Here's what the Cisco log says.
Cisco Systems VPN Client Version 4.9.01 (0100)
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Mac OS X
Running on: Darwin 9.2.2 Darwin Kernel Version 9.2.2: Tue Mar 4 21:17:34 PST 2008; root:xnu-1228.4.31~1/RELEASE_I386 i386
195 16:52:01.725 04/25/2008 Sev=Info/4 CM/0x43100002
Begin connection process
196 16:52:01.725 04/25/2008 Sev=Warning/2 CVPND/0x83400011
Error -28 sending packet. Dst Addr: 0xAC1087FF, Src Addr: 0xAC108701 (DRVIFACE:1158).
197 16:52:01.726 04/25/2008 Sev=Warning/2 CVPND/0x83400011
Error -28 sending packet. Dst Addr: 0xAC10D0FF, Src Addr: 0xAC10D001 (DRVIFACE:1158).
198 16:52:01.726 04/25/2008 Sev=Info/4 CM/0x43100004
Establish secure connection using Ethernet
199 16:52:01.727 04/25/2008 Sev=Info/4 CM/0x43100024
Attempt connection with server "vpn.spgsolar.com"
200 16:52:01.732 04/25/2008 Sev=Info/4 CVPND/0x43400019
Privilege Separation: binding to port: (500).
201 16:52:01.735 04/25/2008 Sev=Info/4 CVPND/0x43400019
Privilege Separation: binding to port: (4500).
202 16:52:01.735 04/25/2008 Sev=Info/6 IKE/0x4300003B
Attempting to establish a connection with 12.26.39.2.
203 16:52:01.837 04/25/2008 Sev=Info/4 IKE/0x43000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 12.26.39.2
204 16:52:01.973 04/25/2008 Sev=Info/4 IPSEC/0x43700008
IPSec driver successfully started
205 16:52:01.973 04/25/2008 Sev=Info/4 IPSEC/0x43700014
Deleted all keys
206 16:52:01.973 04/25/2008 Sev=Info/4 IPSEC/0x4370000D
Key(s) deleted by Interface (192.168.0.135)
207 16:52:01.979 04/25/2008 Sev=Info/5 IKE/0x4300002F
Received ISAKMP packet: peer = 12.26.39.2
208 16:52:01.979 04/25/2008 Sev=Info/4 IKE/0x43000014
RECEIVING <<< ISAKMP OAK AG (SA, VID(Xauth), VID(dpd), VID(Unity), VID(?), KE, ID, NON, VID(?), VID(Nat-T), NAT-D, NAT-D, HASH) from 12.26.39.2
209 16:52:01.979 04/25/2008 Sev=Info/5 IKE/0x43000001
Peer supports XAUTH
210 16:52:01.979 04/25/2008 Sev=Info/5 IKE/0x43000001
Peer supports DPD
211 16:52:01.979 04/25/2008 Sev=Info/5 IKE/0x43000001
Peer is a Cisco-Unity compliant peer
212 16:52:01.979 04/25/2008 Sev=Info/5 IKE/0x43000082
Received IOS Vendor ID with unknown capabilities flag 0x000000A5
213 16:52:01.979 04/25/2008 Sev=Info/5 IKE/0x43000001
Peer supports NAT-T
214 16:52:02.101 04/25/2008 Sev=Info/6 IKE/0x43000001
IOS Vendor ID Contruction successful
215 16:52:02.101 04/25/2008 Sev=Info/4 IKE/0x43000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, NAT-D, NAT-D, VID(?), VID(Unity)) to 12.26.39.2
216 16:52:02.102 04/25/2008 Sev=Info/6 IKE/0x43000055
Sent a keepalive on the IPSec SA
217 16:52:02.102 04/25/2008 Sev=Info/4 IKE/0x43000083
IKE Port in use - Local Port = 0x1194, Remote Port = 0x1194
218 16:52:02.102 04/25/2008 Sev=Info/5 IKE/0x43000072
Automatic NAT Detection Status:
Remote end is NOT behind a NAT device
This end IS behind a NAT device
219 16:52:02.102 04/25/2008 Sev=Info/4 CM/0x4310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
220 16:52:02.102 04/25/2008 Sev=Info/4 CM/0x4310000E
Established Phase 1 SA. 1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system
221 16:52:02.103 04/25/2008 Sev=Info/4 IKE/0x43000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to 12.26.39.2
222 16:52:02.124 04/25/2008 Sev=Info/5 IKE/0x4300002F
Received ISAKMP packet: peer = 12.26.39.2
223 16:52:02.124 04/25/2008 Sev=Info/4 IKE/0x43000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from 12.26.39.2
224 16:52:02.125 04/25/2008 Sev=Info/5 IKE/0x43000045
RESPONDER-LIFETIME notify has value of 86400 seconds
