Index

Numerics

10 Gigabit Ethernet interfaces

modifying 6-7

A

AAA accounting

configuring 7-34

AAA-based management systems 2-26, 7-2

acceleration

about 1-7, 13-1

features 1-7

TCP adaptive buffering settings 13-66

TCP settings 13-64

accelerators

enabling 13-3

accelerator threshold 13-58

accounts

creating 8-4

creation process 8-2

deleting 8-6

local CLI 8-2

roles-based 8-2

types 8-1

viewing 8-8

ACL

interception 5-28

See also IP ACL

action

full optimization (adaptive cache) 13-55

full optimization (bidirectional cache) 13-55

full optimization (unidirectional cache) 13-55

passthrough 13-55

TFO only 13-55

TFO with DRE (Adaptive Cache) 13-55

TFO with DRE (Bidirectional Cache) 13-55

TFO with DRE (Unidirectional Cache) 13-55

TFO with LZ compression 13-55

types 13-55

activating devices 16-35

adaptive buffering, TFO 13-66

adding

charts 17-13

administrative login authentication and authorization

default 7-4

for WAEs 7-2

local database description 7-6

overview of 7-1

RADIUS overview 7-12

TACACS+ overview 7-14

Windows domain overview 7-16

administrative login authentication failover 7-27

alarm overload detection, enabling 10-23

alarm panel

system dashboard window 17-3

alarms

device reporting 17-4

alerts 17-5

application acceleration

about 1-7, 13-1

enabling 13-3

application classifiers

creating 13-53

match condition 13-57

restoring 13-61

application definition

creating 13-52

application list, viewing 13-59

application policy

creating 13-53

creation process 13-51

position 13-62

preparation tasks 13-51

restoring defaults 13-61

applications

monitoring 13-61, 17-2

AppNav

adding and removing devices 4-43

AppNav Cluster 4-2

AppNav Controller 4-1

AppNav Controller Group 4-2

appnav-controller interception 5-57

AppNav Controller Interface Modules 4-3

class maps 4-5

cluster settings 4-35

cluster settings for WAAS node 4-42

cluster wizard 4-15

configuring 4-1, 4-11

configuring class maps 4-22

configuring policy rules 4-28

connection statistics 4-51

connection tracing 4-51

controller settings 4-37

deployment models 4-3

interface wizard 4-20

monitoring cluster 4-47

policies 4-5

policy 4-4

service context 4-2

WAAS Node 4-2

WAAS Node Group 4-2

WAAS node group settings 4-41

WAAS node settings 4-40

AppNav-XE

enabling WAAS service insertion on interfaces 6-17

registration process 10-28

reimporting a certificate to the Central Manager 10-34

assigning

devices to a preposition directive 12-16

devices to device groups 3-5

devices to more than one device group 3-7

audit trail logs

viewing 7-35, 17-62

authentication

default feature values 7-4

authentication databases, types of 7-2

authentication servers

configuring 7-12, 7-14

authorization

default feature values 7-4

autodiscover 1-20

autoregistration

DHCP server requirements 2-8

B

backing up

configuration files 11-6

WAAS Central Manager 16-10

WAE devices 16-12

backup and restore

cms database 16-10

virtual blade 14-11

banners

configuring 7-10

BIC TCP 1-6

BMC

enabling IPMI over LAN 10-26

enabling IPMI SoL 10-27

firmware update 10-25

bootflags 16-22

bridge group

assigning physical interface 6-20

creating 6-19

bridge virtual interface

creating 6-20

browser support 2-10

C

CDP

configuring 6-27

cdp enable command 5-41

cdp run command 5-40

Central Manager. See WAAS Central Manager

certificate

reimporting 10-34

charts

adding 17-13

customizing 17-10

descriptions 17-14

settings 17-14

CIFS 12-1

ports used 2-6

preparing for 12-7

using SMB accelerator for 12-19

CIFS accelerator

configuring 12-8

enabling 13-3

CifsAO WAE Device Manager option 11-13

CIFS configuration process 12-8

Cisco.com

obtaining software files from 16-3

Cisco Discovery Protocol. See CDP

Cisco Prime Network Single Sign-on configuration 7-32

classifier, creating 13-53

classifier report, viewing 13-60

clear statistics all command 7-26

clear statistics authentication command 7-26

clear statistics windows-domain command 7-26

CLI user

creating 8-4

clock

setting 10-5

clustering in inline mode 5-53

cms database

backup and restore procedure 16-10

cms database backup command 16-10

cms database restore command 16-11

coherency

age-based validation 12-4

compression, about 1-6

conditions

modifying or deleting from IP ACLs 9-6

configuring WAAS CM for single sign-on 7-33

congestion windows, about 6-24

connections

viewing TCP connections 17-40

Connections Statistics report 17-40

connection statistics, AppNav 4-51

connection tracing 4-51

controlled shutdown 16-36

copy disk ftp command 16-10

core WAE, about 1-9

corrupted system images

recovering from 16-19

CPU load threshold 13-59

creating

accounts 8-4

application classifier 13-53

application definition 13-52

application policy 13-53

local user 8-4

match condition 13-57

new software file 16-3

preposition directive 12-11

preposition schedule 12-17

current software version

determining 16-3

D

dashboard

customizing 17-10

device 17-8

system 17-1

database backup 16-10

data coherency, about 12-3

data concurrency, about 12-5

data migration 2-27

data redundancy elimination, about 1-6

debug command 17-65

default status, restoring 16-12

deleting

accounts 8-6

device groups 3-6

locations 3-11

roles 8-13

software files 16-9

user groups 8-20

device

alarms 17-4

autodiscovery 1-20

clock setting 10-5

rebooting 16-35

Device Dashboard window 17-8

device groups

about 3-1

adding and removing devices 3-5

configuring 3-4

creating 3-3

creation process 3-2

deleting 3-6

enabling overlap 3-7

force group settings 3-7

list 3-6

overriding settings 3-7

setting configuration precedence 3-8

Device Home window. See Device Dashboard window

device locations

about 3-10

creating 3-10

deleting 3-11

device logs, viewing 17-63

device registration information

recovering 16-23

devices

activating 16-35

adding to device groups 3-5

adding to multiple device groups 3-7

impact of assigning to multiple groups 3-9

overriding device group settings 3-8

restarting 16-35

topology 17-40

viewing group assignments 3-6

viewing information for 17-6, 17-36, 17-40

Devices window 17-6

DHCP

configuring interfaces for 6-14

for autoregistration 2-8

interface-level 2-9

DHCP server

requirements for autoregistration 2-8

diagnostic tests 17-64

directed mode 6-29

Disabling NetFlow v9 17-51

disabling WCCP flow redirection 5-17

disk-based software, missing

recovering from 16-22

disk encryption 16-31

disk handling

configuring error-handling methods 16-32

configuring extended object cache 16-33

disks

monitoring 17-43

Disks report 17-43

DNS, configuring 6-27

domains

about 8-14

adding entities 8-15

assigning to user accounts 8-15

assigning to user groups 8-19

creating 8-14

deleting 8-16

modifying and deleting 8-16

viewing 8-17

downgrading 16-3

DRE, about 1-6

DRE settings

configuring 13-7

DSCP 13-56

global default 13-61

dynamic shares

creating for CIFS accelerator 12-9

creating for SMB accelerator 12-19

E

edge WAE, about 1-9

egress methods

configuring 5-30

email server settings for reports 10-24

enable command 7-15

enabling

optimization and accelerators 13-3

protocol chaining 13-49

SNMP 18-14

SNMP agent 18-13

traffic statistic collection 13-52

virtual blade 14-3

WCCP flow redirection 5-17

encryption

disk 16-31

enabling secure store 10-10

entities

adding to domains 8-15

EPM accelerator

enabling 13-3

errors

disk drives 16-32

EtherChannel

configuring 6-10

Exec timeout

configuring 7-10

explicit congestion notification

about 6-24

extended object cache 16-33

F

failover, for administrative login authentication 7-27

fast offline detection

about 10-23

configuring 10-22

file locking, about 12-5

File Server Rename utility 11-13

file servers

supported 12-7

file services 12-8

about 1-8

features 1-9

preparing for 12-7

SMB configuration process 12-19

firewall, configuring for 6-29

flash memory

corrupted 16-19

flow monitoring

configuring 17-48

force group settings 3-7

full optimization (adaptive cache) action 13-55

full optimization (bidirectional cache) action 13-55

full optimization (unidirectional cache) action 13-55

G

generic GRE egress method 5-30

generic routing encapsulation. See GRE encapsulation

Gigabit Ethernet interfaces

modifying 6-7

GRE encapsulation 5-14, 5-16

GRE packet forwarding 5-16

GRE tunnel, configuring on router 5-32

groups. See user groups

H

hardware clock 10-5

hardware devices supported 2-10

high bandwidth WAN link 2-7

HTTP accelerator

configuring 13-8

enabling 13-3

HTTPS settings 13-8

I

ICA accelerator

configuring 13-29

configuring ICA over SSL 13-31

increased buffering 1-5

inline mode 5-43

configuring IP address 5-52

interface settings 5-47

serial clustering 5-53

VLAN configuration 5-53

VLAN ID check 5-46

inline network adapter card 5-43

installing system software 16-12

intelligent message prediction 1-7

interception

appnav-controller 5-57

inline 5-43

policy-based routing 5-33

VPATH 5-56

WCCP 5-11

interception ACL 5-28

interface

assigning to bridge group 6-20

interface-level DHCP

description 2-9

interface module inline mode 5-43

interfaces

configuring 6-1

configuring virtual 6-14

enabling AppNav-XE service insertion 6-17

manually configuring for DHCP 6-14

WAAS Express optimization 6-16

IP access control lists. See IP ACL

IP ACL

adding conditions to 9-3

applying to interface 9-6

associating with application 9-6

conditions, modifying or deleting 9-6

configuration constraints 9-2

creating new 9-3

deleting 9-7

on routers 2-25

on WAEs 2-25

overview 9-1

IP addresses

multiple, configuring on single interface 6-6

static 2-9

IPMI over LAN

about 10-25

enabling 10-26

enabling SoL 10-27

IP routes

configuring 6-26

ip wccp command 5-10

ip wccp redirect-list command 5-10

ip web-cache redirect command 5-10

K

kernel debugger

enabling 17-63

L

Layer 2 redirection 5-16

LDAP server signing

configuring on a Microsoft server 7-24

configuring on a WAE 7-25

disabling on a WAE 7-26

overview of 7-24

licenses 10-3

line console carrier detection

configuring 7-11

load balancing 1-23, 5-12, 6-13

local CLI accounts, about 8-2

local user, creating 8-4

locations

about 3-10

creating 3-10

deleting 3-11

location tree

viewing 3-11

logging

configuring system logging 17-56

message priority levels 17-58

transaction log format B-1

transaction logging 17-59

viewing audit trail log 17-62

viewing device logs 17-63

viewing system messages 17-62

login

WAE Device Manager 11-1

login access

controlling 7-7

login authentication

about 2-25, 7-1

logs

severity levels in the WAE Device Manager 11-22

viewing in the WAE Device Manager 11-21

lost administrator passwords

