Cisco Wide Area Application Services Configuration Guide (Software Version 4.4.1)
Index
Downloads: This chapterpdf (PDF - 455.0KB) The complete bookPDF (PDF - 11.7MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -

Index

Numerics

10 Gigabit Ethernet interfaces

modifying 5-6

A

AAA accounting

configuring 6-32

AAA-based management systems 2-25, 6-2

acceleration

about 1-6, 12-1

features 1-6

TCP adaptive buffering settings 12-45

TCP settings 12-43

accelerators

enabling 12-2

accounts

creating 7-4

creation process 7-2

deleting 7-6

local CLI 7-2

roles-based 7-2

types 7-1

viewing 7-8

ACL

interception 4-27

See also IP ACL

action

full optimization (adaptive cache) 12-37

full optimization (bidirectional cache) 12-37

full optimization (unidirectional cache) 12-37

passthrough 12-36

TFO only 12-36

TFO with DRE (Adaptive Cache) 12-37

TFO with DRE (Bidirectional Cache) 12-37

TFO with DRE (Unidirectional Cache) 12-37

TFO with LZ compression 12-37

types 12-36

activating devices 15-35

adaptive buffering, TFO 12-45

adding

charts 16-13

administrative login authentication and authorization

default 6-4

for WAEs 6-3

local database description 6-7

overview of 6-1

RADIUS overview 6-13

TACACS+ overview 6-15

Windows domain overview 6-18

administrative login authentication failover 6-27

alarm overload detection, enabling 9-25

alarm panel

system dashboard window 16-4

alarms

device reporting 16-5

alerts 16-6

application acceleration

about 1-6, 12-1

enabling 12-2

application classifiers

creating 12-32

match condition 12-35

restoring 12-40

application definition

creating 12-31

application list, viewing 12-39

application policy

creating 12-32

creation process 12-30

position 12-41

preparation tasks 12-30

restoring defaults 12-40

types 12-34

applications

monitoring 12-40, 16-2

assigning

application to a device 12-32

application to a device group 12-32

devices to a preposition directive 11-16

devices to device groups 3-6

devices to more than one device group 3-8

audit trail logs

viewing 6-33, 16-72

authentication

default feature values 6-4

authentication databases, types of 6-3

authentication servers

configuring 6-13, 6-15

authorization

default feature values 6-4

autodiscover 1-18

autoregistration

DHCP server requirements 2-8

B

backing up

configuration files 10-6

WAAS Central Manager 15-10

WAE devices 15-11

backup and restore

cms database 15-10

virtual blade 13-12

banners

configuring 6-10

baseline groups

configuring 3-14

creation process 3-12

customizing 3-13

switching 3-14

types 3-11

working with 3-11

BIC TCP 1-5

bootflags 15-21

bridge group

assigning physical interface 5-16

creating 5-15

bridge virtual interface

creating 5-15

browser support 2-10

C

CDP

configuring 5-21

cdp enable command 4-38

cdp run command 4-38

Central Manager. See WAAS Central Manager

charts

adding 16-13

customizing 16-11

descriptions 16-15

settings 16-13

CIFS 11-1

enabling 15-33

ports used 2-6

preparing for 11-7

CIFS accelerator

configuring 11-9

enabling 12-2

CifsAO WAE Device Manager option 10-19

Cisco.com

obtaining software files from 15-3

Cisco Discovery Protocol. See CDP

classifier, creating 12-32

classifier report, viewing 12-39

clear ip wccp command 4-1

clear statistics all command 6-26

clear statistics authentication command 6-26

clear statistics windows-domain command 6-26

CLI user

creating 7-4

clock

setting 9-5

clustering in inline mode 4-49

cms database

backup and restore procedure 15-10

cms database backup command 15-10

cms database restore command 15-11

coherency

age-based validation 11-5

compression, about 1-5

conditions

modifying or deleting from IP ACLs 8-6

configuration process 11-9

congestion windows, about 5-18

connections

viewing TCP connections 16-52

Connections Statistics report 16-52

controlled shutdown 15-36

copy disk ftp command 15-10

core WAE, about 1-8

corrupted system images

recovering from 15-19

CPU Statistics report 16-57

creating

accounts 7-4

application classifier 12-32

