You'll set your tunnel interfaces up with a tunnel destination (your other routers ip).
You then create your crypto maps and apply them to the tunnel interfaces (or the public interface - I've seen Cisco do it both ways). Then you can run EIGRP over the tunnel. If you have an access list on the public interface blocking incoming traffic, you need to allow gre, esp, and udp 500 through from your other router.
In your EIGRP process, you'll create your network for your private side.
router eigrp 100
network 192.168.1.0 0.0.0.255
Should work, but this is all from memory. I also found this which should explain in greater detail for you.
This document gives several answers on frequently asked questions for PFRv3 channel state behavior.
Q1: What are all the channel operational states from a BR (border role) perspective and what are the rules/conditions to be in each st...
The need was to reach an host inside a LAN through a VPN connection managed by the LAN gateway (Cisco 1921).
The LAN gateway performs NAT and there was a dedicate nat rule for the host i wanted to reach through VPN.
I couldn't connect to the hos...
We have 3 identical switches configured by someone else and would like to claim some of the Gigabit ports(G1/G2/G3/G4) for use on servers. When we try to change the wiring and configuration, we run in to connectivity issues. Attached is a des...