Cisco WAAS - CNFG PDF
Cisco WAAS - CNFG PDF
Configuration Guide
Software Version 6.2.3
January 23, 2019
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1721R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Preface 21
Audience 21
Document Organization 21
Document Conventions 23
Related Documentation 24
CHAPTER 8 Creating and Managing Administrator User Accounts and Groups 8-1
CHAPTER 9 Creating and Managing IP Access Control Lists for Cisco WAAS Devices 9-1
Using the show and clear Commands from the Central Manager 16-10
INDEX
This preface describes who should read the Cisco Wide Area Application Services Configuration Guide,
how it is organized, and its document conventions. It contains the following sections:
• Audience
• Document Organization
• Document Conventions
• Related Documentation
• Obtaining Documentation and Submitting a Service Request
Audience
This guide is for experienced network administrators who are responsible for configuring and
maintaining the Cisco Wide Area Application Services (WAAS) network.
You should be familiar with the basic concepts and terminology used in internetworking, and understand
your network topology and the protocols that the devices in your network can use. You should also have
a working knowledge of the operating systems on which you are running your WAAS network, such as
Microsoft Windows, Linux, or Solaris.
Document Organization
This guide is organized as follows:
Document Conventions
Command descriptions use these conventions:
screen font Terminal sessions and information the switch displays are in screen font.
boldface screen font Information you must enter is in boldface screen font.
italic screen font Arguments for which you supply values are in italic screen font.
< > Nonprinting characters, such as passwords, are in angle brackets.
[ ] Default responses to system prompts are in square brackets.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Tip Means the following information will help you solve a problem. Tips might not be troubleshooting or
even an action, but could help you save time.
This chapter provides an overview of the Cisco Wide Area Applications Services (WAAS) solution and
describes the main features that enable Cisco WAAS to overcome the most common challenges in
transporting data over a wide area network.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central
Managers and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE refers to
WAE and Cisco Wide Area Virtualization Engine (WAVE) appliances, Cisco Services-Ready Engine
service modules (SRE-SMs) running WAAS, and Cisco Virtual WAAS (vWAAS) instances.
Note You can deploy WAAS in either the new AppNav model, or in the traditional model without using
AppNav Controllers.
Use the WAAS Central Manager GUI to centrally configure and monitor the WAEs and optimization
policies in your network. You can also use the WAAS Central Manager GUI to create new optimization
policy rules so that the WAAS system can optimize both custom applications and less common
applications.
Cisco WAAS helps enterprises meet the following objectives:
• Provide branch office employees with LAN-like access to information and applications across a
geographically distributed network.
• Migrate application and file servers from branch offices into centrally managed data centers.
• Minimize unnecessary WAN bandwidth consumption through the use of advanced compression
algorithms.
• Improve application performance over the WAN by addressing the following common issues:
– Low data rates (constrained bandwidth)
– Slow delivery of frames (high network latency)
– Higher rates of packet loss (low reliability)
Note A WAAS Express device, which is a Cisco router with WAAS Express functionality enabled, can
interoperate with other WAAS devices. A WAAS Express device provides basic WAN optimization and
some application optimization, but no virtualization. For more information on WAAS Express, see
Configuring WAAS Express.
A device having the AppNav-XE component, typically, a Cisco router or virtual Cloud Services Router
with virtual AppNav functionality, can interoperate with other WAAS devices that are acting as WAAS
nodes. Such a device acts as an AppNav Controller that distributes traffic to other WAAS devices acting
as WAAS nodes that optimize the traffic. However, a device with the AppNav-XE component cannot
interoperate with other AppNav Controller hardware appliances. For more information on AppNav-XE,
see the AppNav-XE documentation. For more information on AppNav, see Chapter 4, “Configuring
AppNav.”
A vWAAS instance is a virtual WAAS appliance running on a VMware virtual machine and providing
all of the same features as a WAAS appliance. A WAAS Central Manager can manage WAEs, WAAS
Express devices, and vWAAS instances all in the same WAAS network. For more information on
vWAAS, see the Cisco Wide Area Application Services vWAAS Installation and Configuration Guide.
Cisco ISR-WAAS is a virtualized WAAS instance running on a Cisco ISR router. It provides added
optimization without the need for additional hardware or external appliances. A WAAS Central Manager
can monitor and configure Cisco ISR-WAAS.
Note WAAS Express devices provide basic optimization and compression services and some application
acceleration.
1 WAN 4
2 5
3 6
154635
The following steps describe how your WAAS network optimizes a connection between a branch office
client and a destination server:
1. A branch office client attempts to connect to the destination server over the native application port.
2. The WAAS network uses (Web Cache Communication Protocol (WCCP) or policy-based routing
(PBR) to intercept the client request, or if deployed on an inline WAE, WAAS can intercept the
request directly, using inline mode. For more information on inline mode, see Using Inline Mode
Interception in Chapter 5, “Configuring Traffic Interception.”
3. The branch WAE performs the following actions:
• Examines the parameters in the traffic’s TCP headers and then refers to the optimization policies
to determine if the intercepted traffic should be optimized. Information in the TCP header, such
as the source and destination IP address and port, allows the branch WAE to match the traffic
to an optimization policy rule. For a list of predefined policy rules, see Appendix A, “Predefined
Optimization Policy.”
• If the branch WAE determines that the traffic should be optimized, it adds information to the
TCP header informs the next WAE in the network path to optimize the traffic.
4. The branch WAE passes along the client request through the network to its original destination
server.
5. The data center WAE performs the following actions:
• Intercepts the traffic going to the destination server.
• Establishes an optimized connection with the branch WAE. If the data center WAE has
optimization disabled, an optimized connection is not established, and the traffic passes over
the network unoptimized.
In an AppNav deployment, an AppNav Controller intercepts the traffic in the data center and
distributes it to a WAAS node that establishes an optimized connection with the branch WAE.
For more information on AppNav deployment, see Chapter 4, “Configuring AppNav.”
6. WAAS optimizes subsequent traffic between the branch WAE and data center WAE for this
connection.
Cisco WAAS does not optimize traffic in the following situations:
• The WAE intercepts non-TCP traffic (such as UDP or ICMP).
• The WAE is overloaded and does not have the resources to optimize traffic.
• The intercepted traffic matches an optimization or AppNav policy rule that specifies that traffic
can be passed through unoptimized.
Note If unoptimized traffic reaches a WAE, the WAE forwards the traffic in pass-through mode
without affecting the performance of the application using the passed-through connection.
Window Scaling
Window scaling allows the receiver of a TCP packet to advertise that its TCP receive window can exceed
64 KB. The receive window size determines the amount of space that the receiver has available for
unacknowledged data. By default, TCP headers limit the receive window size to 64 KB, but Windows
scaling allows the TCP header to specify receive windows of up to 1 GB.
Window scaling allows TCP endpoints to take advantage of available bandwidth in your network and not
be limited to the default window size specified in the TCP header.
For more information about Window scaling, refer to For more information on vWAAS, see the RFC
1323.
Increased Buffering
Cisco WAAS enhances the buffering algorithm used by the TCP kernel so that WAEs can pull data from
branch office clients and remote servers more aggressively. This increased buffer helps the two WAEs
participating in the connection keep the link between them full, thus increasing link utilization.
Selective Acknowledgment
Selective Acknowledgement (SACK) is an efficient packet loss recovery and retransmission feature that
allows clients to recover from packet losses more quickly, compared to the default recovery mechanism
used by TCP.
By default, TCP uses a cumulative acknowledgment scheme that forces a sender to either wait for a
round-trip to learn if packets were not received by a recipient, or to unnecessarily retransmit segments
that may have been correctly received.
SACK allows the receiver to inform the sender about all the segments that have arrived successfully, so
that the sender needs to retransmit only the segments that have actually been lost.
For more information about SACK, see RFC 2018.
The WAAS compression scheme is based on a shared cache architecture where each WAE involved in
compression and decompression shares the same redundancy library. When the cache that stores the
redundancy library on a WAE becomes full, WAAS uses a FIFO algorithm to discard old data and make
room for new.
LZ compression operates on smaller data streams and maintains limited compression history. DRE
operates on significantly larger streams (typically tens to hundreds of bytes or more) and maintains a
much larger compression history. Large chunks of redundant data is common in file system operations
when files are incrementally changed from one version to another or when certain elements are common
to many files, such as file headers and logos.
• Windows Print—Accelerates print traffic between clients and a Windows print server located in the
data center. Signed Server Message Block (SMB) traffic is optimized by transport-level
optimizations (TFO, DRE, and LZ). The Windows print accelerator supports Windows 2000,
Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 print servers. It
supports clients running Windows 2000, Windows XP, Windows Vista, and Windows 7.
Note WAAS Express devices provide application acceleration for SMB, HTTP, and SSL traffic.
To enable or disable application accelerators, see Enabling and Disabling the Global Optimization
Features in Chapter 12, “Configuring Application Acceleration.”
You must enable the accelerator on both of the peer WAEs at either end of a WAN link for all application
accelerators to operate.
Note Legacy-mode Wide Area File Services (WAFS) are no longer supported. Legacy WAFS users must
migrate to the SMB accelerator.
By caching the data most likely to be used at these sites, Edge WAEs greatly reduce the number of
requests and the volume of data that must be transferred over the WAN between the data center and the
edge.
When requests for data that is not located in the cache are received, the Edge WAE encapsulates the
original SMB request using a TCP/IP-based protocol, compresses it, and sends it over the WAN to the
Core WAE. Data returned from the data center is distributed by the Edge WAE to the end user who
requested it.
Note The Legacy Print Services feature is no longer supported. Users of Legacy Print Services must
migrate to another print services option.
These services eliminate the need for a separate hardware print server in the branch office. WAAS print
services are available for Windows clients and work with any IP-based network printer.
Note You cannot enable optimization and application acceleration services on a WAE that has been configured
as a WAAS Central Manager. The purpose of the WAAS Central Manager is to configure, monitor, and
manage the WAEs in your network.
You may also see a browser security warning that there is a problem with the website’s security
certificate. This happens because the Central Manager uses a self-signed certificate. Click on the link
Continue to this website (not recommended). You can permanently install the certificate to avoid this
error in the future.
To install the certificate in Internet Explorer 8, click the red Certificate Error button in the address bar
and choose View Certificates. Click Install Certificate, then click Next. Select Automatically select
the certificate store based on the type of certificate and click Next, click Finish, then click Yes on the
security warning, click OK on the acknowledgement, and click OK on the Certificate dialog. The
certificate installation procedure differs depending on the browser.
If you are using Internet Explorer to access the Central Manager GUI, we strongly recommend that you
install the Google Chrome Frame plug-in for better performance. When you log in to the Central
Manager the first time, you are prompted to install Google Chrome Frame. Choose a language, click Get
Google Chrome Frame, and follow the prompts to download and install the plug-in. If you do not want
to install the plug-in, click the link to continue without installing Google Chrome Frame.
Note From WAAS Version 5.4.1, you are no longer prompted to install the Google Frame plug-in when you
access the Central Manager GUI using Internet Explorer. However, if the Google Frame plug-in has
already been installed, IE will continue to use it.
Note In IE 8 and 9, bookmarks to Central Manager pages other than the home page also go to the home page. In
IE 10 and 11, bookmarks work as expected.
Note A known issue in Chrome Version 44.0 may prevent some WAAS CM pages—including Software
Updates, Device Listings, and Reports—from loading properly. In Chrome Version 43.0 all WAAS CM
pages work as expected.
You can configure the WAAS Central Manager GUI to limit the number of concurrent sessions permitted
for a user. The number of concurrent sessions is unlimited by default. To change the number of permitted
concurrent sessions, set the System.security.maxSimultaneousLogins property, as described in
Modifying the Default System Configuration Properties in Chapter 10, “Configuring Other System
Settings.”
Note A user must log out of the Central Manager to end a session. If a user closes the browser or connection
without logging off, the session is not closed until after it times out (in 10 minutes by default, up to a
possible maximum of 1440 minutes). If the number of concurrent sessions permitted also is exceeded
for that user, there is no way for that user to regain access to the Central Manager GUI until after the
timeout expires.
Note After an upgrade, downgrade, or new installation, you must first clear the cache in your browser, close
the browser, and restart the browser session to the WAAS Central Manager.
The WAAS Central Manager GUI includes the following main components:
• Page title—Displays the title of the page being viewed and breadcrumb links to ease navigation back
to previous levels in the hierarchy. (Breadcrumb links are shown in Figure 1-3.)
• Menu bar—The upper level of the menu bar contains menu options that allow you to choose the
context. The lower level of the menu bar contains menu options that group the WAAS Central
Manager functions available within the chosen context. For more information, see WAAS Central
Manager Menus.
• Taskbar—Contains labeled icons that perform various functions depending on the content shown in
the dashboard. For more information, see WAAS Central Manager Taskbar Icons.
• Dashboard—Displays the main content, which changes depending on the option that is chosen in
the menu.
• Administrative links—Includes these navigation links:
– Logout—Logs out the current user from the WAAS Central Manager.
– Help—Opens a separate window displaying WAAS context-sensitive help.
– About—Displays the WAAS About window that shows the Central Manager version number.
• Alarms—Opens the alarm panel, which displays alarms in your WAAS network.
The upper level of the menu bar allows you to choose one of the five contexts available in the WAAS
Central Manager GUI:
• Home—Click this to go to the global context, with no particular device group, device, AppNav
Cluster, or location chosen.
• Device Groups—Choose a device group from this menu option to enter the device group context.
The page title and the first menu on the lower level display the name of the chosen device group.
• Devices—Choose a device from this menu option to enter the device context. The page title and the
first menu on the lower level display the name of the chosen device, as shown in Figure 1-3.
• AppNav Clusters—Choose an AppNav Cluster from this menu option to enter the AppNav Cluster
context. The page title and the first menu on the lower level display the name of the chosen AppNav
Cluster.
• Locations—Choose a location from this menu option to enter the location context. The page title
and the first menu on the lower level display the name of the chosen location.
The WAAS Central Manager GUI includes the following items to help you navigate:
• Breadcrumbs to current location—Displays the path to your current location in the menu structure.
You can click the Devices link to return to the All Devices page.
If you are in the device group context, this link is named Device Groups and it returns you to the
All Device Groups page. If you are in the AppNav Cluster context, this link is named AppNav
Clusters and it returns you to the All AppNav Clusters page.
If you are in the location context, this link is named Locations and it returns you to the All Locations
page.
• Entity name—The first menu option in the lower level of the menu bar shows the name of the chosen
device group, device, AppNav Cluster, or location.
• Context menu options—The top level of the menu bar contains menu options that allow you to
switch easily to any entity in any context. You can search for an item by entering a part of its name
in the search box at the top and clicking the magnifying glass icon or by pressing Enter. The list is
filtered to include only entities that contain the search string. The top entry in each menu is All
Entities, which takes you to a window that lists all the entities of the selected type, has more
advanced search functions, and has taskbar icons that perform functions that are appropriate to the
entity group. You can also click the context menu name to go to the corresponding listing window.
In the Devices and AppNav Clusters menu bar options, a small target icon appears when you hover
your mouse over a device or cluster name. Place your cursor over the target icon to open a dialog
box that shows the device or cluster status (see Figure 1-4).
Note The functions available for WAAS Express devices are a subset of those available for other WAAS
devices. However, some functions are not available on WAAS Express devices.
Menu Description
Dashboard In the global context, allows you to go to the dashboard pertaining to your
or WAAS network.
Device, Device In a context other than global, this menu is named with the corresponding
group, AppNav entity name and allows you to activate devices, view users, assign groups or
Cluster, or Location devices, or view the dashboard or home screen of the entity.
name
Configure Allows you to configure WAAS services and settings.
Monitor Allows you to see network traffic and other charts and reports to monitor the
health and performance of your WAAS network. Allows you to manage and
schedule reports for your WAAS network. Contains troubleshooting tools.
Admin Allows you to manage user accounts, passwords, secure store, licenses, update
the WAAS software, and view system logs and messages.
(Assign All) Selects all the valid items in a table. For example, if you are
distributing print drivers to a WAAS print server, you can click
this icon to select all the drivers in the list that the print server
should download.
(Remove All) Deselects all the selected items in a table.
(Override Group Settings) Allows you to specify device-specific settings that override the
group settings for the device. For more information, see
Overriding the Device Group Settings on a Device in Chapter 3,
“Using Device Groups and Device Locations.”
(Deactivate Device) Deactivates a WAAS or WAAS Express device.
WAAS CLI
The WAAS CLI allows you to configure, manage, and monitor WAEs on a per-device basis through a
console connection or a terminal emulation program. The WAAS CLI also allows you to configure
certain features that are supported only through the CLI (for example, configuring the Lightweight
Directory Access Protocol [LDAP] signing on a WAE). We strongly recommend that you use the WAAS
Central Manager GUI instead of the WAAS CLI, whenever possible.
Note You must wait for approximately 10 minutes (two data feed poll cycles) after registering a WAE with the
WAAS Central Manager before making any CLI configuration changes on the WAE. Any CLI
configuration changes made sooner may be overwritten when the Central Manager updates the WAE. We
strongly recommend making all configuration changes by using the Central Manager GUI.
The WAAS CLI is organized into four command modes. Each command mode has its own set of
commands to use for the configuration, maintenance, and monitoring of a WAE. The commands that are
available to you depend on the mode you are in. When you enter a question mark (?) at the system
prompt, you can obtain a list of commands available for each command mode.
The four WAAS command modes are as follows:
• EXEC mode—For setting, viewing, and testing system operations. This mode is divided into two
access levels: user and privileged. To use the privileged access level, enter the enable command at
the user access level prompt, then enter the privileged EXEC password when you see the password
prompt.
• Global configuration mode—For setting, viewing, and testing the configuration of WAAS software
features for the entire device. To use this mode, enter the configure command from the privileged
EXEC mode.
• Interface configuration mode—For setting, viewing, and testing the configuration of a specific
interface. To use this mode, enter the interface command from the global configuration mode.
• Feature-specific configuration mode—Some configuration modes are available from the global
configuration mode for managing specific features.
For information about using the CLI to configure a WAAS device, see the Cisco Wide Area Application
Services Command Reference and the Cisco Wide Area Application Services Quick Configuration Guide.
In the event of data loss, backup files exist in the data center and can be quickly accessed for
recovery purposes. The amount of data loss is reduced because of the increased frequency of
backups performed on the centralized storage in the data center. This centralized storage backup
makes disaster recovery much more efficient and economical than working with standalone file
servers or NAS appliances.
• Simplified storage management—Migrates storage from remote locations to a central data facility,
which reduces costs and simplifies storage management for the extended enterprise.
• WAN adaptation—Provides remote users with near-LAN access to files located at the data center.
WAAS uses a proprietary protocol that optimizes the way traffic is forwarded between the WAEs.
WCCP Support
The Web Cache Communication Protocol (WCCP) developed by Cisco Systems specifies interactions
between one or more routers (or Layer 3 switches) and one or more application appliances, web caches,
and caches of other application protocols. The purpose of the interaction is to establish and maintain the
transparent redirection of selected types of traffic flowing through a group of routers. The selected traffic
is redirected to a group of appliances. Any type of TCP traffic can be redirected.
The WCCP v2 protocol has a built-in set of beneficial features, for example, automatic failover and load
balancing. The router monitors the liveness of each WAE attached to it through the WCCP keepalive
messages, and if a WAE goes down, the router stops redirecting packets to the WAE. By using WCCP,
the branch WAE avoids becoming a single point of failure. The router can also load balance the traffic
among a number of branch WAEs.
Cisco WAAS supports transparent interception of TCP sessions through WCCP. Once WCCP is turned
on at both the router and the branch WAE, only new sessions are intercepted. Existing sessions are not
affected.
PBR Support
Policy-based routing (PBR) allows IT organizations to configure their network devices (a router or a
Layer 4 to Layer 6 switch) to selectively route traffic to the next hop based on the classification of the
traffic. WAAS administrators can use PBR to transparently integrate a WAE into their existing branch
office network and data centers. PBR can be used to establish a route that goes through a WAE for some
or all packets based on the defined policies.
For more information about PBR, see Chapter 5, “Configuring Traffic Interception.”
Note AppNav Controller Interface Modules do not support automatic bypass mode to continue traffic flow in
the event of a failure. For high availability, two or more AppNav Controller Interface Modules should
be deployed in an AppNav cluster. For more information on using inline mode with the AppNav solution,
see Chapter 4, “Configuring AppNav.”
You can configure the inline WAE to accept traffic only from certain VLANs; for all other VLANs,
traffic is bridged and not processed.
You can serially cluster inline WAE devices to provide higher availability in the event of a device failure.
If the current optimizing device fails, the second inline WAE device in the cluster provides the
optimization services. Deploying WAE devices in a serial inline cluster for the purposes of scaling or
load balancing is not supported.
For more information about inline mode, see the Using Inline Mode Interception in Chapter 5,
“Configuring Traffic Interception.”
RAID Compatibility
Cisco WAAS provides the following Redundant Array of Independent Disks (RAID) capability for
increased storage capacity or increased reliability:
• Logical Disk Handling with RAID-5–Logical disk handling with Redundant Array of Independent
Disks-5 (RAID-5) is implemented in WAAS as a hardware feature. RAID-5 devices can create a
single logical disk drive that may contain up to six physical hard disk drives, providing increased
logical disk capacity.
Systems with RAID-5 can continue operating if one of the physical drives fails or goes offline.
Note RAID Controller Firmware 12.12.0(0060) or later version is required for Toshiba SSD to work
on WAVE 8541 model. Else it is unable to create a RAID.
• Logical Disk Handling with RAID-1—Logical disk handling with RAID-1 is implemented in
WAAS as a software feature. RAID-1 uses disk mirroring to write data redundantly to two or more
drives, providing increased reliability.
Because the software must perform each disk write operation against two disk drives, the filesystem
write performance may be affected.
• Disk Hot-Swap Support—WAAS for RAID-1 allows you to hot-swap the disk hardware. RAID-5
also allows you to hot-swap the disk hardware after the RAID array is shut down. For the disk
removal and replacement procedures for RAID systems, see Chapter 14, “Maintaining Your WAAS
System.”
Streamlined Security
Cisco WAAS supports disk encryption, which addresses the need to securely protect sensitive
information that flows through deployed WAAS systems and that is stored in WAAS persistent storage.
Cisco WAAS does not introduce any additional maintenance overhead on already overburdened IT staffs.
Cisco WAAS avoids adding its own proprietary user management layer, and instead makes use of the
users, user credentials, and access control lists maintained by the file servers. All security-related
protocol commands are delegated directly to the source file servers and the source domain controllers.
Any user recognized on the domain and source file server are automatically recognized by Cisco WAAS
with the same security level, and all without additional configuration or management.
Cisco WAAS delegates access control and authentication decisions to the origin file server.
SNMP Support
Cisco WAAS supports Simple Network Management Protocol (SNMP) including SNMPv1, SNMPv2,
and SNMPv3. Cisco WAAS supports many of the most commonly used SNMP managers, such as HP
OpenView and IBM Tivoli NetView.
Most Cisco WAAS traps are also recorded in the logs displayed in the WAAS Central Manager GUI,
although some (such as exceeding the maximum number of sessions) are reported only to the SNMP
manager.
Cisco WAAS supports parameters based on SNMPv2, enabling it to integrate into a common SNMP
management system. These parameters enable system administrators to monitor the current state of the
WAAS network and its level of performance.
IPv6 Support
Release 6.0 onwards, IPv6 support is implemented for management access to WAAS devices. Basic IPv6
connectivity can be enabled on the WAAS interfaces by assigning IPv6 addresses, configuring default
gateway and static IP routes. This can be further enhanced by configuring support for AAAA record
types in the Domain Name System (DNS) name-to-address and address-to-name lookup processes and
by managing IPv6 neighbour discovery
All devices in the WAAS network can communicate in the IPv6 network using Telnet, SSH, FTP, TFTP,
in IPv6 addresses. The management plane can configure IPv6 address for syslog, AAA servers, ntp
servers, snmp servers and name servers to communicate with WAAS devices.
This chapter describes general guidelines, restrictions, and limitations that you should be aware of before
you set up your Cisco Wide Area Application Services (WAAS) network.
Note Throughout this chapter, the term WAAS device is used to refer collectively to the WAAS Central
Managers and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE refers to
WAE and Cisco Wide Area Virtual Engine (WAVE) appliances, Cisco Services Ready Engine (SRE)
Service Modules (SMs) running WAAS, and Cisco Virtual WAAS instances.
• Mesh deployments—In a mesh deployment, a location can host both clients and servers, and the
clients can access any number of local or remote servers.
• Hierarchical deployments—In a hierarchical deployment, servers are located in multiple regional
and national data centers, and can be accessed by different clients. The connections between the data
centers are of higher bandwidth than the connections to the branch offices.
The deployments are characterized according to the WAAS element connections, which follow the
client-server access pattern and may differ from the physical network links. For more information, see
Chapter 1, “Introduction to Cisco WAAS.”
Planning Checklist
When you are planning your WAAS network, use the following checklist as a guideline. As the following
checklist indicates, you can break the planning phase into the following three main categories of
planning activities:
• Sizing phase
• Planning for management
• Planning for application optimization
Note Although there are some interdependencies, you do not have to complete all of the steps in a particular
planning phase before you start the next step.
– For security purposes, plan to change the predefined password for the predefined superuser
account immediately after you have completed the initial configuration of a WAE. For more
information, see WAAS Login Authentication and Authorization.
– Determine if you need to create any additional administrative accounts for a WAAS device. For
more information, see Chapter 8, “Creating and Managing Administrator User Accounts and
Groups.”
– Determine if you should group your WAEs into logical groups. For more information, see
Logically Grouping Your WAEs.
– Determine which management access method to use. By default, Telnet is used, but SSH may
be the preferred method in certain deployments. For more information, see Configuring Login
Access Control Settings for WAAS Devices in Chapter 7, “Configuring Administrative Login
Authentication, Authorization, and Accounting.”
3. Plan for application optimization as follows:
– Determine and resolve router interoperability issues, for example, the supported hardware and
software versions, router performance with interception enabled. For more information, see Site
and Network Planning.
– Determine the appropriate interception location when the data center or branch office is
complex, for example, if your existing network uses a hierarchical topology.
– Determine which WAAS services to deploy. For more information about the different WAAS
services, see Chapter 1, “Introduction to Cisco WAAS.”
– Determine which WAAS software licenses to install. Software licenses enable specific WAAS
services. For more information about installing software licenses, see the Managing Software
Licenses in Chapter 10, “Configuring Other System Settings.”
– Determine which traffic interception methods to use in your WAAS network, for example,
AppNav, inline mode, WCCP Version 2, or policy-based routing (PBR).
– For more information on the advantages and disadvantages of using WCCP, see Supported
Methods of Traffic Redirection.
– For more information on WCCP traffic interception and redirection, see Overview of Traffic
Interception Methods in Chapter 5, “Configuring Traffic Interception.”
– If you plan to use the WCCP TCP promiscuous mode service as a traffic interception method,
determine whether you should use IP access control lists (ACLs) on your routers.
Note IP ACLs that are defined on a router take precedence over the ACLs that are defined on the
WAE. For more information, see Access Lists on Routers and WAEs.
– Determine whether you have to define IP ACLs or interception ACLs on the WAEs. For more
information, see Access Lists on Routers and WAEs.
Note ACLs that are defined on a WAE take precedence over the WAAS application definition
policies that are defined on the WAE.
– If PBR is to be used, determine which PBR method to use to verify PBR next-hop availability
for your WAEs. For more information, see Methods of Verifying PBR Next-Hop Availability in
Chapter 5, “Configuring Traffic Interception.”
– Determine the major applications for your WAAS network. Verify whether the predefined
application definition policies cover these applications and whether you should add policies if
your applications are not covered by these predefined policies. For a list of the predefined
application definition policies, see Appendix A, “Predefined Optimization Policy.”
– Consider day zero migration of file systems if file servers are to be centralized in the process.
For more information, see Data Migration Process.
After you complete the planning tasks, you are ready to perform a basic configuration of a WAAS
network, as described in the Cisco Wide Area Application Services Quick Configuration Guide.
Note We strongly recommend that you do not use half-duplex connections on the WAE or on routers, switches,
or other devices because half duplex impedes performance. Check each Cisco WAE interface and port
configuration on the adjacent device (router, switch, firewall, or WAE) to verify that full duplex is
configured.
Note The data center WAE and branch WAE communicate with each other only if the firewall is open.
• To enable all branch WAEs in the specified domain to appear in the Network Neighborhood of users
within the same domain, ensure that a Domain Master Browser or local Master Browser is active.
• If DHCP is not used, you must manually add the name and IP address of the branch WAE to the DNS
server.
Note To map users using automatic management, you must first configure the NIS server in both the data
center WAE (primary) and branch WAE (secondary).
Your WAAS network always tries to use the same port to communicate end-to-end. Consequently, if a
client uses port 445 to connect to a branch WAE, the associated data center WAE will try to use the same
port to connect to the file server. If port 445 is unavailable, the data center WAE will try to use port 139.
Note The CIFS application accelerator is removed from WAAS Version 6.0 and later, but the CIFS policy is
continued for two ports: port 139 and port 445. For these ports only, the SMB application accelerator
runs on CIFS policy. Therefore, an alarm generated by SMB on port 139 or port 445 is seen as a CIFS
alarm.
Some organizations close port 139 on their networks to minimize the security risks associated with this
port. If your organization has closed port 139 for security reasons, you can configure your WAAS
network to bypass port 139. If this is the case in your organization, you should perform the following
task to bypass port 139 and use port 445 in its place if you use the SMB application accelerator, running
on CIFS policy, for these ports:
• Enable WCCP Version 2 on your routers and branch WAE, as described in the Cisco Wide Area
Application Services Quick Configuration Guide. Alternatively, you can use inline mode on a branch
WAE with a Cisco WAE Inline Network Adapter or Cisco Interface Module installed.
settings of the primary interface on the WAAS device. This feature is useful for large-scale automated
deployments of devices. After a WAE is registered, configure other interfaces and settings on the device
remotely by using the WAAS Central Manager GUI.
In the example configuration provided in the Cisco Wide Area Application Services Quick Configuration
Guide, the autoregistration feature is disabled on the WAEs when the setup utility is used to perform the
initial configuration of the device and manually configure the interface settings.
Autoregistration uses a form of the Dynamic Host Configuration Protocol (DHCP). For autoregistration
to function, you must have a DHCP server that is configured with basic settings.
Note The WAE sends CISCOCDN as the vendor-class identifier in option 60 of the DHCP DISCOVER
message to facilitate your grouping of WAEs into device groups.
Autoregistration DHCP requires that the following options be present in the DHCP server’s offer:
• Subnet mask (option 1)
• Router (default gateway) (option 3)
• Domain name (option 15)
• Domain name servers (option 6)
Additionally, the DHCP offer can contain the WAE hostname (option 12), but it is not required. If the
hostname option is not supplied, the WAE hostname is automatically set to NO-HOSTNAME-a-b-c-d,
where a.b.c.d is the IP address that is assigned to the WAE by the DHCP server.
All of the above options, with the exception of domain name servers (option 6), replace the existing
configuration on the system. The domain name servers option is added to the existing list of name servers
with a restriction of a maximum of eight name servers.
After the WAE configures its network settings from DHCP, it requires the Central Manager hostname so
that it can register with the Central Manager. The WAE queries the configured DNS server to obtain the
Central Manager hostname. For autoregistration to work, you must configure the DNS server with the
Central Manager hostname by configuring a DNS SRV (Service Location) record. This record is easy to
configure and does not affect normal DNS operation. The DNS SRV record must be configured as
follows:
• Service is _waascms
• Protocol is _tcp
• Host offering this service is the fully qualified domain name (FQDN) of the Central Manager
To create an SRV record in Windows Server 2008, open the DNS Manager, navigate to Forward Lookup
Zones, and select the correct DNS zone. Right click the zone, choose Other New Records, and then
choose Service Location (SRV).
If the DNS request fails or if the domain is not configured, the WAE tries an alternative DNS query for
an SRV record to the ciscowaas.local domain. If this alternative request also fails, the WAE cannot
register with the Central Manager. However, the network configuration remains and allows you to
connect through Telnet to perform additional configuration from the CLI.
Autoregistration is enabled by default on the first interface of the device. On a Cisco NME-WAE module,
autoregistration is enabled on the configured interface. On an SRE-SM module, autoregistration is
disabled by default.
Note You must disable autoregistration when both device interfaces are configured as port-channel interfaces.
If you do not have a DHCP server, the device is unable to complete autoregistration and eventually times
out. You can disable autoregistration at any time after the device has booted, and proceed with manual
setup and registration.
To disable autoregistration, or to configure autoregistration on a different interface, use the no
auto-register enable command in global configuration mode. If you want to preserve the dynamically
configured IP address on the interface as a static IP address when you disable autoregistration, use the
preserve-ip option with this command. This option prevents the WAE from losing network connectivity
because its IP address is removed.
The following example shows how to disable autoregistration on the interface GigabitEthernet 1/0:
WAE(config)# no auto-register enable GigabitEthernet 1/0 preserve-ip
Autoregistration status can be obtained by using the following show EXEC command:
WAE# show auto-register
For WAAS Release 6.0 and above, autoregistration is possible for a dual stack WAAS device. In a
dual-stack network, the WAAS device should be able to get a IPv6 DHCP address and an IPv6 Central
Manager address through DNS entry or in the DHCP pool and then register with the Central Manager
using IPv6. If IPv6 DHCP fails and IPv4 is also configured on the auto-registration interface, then the
device should fall back to getting IPv4 address and proceed as it would in a IPv4-only network.
• Primary interface
When a WAAS device boots, you are prompted to run the first-time setup utility (enter basic
configuration), which you use to set up the basic device network settings for the WAE.
We recommend that you use Cisco IOS Software Release 12.2 or later.
Note WAAS software does not support QoS, MPLS QoS, ATM QoS, Frame Relay QoS, and Layer 2
(VLAN) QoS.
The following is an example flow of how the WAAS software supports NBAR:
1. A packet, P1, which is a part of a TCP stream, S1, enters the router and is classified by NBAR on
the LAN interface of the router as belonging to class C1. If the classification of P1 does not involve
payload inspection, for example, only TCP/IP headers, no action is to be taken because the WAAS
software preserves this information.
2. If P1 classification requires payload inspection, P1 should be marked using the TOS/DSCP bits in
the packet (as opposed to using other internal marking mechanisms).
3. P1 is then intercepted through WCCP Version 2 (still on the LAN interface, WCCP is processed after
NBAR) and is redirected to a WAE.
4. WAAS applies optimizations, if any, on the payload and copies the DCSP bits settings from the
incoming TCP stream, S1, onto the outgoing stream, S2 (which is established between the local
WAAS appliance and the remote WAAS appliance over the WAN). Because NBAR usually has to
see some payload before performing the classification, it is unlikely that WAAS will have the proper
bit settings at connection-establishment time. Consequently, the WAAS software uses polling to
inspect the DSCP bits on the incoming TCP stream, and then copies it over to the stream from the
WAAS device back to the router.
5. When S2 re-enters the router, NBAR will not classify S2 as belonging to C1 because the payload
has been changed or compressed. However, the DSCP settings have already marked these packets
as belonging to C1. Consequently, these packets will be treated appropriately as if they were
classified through NBAR.
As long as the flow is not identified, NBAR will continue to search for classification in the packets.
Because compressed packets will not be classified, this situation can unnecessarily burden the CPU
(performing packet inspection). Because of the potential degradation in performance and the slight
possibility of correctness issues, we strongly recommend that you use a subinterface or a separate
physical interface to connect the WAE to the router (as described in Using Tertiary Interfaces or
Subinterfaces to Connect WAEs to Routers). When you use a tertiary interface or subinterface to
connect the WAE to the router, both the performance and correctness issues are addressed because
each packet is processed only once.
6. For dynamic classifications, NBAR maintains a per-flow state. After certain flows are classified,
NBAR does not continue to perform deep-packet inspection anymore. However, for other flows, for
example, Citrix, NBAR does look at packets continuously because the classification may change
dynamically in a flow. Therefore, in order to support all NBAR classifications, it is not sufficient to
only poll the DSCP settings of packets coming in to WAAS once per flow; you should also poll
periodically to identify flow changes. However, the WAAS system expects packets to appear in the
sequence of packets belonging to the class C1, followed by a sequence of C2, and so forth, so that
a polling method is sufficient to track such dynamic changes.
Note This dynamic classification support requires support for marking DSCP/ToS settings, as
specified in WAAS and the Cisco IOS QoS Classification Feature, as well as the tracking of
dynamic changes through polling.
Several router configurations should be followed in order to ensure NBAR-WAAS compliance, and you
must ensure that the following router configurations are adhered to:
• Ensure that classification is followed by proper DSCP marking.
• Ensure that the router in general (IP access lists that are configured on the router) does not scrub
DSCP/TOS settings that are already marked on the packets on entry, and that NBAR does not
unmark marked packets.
Note A WAAS device does not encrypt WAN traffic. If you require additional security measures,
you should use a VPN. However, the VPN appliances must encrypt and decrypt traffic after
and before the WAAS devices so that the WAAS device sees only unencrypted traffic. The
WAAS device is unable to compress encrypted traffic and provides only limited TCP
optimization to it.
• Network Address Translation (NAT) is supported. However, payload-based NAT is not supported.
Table 2-1 shows the interoperability between WAAS application accelerators (AOs) and the F5 load
balancer. For more information about WAAS load balancing, see About Traffic Interception Methods
and Configuring Policy-Based Routing in the “Configuring Traffic Interception” chapter of this
Configuration Guide, and also see the Server Load-Balancing Guide vA5(1.0), Cisco ACE Application
Control Engine.
Note WAAS does not currently support Citrix NetScaler load balancer.
Note Cisco Application and Content Networking Software (ACNS) devices, used with earlier WAAS versions
to optimize web protocols, is end-of-life/end-of-sale. For more information, including migration
options, see the End-of-Sale and End-of-Life Announcement for the Cisco Application and Content
Networking System (ANCS) Software Version 5.5.
• WAAS Central Manager mode—Mode that the WAAS Central Manager uses.
• WAAS application accelerator mode—Mode that a WAAS Accelerator (data center WAEs and
branch WAEs that run the WAAS software) uses to optimize and accelerate traffic.
• WAAS AppNav Controller mode—Mode for a WAAS device that is operating as an AppNav
Controller that is intercepting and distributing traffic to other WAAS devices operating in
application accelerator mode.
The default device mode for a WAAS device is WAAS accelerator mode. The device mode global
configuration command allows you to change the device mode of a WAAS device.
For example, after you use the WAAS CLI to specify the basic network parameters for the designated
WAAS Central Manager (the WAAS device named waas-cm) and assign it a primary interface, you can
use the device mode configuration command to specify its device mode as central manager. You can also
specify it to be set up as an IPv4 or an IPv6 interface during basic configuration. The following example
shows the configuration of an IPv6 interface.
waas-cm# configure
waas-cm(config)# primary-interface gigabitEthernet 1/0 IPv6
waas-cm(config)# device mode central-manager
waas-cm(config)# exit
waas-cm# copy run start
waas-cm# reload
Proceed with reload?[confirm]yes
Shutting down all services, will timeout in 15 minutes.
reload in progress ..
Note WAAS Version 6.1.1 and later supports IPv6. If you are configuring the WAAS CM as part of a
dual-stack network, and you are using an IPv6 interface on the WAAS CM, you must specify the virtual
interface as the primary interface for IPv6 traffic, using the global configuration command
primary-interface virtual 1/0 ipv6.
Specifying the virtual interface as the primary interface for IPv6 traffic ensures that a device configured
with IPv6 address only will be in Online state after registration to the WAAS CM. Otherwise, the device
may go into Offline state when it is registered to the WAAS CM.
For more information on the primary-interface global configuration command, see the Cisco Wide Area
Application Services Command Reference.
For more information about how to initially configure a WAAS device, see the Cisco Wide Area
Application Services Quick Configuration Guide.
Note You cannot configure a WAE network module in the NME-WAE or SRE-SM family of devices to operate
in WAAS Central Manager mode.
You can configure a WAE with a Cisco WAE Inline Network Adapter to operate in WAAS Central
Manager mode, but the inline interception functionality is not available.
Deregistering WAE device from Central Manager will result in loss of data on encrypted
file systems.
imported certificate/private keys for SSL service.If secure store is initialized and open,
clear secure store.
If encrypted MAPI is enabled, windows-domain encryption-service identities will be
disabled. The passwords must be re-entered again the next time the WAE joins a central
manager.
Do you really want to continue (yes|no) [no]?yes
Disabling management service.
management services stopped
Sending de-registration request to CM
SSMGR RETURNING: 7 (Success)
Removing cms database tables.
Re-initializing SSL managed store and restarting SSL accelerator.
Deregistration complete. Save current cli configuration using 'copy running-config
startup-config' command because CMS service has been disabled.
Note On platforms WAVE-7571 and WAVE-8541, if the device mode is changed to Appnav controller, the
connection limit is reduced for certain accelerators.
a branch WAE for each department. In certain situations, multiple branch WAEs can be clustered
and configured using WCCP to provide failover capabilities. WCCP is the recommended method for
larger user populations.
• Number of data center WAEs—Each organization must have at least one data center WAE.
• Number of ANCs—If you are using the AppNav deployment model, at least one ANC is required.
When determining the number of the component types required by your organization, consider the
following factors:
• Number of users connecting to the system—This number depends on the static and dynamic
capacities defined for the system:
– Static capacities—Defines the number of user sessions that can connect to the system before it
reaches its capacity.
– Dynamic capacities—Defines the amount of traffic handled by the servers, which means the
amount of work being performed on the network. For example, consider whether the users
currently connected to the system place a heavy or light load on it.
Note You should calculate dynamic limits based on the specific load assumptions that are particular
to each customer.
• Total number of users in all the branches that connect to the file servers through the data center
WAE— When the number of users is more than what one data center WAE can support, you must
add one or more additional data center WAEs to the network.
Note The AppNav Controller Interface Modules do not support automatic bypass mode to continue traffic
flow in the event of a failure. For high availability, two or more AppNav Controller Interface Modules
should be deployed in an AppNav cluster. For more information on using inline mode with the AppNav
solution, see Chapter 4, “Configuring AppNav.”
You can configure the inline or bridge group interface to accept traffic only from certain VLANs; for all
other VLANs, traffic is bridged, and not processed. You can serially cluster WAE devices (not AppNav
Controllers) in inline mode to provide higher availability in the event of a device failure. If the current
optimizing device fails, the second WAE device in the cluster provides the optimization services.
Deploying WAE devices in a serial inline cluster for the purposes of scaling or load balancing is not
supported.
Any combination of traffic interception mechanisms on peer WAEs is supported. For example, you can
use inline interception on the branch WAE and WCCP on the data center WAE. For complex data center
deployments, we recommend that you use hardware-accelerated WCCP interception or load balancing
with the Cisco Application Control Engine (ACE) and a WAAS AppNav deployment.
For more information on inline interception, see Using Inline Mode Interception in Chapter 5,
“Configuring Traffic Interception.”
Three elements can help ease traffic interception in data centers without using a WCCP-based approach:
• Multiple pairs of inline interfaces are available on certain WAE models:
• WAVE-294/594/694/7541/7571/8541 models support one installed Cisco Interface Module, which
can be configured with up to 16 inline ports in 8 inline groups, or one installed AppNav Controller
Interface Module, which can be configured with up to 12 inline ports in 5 bridge groups.Serial inline
clustering of two WAEs (not AppNav Controllers) to support high availability.
• Interception ACLs to control the traffic that is intercepted and what is passed through. For more
information on interception ACLs, see Configuring Interception Access Control Lists in Chapter 5,
“Configuring Traffic Interception.”
Note You must configure the routers and WAEs to use WCCP Version 2 instead of WCCP Version 1, because
WCCP Version 1 supports only web traffic (Port 80). The routers must be running a version of Cisco IOS
software that also supports WCCP Version 2.
WCCP is much simpler to configure than PBR. However, you should have write access to the router in
order to configure WCCP on the router, which typically resides in the data center and on the edge of the
branch office. Another advantage of using WCCP is that you have to perform only a basic configuration
of WCCP on your routers and WAEs in order to get your WAE up and running.
The WCCP Version 2 protocol also has a set of useful features built-in, for example, automatic failover
and load balancing between multiple devices. The WCCP-enabled router monitors the liveliness of each
WAE or ANC that is attached to it through the WCCP keepalive messages. If a WAE goes down, the
router stops redirecting packets to the WAE. When you use WCCP Version 2, the branch WAE is not
made a single point of failure for the WAAS services. The router or ANC can also load balance the traffic
among a number of branch WAEs.
You can use CLI commands to configure basic WCCP on both the routers and the WAEs, or you can use
CLI commands to configure the router for WCCP and use the WAAS Central Manager GUI to configure
basic WCCP on the WAEs.
We recommend that you use the WAAS CLI to complete the initial basic configuration of WCCP on your
first branch WAE and data center WAE, as described in the Cisco Wide Area Application Services Quick
Configuration Guide. After you have verified that WCCP transparent redirection is working properly,
you can use the WAAS Central Manager GUI to centrally modify this basic WCCP configuration or
configure additional WCCP settings, for example, load balancing, for a WAE (or group of WAEs). For
more information, see Configuring WCCP on WAEs in Chapter 5, “Configuring Traffic Interception.”
After you have configured basic WCCP on the router, you can configure advanced WCCP features on
the router, as described in the Configuring Advanced WCCP Features on Routers in Chapter 5,
“Configuring Traffic Interception.”
To configure PBR, you must create a route map and then apply the route map to the router interface on
which you want the transparent traffic redirection to occur. Route maps reference access lists that contain
explicit permit or deny criteria. The access lists define the traffic that is interesting to the WAE, that is,
traffic that the network device should transparently intercept and redirect to the local WAE. Route maps
define how the network device should handle interesting traffic, for example, send the packet to the next
hop, which is the local WAE.
The following list summarizes the main advantages of using PBR instead of WCCP Version 2 to
transparently redirect IP/TCP traffic to a WAE:
• PBR provides higher performance than WCCP Version 2 because there is no GRE overhead.
• By default PBR uses CEF when CEF is enabled on the router. (PBR uses CEF for fast switching of
packets.)
• PBR can be implemented on any Cisco IOS-capable router or a switch that is running an appropriate
version of the Cisco IOS software. We recommend that you use Cisco IOS Software Release 12.2
or later.
• PBR provides failover if multiple next-hop addresses are defined.
The following list summarizes the main disadvantages of using PBR instead of WCCP Version 2 to
transparently redirect IP/TCP traffic to a WAE:
• PBR does not support load balancing between equal cost routes. Consequently, PBR does not
provide scalability for the deployment location.
• PBR is more difficult to configure than WCCP Version 2. For an example of how to configure PBR
for WAAS traffic, see the Using Policy-Based Routing Interception in Chapter 5, “Configuring
Traffic Interception.”
Note In this sample deployment, Edge-Router1 and Core-Router1 can be replaced with Layer 4 to Layer 7
switches, which are capable of redirecting traffic to the local WAE.
Figure 2-1 shows that the WAEs (Edge-WAE1 and Core-WAE1) must reside in an out-of-band network
that is separate from the traffic’s destination and source. For example, Edge-WAE1 is on a subnet that is
separate from the clients (the traffic source), and Core-WAE1 is on a subnet that is separate from the file
servers and application servers (the traffic destination). Additionally, you may have to use a tertiary
interface (a separate physical interface) or a subinterface to attach a WAE to the router, which redirects
traffic to it, in order to avoid an infinite routing loop between the WAE and the router. For more
information about this, see Using Tertiary Interfaces or Subinterfaces to Connect WAEs to Routers.
Figure 2-1 Using PBR or WCCP Version 2 for Transparent Redirection of All TCP Traffic to WAEs
File servers
Clients PBR or PBR or and application
WCCP Version 2 WCCP Version 2 servers
C WAN
A F D
Core-Router1
Edge-Router1
B E
159088
Edge-WAE1 Core-WAE1
Table 2-2 provides a summary of the router interfaces that you must configure to use PBR or WCCP
Version 2 to transparently redirect traffic to a WAE.
Table 2-2 Router Interfaces for WCCP or PBR Traffic Redirection to WAEs
Router
interface Description
Edge-Router1
A Edge LAN interface (ingress interface) that performs redirection on the outbound traffic.
B Tertiary interface (separate physical interface) or a subinterface off of the LAN port on Edge-Router1. Used to
attach Edge-WAE1 to Edge-Router1 in the branch office.
C Edge WAN interface (egress interface) on Edge-Router1 that performs redirection on the inbound traffic.
Core-Router1
D Core LAN interface (ingress interface) that performs redirection on outbound traffic.
E Tertiary interface or subinterface off of the LAN port on Core-Router1. Used to attach Core-WAE1 to
Core-Router1 in the data center.
F Core WAN interface (egress interface) on Core-Router1 that performs redirection on the inbound traffic.
This traffic redirection does not use tunneling; the full original quadruple (source IP address, source port
number, destination IP address, and destination port number) of the TCP traffic is preserved end to end.
The original payload of the TCP traffic is not preserved end to end because the primary function of
WAAS is to accelerate WAN traffic by reducing the data that is transferred across the WAN. This change
in payload can potentially impact features on the router that is performing the WCCP or PBR redirection,
and that needs to see the actual payload to perform its operation, for example, NBAR. For more
information on this topic, see WAAS and Cisco IOS Interoperability.
Using WCCP or PBR at both ends with no tunneling requires that traffic is intercepted and redirected
not only in the near-end router but also at the far-end router, which requires four interception points, as
opposed to two interception points in a tunnel-based mode.
You can enable packet redirection on either an outbound interface or inbound interface of a
WCCP-enabled router. The terms outbound and inbound are defined from the perspective of the
interface. Inbound redirection specifies that traffic should be redirected as it is being received on a given
interface. Outbound redirection specifies that traffic should be redirected as it is leaving a given
interface.
If you are deploying WAN optimization in your WAAS network, you must configure the router and WAE
for WCCP Version 2 and the TCP promiscuous mode service (WCCP Version 2 services 61 and 62 by
default).
Note Services 61 and 62 are always enabled together when configuring TCP promiscuous mode on the WAE.
Services 61 and 62 must be defined and configured separately when configuring TCP promiscuous mode
on the network device (router, switch, or other). Service 61 distributes traffic by source IP address, and
service 62 distributes traffic by destination IP address. The service IDs are configurable; 61 and 62 are
the defaults.
The TCP promiscuous mode service intercepts all the TCP traffic that is destined for any TCP port and
transparently redirects it to the WAE. The WCCP-enabled router uses service IDs 61 and 62 to access
this service. The service IDs used on the router must match those on the WAE if service IDs that are
different from the defaults are configured.
By default, IP Protocol 6 is specified for the TCP promiscuous mode service. Consequently, the routers
that have been configured to the TCP promiscuous mode service will intercept all the TCP traffic
destined for any TCP port to the local WAE. Because the TCP promiscuous mode service is configured
on the WAE, the WAE will accept all of the TCP traffic that is transparently redirected to it by specified
WCCP routers, for example, Edge-WAE1 will accept all TCP traffic that Edge-Router1 redirects to it.
In the branch office, you can intercept packets at the edge LAN and WAN interfaces on the Edge routers
and redirect the TCP traffic to the local WAE (the branch WAE). In the data center, you can intercept
packets at the core LAN and WAN interfaces on the core routers and redirect the TCP traffic to the local
WAE (the data center WAE). For more information, see Configuring WAEs as Promiscuous TCP Devices
in a WAAS Network.
Configure packet redirection on inbound interfaces of branch software routers whenever possible.
Inbound traffic can be configured to use Cisco Express Forwarding (CEF), distributed Cisco Express
Forwarding (dCEF), fast forwarding, or process forwarding.
Note CEF is required for WCCP, and must be enabled on the router.
To enable packet redirection on a router’s outbound or inbound interface using WCCP, use the ip wccp
redirect interface configuration command.
Caution The ip wccp redirect interface command has the potential to affect the ip wccp redirect exclude in
command. If you have ip wccp redirect exclude in set on an interface and you subsequently configure
the ip wccp redirect in command, the exclude in command is overridden. If you configure the exclude
in command, the redirect in command is overridden.
Note The WCCP GRE return and generic GRE egress methods allow you to place WAEs on the same VLAN
or subnet as clients and servers. For information on configuring these egress methods, see Configuring
Egress Methods for WCCP-Intercepted Connections in Chapter 5, “Configuring Traffic Interception.”
For example, if you attach Edge-WAE 1 to the same segment (subnet) as the LAN router interface on
which the PBR or WCCP traffic redirection occurs in the branch office, there will be an infinite routing
loop between Edge-Router1 and Edge-WAE1. If you attach Core-WAE1 to the same segment (subnet)
as the LAN router interface on which the PBR or WCCP traffic redirection occurs in the data center,
there will be an infinite routing loop between Core-Router1 and Core-WAE1.
To avoid an infinite routing loop between the router and its local WAE, connect the WAE to the router
through a tertiary interface (a separate physical interface) or a subinterface (a different virtual
subinterface) from the router’s LAN port. By using a tertiary interface or a subinterface to connect a
WAE to the router that is performing the PBR or WCCP redirection, the WAE has its own separate
processing path that has no Cisco IOS features enabled on it. In addition, this approach simplifies the
process of integrating WAEs into an existing network. Because the WAEs are being connected to the
routers through a tertiary interface or subinterface that has no Cisco IOS features enabled on it, the
Cisco IOS features that are already enabled on your existing Cisco-enabled network elements, for
example, Edge-Router1 or Core-Router1, will generally not be affected when you connect WAEs to these
routers. For more information about WAAS and Cisco IOS interoperability, see WAAS and Cisco IOS
Interoperability.
See the Cisco Wide Area Application Services Quick Configuration Guide for an example of how to use
a subinterface to properly attach a local WAE to the router that is redirecting TCP traffic to it.
Note IP access lists on routers have the highest priority, followed by IP ACLs that are defined on the WAEs,
and then interception ACLs that are defined on the WAEs.
IP ACLs on WAEs
In a centrally managed WAAS network environment, administrators need to be able to prevent
unauthorized access to various devices and services. The WAAS software supports standard and
extended IP access control lists (ACLs) that allow you to restrict access to or through particular
interfaces on a WAAS device. For more information, see Chapter 9, “Creating and Managing IP Access
Control Lists for Cisco WAAS Devices.”
Note IP ACLs that are applied on interfaces, and WCCP ACLs, always take precedence over any interception
ACLs and WAAS application definitions, if any, that have been defined on the WAE.
Login authentication is the process by which WAAS devices verify whether the administrator who is
attempting to log in to the device has a valid username and password. The administrator who is logging
in must have a user account registered with the device. User account information serves to authorize the
user for administrative login and configuration privileges. The user account information is stored in an
AAA database, and the WAAS devices must be configured to access the particular authentication server
(or servers) where the AAA database is located. When the user attempts to log in to a device, the device
compares the person’s username, password, and privilege level to the user account information that is
stored in the database.
The WAAS software provides the following authentication, authorization, and accounting (AAA)
support for users who have external access servers, for example, RADIUS, TACACS+, or Windows
domain servers, and for users who need a local access database with AAA features:
• Authentication (or login authentication) is the action of determining who the user is. It checks the
username and password.
• Authorization (or configuration) is the action of determining what a user is allowed to do. It permits
or denies privileges for authenticated users in the network. Generally, authentication precedes
authorization. Both authentication and authorization are required for a user log in.
• Accounting is the action of keeping track of administrative user activities for system accounting
purposes. In the WAAS software, AAA accounting through TACACS+ is supported.
For more information, see Configuring AAA Accounting for WAAS Devices in Chapter 7, “Configuring
Administrative Login Authentication, Authorization, and Accounting.”
Note An administrator can log in to the WAAS Central Manager device through the console port or the WAAS
Central Manager GUI. An administrator can log in to a WAAS device that is functioning as a data center
or branch WAE through the console port or the WAE Device Manager GUI.
A WAAS device that is running WAAS software comes with a predefined superuser account that can be
used initially to access the device. When the system administrator logs in to a WAAS device before
authentication and authorization have been configured, the administrator can access the WAAS device
by using the predefined superuser account (the predefined username is admin and the predefined
password is default). When you log in to a WAAS device using this predefined superuser account, you
are granted access to all the WAAS services and entities in the WAAS system.
After you have initially configured your WAAS devices, we strongly recommend that you immediately
change the password for the predefined superuser account (the predefined username is admin, the
password is default, and the privilege level is superuser, privilege level 15) on each WAAS device. For
instructions on how to use the WAAS Central Manager GUI to change the password, see Changing the
Password for Your Own Account in Chapter 8, “Creating and Managing Administrative User Accounts
and Groups.”
Note The AllWAASGroup and AllWAASExpressGroup are default device groups that automatically contain
all WAAS and WAAS Express devices. In these or any other device groups, you should configure only
the settings that you want to be consistent across all the devices in the group. Settings that apply to a
single device should be configured on that device only and not on the device group.
By default, WAAS Central Manager allows you to assign a device to multiple device groups. Before you
create a device group, make sure you understand the unique properties that you want the group to
contain.
The WAAS Central Manager allows you to create locations that you can associate with a WAAS device.
You assign a device to a location when you first activate the device. The main purpose of assigning a
WAAS device to a location is to help you identify a WAAS device by the physical region in which it
resides. Locations are different from device groups because devices do not inherit settings from
locations.
You assign a device to a location when you activate the device, as described in the Cisco Wide Area
Application Services Quick Configuration Guide. For more information about logically grouping your
WAEs, see Chapter 3, “Using Device Groups and Device Locations.”
This chapter describes the types of device groups supported by the WAAS software and how to create
groups that make it easier to manage and configure multiple devices at the same time. This chapter also
discusses how to use device locations.
Note Throughout this chapter, the term WAAS device is used to refer collectively to the WAAS Central
Managers and WAEs in your network. The term WAE refers to WAE and WAVE appliances, WAE
Network Modules (the NME-WAE family of devices), and SM-SRE modules running WAAS.
(the default AllWAASGroup and the new device group you create). If you only want a device to belong
to a device group that you create, make sure that you remove the device from the default
AllWAASGroup. WAAS Express devices automatically join the default AllWAASExpressGroup device
group when they are registered with the Central Manager.
WAAS devices and WAAS Express devices cannot be mixed in the same device group. You choose the
device group type when you create the group and it cannot be changed. When you create a WAAS
Express type of device group, you can copy policies from an existing WAAS or WAAS Express group,
but policies cannot be copied after creation.
Step 1 From the WAAS Central Manager menu, choose Device Groups > All Device Groups. The Device
Groups window appears.
From this window you can perform the following tasks:
• Click the Edit icon next to the device group that you want to modify.
• Create a new device group as described in the steps that follow.
Step 2 Click the Create New Device Group icon in the taskbar. The Creating New Device Group window
appears.
Step 3 In the Name field, enter the name of the device group.
The name must be unique and should be a name that is useful in distinguishing the device group from
others on your system. The name cannot contain characters other than letters, numbers, period, hyphen,
underscore, and space.
Step 4 Choose either WAAS or WAAS Express for the Configuration Group Type. This sets the type of devices
that the group can contain. A WAAS Express group can contain only WAAS Express devices. A WAAS
group can contain all types of devices except for WAAS Express devices.
Step 5 Check the Automatically assign all newly activated devices to this group check box to set this device
group as the default device group for all newly activated devices.
Step 6 If you chose the WAAS Express group type, you can copy policies from another existing group by
choosing the group in the Copy Policies from the device group drop-down list (only shown when creating
a WAAS Express group). If you copy policies from a WAAS group, only basic optimization policies are
copied, not application acceleration policies.
Step 7 (Optional) Enter comments about the group in the Comments field. The comments that you enter will
appear in the Device Group window.
Step 8 Click Submit.
The page refreshes with additional options.
Note The Pages configured for this device group arrow lists the configuration windows in the WAAS
Central Manager GUI that have been configured for this device group. Because this is a new
device group, no pages will appear in this list.
Step 9 (Optional) Customize the menu options for this device group by completing the following steps. Use this
feature to remove from view any configuration windows that you do not need for that particular device
group:
a. Click the Select pages to hide from table of contents for this device group arrow.
A list of windows in the WAAS Central Manager GUI appears.
b. Check the windows that you want to hide for this device group. You can click the folder icon next
to a window to display its child windows.
c. Click Submit.
Step 10 Configure the settings for this device group as described in Configuring the Settings for a Device Group.
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name.
The Modifying Device Group window appears.
Step 2 Click the Pages configured for this device group arrow button to view which configuration windows
have already been configured for the group.
A list of pages that are configured for that device group appears. If this is a new device group or if there
are no pages configured for this device group, the list displays Null.
Step 3 Customize the menu options for this device group by completing the following steps:
a. Click the Select pages to hide from table of contents of this device group arrow.
A list of windows in the WAAS Central Manager GUI appears.
b. Place a check next to the windows that you want to hide for this device group. Use this feature to
remove from view any configuration windows that you do not need for this particular device group.
Step 4 Use the menu bar to choose each configuration option that you want to modify for this device group.
If the configuration option has not been configured for this device group, the message “There are
currently no settings for this group” appears at the top of the window.
Step 5 Make the necessary changes on the configuration option window, and click Submit when finished.
After a particular setting is configured, the configuration window is listed under Pages configured for
this device group in the Modifying Device Group window.
Step 6 Assign devices to this new group as described in Assigning Devices to a Configuration Device Group.
Note By default, all devices automatically join either the AllWAASGroup or AllWAASExpressGroup when
they are activated. If you do not want a device to belong to one of the default device groups, you should
unassign that device from the default device group, and then assign that device to a custom device group.
Generally, when assigning a device to two different Device Groups, have the same page configured in
it—either have the page configured in single Device Group or it is expected to have Force Device Group
(FDG) settings enabled in the other DeviceGroup. The WAAS Central Manager pushes the latest
changed Device Group's configuration to the device.
Use care when you are assigning devices that have different WAAS software versions to a device group.
Some features configured for a device group may not be supported by all devices in the group or, in some
cases, devices may be prevented from joining the group if the group is configured with policies that they
cannot support. In such cases, we recommend that you upgrade all devices to the same software version
or create different device groups for devices with incompatible versions.
To assign a device to a device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name.
The Modifying Device Group window appears.
Step 2 Choose device-group-name > Assign Devices.
The WAE/WAAS Express Assignments window appears, displaying the devices assigned to various
locations. If you are editing a WAAS group, only WAAS devices are shown. If you are editing a WAAS
Express group, only WAAS Express devices are shown.
The assignments window lets you filter your view of the items in the list. Filtering allows you to find
items in the list that match the criteria that you set.
Step 3 Assign a device to the device group by doing either of the following:
• Click in the taskbar to assign all available devices to the group.
• Click next to each device that you want to assign to the group. The icon changes to when
selected.
Step 4 Click Submit.
A green check mark appears next to the assigned devices.
Step 5 Click the Unassign icon (green check mark) next to the name of the device that you want to remove from
the device group. Alternatively, you can click the Remove all icon in the taskbar to remove all devices
from the selected device group. Click Submit.
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name. The Modifying
Device Group window appears.
Step 2 In the taskbar, click the Delete Device Group icon. You are prompted to confirm your decision to delete
the device group.
Step 3 To confirm your decision, click OK.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
The Device Dashboard window appears.
Step 2 In the Assignments field on the Device Dashboard window, click the link that displays the groups to
which the device is assigned.
The Device Group Assignments page appears, which shows all the device groups in your WAAS network
that match the device type (WAAS or WAAS Express). The device is assigned to the device groups with
a green check mark next to them.
You can also go to the Device Group Assignments window by choosing the Assign Device Groups option
in the menu bar.
To view the devices that are assigned to a specific group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name.
Step 1 From the WAAS Central Manager menu, choose Configure > Global > System Properties.
The Config Properties window appears.
Step 2 Click the Edit icon next to the property name DeviceGroup.overlap.
The Modifying Config Property, DeviceGroup.overlap window appears.
Step 3 From the Value drop-down list, choose either true or false. (The default is true.)
When you disable device group overlap (set to false), existing overlapping device groups are retained
and continue to be handled as though overlap were enabled; however, any newly added groups do not
allow overlapping, and new devices cannot be added to the existing overlapping groups.
Step 4 Click Submit.
The Device Groups > device-group-name > Force Group Settings applies all settings configured for a
specified device group to all the WAEs/WAAS Express assigned to it.
Note the following uses of Force Group Settings when you register a WAE to the WAAS Central
Manager:
• Because all devices in a device group have the same configuration, the configuration you apply at
the device group level gets assigned to all the devices in the group.
However, if a device in a device group has local settings that were either configured manually using
the CLI or automatically during upgrade, its device settings may be out of sync with the rest of the
device group. To remedy this:
– Use Force Group Settings, described in Procedure for Forcing Device Group Settings, to ensure
that all devices in the specified group have the same configuration.
– To avoid the need to use Force Group Setting after a device is registered to the Central Manager,
restore device’s factory default settings before registering it to the WAAS Central Manager.
To force a device group configuration across all devices in the group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name.
The Modifying Device Group window appears.
Step 2 Click the Force Group Settings icon in the taskbar.
The WAAS Central Manager GUI displays the following message:
The action will apply all settings configured for this device group to all the WAEs/WAAS
Express assigned to it. Do you wish to continue?
Step 3 To force group settings across all devices in the device group, click OK.
Step 4 Click Submit.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
The Device Dashboard window appears.
Step 2 From the menu bar, choose the configuration option that contains the conflicting settings.
A drop-down list appears in the taskbar at the top of the window. This drop-down list allows you to select
the device group that you want this configuration window to inherit settings from. The device group that
is currently selected is the device group that has precedence.
Step 3 From the drop-down list, choose the device group that you want this configuration page to inherit
settings from, and click Submit.
The configuration window changes to reflect the settings associated with the selected device group.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
The Device Dashboard window appears.
Step 2 From the menu bar, choose the configuration option that contains the device group settings you want to
override.
Step 3 Click the Override Group Settings icon in the taskbar.
The settings in the configuration window are enabled.
Note The Override Group Settings icon only appears on configuration windows that have been
modified on the associated device group.
Step 4 Make the necessary changes to the configuration window, and click Submit.
The device is now configured with settings that are different from the device group it belongs to.
Note The Force Settings on all Devices in Group icon appears in the device group view of an
overridden configuration window. You can click this icon to reapply the device group settings to
all devices in the device group.
Step 5 To reapply the device groups settings to this configuration window, choose the device group from the
drop-down list in the taskbar, and click Submit.
Step 1 From the WAAS Central Manager menu, choose Devices Groups > old-device-group-name.
Step 2 Choose DeviceGroup > Assign Devices.
Step 3 Click the green check icon next to the device that you want to reassign. The icon changes to a red arrow
pointing left.
Step 4 Click Submit.
Step 5 From the WAAS Central Manager menu, choose Devices Groups > new-device-group-name.
Step 6 Click the blue X icon next to the device that you want to reassign. The icon changes to a green arrow
pointing right.
Step 7 Click Submit.
Step 8 Choose Configure > Acceleration > Optimization Policies.
Step 9 Click the Force Settings on all Devices in Group taskbar icon.
Creating Locations
To create a new location or modify an existing one, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Locations > All Locations. The Locations window
appears.
Step 2 In the taskbar, click the Create New Location icon.
The Creating New Location window appears.
Step 3 In the Name field, enter a location name.
The name can contain letters, numbers, period, hyphen, underscore, and space.
Step 4 From the Parent Location drop-down list, choose a parent location (or choose None).
A location with no parent is a level 1 location. A location with a level 1 parent becomes a level 2 location,
and so forth. The location level is displayed after you choose a parent location (or choose None) and
click Submit to save the configuration.
Step 5 (Optional) In the Comments field, enter comments about the location.
Step 6 Click Submit.
Step 7 Modify a location by going to the Locations window and clicking the Edit icon next to the name of the
location that you want to modify.
Step 8 Assign a device to this location. For more information, see Modifying Device Properties in Chapter 10,
“Configuring Other System Settings.”
Deleting Locations
You can delete locations as needed, as long as they are not the root locations of activated WAAS devices.
Note If a location has a device assigned to it, you can first assign the device to another location and then delete
the original location.
Step 1 From the WAAS Central Manager menu, choose Locations > location-name.
The Modifying Location window appears.
Step 2 In the taskbar, click the Delete Location icon. You are asked to confirm your decision to delete the
location.
Step 3 To confirm the action, click OK. The location is deleted.
This chapter describes how to configure Cisco AppNav, which is a hardware and software solution that
simplifies network integration of WAN optimization and overcomes challenges with provisioning,
visibility, scalability, asymmetry, and high availability.
This chapter includes the following topics:
• Information About Cisco AppNav
• Prerequisites for AppNav Deployment
• Guidelines and Limitations for AppNav Deployment
• Configuring an AppNav Cluster
• Monitoring an AppNav Cluster
System Components
The AppNav solution consists of the following components (see Figure 4-1):
• AppNav Controller (ANC, or AC on the router)—A device that intercepts network traffic and, based
on an AppNav policy, distributes that traffic to one or more WAAS nodes (WNs) for optimization.
The device can be either of the following:
Service Context
AppNav Cluster
Within a service context, WAAS devices can operate in one of two modes:
• Application accelerator—The device serves only as a WN within the service context. It receives
traffic from the ANC, optimizes the traffic, and returns the traffic to the ANC to be delivered to its
destination. The WN can be any kind of WAAS device or vWAAS instance.
• AppNav Controller—The device operates as an ANC that intercepts network traffic, and, based on
a flow policy, distributes that traffic to one or more WAAS nodes for optimization. Only a WAVE
appliance that contains a Cisco AppNav Controller Interface Module, or an AppNav-XE device, can
operate as an ANC. A WAAS appliance ANC can also operate as a WAAS node and optimize traffic
as part of a WNG.
AppNav-XE ANCs have deployment models similar to the in-path diagram shown in Figure 4-2. You
can see the specific deployment diagrams in the Central Manager cluster wizard when you choose a
platform.
Combination mode
A WAAS device, that has an AppNav IOM card installed, can be configured to perform traffic
interception using the AppNav module, and perform optimization as a single device. This is the
combination mode as shown in the Figure 4-3:
A combination mode deployment is not recommended due the limitation of single point failure as
explained below.
Limitation
In a combination deployment, a single AppNav IOM module failure impacts both the AppNav and
WAAS functionality. All the traffic to a WAAS node is blocked leading to a loss of active sessions in
WAAS. The WAAS node on the combination device becomes unreachable and is removed from the
distribution list as shown below. Note that this is applicable for both In-path and Off-path deployments.
Figure 4-5 AppNav IOM and WAAS nodes in separate devices (off-path deployment)
You may experience some delay during cluster convergence when the AppNav IOM module comes back
online. Until then, other devices in the cluster will handle the new flows.
Recommendation
Considering the technical limitation in the combination mode, we strongly recommend to use separate
devices for AppNav IOM and WAAS node to avoid a single point failure.
Interfaces on the AppNav Controller Interface Module can have three functions:
• Interception—Used to receive traffic intercepted from the network and egress traffic to the network.
The interception interface is implied based on the AppNav Controller placement and does not
require explicit configuration for this function.
• Distribution—Used to distribute traffic to the WNs and receive egressed traffic from the WNs. The
distribution interface is explicitly configured as the cluster interface for intracluster traffic and must
be assigned an IP address.
• Management—A management interface can be optionally and exclusively designated for
management traffic and isolated from the normal data path. We recommend that you use one of the
appliance’s built-in interfaces for management traffic and reserve the high-performance interfaces
on the AppNav Controller Interface Module for interception and distribution.
You should use separate interfaces for interception and distribution for best performance, but you can
use the same interface for both functions.
AppNav Controller Interface Modules support port channel and standby logical interfaces. A port
channel allows you to increase the bandwidth of a link by combining multiple physical interfaces into a
single logical interface. A standby interface allows you to designate a backup interface in case of a
failure.
Interfaces on the AppNav Controller Interface Module support the following:
• A maximum of seven port channels with up to eight physical interfaces combined into a single port
channel group.
• A maximum of five bridge groups configured over the physical or logical interfaces.
Interfaces on the AppNav Controller Interface Module do not support the following:
• Fail-to-wire capability
• Bridge virtual interfaces (BVIs)
AppNav Policy
The AppNav policy is a flow distribution policy that allows you to control how ANCs distribute traffic
to the available WNs.
The AppNav policy consists of class maps that classify traffic according to one or more match conditions
and a policy that contains rules that specify distribution actions to WNGs for each of the classes.
This section includes the following topics:
• Class Maps
• Policies
• Nested Policies
• Site and Application Affinity
• Default Policy Behavior
Class Maps
AppNav class maps classify traffic according to one or more of the following match conditions:
• Peer device ID—Matches traffic from one peer WAAS device, which could be handling traffic from
a single site or a group of sites.
You can use this kind of matching to classify all traffic from a peer device that serves one branch
office.
• 3-tuple of source IP, or destination IP, or destination port (matches traffic from a specific
application).
For example, you can use this kind of matching to classify all HTTP traffic that uses port 80.
• A mix of one peer device ID and the source IP, or destination IP, or destination port (matches
application-specific traffic from one site).
For example, you can use this kind of matching to classify all HTTP traffic that is from a peer device
that serves the branch office.
The class-default class map (or APPNAV-class-default on AppNav-XE clusters) is a system-defined
default class map that is defined to match any traffic. By default, it is placed in the last rule in each policy
to handle traffic that is not matched by other classes.
Policies
An AppNav Controller matches incoming flows to class maps and the policy rules in a policy associate
class maps with actions, such as distributing a flow to a particular WNG for optimization. The order in
which rules are listed in the policy is important. Starting at the top of the policy, the first rule that
matches a flow determines to which WNG it is distributed.
A policy rule can specify four kinds of actions to take on a flow:
• Specify the primary WNG to which to distribute the flow (required).
• Specify a backup WNG for distribution if the primary WNG is unavailable or overloaded (optional;
not supported on AppNav-XE clusters).
The primary WNG receives all traffic until all WNs within the group become overloaded (reach 95
percent of the maximum number of connections) or are otherwise unavailable, and then traffic is
distributed to the backup WNG. If a WN in the first WNG becomes available, traffic is again
distributed there. If all WNs in both the WNGs become overloaded, traffic is passed through
unoptimized.
• Monitor the load on the application accelerator that corresponds to the application traffic matched
by the class (optional).
If the monitored application accelerator on one WN in a WNG becomes overloaded (reaches 95
percent of its maximum number of connections), the WN is considered overloaded and traffic is
directed to another WN in the group. If all WNs become overloaded, traffic is distributed to the
backup WNG. This application accelerator monitoring feature is useful for ensuring optimization
for critical applications and is recommended for the MAPI and SMB accelerators.
• Specify a nested policy to apply to the flow (optional; not supported on AppNav-XE clusters).
For more information, see Nested Policies.
Within a WNG, flows are distributed among WNs using a hash. If a WN reaches its maximum capacity
or becomes unavailable, it is not sent new flows. New flows are sent to other available WNs in the WNG
so that they can be optimized successfully. If an unavailable WN later becomes available again, the same
client/server pairs will hash to this WN as before.
Note If a WN that is doing MAPI or ICA application acceleration becomes overloaded, flows associated with
existing MAPI and ICA sessions continue to be sent to the same WN due to the requirement that the
same WN handles these types of flows. New MAPI and ICA flows, however, are distributed to other
WNs.
The AppNav policy is specific to each ANC, though typically, all the ANCs in a cluster have the same
policy. Each ANC consults its AppNav policy to determine which WNG to use for a given flow. Different
ANCs in a cluster can have different AppNav policies, which allows you to customize distribution in
certain cases. For example, when a cluster contains ANCs and WNs that are in different locations, it may
be more desirable for an ANC to distribute traffic to WNs that are closer to it.
Note On AppNav-XE clusters, the AppNav policy must be the same on all the ANCs in a context.
Nested Policies
A policy rule can specify one nested policy, which allows traffic identified in a class to be subdivided
and handled differently. Nested policies provide two advantages:
• They allow another policy to be used as a common subclassification tool.
For example, you can define a policy that contains monitoring actions and apply it as a subpolicy to
multiple classes in the primary policy.
• They provide a method of including class maps with both match-any and match-all characteristics
into a single subclass.
The nested policy feature is designed for use with site-based classes (matched by peer ID) at the
first-level and application-based subclasses (matched by IP address/port) at the second level. Only the
first level policy can contain classes that use match peer conditions.
• WNG-2—Consists of two WNs that process HTTP and SSL flows from any site. Whether HTTP and
SSL flows from Site A and Site B should be processed by WNG-2 or WNG-1 is determined by the
order of rules in the policy.
• WNG-3—Consists of two WNs that process MAPI flows coming from any site. Whether MAPI
flows from Site A and Site B should be processed by WNG-3 or WNG-1 is determined by the order
of rules in the policy.
• WNG-4—Consists of three WNs. The class-default class is applied to this WNG so that it all the
flows that do not match any other class map are sent to it.
WAN
AppNav Cluster
ANC-1 ANC-2
Site A HTTP
Site B SSL WN-9
Sites C, D, E, F
333465
Site Affinity
Site affinity provides you with the ability to always send all the traffic from one site to a specific WNG,
which allows you to reserve optimization capacity for critical sites and to improve compression
performance through better utilization of the DRE cache.
Traffic from any location, not just a single site, can be matched in a class map and associated with a
WNG.
You can implement site affinity by configuring a class map that matches the device ID of the WAE in the
site. If a site has more than one WAE in a WCCP farm or a serial inline cluster, specify multiple device
IDs in the class map. Next, associate the class map with a distribution action to a WNG in a policy rule.
You can also identify sites using source IP addresses or subnets in the class map, if you know what IP
addresses are used in the site and keep the policy configuration consistent with site IP addresses.
However, we recommend that you use peer device IDs when configuring site affinity.
Note A peer ID-based class map works only for matching flows that carry the WAAS auto discovery TCP
options. If you configure a class to match a site peer ID at the data center, the same class does not match
flows that originate in the other direction, such as those flows that originate from the data center and go
back to the same site. Such flows are usually small in number compared to the site-to-data center flows.
If you want flows in both directions to go to the same WNG, you must configure two class maps: one to
match in the site-to-data center direction, typically using the site device ID; and another to match the
data center-to-site direction, using destination IP subnets belonging to the site. Both class maps can be
configured to distribute traffic to the same WNG. A mesh network is a specific use case where flows can
originate in either direction.
If the site WAE is in overload or does not mark the SYN packet with auto discovery options for any other
reason, the ANC cannot match it to the peer match class map.
Application Affinity
Application affinity gives you the ability to always send certain application traffic to a specific WNG,
which allows you to reserve optimization capacity for different applications depending on business
priorities.
In the context of AppNav flow distribution, an application is defined using a three-tuple of source IP,
destination IP, and destination TCP port. The actual type of traffic does not matter for flow distribution.
For example, you can use separate WNGs for HTTP traffic that is addressed to different destination ports
or different server IP addresses. Destination IP and ports are most useful in using application affinity,
but having the source IP also helps you to define the traffic of interest.
A small number of protocols, such as FTP, use dynamic destination ports. An FTP server in active mode
originates a data connection back to the FTP client using a dynamic destination port. This port is
exchanged over the control channel from client to server using the well-defined destination port 21.
Consider trying to define a class map for FTP. Because the destination port is not known in advance, you
cannot map both control and data connections to the same class. In this case, we recommend that you
use the client IP addresses or subnets to match the destination IP addresses for the data connections. You
must configure two class maps: one for the control channel, using destination port 21, and another for
the data channel, using destination IP addresses. You can configure policy rules so that both class maps
distribute traffic to the same WNG.
You can further classify traffic from a site into applications by combining the peer matches with
three-tuple matches in a match-all class map, called a Custom class map type in the Central Manager.
• If you are using AppNav-XE devices, they must be registered and activated in the Central Manager
before the Central Manager can manage them. For more information on registering AppNav-XE
devices, see Managing Cisco IOS Router Devices in Chapter 10, “Configuring Other System
Settings.”
Note You can use an AppNav-XE device in a small deployment without a Central Manager by configuring the
cluster from the AppNav-XE device CLI. For details, see the corresponding router documentation on
www.cisco.com.
2. Use the Central Manager AppNav Cluster Wizard to create a cluster and configure the interception
mode, configure cluster settings, choose cluster devices, configure VRFs (for AppNav-XE),
configure traffic interfaces, and configure WCCP settings if you are using WCCP. AppNav-XE. See
Creating a New AppNav Cluster with the AppNav Cluster Wizard.
3. (Optional) Configure AppNav class maps. This step is necessary only if you want to customize the
default class map configuration. The system adds several default class maps that match traffic
corresponding to most of the application accelerators and a class-default class map that matches all
traffic. See Configuring a Class Map on a WAAS Appliance AppNav Cluster.
4. (Optional) Configure an AppNav policy. This step is necessary only if you want to customize the
default policy. The system adds a default policy that distributes all traffic to the WNG-Default
WNG, which is the node group into which all WNs are grouped by default. See Configuring Rules
Within an AppNav Policy.
5. (Optional) Configure WAAS node optimization class maps and policy rules. This step is necessary
only if you want to customize the default optimization policy that is listed in Appendix A,
“Predefined Optimization Policy.”
6. (Optional) Configure an interception ACL on WAAS appliance ANCs. See Configuring AppNav
Controller ACLs.
AppNav Controller
Step 1 Connect the last AppNav Controller Interface Module port to the switch/router port for the cluster traffic.
For example, this port is GigabitEthernet 1/11 on a 12-port module or TenGigabitEthernet 1/3 on a 4-port
module.
Step 2 Connect a built-in Ethernet port to the switch/router port for the management interface.
Step 3 For an in-path (inline) deployment, connect the first pair of ports on the AppNav Controller Interface
Module, for example, GigabitEthernet 1/0 (LAN) and GigabitEthernet 1/1 (WAN) for bridge 1, to the
corresponding switch/router ports.
If the ANC is connected to a second router for a dual inline deployment, connect the second pair of ports
on the AppNav Controller Interface Module, for example, GigabitEthernet 1/2 (LAN) and
GigabitEthernet 1/3 (WAN) for bridge 2, to corresponding switch/router ports.
Step 4 Use the device setup command to configure the following settings:
– Configure the device mode as AppNav Controller.
– Configure the IP address and netmask of the built-in management port.
– Configure the built-in management port as the primary interface.
– Configure the other network and basic settings (default gateway, DNS, NTP server, and so
forth).
– Register the device with the Central Manager by entering the Central Manager IP address.
Step 5 Configure the IP address and netmask of the last AppNav Controller Interface Module port and do not
use DHCP. You can also configure these settings through the AppNav Cluster wizard.
WAAS Node
Step 1 Connect a built-in Ethernet port to the switch/router port for management interface.
Step 2 Use the device setup command to configure the following settings:
– Configure the device mode as Application Accelerator.
– Configure the IP address and netmask of the built-in management port.
– Configure the built-in management port as the primary interface.
– Configure the other network and basic settings (default gateway, DNS, NTP server, and so
forth).
– Register the device with the Central Manager by entering the Central Manager IP address.
AppNav Controller
Step 1 Connect the last AppNav Controller Interface Module port to the switch/router port for cluster traffic.
For example, this port is GigabitEthernet 1/11 on a 12-port module or TenGigabitEthernet 1/3 on a 4-port
module.
Step 2 For an in-path (inline) deployment, connect the first pair of ports on the AppNav Controller Interface
Module, for example, GigabitEthernet 1/0 (LAN) and GigabitEthernet 1/1 (WAN) for bridge 1, to
corresponding switch/router ports.
If the ANC is connected to a second router for a dual inline deployment, connect the second pair of ports
on the AppNav Controller Interface Module, for example, GigabitEthernet 1/2 (LAN) and
GigabitEthernet 1/3 (WAN) for bridge 2, to corresponding switch/router ports.
Step 3 Use the device setup command to configure the following settings:
WAAS Node
Step 1 Connect a built-in Ethernet port to the switch/router port for management interface.
