Symbols -
A -
B -
C -
D -
E -
F -
G -
H -
I -
K -
L -
M -
N -
O -
P -
R -
S -
T -
U -
V -
W -
Index
Symbols
> 12-14
A
AAA accounting
configuring 6-32
AAA-based management systems 2-25, 6-2
acceleration
about 1-6, 12-1
features 1-6
TCP settings 12-17
accounts
creating 7-3
creation process 7-2
deleting 7-6
local CLI 7-2
roles-based 7-2
types 7-1
viewing 7-8
ACL
See also IP ACL
action
full optimization 12-10
passthrough 12-10
TFO only 12-10
TFO with DRE 12-10
TFO with LZ compression 12-10
types 12-10
activating devices 14-23
adding
print clusters 13-13
printers 13-11
print server to clients 13-24
administrative login authentication and authorization
default 6-5
for WAEs 6-3
local database
description of 6-7
overview of 6-2
RADIUS
overview of 6-14
TACACS+
overview of 6-16
administrative login authentication failover 6-28
aggregate settings
for print servers 13-27
alarm overload detection, enabling 9-14
alarms
device reporting 15-3
aliases, for file servers 11-24
allowed protocols 13-31
application acceleration, about 1-6, 12-1
application classifiers
creating 12-5
match condition 12-8
restoring 12-13
application definition
creating 12-2
application list, viewing 12-11
application policies
restoring 12-13
application policy
creating 12-5
creation process 12-2
position 12-16
preparation tasks 12-2
types 12-7
applications
monitoring 12-14, 15-18
application traffic mix chart 15-25
assigning
application to a device 12-4
application to a device group 12-4
core cluster to file server 11-20
devices to a preposition directive 11-33
devices to more than one device group 3-9
assigning devices to device groups 3-7
audit trail logs
viewing 6-34, 15-17
authentication
default feature values 6-5
authentication databases, types of 6-3
authentication servers
configuring 6-14, 6-16
authorization
default feature values 6-5
autodiscover 1-16
autoregistration
DHCP server requirements 2-8
B
backing up
configuration files 10-8
WAAS Central Manager 14-9
WAE devices 14-11
backup and restore
cms database 14-9
banners
configuring 6-11
baseline groups
configuring 3-14
creation process 3-13
customizing 3-13
switching 3-15
types 3-12
working with 3-12
BIC TCP 1-6
bootflags 14-18
browser support 2-10
C
caching, about 1-17
CDP
configuring 5-15
cdp enable command 4-39
cdp run command 4-39
charts
application traffic mix 15-25
pass-through traffic mix 15-25
traffic reduction 15-26
CIFS 1-19, 11-2
Cisco.com
obtaining software files from 14-2
Cisco Discovery Protocol. See CDP
classifier, creating 12-5
classifier report, viewing 12-12
clear ip wccp command 4-1
clear statistics all command 6-27
clear statistics authentication command 6-27
clear statistics windows-domain command 6-27
CLI user
creating 7-4
clock
setting 9-6
clustering in inline mode 4-47
cms database
backup and restore procedure 14-9
cms database backup command 14-9
cms database restore command 14-11
coherency
age-based validation 11-5
compression, about 1-4
conditions
modifying or deleting from IP ACLs 8-7
configuration group 3-5
configuration process 11-8
configuring
administrative login authentication and authorization 6-8
core cluster 11-9
edge device 11-12
printer 13-30
WCCP on router 4-7
WCCP service password 4-10
congestion windows, about 5-12
connections, creating 11-23
controlled shutdown 14-24
copy disk ftp command 14-10
core cluster
about 1-19
assigning to file server 11-20
connecting to Edge WAEs 11-23
core configuration 11-9
core WAE, about 1-8
corrupted system images
recovering from 14-15
CPU utilization report 15-27
creating
accounts 7-3
application classifier 12-5
application definition 12-2
application policy 12-5
connections 11-23
file blocking directive 11-27
local user 7-4
match condition 12-8
new software file 14-3
preposition directive 11-29
preposition schedule 11-34
current software version
determining 14-2
D
database backup 14-9
data coherency, about 11-4
data concurrency, about 11-5
data migration 2-27
data redundancy elimination, about 1-4
debug command 15-27
default status, restoring 14-11
deleting
accounts 7-6
device groups 3-7
locations 3-18
roles 7-11
software files 14-8
device
alarms 15-3
autodiscovery 1-16
clock setting 9-6
rebooting 14-24
device groups
about 3-1
adding and removing devices 3-7
configuring 3-5
creating 3-3
creation process 3-3
deleting 3-7
enabling overlap 3-9
force group settings 3-10