recovering 16-21

LZ compression, about 1-6

M

management IP address 10-2

MAPI accelerator

configuring 13-11

enabling 13-3

match condition, creating 13-57

maximum segment size 13-65

message logs

viewing 17-62

message of the day settings

configuring 7-10

Message Signing Server Database 12-19

MIBs

supported 18-4

MIB traps

configuring using the WAE Device Manager 11-8

migration, data 2-27

missing disk-based software

recovering from 16-22

monitoring

applications 13-61, 17-2

chart descriptions 17-14

chart settings 17-14

creating custom reports 17-44

disk information 17-43

flows with NetQoS 17-48

predefined reports 17-35

resource utilization 17-42

system status 17-5

using the WAE Device Manager 11-17

with SNMP 18-1

multiple IP addresses

configuring on single interfaces 6-6

N

NAM 15-1

NAS appliances 1-21

NAT address 10-2

NAT configuration 10-2

NetBIOS 10-2

NetFlow v9 17-50

NetQoS monitoring 17-48

network

viewing information for 17-1

Network Analysis Module integration 15-1

Network Time Protocol. See NTP

network traffic analyzer tool 17-65

NFS accelerator

enabling 13-3

notification settings

for alerts 11-9

for reports 10-24

NTP, configuring 10-5

O

obtaining software files 16-3

operation prediction and batching 1-7

optimization

configuring on WAAS Express interfaces 6-16

enabling global features 13-3

P

packet forwarding method 5-14

Layer 2 redirection 5-16

Layer 3 GRE 5-16

packet return 5-15

passthrough action 13-55

passwords

changing account 8-6, 8-7

recovering administrator 16-21

PBR, about 1-22

policy-based routing

about 1-22

configuration of interception 5-33

overview of 2-20

verifying next-hop availability 5-40

policy report, viewing 13-60

port channel interfaces

assigning physical interfaces 6-12

configuring 6-10

load balancing 6-13

ports

139 2-6

bypassing 2-7

445 2-6

used in CIFS 2-6

position, application policy 13-62

power failure 16-19

preposition

about 12-5

checking status of 12-18

creating directive 12-11

scheduling 12-17

viewing in the WAE Device Manager 11-14

print accelerator 1-9

print services

about 1-9

priority levels 17-58

R

RADIUS

authentication overview 7-12

configuring server 7-12

database 7-2

default configuration 7-4

RAID 1-23

RCP services, enabling 10-4

rebooting devices 16-35

receive buffer size 13-65

recovering

device registration information 16-23

from missing disk-based software 16-22

lost administrator passwords 16-21

system software 16-19

redirection methods 5-1

registering

AppNav-XE device 10-28

WAAS Express device 10-28

WAEs in the WAE Device Manager 11-6

reinstalling system software 16-12

remote login

controlling access 7-7

reports

configuring email server settings 10-24

Connections Statistics 17-40

creating custom 17-44

customizing 17-10

editing 17-46

managing 17-44

predefined 17-35

resource utilization 17-42

scheduling 17-46

Topology 17-40

viewing custom 17-46

request redirection methods 5-1

rescue system image 16-19

resource utilization report 17-42

restarting devices 16-35

restoring

application classifiers 13-61

application policies 13-61

configuration files 11-7

WAAS Central Manager 16-10

WAE devices 16-12

WAE to default condition 16-12

retransmit time multiplier

about 6-24

roles

about 8-9

assigning to user accounts 8-12

assigning to user groups 8-18

creating and managing 8-10

deleting 8-13

modifying and deleting 8-13

read-only access to services 8-10

viewing 8-13

viewing settings 8-13

roles-based accounts

about 8-2, 8-3

router

configuring WCCP transparent redirection on 5-6

S

SACK, about 1-5

scheduling

preposition 12-17

reports 17-46

secure shell

configuring 7-7

host keys 7-8

secure store

changing key and password 10-15

configuring 10-10

disabling 10-17

enabling on Central Manager 10-12

enabling on standby Central Manager 10-13

enabling on WAE 10-13

security

disk encryption 16-31

enabling secure store 10-10

selective acknowledgement 1-5

send buffer size 13-65

send TCP keepalive 13-64

serial clustering in inline mode 5-53

service context, AppNav 4-2

service password

configuring 5-10

set ip next-hop verify-availability command 5-41

shadow copy for shared folders 12-6

show cdp neighbors command 5-40

show command utility

for troubleshooting 17-66

show version command 16-21

shutting down WCCP 5-27

Simple Network Management Protocol. See SNMP

site and network planning 2-4

SMB accelerator

configuring 12-19

SNMP 1-24

asset tag setting 18-25

community settings 18-20

configuration process 18-13

configuring using the WAE Device Manager 11-8

contact settings 18-25

defining custom traps 18-17

enabling 18-14

enabling SNMP agent 18-13

enabling traps 18-15

group settings 18-22

host settings 18-19

manager

creating 18-3

monitoring with 18-1

preparation 18-14

security models and security levels 18-4

supported MIBs 18-4

trap source settings 18-25

user settings 18-23

versions supported 18-3

view settings 18-21

software

recovering 16-19

software clock 10-5

software files

obtaining from Cisco.com 16-3

software licenses 10-3

software recovery 16-12

software upgrades 16-3

for multiple devices 16-7

process 16-1

software version

determining 16-3

SSL

configuring 13-31

standby Central Manager

switching to primary 16-29

standby groups

of interfaces 6-3

standby interfaces

assigning physical interfaces 6-6

