For starters here is the error that is logged on the ASA when a user tries to login. Remember when a user logs in from my DMZ they can connect fine to the ASA. This error comes from a user on Internet.
4|Feb 10 2009|10:10:32|713903|||||Group = DefaultRAGroup, IP = 71.111.178.132, Error: Unable to remove PeerTblEntry
3|Feb 10 2009|10:10:32|713902|||||Group = DefaultRAGroup, IP = 71.111.178.132, Removing peer from peer table failed, no match!
7|Feb 10 2009|10:10:32|713236|||||IP = 71.111.178.132, IKE_DECODE SENDING Message (msgid=2cd862d9) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80
7|Feb 10 2009|10:10:32|715046|||||Group = DefaultRAGroup, IP = 71.111.178.132, constructing qm hash payload
7|Feb 10 2009|10:10:32|715046|||||Group = DefaultRAGroup, IP = 71.111.178.132, constructing IKE delete payload
7|Feb 10 2009|10:10:32|715046|||||Group = DefaultRAGroup, IP = 71.111.178.132, constructing blank hash payload
7|Feb 10 2009|10:10:32|713906|||||Group = DefaultRAGroup, IP = 71.111.178.132, sending delete/delete with reason message
7|Feb 10 2009|10:10:32|713906|||||Group = DefaultRAGroup, IP = 71.111.178.132, IKE SA MM:37445713 terminating: flags 0x01000002, refcnt 0, tuncnt 0
7|Feb 10 2009|10:10:32|715065|||||Group = DefaultRAGroup, IP = 71.111.178.132, IKE MM Responder FSM error history (struct &0xd5fbe528) <state>, <event>: MM_DONE, EV_ERROR-->MM_WAIT_MSG5, EV_PROB_AUTH_FAIL-->MM_WAIT_MSG5, EV_TIMEOUT-->MM_WAIT_MSG5, NullEvent-->MM_SND_MSG4, EV_CRYPTO_ACTIVE-->MM_SND_MSG4, EV_SND_MSG-->MM_SND_MSG4, EV_START_TMR-->MM_SND_MSG4, EV_RESEND_MSG
7|Feb 10 2009|10:10:00|713236|||||IP = 71.111.178.132, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 304
7|Feb 10 2009|10:10:00|713906|||||Group = DefaultRAGroup, IP = 71.111.178.132, Generating keys for Responder...
7|Feb 10 2009|10:10:00|713906|||||IP = 71.111.178.132, Connection landed on tunnel_group DefaultRAGroup
7|Feb 10 2009|10:10:00|713906|||||IP = 71.111.178.132, computing NAT Discovery hash
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing NAT-Discovery payload
7|Feb 10 2009|10:10:00|713906|||||IP = 71.111.178.132, computing NAT Discovery hash
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing NAT-Discovery payload
7|Feb 10 2009|10:10:00|715048|||||IP = 71.111.178.132, Send Altiga/Cisco VPN3000/Cisco ASA GW VID
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing VID payload
7|Feb 10 2009|10:10:00|715038|||||IP = 71.111.178.132, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)
7|Feb 10 2009|10:10:00|715048|||||IP = 71.111.178.132, Send IOS VID
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing xauth V6 VID payload
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing Cisco Unity VID payload
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing nonce payload
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing ke payload
7|Feb 10 2009|10:10:00|713906|||||IP = 71.111.178.132, computing NAT Discovery hash
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing NAT-Discovery payload
7|Feb 10 2009|10:10:00|713906|||||IP = 71.111.178.132, computing NAT Discovery hash
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing NAT-Discovery payload
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing nonce payload
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing ISA_KE payload
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing ke payload
7|Feb 10 2009|10:10:00|713236|||||IP = 71.111.178.132, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + NAT-D (130) + NAT-D (130) + NONE (0) total length : 232
7|Feb 10 2009|10:10:00|713236|||||IP = 71.111.178.132, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 124
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing Fragmentation VID + extended capabilities payload
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing NAT-Traversal VID ver 02 payload
7|Feb 10 2009|10:10:00|715046|||||IP = 71.111.178.132, constructing ISAKMP SA payload
7|Feb 10 2009|10:10:00|715028|||||IP = 71.111.178.132, IKE SA Proposal # 1, Transform # 2 acceptable Matches global IKE entry # 3
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing IKE SA payload
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing VID payload
7|Feb 10 2009|10:10:00|715049|||||IP = 71.111.178.132, Received NAT-Traversal ver 02 VID
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing VID payload
7|Feb 10 2009|10:10:00|715049|||||IP = 71.111.178.132, Received Fragmentation VID
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing VID payload
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing VID payload
7|Feb 10 2009|10:10:00|713906|||||IP = 71.111.178.132, Oakley proposal is acceptable
7|Feb 10 2009|10:10:00|715047|||||IP = 71.111.178.132, processing SA payload
7|Feb 10 2009|10:10:00|713236|||||IP = 71.111.178.132, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 312