Hi @kadar2
Understood.
However, hiding your internal services seems unnecessary to me. "Security through obscurity" is generally a bad practice to follow as hiding your IP addresses provides what? Nothing..
If you hide them, they can not see the real IP, however they will still get to the intended destination via NAT - so whats the difference?
If you are concerned about remote users and their access to the internal servers, you should employ a proper firewall policy to restrict what they can and cant do.
Employing NAT over the VPN starts to open complications regarding 'NAT-T' and opening up different ports for NAT traversal - when really, your issue here is how you are tackling your security concerns.
To answer your questions regarding NAT. Bi-directional is needed if both sides need to INITIATE a connection.
If it's only 1 side initiating the connection, then 1 one NAT is needed.
If its initiated on both sides, bi-directional is needed
These are rules in general for NAT - however, as mentioned above, I don't recommend you employing this as you arent securing yourself any more than you think.