I would like to implement a remote access VPN with Racoon to Cisco ASA using certificate.
It works fine now so the following steps have already implemented successfully:
- Phase 1 is completed with success
- Phase 2 is completed with success
When I try to send packets from the Linux client using racoon I got the following errors on Cisco ASA:
Jul 15 16:31:22 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0
Jul 15 16:31:22 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: INTERNAL_DEST, Dst: LINUX_SRC
So the incoming traffic should be OK from racoon to ASA because it matched to my crypto map configuration on the ASA (I could see it on DEBUG level on ASA) but from some reason the answer packets are denied by the ASA.
I could debug the VPN process on the ASA and I can see all automatically and temporary generated VPN access list. So it seems everything is fine but I have this problem with the answer packets.
I haven't find any documentation for this solution but I don't think I'm the only person who wanted to implement this.