キャンセル
次の結果を表示 
次の代わりに検索 
もしかして: 
cancel
578
閲覧回数
0
いいね!
4
返信

AnyConnect が接続60秒後に一度切断し自動再接続します macOS Sonoma AC 4.09 ASA

環境:macOS SonomaのAnyConnect 4.09、ASA、SSL-VPNスプリットトンネル。
症状:接続は成功、約60秒後に一度だけ切断→数秒で自動再接続→以後は安定。特定の1端末のみ。DTLSは無効化不可。
質問:DTLSを維持したままこの“初回60秒切断”を恒久的に止めるには、ASA/クライアントでどの設定をどの値に変更すべきでしょうか。
候補:UDP/443到達性とNAT、MTU/MSS、DPD/Keepalive。実運用で効いた具体値とASDM/CLI手順を教えてください。

4件の返信4

最初の60秒後にいったん切断される事象を解決したいです。

再現:有線/無線とも同一。ASA側は収容正常、~60s切断イベントのみ。クライアントの /opt/cisco/anyconnect/logs に 60sでtunnel down→即再接続を記録。DTLSは使い続けたい。

根本原因の特定と解決策を知りたい:
1) DTLS/UDP経路:UDP/443/NAT/フラグメント、MTU/MSS最適値(例:MSS 1350±)、ASA側での設定箇所(policy-map/class-map、tcpmss、sysopt、mtu、ACL/NAT)と実例値。
2) Keepalive/DPD:初回60秒のドロップを避ける推奨値(ASA webvpn / group-policy / AnyConnectプロファイルの具体項目名と値)。
3) クライアント側:macOS Sonoma×AC 4.09の既知問題(Bug IDがあれば)、推奨アップ/ダウングレード版とプロファイル項目(DTLS/TLS優先、AutoReconnect等)。
4) 決め手となるログ:ASAのsyslog ID/Reasonコード、クライアントログの文字列(“DTLS negotiation failed”“handshake timeout”“DPD failed”等)。これが出たら→どの値を変えると収束したかの実例。

“何をどの値に変えると直るか”の実例(ASDM/CLI)をご教示ください。

■ Environment
- AnyConnect client: 4.09
- OS: macOS Sonoma
- VPN gateway: Cisco ASA
- Connection: SSL-VPN (AnyConnect), split-tunnel enabled

■ Symptom
- VPN connects successfully and the client receives a correct IP.
- Exactly ~60 seconds after connection, the session always disconnects once.
- It auto-reconnects within a few seconds and then remains stable for 20+ minutes.
- This “one drop at ~1 minute” happens every time. I want to eliminate it.

■ Scope
- Occurs on one specific client endpoint only.
- Other users on the same profile are stable (no disconnect).
- On the ASA, the user is admitted correctly, no license issues, and no abnormalities except the ~60s disconnect event.

■ Logs
- AnyConnect Message History records a disconnect exactly ~1 minute after connection.
- Endpoint logs under /opt/cisco/anyconnect/logs/ (vpn.log, acvpnagent.log) show tunnel down at ~60s → immediate reconnect.
- Not a network stability issue (reproduces on both wired and Wi-Fi).

■ Already verified
- Destination networks are included in split-tunnel; routing is correct.
- No ASA firewall rule blocks this user.
- ASA syslog shows no abnormality other than the disconnect event.

■ Questions (DTLS cannot be disabled; seeking concrete fixes)

1) Permanent fix while keeping DTLS enabled
- To eliminate the first-minute drop, what ASA DTLS-related settings (with recommended values) should we review/tune?
Examples: best practices for UDP/443 reachability and NAT traversal, MTU/MSS tuning (recommended range), fragment allowance, required ACL/NAT rules, and DPD/Keepalive values that worked in the field.
- For macOS Sonoma + AnyConnect 4.09, are there known issues where DTLS handshake/keepalive fails around 1 minute and falls back to TCP?
If so, please share recommended client version (upgrade/downgrade targets) and any profile options that resolve it.
(DTLS must remain enabled; we need a solution that continues to use DTLS.)

2) Per-user workaround (keep DTLS globally)
- Without changing global settings, is there a best practice to make only a specific user/group prefer TLS (or force TLS)?
If yes, which is recommended—client XML profile, group-policy, or tunnel-group—and could you provide exact ASDM/CLI steps?
(Global DTLS disable is not possible; we need a scoped workaround.)

3) Evidence to confirm DTLS as root cause (what to capture)
- With DTLS kept enabled, which ASA syslog IDs/reason codes and which client log messages (e.g., “DTLS negotiation failed”, “handshake timeout”, “DPD failed”) are the decisive indicators?
- Once that evidence is captured, which settings (and what values) should be changed to stop the recurrence? Real-world examples are especially helpful.

4) Prioritized action plan (requested)
- Given DTLS must stay on, could you propose a priority-ordered runbook that has worked to stop this issue in the field? For example:
① MTU/MSS optimization (recommended values) → ② Verify UDP/443, NAT, fragmentation → ③ Adjust DPD/Keepalive (recommended intervals) → ④ Update client version / profile options, …
Please include the actual values that resolved it.

Goal: identify exact settings/values and steps (ASA and/or client) that permanently prevent the single disconnect at ~60s while continuing to use DTLS. Command paths or ASDM screenshots/paths are very welcome.



Akira Muranaka
Level 8
Level 8

こんにちは。

特定端末でのみ発生する場合は、端末起因の問題(トラブル)の可能性も高いため、以下のURLを参考に トラブルシューティング用のファイル(DART)を取得してから、Japan TACに問い合わせされてはいかがでしょう?

DART 取得方法
https://www.cisco.com/c/ja_jp/support/docs/security/secure-client/221919-collect-dart-bundle-for-secure-client.html

Japan TAC 日本語での問い合わせ方法
https://community.cisco.com/t5/-/-/ta-p/3160946

 

あと、ご投稿いただいてるコミュニティは、日本語のコミュニティですので、TACに問い合わせする有効な契約をお持ちでなく 英語で海外の方の意見も聞きたい場合は、以下の 英語版のVPNコミュニティに投稿していただくとよいかもしれません。

https://community.cisco.com/t5/vpn/bd-p/6001-discussions-vpn

Hi @Akira Muranaka 
これは数週間前にはすでに共有されていたと思います。ありがとう。