Symbols -
A -
B -
C -
D -
E -
F -
G -
H -
I -
K -
L -
M -
N -
O -
P -
R -
S -
T -
U -
V -
W -
Index
Symbols
>12-14
A
AAA accounting
configuring6-30
AAA-based management systems2-26, 6-2
acceleration
about1-6, 12-1
features1-6
TCP settings12-17
accounts
creating7-3
creation process7-2
deleting7-6
local CLI7-2
roles-based7-2
types7-1
viewing7-8
ACL
See also IP ACL
action
full optimization12-10
none12-10
passthrough12-10
TFO only12-10
TFO with DRE12-10
TFO with LZ compression12-10
types12-10
activating devices14-19
adding
print clusters13-13
printers13-10
print server to clients13-24
administrative login authentication and authorization
default6-5
for WAEs6-3
local database
description of6-7
overview of6-2
RADIUS
overview of6-13
TACACS+
overview of6-15
administrative login authentication failover6-26
aggregate settings
for print servers13-27
alarm overload detection, enabling9-14
alarms
device reporting15-3
aliases, for file servers11-23
allowed protocols13-31
application acceleration, about1-6, 12-1
application classifiers
creating12-5
match condition12-9
restoring12-13
application definition
creating12-2
application list, viewing12-11
application policies
restoring12-13
application policy
creating12-5
creation process12-2
position12-16
preparation tasks12-2
types12-7
applications
monitoring12-14, 15-18
application traffic mix chart15-24
assigning
application to a device12-4
application to a device group12-4
core cluster to file server11-19
devices to a preposition directive11-32
devices to more than one device group3-9
assigning devices to device groups3-7
audit trail logs
viewing6-32, 15-17
authentication
default feature values6-5
authentication databases, types of6-3
authentication servers
configuring6-13, 6-15
authorization
default feature values6-5
autodiscover1-16
autoregistration
DHCP server requirements2-9
B
backing up
configuration files10-8
WAAS Central Manager14-9
WAE devices14-11
backup and restore
cms database14-9
baseline groups
configuring3-14
creation process3-13
customizing3-13
switching3-15
types3-12
working with3-12
BIC TCP1-6
bootflags14-15
browser support2-11
C
caching, about1-17
CDP
configuring5-15
cdp enable command4-47
cdp run command4-47
charts
application traffic mix15-24
pass-through traffic mix15-24
traffic reduction15-25
CIFS1-19, 11-2
Cisco.com
obtaining software files from14-2
Cisco Discovery Protocol. See CDP
classifier, creating12-5
classifier report, viewing12-13
clear ip wccp command4-1
clear statistics all command6-25
clear statistics authentication command6-25
clear statistics windows-domain command6-25
CLI user
creating7-4
clock
setting9-6
cms database
backup and restore procedure14-9
cms database backup command14-9
cms database restore command14-11
coherency
age-based validation11-4
compression, about1-4
conditions
modifying or deleting from IP ACLs8-7
configuration group3-5
configuration process11-8
configuring
administrative login authentication and authorization6-8
core cluster11-9
edge device11-11
printer13-30
WCCP on router4-7
WCCP service password4-11
congestion windows, about5-12
connections, creating11-22
controlled shutdown14-20
copy disk ftp command14-10
core cluster
about1-18
assigning to file server11-19
connecting to Edge WAEs11-22
core configuration11-9
core WAE, about1-7
corrupted system images
recovering from14-13
CPU utilization report15-26
creating
accounts7-3
application classifier12-5
application definition12-2
application policy12-5
connections11-22
file blocking directive11-26
local user7-4
match condition12-9
new software file14-3
preposition directive11-28
preposition schedule11-33
current software version
determining14-2
D
database backup14-9
data coherency, about11-4
data concurrency, about11-5
data migration2-29
data redundancy elimination, about1-4
debug command15-26
default status, restoring14-11
deleting
accounts7-6
device groups3-7
locations3-18
roles7-11
software files14-8
device
alarms15-3
autodiscovery1-16
clock setting9-6
rebooting14-20
device groups
about3-1
adding and removing devices3-7
configuring3-5
creating3-3
creation process3-3
deleting3-7
enabling overlap3-9
