Solved

Cisco ACS TACACS server - adding a secondary

Posted on 2016-10-07
2
78 Views
Last Modified: 2016-10-08
If I go to System Administration/local operations/Deployment Options on a new Cisco ACS - I can enter the Ip address of the primary member of the cluster and the user ID ACSadmin and password and the secondary should add itself to the cluster. But there is a popup message saying this will happen only if the primary is setup to accept this. The exact phrasing is seen in the attachment.

If I go onto the primary ACS server I'm not spotting anywhere that says "If a secondary decides to join me - automatically activate and complete the registration". Is that just the default behavior? I don't have a place to lab this out and want the adding of the secondary to production to go as smoothly as possible. Thank you.
ScrnGrab04-161007-16.13.jpg
0
Comment
Question by:amigan_99
2 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 41835229
IIRC the secondary will register automatically by default.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 41835257
Good news for me! Simple is good.
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
RNC Hacking Question 6 45
Clarification about access via WAN 6 35
How to limit traffic to Netscaler 10.5 VIP 3 91
managing a small network 6 97
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question