The ACL is used to describe which range of addresses to NAT.
It's (usually) a "standard" access list (source spec only). Something like "access-list 1 permit 192.168.1.0 0.0.0.255" will allow the entire host range to NAT going out.
You could also do an "access-list 192.168.1.0 0.0.0.127" and limit the NAT to the lower half of the address range.
For general commercial operation, Cisco recommends doing a NAT with a global outside range, then a PAT to handle the possibility of exhausting the specified range.
So you could do a dynamic NAT pool (each in-going-out user gets a different outside address) for addresses 192.168.1 - 127, then do a PAT (overload - each in-going-out users gets the same outside address) on 192.168.1.128 (or whatever other address is not already specified in the first (outside global) range).
This'll provide a range for the "inside-going-out" people, and leave a range of addresses for specific static mappings (i.e. VPN, Web, FTP ... whatever) inbound.
Doing the ACL is no big deal. Most of the tests ask for a NAT of the entire host range (and don't forget the "overload" keyword if PAT is requested).
FWIW
Scott