12-12
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Chapter 12 Managing Alarms
Creating, Editing, and Duplicating Alarm Thresholds
Step 2 Do one of the following:
• Click Create.
• Check the check box next to the alarm that you want to duplicate, then click Duplicate.
• Click the alarm name that you want to modify, or check the check box next to the alarm that you
want to modify, then click Edit.
• Check the check box next to the alarm that you want to enable, then click Enable.
• Check the check box next to the alarm that you want to disable, then click Disable.
Step 3 Modify fields in the Thresholds page as required. See the following pages for information about valid
field options:
• Configuring General Threshold Information, page 12-13
• Configuring Threshold Criteria, page 12-14
• Configuring Threshold Notifications, page 12-32
Step 4 Click Submit to save your configuration.
The alarm threshold configuration is saved. The Threshold page appears with the new configuration.
Category The alarm threshold category. Options can be:
• Passed Authentications
• Failed Authentications
• Authentication Inactivity
• TACACS Command Accounting
• TACACS Command Authorization
• ACS Configuration Changes
• ACS System Diagnostics
• ACS Process Status
• ACS System Health
• ACS AAA Health
• RADIUS Sessions
• Unknown NAD
• External DB Unavailable
• RBACL Drops
• NAD-reported AAA Down
Last Modified Time The time at which the alarm threshold was last modified by a user.
Last Alarm The time at which the last alarm was generated by the associated alarm
threshold.
Alarm Count The number of times that an associated alarm was generated.
Table 12-8 Alarm Thresholds Page (continued)
Option Description