Cisco Wide Area Application Services Configuration Guide (Software Version 5.2.1)
Index
Downloads: This chapterpdf (PDF - 563.0KB) The complete bookPDF (PDF - 12.03MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - R - S - T - U - V - W -

Index

Numerics

10 Gigabit Ethernet interfaces

modifying 6-7

A

AAA accounting

configuring 7-32

AAA-based management systems 2-26, 7-2

acceleration

about 1-7, 13-1

features 1-7

TCP adaptive buffering settings 13-67

TCP settings 13-65

accelerators

enabling 13-3

accelerator threshold 13-59

accounts

creating 8-4

creation process 8-2

deleting 8-6

local CLI 8-2

roles-based 8-2

types 8-1

viewing 8-8

ACL

interception 5-28

See also IP ACL

action

full optimization (adaptive cache) 13-56

full optimization (bidirectional cache) 13-56

full optimization (unidirectional cache) 13-56

passthrough 13-56

TFO only 13-56

TFO with DRE (Adaptive Cache) 13-56

TFO with DRE (Bidirectional Cache) 13-56

TFO with DRE (Unidirectional Cache) 13-56

TFO with LZ compression 13-56

types 13-56

activating devices 16-34

adaptive buffering, TFO 13-67

adding

charts 17-13

administrative login authentication and authorization

default 7-4

for WAEs 7-2

local database description 7-6

overview of 7-1

RADIUS overview 7-12

TACACS+ overview 7-14

Windows domain overview 7-16

administrative login authentication failover 7-27

alarm overload detection, enabling 10-23

alarm panel

system dashboard window 17-3

alarms

device reporting 17-4

alerts 17-5

application acceleration

about 1-7, 13-1

enabling 13-3

application classifiers

creating 13-54

match condition 13-58

restoring 13-61

application definition

creating 13-53

application list, viewing 13-60

application policy

creating 13-54

creation process 13-52

position 13-63

preparation tasks 13-52

restoring defaults 13-61

applications

monitoring 13-61, 17-2

AppNav

adding and removing devices 4-43

AppNav Cluster 4-2

AppNav Controller 4-1

AppNav Controller Group 4-2

appnav-controller interception 5-56

AppNav Controller Interface Modules 4-3

class maps 4-5

cluster settings 4-35

cluster settings for WAAS node 4-42

cluster wizard 4-15

configuring 4-1, 4-11

configuring class maps 4-22

configuring policy rules 4-28

connection statistics 4-51

connection tracing 4-51

controller settings 4-37

deployment models 4-3

interface wizard 4-20

monitoring cluster 4-47

policies 4-5

policy 4-4

service context 4-2

WAAS Node 4-2

WAAS Node Group 4-2

WAAS node group settings 4-41

WAAS node settings 4-40

AppNav-XE

enabling WAAS service insertion on interfaces 6-17

registration process 10-28

reimporting a certificate to the Central Manager 10-34

assigning

devices to a preposition directive 12-16

devices to device groups 3-5

devices to more than one device group 3-7

audit trail logs

viewing 7-33, 17-57

authentication

default feature values 7-4

authentication databases, types of 7-2

authentication servers

configuring 7-12, 7-14

authorization

default feature values 7-4

autodiscover 1-20

autoregistration

DHCP server requirements 2-8

B

backing up

configuration files 11-6

WAAS Central Manager 16-9

WAE devices 16-11

backup and restore

cms database 16-9

virtual blade 14-11

banners

configuring 7-10

BIC TCP 1-6

BMC

enabling IPMI over LAN 10-26

enabling IPMI SoL 10-27

firmware update 10-25

bootflags 16-21

bridge group

assigning physical interface 6-20

creating 6-19

bridge virtual interface

creating 6-20

browser support 2-10

C

CDP

configuring 6-27

cdp enable command 5-40

cdp run command 5-40

Central Manager. See WAAS Central Manager

certificate

reimporting 10-34

charts

adding 17-13

customizing 17-10

descriptions 17-14

settings 17-14

CIFS 12-1

ports used 2-6

preparing for 12-7

using SMB accelerator for 12-19

CIFS accelerator

configuring 12-8

enabling 13-3

CifsAO WAE Device Manager option 11-13

CIFS configuration process 12-8

Cisco.com

obtaining software files from 16-3

Cisco Discovery Protocol. See CDP

classifier, creating 13-54

classifier report, viewing 13-61

clear statistics all command 7-26

clear statistics authentication command 7-26

clear statistics windows-domain command 7-26

CLI user

creating 8-4

clock

setting 10-5

clustering in inline mode 5-53

cms database

