Cisco Wide Area Application Services Configuration Guide (Software Version 4.3.1)
Index
Downloads: This chapterpdf (PDF - 478.0KB) The complete bookPDF (PDF - 13.02MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -

Index

A

AAA accounting

configuring 6-33

AAA-based management systems 2-26, 6-2

acceleration

about 1-6, 12-1

features 1-6

TCP adaptive buffering settings 12-44

TCP settings 12-42

accelerators

enabling 12-2

accounts

creating 7-4

creation process 7-2

deleting 7-6

local CLI 7-2

roles-based 7-2

types 7-1

viewing 7-8

ACL

interception 4-29

See also IP ACL

action

full optimization 12-36

passthrough 12-36

TFO only 12-36

TFO with DRE 12-36

TFO with LZ compression 12-36

types 12-36

activating devices 15-31

adaptive buffering, TFO 12-44

adding

charts 16-13

print clusters 13-14

printers 13-12

print server to clients 13-24

administrative login authentication and authorization

default 6-4

for WAEs 6-3

local database description 6-7

overview of 6-1

RADIUS overview 6-13

TACACS+ overview 6-15

Windows domain overview 6-17

administrative login authentication failover 6-27

aggregate settings

for print servers 13-27

alarm overload detection, enabling 9-23

alarm panel

system dashboard window 16-4

alarms

device reporting 16-5

alerts 16-6

aliases, for file servers 11-24

allowed protocols 13-31

application acceleration

about 1-6, 12-1

enabling 12-2

application classifiers

creating 12-31

match condition 12-34

restoring 12-38

application definition

creating 12-30

application list, viewing 12-37

application policy

creating 12-31

creation process 12-29

position 12-40

preparation tasks 12-29

restoring defaults 12-38

types 12-33

applications

monitoring 12-39, 16-2

assigning

application to a device 12-30

application to a device group 12-30

core cluster to file server 11-20

devices to a preposition directive 11-31

devices to device groups 3-6

devices to more than one device group 3-8

audit trail logs

viewing 6-34, 16-74

authentication

default feature values 6-4

authentication databases, types of 6-3

authentication servers

configuring 6-13, 6-15

authorization

default feature values 6-4

autodiscover 1-19

autoregistration

DHCP server requirements 2-8

B

backing up

configuration files 10-7

WAAS Central Manager 15-10

WAE devices 15-11

backup and restore

cms database 15-10

virtual blade 14-12

banners

configuring 6-10

baseline groups

configuring 3-14

creation process 3-12

customizing 3-13

switching 3-14

types 3-11

working with 3-11

BIC TCP 1-5

bootflags 15-19

browser support 2-11

C

caching, about 1-20

CDP

configuring 5-16

cdp enable command 4-40

cdp run command 4-40

Central Manager. See WAAS Central Manager

charts

adding 16-13

customizing 16-11

descriptions 16-15

settings 16-13

CIFS 11-2

enabling 15-30

CIFS accelerator

configuring 11-9

enabling 12-2

transparent CIFS and legacy modes 11-3

CifsAO WAE Device Manager option 10-19

Cisco.com

obtaining software files from 15-3

Cisco Discovery Protocol. See CDP

classifier, creating 12-31

classifier report, viewing 12-38

clear ip wccp command 4-1

clear statistics all command 6-26

clear statistics authentication command 6-26

clear statistics windows-domain command 6-26

CLI user

creating 7-4

clock

setting 9-5

clustering in inline mode 4-50

cms database

backup and restore procedure 15-10

cms database backup command 15-10

cms database restore command 15-11

coherency

age-based validation 11-6

compression, about 1-5

conditions

modifying or deleting from IP ACLs 8-6

configuration group 3-4

configuration process 11-9

congestion windows, about 5-14

connections

creating for WAFS 11-23

viewing TCP connections 16-54

Connections Statistics report 16-54

controlled shutdown 15-33

copy disk ftp command 15-10

core cluster

assigning to file server 11-20

connecting to Edge WAEs 11-23

core configuration 11-11

corrupted system images

recovering from 15-17

CPU Statistics report 16-59

creating

accounts 7-4

application classifier 12-31

application definition 12-30

application policy 12-31

connections for WAFS 11-23

local user 7-4

match condition 12-34

new software file 15-4

preposition directive 11-25

preposition schedule 11-32

