Configuring Network Settings

This chapter describes how to configure basic network settings such as configuring additional network interfaces to support network traffic, creating port channel and standby interfaces, configuring optimization on Cisco Wide Area Application Services (WAAS) Express interfaces, specifying a default gateway and Domain Name System (DNS) servers, enabling the Cisco Discovery Protocol (CDP).

note.gif

Noteblank.gif Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central Managers and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE refers to WAE and WAVE appliances, SM-SRE modules running WAAS, and Cisco Virtual WAAS (vWAAS) instances.


This chapter contains the following sections:

For information on configuring a bridge group for inline interfaces on an AppNav Controller Interface Module, see Configuring Inline Operation on ANCs in Chapter 5, “Configuring Traffic Interception,” or use the AppNav Cluster wizard, as described in Creating a New AppNav Cluster with the AppNav Cluster Wizard in Chapter 4, “Configuring AppNav.”

Configuring Network Interfaces

During initial setup, you choose an initial interface and either configure it for DHCP or gave it a static IP address, as described in the Cisco Wide Area Application Services Quick Configuration Guide.

From release 6.0, the following devices support IPv4 only, IPv6 only and dual stack configuration.

  • WAVE-294/594/694/7541/7571/8541
  • vWAAS on VMware ESX and ESXi hypervisor, vWAAS on ISR 4451(kWAAS)
  • WAAS Express

This section describes how to configure additional interfaces using options for redundancy, load balancing, and performance optimization and also to modify previously configured settings on interfaces.

This section contains the following topics:

We recommend that you use the WAAS Central Manager instead of the WAAS CLI to configure network settings. If you want to use the CLI, see the following commands in the Cisco Wide Area Application Services Command Reference : interface, ip address, port-channel, and primary-interface.

Network interfaces are named as follows on WAAS devices:

  • WAE-512/612/7326—Have two inbuilt Ethernet interfaces named GigabitEthernet 1/0 and GigabitEthernet 2/0.
  • WAVE-294/594/694/7541/7571/8541—Have two inbuilt Ethernet interfaces named GigabitEthernet 0/0 and GigabitEthernet 0/1. Additional interfaces on the Cisco Interface Module and AppNav Controller Interface Module are named GigabitEthernet 1/0 to 1/11 or TenGigabitEthernet 1/0 to 1/3, depending on the number and type of ports.
  • NME-WAE devices—Have an internal interface to the router that is designated 1/0, and an external interface that is designated 2/0.SM-SRE devices—Have an internal interface to the router that is designated 1/0 and an external interface that is designated 2/0.
note.gif

Noteblank.gif We strongly recommend that you do not use half-duplex connections on the WAE or on routers, switches, or other devices. Half duplex impedes performance and should not be used. Check each Cisco WAE interface and the port configuration on the adjacent device (router, switch, firewall, and WAE) to verify that full duplex is configured.

When connecting an AppNav Controller to a Cisco Nexus 7000 Series switch, the interfaces on both devices must be set to the same autonegotiate setting: either both on or both off. If they are set differently, switch-link flapping may occur.


note.gif

Noteblank.gif On Cisco ISR-WAAS devices, you cannot configure the following from the WAAS Central Manager: network interfaces, ip addresses (IPv4 or IPv6), routes, default gateway, DNS servers, and jumbo maximum transmission unit (MTU). Use the router CLI to configure these.


note.gif

Noteblank.gif Layer 3 interfaces may drop bridge protocol data unit (BPDU) packets. However, this does not affect data traffic.


Configuring a Standby Interface

Using this procedure, you can configure a logical interface called a standby interface. After you configure this standby interface, you must associate physical or port-channel interfaces with the standby interface in order to create a standby group. In the WAAS Central Manager, you can create a standby group by assigning two interfaces to the standby group and assigning one as primary.

Standby interfaces remain unused unless a member interface that is in use fails. When an in-use network interface fails (because of cable trouble, Layer 2 switch failure, or other failure), the other member interface of the standby group changes its state to in use and starts to carry traffic and take the load off the failed interface. With the standby interface configuration, only one interface is in use at a given time.

To configure standby interfaces, you must assign two physical or two port-channel interface members to a standby group. The following operating considerations apply to standby groups:

  • A standby group consists of two physical or two port-channel interfaces. (If you are configuring a WAAS device running a version earlier than 5.0, both interfaces must be physical interfaces.)
  • The maximum number of standby groups on a WAAS device is two. When using a Cisco AppNav Controller Interface Module, you can have up to three standby groups.
  • A standby group is assigned a unique standby IP address, shared by all members of the group.
  • Configuring the duplex and speed settings of the standby group member interfaces provides better reliability.
  • IP ACLs can be configured on physical interfaces that are members of a standby group.
  • One interface in a standby group is designated as the primary standby interface. Only the primary interface uses the group IP address.
  • If the in-use interface fails, another interface in its standby group takes over and carries the traffic.
  • If all the members of a standby group fail, and then one recovers, the WAAS software brings up the standby group on the operational interface.
  • The primary interface in a standby group can be changed at runtime. (The default action is to pre-empt the currently in-use interface if a different interface is made primary.)
  • If a physical interface is a member of a standby group, it cannot also be a member of a port channel.
  • If a device has only two interfaces, you cannot assign an IP address to both a standby group and a port channel. On such a device, only one logical interface can be configured with an IP address.
  • The member interfaces of a standby group can be connected to different switches if you use a VLAN tagging protocol and assign the same VLAN tag to each interface.
  • You cannot include a built-in Ethernet port and a port on a Cisco Interface Module in the same standby group.

Configuring a standby interface differs, depending on the version of the WAAS device that you are configuring. See one of the following topics:

Configuring a Standby Interface on a Device with Version 5.0 or Later

To configure a standby interface for devices with WAAS Version 5.0 or later, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces.

The Network Interfaces window for the device appears. (See Figure 6-1.)

Figure 6-1 Network Interfaces for Device Window

 

333643.tif

 

 

Step 3blank.gif In the taskbar of the lower area, click the Create Logical Interface icon.

The Create Logical Interface window appears.

Step 4blank.gif From the Logical Interface Type drop-down list, choose Standby and click OK.

The window refreshes with fields for configuring the standby group settings.

Step 5blank.gif From the Standby Group Number drop-down list, choose a group number for the interface.

Step 6blank.gif (Optional) From the Bridge Group Number drop-down list, choose a bridge virtual interface (BVI) group number with which to associate this standby interface, or None. For more information on BVI, see Configuring Management Interface Settings.

note.gif

Noteblank.gif This configuration item is not supported on AppNav Controller Interface Module ports.


Step 7blank.gif (Optional) In the Description field, enter a description for the standby group.

Step 8blank.gif (Optional) Check the Shutdown check box to shut down the hardware interface. By default, this option is disabled.

Step 9blank.gif (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the interface for statistics and calculate throughput. The default is 30 seconds.