application definition 12-31

application policy 12-32

local user 7-4

match condition 12-35

new software file 15-4

preposition directive 11-11

preposition schedule 11-17

current software version

determining 15-3

D

dashboard

customizing 16-11

device 16-9

system 16-2

database backup 15-10

data coherency, about 11-4

data concurrency, about 11-5

data migration 2-28

data redundancy elimination, about 1-5

debug command 16-75

default status, restoring 15-12

deleting

accounts 7-6

device groups 3-7

locations 3-16

roles 7-13

software files 15-9

user groups 7-20

device

alarms 16-5

autodiscovery 1-18

clock setting 9-5

rebooting 15-35

Device Dashboard window 16-9

device groups

about 3-1

adding and removing devices 3-6

configuring 3-5

creating 3-3

creation process 3-3

deleting 3-7

enabling overlap 3-8

force group settings 3-9

list 3-8

overriding settings 3-9

setting configuration precedence 3-9

types 3-2

Device Home window. See Device Dashboard window

device locations

about 3-15

creating 3-15

deleting 3-16

device logs, viewing 16-73

device registration information

recovering 15-23

devices

activating 15-35

adding to device groups 3-6

adding to multiple device groups 3-8

impact of assigning to multiple groups 3-11

overriding device group settings 3-10

restarting 15-35

topology 16-51

viewing group assignments 3-7

viewing information for 16-7, 16-41, 16-52

Devices window 16-7

DHCP

configuring interfaces for 5-11

for autoregistration 2-8

interface-level 2-9

DHCP server

requirements for autoregistration 2-8

directed mode 5-23

disabling WCCP flow redirection 4-18

disk-based software, missing

recovering from 15-22

disk encryption 15-30

disk handling

configuring error-handling methods 15-32

configuring extended object cache 15-33

disks

monitoring 16-57

Disks report 16-57

DNS, configuring 5-22

domains

about 7-14

adding entities 7-15

assigning to user accounts 7-16

assigning to user groups 7-19

creating 7-14

deleting 7-17

modifying and deleting 7-17

viewing 7-17

downgrading 15-3

DRE, about 1-5

DSCP 12-35

global default 12-40

dynamic shares, creating 11-9

E

edge WAE, about 1-8

egress methods

configuring 4-28

email server settings for reports 9-26

enable command 6-16

enabling

optimization and accelerators 12-2

SNMP 17-11

SNMP agent 17-9

traffic statistic collection 12-31

virtual blade 13-3

WCCP flow redirection 4-18

encryption

disk 15-30

enabling secure store 9-10

entities

adding to domains 7-15

EPM accelerator

enabling 12-2

errors

disk drives 15-32

EtherChannel

configuring 5-8

Exec timeout

configuring 6-11

explicit congestion notification

about 5-18

extended object cache 15-33

F

failover, for administrative login authentication 6-27

fast offline detection

about 9-24

configuring 9-24

file locking, about 11-6

File Server Rename utility 10-19

file servers

supported 11-7

file services 11-9

about 1-7

features 1-8

preparing for 11-7

firewall, configuring for 5-23

flash memory

corrupted 15-19

flow monitoring

configuring 16-62

force group settings 3-9

full optimization (adaptive cache) action 12-37

full optimization (bidirectional cache) action 12-37

full optimization (unidirectional cache) action 12-37

G

generic GRE egress method 4-28

generic routing encapsulation. See GRE encapsulation

Gigabit Ethernet interfaces

modifying 5-6

GRE encapsulation 4-15, 4-17

GRE packet forwarding 4-17

GRE tunnel, configuring on router 4-30

groups. See user groups

H

hardware clock 9-5

hardware devices supported 2-10

high bandwidth WAN link 2-7

HTTP accelerator

configuring 12-5

enabling 12-2

HTTPS settings 12-5

I

increased buffering 1-5

inline mode 4-41

configuring IP address 4-47

interface settings 4-44

serial clustering 4-49

VLAN configuration 4-48

VLAN ID check 4-43

inline network adapter card 4-41

installing system software 15-12

intelligent message prediction 1-6

interception ACL 4-27

interface

assigning to bridge group 5-16

interface-level DHCP

description 2-9

note 2-8

