Chapter 12 Managing Alarms

Creating, Editing, and Duplicating Alarm Thresholds

Table 12-14

TACACS Command Authorization

 

 

 

Option

 

Description

 

 

Authorization Result

Use the drop-down list box to select the authorization result on which you want to configure your

 

 

threshold. Valid options are:

 

 

Passed

 

 

Failed

 

 

 

 

Filter

 

 

 

 

 

 

User

 

Click Select to choose or enter a valid username on which to configure your threshold.

 

 

 

Identity Group

 

Click Select to choose a valid identity group name on which to configure your threshold.

 

 

 

Device Name

 

Click Select to choose a valid device name on which to configure your threshold.

 

 

 

Device IP

 

Click Select to choose or enter a valid device IP address on which to configure your threshold.

 

 

 

Device Group

 

Click Select to choose a valid device group name on which to configure your threshold.

 

 

 

 

Related Topics

Creating, Editing, and Duplicating Alarm Thresholds, page 12-11

Configuring General Threshold Information, page 12-13

Configuring Threshold Notifications, page 12-32

ACS Configuration Changes

 

When ACS evaluates this threshold, it examines the accounting records that it received during the

 

interval between the previous and current alarm evaluation cycle.

 

If one or more accounting records match, it calculates the time that has lapsed since the previous alarm

 

evaluation cycle. When it reaches two, three, or five minutes depending on the number of active

 

thresholds, ACS examines the ACS configuration changes made during the interval between the previous

 

and current alarm evaluation cycle. If one or more changes were made, an alarm is triggered.

 

You can specify one or more filters to limit which configuration changes are considered for threshold

 

evaluation. Each filter is associated with a particular attribute in the records, and only those records that

 

match the filter condition are counted. If you specify multiple filter values, only the records that match

 

all the filter conditions are counted.

 

Choose this category to define threshold criteria based on configuration changes made in the ACS

 

instance. Modify the fields in the Criteria tab as described in Table 12-15.

Table 12-15

ACS Configuration Changes

 

 

 

 

Option

 

Description

 

 

 

 

Administrator

 

Click Select to choose a valid administrator username on which you want to configure your

 

 

threshold.

 

 

 

 

Object Name

 

Enter the name of the object on which you want to configure your threshold.

 

 

 

 

Object Type

 

Click Select to choose a valid object type on which you want to configure your threshold.

 

 

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

 

 

 

 

 

OL-24201-01

 

 

12-21

 

 

 

 

 

Page 349
Image 349
Cisco Systems OL-24201-01 manual ACS Configuration Changes, 12-21