force group settings3-10
list3-8
overriding settings3-10
setting configuration precedence3-10
types3-2
Device Home window15-6
device locations
about3-16
creating3-16
deleting3-18
device logs, viewing15-18
device registration information
recovering14-17
devices
activating14-19
adding to device groups3-7
adding to multiple device groups3-9
impact of assigning to multiple groups3-12
overriding device group settings3-11
restarting14-20
topology12-14
viewing group assignments3-8
viewing information for15-5
Devices window15-5
DFS, request interception method4-51
DHCP
configuring interfaces for5-8
for autoregistration2-9
interface-level2-10
DHCP server
requirements for autoregistration2-9
disabling WCCP flow redirection4-17
disconnected mode
about11-36
configuring11-37
requirements11-37
disk-based software, missing
recovering from14-16
disk handling
configuring error-handling methods14-18
distributing drivers13-19
DNS, configuring5-16
documentation
related documentsxx
domains
about7-12
adding entities7-14
assigning to user accounts7-14
creating7-13
deleting7-15
modifying and deleting7-15
viewing7-16
double-byte language support11-13
DRE, about1-4
driver repository13-15
drivers
distributing13-19
installing13-17
DSCP11-11, 11-13
dynamic shares, creating11-20
E
edge configuration11-11
edge WAE, about1-7
enable command6-16
enabling
optimization12-20
print banners13-31
print services13-9
SNMP16-8
SNMP agent16-6
traffic statistic collection12-4
WCCP flow redirection4-17
enabling file services
core11-9
edge11-11
entities
adding to domains7-14
EPM adapter
enabling and disabling12-20
errors
disk drives14-18
EtherChannel
configuring5-7
Exec timeout
configuring6-11
explicit congestion notification
about5-12
F
failover, for administrative login authentication6-26
fast offline detection
about9-13
configuring9-12
file blocking directive, creating11-26
File Engines supported2-11
file locking, about11-5
file server aliases11-23
File Server Rename utility10-20
file servers
registering11-15
supported11-7
file services11-8
about1-7
enabling on core11-9
enabling on edge11-11
features1-7
preparing for11-7
flash memory
corrupted14-13
force group settings3-10
full optimization action12-10
G
generic routing encapsulation. See GRE encapsulation
Gigabit Ethernet interfaces
modifying5-5
GRE encapsulation4-14, 4-16
GRE packet forwarding4-16
H
hardware clock9-6
I
increased buffering1-5
installing
print drivers13-17
intelligent message prediction1-6
interface-level DHCP
description2-10
note2-9
interfaces
manually configuring for DHCP5-8
IP access control lists. See IP ACL
IP ACL
adding conditions to8-4
applying to interface8-7
associating with application8-7
conditions, modifying or deleting8-7
configuration constraints8-3
creating new8-4
deleting8-8
on routers2-25
on WAEs2-25
overview8-1
IP addresses
multiple, configuring on single interface5-5
static2-10
IP routes
configuring5-14
ip wccp command4-10
ip wccp redirect-list command4-10
ip web-cache redirect command4-1, 4-10
K
kernel debugger
enabling15-26
L
Layer 2 redirection4-16
LDAP server signing10-12, 10-14
configuring on a Microsoft server6-23
configuring on a WAE6-23
disabling on a WAE6-25
overview of6-23
line console carrier detection
configuring6-12
load balancing1-18, 4-12, 5-8
local CLI accounts, about7-2
local user, creating7-4
locations
about3-16
creating3-16
deleting3-18
location tree
viewing3-18
logging
message priority levels15-9
system events15-15
login
WAE Device Manager10-2
login access
controlling6-8
login authentication
about2-26, 6-2
logs
severity levels in the WAE Device Manager10-37
viewing in the WAE Device Manager10-36
lost administrator passwords
recovering14-15
LZ compression, about1-4
M
match condition, creating12-9
maximum segment size12-19
message logs
viewing15-15
MIBs
supported16-4
MIB traps
configuring using the WAE Device Manager10-10
Microsoft DFS, request interception method4-51
migration, data2-29
missing disk-based software
recovering from14-16
modifying a printer13-30
monitoring
applications12-14, 15-18
system status15-2
using the WAE Device Manager10-28
with SNMP16-1
