Core issue
This issue is documented in Cisco bug ID CSCse96559.
This problem occurs when the vpn-filter command is applied to the group-policy for remote access IPSec clients on a PIX Firewall/Cisco Adaptive Security Appliance (ASA) running 7.2.1. This issue only affects Cisco IOS EZVPN clients.
Resolution
As a workaround, perform these steps:
- Disable the sysopt connection permit-vpn command:
hostname(config)# no sysopt connection permit-vpn
- Issue the access-group command in order to apply the Access Control List (ACL) to the outside interface:
hostname(config) #access-group <acl_out> in interface outside
This allows the VPN users to go through the outside ACL before the internal network is accessed.