Step 10blank.gif In the Address field, specify the IP address of the standby group.

Step 11blank.gif In the Netmask field, specify the netmask of the standby group.

Step 12blank.gif Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the following options. If you select one of the following options, the IPv6 address field and subsequent secondary IPv6 address fields are not available.

  • Use Link Local - A unicast address that is automatically configured on an interface using the link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this address configuration option is sufficient for nodes on a link to communicate.
  • Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC 4862.

Step 13blank.gif In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number of attempts by which the duplicate address should be detected.

Step 14blank.gif In the Assign Interfaces area, check the check boxes next to the two interfaces that you want to assign to this standby group and click the Assign taskbar icon. (To unassign any assigned interfaces, check the check box next to each interface that you want to unassign and click the Unassign taskbar icon.)

If you want to have two port-channel interfaces as members of the standby group, do not assign any interfaces here. When you create the port-channel interfaces, you assign the standby group number in that window.

Step 15blank.gif To assign one physical interface as the primary (active) interface in the standby group, ensure that it is the only interface that is checked, and then click the Enable Primary taskbar icon.

Step 16blank.gif Click OK.


 

Configuring a Standby Interface on a Device Earlier than Version 5.0

To configure a standby interface for devices with WAAS versions earlier than 5.0, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces.

The Network Interfaces window for the device appears.

Step 3blank.gif In the taskbar, click the Create New Interface icon.

The Creating New Network Interface window appears.

Step 4blank.gif From the Port Type drop-down list, choose Standby.

The window refreshes with fields for configuring the standby group settings.

Step 5blank.gif From the Standby Group Number drop-down list, choose a group number for the interface.

Step 6blank.gif (Optional) In the Description field, enter a description for the standby group.

Step 7blank.gif In the Address field, specify the IP address of the standby group.

Step 8blank.gif In the Netmask field, specify the netmask of the standby group.

Step 9blank.gif (Optional) Check the Shutdown check box to shut down the hardware interface. By default, this option is disabled.

Step 10blank.gif In the Default Gateway field, enter the default gateway IP address. If an interface is configured for DHCP, then this field is read only.

Step 11blank.gif (Optional) From the Bridge Group Number drop-down list, choose a bridge virtual interface (BVI) group number with which to associate this standby interface, or choose None. For more information on BVI, see Configuring Management Interface Settings.

Step 12blank.gif Click Submit.

Step 13blank.gif Configure the physical interface members, as described in Assigning Physical Interfaces to a Standby Group.


 

note.gif

Noteblank.gif After you create the standby interface, assign two physical interfaces to the standby group.


Assigning Physical Interfaces to a Standby Group

After you configure a logical standby interface for a device with a WAAS version earlier than 5.0, configure the standby group by assigning physical interfaces to the standby group and setting one physical interface as the primary standby interface. The primary interface in the standby group uses the standby group IP address. You must have a standby interface configured before you can set it as primary. (See Configuring a Standby Interface.)

You can assign an interface to a standby group only if the interface does not have an IP address assigned, and uses the IP address of the standby group.

note.gif

Noteblank.gif Removing a physical interface from standby group 2 on all WAAS device models may cause network disruption for up to 30 seconds. Additionally, removing a physical interface from standby group 1 on device model WAE-612 may cause network disruption for up to 30 seconds. The best practice is to make such changes when traffic interception is disabled, or at a time when traffic disruption is acceptable.


To associate an interface with a standby group and set it as the primary standby interface, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces window for the device appears.

Step 3blank.gif Click the Edit icon next to the physical interface that you want to assign to a standby group. The Interface Settings window appears.

note.gif

Noteblank.gif Choose a physical interface, not a logical interface (standby, port channel, or BVI), in this step.


Step 4blank.gif Complete the following steps to assign the interface to a standby group and specify it as the primary standby interface:

a.blank.gif In the Port Type To Assign drop-down list, choose Standby.

b.blank.gif Check either the Join Standby Group 1 or the Join Standby Group 2 check box. (Only one check box is shown if only one standby interface has been defined.)

c.blank.gif (Optional) Check the Standby Primary check box if you want this physical interface to be the primary (active) interface in the standby group.

Step 5blank.gif Click Submit.


 

Configuring Multiple IP Addresses on a Single Interface

You can configure up to four secondary IP addresses on a single interface. This configuration allows the device to be present in more than one subnet and can be used to optimize the response time because it allows the data to go directly from the WAAS device to the client that is requesting the information without being redirected through a router. The WAAS device becomes visible to the client because both are configured on the same subnet.

Configuring multiple IP addresses is not supported on AppNav Controller Interface Module ports.

To configure multiple IP addresses on a single interface, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces listing window appears.

Step 3blank.gif Choose the physical interface that you want to modify and click the Edit taskbar icon. (For devices using WAAS versions earlier than 5.0, click the Edit icon next to the interface.)

The Interface Settings window appears.

note.gif

Noteblank.gif Do not choose a standby or port-channel interface in this step. You cannot configure multiple IP addresses on these types of interfaces.


Step 4blank.gif In the Secondary Address and Secondary Netmask fields 1 through 4, enter up to four different IP addresses and secondary netmasks for the interface.

Step 5blank.gif Click OK. (For devices using WAAS versions earlier than 5.0, click Submit).


 

Configuring Ethernet Interface Settings

This section has two topics:

Modifying Physical Ethernet Interface Settings

To modify the settings of a physical Ethernet interface, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces.

The Network Interfaces window appears, listing the configured network interfaces.

note.gif

Noteblank.gif On NME-WAE devices, the internal interface to the router is designated slot 1, port 0, and the external interface is designated slot 2, port 0. For NME-WAE configuration details, see the document Configuring Cisco WAAS Network Modules for Cisco Access Routers.

On ISR-WAAS devices you cannot configure the network interfaces from the Central Manager.


Step 3blank.gif Choose the physical interface that you want to modify, and click the Edit taskbar icon. (For devices using WAAS versions earlier than 5.0, click the Edit icon next to the interface.)

The Interface Settings window appears, displaying the interface configurations on a particular slot and port. The interface type, slot, and port are determined by the hardware.

note.gif

Noteblank.gif When configuring the internal interface (GigabitEthernet 1/0) on an NME-WAE device, you cannot change the following fields or check boxes: Port Channel Number, AutoSense, Speed, Mode, Address, Netmask, Use DHCP, and Standby Group. If you attempt to change these values, the Central Manager displays an error when you click OK. These settings for the internal interface can be configured only through the host router CLI. For NME-WAE details, see the document Configuring Cisco WAAS Network Modules for Cisco Access Routers.


Step 4blank.gif (Optional) In the Description field, enter a description for the interface.

Step 5blank.gif (Optional) Check the Use CDP check box to enable the Cisco Discovery Protocol (CDP) on an interface.

