Not sure where to begin, so here goes!
Client: W2K sp4 latest netware client patched, vpn client 3.8.15, bm 3.8sp5. NW65sp6

After the update to sp5 this client has had disconnect problems. Regular broadband cable connection, No router. use to work fine. No one else seems to have a problem.

Have taken some info out of the BM activity log for your viewing pleasure. Here is a connection from the client: (must read from bottom to top, sorry that's how it's logged)

The top lines keep repeating until I either restart the server or the client reconnects. Any Ideas on this? Thanks

01/30/2007 01:25:02 PM IPSec (ESP) Inbound SA is not found, SPI=BCBE522D, src=67.163.x.197, dst=216.x.x.34
01/30/2007 01:25:02 PM IPSec (ESP) Inbound SA is not found, SPI=BCBE522D, src=67.163.x.197, dst=216.x.x.34
01/30/2007 01:25:02 PM IPSec (ESP) Inbound SA is not found, SPI=BCBE522D, src=67.163.x.197, dst=216.x.x.34
01/30/2007 01:25:02 PM IPSec (ESP) Inbound SA is not found, SPI=BCBE522D, src=67.163.x.197, dst=216.x.x.34
01/30/2007 01:25:00 PM IPSec (ESP) Inbound SA is not found, SPI=BCBE522D, src=67.163.x.197, dst=216.x.x.34
01/30/2007 01:25:00 PM IPSec (ESP) Inbound SA is not found, SPI=BCBE522D, src=67.163.x.197, dst=216.x.x.34
01/30/2007 01:24:54 PM IPSec (ESP) Inbound SA is not found, SPI=BCBE522D, src=67.163.x.197, dst=216.x.x.34
01/30/2007 01:24:52 PM VPN Control Send update cfg to 2 for type of mask = 31, typeofcfg = 1
01/30/2007 01:24:52 PM VPN Control Send update cfg to 1 for type of mask = 7, typeofcfg = 1
01/30/2007 01:24:52 PM VPN Control VPNGetRootCert: Read trusted root certs from TRC - IREWALL.BORER.CHI1.AP
01/30/2007 01:24:52 PM VPN Control The configured server certificate is ServerCert - IREWALL.BORER.CHI1.AP
01/30/2007 01:24:50 PM VPN Control The trusted root container of this VPN server is TRC - IREWALL.BORER.CHI1.AP
01/30/2007 01:24:32 PM IKE ESP-SA is deleted mySPI=2D52BEBC peerSPI=03EF8527 dst :67.163.x.197
01/30/2007 01:24:30 PM IKE ESP-SA is deleted mySPI=2D52BEBC peerSPI=03EF8527 dst :67.163.x.197
01/30/2007 01:24:30 PM VPN Control Client MHUPHR.CHI1.AP removed from IPSEC.
01/30/2007 01:24:26 PM IKE ESP-SA is deleted mySPI=357CA7F4 peerSPI=86A95055 dst :67.163.x.197
01/30/2007 01:23:52 PM IKE Received delete msg from 67.163.x.197
01/30/2007 01:23:50 PM IKE Ipsec deleted ESP-SA mySPI=357CA7F4 peerSPI=86A95055 dst :67.163.x.197
01/30/2007 01:11:52 PM IKE ESP SA was created successfully with 67.163.x.197
01/30/2007 01:11:52 PM IKE Sending proxy id :Type 4 0.0.0.0/0.0.0.0
01/30/2007 01:11:52 PM IKE Sending proxy id: Type 1 67.163.x.197
01/30/2007 01:11:52 PM IKE Received proxy Id : IPV4 SUBNET 0.0.0.0/0.0..0.0
01/30/2007 01:11:52 PM IKE Received proxy id ID_IPV4_ADDR 67.163.x.197
01/30/2007 01:11:52 PM IKE IPSEC SA NEGOTIATION - Peer lifetime is: 7200 My lifetime is: 7200

01/30/2007 12:00:28 PM IKE IKE SA was created successfully with 67.163.x.197, encr = 3DES, SA lifetime = 28800 sec
01/30/2007 12:00:26 PM IKE Final IKE SA (phase 1) lifetime is 28800 secs
01/30/2007 12:00:12 PM IKE Received MM ID type: 1 protocol : 0 portnum: 0 length 8
01/30/2007 12:00:12 PM IKE IKE SA NEGOTIATION - Peer lifetime is: 28800 My lifetime is: 28800
01/30/2007 12:00:12 PM IKE Negotiating for an NMAS user 67.163.x.197

