Are you trying to remote access (VPN Client) to ASA (192.168.1.1), then access resources off the Site-to-Site VPN tunnel on the 192.168.2.100 server?
If that is what you are trying to do, you would need to configure the following:
- Add the remote access ip pool subnet as part of the crypto ACL in your site-to-site vpn crypto ACL
- Add the remote subnet (192.168.2.0/24) subnet in your split tunnel ACL if you configure split tunnel policy for your remote access vpn client.
- Configure "same-security-traffic permit intra-interface" on the 192.168.1.1 ASA.
- Assuming there is no NAT statement on the 192.168.1.1 ASA outside interface, then you would only need to configure NAT exemption on the remote ASA for traffic between remote LAN subnet and ip pool subnet.
Hope that helps.