Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 491
CH A P T E R 17-1 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 17 Configuring System Operations You can configure and deploy ACS instances so that one ACS instance becomes the primary instance and the other ACS instances can be registered to the primary as secondary instances. An ACS instance represents ACS software that runs on a network. An ACS deployment may consist of a single instance, or multiple instances deployed in a distributed manner, where all instances in a system...
Page 492
17-2 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Understanding Distributed Deployment Understanding Distributed Deployment You can configure multiple ACS servers in a deployment. Within any deployment, you designate one server as the primary server and all the other servers are secondary servers. In general, you make configuration changes on the primary server only, and the changes are propagated to all secondary servers, which can...
Page 493
17-3 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Understanding Distributed Deployment NoteACS 5.3 does not support the large deployment with more than ten ACS instances (one primary and nine secondaries). For more information on ACS server deployments, see: http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_system/5.3/installation/gui de/csacs_deploy.html. Related Topics Activating Secondary Servers, page 17-3...
Page 494
17-4 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Understanding Distributed Deployment Understanding Distributed Deployment, page 17-2 Promoting a Secondary Server There can be one server only that is functioning as the primary server. However, you can promote a secondary server so that is assumes the primary role for all servers in the deployment. The promotion operation is performed either on the secondary server that is to assume...
Page 495
17-5 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Understanding Distributed Deployment Understanding Full Replication Under normal circumstances, each configuration change is propagated to all secondary instances. Unlike ACS 4.x where full replication was performed, in ACS 5.3, only the specific changes are propagated. As configuration changes are performed, the administrator can monitor (on the Distributed System Management page)...
Page 496
17-6 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Scheduled Backups Using the Deployment Operations Page to Create a Local Mode Instance, page 17-22 Scheduled Backups You can schedule backups to be run at periodic intervals. You can schedule backups from the primary web interface or through the local CLI. The Scheduled Backups feature backs up ACS configuration data. You can back up data from an earlier version of ACS and restore it...
Page 497
17-7 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Backing Up Primary and Secondary Instances Step 2Click Submit to schedule the backup. Related Topic Backing Up Primary and Secondary Instances, page 17-7 Backing Up Primary and Secondary Instances ACS provides you the option to back up the primary and secondary instances at any time apart from the regular scheduled backups. For a primary instance, you can back up the following: ACS...
Page 498
17-8 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Synchronizing Primary and Secondary Instances After Backup and Restore Step 4Click Submit to run the backup immediately. Related Topic Scheduled Backups, page 17-6 Synchronizing Primary and Secondary Instances After Backup and Restore When you specify that a system backup is restored on a primary instance, the secondary instance is not updated to the newly restored database that is...
Page 499
17-9 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Editing Instances The Distributed System Management page appears with two tables: Primary Instance table—Shows the primary instance. The primary instance is created as part of the installation process. Secondary Instances table—Shows a listing and the status of the secondary instances. See Vi ew i n g and Editing a Secondary Instance, page 17-12 for more information. The Distributed...
Page 500
17-10 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 17 Configuring System Operations Editing Instances Step 2From the Primary Instance table, click the primary instance that you want to modify, or check the Name check box and click Edit. Step 3Complete the fields in the Distributed System Management Properties page as described inTable 17-5: Replication Time Time stamp of the last replication. The time stamp is in the form hh:mm dd:mm:yyyy. Version Current version of...