Some details of your question are somewhat puzzling to me. The behavior that you describe 10.202.1.0 to 10.201.1.0 would seem to be behaviors of router 2 but the topology table that you show is the topology table of router 1. So we do not have sufficient information (or perhaps sufficient understanding) of the topology to really answer your question.
But in general the topology seems fairly simple and if we make some assumptions then we can suggest an answer that should be pretty close to right. When the topology is a simple triangle as you show then the default behavior of EIGRP is to do equal cost load balancing and there is only a single route in the topology table (and in the routing table) to the destination. With EIGRP there is an option for un-euqal cost load balancing using configuration of variance. When variance is configured EIGRP can load balance over links with unequal cost and will balance the traffic in proportion to the metrics of the various routes. So if you configure variance and if you can produce metrics on the routes (probably achieved by applying offset lists) that are in the proportion 70 to 30, then you could achieve your requirement.
In practical terms I believe that it would be very difficult to achieve the proportion of 70 to 30 in the metrics of the routes. and therefore very difficult to achieve your requirements.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...