User Guide for the Cisco Secure Access Control System 5.0
Monitoring and Reporting
Downloads: This chapterpdf (PDF - 234.0KB) The complete bookPDF (PDF - 12.93MB) | Feedback

Monitoring and Reporting

Table Of Contents

Monitoring and Reporting

Authentication Records and Details

Dashboard Pages

Viewing the Monitoring Page

Editing Recent Alarms

Viewing ACS System Health

Viewing ACS Authentication Activity

Viewing Identity Store Authentication Status

Viewing User Authentications

Managing Alarms

Viewing and Editing Alarms in Your Inbox

Viewing Thresholds

Creating, Duplicating, and Editing Alarm Thresholds

Defining Threshold Criteria

Configuring Time Thresholds

Configuring Threshold Notifications

Deleting Alarm Thresholds


Monitoring and Reporting


The Monitoring and Reports drawer appears in the primary web interface window and contains the Launch Monitoring & Report Viewer option.

Click Launch Monitoring & Report Viewer to open the Monitoring & Reports Viewer in a secondary web interface window, which contains these drawers:

Monitoring and Reports

Monitoring Configuration. (See Monitoring & Report Viewer System Operations, page 13-1.)

The Monitoring and Reports drawer provides the following functionality:

Dashboard—Provides a high-level summary, updated in real time, of the ACS servers in the deployment, the authentication activity, and a summary of authentications against each identity store. See Dashboard Pages.

Alarms—You can define thresholds to represent acceptable system performance. Measurements are taken on an ongoing basis and compared against these thresholds. If the thresholds are exceeded, alarms are generated. See Managing Alarms.


Note Alarm-related functionality is available only if you have installed the Advanced Monitoring and Reporting license.


Reports— A rich set of reports are available. See Managing Reports in the Monitoring & Report Viewer, page 11-1

Troubleshooting— Provides tools to assist in troubleshooting the ACS system, including tests for system connectivity and a tool to download support bundles. See Monitoring & Report Viewer Troubleshooting, page 12-1


Note In Monitoring & Reports drawer pages, you can use the page area's down arrow (v) to hide an area's content, and the right arrow (>) to show its content.


Related Topic

Authentication Records and Details

Authentication Records and Details

A primary source of information for reports are the authentication records. Reports are provided that analyze these records according to multiple categories such as the Access Service used for the request, the user or host referenced in the request, the device making the request, etc. ACS provides summaries of the authentications per instance in each category, and administrators can get additional details.

Within each authentication record there is an option to view the details of the authentication record. The details contain the following information:

Authentication Details—Full details of the authentication, which includes details from the request, the service, policies and rules selected for the requests, and the results returned in the response.

Authentication Result—The contents of the result response.

Steps—Lists the sequence of steps performed when processing the request.

The authentication details information is very helpful when trying to understand why a specific successful response was returned, or to track the steps performed when a failed response was returned.

Dashboard Pages

When you launch the Monitoring & Reports Viewer, the Dashboard appears in a secondary web interface window. You can use the dashboard to view recent alarm status, ACS authentication activity, ACS system health, and identity store status, and view recent user authentications.

The Dashboard page contains options for:

Viewing the Monitoring Page

Viewing User Authentications

Viewing the Monitoring Page

Use the Monitoring page to view alarm status, ACS authentication activity, ACS system health, and identity store status.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.


Select Monitoring and Reports > Launch Monitoring & Reports Viewer > Monitoring and Reports > Dashboard > Monitoring.

The Monitoring page appears with recent alarms, ACS health status, ACS authentication activity, and identity store authentication status with the fields described in Table 10-1:

Table 10-1 Dashboard: Monitoring Page 

Option
Description

Protocol

Use the drop-down list box to select the protocol for which you want to view identity store authentication status and ACS authentication activity. Valid options are:

RADIUS

TACACS+

Recent Alarms

A summary of up to 5 recent alarms in the new state. Select Alarms > Inbox to view all recent alarms.

Note When you edit an alarm and the alarm status changes to closed or acknowledged, the alarm is removed from the list of new alarms on the dashboard.

Note This section appears for users with an advanced license only.

Severity

Display only. Indicates the severity level of associated alarms. Options are:

Critical

Warning

Info

Time

The time of the associated alarm, in the format Ddd Mmm dd hh:mm:ss, where:

Ddd = Sun, Mon, Tue, Wed, Thu, Fri, Sat.

