Because I'm not in the habit or rearranging my core LAN on a whim.
That, and the M0n0 is not a physical unit. The M0n0 is a virtual machine, as are the XP clients in question.
The M0n0 VM has two (virtual) NICs, one of which points to the external facing (physical) NIC of the host; the other to an virtual switch that is internal to the host. The clients have one NIC each, which point to the same virtual switch. The M0n0 is the default gateway for the XP clients and, currently, the XP clients can see the internet via the M0n0.
I think I have worked it out as far as I need to. I have added the following inbound NATs:
| If | Proto | Ext port range | NAT IP | Int port range |
| WAN | TCP | 50050 | 10.b.b.50 | 3389 |
| WAN | TCP | 50051 | 10.b.b.51 | 3389 |
and the following rules:
| If | Type | Proto | Source | Port | Destination | Port |
| WAN | Pass | TCP | * | * | 10.b.b.50 | 3389 |
| WAN | Pass | TCP | * | * | 10.b.b.51 | 3389 |
| LAN | Block | * | LAN net | * | 192.a.a.0/24 | * |
| LAN | Block | * | LAN net | * | 192.c.c.0/24 | * |
| LAN | Pass | TCP | * | * | 10.b.b.51 | 3389 |
(where 192.a.a.x is my physical LAN and 192.c.c.x is a VPN LAN that I didn't want them to be able to access).
I had hoped to avoid putting in a block rule for every VPN I don't want the two clients to access, so I first tried setting a static route for all traffic to go to the default gateway of the PIX on the physical LAN (i.e. attempting to bypass the routing that PIX would do) but for some reason, that only allowed me to see the default gateway and no further. So I've just bitten the bullet and added the 18 VPN LAN block rules.
For sanity, if there is a better way, I'd love to hear it.
J.