Hi,
If the clients are connecting to the same tunnel-group and you would like to allow communication within each other, you will need to configure the same-security-traffic permit intra-interface command on the ASA. This command lets traffic enter and exit the same interface, which is normally not allowed. This feature is useful for VPN traffic that enters an interface, but is then routed out the same interface. The VPN traffic might be unencrypted in this case, or it might be reencrypted for another VPN connection.
Example:
hostname(config)# same-security-traffic permit intra-interface
Also you will need to include the IP local pool (10.10.110.0/24) used by the VPN clients into the split-tunnel access-list.
Hope this helps,
Luis.