current software version

determining 15-3

D

dashboard

customizing 16-11

device 16-10

system 16-2

database backup 15-10

data coherency, about 11-5

data concurrency, about 11-6

data migration 2-28

data redundancy elimination, about 1-5

debug command 16-77

default status, restoring 15-12

deleting

accounts 7-6

device groups 3-7

locations 3-16

roles 7-14

software files 15-9

user groups 7-20

device

alarms 16-5

autodiscovery 1-19

clock setting 9-5

rebooting 15-32

Device Dashboard window 16-10

device groups

about 3-1

adding and removing devices 3-6

configuring 3-5

creating 3-3

creation process 3-3

deleting 3-7

enabling overlap 3-8

force group settings 3-9

list 3-8

overriding settings 3-9

setting configuration precedence 3-9

types 3-2

Device Home window. See Device Dashboard window

device locations

about 3-15

creating 3-15

deleting 3-16

device logs, viewing 16-75

device registration information

recovering 15-21

devices

activating 15-31

adding to device groups 3-6

adding to multiple device groups 3-8

impact of assigning to multiple groups 3-11

overriding device group settings 3-10

restarting 15-32

topology 16-53

viewing group assignments 3-7

viewing information for 16-7, 16-42, 16-54

Devices window 16-7

DHCP

configuring interfaces for 5-8

for autoregistration 2-8

interface-level 2-10

DHCP server

requirements for autoregistration 2-8

directed mode 5-18

disabling WCCP flow redirection 4-18

disconnected mode

about 11-34

configuring 11-36

requirements 11-35

disk-based software, missing

recovering from 15-20

disk encryption 15-28

disk handling

configuring error-handling methods 15-29

configuring extended object cache 15-30

disks

monitoring 16-59

Disks report 16-59

distributing drivers 13-20

DNS, configuring 5-17

domains

about 7-14

adding entities 7-16

assigning to user accounts 7-16

assigning to user groups 7-19

creating 7-15

deleting 7-17

modifying and deleting 7-17

viewing 7-17

double-byte language support 11-16

downgrading 15-3

DRE, about 1-5

drivers

distributing 13-20

installing 13-18

repository 13-16

DSCP 11-13, 11-16, 12-34

global default 12-39

dynamic shares, creating 11-21

E

edge configuration 11-14

egress methods

configuring 4-30

email server settings for reports 9-24

enable command 6-16

enabling

core file services 11-11

edge file services 11-14

optimization and accelerators 12-2

print banners 13-31

print services 13-11

SNMP 17-10

SNMP agent 17-9

traffic statistic collection 12-30

virtual blade 14-3

WCCP flow redirection 4-18

encryption

disk 15-28

enabling secure store 9-10

entities

adding to domains 7-16

EPM accelerator

enabling 12-2

errors

disk drives 15-29

EtherChannel

configuring 5-7

Exec timeout

configuring 6-11

explicit congestion notification

about 5-14

extended object cache 15-30

F

failover, for administrative login authentication 6-27

fast offline detection

about 9-23

configuring 9-22

file locking, about 11-6

file server aliases 11-24

File Server Rename utility 10-19

file servers

registering 11-17

supported 11-8

file services 11-9

about 1-7

enabling on core 11-11

enabling on edge 11-14

features 1-8

preparing for 11-8

firewall, configuring for 5-18

flash memory

corrupted 15-17

flow monitoring

configuring 16-65

force group settings 3-9

full optimization action 12-36

G

generic GRE egress method 4-30

generic routing encapsulation. See GRE encapsulation

Gigabit Ethernet interfaces

modifying 5-5

GRE encapsulation 4-15, 4-17

GRE packet forwarding 4-17

GRE tunnel, configuring on router 4-32

groups. See user groups

H

hardware clock 9-6

high bandwidth WAN link 2-8

HTTP accelerator

configuring 12-5

enabling 12-2

HTTPS settings 12-5

I

increased buffering 1-5

inline mode 4-43

configuring IP address 4-47

interface settings 4-44

serial clustering 4-50

VLAN configuration 4-49

VLAN ID check 4-47

inline network adapter card 4-43

intelligent message prediction 1-6

interception ACL 4-29

interface-level DHCP

description 2-10

note 2-8

interfaces

configuring 5-1

configuring virtual 5-9

manually configuring for DHCP 5-8

WAAS Express optimization 5-10

IP access control lists. See IP ACL

IP ACL

adding conditions to 8-3

