Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
K -
L -
M -
N -
O -
P -
R -
S -
T -
U -
V -
W -
Index
Numerics
10 Gigabit Ethernet interfaces
modifying 5-6
A
AAA accounting
configuring 6-32
AAA-based management systems 2-25, 6-2
acceleration
about 1-6, 12-1
features 1-6
TCP adaptive buffering settings 12-45
TCP settings 12-43
accelerators
enabling 12-2
accounts
creating 7-4
creation process 7-2
deleting 7-6
local CLI 7-2
roles-based 7-2
types 7-1
viewing 7-8
ACL
interception 4-27
See also IP ACL
action
full optimization (adaptive cache) 12-37
full optimization (bidirectional cache) 12-37
full optimization (unidirectional cache) 12-37
passthrough 12-36
TFO only 12-36
TFO with DRE (Adaptive Cache) 12-37
TFO with DRE (Bidirectional Cache) 12-37
TFO with DRE (Unidirectional Cache) 12-37
TFO with LZ compression 12-37
types 12-36
activating devices 15-35
adaptive buffering, TFO 12-45
adding
charts 16-13
administrative login authentication and authorization
default 6-4
for WAEs 6-3
local database description 6-7
overview of 6-1
RADIUS overview 6-13
TACACS+ overview 6-15
Windows domain overview 6-18
administrative login authentication failover 6-27
alarm overload detection, enabling 9-25
alarm panel
system dashboard window 16-4
alarms
device reporting 16-5
alerts 16-6
application acceleration
about 1-6, 12-1
enabling 12-2
application classifiers
creating 12-32
match condition 12-35
restoring 12-40
application definition
creating 12-31
application list, viewing 12-39
application policy
creating 12-32
creation process 12-30
position 12-41
preparation tasks 12-30
restoring defaults 12-40
types 12-34
applications
monitoring 12-40, 16-2
assigning
application to a device 12-32
application to a device group 12-32
devices to a preposition directive 11-16
devices to device groups 3-6
devices to more than one device group 3-8
audit trail logs
viewing 6-33, 16-72
authentication
default feature values 6-4
authentication databases, types of 6-3
authentication servers
configuring 6-13, 6-15
authorization
default feature values 6-4
autodiscover 1-18
autoregistration
DHCP server requirements 2-8
B
backing up
configuration files 10-6
WAAS Central Manager 15-10
WAE devices 15-11
backup and restore
cms database 15-10
virtual blade 13-12
banners
configuring 6-10
baseline groups
configuring 3-14
creation process 3-12
customizing 3-13
switching 3-14
types 3-11
working with 3-11
BIC TCP 1-5
bootflags 15-21
bridge group
assigning physical interface 5-16
creating 5-15
bridge virtual interface
creating 5-15
browser support 2-10
C
CDP
configuring 5-21
cdp enable command 4-38
cdp run command 4-38
Central Manager. See WAAS Central Manager
charts
adding 16-13
customizing 16-11
descriptions 16-15
settings 16-13
CIFS 11-1
enabling 15-33
ports used 2-6
preparing for 11-7
CIFS accelerator
configuring 11-9
enabling 12-2
CifsAO WAE Device Manager option 10-19
Cisco.com
obtaining software files from 15-3
Cisco Discovery Protocol. See CDP
classifier, creating 12-32
classifier report, viewing 12-39
clear ip wccp command 4-1
clear statistics all command 6-26
clear statistics authentication command 6-26
clear statistics windows-domain command 6-26
CLI user
creating 7-4
clock
setting 9-5
clustering in inline mode 4-49
cms database
backup and restore procedure 15-10
cms database backup command 15-10
cms database restore command 15-11
coherency
age-based validation 11-5
compression, about 1-5
conditions
modifying or deleting from IP ACLs 8-6
configuration process 11-9
congestion windows, about 5-18
connections
viewing TCP connections 16-52
Connections Statistics report 16-52
controlled shutdown 15-36
copy disk ftp command 15-10
core WAE, about 1-8
corrupted system images
recovering from 15-19
CPU Statistics report 16-57
creating
accounts 7-4
application classifier 12-32
application definition 12-31
application policy 12-32
local user 7-4
match condition 12-35
new software file 15-4
preposition directive 11-11
preposition schedule 11-17
current software version
determining 15-3
D
dashboard
customizing 16-11
device 16-9
system 16-2
database backup 15-10
data coherency, about 11-4
data concurrency, about 11-5
data migration 2-28
data redundancy elimination, about 1-5
debug command 16-75
default status, restoring 15-12
deleting
accounts 7-6
device groups 3-7
locations 3-16
roles 7-13
software files 15-9
user groups 7-20
device
alarms 16-5
autodiscovery 1-18
clock setting 9-5
rebooting 15-35
Device Dashboard window 16-9
device groups
about 3-1
adding and removing devices 3-6
configuring 3-5
creating 3-3
creation process 3-3
deleting 3-7
enabling overlap 3-8
force group settings 3-9
list 3-8
overriding settings 3-9
setting configuration precedence 3-9
types 3-2
Device Home window. See Device Dashboard window
device locations
about 3-15
creating 3-15
deleting 3-16
device logs, viewing 16-73
device registration information
recovering 15-23
devices
activating 15-35
adding to device groups 3-6
adding to multiple device groups 3-8
impact of assigning to multiple groups 3-11
overriding device group settings 3-10
restarting 15-35
topology 16-51
viewing group assignments 3-7
viewing information for 16-7, 16-41, 16-52
Devices window 16-7
DHCP
configuring interfaces for 5-11
for autoregistration 2-8
interface-level 2-9
DHCP server
requirements for autoregistration 2-8
directed mode 5-23
disabling WCCP flow redirection 4-18
disk-based software, missing
recovering from 15-22
disk encryption 15-30
disk handling
configuring error-handling methods 15-32
configuring extended object cache 15-33
disks
monitoring 16-57
Disks report 16-57
DNS, configuring 5-22
domains
about 7-14
adding entities 7-15
assigning to user accounts 7-16
assigning to user groups 7-19
creating 7-14
deleting 7-17
modifying and deleting 7-17
viewing 7-17
downgrading 15-3
DRE, about 1-5
DSCP 12-35
global default 12-40
dynamic shares, creating 11-9
E
edge WAE, about 1-8
egress methods
configuring 4-28
email server settings for reports 9-26
enable command 6-16
enabling
optimization and accelerators 12-2
SNMP 17-11
SNMP agent 17-9
traffic statistic collection 12-31
virtual blade 13-3
WCCP flow redirection 4-18
encryption
disk 15-30
enabling secure store 9-10
entities
adding to domains 7-15
EPM accelerator
enabling 12-2
errors
disk drives 15-32
EtherChannel
configuring 5-8
Exec timeout
configuring 6-11
explicit congestion notification
about 5-18
extended object cache 15-33
F
failover, for administrative login authentication 6-27
fast offline detection
about 9-24
configuring 9-24
file locking, about 11-6
File Server Rename utility 10-19
file servers
supported 11-7
file services 11-9
about 1-7
features 1-8
preparing for 11-7
firewall, configuring for 5-23
flash memory
corrupted 15-19
flow monitoring
configuring 16-62
force group settings 3-9
full optimization (adaptive cache) action 12-37
full optimization (bidirectional cache) action 12-37
full optimization (unidirectional cache) action 12-37
G
generic GRE egress method 4-28
generic routing encapsulation. See GRE encapsulation
Gigabit Ethernet interfaces
modifying 5-6
GRE encapsulation 4-15, 4-17
GRE packet forwarding 4-17
GRE tunnel, configuring on router 4-30
groups. See user groups
H
hardware clock 9-5
hardware devices supported 2-10
high bandwidth WAN link 2-7
HTTP accelerator
configuring 12-5
enabling 12-2
HTTPS settings 12-5
I
increased buffering 1-5
inline mode 4-41
configuring IP address 4-47
interface settings 4-44
serial clustering 4-49
VLAN configuration 4-48
VLAN ID check 4-43
inline network adapter card 4-41
installing system software 15-12
intelligent message prediction 1-6
interception ACL 4-27
interface
assigning to bridge group 5-16
interface-level DHCP
description 2-9
note 2-8
interfaces
configuring 5-1
configuring virtual 5-12
manually configuring for DHCP 5-11
WAAS Express optimization 5-13
IP access control lists. See IP ACL
IP ACL
adding conditions to 8-3
applying to interface 8-6
associating with application 8-6
conditions, modifying or deleting 8-6
configuration constraints 8-2
creating new 8-3
deleting 8-7
on routers 2-24
on WAEs 2-24
overview 8-1
IP addresses
multiple, configuring on single interface 5-5
static 2-9
IP routes
configuring 5-20
ip wccp command 4-11
ip wccp redirect-list command 4-11
ip web-cache redirect command 4-1, 4-11
K
kernel debugger
enabling 16-73
L
Layer 2 redirection 4-17
LDAP server signing 10-11, 10-13
configuring on a Microsoft server 6-24
configuring on a WAE 6-24
disabling on a WAE 6-26
overview of 6-23
licenses 9-3
line console carrier detection
configuring 6-12
load balancing 1-21, 4-13, 5-10
local CLI accounts, about 7-2
local user, creating 7-4
locations
about 3-15
creating 3-15
deleting 3-16
location tree
viewing 3-16
logging
configuring system logging 16-65
message priority levels 16-67
transaction log format B-1
transaction logging 16-68
viewing audit trail log 16-72
viewing device logs 16-73
viewing system messages 16-71
login
WAE Device Manager 10-2
login access
controlling 6-7
login authentication
about 2-25, 6-1
logs
severity levels in the WAE Device Manager 10-28
viewing in the WAE Device Manager 10-27
lost administrator passwords
recovering 15-21
LZ compression, about 1-5
M
management IP address 9-2
MAPI accelerator
configuring 12-8
enabling 12-2
match condition, creating 12-35
maximum segment size 12-43
message logs
viewing 16-71
message of the day settings
configuring 6-10
MIBs
supported 17-4
MIB traps
configuring using the WAE Device Manager 10-9
migration, data 2-28
missing disk-based software
recovering from 15-22
monitoring
applications 12-40, 16-2
chart descriptions 16-15
chart settings 16-13
CPU utilization 16-57
creating custom reports 16-58
disk information 16-57
flows with NetQoS 16-62
predefined reports 16-40
system status 16-6
using the WAE Device Manager 10-23
with SNMP 17-1
multiple IP addresses
configuring on single interfaces 5-5
N
NAM 14-1
NAS appliances 1-19
NAT address 9-2
NAT configuration 9-2
NetBIOS 9-2
NetQoS monitoring 16-62
network
viewing information for 16-2
Network Analysis Module integration 14-1
Network Time Protocol. See NTP
network traffic analyzer tool 16-75
NFS accelerator
enabling 12-2
notification settings
for alerts 10-15
for reports 9-26
NTP, configuring 9-5
O
obtaining software files 15-3
operation prediction and batching 1-6
optimization
configuring on WAAS Express interfaces 5-13
enabling global features 12-2
P
packet forwarding method 4-15
Layer 2 redirection 4-17
Layer 3 GRE 4-17
packet return 4-16
passthrough action 12-36
passwords
changing account 7-6, 7-7
recovering administrator 15-21
PBR, about 1-20
policy-based routing
about 1-20
configuration of 4-32
overview of 2-19
verifying next-hop availability 4-37
policy report, viewing 12-39
port channel interfaces
assigning physical interfaces 5-9
configuring 5-8
load balancing 5-10
ports
139 2-6
bypassing 2-6
445 2-6
used in CIFS 2-6
position, application policy 12-41
power failure 15-19
preposition
about 11-4
checking status of 11-18
creating directive 11-11
scheduling 11-17
viewing in the WAE Device Manager 10-20
print accelerator 1-8
print services
about 1-8
priority levels 16-67
R
RADIUS
authentication overview 6-13
configuring server 6-13
database 6-3
default configuration 6-4
RAID 1-21
RCP services, enabling 9-4
rebooting devices 15-35
receive buffer size 12-43
recovering
device registration information 15-23
from missing disk-based software 15-22
lost administrator passwords 15-21
system software 15-19
redirection methods 4-1
registering
WAAS Express device 9-27
WAEs in the WAE Device Manager 10-6
reinstalling system software 15-12
remote login
controlling access 6-7
reports
configuring email server settings 9-26
