This is best done from the CLI.
"show crypto isakmp sa" shows your current or forming VPN tunnels on your ASA. (SAs are Security Associations.) An active working tunnel normally has the state "MM_IDLE". Look for him trying to bring up his tunnel by repeatedly entering that command during his attempts. If you see other states forming and then timing out you likely have a setting mismatch. Those can be debugged by using a couple of commands. Note his public IP from the "show cry isa sa" output and make it a condition for your debug (that will keep you from getting the rather verbose debug output from your other tunnels):
debug cry condition peer
debug crypto isakmp 7
debug crypto ipsec 7
Have him try again and examine the log for error conditions. ("show log")
If you never see partially formed SAs during his attempts, then he is not reaching you with the IPSec packets for some reason. Make sure he can ping your outside interface. How is he leaving his network? if he doesn't have a static public IP it may be a problem establishing a VPN with whatever global NAT pool address his network's boundary firewall or router is giving him.