If you only want to enable encryption for the private subnet behind the router, and have all other traffic go out in the clear, do the following on your router:
access-list 100 permit ip 192.168.1.0 0.0.0.255 any
crypto isakmp client configuration group VPNclients
acl 100
This should also allow you to get to your local printers/hosts, since only traffic for the 192.168.1.0 network will be encrypted now.
FYI, if you want to do a non-split tunnel configuration in the future, but still want to be able to get to your local hosts, you need to use the include-local-lan option under the VPN group config on the router in addition to checking the box under the VPN client GUI.
See http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t8/ftunity.htm for details.