This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • Re: Is RSA secure ID appliance replication from primary appliance to replica appliance rely only on ...
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
JUNXIAZHANG
JUNXIAZHANG Beginner
Beginner
‎2018-02-14 03:17 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Is RSA secure ID appliance replication from primary appliance to replica appliance rely only on primary LAN?

Jump to solution

We have RSA Authentication manager version 8.2.1 installed on three RSA hardware appliances(RSA SecureID AM8 Intel Appliance 250), one primary and two replica appliances.Each appliance has dual LAN and connected to two different local area networks.
All eth0 of appliances are connected to LAN A and all eth1 are connected to LAN B.IP address of eth0 is set as primary IP address and eth1 address as Alternative IP Address in Advanced Settings
under Security Console.

One day, LAN A was down and we noticed that replications from primary to replica appliances were not success.At that time LAN B was still up and we can authenticate through LAN B without a problem.
After LAN A was up, the replication process success again.Can I assume that RSA replication process rely only on primary IP address(LAN A)?.Is it the normal characteristics of RSA appliances?. If not,
I would like to know how to setup the appliances so that they can still replicate through LAN B, if primary LAN A is down.

Labels (1)
Labels
  • Labels:
  • RSA Authentication Manager

  • Tags:
  • AM
  • Auth Manager
  • Authentication Manager
  • Community Thread
  • Discussion
  • Forum Thread
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • rsa securid authentication manager
  • SecurID
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
1 Solution

Accepted Solutions
SGTech
SGTech Respected Contributor
Respected Contributor
‎2018-02-14 04:54 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hi JUNXIA ZHANG,

 

I will try to answer your question up to my knowledge.

Alternative IP is more for authentication purpose. So replication will happen via primary interface.

 

Hi RSA Team,

 

Please correct me if I am wrong.

 

thanks

Rajesh

View solution in original post

3 Likes
Share
Reply
4 Replies
SGTech
SGTech Respected Contributor
Respected Contributor
‎2018-02-14 04:54 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hi JUNXIA ZHANG,

 

I will try to answer your question up to my knowledge.

Alternative IP is more for authentication purpose. So replication will happen via primary interface.

 

Hi RSA Team,

 

Please correct me if I am wrong.

 

thanks

Rajesh

3 Likes
Share
Reply
PiersB
Trusted Contributor PiersB Trusted Contributor
Trusted Contributor
‎2018-02-14 12:33 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

The comment from Rajesh (MTech Products) is correct. The Alternate IP Addresses are provided to agent's and used as an alternate address to which authentication requests can be sent.

 

Some customers use the secondary NIC for administrative or restricted SSH access. For this reason, the system, by default, does not configure routing of network traffic between the two NICs. This is certainly something that could be configured.

4 Likes
Share
Reply
JUNXIAZHANG
JUNXIAZHANG Beginner
Beginner
In response to PiersB
‎2018-02-18 11:26 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hi Piers Bowness,

Thank you for the information.

0 Likes
Share
Reply
JUNXIAZHANG
JUNXIAZHANG Beginner
Beginner
In response to SGTech
‎2018-02-18 11:26 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hi Rajesh,

Thank you for the information.

0 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.