8-9
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter8 Establishing Cisco Secure ACS System Configuration CiscoSecure Database Replication
After the preceding events on the primary Cisco Secure ACS server, the database
replication process continues on the secondary Cisco Secure ACS server as
follows:
1. The secondary Cisco Secure ACS server receives the compressed, encrypted
copy of the primary Cisco Secure ACS servers CiscoSecure database
components. After transmission of the database components is complete, the
secondary Cisco Secure ACS server uncompresses the database components.
2. The secondary Cisco Secure ACS server stops its authentication service and
replaces its database components with the database components it received
from the primary Cisco Secure ACS server. During this step, if AAA clients
are configured properly, those that usually use the secondary
Cisco Secure ACS server failover to another Cisco Secure ACS server.
3. The secondary Cisco Secure ACS server resumes its authentication service.
A Cisco Secure ACS server can act as both a primary server and a secondary
server. Figure8-1 shows a cascading replication scenario. Server 1 acts only as a
primary Cisco Secure ACS server, replicating to servers 2 and 3, which act as
secondary Cisco Secure ACS servers. After replication from server 1 to server 2
has completed, server 2 acts as a primary Cisco Secure ACS server while
replicating to servers 4 and 5. Similarly, server 3 acts as a primary
Cisco Secure ACS server while replicating to servers 6 and 7.
Figure 8-1 Cascading Database Replication
67473
Server 1
Server 2
Server 3
Server 4
Server 5
Server 6
Server 7