VPN Gateway help

My Setup
RB951G-2HnD

[admin@MikroTik] > /ip address print

Flags: X - disabled, I - invalid, D - dynamic 
 #   ADDRESS            NETWORK         INTERFACE                
 0   ;;; defconf
     80.x.x.242/29   80.x.x.240   ether1                   
 1   10.1.65.5/24       10.1.65.0       ether5                   
 2 D 192.168.99.1/32    192.168.99.100  <l2tp-user>

[admin@MikroTik] > /ip route print

Flags: X - disabled, A - active, D - dynamic, 
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, 
B - blackhole, U - unreachable, P - prohibit 
 #      DST-ADDRESS        PREF-SRC        GATEWAY            DISTANCE
 0 A S  0.0.0.0/0                          80.x.x.241             1
 1 A S  10.1.1.0/24                        10.1.65.1                 1
 2 ADC  10.1.65.0/24       10.1.65.5       bridge                    0
 3 A S  10.10.0.0/16                       10.1.65.1                 1
 4 A S  10.15.0.0/16                       10.1.65.1                 1
 5 ADC  80.x.x.240/29   80.x.x.242   ether1                    0
 6 ADC  192.168.99.100/32  192.168.99.1    <l2tp-user>               0

When using the console in winbox i can ping all the ips in the 10x ranges.

[admin@MikroTik] > ping 10.1.1.3
  SEQ HOST                                     SIZE TTL TIME  STATUS               
    0 10.1.1.3                                   56  63 0ms  
    1 10.1.1.3                                   56  63 0ms

when i am connected to the VPN I can ping 10.1.65.5 but not any of the 10.1.1.x range or others.

ppp0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1280
	inet 192.168.99.100 --> 192.168.99.1 netmask 0xffffff00 
$ ping 10.1.1.3
PING 10.1.1.3 (10.1.1.3): 56 data bytes
Request timeout for icmp_seq 0

Anyone know what i am doing wrong? Sorry for being such a noob.
thanks for any help.

Do you have any firewall rules in place for the VPN connection?

[admin@MikroTik] > /ip firewall filter print

Flags: X - disabled, I - invalid, D - dynamic 
 0  D ;;; special dummy rule to show fasttrack counters
      chain=forward action=passthrough 

 1    ;;; winbox
      chain=input action=accept protocol=tcp dst-port=8291 log=no log-prefix="" 

 2    chain=input action=accept protocol=tcp dst-port=22 log=no log-prefix="" 

 3    chain=input protocol=udp port=1701,500,4500 

 4    chain=input protocol=ipsec-esp 

 5    ;;; defconf: accept established,related,untracked
      chain=input action=accept connection-state=established,related,untracked 

 6    ;;; defconf: drop invalid
      chain=input action=drop connection-state=invalid 

 7    ;;; defconf: accept ICMP
      chain=input action=accept protocol=icmp 

 8    ;;; defconf: drop all not coming from LAN
      chain=input action=drop in-interface-list=!LAN 

 9    ;;; defconf: accept in ipsec policy
      chain=forward action=accept ipsec-policy=in,ipsec 

10    ;;; defconf: accept out ipsec policy
      chain=forward action=accept ipsec-policy=out,ipsec 

11    ;;; defconf: fasttrack
      chain=forward action=fasttrack-connection 
      connection-state=established,related 

12    ;;; defconf: accept established,related, untracked
      chain=forward action=accept connection-state=established,related,untracked 

13    ;;; defconf: drop invalid
      chain=forward action=drop connection-state=invalid 

14    ;;; defconf:  drop all from WAN not DSTNATed
      chain=forward action=drop connection-state=new connection-nat-state=!dstnat 
      in-interface-list=WAN

[admin@MikroTik] > /ip firewall nat print

Flags: X - disabled, I - invalid, D - dynamic 
 0    ;;; defconf: masquerade
      chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none