Index Numerics
10 Gigabit Ethernet interfaces
modifying 6-7
A
AAA accounting
configuring 7-31
AAA-based management systems 2-26, 7-2
acceleration
about 1-6, 13-1
features 1-6
TCP adaptive buffering settings 13-62
TCP settings 13-60
accelerators
enabling 13-3
accelerator threshold 13-55
accounts
creating 8-4
creation process 8-2
deleting 8-6
local CLI 8-2
roles-based 8-2
types 8-1
viewing 8-8
ACL
interception 5-28
See also IP ACL
action
full optimization (adaptive cache) 13-53
full optimization (bidirectional cache) 13-53
full optimization (unidirectional cache) 13-53
passthrough 13-53
TFO only 13-53
TFO with DRE (Adaptive Cache) 13-53
TFO with DRE (Bidirectional Cache) 13-53
TFO with DRE (Unidirectional Cache) 13-53
TFO with LZ compression 13-53
types 13-53
activating devices 16-34
adaptive buffering, TFO 13-62
adding
charts 17-13
administrative login authentication and authorization
default 7-4
for WAEs 7-2
local database description 7-6
overview of 7-1
RADIUS overview 7-12
TACACS+ overview 7-14
Windows domain overview 7-17
administrative login authentication failover 7-26
alarm overload detection, enabling 10-23
alarm panel
system dashboard window 17-3
alarms
device reporting 17-4
alerts 17-5
application acceleration
about 1-6, 13-1
enabling 13-3
application classifiers
creating 13-50
match condition 13-52
restoring 13-57
application definition
creating 13-49
application list, viewing 13-55
application policy
creating 13-50
creation process 13-48
position 13-58
preparation tasks 13-48
restoring defaults 13-57
applications
monitoring 13-57, 17-2
AppNav
adding and removing devices 4-30
AppNav Cluster 4-2
AppNav Controller 4-1
AppNav Controller Group 4-2
appnav-controller interception 5-56
AppNav Controller Interface Modules 4-3
class maps 4-4
cluster settings 4-26
cluster wizard 4-14
configuring 4-1, 4-10
configuring class maps 4-19
configuring policy rules 4-22
connecting tracing 4-37
controller settings 4-28
deployment models 4-2
interface wizard 4-17
monitoring cluster 4-34
policies 4-5
policy 4-4
service context 4-2
WAAS Node 4-2
WAAS Node Group 4-2
WAAS node group settings 4-30
WAAS node settings 4-29
assigning
devices to a preposition directive 12-16
devices to device groups 3-5
devices to more than one device group 3-7
audit trail logs
viewing 7-33, 17-57
authentication
default feature values 7-4
authentication databases, types of 7-2
authentication servers
configuring 7-12, 7-14
authorization
default feature values 7-4
autodiscover 1-20
autoregistration
DHCP server requirements 2-8
B
backing up
configuration files 11-6
WAAS Central Manager 16-9
WAE devices 16-10
backup and restore
cms database 16-9
virtual blade 14-11
banners
configuring 7-10
BIC TCP 1-6
BMC
enabling IPMI over LAN 10-26
enabling IPMI SoL 10-27
firmware update 10-25
bootflags 16-21
bridge group
assigning physical interface 6-19
creating 6-18
bridge virtual interface
creating 6-19
browser support 2-10
C
CDP
configuring 6-26
cdp enable command 5-40
cdp run command 5-40
Central Manager. See WAAS Central Manager
charts
adding 17-13
customizing 17-10
descriptions 17-14
settings 17-14
CIFS 12-1
ports used 2-6
preparing for 12-7
using SMB accelerator for 12-19
CIFS accelerator
configuring 12-8
enabling 13-3
CifsAO WAE Device Manager option 11-19
CIFS configuration process 12-8
Cisco.com
obtaining software files from 16-3
Cisco Discovery Protocol. See CDP
classifier, creating 13-50
classifier report, viewing 13-56
clear statistics all command 7-25
clear statistics authentication command 7-25
clear statistics windows-domain command 7-25
CLI user
creating 8-4
clock
setting 10-5
clustering in inline mode 5-53
cms database
backup and restore procedure 16-9
cms database backup command 16-9
cms database restore command 16-10
coherency
age-based validation 12-4
compression, about 1-6
conditions
modifying or deleting from IP ACLs 9-6
congestion windows, about 6-23
connections
viewing TCP connections 17-40
Connections Statistics report 17-40
connection tracing 4-37
controlled shutdown 16-35
copy disk ftp command 16-9
core WAE, about 1-9
corrupted system images
recovering from 16-18
creating
accounts 8-4
application classifier 13-50
application definition 13-49
application policy 13-50
local user 8-4
match condition 13-52
new software file 16-3
preposition directive 12-11
preposition schedule 12-17
current software version
determining 16-3
D
dashboard
customizing 17-10
device 17-8
system 17-1
database backup 16-9
data coherency, about 12-3
data concurrency, about 12-5
data migration 2-28
data redundancy elimination, about 1-6
debug command 17-60
default status, restoring 16-11
deleting
accounts 8-6
device groups 3-6
locations 3-10
roles 8-13
software files 16-8
user groups 8-20
device
alarms 17-4
autodiscovery 1-20
clock setting 10-5
rebooting 16-34
Device Dashboard window 17-8
device groups
about 3-1
adding and removing devices 3-5
configuring 3-4
creating 3-3
creation process 3-2
deleting 3-6
enabling overlap 3-7
force group settings 3-7
list 3-6
overriding settings 3-7
setting configuration precedence 3-8
