Good mornin @Image_Acquire!
You can consolidate to a single GX and create a new VLAN that used to exist on the TP-Link router, that should be fine. Devices on VLAN A could get to devices on VLAN B. For example:
Your' current GX50 could hold VLAN X (where X is just your VLAN ID) with network 192.168.11.0/24, GX IP at 192.168.11.1. It could have a second VLAN Y that is 10.1.10.0/24 with the GX IP at 10.1.10.1. In this setup, so long as the secure network toggle is set to false, the devices should be allowed to communicate to each other on the LAN.
If you want the two GX setup, the GX50 that is downstream of the GX50 connected to the internet will act as a firewall (which is good news) and block unsolicited inbound connections to the 10.1.10.x network. Devices on the downstream GX50 could initiate connections upwards just fine (i.e. 10.1.10.50 pings 192.168.11.20 would work), but connections coming into the 10.1.10.x network are blocked unless a port forwarding rule exists.
Finally, if you setup client VPN on the downstream GX50 - the connecting client devices should, in theory, be able to reach both the 10.1.10.x and 192.168.11.x networks. If you configure client VPN on the upstream GX50, it would be able to access the 192.168.11.x network, but be blocked by the downstream GX50 that holds the 10.1.10.x network (unless a port forward rule existed for it).
Was the TP-Link router just routing? If that was the case, it probably would have let traffic through without a second thought, which would be the primary difference between the TP-Link and the GX.