Index A
AAA accounting
configuring 6-30
AAA-based management systems 2-26, 6-2
acceleration
about 1-6, 12-1
features 1-6
TCP adaptive buffering settings 12-21
TCP settings 12-19
accelerators
enabling 12-2
accounts
creating 7-4
creation process 7-2
deleting 7-6
local CLI 7-2
roles-based 7-2
types 7-1
viewing 7-8
ACL
See also IP ACL
action
full optimization 12-14
passthrough 12-14
TFO only 12-14
TFO with DRE 12-14
TFO with LZ compression 12-14
types 12-14
activating devices 15-29
adaptive buffering, TFO 12-21
adding
charts 16-11
print clusters 13-14
printers 13-12
print server to clients 13-23
administrative login authentication and authorization
default 6-4
for WAEs 6-3
local database
description of 6-7
overview of 6-1
RADIUS
overview of 6-13
TACACS+
overview of 6-15
administrative login authentication failover 6-26
aggregate settings
for print servers 13-26
alarm overload detection, enabling 9-19
alarm panel
system dashboard window 16-3
alarms
device reporting 16-5
alerts 16-6
aliases, for file servers 11-23
allowed protocols 13-30
application acceleration
about 1-6, 12-1
enabling 12-2
application classifiers
creating 12-9
match condition 12-12
restoring 12-16
application definition
creating 12-8
application list, viewing 12-15
application policy
creating 12-9
creation process 12-7
position 12-18
preparation tasks 12-7
restoring defaults 12-16
types 12-11
applications
monitoring 12-17, 16-2
application traffic mix chart 16-11
assigning
application to a device 12-9
application to a device group 12-9
core cluster to file server 11-19
devices to a preposition directive 11-30
devices to device groups 3-5
devices to more than one device group 3-7
audit trail logs
viewing 6-32, 16-36
authentication
default feature values 6-4
authentication databases, types of 6-3
authentication servers
configuring 6-13, 6-15
authorization
default feature values 6-4
autodiscover 1-17
autoregistration
DHCP server requirements 2-8
B
backing up
configuration files 10-7
WAAS Central Manager 15-11
WAE devices 15-13
backup and restore
cms database 15-11
virtual blade 14-8
banners
configuring 6-10
baseline groups
configuring 3-13
creation process 3-11
customizing 3-12
switching 3-13
types 3-11
working with 3-11
BIC TCP 1-5
bootflags 15-19
browser support 2-11
C
caching, about 1-18
CDP
configuring 5-15
cdp enable command 4-39
cdp run command 4-39
Central Manager. See WAAS Central Manager
charts
adding 16-11
application traffic mix 16-11
customizing 16-10
descriptions 16-11
settings 16-17
traffic reduction 16-13
CIFS 11-2
CIFS accelerator
configuring 11-9
enabling 12-2
transparent CIFS and legacy modes 11-3
CifsAO WAE Device Manager option 10-19
Cisco.com
obtaining software files from 15-3
Cisco Discovery Protocol. See CDP
classifier, creating 12-9
classifier report, viewing 12-16
clear ip wccp command 4-1
clear statistics all command 6-25
clear statistics authentication command 6-25
clear statistics windows-domain command 6-25
CLI user
creating 7-4
clock
setting 9-5
clustering in inline mode 4-48
cms database
backup and restore procedure 15-11
cms database backup command 15-11
cms database restore command 15-12
coherency
age-based validation 11-5
compression, about 1-5
conditions
modifying or deleting from IP ACLs 8-7
configuration group 3-3
configuration process 11-9
congestion windows, about 5-12
connections
creating for WAFS 11-22
viewing TCP connections 16-20
controlled shutdown 15-30
copy disk ftp command 15-12
core cluster
assigning to file server 11-19
connecting to Edge WAEs 11-22
core configuration 11-10
corrupted system images
recovering from 15-17
CPU utilization report 16-21
creating
accounts 7-4
application classifier 12-9
application definition 12-8
application policy 12-9
connections for WAFS 11-22
local user 7-4
match condition 12-12
new software file 15-4
preposition directive 11-25
preposition schedule 11-31
current software version
determining 15-3
D
dashboard
customizing 16-10
device 16-9
system 16-2
database backup 15-11
data coherency, about 11-5
data concurrency, about 11-6
data migration 2-28
data redundancy elimination, about 1-5
debug command 16-39
default status, restoring 15-13
deleting
accounts 7-6
device groups 3-6
locations 3-15
roles 7-13
software files 15-10
user groups 7-19
device
alarms 16-5
autodiscovery 1-17
clock setting 9-5
rebooting 15-29
Device Dashboard window 16-9
device groups
about 3-1
adding and removing devices 3-5
configuring 3-4
creating 3-3
creation process 3-2
deleting 3-6
enabling overlap 3-7
force group settings 3-8
list 3-7
overriding settings 3-8
setting configuration precedence 3-9
types 3-2
Device Home window. See Device Dashboard window
device locations
about 3-14
creating 3-14
deleting 3-15
device logs, viewing 16-37
device registration information
recovering 15-21
devices
activating 15-29
adding to device groups 3-5
