Here is the config from the PIX515E That I promised. I have purposefully obscured the private information however, if there is a piece that you need to complete the puzzle just let me know. Here goes:
domainpix# sh conf
: Saved
: Written by enable_15 at 11:05:16.462 UTC Sat May 28 2005
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 dmz security50
enable password ****** encrypted
passwd g****** encrypted
hostname ******
domain-name ******.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
names
name 172.16.*.* Host1
name 172.16.*.* Host2
name 172.16.*.* Host3
name 208.*.*.* NameSpace
name 172.16.*.* Barracuda_NAT
name 172.16.*.* OWA_machine
name 172.16.*.* smtp.domain.com
name 172.16.*.* owa.domain.com
object-group service irc-group tcp
description Internet Relay Chat Protocol
port-object range 6660 6670
object-group service RealAudio-group tcp-udp
description RealAudio common ports
port-object eq 7070
port-object range 6090 7070
object-group network domain.net.internal
network-object 172.16.0.0 255.255.0.0
network-object 10.6.1.0 255.255.255.0
network-object 10.6.2.0 255.255.255.0
network-object 10.6.3.0 255.255.255.0
network-object 10.6.4.0 255.255.255.0
network-object 10.6.5.0 255.255.255.0
network-object 10.6.6.0 255.255.255.0
network-object 10.6.7.0 255.255.255.0
network-object 10.6.8.0 255.255.255.0
network-object 10.6.9.0 255.255.255.0
network-object 10.6.100.0 255.255.255.0
network-object 10.6.10.0 255.255.255.0
network-object 10.6.35.0 255.255.255.0
object-group network DMZhosts
description CP had HTTP,DNS,Mail. PIX only has OWA
network-object host 208.*.*.*
object-group service port8080 tcp
port-object range 8080 8080
access-list OutBound deny tcp object-group domain.net.internal any object-group irc-group
access-list OutBound deny tcp object-group domain.net.internal any object-group RealAudio-group
access-list OutBound permit ip object-group domain.net.internal any
access-list OutBound deny ip any any
access-list Inbound permit tcp any host 208.*.*.35
access-list Inbound permit tcp any host 208.*.*.38 object-group port8080
access-list Inbound permit tcp any host 208.*.*.36 object-group port8080
access-list Inbound permit ip 10.6.255.0 255.255.255.0 any
access-list Inbound permit icmp any host 208.*.*.21 echo-reply
access-list Inbound permit icmp any host 208.*.*.21 unreachable
access-list Inbound deny tcp any host 208.*.*.34 eq smtp
access-list Inbound permit tcp any host 208.*.*.34 eq https
access-list dontNat permit ip object-group domain.net.internal 10.6.255.0 255.255.255.0
access-list inbound permit tcp host 208.*.*.20 host 208.*.*.18 eq telnet
pager lines 24
logging on
logging timestamp
logging monitor debugging
logging buffered informational
logging trap errors
logging queue 1024
logging host inside 172.16.*.*
no logging message 109001
no logging message 109003
no logging message 109002
no logging message 109005
no logging message 109007
no logging message 106014
no logging message 109009
no logging message 106015
no logging message 109008
no logging message 106012
no logging message 109011
no logging message 106013
no logging message 109010
no logging message 106010
no logging message 109013
no logging message 109012
no logging message 106006
no logging message 106007
no logging message 106002
no logging message 106001
no logging message 308002
no logging message 201005
no logging message 201006
no logging message 199003
no logging message 106018
no logging message 106017
no logging message 305007
no logging message 305006
no logging message 305005
no logging message 309002
no logging message 309001
no logging message 305012
no logging message 305011
no logging message 303002
no logging message 302009
no logging message 302015
no logging message 302014
no logging message 302013
no logging message 304003
no logging message 302003
no logging message 304002
no logging message 304001
no logging message 304007
no logging message 304004
no logging message 302004
no logging message 304008
no logging message 208005
