09-23-2025 04:13 PM
Environment: macOS Sonoma AnyConnect 4.09, ASA, SSL-VPN split tunnel.
Symptom: Connection was successful, only once disconnected after about 60 seconds→ Automatic reconnection in a few seconds→ Stable after that. Only one specific terminal. DTLS cannot be disabled.
Question: What setting should be changed to what value on the ASA/client to permanently stop this "first 60 seconds disconnect" while maintaining DTLS?
Candidates: UDP/443 reachability and NAT, MTU/MSS, and DPD/Keepalive. What are the specific values and ASDM/CLI procedures that worked for production?
Solved! Go to Solution.
10-05-2025 06:06 PM
Hi.
If the problem occurs only on a specific terminal, it is likely that the problem (trouble) is caused by the terminal. So, please refer to the following URL to obtain a file (DART) for troubleshooting, and then contact TAC.
Also, the community you are posting is a Japanese community, so if you do not have a valid agreement to contact TAC and want to hear opinions from overseas people in English, you may want to post in the English version of the VPN community below.
https://community.cisco.com/t5/vpn/bd-p/6001-discussions-vpn
09-23-2025 04:20 PM
■ Environment
- AnyConnect client: 4.09
- OS: macOS Sonoma
- VPN gateway: Cisco ASA
- Connection: SSL-VPN (AnyConnect), split-tunnel enabled
■ Symptom
- VPN connects successfully and the client receives a correct IP.
- Exactly ~60 seconds after connection, the session always disconnects once.
- It auto-reconnects within a few seconds and then remains stable for 20+ minutes.
- This “one drop at ~1 minute” happens every time. I want to eliminate it.
■ Scope
- Occurs on one specific client endpoint only.
- Other users on the same profile are stable (no disconnect).
- On the ASA, the user is admitted correctly, no license issues, and no abnormalities except the ~60s disconnect event.
■ Logs
- AnyConnect Message History records a disconnect exactly ~1 minute after connection.
- Endpoint logs under /opt/cisco/anyconnect/logs/ (vpn.log, acvpnagent.log) show tunnel down at ~60s → immediate reconnect.
- Not a network stability issue (reproduces on both wired and Wi-Fi).
■ Already verified
- Destination networks are included in split-tunnel; routing is correct.
- No ASA firewall rule blocks this user.
- ASA syslog shows no abnormality other than the disconnect event.
■ Questions (DTLS cannot be disabled; seeking concrete fixes)
1) Permanent fix while keeping DTLS enabled
- To eliminate the first-minute drop, what ASA DTLS-related settings (with recommended values) should we review/tune?
Examples: best practices for UDP/443 reachability and NAT traversal, MTU/MSS tuning (recommended range), fragment allowance, required ACL/NAT rules, and DPD/Keepalive values that worked in the field.
- For macOS Sonoma + AnyConnect 4.09, are there known issues where DTLS handshake/keepalive fails around 1 minute and falls back to TCP?
If so, please share recommended client version (upgrade/downgrade targets) and any profile options that resolve it.
(DTLS must remain enabled; we need a solution that continues to use DTLS.)
2) Per-user workaround (keep DTLS globally)
- Without changing global settings, is there a best practice to make only a specific user/group prefer TLS (or force TLS)?
If yes, which is recommended—client XML profile, group-policy, or tunnel-group—and could you provide exact ASDM/CLI steps?
(Global DTLS disable is not possible; we need a scoped workaround.)
3) Evidence to confirm DTLS as root cause (what to capture)
- With DTLS kept enabled, which ASA syslog IDs/reason codes and which client log messages (e.g., “DTLS negotiation failed”, “handshake timeout”, “DPD failed”) are the decisive indicators?
- Once that evidence is captured, which settings (and what values) should be changed to stop the recurrence? Real-world examples are especially helpful.
4) Prioritized action plan (requested)
- Given DTLS must stay on, could you propose a priority-ordered runbook that has worked to stop this issue in the field? For example:
(1) MTU/MSS optimization (recommended values) → (2) Verify UDP/443, NAT, fragmentation → (3) Adjust DPD/Keepalive (recommended intervals) → (4) Update client version / profile options, ...
Please include the actual values that resolved it.
Goal: identify exact settings/values and steps (ASA and/or client) that permanently prevent the single disconnect at ~60s while continuing to use DTLS. Command paths or ASDM screenshots/paths are very welcome.
09-23-2025 04:20 PM
I want to resolve the issue that will be disconnected after the first 60 seconds.
Reproduction: Same as wired/wireless. The ASA side is fully populated and only ~60s disconnect events. Log tunnel down→ immediate reconnection to client /opt/cisco/anyconnect/logs at 60s. I want to keep using DTLS.
Want to know root cause and solutions:
1) DTLS/UDP path: UDP/443/NAT/fragment, MTU/MSS optimal value (e.g., MSS 1350±), setting place on the ASA side (policy-map/class-map, tcpmss, sysopt, mtu, ACL/NAT), and sample value.
2) Keepalive/DPD: Recommended value to avoid dropping for the first 60 seconds (ASA webvpn / group-policy / AnyConnect profile specific item name and value).
3) Client side: Known issues with macOS Sonoma×AC 4.09 (if Bug ID is available), recommended up/down-grade version and profile items (DTLS/TLS priority, AutoConnect, etc.).
4) Defining log: ASA syslog ID/Reason code, client log string (e.g. "DTLS negotiation failed”“handshake timeout”“DPD failed"). An example of → convergence when this occurs.
Please provide an example (ASDM/CLI) of "What to Change to and What to Fix".
10-05-2025 06:06 PM
Hi.
If the problem occurs only on a specific terminal, it is likely that the problem (trouble) is caused by the terminal. So, please refer to the following URL to obtain a file (DART) for troubleshooting, and then contact TAC.
Also, the community you are posting is a Japanese community, so if you do not have a valid agreement to contact TAC and want to hear opinions from overseas people in English, you may want to post in the English version of the VPN community below.
https://community.cisco.com/t5/vpn/bd-p/6001-discussions-vpn
10-05-2025 07:24 PM
Hi @Akira Muranaka
I believe this was already shared here a few weeks ago. Thanks!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide