Your policy only allows for the single subnet
set policy id 9 from "Untrust" to "Trust" "192.168.6.0/24" "192.168.18.0/24" "ANY" tunnel vpn "Griffis VPN" id 0x2 pair-policy 8
set policy id 9
exit
set policy id 8 from "Trust" to "Untrust" "192.168.18.0/24" "192.168.6.0/24" "ANY" tunnel vpn "Griffis VPN" id 0x2 pair-policy 9
set policy id 8
You would need to include the other subnets into the policy as well. My recommendation is to change the policy on both sides from 192.168.18.0/24 to 192.168.0.0/16. Make sure to leave the 192.168.6.0/24 the same.
The other option is to use a route based VPN, which would then rely on routing to get the traffic to/from the VPN. To do this, you would simply remove the VPN policies, create a tunnel interface, bind the VPN to the tunnel interface and create a route for 192.168.6.0 to use the tunnel interface. Example:
set interface "tunnel.1" zone "Trust"
set interface tunnel.1 ip unnumbered interface bgroup0
set vpn "Griffis VPN" bind tunnel.1
set route 192.168.6.0/24 interface tunnel.1
Also, I would recommend not using "permanent" in your route statements. This will force the route to remain active even if the physical interface is down.