You are confusing routing and NAT policies.
Your internal network 192.168.0.x connects to an inside ASA insterface in that same subnet.
Your external network 174.98.0.x connects to an outside ASA interface with a default route to your Comcast router's interface in that same subnet.
If you are allowing incoming VPN connections, they must terminate on the ASA's outside interface address.
If you want to allow incoming access to internal servers, each must have a static NAT or PAT entry mapping their internal address to one of the available external addresses. That may or may not be the interface address. You must also have a coresponding access list entry in and ACL that is applied to the outside interface to allow the traffic to enter from outside.