Device Home window. See Device Dashboard window
device locations
about 3-9
creating 3-10
deleting 3-10
device logs, viewing 17-58
device registration information
recovering 16-23
devices
activating 16-34
adding to device groups 3-5
adding to multiple device groups 3-7
impact of assigning to multiple groups 3-9
overriding device group settings 3-8
restarting 16-34
topology 17-40
viewing group assignments 3-6
viewing information for 17-6, 17-36, 17-40
Devices window 17-6
DHCP
configuring interfaces for 6-14
for autoregistration 2-8
interface-level 2-9
DHCP server
requirements for autoregistration 2-8
diagnostic tests 17-59
directed mode 6-28
disabling WCCP flow redirection 5-16
disk-based software, missing
recovering from 16-22
disk encryption 16-30
disk handling
configuring error-handling methods 16-31
configuring extended object cache 16-32
disks
monitoring 17-42
Disks report 17-42
DNS, configuring 6-26
domains
about 8-14
adding entities 8-15
assigning to user accounts 8-15
assigning to user groups 8-19
creating 8-14
deleting 8-16
modifying and deleting 8-16
viewing 8-17
downgrading 16-3
DRE, about 1-6
DRE settings
configuring 13-7
DSCP 13-54
global default 13-57
dynamic shares
creating for CIFS accelerator 12-9
creating for SMB accelerator 12-19
E
edge WAE, about 1-9
egress methods
configuring 5-29
email server settings for reports 10-24
enable command 7-15
enabling
optimization and accelerators 13-3
SNMP 18-13
SNMP agent 18-11
traffic statistic collection 13-49
virtual blade 14-3
WCCP flow redirection 5-16
encryption
disk 16-30
enabling secure store 10-10
entities
adding to domains 8-15
EPM accelerator
enabling 13-3
errors
disk drives 16-31
EtherChannel
configuring 6-10
Exec timeout
configuring 7-11
explicit congestion notification
about 6-23
extended object cache 16-32
F
failover, for administrative login authentication 7-26
fast offline detection
about 10-22
configuring 10-21
file locking, about 12-5
File Server Rename utility 11-19
file servers
supported 12-7
file services 12-8
about 1-8
features 1-8
preparing for 12-7
SMB configuration process 12-19
firewall, configuring for 6-28
flash memory
corrupted 16-18
flow monitoring
configuring 17-48
force group settings 3-7
full optimization (adaptive cache) action 13-53
full optimization (bidirectional cache) action 13-53
full optimization (unidirectional cache) action 13-53
G
generic GRE egress method 5-29
generic routing encapsulation. See GRE encapsulation
Gigabit Ethernet interfaces
modifying 6-7
GRE encapsulation 5-14, 5-15
GRE packet forwarding 5-15
GRE tunnel, configuring on router 5-31
groups. See user groups
H
hardware clock 10-5
hardware devices supported 2-10
high bandwidth WAN link 2-7
HTTP accelerator
configuring 13-7
enabling 13-3
HTTPS settings 13-7
I
ICA accelerator
configuring 13-27
increased buffering 1-5
inline mode 5-42
configuring IP address 5-51
interface settings 5-46
serial clustering 5-53
VLAN configuration 5-52
VLAN ID check 5-45
inline network adapter card 5-42
installing system software 16-11
intelligent message prediction 1-6
interception
appnav-controller 5-56
inline 5-42
policy-based routing 5-33
VPATH 5-55
WCCP 5-11
interception ACL 5-28
interface
assigning to bridge group 6-19
interface-level DHCP
description 2-9
note 2-8
interface module inline mode 5-42
interfaces
configuring 6-1
configuring virtual 6-14
manually configuring for DHCP 6-14
WAAS Express optimization 6-16
IP access control lists. See IP ACL
IP ACL
adding conditions to 9-3
applying to interface 9-6
associating with application 9-6
conditions, modifying or deleting 9-6
configuration constraints 9-2
creating new 9-3
deleting 9-7
on routers 2-25
on WAEs 2-25
overview 9-1
IP addresses
multiple, configuring on single interface 6-6
static 2-9
IPMI over LAN
about 10-24
enabling 10-26
enabling SoL 10-27
IP routes
configuring 6-25
ip wccp command 5-10
ip wccp redirect-list command 5-9
ip web-cache redirect command 5-10
K
kernel debugger
enabling 17-59
L
Layer 2 redirection 5-16
LDAP server signing 11-11, 11-13
configuring on a Microsoft server 7-24
configuring on a WAE 7-24
disabling on a WAE 7-25
overview of 7-23
licenses 10-3
line console carrier detection
configuring 7-11
load balancing 1-22, 5-12, 6-13
local CLI accounts, about 8-2
local user, creating 8-4
locations
about 3-9
creating 3-10
deleting 3-10
location tree
viewing 3-11
logging
configuring system logging 17-51
message priority levels 17-53
transaction log format B-1
transaction logging 17-53
viewing audit trail log 17-57
viewing device logs 17-58
viewing system messages 17-56
login
WAE Device Manager 11-1
login access
controlling 7-7
login authentication
about 2-26, 7-1
logs
severity levels in the WAE Device Manager 11-28
viewing in the WAE Device Manager 11-27
lost administrator passwords
recovering 16-21
LZ compression, about 1-6
M
management IP address 10-2
MAPI accelerator
configuring 13-11
enabling 13-3
match condition, creating 13-52
maximum segment size 13-61
message logs
viewing 17-56
message of the day settings
configuring 7-10
MIBs
supported 18-4
MIB traps
