Solved

how do I rwsstore a backup on ACS

Posted on 2014-12-23
3
101 Views
Last Modified: 2015-01-03
I cannot find anything on how to resotre a backup file to ACS anyone via cli orGUI?
0
Comment
Question by:Shark Attack
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 81

Expert Comment

by:David Johnson, CD, MVP
ID: 40515594
1. What is ACS?
2. What platform?
3. How did you back it up?

You know all of this but we as experts may be good but we can't read your mind.
0
 
LVL 3

Accepted Solution

by:
Shark Attack earned 0 total points
ID: 40521904
ACS Access Control Server used for tacacs or radius server for authentication usually to Access Points. I was able to restore the backup using ftp. Apparently, you cannot use TFTP when backing up and restoring files for ACS particularly.. Files can become corrupt.
0
 
LVL 3

Author Closing Comment

by:Shark Attack
ID: 40528919
ACS Access Control Server used for tacacs or radius server for authentication usually to Access Points. I was able to restore the backup using ftp. Apparently, you cannot use TFTP when backing up and restoring files for ACS particularly.. Files can become corrupt.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question