Here's an example, the reason I've got two statements for crypto ACL is so that it doesn't cause problems with PDM. AS PDM don't like same statement in two placeS within the configuration.
access-list nonat permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list nonat permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list nonat permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list nonat permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list 100 permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list 200 permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list 300 permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list 400 permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
nat (inside) 0 access-list nonat
sysopt connection permit-ipsec
crypto ipsec transform-set TEST esp-3des esp-md5-hmac
crypto map MYMAP 10 ipsec-isakmp
crypto map MYMAP 10 match address 100
crypto map MYMAP 10 set peer x.x.x.x
crypto map MYMAP 10 set transform-set TEST
crypto map MYMAP 20 ipsec-isakmp
crypto map MYMAP 20 match address 200
crypto map MYMAP 20 set peer x.x.x.x
crypto map MYMAP 20 set transform-set TEST
crypto map MYMAP 30 ipsec-isakmp
crypto map MYMAP 30 match address 300
crypto map MYMAP 30 set peer x.x.x.x
crypto map MYMAP 30 set transform-set TEST
crypto map MYMAP 40 ipsec-isakmp
crypto map MYMAP 40 match address 400
crypto map MYMAP 40 set peer x.x.x.x
crypto map MYMAP 40 set transform-set TEST
crypto map MYMAP interface outside
isakmp enable outside
isakmp key xxxxxxxx address x.x.x.x netmask 255.255.255.255
isakmp key xxxxxxxx address x.x.x.x netmask 255.255.255.255
isakmp key xxxxxxxx address x.x.x.x netmask 255.255.255.255
isakmp key xxxxxxxx address x.x.x.x netmask 255.255.255.255
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption 3des
isakmp policy 10 hash md5
isakmp policy 10 group 2
isakmp policy 10 lifetime 86400
Hope this helps, please rate post if it does.
Jay