Here's the full config:
PIX Version 6.3(4)
interface ethernet0 100full
interface ethernet1 100full
interface ethernet2 100full
interface ethernet3 100full
interface ethernet4 auto shutdown
interface ethernet5 auto shutdown
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
nameif ethernet3 vpn security30
nameif ethernet4 intf4 security8
nameif ethernet5 intf5 security10
enable password *************** encrypted
passwd ***************** encrypted
hostname firewall
domain-name is.ourdomain.com
clock timezone MST -7
clock summer-time MDT recurring
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol ils 389
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
object-group network dns_servers
description *** Internal DNS Servers ***
network-object host 10.2.0.15
network-object host 10.2.0.10
object-group service blocked_services tcp-udp
description *** Blocked Services ***
port-object range 135 139
port-object eq 445
port-object eq 4444
port-object eq 69
object-group service radius_services udp
port-object range 1812 1813
object-group service dns_services tcp-udp
port-object eq domain
object-group network dmz_servers
description *** DMZ Servers ***
network-object 10.252.0.0 255.255.254.0
object-group network webvpn_servers
description *** Web VPN Accessible Servers ***
network-object host 10.2.0.88
network-object host 10.32.248.12
network-object host 10.32.10.6
object-group service webvpn_services tcp
port-object eq www
port-object eq https
object-group network sql_servers
description *** SQL Servers ***
network-object 10.32.11.0 255.255.255.0
object-group service sql_services tcp-udp
port-object eq 3306
access-list OUTSIDE_IN permit icmp any any
access-list OUTSIDE_IN permit tcp host 209.68.1.29 host 63.228.182.133 eq 9054
access-list OUTSIDE_IN permit tcp host 10.254.0.3 host 10.32.248.8 eq tacacs
access-list OUTSIDE_IN permit udp host 10.254.0.3 host 10.32.248.12 eq syslog
access-list OUTSIDE_IN permit udp any host 65.121.128.222 object-group dns_services
access-list OUTSIDE_IN permit udp any host 63.228.182.142 object-group dns_services
access-list OUTSIDE_IN permit tcp any host 65.121.128.220 eq www
access-list OUTSIDE_IN permit tcp host 216.92.131.71 host 63.228.182.133 eq 9054
access-list OUTSIDE_IN permit tcp host 63.209.10.245 host 63.228.182.130 eq smtp
access-list OUTSIDE_IN permit tcp host 63.150.10.201 host 63.228.182.130 eq smtp
access-list OUTSIDE_IN permit tcp any host 65.121.128.219 object-group webvpn_services
access-list OUTSIDE_IN permit tcp any host 63.228.182.134 eq https
access-list OUTSIDE_IN permit ip any host 65.121.128.199
access-list OUTSIDE_IN permit tcp any host 63.228.182.135 eq www
access-list OUTSIDE_IN permit tcp any host 63.228.182.134 eq www
access-list OUTSIDE_IN compiled
access-list NO_NAT_INSIDE permit ip 10.0.0.0 255.0.0.0 10.252.0.0 255.255.254.0
access-list NO_NAT_INSIDE permit ip 10.32.248.0 255.255.252.0 host 10.254.0.3
access-list NO_NAT_INSIDE permit ip 10.0.0.0 255.0.0.0 10.1.32.8 255.255.255.248
access-list NO_NAT_INSIDE permit ip 10.0.0.0 255.0.0.0 10.224.0.0 255.255.0.0
access-list INSIDE_IN deny tcp any any object-group blocked_services
access-list INSIDE_IN deny udp any any object-group blocked_services
