15.2 EIGRP Authentication Configuration Checklist

Consider the following illustration:

There are three steps to consider when configuring EIGRP authentication.

  1. Configure the key chain. Each key is defined by a number, as in key 1.
  2. Configure the authentication mode. Note only MD5 is available in classic EIGRP, and named EIGRP also adds SHA hashing.
  3. Enable the authentication to use the key chain.

Note steps 2 & 3 are configured on a per-interface basis.