IOS-XE 16.8.x line vty 'vrfname'
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-03-2021 08:43 PM
hi,
i noticed the 'vrfname' under the line vty. i checked it was recently introduced in IOS-XE 16.8.x.
i usually use 'vrf-also' for our MGMT VRF and haven't seen anyone use 'vrfname' that much per my google search.
my question is, what's the difference between the 'vrf-also' and 'vrfname'? is 'vrfname' more secure?
what are some use case examples for the 'vrfname'?
(config)#line vty 0 4
(config-line)#access-class acl_VTY_ACL in ?
vrf-also Same access list is applied for all VRFs
vrfname Access list is applied for given VRFs
<cr> <cr>
- Labels:
-
Other Routing
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-04-2021 01:16 AM
Hi there,
The decision to allow all VRFs access to the VTYs or limit it to just one depends on your topology and security posture. Certainly vrf-also is convenient, but if you are operating a multi tenant environment then it would make sense to limit access to the management plane to just one VRF, ie, the L3 domain which contains your management VLAN.
cheers,
Seb.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-04-2021 03:33 AM
Do not want to re-invent the wheel :
good explanation here :
https://community.cisco.com/t5/switching/vty-access-class-vrf-also-question/td-p/2528048
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-04-2021 07:05 PM
hi balaji,
i'm aware of the 'vrf-also' and use it in our environment. my question is regarding 'vrfname' if has the same purpose and what's the main difference between the two.
i don't see it commonly used since it's relatively new.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-05-2021 01:34 AM
I have the opposite experience and always use 'vrfname Mgmt-vrf' as switches are connected via the out of band gi0/0 switchport.
vrfname is useful as it allows you to explicitly list the VRFs you want to have access instead of opening the flood gates and using vrf-also, as you eluded to in your first post, this should be considered more secure.
cheers,
Seb.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-05-2021 02:28 AM
adding @Seb Rupik comment...
vrf-also Same access list is applied for all VRFs vrfname Access list is applied for given VRFs
Commands are self explanatory. If you have more VRF ( VRF-also works) - if you looking Granular 1 VRF - VRFNAME should do the job
Make sense ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-05-2021 07:19 AM
hi balaji,
is using 'vrf-also' tied to the default 'Mgmt-intf' VRF, which is applied to the dedicated OOB management port?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-05-2021 07:25 AM
yes mgmt vrf should cover technically. (if that is the only VRF available in your network, i prefer to go with vrfname
vrfname Access list is applied for given VRF
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-08-2024 08:40 AM
I know I am necro-ing an old thread here, so sorry about that. My process for routers handling untrusted traffic (like internet routers) prior to the support for being able to name a specific vrf in the access class on the vty's was to put the management traffic in the global routing table and then untrusted traffic in a vrf. That way when I specified an access class without the 'vrf-also' keyword then all traffic from vrf's was blocked. I a context where management traffic is in 'Mgmt-intf', can I specify an access class for that vrf that permits certain hosts, and then another access class without a vrf keyword that denies all traffic from the global routing table? The routers I have with this now are remote and I don't want to lock myself out.
