Chapter 8 Establishing Cisco Secure ACS System Configuration
CiscoSecure Database Replication
8-10
User Guide for Cisco Secure ACS for Windows Server
78-14696-01, Version 3.1
primary Cisco Secure ACS goes out of service, incoming requests are
authenticated without network downtime, provided that your AAA clients are
configured to failover to the secondary Cisco Secure ACS.
Database replication allows you to do the following:
•
Select the parts of the primary Cisco Secure ACS configuration to be
replicated.
•
Control the timing of the replication process, including creating schedules
•
Export selected configuration items from the primary Cisco Secure ACS.
•
Securely transport selected configuration data from the primary
Cisco Secure ACS to one or more secondary Cisco Secure ACSes.
•
Update the secondary Cisco Secure ACSes to create matching configurations.
The following items cannot be replicated:
•
IP pool definitions (for more information, see
About IP Pools Server,
page 8-60
)
•
Cisco Secure ACS certificate and private key files
•
External user database configuration
•
Unknown user group mapping configuration
•
User-defined RADIUS dictionaries (for more information, see
Important
Implementation Considerations, page 8-15
)
•
Settings on the ACS Service Management page in the System Configuration
section
•
All external user database configurations
•
All logging configurations
•
RDBMS Synchronization settings
•
Third-party software, such as Novell Requestor or RSA ACE client software