Chapter 8
Establishing Cisco Secure ACS System Configuration
Database Replication Logging
Replication Options
Replication Components Options
Note
78-14696-01, Version 3.1
Cisco Secure ACS logs all replication events—whether successful or not—in two
files:
•
The Windows Event Log
The Database Replication report
•
To view the Windows Event Log, use the Windows administration utilities. You
can view recent reports in the Reports and Activity section of Cisco Secure ACS.
For more information about Cisco Secure ACS reports, see
with Logging and Reports."
The Cisco Secure ACS HTML interface provides three sets of options for
configuring CiscoSecure Database Replication:
Replication Components Options, page 8-17
•
•
Outbound Replication Options, page 8-18
Inbound Replication Options, page 8-20
•
You can specify both the CiscoSecure database components that a
Cisco Secure ACS sends as a primary Cisco Secure ACS and the components that
it receives as a secondary Cisco Secure ACS.
The CiscoSecure database components received by a secondary
Cisco Secure ACS overwrite the CiscoSecure database components on the
secondary Cisco Secure ACS. Any information unique to the overwritten
database component is lost.
User Guide for Cisco Secure ACS for Windows Server
CiscoSecure Database Replication
Chapter 9, "Working
8-17