Skip to content

Telnet

Telnet provides unencrypted remote terminal access on IOS-XR. Because traffic is sent in cleartext, telnet should only be enabled in isolated management networks or legacy environments where SSH is not supported. Per-VRF server limits and ACLs control which VRFs accept inbound sessions and how many concurrent connections are allowed. DSCP marking can be applied per VRF for QoS classification, and client source interfaces determine the originating address for outbound telnet connections.

Diagram
NameTypeConstraintMandatoryDefault Value
telnetClass[telnet]No

NameTypeConstraintMandatoryDefault Value
source_interface_ipv4StringNo
source_interface_ipv6StringNo
vrfsList[vrfs]No

NameTypeConstraintMandatoryDefault Value
nameStringYes
ipv4_access_listStringNo
ipv4_dscpIntegermin: 0, max: 63No
ipv4_max_serversIntegermin: 1, max: 100No
ipv6_access_listStringNo
ipv6_max_serversIntegermin: 1, max: 100No

Example-1: Set the source address for outbound telnet connections to a management interface.

iosxr:
devices:
- name: router-1
host: 10.10.10.1:57400
configuration:
telnet:
source_interface_ipv4: GigabitEthernet0/0/0/1
source_interface_ipv6: GigabitEthernet0/0/0/1

Example-2: Limit inbound telnet sessions per VRF with ACL filtering.

iosxr:
devices:
- name: router-1
host: 10.10.10.1:57400
configuration:
telnet:
source_interface_ipv4: GigabitEthernet0/0/0/1
vrfs:
- name: VRF1
ipv4_max_servers: 4
ipv4_access_list: ACCESS1
ipv6_max_servers: 4
ipv6_access_list: ACCESS11
- name: MGMT
ipv4_max_servers: 10
ipv6_max_servers: 10

Example-3: Apply DSCP marking to telnet traffic in specific VRFs for QoS classification.

iosxr:
devices:
- name: router-1
host: 10.10.10.1:57400
configuration:
telnet:
vrfs:
- name: TOI
ipv4_dscp: 55
- name: PROD
ipv4_dscp: 46