EIGRP Metrics Troubleshooting


When implementing any routing protocol, it is vital to have a handle on how the protocol operates and makes decisions. Without this knowledge, it is almost impossible to check and make sure that the protocol is configured properly and is operating as expected. This article takes a look at the Enhanced Interior Gateway Routing Protocol (EIGRP), how its metric is calculated, and how this information can be used to ensure that traffic is taking the path that is expected.

EIGRP Metric Calculation

Unlike OSPF, the EIGRP metric can be complex to calculate and is calculated differently depending on the configuration of the EIGRP device. By default, the EIGRP metric is calculated as shown in Figure 1:

 EIGRP Default Metric
Figure 1 – EIGRP Default Metric Calculation

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts. Our next episode, “Polaris Inc., and Microsoft Teams- Reinventing how we work and play” will be airing on Oct. 28th from 10-11am PST.

As shown in Figure 1, by default, the EIGRP metric only takes into account the bandwidth and delay parameters of a network path to calculate the metric. It does have the ability to take into account a number of additional parameters, including load and reliability. These are reflected in the complete EIGRP metric, which is shown in Figure 2:

 EIGRP Metric CalculationFigure 2 – EIGRP Metric Calculation

The k-values shown in Figure 2 can be used to alter the metric and give additional weight to certain network parameters. On most modern networks, the default k-values and default metric calculation are used.

Figure 3 displays a simple network topology that will be used to calculate a sample EIGRP metric.

 EIGRP Metric Sample TopologyFigure 3 – EIGRP Metric Sample Topology

Assuming that EIGRP is configured, R1 would have an EIGRP routing table entry for the network that is connected to R2’s F0/1 interface. R1 would calculate the EIGRP metric for the path between it and the destination network; in this case, this would involve passing through its F0/0 interface and through R2’s F0/1 interface. The first part to figure out for the EIGRP metric is the minimum path bandwidth; as stated above, the path for R1 goes through its F0/0 interface and through R2’s F0/1 interface, which both have the same bandwidth of 100 Mbps. The bandwidth metric calculation is shown in Figure 4:

EIGRP Sample Bandwidth Calculation

Figure 4 – EIGRP Sample Bandwidth Calculation

The next part includes adding up the total delay across the entire path to the destination. In this example, the delay on both links is 100 µsec for a total of 200 µsec of delay across the entire path. Keep in mind that when calculating the delay part of the EIGRP metric, that delay is not represented in µseconds but in 10’s of µseconds. The delay metric calculation is shown in Figure 5:

 EIGRP Sample Delay Calculation

Figure 5 – EIGRP Sample Delay Calculation

These two parameters are then inserted into the EIGRP formula and a metric is found; this is shown in Figure 6:

EIGRP Sample Metric Calculation

Figure 6 – EIGRP Sample Metric Calculation

It is very important to note that the bandwidth that EIGRP is using in its metric calculations is based on the configured interface bandwidth using the bandwidth interface configuration mode command. The bandwidth that is configured with the bandwidth command does not have to match the physical bandwidth of the interface, and does not affect the physical bandwidth of the network.

It is also possible to alter the delay of an interface that is used by EIGRP for its metric calculation; to do this, the delay command is used. Like the bandwidth command, the delay command does not alter the actual delay of an interface, but simply the value that is used to calculate the metric.

As shown in Figure 2 above, there are a number of EIGRP k-values that can be changed to affect how the metric is calculated. Each of these k-values can be any value from 0 through 255; to alter these values use the metric weights command while in router configuration mode (router(config-router)#). It is typical to leave the default values, but network engineers should be familiar with the possibility of k-value changes. Look for this command in the configuration if the EIGRP metrics are not calculating correctly (based on the default metric formula).


Most of the time when routing protocols are implemented on small simple network topologies, they work without much additional configuration. When working on networks that are larger, the complexity of the routing protocol configuration can increase. This complexity and the size of the topology can make troubleshooting very complex as well. The EIGRP metric, unlike the OSPF metric, can be very complex to calculate and remember. It is important for any engineer that will work on an EIGRP network to be familiar with how the EIGRP metrics are calculated on their network (default or otherwise). Without this information, it is impossible to troubleshoot how the route to a destination is calculated.


Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: