Hi,
Its pretty hard to give any specific answer to this with the starting information you gave.
Though I don't see a problem with configuring 2 Security Context and I'm not really sure what the problem was with trying that?
Beginning from the start you would
- Boot the ASA in multiple context mode
- Configure the 2 Security Contexts and attach 2 interfaces to both of them
- "outside" interfaces would be connected to their own ISPs
- "inside" interfaces would be connected to their own LANs
- You would have to confirm that the LAN networks have a default route towards their own Security Context
- If you have a L2 switch network behind the ASA then you simply take the needed Vlans to their own Security Context
- If you have already router acting as the gateway for your local networks before the ASA I guess you would need to consider using Policy Based Routing to forward each LANs traffic to the correct Security Context.
- Jouni