Solved

Cisco ACS propagation to secondaries in cluster

Posted on 2016-10-21
2
53 Views
Last Modified: 2016-10-22
I recently added some secondaries into a TACACS cluster. I was under the impression that most everything would be propagated from the primary to the secondaries. Some items did - like the network devices and AAA clients, root CA, user, LDAP, AD configuration. But other things like Access Policies and Policy Elements did not. Does anyone know why these might not have propagated to the secondaries?

In earlier versions - long ago - of ACS you could select what you did or did not want propagated. But I no longer see that in 5.4 code.
0
Comment
Question by:amigan_99
2 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 41855353
Everything apart from device-specific certificates should replicate to the secondaries. If you force replication to the secondaries each box should pull everything from the primary.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 41855368
You're right! The issue turns out to be browser-related. And interestingly it was not consistent. Using the same browser you could see the replicated policies on one ACS secondary and not another. AND those two secondaries were at the same code and patch revisions. Changing to Chrome let me see the replicated policy information although later I realized there are tech notes which specify you should use Explorer or an earlier version of Mozilla Firefox. Now I know. Thank you.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now