Solved

Cisco ACS propagation to secondaries in cluster

Posted on 2016-10-21
2
56 Views
Last Modified: 2016-10-22
I recently added some secondaries into a TACACS cluster. I was under the impression that most everything would be propagated from the primary to the secondaries. Some items did - like the network devices and AAA clients, root CA, user, LDAP, AD configuration. But other things like Access Policies and Policy Elements did not. Does anyone know why these might not have propagated to the secondaries?

In earlier versions - long ago - of ACS you could select what you did or did not want propagated. But I no longer see that in 5.4 code.
0
Comment
Question by:amigan_99
2 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 41855353
Everything apart from device-specific certificates should replicate to the secondaries. If you force replication to the secondaries each box should pull everything from the primary.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 41855368
You're right! The issue turns out to be browser-related. And interestingly it was not consistent. Using the same browser you could see the replicated policies on one ACS secondary and not another. AND those two secondaries were at the same code and patch revisions. Changing to Chrome let me see the replicated policy information although later I realized there are tech notes which specify you should use Explorer or an earlier version of Mozilla Firefox. Now I know. Thank you.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
capture pcap with filtered traffic 1 62
Stuck in INIT/DROTHER 2 23
Cisco ASA 5505 Login issues 2 38
Cisco Policy based routing 2 40
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question