<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The VTY port is randomly in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913265#M39746</link>
    <description>&lt;P&gt;The VTY port is randomly selected, thus I suspect that this would sometimes work and sometimes it won't. To make this work correctly I would suggest using rotary groups. That way you can tie a specific port to a specific VTY line:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-ssh-term-line.html"&gt;http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-ssh-term-line.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Jun 2016 16:16:42 GMT</pubDate>
    <dc:creator>nspasov</dc:creator>
    <dc:date>2016-06-03T16:16:42Z</dc:date>
    <item>
      <title>VTY access restriction</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913262#M39743</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;
&lt;P&gt;we have been pondering on this problem for days without a solution.We would like to restrict&amp;nbsp; the ssh access from a specific source IP address to a given vty. let's say whenever source A with IP&amp;nbsp; X.X.X.X logs in it will be redirected to vty 5 . Even if vty 0 through 4 are free.&lt;/P&gt;
&lt;P&gt;We tried to solve this problem using access-lists. by denying the Host A on all vty except vty 5. But it did not work. The config looks like this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list 10 deny X.X.X.X&lt;/P&gt;
&lt;P&gt;access-list 10 permit Y.Y.Y.Y&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;acces-list 11 permit X.X.X.X&lt;/P&gt;
&lt;P&gt;access-list 11 permit Y.Y.Y.Y&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;line vty 0 4&lt;/P&gt;
&lt;P&gt;access-class 10 in&lt;/P&gt;
&lt;P&gt;line vty 5&lt;/P&gt;
&lt;P&gt;accesss-class 11 in&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in adavance. Any other ideas are welcomed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;P.S: funnily it worked in Packet tracer&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 06:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913262#M39743</guid>
      <dc:creator>nyami.david</dc:creator>
      <dc:date>2019-03-11T06:48:54Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913263#M39744</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you confirm which IP you don't want to be able to use VTY 0 4, and show us the access lists?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What you're doing should work. Are you certain it failed? You can use the "who" command in Privileged EXEC mode to see which VTY line you have connected to.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Out of curiosity, why are you doing this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2016 20:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913263#M39744</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-27T20:33:25Z</dc:date>
    </item>
    <item>
      <title>Hello Tim, </title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913264#M39745</link>
      <description>&lt;P&gt;Hello Tim,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It does not work. I have tried it on IOS and IOS-XE.&lt;/P&gt;
&lt;P&gt;the IP could be any IP (I have used 10.2.1.1 for the test in the lab). Maybe you can try it. We did it 2 times and it did not work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We are installing a new automation tool that connects per SSH to our equipments. &amp;nbsp;We would like to limit the sessions it starts on the router and if possible to a specific VTY. As I said in the original post funnily it works on Packet Tracer&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 28 May 2016 23:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913264#M39745</guid>
      <dc:creator>nyami.david</dc:creator>
      <dc:date>2016-05-28T23:57:18Z</dc:date>
    </item>
    <item>
      <title>The VTY port is randomly</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913265#M39746</link>
      <description>&lt;P&gt;The VTY port is randomly selected, thus I suspect that this would sometimes work and sometimes it won't. To make this work correctly I would suggest using rotary groups. That way you can tie a specific port to a specific VTY line:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-ssh-term-line.html"&gt;http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-ssh-term-line.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2016 16:16:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913265#M39746</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-06-03T16:16:42Z</dc:date>
    </item>
    <item>
      <title>Does IOS-XR provide such a</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913266#M39747</link>
      <description>&lt;P&gt;Does IOS-XR provide such a funtionality, if no is there a workaround?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2016 14:23:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913266#M39747</guid>
      <dc:creator>nyami.david</dc:creator>
      <dc:date>2016-06-28T14:23:56Z</dc:date>
    </item>
    <item>
      <title>Does IOS-XR provide such a</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913267#M39748</link>
      <description>&lt;DIV class="comment-body discussion-body"&gt;
&lt;DIV class="field field-name-comment-body field-type-text-long field-label-hidden"&gt;
&lt;DIV class="field-items"&gt;
&lt;DIV class="field-item even" property="content:encoded"&gt;
&lt;P&gt;Does IOS-XR provide such a funtionality, if no is there a workaround?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 28 Jun 2016 14:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913267#M39748</guid>
      <dc:creator>nyami.david</dc:creator>
      <dc:date>2016-06-28T14:24:39Z</dc:date>
    </item>
    <item>
      <title>I have not done it with XE</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913268#M39749</link>
      <description>&lt;P&gt;I have not done it with XE switches/code but it seems like it is supported. Here is the config guide for one of the switches:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960xr/software/15-2_4_e/configuration_guide/b_1524e_consolidated_2960xr_cg/b_1524e_consolidated_2960xr_cg_chapter_01011011.html"&gt;http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960xr/software/15-2_4_e/configuration_guide/b_1524e_consolidated_2960xr_cg/b_1524e_consolidated_2960xr_cg_chapter_01011011.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2016 17:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913268#M39749</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-06-28T17:29:43Z</dc:date>
    </item>
    <item>
      <title>We tested it on XE switches</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913269#M39750</link>
      <description>&lt;P&gt;We tested it on XE switches and it worked. My question was on IOS-XR though (ASR9k)&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 20:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913269#M39750</guid>
      <dc:creator>nyami.david</dc:creator>
      <dc:date>2016-06-29T20:27:08Z</dc:date>
    </item>
    <item>
      <title>Ops, sorry about that! I read</title>
      <link>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913270#M39751</link>
      <description>&lt;P&gt;Ops, sorry about that! I read XE and not XR &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So, I have never worked with XR routers so I am not sure. However, doing a quick google search suggests that the "rotary"command is NOT available for that IOS. But, I also found the following posts that has an alternative method with using VTY-Pools:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://ccie-in-3-months.blogspot.com/2011/09/aaa-and-vtys-in-ios-xr-bingo.html"&gt;http://ccie-in-3-months.blogspot.com/2011/09/aaa-and-vtys-in-ios-xr-bingo.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 07:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/vty-access-restriction/m-p/2913270#M39751</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-06-30T07:03:34Z</dc:date>
    </item>
  </channel>
</rss>

