Cisco Systems OL-24201-01 Camera Accessories User Manual


 
14-5
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 14 Troubleshooting ACS with the Monitoring & Report Viewer
Working with Expert Troubleshooter
Include core files—Check this check box to include core files, then click All or click Include files
from the last and enter a value from 1 to 365 in the day(s) field.
Include monitoring and reporting logs—Check this check box to include monitoring and reporting
logs, then click All or click Include files from the last and enter a value from 1 to 365 in the day(s)
field.
Specify which monitoring and reporting logs to include:
AAA Audit
AAA Diagnostics
System Diagnostics
AAA Accounting
Administrative and Operational Audit
Include system logs—Check the check box to include system logs, then click All or Recent and
enter a value from 1 to 999 in the file(s) field.
You can enter a description in the Description field, if you need.
Step 4 Click:
Download to download the support bundle with the options you specified. The support bundle is
created and downloaded.
Restore Defaults to clear the changes you made and return to the default settings.
Note ACS does not pick up the core files while creating or downloading the support bundle for the associated
ACS node instance by default. If you want to include the core files in the support bundle, you can check
the Include core files check box. You can check the Encrypt Support Bundle checkbox to encrypt the
support bundle in ACS. It will ensure that the core files are encrypted and included in the supported
bundle.
Related Topics
Available Diagnostic and Troubleshooting Tools, page 14-1
Connectivity Tests, page 14-1
ACS Support Bundle, page 14-1
Expert Troubleshooter, page 14-2
Working with Expert Troubleshooter
The following sections describe how to use the Expert Troubleshooter diagnostic tools:
Troubleshooting RADIUS Authentications, page 14-6
Executing the Show Command on a Network Device, page 14-9
Evaluating the Configuration of a Network Device, page 14-10
Comparing SGACL Policy Between a Network Device and ACS, page 14-11
Comparing the SXP-IP Mappings Between a Device and its Peers, page 14-12