How do i NAT my internal network to different IP range before reaching destinaton LAN
No, you don't need NAT0 anymore and actully it is mandatory to remove it as NAT0 takes precedence over the other NAT statements.
You should translate all subnet to one IP using policy-based NAT
nat (inside) 10 access-list VPN-NAT
global (outside) 10 172.16.20.1
access-list VPN-NAT permit ip 192.168.10.0 255.255.255.255 22.214.171.124 255.255.255.240
The crypto map access-list:
access-list VPN permit ip host 172.16.20.1 126.96.36.199 255.255.255.240
To check the NAT:
To test the full setup use the "packet-tracer" command, that generates a bogus packet with the characteristics you want and passes it to all the ASA internal process and shows you the result.
Please rate if this helped.