Solved

Cisco ACS TACACS server - adding a secondary

Posted on 2016-10-07
2
91 Views
Last Modified: 2016-10-08
If I go to System Administration/local operations/Deployment Options on a new Cisco ACS - I can enter the Ip address of the primary member of the cluster and the user ID ACSadmin and password and the secondary should add itself to the cluster. But there is a popup message saying this will happen only if the primary is setup to accept this. The exact phrasing is seen in the attachment.

If I go onto the primary ACS server I'm not spotting anywhere that says "If a secondary decides to join me - automatically activate and complete the registration". Is that just the default behavior? I don't have a place to lab this out and want the adding of the secondary to production to go as smoothly as possible. Thank you.
ScrnGrab04-161007-16.13.jpg
0
Comment
Question by:amigan_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 41835229
IIRC the secondary will register automatically by default.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 41835257
Good news for me! Simple is good.
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question