Home > Cisco > Control System > Cisco Acs 57 User Guide

Cisco Acs 57 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Acs 57 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 584
    							9   
    Managing Alarms
    Understanding Alarm Schedules
    3.Click Submit to save the alarm schedule.
    The schedule that you create is added to the Schedule list box in the Threshold pages.
    Assigning Alarm Schedules to Thresholds
    When you create an alarm threshold, you must assign an alarm schedule for the threshold. To assign an alarm schedule:
    1.Choose Monitoring and Reports > Alarms > Thresholds.
    The Thresholds page appears.
    Note: This procedure only describes how to assign a schedule to a threshold. For detailed information on how to 
    create, edit, or duplicate a threshold, see Creating, Editing, and Duplicating Alarm Thresholds, page 10.
    2.Do one of the following.
    Click Create.
    Check the check box the threshold that you want to edit and click Edit.
    Check the check box the threshold that you want to duplicate and click Duplicate.
    3.In the General tab, choose the schedule that you want from the Schedule drop-down list box.
    4.Click Submit to assign the schedule to the threshold.
    Deleting Alarm Schedules
    Note: Before you delete an alarm schedule, ensure that it is not referenced by any thresholds that are defined in ACS. 
    You cannot delete the default schedule (nonstop) or schedules that are referenced by any thresholds.
    To delete an alarm schedule:
    1.Choose Monitoring and Reports > Alarms > Schedules.
    The Alarm Schedules page appears.
    Table 117 Alarm Schedules - Create or Edit Page
    Option Description
    Identification
    Name Name of the alarm schedule. The name can be up to 64 characters in length.
    Description A brief description of the alarm schedule; can be up to 255 characters in length.
    Schedule
    Click a square to select or deselect that hour. Use the Shift key to select or deselect a block starting from the previous 
    selection. For more information on schedule boxes, see Schedule Boxes, page 15.
    Select All Click Select All to create a schedule that monitors for events all through the week, 24 hours a day, 7 
    days a week.
    Clear All Click Clear All to deselect all the selection.
    Undo All When you edit a schedule, click Undo All to revert back to the previous schedule. 
    						
    							10
    Managing Alarms
     
    Creating, Editing, and Duplicating Alarm Thresholds
    2.Check the check box the alarm schedule that you want to delete, then click Delete.
    The following message appears:
    Are you sure you want to delete the selected item(s)?
    3.Click Ye s to delete the alarm schedule.
    The alarm schedule page appears without the schedule that you deleted.
    Creating, Editing, and Duplicating Alarm Thresholds
    Use this page to configure thresholds for each alarm category. You can configure up to 100 thresholds.
    To configure a threshold for an alarm category:
    1.Select Monitoring and Reports > Alarms > Thresholds.
    The Alarms Thresholds page appears as described in Table 118 on page 11: 
    						
    							11   
    Managing Alarms
    Creating, Editing, and Duplicating Alarm Thresholds
    2.Do one of the following:
    Click Create.
    Check the check box the alarm that you want to duplicate, then click Duplicate.
    Click the alarm name that you want to modify, or check the check box the alarm that you want to modify, then click 
    Edit.
    Check the check box the alarm that you want to enable, then click Enable.
    Check the check box the alarm that you want to disable, then click Disable.
    3.Modify fields in the Thresholds page as required. See the following pages for information about valid field options:
    Configuring General Threshold Information, page 16
    Configuring Threshold Criteria, page 16
    Table 118 Alarm Thresholds Page
    Option Description
    Name The name of the alarm threshold.
    Description The description of the alarm threshold.
    Category The alarm threshold category. Options can be:
    Passed Authentications
    Failed Authentications
    Authentication Inactivity
    TACACS Command Accounting
    TACACS Command Authorization
    ACS Configuration Changes
    ACS System Diagnostics
    ACS Process Status
    ACS System Health
    ACS AAA Health
    RADIUS Sessions
    Unknown NAD
    External DB Unavailable
    RBACL Drops
    NAD-reported AAA Down
    Last Modified Time The time at which the alarm threshold was last modified by a user.
    Last Alarm The time at which the last alarm was generated by the associated alarm threshold.
    Alarm Count The number of times that an associated alarm was generated. 
    						
