This is my configuration on asa.
crypto ikev1 policy 1
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 28800
crypto ipsec ikev1 transform-set FirstSet esp-3des esp-md5-hmac
access-list l2l_list extended permit ip 192.168.1.0 255.255.255.0 10.10.10.0 255.255.255.0
access-list l2l_list extended permit ip 192.168.1.0 255.255.255.0 10.10.20.0 255.255.255.0
access-list l2l_list extended permit ip 192.168.1.0 255.255.255.0 192.168.95.0 255.255.255.0
tunnel-group 103.19.25.66 type ipsec-l2l
tunnel-group 103.19.25.66 ipsec-attributes
ikev1 pre-shared-key xxxxx
crypto map abcmap 1 match address l2l_list
crypto map abcmap 1 set peer NSX_Public_IP_Address
crypto map abcmap 1 set ikev1 transform-set FirstSet
crypto map abcmap 1 set pfs group2
crypto map abcmap interface outside2
nat (inside,outside) 1 source static obj-192.168.1.0 obj-192.168.1.0 destination static DC-10.10.20.0 DC-10.10.20.0 no-proxy-arp route-lookup
nat (inside,outside) 1 source static obj-192.168.1.0 obj-192.168.1.0 destination static DC-192.168.95.0 DC-192.168.95.0 no-proxy-arp route-lookup
nat (inside,outside) 1 source static obj-192.168.1.0 obj-192.168.1.0 destination static DC-10.10.10.0 DC-10.10.10.0 no-proxy-arp route-lookup
After that, I still cannot connect to opposite site.