Best Practices for EIGRP
Following are some tips for configuring EIGRP:
-
If you are inserting the device into an existing EIGRP autonomous system, examine the configuration of the other routers in the autonomous system to determine the system number and any other customizations. Ensure that you implement the same, or at least consistent, customizations on the threat defense device that you are adding.
-
Determine whether to configure a full EIGRP process or a stub process:
-
If the threat defense device is in the middle of the autonomous system, where it is connected to more than one other EIGRP router, you probably need the full EIGRP process. See Configure the EIGRP Process for Full Routing.
-
If the threat defense device is at the edge of the autonomous system, where it is connected to just one other EIGRP router, and otherwise hosts connected networks only, then configuring it as a stub router might make the most sense. You can configure the stub so that the threat defense device sends information to the EIGRP neighbor about connected routes, so that other EIGRP routers in the autonomous system can get routes to the threat defense device’s connected networks. See Configure the EIGRP Process for Stub Routing.
-
-
The default settings work for most networks, so adjust them only if you have adjusted them on other EIGRP routers in the autonomous system. You can have a fully-functional EIGRP process by simply configuring the autonomous system number and specifying the networks to route.
-
Configure the router ID to ensure a stable address is used to identify the router. This can help make troubleshooting routing problems easier. See Configure EIGRP Advanced Settings.
-
Do not enable automatic route summarization (the auto-summary command) unless you have determined that it will not create routing loops and it will provide some benefit for your network. How to determine whether auto summarization will work for your network is outside the scope of this document.