Может лог маршрутизатора поможет:
1-ый роутер
внешний x.x.x.x
внутренний 192.168.4.1
2-ый роутер
внешний y.y.y.y
внутренний 192.168.0.6
вот лог роутера y.y.y.y после разрыва соединения:
Saturday March 26, 2011 15:48:03 IKED re-TX : INIT to x.x.x.x
Saturday March 26, 2011 15:48:03 Warning : VPN tunnel full 3 used/3 max, reject x.x.x.x -> y.y.y.y, packet type 2
Saturday March 26, 2011 15:48:04 Send IKE (INFO) : delete [192.168.0.0|y.y.y.y]-->[x.x.x.x|192.168.4.0] phase 2
Saturday March 26, 2011 15:48:04 IKE phase2 (IPSec SA) remove : 192.168.0.0 <-> 192.168.4.0
Saturday March 26, 2011 15:48:04 inbound SPI = 0x38001397, outbound SPI = 0x16005a83
Saturday March 26, 2011 15:48:04 Send IKE (INFO) : delete y.y.y.y -> x.x.x.x phase 1
Saturday March 26, 2011 15:48:04 IKE phase1 (ISAKMP SA) remove : y.y.y.y <-> x.x.x.x
Saturday March 26, 2011 15:48:08 Receive IKE M2(RESP) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:08 Try to match with ENC:3DES AUTH:PSK HASH:SHA1 Group:Group1
Saturday March 26, 2011 15:48:08 Send IKE M3(KEYINIT) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:08 Receive IKE M4(KEYRESP) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:08 Send IKE M5(IDINIT) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:08 Receive IKE M6(IDRESP) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:08 IKE Phase1 (ISAKMP SA) established : x.x.x.x <-> y.y.y.y
Saturday March 26, 2011 15:48:08 Send IKE Q1(QINIT) : 192.168.0.0 --> 192.168.4.0
Saturday March 26, 2011 15:48:08 Receive IKE Q2(QRESP) : [192.168.4.0|x.x.x.x]-->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:08 Try to match ESP with MODE:Tunnel PROTOCAL:ESP-3DES AUTH:MD5 HASH:Others PFS(Group):NONE
Saturday March 26, 2011 15:48:08 Send IKE Q3(QHASH) : 192.168.0.0 --> 192.168.4.0
Saturday March 26, 2011 15:48:08 IKE Phase2 (IPSEC SA) established : [192.168.4.0|x.x.x.x]<->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:08 IKE Phase2 (IPSEC SA) established : [192.168.4.0|x.x.x.x]<->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:08 inbound SPI = 0x390014c8, outbound SPI = 0x18004494
Saturday March 26, 2011 15:48:08 Send IKE (INFO) : delete [192.168.0.0|y.y.y.y]-->[x.x.x.x|192.168.4.0] phase 2
Saturday March 26, 2011 15:48:08 IKE phase2 (IPSec SA) remove : 192.168.0.0 <-> 192.168.4.0
Saturday March 26, 2011 15:48:08 inbound SPI = 0x390014c8, outbound SPI = 0x18004494
Saturday March 26, 2011 15:48:08 Send IKE (INFO) : delete y.y.y.y -> x.x.x.x phase 1
Saturday March 26, 2011 15:48:08 IKE phase1 (ISAKMP SA) remove : y.y.y.y <-> x.x.x.x
Saturday March 26, 2011 15:48:09 Receive IKE M1(INIT) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:09 Try to match with ENC:3DES AUTH:PSK HASH:SHA1 Group:Group1
Saturday March 26, 2011 15:48:09 Send IKE M2(RESP) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:09 Receive IKE M3(KEYINIT) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:09 Send IKE M4(KEYRESP) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:09 Receive IKE M5(IDINIT) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:09 Send IKE M6(IDRESP) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:09 IKE Phase1 (ISAKMP SA) established : y.y.y.y <-> x.x.x.x
