Couple of things, You are assigning IP Address to the VPN Clients from a pool which is part of the LAN behind the Pix. This is not a recommended configuration. Also, I dont see a NAT 0 command to bypass NAT for the VPN Clients. So, you could try
access-list inside_outbound_nat0_acl permit ip AB01-LF 255.255.255.0 AB01-LF 255.255.255.0
After, applying the above ACL, your VPN Client still does not work. Then I would recommend that you configure a pool for the VPN Clients from a range of IP that is not part of your internal LAN. Example, 172.16.1.0/24 and also configure NAT 0 to bypass NAT.
access-list inside_outbound_nat0_acl permit ip AB01-LF 255.255.255.0 172.16.1.0 255.255.255.0
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...