Cisco 3.3 User Manual
Page 344
Chapter 9 System Configuration: Advanced
CiscoSecure Database Replication
9-16
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
To implement primary and secondary replication setups on Cisco Secure ACSes,
follow these steps:
Step 1
On each secondary Cisco Secure ACS, follow these steps:
a.
In the Network Configuration section, add the primary Cisco Secure ACS to
the AAA Servers table.
For more information about adding entries to the AAA Servers table, see
AAA Server Configuration, page 4-21
b.
Configure the secondary Cisco Secure ACS to receive replicated components.
For instructions, see
Configuring a Secondary Cisco Secure ACS, page 9-17
.
Step 2
On the primary Cisco Secure ACS, follow these steps:
a.
In the Network Configuration section, add each secondary Cisco Secure ACS
to the AAA Servers table.
Note
If you intend to use cascading replication to replicate network
configuration device tables, you must configure the primary
Cisco Secure ACS with all Cisco Secure ACSes that will receive
replicated database components, regardless of whether they receive
replication directly or indirectly from the primary Cisco Secure ACS.
For example, if the primary Cisco Secure ACS replicates to two
secondary Cisco Secure ACSes which, in turn, each replicate to two
more Cisco Secure ACSes, the primary Cisco Secure ACS must have
AAA server configurations for all six Cisco Secure ACSes that will
receive replicated database components.
For more information about adding entries to the AAA Servers table, see
AAA Server Configuration, page 4-21
b.
If you want to replicate according to a schedule, at intervals, or whenever the
primary Cisco Secure ACS has received replicated components from another
Cisco Secure ACS, see
Scheduling Replication, page 9-21
c.
If you want to initiate replication immediately, see