Cisco 3.3 User Manual page 334

For windows server version 3.3
Table of Contents

Advertisement

CiscoSecure Database Replication
Cisco Secure ACS can act as both a primary Cisco Secure ACS and a secondary
Cisco Secure ACS.
acts only as a primary Cisco Secure ACS, replicating to servers 2 and 3, which act
as secondary Cisco Secure ACSes. After replication from server 1 to server 2 has
completed, server 2 acts as a primary Cisco Secure ACS while replicating to
servers 4 and 5. Similarly, server 3 acts as a primary Cisco Secure ACS while
replicating to servers 6 and 7.
If you intend to use cascading replication to replicate network configuration
Note
device tables, you must configure the primary Cisco Secure ACS with all
Cisco Secure ACSes that will receive replicated database components, regardless
of whether they receive replication directly or indirectly from the primary
Cisco Secure ACS. In
table for each of the other six Cisco Secure ACSes. If this is not done, after
replication, servers 2 and 3 do not have servers 4 through 7 in their AAA Servers
tables and replication will fail.
If server 2 were configured to replicate to server 1 in addition to receiving
replication from server 1, replication to server 2 would fail. Cisco Secure ACS
cannot support such a configuration, known as bidirectional replication. To
safeguard against this, a secondary Cisco Secure ACS aborts replication when its
primary Cisco Secure ACS appears on its Replication list.
Figure 9-1
Server 1
User Guide for Cisco Secure ACS for Windows Server
9-6
The secondary Cisco Secure ACS resumes its authentication service.
c.
Figure 9-1
Figure
Cascading Database Replication
Server 2
Server 3
Chapter 9
shows a cascading replication scenario. Server 1
9-1, server 1 must have an entry in its AAA Servers
Server 4
Server 5
Server 6
Server 7
System Configuration: Advanced
78-16592-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Secure access control serverSecure acs

Table of Contents