I have an office router with networks 192.168.100.x and 192.168.200.x. I also have a remote home office router what also has the 192.168.100.x and 192.168.200.x networks. These two routers are connected over the internet via an encrypted tunnel. The home office only has one PC and one Cisco IP phone.. All is working now but every time I want access a new device at the office from home, I need to enter a static route to it. The office router is a Cisco 3925 and the home router is a Cisco 1921 and both are using IOS 15.7.
I tried enabling EIGRP on both sides but it does not seem to work.
My goal is to be able to ping and connect to a printer at work to my home PC without having to add a specific static router to the printer. The home PC's IP is 192.168.100.21 I tried putting this on both routers:
Quick question : is eigrp mandatory? I'm saying that because you only have 2 subnets on each site so you would be able to do nat to avoid overlapping and use static routes. This would be an easy fix and easy implementation. Or have you already thought about that and have a specific use case which wouldn't work in that design?
Thanks Francesco PS: Please don't forget to rate and select as validated answer if this answered your question
if you are using an IPSec tunnel, EIGRP can't work properly because EIGRP use multicast that is not supported over IPSec. If you really need EIGRP, configure GRE over IPSec to support mutlicast or try to configure EIGRP to work with unicast:
routye eigrp <as> neighbor <ip> <interf>
In any case I suspect that EIGRP does not resolve your problem because home office router has, in its routing table, networks 192.168.100.x and 192.168.200.x as connected and therefore with a best admin metric then EIGRP. So it would always try to reach host with address 192.169.100.x and 192168.200.x locally and not over the tunnel. As suggested by Francesco, the best thing to to is using NAT
To participate in this event, please use the button to ask your questions
* Note: The link to join the discussion will be activated on March 8
All the knowledge of these four experts at your disposal!
Cisco Software-Defined Wide Area Network (SD-WAN...
Community Live- ISR1100X-4G and ISR1100X-6G Platform Overview and Architecture
(Live event - Tuesday, 23 March, 2021 at 10:00 am Pacific/ 1:00 pm Eastern / 7:00 pm Paris)-
This event will have place on Tuesday 23rd, March 2021 at 10:00 hrs PDT&...
Cisco Secure Network Access is helping IT to bridge the gap between what is essential to the business and what the network delivers and to build the next-generation campus network for an unplugged and uninterrupted experience.
Learn more about how these w...
(view in My Videos)
Community Live- New Additions to the Catalyst 8000 Family
(Live event - Tuesday, 23 February, 2021 at 10:00 am Pacific/ 1:00 pm Eastern / 7:00 pm Paris)-
This event had place on Tuesday 23rd, February 2021 at 10:00 hrs PDT...
This event had place on Tuesday 23rd, February 2021 at 10hrs PDT
Designed for an intent-based network, the Cisco Catalyst 8000 Edge Platforms family offers best-in-class networking and security combined. The platforms, available in b...