When enabled, CDP obtains protocol addresses of neighboring devices and discovers the platform of those devices. It also shows information about the interfaces used by your router.

Configuring CDP from the CDP Settings window enables CDP globally on all the interfaces. For information on configuring CDP settings, see Configuring CDP Settings.

Step 6blank.gif (Optional) Check the Shutdown check box to shut down the hardware interface.

Step 7blank.gif (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the interface for statistics and calculate throughput. The default is 30 seconds. (The Load Interval item is not shown for devices using WAAS versions earlier than 5.0.)

Step 8blank.gif (Optional) Check the AutoSense check box to set the interface to autonegotiate the speed and mode. (This setting is not available on interfaces on some Cisco Interface Modules.)

Checking this check box disables the manual Speed and Mode drop-down list settings.

note.gif

Noteblank.gif When autosense is on, manual configurations are overridden. You must reboot the WAAS device to start autosensing.


Step 9blank.gif (Optional) Manually configure the interface transmission speed and mode settings as follows (these settings are not available on interfaces on some Cisco Interface Modules):

a.blank.gif Uncheck the AutoSense check box.

b.blank.gif From the Speed drop-down list, choose a transmission speed (10, 100, 1000, or 10000 Mbps). You must choose 1000 Mbps for fiber Gigabit Ethernet interfaces on a Cisco Interface Module.

c.blank.gif From the Mode drop-down list, choose a transmission mode (full-duplex or half-duplex). You must choose full-duplex for fiber Gigabit Ethernet interfaces on a Cisco Interface Module. This configuration item is not supported on AppNav Controller Interface Module ports.

Full-duplex transmission allows data to travel in both directions at the same time through an interface or a cable. A half-duplex setting ensures that data travels only in one direction at any given time. Although full duplex is faster, the interfaces sometimes cannot operate effectively in this mode. If you encounter excessive collisions or network errors, you may configure the interface for half duplex rather than full duplex.

note.gif

Noteblank.gif We strongly recommend that you do not use half-duplex connections on the WAE or on routers, switches, or other devices. Half duplex impedes performance and should not be used. Check each Cisco WAE interface and the port configuration on the adjacent device (router, switch, firewall, and WAE) to verify that full duplex is configured.


Step 10blank.gif Specify a value (in bytes) in the MTU field to set the interface MTU size.

The range is 576 to 1500 bytes. The MTU is the largest size of IP datagram that can be transferred using a specific data link connection.
If the interface has a IPv6 configuration, the MTU range is between 1280-1500 bytes.

note.gif

Noteblank.gif The MTU field is not editable if the interface is assigned to a standby or port-channel group, or if a system jumbo MTU is configured.


Step 11blank.gif (Optional) Check the Use DHCP check box to obtain an interface IP address through DHCP. Checking this box hides the IP address and Netmask fields. (For devices with WAAS versions earlier than 5.0, these fields are not hidden, but are disabled.) This configuration item is not supported on AppNav Controller Interface Module ports.

Optionally, supply a hostname in the Hostname field and a client ID in the Client Id field.

Step 12blank.gif In the Address field, enter a new IP address to change the interface IP address.

Step 13blank.gif In the Netmask field, enter a new netmask to change the interface netmask.

Step 14blank.gif (Optional) Enter up to four secondary IP addresses and corresponding subnet masks in the Secondary Address and Secondary Netmask fields. These fields are not supported on AppNav Controller Interface Module ports.

Configuring multiple IP addresses allows the device to be present in more than one subnet and can be used to optimize the response time because it allows the data to go directly from the WAAS device to the client that is requesting the information without being redirected through a router. The WAAS device becomes visible to the client because both are configured on the same subnet.

Step 15blank.gif In the Default Gateway field, enter the default gateway IP address. If an interface is configured for DHCP, this field is read only. (The Default Gateway field is not shown for devices using WAAS versions 5.0 or later; configure it as described in Configuring the Default Gateway.)

Step 16blank.gif (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.

The drop-down list contains all the IP ACLs that you configured in the system.

Step 17blank.gif (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.

Step 18blank.gif Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the following options. If you select one of the following options, the IPv6 address field and subsequent secondary IPv6 address fields are not available.

  • Use Link Local - A unicast address that is automatically configured on an interface using the link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this address configuration option is sufficient for nodes on a link to communicate.
  • Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC 4862.
  • Use DHCP - To obtain an interface IP address through DHCP.

Step 19blank.gif In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number of attempts by which the duplicate address should be detected.

Step 20blank.gif Click OK. (For devices using WAAS versions earlier than 5.0, click Submit.)


 

note.gif

Noteblank.gif Changing the interface transmission speed, duplex mode, or MTU may cause network disruption for up to 30 seconds. The best practice is to make such changes when traffic interception is disabled or at a time when traffic disruption is acceptable.


Configuring Flow Control on 1 GB/s and Faster Ethernet Ports

For Ethernet ports that run at 1 Gb/s or faster, you can enable or disable the port’s ability to send and receive flow-control pause frames. For Ethernet ports that run slower than 1 Gb/s, you can enable or disable only the port’s ability to receive flow-control pause frames.

note.gif

Noteblank.gif We recommend that you enable flow control on the Nexus 7000 and 6500 Series models when WAAS IOM onboard NIC are directly attached to the Nexus 7000 and 6500 Series models, and input packet drops are seen.


There are three options for enabling flow control for the local port:

  • Fully enable the local port to send or receive frames regardless of the flow-control setting of the remote port,
  • Set the local port to use the same setting you have specified for the remote port.
  • Set a combination of the two states for the local and remote ports.
note.gif

Noteblank.gif If you enable flow control on both the local and the remote Ethernet port, or you set a specified flow control of the remote port only, or set a combination of these states—flow control is enabled for those ports.


note.gif

Noteblank.gif For Ethernet ports that run at 10 GB/s or faster, you cannot used the specified state for the send/receive parameter.


Before you configure flow control:

Before you being the following procedure, verify these conditions:

  • Verify that the remote port that has the corresponding setting for the local port has the flow control that you need.
  • If you want the local port to send flow-control pause frames, verify that the remote port has a Receive parameter set to On or Desired.
  • If you want the local port to receive flow-control frames, verify that the remote port has a Send parameter set to On or Desired.
  • If you do not want to use flow control, set the remote port’s Send and Receive parameters to Off.

To configure flow control for 1 GB/s and faster Ethernet ports, follow these steps:


Step 1blank.gif Enter Configuration mode for the terminal, using the config terminal command.

Step 2blank.gif Specify an Ethernet interface to configure, using the interface ethernet slot/port command.

The interface ethernet slot/port command enters the terminal into Interface Configuration mode.

Step 3blank.gif Specify the flow-control setting for ports, using the flowcontrol command.

Parameters for this command are send/receive and desired/on/off.