adding to multiple device groups 3-7
impact of assigning to multiple groups 3-10
overriding device group settings 3-9
restarting 15-29
topology 16-19
viewing group assignments 3-6
viewing information for 16-7, 16-18, 16-20
Devices window 16-7
DFS, request interception method 4-50
DHCP
configuring interfaces for 5-9
for autoregistration 2-8
interface-level 2-10
DHCP server
requirements for autoregistration 2-8
directed mode 5-17
disabling WCCP flow redirection 4-17
disconnected mode
about 11-33
configuring 11-34
requirements 11-34
disk-based software, missing
recovering from 15-20
disk encryption 15-26
disk handling
configuring error-handling methods 15-28
disks
monitoring 16-22
distributing drivers 13-19
DNS, configuring 5-16
domains
about 7-14
adding entities 7-15
assigning to user accounts 7-15
assigning to user groups 7-18
creating 7-14
deleting 7-16
modifying and deleting 7-16
viewing 7-16
double-byte language support 11-14
downgrading 15-3
DRE, about 1-5
drivers
distributing 13-19
installing 13-18
repository 13-16
DSCP 11-12, 11-15, 12-12
global default 12-17
dynamic shares, creating 11-20
E
edge configuration 11-13
egress methods
configuring 4-29
email server settings for reports 9-20
enable command 6-16
enabling
core file services 11-10
edge file services 11-13
optimization and accelerators 12-2
print banners 13-30
print services 13-11
SNMP 17-9
SNMP agent 17-8
traffic statistic collection 12-8
virtual blade 14-2
WCCP flow redirection 4-17
encryption
disk 15-26
enabling secure store 9-10
entities
adding to domains 7-15
EPM accelerator
enabling 12-2
errors
disk drives 15-28
EtherChannel
configuring 5-8
Exec timeout
configuring 6-11
explicit congestion notification
about 5-12
F
failover, for administrative login authentication 6-26
fast offline detection
about 9-18
configuring 9-18
file locking, about 11-6
file server aliases 11-23
File Server Rename utility 10-18
file servers
registering 11-16
supported 11-8
file services 11-9
about 1-7
enabling on core 11-10
enabling on edge 11-13
features 1-7
preparing for 11-8
firewall, configuring for 5-17
flash memory
corrupted 15-17
flow monitoring
configuring 16-23
force group settings 3-8
full optimization action 12-14
G
generic GRE egress method 4-29
generic routing encapsulation. See GRE encapsulation
Gigabit Ethernet interfaces
modifying 5-6
GRE encapsulation 4-14, 4-16
GRE packet forwarding 4-16
GRE tunnel, configuring on router 4-31
groups. See user groups
H
hardware clock 9-6
HTTP accelerator
configuring 12-4
enabling 12-2
I
increased buffering 1-5
inline mode 4-41
configuring IP address 4-45
interface settings 4-43
serial clustering 4-48
VLAN configuration 4-47
VLAN ID check 4-45
inline network adapter card 4-41
intelligent message prediction 1-6
interface-level DHCP
description 2-10
note 2-8
interfaces
manually configuring for DHCP 5-9
IP access control lists. See IP ACL
IP ACL
adding conditions to 8-4
applying to interface 8-7
associating with application 8-7
conditions, modifying or deleting 8-7
configuration constraints 8-3
creating new 8-4
deleting 8-8
on routers 2-24
on WAEs 2-24
overview 8-1
IP addresses
multiple, configuring on single interface 5-6
static 2-10
IP routes
configuring 5-15
ip wccp command 4-11
ip wccp redirect-list command 4-11
ip web-cache redirect command 4-1, 4-11
K
kernel debugger
enabling 16-37
L
Layer 2 redirection 4-16
LDAP server signing 10-11, 10-13
configuring on a Microsoft server 6-23
configuring on a WAE 6-24
disabling on a WAE 6-25
overview of 6-23
legacy mode, CIFS 11-3
licenses 9-3
line console carrier detection
configuring 6-12
load balancing 1-20, 4-13, 5-10
local CLI accounts, about 7-2
local user, creating 7-4
locations
about 3-14
creating 3-14
deleting 3-15
location tree
viewing 3-15
logging
configuring system logging 16-29
message priority levels 16-31
transaction logging 16-32
viewing audit trail log 16-36
viewing device logs 16-37
viewing system messages 16-35
login
WAE Device Manager 10-2
login access
controlling 6-7
login authentication
about 2-25, 6-1
logs
severity levels in the WAE Device Manager 10-32
viewing in the WAE Device Manager 10-31
lost administrator passwords
recovering 15-19
LZ compression, about 1-5
M
management IP address 9-2
MAPI accelerator
configuring 12-5
enabling 12-2
match condition, creating 12-12
maximum segment size 12-20
message logs
viewing 16-35
message of the day settings
configuring 6-10
MIBs
supported 17-4
MIB traps
configuring using the WAE Device Manager 10-9
Microsoft DFS, request interception method 4-50
migration, data 2-28
missing disk-based software
recovering from 15-20
modifying configuration 13-28
monitoring
applications 12-17, 16-2
chart descriptions 16-11
chart settings 16-17
CPU utilization 16-21
creating custom reports 16-25
disk information 16-22
flows with NetQoS 16-23
predefined reports 16-18
system status 16-6
using the WAE Device Manager 10-23
with SNMP 17-1
multiple IP addresses
configuring on single interfaces 5-6
N
namespace support 1-20
NAS appliances 1-18
NAT address 9-2
NAT configuration 9-2
NetBIOS 9-2, 11-14
NetQoS monitoring 16-23
network
viewing information for 16-2
Network Time Protocol. See NTP
network traffic analyzer tool 16-39
NFS accelerator
enabling 12-2
notification settings
for alerts 10-15
for reports 9-20
NTP, configuring 9-5
O
obtaining software files 15-3
operation prediction and batching 1-6
optimization, enabling 12-2
P
packet forwarding method 4-14
Layer 2 redirection 4-16
Layer 3 GRE 4-16
packet return 4-15
passthrough action 12-14
passwords
changing account 7-7, 7-8
recovering administrator 15-19
PBR, about 1-19
policy-based routing
about 1-19
configuration of 4-32
overview of 2-20
verifying next-hop availability 4-38
policy report, viewing 12-16
port channel interfaces
configuring 5-8
load balancing 5-10
ports
139 2-7
bypassing 2-7
disabling 11-14
enabling 11-14
4050 2-7
445 2-7
disabling 11-14
enabling 11-14
50139 2-7
used in WAFS 2-7
position, application policy 12-18
power failure 15-17
preposition
about 11-4
checking status of 11-32
creating directive 11-25
scheduling 11-31
viewing in the WAE Device Manager 10-19
print accelerator 1-8
print banners, enabling and disabling 13-30
print clusters
about 13-4
adding 13-14
print drivers
distributing 13-19
installing 13-18
support issues 13-3
verifying distribution 13-21
printer 13-28
adding to a WAAS print server 13-12
printer misconfiguration, PostScript error 13-31
printing a test page 13-29
print servers
adding to clients 13-23
details, viewing 13-25
print services
about 1-8, 13-1
configuration process 13-7
enabling 13-11
planning 13-5
Print Services Administration GUI, about 13-27
priority levels 16-31
R
RADIUS
authentication overview 6-13
configuring server 6-13
database 6-3
default configuration 6-4
RAID 1-21
RCP services, enabling 9-4
rebooting devices 15-29
receive buffer size 12-20
recovering
device registration information 15-21
from missing disk-based software 15-20
lost administrator passwords 15-19
system software 15-17
redirection methods 4-1
registering
file servers 11-16
WAEs in the WAE Device Manager 10-6
remote login
controlling access 6-7
reports
configuring email server settings 9-20
CPU utilization 16-21
creating custom 16-25
customizing 16-10
editing 16-27
managing 16-25
predefined 16-18
scheduling 16-27
viewing custom 16-27
repository, driver 13-16
request redirection methods 4-1
rescue system image 15-17
restarting devices 15-29
restoring
application classifiers 12-16
application policies 12-16
configuration files 10-7
WAAS Central Manager 15-11
WAE devices 15-13
WAE to default condition 15-13
retransmit time multiplier
about 5-13
roles
about 7-10
assigning to user accounts 7-12
assigning to user groups 7-18
creating and managing 7-10
deleting 7-13
modifying and deleting 7-13
read-only access to services 7-10
viewing 7-13
viewing settings 7-13
roles-based accounts
about 7-2, 7-3
router
configuring WCCP transparent redirection on 4-7
router lists, defining for WCCP services 4-25
S
SACK, about 1-5
scheduling
preposition 11-31
reports 16-27
secure shell
configuring 6-8
host keys 6-9
secure store
changing key and password 9-14
configuring 9-10
disabling 9-15
enabling on Central Manager 9-12
enabling on standby Central Manager 9-13
enabling on WAE 9-13
security
disk encryption 15-26
enabling secure store 9-10
selective acknowledgement 1-5
send buffer size 12-20
send TCP keepalive 12-20
serial clustering in inline mode 4-48
service password
configuring 4-11
set ip next-hop verify-availability command 4-39
shadow copy for shared folders 11-7
shares, request redirection using explicit naming of 4-50
show cdp neighbors command 4-38
show command utility
for troubleshooting 16-39
show version command 15-19
shutting down WCCP 4-27
Simple Network Management Protocol. See SNMP
site and network planning 2-4
SNMP 1-21
asset tag setting 17-19
community settings 17-14
configuration process 17-8
configuring using the WAE Device Manager 10-8
contact settings 17-20
defining custom traps 17-12
enabling 17-9
enabling SNMP agent 17-8
enabling traps 17-10
group settings 17-17
host settings 17-13
manager
creating 17-3
monitoring with 17-1
preparation 17-9
security models and security levels 17-4
supported MIBs 17-4
user settings 17-18
versions supported 17-3
view settings 17-16
software
recovering 15-17
software clock 9-6
software files
obtaining from Cisco.com 15-3
software licenses 9-3
software recovery
using the CD-ROM 15-13
software upgrades 15-4
for multiple devices 15-10
process 15-1
software version
determining 15-3
spooling space, default 13-14
standby Central Manager
switching to primary 15-25
standby groups
of interfaces 5-2
standby interfaces
configuring 5-2
priority settings 5-4
