Cisco Wide Area Application Services Configuration Guide (Software Version 4.0.19)
Index
Downloads: This chapterpdf (PDF - 425.0KB) The complete bookPDF (PDF - 7.67MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -

Index

A

AAA accounting

configuring 6-30

AAA-based management systems 2-25, 6-2

acceleration

about 1-6, 12-1

features 1-6

TCP settings 12-15

accounts

creating 7-4

creation process 7-2

deleting 7-6

local CLI 7-2

roles-based 7-2

types 7-1

viewing 7-8

ACL

See also IP ACL

action

full optimization 12-9

passthrough 12-9

TFO only 12-9

TFO with DRE 12-9

TFO with LZ compression 12-9

types 12-9

activating devices 14-29

adding

print clusters 13-14

printers 13-11

print server to clients 13-23

administrative login authentication and authorization

default 6-4

for WAEs 6-3

local database

description of 6-7

overview of 6-1

RADIUS

overview of 6-13

TACACS+

overview of 6-15

administrative login authentication failover 6-26

aggregate settings

for print servers 13-26

alarm overload detection, enabling 9-19

alarm panel

system home window 15-3

alarms

device reporting 15-6

aliases, for file servers 11-22

allowed protocols 13-30

application acceleration, about 1-6, 12-1

application classifiers

creating 12-4

match condition 12-7

restoring 12-11

application definition

creating 12-2

application list, viewing 12-10

application policies

restoring 12-11

application policy

creating 12-4

creation process 12-2

position 12-13

preparation tasks 12-2

types 12-6

applications

monitoring 12-12, 15-30

application traffic mix chart 15-35

assigning

application to a device 12-4

application to a device group 12-4

core cluster to file server 11-18

devices to a preposition directive 11-29

devices to more than one device group 3-8

assigning devices to device groups 3-5

audit trail logs

viewing 6-32, 15-28

authentication

default feature values 6-4

authentication databases, types of 6-3

authentication servers

configuring 6-13, 6-15

authorization

default feature values 6-4

autodiscover 1-16

autoregistration

DHCP server requirements 2-8

B

backing up

configuration files 10-7

WAAS Central Manager 14-11

WAE devices 14-13

backup and restore

cms database 14-11

banners

configuring 6-10

baseline groups

configuring 3-13

creation process 3-11

customizing 3-12

switching 3-14

types 3-11

working with 3-11

BIC TCP 1-6

bootflags 14-20

browser support 2-10

C

caching, about 1-17

CDP

configuring 5-15

cdp enable command 4-37

cdp run command 4-37

charts

application traffic mix 15-35

pass-through traffic mix 15-36

traffic reduction 15-36

CIFS 1-19, 11-2

Cisco.com

obtaining software files from 14-3

Cisco Discovery Protocol. See CDP

classifier, creating 12-4

classifier report, viewing 12-11

clear ip wccp command 4-1

clear statistics all command 6-25

clear statistics authentication command 6-25

clear statistics windows-domain command 6-25

CLI user

creating 7-4

clock

setting 9-5

clustering in inline mode 4-47

cms database

backup and restore procedure 14-11

cms database backup command 14-11

cms database restore command 14-12

coherency

age-based validation 11-5

compression, about 1-4

conditions

modifying or deleting from IP ACLs 8-7

configuration group 3-3

configuration process 11-8

configuring

administrative login authentication and authorization 6-7

core cluster 11-9

edge device 11-12

printer 13-29

WCCP on router 4-7

WCCP service password 4-11

congestion windows, about 5-12

connections, creating 11-21

controlled shutdown 14-30

copy disk ftp command 14-12

core cluster

about 1-19

assigning to file server 11-18

connecting to Edge WAEs 11-21

core configuration 11-9

core WAE, about 1-8

corrupted system images

recovering from 14-18

CPU utilization report 15-37

creating

accounts 7-4

application classifier 12-4

application definition 12-2

application policy 12-4

connections 11-21

file blocking directive 11-24

local user 7-4

match condition 12-7

new software file 14-4

preposition directive 11-25

preposition schedule 11-30

current software version

determining 14-2

D

database backup 14-11

data coherency, about 11-4

data concurrency, about 11-5

data migration 2-27

data redundancy elimination, about 1-4

debug command 15-38

default status, restoring 14-13

deleting

accounts 7-6

device groups 3-6

locations 3-15

roles 7-12

software files 14-10

device

alarms 15-6

autodiscovery 1-16

clock setting 9-5

rebooting 14-29

device groups

about 3-1

adding and removing devices 3-5

configuring 3-4

creating 3-3

creation process 3-2

deleting 3-6

enabling overlap 3-8