225 16:52:02.125 04/25/2008 Sev=Info/5 IKE/0x43000047
This SA has already been alive for 1 seconds, setting expiry to 86399 seconds from now
226 16:52:02.134 04/25/2008 Sev=Info/5 IKE/0x4300002F
Received ISAKMP packet: peer = 12.26.39.2
227 16:52:02.134 04/25/2008 Sev=Info/4 IKE/0x43000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from 12.26.39.2
228 16:52:02.134 04/25/2008 Sev=Info/5 IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 192.168.10.209
229 16:52:02.134 04/25/2008 Sev=Info/5 IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 192.168.1.11
230 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(2): , value = 192.168.1.12
231 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 192.168.1.11
232 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x43000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(2) (a.k.a. WINS) : , value = 192.168.1.12
233 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x4300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = sp
234 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x4300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000001
235 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x4300000F
SPLIT_NET #1
subnet = 192.168.1.0
mask = 255.255.255.0
protocol = 0
src port = 0
dest port=0
236 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x4300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000
237 16:52:02.135 04/25/2008 Sev=Info/5 IKE/0x4300000D
MODE_CFG_REPLY: Attribute = Received and using NAT-T port number , value = 0x00001194
238 16:52:02.135 04/25/2008 Sev=Info/4 CM/0x43100019
Mode Config data received
239 16:52:02.139 04/25/2008 Sev=Info/4 IKE/0x43000056
Received a key request from Driver: Local IP = 192.168.1.47, GW IP = 12.26.39.2, Remote IP = 0.0.0.0
240 16:52:02.139 04/25/2008 Sev=Info/4 IKE/0x43000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to 12.26.39.2
241 16:52:02.167 04/25/2008 Sev=Info/5 IKE/0x4300002F
Received ISAKMP packet: peer = 12.26.39.2
242 16:52:02.167 04/25/2008 Sev=Info/4 IKE/0x43000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from 12.26.39.2
243 16:52:02.167 04/25/2008 Sev=Info/5 IKE/0x43000045
RESPONDER-LIFETIME notify has value of 28800 seconds
244 16:52:02.167 04/25/2008 Sev=Info/5 IKE/0x43000046
RESPONDER-LIFETIME notify has value of 4608000 kb
245 16:52:02.167 04/25/2008 Sev=Info/4 IKE/0x43000013
SENDING >>> ISAKMP OAK QM *(HASH) to 12.26.39.2
246 16:52:02.168 04/25/2008 Sev=Info/5 IKE/0x43000059
Loading IPsec SA (MsgID=CFD4212C OUTBOUND SPI = 0x6526F06B INBOUND SPI = 0x12BDD98F)
247 16:52:02.168 04/25/2008 Sev=Info/5 IKE/0x43000025
Loaded OUTBOUND ESP SPI: 0x6526F06B
248 16:52:02.168 04/25/2008 Sev=Info/5 IKE/0x43000026
Loaded INBOUND ESP SPI: 0x12BDD98F
249 16:52:02.168 04/25/2008 Sev=Info/4 CM/0x4310001A
One secure connection established
250 16:52:02.168 04/25/2008 Sev=Info/4 CVPND/0x4340001E
Privilege Separation: reducing MTU on primary interface.
251 16:52:02.174 04/25/2008 Sev=Info/4 CVPND/0x4340001B
Privilege Separation: backing up resolv.conf file.
252 16:52:02.175 04/25/2008 Sev=Info/4 CVPND/0x4340001D
Privilege Separation: chown( /var/run/resolv.conf.vpnbackup, uid=0, gid=1 ).
253 16:52:02.176 04/25/2008 Sev=Info/4 CVPND/0x43400018
Privilege Separation: opening file: (/var/run/resolv.conf).
254 16:52:02.192 04/25/2008 Sev=Info/4 CM/0x4310003B
Address watch added for 192.168.1.47. Current hostname: eddie-liangs-macbook-pro-15.local, Current address(es): 192.168.1.47, 172.16.135.1, 172.16.208.1.
