- Cisco Secure Access Control System 5.4 Manual

17-14
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Chapter 17 Configuring System Operations
Activating a Secondary Instance
Activating a Secondary Instance
To activate a secondary instance:
Step 1 Choose System Administration > Operations > Distributed System Management.
The Distributed System Management page appears with two tables:
Primary Instance tableShows the primary instance.
Secondary Instances tableShows a listing and the status of the secondary instances registered to
the primary instance.
See the Table 17-4 to view column descriptions.
Step 2 From the Secondary Instances table, check the check box near the secondary instances that you want to
activate.
Step 3 Click Activate.
Step 4 The Secondary Instances table on the Distributed System Management page appears with the activated
secondary instance. See the Table 17-5 for valid field options.
Related Topics
Viewing and Editing a Secondary Instance, page 17-13
Deleting a Secondary Instance, page 17-13
Replicating a Secondary Instance from a Primary Instance, page 17-19
Registering a Secondary Instance to a Primary Instance, page 17-14
Deregistering a Secondary Instance from the Deployment Operations Page, page 17-17
Promoting a Secondary Instance from the Distributed System Management Page, page 17-18
Using the Deployment Operations Page to Create a Local Mode Instance, page 17-23
Registering a Secondary Instance to a Primary Instance
To register a secondary instance to a primary instance:
Step 1 Log into the machine that will be used as a secondary Instance for another ACS server.
Step 2 Choose System Administration > Operations > Local Operations > Deployment Operations.
The Deployment Operations page appears, displaying the information described in Table 17-6: