6-5
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Chapter6 Post-Installation Co nfiguration Tasks
Configuring ACS to Monitor and Troubleshoot Problems in the Network
Step 4 Enable system alarms and
specify how you would like to
receive notification.
Monitoring Configuration >
System Configuration > System
Alarm Settings
Configuring System Alarm
Settings, page 15-18.
Step 5 Define schedules and create
threshold alarms.
Monitoring and Reports >
Alarms
To configure schedules:
Understanding Alarm
Schedules, page12-9.
To create threshold alarms:
Creating, Editing, and
Duplicating Alarm
Thresholds, page 12-11.
Step 6 Configure alarm syslog targets. Monitoring Configuration >
System Configuration > Alarm
Syslog Targets
Configuring Alarm Syslog
Targets, page15-18.
Step 7 Configure remote database to
export the Monitoring and
Report Viewer data.
Monitoring Configuration >
System Configuration > Remote
Database Settings
Configuring Remote Database
Settings, page 15-18.
Table6-4 Monitoring and Troubleshooting Configuration (continued)
Step No. Task Drawer Refer to...