configuring 6-3

priimary interface 6-6

starting WAE components 11-5

static IP addresses 2-9

static IP routes

configuring 6-26

statistics, collecting 13-52

stopping WAE components 11-5

system configuration settings 10-17

system dashboard

viewing system-wide information 17-1

system event logging

configuring 17-56

message priority levels 17-58

viewing log 17-62

system image

recovering 16-19

system message log

using 17-56

viewing 17-62

system software

recovering 16-19

system status

monitoring 17-5

T

TACACS+

authentication and authorization, overview of 7-14

database 7-2

default configuration 7-4

enable password attribute 7-15

TACACS+ server

configuring 7-14

taskbar icons 1-16

TCP

congestion windows 6-24

explicit congestion notification 6-24

parameter settings 6-22

retransmit timer 6-24

slow start 6-25

viewing connections 17-40

tcpdump command 17-65

TCP initial window size, about 1-5

TCP promiscuous mode service

overview of 2-24

Telnet services

enabling 7-9

Ten Gigabit Ethernet interfaces

modifying 6-7

test command for troubleshooting 17-65

tethereal command 17-65

TFO

about 1-4

TFO adaptive buffering 13-66

TFO and LZ compression action 13-55

TFO features 1-4

BIC TCP 1-6

compression 1-6

increased buffering 1-5

selective acknowledgement 1-5

TCP initial window size maximization 1-5

Windows scaling 1-5

TFO only action 13-55

TFO with DRE (Adaptive Cache) action 13-55

TFO with DRE (Bidirectional Cache) action 13-55

TFO with DRE (Unidirectional Cache) action 13-55

time zones

location abbreviations 10-7

parameter settings for 10-5

Topology report 17-40

traceroute 17-66

track command 5-42

traffic statistics collection, enabling 13-52

traffic statistics report 17-2

chart descriptions 17-14

transaction logging 17-59

configuring 17-59

log format B-1

transparent redirection, configuring on a router 5-6

traps

defining SNMP 18-17

enabling 18-15

triggers

defining SNMP 18-17

troubleshooting

CLI commands 17-65

using show command utility 17-66

with Central Manager diagnostic tests 17-64

with TCPdump 17-65

with Tethereal 17-65

with WAAS TCP Traceroute 17-66

Troubleshooting Devices window 17-5

U

Unicode support 2-10

upgrading

device groups 16-7

process 16-1

WAAS Central Manager device 16-5

user accounts

adding domain entities 8-15

assigning to domains 8-15

audit trail logs

viewing 7-35, 17-62

changing passwords 8-6, 8-7

creating 8-4

creation process 8-2

deleting 8-6

deleting domains 8-16

domains 8-14

managing 8-7

modifying and deleting 8-6

roles

assigning to 8-12

creating 8-10

modifying and deleting 8-13

viewing 8-13

viewing 8-8

viewing domains 8-17

user authentication. See login authentication

user groups

about 8-17

assigning roles to 8-18

assigning to domains 8-19

creating 8-18

deleting 8-20

viewing 8-20

UTC offsets 10-8

See also GMT offsets

V

version of software 16-3

video accelerator

configuring 13-23

enabling 13-3

viewing

application list 13-59

classifier report 13-60

logs in the WAE device manager 11-21

policy report 13-60

role settings 8-13

virtual blade

backing up and restoring 14-11

configuring 14-1, 14-4

copying disk image to 14-10

enabling 14-3

starting and stopping 14-8

virtual interfaces

modifying 6-14

virtualization. See virtual blade

VLAN ID check 5-46

VLAN support 5-45

VPATH interception 5-56

vWAAS

virtual interface configuration 6-14

VPATH interception 5-56

W

WAAS

benefits 1-20

interfaces 1-10

WAAS Central Manager

backing up 16-10

restoring 16-10

upgrading 16-5

WAAS Central Manager GUI

about 1-10

accessing 1-11

components 1-12

taskbar icons 1-16

WAAS CLI, about 1-19

WAAS Express

configuring a device certificate 10-32

configuring an NTP server 10-34

configuring a user 10-30

configuring optimization on interfaces 6-16

enabling HTTP secure server 10-33

importing Central Manager certificate 10-31

installing a license 10-33

registering with the Central Manager 10-34

registration process 10-28

reimporting a certificate to the Central Manager 10-34

WAAS interfaces

CLI 1-19

WAAS Central Manager GUI 1-10

WAE Device Manager GUI 1-18

WAAS networks

and IOP interoperability 2-11

network planning for 2-1

traffic redirection methods 2-18

WAAS services, about 1-4

WAAS TCP Traceroute 17-66

WAE Device Manager

about 1-18, 11-1

Configuration option 11-8

Control option for the WAE 11-4

logging out 11-3

Notifier tab 11-9

quick tour 11-2

Utilities option 11-11

workflow 11-3

WAE devices

backing up 16-12

controlled shutdown 16-36

modifying configuration properties 10-1

restoring 16-12

supported 2-10

WAE packet return 5-15

WAFS. See CIFS

WAFS Cache Cleanup utility 11-12

WAVE devices supported 2-10

WCCP

about 1-22, 5-3, 5-11

Cisco Express Forwarding (CEF) 5-15

configuring interception on SCs 5-22

configuring interception on WAEs 5-17

flow redirection, enabling and disabling 5-17

GRE packet return 5-30

ports used 2-6

shutting down 5-27

WCCP-based routing

advanced configuration for a router 5-6

advantages and disadvantages 2-20

configuration guidelines 5-4

web application filter

configuring 10-20

web browser support 2-10

Windows Authentication

configuring in the Central Manager 7-16

Windows domain server settings 7-17

Windows name services 6-28

Windows print accelerator, about 1-9

Windows scaling, about 1-5