Step 2 Use the device setup command to configure the following settings:
– Configure the device mode as Application Accelerator.
– Configure the IP address and netmask of the built-in management port.
– Configure the built-in management port as the primary interface.
– Configure the other network and basic settings (default gateway, DNS, NTP server, and so
forth).
– Register the device with the Central Manager by entering the Central Manager IP address.
• Not configured with an IP address and netmask and not used as part of another logical interface.
(However, the last port on the AppNav Controller Interface Module can be configured with an IP
address because it is the default port for cluster traffic.)
The wizard configures all required traffic interface settings.
• Configured as expected by the wizard according to the following predefined deployment model
expectations:
Prerequisites
• Set up the individual ANC and WN devices as described in Configuring WAAS Device Interfaces.
• Ensure that all ANCs are configured for AppNav Controller device mode. If you need to change the
device mode, see Changing Device Mode in Chapter 2, “Planning Your WAAS Network.”
• Use the Central Manager to configure basic settings for all devices such as NTP server, AAA,
logging, and so on.
Detailed Steps
To create a new AppNav Cluster using the AppNav Cluster wizard, follow these steps:
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > All AppNav Clusters.
The Manage AppNav Clusters window appears.
Step 2 Click the AppNav Cluster Wizard icon in the taskbar of the Manage AppNav Clusters area.
The AppNav Cluster Wizard window appears.
Step 3 From the AppNav platform drop-down list, choose WAVE Appliance.
Step 4 From the Deployment model drop-down list, choose one of the following deployment models that
matches your deployment:
• Single AppNav Controller WCCP interception
• Dual AppNav Controllers WCCP interception
• Single AppNav Controller Inline interception
• Dual AppNav Controllers Inline interception
• Custom—For a deployment that does not match one of the above choices.
Click Next.
Step 5 (Optional) If you chose the Custom deployment model, from the Interception method drop-down list,
choose the WCCP or Inline interception method and click Next.
Step 6 Define the cluster settings by entering the following information:
• In the Name field, enter a name for the cluster. Use only letters, numbers, hyphen, and underscore,
up to a maximum of 32 characters and beginning with a letter.
• (Optional) In the Description field, enter a description of the cluster. Use only letters and numbers,
up to a maximum of 200 characters.
• Check the Disable Distribution check box if you want make the cluster operate in monitoring mode,
otherwise, it is activated when the wizard finishes. In monitoring mode, all traffic is passed through
instead of being distributed to WNs.
Step 7 Click Next.
Step 8 Choose the ANC and WN devices that you want to be part of the cluster:
a. Choose up to eight ANCs in the AppNav Controller device list by clicking the check box next to the
device names. You can use the filter settings in the taskbar to filter the device list.
b. (Optional) To enable optimization on the ANC devices, check the Enable WAN optimization on
selected AppNav Controller(s) check box (it may be enabled or disabled by default, depending on
the deployment model you chose).
c. Choose up to 32 WNs in the WAAS Nodes device list by clicking the check box next to the device
names. You can use the filter settings in the taskbar to filter the device list.
If there are devices that are ineligible to join the cluster, click Show Ineligible Devices to see them
and the reasons why they are ineligible. You can use the filter settings to filter the list.
Step 9 Click Next.
Step 10 Verify the cluster interface, IP address, and netmask for each device in the cluster. The wizard
automatically selects recommended cluster interfaces that should be configured. To edit the IP address
and netmask settings for a device, choose the device and click the Edit taskbar icon.
Note This screen does not appear if you are configuring a custom cluster.
Step 11 Click Finish if you are using inline interception (and you are done) or click Next if you are using WCCP
interception (and continue with the following steps for WCCP).
Step 12 (Optional) Configure the WCCP settings for the ANC. This screen does not appear if you are configuring
an inline cluster.
For details about configuring WCCP, see Configuring WCCP on WAEs in Chapter 5, “Configuring
Traffic Interception.”
a. Ensure that the Enable WCCP Service check box is checked if you want to enable WCCP. This
item appears only if you are defining a custom cluster.
b. Verify the single WCCP service ID of 61 (default), or change it if desired.
Configure only this single WCCP service on both the ingress and egress ports of the router doing
WCCP redirection to this ANC.
c. (Optional) If you want to enable two WCCP services, uncheck the Enable Single Service Mode
check box (it is checked by default because two WCCP services are not required). The automatically
assigned second service ID number is shown in the Service ID2 field.
d. From the Redirect Method drop-down list, choose the WCCP L2 or WCCP GRE redirect method.
For details on the redirect method, see Configuring or Viewing the WCCP Settings on ANCs in
Chapter 5, “Configuring Traffic Interception.” This item appears only if you are defining a custom
cluster.
e. (Optional) If you do not want to use the default gateway defined on the device, uncheck the Use
Default Gateway as WCCP Router check box. Enter the address of one or more WCCP routers,
separated by commas, in the WCCP Routers field.
f. Click Advanced WCCP Settings to configure additional settings, as needed. For more information
on these fields, see Configuring or Viewing the WCCP Settings on ANCs in Chapter 5, “Configuring
Traffic Interception.” This item appears only if you are defining a custom cluster.
Step 13 Click Next. If you are configuring multiple ANCs, a similar screen is shown for each ANC.
Step 14 Configure the interception and cluster interface settings for each device. The Cluster Interface wizard
only appears if you are defining a custom cluster, with one screen for each device in the cluster:
a. Configure individual interception interfaces, port channels, standby interfaces, and bridge interfaces
(for inline only), as needed, on the device by using the graphical interface wizard. If you are
configuring an inline ANC, you must define a bridge interface with two physical or port-channel
interfaces (or one of each) for interception. For details on how to use the wizard, see Configuring
Interfaces with the Graphical Interface Wizard.
b. From the Cluster Interface drop-down list, choose the interface to be used for intracluster traffic.
Step 15 Click Next. If you are configuring multiple devices, a similar screen is shown for each device.
Step 16 Click Finish to save the cluster configuration.
By default, the Cluster Interface wizard assigns all the WNs to a default WNG named WNG-Default.
You can create additional WNGs, as described in Adding a New WAAS Node to the Cluster. You can
reassign WNs to different WNGs, as described in Configuring WAAS Node Settings.
After you create an AppNav Cluster, it is shown in the Manage AppNav Clusters list. For details on
monitoring the cluster, see Monitoring an AppNav Cluster.
Detailed Steps
To create a new AppNav-XE cluster by using the wizard, follow these steps:
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > All AppNav Clusters.
The Manage AppNav Clusters window appears.
Step 2 Click the AppNav Cluster Wizard icon in the taskbar of the Manage AppNav Clusters area. The Cluster
Wizard window appears.
Step 3 From the AppNav platform drop-down list, choose one of the following AppNav-XE platforms to use
for your deployment. All ANCs must use the same platform type with identical memory configurations.
• ASR 1000 Series—AppNav-XE on the Cisco ASR 1000 Series Aggregation Services Router
• CSR 1000V Series—AppNav-XE on the Cisco Cloud Services Router 1000V Series
• ISR 4451X—AppNav-XE on the Cisco 4451-X Integrated Services Router
Step 4 Click Next.
Step 5 Define the cluster settings by entering the following information:
• In the Cluster Name field, enter a name for the cluster. Use only letters, numbers, hyphen, and
underscore. A maximum of 32 characters, beginning with a letter, can be entered.
• (Optional) In the Description field, enter a description of the cluster. Use only letters and numbers.
A maximum of 200 characters can be entered.
• (Optional) From the WAAS Cluster ID drop-down list, choose a cluster ID that is unique for this
cluster in your WAAS network. Only unused cluster IDs are shown.
Click Next.
Step 6 Choose the ANC and WN devices that you want to be part of the cluster:
a. Choose up to four AppNav-XE devices of the same platform type in the AppNav Controller device
list by clicking the check box next to the device names. You can use the filter settings in the taskbar
to filter the device list.
b. Choose up to 64 WNs in the WAAS Nodes device list by clicking the check box next to the device
names. You can use the filter settings in the taskbar to filter the device list.
If there are devices that are ineligible to join the cluster, click Show Ineligible Devices to see them
and the reasons why they are ineligible. You can use the filter settings to filter the list.
Step 7 Click Next.
Step 8 Choose the VRF instances to associate with the service context by checking the box next to each VRF
instance that you want to use. If you choose the VRF default, you cannot choose other VRFs. If you
choose multiple VRFs, they must not have overlapping source IP addresses. Only VRFs that are available
on all the ANCs are listed in the top table. Ineligible VRFs are listed in the lower table.
Step 9 Click Next.
Step 10 Configure the interception and cluster interface settings for each ANC device in the cluster:
a. Choose the WAN interfaces on which traffic interception is to be enabled. Interfaces must already
be configured on the AppNav-XE devices and only those on which service insertion can be enabled
are listed.
b. Choose the local interface to be used for intra-cluster traffic.
Step 11 Click Next. If you are configuring multiple ANCs, a similar screen is shown for each device.
Step 12 Configure the cluster interface settings for each WN device in the cluster. The Cluster Interface wizard
appears, with one screen for each WN in the cluster:
a. Configure individual interfaces, as needed, on the device by using the graphical interface wizard.
For details on how to use the wizard, see Configuring Interfaces with the Graphical Interface
Wizard.
b. From the Cluster Interface drop-down list, choose the interface to be used for intra-cluster traffic.
Step 13 Click Next. If you are configuring multiple WNs, a similar screen is shown for each device.
Step 14 Click Finish to save the cluster configuration.
By default, the wizard assigns all the WNs to a default WNG named WNG-Default. You can create
additional WNGs, as described in Adding a New WAAS Node to the Cluster. You can reassign WNs to
different WNGs, as described in Configuring WAAS Node Settings.
To begin traffic optimization with AppNav-XE, enable WAAS service insertion on the AppNav-XE
device interfaces on which you chose to intercept traffic. For more information, see Enabling WAAS
Service Insertion on AppNav-XE Device Interfaces in Chapter 6, “Configuring Network Settings.”
After you create an AppNav Cluster, it is shown in the Manage AppNav Clusters list. For details on
monitoring the cluster, see the Monitoring an AppNav Cluster.
Note The graphical interface wizard is not used to configure interfaces on AppNav-XE ANCs.
The graphical interface wizard appears when you are editing the settings for a WN or ANC in the
AppNav Cluster context.
Note The top two fields, WAAS Node and WAAS Node Group, do not appear when configuring ANC
interfaces.
In the graphical interface view, hover your mouse over a physical or logical interface to see its identifier,
for example, GigabitEthernet 1/0. Port channels, bridge groups, and standby groups are indicated by
colored blocks or dotted outlines. The IP address of each configured physical or logical interface is
shown with a small blue highlight. The legend below the table indicates port channel, bridge group, and
standby interfaces.
Right-click an interface to choose, from the following options (available actions are dependent on the
device and cluster type):
• Edit—Displays a pane where you can edit the interface description, IP address, netmask, and
shutdown status.
• Create PortChannel—Creates a new port channel with this interface. This choice displays a pane
where you can configure the port channel number, description, IP address, netmask, and shutdown
status.
• Create Bridge—To create a new bridge group with this interface. This choice displays a pane where
you can configure the bridge group number and description and enable link state propagation. This
choice appears only when configuring a device for inline interception. A bridge interface consists
of two physical or port-channel interfaces (or one of each)
• Create Standby—Creates a new standby group with this interface. This choice displays a pane where
you can configure the standby group number, description, IP address, netmask, and shutdown status.
• To PortChannel n—Adds this interface to an existing port channel, where n is the port channel
number.
• To Standby n—Adds this interface to an existing standby group, where n is the standby group
number.
• To Bridge n—Adds this interface to an existing bridge group, where n is the bridge group number.
• For standby interfaces (right-click within the standby interface group indicator):
– Edit—Edits the standby group settings, such as the description, IP address, netmask, primary
interface, and shutdown status.
– Delete Standby n—Deletes the standby group.
• For port channel interfaces (right-click within the port channel indicator):
– Edit—To edit the port channel settings such as the port channel number, description, IP address,
netmask, and shutdown status.
– Remove from Standby n—To remove the port channel from standby group n.
– Delete PortChannel n—To delete the port channel.
• For bridge group interfaces (right-click within the bridge group indicator):
– Edit—Edits the bridge group settings, such as the bridge group number, description, and link
state propagation status.
– Delete Bridge n—Deletes the standby group.
To select an interface:
• Individual interface—Click-and-selection is indicated by a blue color.
• Standby group—Click the colored or dotted line indicator (the selection is indicated by a thick
dotted blue outline around all the interfaces in the standby group).
• Port channel or bridge group—Click the colored indicator (the selection is indicated by a thick
dotted blue outline around all the interfaces in the port channel or bridge group).
You can also perform actions by selecting an interface and clicking the following taskbar icons:
• Add (choices differ depending on the selected entity):
– Create PortChannel—Creates a new port channel with this interface.
– Create Bridge—Creates a new bridge group with this interface.
– Create Standby—Creates a new standby group with this interface.
– To PortChannel n—Adds this interface to an existing port channel, where n is the port channel
number.
– To Standby n—Adds this interface to an existing port channel, where n is the port channel
number.
Note If you are using WCCP, the WCCP control messages must pass through the ANC interface that receives
intercepted traffic from the routers. If WCCP control messages are routed to the ANC management
interface, the cluster does not operate.
To configure a class map on a WAAS appliance AppNav cluster, follow these steps:
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Choose Configure > AppNav Cluster > AppNav Class-Map.
The AppNav Class-Maps window appears, listing the existing class maps.
From this window, you can perform the following tasks:
• From the Show drop-down list, filter the class map list as needed. You can use Quick Filter or Show
All Class Maps.
• Edit a class map by selecting it and clicking the Edit taskbar icon.
• Delete one or more class maps by selecting them and clicking the Delete taskbar icon.
• Add a new class map, as described in the steps that follow.
Step 3 Click the Add Class-Map taskbar icon.
Step 4 In the Name field enter a name for the class map, that can contain a maximum of 40 alphanumeric
characters and an underscore.
Step 5 (Optional) In the Description field enter a description for the class map, that can contain a maximum of
200 alphanumeric characters, underscore, and a space.
Step 6 From the Type drop-down list, choose the class map type:
• Application—Matches traffic for a particular application based on source or destination IP addresses
or ports, or all of them, or the Microsoft RPC application identifier (for applications that use
dynamic port allocation). If you choose this option, continue with Step 7.
• Site—Matches traffic from particular WAAS peer devices, for site affinity. If you choose this option,
continue with Step 8.
• Custom—Mixes application and site affinity. Matches traffic for a particular application from one
specific peer WAAS device. If you choose this option, continue with Step 9.
• Any TCP—Matches any TCP traffic as a catch-all classifier. If you choose this type, there are no
other fields to set. Click OK to finish and return to the class maps list.
Note The match conditions shown in the lower part of the pane change depending on the class map
type.
Step 7 (Optional) For an Application class map type, enter one or more match conditions. You can perform the
following tasks in this pane:
• Edit a match condition by selecting it and clicking the Edit taskbar icon.
• Delete one or more match conditions by selecting them and clicking the Delete taskbar icon.
• Add a new match condition, as described in the steps that follow.
Figure 4-9 AppNav Class Map Dialog Box with Add Match Condition List
a. From the Show drop-down list, filter the device list as required, quick filter, show all devices, or
show all assigned devices.
b. Check the box next to each device you want to match traffic from. Check the box next to the column
title to select all the devices and uncheck it to deselect all the devices. If any of the selected devices
is matched, the class is considered matched.
c. Click OK to save the class map and return to the class maps list.
Step 9 (Optional) For a Custom class map type, enter a match condition based on IP address/port or Microsoft
RPC application ID, and choose a WAAS peer device. All the specified matching criteria must be met
for the class to be considered matched. Perform the following steps to create the class map.
a. Enter values in one or more IP address or port fields, or both, to create a condition for a specific type
of traffic. For example, to match all traffic going to ports 5405 to 5407, enter 5405 in the Destination
Port Start field and 5407 in the Destination Port End field. You can use the IP address wildcard fields
to specify a range of IP addresses using a wildcard subnet mask in dotted decimal notation (such as
0.0.0.255 for /24).
Note We strongly recommend that you use the WAAS Central Manager GUI to centrally configure class maps
for your WAAS devices. However, there is one exception to this recommendation. Use the CLI to create
an AppNav class map with a Type of Application or Custom, and whose source or destination address
has one of the following: an IP address ending in “0.0.0” or a non-Class A IP address ending in “0.0”.
b. (Optional) To match Microsoft RPC traffic that uses dynamic port allocation, choose the RPC
application identifier from the Protocol drop-down list. For example, to match Microsoft Exchange
Server traffic that uses the MAPI protocol, choose mapi.
c. Choose a WAAS peer device from the Remote Device drop-down list.
d. Click OK to save the class map and return to the class maps configuration window.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Choose Configure > AppNav Cluster > AppNav Class-Map.
The AppNav Class-Maps window appears, listing the existing class maps.
From this window, you can perform the following tasks:
• From the Show drop-down list, choose a filter setting to filter the class map list as needed. You can
use Quick Filter or Show All Class Maps.
• Edit a class map by selecting it and clicking the Edit taskbar icon.
• Delete one or more class maps by selecting them and clicking the Delete taskbar icon.
• Add a new class map as described in the steps that follow.
Step 3 Click the Add Class-Map taskbar icon.
Step 4 In the Name field, enter a name for the class map. A maximum of 221 characters, excluding space or
question mark (?), can be entered.
Step 5 (Optional) In the Description field, enter a description for the class map. A maximum of 200 characters,
excluding a question mark (?), can be entered.
Step 6 From the Match Type radio buttons, choose match-any or match-all. Match-any means that if any one
of the match conditions is matched, the class is considered matched. Match-all means that all the match
conditions must be matched for the class to be matched.
Step 7 Click the Add Match Condition taskbar icon.
The Match Condition pane appears.
Step 8 From the Match Condition drop-down list, choose the type of match condition you want to create:
• Source/Destination IP—Matches traffic for a particular application based on an access list of source
and/or destination IP addresses and/or ports. Continue with Step 9.
• Protocol—Matches traffic for a particular Microsoft RPC application identifier (for applications that
use dynamic port allocation). Continue with Step 10.
• Peer—Matches traffic from particular WAAS peer devices, for site affinity. Continue with Step 11.
The match conditions shown in the lower part of the pane change depending on the condition type.
Step 9 (Optional) For a Source/Destination IP match condition type, enter one or more access control entries
(ACEs). You can perform the following tasks in this pane:
• Edit an ACE by selecting it and clicking the Edit taskbar icon.
• Delete one or more ACEs by selecting them and clicking the Delete taskbar icon.
• Move one or more selected ACEs to a new position by clicking the Move To taskbar icon. After
moving the ACEs, click Save Moved Rows to save the change.
• Move one or more selected ACEs up or down one position by clicking the Up or Down Arrow
taskbar icons, and then click Save Moved Rows to save the change.
• Save the ACEs that you have moved with the Move To or Up and Down Arrow functions by clicking
the Save Moved Rows taskbar icon.
• Insert a new ACE before the selected row by clicking the Insert taskbar icon. The workflow for
inserting is the same as for adding (described in the following steps).
• Add a new ACE, as described in the steps that follow.
a. Click the Add ACE taskbar icon.
b. From the Action drop-down list, choose Permit or Deny, to determine whether this ACE permits or
denies matched traffic.
c. Enter values in one or more fields to create an ACE for a specific type of traffic. Enter any in the IP
address fields to specify any IP address.
d. Use the IP address wildcard fields to specify a range of IP addresses using a wildcard subnet mask
in dotted decimal notation, for examle, 0.0.0.255 for /24.
e. Use the Source/Destination Port Operator drop-down lists to choose an operator and behavior for
the port fields:
– None—Port field is not used.
– eq—Match requires traffic port to be equal to the Port field.
– gt—Match requires traffic port to be greater than the Port field.
– lt—Match requires traffic port to be less than the Port field.
– neq—Match requires traffic port to be not equal to the Port field.
– Range—Match requires traffic port to be within the range of ports from the Start Port field
through the Port End field.
In the port fields, you can choose the port from a drop-down list or enter a numeric value.
f. Set the differentiated services code point (DSCP) value. Alternatively, select a Precedence value
from the Precedence drop-down list to set the priority.
The DSCP value must be between 0 and 63. Additionally, DSCP names are also allowed.
g. Click OK to save the ACE.
h. Add additional ACEs. Click OK to save the match condition and return to the Match Conditions list.
Step 10 (Optional) For a Protocol match condition type, follow these steps:
a. From the Select Protocol drop-down list, choose the Microsoft RPC application identifier that
identifies the traffic you want to match. For example, to match Microsoft Exchange Server traffic
that uses the MAPI protocol, choose mapi.
b. Click OK to save the match condition and return to the match conditions list.
Step 11 (Optional) For a Peer match condition type, select one or more peer devices. Follow these steps to create
the match condition:
a. From the Show drop-down list, choose a filter to filter the device list as needed. You can use Quick
Filter, Show All Devices, or Show All Assigned Devices.
b. Check the check box next to each device you want to match traffic from. You can check the check
box next to the column title to select all the devices and uncheck it to deselect all devices.
c. Click OK to save the match condition and return to the match conditions list.
Step 12 Click OK to save the class map and return to the Class Maps Configuration window.
To configure AppNav policy rules on a WAAS appliance AppNav cluster, follow these steps:
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Choose Configure > AppNav Cluster > AppNav Policies.
The AppNav Policy window appears.
Step 3 Choose the policy to configure from the AppNav Policy drop-down list at the top.
You can click Manage to create or delete a policy or configure the ANCs to which a policy is applied.
For details see Managing WAAS Appliance Policies.
From the AppNav Policy Rules area, you can perform the following tasks:
• From the Show drop-down list, choose the filter to filter the rule list as needed. You can use a Quick
Filter or Show All Rules.
• Edit a rule by selecting it and clicking the Edit taskbar icon.
• Delete one or more rules by selecting them and clicking the Delete taskbar icon.
• Move one or more selected rules to a new position by clicking the Move To taskbar icon. After
moving the rows, click Save Moved Rows to save the change.
• Move one or more selected rules up or down one position by clicking the Up or Down Arrow
taskbar icons, and then click Save Moved Rows to save the change.
• Insert a new rule before the selected row by clicking the Insert taskbar icon. The workflow for
inserting is the same as for adding (described in the following steps).
• Add a new rule at the end of the list, as described in the steps that follow. (The class-default rule is
always pushed to the last position.)
Step 4 Click the Add Policy Rule taskbar icon.
Step 5 From the AppNav Class-Map drop-down list, choose the class map to which this policy rule applies.
To edit the class map, click Edit. To create a new class map, click Create New. The workflow is the
same, as described in Configuring a WAAS Appliance AppNav Class Map.
Step 6 From the Distribute To drop-down list, choose the distribution action to apply to the class map. The list
includes all the defined WNGs and the various options: (None), for no action, and (Passthrough), to pass
through this type of traffic. The meaning of None is context dependent: in a top-level policy it means
pass-through, if this policy is nested, it means inherit the parent policy rule action.
When you choose a WNG, other settings appear. To create a new WNG, click Create New. The workflow
is the same as that described in Adding a New WAAS Node Group to the Cluster. The newly created
WNG appears in both the Distribute To and Backup drop-down lists.
Step 7 (Optional) From the Backup drop-down list, choose the backup WNG to use for distribution if the
primary WNG is unavailable.
Step 8 (Optional) From the Monitor drop-down list, choose the application accelerator to monitor. When you
monitor an application accelerator, the ANC checks for overload on that application accelerator and does
not send new flows to a WN that is overloaded. If you choose None, a specific application accelerator is
not monitored, only the maximum connection limit of the device is monitored.
Step 9 (Optional) To apply a nested policy within this rule, click Nested Actions (Advanced) to expand this
area.
Step 10 (Optional) From the Nested Policy drop-down list, choose the policy to nest, or choose None to select
no policy. When you choose a policy, the policy rules are displayed in a table.
If there are policies that are ineligible to be specified as a nested policy, click Show Ineligible Policies
to display them and the reasons they are ineligible. A policy is ineligible if it already has a nested policy,
because only one level of nesting is allowed.
To edit the chosen policy, click Edit. To create a new policy for nesting, click Create New. The workflow
for both editing and creating is the same.
a. In the Name field, enter the policy name.
Note If all the AppNav policies have been deleted and you add a new policy rule, the policy rule is added to
a new appnav_default policy, which is created automatically.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Choose Configure > AppNav Cluster > AppNav Policies.
The AppNav Policy window appears.
Step 3 Click the radio button next to the policy you want to configure in the AppNav Policies table at the top
of the window.
In the AppNav Policies table, you can perform the following tasks:
• Use the filter settings in the Show drop-down list to filter the rule list as needed. You can use Quick
Filter or Show All Rules.
• Edit a policy by selecting it and clicking the Edit taskbar icon.
• Delete a policy by selecting it and clicking the Delete taskbar icon.
• Unassign a policy by selecting it and clicking the Unassign Policy taskbar icon.
• Add a policy by clicking the Add Policy taskbar icon.
For details on these tasks see Managing AppNav-XE Policies.
The AppNav Policy Rules table in the lower part of the window shows the selected rules in the AppNav
Policies table. From this table, you can perform the following tasks:
• From the Show drop-down list, choose a filter to filter the rule list as needed. You can use Quick
Filter or Show All Rules.
• Edit a rule by selecting it and clicking the Edit taskbar icon.
• Delete one or more rules by selecting them and clicking the Delete taskbar icon.
• Move one or more selected rules to a new position by clicking the Move To taskbar icon. After
moving the rows, click Save Moved Rows to save the change.
• Move one or more selected rules up or down one position by clicking the Up or Down Arrow
taskbar icons, and then click Save Moved Rows to save the change.
• Insert a new rule before the selected row by clicking the Insert taskbar icon. The workflow for
inserting is the same as for adding (described in the following steps).
• Add a new rule at the end of the list, as described in the steps that follow. (The class-default rule is
always pushed to the last position.)
Step 4 Click the Add Policy Rule taskbar icon.
Step 5 From the AppNav Class-Map drop-down list, choose the class map to which this policy rule applies.
To edit the class map, click Edit. To create a new class map, click Create New. The workflow is the
same as described in Configuring a Class Map on an AppNav-XE Cluster.
Step 6 From the Distribute To drop-down list, choose the distribution action to apply to the class map. The list
includes WNGs and the choices None, for no action, and Passthrough, to pass through this type of traffic.
Here, the meaning of None is the same as Passthrough. For the default policy map, the WNG list includes
the default WNG and any custom WNG that is a part of the assigned context. For a custom policy map,
the WNG list includes default and custom WNGs that are not already assigned to another context.
When you choose a WNG, other settings appear. To create a new WNG, click Create New. The workflow
is the same as described in Adding a New WAAS Node Group to the Cluster. The newly created WNG
appears in the Distribute To drop-down list.
Step 7 (Optional) From the Backup drop-down list, choose the backup WNG to use for distribution if the
primary WNG is unavailable or overloaded.
Note The Backup WNG option is available only for cluster/s that have XE3.13 devices or later.
It is recommended that prior to downgrading the WCM to a release up to 5.2.1, the Backup WNG
must be removed from the AppNav-XE cluster and make sure WCM and AppNav-XE device
configuration is in sync.
Note PreXE3.13 controllers cannot be added to the cluster policy that has been configured with a
backup WNG. A validation message is displayed while adding preXE3.13 controller to a cluster
with backup WNG policy.
A cluster having pre 3.13 devices cannot be configured with backup WNG. The option for
backup WNG will not be visible if the cluster has at least one pre-3.13 XE device.
Note It is recommended that prior to downgrading XE to a Pre XE3.13 release, the Backup WNG must
be removed from the AppNav-XE cluster. Ensure that the WCM and AppNav-XE device
configuration is in sync.
Step 8 (Optional) From the Monitor drop-down list, choose the application accelerator to monitor. When you
monitor an application accelerator, the ANC checks for overload on that application accelerator and does
not send new flows to a WN that is overloaded. If you choose None, a specific application accelerator is
not monitored, only the maximum connection limit of the device is monitored.
Step 9 Click OK to create the policy rule and return to the policy configuration window.
To create or delete AppNav policies or configure the ANCs to which policies apply in a WAAS appliance
AppNav cluster, follow these steps:
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Choose Configure > AppNav Cluster > AppNav Policies.
The AppNav Policy window appears.
Step 3 Choose the policy to view from the AppNav Policy drop-down list at the top.
For details on using the AppNav Policy Rules area see Configuring AppNav Policy Rules on a WAAS
Appliance AppNav Cluster.
Step 4 Click Manage.
From the Manage AppNav Policies pane, you can perform the following tasks:
• From the Show drop-down list, choose a filter to filter the policy list as needed. You can use a Quick
Filter or Show All Policies.
• Edit a policy and configure the ANCs to which it applies by selecting it and clicking the Edit taskbar
icon.
• Delete a policy by selecting it and clicking the Delete taskbar icon.
• Add a new policy, as described in the steps that follow.
Step 5 Click the Add Policy taskbar icon.
Step 6 In the Name field, enter a name for the policy. A maximum of 40 alphanumeric characters, including an
underscore, can be entered.
Step 7 (Optional) In the Description field, enter a description for the policy. A maximum of 200 alphanumeric
characters, including underscore and space, can be entered.
Step 8 (Optional) Check the check box next to each ANC that you want to assign to this policy. To unassign any
assigned devices, uncheck the check box.
Assigning a policy to an ANC makes the policy active on that ANC (only one policy can be active on an
ANC) and removes the association of any previously active policy on that ANC. It is not necessary to
assign a policy to an ANC if you want to create the policy as an alternative. You can assign it to ANCs
later, as required.
Step 9 Click OK to save the policy and return to the Manage AppNav Policies pane.
Step 10 Click Close to return to the policy configuration window.
Step 11 Add policy rules to the new policy as described in Configuring AppNav Policy Rules on a WAAS
Appliance AppNav Cluster.
To restore the default class maps and policy maps to your cluster, click the Restore Default taskbar icon
at the top of the AppNav Policies window. This action removes all the existing class and policy map
configurations and restores the default class and policy maps. All the WAAS nodes assigned to WNGs
are moved to the default WNG, and other WNGs are removed.
To create or delete AppNav policies or unassign a policy from a context in an AppNav-XE cluster, follow
these steps:
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Choose Configure > AppNav Cluster > AppNav Policies.
The AppNav Policy window appears.
Step 3 Click the radio button next to the policy to modify, in the AppNav Policies table at the top of the window.
From the AppNav Policies table, you can perform the following tasks:
• From the Show drop-down list, choose a filter to the rule list as required. You can use Quick Filter
or Show All Rules.
• Edit a policy by selecting it and clicking the Edit taskbar icon.
• Delete a policy by selecting it and clicking the Delete taskbar icon.
• Unassign a policy from a context by selecting it and clicking the Unassign Policy taskbar icon.
Unassigning a policy from a context also disables the context and unassigns all the WNGs from the
context. Click OK again to confirm that you want to proceed.
• Add a new policy, as described in the steps that follow.
For details on using the AppNav Policy Rules area, see Configuring AppNav-XE Policy Rules on an
AppNav-XE Cluster.
Step 4 Click the Add Policy taskbar icon.
Step 5 In the Name field enter a name for the policy. A maximum of up to 227 characters, excluding a space or
question mark (?), can be entered. Do not use a name of the format APPNAV-n-PMAP, which is used for
default policy maps.
Step 6 (Optional) In the Description field, enter a description for the policy. A maximum of up to 200
characters, not including a question mark (?), can be entered.
Step 7 From the Assign to AppNav Context drop-down list, choose the context to which to assign the new
policy.
Assigning the policy to a context makes the policy active on all the ANCs that are a part of the context.
Only contexts that do not already have an assigned policy are listed.
For default policy maps, only one context is displayed, based on the context ID. For example, for
APPNAV-4-PMAP, only waas/4 is displayed (in case it is not already assigned).
Step 8 Click OK to save the policy and return to the AppNav Policies window.
Step 9 Add policy rules to the new policy as described in Configuring AppNav-XE Policy Rules on an
AppNav-XE Cluster.
To restore the default class maps and policy maps to your cluster, click the Restore Default taskbar icon
at the top of the AppNav Policies window. This action removes all the existing class and policy map
configurations and restores the default class and policy maps. All the WAAS nodes assigned to each
context are moved to their respective default WNGs and all the unassigned WNGs are removed.
For information on how to configure the optimization policy, see Chapter 12, “Configuring Application
Acceleration.”
The default optimization policy is listed in Appendix A, “Predefined Optimization Policy.”
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > All AppNav Clusters.
The Manage AppNav Clusters window showing the status of each cluster appears.
From this window, you can perform the following tasks:
• Create a new AppNav Cluster. The workflow is the same as described in Creating a New AppNav
Cluster with the AppNav Cluster Wizard.
• Delete an AppNav Cluster by selecting an AppNav Cluster and clicking the Delete icon in the
taskbar of the Manage AppNav Clusters area.
• View an AppNav Cluster topology and edit its settings as described in the steps that follow.
Step 2 Click the name of the cluster whose settings you want to edit.
The cluster topology diagram appears.
Step 3 Choose Configure > AppNav Cluster > AppNav Cluster.
The Cluster Configuration window appears.
Step 4 In the Name field, enter a new name for the cluster if you want to rename it. (This feature is not available
on AppNav-XE clusters.)
Step 5 (Optional) In the Description field, enter the cluster description. Use only letters and numbers, up to a
maximum of 200 characters. (This feature is not available on AppNav-XE clusters.)
Step 6 (Optional) In the Authentication Key and Confirm Authentication Key fields, enter an authentication key
that is used to authenticate communications between the WAAS devices in the cluster. Use only letters
and numbers, up to a maximum of 64 characters.
Step 7 (Optional) In the Shutdown Wait Time field, enter the number of seconds that the WNs in the cluster
should wait for all the connections to get terminated before shutting down. The default is 120 seconds.
Step 8 (Optional) To configure cluster distribution and off-loading of pass-through connections, expand the
Advanced Settings section by clicking it.
Step 9 (Optional) To enable distribution of traffic from the ANCs in the cluster to WNs, ensure that the Enable
distribution of traffic on AppNav Controllers check box is checked. To disable distribution of traffic,
uncheck this box. When distribution is disabled, the cluster operates in monitoring mode where it
continues to intercept traffic and, instead of distributing it to WNs, passes it through. This mode can be
useful for monitoring traffic statistics without optimizing the traffic. (Not available on AppNav-XE
clusters.)
Step 10 (Optional) To configure offloading of pass-through connections from WNs to ANCs, check the check
boxes in the Enable offload of pass-through connections from WAAS nodes to AppNav Controllers
for following reasons section. This feature allows pass-through connections to be passed through at the
ANC instead of being distributed to the WN and then passed through. Configure pass-through offload as
follows:
a. To offload all pass-through connections, which includes connections passed through due to error
conditions, check the All pass-through connections check box. Check this check box only if you
do not require application visibility on the WNs into pass-through traffic due to error conditions.
The default is unchecked.
b. To offload connections passed through due to missing policy configuration, check the Due to
missing policy configuration check box. By default, it is checked.
c. To offload connections passed through due to the absence of peer WN, check the Due to no peer
WAAS node check box. By default, it is checked.
d. To offload connections passed through due to an intermediate WN, check the Due to intermediate
WAAS node check box. By default, it is checked.
e. If some of the WNs use different pass-through offload settings, you can synchronize the settings on
all the WNs to match the configuration shown here by checking the Synchronize settings on all
devices check box. This check box is shown only if the settings on some WNs are different. The
default is unchecked.
Step 11 Click Submit.
The lower part of this window includes tabs that show lists of the ANCs, WNs, and WNGs that are a part
of the cluster. On AppNav-XE devices, there is an additional AppNav Contexts tab that displays
contexts. The controls in these parts of this window work as described in the following sections:
• AppNav Controllers—Configuring AppNav Controller Settings
• AppNav Contexts—Configuring AppNav Contexts
• WAAS Nodes—Configuring WAAS Node Settings
• WAAS Node Groups—Configuring WAAS Node Group Settings
To configure AppNav Cluster settings for an individual WN, see Configuring AppNav Cluster Settings
for a WAAS Node. If you are using an authentication key to authenticate communications, you must
configure the cluster and each WN with the same key.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the AppNav Controllers tab below the topology diagram.
All the ANCs in the cluster are listed, along with the name, location, IP address, and interface used for
intracluster traffic, and enabled status.
From this list, you can perform the following tasks:
• Edit the interface settings for an ANC by choosing the ANC and clicking the Edit taskbar icon, as
described in the following steps.
• Delete an ANC by choosing the ANC and clicking the Delete taskbar icon.
• Add a new ANC to the cluster by clicking the Add AppNav Controller taskbar icon. See Adding
an ANC to a Cluster.
• Enable a disabled ANC by choosing the cluster and clicking the Enable taskbar icon.
• Disable an ANC by choosing the ANC and clicking the Disable taskbar icon.
Step 3 Click the radio button next to the ANC that you want to edit and click the Edit taskbar icon.
The Edit AppNav Controller pane appears.
Step 4 Configure the internal WAAS node settings:
a. To enable optimization on the ANC, check the Enable WAN optimization (Internal WAAS Node)
check box.
b. If you enabled WAN optimization, from the WAAS Node Group drop-down list, choose the WNG
to which the internal WN should belong.
c. Click Next.
Step 5 (Optional) Configure the WCCP settings for the ANC. This window does not appear if the ANC is
configured for inline interception. For more information on the WCCP fields, see the “Configuring or
Viewing the WCCP Settings on ANCs” section on page 5-22.
When finished with the WCCP settings, click Next.
The graphical interface wizard appears.
Step 6 Configure the interception and cluster interface settings:
a. In the graphical interface view, configure interception interfaces on the AppNav Controller Interface
Module, as required. For details on how to use the wizard, see Configuring Interfaces with the
Graphical Interface Wizard.
b. From the Cluster Interface drop-down list, choose the interface to be used for intracluster traffic.
c. (Optional) To enable swapping of client and WAAS device source IP address fields in intra-cluster
traffic, check the Enable swapping of source IP address in intra-cluster traffic check box.
You may want to enable this option if you are using a port channel for the cluster interface or there
is a load-balancing device between the ANC and WN. This option can improve the load balancing
of the traffic that the ANC distributes to WNs for optimization because it load balances based on the
client IP address rather than the ANC IP address. (For traffic from the server to the client, it swaps
the server IP address with the ANC IP address.) The Central Manager enables this feature
automatically if any existing ANCs have port channel cluster interfaces.
Step 7 Click Finish.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the AppNav Controllers tab below the topology diagram.
All the ANCs in the cluster are listed, along with the name, location, IP address, interface used for
intracluster traffic, and enabled status.
From this list, you can perform the following tasks:
• Edit the interface settings for an ANC by choosing the ANC and clicking the Edit taskbar icon, as
described in the following steps.
• Delete an ANC by choosing the ANC and clicking the Delete taskbar icon.
• Add a new ANC to the cluster by clicking the Add AppNav Controller taskbar icon. See Adding
an ANC to a Cluster.
Step 3 Click the radio button next to the ANC that you want to edit and click the Edit taskbar icon.
The Edit AppNav Controller pane appears.
Step 4 On an AppNav-XE cluster, configure the interception and cluster interface settings:
a. Choose the WAN interfaces on which traffic interception is to be enabled. Interfaces must already
be configured on the AppNav-XE devices; only those on which service insertion can be enabled are
listed.
b. From the Cluster Interface drop-down list, choose the interface to be used for intra-cluster traffic.
Step 5 Click Finish.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the AppNav Contexts tab below the topology diagram.
All the AppNav contexts in the cluster are listed, along with the name, associated WNGs, VRFs, the
AppNav policy, and enabled status.
From this list, you can perform the following tasks:
• Edit a context by choosing the context and clicking the Edit taskbar icon.
• Delete a context by choosing the context and clicking the Delete taskbar icon.
• Enable a disabled context by choosing the context and clicking the Enable taskbar icon.
• Disable a context by choosing the context and clicking the Disable taskbar icon.
• Add a new context as described in the steps that follow. (This feature is not allowed for WAAS
appliance clusters.)
Step 3 Click the Add AppNav Context taskbar icon.
Step 4 From the WAAS Cluster Id drop-down list, choose the cluster ID to assign to this context. The first
available ID is initially selected.
Step 5 (Optional) In the AppNav Policy Name field, specify the name of the AppNav policy to associate with
the cluster. A default suggested policy name initially appears in the field, which you can change if you
want to. If you enter the name of a policy that does not exist, it is created.
Note You cannot specify a name that uses the same form as the default name but with a number that
is different from the context ID, because such names are reserved for the default policy maps
associated with contexts.
Step 6 (Optional) In the WAAS Node Group field, specify the name of the WNG to associate with the context.
A default suggested WNG name initially appears in the field, which you can change if desired. If you
enter the name of a WNG that does not exist, it is created. To associate a WNG with a context, the WNG
must be used in policy rules that are used in the context.
You cannot specify a name that uses the same form as the default name but with a number different than
the context ID, because such names are reserved for the default WNGs associated with contexts.
Step 7 Click Next.
Step 8 Select one or more VRFs to associate with the context. Follow these steps:
a. From the Show drop-down list, choose a filter the VRF list, as required. You can use Quick Filter or
Show All VRFs. The lower part of the pane lists ineligible VRFs, along with the reason why each is
ineligible.
b. Check the check box next to each VRF that you want to associate with the context.
c. Click Next.
Step 9 Choose the WN devices that you want to be a part of the WNG associated with the context:
a. Choose WNs in the WAAS Nodes device list by checking the check box next to the device names.
You can use the filter settings in the taskbar to filter the device list.
If there are devices that are ineligible to join the cluster, click Show Ineligible Devices to see them
and the reasons why they are ineligible. You can use the filter settings to filter the list.
b. Click Next.
Step 10 Configure the cluster interface settings for each WN device in the context.
The Cluster Interface wizard appears, with one screen for each WN in the context:
a. Configure individual interfaces, as required, on the device by using the Graphical Interface wizard.
For details on how to use the wizard, see Configuring Interfaces with the Graphical Interface
Wizard.
b. From the Cluster Interface drop-down list, choose the interface to be used for intra-cluster traffic.
c. Click Next.
If you are configuring multiple WNs, a similar screen is shown for each device.
Step 11 Click Finish to save the context configuration.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the WAAS Nodes tab below the topology diagram.
All the WNs in the cluster are listed, along with the name, location, IP address, interface in use, WNG
to which the node belongs, and enabled status.
From this list, you can perform the following tasks:
• Edit the settings for a WN by choosing the WN and clicking the Edit taskbar icon.
• Delete a WN by choosing the WN and clicking the Delete taskbar icon.
• Add a new WN to the cluster by clicking the Add WAAS Node taskbar icon. See Adding a New
WAAS Node to the Cluster.
• Enable a disabled WN by choosing the node and clicking the Enable taskbar icon.
• Disable a WN by choosing the node and clicking the Disable taskbar icon.
Step 3 Click the radio button next to the WN that you want to edit and click the Edit taskbar icon.
The WAAS Node pane appears.
Step 4 From the WAAS Node Group drop-down list, choose the WNG to which you want to assign the node.
Step 5 In the graphical interface view, configure interfaces on the device, as required. For details on how to use
the wizard, see Configuring Interfaces with the Graphical Interface Wizard.
Step 6 From the Cluster Interface drop-down list, select the interface to be used for intra-cluster traffic.
Step 7 (Optional) To enable swapping of client and WAAS device source IP address fields in intra-cluster
traffic, check the Enable swapping of source IP address in intra-cluster traffic check box. (This
option is not available for WNs used in an AppNav-XE cluster.)
Enable this option if you are using a port channel for the cluster interface or there is a load-balancing
device between the ANC and WN. This option can improve load balancing of the traffic that the ANC
distributes to WNs for optimization because it load balances based on the client IP address rather than
the ANC IP address. (For traffic from the server to the client, it swaps the server IP address with the ANC
IP address.) The Central Manager enables this feature automatically if any existing ANCs have port
channel cluster interfaces.
Step 8 Click OK to save the settings.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the WAAS Node Groups tab below the topology diagram.
All the WNGs in the cluster are listed, along with the name, description, and the WNs contained in the
group. In an AppNav-XE cluster, the list also shows the WAAS cluster ID.
From this list, you can perform the following tasks:
• Edit the settings for a WNG by choosing the WNG and clicking the Edit taskbar icon.
• Delete a WNG by choosing the WNG and clicking the Delete taskbar icon.
• Add a new WNG to the cluster by clicking the Add WAAS Node Group taskbar icon. See Adding
a New WAAS Node Group to the Cluster.
Step 3 Click the radio button next to the WNG that you want to edit and click the Edit taskbar icon.
Step 4 (Optional) In the Description field, enter a description of the WNG, with up to 32 alphanumeric
characters on a WAAS appliance cluster. For an AppNav-XE cluster, you can enter up to 241 characters,
not including a space.
Step 5 Click OK to save the settings.
To associate a newly created WNG with the desired context in an AppNav-XE cluster, you must use it
in the AppNav policy rules of the context. For one or more rules, choose the WNG for the Distribute To
action of the policy rule.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > AppNav Cluster > AppNav Cluster.
The WAAS Node Configuration window appears.
Step 3 (Optional) To enable this WN to handle traffic distributed by the ANC, check the Enable WAAS Node
check box.
Step 4 (Optional) In the Description field, enter the WN description. Use only letters and numbers, up to a
maximum of 200 characters are allowed.
Step 5 (Optional) In the Authentication Key and Confirm Authentication Key fields, enter an authentication key
that is used to authenticate communications between the WN and the ANC. Use only letters and
numbers, up to a maximum of 64 characters.
Step 6 (Optional) In the Shutdown Wait Time field, enter the number of seconds that the WN should wait for
all the connections to be terminated before shutting down. The default is 120 seconds.
Step 7 (Optional) To enable automatic discovery of this WN by the ANC, check the Enable WAAS Node Auto
Discovery check box. (This feature is not used on WNs with WAAS Version 5.1 and earlier.)
This setting is intended to allow an AppNav-XE ANC to discover WNs that are to participate in a cluster
that is created by the CLI and not configured by the Central Manager.
Step 8 From the WAAS Node Auto Discovery Interface drop-down list, choose the WN interface that is to be
used for auto discovery. (This feature is not used on WNs with WAAS version 5.1 and earlier.)
Step 9 Click Submit.
To configure AppNav Cluster settings at the cluster level, see Configuring AppNav Cluster Settings. If
you are using an authentication key to authenticate communications, you must configure the cluster and
each WN with the same key.
Note Do not use both automatic node discovery and the Central Manager to add a WN to an AppNav-XE
cluster. We recommend that you disable automatic node discovery in AppNav-XE and then register the
device and add it to the cluster with the Central Manager.
Step 1 Configure the basic device and network settings on each new ANC, and ensure that the device mode is
set to appnav-controller on a WAAS appliance.
Step 2 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 3 Click the AppNav Controllers tab below the topology diagram.
Step 4 Click the Add AppNav Controller taskbar icon.
The Add AppNav Controllers pane appears.
Step 5 Select the ANC devices to add:
a. Select one or more ANCs in the AppNav Controller device list by checking the check boxes next to
the device names. You can use the filter settings in the taskbar to filter the device list.
If there are devices that are ineligible to join the cluster, click Show Ineligible Devices to see them
and the reasons why they are ineligible. You can use the filter settings to filter the list.
b. Click Next.
Step 6 Configure the interception method, policy, WCCP settings (if using WCCP interception), VRFs, and
interfaces for each ANC device you are adding (different screens and options appear for WAAS
appliance and AppNav-XE clusters):
a. From the Interception Method drop-down list, choose WCCP or Inline. (This feature is not used on
AppNav-XE clusters.)
b. From the AppNav Policy-Map drop-down list, choose the AppNav policy to apply to the ANC. (Not
used on AppNav-XE clusters.)
c. (Optional) To enable optimization on the ANC devices, check the Enable WAN optimization
(Internal WAAS Node) check box. (This feature is not used on AppNav-XE clusters.)
d. (Optional) If you enabled WAN optimization, from the WAAS Node Group drop-down list, choose
the WNG to which the internal WN should belong. (This feature is not used on AppNav-XE
clusters.)
e. Click Next.
f. (Optional) If you chose WCCP interception, configure the WCCP settings on the WCCP settings
pane that appears. For details on WCCP settings, see Configuring or Viewing the WCCP Settings
on ANCs in Chapter 5, “Configuring Traffic Interception.”
Note Remember to check the Enable WCCP Service check box to enable WCCP.
Enable this option if you are using a port channel for the cluster interface or there is a load-balancing
device between the ANC and WN. This option can improve load balancing of the traffic that the
ANC distributes to WNs for optimization because it load balances based on the client IP address
rather than the ANC IP address. (For traffic from the server to the client, it swaps the server IP
address with the ANC IP address.) The Central Manager enables this feature automatically if any
existing ANCs have port channel cluster interfaces.
m. Click Next to save the settings and continue with the next ANC you are adding. If this is the last
ANC being added, click Finish.
After a convergence waiting period of up to two minutes, the new ANCs are available in the cluster for
traffic interception and distribution. Traffic interception on the new ANCs is prevented until the devices
have fully joined the cluster. You can monitor the ANC status as described in Monitoring an AppNav
Cluster.
Step 1 Disable the traffic interception path on the ANC. For an inline ANC, shut down the in-path interfaces,
and for an ANC using WCCP, disable WCCP.
Traffic that was previously routed to this ANC is rerouted to other ANCs in the cluster.
Step 2 Disable the ANC (not necessary on an AppNav-XE cluster):
a. From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
b. Click the AppNav Controllers tab below the topology diagram.
c. Click the radio button next to the ANC that you want to disable and then click the Disable taskbar
icon.
The ANC is disabled and the service unreachable alarm is raised on the other ANCs in the cluster.
To permanently remove the ANC, click the radio button next to the ANC that you want to remove and
then click the Delete taskbar icon.
This action removes the ANC from the ANCG on all the other ANCs and clears the service unreachable
alarm on the other ANCs. If the ANC is configured for WCCP interception, all the WCCP settings on
the device are removed. If the ANC is also configured as a WN, the WN is removed from the cluster.
Step 3 (Optional) Power down the ANC.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the WAAS Nodes tab below the topology diagram.
Step 3 Click the Add WAAS Node taskbar icon.
The Add WAAS Nodes pane appears.
Step 4 Select one or more WNs in the WAAS Nodes device list by checking the check boxes next to the device
names. You can use the filter settings in the taskbar to filter the device list.
If there are devices that are ineligible to join the cluster, click Show Ineligible Devices to see them and
the reasons why they are ineligible. You can use the filter settings to filter the list.
Step 5 Click Next.
Step 6 Configure the WNG and interfaces for each WN device you are adding:
a. From the WAAS Node Group drop-down list, choose the WNG to which you want to add the new
WNs. The list shows only the defined WNGs.
b. Click Next.
c. Use the Cluster Interface Wizard graphical interface to configure the WN interfaces. For details on
using this wizard, see Configuring Interfaces with the Graphical Interface Wizard.
d. From the Cluster Interface drop-down list, select the interface to be used for intra-cluster traffic.
e. (Optional) To enable swapping of client and WAAS device source IP address fields in intra-cluster
traffic, check the Enable swapping of source IP address in intra-cluster traffic check box. (Not
available for AppNav-XE clusters.)
Enable this option if you are using a port channel for the cluster interface, or there is a
load-balancing device between the ANC and WN. This option can improve load balancing of the
traffic that the ANC distributes to WNs for optimization because it load balances based on the client
IP address rather than the ANC IP address. (For traffic from the server to the client, it swaps the
server IP address with the ANC IP address.) The Central Manager enables this feature automatically
if any existing ANCs have port channel cluster interfaces.
f. Click Next to save the settings and continue with the next WN you are adding. If this is the last WN
being added, click Finish.
Step 7 Configure and enable optimization on the WNs. For details on configuring optimization, see Chapter 12,
“Configuring Application Acceleration.”
After a convergence waiting period of up to two minutes, the new WNs are available on all the ANCs
for optimization.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the WAAS Nodes tab below the topology diagram.
Step 3 Choose the node and click the Disable taskbar icon.
This causes a graceful exit of the WN from the cluster. The ANCs stop sending new flows to the WN but
continue to distribute existing flows to it until the connection count reaches zero, or the maximum
shutdown wait time expires.
Note The default shutdown wait time is 120 seconds. You can configure it from the Shutdown Wait
Time field in the AppNav Cluster tab.
Step 4 (Optional) When the graceful exit process on the WN is complete (all existing connections have
terminated), remove the WN from the WNG on the ANCs by choosing the node and clicking the Delete
taskbar icon.
You can monitor the node status in the topology diagram in the upper part of the window. The colored
status light indicator on the device turns gray when the node is no longer processing connections.
Step 5 (Optional) Power down the WN.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the WAAS Node Groups tab below the topology diagram.
Step 3 Click the Add WAAS Node Group taskbar icon.
The Add WAAS Node Group pane appears.
Step 4 In the Name field, enter the name of the WNG. On a WAAS appliance cluster, you can enter up to 32
alphanumeric characters, and on an AppNav-XE cluster, you can enter up to 64 characters, excluding a
space.
Step 5 (Optional) In the Description field, enter a description of the WNG. You can enter up to 200
alphanumeric characters, including ' | \ ; ` on a WAAS appliance cluster. In an AppNav-XE cluster, you
can enter up to 241 characters, excluding a space.
Step 6 Click OK to save the settings.
Step 7 Add one or more WNs to the new WNG. To add a new WN, see Adding a New WAAS Node to the
Cluster, or to reassign an existing WN to the new WNG, see Configuring WAAS Node Settings.
After a convergence waiting period of up to two minutes, the new WNG is available on all the ANCs for
optimization.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Click the WAAS Nodes tab below the topology diagram.
Step 3 Click the radio button next to the node name you want to disable and click the Disable taskbar icon. This
causes a graceful exit of each WN from the cluster.
Step 4 After all WNs have completed a graceful exit from the cluster, click the WAAS Node Groups tab.
You can monitor the node status in the topology diagram in the upper part of the window. The colored
status light indicator on the device turns gray when the node is no longer processing connections.
Step 5 (Optional) Choose the WNG you want to remove, and click the Delete taskbar icon.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
The cluster home window displays the cluster topology and device status (see Figure 4-17).
To zoom in or out on the topology diagram, click the + or – magnifying glass icons in the taskbar. You
can also click on the diagram and drag it within the window to reposition it.
To change the cluster settings, edit any of the fields in the Cluster Settings tab below the topology
diagram and click Submit.
Note On AppNav-XE clusters, the Name and Description fields are not shown.
To see all the AppNav contexts, click the AppNav Contexts tab below the diagram. From this tab, you
can edit, delete, add, enable, or disable an AppNav context. This tab is not shown on WAAS appliance
clusters.
To see all the ANCs, click the AppNav Controllers tab below the diagram. From this tab, you can edit,
delete, add, enable, or disable an ANC in the cluster.
To see all the WNs, click the WAAS Nodes tab below the diagram. From this tab, you can edit, delete,
add, enable, or disable a WN in the cluster.
To see all the WNGs, click the WAAS Node Groups tab below the diagram. From this tab, you can edit,
delete, or add a WNG in the cluster.
The overall cluster status is shown in the top left corner of the diagram, as follows:
• Green—All the ANCs are operational with no error conditions.
• Yellow—Degraded because one or more ANCs have operational issues. This is also the initial state
before all the nodes have sent status updates.
• Red—Cluster is down because all the ANCs are down, or indicates a split cluster where there is no
connectivity between one or more ANCs.
The overall cluster status does not include administratively disabled ANCs.
The colored status light indicators on each device and dotted lines around each WNG show the status of
the device or group:
• Green—Operational with no error conditions
• Yellow—Degraded (overloaded, joining cluster, or has other noncritical operational issues)
• Red—Critical (one or more processes is in a critical state)
• Gray—Disabled
• Black—Unknown status
The colored lines between each device show the status of the link between devices:
• Green—Operational with no error conditions
• Red—Link is down
• Black—Unknown status
A red plus symbol is shown on the upper right corner of any device that is added to an AppNav-XE
cluster by automatic node discovery. The cluster configuration of such a device is not being managed by
the Central Manager and you should verify that its configuration is correct. Additionally, statistics from
the device are not aggregated in any Central Manager reports if the device is not registered to the Central
Manager; if the device is registered to the Central Manager, its optimization (but not AppNav) statistics
are included in Central Manager reports.
Note Do not use both automatic node discovery and the Central Manager to add a WN to an AppNav-XE
cluster. We recommend that you disable automatic node discovery in AppNav-XE and then register the
device and add it to the cluster with the Central Manager. For details on configuring auto discovery, see
Configuring AppNav Cluster Settings for a WAAS Node.
An orange triangle warning indicator is shown on any device for which the Central Manager may
not have current information because the device has not responded within the last 60 seconds (the device
could be offline or unreachable).
Note A recently removed device still appears in the topology diagram for a few minutes until all the devices
agree on the new cluster topology.
To view a more comprehensive device status display, hover your cursor over a device icon to see the
360-degree Network Device View dialog box (Figure 4-18). (The dialog box for a WN device is similar.)
The 360-degree Network Device View shows the following status information:
• Device name and IP address.
• Device type and software version.
• (ANC only) Interception tab that displays the interception method for a WAAS appliance (Inline or
WCCP). For inline, this tab shows the bridge groups defined for interception, their member
interfaces, and their status. For WCCP, this tab lists the defined WCCP service IDs, their associated
client IP addresses, router IP address, and notes about problems. For an AppNav-XE device, this tab
shows the router interfaces on which interception is enabled and their status.
• (ANC only) Overloaded Policies tab that lists monitored AppNav policies that are overloaded. (Not
shown on AppNav-XE devices.)
• (ANC only) Cluster Control tab that lists all the devices in the cluster,along with device name, IP
address, service type, liveliness state, and reason for any error condition.
• (WN only) Optimization tab that lists the application accelerators and their status.
• Alarms tab that lists pending alarms on the device. (Not shown on AppNav-XE devices.)
• Interfaces tab that lists the device interfaces and status. You can filter the list by choosing a filter
type from the drop-down list above the interface list, entering filter criteria, and clicking the filter
icon.
You can pin the status dialog box so it stays open by clicking the pin icon in the upper right corner. You
can also drag the dialog box to any location within your browser window.
For additional cluster status, you can view the Monitor > AppNav > AppNav Report, as described in
the AppNav Report in Chapter 16, “Troubleshooting Your WAAS Network.”
If you have multiple AppNav Clusters, you can see the brief status for all of them at once by choosing
AppNav Clusters > All AppNav Clusters from the menu.
To trace connections in a WAAS appliance cluster, see AppNav Connection Tracing.
To view connection statistics in an AppNav-XE cluster, see AppNav Connection Statistics.
For additional advanced AppNav troubleshooting information, see Troubleshooting AppNav in the Cisco
WAAS Troubleshooting Guide for Release 4.1.3 and Later.
Note You may see a taskbar icon named Force Settings on all the Devices in a Group if the configuration
across all the ANCs in the cluster becomes unsynchronized. If you see the icon, it means that the cluster
settings, ANC configuration, WN configuration, and WNG configuration do not match on all the ANCs
in the cluster. This problem can occur if you configure a device outside the Central Manager by using
the CLI. Click this taskbar icon to update all the devices with the configuration that is currently shown
in the Central Manager for the cluster.
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
Step 2 Choose Monitor > Tools > Connection Trace.
Step 3 From the AppNav Controller drop-down list, choose the ANC that has the connection that you want to
trace.
Step 4 From the Site (Remote Device) drop-down list, choose the peer WAAS device at the remote site.
Step 5 In one or more of the Source IP, Source Port, Destination IP, and Destination Port fields, enter matching
criteria for one or more connections.
Step 6 Click Trace to display the connections that match the IP address and port criteria.
Connections are displayed in the Connection Tracing Results table below the fields. Use the filter
settings in the Show drop-down list to filter the connections, as required. You can use Quick Filter to
filter on any value or Show All Connections.
You can display flow distribution information from the CLI by using the show appnav-controller
flow-distribution EXEC command.
Another troubleshooting tool that you can use to trace connections on a WAAS appliance AppNav cluster
is the WAAS Tcptraceroute tool. For details, see Using WAAS TCP Traceroute in Chapter 16,
“Troubleshooting Your WAAS Network.”
Step 1 From the WAAS Central Manager menu, choose AppNav Clusters > cluster-name.
You can display connection statistics from the CLI by using the show service-insertion statistics
connection EXEC command.
This chapter describes how to configure interception of TCP traffic in an IP-based network, based on the
IP and TCP header information, and how to redirect the traffic to Cisco Wide Area Application Services
(WAAS) devices. This chapter describes the use of the Web Cache Communication Protocol (WCCP),
policy-based routing (PBR), inline mode for transparent redirection of traffic to Cisco Wide Area
Application Engines (WAEs), appnav-controller mode for use with an AppNav Controller.
Note Throughout this chapter, the term WAAS device is used to refer collectively to the WAAS Central
Managers and WAEs in your network. The term WAE refers to WAE and Cisco Wide Area Virtualization
Engine (WAVE) appliances, WAE Network Modules (the NME-WAE family of devices), SM-SRE
modules running WAAS, and vWAAS instances.
Method Description
WCCP Used for transparent interception of application traffic and Common Internet File
Version 2 System (SMB) traffic. Used in branch offices and data centers to transparently redirect
traffic to the WAAS devices. The traffic is transparently intercepted and redirected to
the local WAE or ANC by a WCCP-enabled router or a Layer 3 switch.
You must configure WCCP on the router and WAE in the branch office and the router
and WAE in the data center. For more information, see the following sections:
• Overview of WCCP Interception
• Configuring Advanced WCCP Features on Routers
• Configuring WCCP on WAEs
PBR Used in branch offices used for wide area application optimization. The branch office
router is configured to use PBR to transparently intercept and route both client and
server traffic to the WAE that resides in the same branch office.
In data centers, used for data center application optimization. The data center router
or Layer 3 switch can be configured to use PBR to transparently intercept and route
client and server traffic to WAEs within the data center. PBR, however, does not
support load balancing across multiple WAEs, such as WCCP does. PBR does not
support load balancing when you use a hardware load balancer, such as the Cisco CSM
or Cisco ACE. See Using Policy-Based Routing Interception.
Inline The WAE physically and transparently intercepts traffic between the clients and the
router. To use this mode, you must use a WAAS device with the Cisco WAE Inline
Network Adapter, Cisco Interface Module, or Cisco AppNav Controller Interface
Module. See Using Inline Mode Interception.
vPATH
Note WAAS versions 6.0 and above use either the WCCP or AppNav traffic
interception methods. WAAS versions 5.5.1 and lower use WCCP,
AppNav, or vPATH traffic interception methods.
Method Description
AppNav For WAEs that are part of an AppNav deployment and are configured as WAAS nodes
Controller in an AppNav Cluster, you must configure them to use the appnav-controller
interception method. This configuration allows WAEs to receive and optimize traffic
that is intercepted and distributed by the AppNav Controllers. See Configuring
AppNav Interception.
ACE or CSM Cisco Application Control Engine (ACE) or Catalyst 6500 series Content Switching
Module (CSM) installed in the data center for data center application optimization.
The ACE or CSM allows for both traffic interception and load balancing across
multiple WAEs within the data center.
Note If you use Microsoft System Center Configuration Manager with Preboot Execution
Environment (SCCM/PXE), we recommend the following configurations for the ports that carry
SCCM/PXE traffic: port 80, port 443, and port 445:
— port 80—Communicates with the distribution point. Configure for pass-through traffic.
— port 443—Communicates with the distribution point. Configure for pass-through traffic.
— port 445—Used for software package distribution data transfer. Configure for traffic
optimization.
Without these configurations you may see the error message “PXE error code 80070056.”
WAAS software supports the WCCP TCP promiscuous mode service (services 61 and 62 by default,
though these service IDs are configurable). This WCCP service requires that WCCP Version 2 is running
on the router and the WAE.
The TCP promiscuous mode service is a WCCP service that intercepts all TCP traffic and redirects it to
the local WAE.
The WAAS software also supports service passwords, WAE failover, and interception ACLs.
Many Cisco routers and switches can be configured and enabled with WCCP Version 2 support for use
with WAAS devices.
Many legacy Cisco routers, including the 2500, 2600, and 3600 routers, have far less processing power
and memory than newer routing platforms, such as the Integrated Services Router (ISR) models 2800
and 3800. As such, the use of WCCPv2 or PBR may cause a high level of CPU utilization on the router
and cause erratic behavior. WAAS can be configured to work with these routers, but not to the same
levels of performance or scalability as can be found with newer routing platforms. The Cisco ISR is the
routing platform of choice for the branch office.
If you are experiencing erratic behavior, such as the WAE being ejected from the service group, enable
fair queuing, weighted fair queuing, or rate limiting on all physical interfaces on the router that connect
to users, servers, WAEs, and the WAN. Fair queuing cannot be configured on subinterfaces, and should
be configured on both ingress and egress physical interfaces. If another form of queuing is already
configured on the LAN or WAN interfaces other than fair queuing, and provides similar fairness, it
should be sufficient.
Additionally, limit the amount of bandwidth that can be received on the LAN-side interface of the router,
to help the router keep its interface queues less congested and provide better performance and lower CPU
utilization. Set the maximum interface bandwidth on the router to no more than 10 times the WAN
bandwidth capacity. For instance, if the WAN link is a T1, the LAN interface and WAE LAN interface
bandwidth should be throttled to 10 * T1 = 10 * 1.544 Mbps, or approximately 15 Mbps. See the
Cisco IOS documentation for more information.
This section contains the following topics:
• Guidelines for Configuring WCCP
• Guidelines for File Server Access Methods
We recommend that you use the WAAS CLI to complete the initial basic configuration of WCCP on
your first branch WAE and data center WAE, as described in the Cisco Wide Area Application
Services Quick Configuration Guide. After you have verified that WCCP transparent redirection is
working properly, you can use the WAAS Central Manager to modify this basic WCCP
configuration or configure additional WCCP settings, for example, load balancing, for a WAE. For
more information, see Configuring WCCP on WAEs. After you have configured basic WCCP on the
router, you can configure advanced WCCP features on the router, as described in Configuring
Advanced WCCP Features on Routers.
• To ensure consistency among WAEs, we recommend that you configure WCCP settings on one
device and then use the Copy Settings taskbar icon from within the WCCP configuration window
to copy the settings to other devices in your network. You should copy the settings only to the WAEs
in the same WCCP service farm, AppNav Controller group (ANCG), or WAAS node group (WNG),
because WCCP settings may have to be different in different farms or service groups.
• When you add a new router to an existing WCCP router farm or WCCP service group, the new router
will reset existing connections. Until WCCP re-establishes path redirections and assignments,
packets are sent directly to the client (as expected).
• The router must support the redirect and return methods configured on the WAE. If the router does
not support the configured methods, the WAE will not join the WCCP router farm. If you have a mix
of routers in the farm, only those routers that support the configured methods will join the farm.
• The WAE joins the WCCP farm only if the assignment method configured on the WAE is supported
by the router. (The strict assignment method is always enforced with Version 4.4.1 and later.)
• A WAE joins a WCCP farm only if it is seen by all the configured routers in the farm. If there is a
link failure in any one of the routers, the farm reconfigures, and the WAE is removed from the farm.
• All the WAEs in a WCCP farm must use the same pair of WCCP service IDs (the default is 61 and
62), and these IDs must match all the routers that are supporting the farm. A WAE with different
WCCP service IDs is not allowed to join the farm, and an alarm is raised. Likewise, all the WAEs
in a farm must use the same value for failure detection timeout. A WAE raises an alarm if you
configure it with a mismatching value.
• Virtual routing and forwarding-aware (VRF) WCCP scalability is as follows:
– The maximum number of WAEs supported by a single VRF instance is 32.
– The maximum number of VRF instances supported by the router is router dependent.
– VRF-aware WCCP is supported only on specific releases of Cisco IOS software. Ensure that the
router is running a release of Cisco IOS software that supports VRF-aware WCCP.
– Each VRF instance has independent assignment, redirection, and return methods.
• In a WAAS AppNav deployment, enable WCCP only on the ANC devices that are intercepting
traffic and distributing it to the optimizing WAAS nodes (WNs). Configure WNs that are a part of
the AppNav Cluster, with the appnav-controller interception method.
• To reduce the number of dropped packets in a network where WCCP L2 is deployed, we recommend
that you configure the maximum segment size (MSS) to 1406 bytes on the WNs using the WAAS
Central Manager. For more information on modifying MSS, see Modifying the Acceleration TCP
Settings in Chapter 12, “Configuring Application Acceleration.”
Note Before you perform the procedures in this section, you should have configured your router for basic
WCCP as described in the Cisco Wide Area Application Services Quick Configuration Guide.
Internet
4
159091
1 2 3
If you have a group of branch WAEs, the WAE that is seen by all the WCCP Version 2-enabled routers,
and that has the lowest IP address, becomes the lead branch WAE.
The following procedure describes how a branch WAE in a service group is designated as the lead:
1. Each branch WAE is configured with a list of WCCP-enabled routers.
Multiple WCCP-enabled routers can service a group (up to 32 routers can be specified). Any of the
available routers in a service group can redirect packets to each of the branch WAEs in the group.
2. Each branch WAE announces its presence to each router on the router list. The routers reply with
their view of branch WAEs in the service group.
3. After the view is consistent across all of the branch WAEs in the group, one branch WAE is
designated as the lead branch WAE and sets the policy that the WCCP-enabled routers need to
deploy in redirecting packets.
The lead branch WAE determines how traffic should be allocated across the branch WAEs in the group.
The assignment information is passed to the entire service group from the designated lead branch WAE
so that the WCCP-enabled routers of the group can redirect the packets, and the branch WAEs in the
group can better manage their load.
WCCP uses service groups to define WAAS services for a WCCP Version 2-enabled router and
branch WAEs in a group. WCCP also redirects client requests to these groups in real time.
All the ports receiving redirected traffic that are configured as members of the same WCCP service
group share the following characteristics:
• They have the same hash or mask parameters, as configured with the WAAS Central Manager
(Configuring or Viewing the WCCP Settings on WAEs) or the WAAS CLI (the wccp
service-number mask global configuration command).
• The WCCP Version 2 service on individual ports cannot be stopped or started individually (a WCCP
Version 2 restriction).
Note We recommend that you use redirect lists on the WCCP-enabled router where possible, because that is
the most efficient method to control traffic interception. However, you can also configure static bypass
lists or interception ACLs on the WAEs, and of these two, we recommend that you use interception ACLs
because they are more flexible and give better statistics about passed-through connections. For
information about how to configure an interception ACL for a WAE, see Configuring Interception
Access Control Lists. For information about how to configure a static bypass list, see Configuring Static
Bypass Lists for WAEs. You can also configure interface ACLs on WAEs to control access to the WAE,
as described in Chapter 9, “Creating and Managing IP Access Control Lists for Cisco WAAS Devices.”
Redirect lists that are configured on the routers have the highest priority, followed by static bypass lists
or interception ACLs on WAEs. Interception ACLs that are configured on WAEs take precedence over
application definition policies that have been defined on the WAE.
A WCCP Version 2-enabled router can be configured with access lists to permit or deny redirection of
TCP traffic to a WAE. The following example shows that traffic conforming to the following criteria are
not redirected by the router to the WAE:
• Originating from the host 10.1.1.1 destined for any other host
• Originating from any host destined for the host 10.255.1.1
Router(config)# ip wccp 61 redirect-list 120
Router(config)# ip wccp 62 redirect-list 120
Router(config)# access-list 120 deny ip host 10.1.1.1 any
Router(config)# access-list 120 deny ip any host 10.1.1.1
Router(config)# access-list 120 deny ip any host 10.255.1.1
Router(config)# access-list 120 deny ip host 10.255.1.1 any
Router(config)# access-list 120 permit ip any
Traffic that is not explicitly permitted is implicitly denied redirection. The access-list 120 permit ip any
command explicitly permits all traffic (from any source on the way to any destination) to be redirected
to the WAE. Because criteria matching occurs in the order in which the commands are entered, the global
permit command is the last command entered.
To limit the redirection of packets to those packets matching an access list, use the ip wccp redirect-list
global configuration command. Use this command to specify which packets should be redirected to the
WAE.
When WCCP is enabled, but the ip wccp redirect-list command is not used, all the packets matching
the criteria of a WCCP service are redirected to the WAE. When you specify the ip wccp redirect-list
command, only packets that match the access list are redirected.
The ip wccp global configuration command and the ip wccp redirect interface configuration command
are the only commands required to start redirecting requests to the WAE using WCCP. To instruct an
interface on the WCCP-enabled router to check for appropriate outgoing packets and redirect them to a
WAE, use the ip wccp redirect interface configuration command. If the ip wccp command is enabled,
but the ip wccp redirect command is disabled, the WCCP-enabled router is aware of the WAE, but does
not use it.
To specify the access list by name or number, use the ip wccp group-list global configuration command,
which defines criteria for group membership. In the following example, the access-list 1 permit
10.10.10.1 command is used to define the IP address of the WAE that is allowed to join the WCCP
service group:
Router(config)# ip wccp 61 group-list 1
Router(config)# ip wccp 62 group-list 1
Router(config)# access-list 1 permit 10.10.10.1
Tip If you have a WCCP service farm with multiple WAEs, the load-balancing assignment may cause
packets that are sent to the WAE devices themselves (such as management traffic) to be redirected to a
different WAE in the farm, negatively impacting performance. To avoid this situation, we recommend
that you configure a WCCP redirect list that excludes traffic that is sent to the WAE IP addresses from
being redirected.
For more information on access lists, see the Cisco IOS IP addressing and services documentation.
The required password argument is the string that directs the WCCP Version 2-enabled router to apply
MD5 authentication to messages received from the specified service group. Messages that are not
accepted by the authentication are discarded. 0-7 is the optional value that indicates the HMAC MD5
algorithm used to encrypt the password. This value is generated when an encrypted password is created
for the WAE. 7 is the recommended value. The optional password argument is the optional password
name that is combined with the HMAC MD5 value to create security for the connection between the
router and the WAE.
For information about how to use the WAAS Central Manager to specify the service group password on
a WAE, see Configuring or Viewing the WCCP Settings on WAEs.
The following example configures the loopback interface, exits configuration mode, and saves the
running configuration to the startup configuration:
Router(config)# interface Loopback0
Router(config-if)# ip address 111.111.111.111 255.255.255.0
Router(config-if)# no shutdown
Router(config-if)# end
Router# copy running-config startup-config
Note Before you perform the procedures in this section, you should have completed an initial configuration
of your WAAS network, which includes the basic configuration of WCCP Version 2 and the TCP
promiscuous mode service on your routers and WAEs, as described in the Cisco Wide Area Application
Services Quick Configuration Guide.
Note In a WAAS AppNav deployment, only ANCs are included in the service group and are load balanced by
the routers. The routers do not send traffic to the optimizing WAEs (WNGs); instead, ANCs distribute
traffic to the optimizing WNGs.
You can use load balancing to balance the traffic load across multiple WAEs. Load balancing allows the
set of hash address buckets assigned to a WAE to be adjusted, shifting the load from an overwhelmed
WAE to other WAEs that have available capacity. Two assignment methods are used by this technique:
hashing and masking.
Assignment method denotes the method used by WCCP to perform load distribution across WAEs. The
two possible load-balancing assignment methods are hashing and masking. If the mask load-balancing
method is not specified, then the hash load-balancing method, which is the default method, is used.
Note In a WAAS AppNav deployment, only the mask assignment method is supported and is the default.
WCCP supports redirection based on a hash function. The hash key may be based on the source or
destination IP address of the packet. For WAAS, load-balancing hashing is based on a source IP address
(default), a destination IP address, or both.
The hash function uses the source IP address to obtain an address bucket to which the packet is assigned.
These source address buckets are then mapped to a particular WAE depending on how many WAEs are
present and how busy they are. (See Figure 5-2.)
32-bit IP addresses
4 billion 0
Hash
WCCP Version 2-
enabled router
Note Packets that the WAEs do not service are tunneled back to the same router from which they were
received. When a router receives a formerly redirected packet, it knows that it should not redirect it
again.
Destination IP address hashing guarantees that a single WAE caches a given file server. This method,
which allows a local coherency directive to be safely applied to the file server content (provided that no
other collaboration on the content occurs), improves performance and WAN link and disk utilization.
This method may distribute the load unevenly because of uneven activity on a file server.
Source IP address hashing has better potential for session distribution between the caches on
branch WAEs. This method may impact performance and WAN link and disk utilization (see the
previous description of factors to be aware of when load balancing is applied). Also, any change in the
IP address of a client (which can happen when working in DHCP environments) may cause the client to
switch to another branch WAE, which can cause the client to experience reduced performance until the
client’s working set is retrieved into the new cache.
Hashing that is based on a client IP address does not guarantee any locality of the hash key. For example,
clients from the same subnet (which are likely to share and collaborate on the same content) may be
assigned two different hash numbers and may be redirected to different branch WAEs, while clients from
different subnets may be assigned the same hash number and may be redirected to the same branch WAE.
Hashing that is based on a client IP address does guarantee consistency. For example, a client using the
same IP address is redirected to the same branch WAE.
In the service farm, a lead WAE is chosen to build the hash table that distributes the load between the
available WAEs. The lead WAE distributes the buckets evenly. The source IP address is hashed and the
resulting bucket determines the WAE that will handle the packet.
WCCP supports redirection by mask value assignments. This method relies on masking to make
redirection decisions. The decisions are made using special hardware support in the WCCP-enabled
router. This method can be very efficient because packets are switched by the hardware.
Note The masking method can only be used for load balancing with the Catalyst 3750, Catalyst 4500, and
Catalyst 6500 Series Switches, Cisco 7600 Series Routers, and Cisco ASR 1000 Aggregation Series
Routers. And, the masking method can be used with the Cisco 2800, 3800, and 7200 Series Routers when
they are running Cisco IOS Release 12.4(20)T or later releases.
You must explicitly specify masking. You can specify two mask values based on the source or destination
IP address of the packet. For WAAS, the default mask value is based on the source IP address. You can
enable masks by using the default values or specifying a particular mask. The default mask values,
specified in hexadecimal notation, are as follows:
• dst-ip-mask= 0x0
• src-ip-mask= 0xF00
You can specify the mask value with a maximum of seven bits. The WAE creates a table of the 2 7 (or
128) combinations, assigns the WAE IP addresses to them, and sends this table to a WCCP-enabled
router. The router uses this table to distribute the traffic among all the WAEs that are in the service group.
Each packet that matches the WCCP service parameters is compared to this table and the packets are
sent to the matching WAE.
In a service farm where the WAEs have different masks, the first WAE to establish two-way
communication with the routers determines the farm’s mask. All the other WAEs cannot join the farm
unless they are configured with the same mask.
Masking is typically used at the data center, where you can take advantage of the hardware-accelerated
WCCP redirection capabilities of switches, such as the Catalyst 6500 Series Switches. At the data center,
the load balancing goal should be to have all the connections originating from a given client subnet
(typically equivalent to a branch) go to one data center WAE, in order to improve data redundancy
elimination (DRE) compression performance. Also, mask assignment on the Catalyst 6500 series
switches uses the ACL Ternary Content Adjustable Memory (TCAM). When combined with WCCP
redirect lists, mask assignment can use a large portion of the TCAM. To minimize TCAM usage, use a
mask with fewer care bits.
Given these considerations, beginning with WAAS Version 4.2.1, the default mask has been changed
from src-ip-mask 0x1741 and dst-ip-mask 0x0 (in 4.1x versions) to src-ip-mask 0xF00 and
dst-ip-mask 0x0 (in 4.2.1 and later versions). The current source IP mask uses only four care bits rather
than the six care bits used by the old mask.
With a typical data center WCCP interception configuration (ingress interception with service 61 on the
WAN, ingress interception with service 62 on the LAN), this mask load balances /24 branch subnets (it
extracts the last 4 bits of /24 subnets). Connections from one branch subnet will be pinned to one data
center WAE. If your network has a different distribution of IP addresses, for example, /16 subnets, you
should configure a mask that extracts bits from the /16 network part of the address, for example,
src-ip-mask 0xF0000. Similarly, if some branches generate more traffic than others, you may want to
create a mask that also extracts bits from the host part of the address, for example, 0xF03.
The redirection mode is controlled by the branch WAE. The first branch WAE that joins the WCCP
service group decides the forwarding method (GRE or Layer 2 redirection) and the assignment method
(hashing or masking). The term mask assignment refers to WCCP Layer 2 Policy Feature Card 2 (PFC2)
input redirection.
If masking is selected with WCCP output redirection, the branch WAE falls back to the original hardware
acceleration that is used with the Multilayer Switch Feature Card (MSFC) and the Policy Feature Card
(PFC).
For example, WCCP filters the packets to determine which redirected packets have been returned from
the branch WAE and which ones have not. WCCP does not redirect the ones that have been returned
because the branch WAE has determined that the packets should not be processed. WCCP Version 2
returns the packets that the branch WAE does not service to the same router from which they were
transmitted.
This section contains the following topics:
• Reasons for Packet Rejection and Return
• Layer 3 GRE as a Packet-Forwarding Method
• Layer 2 Redirection as a Packet-Forwarding Method
Note The packets are redirected to the source of the connection between the WCCP-enabled router and the
branch WAE. Depending on the Cisco IOS software version used, this source could be either the address
of the outgoing interface or the router IP address. In the latter case, it is important that the branch WAE
has the IP address of the WCCP-enabled router stored in the router list. For more information on router
lists, see Configuring and Viewing WCCP Router Lists for WAEs.
Cisco Express Forwarding (CEF) is required for WCCP and must be enabled on the router.
WCCP also allows you to configure multiple routers in a router list to support a particular WCCP service
(for example, SMB redirection).
– If the WAE decides to accept the request, it sends a TCP SYN ACK packet to the client. In this
response packet, the WAE uses the IP address of the original destination (origin server) that was
specified as the source address so that the WAE can be invisible (transparent) to the client; it
pretends to be the destination that the TCP SYN packet from the client was trying to reach.
– If the WAE decides not to accept the request, it re-encapsulates the TCP SYN packet in GRE,
and sends it back to the WCCP-enabled router. The router understands that the WAE is not
interested in this connection and forwards the packet to its original destination (that is, the
origin server).
Note WCCP is licensed only on the WAE and not on the redirecting router. WCCP does not interfere with
normal router or switch operations.
Note Before you perform the procedure in this section, you should have already completed a basic WCCP
configuration for your WAAS network that includes the configuration of the TCP promiscuous mode
service, as described in the Cisco Wide Area Application Services Quick Configuration Guide.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Interception > Interception Configuration. The Interception Configuration
window appears. (See Figure 5-3.)
Note If you are configuring a device using a WAAS version earlier than 5.0, choose Configure >
Interception > WCCP > Settings to configure WCCP settings. The configuration window looks
different, but has similar settings.
By default, WCCP is disabled on a WAE. However, as part of the initial configuration of WCCP in your
WAAS network, you should have enabled WCCP Version 2 on your WAEs (the branch WAE and the data
center WAE) as well as on the routers in the data center and branch office that will be transparently
redirecting requests to these WAEs. For information about how to perform a basic WCCP configuration
in your WAAS network, see the Cisco Wide Area Application Services Quick Configuration Guide.
Step 4 From the Interception Method drop-down list, choose wccp to enable the WCCP interception method.
If you change this setting from any setting other than None, click Submit to update the window with the
proper fields for configuring WCCP. (The Interception Method drop-down list is not displayed for
devices using WAAS versions earlier than 5.0.)
Step 5 Check the Enable WCCP Service check box to enable WCCP Version 2 on the chosen device, or
uncheck the check box to disable WCCP on the chosen device.
Note Ensure that the routers used in the WCCP environment are running a version of the Cisco IOS
software that also supports the WCCP Version 2.
Note If you use the Central Manager to disable WCCP on a WAAS device, the Central Manager
immediately shuts down WCCP and closes any existing connections, ignoring the setting
configured by the wccp shutdown max-wait global configuration command. To gracefully shut
down WCCP connections, use the no enable WCCP configuration command on the WAAS
device.
Step 6 In the Service ID1 field, specify the first service ID of the WCCP service pair. After you submit, the
Service ID2 field is filled in with the second service ID of the pair, which is one greater than Service
ID1. For WAEs with Version 4.4.1 or later, you can change the WCCP service IDs from the default of
61/62 to a different pair of numbers, which allows a router to support multiple WCCP farms because the
WAEs in different farms can use different service IDs. (The Service ID fields are not shown for devices
using WAAS versions earlier than 4.4 and the service IDs are fixed at 61/21.)
The router service priority varies inversely with the service ID. The service priority of the default service
IDs 61/62 is 34. If you specify a lower service ID, the service priority is higher than 34; if you specify
a higher service ID, the service priority is lower than 34.
Step 7 Check the Use Default Gateway as WCCP Router check box to use the default gateway of the WAE
device as the router to associate with the WCCP TCP promiscuous mode service. Alternatively, uncheck
this check box and specify a list of one or more routers by their IP addresses, separated by spaces. The
Central Manager assigns the router list number, which is displayed next to the router list field after the
page is submitted. As part of the initial configuration of your WAAS network, you may have already
created a WCCP router list with the setup utility, as described in the Cisco Wide Area Application
Services Quick Configuration Guide. For more information about WCCP router lists, see Configuring
and Viewing WCCP Router Lists for WAEs.
Note Checking or unchecking the Use Default Gateway as WCCP Router check box, changing the
router list, or submitting the WCCP page removes existing router lists, if any, that are not
assigned to the WCCP service, including router lists configured by the setup utility or through
the CLI.
Step 8 (Optional) To force WCCP to use only the configured assignment method, check the Only Use Selected
Assignment Method check box. You can specify only one load-balancing method (hashing or masking)
per WCCP service in a branch WAE service group. (This check box is shown only for devices using
WAAS versions earlier than 4.4.)
Note If you check the Only Use Selected Assignment Method check box, the WAE only joins a
WCCP farm if the assignment method configured on the WAE is supported by the router. If you
do not check the Only Use Selected Assignment Method check box, the WAE uses the
assignment method that the router supports, even if the WAE is configured differently from the
router.
Step 9 (Optional) From the Assignment Method drop-down list, choose the type of WAE load-balancing
assignment method to use:
• Choose Hash to use the hash method (the default for devices using WAAS versions earlier than 5.0).
Perform Step 10 and Step 11 to define how the hash works, and skip to Step 13 because the mask
settings are not used.
• Choose Mask to use the mask method (the default for devices using WAAS versions 5.0 or later).
Skip to Step 12 to define the service mask.
For more information, see Information About Load Balancing and WAEs.
Step 10 (Optional) To define the load-balancing hash for WCCP service ID1 on the source IP address, check the
Hash on Source IP check box. This check box is shown only if the hash assignment method is used.
Step 11 (Optional) To define the load-balancing hash for WCCP service ID1 on the destination IP address, check
the Hash on Destination IP check box. This check box is shown only if the hash assignment method is
used.
Step 12 (Optional) To use a custom service mask, enter different mask values in the WCCP Assignment Settings
for Load Balancing area, overwriting the default mask settings. If you do not change these settings, the
defaults are used. Define the custom mask as follows:
• In the Source IP Mask field, specify the IP address mask defined by a hexadecimal number, for
example, FE000000, used to match the packet source IP address. The range is 00000000 to
FE000000. The default is F00.
• In the Destination IP Mask field, specify the IP address mask defined by a hexadecimal number, for
example, FE000000, used to match the packet destination IP address. The range is 0000000 to
FE000000. The default is 0.
Note If you apply the default mask to a WAE running WAAS Version 4.1.x or earlier, the mask is
different from the default mask (0x1741) set under WAAS Version 4.1.x and earlier.
If the WAE detects that its configured mask is not the same as that advertised by one or more routers in
the farm, it is not allowed to join the farm, and a major alarm is raised (Configured mask mismatch for
WCCP). This alarm can occur when a WAE is trying to join a farm that already has other WAEs, and these
other WAEs are configured with a different mask. The routers do not allow other WAEs to join the farm
unless they advertise the same mask. To correct this alarm, ensure that all the WAEs in the farm are
configured with the same mask. This alarm is cleared when the WAE’s configured mask matches the
mask of all the routers in the farm.
Step 13 From the Redirect Method drop-down list, choose the type of packet redirection (forwarding) method to
use:
• WCCP GRE (the default for devices using WAAS versions earlier than 5.0) to use Layer 3 GRE
packet redirection.
• WCCP L2 (the default for devices using WAAS versions 5.0 or later) to permit the WAE to receive
transparently redirected traffic from a WCCP Version 2-enabled switch or router if the WAE has a
Layer 2 connection with the device and the device is configured for Layer 2 redirection. For more
Note Do not use WCCP L2 redirection on an ISR-WAAS device when ip unnumbered is configured
on the host router VirtualPortGroup interface. The device will not be able to join the WCCP farm
and the missing_assignment alarm will be raised.
Step 14 From the Return Method drop-down list, choose the type of method to use to return nonoptimized
(bypassed) packets to the router:
• WCCP GRE (the default) to use GRE packet return.
• WCCP L2 to use Layer 2 rewriting for packet return.
The Return Method drop-down list is shown only for devices using WAAS versions earlier than 5.0. For
WAAS Version 5.1, the return method is set the same as the redirect method. For WAAS Version 5.2 and
later, the return method is automatically negotiated with router to the same as the redirect method if the
router supports it. If the router does not support the return method that matches the redirect method, then
the return method is set to the return method supported by the router. For example, if the redirect method
is set to WCCP L2, but the router supports only the GRE return method, then the return method is set to
WCCP GRE.
Step 15 (Optional) From the Egress Method drop-down list, choose the method to use to return optimized packets
to the router or switch:
• Generic GRE (available and set as the default only if Redirect Method is WCCP GRE)
• IP Forwarding
• L2 (available and set as the default only if Redirect Method is WCCP L2)
• WCCP GRE (available only if Redirect Method is WCCP GRE)
For devices using WAAS versions earlier than 5.0, the choices are as follows: IP Forwarding (the
default), WCCP Negotiated Return, or Generic GRE. For more details on choosing the egress method,
see Configuring Egress Methods for WCCP-Intercepted Connections.
Step 16 (Optional) Modify the current advanced settings in the Advanced WCCP Settings area as follows:
• Check the Enable Flow Protection check box to keep the TCP flow intact and to avoid
overwhelming the device when it comes up or is reassigned new traffic. Flow protection is disabled
by default.
• In the Flow Protection Timeout field, specify the amount of time (in seconds) that flow protection
should be enabled. The default is 0, which means it stays enabled with no timeout. (The Flow
Protection Timeout field is not shown for devices using WAAS versions earlier than 5.0.)
Note The Enable Flow Protection check box and the Flow Protection Timeout field are not
enabled on WAAS v6.0.1.
• In the Shutdown Delay field, specify the maximum amount of time (in seconds) that the chosen
device waits to perform a clean shutdown of WCCP. The default is 120 seconds.
The WAE does not reboot until either all connections have been serviced or the maximum wait time
(specified through this Shutdown Delay field) has elapsed for WCCP.
• From the Failure Detection Timeout drop-down list, choose the failure detection timeout value (9,
15, or 30 seconds). The default is 30 seconds and is the only value supported on WAAS versions
prior to 4.4.1. This failure detection value determines how long it takes the router to detect a WAE
failure. (The Failure Detection Timeout field is not shown for devices using WAAS versions earlier
than 4.4.)
The failure detection timeout value is negotiated with the router and takes effect only if the router
also has the variable timeout capability. If the router has a fixed timeout of 30 seconds and you have
configured a failure detection value on the WAE other than the default 30 seconds, the WAE is not
able to join the farm and an alarm is raised (Router unusable with a reason of Timer interval
mismatch with router).
• In the Weight field, specify the weight value that is used for load balancing. The weight value ranges
from 0 to 10000. If the total of all the weight values of the WAEs in a service group is less than or
equal to 100, then the weight value represents a literal percentage of the total load redirected to the
device for load-balancing purposes. For example, a WAE with a weight of 10 receives 10 percent of
the total load in a service group where the total of all the weight values is 50. If a WAE in such a
service group fails, the other WAEs still receive the same load percentages as before the failure; they
will not receive the load allocated to the failed WAE.
If the total of all the weight values of the WAEs in a service group is between 101 and 10000, then
the weight value is treated as a fraction of the total weight of all the active WAEs in the service
group. For example, a WAE with a weight of 200 receives 25 percent of the total load in a service
group where the total of all the weight values is 800. If a WAE in such a service group fails, the other
WAEs will receive the load previously allocated to the failed WAE. The failover handling is different
than if the total weights are less than or equal to 100.
By default, weights are not assigned and the traffic load is distributed evenly between the WAEs in
a service group.
• In the Password field, specify the password to be used for secure traffic between the WAEs within
a cluster and the router for a specified service. Be sure to enable all other WAEs and routers within
the cluster with the same password. Passwords must not exceed eight characters in length. Do not
use the following characters: space, backwards single quote (`), double quote ("), pipe (|), or
question mark (?). Re-enter the password in the Confirm Password field.
Note For information about how to use the CLI to specify the service group password on a router,
see Setting a Service Group Password on a Router.
To configure WCCP settings from the CLI, you must first set the interception method to WCCP by using
the interception-method global configuration command, after which you can use the wccp router-list,
wccp shutdown, and wccp tcp-promiscuous global configuration commands.
For more information about a graceful shut down of WCCP Version 2 on WAEs, see Configuring WAEs
for a Graceful Shutdown of WCCP.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Interception > Interception Configuration. The Interception Configuration
window appears. (See Figure 5-3.)
• To keep the current settings and to close the window, click Reset.
• To remove the current settings, click the Remove Settings taskbar icon.
• To modify the current settings, change the current setting, as described in the rest of this procedure.
• To copy the settings to other WAEs in your network, click the Copy Settings taskbar icon. The Copy
Interception Settings window opens, where you can select other WAEs to which the interception
settings can be copied. You can copy all the settings or you can exclude the router list and enable
the WCCP service. Click OK to copy the settings to the selected WAEs devices.
By default, WCCP is disabled on a WAE. However, as part of the initial configuration of WCCP in your
WAAS network, you should have enabled WCCP Version 2 on your WAEs (the branch WAE and the data
center WAE) as well as on the routers in the data center and branch office that will be transparently
redirecting requests to these WAEs. For information about how to perform a basic WCCP configuration
in your WAAS network, see the Cisco Wide Area Application Services Quick Configuration Guide.
Step 4 From the Interception Method drop-down list, choose wccp to enable the WCCP interception method.
If you change this setting from any setting other than None, click Submit to update the window with the
proper fields for configuring WCCP.
Step 5 Check the Enable WCCP Service check box to enable WCCP Version 2 on the chosen device, or
uncheck the check box to disable WCCP on the chosen device.
Note Ensure that the routers used in the WCCP environment are running a version of the Cisco IOS
software that also supports WCCP Version 2.
Note If you use the Central Manager to disable WCCP on a WAAS device, the Central Manager
immediately shuts down WCCP and closes existing connections, if any, ignoring the setting
configured by the wccp shutdown max-wait global configuration command. To gracefully shut
down WCCP connections, use the no enable WCCP configuration command on the WAAS
device.
Step 6 (Optional) You can enable single service mode by checking the Enable Single Service Mode check box
(the default). Single service mode simplifies configuration by using the same service ID for incoming
and outgoing traffic, which is possible only with an AppNav deployment because it can handle
asymmetric traffic flows.
Step 7 In the Service ID1 field, specify the service ID of the WCCP service.
If the Enable Single Service Mode check box is unchecked, a pair of WCCP service IDs are required,
and the Service ID2 field is filled in with the second service ID of the pair, which is one greater than
Service ID1. The default service IDs are 61 and 62. You can change the WCCP service IDs from the
default of 61/62 to a different pair of numbers, which allows a router to support multiple WCCP farms
because the ANCs in different farms can use different service IDs.
The router service priority varies inversely with the service ID. The service priority of the default service
IDs 61/62 is 34. If you specify a lower service ID, the service priority is higher than 34; if you specify
a higher service ID, the service priority is lower than 34.
Step 8 Check the Use Default Gateway as WCCP Router check box to use the default gateway of the WAE
device as the router to associate with the WCCP TCP promiscuous mode service. Alternatively, you can
uncheck this check box and specify a list of one more routers by their IP addresses, separated by spaces.
The Central Manager assigns the router list number, which is displayed next to the router list field after
the page is submitted. As part of the initial configuration of your WAAS network, you may have already
created a WCCP router list with the setup utility, as described in the Cisco Wide Area Application
Services Quick Configuration Guide. For more information about WCCP router lists, see Configuring
and Viewing WCCP Router Lists for WAEs.
Note Checking or unchecking the Use Default Gateway as WCCP Router check box, changing the
router list, or submitting the WCCP page removes existing router lists, if any, that are not
assigned to the WCCP service, including router lists configured by the setup utility or through
the CLI.
Step 9 (Optional) To use a custom service mask, enter different mask values in the WCCP Assignment Settings
for Load Balancing area, overwriting the default mask settings. If you do not change these settings, the
defaults are used. Define the custom mask as follows:
• In the Source IP Mask field, specify the IP address mask defined by a hexadecimal number, for
example, FE000000, used to match the packet source IP address. The range is 00000000 to
FE000000. The default is F.
• In the Destination IP Mask field, specify the IP address mask defined by a hexadecimal number, for
example, FE000000, used to match the packet destination IP address. The range is 0000000 to
FE000000. The default is 0.
For more information, see Information About Load Balancing and WAEs.
If the WAE detects that its configured mask is not the same as advertised by one or more routers in the
farm, it is not allowed to join the farm and a major alarm is raised (Configured mask mismatch for
WCCP). This alarm can occur when a WAE is trying to join a farm that already has other WAEs, and these
other WAEs are configured with a different mask. The routers do not allow other WAEs to join the farm
unless they advertise the same mask. To correct this alarm, ensure that all the WAEs in the farm are
configured with the same mask. This alarm is cleared when the WAE’s configured mask matches the
mask of all the routers in the farm.
Step 10 (Optional) Modify the current advanced settings in the Advanced WCCP Settings area as follows:
a. From the Redirect Method drop-down list, choose the type of packet redirection (forwarding)
method to use:
– WCCP GRE to use Layer 3 GRE packet redirection.
– WCCP L2 (the default) to permit the WAE to receive transparently redirected traffic from a
WCCP Version 2-enabled switch or router if the WAE has a Layer 2 connection with the device
and the device is configured for Layer 2 redirection. For more information, see Information
About Packet-Forwarding Methods.
The return method is set the same as the redirect method. The return method is generic GRE when
the WCCP GRE redirect method is chosen or WCCP L2 return when the WCCP L2 redirect method
is chosen.
b. In the Failure Detection Timeout drop-down list, choose the failure detection timeout value (3, 6, 9,
15, or 30 seconds). The default is 30 seconds and is the only value supported on WAAS versions
prior to 4.4.1. This failure detection value determines how long it takes the router to detect a WAE
failure.
The failure detection timeout value is negotiated with the router and takes effect only if the router
also has the variable timeout capability. If the router has a fixed timeout of 30 seconds and you have
configured a failure detection value on the WAE other than the default 30 seconds, the WAE is not
able to join the farm and an alarm is raised (Router unusable with a reason of Timer interval
mismatch with router).
c. In the Weight field, specify the weight value that is used for load balancing. The weight value ranges
from 0 to 10000. If the total of all the weight values of the WAEs in a service group is less than or
equal to 100, then the weight value represents a literal percentage of the total load redirected to the
device for load-balancing purposes. For example, a WAE with a weight of 10 receives 10 percent of
the total load in a service group where the total of all weight values is 50. If a WAE in such a service
group fails, the other WAEs still receive the same load percentages as before the failure; they will
not receive the load allocated to the failed WAE.
If the total of all the weight values of the WAEs in a service group is between 101 and 10000, then
the weight value is treated as a fraction of the total weight of all the active WAEs in the service
group. For example, a WAE with a weight of 200 receives 25 percent of the total load in a service
group where the total of all the weight values is 800. If a WAE in such a service group fails, the other
WAEs will receive the load previously allocated to the failed WAE. The failover handling is different
than if the total weights are less than or equal to 100.
By default, weights are not assigned and the traffic load is distributed evenly between the WAEs in
a service group.
d. In the Password field, specify the password to be used for secure traffic between the WAEs within
a cluster and the router for a specified service. Be sure to enable all the other WAEs and routers
within the cluster with the same password. Passwords must not exceed eight characters in length.
Do not use the following characters: space, backwards single quote (`), double quote ("), pipe (|), or
question mark (?). Re-enter the password in the Confirm Password field.
Note For information about how to use the CLI to specify the service group password on a router,
see Setting a Service Group Password on a Router.
To configure WCCP settings from the CLI, you must first set the interception method to WCCP by using
the interception-method global configuration command, and then you can use the wccp router-list and
wccp tcp-promiscuous global configuration commands.
Note WCCP must be enabled before you can use the WCCP global configuration commands.
To delete a router list, use the no wccp router-list global configuration command.
To view an unassigned router list configured by the wccp router-list command, use the show
running-config wccp EXEC command.
Note If you use the Central Manager to disable WCCP on a WAAS device, the Central Manager immediately
shuts down WCCP and closes existing connections, if any, ignoring the setting configured by the
wccp shutdown max-wait global configuration command. To gracefully shut down WCCP connections,
use the no enable WCCP configuration command on the WAAS device.
During a graceful shutdown, the WAE does not reboot until one of the following occurs:
• All the connections have been serviced.
• The maximum wait time (specified in the Shutdown Delay field in the WCCP Configuration Settings
window, or with the wccp shutdown max-wait command [by default, 120 seconds]) has elapsed for
WCCP Version 2.
During a clean shutdown of WCCP, the WAE continues to service the flows that it is handling, but it
starts to bypass new flows. When the number of flows goes down to zero, the WAE takes itself out of the
group by having its buckets reassigned to other WAEs by the lead WAE. TCP connections can still be
broken if the WAE crashes or is rebooted without WCCP being cleanly shut down.
You cannot shut down an individual WCCP service on a particular port on a WAE; you must shut down
WCCP on the WAE. After WCCP is shut down on the WAE, the WAE preserves its WCCP configuration
settings.
Note Static bypass lists are supported only for devices (but not device groups) using WAAS versions earlier
than 5.0, and are deprecated for such devices. Interception ACLs are recommended instead.
Using a static bypass allows traffic flows between a configurable set of clients and servers to bypass
handling by the WAE. By configuring static bypass entries on the branch WAE, you can control traffic
interception without modifying the router configuration. IP access lists can be configured separately on
the router to bypass traffic without first redirecting it to the branch WAE. Typically, the WCCP accept
list defines the group of servers that are accelerated (and the servers that are not). Static bypass can be
used occasionally when you want to prevent WAAS from accelerating a connection from a specific client
to a specific server (or from a specific client to all servers).
Note We recommend that you use ACLs on the WCCP-enabled router where possible, rather than using static
bypass lists or interception ACLs on the WAEs, because that is the most efficient method to control
traffic interception. If you decide to use static bypass lists or interception ACLs, we recommend that you
use interception ACLs because they are more flexible and give better statistics about passed-through
connections. For information about how to configure ACLs on a router, see Configuring IP Access Lists
on a Router. For information about how to configure an interception ACL for a WAE, see Configuring
Interception Access Control Lists.
To configure a static bypass list for a Version 4.x WAE, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Interception > Bypass Lists.
Step 3 In the taskbar, click the Create New WCCP/Inline Bypass List icon. The Creating new WCCP/Inline
Bypass List window appears.
Step 4 In the Client Address field, enter the IP address for the client.
Step 5 In the Server Address field, enter the IP address for the server.
Step 6 Check Submit to save the settings.
To configure a static bypass list from the CLI, you can use the bypass static global configuration
command.
• In this example, if a SYN packet with source ip 1.1.1.1 and destination ip 2.2.2.2 hits the WAAS
device, the WAAS device would mark the connection for optimization.
• In this example, if a SYN packet with source ip 2.2.2.2 and destination ip 1.1.1.1 hits the WAAS
device, the connection will be put in "PT Interception ACL.” If you want both types of connections
to be optimized, add "permit ip host 2.2.2.2 host 1.1.1.1" to the access list.
Note If Interception ACLs are applied to peer WAAS devices, the ACL entries must be specular on the two
devices to allow a connection to be marked for optimization on both sides.
By configuring an interception ACL on a WAAS device, you can control traffic interception without
modifying the router configuration. IP ACLs can be configured separately on the router to bypass traffic
without first redirecting it to the WAAS device. Typically, the WCCP accept list defines the group of
servers that are accelerated (and the servers that are not). Using an interception ACL allows you to easily
bypass uninteresting traffic, for example, in a pilot deployment where you do not want to modify the
router configuration. Additionally, it allows you to more easily transition from a pilot to a production
deployment by allowing and accelerating different kinds of traffic in phases.
An interception ACL can be used both with WCCP and inline interception.
When used with interface ACLs and WCCP ACLs, the interface ACL is applied first, the WCCP ACL is
applied second, and then the interception ACL is applied last. Application policies defined on the WAE
are applied after all ACLs have filtered the traffic.
An ANC that is also operating as a WAAS node can have both an AppNav Controller interception ACL
to control what is intercepted by the ANC and an interception ACL to control what is accepted by the
optimizing engine. A flow may be permitted by the AppNav Controller interception ACL, but
subsequently rejected by the WAAS node interception ACL.
Note The interception ACL feature is mutually exclusive with static bypass lists. You cannot use both types
of lists at the same time. We recommend that you use interception ACLs instead of static bypass lists.
Static bypass lists are supported only for devices using WAAS versions earlier than 5.0.
To use an interception ACL, first define an ACL (see Chapter 9, “Creating and Managing IP Access
Control Lists for Cisco WAAS Devices”) and then apply it to a device. Interception ACLs are configured
only for individual devices and not for device groups.
To configure an interception ACL for an ANC or WAE device, follow these steps:
Step 1 Follow the instructions in Chapter 9, “Creating and Managing IP Access Control Lists for Cisco WAAS
Devices” to create an ACL that you want to use for interception, but do not apply it to an interface.
Step 2 From the WAAS Central Manager menu, choose Devices > device-name.
Step 3 Choose Configure > Interception > Interception Access List.
Step 4 To configure a WAE interception ACL, click the arrow next to the Interception Access List field to
display a drop-down list of ACLs you have defined, and choose an ACL to apply to WAE interception.
Alternatively, you can enter an ACL name directly in the field and create it after you submit this page.
If you enter information, drop-down list of displayed ACLs is filtered to show only the entries that match
the beginning of the entered text.
To create or edit an ACL, click the Go to IP ACL link next to the field to take you to the IP ACL
configuration window (Configure > Network > TCP/IP Settings > IP ACL).
Step 5 To configure an ANC interception ACL, click the arrow next to the AppNav Controller Interception
Access List field to display a drop-down list of ACLs you have defined and choose an ACL to apply to
ANC interception. Alternatively, you can enter an ACL name directly in the field and create it after you
submit this page. If you enter information, drop-down list of displayed ACLs is filtered to show only
entries that match the beginning of the entered text. This field is displayed only on devices configured
in appnav-controller mode.
To create or edit an ACL, click the Go to IP ACL link to take you to the IP ACL configuration window
(Configure > Network > TCP/IP Settings > IP ACL).
Step 6 Check Submit to save the settings.
Note In AppNav Controller interception ACLs, the tcp ... established extended ACL condition is not
supported and is ignored if encountered.
To configure an interception ACL from the CLI, use the ip access-list and interception access-list
global configuration commands. To configure an AppNav Controller interception ACL, use the
interception appnav-controller access-list global configuration command.
You can determine if a connection was passed through by an interception ACL by using the show
statistics connection EXEC command. Flows passed through by an interception ACL are identified with
the connection type PT Interception ACL.
Additionally, the show statistics pass-through command “Interception ACL” counter reports the
number of active and completed pass-through flows due to an interception ACL.
Use the show ip access-list command to view the individual ACL rules that are being matched.
Note For ANCs, the egress method is not configurable. The egress method that is used depends on the redirect
method. The ANC uses generic GRE when the WCCP GRE redirect method is chosen, or Layer 2 when
the WCCP L2 redirect method is chosen.
The default egress method is L2. This egress method sends out optimized data through a Layer 2
connection to the router. This method is available only if the redirect method is also set to WCCP L2,
and is not available on devices using WAAS versions earlier than 5.0. The router must also support Layer
2 redirect. If you configure the WCCP GRE redirect method or switch between WCCP GRE and L2, the
default egress method is set to IP Forwarding.
For devices with a WAAS version earlier than 5.0, the default egress method is IP forwarding. The IP
forwarding egress method does not allow you to place WAEs on the same VLAN or subnet as the clients
and servers, and it does not ensure that packets are returned to the intercepting router.
The WCCP GRE return and generic GRE egress methods allow you to place WAEs on the same VLAN
or subnet as clients and servers. Repeating redirection is prevented by encapsulating the outgoing frames
in the GRE frames. Routers using Cisco IOS software handle these GRE frames as bypass frames, and
do not apply WCCP redirection. With the WCCP GRE return method, WAAS uses the router ID address
as the destination for GRE frames; with the generic GRE method, WAAS uses the address of the router
configured in the WAE router list.
This technique makes it possible to support redundant routers and router load balancing; WAAS makes
a best effort to return frames back to the router from which they arrived, though this is not guaranteed.
To use this functionality with multiple routers connected to the WAAS network segment, ensure
connectivity to the router ID address, for example, by configuring static routes. The router ID is the
address of the first loopback interface or highest active physical interface. This address can be found in
the output of the show wccp routers EXEC command.
WAAS applies the following logic in its router selection for WCCP GRE and generic GRE:
• When the WAAS software applies data redundancy elimination (DRE) and compression to a TCP
flow, the number of packets that are sent out may be fewer. A single packet that carries optimized
data may represent original data that was received in multiple packets redirected from different
routers. That optimized data-carrying packet will egress from the WAE to the router that last
redirected a packet to the WAE for that flow direction.
• When the WAE receives optimized data, the data may arrive in multiple packets from different
routers. The WAAS software expands the optimized data back to the original data, which will be
sent out as several packets. Those original data-carrying packets will egress from the WAE to the
router that last redirected a packet to the WAE for that flow direction.
The WCCP GRE return and generic GRE egress methods are similar, but the generic GRE egress method
is designed specifically to be used in deployments where the router or switch performs
hardware-accelerated processing of GRE packets, such as with a Cisco 7600 Series router or a Catalyst
6500 Series switch with the Supervisor Engine 32 or 720. Additionally, the generic GRE egress method
returns packets to the intercepting router by using a GRE tunnel that you must configure on the router
(the WAE end of the tunnel is configured automatically). The generic GRE egress method is supported
only when the WCCP GRE interception method is used.
To use the generic GRE egress method, you must create an intercepting router list on the WAE (multicast
addresses are not supported) and configure a GRE tunnel interface on each router. For details on
configuring GRE tunnel interfaces on the routers, see Configuring a GRE Tunnel Interface on a Router.
Note For devices with WAAS versions earlier than 5.0, WCCP Version 2 is capable of negotiating the redirect
method and the return method for intercepted connections. The WAAS software supports WCCP GRE and
WCCP Layer 2 as WCCP-negotiated return methods. If WCCP negotiates a WCCP Layer 2 return, the
WAE defaults to using IP forwarding as the egress method. The WAE also defaults to IP forwarding if
the interception method is set to WCCP Layer 2 and you configure generic GRE as the egress method,
both of which are not compatible. When the WAE defaults to IP forwarding, the WAE logs a minor alarm
that is cleared when you correct the configuration so that the interception and egress methods are
consistent. The output of the show egress methods EXEC command also displays a warning if the
interception and egress methods are not consistent.
For devices with WAAS Version 5.0, you must explicitly configure the egress method.
To configure the egress method for L2 return from the CLI, use the egress-method WCCP configuration
command:
WAE(config)# wccp tcp-promiscuous service-pair 61 62
WAE(config-wccp-service)# egress-method L2
To configure the generic GRE egress method from the CLI, configure an intercepting router list and
configure the egress method, as follows:
WAE(config)# wccp router-list 1 192.168.68.98
WAE(config)# wccp tcp-promiscuous service-pair 61 62
WAE(config-wccp-service)# router-list-num 1
WAE(config-wccp-service)# egress-method generic-gre
The router list must contain the IP address of each intercepting router. Multicast addresses are not
supported. Additionally, you must configure a GRE tunnel interface on each router. For details on
configuring GRE tunnel interfaces on the routers, see Configuring a GRE Tunnel Interface on a Router.
To view the egress method that is configured and that is being used on a particular WAE, use the
show wccp egress EXEC command. To view information about the egress method for each connection
segment, use the show statistics connection egress-methods EXEC command.
To view the generic GRE tunnel statistics for each intercepting router, use the show statistics
generic-gre EXEC command. To clear statistics information for the generic GRE egress method, use the
clear statistics generic-gre EXEC command.
Note On a Catalyst 6500 Series switch with the Supervisor Engine 32 or 720, do not configure more than one
GRE tunnel (multipoint or point-to-point) with the same tunnel source interface, because this may result
in high switch CPU load.
The tunnel interface must have a Layer 3 source interface to which it is attached, and this source interface
must be the interface whose IP address is configured in the WAE’s intercepting router list.
The tunnel interface must be excluded from WCCP interception to avoid routing loops when outbound
interception is used. Use the ip wccp redirect exclude in command. You can always use this command
because it does not cause any impact even when it is not required, such as for inbound interception.
Note To configure WCCP to work with WAEs with the generic GRE egress method, you must configure
keepalives on the tunnel interface used on the Cisco WCCP router. The following is a sample
configuration:
interface Tunnel1
ip address 12.12.12.12 255.255.255.0
no ip redirects
ip wccp redirects exclude in
keepalive 20 3 <<<<<<<<<<<<
tunnel source FastEthernet0/.130
tunnle mode gre multipoint
For more information, see the WCCP Router Configuration Commands section of the Cisco IOS
Configuration Fundamentals Command Reference.
Consider a deployment in which there are two intercepting routers and two WAEs in the farm. Each WAE
configuration will look like the following example:
wccp router-list 1 192.168.1.1 192.168.2.1
wccp tcp-promiscuous service-pair 61 62
router-list-num-1
egress-method generic-gre
redirect-method gre
enable
Each router can configure a single multipoint GRE tunnel to the WAE farm.
Router 1 configuration will look like the following example:
interface gigabitEthernet 1/1
ip address 192.168.1.1 255.255.255.0
...
interface Tunnel1
ip address 12.12.12.1 255.255.255.0
tunnel source GigabitEthernet1/1
tunnel mode gre multipoint
ip wccp redirect exclude in
end
Note The tunnel interface is enabled for IP by provisioning an IP address, which allows it to process and
forward transit packets. If you do not want to provision an IP address, the tunnel must be IP enabled by
making it an IP unnumbered interface. This restricts the tunnel; it can only be a point-to-point tunnel.
This section describes how to configure a point-to-point tunnel for a single WAE instead of a multipoint
tunnel on the router. A point-to-point tunnel is enabled for IP either by making it unnumbered or by
giving it an IP address. The unnumbered method is shown in the following example router configuration:
interface gigabitEthernet 1/1
ip address 192.168.1.1 255.255.255.0
...
! Tunnel1 is an unnumbered point-to-point tunnel towards WAE1
interface Tunnel1
ip unnumbered GigabitEthernet1/1
tunnel source GigabitEthernet1/1
! tunnel destination is the IP address of WAE1
tunnel destination 10.10.10.10
ip wccp redirect exclude in
end
You can enable PBR to establish a route that goes through WAAS for some or all packets. WAAS proxy
applications receive PBR-redirected traffic in the same manner as WCCP redirected traffic:
1. In the branch office, define traffic of interest on the branch office router (Edge-Router1) as follows:
a. Specify which traffic is of interest to the LAN interface (ingress interface) on Edge-Router1.
Use extended IP access lists to define traffic of interest (traffic from all or filtered local source
addresses to any or filtered destination address).
b. Specify which traffic is of interest to the WAN interface (egress interface) on Edge-Router1.
Use extended IP access lists to define traffic of interest (traffic from all or filtered local source
addresses from any or filtered remote addresses).
2. In the data center, specify which traffic is of interest to the data center router (Core-Router1) as
follows:
a. Specify which traffic is of interest to the LAN interface (ingress interface) on Core-Router1.
Use extended IP access lists to define traffic of interest (traffic from all or filtered local source
addresses to any or filtered destination address).
b. Specify which traffic is of interest to the WAN interface (egress interface) on Core-Router1.
Use extended IP access lists to define traffic of interest (traffic from all or filtered local source
addresses from any or filtered remote addresses).
3. In the branch office, create route maps on Edge-Router1, as follows:
a. Create a PBR route map on the LAN interface of Edge-Router1.
b. Create a PBR route map on the WAN interface of Edge-Router1.
4. In the data center, create route maps on Core-Router1, as follows:
a. Create a PBR route map on the LAN interface of Core-Router1.
b. Create a PBR route map on the WAN interface of Core-Router1.
5. In the branch office, apply the PBR route maps to Edge-Router1.
6. In the data center, apply the PBR route maps to Core-Router1.
7. Determine which PBR method to use to verify PBR next-hop availability of a WAE. For more
information, see Methods of Verifying PBR Next-Hop Availability.
Note For a description of the PBR commands that are referenced in this section, see Cisco Quality of Service
Solutions Command Reference.
WAEs (Edge-WAE1 and Core-WAE1) must reside in an out-of-band network that is separate from the
traffic’s destination and source. For example, Edge-WAE1 is on a subnet that is separate from the clients
(the traffic source), and Core-WAE that is on a subnet separate from the file servers and application
servers (the traffic destination). Additionally, the WAE may have to be connected to the router that is
redirecting traffic to it through a tertiary interface (a separate physical interface) or a subinterface to
avoid a routing loop. For more information, see Using Tertiary Interfaces or Subinterfaces to Connect
WAEs to Routers in Chapter 2, “Planning Your WAAS Network.”
Table 5-3 provides a summary of the router interfaces that you must configure to use PBR or WCCP
Version 2 to transparently redirect traffic to a WAE.
Table 5-3 Router Interfaces for WCCP or PBR Traffic Redirection to WAEs
Router
interface Comment
Edge-Router1
A Edge LAN interface (ingress interface) that performs redirection on outbound traffic.
B Tertiary interface (separate physical interface) or a subinterface off of the LAN port on Edge-Router1. Used to
attach Edge-WAE1 to Edge-Router1 in the branch office.
C Edge WAN interface (egress interface) on Edge-Router1 that performs redirection on inbound traffic.
Core-Router1
D Core LAN interface (ingress interface) that performs redirection on outbound traffic.
E Tertiary interface or subinterface off of the LAN port on Core-Router1. Used to attach Core-WAE1 to
Core-Router1 in the data center.
F Core WAN interface (egress interface) on Core-Router1 that performs redirection on inbound traffic.
The example provided in Configuring Policy-Based Routing shows how to configure PBR as the traffic
redirection method in a WAAS network that has one WAE in a branch office and one WAE in the data
center.
Note The commands that are used to configure PBR on a router, can vary based on the Cisco IOS release
installed on the router. For information about the commands that are used to configure PBR for the Cisco
IOS release that you are running on your routers, see the appropriate Cisco IOS configuration guide.
Step 1 In the branch office, use extended IP access lists to specify which traffic is of interest to the LAN
interface (ingress interface-A) on Edge-Router:
a. On Edge-Router1, define an extended IP access list within the range of 100 to 199. For example,
create access list 100 on Edge-Router1:
Edge-Router1(config)# ip access-list extended 100
b. On Edge-Router1, specify which traffic is of interest to this particular interface. For example, mark
any IP/TCP traffic from any local source addresses (traffic for any branch office clients) on any TCP
port to any destination, as interesting:
Edge-Router1(config-ext-nac1)# permit tcp 10.10.10.0 0.0.0.255 any
– Alternatively, you can selectively mark interesting traffic by defining the source IP subnet,
destination IP address, and TCP port numbers. For example, mark IP/TCP traffic from any local
source address on TCP ports 135 and 80 to any destination as interesting:
Edge-Router1(config-ext-nac1)# permit tcp 10.10.10.0 0.0.0.255 any eq 135
Step 2 In the branch office, use extended IP access lists to specify which traffic is of interest to the WAN
interface (egress interface-C) on Edge-Router1:
a. On Edge-Router1, define an extended IP access list within the range of 100 to 199, for example,
create access list 101 on Edge-Router1:
Edge-Router1(config)# ip access-list extended 101
– Alternatively, you can selectively mark interesting traffic by defining the source IP subnet,
destination IP address, and TCP port numbers. For example, mark IP/TCP traffic to any local
source addresses on TCP ports 135 and 80 to any destination, as interesting:
Edge-Router1(config-ext-nac1)# permit tcp any 10.10.10.0 0.0.0.255 eq 135
Edge-Router1(config-ext-nac1)# permit tcp any 10.10.10.0 0.0.0.255 eq 80
Step 3 In the data center, use extended IP access lists to specify which traffic is of interest to the LAN interface
(ingress interface-D) on Core-Router1:
a. On Core-Router1, define an extended IP access list within the range of 100 to 199, for example,
create access list 102 on Core-Router1:
Core-Router1(config)# ip access-list extended 102
– Alternatively, you can selectively mark traffic as interesting by defining the source IP subnet,
destination IP address, and TCP port numbers. For example, selectively mark IP/TCP traffic
sourced from any local device on TCP ports 135 and 80 to any destination, as interesting:
Core-Router1(config-ext-nac1)# permit tcp 10.10.11.0 0.0.0.255 any eq 135
Core-Router1(config-ext-nac1)# permit tcp 10.10.11.0 0.0.0.255 any eq 80
Step 4 In the data center, use extended IP access lists to mark traffic of interest for the WAN interface (egress
interface-F) on Core-Router1:
a. On Core-Router1, define an extended access list within the range of 100 to 199, for example, create
access list 103 on Core-Router1:
Core-Router1(config)# ip access-list extended 103
– Alternatively, you can selectively mark traffic as interesting by defining the source IP subnet,
destination IP address, and TCP port numbers. For example, mark IP/TCP traffic on ports 135
and 80 to any local source addresses, as interesting:
Note The ip address command option matches the source or destination IP address that is
permitted by one or more standard or extended access lists.
Note If you have more than one branch WAE, you can specify the IP address of a second branch
WAE for failover purposes, for example, enter the set ip next-hop 1.1.1.101 command on
Edge-Router1, to specify a next-hop address of 1.1.1.101 (the IP address of Edge-WAE2)
for failover purposes. Use the next-hop command for failover purposes and not for
load-balancing purposes.
Use the match command to specify the extended IP access list that Core-Router 1 should use to
determine which traffic is of interest to its WAN interface. If you do not enter a match command,
the route map applies to all the packets. The following example shows how to configure
Core-Router1to use access list 103 as the criteria for determining which traffic is of interest to its
WAN interface:
Core-Router1(config-route-map)# match ip address 103
Note If you have more than one data center WAE, specify the IP address of a second data center
WAE for failover purposes, for example, enter the set ip next-hop 2.2.2.101 command on
Core-Router1, to specify a next-hop address of 2.2.2.101 (the IP address of Core-WAE2) for
failover purposes. Use the next-hop command for failover purposes and not for
load-balancing purposes.
Step 7 In the branch office, apply the route maps to the LAN interface (ingress interface) and the WAN interface
(egress interface) on Edge-Router1:
a. On Edge-Router1, enter interface configuration mode:
Edge-Router1(config)# interface FastEthernet0/0.10
b. Specify that the LAN router interface should use the WAAS-EDGE-LAN route map for PBR:
Edge-Router1(config-if)# ip policy route-map WAAS-EDGE-LAN
d. Specify that the WAN router interface should use the WAAS-EDGE-WAN route map for PBR:
Edge-Router1(config-if)# ip policy route-map WAAS-EDGE-WAN
Step 8 In the data center, apply the route maps to the LAN interface (ingress interface) and the WAN interface
(egress interface) on Core-Router1:
a. On Core-Router1, enter interface configuration mode:
Core-Router1(config)# interface FastEthernet0/0.10
b. Specify that for PBR, the LAN router interface should use the WAAS-CORE-LAN route map:
Core-Router1(config-if)# ip policy route-map WAAS-CORE-LAN
d. Specify that for PBR, the WAN router interface should use the WAAS-CORE-WAN route map:
Core-Router1(config-if)# ip policy route-map WAAS-CORE-WAN
Note In this section, device is used to refer to the router or switch that has been configured to use PBR to
transparently redirect traffic to a WAE.
To verify whether the WAE is CDP visible to a device that has been configured to use PBR, enter the
show cdp neighbors command on the device. If the WAE is CDP visible to the device, the WAE will be
listed in the output of the show cdp neighbors command.
Step 1 On the router where PBR is configured, for example, on the branch office router named Edge-Router1,
enter configuration mode and enable CDP on the router:
Edge-Router1(config)# cdp run
Step 2 Enable route-map configuration mode for the route map, WAAS-EGDE-LAN, which has already been
created on the router:
Edge-Router1(config)# route-map WAAS-EDGE-LAN permit
Step 3 Configure the router to use CDP to verify the availability of the configured next-hop addresses:
Edge-Router1(config-route-map)# set ip next-hop verify-availability
Step 4 Enable CDP on the WAE, for example, on the branch office WAE named Edge-WAE1, that you want the
router to redirect traffic to using PBR:
Note If you are configuring PBR and have multiple WAEs, and are using Method 1 to verify the PBR next-hop
availability of a WAE, no additional configuration is necessary after you have completed the preceding
process.
