Below youll find my PIX config. Im a network admin not an engineer so excuse me if this is something blindingly simple I have configured to the best of my knowledge. I can establish the VPN connection using local auth.(going to TACACS once I figure this out but thatll be another post), my VPN adapter gets an IP but I cannot ping anything inside even the PIX itself. Ive tried the nat 0.0.0.0 0.0.0.0 for the interfaces. Id like to away from using a 2K server for remote user access.TIA
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
no names
access-list outside permit tcp any host xx.xxx.xx.x eq smtp
access-list outside permit tcp any host xx.xxx.xx.x eq pop3
access-list outside permit icmp any any
access-list outside permit tcp any host xx.xxx.xx.x eq www
no pager
logging on
no logging timestamp
no logging standby
no logging console
no logging monitor
no logging buffered
no logging trap
no logging history
logging facility 20
logging queue 512
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu intf2 1500
ip address outside xx.xxx.xx.x 255.255.255.0
ip address inside 192.1.1.1 255.255.255.0
ip address intf2 192.168.255.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pptp-pool 192.1.1.220-192.1.1.250
arp timeout 14400
global (outside) 1 xx.xxx.xx.x
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) xx.xxx.xx.x 192.1.1.7 netmask 255.255.255.255 0 0
static (inside,intf2) 192.1.1.0 192.1.1.0 netmask 255.255.255.0 0 0
access-group outside in interface outside
conduit permit icmp any any
conduit permit tcp any any
route outside 0.0.0.0 0.0.0.0 xx.xxx.xx.x 1
route inside 10.1.0.0 255.255.0.0 192.1.1.16 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-pptp
no sysopt route dnat
isakmp identity address
telnet 192.1.1.0 255.255.255.0 inside
telnet 10.1.0.0 255.255.0.0 inside
telnet xx.xxx.xx.x 255.255.255.255 inside
telnet 192.1.1.0 255.255.255.0 intf2
telnet xx.xxx.xx.x 255.255.255.255 intf2
telnet timeout 5
ssh timeout 5
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication chap
vpdn group 1 ppp authentication mschap
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 client authentication local
vpdn username xxxxx password xxxxxx
vpdn enable outside
terminal width 80
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 intf2 security10
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
no names
access-list outside permit tcp any host xx.xxx.xx.x eq smtp
access-list outside permit tcp any host xx.xxx.xx.x eq pop3
access-list outside permit icmp any any
access-list outside permit tcp any host xx.xxx.xx.x eq www
no pager
logging on
no logging timestamp
no logging standby
no logging console
no logging monitor
no logging buffered
no logging trap
no logging history
logging facility 20
logging queue 512
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
mtu outside 1500
mtu inside 1500
mtu intf2 1500
ip address outside xx.xxx.xx.x 255.255.255.0
ip address inside 192.1.1.1 255.255.255.0
ip address intf2 192.168.255.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool pptp-pool 192.1.1.220-192.1.1.250
arp timeout 14400
global (outside) 1 xx.xxx.xx.x
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) xx.xxx.xx.x 192.1.1.7 netmask 255.255.255.255 0 0
static (inside,intf2) 192.1.1.0 192.1.1.0 netmask 255.255.255.0 0 0
access-group outside in interface outside
conduit permit icmp any any
conduit permit tcp any any
route outside 0.0.0.0 0.0.0.0 xx.xxx.xx.x 1
route inside 10.1.0.0 255.255.0.0 192.1.1.16 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 si
p 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-pptp
no sysopt route dnat
isakmp identity address
telnet 192.1.1.0 255.255.255.0 inside
telnet 10.1.0.0 255.255.0.0 inside
telnet xx.xxx.xx.x 255.255.255.255 inside
telnet 192.1.1.0 255.255.255.0 intf2
telnet xx.xxx.xx.x 255.255.255.255 intf2
telnet timeout 5
ssh timeout 5
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication chap
vpdn group 1 ppp authentication mschap
vpdn group 1 client configuration address local pptp-pool
vpdn group 1 client authentication local
vpdn username xxxxx password xxxxxx
vpdn enable outside
terminal width 80