applying to interface 8-6

associating with application 8-6

conditions, modifying or deleting 8-6

configuration constraints 8-2

creating new 8-3

deleting 8-7

on routers 2-24

on WAEs 2-24

overview 8-1

IP addresses

multiple, configuring on single interface 5-5

static 2-10

IP routes

configuring 5-16

ip wccp command 4-11

ip wccp redirect-list command 4-11

ip web-cache redirect command 4-1, 4-11

K

kernel debugger

enabling 16-75

L

Layer 2 redirection 4-17

LDAP server signing 10-11, 10-13

configuring on a Microsoft server 6-24

configuring on a WAE 6-25

disabling on a WAE 6-26

overview of 6-24

legacy mode, CIFS 11-3

licenses 9-3

line console carrier detection

configuring 6-12

load balancing 1-22, 4-13, 5-12

local CLI accounts, about 7-2

local user, creating 7-4

locations

about 3-15

creating 3-15

deleting 3-16

location tree

viewing 3-16

logging

configuring system logging 16-67

message priority levels 16-69

transaction log format B-1

transaction logging 16-70

viewing audit trail log 16-74

viewing device logs 16-75

viewing system messages 16-73

login

WAE Device Manager 10-2

login access

controlling 6-7

login authentication

about 2-26, 6-1

logs

severity levels in the WAE Device Manager 10-33

viewing in the WAE Device Manager 10-32

lost administrator passwords

recovering 15-19

LZ compression, about 1-5

M

management IP address 9-3

MAPI accelerator

configuring 12-8

enabling 12-2

match condition, creating 12-34

maximum segment size 12-42

message logs

viewing 16-73

message of the day settings

configuring 6-10

MIBs

supported 17-4

MIB traps

configuring using the WAE Device Manager 10-9

migration, data 2-28

missing disk-based software

recovering from 15-20

modifying configuration 13-29

monitoring

applications 12-39, 16-2

chart descriptions 16-15

chart settings 16-13

CPU utilization 16-59

creating custom reports 16-61

disk information 16-59

flows with NetQoS 16-65

predefined reports 16-42

system status 16-6

using the WAE Device Manager 10-24

with SNMP 17-1

multiple IP addresses

configuring on single interfaces 5-5

N

namespace support 1-22

NAS appliances 1-20

NAT address 9-2

NAT configuration 9-2

NetBIOS 9-2, 11-15

NetQoS monitoring 16-65

network

viewing information for 16-2

Network Time Protocol. See NTP

network traffic analyzer tool 16-77

NFS accelerator

enabling 12-2

notification settings

for alerts 10-15

for reports 9-24

NTP, configuring 9-5

O

obtaining software files 15-3

operation prediction and batching 1-6

optimization

configuring on WAAS Express interfaces 5-10

enabling global features 12-2

P

packet forwarding method 4-15

Layer 2 redirection 4-17

Layer 3 GRE 4-17

packet return 4-16

passthrough action 12-36

passwords

changing account 7-7, 7-8

recovering administrator 15-19

PBR, about 1-21

policy-based routing

about 1-21

configuration of 4-34

overview of 2-20

verifying next-hop availability 4-39

policy report, viewing 12-38

port channel interfaces

configuring 5-7

load balancing 5-12

ports

139 2-6

bypassing 2-7

disabling 11-15

enabling 11-15

4050 2-6

445 2-6

disabling 11-15

enabling 11-15

50139 2-6

used in WAFS 2-6

position, application policy 12-40

power failure 15-17

preposition

about 11-4

checking status of 11-33

creating directive 11-25

scheduling 11-32

viewing in the WAE Device Manager 10-20

print accelerator 1-8

print banners, enabling and disabling 13-31

print clusters

about 13-4

adding 13-14

print drivers

distributing 13-20

installing 13-18

support issues 13-3

verifying distribution 13-21

printer 13-29

adding to a WAAS print server 13-12

printer misconfiguration, PostScript error 13-32

printing a test page 13-30

print servers

adding to clients 13-24

details, viewing 13-25

print services

about 1-8, 13-1

configuration process 13-7

enabling 13-11

planning 13-5

Print Services Administration GUI, about 13-28

priority levels 16-69

R

RADIUS

authentication overview 6-13

configuring server 6-13

database 6-3

default configuration 6-4

RAID 1-23

RCP services, enabling 9-4

rebooting devices 15-32

receive buffer size 12-42

recovering

device registration information 15-21

from missing disk-based software 15-20

lost administrator passwords 15-19