configuring using the WAE Device Manager 11-9
migration, data 2-28
missing disk-based software
recovering from 16-22
monitoring
applications 13-57, 17-2
chart descriptions 17-14
chart settings 17-14
creating custom reports 17-44
disk information 17-42
flows with NetQoS 17-48
predefined reports 17-35
resource utilization 17-42
system status 17-5
using the WAE Device Manager 11-23
with SNMP 18-1
multiple IP addresses
configuring on single interfaces 6-6
N
NAM 15-1
NAS appliances 1-20
NAT address 10-2
NAT configuration 10-2
NetBIOS 10-2
NetQoS monitoring 17-48
network
viewing information for 17-1
Network Analysis Module integration 15-1
Network Time Protocol. See NTP
network traffic analyzer tool 17-60
NFS accelerator
enabling 13-3
notification settings
for alerts 11-15
for reports 10-24
NTP, configuring 10-5
O
obtaining software files 16-3
operation prediction and batching 1-6
optimization
configuring on WAAS Express interfaces 6-16
enabling global features 13-3
P
packet forwarding method 5-14
Layer 2 redirection 5-16
Layer 3 GRE 5-15
packet return 5-15
passthrough action 13-53
passwords
changing account 8-6, 8-7
recovering administrator 16-21
PBR, about 1-21
policy-based routing
about 1-21
configuration of interception 5-33
overview of 2-21
verifying next-hop availability 5-39
policy report, viewing 13-56
port channel interfaces
assigning physical interfaces 6-12
configuring 6-10
load balancing 6-13
ports
139 2-6
bypassing 2-7
445 2-6
used in CIFS 2-6
position, application policy 13-58
power failure 16-18
preposition
about 12-5
checking status of 12-18
creating directive 12-11
scheduling 12-17
viewing in the WAE Device Manager 11-20
print accelerator 1-9
print services
about 1-9
priority levels 17-53
R
RADIUS
authentication overview 7-12
configuring server 7-12
database 7-2
default configuration 7-4
RAID 1-22
RCP services, enabling 10-4
rebooting devices 16-34
receive buffer size 13-61
recovering
device registration information 16-23
from missing disk-based software 16-22
lost administrator passwords 16-21
system software 16-18
redirection methods 5-1
registering
WAAS Express device 10-27
WAEs in the WAE Device Manager 11-6
reinstalling system software 16-11
remote login
controlling access 7-7
reports
configuring email server settings 10-24
Connections Statistics 17-40
creating custom 17-44
customizing 17-10
editing 17-45
managing 17-43
predefined 17-35
resource utilization 17-42
scheduling 17-46
Topology 17-40
viewing custom 17-45
request redirection methods 5-1
rescue system image 16-18
resource utilization report 17-42
restarting devices 16-34
restoring
application classifiers 13-57
application policies 13-57
configuration files 11-7
WAAS Central Manager 16-9
WAE devices 16-10
WAE to default condition 16-11
retransmit time multiplier
about 6-23
roles
about 8-9
assigning to user accounts 8-12
assigning to user groups 8-18
creating and managing 8-10
deleting 8-13
modifying and deleting 8-13
read-only access to services 8-10
viewing 8-13
viewing settings 8-13
roles-based accounts
about 8-2, 8-3
router
configuring WCCP transparent redirection on 5-6
S
SACK, about 1-5
scheduling
preposition 12-17
reports 17-46
secure shell
configuring 7-7
host keys 7-8
secure store
changing key and password 10-15
configuring 10-10
disabling 10-17
enabling on Central Manager 10-12
enabling on standby Central Manager 10-13
enabling on WAE 10-13
security
disk encryption 16-30
enabling secure store 10-10
selective acknowledgement 1-5
send buffer size 13-61
send TCP keepalive 13-60
serial clustering in inline mode 5-53
service context, AppNav 4-2
service password
configuring 5-10
set ip next-hop verify-availability command 5-41
shadow copy for shared folders 12-6
show cdp neighbors command 5-40
show command utility
for troubleshooting 17-61
show version command 16-20
shutting down WCCP 5-26
Simple Network Management Protocol. See SNMP
site and network planning 2-4
SMB accelerator
configuring 12-19
SNMP 1-23
asset tag setting 18-24
community settings 18-19
configuration process 18-12
configuring using the WAE Device Manager 11-8
contact settings 18-24
defining custom traps 18-16
enabling 18-13
enabling SNMP agent 18-11
enabling traps 18-14
group settings 18-21
host settings 18-18
manager
creating 18-3
monitoring with 18-1
preparation 18-13
security models and security levels 18-4
supported MIBs 18-4
trap source settings 18-24
user settings 18-22
versions supported 18-3
view settings 18-20
software
recovering 16-18
software clock 10-5
software files
obtaining from Cisco.com 16-3
software licenses 10-3
software recovery 16-11
software upgrades 16-3
for multiple devices 16-7
process 16-1
software version
determining 16-3
SSL
configuring 13-28
standby Central Manager
switching to primary 16-28
standby groups
of interfaces 6-3
standby interfaces
assigning physical interfaces 6-6
configuring 6-3
priimary interface 6-6
starting WAE components 11-5
static IP addresses 2-9
static IP routes
configuring 6-25
statistics, collecting 13-49
stopping WAE components 11-5
system configuration settings 10-17
system dashboard
viewing system-wide information 17-1
system event logging
configuring 17-51
message priority levels 17-53
viewing log 17-56
system image
recovering 16-18
system message log
using 17-51
viewing 17-56
system software
recovering 16-18
system status
monitoring 17-5
T
TACACS+
authentication and authorization, overview of 7-14
database 7-2
default configuration 7-4
enable password attribute 7-15
TACACS+ server
configuring 7-14
taskbar icons 1-15
TCP
congestion windows 6-23
explicit congestion notification 6-23
parameter settings 6-21
retransmit timer 6-23
slow start 6-24
viewing connections 17-40
tcpdump command 17-60
TCP initial window size, about 1-5
TCP promiscuous mode service
overview of 2-24
Telnet services
enabling 7-9
Ten Gigabit Ethernet interfaces
modifying 6-7
test command for troubleshooting 17-60
tethereal command 17-60
TFO
about 1-4
TFO adaptive buffering 13-62
TFO and LZ compression action 13-53
TFO features 1-4
BIC TCP 1-6
compression 1-6
increased buffering 1-5
selective acknowledgement 1-5
TCP initial window size maximization 1-5
Windows scaling 1-5
TFO only action 13-53
TFO with DRE (Adaptive Cache) action 13-53
TFO with DRE (Bidirectional Cache) action 13-53
TFO with DRE (Unidirectional Cache) action 13-53
time zones
location abbreviations 10-7
parameter settings for 10-5
Topology report 17-40
traceroute 17-61
track command 5-41
traffic statistics collection, enabling 13-49
traffic statistics report 17-2
chart descriptions 17-14
transaction logging 17-53
configuring 17-54
log format B-1
transparent redirection, configuring on a router 5-6
traps
defining SNMP 18-16
enabling 18-14
triggers
defining SNMP 18-16
troubleshooting
CLI commands 17-60
using show command utility 17-61
with Central Manager diagnostic tests 17-59
with TCPdump 17-60
with Tethereal 17-60
with WAAS TCP Traceroute 17-61
Troubleshooting Devices window 17-5
U
Unicode support 2-10
upgrading
device groups 16-7
process 16-1
WAAS Central Manager device 16-5
user accounts
adding domain entities 8-15
assigning to domains 8-15
audit trail logs
viewing 7-33, 17-57
changing passwords 8-6, 8-7
creating 8-4
creation process 8-2
deleting 8-6
deleting domains 8-16
domains 8-14
managing 8-7
modifying and deleting 8-6
roles
assigning to 8-12
creating 8-10
modifying and deleting 8-13
viewing 8-13
viewing 8-8
viewing domains 8-17
user authentication. See login authentication
user groups
about 8-17
assigning roles to 8-18
assigning to domains 8-19
creating 8-18
deleting 8-20
viewing 8-20
UTC offsets 10-8
See also GMT offsets
V
version of software 16-3
video accelerator
configuring 13-22
enabling 13-3
viewing
application list 13-55
classifier report 13-56
logs in the WAE device manager 11-27
policy report 13-56
role settings 8-13
virtual blade
backing up and restoring 14-11
configuring 14-1, 14-4
copying disk image to 14-10
enabling 14-3
starting and stopping 14-8
virtual interfaces
modifying 6-14
virtualization. See virtual blade
VLAN ID check 5-45
VLAN support 5-44
VPATH interception 5-55
vWAAS
virtual interface configuration 6-14
VPATH interception 5-55
W
WAAS
benefits 1-19
interfaces 1-10
WAAS Central Manager
backing up 16-9
restoring 16-9
upgrading 16-5
WAAS Central Manager GUI
about 1-10
accessing 1-11
components 1-12
taskbar icons 1-15
WAAS CLI, about 1-18
WAAS Express
configuring a device certificate 10-32
configuring an NTP server 10-33
configuring a user 10-30
configuring optimization on interfaces 6-16
enabling HTTP secure server 10-32
importing Central Manager certificate 10-31
installing a license 10-33
registering with the Central Manager 10-34
registration process overview 10-27
reimporting a certificate to the Central Manager 10-34
WAAS interfaces
CLI 1-18
WAAS Central Manager GUI 1-10
WAE Device Manager GUI 1-17
WAAS networks
and IOP interoperability 2-11
network planning for 2-1
traffic redirection methods 2-18
WAAS services, about 1-4
WAAS TCP Traceroute 17-61
WAE Device Manager
about 1-17, 11-1
Configuration option 11-8
Control option for the WAE 11-4
logging out 11-3
Notifier tab 11-15
quick tour 11-2
Utilities option 11-17
workflow 11-3
WAE devices
backing up 16-10
controlled shutdown 16-35
modifying configuration properties 10-1
restoring 16-10
supported 2-10
WAE packet return 5-15
WAFS. See CIFS
WAFS Cache Cleanup utility 11-18
WAVE devices supported 2-10
WCCP
about 1-21, 5-3, 5-11
Cisco Express Forwarding (CEF) 5-15
configuring interception on SCs 5-22
configuring interception on WAEs 5-17
flow redirection, enabling and disabling 5-16
GRE packet return 5-29
ports used 2-6
shutting down 5-26
WCCP-based routing
advanced configuration for a router 5-6
advantages and disadvantages 2-20
configuration guidelines 5-4
web application filter
configuring 10-20
web browser support 2-10
Windows Authentication
checking the status in the WAE Device Manager 11-13
configuring in the Central Manager 7-17
configuring using the WAE Device Manager 11-10
Windows domain server settings 7-17
Windows name services 6-27
Windows print accelerator, about 1-9
Windows scaling, about 1-5
Index
Numerics
10 Gigabit Ethernet interfaces
modifying 6-7
A
AAA accounting
configuring 7-31
AAA-based management systems 2-26, 7-2
acceleration
about 1-6, 13-1
features 1-6
TCP adaptive buffering settings 13-62
TCP settings 13-60
accelerators
enabling 13-3
accelerator threshold 13-55
accounts
creating 8-4
creation process 8-2
deleting 8-6
local CLI 8-2
roles-based 8-2
types 8-1
viewing 8-8
ACL
interception 5-28
See also IP ACL
action
full optimization (adaptive cache) 13-53
full optimization (bidirectional cache) 13-53
full optimization (unidirectional cache) 13-53
passthrough 13-53
TFO only 13-53
TFO with DRE (Adaptive Cache) 13-53
TFO with DRE (Bidirectional Cache) 13-53
TFO with DRE (Unidirectional Cache) 13-53
TFO with LZ compression 13-53
types 13-53
activating devices 16-34
adaptive buffering, TFO 13-62
adding
charts 17-13
administrative login authentication and authorization
default 7-4
for WAEs 7-2
local database description 7-6
overview of 7-1
RADIUS overview 7-12
TACACS+ overview 7-14
Windows domain overview 7-17
administrative login authentication failover 7-26
alarm overload detection, enabling 10-23
alarm panel
system dashboard window 17-3
alarms
device reporting 17-4
alerts 17-5
application acceleration
about 1-6, 13-1
enabling 13-3
application classifiers
creating 13-50
match condition 13-52
restoring 13-57
application definition
creating 13-49
application list, viewing 13-55
application policy
creating 13-50
creation process 13-48
position 13-58
preparation tasks 13-48
restoring defaults 13-57
applications
monitoring 13-57, 17-2
AppNav
adding and removing devices 4-30
AppNav Cluster 4-2
AppNav Controller 4-1
AppNav Controller Group 4-2
appnav-controller interception 5-56
AppNav Controller Interface Modules 4-3
class maps 4-4
cluster settings 4-26
cluster wizard 4-14
configuring 4-1, 4-10
configuring class maps 4-19
configuring policy rules 4-22
connecting tracing 4-37
controller settings 4-28
deployment models 4-2
interface wizard 4-17
monitoring cluster 4-34
policies 4-5
policy 4-4
service context 4-2
WAAS Node 4-2
WAAS Node Group 4-2
WAAS node group settings 4-30
WAAS node settings 4-29
assigning
devices to a preposition directive 12-16
devices to device groups 3-5
devices to more than one device group 3-7
audit trail logs
viewing 7-33, 17-57
authentication
default feature values 7-4
authentication databases, types of 7-2
authentication servers
configuring 7-12, 7-14
authorization
default feature values 7-4
autodiscover 1-20
autoregistration
DHCP server requirements 2-8
B
backing up
configuration files 11-6
WAAS Central Manager 16-9
WAE devices 16-10
backup and restore
cms database 16-9
virtual blade 14-11
banners
configuring 7-10
BIC TCP 1-6
BMC
enabling IPMI over LAN 10-26
enabling IPMI SoL 10-27
firmware update 10-25
bootflags 16-21
bridge group
assigning physical interface 6-19
creating 6-18
bridge virtual interface
creating 6-19
browser support 2-10
C
CDP
configuring 6-26
cdp enable command 5-40
cdp run command 5-40
Central Manager. See WAAS Central Manager
charts
adding 17-13
customizing 17-10
descriptions 17-14
settings 17-14
CIFS 12-1
ports used 2-6
preparing for 12-7
using SMB accelerator for 12-19
CIFS accelerator
configuring 12-8
enabling 13-3
CifsAO WAE Device Manager option 11-19
CIFS configuration process 12-8
Cisco.com
obtaining software files from 16-3
Cisco Discovery Protocol. See CDP
classifier, creating 13-50
classifier report, viewing 13-56
clear statistics all command 7-25
clear statistics authentication command 7-25
clear statistics windows-domain command 7-25
CLI user
creating 8-4
clock
setting 10-5
clustering in inline mode 5-53
cms database
backup and restore procedure 16-9
cms database backup command 16-9
cms database restore command 16-10
coherency
age-based validation 12-4
compression, about 1-6
conditions
modifying or deleting from IP ACLs 9-6
congestion windows, about 6-23
connections
viewing TCP connections 17-40
Connections Statistics report 17-40
connection tracing 4-37
controlled shutdown 16-35
copy disk ftp command 16-9
core WAE, about 1-9
corrupted system images
recovering from 16-18
creating
accounts 8-4
application classifier 13-50
application definition 13-49
application policy 13-50
local user 8-4
match condition 13-52
new software file 16-3
preposition directive 12-11
preposition schedule 12-17
current software version
determining 16-3
D
dashboard
customizing 17-10
device 17-8
system 17-1
database backup 16-9
data coherency, about 12-3
data concurrency, about 12-5
data migration 2-28
data redundancy elimination, about 1-6
debug command 17-60
default status, restoring 16-11
deleting
accounts 8-6
device groups 3-6
locations 3-10
roles 8-13
software files 16-8
user groups 8-20
device
alarms 17-4
autodiscovery 1-20
clock setting 10-5
rebooting 16-34
Device Dashboard window 17-8
device groups
about 3-1
adding and removing devices 3-5
configuring 3-4
creating 3-3
creation process 3-2
deleting 3-6
enabling overlap 3-7
force group settings 3-7
list 3-6
overriding settings 3-7
setting configuration precedence 3-8
