This is very possible. All you have to do is set up two VPN qubes (with different providers/accounts/destinations according to how separate you want it to be). You will, as you correctly assumed, have to have two distinctly separate qubes to do this, but you just connect the different qubes to the different VPNs.
If this network we are connecting to also uses a tunnel will that cause an issue?
secondly, Which IP address will clientapp see VPN1 or the last link in the chain (e.g., the tunnel vpn at sys-net)?
When setting up the firewall for the clientapp where do I best do that with this setup? Which qube? Can I do it in the client app qube or should I do it elsewhere? Let’s use something simple as an example. I want to block all other connections except outgoing and incoming mail (everything else is blocked)
let’s use outlook or gmail as an example!
The key server settings for IMAP are:
Incoming Server (IMAP) imap.gmail.com
Port: 993 (with SSL/TLS)
For the outgoing server (SMTP):
Outgoing Server (SMTP):smtp.gmail.com
Port: 465 (with SSL) or 587 (with TLS/STARTTLS)
I think you may have misunderstood. I was suggesting different providers, different accounts or just different IPs, depending on what your needs are. For instance, if you just need it to look like it’s coming from different countries, then just set up the different VPN vms to use different destination IPs. But if you want it to appear more separate (and understand that this requires more than just VPN setup) you should consider separate accounts or even separate providers.
You didn’t give any information as to why you’re setting up different VMs, so I don’t know what your goal is, so I made generalities in my response.
Don’t need pre-firewall. I don’t block anything on sys-firewall. I have default sys-firewall config. My threat level is I don't want aggregated advertisement.