Index

Numerics

10 Gigabit Ethernet interfaces

modifying 6-7

A

AAA accounting

configuring 7-34

AAA-based management systems 2-26, 7-2

acceleration

about 1-7, 13-1

features 1-7

TCP adaptive buffering settings 13-66

TCP settings 13-64

accelerators

enabling 13-3

accelerator threshold 13-58

accounts

creating 8-4

creation process 8-2

deleting 8-6

local CLI 8-2

roles-based 8-2

types 8-1

viewing 8-8

ACL

interception 5-28

See also IP ACL

action

full optimization (adaptive cache) 13-55

full optimization (bidirectional cache) 13-55

full optimization (unidirectional cache) 13-55

passthrough 13-55

TFO only 13-55

TFO with DRE (Adaptive Cache) 13-55

TFO with DRE (Bidirectional Cache) 13-55

TFO with DRE (Unidirectional Cache) 13-55

TFO with LZ compression 13-55

types 13-55

activating devices 16-35

adaptive buffering, TFO 13-66

adding

charts 17-13

administrative login authentication and authorization

default 7-4

for WAEs 7-2

local database description 7-6

overview of 7-1

RADIUS overview 7-12

TACACS+ overview 7-14

Windows domain overview 7-16

administrative login authentication failover 7-27

alarm overload detection, enabling 10-23

alarm panel

system dashboard window 17-3

alarms

device reporting 17-4

alerts 17-5

application acceleration

about 1-7, 13-1

enabling 13-3

application classifiers

creating 13-53

match condition 13-57

restoring 13-61

application definition

creating 13-52

application list, viewing 13-59

application policy

creating 13-53

creation process 13-51

position 13-62

preparation tasks 13-51

restoring defaults 13-61

applications

monitoring 13-61, 17-2

AppNav

adding and removing devices 4-43

AppNav Cluster 4-2

AppNav Controller 4-1

AppNav Controller Group 4-2

appnav-controller interception 5-57

AppNav Controller Interface Modules 4-3

class maps 4-5

cluster settings 4-35

cluster settings for WAAS node 4-42

cluster wizard 4-15

configuring 4-1, 4-11

configuring class maps 4-22

configuring policy rules 4-28

connection statistics 4-51

connection tracing 4-51

controller settings 4-37

deployment models 4-3

interface wizard 4-20

monitoring cluster 4-47

policies 4-5

policy 4-4

service context 4-2

WAAS Node 4-2

WAAS Node Group 4-2

WAAS node group settings 4-41

WAAS node settings 4-40

AppNav-XE

enabling WAAS service insertion on interfaces 6-17

registration process 10-28

reimporting a certificate to the Central Manager 10-34

assigning

devices to a preposition directive 12-16

devices to device groups 3-5

devices to more than one device group 3-7

audit trail logs

viewing 7-35, 17-62

authentication

default feature values 7-4

authentication databases, types of 7-2

authentication servers

configuring 7-12, 7-14

authorization

default feature values 7-4

autodiscover 1-20

autoregistration

DHCP server requirements 2-8

B

backing up

configuration files 11-6

WAAS Central Manager 16-10

WAE devices 16-12

backup and restore

cms database 16-10

virtual blade 14-11

banners

configuring 7-10

BIC TCP 1-6

BMC

enabling IPMI over LAN 10-26

enabling IPMI SoL 10-27

firmware update 10-25

bootflags 16-22

bridge group

assigning physical interface 6-20

creating 6-19

bridge virtual interface

creating 6-20

browser support 2-10

C

CDP

configuring 6-27

cdp enable command 5-41

cdp run command 5-40

Central Manager. See WAAS Central Manager

certificate

reimporting 10-34

charts

adding 17-13

customizing 17-10

descriptions 17-14

settings 17-14

CIFS 12-1

ports used 2-6

preparing for 12-7

using SMB accelerator for 12-19

CIFS accelerator

configuring 12-8

enabling 13-3

CifsAO WAE Device Manager option 11-13

CIFS configuration process 12-8

Cisco.com

obtaining software files from 16-3

Cisco Discovery Protocol. See CDP

Cisco Prime Network Single Sign-on configuration 7-32

classifier, creating 13-53

classifier report, viewing 13-60

clear statistics all command 7-26

clear statistics authentication command 7-26

clear statistics windows-domain command 7-26

CLI user

creating 8-4

clock

setting 10-5

clustering in inline mode 5-53

cms database

backup and restore procedure 16-10

cms database backup command 16-10

cms database restore command 16-11

coherency

age-based validation 12-4

compression, about 1-6

conditions

modifying or deleting from IP ACLs 9-6

configuring WAAS CM for single sign-on 7-33

congestion windows, about 6-24

connections

viewing TCP connections 17-40

Connections Statistics report 17-40

connection statistics, AppNav 4-51

connection tracing 4-51

controlled shutdown 16-36

copy disk ftp command 16-10

core WAE, about 1-9

corrupted system images

recovering from 16-19

CPU load threshold 13-59

creating

accounts 8-4

application classifier 13-53

application definition 13-52

application policy 13-53

local user 8-4

match condition 13-57

new software file 16-3

preposition directive 12-11

preposition schedule 12-17

current software version

determining 16-3

D

dashboard

customizing 17-10

device 17-8

system 17-1

database backup 16-10

data coherency, about 12-3

data concurrency, about 12-5

data migration 2-27

data redundancy elimination, about 1-6

debug command 17-65

default status, restoring 16-12

deleting

accounts 8-6

device groups 3-6

locations 3-11

roles 8-13

software files 16-9

user groups 8-20

device

alarms 17-4

autodiscovery 1-20

clock setting 10-5