interfaces

configuring 5-1

configuring virtual 5-12

manually configuring for DHCP 5-11

WAAS Express optimization 5-13

IP access control lists. See IP ACL

IP ACL

adding conditions to 8-3

applying to interface 8-6

associating with application 8-6

conditions, modifying or deleting 8-6

configuration constraints 8-2

creating new 8-3

deleting 8-7

on routers 2-24

on WAEs 2-24

overview 8-1

IP addresses

multiple, configuring on single interface 5-5

static 2-9

IP routes

configuring 5-20

ip wccp command 4-11

ip wccp redirect-list command 4-11

ip web-cache redirect command 4-1, 4-11

K

kernel debugger

enabling 16-73

L

Layer 2 redirection 4-17

LDAP server signing 10-11, 10-13

configuring on a Microsoft server 6-24

configuring on a WAE 6-24

disabling on a WAE 6-26

overview of 6-23

licenses 9-3

line console carrier detection

configuring 6-12

load balancing 1-21, 4-13, 5-10

local CLI accounts, about 7-2

local user, creating 7-4

locations

about 3-15

creating 3-15

deleting 3-16

location tree

viewing 3-16

logging

configuring system logging 16-65

message priority levels 16-67

transaction log format B-1

transaction logging 16-68

viewing audit trail log 16-72

viewing device logs 16-73

viewing system messages 16-71

login

WAE Device Manager 10-2

login access

controlling 6-7

login authentication

about 2-25, 6-1

logs

severity levels in the WAE Device Manager 10-28

viewing in the WAE Device Manager 10-27

lost administrator passwords

recovering 15-21

LZ compression, about 1-5

M

management IP address 9-2

MAPI accelerator

configuring 12-8

enabling 12-2

match condition, creating 12-35

maximum segment size 12-43

message logs

viewing 16-71

message of the day settings

configuring 6-10

MIBs

supported 17-4

MIB traps

configuring using the WAE Device Manager 10-9

migration, data 2-28

missing disk-based software

recovering from 15-22

monitoring

applications 12-40, 16-2

chart descriptions 16-15

chart settings 16-13

CPU utilization 16-57

creating custom reports 16-58

disk information 16-57

flows with NetQoS 16-62

predefined reports 16-40

system status 16-6

using the WAE Device Manager 10-23

with SNMP 17-1

multiple IP addresses

configuring on single interfaces 5-5

N

NAM 14-1

NAS appliances 1-19

NAT address 9-2

NAT configuration 9-2

NetBIOS 9-2

NetQoS monitoring 16-62

network

viewing information for 16-2

Network Analysis Module integration 14-1

Network Time Protocol. See NTP

network traffic analyzer tool 16-75

NFS accelerator

enabling 12-2

notification settings

for alerts 10-15

for reports 9-26

NTP, configuring 9-5

O

obtaining software files 15-3

operation prediction and batching 1-6

optimization

configuring on WAAS Express interfaces 5-13

enabling global features 12-2

P

packet forwarding method 4-15

Layer 2 redirection 4-17

Layer 3 GRE 4-17

packet return 4-16

passthrough action 12-36

passwords

changing account 7-6, 7-7

recovering administrator 15-21

PBR, about 1-20

policy-based routing

about 1-20

configuration of 4-32

overview of 2-19

verifying next-hop availability 4-37

policy report, viewing 12-39

port channel interfaces

assigning physical interfaces 5-9

configuring 5-8

load balancing 5-10

ports

139 2-6

bypassing 2-6

445 2-6

used in CIFS 2-6

position, application policy 12-41

power failure 15-19

preposition

about 11-4

checking status of 11-18

creating directive 11-11

scheduling 11-17

viewing in the WAE Device Manager 10-20

print accelerator 1-8

print services

about 1-8

priority levels 16-67

R

RADIUS

authentication overview 6-13

configuring server 6-13

database 6-3

default configuration 6-4

RAID 1-21

RCP services, enabling 9-4

rebooting devices 15-35

receive buffer size 12-43

recovering

device registration information 15-23

from missing disk-based software 15-22

lost administrator passwords 15-21

system software 15-19

redirection methods 4-1

registering

WAAS Express device 9-27

WAEs in the WAE Device Manager 10-6

reinstalling system software 15-12

remote login

controlling access 6-7

