Cisco Wide Area Application Services Configuration Guide (Software Version 4.0.7)
Index
Downloads: This chapterpdf (PDF - 421.0KB) The complete bookPDF (PDF - 8.86MB) | Feedback

Index

Table Of Contents

Symbols - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -

Index

Symbols

> 12-14

A

AAA accounting

configuring 6-32

AAA-based management systems 2-25, 6-2

acceleration

about 1-6, 12-1

features 1-6

TCP settings 12-17

accounts

creating 7-3

creation process 7-2

deleting 7-6

local CLI 7-2

roles-based 7-2

types 7-1

viewing 7-8

ACL

See also IP ACL

action

full optimization 12-10

passthrough 12-10

TFO only 12-10

TFO with DRE 12-10

TFO with LZ compression 12-10

types 12-10

activating devices 14-23

adding

print clusters 13-13

printers 13-11

print server to clients 13-24

administrative login authentication and authorization

default 6-5

for WAEs 6-3

local database

description of 6-7

overview of 6-2

RADIUS

overview of 6-14

TACACS+

overview of 6-16

administrative login authentication failover 6-28

aggregate settings

for print servers 13-27

alarm overload detection, enabling 9-14

alarms

device reporting 15-3

aliases, for file servers 11-24

allowed protocols 13-31

application acceleration, about 1-6, 12-1

application classifiers

creating 12-5

match condition 12-8

restoring 12-13

application definition

creating 12-2

application list, viewing 12-11

application policies

restoring 12-13

application policy

creating 12-5

creation process 12-2

position 12-16

preparation tasks 12-2

types 12-7

applications

monitoring 12-14, 15-18

application traffic mix chart 15-25

assigning

application to a device 12-4

application to a device group 12-4

core cluster to file server 11-20

devices to a preposition directive 11-33

devices to more than one device group 3-9

assigning devices to device groups 3-7

audit trail logs

viewing 6-34, 15-17

authentication

default feature values 6-5

authentication databases, types of 6-3

authentication servers

configuring 6-14, 6-16

authorization

default feature values 6-5

autodiscover 1-16

autoregistration

DHCP server requirements 2-8

B

backing up

configuration files 10-8

WAAS Central Manager 14-9

WAE devices 14-11

backup and restore

cms database 14-9

banners

configuring 6-11

baseline groups

configuring 3-14

creation process 3-13

customizing 3-13

switching 3-15

types 3-12

working with 3-12

BIC TCP 1-6

bootflags 14-18

browser support 2-10

C

caching, about 1-17

CDP

configuring 5-15

cdp enable command 4-39

cdp run command 4-39

charts

application traffic mix 15-25

pass-through traffic mix 15-25

traffic reduction 15-26

CIFS 1-19, 11-2

Cisco.com

obtaining software files from 14-2

Cisco Discovery Protocol. See CDP

classifier, creating 12-5

classifier report, viewing 12-12

clear ip wccp command 4-1

clear statistics all command 6-27

clear statistics authentication command 6-27

clear statistics windows-domain command 6-27

CLI user

creating 7-4

clock

setting 9-6

clustering in inline mode 4-47

cms database

backup and restore procedure 14-9

cms database backup command 14-9

cms database restore command 14-11

coherency

age-based validation 11-5

compression, about 1-4

conditions

modifying or deleting from IP ACLs 8-7

configuration group 3-5

configuration process 11-8

configuring

administrative login authentication and authorization 6-8

core cluster 11-9

edge device 11-12

printer 13-30

WCCP on router 4-7

WCCP service password 4-10

congestion windows, about 5-12

connections, creating 11-23

controlled shutdown 14-24

copy disk ftp command 14-10

core cluster

about 1-19

assigning to file server 11-20

connecting to Edge WAEs 11-23

core configuration 11-9

core WAE, about 1-8

corrupted system images

recovering from 14-15

CPU utilization report 15-27

creating

accounts 7-3

application classifier 12-5

application definition 12-2

application policy 12-5

connections 11-23

file blocking directive 11-27

local user 7-4

match condition 12-8

new software file 14-3

preposition directive 11-29

preposition schedule 11-34

current software version

determining 14-2

D

database backup 14-9

data coherency, about 11-4

data concurrency, about 11-5

data migration 2-27

data redundancy elimination, about 1-4

debug command 15-27

default status, restoring 14-11

deleting

accounts 7-6

device groups 3-7

locations 3-18

roles 7-11

software files 14-8

device

alarms 15-3

autodiscovery 1-16

clock setting 9-6

rebooting 14-24

device groups

about 3-1