Device Home window. See Device Dashboard window
device locations
about 3-9
creating 3-10
deleting 3-10
device logs, viewing 17-58
device registration information
recovering 16-23
devices
activating 16-34
adding to device groups 3-5
adding to multiple device groups 3-7
impact of assigning to multiple groups 3-9
overriding device group settings 3-8
restarting 16-34
topology 17-40
viewing group assignments 3-6
viewing information for 17-6, 17-36, 17-40
Devices window 17-6
DHCP
configuring interfaces for 6-14
for autoregistration 2-8
interface-level 2-9
DHCP server
requirements for autoregistration 2-8
diagnostic tests 17-59
directed mode 6-28
disabling WCCP flow redirection 5-16
disk-based software, missing
recovering from 16-22
disk encryption 16-30
disk handling
configuring error-handling methods 16-31
configuring extended object cache 16-32
disks
monitoring 17-42
Disks report 17-42
DNS, configuring 6-26
domains
about 8-14
adding entities 8-15
assigning to user accounts 8-15
assigning to user groups 8-19
creating 8-14
deleting 8-16
modifying and deleting 8-16
viewing 8-17
downgrading 16-3
DRE, about 1-6
DRE settings
configuring 13-7
DSCP 13-54
global default 13-57
dynamic shares
creating for CIFS accelerator 12-9
creating for SMB accelerator 12-19
E
edge WAE, about 1-9
egress methods
configuring 5-29
email server settings for reports 10-24
enable command 7-15
enabling
optimization and accelerators 13-3
SNMP 18-13
SNMP agent 18-11
traffic statistic collection 13-49
virtual blade 14-3
WCCP flow redirection 5-16
encryption
disk 16-30
enabling secure store 10-10
entities
adding to domains 8-15
EPM accelerator
enabling 13-3
errors
disk drives 16-31
EtherChannel
configuring 6-10
Exec timeout
configuring 7-11
explicit congestion notification
about 6-23
extended object cache 16-32
F
failover, for administrative login authentication 7-26
fast offline detection
about 10-22
configuring 10-21
file locking, about 12-5
File Server Rename utility 11-19
file servers
supported 12-7
file services 12-8
about 1-8
features 1-8
preparing for 12-7
SMB configuration process 12-19
firewall, configuring for 6-28
flash memory
corrupted 16-18
flow monitoring
configuring 17-48
force group settings 3-7
full optimization (adaptive cache) action 13-53
full optimization (bidirectional cache) action 13-53
full optimization (unidirectional cache) action 13-53
G
generic GRE egress method 5-29
generic routing encapsulation. See GRE encapsulation
Gigabit Ethernet interfaces
modifying 6-7
GRE encapsulation 5-14, 5-15
GRE packet forwarding 5-15
GRE tunnel, configuring on router 5-31
groups. See user groups
H
hardware clock 10-5
hardware devices supported 2-10
high bandwidth WAN link 2-7
HTTP accelerator
configuring 13-7
enabling 13-3
HTTPS settings 13-7
I
ICA accelerator
configuring 13-27
increased buffering 1-5
inline mode 5-42
configuring IP address 5-51
interface settings 5-46
serial clustering 5-53
VLAN configuration 5-52
VLAN ID check 5-45
inline network adapter card 5-42
installing system software 16-11
intelligent message prediction 1-6
interception
appnav-controller 5-56
inline 5-42
policy-based routing 5-33
VPATH 5-55
WCCP 5-11
interception ACL 5-28
interface
assigning to bridge group 6-19
interface-level DHCP
description 2-9
note 2-8
interface module inline mode 5-42
interfaces
configuring 6-1
configuring virtual 6-14
manually configuring for DHCP 6-14
WAAS Express optimization 6-16
IP access control lists. See IP ACL
IP ACL
adding conditions to 9-3
applying to interface 9-6
associating with application 9-6
conditions, modifying or deleting 9-6
configuration constraints 9-2
creating new 9-3
deleting 9-7
on routers 2-25
on WAEs 2-25
overview 9-1
IP addresses
multiple, configuring on single interface 6-6
static 2-9
IPMI over LAN
about 10-24
enabling 10-26
enabling SoL 10-27
IP routes
configuring 6-25
ip wccp command 5-10
ip wccp redirect-list command 5-9
ip web-cache redirect command 5-10
K
kernel debugger
enabling 17-59
L
Layer 2 redirection 5-16
LDAP server signing 11-11, 11-13
configuring on a Microsoft server 7-24
configuring on a WAE 7-24
disabling on a WAE 7-25
overview of 7-23
licenses 10-3
line console carrier detection
configuring 7-11
load balancing 1-22, 5-12, 6-13
local CLI accounts, about 8-2
local user, creating 8-4
locations
about 3-9
creating 3-10
deleting 3-10
location tree
viewing 3-11
logging
configuring system logging 17-51
message priority levels 17-53
transaction log format B-1
transaction logging 17-53
viewing audit trail log 17-57
viewing device logs 17-58
viewing system messages 17-56
login
WAE Device Manager 11-1
login access
controlling 7-7
login authentication
about 2-26, 7-1
logs
severity levels in the WAE Device Manager 11-28
viewing in the WAE Device Manager 11-27
lost administrator passwords
recovering 16-21
LZ compression, about 1-6
M
management IP address 10-2
MAPI accelerator
configuring 13-11
enabling 13-3
match condition, creating 13-52
maximum segment size 13-61
message logs
viewing 17-56
message of the day settings
configuring 7-10
MIBs
supported 18-4
MIB traps
