Chapter 12 Managing Alarms

Creating, Editing, and Duplicating Alarm Thresholds

Table 12-11

Failed Authentications (continued)

 

 

 

Option

 

Description

 

 

 

ACS Instance

 

Click Select to choose a valid ACS instance on which to configure your threshold.

 

 

 

User

 

Click Select to choose or enter a valid username on which to configure your threshold.

 

 

 

Identity Group

 

Click Select to choose a valid identity group name on which to configure your threshold.

 

 

 

Device Name

 

Click Select to choose a valid device name on which to configure your threshold.

 

 

 

Device IP

 

Click Select to choose or enter a valid device IP address on which to configure your threshold.

 

 

 

Device Group

 

Click Select to choose a valid device group name on which to configure your threshold.

 

 

 

Identity Store

 

Click Select to choose a valid identity store name on which to configure your threshold.

 

 

 

Access Service

 

Click Select to choose a valid access service name on which to configure your threshold.

 

 

 

MAC Address

 

Click Select to choose or enter a valid MAC address on which to configure your threshold. This

 

 

filter is available only for RADIUS authentications.

 

 

 

NAD Port

 

Click Select to choose a port for the network device on which to configure your threshold. This

 

 

filter is available only for RADIUS authentications.

 

 

 

AuthZ Profile

 

Click Select to choose an authorization profile on which to configure your threshold. This filter is

 

 

available only for RADIUS authentications.

 

 

 

AuthN Method

 

Click Select to choose an authentication method on which to configure your threshold. This filter

 

 

is available only for RADIUS authentications.

 

 

 

EAP AuthN

 

Click Select to choose an EAP authentication value on which to configure your threshold. This

 

 

filter is available only for RADIUS authentications.

 

 

 

EAP Tunnel

 

Click Select to choose an EAP tunnel value on which to configure your threshold. This filter is

 

 

available only for RADIUS authentications.

 

 

 

Protocol

 

Use the drop-down list box to configure the protocol that you want to use for your threshold. Valid

 

 

options are:

 

 

RADIUS

 

 

TACACS+

 

 

 

 

Related Topics

Creating, Editing, and Duplicating Alarm Thresholds, page 12-11

Configuring General Threshold Information, page 12-13

Configuring Threshold Notifications, page 12-32

Authentication Inactivity

When ACS evaluates this threshold, it examines the RADIUS or TACACS+ authentications that occurred during the time interval that you have specified up to the previous 31 days. If no authentications have occurred during the specified time interval, an alarm is triggered.

You can specify filters to generate an alarm if no authentications are seen for a particular ACS instance or device IP address during the specified time interval.

If the time interval that you have specified in the authentication inactivity threshold is lesser than that of the time taken to complete an aggregation job, which is concurrently running, then this alarm is suppressed.

 

User Guide for Cisco Secure Access Control System 5.3

12-18

OL-24201-01

Page 346
Image 346
Cisco Systems OL-24201-01 manual Authentication Inactivity, 12-18