Configuration examples
As an example of RBAC configuration, this section shows how to add to the default rule set and create a new role for users who should be allowed to access information regarding only routing protocols on the system. Essentially, rules are being defined for a group of users that restrict which commands the users of that group are allowed to run.