force group settings 3-8

list 3-7

overriding settings 3-8

setting configuration precedence 3-9

types 3-2

Device Home window 15-10

device locations

about 3-14

creating 3-15

deleting 3-15

device logs, viewing 15-29

device registration information

recovering 14-21

devices

activating 14-29

adding to device groups 3-5

adding to multiple device groups 3-8

impact of assigning to multiple groups 3-10

overriding device group settings 3-10

restarting 14-29

topology 12-12

viewing group assignments 3-7

viewing information for 15-8, 15-12, 15-14

Devices window 15-8

DFS, request interception method 4-50

DHCP

configuring interfaces for 5-8

for autoregistration 2-8

interface-level 2-9

DHCP server

requirements for autoregistration 2-8

disabling WCCP flow redirection 4-17

disconnected mode

about 11-32

configuring 11-34

requirements 11-33

disk-based software, missing

recovering from 14-21

disk handling

configuring error-handling methods 14-28

disks

monitoring 15-16

distributing drivers 13-20

DNS, configuring 5-16

domains

about 7-13

adding entities 7-14

assigning to user accounts 7-14

creating 7-13

deleting 7-15

modifying and deleting 7-15

viewing 7-15

double-byte language support 11-14

DRE, about 1-4

driver repository 13-16

drivers

distributing 13-20

installing 13-18

DSCP 11-11, 11-14

dynamic shares, creating 11-19

E

edge configuration 11-12

edge WAE, about 1-7

egress methods

configuring 4-29

enable command 6-16

enabling

optimization 12-17

print banners 13-30

print services 13-10

SNMP 16-9

SNMP agent 16-8

traffic statistic collection 12-3

WCCP flow redirection 4-17

enabling file services

core 11-9

edge 11-12

entities

adding to domains 7-14

EPM classification

enabling and disabling 12-17

errors

disk drives 14-28

EtherChannel

configuring 5-7

Exec timeout

configuring 6-11

explicit congestion notification

about 5-12

F

failover, for administrative login authentication 6-26

fast offline detection

about 9-18

configuring 9-18

file blocking directive, creating 11-24

File Engines supported 2-10

file locking, about 11-6

file server aliases 11-22

File Server Rename utility 10-18

file servers

registering 11-16

supported 11-7

file services 11-8

about 1-7

enabling on core 11-9

enabling on edge 11-12

features 1-7

preparing for 11-7

flash memory

corrupted 14-18

flow monitoring

configuring 15-16

force group settings 3-8

full optimization action 12-9

G

generic routing encapsulation. See GRE encapsulation

Gigabit Ethernet interfaces

modifying 5-6

GRE encapsulation 4-14, 4-16

GRE packet forwarding 4-16

H

hardware clock 9-5

I

increased buffering 1-5

inline mode 4-39

interface settings 4-41

serial clustering 4-47

VLAN configuration 4-46

VLAN ID check 4-43

inline network adapter card 4-39

installing

print drivers 13-18

intelligent message prediction 1-6

interface-level DHCP

description 2-9

note 2-8

interfaces

manually configuring for DHCP 5-8

IP access control lists. See IP ACL

IP ACL

adding conditions to 8-4

applying to interface 8-7

associating with application 8-7

conditions, modifying or deleting 8-7

configuration constraints 8-3

creating new 8-4

deleting 8-8

on routers 2-24

on WAEs 2-24

overview 8-1

IP addresses

multiple, configuring on single interface 5-5

static 2-9

IP routes

configuring 5-14

ip wccp command 4-11

ip wccp redirect-list command 4-11

ip web-cache redirect command 4-1, 4-11

K

kernel debugger

enabling 15-37

L

Layer 2 redirection 4-16

LDAP server signing 10-11, 10-13

configuring on a Microsoft server 6-23

configuring on a WAE 6-24

disabling on a WAE 6-25

overview of 6-23

line console carrier detection

configuring 6-12

load balancing 1-19, 4-13, 5-9

local CLI accounts, about 7-2

local user, creating 7-4

locations

about 3-14

creating 3-15

deleting 3-15

location tree

viewing 3-16

logging

message priority levels 15-22

system events 15-27

login

WAE Device Manager 10-2

login access

controlling 6-7

login authentication

about 2-25, 6-1

logs

severity levels in the WAE Device Manager 10-35

viewing in the WAE Device Manager 10-34

lost administrator passwords

recovering 14-19

LZ compression, about 1-4

M

match condition, creating 12-7

maximum segment size 12-16

message logs

viewing 15-27

message of the day settings

configuring 6-10

MIBs

supported 16-4

MIB traps

configuring using the WAE Device Manager 10-9

Microsoft DFS, request interception method 4-50

migration, data 2-27

missing disk-based software

recovering from 14-21

modifying a printer 13-29

monitoring

applications 12-12, 15-30