Mmm = Jan, Feb, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, Dec.

dd = A two-digit numeric representation of the day of the month, from 01 to 31.

hh = A two-digit numeric representation of the hour of the day, from 00 to 23.

mm = A two-digit numeric representation of the minute of the hour, from 00 to 59.

ss = A two-digit numeric representation of the second of the minute, from 00 to 59.

Name

The name of the associated alarm. Click to access the Alarms > Inbox > Edit <alarm_name>, where <alarm_name> page of the alarm and edit the alarm.

Status

Display only. Indicates the status of new alarms.

Note Only new alarms appear on this Dashboard page.

ACS Health Status

ACS Instance

The name of an ACS instance. Click a name to display the associated ACS Instance Health Summary report, in a separate window, for more information.

System Health

Display only. Indicates the health of the associated ACS instance. Options are:

Critical

Warning

Healthy

Note An exclamation point (!) inside a yellow triangle indicates that a severity level or status is not available.

AAA Health

Display only. Indicates the health of the associated AAA transaction rate and AAA request/response latency. Options are:

Critical—Indicates an average latency of greater than 3 seconds.

Warning—Indicates an average latency from 1 to 2 seconds.

Healthy—Indicates an average latency from 0 to 1 second.

Note An exclamation point (!) inside a yellow triangle indicates that a severity level or status is not available.

ACS Authentication Activity

ACS Instance <acs_inst>

Use the drop-down list box to select an ACS instance, where <acs_inst> is the name of the ACS for which you want to view authentication activity.

Go

Displays the ACS instance authentication activity for a selected ACS instance in a bar graph format.

Bar graph

The bar graph shows ACS instance passed and failed authentication activity over time.

Identity Store Authentication Status

Identity Store

The name of the identity store. Click a name to display the associated Identity Store Authentication report for the selected protocol, in a separate window, for more information.

Today

Indicates the number of passed and failed identity store authentications for an associated identity store. Click Pass or Fail to display the passed or failed summary page, in a separate window, for more information.

Day of Week Average

Display only. Indicates the average number of passed and failed authentications on this day of the week in the last three months and the current month, excluding today.

Daily Average

Display only. Indicates the average number of passed and failed authentications for the last three months and the average of the number of days in the current month, excluding today.

Top 3 Failure Reasons

Indicates the top three identity store authentication failure reasons for an associated identity store. Click an identity store authentication failure reason to display the Authentication Failure Reason Lookup report in a separate page.



Related Topics

Viewing and Editing Alarms in Your Inbox

Viewing ACS System Health

Viewing ACS Authentication Activity

Viewing Identity Store Authentication Status

Editing Recent Alarms


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.


Step 5 To display this page, select Monitoring and Reports, launch Monitoring & Reports Viewer, then select Monitoring and Reports > Dashboard > Monitoring. (From the Alarm Inbox page [Monitoring and Reports > Alarms > Inbox], you can also edit recent alarms by clicking an alarm name or clicking the checkbox next to the alarm you want to edit. The Alarm details are displayed in the web interface.)

Step 6 Click the name of the alarm you want to edit by. The Alarm: Properties page appears with the fields described in Table 10-2:

Table 10-2 Alarms: Properties Page 

Option
Description

Status

Use the drop-down list box to assign a status to an alarm. Valid options are:

New—The alarm is new.

Acknowledged—The alarm is known.

Closed—The alarm is closed.

Assigned To

Enter the username of the administrator that you want to assign to this alarm.

Notes

Enter any informational notes you, or the assigned, want the all administrators to view.

Details

Display only. Indicates the cause, time, and informational details about the alarm.



Viewing ACS System Health

To view ACS system health:


Step 1 Select Monitoring and Reports > Launch Monitoring & Reports Viewer > Monitoring and Reports > Dashboard > Monitoring.

The Monitoring page appears with recent alarms, ACS health status, ACS authentication activity, and identity store authentication status with the fields described in Table 10-1.

Step 2 In the Health Status area, click the ACS system name for which you want to view system health.

An ACS System Health Summary opens in a new window.

Step 3 Click Launch Interactive Viewer for more options.


Note You can also hover your mouse over the image in the System Health column to view a tool tip that contains the process status for the associated ACS server.