rebooting 16-35

Device Dashboard window 17-8

device groups

about 3-1

adding and removing devices 3-5

configuring 3-4

creating 3-3

creation process 3-2

deleting 3-6

enabling overlap 3-7

force group settings 3-7

list 3-6

overriding settings 3-7

setting configuration precedence 3-8

Device Home window. See Device Dashboard window

device locations

about 3-10

creating 3-10

deleting 3-11

device logs, viewing 17-63

device registration information

recovering 16-23

devices

activating 16-35

adding to device groups 3-5

adding to multiple device groups 3-7

impact of assigning to multiple groups 3-9

overriding device group settings 3-8

restarting 16-35

topology 17-40

viewing group assignments 3-6

viewing information for 17-6, 17-36, 17-40

Devices window 17-6

DHCP

configuring interfaces for 6-14

for autoregistration 2-8

interface-level 2-9

DHCP server

requirements for autoregistration 2-8

diagnostic tests 17-64

directed mode 6-29

Disabling NetFlow v9 17-51

disabling WCCP flow redirection 5-17

disk-based software, missing

recovering from 16-22

disk encryption 16-31

disk handling

configuring error-handling methods 16-32

configuring extended object cache 16-33

disks

monitoring 17-43

Disks report 17-43

DNS, configuring 6-27

domains

about 8-14

adding entities 8-15

assigning to user accounts 8-15

assigning to user groups 8-19

creating 8-14

deleting 8-16

modifying and deleting 8-16

viewing 8-17

downgrading 16-3

DRE, about 1-6

DRE settings

configuring 13-7

DSCP 13-56

global default 13-61

dynamic shares

creating for CIFS accelerator 12-9

creating for SMB accelerator 12-19

E

edge WAE, about 1-9

egress methods

configuring 5-30

email server settings for reports 10-24

enable command 7-15

enabling

optimization and accelerators 13-3

protocol chaining 13-49

SNMP 18-14

SNMP agent 18-13

traffic statistic collection 13-52

virtual blade 14-3

WCCP flow redirection 5-17

encryption

disk 16-31

enabling secure store 10-10

entities

adding to domains 8-15

EPM accelerator

enabling 13-3

errors

disk drives 16-32

EtherChannel

configuring 6-10

Exec timeout

configuring 7-10

explicit congestion notification

about 6-24

extended object cache 16-33

F

failover, for administrative login authentication 7-27

fast offline detection

about 10-23

configuring 10-22

file locking, about 12-5

File Server Rename utility 11-13

file servers

supported 12-7

file services 12-8

about 1-8

features 1-9

preparing for 12-7

SMB configuration process 12-19

firewall, configuring for 6-29

flash memory

corrupted 16-19

flow monitoring

configuring 17-48

force group settings 3-7

full optimization (adaptive cache) action 13-55

full optimization (bidirectional cache) action 13-55

full optimization (unidirectional cache) action 13-55

G

generic GRE egress method 5-30

generic routing encapsulation. See GRE encapsulation

Gigabit Ethernet interfaces

modifying 6-7

GRE encapsulation 5-14, 5-16

GRE packet forwarding 5-16

GRE tunnel, configuring on router 5-32

groups. See user groups

H

hardware clock 10-5

hardware devices supported 2-10

high bandwidth WAN link 2-7

HTTP accelerator

configuring 13-8

enabling 13-3

HTTPS settings 13-8

I

ICA accelerator

configuring 13-29

configuring ICA over SSL 13-31

increased buffering 1-5

inline mode 5-43

configuring IP address 5-52

interface settings 5-47

serial clustering 5-53

VLAN configuration 5-53

VLAN ID check 5-46

inline network adapter card 5-43

installing system software 16-12

intelligent message prediction 1-7

interception

appnav-controller 5-57

inline 5-43

policy-based routing 5-33

VPATH 5-56

WCCP 5-11

interception ACL 5-28

interface

assigning to bridge group 6-20

interface-level DHCP

description 2-9

interface module inline mode 5-43

interfaces

configuring 6-1

configuring virtual 6-14

enabling AppNav-XE service insertion 6-17

manually configuring for DHCP 6-14

WAAS Express optimization 6-16

IP access control lists. See IP ACL

IP ACL

adding conditions to 9-3

applying to interface 9-6

associating with application 9-6

conditions, modifying or deleting 9-6

configuration constraints 9-2

creating new 9-3

deleting 9-7

on routers 2-25

on WAEs 2-25

overview 9-1

IP addresses

multiple, configuring on single interface 6-6

static 2-9

IPMI over LAN

about 10-25

enabling 10-26

enabling SoL 10-27

IP routes

configuring 6-26

ip wccp command 5-10

ip wccp redirect-list command 5-10

ip web-cache redirect command 5-10

K

kernel debugger

enabling 17-63

L

Layer 2 redirection 5-16

LDAP server signing

configuring on a Microsoft server 7-24

configuring on a WAE 7-25

disabling on a WAE 7-26

overview of 7-24

licenses 10-3

line console carrier detection

configuring 7-11

load balancing 1-23, 5-12, 6-13

local CLI accounts, about 8-2

local user, creating 8-4

locations

about 3-10

creating 3-10

deleting 3-11

location tree

viewing 3-11

logging

configuring system logging 17-56

message priority levels 17-58

transaction log format B-1

transaction logging 17-59

viewing audit trail log 17-62

viewing device logs 17-63

viewing system messages 17-62

login

WAE Device Manager 11-1

login access

controlling 7-7

login authentication

about 2-25, 7-1

logs

severity levels in the WAE Device Manager 11-22

viewing in the WAE Device Manager 11-21

lost administrator passwords

