03-05-2025 10:43 PM
i have 5 svi on my switch and switch is accessble over all svi ip
i want to set a single svi for mgmt
can anyone guide please
03-05-2025 11:13 PM
@Lalaram Raika hi, recommended way is to use dedicated management port in your switch. you can add IP address directly to the port and access from management network. normally this port running in different VRF, so its not mixed with other routing tables.
if you need management connectivity as a SVI, you can create new SVI and access it from relevant VLAN.
03-05-2025 11:24 PM
if i create new svi it will also be accesible over all vlan's due to intervlan routing
alredy i have 5 vlans vlan1, vlan2, 3, 4, 5, and each have svi interface and ip , now my issue is each vlan's user should not access
right now each vlans user can access my switch using 5 svi ip
03-05-2025 11:42 PM
For this you should configure an access list and apply it on the vty lines. For example if VLAN 1, 192.168.1.0/24, is your management VLAN and the config should be:
ip access-list standard VTY_ACL
permit 192.168.1.0 0.0.0.255
line vty 0 4
access-class VTY_ACL in
03-05-2025 11:50 PM
03-05-2025 11:51 PM
this not work
03-05-2025 11:54 PM
From which IP address are you trying to ssh into the switch?
03-06-2025 12:03 AM
looks like you preffer to move with ACL method. share the current ACL you implemented.
03-05-2025 11:43 PM
@Lalaram Raika your understanding is correct.
1. you can use dedicated management for this use case.
2. you can create sperate VRF for new management SVI and use that to enclose management SVI. then new SVI will not be accessible to other VLANs
03-05-2025 11:52 PM
how tell me whole process with cmd please
03-05-2025 11:49 PM
You have 2 option you can set using source interface for SSH or use ACL to filter what IP need to have access to switch.
03-06-2025 12:05 AM
can i use svi as source int
03-06-2025 06:15 PM
I think that there is some misunderstanding about management interface. The purpose of management interface is to provide an interface where management traffic (access using telnet/SSH/HTTP/HTTPS, or traffic like SNMP, syslog, etc) will not compete with or impact data traffic.
There is not anything in the config that specifies whether an interface is management or not. And so it is not an issue if users could access your switch using address other than the "management" address. If you want to enforce that management can only access using the management interface, then you will need to implement access lists on all other interfaces that deny incoming traffic of telnet/SSH/HTTP/HTTPS.
03-06-2025 11:58 PM
Sure, it does not matter as long as the source interface is up and running and reachable.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide