Hi Adam,
The above scenario is possible.
we have to do nat on the remote end
lets say we have the following topology
ASA1========ASA2
where ASA1 is the side where we have multiple subinterfaces and the ASA2 is the remote end
we need to apply the policy based nat rule on the remote end which should be as follow
access-list nat_policy permit ip 172.16.1.0 255.255.255.0 192.168.18.0 255.255.255.0
nat nside) 2 access-list nat_policy
global (outside) 2 192.168.19.0 255.255.255.0
now on the ASA1 the
local network should be 192,168.18.0/24
remote network should be 192.168.19.0/24
On the ASA 2
local network should be 192.168.19.0/24
Remote network should be 192.168.18.0/24
Make sure that we dont have a nat exempt on the ASA2 for the traffic fllowing from 172.16.1.0/24 toward destination 192.168.18.0/24
Here is the config example that you can follow
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b37d0b.shtml
Hope this helps you
Thanks
Raj