recovering 16-21

LZ compression, about 1-6

M

management IP address 10-2

MAPI accelerator

configuring 13-11

enabling 13-3

match condition, creating 13-57

maximum segment size 13-65

message logs

viewing 17-62

message of the day settings

configuring 7-10

Message Signing Server Database 12-19

MIBs

supported 18-4

MIB traps

configuring using the WAE Device Manager 11-8

migration, data 2-27

missing disk-based software

recovering from 16-22

monitoring

applications 13-61, 17-2

chart descriptions 17-14

chart settings 17-14

creating custom reports 17-44

disk information 17-43

flows with NetQoS 17-48

predefined reports 17-35

resource utilization 17-42

system status 17-5

using the WAE Device Manager 11-17

with SNMP 18-1

multiple IP addresses

configuring on single interfaces 6-6

N

NAM 15-1

NAS appliances 1-21

NAT address 10-2

NAT configuration 10-2

NetBIOS 10-2

NetFlow v9 17-50

NetQoS monitoring 17-48

network

viewing information for 17-1

Network Analysis Module integration 15-1

Network Time Protocol. See NTP

network traffic analyzer tool 17-65

NFS accelerator

enabling 13-3

notification settings

for alerts 11-9

for reports 10-24

NTP, configuring 10-5

O

obtaining software files 16-3

operation prediction and batching 1-7

optimization

configuring on WAAS Express interfaces 6-16

enabling global features 13-3

P

packet forwarding method 5-14

Layer 2 redirection 5-16

Layer 3 GRE 5-16

packet return 5-15

passthrough action 13-55

passwords

changing account 8-6, 8-7

recovering administrator 16-21

PBR, about 1-22

policy-based routing

about 1-22

configuration of interception 5-33

overview of 2-20

verifying next-hop availability 5-40

policy report, viewing 13-60

port channel interfaces

assigning physical interfaces 6-12

configuring 6-10

load balancing 6-13

ports

139 2-6

bypassing 2-7

445 2-6

used in CIFS 2-6

position, application policy 13-62

power failure 16-19

preposition

about 12-5

checking status of 12-18

creating directive 12-11

scheduling 12-17

viewing in the WAE Device Manager 11-14

print accelerator 1-9

print services

about 1-9

priority levels 17-58

R

RADIUS

authentication overview 7-12

configuring server 7-12

database 7-2

default configuration 7-4

RAID 1-23

RCP services, enabling 10-4

rebooting devices 16-35

receive buffer size 13-65

recovering

device registration information 16-23

from missing disk-based software 16-22

lost administrator passwords 16-21

system software 16-19

redirection methods 5-1

registering

AppNav-XE device 10-28

WAAS Express device 10-28

WAEs in the WAE Device Manager 11-6

reinstalling system software 16-12

remote login

controlling access 7-7

reports

configuring email server settings 10-24

Connections Statistics 17-40

creating custom 17-44

customizing 17-10

editing 17-46

managing 17-44

predefined 17-35

resource utilization 17-42

scheduling 17-46

Topology 17-40

viewing custom 17-46

request redirection methods 5-1

rescue system image 16-19

resource utilization report 17-42

restarting devices 16-35

restoring

application classifiers 13-61

application policies 13-61

configuration files 11-7

WAAS Central Manager 16-10

WAE devices 16-12

WAE to default condition 16-12

retransmit time multiplier

about 6-24

roles

about 8-9

assigning to user accounts 8-12

assigning to user groups 8-18

creating and managing 8-10

deleting 8-13

modifying and deleting 8-13

read-only access to services 8-10

viewing 8-13

viewing settings 8-13

roles-based accounts

about 8-2, 8-3

router

configuring WCCP transparent redirection on 5-6

S

SACK, about 1-5

scheduling

preposition 12-17

reports 17-46

secure shell

configuring 7-7

host keys 7-8

secure store

changing key and password 10-15

configuring 10-10

disabling 10-17

enabling on Central Manager 10-12

enabling on standby Central Manager 10-13

enabling on WAE 10-13

security

disk encryption 16-31

enabling secure store 10-10

selective acknowledgement 1-5

send buffer size 13-65

send TCP keepalive 13-64

serial clustering in inline mode 5-53

service context, AppNav 4-2

service password

configuring 5-10

set ip next-hop verify-availability command 5-41

shadow copy for shared folders 12-6

show cdp neighbors command 5-40

show command utility

for troubleshooting 17-66

show version command 16-21

shutting down WCCP 5-27

Simple Network Management Protocol. See SNMP

site and network planning 2-4

SMB accelerator

configuring 12-19

SNMP 1-24

asset tag setting 18-25

community settings 18-20

configuration process 18-13

configuring using the WAE Device Manager 11-8

contact settings 18-25

defining custom traps 18-17

enabling 18-14

enabling SNMP agent 18-13

enabling traps 18-15

group settings 18-22

host settings 18-19

manager

creating 18-3

monitoring with 18-1

preparation 18-14

security models and security levels 18-4

supported MIBs 18-4

trap source settings 18-25

user settings 18-23

versions supported 18-3

view settings 18-21

software

recovering 16-19

software clock 10-5

software files

obtaining from Cisco.com 16-3

software licenses 10-3

software recovery 16-12

software upgrades 16-3

for multiple devices 16-7

process 16-1

software version

determining 16-3

SSL

configuring 13-31

standby Central Manager

switching to primary 16-29

standby groups

of interfaces 6-3

standby interfaces

