Here's the log file when I try to connect.
Cisco Systems VPN Client Version 5.0.00.0340
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 5.1.2600 Service Pack 3
Config file directory: C:\Program Files\Cisco Systems\VPN Client
1 09:33:28.828 11/10/09 Sev=Info/4 CM/0x63100002
Begin connection process
2 09:33:28.875 11/10/09 Sev=Info/4 CM/0x63100004
Establish secure connection
3 09:33:28.875 11/10/09 Sev=Info/4 CM/0x63100024
Attempt connection with server "67.78.141.82"
4 09:33:28.984 11/10/09 Sev=Info/6 IKE/0x6300003B
Attempting to establish a connection with 67.78.141.82.
5 09:33:28.984 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 67.78.141.82
6 09:33:29.000 11/10/09 Sev=Info/4 IPSEC/0x63700008
IPSec driver successfully started
7 09:33:29.000 11/10/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
8 09:33:29.125 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
9 09:33:29.125 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, VID(Xauth), VID(dpd), VID(Unity), VID(?), KE, ID, NON, VID(?), VID(Nat-T), NAT-D, NAT-D, HASH) from 67.78.141.82
10 09:33:29.125 11/10/09 Sev=Info/5 IKE/0x63000001
Peer supports XAUTH
11 09:33:29.125 11/10/09 Sev=Info/5 IKE/0x63000001
Peer supports DPD
12 09:33:29.125 11/10/09 Sev=Info/5 IKE/0x63000001
Peer is a Cisco-Unity compliant peer
13 09:33:29.125 11/10/09 Sev=Info/5 IKE/0x63000082
Received IOS Vendor ID with unknown capabilities flag 0x000000A5
14 09:33:29.125 11/10/09 Sev=Info/5 IKE/0x63000001
Peer supports NAT-T
15 09:33:29.125 11/10/09 Sev=Info/6 IKE/0x63000001
IOS Vendor ID Contruction successful
16 09:33:29.125 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 67.78.141.82
17 09:33:29.125 11/10/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
18 09:33:29.125 11/10/09 Sev=Info/4 IKE/0x63000083
IKE Port in use - Local Port = 0x0989, Remote Port = 0x1194
19 09:33:29.125 11/10/09 Sev=Info/5 IKE/0x63000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
20 09:33:29.125 11/10/09 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
21 09:33:29.140 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
22 09:33:29.140 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_INITIAL_CONTACT) from 67.78.141.82
23 09:33:29.140 11/10/09 Sev=Warning/2 IKE/0xA3000067
Received Unexpected InitialContact Notify (PLMgrNotify:886)
24 09:33:29.140 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
25 09:33:29.140 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 67.78.141.82
26 09:33:29.140 11/10/09 Sev=Info/5 IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds
27 09:33:29.140 11/10/09 Sev=Info/5 IKE/0x63000047
This SA has already been alive for 1 seconds, setting expiry to 86399 seconds from now
28 09:33:29.140 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
29 09:33:29.140 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 67.78.141.82
30 09:33:29.140 11/10/09 Sev=Info/4 CM/0x63100015
Launch xAuth application
31 09:33:34.171 11/10/09 Sev=Info/4 CM/0x63100017
xAuth application returned
32 09:33:34.171 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 67.78.141.82
33 09:33:34.187 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
34 09:33:34.187 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 67.78.141.82
35 09:33:34.187 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 67.78.141.82
36 09:33:34.187 11/10/09 Sev=Info/4 CM/0x6310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
37 09:33:34.453 11/10/09 Sev=Info/5 IKE/0x6300005E
Client sending a firewall request to concentrator
38 09:33:34.453 11/10/09 Sev=Info/5 IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).