  • You can set the Send parameter only for ports running at 1000 MB/s or faster.
  • You can set the Receive parameter for ports running at any speed.

Step 4blank.gif Display the interface status, using the show interface gigabitEthernet slot/port command.

The interface status includes the flow-control parameters.

The following is sample output from the show interface gigabitEthernet slot/port command:

#show interface gigabitEthernet 0/1
 
Ethernet Address : 50:3d:e5:9d:1c:ef
Internet Address : --
Netmask : --
Admin State : Up
Operation State : Running
Maximum Transfer Unit Size : 1500
Input Errors : 2
Input Packets Dropped : 41967568
Packets Received : 218840605830
Output Errors : 0
Output Packets Dropped : 0
Load Interval : 30
Input Throughput : 364402648 bits/sec, 45090 packets/sec
Output Throughput : 191939420 bits/sec, 23974 packets/sec
Packets Sent : 161861463575
 

Step 5blank.gif Display the flow control status for all Ethernet ports, using the show interface flowcontrol command.

Step 6blank.gif Exit Interface mode, using the exit command.

Step 7blank.gif (Optional) Copy the running configuration to the startup configuration, using the copy running-config startup-config command.


 

Configuring the Default Gateway

On WAAS devices with Version 5.0 or later, configure the default gateway as follows:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Default Gateway.

The Default Gateway window appears with fields for IPv4 and IPv6.

Step 3blank.gif In the Default Gateway field, enter the default gateway IP address( either IPv4 or IPv6 address).

Step 4blank.gif Click Submit.


 

To configure a default gateway from the CLI, use the ip default-gateway global configuration or the ipv6 default-gateway address command.

On WAAS devices with versions earlier than 5.0, the default gateway should be configured within the interface settings for each interface.

note.gif

Noteblank.gif On ISR-WAAS devices, you cannot configure the default gateway from the Central Manager.


Configuring Port-Channel Settings

The WAAS software supports grouping of up to four (eight on AppNav Controller Interface Modules) physical network interfaces into one logical interface called a port channel. After you configure this port-channel interface, you must associate physical interfaces with the port channel.

You can configure up to four port-channel interfaces (seven on AppNav Controller Interface Modules). This capability also provides interoperability with Cisco routers, switches, and other networking devices or hosts supporting EtherChannel, load balancing, automatic failure detection, and recovery based on each interface’s current link status. EtherChannel is also referred to as a port channel.

You can use a port channel in standby interface, or as a member of an inline bridge group on an AppNav Controller Interface Module. For more information on configuring a BVI, see Configuring Management Interface Settings. The following operating considerations apply to a port-channel virtual interface:

  • A physical interface can be a member of a port channel or a standby group, but not both.
  • You cannot assign an IP address to both a port channel and a standby group. Only one logical interface can be configured with an IP address.
  • All port-channel member interfaces must have the same port bandwidth.
  • Port-channel settings are not applicable to vWAAS devices.
  • You cannot include a built-in Ethernet port and a port on a Cisco Interface Module in the same port-channel interface.
note.gif

Noteblank.gif You must disable autoregistration if the device has only two interfaces and both device interfaces are configured as port-channel interfaces.


Configuring a port-channel interface differs, depending on the version of the WAAS device that you are configuring. See one of the following topics:

Configuring a Port-Channel Interface on a Device with Version 5.0 or Later

To configure a port-channel interface for devices with WAAS Version 5.0 or later, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces window for the device appears.

Step 3blank.gif In the taskbar of the lower area, click the Create Logical Interface icon. The Create Logical Interface window appears.

Step 4blank.gif From the Logical Interface Type drop-down list, choose PortChannel and click OK. The window refreshes with fields for configuring the port-channel interface settings.

Step 5blank.gif From the Port Channel Number drop-down list, choose a number for the interface.

Step 6blank.gif (Optional) From the Bridge Group Number drop-down list, choose a bridge group number with which to associate this interface, or choose None. The bridge group number can be associated with a BVI or an inline bridge group defined on an AppNav Controller.

Step 7blank.gif (Optional) From the Standby Group Number drop-down list, choose a standby group number with which to associate this interface, or choose None.

You must create the standby group with no assigned interfaces before it appears as a choice in this list.

Step 8blank.gif (Optional) In the Description field, enter a description for the interface.

Step 9blank.gif (Optional) Check the Shutdown check box to shut down the hardware interface. By default, this option is disabled.

If you plan to assign this port-channel interface to a standby interface, check this check box.

Step 10blank.gif (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the interface for statistics and calculate throughput. The default is 30 seconds.

Step 11blank.gif In the Address field, specify the IP address of the interface.

If you are assigning this port-channel interface to a standby group, do not configure an IP address or netmask. The standby group supplies the IP address and netmask.

Step 12blank.gif In the Netmask field, specify the netmask of the interface.

Step 13blank.gif (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.

The drop-down list contains all the IP ACLs that you configured in the system.

Step 14blank.gif (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.

Step 15blank.gif Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the following options. If you select one of the following options, the IPv6 address field and subsequent secondary IPv6 address fields are not available.

  • Use Link Local - A unicast address that is automatically configured on an interface using the link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this address configuration option is sufficient for nodes on a link to communicate.
  • Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC 4862.

Step 16blank.gif In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number of attempts by which the duplicate address should be detected.

Step 17blank.gif In the Assign Interfaces area, click the check box next to the interfaces that you want to assign to this port channel and click the Assign taskbar icon. To unassign assigned interfaces, check the check box next to each interface that you want to unassign and click the Unassign taskbar icon.

If you plan to assign this port-channel interface to a standby interface, do not assign interfaces until after the port channel is assigned to the standby interface.

Step 18blank.gif Click OK.


 

Configuring a Port-Channel Interface on a Device Earlier than Version 5.0

To configure a port-channel interface for devices with WAAS versions earlier than 5.0, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces window appears, listing all the interfaces for the chosen device.

Step 3blank.gif In the taskbar, click the Create New Interface icon. The Creating New Network Interface window appears.

Step 4blank.gif From the Port Type drop-down list, choose PortChannel.

The window refreshes and provides fields for configuring the network interface settings.

Step 5blank.gif From the Port Channel Number drop-down list, choose the number of the port-channel interface. Up to four port channels are supported, depending on the WAAS device model and installed interface module.

Step 6blank.gif (Optional) In the Description field, enter a description for the port channel.

Step 7blank.gif (Optional) Check the Shutdown check box to shut down this interface. By default, this option is disabled.

Step 8blank.gif In the Default Gateway field, enter the default gateway IP address.

Step 9blank.gif In the Address field, specify the IP address of the interface.

Step 10blank.gif In the Netmask field, specify the netmask of the interface.

Step 11blank.gif (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.

The drop-down list contains all the IP ACLs that you configured in the system.

Step 12blank.gif (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.

Step 13blank.gif Click Submit.

