cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2262
Views
5
Helpful
4
Replies

SSH MGMT VRF / Line VTY

hermanwjacobsen
Level 1
Level 1

is it possible to restrict ssh into router to only MGMT vrf ?

 

under line vty x x , I only find the option VRF-ALSO, but that will allow all VRF and not a specific one or the deafult MGMT vrf 

1 Accepted Solution

Accepted Solutions

cmarva
Level 4
Level 4

for access to the device from a vrf other than the default vrf, and to do restrictions, you would define an acl to allow the IPs that you want to have access to the device, then define your access-class statement as such:

 

line vty 0 15

 ip access-class BLAH in vrf-also

 

If I understand what you are asking, this should work for you.

View solution in original post

4 Replies 4

cmarva
Level 4
Level 4

for access to the device from a vrf other than the default vrf, and to do restrictions, you would define an acl to allow the IPs that you want to have access to the device, then define your access-class statement as such:

 

line vty 0 15

 ip access-class BLAH in vrf-also

 

If I understand what you are asking, this should work for you.

I want to have the router only respond to SSH from OOB/MANAGEMENT interface.. and not all the other VRF/Interfaces

Mike.Cifelli
VIP Alumni
VIP Alumni

@cmarva is right.  A few other things you will need to ensure is that if using AAA server such as ISE for AAA features and you want to route that traffic over that vrf you will need to setup vrf forwarding under aaa server group.  Also, ensure you have defined vrf routes in your vrf for management access.

gurindersingh
Level 1
Level 1

you can also check if following command is there or not

#access-class BLAH in vrfname Mgmt-intf

or follow following doc

 VRF Awareness Access Class Line (cisco.com)