list 3-8
overriding settings 3-10
setting configuration precedence 3-10
types 3-2
Device Home window 15-6
device locations
about 3-16
creating 3-16
deleting 3-18
device logs, viewing 15-18
device registration information
recovering 14-19
devices
activating 14-23
adding to device groups 3-7
adding to multiple device groups 3-9
impact of assigning to multiple groups 3-12
overriding device group settings 3-11
restarting 14-24
topology 12-14
viewing group assignments 3-8
viewing information for 15-5
Devices window 15-5
DFS, request interception method 4-49
DHCP
configuring interfaces for 5-8
for autoregistration 2-8
interface-level 2-9
DHCP server
requirements for autoregistration 2-8
disabling WCCP flow redirection 4-16
disconnected mode
about 11-37
configuring 11-38
requirements 11-38
disk-based software, missing
recovering from 14-18
disk handling
configuring error-handling methods 14-22
distributing drivers 13-19
DNS, configuring 5-16
documentation
related documents xx
domains
about 7-12
adding entities 7-14
assigning to user accounts 7-14
creating 7-13
deleting 7-15
modifying and deleting 7-15
viewing 7-16
double-byte language support 11-14
DRE, about 1-4
driver repository 13-15
drivers
distributing 13-19
installing 13-17
DSCP 11-11, 11-14
dynamic shares, creating 11-21
E
edge configuration 11-12
edge WAE, about 1-7
enable command 6-17
enabling
optimization 12-20
print banners 13-31
print services 13-10
SNMP 16-8
SNMP agent 16-6
traffic statistic collection 12-4
WCCP flow redirection 4-16
enabling file services
core 11-9
edge 11-12
entities
adding to domains 7-14
EPM classification
enabling and disabling 12-20
errors
disk drives 14-22
EtherChannel
configuring 5-7
Exec timeout
configuring 6-12
explicit congestion notification
about 5-12
F
failover, for administrative login authentication 6-28
fast offline detection
about 9-13
configuring 9-12
file blocking directive, creating 11-27
File Engines supported 2-10
file locking, about 11-6
file server aliases 11-24
File Server Rename utility 10-20
file servers
registering 11-16
supported 11-7
file services 11-8
about 1-7
enabling on core 11-9
enabling on edge 11-12
features 1-7
preparing for 11-7
flash memory
corrupted 14-15
force group settings 3-10
full optimization action 12-10
G
generic routing encapsulation. See GRE encapsulation
Gigabit Ethernet interfaces
modifying 5-5
GRE encapsulation 4-14, 4-15
GRE packet forwarding 4-15
H
hardware clock 9-6
I
increased buffering 1-5
inline mode 4-41
interface settings 4-43
serial clustering 4-47
VLAN configuration 4-46
inline network adapter card 4-41
installing
print drivers 13-17
intelligent message prediction 1-6
interface-level DHCP
description 2-10
note 2-8
interfaces
manually configuring for DHCP 5-8
IP access control lists. See IP ACL
IP ACL
adding conditions to 8-4
applying to interface 8-7
associating with application 8-7
conditions, modifying or deleting 8-7
configuration constraints 8-3
creating new 8-4
deleting 8-8
on routers 2-24
on WAEs 2-24
overview 8-1
IP addresses
multiple, configuring on single interface 5-5
static 2-9
IP routes
configuring 5-14
ip wccp command 4-10
ip wccp redirect-list command 4-10
ip web-cache redirect command 4-1, 4-10
K
kernel debugger
enabling 15-27
L
Layer 2 redirection 4-16
LDAP server signing 10-12, 10-14
configuring on a Microsoft server 6-25
configuring on a WAE 6-26
disabling on a WAE 6-27
overview of 6-25
line console carrier detection
configuring 6-13
load balancing 1-19, 4-12, 5-8
local CLI accounts, about 7-2
local user, creating 7-4
locations
about 3-16
creating 3-16
deleting 3-18
location tree
viewing 3-18
logging
message priority levels 15-10
system events 15-15
login
WAE Device Manager 10-2
login access
controlling 6-8
login authentication
about 2-25, 6-2
logs
severity levels in the WAE Device Manager 10-37
viewing in the WAE Device Manager 10-36
lost administrator passwords
recovering 14-17
LZ compression, about 1-4
M
match condition, creating 12-8
maximum segment size 12-19
message logs
viewing 15-15
message of the day settings
configuring 6-11
MIBs
supported 16-4
MIB traps
configuring using the WAE Device Manager 10-10
Microsoft DFS, request interception method 4-49
migration, data 2-27
missing disk-based software
recovering from 14-18
modifying a printer 13-30
monitoring
applications 12-14, 15-18
system status 15-2