adding and removing devices 3-7

configuring 3-5

creating 3-3

creation process 3-3

deleting 3-7

enabling overlap 3-9

force group settings 3-10

list 3-8

overriding settings 3-10

setting configuration precedence 3-10

types 3-2

Device Home window 15-6

device locations

about 3-16

creating 3-16

deleting 3-18

device logs, viewing 15-18

device registration information

recovering 14-19

devices

activating 14-23

adding to device groups 3-7

adding to multiple device groups 3-9

impact of assigning to multiple groups 3-12

overriding device group settings 3-11

restarting 14-24

topology 12-14

viewing group assignments 3-8

viewing information for 15-5

Devices window 15-5

DFS, request interception method 4-49

DHCP

configuring interfaces for 5-8

for autoregistration 2-8

interface-level 2-9

DHCP server

requirements for autoregistration 2-8

disabling WCCP flow redirection 4-16

disconnected mode

about 11-37

configuring 11-38

requirements 11-38

disk-based software, missing

recovering from 14-18

disk handling

configuring error-handling methods 14-22

distributing drivers 13-19

DNS, configuring 5-16

documentation

related documents xx

domains

about 7-12

adding entities 7-14

assigning to user accounts 7-14

creating 7-13

deleting 7-15

modifying and deleting 7-15

viewing 7-16

double-byte language support 11-14

DRE, about 1-4

driver repository 13-15

drivers

distributing 13-19

installing 13-17

DSCP 11-11, 11-14

dynamic shares, creating 11-21

E

edge configuration 11-12

edge WAE, about 1-7

enable command 6-17

enabling

optimization 12-20

print banners 13-31

print services 13-10

SNMP 16-8

SNMP agent 16-6

traffic statistic collection 12-4

WCCP flow redirection 4-16

enabling file services

core 11-9

edge 11-12

entities

adding to domains 7-14

EPM classification

enabling and disabling 12-20

errors

disk drives 14-22

EtherChannel

configuring 5-7

Exec timeout

configuring 6-12

explicit congestion notification

about 5-12

F

failover, for administrative login authentication 6-28

fast offline detection

about 9-13

configuring 9-12

file blocking directive, creating 11-27

File Engines supported 2-10

file locking, about 11-6

file server aliases 11-24

File Server Rename utility 10-20

file servers

registering 11-16

supported 11-7

file services 11-8

about 1-7

enabling on core 11-9

enabling on edge 11-12

features 1-7

preparing for 11-7

flash memory

corrupted 14-15

force group settings 3-10

full optimization action 12-10

G

generic routing encapsulation. See GRE encapsulation

Gigabit Ethernet interfaces

modifying 5-5

GRE encapsulation 4-14, 4-15

GRE packet forwarding 4-15

H

hardware clock 9-6

I

increased buffering 1-5

inline mode 4-41

interface settings 4-43

serial clustering 4-47

VLAN configuration 4-46

inline network adapter card 4-41

installing

print drivers 13-17

intelligent message prediction 1-6

interface-level DHCP

description 2-10

note 2-8

interfaces

manually configuring for DHCP 5-8

IP access control lists. See IP ACL

IP ACL

adding conditions to 8-4

applying to interface 8-7

associating with application 8-7

conditions, modifying or deleting 8-7

configuration constraints 8-3

creating new 8-4

deleting 8-8

on routers 2-24

on WAEs 2-24

overview 8-1

IP addresses

multiple, configuring on single interface 5-5

static 2-9

IP routes

configuring 5-14

ip wccp command 4-10

ip wccp redirect-list command 4-10

ip web-cache redirect command 4-1, 4-10

K

kernel debugger

enabling 15-27

L

Layer 2 redirection 4-16

LDAP server signing 10-12, 10-14

configuring on a Microsoft server 6-25

configuring on a WAE 6-26

disabling on a WAE 6-27

overview of 6-25

line console carrier detection

configuring 6-13

load balancing 1-19, 4-12, 5-8

local CLI accounts, about 7-2

local user, creating 7-4

locations

about 3-16

creating 3-16

deleting 3-18

location tree

viewing 3-18

logging

message priority levels 15-10

system events 15-15

login

WAE Device Manager 10-2

login access

controlling 6-8

login authentication

about 2-25, 6-2

logs

severity levels in the WAE Device Manager 10-37

viewing in the WAE Device Manager 10-36

lost administrator passwords

recovering 14-17

LZ compression, about 1-4

M

match condition, creating 12-8

maximum segment size 12-19

message logs

viewing 15-15

message of the day settings

configuring 6-11

MIBs

supported 16-4

MIB traps

configuring using the WAE Device Manager 10-10

Microsoft DFS, request interception method 4-49

migration, data 2-27

missing disk-based software

