beautypg.com

Scheduling replication – Cisco 3.3 User Manual

Page 349

background image

9-21

User Guide for Cisco Secure ACS for Windows Server

78-16592-01

Chapter 9 System Configuration: Advanced

CiscoSecure Database Replication

Note

Replication only occurs when the database of the primary Cisco Secure
ACS has changed since the last successful replication. You can force
replication to occur by making one change to a user or group profile, such
as changing a password or RADIUS attribute.

Scheduling Replication

You can schedule when a primary Cisco Secure ACS sends its replicated database
components to a secondary Cisco Secure ACS. For more information about
replication scheduling options, see

Outbound Replication Options, page 9-12

.

Note

Replication cannot occur until the secondary Cisco Secure ACSes are configured
properly. For more information, see

Configuring a Secondary Cisco Secure ACS,

page 9-17

.

Before You Begin

Ensure correct configuration of the primary and secondary Cisco Secure ACSes.
For detailed steps, see

Implementing Primary and Secondary Replication Setups

on Cisco Secure ACSes, page 9-15

.

For each secondary Cisco Secure ACS of this primary Cisco Secure ACS, ensure
that you have completed the steps in

Configuring a Secondary Cisco Secure ACS,

page 9-17

.

To schedule when a primary Cisco Secure ACS replicates to its secondary
Cisco Secure ACSes, follow these steps:

Step 1

Log in to the HTML interface on the primary Cisco Secure ACS.

Step 2

In the navigation bar, click System Configuration.

Step 3

Click CiscoSecure Database Replication.