Cisco Systems OL-24201-01 Camera Accessories User Manual


 
12-18
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12 Managing Alarms
Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Creating, Editing, and Duplicating Alarm Thresholds, page 12-11
Configuring General Threshold Information, page 12-13
Configuring Threshold Notifications, page 12-32
Authentication Inactivity
When ACS evaluates this threshold, it examines the RADIUS or TACACS+ authentications that occurred
during the time interval that you have specified up to the previous 31 days. If no authentications have
occurred during the specified time interval, an alarm is triggered.
You can specify filters to generate an alarm if no authentications are seen for a particular ACS instance
or device IP address during the specified time interval.
If the time interval that you have specified in the authentication inactivity threshold is lesser than that of
the time taken to complete an aggregation job, which is concurrently running, then this alarm is
suppressed.
ACS Instance Click Select to choose a valid ACS instance on which to configure your threshold.
User Click Select to choose or enter a valid username on which to configure your threshold.
Identity Group Click Select to choose a valid identity group name on which to configure your threshold.
Device Name Click Select to choose a valid device name on which to configure your threshold.
Device IP Click Select to choose or enter a valid device IP address on which to configure your threshold.
Device Group Click Select to choose a valid device group name on which to configure your threshold.
Identity Store Click Select to choose a valid identity store name on which to configure your threshold.
Access Service Click Select to choose a valid access service name on which to configure your threshold.
MAC Address Click Select to choose or enter a valid MAC address on which to configure your threshold. This
filter is available only for RADIUS authentications.
NAD Port Click Select to choose a port for the network device on which to configure your threshold. This
filter is available only for RADIUS authentications.
AuthZ Profile Click Select to choose an authorization profile on which to configure your threshold. This filter is
available only for RADIUS authentications.
AuthN Method Click Select to choose an authentication method on which to configure your threshold. This filter
is available only for RADIUS authentications.
EAP AuthN Click Select to choose an EAP authentication value on which to configure your threshold. This
filter is available only for RADIUS authentications.
EAP Tunnel Click Select to choose an EAP tunnel value on which to configure your threshold. This filter is
available only for RADIUS authentications.
Protocol Use the drop-down list box to configure the protocol that you want to use for your threshold. Valid
options are:
RADIUS
TACACS+
Table 12-11 Failed Authentications (continued)
Option Description