Hi Francisco,
If you have impemented RA in your ASA , you have couple of options to allow your VPN clients internet while connected to your VPN gateway.
The first option is the one I mostly recommend , that is , to implement your RA tunnel as a full tunnel .. meaning all traffic is to be encrypted ( No split tunnel) , use the intra-interface featured introduced in code 7.x and above , this feature along with NAT will allow your VPN clients internet access out the same interface they came from ALL encrypted , NAT your VPN network ID towards your global interface ( outside interface ) or any other available global pool your outside interface has , this is very straight forward to implement , see public internet on a stick link.
Public internet on a stick
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805734ae.shtml
same-security-traffic permit intra-interface
global (outside) 1 interface
nat (outside) 1
The second option is to use split tunnel , less secure, read the link for more thorough details on risks.
Configuring RA VPN as a split tunnel
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080702999.shtml
Hope this helps
Regards
Jorge Rodriguez