I can confirm that this is also an issue when running mikrotik/Cisco. I have scheduled a flush every 60min and so far it seems to work ok, not perfect but ok.
It have been like this since version 5.12 and mikrotik support ignores the existence of the error with saying that it works fine and that there must be something wrong with my config.
What is not good is that you have the same issue as me, but I understand you run Mikrotik to Cisco, from your post I understand it was OK before 5.12 with the exact same config?
I have triple checked the configuration, it is set as per the guides on the wiki and from other sites.
My routerboards are 8 months old, how can I go about getting official word from Mikrotik on this issue?
I reported a similar bug to MT a couple of months ago. It was between Windows/MT and MT/MT
The main point of the report was that when you get a connection error for any reason (network problem, password problem, etc …) MT doesn’t fully clear the SAs. They disappear from your list but MT still tries to use them later, so the connection won’t establish because both sides try to use different keys. You can fix it by flushing the SAs because that will also clear the phantom ones.
Anyways, I don’t remember the issue fully, but MT tested and confirmed it as a bug. It was a few weeks before Ros 5.22 came out, so I don’t think it had been fixed yet.
Sorry for my bad language, it didn’t work before 5.12 either, I started using VPN from version 5.12, it have never worked flawless.
I suggest that you contact support@mikrotik.com. One would believe that VPN should work fine between two Mikrotiks as they are using the same RFC. Cisco does not follow the RFC completely - therefore there might be some compliance issues between them and Mikrotik.
But one would think that Mikrotik could have made a “Cisco”-setting or something which fixes this since Cisco have a very great advantage on the market.
I have never tried that actually - but I am running it now on one of my MT/Cisco solutions. Will turn off flushing SA tonight and see if it works until tomorrow morning.
RouterOS creates new SAs before SA lifetime expires and notifies about it remote peer. ASA simply does not respond and do not make new SAs. So without access to ASA or detailed debug logs from it is hard to tell why it is happening.