system software 15-17

redirection methods 4-1

registering

file servers 11-17

WAAS Express device 9-25

WAEs in the WAE Device Manager 10-6

remote login

controlling access 6-7

reports

configuring email server settings 9-24

Connections Statistics 16-54

CPU utilization 16-59

creating custom 16-61

customizing 16-11

editing 16-62

managing 16-60

predefined 16-42

scheduling 16-62

Topology 16-53

viewing custom 16-62

repository, driver 13-16

request redirection methods 4-1

rescue system image 15-17

restarting devices 15-32

restoring

application classifiers 12-38

application policies 12-38

configuration files 10-7

WAAS Central Manager 15-10

WAE devices 15-11

WAE to default condition 15-12

retransmit time multiplier

about 5-14

roles

about 7-10

assigning to user accounts 7-13

assigning to user groups 7-19

creating and managing 7-11

deleting 7-14

modifying and deleting 7-13

read-only access to services 7-11

viewing 7-14

viewing settings 7-14

roles-based accounts

about 7-2, 7-3

router

configuring WCCP transparent redirection on 4-7

router lists, defining for WCCP services 4-26

S

SACK, about 1-5

scheduling

preposition 11-32

reports 16-62

secure shell

configuring 6-8

host keys 6-9

secure store

changing key and password 9-14

configuring 9-10

disabling 9-16

enabling on Central Manager 9-12

enabling on standby Central Manager 9-13

enabling on WAE 9-13

security

disk encryption 15-28

enabling secure store 9-10

selective acknowledgement 1-5

send buffer size 12-42

send TCP keepalive 12-42

serial clustering in inline mode 4-50

service password

configuring 4-11

set ip next-hop verify-availability command 4-41

shadow copy for shared folders 11-7

show cdp neighbors command 4-40

show command utility

for troubleshooting 16-78

show version command 15-18

shutting down WCCP 4-28

Simple Network Management Protocol. See SNMP

site and network planning 2-4

SNMP 1-23

asset tag setting 17-21

community settings 17-16

configuration process 17-9

configuring using the WAE Device Manager 10-8

contact settings 17-21

defining custom traps 17-13

enabling 17-10

enabling SNMP agent 17-9

enabling traps 17-11

group settings 17-18

host settings 17-15

manager

creating 17-3

monitoring with 17-1

preparation 17-10

security models and security levels 17-4

supported MIBs 17-4

trap source settings 17-22

user settings 17-19

versions supported 17-3

view settings 17-17

software

recovering 15-17

software clock 9-6

software files

obtaining from Cisco.com 15-3

software licenses 9-3

software recovery

using the CD-ROM 15-12

software upgrades 15-4

for multiple devices 15-8

process 15-1

software version

determining 15-3

spooling space, default 13-15

SSL

configuring 12-11

standby Central Manager

switching to primary 15-26

standby groups

of interfaces 5-2

standby interfaces

configuring 5-2

priority settings 5-4

starting WAE components 10-5

static IP addresses 2-10

static IP routes

configuring 5-16

statistics, collecting 12-30

stopping WAE components 10-5

switching baseline group 3-14

system configuration settings 9-17

system dashboard

viewing system-wide information 16-2

system event logging

configuring 16-67

message priority levels 16-69

viewing log 16-73

system image

recovering 15-17

system message log

using 16-67

viewing 16-73

system software

recovering 15-17

system status

monitoring 16-6

T

TACACS+

authentication and authorization, overview of 6-15

database 6-3

default configuration 6-4

enable password attribute 6-16

TACACS+ server

configuring 6-15

taskbar icons 1-13

TCP

congestion windows 5-14

explicit congestion notification 5-14

parameter settings 5-12

retransmit timer 5-14

slow start 5-15

viewing connections 16-54

tcpdump command 16-77

TCP initial window size, about 1-4

TCP promiscuous mode service

overview of 2-23

Telnet services

enabling 6-10

test command for troubleshooting 16-77

tethereal command 16-77

TFO

about 1-4

TFO adaptive buffering 12-44

TFO and LZ compression action 12-36

TFO features 1-4

BIC TCP 1-5

compression 1-5

increased buffering 1-5

selective acknowledgement 1-5

TCP initial window size maximization 1-4

Windows scaling 1-4

TFO only action 12-36