multiple IP addresses
configuring on single interfaces5-5
N
namespace support1-19
NAS appliances1-16
NAT address9-3
NAT configuration9-3
NetBIOS9-3, 11-12
Network Time Protocol. See NTP
network traffic analyzer tool15-26
notification settings10-17
NTP, configuring9-5
O
obtaining software files14-2
operation prediction and batching1-6
optimization, enabling12-20
P
packet forwarding method4-14
Layer 2 redirection4-16
Layer 3 GRE4-16
packet return4-15
passthrough action12-10
pass-through traffic mix chart15-24
passwords
changing account7-7, 7-8
recovering administrator14-15
PBR, about1-18
policy-based routing
about1-18
configuration of4-40
overview of2-19
verifying next-hop availability4-46
policy report, viewing12-12
port channel interfaces
configuring5-7
load balancing5-8
ports
1392-7
bypassing2-8
disabling11-12
enabling11-12
40502-7
4452-7
disabling11-12
enabling11-12
501392-7
used in WAFS2-7
position, application policy12-16
power failure14-13
preposition
checking status of11-35
viewing in the WAE Device Manager10-24
preposition directive, creating11-28
prepositioning
about11-3
preposition schedule, creating11-33
print banners, enabling and disabling13-31
print clusters
about13-3
adding13-13
print driver distribution, verifying13-22
print drivers
distributing13-19
installing13-17
printer misconfiguration, PostScript error13-32
printers
adding to a WAAS print server13-10
printing a test page13-30
print servers
adding to clients13-24
details, viewing13-26
print services
about1-8, 13-1
configuration process13-6
enabling13-9
planning13-4
Print Services Administration GUI, about13-28
priority levels15-9
R
RADIUS
authentication overview6-13
configuring server6-13
database6-3
default configuration6-5
RAID1-19
RCP services, enabling9-3
real-time transaction logging
configuring15-12
rebooting devices14-20
receive buffer size12-19
recovering
device registration information14-17
from missing disk-based software14-16
lost administrator passwords14-15
system software14-13
redirection methods4-2
registering
file servers11-15
WAEs in the WAE Device Manager10-6
remote login
controlling access6-8
reports
CPU utilization15-26
repository, driver13-15
request redirection methods4-2
rescue system image14-13
restarting devices14-20
restoring
application classifiers12-13
application policies12-13
configuration files10-8
WAAS Central Manager14-9
WAE devices14-11
WAE to default condition14-11
retransmit time multiplier
about5-12
roles
about7-8
assigning to user accounts7-11
creating and managing7-9
deleting7-11
modifying and deleting7-11
viewing7-12
viewing settings7-12
roles-based accounts
about7-2, 7-3
router
configuring WCCP transparent redirection on4-7
router lists, defining for WCCP services4-36
S
SACK, about1-5
schedule, for preposition11-33
secure shell
configuring6-8
host keys6-9
selective acknowledgement1-5
send buffer size12-19
send TCP keepalive12-18
service password
configuring4-11
set ip next-hop verify-availability command4-48
shadow copy for shared folders11-6
shares, request redirection using explicit naming of4-50
show cdp neighbors command4-47
show command utility
for troubleshooting15-4
show version command14-14
shutting down WCCP4-38
Simple Network Management Protocol. See SNMP
site and network planning2-5
SNMP1-20
asset tag setting16-16
community settings16-11
configuration process16-7
configuring using the WAE Device Manager10-9
contact settings16-17
enabling16-8
enabling SNMP agent16-6
group settings16-13
host settings16-10
manager
creating16-3
monitoring with16-1
preparation16-7
security models and security levels16-4
supported MIBs16-4
traps16-9
user settings16-15
versions supported16-3
view settings16-12
software
recovering14-13
software clock9-6
software files
obtaining from Cisco.com14-2
software recovery
using the CD-ROM14-12
software upgrades14-3
for multiple devices14-5
process14-1
software version
determining14-2
spooling space, default13-13
standby groups
of interfaces5-2
standby interfaces
configuring5-2
priority settings5-3
starting WAE components10-5
static IP addresses2-10
static IP routes
configuring5-14
