CHAP TER
69-1
User Guide for Cisco Security Manager 4.4
OL-28826-01
69
Using External Monitoring, Troubleshooting, and Diagnostic Tools
A high degree of network availability is a requirement for large enterprises and service providers.
Network managers face various challenges in maintaining network availability, including unscheduled
down time, lack of expertise, insufficient tools, complex technologies, business consolidation, and
competing markets. Network monitoring, problem diagnosis, and troubleshooting are essential to
meeting and overcoming these challenges.
Monitoring involves the study of network activity and device status to identify anomalous events and
behaviors. Quickly diagnosing and correcting network and system faults such as outages and
degradations increase service availability, and thus tools to isolate, analyze and correct problems are
essential.
The main Security Manager tools for monitoring device events are the Health and Performance Monitor
(see Chapter 68, “Health and Performance Monitoring”) and the Event Viewer (see Chapter 66,
“Viewing Events”).
In addition to Health and Performance Monitor and Event Viewer, the following topics describe
additional monitoring, troubleshooting and diagnostic tools that are available with Security Manager:
Viewing Inventory Status, page69-1
Starting Device Managers, page 69-4
Launching Cisco Prime Security Manager, page 69-9
Analyzing an ASA or PIX Configuration Using Packet Tracer, page 69-12
Analyzing Connectivity Issues Using the Ping, Trace Route, or NS Lookup Tools, page 69-14
Using the Packet Capture Wizard, page 69-18
Integrating CS-MARS and Security Manager, page69-22

Viewing Inventory Status

You can view a summary of device properties for all devices that you are authorized to view. The
summary includes device contact information and all device configurations, indicating which settings
are local and which are using a shared policy, and indicating any policy object overrides in effect. You
can also view the status of configuration deployment to the device.
The report is in table format, allowing you to organize information by filtering, sorting, reordering and
removing columns. You can also export the table contents to a comma-separated values (CSV) file on
the Security Manager server.