I have two isp's connected on my ASA (outside and outside2), and SLA ISP backup is configured, now the default gateway for internet access is outside interface.
Recently i have configured SSL Vpn on my other interface (outside2) , and it is working fine, after few days, i got a requirement from my boss, that he need to connect to exchange server, which is over the internet, after successfully connected to SSL vpn, i know there is a concept called client u-turn in cisco, so with that i have configured, the following
access-list 101 extended permit ip 10.10.10.0 255.255.255.0 host 188.8.131.52 **(10.10.10.0/24 is the ssl vpn client pool, 184.108.40.206 is the ip of exchange server).
nat (ouside2) 3 access-list 101
global (outside2) 3 220.127.116.11 ** ( 18.104.22.168 is one of the ip of my outside2 wan pool)
same-security-traffic permit intra-interface
But the above configuration does not works for my requirement.
Kindly help , for the same.