Step 14blank.gif Configure the physical interface members as described in Assigning Physical Interfaces to a Port Channel.


 

note.gif

Noteblank.gif After you create the port-channel interface, assign physical interfaces to the port channel.


Assigning Physical Interfaces to a Port Channel

After you have configured a logical port-channel interface, you must assign multiple physical interfaces to the port channel. You can assign up to four physical interfaces to one port-channel interface, depending on the WAAS device.

You can assign an interface to a port channel only if the interface does not have an IP address assigned, and uses the IP address of the port channel.

You cannot combine built-in Ethernet ports with ports on a Cisco Interface Module into the same port-channel interface.

note.gif

Noteblank.gif Removing a physical interface from a port channel on device model WAE-612 may cause network disruption for up to 30 seconds. The best practice is to make such changes when traffic interception is disabled or at a time when traffic disruption is acceptable.


To add an interface to a port channel, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces window for the device appears.

Step 3blank.gif Click the Edit icon next to the physical interface that you want to assign to a port channel. The Modifying Network Interface window appears.

Choose a physical interface, not a logical interface (standby, port channel, or BVI), in this step.

Step 4blank.gif Complete the following steps to assign the interface to a port channel:

a.blank.gif From the Port Type To Assign drop-down list, choose PortChannel.

b.blank.gif From the Port Channel Number drop-down list, choose the number of the port channel to which you want to add the physical interface.

Step 5blank.gif Click Submit.


 

Configuring a Load-Balancing Method for Port-Channel Interfaces

Before you configure load balancing, ensure that you have configured the port-channel settings described in Configuring Port-Channel Settings.

To configure load balancing, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name ( or Device Groups > device-group-name).

Step 2blank.gif Choose Configure > Network > Port Channel.

Step 3blank.gif From the Load Balancing Method drop-down list, choose a load-balancing method:

    • src-dst-ip-port —The distribution function is based on a combination of source and destination IP addresses and ports. This load-balancing method is available only on devices running Version 4.4.1 and later.
    • src-dst-ip —The distribution function is based on a combination of source and destination IP addresses. This load-balancing method is available only on devices running Version 5.0.1 and later.
    • round-robin —Round robin allows traffic to be distributed evenly among all the interfaces in the channel group. This load-balancing method is available only on devices running versions earlier than 4.4.1.

Step 4blank.gif Click Submit.


 

To configure a load-balancing method from the CLI, use the port-channel global configuration command.

note.gif

Noteblank.gif To configure devices running previous versions of WAAS, a device group can be configured with a load-balancing method supported only by previous WAAS software versions. When viewing the Port Channel Settings window for Version 4.4.1 or later for a device that gets its settings from such a device group, you may see an unsupported load-balancing method listed. However, a Version 4.4.1 or later device supports only the load-balancing methods as described above, regardless of what the device group or device configuration window shows for the setting.


Configuring Interfaces for DHCP

note.gif

Noteblank.gif You must disable autoregistration before you can manually configure an interface for DHCP.


A WAAS device sends its configured client identifier and hostname to the DHCP server when requesting network information. You can configure DHCP servers to identify the client identifier information and the hostname information that the WAAS device is sending and then to send back the specific network settings that are assigned to the WAAS device.

To enable an interface for DHCP, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces listing window appears.

Step 3blank.gif Choose the physical interface that you want to modify and click the Edit taskbar icon. (For devices using WAAS versions earlier than 5.0, click the Edit icon next to the interface.)

The Interface Settings window appears.

note.gif

Noteblank.gif Do not choose a logical interface (standby, port channel, or BVI) in this step, because you cannot configure DHCP on a logical interface. In addition, do not choose the internal interface (GigabitEthernet 1/0) on an NME-WAE module, because this interface can be configured only through the host router CLI. For NME-WAE details, see the document Configuring Cisco WAAS Network Modules for Cisco Access Routers. For SM-SRE details, see the document Cisco SRE Service Module Configuration and Installation Guide.


Step 4blank.gif Check the Use DHCP check box.

When this check box is checked, the IP address and netmask fields are disabled.

Step 5blank.gif In the Hostname field, specify the hostname for the WAAS device or other device.

Step 6blank.gif In the Client ID field, specify the configured client identifier for the device.

The DHCP server uses this identifier when the WAAS device requests the network information for the device.

Step 7blank.gif Click Submit.


 

Modifying Virtual Interface Settings for a vWAAS Device

To modify the settings of an existing vWAAS interface, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

note.gif

Noteblank.gif On ISR-WAAS devices you cannot configure the virtual interface settings from the Central Manager.


Step 2blank.gif Choose Configure > Network > Network Interfaces.

The Network Interfaces window appears, listing the network interfaces configured.

note.gif

Noteblank.gif Certain values (including autosense) are not applicable to a vWAAS interface.


Step 3blank.gif Choose the interface that you want to modify and click the Edit taskbar icon. (For devices using WAAS versions earlier than 5.0, click the Edit icon next to the interface.)

The Interface Settings window appears, displaying the interface configurations on a particular slot and port.

note.gif

Noteblank.gif Interface configurations for slot, port, and port type are set for virtual interfaces during initial startup, or by using the WAAS CLI.

Some of the fields in the window (port-channel number, autosense, speed, mode, and standby-related fields) are not available because they are not applicable.


Step 4blank.gif (Optional) In the Description field, enter a description for the interface.

Step 5blank.gif (Optional) Check the Use CDP check box to enable the Cisco Discovery Protocol (CDP) on an interface.

When enabled, CDP obtains protocol addresses of neighboring devices and discovers the platform of those devices. It also shows information about the interfaces used by your router.

Configuring CDP from the CDP Settings window enables CDP globally on all the interfaces. For information on configuring CDP settings, see Configuring CDP Settings.

Step 6blank.gif (Optional) Check the Shutdown check box to shut down the virtual interface.

Step 7blank.gif (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the interface for statistics and calculate throughput. The default is 30 seconds. (The Load Interval item is not shown for devices using WAAS versions earlier than 5.0.)

Step 8blank.gif Specify a value (in bytes) in the MTU field to set the interface MTU size.

The range is 576 to 1500 bytes. The MTU is the largest size of IP datagram that can be transferred using a specific data link connection.

If the interface has a IPv6 configuration, the MTU range is between 1280-1500 bytes.

note.gif

Noteblank.gif The MTU field is not editable if a system jumbo MTU is configured.


Step 9blank.gif Check the Use DHCP check box to obtain an interface IP address through DHCP. Checking this check box hides the IP address and Netmask fields. (For devices with WAAS versions earlier than 5.0, these fields are not hidden but are disabled.)

a.blank.gif (Optional) In the Hostname field, specify the hostname for the WAAS device or other device.

b.blank.gif (Optional) In the Client Id field, specify the configured client identifier for the device. The DHCP server uses this identifier when the WAAS device requests the network information for the device.

