Cisco Systems CL-28826-01 Security Camera User Manual


  Open as PDF
of 2616
 
CHAPTER
69-1
User Guide for Cisco Security Manager 4.4
OL-28826-01
69
Using External Monitoring, Troubleshooting, and
Diagnostic Tools
A high degree of network availability is a requirement for large enterprises and service providers.
Network managers face various challenges in maintaining network availability, including unscheduled
down time, lack of expertise, insufficient tools, complex technologies, business consolidation, and
competing markets. Network monitoring, problem diagnosis, and troubleshooting are essential to
meeting and overcoming these challenges.
Monitoring involves the study of network activity and device status to identify anomalous events and
behaviors. Quickly diagnosing and correcting network and system faults such as outages and
degradations increase service availability, and thus tools to isolate, analyze and correct problems are
essential.
The main Security Manager tools for monitoring device events are the Health and Performance Monitor
(see Chapter 68, “Health and Performance Monitoring”) and the Event Viewer (see Chapter 66,
“Viewing Events”).
In addition to Health and Performance Monitor and Event Viewer, the following topics describe
additional monitoring, troubleshooting and diagnostic tools that are available with Security Manager:
Viewing Inventory Status, page 69-1
Starting Device Managers, page 69-4
Launching Cisco Prime Security Manager, page 69-9
Analyzing an ASA or PIX Configuration Using Packet Tracer, page 69-12
Analyzing Connectivity Issues Using the Ping, Trace Route, or NS Lookup Tools, page 69-14
Using the Packet Capture Wizard, page 69-18
Integrating CS-MARS and Security Manager, page 69-22
Viewing Inventory Status
You can view a summary of device properties for all devices that you are authorized to view. The
summary includes device contact information and all device configurations, indicating which settings
are local and which are using a shared policy, and indicating any policy object overrides in effect. You
can also view the status of configuration deployment to the device.
The report is in table format, allowing you to organize information by filtering, sorting, reordering and
removing columns. You can also export the table contents to a comma-separated values (CSV) file on
the Security Manager server.