reports

configuring email server settings 9-26

Connections Statistics 16-52

CPU utilization 16-57

creating custom 16-58

customizing 16-11

editing 16-60

managing 16-58

predefined 16-40

scheduling 16-60

Topology 16-51

viewing custom 16-60

request redirection methods 4-1

rescue system image 15-19

restarting devices 15-35

restoring

application classifiers 12-40

application policies 12-40

configuration files 10-7

WAAS Central Manager 15-10

WAE devices 15-11

WAE to default condition 15-12

retransmit time multiplier

about 5-19

roles

about 7-9

assigning to user accounts 7-12

assigning to user groups 7-18

creating and managing 7-10

deleting 7-13

modifying and deleting 7-13

read-only access to services 7-11

viewing 7-13

viewing settings 7-13

roles-based accounts

about 7-2, 7-3

router

configuring WCCP transparent redirection on 4-7

router lists, defining for WCCP services 4-24

S

SACK, about 1-5

scheduling

preposition 11-17

reports 16-60

secure shell

configuring 6-8

host keys 6-9

secure store

changing key and password 9-16

configuring 9-10

disabling 9-18

enabling on Central Manager 9-12

enabling on standby Central Manager 9-13

enabling on WAE 9-14

security

disk encryption 15-30

enabling secure store 9-10

selective acknowledgement 1-5

send buffer size 12-43

send TCP keepalive 12-43

serial clustering in inline mode 4-49

service password

configuring 4-11

set ip next-hop verify-availability command 4-39

shadow copy for shared folders 11-6

show cdp neighbors command 4-38

show command utility

for troubleshooting 16-76

show version command 15-21

shutting down WCCP 4-26

Simple Network Management Protocol. See SNMP

site and network planning 2-4

SNMP 1-22

asset tag setting 17-22

community settings 17-17

configuration process 17-10

configuring using the WAE Device Manager 10-8

contact settings 17-22

defining custom traps 17-14

enabling 17-11

enabling SNMP agent 17-9

enabling traps 17-12

group settings 17-19

host settings 17-16

manager

creating 17-3

monitoring with 17-1

preparation 17-10

security models and security levels 17-4

supported MIBs 17-4

trap source settings 17-23

user settings 17-20

versions supported 17-3

view settings 17-18

software

recovering 15-19

software clock 9-5

software files

obtaining from Cisco.com 15-3

software licenses 9-3

software recovery 15-12

software upgrades 15-4

for multiple devices 15-8

process 15-1

software version

determining 15-3

SSL

configuring 12-12

standby Central Manager

switching to primary 15-29

standby groups

of interfaces 5-2

standby interfaces

assigning physical interfaces 5-4

configuring 5-2

priimary interface 5-4

starting WAE components 10-5

static IP addresses 2-9

static IP routes

configuring 5-20

statistics, collecting 12-31

stopping WAE components 10-5

switching baseline group 3-14

system configuration settings 9-18

system dashboard

viewing system-wide information 16-2

system event logging

configuring 16-65

message priority levels 16-67

viewing log 16-71

system image

recovering 15-19

system message log

using 16-65

viewing 16-71

system software

recovering 15-19

system status

monitoring 16-6

T

TACACS+

authentication and authorization, overview of 6-15

database 6-3

default configuration 6-4

enable password attribute 6-16

TACACS+ server

configuring 6-15

taskbar icons 1-14

TCP

congestion windows 5-18

explicit congestion notification 5-18

parameter settings 5-17

retransmit timer 5-19

slow start 5-19

viewing connections 16-52

tcpdump command 16-75

TCP initial window size, about 1-4

TCP promiscuous mode service

overview of 2-23

Telnet services

enabling 6-10

Ten Gigabit Ethernet interfaces

modifying 5-6

test command for troubleshooting 16-75

tethereal command 16-75

TFO

about 1-4

TFO adaptive buffering 12-45

TFO and LZ compression action 12-37

TFO features 1-4

BIC TCP 1-5

compression 1-5

increased buffering 1-5

selective acknowledgement 1-5

TCP initial window size maximization 1-4

Windows scaling 1-4

