Disclaimer: I'm not a network guru but I do learn quickly! Bear with me.
Situation: I have a colo setup which is comprised of several servers, a iscsi SAN, connected with a Cisco 3560G switch, protected by a Cisco ASA appliance. The switch (and servers) are configured using vlan's such that iscsi traffic is on a dedicated vlan (actually two for redundancy and throughput) and all other network traffic is over another vlan.
I also have a basic SOHO setup, for which I have another Cisco 3560G and a ridiculous router provided by my ISP (it's a Cisco router that doesn't actually allow you to route more than one subnet). My current configuration is what I believe is called a 'router on a stick' configuration. My local SOHO is a standard 192.168.10.0/24 network whereas the colo is 10.0.0.0/8.
I've managed to configure the local 3560G to handle all my local machines and I've also configured my router to have a persistent IPSEC vpn connection to the ASA, which is great. I can connect from any SOHO client to any of my colo servers (To be clear, I can access any device on vlan1).
Goal: I want my some of my local SOHO hosts to be able to access the iscsi at the COLO on that resides on vlan2...
The difference from the client is pinging 10.10.10.x (vlan1) vs 10.10.0.x (vlan2) ... I cannot figure out what I need to do to get this to work. What I have found, and I think this makes sense is that I the iscsi vlan (vlan2) is not connected directly to the ASA and thus is not available to be NAT'd by the ASA. Vlan2 devices are connected directly from the iscsi guest and the host and the traffic is managed by the switch. The ASA has no idea about the vlan2 traffic.
Possible Solution: Is it possible to 'trunk' my soho switch with my colo switch (they're exactly the same model and specs) such that the vlan information is shared and they can 'talk'.
I'm not sure what more specific information I need to post but if anyone can lend some assistance I'd really appreciate it. Sorry if I'm not absolutely clear but networking isn't my forte.