I have deployed version 8.0(3) on quite a few ASA and PIX devices without any problems. I don't see a clear reason why you shouldn't use version 8 of the code. Just make sure to read the release notes to ensure that there are not any bugs related to your organization's setup.
Actually i am going to the following on the firewall.
1. 10 Site to site VPN from Routers to ASA
2. 10 SSL Vpn connection to ASA
3. 200+ remote access VPN on ASA.
4. INLINE IPS using AIP-SSM-10 on ASA
5. Active Directory integration for remote access VPN and SSL VPN.
6. DHCP pool on ASA.
7. Lot of different kinds of Natting.
Actually I am also looking the advice if anyone setup this kind of scenario or near to this kind. I really don't want to play first and reach to the stable configuration. I am trying to start with the most recommend ASA/ASDM versions.
BTW how did you find ASDM 6.0 for impmentation & also day to day management?.
I like the ASDM for installation and management for the ASA/PIX devices. Version 6 has worked well for me. The VPN wizards are helpful in setting up both SSL and IPSec remote access VPNs as well as Site to Site connections. I have setup similiar secenarios for clients in the past, so there isn;t anything really crazy in your list. The biggest thing to do is to make sure that you size the device properly for your needs.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :