I upgraded from 8.3(1) to 8.4(3) and all seemed well until someone mentioned that no one could make connections from the inside network to the VPN client pool addresses. When I trace the TCP SYN connections and look at the frame headers, I can see that the initial packet goes to the ASA inside interface, then the ASA forwards it to an internal router that it has a static route for for the internal net space ... and the router punts it back to the ASA because it has a route to it for the VPN pool address ... and so on until the TTL expires. I don't think this was the case prior to the upgrade.
Opened a TAC but haven't resolved it yet. Wanted to see if anyone had the same experience. The remote access users can connect to internal nets fine, it's just figuring out how to get connections initiated from the inside to work.
After some research, I'm guessing it has something to do with how the ASA gives precedence to NAT rules over its routing table starting with 8.4(2):
http://packetpushers.net/understanding-when-a-cisco-asa-nat-rule-can-override-the-asa-routing-table/
Thoughts? I'm not planning to post a config here or anything, but just as a general question.