    							12
    Managing Alarms
     
    Creating, Editing, and Duplicating Alarm Thresholds
    Configuring Threshold Notifications, page 35
    4.Click Submit to save your configuration.
    The alarm threshold configuration is saved. The Threshold page appears with the new configuration.
    Related Topics
    Configuring General Threshold Information, page 16
    Configuring Threshold Criteria, page 16
    Configuring Threshold Notifications, page 35
    Alarm Threshold Messages
    A general alarm threshold message would include the following: 
            
    , , , .
    A sample alarm threshold message is given below:
     Apr 2 13:23:00 ACS Server1 0000000005 1 0 ACSVIEW_ALARM Threshold alarm name = “System_Diagnostics”, 
    severity = Warn, cause = “Alarm caused by System_Diagnostics threshold”, detail = “(ACS Instance = ACS Server, 
    Category = CSCOacs_Internal_Operations_Diagnostics, Severity = Warn, Message Text = CTL for syslog server 
    certificate is empty)”
    Table 119 on page 13 displays the list of all alarm threshold messages. 
    						
    							13   
    Managing Alarms
    Creating, Editing, and Duplicating Alarm Thresholds
    Table 119 List of Alarm Threshold Messages
    Alarm 
    Threshold 
    CategoryAlarm Header Alarm Name Severity Cause Details
    Passed 
    Authentication    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 00000001
    Number of Fragments: 1
    First Fragment: 0 Authentication Critical/
    Warning/
    InfoThis alarm is 
    raised when the 
    authentication 
    threshold is 
    reached. User: user1
    Passed authentication 
    count: 2
    Failed 
    Authentication    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 00000002
    Number of Fragments: 1
    First Fragment: 0 Authentication Critical/
    Warning/
    InfoThis alarm is 
    raised when the 
    authentication 
    threshold is 
    reached. User: user1
    Failed authentication 
    count: 2
    Authentication 
    Inactivity    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 000000081
    Number of Fragments: 1
    First Fragment: 0 Authentication 
    inactivityCritical/
    Warning/
    InfoThis alarm is 
    raised when the 
    authentication 
    inactivity has 
    occurred. Following ACS instance(s) 
    did not receive any 
    authentication request 
    between   
      
     and  
      
     : 
    acsserver1
    TACACS 
    Command 
    Accounting    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 0000000127
    Number of Fragments: 1
    First Fragment: 0 TACACS 
    AccountingCritical/
    Warning/
    InfoThis alarm is 
    caused when 
    the TACACS+ 
    accounting 
    threshold is 
    reached.ACS instance: acsserver1
    Time:   
      
     
    User: user1
    Privilege: 0
    Command: CmdAV = 
    show run 
    						
    							14
    Managing Alarms
     
    Creating, Editing, and Duplicating Alarm Thresholds
    TACACS 
    Command 
    Authorization    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 0000000128
    Number of Fragments: 1
    First Fragment: 0TACACS 
    AuthorizationCritical/
    Warning/
    InfoThis alarm is 
    caused when 
    the TACACS+ 
    authorization 
    threshold is 
    reached.ACS instance: acsserver1
    Time:   
      
     
    Network Device: device1
    User: user1
    Privilege: 0
    Command: CmdAV = 
    show run
    Authorization Result: 
    Passed 
    Identity Group: All 
    Groups, 
    Device Group & Device 
    Type: All Device Types
    Location: All Locations
    ACS 
    Configuration 
    Changes    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 0000000002
    Number of Fragments: 1
    First Fragment: 0 Configuration 
    ChangesCritical/
    Warning/
    InfoThis alarm is 
    caused when 
    the 
    configuration 
    changes 
    threshold is 
    reached.ACS instance: acsserver1
    Time:   
      
