basically you have what it's called: "NAT exemption"
when the condition on the access-list nonat-dmz and nonat-inside happens, the firewall lets the traffic to go out without translation, this is common used for VPN interesting traffic. And the other one the nat (inside) 1 access-list nat-inside
it's called Policy NAT, and basically is going to translate the matching condition defined on the access-list nat-inside into the public address or range defined on the global (outside) 1 x.x.x.x
Here is the command reference for PIX/ASA 7.2.2, please check the nat and static statements it has a really good explanation of how the firewall handles the translations:
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...