starting WAE components 10-5
static IP addresses 2-10
static IP routes
configuring 5-15
statistics, collecting 12-8
stopping WAE components 10-5
switching baseline group 3-13
system configuration settings 9-16
system dashboard
viewing system-wide information 16-2
system event logging
configuring 16-29
message priority levels 16-31
viewing log 16-35
system image
recovering 15-17
system message log
using 16-29
viewing 16-35
system software
recovering 15-17
system status
monitoring 16-6
T
TACACS+
authentication and authorization, overview of 6-15
database 6-3
default configuration 6-4
enable password attribute 6-16
TACACS+ server
configuring 6-15
taskbar icons 1-12
TCP
congestion windows 5-12
explicit congestion notification 5-12
parameter settings 5-10
retransmit timer 5-13
slow start 5-13
viewing connections 16-20
tcpdump command 16-39
TCP initial window size, about 1-4
TCP promiscuous mode service
overview of 2-23
Telnet services
enabling 6-10
test command for troubleshooting 16-38
tethereal command 16-39
TFO
about 1-4
TFO adaptive buffering 12-21
TFO and LZ compression action 12-14
TFO features 1-4
BIC TCP 1-5
compression 1-5
increased buffering 1-5
selective acknowledgement 1-5
TCP initial window size maximization 1-4
Windows scaling 1-4
TFO only action 12-14
TFO with DRE action 12-14
time zones
location abbreviations 9-7
parameter settings for 9-5
topology 16-19
track command 4-40
traffic reduction chart 16-13
traffic statistics collection, enabling 12-8
traffic statistics report 16-2
chart descriptions 16-11
transaction logging 16-32
configuring 16-32
transparent redirection, configuring on a router 4-7
traps
defining SNMP 17-12
enabling 17-10
triggers
defining SNMP 17-12
troubleshooting
CLI commands 16-38
using show command utility 16-39
with Central Manager diagnostic tests 16-38
with TCPdump 16-39
with Tethereal 16-39
Troubleshooting Devices window 16-6
types of application policies 12-11
U
Unicode support 2-11
upgrading
device groups 15-10
process 15-1
WAAS Central Manager device 15-8
user accounts
adding domain entities 7-15
assigning to domains 7-15
audit trail logs
viewing 6-32, 16-36
changing passwords 7-7, 7-8
creating 7-4
creation process 7-2
deleting 7-6
deleting domains 7-16
domains 7-14
managing 7-7, 7-8
modifying and deleting 7-6
roles
assigning to 7-12
creating 7-10
modifying and deleting 7-13
viewing 7-13
viewing 7-8
viewing domains 7-16
user authentication. See login authentication
user groups
about 7-17
assigning roles to 7-18
assigning to domains 7-18
creating 7-17
deleting 7-19
viewing 7-19
UTC offsets 9-8
See also GMT offsets
V
version of software 15-3
video accelerator
configuring 12-5
enabling 12-2
viewing
application list 12-15
classifier report 12-16
logs in the WAE device manager 10-31
policy report 12-16
print server details 13-25
role settings 7-13
virtual blade
backing up and restoring 14-8
configuring 14-1, 14-4
copying disk image to 14-8
enabling 14-2
starting and stopping 14-7
virtualization. See virtual blade
VLAN ID check 4-45
VLAN support 4-42
W
WAAS
benefits 1-16
interfaces 1-8
WAAS Central Manager
backing up 15-11
configuring as driver repository 13-16
restoring 15-11
upgrading 15-8
WAAS Central Manager GUI
about 1-9
accessing 1-9
components 1-9
taskbar icons 1-12
WAAS CLI, about 1-16
WAAS interfaces
CLI 1-16
Print Services Administration GUI 1-15
WAAS Central Manager GUI 1-9
WAE Device Manager GUI 1-14
WAAS networks
and IOP interoperability 2-12
network planning for 2-1
traffic redirection methods 2-18
WAAS Print Services Administration GUI, about 1-15
WAAS services, about 1-4
WAE Device Manager
about 1-14, 10-1
Configuration option 10-8
Control option for the WAE 10-4
logging out 10-3
Notifier tab 10-15
quick tour 10-2
Utilities option 10-17
workflow 10-3
WAE devices
backing up 15-13
controlled shutdown 15-30
modifying configuration properties 9-1
restoring 15-13
supported 2-11
WAE packet return 4-15
WAFS
about 1-18
configuration process 11-9
preparing for 11-8
WAFS Cache Cleanup utility 10-18
WAFS Core cluster 3-3
WAN failures, preparing for 11-33
WAN utilization setting 11-24
WCCP
about 1-19
Cisco Express Forwarding (CEF) 4-16
default values
for WAE general settings 4-17
defining router lists 4-25
flow redirection
enabling and disabling 4-17
GRE packet return 4-29
ports used 2-7
request interception method 4-4
shutting down 4-27
WCCP-based routing
advanced configuration
for a router 4-7
configuration guidelines 4-5
overview of 2-19
wccp command 4-5
WCCP general settings
WAE default values 4-17
WCCP service masks
deleting 4-22, 4-23
modifying 4-22, 4-23
WCCP services
displaying list of 4-5
web browser support 2-11
Windows Authentication
checking the status in the WAE Device Manager 10-14
configuring using the WAE Device Manager 10-10
Windows name services 5-17
Windows print accelerator, about 1-8
Windows scaling, about 1-4
Index
A
AAA accounting
configuring 6-30
AAA-based management systems 2-26, 6-2
acceleration
about 1-6, 12-1
features 1-6
TCP adaptive buffering settings 12-21
TCP settings 12-19
accelerators
enabling 12-2
accounts
creating 7-4
creation process 7-2
deleting 7-6
local CLI 7-2
roles-based 7-2
types 7-1
viewing 7-8
ACL
See also IP ACL
action
full optimization 12-14
passthrough 12-14
TFO only 12-14
TFO with DRE 12-14
TFO with LZ compression 12-14
types 12-14
activating devices 15-29
adaptive buffering, TFO 12-21
adding
charts 16-11
print clusters 13-14
printers 13-12
print server to clients 13-23
administrative login authentication and authorization
default 6-4
for WAEs 6-3
local database
description of 6-7
overview of 6-1
RADIUS
overview of 6-13
TACACS+
overview of 6-15
administrative login authentication failover 6-26
aggregate settings
for print servers 13-26
alarm overload detection, enabling 9-19
alarm panel
system dashboard window 16-3
alarms
device reporting 16-5
alerts 16-6
aliases, for file servers 11-23
allowed protocols 13-30
application acceleration
about 1-6, 12-1
enabling 12-2
application classifiers
creating 12-9
match condition 12-12
restoring 12-16
application definition
creating 12-8
application list, viewing 12-15
application policy
creating 12-9
creation process 12-7
position 12-18
preparation tasks 12-7
restoring defaults 12-16
types 12-11
applications
monitoring 12-17, 16-2
application traffic mix chart 16-11
assigning
application to a device 12-9
application to a device group 12-9
core cluster to file server 11-19
devices to a preposition directive 11-30
devices to device groups 3-5
devices to more than one device group 3-7
audit trail logs
viewing 6-32, 16-36
authentication
default feature values 6-4
authentication databases, types of 6-3
authentication servers
configuring 6-13, 6-15
authorization
default feature values 6-4
autodiscover 1-17
autoregistration
DHCP server requirements 2-8
B
backing up
configuration files 10-7
WAAS Central Manager 15-11
WAE devices 15-13
backup and restore
cms database 15-11
virtual blade 14-8
banners
configuring 6-10
baseline groups
configuring 3-13
creation process 3-11
customizing 3-12
switching 3-13
types 3-11
working with 3-11
BIC TCP 1-5
bootflags 15-19
browser support 2-11
C
caching, about 1-18
CDP
configuring 5-15
cdp enable command 4-39
cdp run command 4-39
Central Manager. See WAAS Central Manager
charts
adding 16-11
application traffic mix 16-11
customizing 16-10
descriptions 16-11
settings 16-17
traffic reduction 16-13
CIFS 11-2
CIFS accelerator
configuring 11-9
enabling 12-2
transparent CIFS and legacy modes 11-3
CifsAO WAE Device Manager option 10-19
Cisco.com
obtaining software files from 15-3
Cisco Discovery Protocol. See CDP
classifier, creating 12-9
classifier report, viewing 12-16
clear ip wccp command 4-1
clear statistics all command 6-25
clear statistics authentication command 6-25
clear statistics windows-domain command 6-25
CLI user
creating 7-4
clock
setting 9-5
clustering in inline mode 4-48
cms database
backup and restore procedure 15-11
cms database backup command 15-11
cms database restore command 15-12
coherency
age-based validation 11-5
compression, about 1-5
conditions
modifying or deleting from IP ACLs 8-7
configuration group 3-3
configuration process 11-9
congestion windows, about 5-12
connections
creating for WAFS 11-22
viewing TCP connections 16-20
controlled shutdown 15-30
copy disk ftp command 15-12
core cluster
assigning to file server 11-19
connecting to Edge WAEs 11-22
core configuration 11-10
corrupted system images
recovering from 15-17
CPU utilization report 16-21
creating
accounts 7-4
application classifier 12-9
application definition 12-8
application policy 12-9
connections for WAFS 11-22
local user 7-4
match condition 12-12
new software file 15-4
preposition directive 11-25
preposition schedule 11-31
current software version
determining 15-3
D
dashboard
customizing 16-10
device 16-9
system 16-2
database backup 15-11
data coherency, about 11-5
data concurrency, about 11-6
data migration 2-28
data redundancy elimination, about 1-5
debug command 16-39
default status, restoring 15-13
deleting
accounts 7-6
device groups 3-6
locations 3-15
roles 7-13
software files 15-10
user groups 7-19
device
alarms 16-5
autodiscovery 1-17
clock setting 9-5
rebooting 15-29
Device Dashboard window 16-9
device groups
about 3-1
adding and removing devices 3-5
configuring 3-4
creating 3-3
creation process 3-2
deleting 3-6
enabling overlap 3-7
force group settings 3-8
list 3-7
overriding settings 3-8
setting configuration precedence 3-9
types 3-2
Device Home window. See Device Dashboard window
device locations
about 3-14
creating 3-14
deleting 3-15
device logs, viewing 16-37
device registration information
recovering 15-21
devices
activating 15-29
adding to device groups 3-5