system status 15-5

using the WAE Device Manager 10-25

with SNMP 16-1

multiple IP addresses

configuring on single interfaces 5-5

N

namespace support 1-19

NAS appliances 1-16

NAT address 9-2

NAT configuration 9-2

NetBIOS 9-2, 11-13

network

viewing information for 15-2

Network Time Protocol. See NTP

network traffic analyzer tool 15-38

notification settings 10-15

NTP, configuring 9-4

O

obtaining software files 14-3

operation prediction and batching 1-6

optimization, enabling 12-17

P

packet forwarding method 4-14

Layer 2 redirection 4-16

Layer 3 GRE 4-16

packet return 4-15

passthrough action 12-9

pass-through traffic mix chart 15-36

passwords

changing account 7-7

recovering administrator 14-19

PBR, about 1-18

policy-based routing

about 1-18

configuration of 4-30

overview of 2-19

verifying next-hop availability 4-36

policy report, viewing 12-10

port channel interfaces

configuring 5-7

load balancing 5-9

ports

139 2-7

bypassing 2-7

disabling 11-13

enabling 11-13

4050 2-7

445 2-7

disabling 11-13

enabling 11-13

50139 2-7

used in WAFS 2-7

position, application policy 12-13

power failure 14-18

preposition

checking status of 11-31

viewing in the WAE Device Manager 10-22

preposition directive, creating 11-25

prepositioning

about 11-4

preposition schedule, creating 11-30

print banners, enabling and disabling 13-30

print clusters

about 13-4

adding 13-14

print driver distribution, verifying 13-21

print drivers

distributing 13-20

installing 13-18

support issues 13-3

printer misconfiguration, PostScript error 13-31

printers

adding to a WAAS print server 13-11

printing a test page 13-29

print servers

adding to clients 13-23

details, viewing 13-25

print services

about 1-8, 13-1

configuration process 13-7

enabling 13-10

planning 13-5

Print Services Administration GUI, about 13-27

priority levels 15-21

R

RADIUS

authentication overview 6-13

configuring server 6-13

database 6-3

default configuration 6-4

RAID 1-19

RCP services, enabling 9-3

real-time transaction logging

configuring 15-24

rebooting devices 14-29

receive buffer size 12-16

recovering

device registration information 14-21

from missing disk-based software 14-21

lost administrator passwords 14-19

system software 14-18

redirection methods 4-1

registering

file servers 11-16

WAEs in the WAE Device Manager 10-6

remote login

controlling access 6-7

reports

CPU utilization 15-37

repository, driver 13-16

request redirection methods 4-1

rescue system image 14-18

restarting devices 14-29

restoring

application classifiers 12-11

application policies 12-11

configuration files 10-7

WAAS Central Manager 14-11

WAE devices 14-13

WAE to default condition 14-13

retransmit time multiplier

about 5-13

roles

about 7-10

assigning to user accounts 7-11

creating and managing 7-10

deleting 7-12

modifying and deleting 7-12

viewing 7-13

viewing settings 7-13

roles-based accounts

about 7-2, 7-3

router

configuring WCCP transparent redirection on 4-7

router lists, defining for WCCP services 4-25

S

SACK, about 1-5

schedule, for preposition 11-30

secure shell

configuring 6-7

host keys 6-9

selective acknowledgement 1-5

send buffer size 12-16

send TCP keepalive 12-15

serial clustering in inline mode 4-47

service password

configuring 4-11

set ip next-hop verify-availability command 4-37

shadow copy for shared folders 11-6

shares, request redirection using explicit naming of 4-49

show cdp neighbors command 4-36

show command utility

for troubleshooting 15-8

show version command 14-19

shutting down WCCP 4-27

Simple Network Management Protocol. See SNMP

site and network planning 2-4

SNMP 1-20

asset tag setting 16-17

community settings 16-12

configuration process 16-8

configuring using the WAE Device Manager 10-8

contact settings 16-18

enabling 16-9

enabling SNMP agent 16-8

group settings 16-15

host settings 16-11

manager

creating 16-3

monitoring with 16-1

preparation 16-9

security models and security levels 16-4

supported MIBs 16-4

traps 16-10

user settings 16-16

versions supported 16-3

view settings 16-14

software

recovering 14-18

software clock 9-5

software files

obtaining from Cisco.com 14-3

software recovery

using the CD-ROM 14-14

software upgrades 14-4

for multiple devices 14-7

process 14-1

software version

determining 14-2

spooling space, default 13-14

standby Central Manager

switching to primary 14-25

standby groups

of interfaces 5-2

standby interfaces

configuring 5-2

priority settings 5-4

starting WAE components 10-5

static IP addresses 2-9

static IP routes

configuring 5-14

