<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PBR as VRF Substitute on 7150 in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/PBR-as-VRF-Substitute-on-7150/m-p/72767#M5042</link>
    <description>&lt;P&gt;Hi Matt,&amp;nbsp;&lt;/P&gt;&lt;P&gt;With respect to the query raised, on the set up currently , with the 7650s and 7550s, there is a management VRF in place for the MGMT traffic to traverse; and something similar is needed for&amp;nbsp; 7150s&amp;nbsp;&lt;BR /&gt;if the 7150s are being deployed with Switch image : you could use Management-vlan to set up the mgmt vlan and use the OOBM interface management purposes&amp;nbsp;&lt;BR /&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08090-commandref/page/GUID-4E7D719F-FDD8-4098-BD59-FA61418959AE.html" target="_self"&gt;management-vlan&lt;/A&gt;&amp;nbsp;(click on the link)&amp;nbsp;&lt;/P&gt;&lt;P&gt;if on router code, you could have a vlan dedicated to management. Access - restricted via ACL to that subnet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;or further more/better yet, you could use ssh access-group to restrict access to the devices CLI via the network by defining the allowed IPs via the Standard ACL: same can also be done for SNMP, where access to the switch can be restricted via standard ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-commandref/page/GUID-541A79ED-0DA6-46D3-96CD-0880F43DD7BF.html" target="_self"&gt;ssh access-group&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-commandref/page/GUID-E0EDB8BC-AC55-4251-A920-FB317129683F.html" target="_self"&gt;SNMP config statement&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this way the traffic wont be affected : and only allowed devices will be able to access device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do let us know if the details help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks !!&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Dec 2023 10:56:25 GMT</pubDate>
    <dc:creator>jdryan</dc:creator>
    <dc:date>2023-12-08T10:56:25Z</dc:date>
    <item>
      <title>PBR as VRF Substitute on 7150</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/PBR-as-VRF-Substitute-on-7150/m-p/72709#M5037</link>
      <description>&lt;P&gt;Most of our switches are 7650/7550's and we've got management VRFs configured.&amp;nbsp; Looking for some kind of workaround on some of our sites since VRFs aren't available on the 7150 L3 devices.&amp;nbsp; Thinking PBR with ACL restricting to that subnet.&amp;nbsp; Has anyone here done this?&amp;nbsp; Am I missing something?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 22:06:25 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/PBR-as-VRF-Substitute-on-7150/m-p/72709#M5037</guid>
      <dc:creator>matt_236689</dc:creator>
      <dc:date>2023-12-06T22:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: PBR as VRF Substitute on 7150</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/PBR-as-VRF-Substitute-on-7150/m-p/72767#M5042</link>
      <description>&lt;P&gt;Hi Matt,&amp;nbsp;&lt;/P&gt;&lt;P&gt;With respect to the query raised, on the set up currently , with the 7650s and 7550s, there is a management VRF in place for the MGMT traffic to traverse; and something similar is needed for&amp;nbsp; 7150s&amp;nbsp;&lt;BR /&gt;if the 7150s are being deployed with Switch image : you could use Management-vlan to set up the mgmt vlan and use the OOBM interface management purposes&amp;nbsp;&lt;BR /&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08090-commandref/page/GUID-4E7D719F-FDD8-4098-BD59-FA61418959AE.html" target="_self"&gt;management-vlan&lt;/A&gt;&amp;nbsp;(click on the link)&amp;nbsp;&lt;/P&gt;&lt;P&gt;if on router code, you could have a vlan dedicated to management. Access - restricted via ACL to that subnet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;or further more/better yet, you could use ssh access-group to restrict access to the devices CLI via the network by defining the allowed IPs via the Standard ACL: same can also be done for SNMP, where access to the switch can be restricted via standard ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-commandref/page/GUID-541A79ED-0DA6-46D3-96CD-0880F43DD7BF.html" target="_self"&gt;ssh access-group&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08095-commandref/page/GUID-E0EDB8BC-AC55-4251-A920-FB317129683F.html" target="_self"&gt;SNMP config statement&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this way the traffic wont be affected : and only allowed devices will be able to access device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do let us know if the details help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks !!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2023 10:56:25 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/PBR-as-VRF-Substitute-on-7150/m-p/72767#M5042</guid>
      <dc:creator>jdryan</dc:creator>
      <dc:date>2023-12-08T10:56:25Z</dc:date>
    </item>
  </channel>
</rss>