Saturday March 26, 2011 15:48:09 Receive IKE Q1(QINIT) : [x.x.x.x]-->[y.y.y.y]
Saturday March 26, 2011 15:48:09 Requested routing is [192.168.4.0|x.x.x.x]<->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:09 Try to match ESP with MODE:Tunnel PROTOCAL:ESP-3DES AUTH:MD5 HASH:Others PFS(Group):NONE
Saturday March 26, 2011 15:48:09 IKE Q1 : 192.168.4.0 -> 192.168.0.0 no pfs support
Saturday March 26, 2011 15:48:09 Send IKE Q2(QRESP) : 192.168.0.0 --> 192.168.4.0
Saturday March 26, 2011 15:48:09 Receive IKE Q3(QHASH) : [192.168.4.0|x.x.x.x]-->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:09 IKE Phase2 (IPSEC SA) established : [192.168.4.0|x.x.x.x]<->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:09 inbound SPI = 0x3b002a2a, outbound SPI = 0x1a0042a5
Saturday March 26, 2011 15:48:10 Send IKE (INFO) : delete [192.168.0.0|y.y.y.y]-->[x.x.x.x|192.168.4.0] phase 2
Saturday March 26, 2011 15:48:10 IKE phase2 (IPSec SA) remove : 192.168.0.0 <-> 192.168.4.0
Saturday March 26, 2011 15:48:10 inbound SPI = 0x3b002a2a, outbound SPI = 0x1a0042a5
Saturday March 26, 2011 15:48:10 Send IKE (INFO) : delete y.y.y.y -> x.x.x.x phase 1
Saturday March 26, 2011 15:48:10 IKE phase1 (ISAKMP SA) remove : y.y.y.y <-> x.x.x.x
Saturday March 26, 2011 15:48:10 Receive IKE M1(INIT) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:10 Try to match with ENC:3DES AUTH:PSK HASH:SHA1 Group:Group1
Saturday March 26, 2011 15:48:10 Send IKE M2(RESP) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:10 Receive IKE M3(KEYINIT) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:10 Send IKE M4(KEYRESP) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:10 Receive IKE M5(IDINIT) : x.x.x.x --> y.y.y.y
Saturday March 26, 2011 15:48:10 Send IKE M6(IDRESP) : y.y.y.y --> x.x.x.x
Saturday March 26, 2011 15:48:10 IKE Phase1 (ISAKMP SA) established : y.y.y.y <-> x.x.x.x
Saturday March 26, 2011 15:48:10 Send IKE Q1(QINIT) : 192.168.0.0 --> 192.168.4.0
Saturday March 26, 2011 15:48:10 Receive IKE Q1(QINIT) : [x.x.x.x]-->[y.y.y.y]
Saturday March 26, 2011 15:48:10 Requested routing is [192.168.4.0|x.x.x.x]<->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:10 Try to match ESP with MODE:Tunnel PROTOCAL:ESP-3DES AUTH:MD5 HASH:Others PFS(Group):NONE
Saturday March 26, 2011 15:48:10 IKE Q1 : 192.168.4.0 -> 192.168.0.0 no pfs support
Saturday March 26, 2011 15:48:10 Send IKE Q2(QRESP) : 192.168.0.0 --> 192.168.4.0
Saturday March 26, 2011 15:48:10 Receive IKE Q2(QRESP) : [192.168.4.0|x.x.x.x]-->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:10 Try to match ESP with MODE:Tunnel PROTOCAL:ESP-3DES AUTH:MD5 HASH:Others PFS(Group):NONE
Saturday March 26, 2011 15:48:10 Send IKE Q3(QHASH) : 192.168.0.0 --> 192.168.4.0
Saturday March 26, 2011 15:48:10 IKE Phase2 (IPSEC SA) established : [192.168.4.0|x.x.x.x]<->[y.y.y.y|192.168.0.0]
Saturday March 26, 2011 15:48:10 inbound SPI = 0x3c003f5b, outbound SPI = 0x1e0066c7
Saturday March 26, 2011 15:48:10 Warning : VPN tunnel full 3 used/3 max, reject x.x.x.x -> y.y.y.y, packet type 32
Saturday March 26, 2011 15:48:43 IKED re-TX : QRESP to x.x.x.x
Вот картинка vpn статуса:

Но пакеты между сетью 192.168.0.0 и 192.168.4.0 не ходят
в этом логе я ничего не понимаю может кто подскажет