Viewing ACS Authentication Activity


Note To view the Authentication Summary window, you must have Adobe Flash Player installed on the client machine.


To view ACS authentication activity:


Step 1 Select Monitoring and Reports > Launch Monitoring & Reports Viewer > Monitoring and Reports > Dashboard > Monitoring.

The Monitoring page appears with recent alarms, ACS health status, ACS authentication activity, and identity store authentication status with the fields described in Table 10-1.

Step 2 In the ACS Authentication area, select an ACS instance name from the drop-down list box.

Step 3 Click Go.

The Monitoring page refreshes to display an updated ACS authentication graph.


Viewing Identity Store Authentication Status

To view identity store authentication status:


Step 1 Select Monitoring and Reports > Launch Monitoring & Reports Viewer > Monitoring and Reports > Dashboard > Monitoring.

The Monitoring page appears with recent alarms, ACS health status, ACS authentication activity, and identity store authentication status with the fields described in Table 10-1.

Step 2 In the Identity Store Authentication Status area, click the identity store name for which you want to view status.

The Authentication Summary window opens.

Step 3 Click Launch Interactive Viewer for more options.


Note You can also click Pass or Fail in the Today column to view authentication summary reports for the current day.



Viewing User Authentications

Use the Reporting tab to view user authentications.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.


To display this page, choose Monitoring and Reports > Launch Monitoring & Reports Viewer > Monitoring and Reports > Dashboard, then click the Reporting tab.

The Reporting page appears with the fields described in Table 10-3:

Table 10-3 Dashboard: Reporting Page  

Option
Description
Authentication Lookup

Protocol

Use the drop-down list box to select the protocol for which you want to view the Authentication Lookup report page. Valid options are:

RADIUS

TACACS+

User

Enter a username, or click Select to open a secondary window from which to choose a username on which you want to obtain summary user authentication information.

MAC Address

This field applies to RADIUS protocol only.

Enter the MAC address, or click Select to open a secondary window from which to choose a MAC address on which you want to obtain summary user authentication information.

Time Range

Use the drop-down list box to choose which time you want to obtain summary user authentication information. Valid options are:

Today

Yesterday

Custom—You must enter data into the Day field.

Day

Click the date selector icon to enter the date for which you want for summary user authentication information.

Run

Click to obtain the summary user authentication information for your selected username, MAC address (if applicable) and time.

Favorite Reports

Favorite Name

A summary list of all favorite reports. Click a name to view the summary report information.

Report Name

The location of the report within the Monitoring and Reports drawer.

Report Type

Indicates the type of report.



Managing Alarms

The Alarms option contains options for:

Viewing and Editing Alarms in Your Inbox

Viewing Thresholds

Creating, Duplicating, and Editing Alarm Thresholds

Deleting Alarm Thresholds

Viewing and Editing Alarms in Your Inbox

Use this page to view alarms (critical conditions) that you configure to monitor, based on a threshold configuration or a rule on a set of data collected from ACS servers. Alarms that have met configured thresholds are sent to your inbox.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.



Step 1 Select Monitoring and Reports > Alarms > Inbox.

The Inbox page appears as described in Table 10-4:

Table 10-4 Alarms Page 

Option
Description

Severity

Display only. Indicates the severity of the associated alarm. Options are:

Critical

Warning

Info

Time

Display only. Indicates the time of the associated alarm generation in the format Ddd Mmm dd hh:mm:ss timezone yyyy, where:

Ddd = Sun, Mon, Tue, Wed, Thu, Fri, Sat.

Mmm = Jan, Feb, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, Dec.

dd = A two-digit numeric representation of the day of the month, from 01 to 31.

hh = A two-digit numeric representation of the hour of the day, from 00 to 23.

mm = A two-digit numeric representation of the minute of the hour, from 00 to 59.

ss = A two-digit numeric representation of the second of the minute, from 00 to 59.

timezone = The time zone.

yyyy = A four-digit representation of the year.

Name

Indicates the name of the alarm. Click to display the Alarms: Properties page and edit the alarm.

Cause

Display only. Indicates the cause of the alarm.

Assigned To

Display only. Indicates who is assigned to investigate the alarm.

Status

Display only. Indicates the status of the alarm. Options are:

New—The alarm is new.

Acknowledged—The alarm is known.