adding to multiple device groups 3-7
impact of assigning to multiple groups 3-10
overriding device group settings 3-9
restarting 15-29
topology 16-19
viewing group assignments 3-6
viewing information for 16-7, 16-18, 16-20
Devices window 16-7
DFS, request interception method 4-50
DHCP
configuring interfaces for 5-9
for autoregistration 2-8
interface-level 2-10
DHCP server
requirements for autoregistration 2-8
directed mode 5-17
disabling WCCP flow redirection 4-17
disconnected mode
about 11-33
configuring 11-34
requirements 11-34
disk-based software, missing
recovering from 15-20
disk encryption 15-26
disk handling
configuring error-handling methods 15-28
disks
monitoring 16-22
distributing drivers 13-19
DNS, configuring 5-16
domains
about 7-14
adding entities 7-15
assigning to user accounts 7-15
assigning to user groups 7-18
creating 7-14
deleting 7-16
modifying and deleting 7-16
viewing 7-16
double-byte language support 11-14
downgrading 15-3
DRE, about 1-5
drivers
distributing 13-19
installing 13-18
repository 13-16
DSCP 11-12, 11-15, 12-12
global default 12-17
dynamic shares, creating 11-20
E
edge configuration 11-13
egress methods
configuring 4-29
email server settings for reports 9-20
enable command 6-16
enabling
core file services 11-10
edge file services 11-13
optimization and accelerators 12-2
print banners 13-30
print services 13-11
SNMP 17-9
SNMP agent 17-8
traffic statistic collection 12-8
virtual blade 14-2
WCCP flow redirection 4-17
encryption
disk 15-26
enabling secure store 9-10
entities
adding to domains 7-15
EPM accelerator
enabling 12-2
errors
disk drives 15-28
EtherChannel
configuring 5-8
Exec timeout
configuring 6-11
explicit congestion notification
about 5-12
F
failover, for administrative login authentication 6-26
fast offline detection
about 9-18
configuring 9-18
file locking, about 11-6
file server aliases 11-23
File Server Rename utility 10-18
file servers
registering 11-16
supported 11-8
file services 11-9
about 1-7
enabling on core 11-10
enabling on edge 11-13
features 1-7
preparing for 11-8
firewall, configuring for 5-17
flash memory
corrupted 15-17
flow monitoring
configuring 16-23
force group settings 3-8
full optimization action 12-14
G
generic GRE egress method 4-29
generic routing encapsulation. See GRE encapsulation
Gigabit Ethernet interfaces
modifying 5-6
GRE encapsulation 4-14, 4-16
GRE packet forwarding 4-16
GRE tunnel, configuring on router 4-31
groups. See user groups
H
hardware clock 9-6
HTTP accelerator
configuring 12-4
enabling 12-2
I
increased buffering 1-5
inline mode 4-41
configuring IP address 4-45
interface settings 4-43
serial clustering 4-48
VLAN configuration 4-47
VLAN ID check 4-45
inline network adapter card 4-41
intelligent message prediction 1-6
interface-level DHCP
description 2-10
note 2-8
interfaces
manually configuring for DHCP 5-9
IP access control lists. See IP ACL
IP ACL
adding conditions to 8-4
applying to interface 8-7
associating with application 8-7
conditions, modifying or deleting 8-7
configuration constraints 8-3
creating new 8-4
deleting 8-8
on routers 2-24
on WAEs 2-24
overview 8-1
IP addresses
multiple, configuring on single interface 5-6
static 2-10
IP routes
configuring 5-15
ip wccp command 4-11
ip wccp redirect-list command 4-11
ip web-cache redirect command 4-1, 4-11
K
kernel debugger
enabling 16-37
L
Layer 2 redirection 4-16
LDAP server signing 10-11, 10-13
configuring on a Microsoft server 6-23
configuring on a WAE 6-24
disabling on a WAE 6-25
overview of 6-23
legacy mode, CIFS 11-3
licenses 9-3
line console carrier detection
configuring 6-12
load balancing 1-20, 4-13, 5-10
local CLI accounts, about 7-2
local user, creating 7-4
locations
about 3-14
creating 3-14
deleting 3-15
location tree
viewing 3-15
logging
configuring system logging 16-29
message priority levels 16-31
transaction logging 16-32
viewing audit trail log 16-36
viewing device logs 16-37
viewing system messages 16-35
login
WAE Device Manager 10-2
login access
controlling 6-7
login authentication
about 2-25, 6-1
logs
severity levels in the WAE Device Manager 10-32
viewing in the WAE Device Manager 10-31
lost administrator passwords
recovering 15-19
LZ compression, about 1-5
M
management IP address 9-2
MAPI accelerator
configuring 12-5
enabling 12-2
match condition, creating 12-12
maximum segment size 12-20
message logs
viewing 16-35
message of the day settings
configuring 6-10
MIBs
supported 17-4
MIB traps
configuring using the WAE Device Manager 10-9
Microsoft DFS, request interception method 4-50
migration, data 2-28
missing disk-based software
recovering from 15-20
modifying configuration 13-28
monitoring
applications 12-17, 16-2
chart descriptions 16-11
chart settings 16-17
CPU utilization 16-21
creating custom reports 16-25
disk information 16-22
flows with NetQoS 16-23
predefined reports 16-18
system status 16-6
