A STACK resource provides IP Security Monitoring attributes. You can use these attributes to collect statistical information. You can set alerts to warn you of abnormal attribute values.
The following process shows you how to implement IP Security Monitoring:
For example, IKEKeyMsgFailedAuth monitors the number of key exchange (phase 1) message authentication failures for the stack during IKE Phase 1 negotiations. You can set an alert to warn you if the number exceeds a specified threshold.
| Copyright © 2012 CA. All rights reserved. |
|