Recording - Cisco 2509 - Router - EN User Manual

User guide
Hide thumbs Also See for 2509 - Router - EN:
Table of Contents

Advertisement

CSMon

Recording

User Guide for Cisco Secure ACS for Windows Server
G-6
build up a "picture" of expected response time on the system in question.
CSMon can therefore detect whether excess re-tries are required for each
authentication or if response times for a single authentication exceed a
percentage threshold over the average.
System resource consumption by Cisco Secure ACS—CSMon periodically
monitors and records the usage by Cisco Secure ACS of a small set of key
system resources and compares it against predetermined thresholds for
indications of atypical behavior. The parameters monitored include the
following:
Handle counts
Memory utilization
Processor utilization
Thread used
Failed log-on attempts
CSMon cooperates with CSAuth to keep track of user accounts being disabled by
exceeding their failed attempts count maximum. This feature is more oriented to
security and user support than system viability. If configured, it provides
immediate warning of "brute force" attacks by alerting the administrator to a large
number of accounts becoming disabled. In addition, it helps support technicians
anticipate problems with individual users gaining access.
CSMon records exception events in logs that you can use to diagnose problems.
CSMon Log—Like the other Cisco Secure ACS services, CSMon maintains
a CSV log of its own for diagnostic recording and error logging. Because this
logging consumes relatively small amounts of resources, CSMon logging
cannot be disabled.
Windows Event Log—CSMon can log messages to the Windows Event Log.
Logging to the Windows Event Log is enabled by default but can be disabled.
Appendix G
Cisco Secure ACS Internal Architecture
78-14696-01, Version 3.1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs

Table of Contents