11-01-2019 06:45 AM - edited 02-21-2020 09:47 PM
Since updating to macOS Catalina, I enjoy using sidecar to extend my laptop screen on my iPad. However, every VPN connection that I established with the AnyConnect Client kills this sidecar connection. Any suggestions?
12-05-2019 11:49 PM
This has been filed to the defect AnyConnect VPN tunnel on macOS interferes with Sidecar feature
bug: https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr70933
We are having communication with the other party to know the exact mechanism.
but the feature uses IPv6 traffic over proprietary virtual wireless interfaces. In order to keep AnyConnect from blocking that traffic you should assign the client an IPv6 address and have a split include IPv6 route that is arbitrary but does not overlap the addressing used. Any valid routable IPv6 should work.
your feedback is highly appreciated.
12-06-2019 04:42 AM
04-27-2020 12:13 AM
This bug had been unsolved for about a year now, is there any hope of fixing it at all?
06-17-2020 12:37 AM
We don't need to route IPv6 traffic through ASA at all. Please enable "Client Bypass Protocol" feature, We need to enable it under specific tunnel-group: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect48/administration/guide/b_AnyConnect_Administrator_Guide_4-8/configure_vpn.html#ID-1428-0000038a
So that way only IPv4 traffic will flow through the tunnel and IPv6 will not be blackholed by AnyConnect, It will go in clear form through the client's network. So that way traffic to sidecar enabled device will not hit tunnel.
Your feedback is highly appreciated
07-16-2020 02:41 AM
Hi, this worked fine for me. I have an ASA 5506-X, Enabled Client Bypass Protocol as directed on AnyConnect Group Policy and Sidecar is up and running now. A note to all end users reading this, this change cannot be made by you, it needs to be made by whoever manages your AnyConnect service.
05-08-2020 06:03 AM
I have this issue too. Actually bought a brand new MacBook Pro to work mobile with my iPad Pro as a second screen and this news is not amusing. No further steps from Cisco in collaboration with Apple on this?
05-08-2020 08:27 AM
Dear giorgio.f,
Sorry no news from Cisco. I solved the problem by using OpenConnect from the command line. This is a little bit of installation work but since then I have no interference with Sidecar or Airdrop... I'm sure that there are also OpenConnect Apps around for macOS.
07-16-2020 02:49 AM
Hi giorgio.f, you need to get whoever manages your AnyConnect VPN service to make the changes given above by ishqaira to enable Client Bypass Protocol option. You cannot do this as an end user, just send the post from ishqaira to whoever looks after the AnyConnect service you use. It took me 30 secoonds to make the changes on mine and Sidecare is up and running.
06-16-2020 02:09 PM - edited 06-16-2020 02:13 PM
09-07-2020 05:47 AM - edited 09-07-2020 05:48 AM
Upon checking with our system administrator his view is that the proposed change reduces the security of the system, and thus should not be applied. Any suggestions for a fix or another workaround? (not involving heavy user-side customization)
09-07-2020 06:59 AM
Hi thias,
I'd be interested to know why he thought it was risky, if you could get a fuller explanation from him that would be great.
The way i understand the feature it changes the behaviour if assigned an ipv4 address on the AnyConnect tunnel that it would stop any ipv6 traffic being routed over it so staying on the client LAN (thus allowing services like SideCare to work).
I wouldn't say this is risky behaviour but may be more unwanted.
It comes down to how your company network is set up, are they using a proxy for internet breakout, are they routing all traffic over VPN or select subnets etc.
If Cisco (ishqaira) are offering advise that poses a secuirty risk then it is in all our interests to know.
09-08-2020 02:51 AM
The Client Protocol Bypass feature allows you to configure how the ASA manages IPv4 traffic when it is expecting only IPv6 traffic or how it manages IPv6 traffic when it is expecting only IPv4 traffic.
When the AnyConnect client makes a VPN connection to the ASA, the ASA could assign it an IPv4, IPv6, or both an IPv4 and IPv6 address. If the ASA assigns the AnyConnect connection only an IPv4 address or only an IPv6 address, you can now configure the Client Bypass Protocol to drop network traffic for which the ASA did not assign an IP address, or allow that traffic to bypass the ASA and be sent from the client unencrypted or “in the clear”.
For example, assume that the ASA assigns only an IPv4 address to an AnyConnect connection and the endpoint is dual stacked and using SideCar. When the endpoint attempts to reach an IPv6 address (SideCar), if Client Bypass Protocol is disabled, the IPv6 traffic is dropped; however, if Client Bypass Protocol is enabled, the IPv6 traffic is sent from the client to SideCar in the clear.
The security risk lays behind your LAN robustness and how Mac sends this IPv6 traffic between your machine and the Car.
11-18-2020 05:34 AM
This is now fixed but requires:
- AnyConnect 4.9.03047 or newer
- macOS Big Sur 11.0.1 or newer
Working great for me now, with sometimes just a brief screen interruption when connecting to the VPN.
01-14-2021 06:41 AM - edited 01-14-2021 06:43 AM
Is this still fixed?
I'm running AnyConnect 4.9.04053 and Big Sur 11.1 and Sidecar is still disconnecting anytime I connect to VPN.
EDIT: Works over wifi but if the iPad is plugged into the computer it won't
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide