I have two isp's connected on my ASA (outside and outside2), and SLA ISP backup is configured, now the default gateway for internet access is outside interface.
Recently i have configured SSL Vpn on my other interface (outside2) , and it is working fine, after few days, i got a requirement from my boss, that he need to connect to exchange server, which is over the internet, after successfully connected to SSL vpn, i know there is a concept called client u-turn in cisco, so with that i have configured, the following
access-list 101 extended permit ip 10.10.10.0 255.255.255.0 host 184.108.40.206 **(10.10.10.0/24 is the ssl vpn client pool, 220.127.116.11 is the ip of exchange server).
nat (ouside2) 3 access-list 101
global (outside2) 3 18.104.22.168 ** ( 22.214.171.124 is one of the ip of my outside2 wan pool)
same-security-traffic permit intra-interface
But the above configuration does not works for my requirement.
Kindly help , for the same.