statistics, collecting 12-3

stopping WAE components 10-5

switching baseline group 3-14

system configuration settings 9-15

system event logging

configuring 15-19

message priority levels 15-22

viewing log 15-27

system home

viewing system-wide information 15-2

system image

recovering 14-18

system message log

using 15-19

viewing 15-27

system software

recovering 14-18

system status

monitoring 15-5

system status bar

troubleshooting devices 15-7

T

TACACS+

authentication and authorization, overview of 6-15

database 6-3

default configuration 6-4

enable password attribute 6-16

TACACS+ server

configuring 6-15

taskbar icons 1-11

TCP

congestion windows 5-12

explicit congestion notification 5-12

parameter settings 5-9

retransmit timer 5-13

slow start 5-13

tcpdump command 15-38

TCP initial window size, about 1-5

TCP promiscuous mode service

overview of 2-23

Telnet services

enabling 6-10

tethereal command 15-38

TFO

about 1-4

TFO and LZ compression action 12-9

TFO features 1-4

BIC TCP 1-6

compression 1-4

increased buffering 1-5

selective acknowledgement 1-5

TCP initial window size maximization 1-5

Windows scaling 1-5

TFO only action 12-9

TFO with DRE action 12-9

timezone locations

abbreviations 9-7

time zones

parameter settings for 9-5

topology 12-12

track command 4-38

traffic reduction chart 15-36

traffic statistics collection, enabling 12-3

traffic statistics report 15-30

chart descriptions 15-35

transaction logging

about using 15-22

configuring 15-23

real-time, about using 15-26

real-time, configuring 15-24

transparent redirection, configuring on a router 4-7

traps, enabling 16-10

troubleshooting

using show command utility 15-8

with TCPdump 15-38

with Tethereal 15-38

types of application policies 12-6

U

Unicode support 2-11

upgrading

device groups 14-7

process 14-1

WAAS Central Manager device 14-9

user accounts

adding domain entities 7-14

assigning to domains 7-14

audit trail logs

viewing 6-32, 15-28

changing passwords 7-7

creating 7-4

creation process 7-2

deleting 7-6

deleting domains 7-15

domains 7-13

managing 7-7, 7-8

modifying and deleting 7-6

roles

assigning to 7-11

creating 7-10

modifying and deleting 7-12

viewing 7-13

viewing 7-8

viewing domains 7-15

user authentication. See login authentication

UTC offsets 9-7

See also GMT offsets

V

verifying

print driver distribution 13-21

version of software 14-2

viewing

application list 12-10

classifier report 12-11

logs in the WAE device manager 10-34

policy report 12-10

print server details 13-25

role settings 7-13

VLAN

ID check 4-43

VLAN ID check 4-43

VLAN support 4-40

W

WAAS

benefits 1-15

interfaces 1-8

WAAS Central Manager

backing up 14-11

configuring as driver repository 13-16

restoring 14-11

upgrading 14-9

WAAS Central Manager GUI

about 1-8

accessing 1-9

components 1-9

taskbar icons 1-11

WAAS CLI, about 1-14

WAAS interfaces

CLI 1-14

Print Services Administration GUI 1-14

WAAS Central Manager GUI 1-8

WAE Device Manager GUI 1-13

WAAS networks

and IOP interoperability 2-11

network planning for 2-1

traffic redirection methods 2-18

WAAS Print Services Administration GUI, about 1-14

WAAS services, about 1-4

WAE Device Manager

about 1-13, 10-1

Configuration option 10-8

Configuration option (WAFS core) 10-19

Configuration option (WAFS Edge) 10-20

Control option for the WAE 10-4

logging out 10-3

Notifier tab 10-15

quick tour 10-2

Utilities option 10-16

workflow 10-3

WAE devices

backing up 14-13

controlled shutdown 14-30

modifying configuration properties 9-1

restoring 14-13

supported 2-10

WAE packet return 4-15

WAFS

about 1-17

configuration process 11-8

preparing for 11-7

WAFS Cache Cleanup utility 10-17

WAFS Core cluster 3-3

WAN failures, preparing for 11-32

WAN information panel

system home window 15-3

WAN utilization setting 11-23

WCCP

about 1-18

Cisco Express Forwarding (CEF) 4-16

default values

for WAE general settings 4-17

defining router lists 4-25

flow redirection

enabling and disabling 4-17

GRE packet return 4-29

ports used 2-7

request interception method 4-4

shutting down 4-27

WCCP-based routing

advanced configuration

for a router 4-7

configuration guidelines 4-5

overview of 2-19

wccp command 4-5

WCCP general settings

WAE default values 4-17

WCCP service masks

deleting 4-22, 4-23

modifying 4-22, 4-23

WCCP services

displaying list of 4-5

web browser support 2-10

Windows Authentication

checking the status in the WAE Device Manager 10-13

configuring using the WAE Device Manager 10-10

Windows name services 5-16

Windows scaling, about 1-5