06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 8 System Configuration: Advanced<br />

OL-14386-02<br />

ACS Internal Database Replication<br />

Caution Because the possibility of replicating a corrupted database always exists, we strongly recommend that<br />

you implement a backup plan, especially in mission-critical environments. For more in<strong>for</strong>mation about<br />

backing up the ACS internal database, see ACS Backup, page 7-8. For additional in<strong>for</strong>mation (ACS <strong>for</strong><br />

Windows), see Appendix C, “CSUtil Database Utility.”<br />

Database Replication Logging<br />

Replication Options<br />

ACS logs all replication events—regardless of whether they are successful—in two files. The:<br />

Windows Event Log<br />

Replication Components Options<br />

Database Replication report<br />

To view the Windows Event Log, use the Windows administration utilities. You can view recent reports<br />

in the Reports and Activity section of ACS.<br />

For more in<strong>for</strong>mation about ACS reports, see Chapter 1, “Overview.”<br />

The ACS web interface provides three sets of options <strong>for</strong> configuring ACS Database Replication.<br />

This section contains:<br />

Replication Components Options, page 8-7<br />

Outbound Replication Options, page 8-9<br />

Inbound Replication Options, page 8-10<br />

You can specify the ACS internal database components that an ACS sends as a primary ACS and the<br />

components that it receives as a secondary ACS.<br />

For increased security, you might want to have one ACS always be the sender and the other ACSs always<br />

be the receivers. You can use this method to ensure that all your ACSs are configured identically.<br />

Note The ACS internal database components that a secondary ACS receives overwrite the ACS internal<br />

database components on the secondary ACS. Any in<strong>for</strong>mation that is unique to the overwritten database<br />

component is lost. For example, if the Receive check box is selected <strong>for</strong> the <strong>User</strong> and Group Database,<br />

any existing user or group records are lost on replication when the new ACS internal database is received.<br />

Table 8-1 describes the Replication Components table on the ACS Database Replication page and<br />

describes the component options that are replicated.<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

8-7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!