If i understand you correctly , you are trying to access remote private network through site to site tunnel. If yes , then you will have to modify Crypto ACL to permit VPN client traffic . Mirror image of this ACL will have to added to Crypto ACL at remote end also.
I will clear u my whole nw , I have one site to site tunnel for my USA client, tht IP is 169.X.X.X . from office we access that tunnel. now I configured remote vpn for my home users, my office inside ip is 192.168.2.X and once I connect to home thru cisco vpn client then my ip is 192.168.3.X which I set IP pool in ASA , now 192.168.3.X and 192.168.2.X is communicating properly, but I need to access my Tunnel IP 169.1.X.X also from 192.168.3.X(Home).
202.92.X.X is my static public Ip which is permitted in the client side for the tunnel.
You will have to permit 169.1.X.X in the split tunnel access list and also in the Crypto ACL of site to site tunnel as i have mentioned in my previous post. Also you will have to mirror those Crypto ACL on the the remote vpn device for site to site tunnel.
Since you already have "same-security-traffic permit intra-interface" the traffic from VPN client will be redirected to site to site tunnel and will not be NAT'ed to public ip (202.92.X.X).So the source of the packet would be the vpn pool ip and not public ip .
I am very very Thanks to you for giving me a time . I created Crypto acl according to your above mail .but Saju Still I am not able to access tunnel Ip (184.108.40.206/24) from my home . I am sending my current config again wht I did change according your suggession. please once again you chack and let me know if thr any hopes ;-).
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :