8-7
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter8 Establishing Cisco Secure ACS System Configuration CiscoSecure Database Replication
these secondary Cisco Secure ACS servers if the primary Cisco Secure ACS
server fails or is unreachable. With a secondary CiscoSecure ACS server whose
CiscoSecure database is a replica of the primary Cisco Secure ACS server’s
CiscoSecure database, if the primary Cisco Secure ACS server goes out of
service, incoming requests are authenticated without network downtime, provided
that your AAA clients are configured to failover to the secondary
Cisco Secure ACS server.
Database replication allows you to do the following:
•Select the parts of the primary Cisco Secure ACS servers’s configuration to
be replicated
•Control the timing of the replication process, including creating schedules
•Export selected configuration items from the primary system
•Securely transport selected configuration data from the primary
Cisco Secure ACS server to one or more secondary Cisco Secure ACS
servers
•Update the secondary Cisco Secure ACS servers to create matching
configurations
With regard to database replication, we make the following distinctions about
Cisco Secure ACS servers:
•Primary Cisco Secure ACS server—A Cisco Secure ACS server that sends
replicated CiscoSecure database components to other Cisco Secure ACS
servers.
•Secondary Cisco Secure ACS server—A Cisco Secure ACS server that
receives replicated CiscoSecure database components from a primary
Cisco Secure ACS server. In the HTML interface, these are identified as
replication partners.
A Cisco Secure ACS server can be both a primary server and a secondary server,
provided that it is not configured to be a secondary server to a Cisco Secure ACS
server for which it performs as a primary server. Bidirectional replication,
wherein an Cisco Secure ACS server both sends database components to and
receives database components from the same remote CiscoSecure ACS server, is
not supported.