Cisco Systems OL-24201-01 Camera Accessories User Manual


 
12-21
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 12 Managing Alarms
Creating, Editing, and Duplicating Alarm Thresholds
Related Topics
Creating, Editing, and Duplicating Alarm Thresholds, page 12-11
Configuring General Threshold Information, page 12-13
Configuring Threshold Notifications, page 12-32
ACS Configuration Changes
When ACS evaluates this threshold, it examines the accounting records that it received during the
interval between the previous and current alarm evaluation cycle.
If one or more accounting records match, it calculates the time that has lapsed since the previous alarm
evaluation cycle. When it reaches two, three, or five minutes depending on the number of active
thresholds, ACS examines the ACS configuration changes made during the interval between the previous
and current alarm evaluation cycle. If one or more changes were made, an alarm is triggered.
You can specify one or more filters to limit which configuration changes are considered for threshold
evaluation. Each filter is associated with a particular attribute in the records, and only those records that
match the filter condition are counted. If you specify multiple filter values, only the records that match
all the filter conditions are counted.
Choose this category to define threshold criteria based on configuration changes made in the ACS
instance. Modify the fields in the Criteria tab as described in Table 12-15.
Authorization Result Use the drop-down list box to select the authorization result on which you want to configure your
threshold. Valid options are:
Passed
Failed
Filter
User Click Select to choose or enter a valid username on which to configure your threshold.
Identity Group Click Select to choose a valid identity group name on which to configure your threshold.
Device Name Click Select to choose a valid device name on which to configure your threshold.
Device IP Click Select to choose or enter a valid device IP address on which to configure your threshold.
Device Group Click Select to choose a valid device group name on which to configure your threshold.
Table 12-14 TACACS Command Authorization
Option Description
Table 12-15 ACS Configuration Changes
Option Description
Administrator Click Select to choose a valid administrator username on which you want to configure your
threshold.
Object Name Enter the name of the object on which you want to configure your threshold.
Object Type Click Select to choose a valid object type on which you want to configure your threshold.