TFO with DRE action 12-36

time zones

location abbreviations 9-7

parameter settings for 9-5

Topology report 16-53

track command 4-41

traffic statistics collection, enabling 12-30

traffic statistics report 16-2

chart descriptions 16-15

transaction logging 16-70

configuring 16-70

log format B-1

transparent redirection, configuring on a router 4-7

traps

defining SNMP 17-13

enabling 17-11

triggers

defining SNMP 17-13

troubleshooting

CLI commands 16-77

using show command utility 16-78

with Central Manager diagnostic tests 16-76

with TCPdump 16-77

with Tethereal 16-77

Troubleshooting Devices window 16-6

types of application policies 12-33

U

Unicode support 2-11

upgrading

device groups 15-8

process 15-1

WAAS Central Manager device 15-6

user accounts

adding domain entities 7-16

assigning to domains 7-16

audit trail logs

viewing 6-34, 16-74

changing passwords 7-7, 7-8

creating 7-4

creation process 7-2

deleting 7-6

deleting domains 7-17

domains 7-15

managing 7-8

modifying and deleting 7-6

roles

assigning to 7-13

creating 7-11

modifying and deleting 7-13

viewing 7-14

viewing 7-8

viewing domains 7-17

user authentication. See login authentication

user groups

about 7-18

assigning roles to 7-19

assigning to domains 7-19

creating 7-18

deleting 7-20

viewing 7-21

UTC offsets 9-8

See also GMT offsets

V

version of software 15-3

video accelerator

configuring 12-9

enabling 12-2

viewing

application list 12-37

classifier report 12-38

logs in the WAE device manager 10-32

policy report 12-38

print server details 13-25

role settings 7-14

virtual blade

backing up and restoring 14-12

configuring 14-1, 14-4

copying disk image to 14-10

enabling 14-3

starting and stopping 14-9

virtual interfaces

modifying 5-9

virtualization. See virtual blade

VLAN ID check 4-47

VLAN support 4-44

VPATH interception 4-52

vWAAS

virtual interface configuration 5-9

VPATH interception 4-52

W

WAAS

benefits 1-18

interfaces 1-9

WAAS Central Manager

backing up 15-10

configuring as driver repository 13-16

restoring 15-10

upgrading 15-6

WAAS Central Manager GUI

about 1-9

accessing 1-9

components 1-10

taskbar icons 1-13

WAAS CLI, about 1-17

WAAS Express

configuring a device certificate 9-28

configuring an NTP server 9-30

configuring a user 9-26

configuring optimization on interfaces 5-10

enabling HTTP secure server 9-29

importing Central Manager certificate 9-27

installing a license 9-29

registering with the Central Manager 9-30

registration process overview 9-25

reimporting a certificate to the Central Manager 9-31

WAAS interfaces

CLI 1-17

Print Services Administration GUI 1-17

WAAS Central Manager GUI 1-9

WAE Device Manager GUI 1-16

WAAS networks

and IOP interoperability 2-12

network planning for 2-1

traffic redirection methods 2-18

WAAS Print Services Administration GUI, about 1-17

WAAS services, about 1-4

WAE Device Manager

about 1-16, 10-1

Configuration option 10-8

Control option for the WAE 10-4

logging out 10-3

Notifier tab 10-15

quick tour 10-2

Utilities option 10-17

workflow 10-3

WAE devices

backing up 15-11

controlled shutdown 15-33

modifying configuration properties 9-1

restoring 15-11

supported 2-11

WAE packet return 4-16

WAFS

about 1-20

configuration process 11-9

preparing for 11-8

WAFS Cache Cleanup utility 10-18

WAFS Core cluster 3-4

WAN failures, preparing for 11-34

WAN utilization setting 11-25

WCCP

about 1-21

Cisco Express Forwarding (CEF) 4-17

defining router lists 4-26

flow redirection, enabling and disabling 4-18

GRE packet return 4-30

ports used 2-6

request interception method 4-3

shutting down 4-28

WCCP-based routing

advanced configuration for a router 4-7

configuration guidelines 4-5

overview of 2-19

wccp command 4-5

WCCP service masks

deleting 4-21

modifying 4-21, 4-23, 4-24

WCCP services

displaying list of 4-5

web application filter

configuring 9-20

web browser support 2-11

Windows Authentication

checking the status in the WAE Device Manager 10-13

configuring in the Central Manager 6-17

configuring using the WAE Device Manager 10-10

Windows domain server settings 6-18

Windows name services 5-18

Windows print accelerator, about 1-8

Windows scaling, about 1-4