I have a internal user that needs to connect via VPN to an external company. The external company's vpn is using IPSec over TCP on port 57369. When my user tries to connect it fails. The logs on my ASA show the following. Deny TCP (no connection) from 172.x.x.x/1155 to 167.x.x.x/57369 flags RST on interface Inside
How do I allow this traffic through my ASA?
Thanks!
Try adding this to your asa config:
After capturing the traffic and testing some different setting. The problem looks like its on the remote side, not my ASA. I confirmed with Cisco that I'll I need to do is have inspect ipsec-pass-thru.
Thanks!