39 09:33:34.453 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 67.78.141.82
40 09:33:34.468 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
41 09:33:34.468 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 67.78.141.82
42 09:33:34.468 11/10/09 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 10.252.1.100
43 09:33:34.468 11/10/09 Sev=Info/5 IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 10.251.0.1
44 09:33:34.468 11/10/09 Sev=Info/5 IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = nattymac.local
45 09:33:34.468 11/10/09 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000
46 09:33:34.468 11/10/09 Sev=Info/5 IKE/0x6300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194
47 09:33:34.468 11/10/09 Sev=Info/4 CM/0x63100019
Mode Config data received
48 09:33:34.484 11/10/09 Sev=Info/4 IKE/0x63000056
Received a key request from Driver: Local IP = 10.252.1.100, GW IP = 67.78.141.82, Remote IP = 0.0.0.0
49 09:33:34.484 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 67.78.141.82
50 09:33:34.500 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
51 09:33:34.500 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:NO_PROPOSAL_CHOSEN) from 67.78.141.82
52 09:33:34.500 11/10/09 Sev=Warning/3 IKE/0xA300004B
Received a NOTIFY message with an invalid protocol id (0)
53 09:33:35.375 11/10/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
54 09:33:39.375 11/10/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
55 09:33:39.875 11/10/09 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
56 09:33:39.875 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(Retransmission) to 67.78.141.82
57 09:33:44.875 11/10/09 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
58 09:33:44.875 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(Retransmission) to 67.78.141.82
59 09:33:49.375 11/10/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
60 09:33:49.875 11/10/09 Sev=Info/4 IKE/0x63000021
Retransmitting last packet!
61 09:33:49.875 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(Retransmission) to 67.78.141.82
62 09:33:54.875 11/10/09 Sev=Info/4 IKE/0x6300002D
Phase-2 retransmission count exceeded: MsgID=E48924F0
63 09:33:54.875 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, NOTIFY

PD_REQUEST) to 67.78.141.82
64 09:33:54.875 11/10/09 Sev=Info/6 IKE/0x6300003D
Sending DPD request to 67.78.141.82, our seq# = 3319899588
65 09:33:54.875 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 67.78.141.82
66 09:33:54.875 11/10/09 Sev=Info/4 IKE/0x63000049
Discarding IPsec SA negotiation, MsgID=E48924F0
67 09:33:54.890 11/10/09 Sev=Info/5 IKE/0x6300002F
Received ISAKMP packet: peer = 67.78.141.82
68 09:33:54.890 11/10/09 Sev=Info/4 IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY

PD_ACK) from 67.78.141.82
69 09:33:54.890 11/10/09 Sev=Info/5 IKE/0x63000040
Received DPD ACK from 67.78.141.82, seq# received = 3319899588, seq# expected = 3319899588
70 09:33:59.375 11/10/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
71 09:34:09.375 11/10/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
72 09:34:19.375 11/10/09 Sev=Info/6 IKE/0x63000055
Sent a keepalive on the IPSec SA
73 09:34:24.875 11/10/09 Sev=Info/4 IKE/0x63000017
Marking IKE SA for deletion (I_Cookie=0168A263A30D7835 R_Cookie=B76953D02B94AC58) reason = DEL_REASON_PEER_NOT_RESPONDING
74 09:34:24.875 11/10/09 Sev=Info/4 IKE/0x63000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 67.78.141.82
75 09:34:25.375 11/10/09 Sev=Info/4 IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=0168A263A30D7835 R_Cookie=B76953D02B94AC58) reason = DEL_REASON_PEER_NOT_RESPONDING
76 09:34:25.375 11/10/09 Sev=Info/4 CM/0x63100012
Phase 1 SA deleted before first Phase 2 SA is up cause by "DEL_REASON_PEER_NOT_RESPONDING". 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
77 09:34:25.375 11/10/09 Sev=Info/5 CM/0x63100025
Initializing CVPNDrv
78 09:34:25.375 11/10/09 Sev=Info/6 CM/0x63100046
Set tunnel established flag in registry to 0.
79 09:34:25.375 11/10/09 Sev=Info/4 IKE/0x63000001
IKE received signal to terminate VPN connection
80 09:34:25.593 11/10/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
81 09:34:25.593 11/10/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
82 09:34:25.593 11/10/09 Sev=Info/4 IPSEC/0x63700014
Deleted all keys
83 09:34:25.593 11/10/09 Sev=Info/4 IPSEC/0x6370000A
IPSec driver successfully stopped