using the WAE Device Manager 10-27
with SNMP 16-1
multiple IP addresses
configuring on single interfaces 5-5
N
namespace support 1-19
NAS appliances 1-16
NAT address 9-3
NAT configuration 9-3
NetBIOS 9-3, 11-13
Network Time Protocol. See NTP
network traffic analyzer tool 15-27
notification settings 10-17
NTP, configuring 9-5
O
obtaining software files 14-2
operation prediction and batching 1-6
optimization, enabling 12-20
P
packet forwarding method 4-14
Layer 2 redirection 4-16
Layer 3 GRE 4-15
packet return 4-15
passthrough action 12-10
pass-through traffic mix chart 15-25
passwords
changing account 7-7, 7-8
recovering administrator 14-17
PBR, about 1-18
policy-based routing
about 1-18
configuration of 4-33
overview of 2-19
verifying next-hop availability 4-38
policy report, viewing 12-12
port channel interfaces
configuring 5-7
load balancing 5-8
ports
139 2-7
bypassing 2-7
disabling 11-13
enabling 11-13
4050 2-7
445 2-7
disabling 11-13
enabling 11-13
50139 2-7
used in WAFS 2-7
position, application policy 12-16
power failure 14-15
preposition
checking status of 11-36
viewing in the WAE Device Manager 10-24
preposition directive, creating 11-29
prepositioning
about 11-4
preposition schedule, creating 11-34
print banners, enabling and disabling 13-31
print clusters
about 13-3
adding 13-13
print driver distribution, verifying 13-22
print drivers
distributing 13-19
installing 13-17
printer misconfiguration, PostScript error 13-32
printers
adding to a WAAS print server 13-11
printing a test page 13-30
print servers
adding to clients 13-24
details, viewing 13-26
print services
about 1-8, 13-1
configuration process 13-6
enabling 13-10
planning 13-4
Print Services Administration GUI, about 13-28
priority levels 15-10
R
RADIUS
authentication overview 6-14
configuring server 6-14
database 6-3
default configuration 6-5
RAID 1-20
RCP services, enabling 9-3
real-time transaction logging
configuring 15-12
rebooting devices 14-24
receive buffer size 12-19
recovering
device registration information 14-19
from missing disk-based software 14-18
lost administrator passwords 14-17
system software 14-15
redirection methods 4-2
registering
file servers 11-16
WAEs in the WAE Device Manager 10-6
remote login
controlling access 6-8
reports
CPU utilization 15-27
repository, driver 13-15
request redirection methods 4-2
rescue system image 14-15
restarting devices 14-24
restoring
application classifiers 12-13
application policies 12-13
configuration files 10-8
WAAS Central Manager 14-9
WAE devices 14-11
WAE to default condition 14-11
retransmit time multiplier
about 5-12
roles
about 7-8
assigning to user accounts 7-11
creating and managing 7-9
deleting 7-11
modifying and deleting 7-11
viewing 7-12
viewing settings 7-12
roles-based accounts
about 7-2, 7-3
router
configuring WCCP transparent redirection on 4-7
router lists, defining for WCCP services 4-29
S
SACK, about 1-5
schedule, for preposition 11-34
secure shell
configuring 6-8
host keys 6-9
selective acknowledgement 1-5
send buffer size 12-19
send TCP keepalive 12-18
serial clustering in inline mode 4-47
service password
configuring 4-10
set ip next-hop verify-availability command 4-40
shadow copy for shared folders 11-6
shares, request redirection using explicit naming of 4-49
show cdp neighbors command 4-39
show command utility
for troubleshooting 15-4
show version command 14-17
shutting down WCCP 4-31
Simple Network Management Protocol. See SNMP
site and network planning 2-4
SNMP 1-20
asset tag setting 16-16
community settings 16-11
configuration process 16-7
configuring using the WAE Device Manager 10-9
contact settings 16-17
enabling 16-8
enabling SNMP agent 16-6
group settings 16-13
host settings 16-10
manager
creating 16-3
monitoring with 16-1
preparation 16-7
security models and security levels 16-4
supported MIBs 16-4
traps 16-9
user settings 16-15
versions supported 16-3
view settings 16-12
software
recovering 14-15
software clock 9-6
software files
obtaining from Cisco.com 14-2
software recovery
using the CD-ROM 14-12
software upgrades 14-3
for multiple devices 14-5
process 14-1
software version
determining 14-2
spooling space, default 13-13
standby Central Manager
switching to primary 14-20
standby groups
of interfaces 5-2
standby interfaces
configuring 5-2
priority settings 5-3
starting WAE components 10-5