assigning physical interfaces 6-6

configuring 6-3

priimary interface 6-6

starting WAE components 11-5

static IP addresses 2-9

static IP routes

configuring 6-26

statistics, collecting 13-52

stopping WAE components 11-5

system configuration settings 10-17

system dashboard

viewing system-wide information 17-1

system event logging

configuring 17-56

message priority levels 17-58

viewing log 17-62

system image

recovering 16-19

system message log

using 17-56

viewing 17-62

system software

recovering 16-19

system status

monitoring 17-5

T

TACACS+

authentication and authorization, overview of 7-14

database 7-2

default configuration 7-4

enable password attribute 7-15

TACACS+ server

configuring 7-14

taskbar icons 1-16

TCP

congestion windows 6-24

explicit congestion notification 6-24

parameter settings 6-22

retransmit timer 6-24

slow start 6-25

viewing connections 17-40

tcpdump command 17-65

TCP initial window size, about 1-5

TCP promiscuous mode service

overview of 2-24

Telnet services

enabling 7-9

Ten Gigabit Ethernet interfaces

modifying 6-7

test command for troubleshooting 17-65

tethereal command 17-65

TFO

about 1-4

TFO adaptive buffering 13-66

TFO and LZ compression action 13-55

TFO features 1-4

BIC TCP 1-6

compression 1-6

increased buffering 1-5

selective acknowledgement 1-5

TCP initial window size maximization 1-5

Windows scaling 1-5

TFO only action 13-55

TFO with DRE (Adaptive Cache) action 13-55

TFO with DRE (Bidirectional Cache) action 13-55

TFO with DRE (Unidirectional Cache) action 13-55

time zones

location abbreviations 10-7

parameter settings for 10-5

Topology report 17-40

traceroute 17-66

track command 5-42

traffic statistics collection, enabling 13-52

traffic statistics report 17-2

chart descriptions 17-14

transaction logging 17-59

configuring 17-59

log format B-1

transparent redirection, configuring on a router 5-6

traps

defining SNMP 18-17

enabling 18-15

triggers

defining SNMP 18-17

troubleshooting

CLI commands 17-65

using show command utility 17-66

with Central Manager diagnostic tests 17-64

with TCPdump 17-65

with Tethereal 17-65

with WAAS TCP Traceroute 17-66

Troubleshooting Devices window 17-5

U

Unicode support 2-10

upgrading

device groups 16-7

process 16-1

WAAS Central Manager device 16-5

user accounts

adding domain entities 8-15

assigning to domains 8-15

audit trail logs

viewing 7-35, 17-62

changing passwords 8-6, 8-7

creating 8-4

creation process 8-2

deleting 8-6

deleting domains 8-16

domains 8-14

managing 8-7

modifying and deleting 8-6

roles

assigning to 8-12

creating 8-10

modifying and deleting 8-13

viewing 8-13

viewing 8-8

viewing domains 8-17

user authentication. See login authentication

user groups

about 8-17

assigning roles to 8-18

assigning to domains 8-19

creating 8-18

deleting 8-20

viewing 8-20

UTC offsets 10-8

See also GMT offsets

V

version of software 16-3

video accelerator

configuring 13-23

enabling 13-3

viewing

application list 13-59

classifier report 13-60

logs in the WAE device manager 11-21

policy report 13-60

role settings 8-13

virtual blade

backing up and restoring 14-11

configuring 14-1, 14-4

copying disk image to 14-10

enabling 14-3

starting and stopping 14-8

virtual interfaces

modifying 6-14

virtualization. See virtual blade

VLAN ID check 5-46

VLAN support 5-45

VPATH interception 5-56

vWAAS

virtual interface configuration 6-14

VPATH interception 5-56

W

WAAS

benefits 1-20

interfaces 1-10

WAAS Central Manager

backing up 16-10

restoring 16-10

upgrading 16-5

WAAS Central Manager GUI

about 1-10

accessing 1-11

components 1-12

taskbar icons 1-16

WAAS CLI, about 1-19

WAAS Express

configuring a device certificate 10-32

configuring an NTP server 10-34

configuring a user 10-30

configuring optimization on interfaces 6-16

enabling HTTP secure server 10-33

importing Central Manager certificate 10-31

installing a license 10-33

registering with the Central Manager 10-34

registration process 10-28

reimporting a certificate to the Central Manager 10-34

WAAS interfaces

CLI 1-19

WAAS Central Manager GUI 1-10

WAE Device Manager GUI 1-18

WAAS networks

and IOP interoperability 2-11

network planning for 2-1

traffic redirection methods 2-18

WAAS services, about 1-4

WAAS TCP Traceroute 17-66

WAE Device Manager

about 1-18, 11-1

Configuration option 11-8

Control option for the WAE 11-4

logging out 11-3

Notifier tab 11-9

quick tour 11-2

Utilities option 11-11

workflow 11-3

WAE devices

backing up 16-12

controlled shutdown 16-36

modifying configuration properties 10-1

restoring 16-12

supported 2-10

WAE packet return 5-15

WAFS. See CIFS

WAFS Cache Cleanup utility 11-12

WAVE devices supported 2-10

WCCP

about 1-22, 5-3, 5-11

Cisco Express Forwarding (CEF) 5-15

configuring interception on SCs 5-22

configuring interception on WAEs 5-17

flow redirection, enabling and disabling 5-17

GRE packet return 5-30

ports used 2-6

shutting down 5-27

WCCP-based routing

advanced configuration for a router 5-6

advantages and disadvantages 2-20

configuration guidelines 5-4

web application filter

configuring 10-20

web browser support 2-10

Windows Authentication

configuring in the Central Manager 7-16

Windows domain server settings 7-17

Windows name services 6-28

Windows print accelerator, about 1-9

Windows scaling, about 1-5