Security - accessing VTY from another VRF
When configuring management connectivity on a particular Cisco device, you can be filtered by creating an access-class on the VTY lines of that device.
By default incoming Telnet or SSH connections from interfaces that are part of a VRF instance other than the default instance are rejected. In order to allow incoming connections on the VTY line from a different VRF, the vrf-also
keyword must be applied after the access-class.
If you have VRFs configured on your device, then for you to access the VTY management interface via an interface in another VRF, you must apply the keyword like so:
Router(config-line)# access-class 1 in vrf-also
Starting from IOS XE 16.8.1 VRF awareness has been added to the access class line feature using the vrfname
keyword. Specifically, you can do the following:
Device(config)# line vty 0 4 Device(config-line)# ipv6 access-class acl-name in vrfname vfrA
Note that you cannot use both VRF awareness and vrf-also
on the same VTY line, as they are mutually exclusive commands.
Links
https://networklessons.com/cisco/ccna-200-301//cisco-ios-telnet-server-client/