My subject isn't too clear, so let me describe what I'm looking to do. I'm not sure if it's possible. I have an existing network setup here on 192.168.1.0/24, the PAN is .1 on Ethernet 0/2. We are aquiring hardware from a sister company that is going to be eventually merged with us. I am going to put their gear on a separate VLAN, and wanted to dedicate a separate interface on the PAN to that gear. They have remote locations that are using IPSec VPN to get back to their equipment, so I am going to change the VPN tunnels to point back to my PAN and route the traffic over to their little segmented network. I would like to avoid making changes to their hardware and I want to leave their subnet alone. However, they are also using 192.168.1.0/24, and due to the VPN their remote sites are hard-coded to connect to specific IPs in that subnet (for Citrix, etc). Is there some way I can mangle the traffic such that I can terminate their IPSec tunnels and have the traffic hit "their" 192.168.1.0/24 without it having any affect on "my" 192.168.1.0/24? Here was my line of thinking... Add a second "internet" interface, assign a single external IP from our static pool Add a new internal / trusted interface for this sister company's equipment, assign it 192.168.1.1/24 Create a new virtual router for this setup, and put the above two interfaces in the VR Setup IPSec tunnels and assign them to the same VR Assuming I keep all of the traffic for the sister company in a separate Virtual Router, it shouldn't "conflict" or upset my traffic on my existing VR (also using the 192.168.1.0/24 subnet), correct?
... View more