17-8
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
17






Monitoring

Your

Network
Using
Dashboards

to

Monitor

Devices

and

Virtual

Contexts


VLANs—Total
count

of

VLANs

configured

and

the

count

of

VLANs

based

on

operational

status

-
Up
and

Down.

A

hyperlink

enables

you

to

view

traffic

summary

information

based

on

the

identified
state
(see

the

“Monitoring

Traffic”

section

on

page

17-30 ).

For

example,

if

you

click

the

Up
hyperlink,
you

will

see

onl

y

t

he

VLAN

interfaces

that

currently

have

an

operational

status

of

Up.


Port
Channels—(ACE

appliance

only)
Total
count

of

port
channels
configured
on

the

ACE

appliance
based
on

their

operational

status

of

Up

and

Down.

A

hyperlink

enables

you

to

view

traffic

summary
information
based

on

the

identified

state

(see

the

“Monitoring

Traffic”

section

on

page

17-30 ).

For
example,
if

you

click

the

Up

hyperlink,

you

will

see

only

the

port

channels

that

currently

have

an
operational
status

of

Up.


BVIs—Total
count

of

BVI

interfaces

and

the

count

of

BVI

interfaces

based

on
their

operational
status
of

Up

and

Down.

A

hyperlink

enables

you

to

view

traffic

summary

information

based

on

the
identified
state

(see

the

“Monitoring

Traffic”

section

on

page

17-30 ).

For

example,

if

you

click

the
Up
hyperlink,

you

will

see

only

the

BVI

interfaces

that

currently

have

an

operational

status

of

Up.


Certificates—Total
count
of
SSL

certificates

and

the

count

of

SSL

certificates

that
are

expiring
beyond
30

days,

expired,

or

that

are

expiring

within

30

days.

A

hyperlink

accesses

a

popup

window
for
you

to

view

the

SSL

certificates

list

based

on

the

selection,

displaying

the

certificate

name,
device
name,

days

to

expire,

expiration

date,

and

the

date

it

was

evaluated

for

you

to

determine

the
days
to

expire.

Certificates

are

considered

expired

it

their

expiration

date

is

within

the

next

day
(rounded
down

the

next

day).

A

hyperlink

in

the

device

name

allows

you

to

navigate

to

the
context-based
SSL

Certificate

configuration

page

(see

the

“Using

SSL

Certificates”

section

on
page
11-5 ).
This
data

is

collected

during

discovery

as

well

as

during

periodic

monitoring

polling.

The

timestamp
shown
in

the

status

bar

indicates

a

varying

poll

time;

that

is,

different

virtual

contexts

were

polled

and
those
context

had

different

time

stamps.

The

earliest

time

stamp

of

the

polled

virtual

contexts

is
displayed
in

the

status

bar.
All
counts

shown

in

the

Device

Configuration

Summary

table

are

based

on

the

operational

status

of

the
monitored
objects

listed

above.





Out
Of

Service—Indicates

any

status
other
than
In
Service

(for
example,
Out

Of

Service,

Failed,

or
Disabled).


Status
not

available—Indicates

t

hat
ANM
was

unable

to
poll
t

he
operational

st

atus

of


this

obj

ect.
The
display

of

this

operational

status

could

be

due

to

polling

errors

or

the

device

was

unreachable.
Also,
if

a

poll

was

recently

initiated,

this

operational

status

could

indicate

that

ANM

is

in

the

process
of
collecting

data.


Status
not

supported—Indicates

that

the

device

does

not
have
t

he
capability
t

o
provide

an
operational
status

of

t

his

object.

The

di

splay

of

t

his

operational

st

atus

could

be

due

to

mi

ssing
SNMP
instrumentation

on

earlier

ACE

devices.
Context
With

Denied

Resource

Usage

Detected

Table
The
Context

With

Denied

Resource

Usage

Detected

table

lists

all

contexts

for

which

the

resource

request
is
denied

after

reaching

the

maximum

limit.

An

increase

in

the

deny

count

(that

is,

the

deny

rate)

results
in
the

relevant

context

resource

type

appearing

in

this

table.

ANM

obtains

the

count

information

by

using
the
ACE

show

resource

usage

CLI

command,

which

collects

the

information

from

the

following

MIBs:
crlResourceLimitReqsDeniedCount
and

crlRateLimitResourceReqsDeniedCount.
This
table

includes

the

following

information:


Context—Name
of

the

configured

context
that
contains

a

denied

resource.


Resource
Type—Type

of
system
resource

in
the
context.