Cisco 3.3 User Manual

Page 344

Advertising
background image

Chapter 9 System Configuration: Advanced

CiscoSecure Database Replication

9-16

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

To implement primary and secondary replication setups on Cisco Secure ACSes,
follow these steps:

Step 1

On each secondary Cisco Secure ACS, follow these steps:

a.

In the Network Configuration section, add the primary Cisco Secure ACS to
the AAA Servers table.

For more information about adding entries to the AAA Servers table, see

AAA Server Configuration, page 4-21

.

b.

Configure the secondary Cisco Secure ACS to receive replicated components.
For instructions, see

Configuring a Secondary Cisco Secure ACS, page 9-17

.

Step 2

On the primary Cisco Secure ACS, follow these steps:

a.

In the Network Configuration section, add each secondary Cisco Secure ACS
to the AAA Servers table.

Note

If you intend to use cascading replication to replicate network
configuration device tables, you must configure the primary
Cisco Secure ACS with all Cisco Secure ACSes that will receive
replicated database components, regardless of whether they receive
replication directly or indirectly from the primary Cisco Secure ACS.
For example, if the primary Cisco Secure ACS replicates to two
secondary Cisco Secure ACSes which, in turn, each replicate to two
more Cisco Secure ACSes, the primary Cisco Secure ACS must have
AAA server configurations for all six Cisco Secure ACSes that will
receive replicated database components.

For more information about adding entries to the AAA Servers table, see

AAA Server Configuration, page 4-21

.

b.

If you want to replicate according to a schedule, at intervals, or whenever the
primary Cisco Secure ACS has received replicated components from another
Cisco Secure ACS, see

Scheduling Replication, page 9-21

.

c.

If you want to initiate replication immediately, see

Replicating Immediately,

page 9-19

.

Advertising