Configuring A Secondary Cisco Secure Acs Server - Cisco Servers User Manual

For windows 2000/nt servers
Table of Contents

Advertisement

Chapter 8
Establishing Cisco Secure ACS System Configuration

Configuring a Secondary Cisco Secure ACS Server

Note
Caution
Step 1
Step 2
Step 3
Step 4
78-13751-01, Version 3.0
If this feature does not appear, click Interface Configuration, click
Advanced Options, and select the CiscoSecure ACS Database Replication
check box. Also, verify that the Distributed System Settings check box is
selected; if not, select the Distributed System Settings check box.
The CiscoSecure Database Replication feature requires that you configure
Cisco Secure ACS servers that are to receive replication components, that is, that
you configure Cisco Secure ACS servers to act as secondary Cisco Secure ACS
servers. The components that a secondary Cisco Secure ACS server is to receive
must be explicitly specified, as must be its primary Cisco Secure ACS server or
servers.
Replication is always initiated by the primary Cisco Secure ACS server. For more
information about sending replication components, see the
Immediately" section on page 8-18
page
8-20.
The CiscoSecure database components received by a secondary
Cisco Secure ACS server overwrite the secondary Cisco Secure ACS server's
own CiscoSecure database components. Any information unique to the
overwritten database component is lost.
To configure a Cisco Secure ACS server to be a secondary Cisco Secure ACS
server, follow these steps:
Log in to the secondary Cisco Secure ACS server's HTML interface.
In the navigation bar, click System Configuration.
Click CiscoSecure Database Replication.
Result: The Database Replication Setup page appears.
Select the Receive check box for each database component to be received from a
primary Cisco Secure ACS server.
For more information about replication components, see the
Components Options" section on page
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
CiscoSecure Database Replication
or the
"Scheduling Replication" section on
8-13.
"Replicating
"Replication
8-17

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure acs 3.0

Table of Contents