     
    Administrator: acsadmin
    Object Name: ACSAdmin
    Object Type: 
    Administrator Account
    Change: UPDATE
    ACS System 
    Diagnostics    
    Syslog ID: 0000000005
    Number of Fragments: 1
    First Fragment: 0System 
    DiagnosticsCritical/
    Warning/
    InfoThis alarm is 
    caused when 
    the system 
    diagnostics 
    threshold is 
    reached.ACS instance: acsserver1
    Category: 
    CSCOacs_Internal_Opera
    tions_Diagnostics
    Severity: warning
    Message Text: CTL for 
    Syslog server certificate is 
    empty
    Table 119 List of Alarm Threshold Messages (continued)
    Alarm 
    Threshold 
    CategoryAlarm Header Alarm Name Severity Cause Details 
    						
    							15   
    Managing Alarms
    Creating, Editing, and Duplicating Alarm Thresholds
    ACS Process 
    Status    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 0000000001
    Number of Fragments: 1
    First Fragment: 0Authentication Critical/
    Warning/
    InfoThis alarm is 
    caused when 
    the 
    authentication 
    threshold is 
    reached.No process status 
    updates have been 
    received since the ACS 
    View may be down. 
    ACS System 
    Health    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 0000000004
    Number of Fragments: 1
    First Fragment: 0 Authentication Critical/
    Warning/
    InfoThis alarm is 
    caused when 
    the 
    authentication 
    threshold is 
    reached.ACS instance: acsserver1
    CPU utilization(%): 0.96
    Memory utilization(%): 
    91.73
    Disk space used /opt(%): 
    14.04 
    Disk space used 
    /localdisk(%): 8.94
    ACS AAA 
    Health    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 0000000003
    Number of Fragments: 1
    First Fragment: 0AAA Health Critical/
    Warning/
    InfoThis alarm is 
    caused when 
    the AAA health 
    threshold is 
    reached.ACS instance: acsserver1
    RADIUS throughput 
    (transactions per 
    second): 0.00
    RADIUS 
    Sessions    
    Syslog ID: 0000000003
    Number of Fragments: 1
    First Fragment: 0RADIUS 
    SessionCritical/
    Warning/
    InfoThis alarm is 
    caused when 
    the RADIUS 
    sessions 
    threshold is 
    reached.ACS instance: acsserver1
    Device IP: 192.168.1.2 
    Count: 12
    Table 119 List of Alarm Threshold Messages (continued)
    Alarm 
    Threshold 
    CategoryAlarm Header Alarm Name Severity Cause Details 
    						
    							16
    Managing Alarms
     
    Creating, Editing, and Duplicating Alarm Thresholds
    Configuring General Threshold Information
    To configure general threshold information, fill out the fields in the General Tab of the Thresholds page. Table 120 on 
    page 16 describes the fields.
    Related Topics
    Configuring Threshold Criteria, page 16
    Configuring Threshold Notifications, page 35
    Configuring Threshold Criteria
    ACS 5.7 provides the following threshold categories to define different threshold criteria: Unknown NAD     
    Syslog ID: 0000000002
    Number of Fragments: 1
    First Fragment: 0Unknown NAD Critical/
    Warning/
    InfoThis alarm is 
    caused when 
    the unknown 
    NAD threshold 
    is reached.ACS instance: acsserver1
    Unknown NAD count: 12
    External 
    Database 
    Unavailable    
    Alarm Category: 
    CSCOacs_View_Alarm
    Syslog ID: 0000000001
    Number of Fragments: 1
    First Fragment: 0External 
    databaseCritical/
    Warning/
    InfoThis alarm is 
    caused when 
    the external 
    database 
    threshold is 
    reached.ACS instance: acsserver1
    External database 
    unavailable: 6
    NAD-reported 
    AAA Down    
    Syslog ID: 0000000004
    Number of Fragments: 1
    First Fragment: 0NAD_Reported
    _AAA_Down Critical/
    Warning/
    InfoThis alarm is 
    caused when 
    the 
    NAD_Reported
    _AAA_ Down 
    threshold is 
    reached.ACS instance: acsserver1
    AAA down count: 10
    Table 119 List of Alarm Threshold Messages (continued)
    Alarm 
    Threshold 
    CategoryAlarm Header Alarm Name Severity Cause Details
    Table 120 General Tab
    Option Description
    Name Name of the threshold.
    Description (Optional) The description of the threshold.
    Enabled Check this check box to allow this threshold to be executed.
    Schedule Use the drop-down list box to select a schedule during which the threshold should be run. A list of 
    available schedules appears in the list. 
    						
