First thing I noticed in your config is that you are using conduits and ACL's at the same time. This is not recommended! So, thirst thing I would do is get rid of the conduits and convert this to an ACL.
Second thing is that I see that you're having two ACL's (108 and 88) and they are not bound to an interface (with the access-group command), so, if this is your whole config then the ACL's are never used.
Question: What is the use of ACL 88 (sounds to me like a anti-spoofing ACL, but there are easier ways to prevent IP-spoofing on the PIX with using IP verify reverse path)
Remember, Cisco recommends to use only ACL's (or conduits only, but conduits are not the recommended way anymore).
Then you have to remember that you when you build an ACL, the PIX does only support inbound ACL's, and the ACL is bound to an interface using the command access-group.
(example: access-group 108 in interface dmz)
You do not have to concern about return traffic, cause the ASA algorithm within the PIX will take care of this (that is, if all the right translations are in place).
Finally, do not test with ICMP (ping), because ICMP is not handled by the ASA, so the returning echo replies does not pass the PIX (unless you create a rule in your ACL which does permit ICMP echo replies)
Better to use TCP/UDP for testing, cause these are statefully inspected and are handled by the ASA.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :