Routing Configuration Guide, Cisco Catalyst SD-WAN Releases 17.x

PDF

Configure EIGRP

Updated: February 6, 2026

Overview

Sets up the routing protocol across your overlay network using various management methods. This task enables efficient routing by defining autonomous system IDs and specifying redistribution parameters to meet your specific service-side routing requirements within the Cisco Catalyst SD-WAN.

Use this task to set up EIGRP for routing in Cisco Catalyst SD-WAN, enabling efficient and scalable routing across your overlay.

You can EIGRP using Cisco SD-WAN Manager templates, configuration groups, or directly via the CLI on Cisco IOS XE Catalyst SD-WAN devices.

Before you begin

Follow one of these steps to configure EIGRP:

Procedure

1.

Configure EIGRP using Cisco SD-WAN Manager templates.

This method involves creating a reusable EIGRP feature template in Cisco SD-WAN Manager, which defines the basic EIGRP parameters such as the autonomous system ID, and specifies how routes are redistributed. This template can then be applied to multiple devices. For more information, see Configure EIGRP using Cisco SD-WAN Manager.

2.

Configure EIGRP using a configuration group.

This method applies EIGRP configurations within a service profile using configuration groups in Cisco SD-WAN Manager, suitable for service-side routing within specific VPNs. For more information, see Configure EIGRP using a configuration group.

3.

Configure EIGRP using CLI.

This method involves directly entering EIGRP configuration commands on the Cisco IOS XE Catalyst SD-WAN device's command-line interface, providing granular control over the configuration.

What to do next

After configuring EIGRP, verify the configuration using the appropriate show commands on the device. For example, show ip route vrf <vpn-id> for IPv4 EIGRP routes. For more information, see Verification commands for EIGRP configuration.


Configure EIGRP using Cisco SD-WAN Manager

Use this task to configure the EIGRP routing protocol using the EIGRP feature template in Cisco SD-WAN Manager.

This template defines the basic EIGRP parameters, such as the autonomous system ID. It also specifies how routes are redistributed. You can apply this template to multiple devices.

Before you begin

Follow these steps to create an EIGRP template:

Procedure

1.

From the Cisco SD-WAN Managermenu, choose Configuration > Templates > Feature Templates.

2.

Click Add Template and select a device from the list.

3.

From the Other Templates section, choose EIGRP and enter a name and a description for the template.

4.

Click Basic Configuration to configure the local autonomous system number for the template.

  1. In the Autonomous System ID field, enter the local AS number (Range: 1-65,535).

5.

To redistribute routes from one protocol into an EIGRP routing domain, click New Redistribute under IP4 Unicast Address Family and enter the following parameter values:

  1. Select Mark as Optional Row.

    This action marks the configuration as device-specific. To include this configuration for a device, enter the requested variable values when you attach a device template to a device, or create a template variables spreadsheet to apply the variables.

  2. Choose the Protocol from which to redistribute routes into EIGRP (e.g., omp, connected, static, ospf, bgp, nat-route).

  3. Enter the name of the Route Policy to apply to redistributed routes.

  4. Click Add to save the redistribution information.

6.

To advertise a prefix into the EIGRP routing domain, click Network, then click New Network and enter the following parameter values:

  1. Select Mark as Optional Row.

    This action marks the configuration as device-specific. To include this configuration for a device, enter the requested variable values when you attach a device template to a device, or create a template variables spreadsheet to apply the variables.

  2. In the Network Prefix field, enter the network prefix you want EIGRP to advertise in the format of prefix/mask.

  3. Click Add to save the network prefix.

7.

To configure advanced parameters for EIGRP, click Advanced and configure the following parameter values:

  1. In the Hold Time (seconds) field, set the interval after which EIGRP considers a neighbor to be down (Range: 0-65,535, Default: 15 seconds).

  2. In the Hello Interval (seconds) field, set the interval at which the router sends EIGRP hello packets (Range: 0-65,535, Default: 5 seconds).

  3. In the Route Policy Name field, enter the name of an EIGRP route policy.

8.

To configure authentication for EIGRP routes click Authentication:

  1. Click Authentication

  2. Choose global in the Authentication Key drop-down list, and then choose md5 or hmac-sha-256.

    • For MD5: Enter an MD5 Key ID and MD5 Authentication Key.

    • For HMAC-SHA-256: Enter an Authentication Key.

  3. Click Add to save the authentication parameters.

Note

To use a preferred route map, specify both an MD5 key (ID or auth key) and a route map.

9.

To configure interface parameters for EIGRP routes, click Interface, and enter the following parameter values:

  1. Select Mark as Optional Row.

    This action marks the configuration as device-specific. To include this configuration for a device, enter the requested variable values when you attach a device template to a device, or create a template variables spreadsheet to apply the variables.