using the WAE Device Manager 10-23
with SNMP 17-1
multiple IP addresses
configuring on single interfaces 5-6
N
namespace support 1-20
NAS appliances 1-18
NAT address 9-2
NAT configuration 9-2
NetBIOS 9-2, 11-14
NetQoS monitoring 16-23
network
viewing information for 16-2
Network Time Protocol. See NTP
network traffic analyzer tool 16-39
NFS accelerator
enabling 12-2
notification settings
for alerts 10-15
for reports 9-20
NTP, configuring 9-5
O
obtaining software files 15-3
operation prediction and batching 1-6
optimization, enabling 12-2
P
packet forwarding method 4-14
Layer 2 redirection 4-16
Layer 3 GRE 4-16
packet return 4-15
passthrough action 12-14
passwords
changing account 7-7, 7-8
recovering administrator 15-19
PBR, about 1-19
policy-based routing
about 1-19
configuration of 4-32
overview of 2-20
verifying next-hop availability 4-38
policy report, viewing 12-16
port channel interfaces
configuring 5-8
load balancing 5-10
ports
139 2-7
bypassing 2-7
disabling 11-14
enabling 11-14
4050 2-7
445 2-7
disabling 11-14
enabling 11-14
50139 2-7
used in WAFS 2-7
position, application policy 12-18
power failure 15-17
preposition
about 11-4
checking status of 11-32
creating directive 11-25
scheduling 11-31
viewing in the WAE Device Manager 10-19
print accelerator 1-8
print banners, enabling and disabling 13-30
print clusters
about 13-4
adding 13-14
print drivers
distributing 13-19
installing 13-18
support issues 13-3
verifying distribution 13-21
printer 13-28
adding to a WAAS print server 13-12
printer misconfiguration, PostScript error 13-31
printing a test page 13-29
print servers
adding to clients 13-23
details, viewing 13-25
print services
about 1-8, 13-1
configuration process 13-7
enabling 13-11
planning 13-5
Print Services Administration GUI, about 13-27
priority levels 16-31
R
RADIUS
authentication overview 6-13
configuring server 6-13
database 6-3
default configuration 6-4
RAID 1-21
RCP services, enabling 9-4
rebooting devices 15-29
receive buffer size 12-20
recovering
device registration information 15-21
from missing disk-based software 15-20
lost administrator passwords 15-19
system software 15-17
redirection methods 4-1
registering
file servers 11-16
WAEs in the WAE Device Manager 10-6
remote login
controlling access 6-7
reports
configuring email server settings 9-20
CPU utilization 16-21
creating custom 16-25
customizing 16-10
editing 16-27
managing 16-25
predefined 16-18
scheduling 16-27
viewing custom 16-27
repository, driver 13-16
request redirection methods 4-1
rescue system image 15-17
restarting devices 15-29
restoring
application classifiers 12-16
application policies 12-16
configuration files 10-7
WAAS Central Manager 15-11
WAE devices 15-13
WAE to default condition 15-13
retransmit time multiplier
about 5-13
roles
about 7-10
assigning to user accounts 7-12
assigning to user groups 7-18
creating and managing 7-10
deleting 7-13
modifying and deleting 7-13
read-only access to services 7-10
viewing 7-13
viewing settings 7-13
roles-based accounts
about 7-2, 7-3
router
configuring WCCP transparent redirection on 4-7
router lists, defining for WCCP services 4-25
S
SACK, about 1-5
scheduling
preposition 11-31
reports 16-27
secure shell
configuring 6-8
host keys 6-9
secure store
changing key and password 9-14
configuring 9-10
disabling 9-15
enabling on Central Manager 9-12
enabling on standby Central Manager 9-13
enabling on WAE 9-13
security
disk encryption 15-26
enabling secure store 9-10
selective acknowledgement 1-5
send buffer size 12-20
send TCP keepalive 12-20
serial clustering in inline mode 4-48
service password
configuring 4-11
set ip next-hop verify-availability command 4-39
shadow copy for shared folders 11-7
shares, request redirection using explicit naming of 4-50
show cdp neighbors command 4-38
show command utility
for troubleshooting 16-39
show version command 15-19
shutting down WCCP 4-27
Simple Network Management Protocol. See SNMP
site and network planning 2-4
SNMP 1-21
asset tag setting 17-19
community settings 17-14
configuration process 17-8
configuring using the WAE Device Manager 10-8
contact settings 17-20
defining custom traps 17-12
enabling 17-9
enabling SNMP agent 17-8
enabling traps 17-10
group settings 17-17
host settings 17-13
manager
creating 17-3
monitoring with 17-1
preparation 17-9
security models and security levels 17-4
supported MIBs 17-4
user settings 17-18
versions supported 17-3
view settings 17-16
software
recovering 15-17
software clock 9-6
software files
obtaining from Cisco.com 15-3
software licenses 9-3
software recovery
using the CD-ROM 15-13
software upgrades 15-4
for multiple devices 15-10
process 15-1
software version
determining 15-3
spooling space, default 13-14
standby Central Manager
switching to primary 15-25
standby groups
of interfaces 5-2
standby interfaces
configuring 5-2
priority settings 5-4
