I actually prefer the 8.3+ NAT configuration. It's a lot more intuitive when you get used to it. Here's a sample config that I believe will work, but I have not had a chance to throw it up in the lab yet. Feel free to change any of this to suit your needs.
object-group network Private-Networks
network-object 10.100.0.0 255.255.0.0
network-object 192.168.222.0 255.255.255.0
object-group network NATTED-Private-Network
network-object 192.168.50.0 255.255.255.0
object-group network Destination-VPN-Networks
network-object 192.168.228.0 255.255.255.0
network-object 192.168.229.0 255.255.255.0
nat (inside,outside) source dynamic Private-Networks NATTED-Private-Networks destination static Destination-VPN-Networks Destination-VPN-Networks
This should utilize the 192.168.50/24 network as a dynamic NAT pool. If you prefer to use the subnet as a dynamic PAT pool, use the following NAT configuration:
nat (inside,outside) source dynamic Private-Networks pat-pool NATTED-Private-Networks destination static Destination-VPN-Networks Destination-VPN-Networks
Also note, when defining your access-list for VPN traffic, in 8.3+ you still need to use the mapped IP addresses. The ASA uses the access-list to determine the phase 2 SAs and doesn't perform NAT prior to bringing up phase 2. This is the opposite of normal interface access-lists in 8.3+.
Regards,
Mike
Please remember to rate helpful posts.