I'm not sure if you can see the Phase1 parameters that were used. Though you can see the Phase1 parameters used if you debug the ISAKMP during the VPN connection forming.
To my understanding the number after isakmp policy is the order/sequence number in which the device tries negotiate the parameters with the remote device to find the matching settings. As I said before, using debug while the connection is forming is a good way check what is happening regards the Phase1 policy beeing chosen.
Regarding the interesting traffic I think you need to use the public network range in the VPN configurations (202.x.x.x). The encryption domain access-list have to be mirror images of eachother.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...