Behind the 5100, we have :
192.168.0.1/23 - office network, wifi, domain controllers, etc.
172.16.3.0/24 - Encryption domain for site to site VPNs
10.x.x.x - Engineering servers
Right now the way users access the encryption domain is by connecting to a local RRAS server which authenticates their account and gives them an IP on the 172.16.3.0/24 network (locally or remotely). This then allows them to have access through some or all of the site to site VPN's using that encryption domain. This is messy and we would like to get rid pf the RRAS server. I know there is a lot going on here and I think it is more about improper network design, etc. However, I was thinking there must be a way using our Checkpoint gateway to allow some users in 192.168.0.1/23 to use an IP in the 172.16.0.0/24 network. You might be right about fixed IP's and NAT rules but that is a lot of work for me!