Those Access Control Entries are not found in any of the ACLs in your configuration.
The ACEs were probably not accepted because you have specified the protocol as IP, rather than TCP or UDP.
Port 1723 is PPTP. Although I don't work with PPTP, I see no indication in your configuration that you require PPTP anyway. It appears to me that you are trying to establish standard Cisco VPN Client IPSec connections (which has not been clearly stated).
ACL 110 is currently not applied to any interface.
The most notable deficiency is the absence of "reverse-route" from your dynamic crypto map, which is required to provision a return path to the VPN Client by injecting a route into the routing table.
crypto dynamic-map outsidemap_dyn 10
set transform-set 3DES-MD5
reverse-route
You may also wish to amend your split tunneling ACL from:
Extended IP access list acl-SplitTunnel1
10 permit ip 192.168.0.0 0.0.0.255 any
to:
Extended IP access list acl-SplitTunnel1
10 permit ip 192.168.0.0 0.0.0.255 172.22.100.0 0.0.0.255