access-list INSIDE_IN permit icmp any any
access-list INSIDE_IN permit ip any any
access-list INSIDE_IN permit tcp any any eq https
access-list INSIDE_IN compiled
access-list DMZ_IN permit icmp any any
access-list DMZ_IN permit tcp object-group dmz_servers object-group dns_servers object-group dns_services
access-list DMZ_IN permit udp object-group dmz_servers object-group dns_servers object-group dns_services
access-list DMZ_IN permit tcp 10.252.0.0 255.255.254.0 any eq ftp-data
access-list DMZ_IN permit tcp 10.252.0.0 255.255.254.0 any eq ftp
access-list DMZ_IN permit tcp 10.252.0.0 255.255.254.0 any eq www
access-list DMZ_IN permit tcp host 10.252.0.8 any eq smtp
access-list DMZ_IN permit udp host 10.252.0.16 any eq domain
access-list DMZ_IN permit tcp host 10.252.0.33 host 10.2.0.88 eq smtp
access-list DMZ_IN permit tcp host 10.252.0.33 object-group sql_servers object-group sql_services
access-list DMZ_IN permit tcp host 10.252.0.33 host 10.32.248.8 eq 3306
access-list DMZ_IN permit tcp host 10.252.0.8 any eq 873
access-list DMZ_IN permit tcp host 10.252.0.35 host 10.32.11.19 eq 1433
access-list DMZ_IN permit tcp host 10.252.0.35 host 10.32.11.19 eq ftp
access-list DMZ_IN permit tcp host 10.252.0.35 host 10.32.11.19 eq smtp
access-list DMZ_IN permit tcp host 10.252.0.35 host 10.32.11.19 eq 135
access-list DMZ_IN permit tcp host 10.252.0.35 host 10.32.11.19 eq 1025
access-list DMZ_IN permit tcp host 10.252.0.35 host 10.32.11.19 eq 1027
access-list DMZ_IN permit ip host 10.252.0.199 any
access-list DMZ_IN permit icmp any any echo-reply
access-list DMZ_IN permit icmp any any unreachable
access-list DMZ_IN permit icmp any any time-exceeded
access-list DMZ_IN compiled
access-list VPN_IN remark *** ALLOW ICMP FOR TESTING ***
access-list VPN_IN permit icmp 10.224.0.0 255.255.0.0 any
access-list VPN_IN remark *** WEBVPN ACCESS ***
access-list VPN_IN permit icmp host 10.1.32.9 any
access-list VPN_IN permit tcp host 10.1.32.9 object-group dns_servers object-group dns_services
access-list VPN_IN permit udp host 10.1.32.9 object-group dns_servers object-group dns_services
access-list VPN_IN permit udp host 10.1.32.9 host 10.32.248.12 eq syslog
access-list VPN_IN permit tcp host 10.1.32.9 host 10.32.248.8 eq www
access-list VPN_IN permit udp host 10.1.32.9 host 10.32.248.8 object-group radius_services
access-list VPN_IN permit tcp host 10.1.32.9 host 10.32.248.8 eq tacacs
access-list VPN_IN permit tcp host 10.1.32.9 object-group webvpn_servers object-group webvpn_services
access-list VPN_IN permit tcp host 10.1.32.9 host 10.252.0.16 eq ssh
access-list VPN_IN remark *** DNS ACCESS FOR ALL VPN CLIENTS ***
access-list VPN_IN permit tcp 10.224.0.0 255.255.0.0 object-group dns_servers object-group dns_services
access-list VPN_IN permit udp 10.224.0.0 255.255.0.0 object-group dns_servers object-group dns_services
access-list VPN_IN remark *** NETADMIN/IS_Data VPN ACCESS ***
access-list VPN_IN permit icmp 10.224.0.0 255.255.254.0 any
access-list VPN_IN permit ip 10.224.0.0 255.255.254.0 any
access-list VPN_IN remark *** HD VPN ACCESS ***
access-list VPN_IN permit tcp 10.224.254.0 255.255.255.0 10.32.11.16 255.255.255.248 eq 3389
