06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ACS Internal Database Replication<br />

8-8<br />

Table 8-1 Replication Component Descriptions<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 8 System Configuration: Advanced<br />

Component What Gets Replicated?<br />

<strong>User</strong> and group database Groups and users. Excludes the use of the Group database<br />

only option.<br />

Group database only Groups, but not <strong>for</strong> users. Excludes the use of the <strong>User</strong> and<br />

group database option.<br />

Network Configuration Device<br />

tables 1<br />

AAA <strong>Server</strong>s tables, the AAA Clients tables, in the Network<br />

Configuration section, Key Wrap keys as part of host<br />

configuration or Network Device Groups (NDG) and Remote<br />

Agents configuration. This option also controls whether<br />

NDGs are replicated.<br />

Distribution table Proxy Distribution Table in the Network Configuration<br />

section.<br />

Interface configuration Advanced Options settings, RADIUS settings, and<br />

TACACS+ settings from the Interface Configuration section.<br />

Interface security settings Administrators and security in<strong>for</strong>mation <strong>for</strong> the ACS web<br />

interface, password policy, including the password history<br />

and the parts of the global system configuration that<br />

configures the history.<br />

Password validation settings Password validation settings.<br />

EAP-FAST master keys and policies Active and retired master keys and policies <strong>for</strong> EAP-FAST.<br />

Network <strong>Access</strong> Profiles 2<br />

A collaboration of configuration settings. These include:<br />

Network <strong>Access</strong> Profiles, Posture Validation settings, AAA<br />

clients and hosts, external user database configuration, global<br />

authentication configuration, NDGs, user-defined RADIUS<br />

dictionaries, shared profile components, logging<br />

configuration 3 , GAME Group Feed back configuration,<br />

databases <strong>for</strong> MAC Authentication Bypass, EAP-TLS <strong>for</strong><br />

PEAP configuration, EAP-TLS configuration, and Key Wrap<br />

allowed configuration.<br />

Logging Configuration<br />

(Enable/Disable Settings)<br />

Logging configuration settings from the System<br />

Configuration section.<br />

1. If you intend to use cascading replication to replicate network configuration device tables, you must configure the primary<br />

ACS with all ACSs that will receive replicated database components, regardless of whether they receive replication directly<br />

or indirectly from the primary ACS. For example, if the primary ACS replicates to two secondary ACSs that, in turn, each<br />

replicate to two more ACSs, the primary ACS must have AAA server configurations <strong>for</strong> all six ACSs that will receive<br />

replicated database components.<br />

2. Replication of Network <strong>Access</strong> Profiles contradicts the replication of Network Configuration Device tables; there<strong>for</strong>e, do not<br />

check both of these components at the same time. NAP settings will override all other settings. Dynamically mapped users<br />

are not replicated, only statically added users are replicated.<br />

3. When you replicate logging configurations between ACS <strong>for</strong> Windows and ACS SE, only the logger configurations that the<br />

receiving ACS supports are replicated. For example, ODBC logging configurations will not be replicated on an ACS SE.<br />

Note For interface security settings configuration replication: the activity limitation and locking as well as<br />

timezone are specified and evaluated on the master ACS and replicated. This replication may lead to<br />

unexpected behavior on the replica.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!