    							17   
    Managing Alarms
    Creating, Editing, and Duplicating Alarm Thresholds
    Passed Authentications, page 17
    Failed Authentications, page 19
    Authentication Inactivity, page 21
    TACACS Command Accounting, page 22
    TACACS Command Authorization, page 23
    ACS Configuration Changes, page 24
    ACS System Diagnostics, page 25
    ACS Process Status, page 26
    ACS System Health, page 27
    ACS AAA Health, page 28
    RADIUS Sessions, page 29
    Unknown NAD, page 30
    External DB Unavailable, page 31
    RBACL Drops, page 33
    NAD-Reported AAA Downtime, page 34
    Passed Authentications
    When ACS evaluates this threshold, it examines the RADIUS or TACACS+ passed authentications that occurred during 
    the time interval that you have specified up to the previous 24 hours. 
    These authentication records are grouped by a common attribute, such as ACS Instance, User, Identity Group, and so 
    on. The number of records within each of these groups is computed. If the count computed for any of these groups 
    exceeds the specified threshold, an alarm is triggered.
    For example, if you configure a threshold with the following criteria: Passed authentications greater than 1000 in the past 
    20 minutes for an ACS instance. When ACS evaluates this threshold and three ACS instances have processed passed 
    authentications as follows:
    An alarm is triggered because at least one ACS instance has greater than 1000 passed authentications in the past 20 
    minutes.
    Note: You can specify one or more filters to limit the passed authentications that are considered for threshold evaluation. 
    Each filter is associated with a particular attribute in the authentication records and only those records whose filter value 
    matches the value that you specify are counted. If you specify multiple filters, only the records that match all the filter 
    conditions are counted.ACS Instance Passed Authentication Count
    New York ACS 1543
    Chicago ACS 879
    Los Angeles 2096 
    						
    							18
    Managing Alarms
     
    Creating, Editing, and Duplicating Alarm Thresholds
    Modify the fields in the Criteria tab as described in Table 121 on page 18 to create a threshold with the passed 
    authentication criteria.
    Table 121 Passed Authentications 
    Option Description
    Passed 
    AuthenticationsEnter data according to the following:
    greater than count > occurrences |%> in the past time > Minutes | Hours for a object, where:
    count values can be the absolute number of occurrences or percent. Valid values are:
    —count must be in the range 0 to 99 for greater than.
    —count must be in the range 1 to 100 for lesser than.
    occurrences | %> value can be occurrences or %.
    time values can be 5 to 1440 minutes, or 1 to 24 hours.
    Minutes|Hours value can be Minutes or Hours.
    object values can be:
    —ACS Instance
    —User
    —Identity Group
    —Device IP
    —Identity Store
    —Access Service
    —NAD Port
    —AuthZ Profile
    —AuthN Method
    —EAP AuthN
    —EAP Tunnel
    In a distributed deployment, if there are two ACS instances, the count is calculated as an absolute number 
    or as a percentage for each of the instances. ACS triggers an alarm only when the individual count of any 
    of the ACS instance exceeds the specified threshold.
    Filter
    ACS Instance Click Select to choose a valid ACS instance on which to configure your threshold.
    User Click Select to choose or enter a valid username on which to configure your threshold.
    Identity Group Click Select to choose a valid identity group name on which to configure your threshold.
    Device Name Click Select to choose a valid device name on which to configure your threshold.
    Device IP Click Select to choose or enter a valid device IP address on which to configure your threshold.
    Device Group Click Select to choose a valid device group name on which to configure your threshold.
    Identity Store Click Select to choose a valid identity store name on which to configure your threshold.
    Access Service Click Select to choose a valid access service name on which to configure your threshold. 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Acs 57 User Guide