?
Solved

Cisco ACS TACACS server - adding a secondary

Posted on 2016-10-07
2
Medium Priority
?
124 Views
Last Modified: 2016-10-08
If I go to System Administration/local operations/Deployment Options on a new Cisco ACS - I can enter the Ip address of the primary member of the cluster and the user ID ACSadmin and password and the secondary should add itself to the cluster. But there is a popup message saying this will happen only if the primary is setup to accept this. The exact phrasing is seen in the attachment.

If I go onto the primary ACS server I'm not spotting anywhere that says "If a secondary decides to join me - automatically activate and complete the registration". Is that just the default behavior? I don't have a place to lab this out and want the adding of the secondary to production to go as smoothly as possible. Thank you.
ScrnGrab04-161007-16.13.jpg
0
Comment
Question by:amigan_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 47

Accepted Solution

by:
Craig Beck earned 2000 total points
ID: 41835229
IIRC the secondary will register automatically by default.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 41835257
Good news for me! Simple is good.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question