
Chapter 8 Establishing Cisco Secure ACS System Configuration
CiscoSecure Database Replication
8-22
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
The CiscoSecure Database Replication feature requires that you configure
specific Cisco Secure ACSes to act as secondary Cisco Secure ACSes. The
components that a secondary Cisco Secure ACS is to receive must be explicitly
specified, as must be its primary Cisco Secure ACS.
Replication is always initiated by the primary Cisco Secure ACS. For more
information about sending replication components, see
Replicating Immediately,
page 8-24
, or
Scheduling Replication, page 8-26
.
Caution
The CiscoSecure database components received by a secondary
Cisco Secure ACS overwrite the CiscoSecure database components on the
secondary Cisco Secure ACS. Any information unique to the overwritten
database component is lost.
Before You Begin
Ensure correct configuration of the AAA Servers table in the secondary
Cisco Secure ACS. This secondary Cisco Secure ACS must have an entry in its
AAA Servers table for each of its primary Cisco Secure ACSes. Also, the AAA
Servers table entry for each primary Cisco Secure ACS must have the same shared
secret that the primary Cisco Secure ACS has for its own entry in its AAA Servers
table. For more information about the AAA Servers table, see
AAA Server
Configuration, page 4-20
.
To configure a Cisco Secure ACS to be a secondary Cisco Secure ACS, follow
these steps:
Step 1
Log in to the HTML interface on the secondary Cisco Secure ACS.
Step 2
In the navigation bar, click System Configuration.
Step 3
Click CiscoSecure Database Replication.
Result: The Database Replication Setup page appears.
Step 4
In the Replication Components table, select the Receive check box for each
database component to be received from a primary Cisco Secure ACS.
For more information about replication components, see
Replication Components
Options, page 8-17
.