In this diagram we have two VRF groups HR and ACCT. I used VRF to isolate HR department traffic from ACCT department traffic.
I setup loopbacks on each router that are in HR or ACCT. All routers can ping out to the real world. 172.16.1.1 is my 60E. 192.168.1.240 is my workstation for TFTP. I use redirects to build these pages. I used ip tftp source-interface g0/x to allow the TFTP traffic out.
EIGRP doesn’t allow default-information originate always. I setup ip route vrf routing commands for 0.0.0.0 0.0.0.0 as one test to get to the 60E and my workstation. A setup a second ip route vrf HR and ACCT with 172.16.1.0 255.255.255.0 and another set with 192.168.1.0 255.255.255.0 to get out. Either would work but for completeness, I did both.
iosv-6: ip tftp source-interface GigabitEthernet0/1 ip route vrf ACCT 172.16.1.0 255.255.255.0 192.168.64.17 ip route vrf ACCT 192.168.1.0 255.255.255.0 192.168.64.17 ip route vrf HR 172.16.1.0 255.255.255.0 192.168.48.13 ip route vrf HR 192.168.1.0 255.255.255.0 192.168.48.13
On iosv-1, I have IP route vrf to bring traffic back into VRF from the 60E.
ip route 0.0.0.0 0.0.0.0 172.16.1.1 ip route 192.168.48.0 255.255.255.224 GigabitEthernet0/2 ip route 192.168.64.0 255.255.255.224 GigabitEthernet0/3 ip route vrf ACCT 0.0.0.0 0.0.0.0 172.16.1.1 global ip route vrf HR 0.0.0.0 0.0.0.0 172.16.1.1 global