Chapter8 E stablishing CiscoSecure ACS System Configuration
CiscoSecure Database Replication
8-16
Cisco Secure ACS 3.0 for Windows 2000/NT Servers User Guide
78-13751-01, Version 3.0
Implementing Primary and Secondary Replication Setups on Cisco Secure ACS Servers
If you implement a replication scheme that uses cascading replication, the
Cisco Secure ACS server configured to replicate only when it has received
replicated components from another Cisco Secure ACS server acts both as a
primary Cisco Secure ACS server and as a secondary Cisco Secure ACS server.
First, it acts as a secondary Cisco Secure ACS server while it receives replicated
components, and then it acts as a primary Cisco Secure ACS while it replicates
components to other Cisco Secure ACS servers. For an illustration of cascade
replication, see Figure 8-1 on page 8-9.
To implement primary and secondary replication setups on CiscoSecure ACS
servers, follow these steps:
Step 1 On each secondary Cisco Secure ACS server, follow these steps:
a. In the Network Configuration section, add the primary CiscoSecure ACS
server to the AAA Servers table.
For more information about adding entries to the AAA Servers table, see the
AAA Server Configuration section on page4-15.
b. Configure the secondary Cisco Secure ACS server to receive replicated
components. For instructions, see the Configuring a Secondary
Cisco Secure ACS Server section on page 8-17.
Step 2 On the primary Cisco Secure ACS server, follow these steps:
a. In the Network Configuration section, add each secondary Cisco Secure ACS
server to the AAA Servers table.
For more information about adding entries to the AAA Servers table, see the
AAA Server Configuration section on page4-15.
b. To replicate according to a schedule, at intervals, or whenever the primary
Cisco Secure ACS server has received replicated components from another
Cisco Secure ACS server, see the Scheduling Replication section on
page 8-20.
c. To initiate replication immediately, see the Replicating Immediately
section on page 8-18.