Seems like you have some routing problems.
The VPN Clients should use a separate Network Range that is diffrent from the inside network. As the netmask is choosen by the Class of network it is best to use a Class C network.
For example: 192.168.1.0 / 24 for the inside network
and 192.168.2.0 /24 for the VPN Pool.
Probably a few of this commands as "isakmp nat-traversal" will not work as this was added in the PIX OS 6.3.x code.
Config example:
access-list NONAT permit ip Internalnet ISubnet VPN-Pool 255.255.255.0
nat (inside) 0 access-list NONAT
access-list DYN-VPN-ACL permit ip Internalnet ISubnet VPN-Pool 255.255.255.0
aaa-server LOCAL protocol local
aaa authentication secure-http-client
sysopt connection permit-ipsec
crypto ipsec transform-set TRANS esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address DYN-VPN-ACL
crypto dynamic-map outside_dyn_map 20 set transform-set TRANS
crypto map REMOTE 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map REMOTE client authentication LOCAL
crypto map REMOTE interface outside
isakmp enable outside
isakmp identity address
isakmp nat-traversal 20
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
ip local pool VPNPool x.y.z.1-x.y.z.254
vpngroup VPNGroup address-pool VPNPool
vpngroup VPNGroup dns-server dns2 dns1
vpngroup VPNGroup default-domain localdomain
vpngroup VPNGroup idle-time 1800
vpngroup VPNGroup password grouppassword
username vpnclient password vpnclient-password
sincerely
Patrick