Cisco 3.3 User Manual

Page 334

Advertising
background image

Chapter 9 System Configuration: Advanced

CiscoSecure Database Replication

9-6

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

c.

The secondary Cisco Secure ACS resumes its authentication service.

Cisco Secure ACS can act as both a primary Cisco Secure ACS and a secondary
Cisco Secure ACS.

Figure 9-1

shows a cascading replication scenario. Server 1

acts only as a primary Cisco Secure ACS, replicating to servers 2 and 3, which act
as secondary Cisco Secure ACSes. After replication from server 1 to server 2 has
completed, server 2 acts as a primary Cisco Secure ACS while replicating to
servers 4 and 5. Similarly, server 3 acts as a primary Cisco Secure ACS while
replicating to servers 6 and 7.

Note

If you intend to use cascading replication to replicate network configuration
device tables, you must configure the primary Cisco Secure ACS with all
Cisco Secure ACSes that will receive replicated database components, regardless
of whether they receive replication directly or indirectly from the primary
Cisco Secure ACS. In

Figure 9-1

, server 1 must have an entry in its AAA Servers

table for each of the other six Cisco Secure ACSes. If this is not done, after
replication, servers 2 and 3 do not have servers 4 through 7 in their AAA Servers
tables and replication will fail.

If server 2 were configured to replicate to server 1 in addition to receiving
replication from server 1, replication to server 2 would fail. Cisco Secure ACS
cannot support such a configuration, known as bidirectional replication. To
safeguard against this, a secondary Cisco Secure ACS aborts replication when its
primary Cisco Secure ACS appears on its Replication list.

Figure 9-1

Cascading Database Replication

67473

Server 1

Server 2

Server 3

Server 4

Server 5

Server 6

Server 7

Advertising