configuring using the WAE Device Manager 11-9
migration, data 2-28
missing disk-based software
recovering from 16-22
monitoring
applications 13-57, 17-2
chart descriptions 17-14
chart settings 17-14
creating custom reports 17-44
disk information 17-42
flows with NetQoS 17-48
predefined reports 17-35
resource utilization 17-42
system status 17-5
using the WAE Device Manager 11-23
with SNMP 18-1
multiple IP addresses
configuring on single interfaces 6-6
N
NAM 15-1
NAS appliances 1-20
NAT address 10-2
NAT configuration 10-2
NetBIOS 10-2
NetQoS monitoring 17-48
network
viewing information for 17-1
Network Analysis Module integration 15-1
Network Time Protocol. See NTP
network traffic analyzer tool 17-60
NFS accelerator
enabling 13-3
notification settings
for alerts 11-15
for reports 10-24
NTP, configuring 10-5
O
obtaining software files 16-3
operation prediction and batching 1-6
optimization
configuring on WAAS Express interfaces 6-16
enabling global features 13-3
P
packet forwarding method 5-14
Layer 2 redirection 5-16
Layer 3 GRE 5-15
packet return 5-15
passthrough action 13-53
passwords
changing account 8-6, 8-7
recovering administrator 16-21
PBR, about 1-21
policy-based routing
about 1-21
configuration of interception 5-33
overview of 2-21
verifying next-hop availability 5-39
policy report, viewing 13-56
port channel interfaces
assigning physical interfaces 6-12
configuring 6-10
load balancing 6-13
ports
139 2-6
bypassing 2-7
445 2-6
used in CIFS 2-6
position, application policy 13-58
power failure 16-18
preposition
about 12-5
checking status of 12-18
creating directive 12-11
scheduling 12-17
viewing in the WAE Device Manager 11-20
print accelerator 1-9
print services
about 1-9
priority levels 17-53
R
RADIUS
authentication overview 7-12
configuring server 7-12
database 7-2
default configuration 7-4
RAID 1-22
RCP services, enabling 10-4
rebooting devices 16-34
receive buffer size 13-61
recovering
device registration information 16-23
from missing disk-based software 16-22
lost administrator passwords 16-21
system software 16-18
redirection methods 5-1
registering
WAAS Express device 10-27
WAEs in the WAE Device Manager 11-6
reinstalling system software 16-11
remote login
controlling access 7-7
reports
configuring email server settings 10-24
Connections Statistics 17-40
creating custom 17-44
customizing 17-10
editing 17-45
managing 17-43
predefined 17-35
resource utilization 17-42
scheduling 17-46
Topology 17-40
viewing custom 17-45
request redirection methods 5-1
rescue system image 16-18
resource utilization report 17-42
restarting devices 16-34
restoring
application classifiers 13-57
application policies 13-57
configuration files 11-7
WAAS Central Manager 16-9
WAE devices 16-10
WAE to default condition 16-11
retransmit time multiplier
about 6-23
roles
about 8-9
assigning to user accounts 8-12
assigning to user groups 8-18
creating and managing 8-10
deleting 8-13
modifying and deleting 8-13
read-only access to services 8-10
viewing 8-13
viewing settings 8-13
roles-based accounts
about 8-2, 8-3
router
configuring WCCP transparent redirection on 5-6
S
SACK, about 1-5
scheduling
preposition 12-17
reports 17-46
secure shell
configuring 7-7
host keys 7-8
secure store
changing key and password 10-15
configuring 10-10
disabling 10-17
enabling on Central Manager 10-12
enabling on standby Central Manager 10-13
enabling on WAE 10-13
security
disk encryption 16-30
enabling secure store 10-10
selective acknowledgement 1-5
send buffer size 13-61
send TCP keepalive 13-60
serial clustering in inline mode 5-53
service context, AppNav 4-2
service password
configuring 5-10
set ip next-hop verify-availability command 5-41
shadow copy for shared folders 12-6
show cdp neighbors command 5-40
show command utility
for troubleshooting 17-61
show version command 16-20
shutting down WCCP 5-26
Simple Network Management Protocol. See SNMP
site and network planning 2-4
SMB accelerator
configuring 12-19
SNMP 1-23
asset tag setting 18-24
community settings 18-19
configuration process 18-12
configuring using the WAE Device Manager 11-8
contact settings 18-24
defining custom traps 18-16
enabling 18-13
enabling SNMP agent 18-11
enabling traps 18-14
group settings 18-21
host settings 18-18
manager
creating 18-3
monitoring with 18-1
preparation 18-13
security models and security levels 18-4
supported MIBs 18-4
trap source settings 18-24
user settings 18-22
versions supported 18-3
view settings 18-20
software
recovering 16-18
software clock 10-5
software files
obtaining from Cisco.com 16-3
software licenses 10-3
software recovery 16-11
software upgrades 16-3
for multiple devices 16-7
process 16-1
software version
determining 16-3
SSL
configuring 13-28
standby Central Manager
switching to primary 16-28
standby groups
of interfaces 6-3
standby interfaces
assigning physical interfaces 6-6
configuring 6-3
priimary interface 6-6
starting WAE components 11-5
static IP addresses 2-9
static IP routes
configuring 6-25
statistics, collecting 13-49
stopping WAE components 11-5
system configuration settings 10-17
