Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
I would like to implement a remote access VPN with Racoon to Cisco ASA using certificate.
It works fine now so the following steps have already implemented successfully:
- Phase 1 is completed with success
- Phase 2 is completed with success
When I try to send packets from the Linux client using racoon I got the following errors on Cisco ASA:
Jul 15 16:31:22 [IKEv1 DEBUG]: Pitcher: received a key acquire message, spi 0x0
Jul 15 16:31:22 [IKEv1]: IKE Initiator unable to find policy: Intf inside, Src: INTERNAL_DEST, Dst: LINUX_SRC
So the incoming traffic should be OK from racoon to ASA because it matched to my crypto map configuration on the ASA but from some reason the answer packets are denied by the ASA.
I could debug the VPN process on the ASA and I can see all automatically and temporary generated VPN access list. So it seems everything is fine but I have this problem with the answer packets.
I haven't find any documentation for this solution but I don't think I'm the only person who wanted to implement this.