Load Balancing, Configuration and Routing Guide for EIGRP

Need a step by step guide on how to do load balancing, configuration and routing of EIGRP? Check out our informative guide to achieve just that. Read here.

Notice: This blog post was originally published on Indeni before its acquisition by BlueCat.

The content reflects the expertise and perspectives of the Indeni team at the time of writing. While some references may be outdated, the insights remain valuable. For the latest updates and solutions, explore the rest of our blog


Many of you have problems finding a comprehensive guide to load balancing for EIGRP. Using routing capabilities is a must in today’s evolving networks. In an enterprise environment, using EIGRP (Enhanced Interior Gateway Protocol) is your best choice because EIGRP is fast and agile.

Here is brief recap of EIGRP attributes.

EIGRP has four basic components:

Neighbor Discovery/Recovery is the process that routers use to dynamically learn of other routers on their directly attached networks. Routers must also discover when their neighbors become unreachable or non-operative.

This process is achieved with low overhead by periodically sending small hello packets. As long as hello packets are received, a router can determine that a neighbor is alive and functioning. Once this is determined, the neighboring routers can exchange routing information.

EIGRP offers the following features:

ALSO:

Configuring EIGRP

To enable EIGRP, run the following command:

Router(config)# router eigrp <ASN>

To add a network to EIGRP run the following command:

Router(config-router)# network <network> [wildcard mask]

All non-passive interfaces belonging to a specified network will become capable of forming EIGRP adjacencies and their attached networks will be advertised into EIGRP.

EIGRP will summarize to classful boundaries by default.

An interface can be set to passive operation to prevent advertisement:

Router(config-router)# passive-interface <interface>

If an interface is included in the network configuration but set to passive, it will still be included in EIGRP advertisements. If an interface is not included in an EIGRP network, it will not be advertised in EIGRP.

Download our free ultimate runbook and  see how predictive analysis can help you be proactive about your Cisco devices.

Efficient route summarization is key in preventing looping route queries (which leads to an SIA condition).

Disable automatic classful summarization:

Router(config-router)# no auto-summary

Configure manual summarization on an interface:

Router(config-if)# ip summary-address eigrp <ASN> <network> <subnet mask>

Stub Routing

Stub routers participate minimally in EIGRP, which reduces utilization of memory and CPU on the router.

Router(config-router)# eigrp stub [options]

Load Balancing EIGRP

EIGRP automatically load balances across equal-cost links. Unequal-cost load balancing can be enabled by specifying a variance. Feasible successors with a feasible distance less than (best path FD * variance) will be proportionally utilized:

Router(config-router)# variance <multiplier>

The variance can be between 1 and 128; default is 1 (equal-cost balancing only).

EIGRP Tuning

EIGRP timers do not have to match for two routers to form an adjacency.

Hello timers are modified per interface:

Router(config-if)# ip hello-interval eigrp <ASN> <seconds>

The default hold timer is calculated as three times the hello timer value. However, configuring the hold timer manually is done in seconds:

Router(config-if)# ip hold-time eigrp <ASN> <seconds>

Manipulating EIGRP metrics with K-values (default is bandwidth and delay ) then values are : K1=Bandwidth K2=Load K3=Delay K4 = Reliability K5=MTU:

Router(config-router)# metric weights 0 1 1 1 1 1

Authentication

Configuring MD5 authentication on an interface:

Router(config-if)# ip authentication mode eigrp <ASN> md5 Router(config-if)# ip authentication key-chain eigrp <ASN> <chain name> Router(config)# key chain <chain name> Router(config-keychain)# key 1 Router(config-keychain-key)# key-string <password>

Bandwidth Manipulation

The perceived bandwidth of an interface can be administratively altered for the purpose of metric manipulation:

Router(config-if)# bandwidth <kilobits>

The bandwidth setting will not affect the actual interface speed, only the value used in metric calculation. This is useful for interfaces being rate-limited below line rate.

By default, EIGRP will use no more than 50% of an interface’s bandwidth. This can be adjusted as such:

Router(config-if)# ip bandwidth-percent eigrp <ASN> <percentage>

Verifying EIGRP Operation

Monitoring
Debugging

EIGRP configuration is pretty straightforward, but what happens in complex environments with many routers and firewalls if EIGRP stops working? The work load is almost impossible to bear.

It’s good to have indeni on your side. This cutting edge technology has complex algorithms. By connecting to the device and simulating human-like behavior, indeni automates the troubleshooting of EIGRP protocol network environments and provides solutions to EIGRP malfunctions.

If you enjoyed this post, wait until you see the power of predictive analytics for IT in your network environment. 

Related content

Route traffic intelligently with DNS-based GSLB for BlueCat Edge

Discover how DNS-based GSLB with BlueCat Edge empowers networking teams to control traffic steering, reduce costs, and improve resilience.

Read more
Webinar

Making APIs Work for You (Part 5)

Welcome to Part 5 of Making APIs Work for You. Our community specialist, Vivek Mistry, is your guide, and today, Vivek will focus on user security…

Read more
Image shows BlueCat cathead image in the background with the text "Introducing Integrity X" appear over it. Integrity X is the newest version of BlueCat's DDI management solution.

Exciting product update: Introducing BlueCat Integrity X

Introducing BlueCat Integrity X, a single platform for complete visibility and control over critical network services.

Read more
Article

What is protective DNS (PDNS) and why is PDNS important?

Discover what protective DNS is, how it prevents cyber threats like phishing and malware, and why it’s essential for modern enterprise network security.

Read more