Hi there -
Here is the config that I am running. I have used ACL's to limit the types of outbound traffic. Let me know if you have any questions or suggestions for improvement.
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
enable password xxx encrypted
passwd xxx encrypted
hostname pix
domain-name domain.com
clock timezone edt -5
clock summer-time est recurring
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
names
access-list returning permit icmp any any echo-reply
access-list returning permit icmp any any time-exceeded
access-list returning permit icmp any any unreachable
access-list outbound permit tcp any any eq www
access-list outbound permit tcp any any eq domain
access-list outbound permit tcp any any eq pop3
access-list outbound permit tcp any any eq smtp
access-list outbound permit tcp any any eq 510
access-list outbound permit tcp any any eq 123
access-list outbound permit icmp any any echo
access-list outbound permit udp any any
access-list outbound permit tcp any any eq 1863
access-list outbound permit tcp any any eq ftp
pager lines 24
logging on
logging trap warnings
logging host inside x.x.x.x (syslog server)
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
icmp deny any outside
icmp deny any dmz
icmp permit any inside
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside 10.10.20.2 255.255.255.0
ip address inside 10.10.30.1 255.255.255.0
ip address dmz 192.168.1.0 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
nat (inside) 0 0.0.0.0 0.0.0.0 0 0
access-group returning in interface outside
access-group outbound in interface inside
rip inside default version 2
route outside 0.0.0.0 0.0.0.0 10.10.20.1 1
route inside 10.10.10.0 255.255.255.0 10.10.30.2 1
route dmz 192.168.1.0 255.255.255.0 192.168.1.1 1
timeout xlate 0:10:00
timeout conn 0:05:00 half-closed 0:05:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:02:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
ntp server x.x.x.x source outside prefer
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
no sysopt route dnat
telnet 10.10.0.0 255.255.0.0 inside
telnet timeout 60
ssh timeout 5
terminal width 80