recovering from 14-18

modifying a printer 13-30

monitoring

applications 12-14, 15-18

system status 15-2

using the WAE Device Manager 10-27

with SNMP 16-1

multiple IP addresses

configuring on single interfaces 5-5

N

namespace support 1-19

NAS appliances 1-16

NAT address 9-3

NAT configuration 9-3

NetBIOS 9-3, 11-13

Network Time Protocol. See NTP

network traffic analyzer tool 15-27

notification settings 10-17

NTP, configuring 9-5

O

obtaining software files 14-2

operation prediction and batching 1-6

optimization, enabling 12-20

P

packet forwarding method 4-14

Layer 2 redirection 4-16

Layer 3 GRE 4-15

packet return 4-15

passthrough action 12-10

pass-through traffic mix chart 15-25

passwords

changing account 7-7, 7-8

recovering administrator 14-17

PBR, about 1-18

policy-based routing

about 1-18

configuration of 4-33

overview of 2-19

verifying next-hop availability 4-38

policy report, viewing 12-12

port channel interfaces

configuring 5-7

load balancing 5-8

ports

139 2-7

bypassing 2-7

disabling 11-13

enabling 11-13

4050 2-7

445 2-7

disabling 11-13

enabling 11-13

50139 2-7

used in WAFS 2-7

position, application policy 12-16

power failure 14-15

preposition

checking status of 11-36

viewing in the WAE Device Manager 10-24

preposition directive, creating 11-29

prepositioning

about 11-4

preposition schedule, creating 11-34

print banners, enabling and disabling 13-31

print clusters

about 13-3

adding 13-13

print driver distribution, verifying 13-22

print drivers

distributing 13-19

installing 13-17

printer misconfiguration, PostScript error 13-32

printers

adding to a WAAS print server 13-11

printing a test page 13-30

print servers

adding to clients 13-24

details, viewing 13-26

print services

about 1-8, 13-1

configuration process 13-6

enabling 13-10

planning 13-4

Print Services Administration GUI, about 13-28

priority levels 15-10

R

RADIUS

authentication overview 6-14

configuring server 6-14

database 6-3

default configuration 6-5

RAID 1-20

RCP services, enabling 9-3

real-time transaction logging

configuring 15-12

rebooting devices 14-24

receive buffer size 12-19

recovering

device registration information 14-19

from missing disk-based software 14-18

lost administrator passwords 14-17

system software 14-15

redirection methods 4-2

registering

file servers 11-16

WAEs in the WAE Device Manager 10-6

remote login

controlling access 6-8

reports

CPU utilization 15-27

repository, driver 13-15

request redirection methods 4-2

rescue system image 14-15

restarting devices 14-24

restoring

application classifiers 12-13

application policies 12-13

configuration files 10-8

WAAS Central Manager 14-9

WAE devices 14-11

WAE to default condition 14-11

retransmit time multiplier

about 5-12

roles

about 7-8

assigning to user accounts 7-11

creating and managing 7-9

deleting 7-11

modifying and deleting 7-11

viewing 7-12

viewing settings 7-12

roles-based accounts

about 7-2, 7-3

router

configuring WCCP transparent redirection on 4-7

router lists, defining for WCCP services 4-29

S

SACK, about 1-5

schedule, for preposition 11-34

secure shell

configuring 6-8

host keys 6-9

selective acknowledgement 1-5

send buffer size 12-19

send TCP keepalive 12-18

serial clustering in inline mode 4-47

service password

configuring 4-10

set ip next-hop verify-availability command 4-40

shadow copy for shared folders 11-6

shares, request redirection using explicit naming of 4-49

show cdp neighbors command 4-39

show command utility

for troubleshooting 15-4

show version command 14-17

shutting down WCCP 4-31

Simple Network Management Protocol. See SNMP

site and network planning 2-4

SNMP 1-20

asset tag setting 16-16

community settings 16-11

configuration process 16-7

configuring using the WAE Device Manager 10-9

contact settings 16-17

enabling 16-8

enabling SNMP agent 16-6

group settings 16-13

host settings 16-10

manager

creating 16-3

monitoring with 16-1

preparation 16-7

security models and security levels 16-4

supported MIBs 16-4

traps 16-9

user settings 16-15

versions supported 16-3

view settings 16-12

software

recovering 14-15

software clock 9-6

software files

obtaining from Cisco.com 14-2

software recovery

using the CD-ROM 14-12

software upgrades 14-3

for multiple devices 14-5

process 14-1

software version

determining 14-2

spooling space, default 13-13

standby Central Manager

switching to primary 14-20

standby groups

of interfaces 5-2

standby interfaces

configuring 5-2

priority settings 5-3

