Cisco Systems CSACS3415K9 Manual De Usuario

Descargar
Página de 678
12-23
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Chapter 12      Managing Alarms
  Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
ACS Process Status
When ACS evaluates this threshold, it examines the accounting records that it received during the 
interval between the previous and current alarm evaluation cycle.
If one or more accounting records match, it calculates the time that has lapsed since the previous alarm 
evaluation cycle. When it reaches two, three, or five minutes depending on the number of active 
thresholds, ACS determines whether any ACS process has failed during that time. 
If ACS detects one or more failures, an alarm is triggered. You can limit the check to particular processes 
or a particular ACS instance or both.
Choose this category to define threshold criteria based on ACS process status. Modify the fields in the 
Criteria tab as described in 
.
Table 12-16
ACS System Diagnostics
Option
Description
Severity at and above
Use the drop-down list box to choose the severity level on which you want to configure your 
threshold. This setting captures the indicated severity level and those that are higher within the 
threshold. Valid options are:
Fatal
Error
Warning
Info
Debug
Message Text
Enter the message text on which you want to configure your threshold. Maximum character limit is 
1024.
Filter
ACS Instance
Click Select to choose a valid ACS instance on which to configure your threshold.
Table 12-17
ACS Process Status
Option
Description
Monitor Processes
ACS Database
Check the check box to add the ACS database to your threshold configuration.
ACS Management
Check the check box to add the ACS management to your threshold 
configuration.
ACS Runtime
Check the check box to add the ACS runtime to your threshold configuration.
Monitoring and Reporting Database
Check the check box to have this process monitored. If this process goes down, 
an alarm is generated.