Closed—The alarm is closed.

Edit

Click to display the Alarms: Properties page and edit the alarm.

Close

Click to close the selected alarm(s).

Delete

Click to delete the selected alarm(s).


Step 2 Modify fields in the Alarms page as required. See Viewing and Editing Alarms in Your Inbox.

Step 3 Click Submit to save changes.

The Alarms page appears with the changes you made.


Related Topics

Creating, Duplicating, and Editing Alarm Thresholds

Deleting Alarm Thresholds

Viewing Thresholds

Use this page to configure thresholds for each alarm category. You can configure up to 200 thresholds.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.


Select Monitoring and Reports > Alarms > Thresholds.

The Alarms Thresholds page appears as described in Table 10-5:

Table 10-5 Alarm Thresholds Page 

Option
Description

Name

The name of the alarm threshold.

Description

The description of the alarm threshold.

Category

The alarm threshold category. Options can be:

Passed Authentications

Failed Authentications

Authentication Inactivity

TACACS Command Accounting

TACACS Command Authorization

Admin Audit

Internal Operations

Process Status

System Health

AAA Health Status

Last Modified Time

The time that the alarm threshold was last modified by a user.

Last Alarm

The time at which the last alarm was generated by the associated alarm threshold.

Alarm Count

The number of times that an associated alarm was generated.



Creating, Duplicating, and Editing Alarm Thresholds

You can configure thresholds for each alarm category. You can create up to 200 thresholds.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.


To configure a threshold for an alarm category:


Step 1 Select Monitoring and Reports > Alarms > Thresholds.

The Alarms Thresholds page appears.

Step 2 Do one of the following:

Click Create.

Check the check box next to the alarm that you want to duplicate, then click Duplicate.

Click the alarm name that you want to modify, or check the check box next to the alarm that you want to modify, then click Edit.

Step 3 Modify fields in the Thresholds page as required. See the following pages for information about valid field options:

Defining Threshold Criteria

Configuring Time Thresholds

Configuring Threshold Notifications

Step 4 Click Submit to save your configuration.

The alarm threshold configuration is saved. The Threshold page appears with the new configuration.


Defining Threshold Criteria

Use the Threshold:Criteria page to configure alarm threshold criteria.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.


Select Monitoring and Reports > Alarms > Thresholds, then:

Click Create to create a new alarm threshold.

Click the name of an alarm threshold, or check the check box next to an existing alarm threshold and click Edit to edit a selected alarm threshold.

Click the name of an alarm threshold, or check the check box next to an existing alarm threshold and click Duplicate to duplicate a selected alarm threshold.


Note Not all fields described in Table 10-6 are available for all alarm threshold categories.


Table 10-6 Thresholds: Criteria Page 

Option
Description

Name

Enter a name for your alarm threshold.

Description

Enter a description for your alarm threshold.

Enabled

Click to enable your alarm threshold.

Category

Use the drop-down list box to select an alarm category. Valid options are:

Passed Authentications—Monitors passed authentications that exceed a specified count in a specific amount of time.

Failed Authentications—Monitors failed authentications.

Authentication Inactivity—Monitors authentication inactivity.

TACACS Command Accounting—Monitors TACACS+ command accounting.

TACACS Command Authorization—Monitors TACACS+ command authorization.

Process Status—Monitors the status of ACS processes.

System Health—Monitors the ACS system health.

AAA Health Status—Monitors the AAA status health.

ACS Configuration Changes—Monitors any changes in the ACS Configuration

ACS System Diagnostics—Monitors diagnostics messages for internal operations, administrator authentication and authorization, and distributed management

RADIUS Sessions—Monitors authenticated sessions during the previous 15 minutes when the accounting start event has not been received for a device IP address.

Passed/Failed Authentications

Enter data according to the following:

greater than <num> in the past <time> <Minutes|Hours> for a <object>, where:

<num> values can be any five-digit number greater than zero (0).

<time> values can be 0 to 1440 minutes, or 0 to 23 hours.

<Minutes|Hours> value can be Minutes or Hours.

<object> values can be:

ACS Server

User

Identity Group

Device

Identity Store

Access Service

Filter

The Select button associated with threshold criteria and filter text boxes provides values for the associated field. The values are retrieved from the ACS configuration and previous authentications, authorizations, and accounting records. Some threshold criteria text boxes (for example, User, Device IP, MAC Address, and Object Name) are editable; you can enter text directly in the field if values are not provided by the Select button.

