Hi @ngsb. The MX devices can’t do the NAT of traffic going to a non-Meraki VPN peer, so it’s almost certain you will need to maintain the ASA (or another third party firewall) in the design. Having the ASA terminating this VPN will also let you distribute the routes to the far end into the Meraki Auto VPN, something you may not be able to do otherwise.
Then you just need to work out which way round you want to position the devices. Do you want the ASA on the internet edge with the Meraki MX behind it in VPN concentrator mode, or do you have the MX at the internet edge, with the ASA behind it just to terminate the third party VPN. This may come down to what inspection you want to do on the edge - do you intend to use the Meraki Advanced Security with Cisco AMP, IDS/IPS etc., or do you only have the Enterprise license in which case you may consider using the ASA for those functions (assuming it can run the Firepower services software module).
Either way, the MX68 will know of all the routes to the Z3 sites through Auto VPN, and you’ll need a static route from the MX68 pointing to the ASA for the cell routers (which needs to be advertised ‘in’ the Auto VPN). In the reverse direction you’ll need a route from the ASA to the MX68 for traffic to reach the Z3 sites. Ideally you’d want all the Z3 sites to exist under a single summary route if possible, that will make things much easier (e.g. each Z3 site is a 192.168.x.x subnet, and this can be summarised as 192.168.0.0/16 in a static route on the ASA). This is the basics, there will likely be other things you will find you need to do, and also some you could (like dynamic routing).