I am assuming you are using Remote Access VPN on Cisco Firewall ( ASA/FTD ) connected behind the Router ?
If so, can you please check the following:
- 192.168.178.0/24 is part of your split tunneling policies in your Firewall ? are you able to ping any other IP from this range ?
- Can you please check whether in your Router you have added the Route for VPN Client Pool addresses pointing back to firewall ?
I am using Cisco AnyConnect Secure Mobility Client 4.9.06037. I don't have that (ASA/FTD). I dont have access to the address range 192.168.178.* . In my "Connect BOX Unitymedia" router, I have no way to define the VPN route. Thanks
As soon you connect to VPN your Corporate network, all traffic go Via Full tunnel, if you do not like that to happend, you need to configure split tunnel config (if you have control on device) - if this is given by company you have less rights to change this.
Not sure if have option to change yourself as per the business policy. check below guide may help you :
you can check below guide : see if you can able to do some action your side (if this is not locked ?)