ACS Server

Click Select to enter a valid ACS server name on which to configure your threshold.

User

Click Select to enter a valid username on which to configure your threshold.

Identity Group

Click Select to enter a valid identity group name on which to configure your threshold.

Device Name

Click Select to enter a valid device name on which to configure your threshold.

Device IP

Click Select to enter a valid device IP address on which to configure your threshold.

Device Group

Click Select to enter a valid device group name on which to configure your threshold.

Identity Store

Click Select to enter a valid identity store name on which to configure your threshold.

Access Service

Click Select to enter a valid access service name on which to configure your threshold.

MAC Address

Click Select to enter a valid MAC address on which to configure your threshold.

Protocol

Use the drop-down list box to configure which protocol you want to use for your threshold. Valid options are:

RADIUS

TACACS+

Failure Reason

Click Select to enter a valid failure reason name on which to configure your threshold.

Device

Click Select to enter a valid device on which to configure your threshold.

Inactive for

Use the drop-down list box to select one of these valid options:

Hours—Specify a number hours in the range from 1 to 24.

Days—Specify the number of days from 1 to 7.

Command

Enter a command name on which you want to configure your threshold.

Privilege Level

Use the drop-down list box to select the privilege level on which you want to configure your threshold. Valid options are:

Any

In the range from 0 to 15.

Authorization Result

Use the drop-down list box to select the authorization result on which you want to configure your threshold. Valid options are:

Passed

Failed

Administrator

Click Select to enter a valid administrator username on which you want to configure your threshold.

Object Name

Enter the name of the object on which you want to configure your threshold.

Object Type

Click Select to enter a valid object type on which you want to configure your threshold.

Change

Use the drop-down list box to select the administrative change on which you want to configure your threshold. Valid options are:

Any

Update—Includes duplicate and edit administrative actions.

Create

Delete

Message

Severity at and above

Use the drop-down list box to select the severity level on which you want to configure your threshold. This setting captures the indicated severity level and those that are higher within the threshold. Valid options are:

Fatal

Error

Warning

Info

Debug

Message text

Enter the message text on which you want to configure your threshold. Maximum character limit is 1024.

Monitor Processes

ACS Database

Check the check box to add the ACS database to your threshold configuration.

ACS Management

Check the check box to add the ACS management to your threshold configuration.

ACS Runtime

Check the check box to add the ACS runtime to your threshold configuration.

Monitoring and Reporting Database

Check the check box to have this process monitored. If this process goes down, an Alarm is generated.

Monitoring and Reporting Collector

Check the check box to have this process monitored. If this process goes down, an Alarm is generated.

Monitoring and Reporting Alarm Manager

Check the check box to have this process monitored. If this process goes down, an Alarm is generated.

Monitoring and Reporting Job Manager

Check the check box to have this process monitored. If this process goes down, an Alarm is generated.

Average over the past <min>

Use the drop-down list box to select the amount of time you want to configure for your configuration, where <min> is minutes and can be:

15

30

45

60

CPU

Enter the percentage of CPU usage you want to set for your threshold configuration. The valid range is from 1 to 100.

Memory

Enter the percentage of memory usage (that is greater than or equal to) for your threshold configuration. The valid range is from 1 to 100.

Disk I/O

Enter the percentage of disk usage you want to set, that is greater than or equal to, for your threshold configuration. The valid range is from 1 to 100.

Disk space used /opt

Enter the percentage of /opt disk space usage you want to set, that is greater than or equal to, for your threshold configuration. The valid range is from 1 to 100.

Disk space used /local disk

Enter the percentage of local disk space usage you want to set, that is greater than or equal to, for your threshold configuration. The valid range is from 1 to 100.

Disk space used /

Enter the percentage of the / disk space usage you want to set, that is greater than or equal to, for your threshold configuration. The valid range is from 1 to 100.

Disk space used /tmp

Enter the percentage of temporary disk space usage you want to set, that is greater than or equal to, for your threshold configuration. The valid range is from 1 to 100.

RADIUS throughput

Enter the number of RADIUS transactions per second you want to set, that is less than or equal to, for your threshold configuration. The valid range is from 1 to 999999.