starting WAE components 10-5

static IP addresses 2-9

static IP routes

configuring 5-14

statistics, collecting 12-4

stopping WAE components 10-5

switching baseline group 3-15

system configuration settings 9-10

system event logging

configuring 15-8

message priority levels 15-10

viewing log 15-15

system image

recovering 14-15

system message log

using 15-8

viewing 15-15

system software

recovering 14-15

system status

monitoring 15-2

system status bar

troubleshooting devices 15-4

T

TACACS+

authentication and authorization, overview of 6-16

database 6-3

default configuration 6-5

enable password attribute 6-17

TACACS+ server

configuring 6-16

taskbar icons 1-11

TCP

congestion windows 5-12

explicit congestion notification 5-12

parameter settings 5-9

retransmit timer 5-12

slow start 5-13

tcpdump command 15-27

TCP initial window size, about 1-5

TCP promiscuous mode service

overview of 2-23

Telnet services

enabling 6-10

tethereal command 15-27

TFO

about 1-4

TFO and LZ compression action 12-10

TFO features 1-4

BIC TCP 1-6

compression 1-4

increased buffering 1-5

selective acknowledgement 1-5

TCP initial window size maximization 1-5

Windows scaling 1-5

TFO only action 12-10

TFO with DRE action 12-10

time zones

parameter settings for 9-6

topology 12-14

track command 4-40

traffic reduction chart 15-26

traffic statistics collection, enabling 12-4

traffic statistics report 15-18

chart descriptions 15-24

transaction logging

about using 15-10

configuring 15-11

real-time, about using 15-14

real-time, configuring 15-12

transparent redirection, configuring on a router 4-7

traps, enabling 16-9

troubleshooting

using show command utility 15-4

with TCPdump 15-27

with Tethereal 15-27

types of application policies 12-7

U

Unicode support 2-11

upgrading

device groups 14-5

process 14-1

WAAS Central Manager device 14-7

user accounts

adding domain entities 7-14

assigning to domains 7-14

audit trail logs

viewing 6-34, 15-17

changing passwords 7-7, 7-8

creating 7-3

creation process 7-2

deleting 7-6

deleting domains 7-15

domains 7-13

managing 7-7, 7-8

modifying and deleting 7-6

roles

assigning to 7-11

creating 7-9

modifying and deleting 7-11

viewing 7-12

viewing 7-8

viewing domains 7-16

user authentication. See login authentication

UTC offsets 9-8

See also GMT offsets

V

verifying

print driver distribution 13-22

version of software 14-2

viewing

application list 12-11

classifier report 12-12

logs in the WAE device Manager 10-36

policy report 12-12

print server details 13-26

role settings 7-12

VLAN support 4-43

W

WAAS

benefits 1-15

interfaces 1-8

WAAS Central Manager

backing up 14-9

configuring as driver repository 13-15

restoring 14-9

upgrading 14-7

WAAS Central Manager GUI

about 1-9

accessing 1-9

components 1-10

taskbar icons 1-11

WAAS CLI, about 1-14

WAAS interfaces

CLI 1-14

Print Services Administration GUI 1-14

WAAS Central Manager GUI 1-9

WAE Device Manager GUI 1-13

WAAS networks

and IOP interoperability 2-11

network planning for 2-1

traffic redirection methods 2-18

WAAS Print Services Administration GUI, about 1-14

WAAS services, about 1-4

WAE Device Manager

about 1-13, 10-1

Configuration option 10-9

Configuration option (WAFS core) 10-21

Configuration option (WAFS Edge) 10-22

Control option for the WAE 10-5

logging out 10-3

Notifier tab 10-17

quick tour 10-3

Utilities option 10-18

workflow 10-3

WAE devices

backing up 14-11

controlled shutdown 14-24

modifying configuration properties 9-1

restoring 14-11

supported 2-10

WAE packet return 4-15

WAFS

about 1-17

configuration process 11-8

preparing for 11-7

WAFS Cache Cleanup utility 10-19

WAFS Core cluster 3-5

WAN failures, preparing for 11-37

WAN utilization setting 11-26

WCCP

about 1-18

Cisco Express Forwarding (CEF) 4-15

default values

for WAE's general settings 4-17

defining router lists 4-29

flow redirection

enabling and disabling 4-16

ports used 2-7

request interception method 4-4

shutting down 4-31

WCCP-based routing

advanced configuration

for a router 4-7

for a WAE 4-11

configuration guidelines 4-5

overview of 2-19

wccp command 4-6

WCCP general settings

WAE default values 4-17

WCCP service masks

deleting 4-23, 4-24

modifying 4-23, 4-24, 4-25

WCCP services

displaying list of 4-6

web browser support 2-10

Windows Authentication

checking the status in the WAE Device Manager 10-15

configuring using the WAE Device Manager 10-11

Windows name services 5-17

Windows scaling, about 1-5