Method 2: Using IP SLAs to Verify WAE Operability Using ICMP Echo Verification
To use IP SLAs and ICMP (the recommended method) to verify PBR next-hop availability of a WAE,
follow these steps:
Step 1 On the branch office router named Edge-Router1, enter the route-map configuration mode for the route
map named WAAS-EDGE-LAN, which has been previously configured on this router:
Edge-Router1(config)# route-map WAAS-EDGE-LAN permit
Step 2 Specify a match condition for the traffic. In the following example, the match condition specifies access
list number 105:
Edge-Router1(config)# match ip address 105
Step 3 Configure the route map to use IP SLA tracking instance number 1 to verify the availability of the
next-hop WAE, for example, the branch WAE named Edge-WAE1 that has an IP address of 1.1.1.100:
Edge-Router1(config-route-map)# set ip next-hop verify-availability 1.1.1.100 track 1
Note Enter the set ip next-hop verify-availability command for each route map that has been
configured on this branch office edge router and on the data center’s core router that has also
been configured to use PBR to redirect traffic to WAEs.
Step 5 Configure the router to echo Edge-WAE1 using the specified source interface:
Edge-Router1(config-ip-sla)# icmp-echo 1.1.1.100 source-interface FastEthernet 0/0.20
Step 7 Schedule IP SLA tracking instance 1 to start immediately and to run continuously:
Edge-Router1(config)# ip sla schedule 1 life forever start-time now
Step 8 Configure IP SLA tracking instance 1 to track the device, which is defined in the IP SLA tracking
instance 1:
Edge-Router1(config)# track 1 rtr 1
Note If you are configuring PBR and have multiple WAEs, and you are using Method 2 to verify PBR next-hop
availability of a WAE, you must configure a separate IP SLA per WAE, and then run the track command
for each IP SLA.
Method 3: Using IP SLAs to Verify WAE Operability Using TCP Connection Attempts
If the device that is configured for PBR is running the Cisco IOS software Release 12.4 or later, and does
not see the WAE as a CDP neighbor, use IP SLAs to verify that the WAE is alive using TCP connection
attempts. Use IP SLAs to monitor a WAE’s availability as the PBR next hop using TCP connection
attempts at a fixed interval of 60 seconds.
To verify PBR next-hop availability of a WAE, follow these steps:
Step 1 On the branch office router named Edge-Router1, enter route-map configuration mode for the route map
named WAAS-EDGE-LAN, which has been previously configured on this router:
Edge-Router1(config)# route-map WAAS-EDGE-LAN permit
Step 2 Configure the route map to use IP SLA tracking instance number 1 to verify the availability of the
next-hop WAE (the Edge WAE that has an IP address of 1.1.1.100):
Edge-Router1(config-route-map)# set ip next-hop verify-availability 1.1.1.100 track 1
Note Enter the set ip next-hop verify-availability command for each route map that is configured on
this branch office edge router and on the data center’s core router that has also been configured
to use PBR to transparently redirect traffic to WAEs.
Step 4 Configure the router to use the specified source and destination ports to use TCP connection attempts at
a fixed interval of 60 seconds to monitor the WAE availability:
Edge-Router1(config-ip-sla)# tcp-connect 1.1.1.100 80 source-port 51883 control disable
Edge-Router1(config-ip-sla)# exit
Step 5 Schedule the IP SLA tracking instance 1 to start immediately and to run forever:
Edge-Router1(config)# ip sla schedule 1 life forever start-time now
Step 6 Configure the IP SLA tracking instance 1 to track the device, that is defined in the IP SLA tracking
instance 1:
Edge-Router1(config)# track 1 rtr 1
Note If you are configuring PBR and have multiple WAEs, and you are using Method 3 to verify PBR next-hop
availability of a WAE, you must configure a separate IP SLA per WAE, and then run the track command
per IP SLA.
Note When you install an inline WAE device, you must follow the cabling requirements described in the
“Cabling” section of Installing the Cisco WAE Inline Network Adapter or the appropriate platform
hardware guide.
Any combination of traffic interception mechanisms on peer WAEs is supported. For example, you can
use inline interception on the branch WAE and WCCP on the data center WAE. For complex data center
deployments, we recommend that you use hardware-accelerated WCCP interception with the WAAS
AppNav solution (see Chapter 4, “Configuring AppNav”) or load balancing with the Cisco Application
Control Engine (ACE).
File and
Clients application servers
WAN
159919
Switch Edge WAE Router Router Core WAE Switch
Note Inline mode and WCCP redirection are exclusive. You cannot configure inline mode if the WAE is
configured for WCCP operation. Inline mode is the default mode when a Cisco WAE Inline Network
Adapter is installed in a WAE device, but you must configure inline mode explicitly on a device with a
Cisco Interface Module.
Note An inline WAE can be configured as a Central Manager, but the inline interception functionality is not
be available.
The Cisco WAE Inline Network Adapter contains two or four Ethernet ports, the Cisco Interface Module
contains two to eight Ethernet ports, and the Cisco AppNav Controller Interface Module contains four
to 12 Ethernet ports. Ports on the Cisco WAE Inline Network Adapter are always configured as inline
ports, while ports on the Interface Modules are configured as normal standalone ports by default, and
you must explicitly configure these ports as inline ports. Each pair of inline ports is grouped into a
logical inline group.
Each inline group has one LAN-facing port and one WAN-facing port. Typically, you use just one inline
group, and connect the LAN-facing port to a switch and the WAN-facing port to a router. On adapters or
interface modules with additional ports, additional groups of interfaces are provided if you are using a
network topology where you have to connect a WAE to multiple routers. Traffic that enters into one
interface in a group, exits the device via another interface in the same group.
Hardware platform support for inline ports is as follows:
• WAVE-294—Supports one installed Cisco Interface Module with 2, 4, or 8 ports.
• WAVE-594/694/7541/7571/8541—Support one installed Cisco Interface Module with 2, 4, or 8
ports or a Cisco AppNav Controller Interface Module with 4 or 12 ports.
Note The two-port 10-Gigabit Cisco Interface Module cannot be used in inline mode. The four-port
10-Gigabit Cisco AppNav Controller Interface Module is supported only on the WAVE-594.
You have the option of assigning an IP address to an inline interface, but it is not required. For more
information, see Configuring an IP Address on an Inline Interface.
Traffic that flows through an inline group is transparently intercepted for optimization. Traffic that does
not have to be optimized is bridged across the LAN/WAN interfaces. If a power, hardware, or
unrecoverable software failure occurs, the network adapter automatically begins operating in bypass
mode (fail-close), where all traffic is mechanically bridged between the LAN and WAN interfaces in
each group. The Cisco WAE Inline Network Adapter and Cisco Interface Module also operate in bypass
mode when the WAE is powered off or starting up. Additionally, you can manually put an inline group
into bypass mode.
Note AppNav Controller Interface Modules do not support automatic bypass mode to continue traffic flow in
the event of a failure. For high availability, two or more AppNav Controller Interface Modules should
be deployed in an AppNav cluster. For more information on using inline mode with the AppNav solution,
see Chapter 4, “Configuring AppNav.”
Inline mode is configured by default to accept all TCP traffic. If the network segment in which the WAE
is inserted is carrying 802.1Q tagged (VLAN) traffic, initially, traffic on all VLANs is accepted. Inline
interception can be enabled or disabled for each VLAN. However, optimization policies cannot be
customized based on the VLAN.
You can serially cluster WAE devices operating in inline mode to provide higher availability if a device
fails. For details, see Information About Clustering Inline WAEs.
Note When a WAE inline group enters bypass mode, the switch and router ports to which it is connected may
have to reinitialize, which may cause an interruption of several seconds in the traffic flow through the
WAE.
If the WAE is deployed in a configuration where the creation of a loop is not possible, that is, if it is
deployed in a standard fashion between a switch and a router, configure PortFast on the switch port to
which the WAE is connected. PortFast allows the port to skip the first few stages of the Spanning Tree
Algorithm (STA) and move more quickly into a packet forwarding mode.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name. (You cannot enable inline
operation from device groups.)
Step 2 Choose Configure > Interception > Interception Configuration.
Note If you are configuring a device using a WAAS version earlier than 5.0, choose Configure >
Interception > Inline > General Settings to configure inline general settings. The
configuration window looks different, but has similar settings.
Step 4 Check the Inline Enable check box to enable inline operation.
The Inline Enable check box is displayed only for WAVE devices using WAAS versions earlier than 5.0
and that have a Cisco Interface Module installed.
Step 5 Check the Vlan ID Connection Check check box to enable VLAN ID connection checking. Uncheck
the check box to disable it. The default setting is enabled.
WAAS uses the VLAN ID to intercept or bridge VLAN traffic on the inline interface for a TCP flow.
The VLAN ID of all the packets sent in a particular TCP connection must match; packets with a different
VLAN ID will be bridged and not optimized. If your system has an asymmetric routing topology, in
which the traffic flow in one direction uses a different VLAN ID than the traffic flow from the other
direction, you may have to disable VLAN ID checking to ensure that the traffic is optimized.
Step 6 From the Failover Timeout drop-down list, choose the failover timeout (1, 5, or 25 seconds), which is
the number of seconds that the interface should wait for before going into bypass mode, after a device
or power failure. The default is 1 second.
This item appears only for WAVE devices that use Cisco Interface Modules, but not for AppNav
Controller Interface Modules. For devices that use Cisco WAE Inline Network Adapters, the failover
timeout is configured in the Inline Interface Settings window (Figure 5-6). This item is named Time Out
for WAAS versions earlier than 5.0 and appears before the VLAN ID Connection Check item.
Step 7 Click Submit. A message appears, for you to confirm that all the Interface Module interfaces are to be
converted to inline group interfaces, and the existing Interface Module interface configurations are to be
removed.
Step 8 Click OK to confirm.
The inline groups are configured with basic default settings. To configure inline group settings, see
Configuring Inline Interface Settings on WAEs.
For devices running WAAS versions earlier than 5.0, after enabling inline mode, it takes about two data
feed poll cycles (about 10 minutes by default) for the inline groups to appear in the Inline Interfaces list
in the lower part of the window.
Note Inline mode cannot be enabled if any of the Interface Module ports are configured as the primary
interface. Change the primary interface and return to this window to enable inline mode.
For devices running WAAS versions earlier than 5.0, if you configure any of the interfaces on
an Interface Module with nondefault settings (standby group, port channel, BVI, speed, duplex,
IP address, ACLs, and so on), inline mode cannot be enabled, and a warning message appears,
asking you to check all the interfaces for configuration settings. You must remove all the
configuration settings from all the interface module interfaces (slot 1) and then return to this
window to enable inline mode.
To enable inline operation from the CLI, use the interception-method inline global configuration
command.
To configure VLAN ID checking from the CLI, use the inline vlan-id-connection-check global
configuration command after inline operation is enabled.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name. (You cannot configure inline
interface settings from device groups.)
Step 2 Choose Configure > Interception > Interception Configuration.
Note If you are configuring a device using a WAAS version earlier than 5.0, choose Configure >
Interception > Inline > Inline Interfaces to configure inline interface settings. The
configuration window looks different, but has similar settings.
The Inline Interfaces window appears, listing the inline interface groups available on the device.
Step 3 Choose an inline group to configure and click the Edit taskbar icon. (For devices using WAAS versions
earlier than 5.0, click the Edit icon next to the interface.)
The Edit Inline Settings window appears, displaying the inline interface configurations for a particular
slot and port group. (See Figure 5-7.)
Step 4 Check the Use CDP check box to enable Cisco Discovery Protocol (CDP) on the inline group interfaces.
The Use CDP check box is not shown for devices using WAAS versions earlier than 5.0.
When enabled, CDP obtains protocol addresses of neighboring devices and discovers the platform of
those devices. It also shows information about the interfaces used by your router.
Configuring CDP from the CDP Settings window enables CDP globally on all the interfaces. For
information on configuring CDP settings, see Configuring CDP Settings in Chapter 6, “Configuring
Network Settings.”
Step 5 Check the Shutdown check box to shut down the inline group. This setting bridges traffic across the
LAN/WAN interfaces without any processing.
Step 6 In the Encapsulation field, enter the VLAN ID that is to be assigned to traffic that leaves the WAE. The
VLAN ID should be set to match the VLAN ID expected by the router.
For more information about the VLAN ID, see Configuring an IP Address on an Inline Interface.
Step 7 From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the interface for
statistics and calculate throughput. The default is 30 seconds. (The Load Interval item is not shown for
devices using WAAS versions earlier than 5.0.)
Step 8 Check the Intercept all VLANs check box to enable inline interception on the interface group. Inline
interception is enabled by default when the WAE contains a Cisco WAE Inline Network Adapter, but
must be explicitly enabled on devices with a Cisco Interface Module (see Enabling Inline Operation on
WAEs).
Step 9 In the Exclude VLAN field, enter a list of one or more VLAN ranges to exclude from optimization. You
can enter the word native to exclude the native VLAN. Separate each VLAN range from the next with
a comma. Alternatively, you can select VLAN ranges from a list by following these steps:
a. Click Configure Include VLANs when you know the list of VLANs that you want to include in
inline interception. This button runs a script that prompts you for a comma-separated list of VLANs
that you want to include. The script generates an inverse list of all the VLANs that should be
excluded and then updates the window and puts the list into the Exclude VLAN field.
b. Click Choose VLANs from the list to choose VLAN ranges. The VLAN Range Assignments
window appears, displaying the VLAN ranges that are defined. Defining VLAN ranges is described
in Configuring VLANs for Inline Support.
c. Choose the VLAN ranges to include or exclude:
– Check the check box next to each VLAN range that you want to include for optimization, and
click the Include Vlan taskbar icon. All the VLANs that are not included for optimization are
excluded. For devices using WAAS versions earlier than 5.0, click next to each VLAN range
that you want to include. The icon changes to .
– Check the check box next to each VLAN range that you want to exclude from optimization, and
click the Exclude Vlan taskbar icon. For devices using WAAS versions earlier than 5.0, click
next to each VLAN range that you want to exclude from optimization. The icon changes to
.
– Click the Clear Selection taskbar icon to clear all selections. For devices using WAAS versions
earlier than 5.0, click in the taskbar to select all the available VLAN ranges for
optimization, or click in the taskbar to exclude all the VLAN ranges from optimization.
d. Click OK. For devices using WAAS versions earlier than 5.0, click Submit.
Step 10 From the Failover Timeout drop-down list, choose 1, 3, 5, or 10 seconds. The default is 1 second. This
value sets the number of seconds after a failure event that the WAE waits for before beginning to operate
in bypass mode. In bypass mode, all the traffic received on either port of the interface group is forwarded
out to the other port in the group.
This check box applies only to devices that use Cisco WAE Inline Network Adapters. For devices that
use Cisco Interface Modules, the failover timeout is configured in the Inline Interception Settings
window (Figure 5-6) and does not appear in this window.
Step 11 Configure the Speed and Mode port settings as follows (these settings are not used for the interfaces on
the Cisco Interface Module on a device using WAAS Version 5.0 or later, which uses auto sensing):
a. Uncheck the AutoSense check box, which is enabled by default.
b. From the Speed drop-down list, choose a transmission speed (10, 100, 1000, or 10000 Mbps).
Choose 1000 Mbps for fiber Gigabit Ethernet interfaces on a Cisco Interface Module for devices
using WAAS versions earlier than 5.0.
c. From the Mode drop-down list, choose a transmission mode (full-duplex or half-duplex). Choose
full-duplex for fiber Gigabit Ethernet interfaces on a Cisco Interface Module for devices using
WAAS versions earlier than 5.0.
Note We strongly recommend that you do not use half-duplex connections on WAEs or on routers,
switches, or other devices. Half duplex impedes performance and should not be used. Check
each Cisco WAE interface and port configuration on the adjacent device (router, switch,
firewall, and WAE) to verify that full duplex is configured.
Step 12 In the Address field, enter an IP address for the inline interface, if you want to assign an IP address.
Step 13 In the Netmask field, enter a subnet mask for the inline interface.
Step 14 Enter up to four secondary IP addresses and corresponding subnet masks in the Secondary Address and
Secondary Netmask fields.
Configuring multiple IP addresses allows the device to be present in more than one subnet and can be
used to optimize response time because it allows the data to go directly from the WAAS device to the
client that is requesting the information without being redirected through a router. The WAAS device
becomes visible to the client because both are configured on the same subnet.
Step 15 In the Default Gateway field, enter the default gateway IP address. The Default Gateway field is not
shown for devices using WAAS versions 5.0 or later.
Step 16 (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.
The drop-down list contains all the IP ACLs that you configured in the system.
Step 17 (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.
Step 18 Under IPv6 Settings, you can manually assign an IPv6 address to the inline interface or select from the
following options. If you select one of the following options, the IPv6 address field and subsequent
secondary IPv6 address fields are not available.
• Use Single Link Local - A unicast address that is automatically configured on an interface using the
link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this
address configuration option is sufficient for nodes on a link to communicate.
• Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC
4862.
Step 19 Enter up to four secondary IP addresses and corresponding subnet masks in the Secondary Address and
Secondary Netmask fields.
Configuring multiple IP addresses allows the device to be present in more than one subnet and can be
used to optimize response time because it allows the data to go directly from the WAAS device to the
client that is requesting the information without being redirected through a router. The WAAS device
becomes visible to the client because both are configured on the same subnet.
Step 20 In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number
of attempts by which the duplicate address should be detected.
Step 21 Click OK. (For devices using WAAS versions earlier than 5.0, click Submit.)
Step 22 For WAAS Version 5.0 and later, choose Configure > Network > Default Gateway to configure the
default gateway for an inline interface:
a. In the Default Gateway field, enter the default gateway IP address.
b. Click Submit.
To configure inline interception from the CLI, use the interface InlineGroup global configuration
command.
To configure the inline settings on WAEs configured as application accelerators, see Enabling Inline
Operation on WAEs.
On WAVE-594/694/7541/7571/8541 devices that use Cisco AppNav Controller Interface Modules, the
AppNav Controller Interface Module ports are configured by default for normal standalone operation.
To use the device in inline mode, you must configure the ports for inline operation and create an inline
bridge group. Enabling inline mode configures all the ports for inline operation.
To enable inline operation and configure an inline bridge group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name. (You cannot enable inline
operation from device groups.)
Step 2 Choose Configure > Interception > Interception Configuration.
The Interception Configuration window appears.
Step 3 From the Interception Method drop-down list, choose Inline to enable inline mode.
Step 4 Click Submit to enable inline mode and refresh the window with additional settings.
All the existing bridge groups are listed, showing the bridge group number, protocol, link state
propagation setting, VLAN ranges, and included interfaces.
From this list, you can perform the following tasks:
• Edit the settings for a bridge group by choosing it, and clicking the Edit taskbar icon.
• Delete a bridge group by choosing it, and clicking the Delete taskbar icon.
• Create a new bridge group as described in the following steps.
Step 5 Click the Create Bridge taskbar icon.
Step 6 From the Bridge Index drop-down list, choose the bridge group number.
Step 7 (Optional) In the Description field, enter a bridge group description.
Step 8 (Optional) Check the Link State Propagation check box to enable link state propagation. It is enabled
by default.
Link state propagation means that if one interface in the inline bridge group is down, the system
automatically shuts down the other interface to ensure that a network failover scheme is triggered.
Step 9 (Optional) Configure VLANs to include in interception. Initially, all the VLANS are included. To
include or exclude specific VLAN ranges, follow these steps:
a. Click Vlan Calculator.
b. For each VLAN range that you want to include in interception, choose Add/Include from the Select
Operation Type drop-down list. In the Vlan Range field, enter a comma-separated list of one or
more VLAN ranges to include. You can enter the word native to include the native VLAN.
c. For each VLAN range that you want to exclude from interception, choose Except/Exclude from the
Select Operation Type drop-down list. In the Vlan Range field, enter a comma-separated list of one
or more VLAN ranges to exclude. You can enter the word native to exclude the native VLAN.
d. Click OK to save your settings.
Step 10 In the Assign Interfaces area, check the check box next to two interfaces that you want to assign to this
bridge group, and then click the Assign taskbar icon. To unassign assigned interfaces, check each
interface that you want to unassign, and click the Unassign taskbar icon. The bridge group can contain
two physical or two port-channel interfaces, or a combination.
Step 11 Click OK to create the bridge group.
This example shows how to assign VLAN ID 100 to the traffic leaving the WAE. The VLAN ID can
range from 1 to 4094.
Note You can set the VLAN ID of the inline traffic by using the encapsulation dot1Q interface command or
by using the Central Manager menu item Configure > Interception > Interception Configuration (see
Configuring Inline Interface Settings on WAEs).
If the VLAN ID that you set does not match the VLAN ID expected by the router subinterface, you may
not be able to connect to the inline interface IP address.
The inline adapter supports only a single VLAN ID for each inline group interface. If you have
configured a secondary address from a different subnet on an inline interface, you must have the same
secondary address assigned on the router subinterface for the VLAN.
Using IEEE 802.1Q tunneling increases the frame size by 4 bytes when the tag is added. Therefore, you
must configure all the switches through which the tunneled packet traverses to be able to process larger
frames by increasing the device MTU to at least 1504 bytes.
Note When an Inline interface on a WAE configured with IPv6 address and dot1 q encapsulation, tries to
communicate with an IPv6 default gateway, the communication fails. If the same device, configured
with IPv4 address and dot1 Q encapsulation, tries to communicate with an IPv4 default gateway, the
communication is successful.
Note that when dot1Q encapsulation is disabled, the WAE (configured with either IPv6 or IPv4) can
successfully reach the default gateway of the relevant IP type.
The following operating considerations apply to configuring IP addresses on the inline interfaces:
• This feature provides basic routable interface support and does not support the following additional
features associated with the built-in interfaces: standby and port channel.
• If you have configured a WAE to use inline interfaces for all traffic, inline interception must be
enabled; otherwise, the WAE will not receive any traffic.
• If you have configured a WAE to use the inline interfaces for all traffic, and it goes into mechanical
bypass mode, the WAE become inaccessible through the inline interface IP address. Console access
is required for device management when an inline interface is in bypass mode.
• If you have configured a WAE with an IP address on an inline interface, the interface can accept only
traffic addressed to it and ARP broadcasts, and the interface cannot accept multicast traffic.
• In a deployment using the Hot Standby Router Protocol (HSRP) where two routers that participate
in an HSRP group are directly connected through two inline groups, HSRP works for all the clients
if the active router fails. However, this redundancy does not apply to the IP address of the WAE itself
for management traffic, if management traffic is also configured to use the inline interface. If the
active router fails, you will not be able to connect to the WAE inline IP address because the inline
interface is physically connected to the failed router interface. You will be able to connect to the
WAE through the second inline group interface that is connected to the standby router. If redundancy
is needed for the IP address of the WAE itself for management traffic, we recommend that you use
the IP addresses of the built-in interfaces rather than the inline interfaces.
Step 1 From the WAAS Central Manager menu, choose Configure > Platform > Vlans.
The Vlans window appears, which lists the VLANs that are defined. From this list, you can perform the
following tasks:
• Edit a VLAN by choosing it and clicking the Edit taskbar icon.
• Delete a VLAN by choosing it and clicking the Delete taskbar icon.
• Create a new VLAN as described in the following steps.
Step 2 Click the Add VLAN taskbar icon. The VLAN pane appears.
Step 3 In the Name field, enter a name for the VLAN list.
Step 4 In the Ranges field, enter a list of one or more VLAN ranges. Separate each VLAN range from the next
with a comma (but no space). This list of VLAN ranges can be included or excluded from optimization
when you configure the inline interface group, as described in Configuring Inline Interface Settings on
WAEs. You cannot specify the term native in this field.
Step 5 Click OK.
This facility for creating VLAN lists is provided so that you can configure VLAN lists globally. You do
not have to use this facility to configure VLANs for an inline interface. You can configure VLANs
directly in the inline interface settings window, as described in Configuring Inline Interface Settings on
WAEs.
Note Overload failover occurs on TFO overload, not overload of individual application accelerators, and it is
intended for temporary overload protection. We do not recommend that you continually run a WAE in
an overloaded state, frequently triggering overload failover.
A serial cluster consists of two WAE devices connected together sequentially in the traffic path. The
WAN port of one device is connected to the LAN port of the next device, as shown in Figure 5-9.
1 2 3 4
WAN
159918
File and Switch WAE-1 WAE-2 Router
application servers
In a serial cluster, all the traffic between a switch and router passes through all the inline WAEs. In
Figure 5-9, TCP connections are optimized by WAE-1. If WAE-1 fails, it bypasses the traffic and
connections are then optimized by WAE-2.
The policy configuration of serially clustered WAEs should be the same. Additionally, we recommend
that you use the same device for both the WAEs in the cluster.
When serially clustering inline WAEs, on each WAE, you must configure the address of the other WAE
in the cluster as a nonoptimizing peer. This disables optimization between the two peer WAEs in the
serial cluster, since you want optimization only between the WAE peers on each side of the WAN link.
For information on how to disable optimization between peers, see Disabling Peer Optimization
Between Serial Inline WAEs.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name. (You cannot configure peer
settings from device groups.)
Step 2 Choose Configure > Peers > Peer Settings.
The Peer Settings window appears. (See Figure 5-10.)
Step 3 Click the Select Peer triangle control to display the other WAEs that are registered with this Central
Manager, in the lower part of the window (see the Select Peer area).
Step 4 In the Select Peer area, click the radio button next to the serial peer of the current device. The peer device
name appears in the Disable Optimization With Peer field.
To filter the device list, enter a string in the Filter field. As you enter characters, the device list is
dynamically filtered to include only devices that have the filter string in their name or hardware device
ID.
Step 5 Check the Automatically Configure Peer check box to allow the Central Manager to configure the other
peer with a similar setting to disable optimization with the current device.
If you do not check this check box, you must manually configure the other peer to disable optimization
with the current device. After you submit your changes, you can click Switch to Peer to go to this same
configuration page for the peer device.
Step 6 In the Description field, enter a description for the peer. The default description is the device name of
the peer.
Step 7 Click Submit.
To disable serial peer optimization from the CLI, use the no peer device-id global configuration
command. To re-enable serial peer optimization, use the peer device-id global configuration command.
To view the status of all the serial cluster pairs registered with the Central Manager, from the WAAS
Central Manager menu, choose Configure > Global > Peer Settings. The Peer Settings status window
appears, as shown in Figure 5-11.
The window lists each WAE for which you have configured peer optimization settings. Verify that there
are two entries for each serial cluster pair, both with a check mark in the Mutual Pair column. There
should be an entry for each WAE in the pair, for example, the first and last entries in the figure.
If you see an entry without a check mark in the Mutual Pair column (like the third one in the figure), it
indicates a WAE on which a serial peer is configured, but the peer is not similarly configured with the
first device as its serial peer.
Note ISR-WAAS devices support only the AppNav Controller interception method.
If you create an AppNav Cluster by using the Central Manager wizard, or you add WNs to a cluster
through the AppNav Clusters window, the Central Manager automatically configures WNs with the
appnav-controller interception method. After the WN is added to a cluster, its interception method
cannot be changed.
To manually configure appnav-controller interception on a WN, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Interception > Interception Configuration. The Interception Configuration
window appears.
Step 3 From the Interception Method drop-down list, choose appnav-controller to enable the
appnav-controller interception method.
Step 4 Click Submit.
This chapter describes how to configure basic network settings such as configuring additional network
interfaces to support network traffic, creating port channel and standby interfaces, configuring
optimization on Cisco Wide Area Application Services (WAAS) Express interfaces, specifying a default
gateway and Domain Name System (DNS) servers, enabling the Cisco Discovery Protocol (CDP).
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central
Managers and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE refers to
WAE and WAVE appliances, SM-SRE modules running WAAS, and Cisco Virtual WAAS (vWAAS)
instances.
This section describes how to configure additional interfaces using options for redundancy, load
balancing, and performance optimization and also to modify previously configured settings on
interfaces.
This section contains the following topics:
• Configuring a Standby Interface
• Configuring Multiple IP Addresses on a Single Interface
• Modifying Ethernet Interface Settings
• Configuring the Default Gateway
• Configuring Port-Channel Settings
• Configuring Interfaces for DHCP
• Modifying Virtual Interface Settings for a vWAAS Device
• Enabling or Disabling Optimization on WAAS Express Interfaces
• Enabling WAAS Service Insertion on AppNav-XE Device Interfaces
• Configuring Management Interface Settings
• Configuring Management Interface Settings
• Configuring a Jumbo MTU
We recommend that you use the WAAS Central Manager instead of the WAAS CLI to configure network
settings. If you want to use the CLI, see the following commands in the Cisco Wide Area Application
Services Command Reference: interface, ip address, port-channel, and primary-interface.
Network interfaces are named as follows on WAAS devices:
• WAE-512/612/7326—Have two inbuilt Ethernet interfaces named GigabitEthernet 1/0 and
GigabitEthernet 2/0.
• WAVE-294/594/694/7541/7571/8541—Have two inbuilt Ethernet interfaces named GigabitEthernet
0/0 and GigabitEthernet 0/1. Additional interfaces on the Cisco Interface Module and AppNav
Controller Interface Module are named GigabitEthernet 1/0 to 1/11 or TenGigabitEthernet 1/0 to
1/3, depending on the number and type of ports.
• NME-WAE devices—Have an internal interface to the router that is designated 1/0, and an external
interface that is designated 2/0.SM-SRE devices—Have an internal interface to the router that is
designated 1/0 and an external interface that is designated 2/0.
Note We strongly recommend that you do not use half-duplex connections on the WAE or on routers, switches,
or other devices. Half duplex impedes performance and should not be used. Check each Cisco WAE
interface and the port configuration on the adjacent device (router, switch, firewall, and WAE) to verify
that full duplex is configured.
When connecting an AppNav Controller to a Cisco Nexus 7000 Series switch, the interfaces on both
devices must be set to the same autonegotiate setting: either both on or both off. If they are set differently,
switch-link flapping may occur.
Note On Cisco ISR-WAAS devices, you cannot configure the following from the WAAS Central Manager:
network interfaces, ip addresses (IPv4 or IPv6), routes, default gateway, DNS servers, and jumbo
maximum transmission unit (MTU). Use the router CLI to configure these.
Note Layer 3 interfaces may drop bridge protocol data unit (BPDU) packets. However, this does not affect
data traffic.
Note When a Central Manager and WAE are part of a dual stack configuration, the primary interface on the
Central Manager must be configured with an IPv6 address. If this is not configured, then a device
(configured with only an IPv6 address) fails to communicate with the Central Manager when it is
registered to the CM; and goes into the offline state.
Configuring a standby interface differs, depending on the version of the WAAS device that you are
configuring. See one of the following topics:
• Configuring a Standby Interface on a Device with Version 5.0 or Later
• Configuring a Standby Interface on a Device Earlier than Version 5.0
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces.
The Network Interfaces window for the device appears. (See Figure 6-1.)
Step 3 In the taskbar of the lower area, click the Create Logical Interface icon.
The Create Logical Interface window appears.
Step 4 From the Logical Interface Type drop-down list, choose Standby and click OK.
The window refreshes with fields for configuring the standby group settings.
Step 5 From the Standby Group Number drop-down list, choose a group number for the interface.
Step 6 (Optional) From the Bridge Group Number drop-down list, choose a bridge virtual interface (BVI) group
number with which to associate this standby interface, or None. For more information on BVI, see
Configuring Management Interface Settings.
Note This configuration item is not supported on AppNav Controller Interface Module ports.
Step 7 (Optional) In the Description field, enter a description for the standby group.
Step 8 (Optional) Check the Shutdown check box to shut down the hardware interface. By default, this option
is disabled.
Step 9 (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the
interface for statistics and calculate throughput. The default is 30 seconds.
Step 10 In the Address field, specify the IP address of the standby group.
Step 11 In the Netmask field, specify the netmask of the standby group.
Step 12 Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the
following options. If you select one of the following options, the IPv6 address field and subsequent
secondary IPv6 address fields are not available.
• Use Link Local - A unicast address that is automatically configured on an interface using the
link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this
address configuration option is sufficient for nodes on a link to communicate.
• Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC
4862.
Step 13 In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number
of attempts by which the duplicate address should be detected.
Step 14 In the Assign Interfaces area, check the check boxes next to the two interfaces that you want to assign
to this standby group and click the Assign taskbar icon. (To unassign any assigned interfaces, check the
check box next to each interface that you want to unassign and click the Unassign taskbar icon.)
If you want to have two port-channel interfaces as members of the standby group, do not assign any
interfaces here. When you create the port-channel interfaces, you assign the standby group number in
that window.
Step 15 To assign one physical interface as the primary (active) interface in the standby group, ensure that it is
the only interface that is checked, and then click the Enable Primary taskbar icon.
Step 16 Click OK.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces.
The Network Interfaces window for the device appears.
Step 3 In the taskbar, click the Create New Interface icon.
The Creating New Network Interface window appears.
Step 4 From the Port Type drop-down list, choose Standby.
The window refreshes with fields for configuring the standby group settings.
Step 5 From the Standby Group Number drop-down list, choose a group number for the interface.
Step 6 (Optional) In the Description field, enter a description for the standby group.
Step 7 In the Address field, specify the IP address of the standby group.
Step 8 In the Netmask field, specify the netmask of the standby group.
Step 9 (Optional) Check the Shutdown check box to shut down the hardware interface. By default, this option
is disabled.
Step 10 In the Default Gateway field, enter the default gateway IP address. If an interface is configured for
DHCP, then this field is read only.
Step 11 (Optional) From the Bridge Group Number drop-down list, choose a bridge virtual interface (BVI) group
number with which to associate this standby interface, or choose None. For more information on BVI,
see Configuring Management Interface Settings.
Step 12 Click Submit.
Step 13 Configure the physical interface members, as described in Assigning Physical Interfaces to a Standby
Group.
Note After you create the standby interface, assign two physical interfaces to the standby group.
After you configure a logical standby interface for a device with a WAAS version earlier than 5.0,
configure the standby group by assigning physical interfaces to the standby group and setting one
physical interface as the primary standby interface. The primary interface in the standby group uses the
standby group IP address. You must have a standby interface configured before you can set it as primary.
(See Configuring a Standby Interface.)
You can assign an interface to a standby group only if the interface does not have an IP address assigned,
and uses the IP address of the standby group.
Note Removing a physical interface from standby group 2 on all WAAS device models may cause network
disruption for up to 30 seconds. Additionally, removing a physical interface from standby group 1 on
device model WAE-612 may cause network disruption for up to 30 seconds. The best practice is to make
such changes when traffic interception is disabled, or at a time when traffic disruption is acceptable.
To associate an interface with a standby group and set it as the primary standby interface, follow these
steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces window for the device
appears.
Step 3 Click the Edit icon next to the physical interface that you want to assign to a standby group. The
Interface Settings window appears.
Note Choose a physical interface, not a logical interface (standby, port channel, or BVI), in this step.
Step 4 Complete the following steps to assign the interface to a standby group and specify it as the primary
standby interface:
a. In the Port Type To Assign drop-down list, choose Standby.
b. Check either the Join Standby Group 1 or the Join Standby Group 2 check box. (Only one check
box is shown if only one standby interface has been defined.)
c. (Optional) Check the Standby Primary check box if you want this physical interface to be the
primary (active) interface in the standby group.
Step 5 Click Submit.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces listing window appears.
Step 3 Choose the physical interface that you want to modify and click the Edit taskbar icon. (For devices using
WAAS versions earlier than 5.0, click the Edit icon next to the interface.)
The Interface Settings window appears.
Note Do not choose a standby or port-channel interface in this step. You cannot configure multiple IP
addresses on these types of interfaces.
Step 4 In the Secondary Address and Secondary Netmask fields 1 through 4, enter up to four different IP
addresses and secondary netmasks for the interface.
Step 5 Click OK. (For devices using WAAS versions earlier than 5.0, click Submit).
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces.
The Network Interfaces window appears, listing the configured network interfaces.
Note On NME-WAE devices, the internal interface to the router is designated slot 1, port 0, and the
external interface is designated slot 2, port 0. For NME-WAE configuration details, see the
document Configuring Cisco WAAS Network Modules for Cisco Access Routers.
On ISR-WAAS devices you cannot configure the network interfaces from the Central Manager.
Step 3 Choose the physical interface that you want to modify, and click the Edit taskbar icon. (For devices using
WAAS versions earlier than 5.0, click the Edit icon next to the interface.)
The Interface Settings window appears, displaying the interface configurations on a particular slot and
port. The interface type, slot, and port are determined by the hardware.
Note When configuring the internal interface (GigabitEthernet 1/0) on an NME-WAE device, you
cannot change the following fields or check boxes: Port Channel Number, AutoSense, Speed,
Mode, Address, Netmask, Use DHCP, and Standby Group. If you attempt to change these values,
the Central Manager displays an error when you click OK. These settings for the internal
interface can be configured only through the host router CLI. For NME-WAE details, see the
document Configuring Cisco WAAS Network Modules for Cisco Access Routers.
Step 4 (Optional) In the Description field, enter a description for the interface.
Step 5 (Optional) Check the Use CDP check box to enable the Cisco Discovery Protocol (CDP) on an interface.
When enabled, CDP obtains protocol addresses of neighboring devices and discovers the platform of
those devices. It also shows information about the interfaces used by your router.
Configuring CDP from the CDP Settings window enables CDP globally on all the interfaces. For
information on configuring CDP settings, see Configuring CDP Settings.
Step 6 (Optional) Check the Shutdown check box to shut down the hardware interface.
Step 7 (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the
interface for statistics and calculate throughput. The default is 30 seconds. (The Load Interval item is
not shown for devices using WAAS versions earlier than 5.0.)
Step 8 (Optional) Check the AutoSense check box to set the interface to autonegotiate the speed and mode.
(This setting is not available on interfaces on some Cisco Interface Modules.)
Checking this check box disables the manual Speed and Mode drop-down list settings.
Note When autosense is on, manual configurations are overridden. You must reboot the WAAS device
to start autosensing.
Step 9 (Optional) Manually configure the interface transmission speed and mode settings as follows (these
settings are not available on interfaces on some Cisco Interface Modules):
a. Uncheck the AutoSense check box.
b. From the Speed drop-down list, choose a transmission speed (10, 100, 1000, or 10000 Mbps). You
must choose 1000 Mbps for fiber Gigabit Ethernet interfaces on a Cisco Interface Module.
c. From the Mode drop-down list, choose a transmission mode (full-duplex or half-duplex). You must
choose full-duplex for fiber Gigabit Ethernet interfaces on a Cisco Interface Module. This
configuration item is not supported on AppNav Controller Interface Module ports.
Full-duplex transmission allows data to travel in both directions at the same time through an
interface or a cable. A half-duplex setting ensures that data travels only in one direction at any given
time. Although full duplex is faster, the interfaces sometimes cannot operate effectively in this
mode. If you encounter excessive collisions or network errors, you may configure the interface for
half duplex rather than full duplex.
Note We strongly recommend that you do not use half-duplex connections on the WAE or on
routers, switches, or other devices. Half duplex impedes performance and should not be
used. Check each Cisco WAE interface and the port configuration on the adjacent device
(router, switch, firewall, and WAE) to verify that full duplex is configured.
Step 10 Specify a value (in bytes) in the MTU field to set the interface MTU size.
The range is 576 to 1500 bytes. The MTU is the largest size of IP datagram that can be transferred using
a specific data link connection.
If the interface has a IPv6 configuration, the MTU range is between 1280-1500 bytes.
Note The MTU field is not editable if the interface is assigned to a standby or port-channel group, or
if a system jumbo MTU is configured.
Step 11 (Optional) Check the Use DHCP check box to obtain an interface IP address through DHCP. Checking
this box hides the IP address and Netmask fields. (For devices with WAAS versions earlier than 5.0,
these fields are not hidden, but are disabled.) This configuration item is not supported on AppNav
Controller Interface Module ports.
Optionally, supply a hostname in the Hostname field and a client ID in the Client Id field.
Step 12 In the Address field, enter a new IP address to change the interface IP address.
Step 13 In the Netmask field, enter a new netmask to change the interface netmask.
Step 14 (Optional) Enter up to four secondary IP addresses and corresponding subnet masks in the Secondary
Address and Secondary Netmask fields. These fields are not supported on AppNav Controller Interface
Module ports.
Configuring multiple IP addresses allows the device to be present in more than one subnet and can be
used to optimize the response time because it allows the data to go directly from the WAAS device to
the client that is requesting the information without being redirected through a router. The WAAS device
becomes visible to the client because both are configured on the same subnet.
Step 15 In the Default Gateway field, enter the default gateway IP address. If an interface is configured for
DHCP, this field is read only. (The Default Gateway field is not shown for devices using WAAS versions
5.0 or later; configure it as described in Configuring the Default Gateway.)
Step 16 (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.
The drop-down list contains all the IP ACLs that you configured in the system.
Step 17 (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.
Step 18 Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the
following options. If you select one of the following options, the IPv6 address field and subsequent
secondary IPv6 address fields are not available.
• Use Link Local - A unicast address that is automatically configured on an interface using the
link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this
address configuration option is sufficient for nodes on a link to communicate.
• Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC
4862.
• Use DHCP - To obtain an interface IP address through DHCP.
Step 19 In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number
of attempts by which the duplicate address should be detected.
Step 20 Click OK. (For devices using WAAS versions earlier than 5.0, click Submit.)
Note Changing the interface transmission speed, duplex mode, or MTU may cause network disruption for up
to 30 seconds. The best practice is to make such changes when traffic interception is disabled or at a time
when traffic disruption is acceptable.
Note We recommend that you enable flow control on the Nexus 7000 and 6500 Series models when WAAS
IOM onboard NIC are directly attached to the Nexus 7000 and 6500 Series models, and input packet
drops are seen.
There are three options for enabling flow control for the local port:
• Fully enable the local port to send or receive frames regardless of the flow-control setting of the
remote port,
• Set the local port to use the same setting you have specified for the remote port.
• Set a combination of the two states for the local and remote ports.
Note If you enable flow control on both the local and the remote Ethernet port, or you set a specified flow
control of the remote port only, or set a combination of these states—flow control is enabled for those
ports.
