I saw the DH group mismatch error and changed the group # and got these results from the debug:
RH2811-B#
*May 27 14:06:53.594: IPSEC(sa_request): ,
(key eng. msg.) OUTBOUND local= 208.47.200.122, remote= 206.17.98.20,
local_proxy= 10.0.0.0/255.0.0.0/0/0 (type=4),
remote_proxy= 10.100.25.58/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= esp-3des esp-sha-hmac (Tunnel),
lifedur= 86400s and 4608000kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
*May 27 14:06:53.598: ISAKMP: set new node 0 to QM_IDLE
*May 27 14:06:53.598: SA has outstanding requests (local 74.50.12.108 port 500,
remote 74.50.12.136 port 500)
*May 27 14:06:53.598: ISAKMP

1003): sitting IDLE. Starting QM immediately (QM_I
DLE )
*May 27 14:06:53.598: ISAKMP

1003):beginning Quick Mode exchange, M-ID of -1651
972654
*May 27 14:06:53.598: ISAKMP

1003):QM Initiator gets spi
*May 27 14:06:53.598: crypto_engine: Generate IKE hash
*May 27 14:06:53.602: crypto_engine: Encrypt IKE packet
*May 27 14:06:53.602: ISAKMP

1003): sending packet to 206.17.98.20 my_port 500
peer_port 500 (R) QM_IDLE
*May 27 14:06:53.602: ISAKMP

1003):Sending an IKE IPv4 Packet.
*May 27 14:06:53.602: ISAKMP

1003):Node -1651972654, Input = IKE_MESG_INTERNAL,
IKE_INIT_QM
*May 27 14:06:53.602: ISAKMP

1003):Old State = IKE_QM_READY New State = IKE_QM
_I_QM1
*May 27 14:06:53.638: ISAKMP (0:1003): received packet from 206.17.98.20 dport 5
00 sport 500 Global (R) QM_IDLE
*May 27 14:06:53.638: crypto_engine: Decrypt IKE packet
*May 27 14:06:53.642: crypto_engine: Generate IKE hash
*May 27 14:06:53.642: ISAKMP

1003): processing HASH payload. message ID = -1651
972654
*May 27 14:06:53.642: ISAKMP

1003): processing SA payload. message ID = -165197
2654
*May 27 14:06:53.642: ISAKMP

1003):Checking IPSec proposal 1
*May 27 14:06:53.642: ISAKMP: transform 1, ESP_3DES
*May 27 14:06:53.642: ISAKMP: attributes in transform:
*May 27 14:06:53.642: ISAKMP: encaps is 1 (Tunnel)
*May 27 14:06:53.642: ISAKMP: SA life type in seconds
*May 27 14:06:53.642: ISAKMP: SA life duration (VPI) of 0x0 0x1 0x51 0x80
*May 27 14:06:53.642: ISAKMP: SA life type in kilobytes
*May 27 14:06:53.642: ISAKMP: SA life duration (VPI) of 0x0 0x46 0x50 0x0
*May 27 14:06:53.642: ISAKMP: authenticator is HMAC-SHA
*May 27 14:06:53.642: ISAKMP

1003):atts are acceptable.
*May 27 14:06:53.642: IPSEC(validate_proposal_request): proposal part #1
*May 27 14:06:53.642: IPSEC(validate_proposal_request): proposal part #1,
(key eng. msg.) INBOUND local= 208.47.200.122, remote= 206.17.98.20,
local_proxy= 10.0.0.0/255.0.0.0/0/0 (type=4),
remote_proxy= 10.100.25.58/255.255.255.255/0/0 (type=1),
protocol= ESP, transform= NONE (Tunnel),
lifedur= 0s and 0kb,
spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0
*May 27 14:06:53.642: Crypto mapdb : proxy_match
src addr : 10.0.0.0
dst addr : 10.100.25.58
protocol : 0
src port : 0
dst port : 0
*May 27 14:06:53.642: ISAKMP

1003): processing NONCE payload. message ID = -165
1972654
*May 27 14:06:53.642: ISAKMP

1003): processing ID payload. message ID = -165197
2654
*May 27 14:06:53.642: ISAKMP

1003): processing ID payload. message ID = -165197
2654
*May 27 14:06:53.642: ISAKMP

1003): processing NOTIFY RESPONDER_LIFETIME protoc
ol 3
spi 3207220409, message ID = -1651972654, sa = 4A320B04
*May 27 14:06:53.642: ISAKMP

