Consider the following illustration:
There are three steps to consider when configuring EIGRP authentication.
- Configure the key chain. Each key is defined by a number, as in key 1.
- Configure the authentication mode. Note only MD5 is available in classic EIGRP, and named EIGRP also adds SHA hashing.
- Enable the authentication to use the key chain.
Note steps 2 & 3 are configured on a per-interface basis.