Step 10blank.gif In the Address field, enter a new IP address to change the interface IP address.

Step 11blank.gif In the Netmask field, enter a new netmask to change the interface netmask.

Step 12blank.gif In the Default Gateway field, enter the default gateway IP address. The gateway interface IP address should be in the same network as one of the device’s network interfaces. If an interface is configured for DHCP, this field is read only. (The Default Gateway field is not shown for devices using WAAS versions 5.0 or later; instead, configure it, as described in Configuring the Default Gateway.)

Step 13blank.gif (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.

The drop-down list contains all the IP ACLs that you configured in the system.

Step 14blank.gif (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.

Step 15blank.gif Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the following options.

  • Use Link Local - A unicast address that is automatically configured on an interface using the link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this address configuration option is sufficient for nodes on a link to communicate.
  • Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC 4862.
  • Use DHCP - To obtain an interface IP address through DHCP.

Step 16blank.gif In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number of attempts by which the duplicate address should be detected.

Step 17blank.gif Click OK. (For devices using WAAS versions earlier than 5.0, click Submit.)


 

Enabling or Disabling Optimization on WAAS Express Interfaces

WAAS Express device interfaces are configured by using the router CLI, not through the WAAS Central Manager. However, you can enable or disable WAAS optimization on the available interfaces on the router.

To enable or disable WAAS optimization on WAAS Express device interfaces, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > WAAS-Express-device-name ( or Device Groups > WAAS-Express-device-group-name).

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces window appears and lists the available interfaces. (See Figure 6-2.)

note.gif

Noteblank.gif Loopback interfaces are not included because they are not valid interfaces for optimization. Null, Virtual-Access, NVI, and Embedded-Service interfaces are also not supported.


Figure 6-2 WAAS Express Network Interfaces Device Window

 

346132.tif

For a device group, the Network Interfaces window is different and displays an interface name, the number of devices that contain that interface, and the number of devices in the group that have optimization enabled on the interface. (See Figure 6-3.)

Figure 6-3 WAAS Express Network Interfaces Device Group Interfaces Window

 

346133.tif

Step 3blank.gif Check the check box next to each interface on which you want to enable WAAS optimization, and click the Enable Optimization taskbar icon; or, to disable optimization, click the Disable Optimization taskbar icon.

note.gif

Noteblank.gif Enable WAAS optimization only on WAN interfaces, not LAN interfaces.


For a device group, enabling optimization for an interface enables optimization on that interface for all the devices in the group that have the interface. You can check the check box next to a single device and click the Edit taskbar icon to display a list of devices on which an interface is available and individually configure optimization on those devices. (See Figure 6-4.)

Figure 6-4 WAAS Express Network Interfaces Device Group Devices Window

 

346134.tif


 

Enabling WAAS Service Insertion on AppNav-XE Device Interfaces

AppNav-XE device interfaces are configured by using the router CLI, not through the WAAS Central Manager. However, you can use the Central Manager to enable or disable WAAS service insertion on the available interfaces on the router.

To enable or disable WAAS service insertion on AppNav-XE device interfaces, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > AppNav-XE-device-name.

Step 2blank.gif Choose Configure > Network > Network Interfaces. The Network Interfaces window appears and lists the available interfaces.

Step 3blank.gif Check the check box next to an interface on which you want to enable WAAS service insertion and click the Edit taskbar icon.

Step 4blank.gif Check the Enable WAAS Service Insertion check box; or, to disable optimization, uncheck the check box.

Enable WAAS service insertion only on WAN interfaces, not LAN interfaces.

Step 5blank.gif Click OK.

Step 6blank.gif Repeat Step 3 through Step 5 for each interface on which you want to enable WAAS service insertion.


 

For more information about AppNav, see Chapter4, “Configuring AppNav”

Configuring Management Interface Settings

On devices running WAAS Version 5.0 or later, you can designate a specific interface to be used as the management interface for communicating with the Central Manager, Telnet, SSH, and so on. This configuration separates management traffic from data traffic.

If you designate a management interface, you must have another active interface to handle data traffic. In addition to management interface for IPv4 traffic, a separate management interface can be configured for IPV6 traffic. This interface will use the management features with IPV6 support.

To configure the management interface settings, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Management Interface Settings.

The Management Interface Settings window appears with tabs for IPv4 and IPv6 settings. Select the appropriate one for your network before you proceed.

Step 3blank.gif From the Management Interface drop-down list, choose the interface that you want to use as the management interface.

Step 4blank.gif In the Management Default Gateway field, enter the default gateway IP address for management traffic.

Step 5blank.gif Check the Use Management Interface for FTP Traffic check box if you want to use the designated management interface for FTP traffic.

Step 6blank.gif Check the Use Management Interface for TFTP Traffic check box to use the designated management interface for TFTP traffic.

Step 7blank.gif Check the Use Management Interface for Tacacs Traffic check box to use the designated management interface for TACACS traffic.

Step 8blank.gif Check the Use Management Interface for Radius Traffic check box to use the designated management interface for RADIUS traffic.

Step 9blank.gif Check the Use Management Interface for DNS Traffic check box to use the designated management interface for DNS traffic.

Step 10blank.gif Check the Use Management Interface for NTP Traffic check box to use the designated management interface for NTP traffic.

Step 11blank.gif Click Submit. A confirmation message appears.

Step 12blank.gif Click OK.


 

To configure a different default gateway for management traffic from the CLI, use the ip default-gateway management global configuration command.

After you have designate a management interface, create static IP routes for management traffic so that an IP packet that is designated for the specified destination uses the configured route.

To configure a static route for management traffic, follow these steps:


Step 1blank.gif In the Management Interface Settings window, in the Management IP Routes area of this window, click the Create Management IP Route taskbar button. The Management IP Routes window appears.

Step 2blank.gif In the Destination Network Address field, enter the destination network IP address.

Step 3blank.gif In the Netmask field, enter the destination host netmask. This field is not available when you create a IPv6 Management IP Route.

Step 4blank.gif In the Gateway’s IP Address field, enter the IP address of the gateway interface.

The gateway interface IP address should be in the same network as the device’s management interface.

Step 5blank.gif Click Submit.


 

To configure a static route for management traffic from the CLI, use the ip route management global configuration command.

Configuring a Jumbo MTU

A jumbo MTU can be configured on the following devices: WAVE-294/594/694/7541/7571/8541, and vWAAS.

note.gif

Noteblank.gif To enable Jumbo MTU on ISR-WAAS devices, first we need to upgrade the ISR-WAAS to version 6.0 using the.ova files. The default MTU size for the virtual interface of the ISR-WAAS devices is 9000 and cannot be changed.


If configured, a jumbo MTU applies to all the device interfaces, including logical interfaces with at least one member physical interface. The MTU for individual interfaces cannot be changed while the jumbo MTU is configured. If the jumbo MTU is disabled, all the interfaces are configured with an MTU of 1500.

