<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH MGMT VRF / Line VTY in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4008905#M557101</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324138"&gt;@cmarva&lt;/a&gt;&amp;nbsp;is right.&amp;nbsp; A few other things you will need to ensure is that if using AAA server such as ISE for AAA features and you want to route that traffic over that vrf you will need to setup vrf forwarding under aaa server group.&amp;nbsp; Also, ensure you have defined vrf routes in your vrf for management access.&lt;/P&gt;</description>
    <pubDate>Thu, 09 Jan 2020 16:00:43 GMT</pubDate>
    <dc:creator>Mike.Cifelli</dc:creator>
    <dc:date>2020-01-09T16:00:43Z</dc:date>
    <item>
      <title>SSH MGMT VRF / Line VTY</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4008881#M557080</link>
      <description>&lt;P&gt;is it possible to restrict ssh into router to only MGMT vrf ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;under line vty x x , I only find the option VRF-ALSO, but that will allow all VRF and not a specific one or the deafult MGMT vrf&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4008881#M557080</guid>
      <dc:creator>hermanwjacobsen</dc:creator>
      <dc:date>2020-02-21T19:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSH MGMT VRF / Line VTY</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4008891#M557094</link>
      <description>&lt;P&gt;for access to the device from a vrf other than the default vrf, and to do restrictions, you would define an acl to allow the IPs that you want to have access to the device, then define your access-class statement as such:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip access-class BLAH in vrf-also&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I understand what you are asking, this should work for you.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 15:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4008891#M557094</guid>
      <dc:creator>cmarva</dc:creator>
      <dc:date>2020-01-09T15:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: SSH MGMT VRF / Line VTY</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4008905#M557101</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324138"&gt;@cmarva&lt;/a&gt;&amp;nbsp;is right.&amp;nbsp; A few other things you will need to ensure is that if using AAA server such as ISE for AAA features and you want to route that traffic over that vrf you will need to setup vrf forwarding under aaa server group.&amp;nbsp; Also, ensure you have defined vrf routes in your vrf for management access.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 16:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4008905#M557101</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-01-09T16:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSH MGMT VRF / Line VTY</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4009333#M557107</link>
      <description>I want to have the router only respond to SSH from OOB/MANAGEMENT interface.. and not all the other VRF/Interfaces&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Jan 2020 10:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4009333#M557107</guid>
      <dc:creator>hermanwjacobsen</dc:creator>
      <dc:date>2020-01-10T10:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH MGMT VRF / Line VTY</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4960662#M585250</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;you can also check if following command is there or not&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;#access-class BLAH in vrfname Mgmt-intf&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;or follow following doc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/bbdsl/configuration/xe-16-8/bba-xe-16-8-book/bba-xe-16-8-book_chapter_0100101.pdf" target="_blank" rel="noopener"&gt;VRF Awareness Access Class Line (cisco.com)&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 11:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh-mgmt-vrf-line-vty/m-p/4960662#M585250</guid>
      <dc:creator>gurindersingh</dc:creator>
      <dc:date>2023-11-16T11:48:31Z</dc:date>
    </item>
  </channel>
</rss>

