Solved

Cisco ACS propagation to secondaries in cluster

Posted on 2016-10-21
2
61 Views
Last Modified: 2016-10-22
I recently added some secondaries into a TACACS cluster. I was under the impression that most everything would be propagated from the primary to the secondaries. Some items did - like the network devices and AAA clients, root CA, user, LDAP, AD configuration. But other things like Access Policies and Policy Elements did not. Does anyone know why these might not have propagated to the secondaries?

In earlier versions - long ago - of ACS you could select what you did or did not want propagated. But I no longer see that in 5.4 code.
0
Comment
Question by:amigan_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 41855353
Everything apart from device-specific certificates should replicate to the secondaries. If you force replication to the secondaries each box should pull everything from the primary.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 41855368
You're right! The issue turns out to be browser-related. And interestingly it was not consistent. Using the same browser you could see the replicated policies on one ACS secondary and not another. AND those two secondaries were at the same code and patch revisions. Changing to Chrome let me see the replicated policy information although later I realized there are tech notes which specify you should use Explorer or an earlier version of Mozilla Firefox. Now I know. Thank you.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question