backup and restore procedure 16-9

cms database backup command 16-9

cms database restore command 16-10

coherency

age-based validation 12-4

compression, about 1-6

conditions

modifying or deleting from IP ACLs 9-6

congestion windows, about 6-24

connections

viewing TCP connections 17-40

Connections Statistics report 17-40

connection statistics, AppNav 4-51

connection tracing 4-51

controlled shutdown 16-35

copy disk ftp command 16-9

core WAE, about 1-9

corrupted system images

recovering from 16-18

creating

accounts 8-4

application classifier 13-54

application definition 13-53

application policy 13-54

local user 8-4

match condition 13-58

new software file 16-3

preposition directive 12-11

preposition schedule 12-17

current software version

determining 16-3

D

dashboard

customizing 17-10

device 17-8

system 17-1

database backup 16-9

data coherency, about 12-3

data concurrency, about 12-5

data migration 2-27

data redundancy elimination, about 1-6

debug command 17-59

default status, restoring 16-11

deleting

accounts 8-6

device groups 3-6

locations 3-11

roles 8-13

software files 16-8

user groups 8-20

device

alarms 17-4

autodiscovery 1-20

clock setting 10-5

rebooting 16-34

Device Dashboard window 17-8

device groups

about 3-1

adding and removing devices 3-5

configuring 3-4

creating 3-3

creation process 3-2

deleting 3-6

enabling overlap 3-7

force group settings 3-7

list 3-6

overriding settings 3-7

setting configuration precedence 3-8

Device Home window. See Device Dashboard window

device locations

about 3-10

creating 3-10

deleting 3-11

device logs, viewing 17-57

device registration information

recovering 16-22

devices

activating 16-34

adding to device groups 3-5

adding to multiple device groups 3-7

impact of assigning to multiple groups 3-9

overriding device group settings 3-8

restarting 16-34

topology 17-40

viewing group assignments 3-6

viewing information for 17-6, 17-36, 17-40

Devices window 17-6

DHCP

configuring interfaces for 6-14

for autoregistration 2-8

interface-level 2-9

DHCP server

requirements for autoregistration 2-8

diagnostic tests 17-58

directed mode 6-29

disabling WCCP flow redirection 5-16

disk-based software, missing

recovering from 16-21

disk encryption 16-30

disk handling

configuring error-handling methods 16-31

configuring extended object cache 16-32

disks

monitoring 17-42

Disks report 17-42

DNS, configuring 6-27

domains

about 8-14

adding entities 8-15

assigning to user accounts 8-15

assigning to user groups 8-19

creating 8-14

deleting 8-16

modifying and deleting 8-16

viewing 8-17

downgrading 16-3

DRE, about 1-6

DRE settings

configuring 13-7

DSCP 13-57

global default 13-62

dynamic shares

creating for CIFS accelerator 12-9

creating for SMB accelerator 12-19

E

edge WAE, about 1-9

egress methods

configuring 5-29

email server settings for reports 10-24

enable command 7-15

enabling

optimization and accelerators 13-3

SNMP 18-14

SNMP agent 18-12

traffic statistic collection 13-53

virtual blade 14-3

WCCP flow redirection 5-16

encryption

disk 16-30

enabling secure store 10-10

entities

adding to domains 8-15

EPM accelerator

enabling 13-3

errors

disk drives 16-31

EtherChannel

configuring 6-10

Exec timeout

configuring 7-10

explicit congestion notification

about 6-24

extended object cache 16-32

F

failover, for administrative login authentication 7-27

fast offline detection

about 10-23

configuring 10-22

file locking, about 12-5

File Server Rename utility 11-13

file servers

supported 12-7

file services 12-8

about 1-8

features 1-9

preparing for 12-7

SMB configuration process 12-19

firewall, configuring for 6-29

flash memory

corrupted 16-18

flow monitoring

configuring 17-48

force group settings 3-7

full optimization (adaptive cache) action 13-56

full optimization (bidirectional cache) action 13-56

full optimization (unidirectional cache) action 13-56

G

generic GRE egress method 5-29

generic routing encapsulation. See GRE encapsulation

Gigabit Ethernet interfaces

modifying 6-7

GRE encapsulation 5-14, 5-15

GRE packet forwarding 5-15

GRE tunnel, configuring on router 5-31

groups. See user groups

H

hardware clock 10-5

hardware devices supported 2-10

high bandwidth WAN link 2-7