TFO only action 12-36

TFO with DRE (Adaptive Cache) action 12-37

TFO with DRE (Bidirectional Cache) action 12-37

TFO with DRE (Unidirectional Cache) action 12-37

time zones

location abbreviations 9-7

parameter settings for 9-5

Topology report 16-51

track command 4-39

traffic statistics collection, enabling 12-31

traffic statistics report 16-2

chart descriptions 16-15

transaction logging 16-68

configuring 16-68

log format B-1

transparent redirection, configuring on a router 4-7

traps

defining SNMP 17-14

enabling 17-12

triggers

defining SNMP 17-14

troubleshooting

CLI commands 16-75

using show command utility 16-76

with Central Manager diagnostic tests 16-74

with TCPdump 16-75

with Tethereal 16-75

Troubleshooting Devices window 16-6

types of application policies 12-34

U

Unicode support 2-10

upgrading

device groups 15-8

process 15-1

WAAS Central Manager device 15-6

user accounts

adding domain entities 7-15

assigning to domains 7-16

audit trail logs

viewing 6-33, 16-72

changing passwords 7-6, 7-7

creating 7-4

creation process 7-2

deleting 7-6

deleting domains 7-17

domains 7-14

managing 7-7, 7-8

modifying and deleting 7-6

roles

assigning to 7-12

creating 7-10

modifying and deleting 7-13

viewing 7-13

viewing 7-8

viewing domains 7-17

user authentication. See login authentication

user groups

about 7-17

assigning roles to 7-18

assigning to domains 7-19

creating 7-18

deleting 7-20

viewing 7-20

UTC offsets 9-8

See also GMT offsets

V

version of software 15-3

video accelerator

configuring 12-10

enabling 12-2

viewing

application list 12-39

classifier report 12-39

logs in the WAE device manager 10-27

policy report 12-39

role settings 7-13

virtual blade

backing up and restoring 13-12

configuring 13-1, 13-4

copying disk image to 13-10

enabling 13-3

starting and stopping 13-9

virtual interfaces

modifying 5-12

virtualization. See virtual blade

VLAN ID check 4-43

VLAN support 4-42

VPATH interception 4-51

vWAAS

virtual interface configuration 5-12

VPATH interception 4-51

W

WAAS

benefits 1-18

interfaces 1-9

WAAS Central Manager

backing up 15-10

restoring 15-10

upgrading 15-6

WAAS Central Manager GUI

about 1-9

accessing 1-10

components 1-11

taskbar icons 1-14

WAAS CLI, about 1-17

WAAS Express

configuring a device certificate 9-30

configuring an NTP server 9-31

configuring a user 9-28

configuring optimization on interfaces 5-13

enabling HTTP secure server 9-30

importing Central Manager certificate 9-29

installing a license 9-31

registering with the Central Manager 9-32

registration process overview 9-27

reimporting a certificate to the Central Manager 9-32

WAAS interfaces

CLI 1-17

WAAS Central Manager GUI 1-9

WAE Device Manager GUI 1-16

WAAS networks

and IOP interoperability 2-11

network planning for 2-1

traffic redirection methods 2-17

WAAS services, about 1-4

WAE Device Manager

about 1-16, 10-1

Configuration option 10-8

Control option for the WAE 10-4

logging out 10-3

Notifier tab 10-15

quick tour 10-2

Utilities option 10-17

workflow 10-3

WAE devices

backing up 15-11

controlled shutdown 15-36

modifying configuration properties 9-1

restoring 15-11

supported 2-10

WAE packet return 4-16

WAFS. See CIFS

WAFS Cache Cleanup utility 10-18

WAVE devices supported 2-10

WCCP

about 1-20

Cisco Express Forwarding (CEF) 4-16

defining router lists 4-24

flow redirection, enabling and disabling 4-18

GRE packet return 4-28

ports used 2-6

request interception method 4-3

shutting down 4-26

WCCP-based routing

advanced configuration for a router 4-7

configuration guidelines 4-5

overview of 2-18

wccp command 4-5

WCCP services

displaying list of 4-5

web application filter

configuring 9-21

web browser support 2-10

Windows Authentication

checking the status in the WAE Device Manager 10-13

configuring in the Central Manager 6-18

configuring using the WAE Device Manager 10-10

Windows domain server settings 6-18

Windows name services 5-22

Windows print accelerator, about 1-8

Windows scaling, about 1-4