ALthough you can't nat IPSEC or Kerberos though the ISA server, there's no reason you can't route it.
Under Access policy right click and go into the properties of IP Pakcet Filters. Then enable both Packet filtering AND IP routing with intrusion detection. Then hop over to the PPTP tab and select "PPTP through firewall". When you leave the screen the appropriate filter will be automatically created to allow PPTP. With that out of the way simply open up the nessisary Kerberos ports (good idea to lock down source and destination as oppossed to any/any) and your done.
On the servers on either side of the internal ISA, either set your default gateway to the ISA server or add a static route to it. Lastly, review any name resultion issues you might have and your done.
End result? PPTP connections through the internal ISA to a VPN server. A nice way to control who can manage boxes in your DMZ.