EIGRP Authentication, Passive-Interface, Summarization
Description
In this guide, we will configure authentication keys for our EIGRP neighbors to be used on a yearly basis. We will also configure the "passive-interface" command for any interfaces that do not need to participate in sending EIGRP Hello packets. We will also configure summarization for contiguous networks.

Configuration
1. First, we will configure authentication.
2. Second, we will configure our passive-interfaces
3. Lastly, we will configure summarization from R1 to R2/R3
First, let's configure our clock and our authentication keys. (typically, in a live network, we would use NTP for clock synchronization)
The full configuration is below.
R1 Configuration

R2 Configuration

R3 Configuration

EIGRP Authentication Configuration
Now let's go into our EIGRP sub-configuration and apply our Key-chain
Full configuration below
This configuration will be applied to all routers

Verification

Hello packet with the authentication parameter

Passive Interface Configuration
The passive-interface configuration will turn off EIGRP messages being sent out to the configured interfaces. We will put every interface into "passive-interface," and then we will go into our individual interfaces that are needed for EIGRP neighbors and turn off the "passive-interface" command.
Full configuration below

Verification


Wireshark capture of the interface facing the LAN. Notice there are no EIGRP Hello Messages.

Summarization
For this step, we will first look at the EIGRP learned routes on R2.

We should see 3 172.16.X.X that can be summarized. Since they are contiguous, the routes can be summarized with a /22. We will need to do this configuration for both interfaces from R1-->R2 and R1-->R3.
Configuration
First, we will enter into our EIGRP named mode configuration.
Full Configuration Below

Verification
Now let's run our show ip route command again and see what it looks like.

Now we can only see the /22 route that is being advertised to us. Let's take a look at the EIGRP update message via Wireshark.

Conclusion
After going through these steps, we have successfully accomplished implementing some security on our EIGRP-enabled links.
Last updated