Hello !
What is SMAP?
You need to use the same crypto map, because the crypto map applied to the ouside interface is crypto map cj_map.
This is what you need to add (and sure, trust me it is not going to affect your other tunnels)
aaa new-model
aaa authentication login userauthen local
aaa authorization network groupauthor local
crypto isakmp client configuration group vpngroup
key cisco123
dns x.x.x.x
wins x.x.x.x
domain cisco.com
pool ippool
ACL xxx
crypto dynamic-map dynmap 10
set transform-set xxx
crypto map cj_map client authentication list userauthen
crypto map cj_map isakmp authorization list groupauthor
crypto map cj_map client configuration address respond
crypto map cj_map 65535 ipsec-isakmp dynamic dynmap
Or if you still do not believe me :-) then check this example:
Configuring IPsec Between Two Routers and a Cisco VPN Client 4.x
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080094685.shtmlPlease let me know if this information was helpful.