Home > Cisco > Control System > Cisco Acs 5x User Guide

Cisco Acs 5x User Guide

Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.

Page 341

12-13
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Configuring General Threshold Information, page 12-13
Configuring Threshold Criteria, page 12-14
Configuring Threshold Notifications, page 12-32
Configuring General Threshold Information
To configure general threshold information, fill out the fields in the General Tab of the Thresholds page. 
Table 12-9 describes the fields.
Related...

Page 342

12-14
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Configuring Threshold Criteria
ACS 5.3 provides the following threshold categories to define different threshold criteria:
Passed Authentications, page 12-14
Failed Authentications, page 12-16
Authentication Inactivity, page 12-18
TACACS Command Accounting, page 12-19
TACACS Command Authorization, page 12-20
ACS Configuration Changes, page 12-21
ACS...

Page 343

12-15
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
NoteYou can specify one or more filters to limit the passed authentications that are considered for threshold 
evaluation. Each filter is associated with a particular attribute in the authentication records and only 
those records whose filter value matches the value that you specify are counted. If you specify multiple 
filters, only the records...

Page 344

12-16
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Creating, Editing, and Duplicating Alarm Thresholds, page 12-11
Configuring General Threshold Information, page 12-13
Configuring Threshold Notifications, page 12-32
Failed Authentications
When ACS evaluates this threshold, it examines the RADIUS or TACACS+ failed authentications that 
occurred during the time interval that you have...

Page 345

12-17
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
An alarm is triggered because at least one Device IP has greater than 10 failed authentications in the past 
2 hours.
NoteYou can specify one or more filters to limit the failed authentications that are considered for threshold 
evaluation. Each filter is associated with a particular attribute in the authentication records and only 
those records...

Page 346

12-18
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Creating, Editing, and Duplicating Alarm Thresholds, page 12-11
Configuring General Threshold Information, page 12-13
Configuring Threshold Notifications, page 12-32
Authentication Inactivity
When ACS evaluates this threshold, it examines the RADIUS or TACACS+ authentications that occurred 
during the time interval that you have...

Page 347

12-19
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
The aggregation job begins at 00:05 hours every day. From 23:50 hours, up until the time the aggregation 
job completes, the authentication inactivity alarms are suppressed. 
For example, if your aggregation job completes at 01:00 hours today, then the authentication inactivity 
alarms will be suppressed from 23:50 hours until 01:00 hours.
NoteIf...

Page 348

12-20
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Creating, Editing, and Duplicating Alarm Thresholds, page 12-11
Configuring General Threshold Information, page 12-13
Configuring Threshold Notifications, page 12-32
TACACS Command Authorization
When ACS evaluates this threshold, it examines the TACACS+ accounting records that it received during 
the interval between the previous and...

Page 349

12-21
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Creating, Editing, and Duplicating Alarm Thresholds, page 12-11
Configuring General Threshold Information, page 12-13
Configuring Threshold Notifications, page 12-32
ACS Configuration Changes
When ACS evaluates this threshold, it examines the accounting records that it received during the 
interval between the previous and current...

Page 350

12-22
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Creating, Editing, and Duplicating Alarm Thresholds, page 12-11
Configuring General Threshold Information, page 12-13
Configuring Threshold Notifications, page 12-32
ACS System Diagnostics
When ACS evaluates this threshold, it examines the accounting records that it received during the 
interval between the previous and current alarm...
Start reading Cisco Acs 5x User Guide

Related Manuals for Cisco Acs 5x User Guide

All Cisco manuals