To configure a jumbo MTU, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name.

Step 2blank.gif Choose Configure > Network > Jumbo MTU.

The Jumbo MTU Settings window appears.

Step 3blank.gif In the System Jumbo MTU field, enter the jumbo MTU size, in bytes, (maximum size varies by platform).

Step 4blank.gif Click Submit.


 

note.gif

Noteblank.gif If the original and optimized maximum segment sizes are set to their default values and you configure a jumbo MTU setting, the segment sizes are changed to the jumbo MTU setting minus 68 bytes. If you have configured custom maximum segment sizes, their values are not changed if you configure a jumbo MTU. For more information on configuring maximum segment sizes, see Modifying the Acceleration TCP Settings in Chapter 12, “Configuring Application Acceleration.”


To configure a jumbo MTU from the CLI, you can use the system jumbomtu global configuration command.

Configuring TCP Settings

For data transactions and queries between client and servers, the size of windows and buffers is important. Therefore, fine-tuning the TCP stack parameters becomes the key to maximizing cache performance.

note.gif

Noteblank.gif Because of the complexities involved in TCP parameters, be careful when tuning these parameters. In nearly all environments, the default TCP settings are adequate. Fine-tuning TCP settings is for network administrators with adequate experience and full understanding of TCP operation details.


To configure TCP and IP settings, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name ( or Device Groups > device-group-name).

Step 2blank.gif Choose Configure > Network > TCP/IP Settings > TCP/IP. The TCP/IP Settings window appears.

Step 3blank.gif Make the necessary changes to the TCP settings.

See Table 6-1 for a description of each TCP field in this window.

Step 4blank.gif Click Submit.

A Click Submit to Save message appears in red next to the Current Settings line when there are pending changes to be saved after you have applied default or device group settings. You can also revert to the previously configured settings by clicking Reset, which is visible only when you have applied default or group settings to change the current device settings, but have not yet submitted the changes.


 

 

Table 6-1 TCP Settings

TCP Setting
Description

TCP General Settings

Enable Explicit Congestion Notification

Enables reduction of delay and packet loss in data transmissions. Provides TCP support for RFC 2581. By default, this option is enabled. For more information, see Explicit Congestion Notification.

Initial Send Congestion Window Size

Initial congestion window size value, in segments. The range is 0 to 10 segments. The default is 0 segment. For more information, see Congestion Windows.

ReTransmit Time Multiplier

Factor used to modify the length of the retransmit timer by 1 to 3 times the base value determined by the TCP algorithm. The default is 1, which leaves the times unchanged. The range is 1 to 3. For more information, see Retransmit Time Multiplier.

Note Modify this factor with caution. It can improve throughput when TCP is used over slow reliable connections, but should never be changed in an unreliable packet delivery environment.

Keepalive Probe Count

Number of times that the WAAS device can retry a connection before the connection is considered unsuccessful. The range is 1 to 120 attempts. The default is 4 attempts.

Keepalive Probe Interval

Length of time that the WAAS device keeps an idle connection open. The default is 75 seconds.

Keepalive Timeout

Length of time that the WAAS device keeps a connection open before disconnecting. The range is 1 to 120 seconds. The default is 90 seconds.

Enable Path MTU Discovery

Enables discovery of the largest IP packet size allowable between the various links along the forwarding path and automatically sets the correct value for the packet size. By default, this option is disabled. For more information, see Path MTU Discovery.

To configure TCP settings from the CLI, use the tcp global configuration command.

To enable the MTU discovery utility from the CLI, use the ip path-mtu-discovery enable global configuration command.

This section contains the following topics:

Explicit Congestion Notification

The TCP Explicit Congestion Notification (ECN) feature allows an intermediate router to notify the end hosts of impending network congestion. It also provides enhanced support for TCP sessions associated with applications that are sensitive to delay or packet loss. The major issue with ECN is that the operation of both the routers and the TCP software stacks needs to be changed to accommodate the operation of ECN.

Congestion Windows

The congestion window ( cwnd) is a TCP state variable that limits the amount of data that a TCP sender can transmit to the network before receiving an acknowledgment (ACK) from the receiving side of the TCP transmission. The TCP cwnd variable is implemented by the TCP congestion avoidance algorithm. The goal of the congestion avoidance algorithm is to continually modify the sending rate so that the sender automatically senses any increase or decrease in available network capacity during the entire data flow. When congestion occurs (manifested as packet loss), the sending rate is first lowered, and then gradually increased as the sender continues to probe the network for additional capacity.

Retransmit Time Multiplier

A TCP sender uses a timer to measure the time that has elapsed between sending a data segment and receiving the corresponding ACK from the receiving side of the TCP transmission. When this retransmit timer expires, the sender (according to the RFC standards for TCP congestion control) must reduce its sending rate. However, because the sender is not reducing its sending rate in response to network congestion, the sender is not able to make any valid assumptions about the current state of the network. Therefore, in order to avoid congesting the network with an inappropriately large burst of data, the sender implements the slow start algorithm, which reduces the sending rate to one segment per transmission. (See TCP Slow Start.)

You can modify the sender’s retransmit timer by using the Retransmit Time Multiplier field in the WAAS Central Manager. The retransmit time multiplier modifies the length of the retransmit timer by one to three times the base value, as determined by the TCP algorithm that is being used for congestion control.

note.gif

Noteblank.gif When making adjustments to the retransmit timer, be aware that they affect performance and efficiency. If the retransmit timer is triggered too early, the sender pushes duplicate data onto the network unnecessarily; if the timer is triggered too slowly, the sender remains idle for too long, unnecessarily slowing data flow.


TCP Slow Start

Slow start is one of four congestion-control algorithms used by TCP. The slow-start algorithm controls the amount of data being inserted into the network at the beginning of a TCP session when the capacity of the network is not known.

For example, if a TCP session began with an insertion of a large amount of data into the network, much of the initial burst of data is likely be lost. Instead, TCP should initially transmit a modest amount of data, which has a high probability of successful transmission. Next, TCP can probe the network by sending increasing amounts of data as long as the network does not show signs of congestion.

The slow-start algorithm begins by sending packets at a rate that is determined by the congestion window, or cwnd variable. (See Congestion Windows.) The algorithm continues to increase the sending rate until it reaches the limit set by the slow-start threshold ( ssthresh) variable. Initially, the value of the ssthresh variable is adjusted to the receiver’s maximum segment size (RMSS). However, when congestion occurs, the ssthresh variable is set to half the current value of the cwnd variable, marking the point of the onset of network congestion for future reference.

