If the PIX is a pass-thru device for the IPSec traffic, then the answer is no. If the PIX is terminating the IPSec traffic, then yes. In this case, the IPSec traffic is terminated and decrypted, then processed via the rules you have configured. In the first case, the traffic is encrypted so the PIX can only make decisions based on the source/dest IP's and protocols.
Scott