8-13
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Chapter8 Establishing Cisco Secure ACS System Configuration CiscoSecure Database Replication
Replication OptionsThe Cisco Secure ACS HTML interface provides three sets of options for
configuring CiscoSecure Database Replication:
•Replication Components Options, page 8-13
•Replication Scheduling Options, page 8-14
•Replication Partners Options, page 8-15
Replication Components Options
You can specify both the CiscoSecure database components that a
Cisco Secure ACS server sends as a primary Cisco Secure ACS server and the
components that it receives as a secondary Cisco Secure ACS server. To create a
mirror system, all items must be selected.
Note The CiscoSecure database components received by a secondary
Cisco Secure ACS server overwrite the secondary Cisco Secure ACS server’s
own CiscoSecure database components. Any information unique to the
overwritten database component is lost.
The options that control the components replicated appear in the Replication
Components table on the CiscoSecure Database Replication page and are as
follows:
•User and group database—Replicate the information for groups and users.
•AAA Servers and AAA Clients tables—Replicate the AAA Servers tables
and the AAA Clients tables in the Network Configuration section.
•Distribution table—Replicate the Proxy Distribution Table in the Network
Configuration section.
•Interface configuration—Replicate the Advanced Options settings from the
Interface Configuration section.
•Interface security settings—Replicate the security information for the
Cisco Secure ACS HTML interface.
•Password validation settings—Replicate the password validation settings.