This sounds like a highly secure (military grade) level network. Is that the case?
Physically separate may not necessarily be the right answer as a network can be logically separated using techniques like:
Are you being challenged to provide this separation or are you doing the auditing?
In the IT trenches? So am I – read my <a href=”http://itknowledgeexchange.techtarget.com/it-trenches”>IT-Trenches blog</a>