Firewall – How to allow IPSec over TCP through a Cisco ASA

cisco-asafirewallipsecvpn

I have a internal user that needs to connect via VPN to an external company. The external company's vpn is using IPSec over TCP on port 57369. When my user tries to connect it fails. The logs on my ASA show the following.
Deny TCP (no connection) from 172.x.x.x/1155 to 167.x.x.x/57369 flags RST on interface Inside

How do I allow this traffic through my ASA?

Thanks!

Best Answer

Try adding this to your asa config:

policy-map global_policy
  class inspection_default
    inspect ipsec-pass-thru