Note For Ethernet ports that run at 10 GB/s or faster, you cannot used the specified state for the send/receive
parameter.
• If you want the local port to send flow-control pause frames, verify that the remote port has a
Receive parameter set to On or Desired.
• If you want the local port to receive flow-control frames, verify that the remote port has a Send
parameter set to On or Desired.
• If you do not want to use flow control, set the remote port’s Send and Receive parameters to Off.
To configure flow control for 1 GB/s and faster Ethernet ports, follow these steps:
Step 1 Enter Configuration mode for the terminal, using the config terminal command.
Step 2 Specify an Ethernet interface to configure, using the interface ethernet slot/port command.
The interface ethernet slot/port command enters the terminal into Interface Configuration mode.
Step 3 Specify the flow-control setting for ports, using the flowcontrol command.
Parameters for this command are send/receive and desired/on/off.
• You can set the Send parameter only for ports running at 1000 MB/s or faster.
• You can set the Receive parameter for ports running at any speed.
Step 4 Display the interface status, using the show interface gigabitEthernet slot/port command.
The interface status includes the flow-control parameters.
The following is sample output from the show interface gigabitEthernet slot/port command:
#show interface gigabitEthernet 0/1
Step 5 Display the flow control status for all Ethernet ports, using the show interface flowcontrol command.
Step 6 Exit Interface mode, using the exit command.
Step 7 (Optional) Copy the running configuration to the startup configuration, using the copy running-config
startup-config command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Default Gateway.
The Default Gateway window appears with fields for IPv4 and IPv6.
Step 3 In the Default Gateway field, enter the default gateway IP address( either IPv4 or IPv6 address).
Step 4 Click Submit.
To configure a default gateway from the CLI, use the ip default-gateway global configuration or the
ipv6 default-gateway address command.
On WAAS devices with versions earlier than 5.0, the default gateway should be configured within the
interface settings for each interface.
Note On ISR-WAAS devices, you cannot configure the default gateway from the Central Manager.
Note You must disable autoregistration if the device has only two interfaces and both device interfaces are
configured as port-channel interfaces.
Configuring a port-channel interface differs, depending on the version of the WAAS device that you are
configuring. See one of the following topics:
• Configuring a Port-Channel Interface on a Device with Version 5.0 or Later
• Configuring a Port-Channel Interface on a Device Earlier than Version 5.0
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces window for the device
appears.
Step 3 In the taskbar of the lower area, click the Create Logical Interface icon. The Create Logical Interface
window appears.
Step 4 From the Logical Interface Type drop-down list, choose PortChannel and click OK. The window
refreshes with fields for configuring the port-channel interface settings.
Step 5 From the Port Channel Number drop-down list, choose a number for the interface.
Step 6 (Optional) From the Bridge Group Number drop-down list, choose a bridge group number with which
to associate this interface, or choose None. The bridge group number can be associated with a BVI or
an inline bridge group defined on an AppNav Controller.
Step 7 (Optional) From the Standby Group Number drop-down list, choose a standby group number with which
to associate this interface, or choose None.
You must create the standby group with no assigned interfaces before it appears as a choice in this list.
Step 8 (Optional) In the Description field, enter a description for the interface.
Step 9 (Optional) Check the Shutdown check box to shut down the hardware interface. By default, this option
is disabled.
If you plan to assign this port-channel interface to a standby interface, check this check box.
Step 10 (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the
interface for statistics and calculate throughput. The default is 30 seconds.
Step 11 In the Address field, specify the IP address of the interface.
If you are assigning this port-channel interface to a standby group, do not configure an IP address or
netmask. The standby group supplies the IP address and netmask.
Step 12 In the Netmask field, specify the netmask of the interface.
Step 13 (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.
The drop-down list contains all the IP ACLs that you configured in the system.
Step 14 (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.
Step 15 Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the
following options. If you select one of the following options, the IPv6 address field and subsequent
secondary IPv6 address fields are not available.
• Use Link Local - A unicast address that is automatically configured on an interface using the
link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this
address configuration option is sufficient for nodes on a link to communicate.
• Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC
4862.
Step 16 In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number
of attempts by which the duplicate address should be detected.
Step 17 In the Assign Interfaces area, click the check box next to the interfaces that you want to assign to this
port channel and click the Assign taskbar icon. To unassign assigned interfaces, check the check box
next to each interface that you want to unassign and click the Unassign taskbar icon.
If you plan to assign this port-channel interface to a standby interface, do not assign interfaces until after
the port channel is assigned to the standby interface.
Step 18 Click OK.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces window appears, listing
all the interfaces for the chosen device.
Step 3 In the taskbar, click the Create New Interface icon. The Creating New Network Interface window
appears.
Step 4 From the Port Type drop-down list, choose PortChannel.
The window refreshes and provides fields for configuring the network interface settings.
Step 5 From the Port Channel Number drop-down list, choose the number of the port-channel interface. Up to
four port channels are supported, depending on the WAAS device model and installed interface module.
Step 6 (Optional) In the Description field, enter a description for the port channel.
Step 7 (Optional) Check the Shutdown check box to shut down this interface. By default, this option is
disabled.
Step 8 In the Default Gateway field, enter the default gateway IP address.
Step 9 In the Address field, specify the IP address of the interface.
Step 10 In the Netmask field, specify the netmask of the interface.
Step 11 (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.
The drop-down list contains all the IP ACLs that you configured in the system.
Step 12 (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.
Step 13 Click Submit.
Step 14 Configure the physical interface members as described in Assigning Physical Interfaces to a Port
Channel.
Note After you create the port-channel interface, assign physical interfaces to the port channel.
After you have configured a logical port-channel interface, you must assign multiple physical interfaces
to the port channel. You can assign up to four physical interfaces to one port-channel interface,
depending on the WAAS device.
You can assign an interface to a port channel only if the interface does not have an IP address assigned,
and uses the IP address of the port channel.
You cannot combine built-in Ethernet ports with ports on a Cisco Interface Module into the same
port-channel interface.
Note Removing a physical interface from a port channel on device model WAE-612 may cause network
disruption for up to 30 seconds. The best practice is to make such changes when traffic interception is
disabled or at a time when traffic disruption is acceptable.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces window for the device
appears.
Step 3 Click the Edit icon next to the physical interface that you want to assign to a port channel. The
Modifying Network Interface window appears.
Choose a physical interface, not a logical interface (standby, port channel, or BVI), in this step.
Step 4 Complete the following steps to assign the interface to a port channel:
a. From the Port Type To Assign drop-down list, choose PortChannel.
b. From the Port Channel Number drop-down list, choose the number of the port channel to which you
want to add the physical interface.
Step 5 Click Submit.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > Port Channel.
Step 3 From the Load Balancing Method drop-down list, choose a load-balancing method:
• src-dst-ip-port—The distribution function is based on a combination of source and destination IP
addresses and ports. This load-balancing method is available only on devices running Version 4.4.1
and later.
• src-dst-ip—The distribution function is based on a combination of source and destination IP
addresses. This load-balancing method is available only on devices running Version 5.0.1 and later.
• round-robin—Round robin allows traffic to be distributed evenly among all the interfaces in the
channel group. This load-balancing method is available only on devices running versions earlier
than 4.4.1.
Step 4 Click Submit.
To configure a load-balancing method from the CLI, use the port-channel global configuration
command.
Note To configure devices running previous versions of WAAS, a device group can be configured with a
load-balancing method supported only by previous WAAS software versions. When viewing the Port
Channel Settings window for Version 4.4.1 or later for a device that gets its settings from such a device
group, you may see an unsupported load-balancing method listed. However, a Version 4.4.1 or later
device supports only the load-balancing methods as described above, regardless of what the device group
or device configuration window shows for the setting.
Note You must disable autoregistration before you can manually configure an interface for DHCP.
A WAAS device sends its configured client identifier and hostname to the DHCP server when requesting
network information. You can configure DHCP servers to identify the client identifier information and
the hostname information that the WAAS device is sending and then to send back the specific network
settings that are assigned to the WAAS device.
To enable an interface for DHCP, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces listing window appears.
Step 3 Choose the physical interface that you want to modify and click the Edit taskbar icon. (For devices using
WAAS versions earlier than 5.0, click the Edit icon next to the interface.)
The Interface Settings window appears.
Note Do not choose a logical interface (standby, port channel, or BVI) in this step, because you cannot
configure DHCP on a logical interface. In addition, do not choose the internal interface
(GigabitEthernet 1/0) on an NME-WAE module, because this interface can be configured only
through the host router CLI. For NME-WAE details, see the document Configuring Cisco WAAS
Network Modules for Cisco Access Routers. For SM-SRE details, see the document Cisco SRE
Service Module Configuration and Installation Guide.
The DHCP server uses this identifier when the WAAS device requests the network information for the
device.
Step 7 Click Submit.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Note On ISR-WAAS devices you cannot configure the virtual interface settings from the Central
Manager.
Note Certain values (including autosense) are not applicable to a vWAAS interface.
Step 3 Choose the interface that you want to modify and click the Edit taskbar icon. (For devices using WAAS
versions earlier than 5.0, click the Edit icon next to the interface.)
The Interface Settings window appears, displaying the interface configurations on a particular slot and
port.
Note Interface configurations for slot, port, and port type are set for virtual interfaces during initial
startup, or by using the WAAS CLI.
Some of the fields in the window (port-channel number, autosense, speed, mode, and
standby-related fields) are not available because they are not applicable.
Step 4 (Optional) In the Description field, enter a description for the interface.
Step 5 (Optional) Check the Use CDP check box to enable the Cisco Discovery Protocol (CDP) on an interface.
When enabled, CDP obtains protocol addresses of neighboring devices and discovers the platform of
those devices. It also shows information about the interfaces used by your router.
Configuring CDP from the CDP Settings window enables CDP globally on all the interfaces. For
information on configuring CDP settings, see Configuring CDP Settings.
Step 6 (Optional) Check the Shutdown check box to shut down the virtual interface.
Step 7 (Optional) From the Load Interval drop-down list, choose the interval, in seconds, at which to poll the
interface for statistics and calculate throughput. The default is 30 seconds. (The Load Interval item is
not shown for devices using WAAS versions earlier than 5.0.)
Step 8 Specify a value (in bytes) in the MTU field to set the interface MTU size.
The range is 576 to 1500 bytes. The MTU is the largest size of IP datagram that can be transferred using
a specific data link connection.
If the interface has a IPv6 configuration, the MTU range is between 1280-1500 bytes.
Note The MTU field is not editable if a system jumbo MTU is configured.
Step 9 Check the Use DHCP check box to obtain an interface IP address through DHCP. Checking this check
box hides the IP address and Netmask fields. (For devices with WAAS versions earlier than 5.0, these
fields are not hidden but are disabled.)
a. (Optional) In the Hostname field, specify the hostname for the WAAS device or other device.
b. (Optional) In the Client Id field, specify the configured client identifier for the device. The DHCP
server uses this identifier when the WAAS device requests the network information for the device.
Step 10 In the Address field, enter a new IP address to change the interface IP address.
Step 11 In the Netmask field, enter a new netmask to change the interface netmask.
Step 12 In the Default Gateway field, enter the default gateway IP address. The gateway interface IP address
should be in the same network as one of the device’s network interfaces. If an interface is configured for
DHCP, this field is read only. (The Default Gateway field is not shown for devices using WAAS versions
5.0 or later; instead, configure it, as described in Configuring the Default Gateway.)
Step 13 (Optional) From the Inbound ACL drop-down list, choose an IP ACL to apply to inbound packets.
The drop-down list contains all the IP ACLs that you configured in the system.
Step 14 (Optional) From the Outbound ACL drop-down list, choose an IP ACL to apply to outbound packets.
Step 15 Under IPv6 Settings, manually assign an IPv6 address to the primary interface or select from the
following options.
• Use Link Local - A unicast address that is automatically configured on an interface using the
link-local prefix FE80::/10 and the interface identifier in the modified EUI-64 format. Using this
address configuration option is sufficient for nodes on a link to communicate.
• Use Auto Config - To auto-configure an IPv6 global unicast address on the interface as per RFC
4862.
• Use DHCP - To obtain an interface IP address through DHCP.
Step 16 In the Duplicate address Detection Attempts field enter a number between 0-600 to specify the number
of attempts by which the duplicate address should be detected.
Step 17 Click OK. (For devices using WAAS versions earlier than 5.0, click Submit.)
Step 1 From the WAAS Central Manager menu, choose Devices > WAAS-Express-device-name (or Device
Groups > WAAS-Express-device-group-name).
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces window appears and lists
the available interfaces. (See Figure 6-2.)
Note Loopback interfaces are not included because they are not valid interfaces for optimization.
Null, Virtual-Access, NVI, and Embedded-Service interfaces are also not supported.
For a device group, the Network Interfaces window is different and displays an interface name, the
number of devices that contain that interface, and the number of devices in the group that have
optimization enabled on the interface. (See Figure 6-3.)
Figure 6-3 WAAS Express Network Interfaces Device Group Interfaces Window
Step 3 Check the check box next to each interface on which you want to enable WAAS optimization, and click
the Enable Optimization taskbar icon; or, to disable optimization, click the Disable Optimization
taskbar icon.
Note Enable WAAS optimization only on WAN interfaces, not LAN interfaces.
For a device group, enabling optimization for an interface enables optimization on that interface for all
the devices in the group that have the interface. You can check the check box next to a single device and
click the Edit taskbar icon to display a list of devices on which an interface is available and individually
configure optimization on those devices. (See Figure 6-4.)
Figure 6-4 WAAS Express Network Interfaces Device Group Devices Window
Step 1 From the WAAS Central Manager menu, choose Devices > AppNav-XE-device-name.
Step 2 Choose Configure > Network > Network Interfaces. The Network Interfaces window appears and lists
the available interfaces.
Step 3 Check the check box next to an interface on which you want to enable WAAS service insertion and click
the Edit taskbar icon.
Step 4 Check the Enable WAAS Service Insertion check box; or, to disable optimization, uncheck the check
box.
Enable WAAS service insertion only on WAN interfaces, not LAN interfaces.
Step 5 Click OK.
Step 6 Repeat Step 3 through Step 5 for each interface on which you want to enable WAAS service insertion.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Management Interface Settings.
The Management Interface Settings window appears with tabs for IPv4 and IPv6 settings. Select the
appropriate one for your network before you proceed.
Step 3 From the Management Interface drop-down list, choose the interface that you want to use as the
management interface.
Step 4 In the Management Default Gateway field, enter the default gateway IP address for management traffic.
Step 5 Check the Use Management Interface for FTP Traffic check box if you want to use the designated
management interface for FTP traffic.
Step 6 Check the Use Management Interface for TFTP Traffic check box to use the designated management
interface for TFTP traffic.
Step 7 Check the Use Management Interface for Tacacs Traffic check box to use the designated management
interface for TACACS traffic.
Step 8 Check the Use Management Interface for Radius Traffic check box to use the designated management
interface for RADIUS traffic.
Step 9 Check the Use Management Interface for DNS Traffic check box to use the designated management
interface for DNS traffic.
Step 10 Check the Use Management Interface for NTP Traffic check box to use the designated management
interface for NTP traffic.
Step 11 Click Submit. A confirmation message appears.
Step 12 Click OK.
To configure a different default gateway for management traffic from the CLI, use the ip
default-gateway management global configuration command.
After you have designate a management interface, create static IP routes for management traffic so that
an IP packet that is designated for the specified destination uses the configured route.
To configure a static route for management traffic, follow these steps:
Step 1 In the Management Interface Settings window, in the Management IP Routes area of this window, click
the Create Management IP Route taskbar button. The Management IP Routes window appears.
Step 2 In the Destination Network Address field, enter the destination network IP address.
Step 3 In the Netmask field, enter the destination host netmask. This field is not available when you create a
IPv6 Management IP Route.
Step 4 In the Gateway’s IP Address field, enter the IP address of the gateway interface.
The gateway interface IP address should be in the same network as the device’s management interface.
Step 5 Click Submit.
To configure a static route for management traffic from the CLI, use the ip route management global
configuration command.
Note To enable Jumbo MTU on ISR-WAAS devices, first we need to upgrade the ISR-WAAS to version 6.0
using the .ova files. The default MTU size for the virtual interface of the ISR-WAAS devices is 9000 and
cannot be changed.
If configured, a jumbo MTU applies to all the device interfaces, including logical interfaces with at least
one member physical interface. The MTU for individual interfaces cannot be changed while the jumbo
MTU is configured. If the jumbo MTU is disabled, all the interfaces are configured with an MTU of
1500.
To configure a jumbo MTU, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Jumbo MTU.
The Jumbo MTU Settings window appears.
Step 3 In the System Jumbo MTU field, enter the jumbo MTU size, in bytes, (maximum size varies by
platform).
Step 4 Click Submit.
Note If the original and optimized maximum segment sizes are set to their default values and you configure a
jumbo MTU setting, the segment sizes are changed to the jumbo MTU setting minus 68 bytes. If you
have configured custom maximum segment sizes, their values are not changed if you configure a jumbo
MTU. For more information on configuring maximum segment sizes, see Modifying the Acceleration
TCP Settings in Chapter 12, “Configuring Application Acceleration.”
To configure a jumbo MTU from the CLI, you can use the system jumbomtu global configuration
command.
Note Because of the complexities involved in TCP parameters, be careful when tuning these parameters. In
nearly all environments, the default TCP settings are adequate. Fine-tuning TCP settings is for network
administrators with adequate experience and full understanding of TCP operation details.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > TCP/IP Settings > TCP/IP. The TCP/IP Settings window appears.
Step 3 Make the necessary changes to the TCP settings.
See Table 6-1 for a description of each TCP field in this window.
Step 4 Click Submit.
A Click Submit to Save message appears in red next to the Current Settings line when there are
pending changes to be saved after you have applied default or device group settings. You can also revert
to the previously configured settings by clicking Reset, which is visible only when you have applied
default or group settings to change the current device settings, but have not yet submitted the changes.
To configure TCP settings from the CLI, use the tcp global configuration command.
To enable the MTU discovery utility from the CLI, use the ip path-mtu-discovery enable global
configuration command.
This section contains the following topics:
• Explicit Congestion Notification
• Congestion Windows
• Retransmit Time Multiplier
• TCP Slow Start
• Path MTU Discovery
Congestion Windows
The congestion window (cwnd) is a TCP state variable that limits the amount of data that a TCP sender
can transmit to the network before receiving an acknowledgment (ACK) from the receiving side of the
TCP transmission. The TCP cwnd variable is implemented by the TCP congestion avoidance algorithm.
The goal of the congestion avoidance algorithm is to continually modify the sending rate so that the
sender automatically senses any increase or decrease in available network capacity during the entire data
flow. When congestion occurs (manifested as packet loss), the sending rate is first lowered, and then
gradually increased as the sender continues to probe the network for additional capacity.
Note When making adjustments to the retransmit timer, be aware that they affect performance and efficiency.
If the retransmit timer is triggered too early, the sender pushes duplicate data onto the network
unnecessarily; if the timer is triggered too slowly, the sender remains idle for too long, unnecessarily
slowing data flow.
Note IP Path MTU Discovery is a process initiated by the sending device. If a server does not support IP Path
MTU Discovery, the receiving device will have no available means to avoid fragmenting datagrams
generated by the server.
By default, this feature is disabled. With the feature disabled, the sending device uses a packet size that
is the lesser of 576 bytes and the next hop MTU. Existing connections are not affected when this feature
is turned on or off.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > TCP/IP Settings > Static Routes. The IP Route Entries window
appears.
Step 3 In the taskbar, click the Create New IP Route Entry icon. The Creating New IP Route window appears.
Step 4 In the Destination Network Address field, enter the destination network IP address.
Step 5 In the Netmask field, enter the destination host netmask.
Step 6 In the Gateway’s IP Address field, enter the IP address of the gateway interface.
The gateway interface IP address should be in the same network as that of one of the device’s network
interfaces.
Step 7 Alternately, if you select the check box for IPv6 Address, you need to specify the details only for the
Destination Network Address and the Gateway’s IP Address field.
Step 8 Click OK.
To configure a static route from the CLI, use the ip route global configuration command.or IPv6 route
global configuration command.
Aggregating IP Routes
An individual WAE device can have IP routes defined and can belong to device groups that have other
IP routes defined.
In the IP Route Entries window, the Aggregate Settings radio button controls how IP routes are
aggregated for an individual device, as follows:
• Choose Yes to configure the device with all the IP routes that are defined for itself and for the device
groups to which it belongs.
• Choose No to limit the device to just the IP routes that are defined for itself.
When you change the setting, you get the following confirmation message: This option will take
effect immediately and will affect the device configuration. Do you wish to continue?
Click OK to continue.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > CDP. The CDP Settings window appears.
Step 3 Check the Enable check box to enable CDP support. By default, this option is enabled.
Step 4 In the Hold Time field, enter the time (in seconds) to specify the length of time that a receiver is to keep
the CDP packets.
The range is 10 to 255 seconds. The default is 180 seconds.
Step 5 In the Packet Send Rate field, enter a value (in seconds) for the interval between CDP advertisements.
The range is 5 to 254 seconds. The default is 60 seconds.
Step 6 Click Submit.
To configure CDP settings from the CLI, use the cdp global configuration command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > DNS. The DNS Settings window appears.
Step 3 In the Local Domain Name field, enter the name of the local domain. You can configure up to three local
domain names. Separate items in the list with a space.
Step 4 In the List of DNS Servers field, enter a list of DNS servers used by the network to resolve hostnames
to IP addresses.
You can configure up to three DNS servers. Separate items in the list with a space.
Step 5 Click Submit.
A Click Submit to Save message appears in red next to the Current Settings line when there are
pending changes to be saved after you have applied default and device group settings. To revert to the
previously configured window settings, click Reset, which appears only when you have applied default
or group settings to change the current device settings, but the settings have not yet been submitted.
To configure DNS name servers from the CLI, use the ip name-server global configuration command.
Note On ISR-WAAS devices you cannot configure the DNS server from the Central Manager.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > WINS. The Windows Name Services Settings window appears.
Step 3 In the Workgroup or Domain Name field, enter the name of the workgroup (or domain) in which the
chosen device or device group resides.
This name must be entered in shortname format and cannot exceed 15 characters. Valid characters
include alphanumeric characters, a forward slash (\), an underscore (_), and a dash (-).
For example, if your domain name is cisco.com, the short name format is cisco.
Step 4 Check the NT check box if the workgroup or domain is a Windows NT 4 domain. For example, if your
domain name is cisco.com, the short name format is cisco. If your workgroup or domain is a Windows
2000 or Windows 2003 domain, do not check the NT check box. By default, this option is disabled.
Step 5 In the WINS Server field, enter the hostname or IP address of the Windows Internet Naming Service
(WINS) server.
Step 6 Click Submit.
To configure Windows name services from the CLI, use the windows-domain global configuration
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > NAT Settings. The NAT Settings window appears.
Step 3 In the NAT IP field, enter the external ip of the WAAS Central Manager and click on Submit.
The external ip configuration (routed through NAT) is pushed to the Azure devices. This ip is used by
the Azure devices to communicate with the Central Manager.
This chapter describes how to configure administrative login authentication, authorization, and
accounting for Cisco Wide Area Application Services (WAAS) devices.
This chapter contains the following sections:
• About Administrative Login Authentication and Authorization
• Configuring Administrative Login Authentication and Authorization
• Configuring AAA Command Authorization
• Configuring Cisco Prime Network Control System Single Sign-On
• Configuring AAA Accounting for WAAS Devices
• Viewing Audit Trail Logs
Use the WAAS Central Manager GUI to centrally create and manage two different types of administrator
user accounts (device-based CLI accounts and roles-based accounts) for your Cisco WAAS devices. For
more information, see Chapter 8, “Creating and Managing Administrator User Accounts and Groups.”
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the Cisco WAAS
Central Managers and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE
refers to WAE appliances and WAE Network Modules (the Cisco WAAS NME-WAE family of
devices)and Cisco SRE service modules (SM-SRE) running Cisco WAAS.
The WAAS software provides the following AAA support for users who have external access servers,
for example, RADIUS or TACACS+ servers, and for users who require a local access database with AAA
features:
• Authentication (or login authentication) is the action of determining who a user is. It checks the
username and password.
• Authorization (or configuration) is the action of determining what a user is allowed to do. It permits
or denies privileges for authenticated users in the network. Generally, authentication precedes
authorization. Both authentication and authorization are required for a user login.
• Accounting is the action of keeping track of administrative user activities for system accounting
purposes. In the WAAS software, AAA accounting through TACACS+ is supported. For more
information, see Configuring AAA Accounting for WAAS Devices.
Note An administrator can log in to the WAAS Central Manager device through the console port
or the WAAS Central Manager GUI. An administrator can also log in to a WAAS device that
is functioning as a data center or branch WAE through the console port.
When the system administrator logs in to a WAAS device before authentication and authorization have
been configured, the administrator can access the WAAS device by using the predefined superuser
account (the predefined username is admin and the predefined password is default). When you log in
to a WAAS device using this predefined superuser account, you are granted access to all the WAAS
services and entities in the WAAS system.
Note Each WAAS device must have one administrator account with the username admin. You cannot change
the username of the predefined superuser account. The predefined superuser account must have the
username admin.
4 6
5
2 7
10 10
1 8
159092
10 10
The user account information is stored in an AAA database, and the WAAS devices must be configured
to access the particular authentication server (or servers) that contains the AAA database. You can
configure any combination of these authentication and authorization methods to control administrative
login access to a WAAS device:
• Local authentication and authorization
• RADIUS
• TACACS+
• Windows domain authentication
Note Even if you configure authentication using an external authentication server, you must create a
role-based user or user group account in the WAAS Central Manager, as described in Chapter 8,
“Creating and Managing Administrator User Accounts and Groups.”
For more information on the default AAA configuration, see Default Administrative Login
Authentication and Authorization Configuration. For more information on configuring AAA, see
Configuring Administrative Login Authentication and Authorization.
Note If you configure a RADIUS or TACACS+ key on a WAAS device (the RADIUS and or TACACS+
client), make sure that you configure an identical key on the external RADIUS or TACACS+ server.
Change these defaults through the WAAS Central Manager GUI, as described in Configuring
Administrative Login Authentication and Authorization.
Multiple Windows domain utilities are included in the WAAS software to assist with Windows domain
authentication configuration. You can access these utilities through the WAAS CLI by using the
windows-domain diagnostics EXEC command.
Step 1 Determine the login authentication scheme that you want to configure for the WAAS device to use when
authenticating administrative login requests, for example, use the local database as the primary login
database and your RADIUS server as the secondary authentication database.
Step 2 Configure the login access control settings for the WAAS device, as described in Configuring Login
Access Control Settings for WAAS Devices.
Step 3 Configure the administrative login authentication server settings on the WAAS device (if a remote
authentication database is to be used). For example, specify the IP address( IPv4/IPv6) of the remote
RADIUS servers, TACACS+ servers, or Windows domain server that the WAAS device should use to
authenticate administrative login requests, as described in the following sections:
• Configuring RADIUS Server Authentication Settings
• About TACACS+ Server Authentication Settings
• Configuring Windows Domain Server Authentication Settings
Step 4 Specify one or all of the following login authentication configuration schemes that the WAAS device
should use to process administrative login requests:
• Specify the administrative login authentication scheme.
• Specify the administrative login authorization scheme.
• (Optional) Specify the failover scheme for the administrative login authentication server.
For example, specify which authentication database the WAAS device should check to process an
administrative login request. For more information, see Enabling Administrative Login Authentication
and Authorization Schemes for WAAS Devices.
Caution Make sure that the RADIUS, TACACS+, or Windows domain authentication server is configured and
operating correctly before disabling local authentication and authorization. If you disable local
authentication, and RADIUS, TACACS+, or Windows domain settings are not configured correctly, or
if the RADIUS, TACACS+, or Windows domain server is not online, you may be unable to log in to the
WAAS device.
You can enable or disable the local and the remote databases (TACACS+, RADIUS, and Windows
domain) through the WAAS Central Manager GUI or the WAAS CLI. The WAAS device verifies
whether all the databases are disabled, and, if so, sets the system to the default state (see Table 7-1). If
you have configured the WAAS device to use one or more of the external third-party databases
(TACACS+, RADIUS, or Windows domain authentication) for administrative authentication and
authorization, make sure that you have also enabled the local authentication and authorization method
on the WAAS device, and that the local method is specified as the last option. Otherwise, the WAAS
device will not go to the local authentication and authorization method by default if the specified
external third-party databases are not reachable.
By default, local login authentication is enabled first. Local authentication and authorization uses locally
configured login names and passwords to authenticate administrative login attempts. The login names
and passwords are local to each WAAS device and are not mapped to individual usernames. When local
authentication is disabled, if you disable all the other authentication methods, local authentication is
re-enabled automatically.
You can disable local login authentication only after enabling one or more of the other administrative
login authentication methods. However, when local login authentication is disabled, if you disable all
other administrative login authentication methods, local login authentication is re-enabled
automatically. You cannot specify different administrative login authentication methods for console and
Telnet connections.
We strongly recommend that you set the administrative login authentication and authorization methods
in the same order. For example, configure the WAAS device to use RADIUS as the primary login
method, TACACS+ as the secondary login method, Windows as the tertiary method, and the local
method as the quaternary method for both administrative login authentication and authorization.
Note A TACACS+ server will not authorize a user who is authenticated by a different method. For example,
if you configure Windows as the primary authentication method, but use TACACS+ as the primary
authorization method, TACACS+ authorization will fail.
We strongly recommend that you specify the local method as the last method in your prioritized list of
login authentication and authorization methods. By adhering to this practice, if the specified external
third-party servers (TACACS+, RADIUS, or Windows domain servers) are not reachable, a WAAS
administrator can still log in to a WAAS device through the local authentication and authorization
method.
This section describes how to centrally configure administrative login authentication, and contains the
following topics:
• Configuring Login Access Control Settings for WAAS Devices
• Configuring Remote Authentication Server Settings for WAAS Devices
• Enabling Administrative Login Authentication and Authorization Schemes for WAAS Devices
About SSH
Secure Shell (SSH) consists of a server and a client program. Like Telnet, you can use the client program
to remotely log in to a machine that is running the SSH server, but unlike Telnet, messages transported
between the client and the server are encrypted. The functionality of SSH includes user authentication,
message encryption, and message authentication.
The SSH management window in the WAAS Central Manager GUI allows you to specify the key length,
login grace time, and maximum number of password guesses allowed when logging in to a specific
WAAS device or device group for configuration, monitoring, or troubleshooting purposes.
Note these operational guidelines when enabling or disabling SSH for different WAAS versions:
To centrally enable the SSH feature on a WAAS device or a device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > Console Access > SSH.
The SSH Configuration window appears. (See Figure 7-2.)
Note The SSH Version 1 protocol is no longer supported. Only the SSH Version 2 protocol is
supported by the WAAS device.
Step 3 SSH enables login access to the chosen WAAS device (or the device group) through a secure and
encrypted channel. The SSH default status is determined by your WAAS version (see Table 7-2 for
descriptions of these). Depending on your WAAS version, an Enable or Disable check box is displayed
in the SSH Configuration window for you to change the default status, if needed.
You can also use the CLI to enable or disable SSH, using the sshd enable global configuration command,
or the no sshd enable command.
Step 4 Check the Allow non-admin users check box to allow nonadministrative users to gain SSH access to
the chosen device (or device group). By default, this option is disabled.
Note Nonadministrative users are nonsuperuser administrators. All nonsuperuser administrators have
only restricted access to a WAAS device because their login accounts have a privilege level of
0. Superuser administrators have full access to a WAAS device because their login accounts have
the highest level of privileges, a privilege level of 15.
Step 5 In the Login grace time field, specify the number of seconds for which an SSH session will be active
during the negotiation (authentication) phase between the client and the server before it times out. The
default is 300 seconds.
Step 6 In the Maximum number of password guesses field, specify the maximum number of incorrect password
guesses allowed per connection. The default is 3.
Although the value in the Maximum number of password guesses field specifies the number of password
guesses allowed from the SSH server side, the actual number of password guesses for an SSH login
session is determined by the combined number of allowed password guesses of the SSH server and the
SSH client. Some SSH clients limit the maximum number of allowed password guesses to three (or to
one in some cases), even though the SSH server allows more than this number of guesses. When you
specify n password guesses allowed, certain SSH clients interpret this number as n + 1. For example,
when configuring the number of guesses to two for a particular device, SSH sessions from some SSH
clients will allow three password guesses.
Step 7 In the Length of key field, specify the number of bits required to create an SSH key. The default is 1024.
When you enable SSH, be sure to generate both a private and a public host key, which client programs
can use to verify the server’s identity. When you use an SSH client and log in to a WAAS device, the
public key for the SSH daemon running on the device is recorded in the client machine known_hosts file
in your home directory. If the WAAS administrator subsequently regenerates the host key by specifying
the number of bits in the Length of key field, you must delete the old public key entry associated with
the WAAS device in the known_hosts file before running the SSH client program to log in to the WAAS
device. When you use the SSH client program after deleting the old entry, the known_hosts file is
updated with the new SSH public key for the WAAS device.
Step 8 Click Submit to save the settings.
A Click Submit to Save message appears in red in the Current Settings line when there are pending
changes to be saved after you have applied the default or device group settings. You can also revert to
the previously configured settings by clicking Reset button, which is visible only if you have applied
default or group settings to change the current device settings, but have not yet submitted the changes.
If you try to exit this window without saving the modified settings, a warning dialog box prompts you
to submit the changes. This dialog box appears only if you are using the Internet Explorer browser.
To configure SSH settings from the CLI, you can use the sshd and ssh-key-generate global
configuration commands.
Note Telnet is not supported in Internet Explorer. If you want to use the Telnet button from the Device
Dashboard, use a different web browser.
To centrally disable the Telnet service on a WAAS device or a device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > Console Access > Telnet.
The Telnet Settings window appears.
Step 3 Uncheck the Telnet Enable check box to disable the terminal emulation protocol for remote terminal
connection for the chosen device (or device group).
Step 4 Click Submit to save the settings.
A Click Submit to Save message appears in red next to the Current Settings line when there are
pending changes to be saved after you have applied default or device group settings. You can also revert
to the previously configured settings by clicking Reset, which is visible only if you have applied default
or group settings to change the current device settings, but have not yet submitted the changes.
If you try to exit this window without saving the modified settings, a warning dialog box prompts you
to submit the changes. This dialog box appears only if you are using the Internet Explorer browser.
To centrally re-enable the Telnet service on the device (or device group) at a later time, check the Telnet
Enable check box in the Telnet Settings window, and click Submit.
From the CLI, use the no telnet enable global configuration command to disable Telnet, or the telnet
enable global configuration command to enable it.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > Console Access > Message of the day.
The MOTD Configuration window for the chosen device appears.
Step 3 To enable the MOTD settings, check the Enable check box.
The Message of the Day (MOTD) banner, EXEC process creation banner, and Login banner fields
become enabled.
Step 4 In the Message of the Day (MOTD) Banner field, enter a string that you want displayed as the MOTD
banner after a user logs in to the device.
In the Message of the Day (MOTD) Banner, EXEC Process Creation Banner, and Login Banner fields,
you can enter a maximum of 1024 characters. A new line character (or Enter) is counted as two
characters, as it is interpreted as \n by the system. You cannot use special characters such as `, % ,^ , and
" in the MOTD text. If your text contains any of these special characters, WAAS software removes it
from the MOTD output.
Step 5 In the EXEC Process Creation Banner field, enter a string to be displayed as the EXEC process creation
banner when a user enters into the EXEC shell of the device.
Step 6 In the Login Banner field, enter a string to be displayed after the MOTD banner, when a user attempts
to log in to the device.
Step 7 To save the configuration, click Submit.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Click the Edit icon next to the device (or device group) for which you want to configure the EXEC
timeout.
Step 3 Choose Configure > Network > Console Access > Exec Timeout.
Step 4 In the Exec Timeout field, specify the number of minutes after which an active session times out. The
default is 15 minutes.
A Telnet session with a WAAS device can remain open and inactive for the period specified in this field.
When the EXEC timeout period elapses, the WAAS device automatically closes the Telnet session.
Step 5 Click Submit to save the settings.
A Click Submit to Save message appears in red next to the Current Settings line when there are
pending changes to be saved after you have applied default or device group settings. You can also revert
to the previously configured settings by clicking Reset, which is visible only if you have applied default
or group settings to change the current device settings, but have not yet submitted the changes.
If you try to exit this window without saving the modified settings, a warning dialog box prompts you
to submit the changes. This dialog box appears only if you are using the Internet Explorer browser.
To configure the Telnet session timeout from the CLI, use the exec-timeout global configuration
command.
To centrally enable Console Line Carrier Detection for a WAAS device or device group, follow these
steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > Console Access > Console Carrier Detect.
The Console Carrier Detect Settings window appears.
Step 3 Check the Enable console line carrier detection before writing to the console check box to enable the
window for configuration.
Step 4 Click Submit to save the settings.
A message appears that explains that if a null-modem cable that does not have a carrier detect pin wired
is being used, the WAE may appear unresponsive on the console until the carrier detect signal is asserted.
To recover from a misconfiguration, the WAE should be rebooted and the 0x2000 bootflag should be set
to ignore the carrier detect setting.
Step 5 Click OK to continue.
To configure console line carrier detection from the CLI, you can use the line console carrier-detect
global configuration command.
Note For more information about how the RADIUS protocol operates, see RFC 2138, Remote Authentication
Dial In User Service (RADIUS).
RADIUS authentication usually occurs when an administrator first logs in to the WAAS device to
configure the device for monitoring, configuration, or troubleshooting purposes. RADIUS
authentication is disabled by default. You can enable RADIUS authentication and other authentication
methods at the same time. You can also specify which method to use first.
You can configure multiple RADIUS servers; authentication is attempted on the servers in order. If the
first server is unreachable, then authentication is attempted on the other servers in the farm, in order. If
authentication fails for any reason other than a server being unreachable, authentication is not attempted
on the other servers in the farm.
Tip The WAAS Central Manager does not cache user authentication information. Therefore, the user is
reauthenticated against the RADIUS server for every request. To prevent performance degradation
caused by many authentication requests, install the WAAS Central Manager device in the same location
as the RADIUS server, or as close as possible to it, to ensure that authentication requests can occur as
quickly as possible.
To centrally configure RADIUS server settings for a WAAS device or device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > AAA > RADIUS.
The RADIUS Server Settings window appears. (See Figure 7-3.)
Step 3 In the Time to Wait field, specify how long the device or device group should wait for a response from
the RADIUS server before timing out. The range is from 1 to 20 seconds. The default value is 5 seconds.
Step 4 In the Number of Retransmits field, specify the number of attempts allowed to connect to a RADIUS
server. The default value is 2 times.
Step 5 In the Shared Encryption Key field, enter the secret key that is used to communicate with the RADIUS
server.
Note If you configure a RADIUS key on the WAAS device (the RADIUS client), make sure that you
configure an identical key on the external RADIUS server. Do not use the following characters:
space, backwards single quote (`), double quote ("), pipe (|), or question mark (?).
Step 6 In the Server Name field, enter an IP address (IPv4/IPv6) or hostname of the RADIUS server. Five
different hosts are allowed.
Step 7 In the Server Port field, enter a UDP port number on which the RADIUS server is listening. You must
specify at least one port. Five different ports are allowed.
Step 8 Click Submit to save the settings.
You can now enable RADIUS as an administrative login authentication and authorization method for this
WAAS device or device group, as described in Enabling Administrative Login Authentication and
Authorization Schemes for WAAS Devices.
To configure RADIUS settings from the CLI, you can use the radius-server global configuration
command.
}
global = cleartext "tac"
}
For each user, list the groups they belong to in the waas_rbac_groups attribute, separating each group
from the next with a comma.
The dynamic assignment of roles and domains based on external user groups requires a TACACS+ server
that supports shell custom attributes. For example, these are supported in Cisco ACS 4.x and 5.1 and
later.
Tip The WAAS Central Manager does not cache user authentication information. Therefore a user is
reauthenticated against the TACACS+ server for every request. To prevent performance degradation
caused by many authentication requests, install the WAAS Central Manager device in the same location
as the TACACS+ server, or as close as possible to it, to ensure that authentication requests can occur as
quickly as possible.
Note This caveat applies even if the WAAS users are using TACACS+ for login authentication.
To centrally configure TACACS+ server settings on a WAAS device or device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > AAA > TACACS+.
The TACACS+ Server Settings window appears.
Note The TACACS+ server configuration cannot be modified or deleted when AAA Command
Authorization is enabled.
Step 3 Check the Use ASCII Password Authentication check box to use the ASCII password type for
authentication.
The default password type is PAP (Password Authentication Protocol). However, you can change the
password type to ASCII when the authentication packets are to be sent in ASCII cleartext format.
Step 4 In the Time to Wait field, specify how long the device should wait before timing out. The range is from
1 to 20 seconds. The default value is 5 seconds.
Step 5 In the Number of Retransmits field, specify the number of attempts allowed to connect to a TACACS+
server. The range is 1 to 3 times. The default value is 2 times.
Step 6 In the Security Word field enter the secret key that is used to communicate with the TACACS+ server.
The secret key value can contain a maximum of 32 alphanumeric characters. The following characters
are not allowed: space, backwards single quote (`), double quote ("), pipe (|), number sign (#), question
mark (?), or backslash (\).
Step 7 In the Primary Server field, enter an IP address (IPv4/IPv6) or hostname for the primary
TACACS+ server.
To change the default port (49), enter the port in the Primary Server Port field.
Step 8 In the Secondary Server field, enter an IP address (IPv4/IPv6) or hostname for a secondary
TACACS+ server.
To change the default port (49), enter the port in the Secondary Server Port field.
Step 9 In the Tertiary Server field, enter an IP address (IPv4/IPv6) or hostname for a tertiary TACACS+ server.
To change the default port (49), enter the port in the Tertiary Server Port field.
You can now enable TACACS+ as an administrative login authentication and authorization method for
this WAAS device or device group, as described in Enabling Administrative Login Authentication and
Authorization Schemes for WAAS Devices.