access-list VPN_IN permit tcp 10.224.254.0 255.255.255.0 host 10.2.0.31 eq 3389
access-list VPN_IN permit tcp 10.224.254.0 255.255.255.0 host 10.2.0.50 eq 3389
access-list VPN_IN permit tcp 10.224.254.0 255.255.255.0 host 10.2.0.51 eq 3389
access-list VPN_IN permit tcp 10.224.254.0 255.255.255.0 host 10.32.240.94 eq 3389
access-list VPN_IN remark *** JCG VPN ACCESS ***
access-list VPN_IN permit tcp 10.224.253.0 255.255.255.0 host 10.252.0.33 eq www
access-list VPN_IN permit tcp 10.224.253.0 255.255.255.0 host 10.252.0.33 eq https
access-list VPN_IN permit tcp 10.224.253.0 255.255.255.0 host 10.252.0.33 eq ftp-data
access-list VPN_IN permit tcp 10.224.253.0 255.255.255.0 host 10.252.0.33 eq ftp
access-list VPN_IN permit tcp 10.224.253.0 255.255.255.0 host 10.32.11.17 eq 3306
access-list VPN_IN compiled
access-list NO_NAT_DMZ permit ip 10.252.0.0 255.255.0.0 10.224.0.0 255.255.0.0
pager lines 60
logging on
logging timestamp
logging trap critical
logging history informational
logging host inside 10.32.248.12
icmp permit any echo-reply outside
icmp permit any unreachable outside
icmp permit any time-exceeded outside
mtu outside 1500
mtu inside 1500
mtu dmz 1500
mtu vpn 1500
mtu intf4 1500
mtu intf5 1500
ip address outside 63.228.182.131 255.255.255.240
ip address inside 10.1.32.1 255.255.255.252
ip address dmz 10.252.0.1 255.255.254.0
ip address vpn 10.1.32.14 255.255.255.248
no ip address intf4
no ip address intf5
ip verify reverse-path interface outside
ip verify reverse-path interface inside
ip verify reverse-path interface dmz
ip verify reverse-path interface vpn
ip audit info action alarm
ip audit attack action alarm
no failover
failover timeout 0:00:00
failover poll 15
no failover ip address outside
no failover ip address inside
no failover ip address dmz
no failover ip address vpn
no failover ip address intf4
no failover ip address intf5
pdm history enable
arp timeout 14400
global (outside) 1 63.228.182.132 netmask 255.255.255.255
nat (inside) 0 access-list NO_NAT_INSIDE
nat (inside) 1 10.0.0.0 255.0.0.0 0 0
nat (dmz) 0 access-list NO_NAT_DMZ
static (inside,outside) tcp 63.228.182.134 https 10.32.10.6 https netmask 255.255.255.255 0 0
static (inside,outside) tcp 63.228.182.134
255.255.255.255 0 0
static (inside,outside) 63.228.182.133 10.14.5.21 netmask 255.255.255.255 0 0
static (dmz,outside) 65.121.128.222 10.252.0.16 netmask 255.255.255.255 0 0
static (dmz,outside) 63.228.182.142 10.252.0.24 netmask 255.255.255.255 0 0
static (dmz,outside) 65.121.128.220 10.252.0.33 netmask 255.255.255.255 0 0
static (inside,outside) 63.228.182.135 10.2.0.88 netmask 255.255.255.255 0 0
static (inside,outside) 63.228.182.130 10.2.0.88 netmask 255.255.255.255 0 0
static (dmz,outside) 65.121.128.219 10.252.0.35 netmask 255.255.255.255 0 0
static (dmz,outside) 65.121.128.199 10.252.0.199 netmask 255.255.255.255 0 0
access-group OUTSIDE_IN in interface outside
access-group INSIDE_IN in interface inside
access-group DMZ_IN in interface dmz
access-group VPN_IN in interface vpn
routing interface inside
ospf priority 10
ospf message-digest-key 1 md5 r0ut3m3b@by
ospf authentication message-digest
routing interface vpn
ospf priority 10
ospf message-digest-key 1 md5 r0ut3m3b@by
