cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
265
Views
4
Helpful
5
Replies

ssh refused when assigning vrf forwarding to vlan interface

Sueco
Level 1
Level 1

hey,

I have a pair of 9500 running stackwise working fine but when i assigned the vlan interface to a vrf it starts to refuse my SSH attempt.

When i remove the ACL from the vty it works again. I have tried both standard and extendet ACLs but with same results.

Since its the XE version i cant use commands like "ssh server vrf X".

Anyone with experience about this problem and knows how to solve the configuration? 

2 Accepted Solutions

Accepted Solutions

balaji.bandi
Hall of Fame
Hall of Fame

Hope this is SSH coming in using VRF aware right, not going out using VRF ?

how does your configuration looks like on the device.

check VRF aware config for reference :

https://www.cisco.com/c/en/us/support/docs/ip/telnet/200718-Configure-Telnet-SSH-Access-to-Device-wi.html

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

View solution in original post

EminaBrkanic
Level 1
Level 1

Under line vty and access-class cmd, add vrf-also keyword. 

access-class acl_name in vrf-also

 

regards

View solution in original post

5 Replies 5

balaji.bandi
Hall of Fame
Hall of Fame

Hope this is SSH coming in using VRF aware right, not going out using VRF ?

how does your configuration looks like on the device.

check VRF aware config for reference :

https://www.cisco.com/c/en/us/support/docs/ip/telnet/200718-Configure-Telnet-SSH-Access-to-Device-wi.html

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

@Sueco 

Could you associate the vty lines with the same VRF as your VLAN interface to ensure SSH sessions are handled within the correct routing context?

#line vty 0 4
#vrf forwarding MY_VRF ! Replace MY_VRF with your VRF name
#access-class SSH-ACL in ! Apply your ACL here
#transport input ssh

Thanks!

EminaBrkanic
Level 1
Level 1

Under line vty and access-class cmd, add vrf-also keyword. 

access-class acl_name in vrf-also

 

regards

It is not central to the main question in the OP. But I will respond to this part of it: " I have tried both standard and extendet ACL".  When configuring access controls using access-class for the vty, there is little advantage in using extended acl. Extended acl allows you to specify destination address, mask, and protocol. But when applied in access-class the destination address and mask must be any any, and access-class already processes any valid access protocol. So you are better off to just use standard acl for access-class.

HTH

Rick

Sueco
Level 1
Level 1

Thanks for all good input and advises! 

As @balaji.bandi and @EminaBrkanic mentioned the solution for me was to add the vrf-also command after the vty access-list. 

Review Cisco Networking for a $25 gift card