Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 341
12-13 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds Related Topics Configuring General Threshold Information, page 12-13 Configuring Threshold Criteria, page 12-14 Configuring Threshold Notifications, page 12-32 Configuring General Threshold Information To configure general threshold information, fill out the fields in the General Tab of the Thresholds page. Table 12-9 describes the fields. Related...
Page 342
12-14 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds Configuring Threshold Criteria ACS 5.3 provides the following threshold categories to define different threshold criteria: Passed Authentications, page 12-14 Failed Authentications, page 12-16 Authentication Inactivity, page 12-18 TACACS Command Accounting, page 12-19 TACACS Command Authorization, page 12-20 ACS Configuration Changes, page 12-21 ACS...
Page 343
12-15 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds NoteYou can specify one or more filters to limit the passed authentications that are considered for threshold evaluation. Each filter is associated with a particular attribute in the authentication records and only those records whose filter value matches the value that you specify are counted. If you specify multiple filters, only the records...
Page 344
12-16 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds Related Topics Creating, Editing, and Duplicating Alarm Thresholds, page 12-11 Configuring General Threshold Information, page 12-13 Configuring Threshold Notifications, page 12-32 Failed Authentications When ACS evaluates this threshold, it examines the RADIUS or TACACS+ failed authentications that occurred during the time interval that you have...
Page 345
12-17 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds An alarm is triggered because at least one Device IP has greater than 10 failed authentications in the past 2 hours. NoteYou can specify one or more filters to limit the failed authentications that are considered for threshold evaluation. Each filter is associated with a particular attribute in the authentication records and only those records...
Page 346
12-18 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds Related Topics Creating, Editing, and Duplicating Alarm Thresholds, page 12-11 Configuring General Threshold Information, page 12-13 Configuring Threshold Notifications, page 12-32 Authentication Inactivity When ACS evaluates this threshold, it examines the RADIUS or TACACS+ authentications that occurred during the time interval that you have...
Page 347
12-19 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds The aggregation job begins at 00:05 hours every day. From 23:50 hours, up until the time the aggregation job completes, the authentication inactivity alarms are suppressed. For example, if your aggregation job completes at 01:00 hours today, then the authentication inactivity alarms will be suppressed from 23:50 hours until 01:00 hours. NoteIf...
Page 348
12-20 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds Related Topics Creating, Editing, and Duplicating Alarm Thresholds, page 12-11 Configuring General Threshold Information, page 12-13 Configuring Threshold Notifications, page 12-32 TACACS Command Authorization When ACS evaluates this threshold, it examines the TACACS+ accounting records that it received during the interval between the previous and...
Page 349
12-21 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds Related Topics Creating, Editing, and Duplicating Alarm Thresholds, page 12-11 Configuring General Threshold Information, page 12-13 Configuring Threshold Notifications, page 12-32 ACS Configuration Changes When ACS evaluates this threshold, it examines the accounting records that it received during the interval between the previous and current...
Page 350
12-22 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 12 Managing Alarms Creating, Editing, and Duplicating Alarm Thresholds Related Topics Creating, Editing, and Duplicating Alarm Thresholds, page 12-11 Configuring General Threshold Information, page 12-13 Configuring Threshold Notifications, page 12-32 ACS System Diagnostics When ACS evaluates this threshold, it examines the accounting records that it received during the interval between the previous and current alarm...