Chapter 6 Post-Installation Configuration Tasks

Configuring ACS to Monitor and Troubleshoot Problems in the Network

Table 6-4

Monitoring and Troubleshooting Configuration (continued)

 

 

 

 

 

 

Step No.

 

Task

Drawer

Refer to...

 

 

 

 

 

Step 4

 

Enable system alarms and

Monitoring Configuration >

Configuring System Alarm

 

 

specify how you would like to

System Configuration > System

Settings, page 15-17.

 

 

receive notification.

Alarm Settings

 

 

 

 

 

 

Step 5

 

Define schedules and create

Monitoring and Reports >

To configure schedules:

 

 

threshold alarms.

Alarms

Understanding Alarm

 

 

 

 

 

 

 

 

Schedules, page 12-9.

 

 

 

 

To create threshold alarms:

 

 

 

 

Creating, Editing, and

 

 

 

 

Duplicating Alarm

 

 

 

 

Thresholds, page 12-11.

 

 

 

 

 

Step 6

 

Configure alarm syslog targets.

Monitoring Configuration >

Configuring Alarm Syslog

 

 

 

System Configuration > Alarm

Targets, page 15-17.

 

 

 

Syslog Targets

 

 

 

 

 

 

Step 7

 

Configure remote database to

Monitoring Configuration >

Configuring Remote Database

 

 

export the Monitoring & Report

System Configuration > Remote

Settings, page 15-17.

 

 

Viewer data.

Database Settings

 

 

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

OL-24201-01

6-5

 

 

 

Page 129
Image 129
Cisco Systems OL-24201-01 Configuring System Alarm, Settings, Understanding Alarm, Schedules, Creating, Editing, Targets