Chapter 8 Establishing Cisco Secure ACS System Configuration
CiscoSecure Database Replication
8-14
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
If server 2 were configured to replicate to server 1 in addition to receiving
replication from server 1, replication to server 2 would fail. Cisco Secure ACS
cannot support such a configuration, known as bidirectional replication. To
safeguard against this, a secondary Cisco Secure ACS aborts replication when its
primary Cisco Secure ACS appears on its Replication list.
Figure 8-1
Cascading Database Replication
Replication Frequency
The frequency with which your Cisco Secure ACSes replicate can have important
implications for overall AAA performance. With shorter replication frequencies,
a secondary Cisco Secure ACS is more up-to-date with the primary
Cisco Secure ACS. This allows for a more current secondary Cisco Secure ACS
if the primary Cisco Secure ACS fails.
There is a cost to having frequent replications. The more frequent the replication,
the higher the load on a multi-server Cisco Secure ACS architecture and on your
network environment. If you schedule frequent replication, network traffic is
much higher. Also, processing load on the replicating systems is increased.
Replication consumes system resources and briefly interrupts authentication; thus
the more often replication is repeated, the greater the impact on the AAA
performance of the Cisco Secure ACS.
This issue is more apparent with databases that are large or that frequently change.
Database replication is a non-incremental, destructive backup. In other words, it
completely replaces the database and configuration on the secondary
67473
Server 1
Server 2
Server 3
Server 4
Server 5
Server 6
Server 7