  2. In the Interface name field, enter the interface name(s) on which EIGRP should run.

  3. Set Shutdown to No (default) to enable the interface to run EIGRP, or Yes to disable it.

  4. Click Add to save the interfaces.

An EIGRP feature template is created, ready to be applied to devices.

What to do next

When the configuration has been applied to the devices, verify the EIGRP configuration using the appropriate show commands on the device. For example, show ip route vrf <vpn-id> for IPv4 EIGRP routes. For more information, see Verification commands for EIGRP configuration.


Configure EIGRP using a configuration group

Use this task to apply EIGRP configurations within a service profile using configuration groups in Cisco SD-WAN Manager.

This method is suitable for service-side routing within specific VPNs and leverages configuration groups for simplified management.

Before you begin

Follow these steps to configure EIGRP routing in a service profile:

Procedure

1.

From the Cisco SD-WAN Manager menu, choose Configuration > Configuration Groups.

2.

Configure an EIGRP Routing feature in a Service Profile.

3.

Configure basic settings.

  1. In the Autonomous System ID field, enter the local autonomous system (AS) number (Range: 1-65535).

  2. For Network: Enter the IP address and subnet mask.

  3. For Interface:

    1. Select one of the Protocol options from which to redistribute routes into EIGRP (e.g., bgp, connected, nat-route, omp, ospf, ospfv3, static).

      Note
      From Cisco IOS XE Catalyst SD-WAN Release 16.12.1b and later, you can set metric values for redistribution by using the CLI add-on feature template. Use the following command:
      redistribute ospf 1 metric 1000000 1 1 1 1500

      For more information, see CLI Add-on Feature Templates. .

    2. Enter the name of the Route Policy to apply to redistributed routes.

  4. Configure IPv4 unicast address family:

    1. Click Add Interface.

    2. Provide a value for the AF Interface.

    3. Set Shutdown to OFF (default) to enable the interface, or ON to disable it.

    4. (Optional) Click Add Summary Address and enter an IPv4 address and choose a subnet mask.

  5. Configure authentication:

    1. MD5 ID

      • MD5 key ID: Enter an MD5 key ID to compute an MD5 hash over the contents of the EIGRP packet using that value.

      • MD5 Authentication Key: Enter an MD5 authentication key to use an encoded MD5 checksum in the transmitted packet.

      • Authentication Key: A 256-byte unique key that is used to compute the Hashed Message Authentication Code (HMAC) and is known both by the sender and the receiver of the message.

    2. HMAC-SHA-256: A 256-byte unique key that is used to compute the Hashed Message Authentication Code (HMAC) and is known both by the sender and the receiver of the message.

  6. Configure advanced settings:

    1. In the Hold Time (seconds) field, set the interval after which EIGRP considers a neighbor to be down. Specify a value in the range of 0-65535. The default is 15 seconds.

    2. In the Hello Interval (seconds) field, set the interval at which the router sends EIGRP hello packets. Specify a value between 0 and 65535. The default is 5 seconds.

    3. In the Route Policy field, enter the name of an EIGRP route policy.

    4. Toggle Filter to ON. This filters routes that do not match the policy.

EIGRP routing is configured within the specified service profile, ready for deployment.

What to do next

Verify the EIGRP configuration using the appropriate show commands on the device. For example, show ip route vrf <vpn-id> for IPv4 EIGRP routes. For more information, see Verification commands for EIGRP configuration.


Configure EIGRP using CLI

You can use this task to configure EIGRP parameters directly on Cisco IOS XE Catalyst SD-WAN devices via the command-line interface.

Before you begin

To configure EIGRP using the CLI, complete these steps:

Procedure

1.

Configure EIGRP on Cisco IOS XE Catalyst SD-WAN devices using these commands:

config-transaction
router eigrp vpn
 !
 address-family ipv4 unicast vrf 1 autonomous-system 100
  !
  topology base
   table-map foo filter
   redistribute omp
  exit-af-topology
  network 10.1.44.0 255.0.0.0
 exit-address-family
 !
 address-family ipv6 unicast vrf 1 autonomous-system 200
  !
  topology base
   table-map bar
   redistribute omp
  exit-af-topology
 exit-address-family
!
2.

(Optional) To advertise EIGRP routes to OMP, use these commands:

config-transaction
sdwan
 omp
  no shutdown
  graceful-restart
  address-family ipv4 vrf 1
   advertise eigrp
  !
  address-family ipv6 vrf 1
   advertise eigrp
  !
  address-family ipv4
   advertise connected
   advertise static
  !
 !

EIGRP is configured on the Cisco IOS XE Catalyst SD-WAN device via CLI.