01/30/2007 11:35:44 AM IKE ESP-SA is deleted mySPI=103AD85C peerSPI=791A8218 dst :67.163.x.197
01/30/2007 11:35:44 AM IKE Ipsec deleted ESP-SA mySPI=103AD85C peerSPI=791A8218 dst :67.163.x.197
01/30/2007 11:23:48 AM IKE ESP SA was created successfully with 67.163.x.197
01/30/2007 11:23:48 AM IKE Sending proxy id :Type 4 0.0.0.0/0.0.0.0
01/30/2007 11:23:48 AM IKE Sending proxy id: Type 1 67.163.x.197
01/30/2007 11:23:48 AM IKE Received proxy Id : IPV4 SUBNET 0.0.0.0/0.0..0.0
01/30/2007 11:23:48 AM IKE Received proxy id ID_IPV4_ADDR 67.163.x.197

01/30/2007 09:47:44 AM IKE ESP-SA is deleted mySPI=B8732AD8 peerSPI=B5CE4EC3 dst :67.163.x.197
01/30/2007 09:47:44 AM IKE Received delete msg from 67.163.x.197
01/30/2007 09:35:44 AM IKE ESP SA was created successfully with 67.163.x.197
01/30/2007 09:35:44 AM IKE Sending proxy id :Type 4 0.0.0.0/0.0.0.0
01/30/2007 09:35:44 AM IKE Sending proxy id: Type 1 67.163.x.197
01/30/2007 09:35:44 AM IKE Received proxy Id : IPV4 SUBNET 0.0.0.0/0.0..0.0

01/30/2007 07:59:40 AM IKE ESP-SA is deleted mySPI=1A248149 peerSPI=AF33CB14 dst :67.163.x.197
01/30/2007 07:59:40 AM IKE Ipsec deleted ESP-SA mySPI=1A248149 peerSPI=AF33CB14 dst :67.163.x.197
01/30/2007 07:47:40 AM IKE ESP SA was created successfully with 67.163.x.197
01/30/2007 07:47:40 AM IKE Sending proxy id :Type 4 0.0.0.0/0.0.0.0
01/30/2007 07:47:40 AM IKE Sending proxy id: Type 1 67.163.x.197
01/30/2007 07:47:40 AM IKE Received proxy Id : IPV4 SUBNET 0.0.0.0/0.0..0.0

01/30/2007 05:59:42 AM VPN Tunnel Received an IP call from MHUPHR.CHI1.AP @ 1.0.0.23
01/30/2007 05:59:40 AM IKE ESP SA was created successfully with 67.163.x.197
01/30/2007 05:59:40 AM IKE Sending proxy id :Type 4 0.0.0.0/0.0.0.0
01/30/2007 05:59:40 AM IKE Sending proxy id: Type 1 67.163.x.197
01/30/2007 05:59:38 AM IKE Received proxy Id : IPV4 SUBNET 0.0.0.0/0.0..0.0
01/30/2007 05:59:38 AM IKE Received proxy id ID_IPV4_ADDR 67.163.x.197
01/30/2007 05:59:38 AM IKE IPSEC SA NEGOTIATION - Peer lifetime is: 7200 My lifetime is: 7200
01/30/2007 05:59:38 AM IKE Proposal Mismatch - Quick Mode : ESP - transform mismatch mine : esp 3des his : esp des dst: 67.163.x.197 src: 216.145.229.34 cookies my-his :C5BCCD74A7382A0A - CF53062519ACE8B1
01/30/2007 05:59:38 AM IKE Received proxy Id : IPV4 SUBNET 0.0.0.0/0.0..0.0
01/30/2007 05:59:38 AM IKE Received proxy id ID_IPV4_ADDR 67.163.x.197
01/30/2007 05:59:38 AM IKE IKE SA was created successfully with 67.163.x.197, encr = 3DES, SA lifetime = 28800 sec
01/30/2007 05:59:38 AM IKE Final IKE SA (phase 1) lifetime is 28800 secs
01/30/2007 05:59:38 AM IKE Nmas user check authentication and traffic rule
01/30/2007 05:59:38 AM IKE Recieved INITIAL_CONTACT notify from 67.163.x.197 deleting all old sa's to 67.163.x.197
01/30/2007 05:59:38 AM IKE Received notify message of type IPSEC_CONTACT : 24578 from 67.163.x.197
01/30/2007 05:59:38 AM IKE Received MM ID type: 1 protocol : 0 portnum: 0 length 8
01/30/2007 05:59:38 AM VPN Control Client MHUPHR.CHI1.AP added to IPSEC.
01/30/2007 05:59:36 AM IKE IKE SA NEGOTIATION - Peer lifetime is: 28800 My lifetime is: 28800
01/30/2007 05:59:36 AM IKE Negotiating for an NMAS user 67.163.x.197
01/30/2007 05:59:36 AM AUTH Gateway Connection closed for the VPN client at address 67.163.x.197.
01/30/2007 05:59:36 AM AUTH Gateway VPN client NMAS user MHUPHR.CHI1.AP at address 67.163.x.197 has been authenticated.
01/30/2007 05:59:36 AM AUTH Gateway Process NMAS request: NMAS authentication successful.
01/30/2007 05:59:34 AM AUTH Gateway A connection was opened for a VPN client at address 67.163.x.197.