Thoughts & opinions if I may.
 
 I ' m not a big fan of transparent firewall operation, but if the " green lan"  is already in place, you could do transparent mode here, and 
not change one aspect of the lan. The same holds true, with regards to the DMZ
 
 On the DMZ and trunking, there' s no problems with doing  tagging in transparent mode. 
  
 On the earlier comment by another & with regards to AS and Fortimail, the  Fortigate does provide AS function and you don' t need a  separate ESA just  for AS.
 
 
On the ASA & FGT, do you have any concerns with  sessions limits?  thru-put ? 
 
 The reason I say this (above bold ), I did something like the above design that your proposing, but with an older  ASA 5510 and FGT200B and the choke point was the 5510 in regards to thru-put. ( 
 fwiw  you will not get more than 350mbps out of a ASA5510 no matter whatever you do or with gige ports and security+  )
 
 This is why I question the ASA, & it' s role and if it' s a business requirement.  You probably would want to look at  that,  and make sure you don' t have ay portion of  the stacked/tiered firewalls being a bottleneck/chokepoint regardless if it encrypted or non-encrypted traffic. So i would pull the numbers for both models and do comparisons.
 
 The cool thing with vdoms on the fortigate, you could set sessions limits and resources limits. ( 
 see attach drawing  )
 
 In the end of the day, you have about 6 or more options. Just vet each one and do your research. Did you engage your fortinet partnet or sales team for there opinions?
 
 
 
 
 
