I can confirm that this workaround worked for me on an ASA5505 running 9.2(2), but not on an ASA5510 running 8.4(5). The only differences in the group-policy configurations between the two is I have "client-bypass-protocol enable" set on the 5505 running 9.2(2), but this does not seem to be available on the 5510 running 8.4(5).
I plan to upgrade the 5510 to 9.1.6 sometime next week and see if this command is supported (or even needed) for this workaround to work.
In detail, what I'm seeing on my Yosemite client when it's NOT working is:
- /etc/resolv.conf is not found
- scutil --dns shows the iphone IP as nameserver[0] with no other namservers listed
- netstat -nr shows default route with "I" flag added. This flag is not present when Anyconnect is not connected nor when connected to my wokraround-enabled 5505 running 9.2(2).
The above behavior is the same whether I am tethered via USB or via wi-fi. I've not attempted bluetooth tethering yet, but I'm suspecting the result may be the same.
Existing connections continue to work, but opening any new connections to anything not through the VPN fails with a "network is unreachable" or similar unreachable message. I haven't tried this with split-tunneling disabled since that would not be a viable solution in my case anyway. Re-adding the default route seems to get traffic flowing, but nothing I've tried has gotten the dns resolver to work. It's possible to use the dig, host, or nslookup commands and reference a specific dns server over the tunnel though, but that doesn't help too much for trying to use applications locally.
Since starting write this, I stumbled upon this Cisco technote: http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-cl ient/116016-technote-AnyConnect-00.html that references an older bug https://tools.cisco.com/bugsearch/bug/CSCtz86314 . My symptoms seem to be exactly as described in these docs and then some. Both do mention that version 9.0 or better is needed for the workaround to work though.
Hopefully, my 5510 will far better following the upgrade next week.
My 5505's group-policy settings, for reference:
group-policy vpn1_policy attributes
dns-server value 172.24.0.128 172.24.0.129
vpn-simultaneous-logins 2
vpn-idle-timeout 10
vpn-filter value vpn1-acl
vpn-tunnel-protocol ssl-client
password-storage disable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value vpn1-acl
default-domain value xnxnxn.com
split-tunnel-all-dns disable
client-bypass-protocol enable
webvpn
anyconnect keep-installer installed
anyconnect ssl keepalive 290
anyconnect dpd-interval client 10
anyconnect dpd-interval gateway 30
anyconnect ask none default anyconnect