8-17
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
Chapter 8 Establishing Cisco Secure ACS System Configuration
CiscoSecure Database Replication
Database Replication Logging
Cisco Secure ACS logs all replication events—whether successful or not—in two
files:
•
The Windows Event Log
•
The Database Replication report
To view the Windows Event Log, use the Windows administration utilities. You
can view recent reports in the Reports and Activity section of Cisco Secure ACS.
For more information about Cisco Secure ACS reports, see
Chapter 9, “Working
with Logging and Reports.”
Replication Options
The Cisco Secure ACS HTML interface provides three sets of options for
configuring CiscoSecure Database Replication:
•
Replication Components Options, page 8-17
•
Outbound Replication Options, page 8-18
•
Inbound Replication Options, page 8-20
Replication Components Options
You can specify both the CiscoSecure database components that a
Cisco Secure ACS sends as a primary Cisco Secure ACS and the components that
it receives as a secondary Cisco Secure ACS.
Note
The CiscoSecure database components received by a secondary
Cisco Secure ACS overwrite the CiscoSecure database components on the
secondary Cisco Secure ACS. Any information unique to the overwritten
database component is lost.