statistics, collecting12-4
stopping WAE components10-5
switching baseline group3-15
system configuration settings9-10
system event logging
configuring15-7
message priority levels15-9
viewing log15-15
system image
recovering14-13
system message log
using15-7
viewing15-15
system software
recovering14-13
system status
monitoring15-2
system status bar
troubleshooting devices15-3
T
TACACS+
authentication and authorization, overview of6-15
database6-3
default configuration6-5
enable password attribute6-16
TACACS+ server
configuring6-15
taskbar icons1-11
TCP
congestion windows5-12
explicit congestion notification5-12
parameter settings5-9
retransmit timer5-12
slow start5-13
tcpdump command15-26
TCP initial window size, about1-5
TCP promiscuous mode service
overview of2-23
Telnet services
enabling6-10
tethereal command15-26
TFO
about1-4
TFO and LZ compression action12-10
TFO features1-4
BIC TCP1-6
compression1-4
increased buffering1-5
selective acknowledgement1-5
TCP initial window size maximization1-5
Windows scaling1-5
TFO only action12-10
TFO with DRE action12-10
time zones
parameter settings for9-6
topology12-14
track command4-48
traffic reduction chart15-25
traffic statistics collection, enabling12-4
traffic statistics report15-18
chart descriptions15-23
transaction logging
about using15-10
configuring15-10
real-time, about using15-14
real-time, configuring15-12
transparent redirection, configuring on a router4-7
traps, enabling16-9
troubleshooting
using show command utility15-4
with TCPdump15-26
with Tethereal15-26
types of application policies12-7
U
Unicode support2-11
upgrading
device groups14-5
process14-1
WAAS Central Manager device14-7
user accounts
adding domain entities7-14
assigning to domains7-14
audit trail logs
viewing6-32, 15-17
changing passwords7-7, 7-8
creating7-3
creation process7-2
deleting7-6
deleting domains7-15
domains7-13
managing7-7, 7-8
modifying and deleting7-6
roles
assigning to7-11
creating7-9
modifying and deleting7-11
viewing7-12
viewing7-8
viewing domains7-16
user authentication. See login authentication
UTC offsets9-8
See also GMT offsets
V
verifying
print driver distribution13-22
version of software14-2
viewing
application list12-11
classifier report12-13
logs in the WAE device Manager10-36
policy report12-12
print server details13-26
role settings7-12
W
WAAS
benefits1-15
interfaces1-8
WAAS Central Manager
backing up14-9
configuring as driver repository13-15
restoring14-9
upgrading14-7
WAAS Central Manager GUI
about1-9
accessing1-9
components1-10
taskbar icons1-11
WAAS CLI, about1-14
WAAS interfaces
CLI1-14
Print Services Administration GUI1-14
WAAS Central Manager GUI1-9
WAE Device Manager GUI1-13
WAAS networks
and IOP interoperability2-12
network planning for2-1
traffic redirection methods2-18
WAAS Print Services Administration GUI, about1-14
WAAS services, about1-4
WAE Device Manager
about1-13, 10-1
Configuration option10-9
Configuration option (WAFS core)10-21
Configuration option (WAFS Edge)10-22
Control option for the WAE10-5
logging out10-3
Notifier tab10-17
quick tour10-3
Utilities option10-18
workflow10-3
WAE devices
backing up14-11
controlled shutdown14-20
modifying configuration properties9-1
restoring14-11
supported2-11
WAE packet return4-15
WAFS
about1-17
configuration process11-8
preparing for11-7
WAFS Cache Cleanup utility10-19
WAFS Core cluster3-5
WAN failures, preparing for11-36
WAN utilization setting11-25
WCCP
about1-18
Cisco Express Forwarding (CEF)4-15
default values
for WAE's general settings4-17
defining router lists4-36
flow redirection
enabling and disabling4-17
ports used2-7
request interception method4-4
shutting down4-38
WCCP-based routing
advanced configuration
for a router4-7
for a WAE4-12
configuration guidelines4-5
overview of2-18
wccp command4-6
WCCP general settings
WAE default values4-17
WCCP service masks
deleting4-25, 4-26
modifying4-25, 4-27, 4-28
WCCP services
displaying list of4-6
web browser support2-11
Windows Authentication
checking the status in the WAE Device Manager10-15
configuring using the WAE Device Manager10-11
Windows name services5-17
Windows scaling, about1-5