The answer is, it depends.
Are you using a VPN client - like ciscos or sonicwalls vpn clients?
Does the VPN software you are using to open the connection permit routing?
Do you have routing installed on your windows server and are you using an MS vpn tunnel between two servers? From what you've said it sounds like a vpn client and not this.
If the server is being assigned a single IP then it appears on the clients network as that IP and not with your internal IP. If you want to connect from another PC then your server is going to have to not only route connections from your pc to their server but its also going to have to NAT the traffic to that assigned IP.
Does what you are using support that?
When your home PC connects, there are more complications. Your home PC recieves an ip in your subnet... but normally will only route traffic for that subnet to your office. You need to 'push' out the route for 172.x.x.x to your pc. It depends on the software you are using as to how you do this.
The ideal is to open a point-to-point link and to route between the two networks. For this to work you will need their cooperation and a router/fw to open an ipsec tunnel between the two. This way they will send all traffic for your subnet to your router and your router will send all traffic destined for 172.x.x.x to their router.
Interconnecting Networks is not rocket science - its a bit more like watchmaking. Thousands of little tiny details. If one bit is out of place it doesn't work.
Simplest soution: buy a new router for home for 50$ and save yourself a lot of trouble.
UPDATE: if you are going to be changing things and you don't have a big setup then I'd recommend just buying a little sonicwall firewall and letting that handle the ipsec tunnel and remote access. It removes much of the headache and they cost next to nothing. Running RAS on a windows server introduces all sorts of fun problems with blocked ports and routing... thats why everyone usually dedicates a server to RAS and nothing else.
I don't know how you are planning to open this site-to-site tunnel. Are you planning to use IPSec, Openvpn or pptp or something else?
A site to site connection means that the whole 172.x.x.x subnet should be able to reach your whole 192.168 (or whatever you use) subnet... Unless a rule filters the traffic somewhere.
When connect to your office you are assigned an ip in 192.168.x.x so you should be able to reach the remote subnet from home.
Complications:
-The relaying of packets from a dialin client to a remote subnet may be restricted by the server by default - depending on what software you use.
- you will need to 'push' out a route to 172.x.x.x to your dial in client so it knows to send that traffic to your office
- If you are on your own, setting this up and debugging it while connected from home is even more fun and games
Hope that helps.
Best Answer
From the looks of things, you will need to make changes to both VPNs.
On the Home <--> Work VPN, you will need to make sure that all your remote networks are routeable from your home worker VPN clients.
There are two options for this:
Send specific routes for all of your remote networks as part of the VPN client configuration. This could be quite configuration intensive if your client/remote server VPNs are spread across lots of different address blocks.
Configure your home worker VPN clients to use their tunnel interface as their default route. This is a lot simpler from a configuration management point of view, but it will force all traffic from the VPN clients through the office, including their browsing traffic, which may not be desirable.
Could you be a little more specific when you say your home users use hardware VPNs? Do you provide a VPN appliance that they plug into their home broadband, and then plug their laptops in behind the VPN end point? If that's the case, then the above probably won't be needed, as the home VPN client's default route will point back to the office.
On the Work <--> Remote Server|Client Site VPNs, you will need to advertise routes for all of your 'Home VPN' address ranges. (from your example above, 192.168.1.0/24). How do you currently exchange routes with your clients and remote service sites?