255 16:52:02.760 04/25/2008 Sev=Info/4 IPSEC/0x43700014
Deleted all keys
256 16:52:02.760 04/25/2008 Sev=Info/4 IPSEC/0x43700010
Created a new key structure
257 16:52:02.760 04/25/2008 Sev=Info/4 IPSEC/0x4370000F
Added key with SPI=0x6bf02665 into key list
258 16:52:02.760 04/25/2008 Sev=Info/4 IPSEC/0x43700010
Created a new key structure
259 16:52:02.761 04/25/2008 Sev=Info/4 IPSEC/0x4370000F
Added key with SPI=0x8fd9bd12 into key list
260 16:52:12.474 04/25/2008 Sev=Info/6 IKE/0x43000055
Sent a keepalive on the IPSec SA
261 16:52:22.474 04/25/2008 Sev=Info/6 IKE/0x43000055
Sent a keepalive on the IPSec SA
262 16:52:32.474 04/25/2008 Sev=Info/6 IKE/0x43000055
Sent a keepalive on the IPSec SA
263 16:52:42.474 04/25/2008 Sev=Info/6 IKE/0x43000055
Sent a keepalive on the IPSec SA
264 16:52:48.533 04/25/2008 Sev=Info/4 CM/0x4310000A
Secure connections terminated
265 16:52:48.533 04/25/2008 Sev=Info/4 IKE/0x43000001
IKE received signal to terminate VPN connection
266 16:52:48.533 04/25/2008 Sev=Info/4 IKE/0x43000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 12.26.39.2
267 16:52:48.534 04/25/2008 Sev=Info/5 IKE/0x43000018
Deleting IPsec SA: (OUTBOUND SPI = 6526F06B INBOUND SPI = 12BDD98F)
268 16:52:48.534 04/25/2008 Sev=Info/4 IKE/0x43000049
Discarding IPsec SA negotiation, MsgID=CFD4212C
269 16:52:48.534 04/25/2008 Sev=Info/4 IKE/0x43000017
Marking IKE SA for deletion (I_Cookie=866216F65FF0571E R_Cookie=98FE3D252BB92390) reason = DEL_REASON_RESET_SADB
270 16:52:48.534 04/25/2008 Sev=Info/4 IKE/0x43000013
SENDING >>> ISAKMP OAK INFO *(HASH, DEL) to 12.26.39.2
271 16:52:48.534 04/25/2008 Sev=Info/4 IKE/0x4300004B
Discarding IKE SA negotiation (I_Cookie=866216F65FF0571E R_Cookie=98FE3D252BB92390) reason = DEL_REASON_RESET_SADB
272 16:52:48.535 04/25/2008 Sev=Info/4 CM/0x43100013
Phase 1 SA deleted cause by DEL_REASON_RESET_SADB. 0 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system
273 16:52:48.535 04/25/2008 Sev=Info/4 CVPND/0x4340001C
Privilege Separation: restoring resolv.conf file.
274 16:52:48.535 04/25/2008 Sev=Info/4 CVPND/0x4340001D
Privilege Separation: chown( /var/run/resolv.conf, uid=0, gid=1 ).
275 16:52:48.537 04/25/2008 Sev=Info/5 CM/0x43100025
Initializing CVPNDrv
276 16:52:48.539 04/25/2008 Sev=Info/6 CM/0x43100031
Tunnel to headend device vpn.spgsolar.com disconnected: duration: 0 days 0:0:46
277 16:52:48.539 04/25/2008 Sev=Info/4 CVPND/0x4340001F
Privilege Separation: restoring MTU on primary interface.
278 16:52:53.540 04/25/2008 Sev=Warning/2 CVPND/0xC3400018
Privilege Separation: root operation failed.
279 16:52:53.541 04/25/2008 Sev=Info/5 CM/0x43100025
Initializing CVPNDrv
280 16:52:53.541 04/25/2008 Sev=Info/4 CVPND/0x4340001F
Privilege Separation: restoring MTU on primary interface.
281 16:52:53.542 04/25/2008 Sev=Info/4 IPSEC/0x43700013
Delete internal key with SPI=0x8fd9bd12
282 16:52:53.542 04/25/2008 Sev=Info/4 IPSEC/0x4370000C
Key deleted by SPI 0x8fd9bd12
283 16:52:53.542 04/25/2008 Sev=Info/4 IPSEC/0x43700013
Delete internal key with SPI=0x6bf02665
284 16:52:53.542 04/25/2008 Sev=Info/4 IPSEC/0x4370000C
Key deleted by SPI 0x6bf02665
285 16:52:53.542 04/25/2008 Sev=Info/4 IPSEC/0x43700010
Created a new key structure
286 16:52:53.542 04/25/2008 Sev=Info/4 IPSEC/0x4370000B
Key requested
287 16:52:53.542 04/25/2008 Sev=Info/4 IPSEC/0x43700013
Delete internal key with SPI=0x00000000
288 16:52:53.543 04/25/2008 Sev=Info/4 IPSEC/0x43700014
Deleted all keys
289 16:52:53.543 04/25/2008 Sev=Info/4 IPSEC/0x43700014
Deleted all keys
290 16:52:53.543 04/25/2008 Sev=Info/4 IPSEC/0x4370000A
IPSec driver successfully stopped
291 16:52:53.543 04/25/2008 Sev=Info/4 IPSEC/0x43700014
Deleted all keys
292 16:52:53.543 04/25/2008 Sev=Warning/2 IKE/0x83000067
Received an IPC message during invalid state (IKE_MAIN:507)