HTTP accelerator

configuring 13-8

enabling 13-3

HTTPS settings 13-8

I

ICA accelerator

configuring 13-29

increased buffering 1-5

inline mode 5-42

configuring IP address 5-51

interface settings 5-47

serial clustering 5-53

VLAN configuration 5-52

VLAN ID check 5-46

inline network adapter card 5-42

installing system software 16-11

intelligent message prediction 1-7

interception

appnav-controller 5-56

inline 5-42

policy-based routing 5-33

VPATH 5-55

WCCP 5-11

interception ACL 5-28

interface

assigning to bridge group 6-20

interface-level DHCP

description 2-9

interface module inline mode 5-42

interfaces

configuring 6-1

configuring virtual 6-14

enabling AppNav-XE service insertion 6-17

manually configuring for DHCP 6-14

WAAS Express optimization 6-16

IP access control lists. See IP ACL

IP ACL

adding conditions to 9-3

applying to interface 9-6

associating with application 9-6

conditions, modifying or deleting 9-6

configuration constraints 9-2

creating new 9-3

deleting 9-7

on routers 2-25

on WAEs 2-25

overview 9-1

IP addresses

multiple, configuring on single interface 6-6

static 2-9

IPMI over LAN

about 10-25

enabling 10-26

enabling SoL 10-27

IP routes

configuring 6-26

ip wccp command 5-10

ip wccp redirect-list command 5-9

ip web-cache redirect command 5-10

K

kernel debugger

enabling 17-58

L

Layer 2 redirection 5-16

LDAP server signing

configuring on a Microsoft server 7-24

configuring on a WAE 7-24

disabling on a WAE 7-26

overview of 7-23

licenses 10-3

line console carrier detection

configuring 7-11

load balancing 1-23, 5-12, 6-13

local CLI accounts, about 8-2

local user, creating 8-4

locations

about 3-10

creating 3-10

deleting 3-11

location tree

viewing 3-11

logging

configuring system logging 17-51

message priority levels 17-53

transaction log format B-1

transaction logging 17-53

viewing audit trail log 17-57

viewing device logs 17-57

viewing system messages 17-56

login

WAE Device Manager 11-1

login access

controlling 7-7

login authentication

about 2-25, 7-1

logs

severity levels in the WAE Device Manager 11-22

viewing in the WAE Device Manager 11-21

lost administrator passwords

recovering 16-20

LZ compression, about 1-6

M

management IP address 10-2

MAPI accelerator

configuring 13-11

enabling 13-3

match condition, creating 13-58

maximum segment size 13-66

message logs

viewing 17-56

message of the day settings

configuring 7-10

MIBs

supported 18-4

MIB traps

configuring using the WAE Device Manager 11-8

migration, data 2-27

missing disk-based software

recovering from 16-21

monitoring

applications 13-61, 17-2

chart descriptions 17-14

chart settings 17-14

creating custom reports 17-44

disk information 17-42

flows with NetQoS 17-48

predefined reports 17-35

resource utilization 17-42

system status 17-5

using the WAE Device Manager 11-17

with SNMP 18-1

multiple IP addresses

configuring on single interfaces 6-6

N

NAM 15-1

NAS appliances 1-21

NAT address 10-2

NAT configuration 10-2

NetBIOS 10-2

NetQoS monitoring 17-48

network

viewing information for 17-1

Network Analysis Module integration 15-1

Network Time Protocol. See NTP

network traffic analyzer tool 17-59

NFS accelerator

enabling 13-3

notification settings

for alerts 11-9

for reports 10-24

NTP, configuring 10-5

O

obtaining software files 16-3

operation prediction and batching 1-7

optimization

configuring on WAAS Express interfaces 6-16

enabling global features 13-3

P

packet forwarding method 5-14

Layer 2 redirection 5-16

Layer 3 GRE 5-15

packet return 5-15

passthrough action 13-56

passwords

changing account 8-6, 8-7

recovering administrator 16-20

PBR, about 1-22

policy-based routing

about 1-22

configuration of interception 5-33

overview of 2-20

verifying next-hop availability 5-39

policy report, viewing 13-60

port channel interfaces

assigning physical interfaces 6-12

configuring 6-10

load balancing 6-13

ports

139 2-6

bypassing 2-7

445 2-6

used in CIFS 2-6

position, application policy 13-63

power failure 16-18

preposition

about 12-5

checking status of 12-18

creating directive 12-11

scheduling 12-17

viewing in the WAE Device Manager 11-14

print accelerator 1-9

print services

about 1-9

priority levels 17-53

R

RADIUS

