Cisco Systems 3.3 Server User Manual


 
Chapter 9 System Configuration: Advanced
CiscoSecure Database Replication
9-10
User Guide for Cisco Secure ACS for Windows Server
78-16592-01
of settings using user-defined RADIUS vendors and VSAs is supported. For
more information about user-defined RADIUS vendors and VSAs, see
Custom RADIUS Vendors and VSAs, page 9-28.
Database Replication Versus Database Backup
Do not confuse database replication with system backup. Database replication
does not replace System Backup. While both features protect against partial or
complete server loss, each feature addresses the issue in a different way.
System Backup archives data into a format that you can later use to restore the
configuration if the system fails or the data becomes corrupted. The backup data
is stored on the local hard drive and can be copied and removed from the system
for long-term storage. You can store several generations of database backup files.
CiscoSecure Database Replication enables you to copy various components of the
CiscoSecure database to other Cisco Secure ACSes. This can help you plan a
failover AAA architecture and can reduce the complexity of your configuration
and maintenance tasks. While it is unlikely, it is possible that CiscoSecure
Database Replication can propagate a corrupted database to the Cisco Secure
ACSes that generate your backup files.
Caution Because the possibility of replicating a corrupted database always exists, we
strongly recommend that you implement a backup plan, especially in
mission-critical environments. For more information about backing up
Cisco Secure ACS or the CiscoSecure database, see Cisco Secure ACS Backup,
page 8-9 and Appendix D, “CSUtil Database Utility”.
Database Replication Logging
Cisco Secure ACS logs all replication events—whether successful or not—in two
files:
The Windows Event Log
The Database Replication report
To view the Windows Event Log, use the Windows administration utilities. You
can view recent reports in the Reports and Activity section of Cisco Secure ACS.