It seems like it works somehow, strange but works. ???
all works on vmware workstation 6.5
client server
vm1<–-lan--->vmnet3<----lan--->em1 pfs1 em0<---wan---->vmnet1<---wan---->em0 pfs2 em1<---lan---->vmnet4<---lan---->vm2
192.168.4.21/24 192.168.4.11/24 172.16.1.10/24 172.16.1.11/24 192.168.4.10/24 192.168.4.20/24
gw 192.168.4.11 tap 192.168.4.2 tap 192.168.4.1 gw 192.168.4.10
I know that this seems to work on vmware, but I don't think that this would a standard network configuration. I can see several potential issues, DNS, DHCP. In most wide area networks you would have a core site with a 21 network or larger. For your remotes they would some 24 networks or smaller. It all depends on the size of your company.
So in that case you would extend your network either with secure VPN's, or metnet's, openvpn's. When I mean extend your business network to 10 sites I would do the following and let's assume that the connections are ipsec or openvpn. We are also using windows 2003/2008 for servers.
Our core network has 200 users and each site has 32 users. We will have a 510 addresses (23 bit mask) at the core(10.10.10.0- 10.10.11.254), each site will have 64 addresses.
Core:10.10.10.0
Site 1: 10.10.20.1 - 10.10.20.64 GW:10.10.20.1
Site 2: 10.10.20.65 - 10.10.20.128 GW:10.10.20.66
Site 3: 10.10.20.129 - 10.10.20.193 GW:10.10.20.130
Site 4: 10.10.20.194 - 10.10.20.254 GW:10.10.20.195
Site 5: 10.10.21.1 - 10.10.21.64 GW:10.10.21.1
Site 6: 10.10.21.65 - 10.10.21.128 GW:10.10.21.66
Site 7: 10.10.21.129 - 10.10.21.193 GW:10.10.21.130
Site 8: 10.10.21.194 - 10.10.21.254 GW:10.10.21.195
Site 9: 10.10.22.1 - 10.10.22.64 GW:10.10.22.1
Site 10: 10.10.22.65 - 10.10.22.128 GW:10.10.22.65
So at the core site we would be building a main router so we would reserve the first 32 addresses for addresses for routers and vpn devices. Then we would build out from there through our firewalls and start building out our tunnels (what every secure method that you would use, your choice). So at the core we would then be looking at something like the following:
Core: 10.10.10.10 core router managment
Core: 10.10.10.1 Default gateway
Firewall Lan interface: 10.10.10.11
Firewall VPN interface 1:10.10.10.12 (5 vpn tunnels per interface)
Firewall VPN interface 2:10.10.10.13 (5 vpn tunnels per interface)
DHCP Server: 10.10.10.14 contains scopes for core site with all vpn sites
Baracuda: 10.10.10.15 (mail filtering)
We would build our VPN's with rules in place to allow DCHP, DNS services to extend over the vpn tunnels. Our internet and other services would be provided from the core site. Remote sites would have a file server and data would be replicated over the vpn tunnels for backup. The local server would also run DNS services for local names resolution. Other services could be provided via terminal services or citrix to conserve bandwidth.
I hope this helps. I know it might draw more questions.
RC