1003):SA authentication status:
authenticated
*May 27 14:06:53.642: ISAKMP

1003): processing responder lifetime
*May 27 14:06:53.642: ISAKMP

1003): processing NOTIFY RESPONDER_LIFETIME protoc
ol 3
spi 3207220409, message ID = -1651972654, sa = 4A320B04
*May 27 14:06:53.646: ISAKMP

1003):SA authentication status:
authenticated
*May 27 14:06:53.646: ISAKMP

1003): processing responder lifetime
*May 27 14:06:53.646: crypto_engine: Generate IKE hash
*May 27 14:06:53.646: crypto_engine: Generate IKE QM keys
*May 27 14:06:53.646: crypto_engine: Create IPSec SA (by keys)
*May 27 14:06:53.646: crypto_engine: Generate IKE QM keys
*May 27 14:06:53.646: crypto_engine: Create IPSec SA (by keys)
*May 27 14:06:53.646: ISAKMP

1003): Creating IPSec SAs
*May 27 14:06:53.646: inbound SA from 206.17.98.20 to 208.47.200.122 (f/
i) 0/ 0
(proxy 10.100.25.58 to 10.0.0.0)
*May 27 14:06:53.646: has spi 0xBF2A4CB9 and conn_id 0
*May 27 14:06:53.646: lifetime of 86400 seconds
*May 27 14:06:53.646: lifetime of 4608000 kilobytes
*May 27 14:06:53.646: outbound SA from 208.47.200.122 to 206.17.98.20 (f
/i) 0/0
(proxy 10.0.0.0 to 10.100.25.58)
*May 27 14:06:53.646: has spi 0xC98221A6 and conn_id 0
*May 27 14:06:53.646: lifetime of 86400 seconds
*May 27 14:06:53.646: lifetime of 4608000 kilobytes
*May 27 14:06:53.650: crypto_engine: Encrypt IKE packet
*May 27 14:06:53.650: ISAKMP

1003): sending packet to 206.17.98.20 my_port 500
peer_port 500 (R) QM_IDLE
*May 27 14:06:53.650: ISAKMP

1003):Sending an IKE IPv4 Packet.
*May 27 14:06:53.650: ISAKMP

1003):deleting node -1651972654 error FALSE reason
"No Error"
*May 27 14:06:53.650: ISAKMP

1003):Node -1651972654, Input = IKE_MESG_FROM_PEER
, IKE_QM_EXCH
*May 27 14:06:53.650: ISAKMP

1003):Old State = IKE_QM_I_QM1 New State = IKE_QM
_PHASE2_COMPLETE
*May 27 14:06:53.650: IPSEC(key_engine): got a queue event with 1 KMI message(s)
*May 27 14:06:53.650: Crypto mapdb : proxy_match
src addr : 10.0.0.0
dst addr : 10.100.25.58
protocol : 0
src port : 0
dst port : 0
*May 27 14:06:53.650: IPSEC(crypto_ipsec_sa_find_ident_head): reconnecting with
the same proxies and peer 206.17.98.20
*May 27 14:06:53.650: IPSEC(rte_mgr): VPN Route Event create SA based on crypto
ACL in real time for 206.17.98.20
*May 27 14:06:53.650: IPSEC(rte_mgr): VPN Route Refcount 1 Serial0/0/0:0
*May 27 14:06:53.654: IPSEC(rte_mgr): VPN Route Added 10.100.25.58 255.255.255.2
55 via 0.0.0.0 in IP DEFAULT TABLE with tag 0 distance 1
*May 27 14:06:53.654: IPSEC(policy_db_add_ident): src 10.0.0.0, dest 10.100.25.5
8, dest_port 0
*May 27 14:06:53.654: IPSEC(create_sa): sa created,
(sa) sa_dest= 208.47.200.122, sa_proto= 50,
sa_spi= 0xBF2A4CB9(3207220409),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2017
*May 27 14:06:53.654: IPSEC(create_sa): sa created,
(sa) sa_dest= 206.17.98.20, sa_proto= 50,
sa_spi= 0xC98221A6(3380748710),
sa_trans= esp-3des esp-sha-hmac , sa_conn_id= 2018
*May 27 14:06:53.654: crypto engine: updating MTU size of IPSec SA NETGX:18
*May 27 14:06:53.654: crypto_engine: Set IPSec MTU
*May 27 14:06:53.654: IPSEC(update_current_outbound_sa): updated peer 206.17.98.
20 current outbound sa to SPI C98221A6
*May 27 14:07:43.650: ISAKMP

1003)

urging node -1651972654