authentication overview 7-12

configuring server 7-12

database 7-2

default configuration 7-4

RAID 1-23

RCP services, enabling 10-4

rebooting devices 16-34

receive buffer size 13-66

recovering

device registration information 16-22

from missing disk-based software 16-21

lost administrator passwords 16-20

system software 16-18

redirection methods 5-1

registering

AppNav-XE device 10-28

WAAS Express device 10-28

WAEs in the WAE Device Manager 11-6

reinstalling system software 16-11

remote login

controlling access 7-7

reports

configuring email server settings 10-24

Connections Statistics 17-40

creating custom 17-44

customizing 17-10

editing 17-45

managing 17-44

predefined 17-35

resource utilization 17-42

scheduling 17-46

Topology 17-40

viewing custom 17-45

request redirection methods 5-1

rescue system image 16-18

resource utilization report 17-42

restarting devices 16-34

restoring

application classifiers 13-61

application policies 13-61

configuration files 11-7

WAAS Central Manager 16-9

WAE devices 16-11

WAE to default condition 16-11

retransmit time multiplier

about 6-24

roles

about 8-9

assigning to user accounts 8-12

assigning to user groups 8-18

creating and managing 8-10

deleting 8-13

modifying and deleting 8-13

read-only access to services 8-10

viewing 8-13

viewing settings 8-13

roles-based accounts

about 8-2, 8-3

router

configuring WCCP transparent redirection on 5-6

S

SACK, about 1-5

scheduling

preposition 12-17

reports 17-46

secure shell

configuring 7-7

host keys 7-8

secure store

changing key and password 10-15

configuring 10-10

disabling 10-17

enabling on Central Manager 10-12

enabling on standby Central Manager 10-13

enabling on WAE 10-13

security

disk encryption 16-30

enabling secure store 10-10

selective acknowledgement 1-5

send buffer size 13-66

send TCP keepalive 13-65

serial clustering in inline mode 5-53

service context, AppNav 4-2

service password

configuring 5-10

set ip next-hop verify-availability command 5-41

shadow copy for shared folders 12-6

show cdp neighbors command 5-40

show command utility

for troubleshooting 17-60

show version command 16-20

shutting down WCCP 5-26

Simple Network Management Protocol. See SNMP

site and network planning 2-4

SMB accelerator

configuring 12-19

SNMP 1-24

asset tag setting 18-25

community settings 18-20

configuration process 18-13

configuring using the WAE Device Manager 11-8

contact settings 18-25

defining custom traps 18-17

enabling 18-14

enabling SNMP agent 18-12

enabling traps 18-15

group settings 18-22

host settings 18-19

manager

creating 18-3

monitoring with 18-1

preparation 18-14

security models and security levels 18-4

supported MIBs 18-4

trap source settings 18-25

user settings 18-23

versions supported 18-3

view settings 18-21

software

recovering 16-18

software clock 10-5

software files

obtaining from Cisco.com 16-3

software licenses 10-3

software recovery 16-11

software upgrades 16-3

for multiple devices 16-7

process 16-1

software version

determining 16-3

SSL

configuring 13-31

standby Central Manager

switching to primary 16-28

standby groups

of interfaces 6-3

standby interfaces

assigning physical interfaces 6-6

configuring 6-3

priimary interface 6-6

starting WAE components 11-5

static IP addresses 2-9

static IP routes

configuring 6-26

statistics, collecting 13-53

stopping WAE components 11-5

system configuration settings 10-17

system dashboard

viewing system-wide information 17-1

system event logging

configuring 17-51

message priority levels 17-53

viewing log 17-56

system image

recovering 16-18

system message log

using 17-51

viewing 17-56

system software

recovering 16-18

system status

monitoring 17-5

T

TACACS+

authentication and authorization, overview of 7-14

database 7-2

default configuration 7-4

enable password attribute 7-15

TACACS+ server

configuring 7-14

taskbar icons 1-16

TCP

congestion windows 6-24

explicit congestion notification 6-24

parameter settings 6-22

retransmit timer 6-24

slow start 6-25

viewing connections 17-40

tcpdump command 17-59

TCP initial window size, about 1-5

TCP promiscuous mode service

overview of 2-24

Telnet services

enabling 7-9

Ten Gigabit Ethernet interfaces

modifying 6-7

