Why don't you try and set a delay parameter on the ethernet interface of your standby router so that routes from your active router will always be preferred. IF the primary router goes down, the route from the backup router will be used, providing you the required redundancy.
Do the following to increase the delay:
[ note the delay value that you see here]
Note that the delay parameter is configured in tens of microseconds. Therefore, if your original delay was 100, then the delay command will use (100+100)/10 = 20
If I'm interpreting your post correctly, you want the routes advertised by your standby router toward the IPSec spokes to be less desirable than via the primary. You can achieve this through offset lists:
My understanding of an offset list is to change the prefered route by modifying the admin distance on a matching route. I see a problem because when a link dies, HA IPSec will force a reload of the Active router. This causes the statefull failover to the standby router. ( all is good as long as the primary stays down). However it does not and in the event of a link failure, the primary will reload and come back up and eigrp will send traffic to the prefered side even though it is the standby IPSec device. All traffic stops at this point until the bad link is fixed or the box is powered down.
So, This wont work either. The only solution that I think will work is one where EIGRP can have knowledge of the active router.( i.e. route to the VIP of the HSRP group).
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...