Hi @fwitron1981,
You need to change your split-tunnel policy from 'tunnelspcified' to 'tunelall'. In this case, you'll no longer need ACL 'CiscoVPN_splitTunnelAcl'. I would also advise to restrict your VPN protocols to what is actually required. Assuming that you only use SSL client, an example would look something like:
group-policy CiscoVPN attributes
wins-server value 192.168.110.x 192.168.110.x
dns-server value 192.168.110.x 192.168.110.x
dhcp-network-scope 172.31.4.0
vpn-tunnel-protocol ssl-client
split-tunnel-policy tunnelall
no split-tunnel-network-list value CiscoVPN_splitTunnelAcl
Please remember that you now have to handle all traffic over this VPN gateway (e.g. routing, ACL, NAT, etc.). If traffic should also go to the internet directly from this gateway, that you'll need to configure U-turn. I would also advise creation of new tunnel-group/group-policy for testing this setup, and, once you are happy with all parameters, you can go and modify your production group-policy.
BR,
Milos