There are several aspects of your post that I do not understand. You seem to be saying that the second site is not configured for EIGRP but that the address in the error message is the switch at the second site. The message says that there is an EIGRP neighbor at 22.214.171.124. There can not be an EIGRP neighbor if the device is not configured for EIGRP. So either 126.96.36.199 is not really at the second site, or it is not true that the second site is not configured for EIGRP. Perhaps you can clarify what is going on?
You have not provided enough information about the another 3 sites for us to advise whether they should be part of your EIGRP. Can you tell us more about your topology?
I still believe that we are little left out in the cold in regard to enough information.
You have EIGRP routing running for network 188.8.131.52 but we do not see the relevant interface config for the two routers CS_1 and CS_2, and equally important we do not have any info whatsoever about the boxes SG_1, SG_2, Dis_1 and Dis_2. What are they? How are they configured?
The log tells that for some reason a duplicate IP has happened on VLAN80 where a unit with the MAC address of 000e.386e.49ff claims to have the 184.108.40.206 address which is used for HSRP somewhere. But as we do not know anything about VLANs and their config in your network, we simply cannot be of much help.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...