static IP addresses 2-9
static IP routes
configuring 5-14
statistics, collecting 12-4
stopping WAE components 10-5
switching baseline group 3-15
system configuration settings 9-10
system event logging
configuring 15-8
message priority levels 15-10
viewing log 15-15
system image
recovering 14-15
system message log
using 15-8
viewing 15-15
system software
recovering 14-15
system status
monitoring 15-2
system status bar
troubleshooting devices 15-4
T
TACACS+
authentication and authorization, overview of 6-16
database 6-3
default configuration 6-5
enable password attribute 6-17
TACACS+ server
configuring 6-16
taskbar icons 1-11
TCP
congestion windows 5-12
explicit congestion notification 5-12
parameter settings 5-9
retransmit timer 5-12
slow start 5-13
tcpdump command 15-27
TCP initial window size, about 1-5
TCP promiscuous mode service
overview of 2-23
Telnet services
enabling 6-10
tethereal command 15-27
TFO
about 1-4
TFO and LZ compression action 12-10
TFO features 1-4
BIC TCP 1-6
compression 1-4
increased buffering 1-5
selective acknowledgement 1-5
TCP initial window size maximization 1-5
Windows scaling 1-5
TFO only action 12-10
TFO with DRE action 12-10
time zones
parameter settings for 9-6
topology 12-14
track command 4-40
traffic reduction chart 15-26
traffic statistics collection, enabling 12-4
traffic statistics report 15-18
chart descriptions 15-24
transaction logging
about using 15-10
configuring 15-11
real-time, about using 15-14
real-time, configuring 15-12
transparent redirection, configuring on a router 4-7
traps, enabling 16-9
troubleshooting
using show command utility 15-4
with TCPdump 15-27
with Tethereal 15-27
types of application policies 12-7
U
Unicode support 2-11
upgrading
device groups 14-5
process 14-1
WAAS Central Manager device 14-7
user accounts
adding domain entities 7-14
assigning to domains 7-14
audit trail logs
viewing 6-34, 15-17
changing passwords 7-7, 7-8
creating 7-3
creation process 7-2
deleting 7-6
deleting domains 7-15
domains 7-13
managing 7-7, 7-8
modifying and deleting 7-6
roles
assigning to 7-11
creating 7-9
modifying and deleting 7-11
viewing 7-12
viewing 7-8
viewing domains 7-16
user authentication. See login authentication
UTC offsets 9-8
See also GMT offsets
V
verifying
print driver distribution 13-22
version of software 14-2
viewing
application list 12-11
classifier report 12-12
logs in the WAE device Manager 10-36
policy report 12-12
print server details 13-26
role settings 7-12
VLAN support 4-43
W
WAAS
benefits 1-15
interfaces 1-8
WAAS Central Manager
backing up 14-9
configuring as driver repository 13-15
restoring 14-9
upgrading 14-7
WAAS Central Manager GUI
about 1-9
accessing 1-9
components 1-10
taskbar icons 1-11
WAAS CLI, about 1-14
WAAS interfaces
CLI 1-14
Print Services Administration GUI 1-14
WAAS Central Manager GUI 1-9
WAE Device Manager GUI 1-13
WAAS networks
and IOP interoperability 2-11
network planning for 2-1
traffic redirection methods 2-18
WAAS Print Services Administration GUI, about 1-14
WAAS services, about 1-4
WAE Device Manager
about 1-13, 10-1
Configuration option 10-9
Configuration option (WAFS core) 10-21
Configuration option (WAFS Edge) 10-22
Control option for the WAE 10-5
logging out 10-3
Notifier tab 10-17
quick tour 10-3
Utilities option 10-18
workflow 10-3
WAE devices
backing up 14-11
controlled shutdown 14-24
modifying configuration properties 9-1
restoring 14-11
supported 2-10
WAE packet return 4-15
WAFS
about 1-17
configuration process 11-8
preparing for 11-7
WAFS Cache Cleanup utility 10-19
WAFS Core cluster 3-5
WAN failures, preparing for 11-37
WAN utilization setting 11-26
WCCP
about 1-18
Cisco Express Forwarding (CEF) 4-15
default values
for WAE's general settings 4-17
defining router lists 4-29
flow redirection
enabling and disabling 4-16
ports used 2-7
request interception method 4-4
shutting down 4-31
WCCP-based routing
advanced configuration
for a router 4-7
for a WAE 4-11
configuration guidelines 4-5
overview of 2-19
wccp command 4-6
WCCP general settings
WAE default values 4-17
WCCP service masks
deleting 4-23, 4-24
modifying 4-23, 4-24, 4-25
WCCP services
displaying list of 4-6
web browser support 2-10
Windows Authentication
checking the status in the WAE Device Manager 10-15
configuring using the WAE Device Manager 10-11
Windows name services 5-17
Windows scaling, about 1-5