Hi Sarab,
I haven't tried the NAT option yet but am in the process of testing with your 2nd suggestion, although I'm still not able to get to this one internal subnet. Here is what I've done so far.
1. Found a spare /29 range in my Internal LAN and created a new VPN Pool. Assigned this VPN pool to one XAUTH User.
2. Set the policies on the FW to allow this traffic
3. Added a route on the firewall to send this traffic to a tunnel interface (not sure why it's configured like this but it is)
4. Added a route on the internal L3 switch to forward traffic for this /29 subnet to the FW
5. Added a network route for 172.19.98.0/24 to my VPN Client
At this point I am able to browse to all internal subnets except this one which I need. If I trace route to an IP in this subnet (172.19.98.0/24) when the client is connected to the VPN every hop times out and I cannot see any logs on the firewall for this traffic. The firewall is able to ping and trace route to all devices in 172.19.98.0/24 so I don't think there is a problem beyond the firewall.
Any ideas on what else I can try? Failing this I might have to go with the NAT method but would need to find some documentation on this and read over it first.