O'Reilly logo

Implementing Cisco Networking Solutions by Harpreet Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Role-based user access

The discussions so far have focused on logging into the devices. This section focuses on creating user profiles that can be used to allow specific users access to a set of commands and not allow them to make changes to the devices.

Cisco IOS allows different view-profiles that allow users belonging to a certain profile to execute only specific commands. It is necessary to log into the devices in the root view, using the enable view command. The configuration for creating a view is as shown in the following image:

Figure 15: Configuring RBAC

We created a view called OpXYZ, which has the right to execute only the EXEC ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required