19-11
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19 Understanding Logging
About Logging
The Monitoring & Report Viewer has two drawer options:
Monitoring and Reports—Use this drawer to view and configure alarms, view log reports, and
perform troubleshooting tasks.
Monitoring Configuration—Use this drawer to view and configure logging operations and system
settings.
In addition to the information that is captured in the log messages described in Logging Categories,
page 19-2, the Viewer reports list successful and failed AAA authentication attempts with Step
attributes. Step attributes provide information about other events that occurred within the same session.
This information allows you to see the sequence of steps that resulted in an authentication success or
failure.
You can use the Viewer to:
Manage alarms, reports, and troubleshooting information.
Manage system operations, including purging data, collecting logs, scheduling jobs, and monitoring
status
Manage system configuration, including editing failure reasons, and configuring e-mail, session
directory, and alarm settings
See Monitoring and Reporting in ACS, page 11-1 for more information

Debug Logs

You can use the web interface and the CLI to send logs, including debug logs, to Cisco technical support
personnel if you need troubleshooting assistance. In the web interface, choose Monitoring and Reports
> Launch Monitoring & Report Viewer > Monitoring and Reports > Troubleshooting > ACS
Support Bundle.
You can also use the CLI to view and export the hardware server in the Application Deployment
Engine-OS 1.2 environment logs. These messages are sent to /var/log/boot.log only and are unrelated to
the way in which the CLI views or exports ACS debug log messages. See the Command Line Interface
Reference Guide for Cisco Secure Access Control System 5.3 for information.