TACACS+ throughput

Enter the number of TACACS+ transactions per second you want to set, that is less than or equal to, for your threshold configuration. The valid range is from 1 to 999999.

RADIUS latency

Enter the number milliseconds you want to set for RADIUS latency, that is greater than or equal to, for your threshold configuration. The valid range is from 1 to 999999.

TACACS+ latency

Enter the number milliseconds you want to set for TACACS+ latency, that is greater than or equal to, for your threshold configuration. The valid range is from 1 to 999999.

Clear

Click to remove content from an associated text box.



Related Topics

Viewing and Editing Alarms in Your Inbox

Creating, Duplicating, and Editing Alarm Thresholds

Deleting Alarm Thresholds

Configuring Time Thresholds

Use this page to configure alarm time thresholds.

The threshold will run on the days selected during the selected From and To times. If the From and To times are the same, the threshold will run 24 hours during the selected days.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.



Step 1 Select Monitoring and Reports > Alarms > Thresholds, then:

Click Create to create a new alarm threshold.

Click the name of an alarm threshold, or check the check box next to an existing alarm threshold and click Edit to edit a selected alarm threshold.

Click the name of an alarm threshold, or check the check box next to an existing alarm threshold and click Duplicate to duplicate a selected alarm threshold.

Step 2 Click the Time tab.

The Thresholds: Time page appears as described in Table 10-7:

Table 10-7 Thresholds: Time Page 

Option
Description

From

Use the drop-down list boxes to configure the hour and minute of the of the day you want to apply your alarm threshold configuration. Valid options are:

00 to 23 for the hour of the day.

00, 05, 10, 15, 20, 25, 30, 35, 40, 45, 50, and 55 for the minute of the hour.

To

Use the drop-down list boxes to configure the hour and minute of the of the day you want to end the application of your alarm threshold configuration. Valid options are:

00 to 23 for the hour of the day.

00, 05, 10, 15, 20, 25, 30, 35, 40, 45, 50, and 55 for the minute of the hour.

Days

Check the All check box to apply your alarm threshold configuration to all days of the week, or check the check box(es) of specific day(s) of the week to apply your alarm threshold configuration to only specific day(s).



Related Topics

Viewing and Editing Alarms in Your Inbox

Creating, Duplicating, and Editing Alarm Thresholds

Deleting Alarm Thresholds

Configuring Threshold Notifications

Use this page to configure alarm threshold notifications.


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.



Step 1 Select Monitoring and Reports > Alarms > Thresholds, then:

Click Create to create a new alarm threshold.

Click the name of an alarm threshold, or check the check box next to an existing alarm threshold and click Edit to edit a selected alarm threshold.

Click the name of an alarm threshold, or check the check box next to an existing alarm threshold and click Duplicate to duplicate a selected alarm threshold.

Step 2 Click the Notifications tab.

The Thresholds: Notifications page appears as described in Table 10-8:

Table 10-8 Thresholds: Notifications Page 

Option
Description

Severity

Use the drop-down list box to select the severity level for your alarm threshold. Valid options are:

Critical

Warning

Info

Send Duplicate Notifications

Check the check box to be notified of duplicate alarms. An alarm is considered a duplicate if the data window considered for this alarm overlaps with the data window of a previously generated alarm.

Email Notification User List

Do one of the following to specify users that you want notified of your alarm threshold when it becomes activated:

Enter the email addresses.

Click Select to enter valid ACS administrator names. The associated administrator is notified by email only if there is an email identification specified in the administrator configuration. See Creating, Duplicating, Editing, and Deleting Administrator Accounts, page 14-5 for more information.

Custom Text

Enter custom text messages that you want associated with your alarm threshold.



Related Topics

Viewing and Editing Alarms in Your Inbox

Creating, Duplicating, and Editing Alarm Thresholds

Deleting Alarm Thresholds

Deleting Alarm Thresholds


Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in the following procedure. See Configuring System Administrators and Accounts, page 14-2 to configure the appropriate administrator privileges.


To delete an alarm threshold:


Step 1 Select Monitoring and Reports > Alarms > Thresholds.

The Alarms Thresholds page appears.

Step 2 Check one or more check boxes next to the thresholds you want to delete, and click Delete.

Step 3 Click OK to confirm that you want to delete the selected alarm(s).

The Alarms Thresholds page appears without the deleted threshold.