I am facing one problem with my remote VPN users ,I am describing my network here . I have one site to site tunnel for my USA client, tht IP is 169.X.X.X . from office we are able to connect that tunnel. now I configured remote vpn for my home users, my office inside ip is 192.168.2.X and once I connect from home to office thru cisco vpn client then my ip is 192.168.3.X which I set IP pool in ASA , now 192.168.3.X and 192.168.2.X is communicating properly, but I need to access my Tunnel IP 169.1.X.X also from 192.168.3.X(Home).
203.92.X.X is my static public Ip which is permitted in the client side for the tunnel.
If anything confussing please let me know .
It is not possible to have NATing on 192.168.3.0/24 to public ip because there is default route(by which you can reach L2L remote host) on the ASA pointing to outside interface . That default route will redirect/route the vpn client traffic on the outside interface only so NATing is going happen here.