Connections Statistics 16-52
CPU utilization 16-57
creating custom 16-58
customizing 16-11
editing 16-60
managing 16-58
predefined 16-40
scheduling 16-60
Topology 16-51
viewing custom 16-60
request redirection methods 4-1
rescue system image 15-19
restarting devices 15-35
restoring
application classifiers 12-40
application policies 12-40
configuration files 10-7
WAAS Central Manager 15-10
WAE devices 15-11
WAE to default condition 15-12
retransmit time multiplier
about 5-19
roles
about 7-9
assigning to user accounts 7-12
assigning to user groups 7-18
creating and managing 7-10
deleting 7-13
modifying and deleting 7-13
read-only access to services 7-11
viewing 7-13
viewing settings 7-13
roles-based accounts
about 7-2, 7-3
router
configuring WCCP transparent redirection on 4-7
router lists, defining for WCCP services 4-24
S
SACK, about 1-5
scheduling
preposition 11-17
reports 16-60
secure shell
configuring 6-8
host keys 6-9
secure store
changing key and password 9-16
configuring 9-10
disabling 9-18
enabling on Central Manager 9-12
enabling on standby Central Manager 9-13
enabling on WAE 9-14
security
disk encryption 15-30
enabling secure store 9-10
selective acknowledgement 1-5
send buffer size 12-43
send TCP keepalive 12-43
serial clustering in inline mode 4-49
service password
configuring 4-11
set ip next-hop verify-availability command 4-39
shadow copy for shared folders 11-6
show cdp neighbors command 4-38
show command utility
for troubleshooting 16-76
show version command 15-21
shutting down WCCP 4-26
Simple Network Management Protocol. See SNMP
site and network planning 2-4
SNMP 1-22
asset tag setting 17-22
community settings 17-17
configuration process 17-10
configuring using the WAE Device Manager 10-8
contact settings 17-22
defining custom traps 17-14
enabling 17-11
enabling SNMP agent 17-9
enabling traps 17-12
group settings 17-19
host settings 17-16
manager
creating 17-3
monitoring with 17-1
preparation 17-10
security models and security levels 17-4
supported MIBs 17-4
trap source settings 17-23
user settings 17-20
versions supported 17-3
view settings 17-18
software
recovering 15-19
software clock 9-5
software files
obtaining from Cisco.com 15-3
software licenses 9-3
software recovery 15-12
software upgrades 15-4
for multiple devices 15-8
process 15-1
software version
determining 15-3
SSL
configuring 12-12
standby Central Manager
switching to primary 15-29
standby groups
of interfaces 5-2
standby interfaces
assigning physical interfaces 5-4
configuring 5-2
priimary interface 5-4
starting WAE components 10-5
static IP addresses 2-9
static IP routes
configuring 5-20
statistics, collecting 12-31
stopping WAE components 10-5
switching baseline group 3-14
system configuration settings 9-18
system dashboard
viewing system-wide information 16-2
system event logging
configuring 16-65
message priority levels 16-67
viewing log 16-71
system image
recovering 15-19
system message log
using 16-65
viewing 16-71
system software
recovering 15-19
system status
monitoring 16-6
T
TACACS+
authentication and authorization, overview of 6-15
database 6-3
default configuration 6-4
enable password attribute 6-16
TACACS+ server
configuring 6-15
taskbar icons 1-14
TCP
congestion windows 5-18
explicit congestion notification 5-18
parameter settings 5-17
retransmit timer 5-19
slow start 5-19
viewing connections 16-52
tcpdump command 16-75
TCP initial window size, about 1-4
TCP promiscuous mode service
overview of 2-23
Telnet services
enabling 6-10
Ten Gigabit Ethernet interfaces
modifying 5-6
test command for troubleshooting 16-75
tethereal command 16-75
TFO
about 1-4
TFO adaptive buffering 12-45
TFO and LZ compression action 12-37
TFO features 1-4
BIC TCP 1-5
compression 1-5
increased buffering 1-5
selective acknowledgement 1-5
TCP initial window size maximization 1-4
Windows scaling 1-4
TFO only action 12-36
