6-5
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 6 Post-Installation Configuration Tasks
Configuring ACS to Monitor and Troubleshoot Problems in the Network
Step 4 Enable system alarms and
specify how you would like to
receive notification.
Monitoring Configuration >
System Configuration > System
Alarm Settings
Configuring System Alarm
Settings, page 15-17.
Step 5 Define schedules and create
threshold alarms.
Monitoring and Reports >
Alarms
To configure schedules:
Understanding Alarm
Schedules, page 12-9.
To create threshold alarms:
Creating, Editing, and
Duplicating Alarm
Thresholds, page 12-11.
Step 6 Configure alarm syslog targets. Monitoring Configuration >
System Configuration > Alarm
Syslog Targets
Configuring Alarm Syslog
Targets, page 15-17.
Step 7 Configure remote database to
export the Monitoring & Report
Viewer data.
Monitoring Configuration >
System Configuration > Remote
Database Settings
Configuring Remote Database
Settings, page 15-17.
Table 6-4 Monitoring and Troubleshooting Configuration (continued)
Step No. Task Drawer Refer to...