Yes, this works fine. Just make sure that all routers have the same view of what networks are connected (all are on the same primary subnet and have the same secondary subnet definitions).
However, this is not the preferred way to solve the problem because it forces traffic between the user communities to be routed as well. If your routers support MHSRP, use a single subnetwork definition and a different HSRP group for each class of users. In the case you describe, with two classes of users and two routers, you can use the real router address for the default gateway of those users which should be kept off the standby router and only use HSRP for the users which must be protected. (Note that even though this requires only a single HSRP group, it does require using routers which support MHSRP. The reason why is "left as an exercise for the reader." :-)
If the reason for the policy is because the link on the standby router lacks the required capacity to support all users, another approach would be to use policy routing to apply type of service to the outbound packets and then apply custom queueing to control traffic flow. That way, rather than cutting the lower priority users off completely even if the higher priority users are all on vacation, the low priority users can be supported on an available bit rate basis. However, this assume the bottleneck is the outbound link(s) and will not be reliable if the traffic bottleneck is inbound.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...