Inbound replication options – Cisco 3.3 User Manual

Page 343

Advertising
background image

9-15

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

Chapter 9 System Configuration: Advanced

CiscoSecure Database Replication

Inbound Replication Options

You can specify the primary Cisco Secure ACSes from which a secondary
Cisco Secure ACS accepts replication. This option appears in the Inbound
Replication table on the CiscoSecure Database Replication page.

The Accept replication from list controls which Cisco Secure ACSes the current
Cisco Secure ACS does accept replicated components from. The list contains the
following options:

Any Known CiscoSecure ACS Server—If this option is selected,
Cisco Secure ACS accepts replicated components from any Cisco Secure
ACS configured in the AAA Servers table in Network Configuration.

Other AAA servers—The list displays all the AAA servers configured in the
AAA Servers table in Network Configuration. If a specific AAA server name
is selected, Cisco Secure ACS accepts replicated components only from the
Cisco Secure ACS specified.

Note

Cisco Secure ACS does not support bidirectional database replication. A
secondary Cisco Secure ACS receiving replicated components verifies that the
primary Cisco Secure ACS is not on its Replication list. If not, the secondary
Cisco Secure ACS accepts the replicated components. If so, it rejects the
components.

For more information about the AAA Servers table in Network Configuration, see

AAA Server Configuration, page 4-21

.

Implementing Primary and Secondary Replication Setups on
Cisco Secure ACSes

If you implement a replication scheme that uses cascading replication, the
Cisco Secure ACS configured to replicate only when it has received replicated
components from another Cisco Secure ACS acts both as a primary Cisco Secure
ACS and as a secondary Cisco Secure ACS. First, it acts as a secondary
Cisco Secure ACS while it receives replicated components, and then it acts as a
primary Cisco Secure ACS while it replicates components to other Cisco Secure
ACSes. For an illustration of cascade replication, see

Figure 9-1

.

Advertising