system dashboard
viewing system-wide information 17-1
system event logging
configuring 17-51
message priority levels 17-53
viewing log 17-56
system image
recovering 16-18
system message log
using 17-51
viewing 17-56
system software
recovering 16-18
system status
monitoring 17-5
T
TACACS+
authentication and authorization, overview of 7-14
database 7-2
default configuration 7-4
enable password attribute 7-15
TACACS+ server
configuring 7-14
taskbar icons 1-15
TCP
congestion windows 6-23
explicit congestion notification 6-23
parameter settings 6-21
retransmit timer 6-23
slow start 6-24
viewing connections 17-40
tcpdump command 17-60
TCP initial window size, about 1-5
TCP promiscuous mode service
overview of 2-24
Telnet services
enabling 7-9
Ten Gigabit Ethernet interfaces
modifying 6-7
test command for troubleshooting 17-60
tethereal command 17-60
TFO
about 1-4
TFO adaptive buffering 13-62
TFO and LZ compression action 13-53
TFO features 1-4
BIC TCP 1-6
compression 1-6
increased buffering 1-5
selective acknowledgement 1-5
TCP initial window size maximization 1-5
Windows scaling 1-5
TFO only action 13-53
TFO with DRE (Adaptive Cache) action 13-53
TFO with DRE (Bidirectional Cache) action 13-53
TFO with DRE (Unidirectional Cache) action 13-53
time zones
location abbreviations 10-7
parameter settings for 10-5
Topology report 17-40
traceroute 17-61
track command 5-41
traffic statistics collection, enabling 13-49
traffic statistics report 17-2
chart descriptions 17-14
transaction logging 17-53
configuring 17-54
log format B-1
transparent redirection, configuring on a router 5-6
traps
defining SNMP 18-16
enabling 18-14
triggers
defining SNMP 18-16
troubleshooting
CLI commands 17-60
using show command utility 17-61
with Central Manager diagnostic tests 17-59
with TCPdump 17-60
with Tethereal 17-60
with WAAS TCP Traceroute 17-61
Troubleshooting Devices window 17-5
U
Unicode support 2-10
upgrading
device groups 16-7
process 16-1
WAAS Central Manager device 16-5
user accounts
adding domain entities 8-15
assigning to domains 8-15
audit trail logs
viewing 7-33, 17-57
changing passwords 8-6, 8-7
creating 8-4
creation process 8-2
deleting 8-6
deleting domains 8-16
domains 8-14
managing 8-7
modifying and deleting 8-6
roles
assigning to 8-12
creating 8-10
modifying and deleting 8-13
viewing 8-13
viewing 8-8
viewing domains 8-17
user authentication. See login authentication
user groups
about 8-17
assigning roles to 8-18
assigning to domains 8-19
creating 8-18
deleting 8-20
viewing 8-20
UTC offsets 10-8
See also GMT offsets
V
version of software 16-3
video accelerator
configuring 13-22
enabling 13-3
viewing
application list 13-55
classifier report 13-56
logs in the WAE device manager 11-27
policy report 13-56
role settings 8-13
virtual blade
backing up and restoring 14-11
configuring 14-1, 14-4
copying disk image to 14-10
enabling 14-3
starting and stopping 14-8
virtual interfaces
modifying 6-14
virtualization. See virtual blade
VLAN ID check 5-45
VLAN support 5-44
VPATH interception 5-55
vWAAS
virtual interface configuration 6-14
VPATH interception 5-55
W
WAAS
benefits 1-19
interfaces 1-10
WAAS Central Manager
backing up 16-9
restoring 16-9
upgrading 16-5
WAAS Central Manager GUI
about 1-10
accessing 1-11
components 1-12
taskbar icons 1-15
WAAS CLI, about 1-18
WAAS Express
configuring a device certificate 10-32
configuring an NTP server 10-33
configuring a user 10-30
configuring optimization on interfaces 6-16
enabling HTTP secure server 10-32
importing Central Manager certificate 10-31
installing a license 10-33
registering with the Central Manager 10-34
registration process overview 10-27
reimporting a certificate to the Central Manager 10-34
WAAS interfaces
CLI 1-18
WAAS Central Manager GUI 1-10
WAE Device Manager GUI 1-17
WAAS networks
and IOP interoperability 2-11
network planning for 2-1
traffic redirection methods 2-18
WAAS services, about 1-4
WAAS TCP Traceroute 17-61
WAE Device Manager
about 1-17, 11-1
Configuration option 11-8
Control option for the WAE 11-4
logging out 11-3
Notifier tab 11-15
quick tour 11-2
Utilities option 11-17
workflow 11-3
WAE devices
backing up 16-10
controlled shutdown 16-35
modifying configuration properties 10-1
restoring 16-10
supported 2-10
WAE packet return 5-15
WAFS. See CIFS
WAFS Cache Cleanup utility 11-18
WAVE devices supported 2-10
WCCP
about 1-21, 5-3, 5-11
Cisco Express Forwarding (CEF) 5-15
configuring interception on SCs 5-22
configuring interception on WAEs 5-17
flow redirection, enabling and disabling 5-16
GRE packet return 5-29
ports used 2-6
shutting down 5-26
WCCP-based routing
advanced configuration for a router 5-6
advantages and disadvantages 2-20
configuration guidelines 5-4
web application filter
configuring 10-20
web browser support 2-10
Windows Authentication
checking the status in the WAE Device Manager 11-13
configuring in the Central Manager 7-17
configuring using the WAE Device Manager 11-10
Windows domain server settings 7-17
Windows name services 6-27
Windows print accelerator, about 1-9
Windows scaling, about 1-5