test command for troubleshooting 17-59

tethereal command 17-59

TFO

about 1-4

TFO adaptive buffering 13-67

TFO and LZ compression action 13-56

TFO features 1-4

BIC TCP 1-6

compression 1-6

increased buffering 1-5

selective acknowledgement 1-5

TCP initial window size maximization 1-5

Windows scaling 1-5

TFO only action 13-56

TFO with DRE (Adaptive Cache) action 13-56

TFO with DRE (Bidirectional Cache) action 13-56

TFO with DRE (Unidirectional Cache) action 13-56

time zones

location abbreviations 10-7

parameter settings for 10-5

Topology report 17-40

traceroute 17-60

track command 5-41

traffic statistics collection, enabling 13-53

traffic statistics report 17-2

chart descriptions 17-14

transaction logging 17-53

configuring 17-54

log format B-1

transparent redirection, configuring on a router 5-6

traps

defining SNMP 18-17

enabling 18-15

triggers

defining SNMP 18-17

troubleshooting

CLI commands 17-59

using show command utility 17-60

with Central Manager diagnostic tests 17-58

with TCPdump 17-59

with Tethereal 17-59

with WAAS TCP Traceroute 17-60

Troubleshooting Devices window 17-5

U

Unicode support 2-10

upgrading

device groups 16-7

process 16-1

WAAS Central Manager device 16-5

user accounts

adding domain entities 8-15

assigning to domains 8-15

audit trail logs

viewing 7-33, 17-57

changing passwords 8-6, 8-7

creating 8-4

creation process 8-2

deleting 8-6

deleting domains 8-16

domains 8-14

managing 8-7

modifying and deleting 8-6

roles

assigning to 8-12

creating 8-10

modifying and deleting 8-13

viewing 8-13

viewing 8-8

viewing domains 8-17

user authentication. See login authentication

user groups

about 8-17

assigning roles to 8-18

assigning to domains 8-19

creating 8-18

deleting 8-20

viewing 8-20

UTC offsets 10-8

See also GMT offsets

V

version of software 16-3

video accelerator

configuring 13-23

enabling 13-3

viewing

application list 13-60

classifier report 13-61

logs in the WAE device manager 11-21

policy report 13-60

role settings 8-13

virtual blade

backing up and restoring 14-11

configuring 14-1, 14-4

copying disk image to 14-10

enabling 14-3

starting and stopping 14-8

virtual interfaces

modifying 6-14

virtualization. See virtual blade

VLAN ID check 5-46

VLAN support 5-44

VPATH interception 5-55

vWAAS

virtual interface configuration 6-14

VPATH interception 5-55

W

WAAS

benefits 1-20

interfaces 1-10

WAAS Central Manager

backing up 16-9

restoring 16-9

upgrading 16-5

WAAS Central Manager GUI

about 1-10

accessing 1-11

components 1-12

taskbar icons 1-16

WAAS CLI, about 1-19

WAAS Express

configuring a device certificate 10-32

configuring an NTP server 10-34

configuring a user 10-30

configuring optimization on interfaces 6-16

enabling HTTP secure server 10-33

importing Central Manager certificate 10-31

installing a license 10-33

registering with the Central Manager 10-34

registration process 10-28

reimporting a certificate to the Central Manager 10-34

WAAS interfaces

CLI 1-19

WAAS Central Manager GUI 1-10

WAE Device Manager GUI 1-18

WAAS networks

and IOP interoperability 2-11

network planning for 2-1

traffic redirection methods 2-18

WAAS services, about 1-4

WAAS TCP Traceroute 17-60

WAE Device Manager

about 1-18, 11-1

Configuration option 11-8

Control option for the WAE 11-4

logging out 11-3

Notifier tab 11-9

quick tour 11-2

Utilities option 11-11

workflow 11-3

WAE devices

backing up 16-11

controlled shutdown 16-35

modifying configuration properties 10-1

restoring 16-11

supported 2-10

WAE packet return 5-15

WAFS. See CIFS

WAFS Cache Cleanup utility 11-12

WAVE devices supported 2-10

WCCP

about 1-22, 5-3, 5-11

Cisco Express Forwarding (CEF) 5-15

configuring interception on SCs 5-22

configuring interception on WAEs 5-17

flow redirection, enabling and disabling 5-16

GRE packet return 5-29

ports used 2-6

shutting down 5-26

WCCP-based routing

advanced configuration for a router 5-6

advantages and disadvantages 2-20

configuration guidelines 5-4

web application filter

configuring 10-20

web browser support 2-10

Windows Authentication

configuring in the Central Manager 7-16

Windows domain server settings 7-17

Windows name services 6-28

Windows print accelerator, about 1-9

Windows scaling, about 1-5