no logging message 112001
no logging message 108002
no logging message 302016
interface ethernet0 100basetx
interface ethernet1 100full
interface ethernet2 auto
icmp permit any unreachable outside
icmp permit any echo-reply outside
icmp permit any echo inside
icmp permit any echo-reply inside
icmp permit any dmz
mtu outside 1500
mtu inside 1500
mtu dmz 1500
ip address outside 208.*.*.18 255.255.255.192
ip address inside 172.16.*.* 255.255.0.0
ip address dmz 216.*.*.* 255.255.255.0
ip verify reverse-path interface outside
ip verify reverse-path interface inside
ip verify reverse-path interface dmz
ip audit name ExtAuditAttackPolicy attack action alarm drop reset
ip audit interface outside ExtAuditAttackPolicy
ip audit info action alarm
ip audit attack action alarm
ip local pool domainpool 10.6.255.1-10.6.255.254
no failover
failover timeout 0:00:00
failover poll 15
failover ip address outside 0.0.0.0
failover ip address inside 0.0.0.0
failover ip address dmz 0.0.0.0
pdm locations (removed for simplicity)
arp timeout 600
global (outside) 1 208.*.*.21
global (dmz) 1 208.*.*.150
nat (outside) 1 10.6.255.0 255.255.255.0 0 0
nat (inside) 0 access-list dontNat
nat (inside) 1 10.6.0.0 255.255.0.0 0 0
nat (inside) 1 172.16.0.0 255.255.0.0 0 0
nat (inside) 1 10.6.255.0 255.255.255.0 outside 0 0
nat (dmz) 0 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp 208.*.*.35 smtp Barracuda_NAT smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp 208.*.*.34 smtp 172.16.*.* smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp 208.*.*.38 8080 owa.domain.com 8080 netmask 255.255.255.255 0 0
static (inside,outside) tcp 208.*.*.34 https 172.16.*.* https netmask 255.255.255.255 0 0
static (inside,outside) tcp 208.*.*.36 8080 OWA_machine 8080 netmask 255.255.255.255 0 0
static (inside,outside) 208.*.*.22 Host1 netmask 255.255.255.255 0 0
static (inside,outside) 208.*.*.37 smtp.domain.com netmask 255.255.255.255 0 0
access-group Inbound in interface outside
access-group OutBound in interface inside
route outside 0.0.0.0 0.0.0.0 208.*.*.20 1
route inside 10.0.0.0 255.0.0.0 172.16.*.* 1
route inside 192.168.110.0 255.255.255.0 172.16.*.* 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media
0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server RADIUS (inside) host Host3 domainpix timeout 30
aaa-server LOCAL protocol local
http server enable
http Host1 255.255.255.255 inside
http Host2 255.255.255.255 inside
http 172.16.*.* 255.255.255.255 inside
snmp-server host inside 172.16.*.*
snmp-server location (removed for privacy)
snmp-server community domainpixcommunitystring
snmp-server enable traps
tftp-server inside 172.16.*.* /pix
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
auth-prompt prompt For Authorized Company Use Only. Unauthorized use is prohibited and will
be punished to the fullest extent of the law. Your activities are being monitored.
crypto ipsec transform-set singledes esp-des esp-md5-hmac
crypto dynamic-map vpndynmap 10 set transform-set singledes
crypto map outsidecmap 10 ipsec-isakmp dynamic vpndynmap
crypto map outsidecmap client configuration address initiate
crypto map outsidecmap client configuration address respond
crypto map outsidecmap client token authentication RADIUS
crypto map outsidecmap interface outside
isakmp enable outside
isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
isakmp client configuration address-pool local domainpool outside
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup domainvpngroup address-pool domainpool
vpngroup domainvpngroup dns-server 172.16.*.* 172.16.*.*
vpngroup domainvpngroup wins-server 172.16.*.*
vpngroup domainvpngroup default-domain ******.com
vpngroup domainvpngroup idle-time 1800
vpngroup domainvpngroup password ********
telnet 208.*.*.20 255.255.255.255 outside
telnet Host1 255.255.255.255 inside
telnet Host2 255.255.255.255 inside
telnet 172.16.*.* 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
terminal width 80
Cryptochecksum:******
domainpix#