starting WAE components 10-5
static IP addresses 2-10
static IP routes
configuring 5-15
statistics, collecting 12-8
stopping WAE components 10-5
switching baseline group 3-13
system configuration settings 9-16
system dashboard
viewing system-wide information 16-2
system event logging
configuring 16-29
message priority levels 16-31
viewing log 16-35
system image
recovering 15-17
system message log
using 16-29
viewing 16-35
system software
recovering 15-17
system status
monitoring 16-6
T
TACACS+
authentication and authorization, overview of 6-15
database 6-3
default configuration 6-4
enable password attribute 6-16
TACACS+ server
configuring 6-15
taskbar icons 1-12
TCP
congestion windows 5-12
explicit congestion notification 5-12
parameter settings 5-10
retransmit timer 5-13
slow start 5-13
viewing connections 16-20
tcpdump command 16-39
TCP initial window size, about 1-4
TCP promiscuous mode service
overview of 2-23
Telnet services
enabling 6-10
test command for troubleshooting 16-38
tethereal command 16-39
TFO
about 1-4
TFO adaptive buffering 12-21
TFO and LZ compression action 12-14
TFO features 1-4
BIC TCP 1-5
compression 1-5
increased buffering 1-5
selective acknowledgement 1-5
TCP initial window size maximization 1-4
Windows scaling 1-4
TFO only action 12-14
TFO with DRE action 12-14
time zones
location abbreviations 9-7
parameter settings for 9-5
topology 16-19
track command 4-40
traffic reduction chart 16-13
traffic statistics collection, enabling 12-8
traffic statistics report 16-2
chart descriptions 16-11
transaction logging 16-32
configuring 16-32
transparent redirection, configuring on a router 4-7
traps
defining SNMP 17-12
enabling 17-10
triggers
defining SNMP 17-12
troubleshooting
CLI commands 16-38
using show command utility 16-39
with Central Manager diagnostic tests 16-38
with TCPdump 16-39
with Tethereal 16-39
Troubleshooting Devices window 16-6
types of application policies 12-11
U
Unicode support 2-11
upgrading
device groups 15-10
process 15-1
WAAS Central Manager device 15-8
user accounts
adding domain entities 7-15
assigning to domains 7-15
audit trail logs
viewing 6-32, 16-36
changing passwords 7-7, 7-8
creating 7-4
creation process 7-2
deleting 7-6
deleting domains 7-16
domains 7-14
managing 7-7, 7-8
modifying and deleting 7-6
roles
assigning to 7-12
creating 7-10
modifying and deleting 7-13
viewing 7-13
viewing 7-8
viewing domains 7-16
user authentication. See login authentication
user groups
about 7-17
assigning roles to 7-18
assigning to domains 7-18
creating 7-17
deleting 7-19
viewing 7-19
UTC offsets 9-8
See also GMT offsets
V
version of software 15-3
video accelerator
configuring 12-5
enabling 12-2
viewing
application list 12-15
classifier report 12-16
logs in the WAE device manager 10-31
policy report 12-16
print server details 13-25
role settings 7-13
virtual blade
backing up and restoring 14-8
configuring 14-1, 14-4
copying disk image to 14-8
enabling 14-2
starting and stopping 14-7
virtualization. See virtual blade
VLAN ID check 4-45
VLAN support 4-42
W
WAAS
benefits 1-16
interfaces 1-8
WAAS Central Manager
backing up 15-11
configuring as driver repository 13-16
restoring 15-11
upgrading 15-8
WAAS Central Manager GUI
about 1-9
accessing 1-9
components 1-9
taskbar icons 1-12
WAAS CLI, about 1-16
WAAS interfaces
CLI 1-16
Print Services Administration GUI 1-15
WAAS Central Manager GUI 1-9
WAE Device Manager GUI 1-14
WAAS networks
and IOP interoperability 2-12
network planning for 2-1
traffic redirection methods 2-18
WAAS Print Services Administration GUI, about 1-15
WAAS services, about 1-4
WAE Device Manager
about 1-14, 10-1
Configuration option 10-8
Control option for the WAE 10-4
logging out 10-3
Notifier tab 10-15
quick tour 10-2
Utilities option 10-17
workflow 10-3
WAE devices
backing up 15-13
controlled shutdown 15-30
modifying configuration properties 9-1
restoring 15-13
supported 2-11
WAE packet return 4-15
WAFS
about 1-18
configuration process 11-9
preparing for 11-8
WAFS Cache Cleanup utility 10-18
WAFS Core cluster 3-3
WAN failures, preparing for 11-33
WAN utilization setting 11-24
WCCP
about 1-19
Cisco Express Forwarding (CEF) 4-16
default values
for WAE general settings 4-17
defining router lists 4-25
flow redirection
enabling and disabling 4-17
GRE packet return 4-29
ports used 2-7
request interception method 4-4
shutting down 4-27
WCCP-based routing
advanced configuration
for a router 4-7
configuration guidelines 4-5
overview of 2-19
wccp command 4-5
WCCP general settings
WAE default values 4-17
WCCP service masks
deleting 4-22, 4-23
modifying 4-22, 4-23
WCCP services
displaying list of 4-5
web browser support 2-11
Windows Authentication
checking the status in the WAE Device Manager 10-14
configuring using the WAE Device Manager 10-10
Windows name services 5-17
Windows print accelerator, about 1-8
Windows scaling, about 1-4