ospf authentication message-digest
router ospf 5481
network 10.1.32.0 255.255.255.252 area 0
network 10.1.32.8 255.255.255.248 area 0
network 10.252.0.0 255.255.254.0 area 0
area 0 authentication message-digest
router-id 10.1.32.1
log-adj-changes
default-information originate
route outside 0.0.0.0 0.0.0.0 63.228.182.129 1
route inside 10.0.0.0 255.0.0.0 10.1.32.2 200
route vpn 10.224.0.0 255.255.0.0 10.1.32.9 200
route outside 10.254.0.3 255.255.255.255 63.228.182.129 1
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:01:00 absolute
timeout xlate 0:01:00
aaa-server radius-authport 1812
aaa-server radius-acctport 1813
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server RADIUS (inside) host 10.32.248.8 (removed) timeout 10
aaa-server LOCAL protocol local
aaa-server NETADMIN protocol tacacs+
aaa-server NETADMIN max-failed-attempts 3
aaa-server NETADMIN deadtime 10
aaa-server NETADMIN (inside) host 10.32.248.8 (removed) timeout 10
aaa authentication ssh console RADIUS
aaa authentication telnet console RADIUS
aaa authentication enable console RADIUS
ntp server 131.107.1.10 source outside prefer
ntp server 140.142.16.43 source outside
no snmp-server location
no snmp-server contact
snmp-server community (removed)
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
sysopt connection permit-pptp
service resetinbound
service resetoutside
crypto ipsec transform-set MGMT-SET-AES esp-aes-256 esp-sha-hmac
crypto dynamic-map MGMT-DYNMAP 10 set transform-set MGMT-SET-AES
crypto map IPSEC-MAP 10 ipsec-isakmp dynamic MGMT-DYNMAP
crypto map IPSEC-MAP client authentication NETADMIN
crypto map IPSEC-MAP interface outside
isakmp enable outside
isakmp policy 10 authentication rsa-sig
isakmp policy 10 encryption aes-256
isakmp policy 10 hash sha
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
vpngroup IS-GROUP dns-server 10.2.0.15
vpngroup IS-GROUP wins-server 10.2.0.15
vpngroup IS-GROUP default-domain is.ourdomain
vpngroup IS-GROUP idle-time 1800
vpngroup IS-GROUP authentication-server NETADMIN
vpngroup IS-GROUP user-authentication
vpngroup IS-GROUP password ********
vpngroup city dns-server 10.2.0.15
vpngroup city wins-server 10.2.0.15
vpngroup city default-domain is.ourdomain.com
vpngroup city idle-time 1800
vpngroup city authentication-server NETADMIN
vpngroup city user-authentication
vpngroup city password ********
ca identity CertAuth 10.32.248.8:/certsrv/mscep/mscep.dll
ca configure CertAuth ra 1 20 crloptional
telnet 10.32.248.0 255.255.255.0 inside
telnet 10.2.5.0 255.255.255.0 inside
telnet timeout 15
ssh 10.32.248.0 255.255.254.0 inside
ssh 10.34.248.0 255.255.254.0 inside
ssh 10.32.0.0 255.255.0.0 inside
ssh 10.1.32.1 255.255.255.255 inside
ssh 10.1.32.1 255.255.255.255 vpn
ssh timeout 15
console timeout 60
vpdn group 1 accept dialin pptp
vpdn group 1 ppp authentication mschap
vpdn group 1 ppp encryption mppe 128
vpdn group 1 client configuration dns 10.2.0.10 10.2.0.15
vpdn group 1 client configuration wins 10.2.0.15 10.2.0.10
vpdn group 1 client authentication aaa RADIUS
vpdn group 1 pptp echo 60
vpdn username badusername password *********
vpdn enable outside
username badusername password ************ encrypted privilege 15
terminal width 80
: end