The starting value of the cwnd variable is set to that of the sender maximum segment size (SMSS), which is the size of the largest segment that a sender can transmit. The sender sends a single data segment, and because the congestion window is equal to the size of one segment, the congestion window is full. The sender then waits for the corresponding ACK from the receiving side of the transmission. When the ACK is received, the sender increases the congestion window size by increasing the value of the cwnd variable by the value of one SMSS. Now the sender can transmit two segments before the congestion window is again full and the sender is once more required to wait for the corresponding ACKs for these segments. The slow-start algorithm continues to increase the value of the cwnd variable, and thus increases the size of the congestion window by one SMSS for every ACK received. If the value of the cwnd variable increases beyond the value of the ssthresh variable, the TCP flow-control algorithm changes from the slow-start algorithm to the congestion-avoidance algorithm.

Path MTU Discovery

The WAAS software supports the IP Path Maximum Transmission Unit (MTU) Discovery method, as defined in RFC 1191. When enabled, the Path MTU Discovery feature discovers the largest IP packet size allowable between the various links along the forwarding path and automatically sets the correct value for the packet size. By using the largest MTU that the links can handle, the sending device can minimize the number of packets it must send.

IP Path MTU Discovery is useful when a link in a network goes down, which forces the use of another, different MTU-sized link. IP Path MTU Discovery is also useful when a connection is first being established, and the sender has no information about the intervening links.

note.gif

Noteblank.gif IP Path MTU Discovery is a process initiated by the sending device. If a server does not support IP Path MTU Discovery, the receiving device will have no available means to avoid fragmenting datagrams generated by the server.


By default, this feature is disabled. With the feature disabled, the sending device uses a packet size that is the lesser of 576 bytes and the next hop MTU. Existing connections are not affected when this feature is turned on or off.

Configuring a Static IP Route

The WAAS software allows you to configure a static route for a network or host. Any IP packet designated for the specified destination uses the configured route.

To configure a static IP route, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name ( or Device Groups > device-group-name).

Step 2blank.gif Choose Configure > Network > TCP/IP Settings > Static Routes. The IP Route Entries window appears.

Step 3blank.gif In the taskbar, click the Create New IP Route Entry icon. The Creating New IP Route window appears.

Step 4blank.gif In the Destination Network Address field, enter the destination network IP address.

Step 5blank.gif In the Netmask field, enter the destination host netmask.

Step 6blank.gif In the Gateway’s IP Address field, enter the IP address of the gateway interface.

The gateway interface IP address should be in the same network as that of one of the device’s network interfaces.

Step 7blank.gif Alternately, if you select the check box for IPv6 Address, you need to specify the details only for the Destination Network Address and the Gateway’s IP Address field.

Step 8blank.gif Click OK.


 

To configure a static route from the CLI, use the ip route global configuration command.or IPv6 route global configuration command.

Aggregating IP Routes

An individual WAE device can have IP routes defined and can belong to device groups that have other IP routes defined.

In the IP Route Entries window, the Aggregate Settings radio button controls how IP routes are aggregated for an individual device, as follows:

  • Choose Yes to configure the device with all the IP routes that are defined for itself and for the device groups to which it belongs.
  • Choose No to limit the device to just the IP routes that are defined for itself.

When you change the setting, you get the following confirmation message: This option will take effect immediately and will affect the device configuration. Do you wish to continue? Click OK to continue.

Configuring CDP Settings

The Cisco Discovery Protocol (CDP) is a device discovery protocol that runs on all Cisco-manufactured devices. With CDP, each device in a network sends periodic messages to all the other devices in the network. All the devices listen to periodic messages that are sent by others to learn about neighboring devices and determine the status of their interfaces.

With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices. Applications are able to send SNMP queries within the network. CiscoWorks2000 also discovers the WAAS devices by using the CDP packets that are sent by the WAAS device after booting.

To perform device-related tasks, the WAAS device platform must support CDP to be able to notify the system manager of the existence, type, and version of the WAAS device platform.

To configure CDP settings, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name ( or Device Groups > device-group-name).

Step 2blank.gif Choose Configure > Network > CDP. The CDP Settings window appears.

Step 3blank.gif Check the Enable check box to enable CDP support. By default, this option is enabled.

Step 4blank.gif In the Hold Time field, enter the time (in seconds) to specify the length of time that a receiver is to keep the CDP packets.

The range is 10 to 255 seconds. The default is 180 seconds.

Step 5blank.gif In the Packet Send Rate field, enter a value (in seconds) for the interval between CDP advertisements.

The range is 5 to 254 seconds. The default is 60 seconds.

Step 6blank.gif Click Submit.


 

To configure CDP settings from the CLI, use the cdp global configuration command.

Configuring the DNS Server

DNS allows the network to translate the domain names entered in requests into their associated IP addresses. To configure DNS on a WAAS device, you must complete the following tasks:

  • Specify the list of DNS servers that are used by the network to translate requested domain names into IP addresses (both IPv4 and IPv6) that the WAAS device should use for domain name resolution.
  • Enable DNS on the WAAS device.

To configure DNS server settings for a WAAS device, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name ( or Device Groups > device-group-name).

Step 2blank.gif Choose Configure > Network > DNS. The DNS Settings window appears.

Step 3blank.gif In the Local Domain Name field, enter the name of the local domain. You can configure up to three local domain names. Separate items in the list with a space.

Step 4blank.gif In the List of DNS Servers field, enter a list of DNS servers used by the network to resolve hostnames to IP addresses.

You can configure up to three DNS servers. Separate items in the list with a space.

Step 5blank.gif Click Submit.

A Click Submit to Save message appears in red next to the Current Settings line when there are pending changes to be saved after you have applied default and device group settings. To revert to the previously configured window settings, click Reset, which appears only when you have applied default or group settings to change the current device settings, but the settings have not yet been submitted.


 

To configure DNS name servers from the CLI, use the ip name-server global configuration command.

note.gif

Noteblank.gif On ISR-WAAS devices you cannot configure the DNS server from the Central Manager.


Configuring Windows Name Services

To configure Windows name services for a device or device group, follow these steps:


Step 1blank.gif From the WAAS Central Manager menu, choose Devices > device-name ( or Device Groups > device-group-name).

Step 2blank.gif Choose Configure > Network > WINS. The Windows Name Services Settings window appears.

Step 3blank.gif In the Workgroup or Domain Name field, enter the name of the workgroup (or domain) in which the chosen device or device group resides.

This name must be entered in shortname format and cannot exceed 15 characters. Valid characters include alphanumeric characters, a forward slash (\), an underscore (_), and a dash (-).

For example, if your domain name is cisco.com, the short name format is cisco.

Step 4blank.gif Check the NT check box if the workgroup or domain is a Windows NT 4 domain. For example, if your domain name is cisco.com, the short name format is cisco. If your workgroup or domain is a Windows 2000 or Windows 2003 domain, do not check the NT check box. By default, this option is disabled.

Step 5blank.gif In the WINS Server field, enter the hostname or IP address of the Windows Internet Naming Service (WINS) server.

Step 6blank.gif Click Submit.


 

To configure Windows name services from the CLI, use the windows-domain global configuration command.