TFO with DRE (Adaptive Cache) action 12-37
TFO with DRE (Bidirectional Cache) action 12-37
TFO with DRE (Unidirectional Cache) action 12-37
time zones
location abbreviations 9-7
parameter settings for 9-5
Topology report 16-51
track command 4-39
traffic statistics collection, enabling 12-31
traffic statistics report 16-2
chart descriptions 16-15
transaction logging 16-68
configuring 16-68
log format B-1
transparent redirection, configuring on a router 4-7
traps
defining SNMP 17-14
enabling 17-12
triggers
defining SNMP 17-14
troubleshooting
CLI commands 16-75
using show command utility 16-76
with Central Manager diagnostic tests 16-74
with TCPdump 16-75
with Tethereal 16-75
Troubleshooting Devices window 16-6
types of application policies 12-34
U
Unicode support 2-10
upgrading
device groups 15-8
process 15-1
WAAS Central Manager device 15-6
user accounts
adding domain entities 7-15
assigning to domains 7-16
audit trail logs
viewing 6-33, 16-72
changing passwords 7-6, 7-7
creating 7-4
creation process 7-2
deleting 7-6
deleting domains 7-17
domains 7-14
managing 7-7, 7-8
modifying and deleting 7-6
roles
assigning to 7-12
creating 7-10
modifying and deleting 7-13
viewing 7-13
viewing 7-8
viewing domains 7-17
user authentication. See login authentication
user groups
about 7-17
assigning roles to 7-18
assigning to domains 7-19
creating 7-18
deleting 7-20
viewing 7-20
UTC offsets 9-8
See also GMT offsets
V
version of software 15-3
video accelerator
configuring 12-10
enabling 12-2
viewing
application list 12-39
classifier report 12-39
logs in the WAE device manager 10-27
policy report 12-39
role settings 7-13
virtual blade
backing up and restoring 13-12
configuring 13-1, 13-4
copying disk image to 13-10
enabling 13-3
starting and stopping 13-9
virtual interfaces
modifying 5-12
virtualization. See virtual blade
VLAN ID check 4-43
VLAN support 4-42
VPATH interception 4-51
vWAAS
virtual interface configuration 5-12
VPATH interception 4-51
W
WAAS
benefits 1-18
interfaces 1-9
WAAS Central Manager
backing up 15-10
restoring 15-10
upgrading 15-6
WAAS Central Manager GUI
about 1-9
accessing 1-10
components 1-11
taskbar icons 1-14
WAAS CLI, about 1-17
WAAS Express
configuring a device certificate 9-30
configuring an NTP server 9-31
configuring a user 9-28
configuring optimization on interfaces 5-13
enabling HTTP secure server 9-30
importing Central Manager certificate 9-29
installing a license 9-31
registering with the Central Manager 9-32
registration process overview 9-27
reimporting a certificate to the Central Manager 9-32
WAAS interfaces
CLI 1-17
WAAS Central Manager GUI 1-9
WAE Device Manager GUI 1-16
WAAS networks
and IOP interoperability 2-11
network planning for 2-1
traffic redirection methods 2-17
WAAS services, about 1-4
WAE Device Manager
about 1-16, 10-1
Configuration option 10-8
Control option for the WAE 10-4
logging out 10-3
Notifier tab 10-15
quick tour 10-2
Utilities option 10-17
workflow 10-3
WAE devices
backing up 15-11
controlled shutdown 15-36
modifying configuration properties 9-1
restoring 15-11
supported 2-10
WAE packet return 4-16
WAFS. See CIFS
WAFS Cache Cleanup utility 10-18
WAVE devices supported 2-10
WCCP
about 1-20
Cisco Express Forwarding (CEF) 4-16
defining router lists 4-24
flow redirection, enabling and disabling 4-18
GRE packet return 4-28
ports used 2-6
request interception method 4-3
shutting down 4-26
WCCP-based routing
advanced configuration for a router 4-7
configuration guidelines 4-5
overview of 2-18
wccp command 4-5
WCCP services
displaying list of 4-5
web application filter
configuring 9-21
web browser support 2-10
Windows Authentication
checking the status in the WAE Device Manager 10-13
configuring in the Central Manager 6-18
configuring using the WAE Device Manager 10-10
Windows domain server settings 6-18
Windows name services 5-22
Windows print accelerator, about 1-8
Windows scaling, about 1-4