To configure TACACS+ settings from the CLI, use the tacacs global configuration command.
You can configure Windows authentication for the WAAS Central Manager device, a single WAAS
device, or a group of devices. To configure Windows domain authentication on a WAAS device,
configure a set of Windows domain authentication settings.
Note Windows domain authentication is not performed unless a Windows domain server is configured on the
WAAS device. If the device is not successfully registered, authentication and authorization do not occur.
WAAS supports authentication by a Windows domain controller running only on Windows Server 2000,
Windows Server 2003, or Windows Server 2008.
You should know the name and IP address, or hostname, of the Windows domain controller that will be
used for authentication.
Note If the Central Manager is Version 4.2.3a or later, and you want to configure the Windows domain settings
on a WAAS device that is running Version 4.2.3 or 4.2.1, you cannot use the Windows Domain Server
Settings page on the Central Manager. You must use the windows-domain diagnostics net CLI
command, as described in this procedure.
To configure Windows Domain server settings on a WAAS device or device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > AAA > Windows User Authentication.
The Windows User Authentication window appears. (See Figure 7-4.)
Note Workgroup settings are only required for Windows domain authentication, not for a domain join.
You can skip to workgroup settings if you are only performing a domain join.
Step 3 In the Windows group for authorizing normal users field, specify an administrative group for normal
users (nonsuperuser administrators), who only have restricted access to the chosen device (or device
group) because their administrator user account has a privilege level of 0.
Note By default, there are no predefined user groups for Windows domain authorization configured
on a WAE.
Step 4 In the Windows group for authorizing super users field, specify an administrative group for superusers
(superuser administrators), who have unrestricted access to the chosen device (or device group) because
their administrator user account has a privilege level of 15.
Note In addition to configuring Windows domain administrative group on a WAE, you must configure
the Windows domain administrative group on your Microsoft Windows 2000, 2003, or 2008
server. You must create a Windows Domain administrative superuser group and a normal user
group. Make sure that the group scope for the superuser group is set to global, assign user
member to newly created administrative group, and add the user account, for example, the
winsuper user, to the Windows domain superuser group. For more information about how to
configure the Windows domain administrative group on your Windows server, see the
corresponding Microsoft documentation.
When a user attempts to access this WAE through a Telnet session, FTP, or SSH session, the WAE is
configured to use the Active Directory user database to authenticate a request for administrative access.
Step 5 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 6 Choose Configure > Security > Windows Domain > Domain Settings.
The Domain Settings window appears. (See Figure 7-5.)
Note In WAAS versions earlier than 5.1.1, if the related WINS server and the workgroup or domain
name have not been defined for the chosen device (or device group), an informational message
is displayed at the top of this window to inform you that these related settings are currently not
defined, as shown in Figure 7-5. To define these settings, choose Configure > Network >
WINS.
Domain name, DNS server, and NTP configuration are mandatory prerequisites for the Windows
domain join. The Windows domain controller and the WAAS device must be in time sync for
Kerberos authentication to succeed. For full AAA functionality, workgroup and WINS server
must also be configured.
In WAAS versions earlier than 5.1.1, NetBIOS name does not have to be configured for
Windows domain join. If left unconfigured, the first 15 characters of the hostname are
automatically assigned as the NetBIOS name during the join. For WAAS versions later than
5.1.1, NetBIOS name, WINS server, and workgroup configuration settings are not required for
Windows domain authentication configuration.
Step 7 From the Domain Name drop-down list, choose a name or click Create New to create a new Local
Domain Name.
Step 8 If your WAAS device (or device group) is a previous version of the software.
a. Choose Kerberos, NTLM1 plus ESS (Extended Session Security), or NTLM2 as a shared secure
authentication method for administrative logins to the chosen device (or device group). The default
authentication protocol is kerberos.
Note In WAAS version 5.0.1 onwards, Windows domain user login authentication using NTLM
protocol is deprecated. We recommend that you use Kerberos protocol for Windows domain
user login authentication.
In WAAS Version 5.1.1 onwards, Windows domain user authentication using NTLM
protocol is not supported.
You can use the Kerberos protocol, NTLMv1 plus ESS (Extended Session Security), or
NTLMv2 for encrypted MAPI acceleration.
Click Auto Detect The Parameters when using Kerberos to automatically obtain the kerberos
realm, kerberos server, and domain controller. Domain, DNS, and NTP parameters must be
configured first. This option is not supported with NTLM.
After the device is queried for the parameters, a status message is displayed on the screen indicating
either success or failure. The process may not be immediate and the status message will not appear
until the auto detection process is completed.
When successful, the parameters can be reviewed and edited, if required. After the parameters are
reviewed, the values can be submitted.
If auto detection fails, check the configured domain/DNS configuration and enter them manually.
The values can then be submitted.
Note Kerberos Version 5 is used for Windows systems running Windows 2000 or later, with users
logging in to domain accounts.
For Windows domain join using Kerberos authentication, you must have the following ports
open on the firewall for outgoing traffic: 53 UDP/TCP, 88 UDP/TCP, 123 UDP, 135 TCP,
137 UDP, 139 TCP, 389 UDP/TCP, 445 TCP, 464 UDP/TCP, and 3268 TCP.
b. (Skip this step for Kerberos) For NTLM, choose version 1 or version 2 from the drop-down list.
NTLM Version 1 is selected by default.
Note For WAAS v5.3.1, NTLM is also supported for encrypted MAPI (EMAPI). Note the
following about NTLM for EMAPI:
NTLM for EMAPI does not require any additional configuration other than what is required
for Kerberos. However, the client must be joined to the domain.
NTLM with EMAPI uses a key for each NTLM user. These keys are stored in memory and
removed after a reload. If, for example, a core WAE is rebooted during the night, all NTLM
keys need to be gathered again at startup, which may cause an increase in latency in
establishing the client-server connection.
– NTLM Version 1 is used for all Windows systems, including legacy systems such as
Windows 98 with Active Directory, Windows NT, and more recent Windows systems, such as
Windows 2000, Windows XP, and Windows 2003. We recommend the use of Kerberos if you
are using a Windows 2000 SP4 or Windows 2003 domain controller.
– NTLM Version 2 is used for Windows systems running Windows 98 with Active Directory,
Windows NT 4.0 (Service Pack 4 or later), Windows XP, Windows 2000, and Windows 2003.
Enabling NTLM Version 2 support on the WAAS print server will not allow access to clients
who use NTLM or LM.
Caution Enable NTLM Version 2 support in the print server only if all the clients’ security policy has
been set to Send NTLMv2 responses only/Refuse LM and NTLM.
c. (Skip this step for NTLM) In the Kerberos Realm field, enter the fully qualified name of the realm
in which the WAAS device resides. In the Key Distribution center, enter the fully qualified name or
the IP address of the distribution center for the Kerberos key. If you clicked Auto Detect The
Parameters when you selected the Kerberos authentication method, these fields will already be
populated.
All Windows 2000 domains are also Kerberos realms. Because the Windows 2000 domain name is
also a DNS domain name, the Kerberos realm name for the Windows 2000 domain name is always
in uppercase letters. This capitalization follows the recommendation for using DNS names as realm
names in the Kerberos Version 5 protocol document (RFC-4120) and affects only interoperability
with other Kerberos-based environments.
d. In the Domain Controller field, enter the name of the Windows Domain Controller.
When you click Submit, the Central Manager validates this name by requesting the WAAS device
(if Version 4.2.x or later) to resolve the domain controller name. If the domain controller is not
resolvable, you are asked to submit a valid name. If the device is offline, you are asked to verify
device connectivity. If you are configuring a device group, the domain controller name is not
validated on each device before this page is accepted and if it is not resolvable on a device, the
configuration changes on this page are not applied to that device.
e. Click Submit.
Note Make sure that you click Submit now so that the specified changes are committed to the
WAAS Central Manager database. The Domain Administrator’s username and password,
which you will enter in Step 9, are not stored in the WAAS Central Manager’s database.
Step 9 Register the chosen device (or device group) with the Windows Domain Controller as follows:
a. In the User Name field, enter a username (the domain\username or the domain name plus the
username) for the specified Windows Domain Controller. This must be the username and password
of a user who has administrative privileges in Active Directory (permission to add a computer to a
domain).
If your WAAS device (or device group) is running a previous version of the software, click the
Domain Join tab.
For NTLM, the user credentials can be that of any normal user belonging to the Domain Users group.
For Kerberos, it is preferable that the user credentials belong to the Domain Administrators group,
but need not be the system default Administrator user.
By default, a Windows Domain Administrator user is part of following groups - Administrators,
Domain Administrators, Domain Users, Enterprise Administrators, Group policy creator owners
and Schema Administrators.
However, only Administrators and Domain/Enterprise Administrators have the privileges to join a
device to the Windows Active Directory.
If users do not want to use the administrative privileges, they can be a part of the default group called
Account Operators, which has the privilege to join the device to a Windows Active Directory (AD).
However, since the Account Operators group has wide access to the AD, we recommend to use AD
Delegation to grant permissions using ACLs as described below.
1) Go to Active Directory Users and Computers and select Computers>Action>Delegate Control
to open the Delegate Control Wizard. Select Users and Groups>Create custom task to Delegate.
2) Verify that the user/group is added to the AD. Click Computers> Properties> Security and view
if the user/group is added.
3) Select Advanced and add ACL for Create and Delete Computer Objects by selecting the
check-boxes.
To join the Windows domain successfully, the Windows domain user should either be a part of the
Account Operators group or should have been granted permission to join the domain through AD
delegation.
Note To use Windows domain server authentication, the WAAS device must join the Windows
domain. For registration, you will require a user credential with permission to join a machine
to the Windows domain. The user credential used for registration is not shown in clear text
anywhere, including log files. WAAS does not modify the structure or schema of the
Windows Active Directory.
Note A domain join is required for encrypted MAPI acceleration using a machine account.
b. In the Password field, enter the password of the specified Windows Domain Controller account.
c. In the Confirm password field, re-enter the password of the specified Windows Domain Controller.
d. (Optional, if your WAAS device [or device group] is running a previous version of the software) If
necessary, enter the name of the organizational unit in the Organizational Unit field (for Kerberos
authentication only).
e. Click Join.
Note When you click Join, WAAS Central Manager immediately sends a registration request to
the WAAS device (or all of the devices in the device group) using SSH (the specified domain
administrator password is encrypted by SSH). The registration request instructs the device
to perform domain registration with the specified Windows Domain Controller using the
specified domain username and password. If the device is accessible (if it is behind a NAT
and has an external IP address), the registration request is performed by the device (or device
group).
The status of the registration request is shown in the Domain Join Status table.
f. If your WAAS device (or device group) is running a version of the software that is earlier than latest
version of WAAS, click the Show Join Status button to view the status of the registration request.
It may take a few moments for the results to be updated. If the join request fails, the result is shown
in the Domain Join Status table.
g. Wait for a few more minutes and try again to see the updated authentication status.
If the request succeeds, the domain registration status is shown in the Domain Join Status table.
After configuring the Windows domain settings, to complete the process of enabling Windows
authentication, you must set Windows as the authentication and authorization method for the device by
using the Authentication Methods window, as described in the Enabling Administrative Login
Authentication and Authorization Schemes for WAAS Devices.
We recommend that you use the WAAS Central Manager GUI instead of the WAAS CLI to configure the
Windows Domain server settings, but if you want to use the CLI, see the following commands in the
Cisco Wide Area Application Services Command Reference: windows-domain join and kerberos (if you
are using Kerberos as a shared secure authentication method).
You must first configure the IP domain name and IP name server using the ip global configuration
command.
Next, configure the appropriate NTP server using the ntp global configuration command.
Next, configure the windows domain administrative supergroup and normal group using the following
global configuration commands:
WAE(config)# windows-domain administrative group super-user group_name
WAE(config)# windows-domain administrative group normal-user group_name
Next, register the WAAS device with the Windows domain server that you configured, by using the
following command:
WAE# windows-domain join domain-name DomainName user UserName
Finally, enable Windows Domain as the administrative login authentication and authorization
configuration by using the following commands:
WAE(config)# authentication login windows-domain enable primary
WAE(config)# authentication configuration windows-domain enable primary
The following CLI commands display diagnostic information on NTLM authentication for EMAPI:
# show windows-domain encryption-service identity
# show windows-domain encryption-service identity detail
# show windows-domain encryption-service blacklist identity
# show statistics connectoin conn-id ConnectionID
# show statistics accelerator mapi detail
If you want to unregister a WAE device from a Windows domain controller, you can do that directly from
the WAAS Central Manager, as long as you have used the Kerberos shared secure authentication method.
If you have used the NTLM method, you cannot unregister the WAE by using the WAAS Central
Manager; you must log in to the domain controller and remove the device registration manually.
Note Before you can unregister a device, you must disable Windows authentication for the device. Also, if
Encrypted MAPI is utilizing the machine account domain identity, you must remove it before performing
a domain leave.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-name).
Step 2 Choose Configure > Security > AAA > Authentication Methods.
The Authentication and Authorization Methods window appears. (See Figure 7-6.)
Step 3 Under both the Authentication Login Methods and the Authorization Methods sections, change the value
WINDOWS that is already chosen by choosing another value from the drop-down lists. For more
information about changing these settings, see Enabling Administrative Login Authentication and
Authorization Schemes for WAAS Devices.
Step 4 Click Submit to save the settings.
Step 5 Choose Configure > Security > Windows Domain > Domain Settings. If your WAAS device (or
device group) is running a previous version of the software, click the Domain Join tab.
Step 6 (Optional) Enter the administrative username and password in the Administrator Username, Password,
and Confirm Password fields. The domain controller requires the username and password to perform the
unregistration.
Step 7 Click Leave.
Note When you click Leave, WAAS Central Manager immediately sends an unregistration request
to the WAAS device (or device group) using SSH. The unregistration request instructs the
device to unregister from the specified Windows Domain Controller.
Request to unregister the device is not allowed when encrypted MAPI is configured to use
machine accounts. You must delete the machine account identity before proceeding with the
leave.
The status of the unregistration request is shown in the Domain Join Status table.
Step 8 If your WAAS device (or device group) is running a previous version of the software, check the status
of the unregistration request by waiting a few minutes and click Show Join Status.
If you want to use the CLI to unregister a WAE device, you must first use the following commands to
disable windows authentication:
WAE(config)# no authentication login windows-domain enable
WAE(config)# no authentication configuration windows-domain enable
Note If an Encrypted MAPI machine account identity has been configured, then it has to be removed first. Use
the no windows-domain encryption-service global configuration command to remove a machine
account identity.
Next, unregister the WAAS device from the Windows domain server by using the following command
(for Kerberos authentication):
WAE# windows-domain leave user UserName password Password
There is no CLI command to unregister the WAAS device if it is using NTLM authentication.
Note When you configure your Windows domain controller to require an LDAP signature, you must also
configure LDAP signing on the client WAE. By not configuring the client to use LDAP signatures,
communication with the server is affected, and user authentication, group policy settings, and login
scripts might fail. Install the Certification Authority service on the Microsoft server with the server’s
certificate (Programs > Administrative Tools > Certification Authority). Enable the LDAP server
signing requirements property on the Microsoft server (Start > Programs > Administrative Tools >
Domain Controller Security Policy). In the window that is displayed, choose Require signing from
the drop-down list, and click OK.
For information about how to configure your Windows domain controller to require an LDAP signature,
see your Microsoft documentation.
You can configure a security setting on Windows 2003 domain controllers to require clients (such as
WAEs) to sign LDAP requests. Because unsigned network traffic can be intercepted and manipulated by
outside parties, some organizations require LDAP server signing to prevent man-in-the-middle attacks
on their LDAP servers. You configure LDAP signing only on a single WAE; it cannot be configured at
a system level. In addition, you must configure LDAP signing on a WAE through the WAAS CLI; you
cannot configure LDAP signing through any of the WAAS GUI.
By default, LDAP server signing is disabled on a WAE. To enable this feature on a WAE, follow these
steps:
Step 3 Verify the current running LDAP client configuration on the WAE:
WAE# show smb-conf
Step 7 Check the current configuration for login authentication and authorization on the WAE:
The WAE is now configured to authenticate Active Directory users, who can use Telnet, FTP, or SSH to
connect to the WAE. Alternatively, they can access the WAE through the WAAS GUI.
Step 8 View statistics that are related to Windows domain user authentication. Statistics increment after each
user authentication attempt:
WAE# show statistics windows-domain
Windows Domain Statistics
-----------------------------------------------
Authentication:
Number of access requests: 9
Number of access deny responses: 3
Number of access allow responses: 6
Authorization:
Number of authorization requests: 9
Number of authorization failure responses: 3
Number of authorization success responses: 6
Accounting:
Number of accounting requests: 0
Number of accounting failure responses: 0
Number of accounting success responses: 0
Step 9 Use the clear statistics EXEC command to clear the statistics on the WAE:
• To clear all the login authentication statistics, enter the clear statistics authentication EXEC
command.
• To clear only the statistics that are related to Windows domain authentication, enter the clear
statistics windows-domain EXEC command.
• To clear all the statistics, enter the clear statistics all EXEC command.
Caution Make sure that RADIUS, TACACS+, or Windows domain authentication is configured and operating
correctly before disabling local authentication and authorization. If you disable local authentication, and
if RADIUS, TACACS+, or Windows domain authentication is not configured correctly, or if the
RADIUS, TACACS+, or Windows domain server is not online, you will be unable to log in to the WAAS
device.
By default, a WAAS device uses the local database to authenticate and authorize administrative login
requests. The WAAS device verifies whether all the authentication databases are disabled, and if so, sets
the system to the default state. For information on this default state, see Default Administrative Login
Authentication and Authorization Configuration.
Note You must configure the TACACS+, RADIUS, or Windows server settings for the WAAS device (or
device group) before you configure and submit these settings. For information on how to configure these
server settings on a WAAS device or device group, see About TACACS+ Server Authentication Settings,
and Configuring RADIUS Server Authentication Settings, and Configuring Windows Domain Server
Authentication Settings.
By default, WAAS devices fail over to the secondary method of administrative login authentication
whenever the primary administrative login authentication method fails for any reason. Change this
default login authentication failover method through the WAAS Central Manager GUI, as follows:
• To change the default for a WAAS device, choose Devices > device-name and then choose
Configure > Security > AAA > Authentication Methods from the menu. Check the Failover to
next available authentication method box in the displayed window and click Submit.
• To change the default for a device group, choose Device Groups > device-group-name and then
choose Configure > Security > AAA > Authentication Methods from the menu. Check the
Failover to next available authentication method box in the displayed window and click Submit.
After you enable the failover to next available authentication method option, the WAAS device (or the
devices in the device group) queries the next authentication method only if the administrative login
authentication server is unreachable, not if authentication fails for some other reason. The authentication
server could be unreachable due to an incorrect key in the RADIUS or TACACS+ settings on the WAAS
device.
You can configure multiple TACACS+ or RADIUS servers; authentication is attempted on the primary
server first. If the primary server is unreachable, then authentication is attempted on the other servers in
the TACACS+ or RADIUS farm, in order. If authentication fails for any reason other than a server being
unreachable, authentication is not attempted on the other servers in the farm. This process applies
regardless of the setting of the Failover to next available authentication method check box.
Note To use the login authentication failover feature, you must set TACACS+, RADIUS, or Windows
domain as the primary login authentication method, and local as the secondary login
authentication method.
If the failover to the next available authentication method option is enabled, follow these guidelines:
• You can configure only two login authentication schemes (a primary and secondary scheme) on the
WAAS device.
• Note that the WAAS device (or the devices in the device group) fails over from the primary
authentication scheme to the secondary authentication scheme only if the specified authentication
server is unreachable.
• Configure the local database scheme as the secondary scheme for both authentication and
authorization (configuration).
For example, if the failover to next available authentication method option is enabled and RADIUS is
set as the primary login authentication scheme and local is set as the secondary login authentication
scheme, the following events occur:
1. When the WAAS device (or the devices in the device group) receives an administrative login request,
it queries the external RADIUS authentication server.
2. One of the following occurs:
a. If the RADIUS server is reachable, the WAAS device (or the devices in the device group) uses
this RADIUS database to authenticate the administrator.
b. If the RADIUS server is not reachable, the WAAS device (or the devices in the device group)
tries the secondary authentication scheme (that is, it queries its local authentication database)
to authenticate the administrator.
Note The local database is contacted for authentication only if this RADIUS server is not available.
In any other situation, for example, if the authentication fails in the RADIUS server, the local
database is not contacted for authentication.
Conversely, if the failover to the next available authentication method option is disabled, the WAAS
device (or the devices in the device group) contacts the secondary authentication database regardless of
the reason why the authentication failed with the primary authentication database.
If all the authentication databases are enabled for use, then all the databases are queried in the order of
priority selected and based on the failover reason. If no failover reason is specified, then all the databases
are queried in the order of their priority. For example, first the primary authentication database is
queried, then the secondary authentication database is queried, then the tertiary database is queried, and
finally the quaternary authentication database is queried.
To specify the login authentication and authorization scheme for a WAAS device or device group, follow
these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > AAA > Authentication Methods.
The Authentication and Authorization Methods window appears. (See Figure 7-6.)
Step 3 Check the Failover to next available authentication method check box to query the secondary
authentication database only if the primary authentication server is unreachable. When the check box is
unchecked, the other authentication methods are tried if the primary method fails for any reason.
To use this feature, you must set TACACS+, RADIUS, or Windows domain as the primary authentication
method, and local as a secondary authentication method. Make sure that you configure the local method
as a secondary scheme for both authentication and authorization (configuration).
Check the Use only local admin account to enable privilege exec level check box to configure enable
authentication by using the local admin user account password. In this case, the request for enable access
is not sent to the external authentication servers, but is processed on the WAE. It uses only the local
“admin” user account password to verify the given password, and to provide access.
Step 4 Check the Authentication Login Methods check box to enable authentication privileges using the local,
TACACS+, RADIUS, or WINDOWS databases.
Step 5 Specify the order of the login authentication methods that the chosen device or device group are to use:
a. From the Primary Login Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the first method that the chosen device (or the device group)
should use for administrative login authentication.
b. From the Secondary Login Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the method that the chosen device (or the device group) should
use for administrative login authentication if the primary method fails.
c. From the Tertiary Login Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the method that the chosen device (or the device group) should
use for administrative login authentication if both the primary and the secondary methods fail.
d. From the Quaternary Login Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the method that the chosen device (or device group) should use
for administrative login authentication if the primary, secondary, and tertiary methods all fail.
Note We strongly recommend that you specify the local method as the last method in your prioritized
list of login authentication and authorization methods. By adhering to this practice, the WAAS
administrator will be able to log in to a WAAS device (or the devices in the device groups)
through the local authentication and authorization method if the specified external third-party
servers (TACACS+, RADIUS, or Windows domain servers) are not reachable.
Step 6 Check the Authorization Methods check box to enable authorization privileges using the local,
TACACS+, RADIUS, or WINDOWS databases.
Note Authorization privileges apply to console and Telnet connection attempts, secure FTP (SFTP)
sessions, and Secure Shell (SSH Version 2) sessions.
Step 7 Specify the order of the login authorization (configuration) methods that the chosen device (or the device
group) should use:
Note We strongly recommend that you set the administrative login authentication and authorization
methods in the same order. For example, configure the WAAS device (or device group) to use
RADIUS as the primary login method, TACACS+ as the secondary login method, Windows as
the tertiary method, and the local method as the quaternary method for both administrative login
authentication and authorization.
a. From the Primary Configuration Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the first method that the chosen device (or the device group)
should use to determine authorization privileges.
Note If you have checked the Failover to next available authentication method check box
(Step 3), make sure that you choose TACACS+ or RADIUS from the Primary Configuration
Method drop-down list to configure either the TACACS+ or RADIUS method as the primary
scheme for authorization (configuration).
b. From the Secondary Configuration Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the method that the chosen device (or the device group) should
use to determine authorization privileges if the primary method fails.
Note If you have checked the Failover to next available authentication method check box
(Step 3), make sure that you choose local from the Secondary Configuration Method
drop-down list to configure the local method as the secondary scheme for authorization
(configuration).
c. From the Tertiary Configuration Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the method that the chosen device (or the device group) should
use to determine authorization privileges if both the primary and secondary methods fail.
d. From the Quaternary Configuration Method drop-down list, choose local, TACACS+, RADIUS, or
WINDOWS. This option specifies the method that the chosen device (or device group) should use
to determine authorization privileges if the primary, secondary, and tertiary methods all fail.
Step 8 To refresh the authentication status, check the check box and click Show Windows Authentication
Status. This option is only available when Windows is set as the authentication and authorization
methods.
A dialog box prompts you about whether or not you want to continue with this request to refresh the
status of the authentication request. (See Figure 7-7.)
Note If you have enabled the Windows authentication or authorization method, the Central Manager
queries the WAE (of Version 4.2.1 or later) to ensure that it is registered to a Windows domain.
This can take up to one minute after you click Submit. You will see a message asking you to
confirm this process. Click OK to proceed. If you are configuring a WAE of Version 4.1.x or
earlier, or a device group, the Central Manager does not query the WAEs and you must ensure
that each WAE is properly registered. You will see a message informing you that system
behavior is unknown (if a WAE is unregistered). Click OK to proceed.
Note If you have enabled the Windows authentication method, it takes about 15 seconds to activate it. Wait
for at least 15 seconds before verifying the Windows authentication status or performing any operation
that requires Windows authentication.
To configure the login authentication and authorization scheme from the CLI, use the authentication
global configuration command. Before you enable Windows domain authentication or authorization for
a device, the device must be registered with the Windows domain controller.
Note Only commands executed through the CLI interface are subject to command authorization.
When command authorization is enabled, you must specify "permit null" on the TACACS+ server to
allow authorized commands with no arguments to be executed.
To configure command authorization for a WAAS device or device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > AAA > Command Authorization Settings.
The Command Authorization window appears.
Step 3 Check the Command Authorization Level check box to mark the desired level:
• Level 0—Only EXEC commands are authorized by the TACACS+ server before they are executed,
regardless of user level (normal or super). Global configuration commands are not allowed.
• Level 15—Both EXEC and global configuration level commands are authorized by the TACACS+
server before they are executed, regardless of user level (normal or super).
Note You must have a TACACS+ server configured before you can configure command authorization.
Step 1 Configure the NCS device. For more information, see Configuring the NCS Device.
Step 2 Configure the WAAS CM. For more information, see Configuring the WAAS CM to use SSO.
Step 3 Use the Single Sign-on feature. For more information, see Launching WAAS CM from NCS.
Note If you use an external Cisco Prime host for SSO, specify the IP address of that host. If you do
not currently use the SSO functionality to log in to Cisco Prime, use the IP address of the Cisco
Prime device itself.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users to configure a NCS user
account.
The User Accounts window displays all the user accounts on the system.
Step 2 Click the Create New User Accounts icon.
The Creating New User Account window appears.Create a new non-local (remote) user account with
the name matching exactly the name of the NCS SSO user. Assign needed roles and domains in the Role
Management and Domain Management windows.
Step 3 To configure the NCS server from the WAAS CM:
a. From the WAAS Central Manager menu, choose Devices > WAAS CM> Configure AAA> Cisco
Prime SSO
b. Check the Enable NCS Single Sign-on check box, enter the NCS SSO server URL to configure the
SSO server. Click Submit.
c. Verify Server Certificate and click Submit.
The SSO feature is now ready for use.
Step 1 Go to Cisco Prime Server and select the appropriate device from the Service Container.
Step 2 Click the WAAS CM UI tab to launch the WAAS CM GUI.
Alternatively, select the device to launch the device instance homepage in the WAAS CM GUI.
Note Before you can configure the AAA accounting settings for a WAAS device, you must first configure the
TACACS+ server settings for the WAAS device. (See About TACACS+ Server Authentication Settings.)
Note If you enable AAA accounting for a device, we strongly recommended that you create an IP ACL
condition in the first entry position permitting access to the TACACS+ servers to avoid delay while
processing the commands. For information on IP ACLs, see Chapter 9, “Creating and Managing IP
Access Control Lists for Cisco WAAS Devices.”
To centrally configure AAA accounting settings for a WAAS device or device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > AAA > AAA Accounting.
The AAA Accounting Settings window appears.
Step 3 From the System Events drop-down list, choose a keyword to specify when the chosen device (or the
device group) should track system-level events that are not associated with users, such as reloads, and
to activate accounting for system events.
Step 4 From the Exec Shell and Login/Logout Events drop-down list, choose a keyword to specify when the
chosen device (or the device group) should track EXEC shell and user login and logout events and to
activate accounting for EXEC mode processes. Reports include username, date, start and stop times, and
the WAAS device IP address.
Step 5 From the Normal User Commands drop-down list, choose a keyword to specify when the chosen device
(or the device group) should track all the commands at the normal user privilege level (privilege level 0)
and to activate accounting for all the commands at the nonsuperuser administrative (normal user) level.
Step 6 From the Administrative User Commands drop-down list, choose a keyword to specify when the
chosen device (or the device group) should track all commands at the superuser privilege level (privilege
level 15) and to activate accounting for all the commands at the superuser administrative user level.
Caution Before using the wait-start option, ensure that the WAAS device is configured with the TACACS+
server and is able to successfully contact the server. If the WAAS device cannot contact a configured
TACACS+ server, it might become unresponsive.
Step 7 Check the Enable CMS CLI Accounting check box to enable AAA accounting to TACACS+ server.
Step 8 Click Submit to save the settings.
To configure AAA accounting settings from the CLI, use the aaa accounting global configuration
command.
This chapter describes how to create user accounts and groups from the Cisco Wide Area Applications
Services Central Manager GUI.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central
Managers and WAEs (Cisco Wide Area Application Engines) in your network. The term WAE refers to
WAE appliances, and WAE Network Modules (the Cisco WAAS NME-WAE family of devices).
Action Result
Creating a Local User • The account can be used to access the WAAS CLI and the WAAS
Central Manager GUI (with the default role).
• Users can change their own passwords, and the password change will
propagate to standby WAAS Central Managers.
• The account is stored in the WAAS Central Manager database and is
also propagated to the standby WAAS Central Managers.
Not Creating a Local • The user account is created in the primary and standby WAAS Central
User Manager management databases.
• No user account is created in the CLI. Users will have to use another
account to access the CLI.
• The new account can be used to log in to the WAAS Central Manager
GUI if an external authentication server is set. The user is assigned the
roles defined for the default user (initially none).
• Local users can change their passwords using the WAAS Central
Manager GUI only if they have roles that allow access to the
Admin > AAA section.
Note If a user account has been created from the CLI only, when you log in to the WAAS Central Manager
GUI for the first time, the Centralized Management System (CMS) automatically creates a user account
(with the same username as that configured in the CLI) with default authorization and access control.
An account created from the CLI will initially be unable to access any configuration pages in the WAAS
Central Manager GUI. You must use an admin account to give the account created from the CLI the roles
it requires to perform configuration tasks from the WAAS Central Manager GUI.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users.
The User Accounts window displays all the user accounts on the system.
Step 2 Click the Create New User Accounts icon.
The Creating New User Account window appears.
Note This window can be accessed only by users with administrator-level privileges.
Note Do not create a local user with a username that is identical to a username defined in an external
authentication server that is authorizing access to the WAAS device.
b. In the Password field, enter a password for the local user account, and re-enter the same password
in the Confirm Password field. Passwords are case-sensitive, must be 1 to 31 characters in length,
and cannot contain the characters ‘, “, | (apostrophe, double quote, or pipe) or any control
characters.
c. From the CLI Privilege Level drop-down list, select one of the following options for the local user
account:
– 0 (normal user)—Limits the CLI commands this user can use to only user-level EXEC
commands. This is the default value.
– 15 (super user)—Allows this user to use privileged EXEC-level CLI commands, similar to the
functions that a Central Manager GUI user with the admin role can perform.
Note Use the WAAS CLI EXEC mode for setting, viewing, and testing system operations. It is divided
into two access levels: user and privileged. A local user who has normal privileges can only
access the user-level EXEC CLI mode. A local user who has superuser privileges can access the
privileged EXEC mode as well as all other modes, for example, configuration mode and
interface mode, to perform any administrative task. For more information about the user-level
and privileged EXEC modes and CLI commands, see the Cisco Wide Area Application Services
Command Reference.
Step 5 (Optional) In the User Information fields, enter the following information about the user in the
appropriate fields: first name, last name, phone number, e-mail address, job title, and department.
Step 6 (Optional) In the Comments field. enter any additional information about this account.
Step 7 Click Submit.
A Changes Submitted message appears at the bottom of the window.
Step 8 Assign roles to this new account, as described in Working with Roles and assign domains, as described
in Working with Domains.
Note Modifying a user account from the CLI does not update the Centralized Management System (CMS)
database and the change will not be reflected in the Central Manager GUI.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users.
The User Accounts window appears.
Step 2 Click the Edit icon next to the user account that you want to modify.
Note This window can only be accessed by users with administrator-level privileges.
The Modifying User Account window appears. You can delete or edit user accounts as follows:
• To delete the user account, click the Delete icon in the taskbar, and then click OK to confirm the
deletion.
If the local user account was created using the WAAS Central Manager GUI, the corresponding user
account is removed from the CLI and is also deleted from all standby WAAS Central Managers.
Note Deleting a user account from the CLI does not disable the corresponding user account in the
CMS database. Consequently, the user account remains active in the CMS database. User
accounts created in the WAAS Central Manager GUI should always be deleted from the
WAAS Central Manager GUI.
• To edit the user account, make the necessary changes to the username and account information, and
click Submit.
Note We do not recommend changing the local CLI user password from the CLI. Any changes to local CLI
user passwords from the CLI are not updated in the management database and are not propagated to the
standby WAAS Central Manager. Therefore, passwords in the management database will not match a
new password configured in the CLI.
Note The advantage of initially setting passwords from the WAAS Central Manager GUI is that both the
primary and the standby WAAS Central Managers will be synchronized, and GUI users will not have to
access the CLI to change their password.
To change the password for your own account, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Admin > Security > Password.
The Changing Password for User Account window appears.
Step 2 In the New Password field, enter the changed password. Passwords are case sensitive, must be 1 to 31
characters in length, and cannot contain the characters ‘, “, | (apostrophe, double quote, or pipe) or
any control characters.
Step 3 In the Confirm New Password field, re-enter the password for confirmation.
Step 4 Click Submit.
The message Changes Submitted appears at the bottom of the window confirming that your password
has been changed.
When you change the password of an account by using the WAAS Central Manager GUI, it changes the
password for all WAE devices managed by the Central Manager.
Note If you change a user password from the CLI, the password change applies only to the local device, will
not be reflected in the Central Manager GUI, and is not propagated to any other devices.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users.
A list of roles-based user accounts appears.
Step 2 Click the Edit icon next to the account that needs a new password.
The Modifying User Account window appears.
Step 3 In the Password field, enter the changed password. Passwords are case-sensitive, must be 1 to 31
characters in length, and cannot contain the characters ‘, “, | (apostrophe, double quote, or pipe) or
any control characters.
Step 4 In the Confirm Password field, reenter the password for confirmation.
Step 5 Click Submit.
The message Changes Submitted appears at the bottom of the window confirming that your password
has been changed.
Step 1 From the WAAS Central Manager GUI, choose Admin > AAA > Users.
The User Accounts listing window appears and displays the status of each user account.
Note This window can only be accessed by users with administrator-level privileges.
Step 2 Click the Edit icon next to the user account that you want to modify.
The Modifying User Account window appears and displays a list of devices on which this account is
locked out.
Step 3 Choose the device in which you want to unlock the account.
The list of device users appears.
Step 4 Choose the user or users to unlock, and click unlock.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > AAA > Password Policy Settings.
Step 3 Check the Enforce stringent password check box to enable the strong password policy.
Step 4 In the Maximum login retries field, enter the maximum number of login attempts to be allowed before
a user is locked out. The user remains locked out until cleared by the administrator. For information
about how to clear a locked-out account, see Unlocking a User Account.
Step 5 Click Submit to save your changes.
To configure a password policy from the CLI, use the authentication strict-password-policy global
configuration command.
When the standard password policy is enabled, user passwords must meet the following requirements:
• The password must be 1 to 31 characters long.
• The password can include both uppercase and lowercase letters (A–Z and a–z) and numbers (0 to 9).
• The password cannot contain the characters ‘, “, | (apostrophe, double quote, or pipe) or any
control characters.
When the strong password policy is enabled, user passwords must meet the following requirements:
• The password must be 8 to 31 characters long.
• The password can include both uppercase and lowercase letters (A–Z and a–z), numbers (0 to 9),
and special characters including ~,`,!,@,#,$,%,^,&,*,(,),_,+,-,=,[,],\,{,},;,:,,,<,/,>.
• The password cannot contain the characters ‘ “ | (apostrophe, double quote, or pipe) or any control
characters.
• The password cannot contain all the same characters (for example, 99999).
• The password cannot contain consecutive characters (for example, 12345).
• The password cannot be the same as the username.
• Each new password must be different from the previous 12 passwords. User passwords expire within
90 days.
• The password cannot contain dictionary words.
A user account will be locked out after the configured number of failed login attempts (the default is
three). The user remains locked-out until cleared by the administrator. For information on how to clear
a locked-out account, see Unlocking a User Account.
Note Assigning the admin role to a user does not change the user privilege level to 15. The user must also have
privilege level 15 in order to perform administrative tasks.
WAAS can dynamically assign a role to users based on their membership in a group as defined on an
external TACACS+ or Windows domain authentication server. To take advantage of this feature, you
must define user group names on the WAAS Central Manager that match the user groups defined on the
external authentication server, and assign a role to the user groups on the WAAS Central Manager. For
more information on user groups, see Working with User Groups.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Roles.
The Roles listing window appears.
Step 2 Click the Create New Role icon from the taskbar.
The Creating New Role window appears.
Step 3 In the Name field, enter the name of the role.
The name cannot contain characters other than letters, numbers, period, hyphen, underscore, and space.
Step 4 Check the check box next to the services you want this role to manage.
The check boxes in this window are tri-state check boxes. When there is a check in a check box, it means
that the user will have read and write access to the listed service. Click the check box again to change
the indicator to a square partially filling the check box. This indicator means that the user will have
read-only access to the service. An empty square signifies no access to the service.
To expand the listing of services under a category, click the folder icon, and then check the check box
next to the services you want to enable for this role. To choose all the services under one category
simultaneously, check the check box next to the top-level folder for those services.
Table 8-4 lists the services that you can enable for a role.
Service Description
Home Allows a role to view, configure, and manage the system dashboard and
settings in the Configure, Monitor, and Admin menus of the WAAS
Central Manager GUI in the Home (global) context. Under each folder you
can select the subpages that you want this role to manage.
Device Groups Allows a role to view, configure, and manage the settings and subpages for
the various device groups in the WAAS Central Manager GUI in the device
group context.
Devices Allows a role to view, configure, and manage the settings and subpages for
various kinds of devices in the WAAS Central Manager GUI in the device
context.
AppNav Clusters Allows a role to view, configure, and manage the settings and subpages in
the WAAS Central Manager GUI in the AppNav Cluster context.
Locations Allows a role to view, configure, and manage the settings and subpages in
the WAAS Central Manager GUI in the Location context.
Service Description
All Devices Allows a role to access all the devices in your WAAS network. If this
service is not enabled, the user account will only have access to the devices
associated with the domain that you assign to the account.
Selecting this service allows you to skip the following tasks when setting
up a roles-based account:
• Creating and maintaining a domain that contains all the devices in
your network.
• Assigning to the account the domain that contains all the devices.
All Device Groups Allows a role to access all the device groups in your WAAS network. If
this service is not enabled, the user account will only have access to the
device groups associated with the domain that you assigned to the account.
Selecting this service allows you to skip the following tasks when setting
up a roles-based account:
• Creating and maintaining a domain that contains all the device groups
in your network.
• Assigning to the account the domain that contains all the device
groups.
All AppNav Clusters Allows a role to access all the AppNav Clusters in your WAAS network.
If this service is not enabled, the user account will only have access to the
AppNav Clusters associated with the domain that you assign to the
account.
Selecting this service allows you to skip the following tasks when setting
up a roles-based account:
• Creating and maintaining a domain that contains all the AppNav
Clusters in your network.
• Assigning to the account the domain that contains all the AppNav
Clusters.
Monitoring API Allows a role to access monitoring APIs through HTTPS requests. For
more information, see Cisco Wide Area Application Services API
Reference.
System Status Allows a role to access the device Alarms panel. For more information
about device alarms, see Chapter 15, “Monitoring Your WAAS Network.”
Step 5 (Optional) Enter comments, if any, about this role in the Comments field.
Step 6 Click Submit to save your settings.
Note The admin user account, by default, is assigned to the role that allows access to all entities in the system.
It is not possible to change the role for this user account.
To assign one or more roles to a user account group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users (or Admin > AAA > User
Groups).
The User Accounts (or User Groups) window appears with all the configured user accounts listed.
Step 2 Click the Edit icon next to the user account or group for which you want to assign roles.
The Modifying User Account (or Modifying User Group) window appears.
Step 3 Click the Role Management tab.
The Role Management window appears with all the configured role names listed.
Step 4 Click the Assign icon (blue cross mark) that appears next to the role name you want to assign to the
selected user account or group.
Step 5 Click the Unassign icon (green tick mark) next to the role name to unassign a previously assigned role.
Note Click the Assign all Roles icon in the taskbar to assign all the roles in the current window to a
user account or group. Alternatively, click the Remove all Roles icon to unassign all the roles
associated with a user account or group.
Note The admin user account, by default, is allowed access to all the services, and cannot be modified.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Roles.
The Roles window appears.
Step 2 Click the Edit icon next to the name of the role you want to change or delete.
The Modifying Role window appears. You can modify the role as follows:
• To delete this role, click the Delete icon in the taskbar.
• To edit this role, make the necessary changes to the fields, and click Submit.
• To enable a service for this role, check the check box next to the corresponding service. To disable
a previously selected service, uncheck the check box next to the service you want to disable. To
choose all the services under one category simultaneously, check the check box next to the top-level
service.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users (or Admin > AAA > User
Groups).
The User Accounts (or User Groups) window appears with all the configured user accounts or groups
listed.
Step 2 Click the Edit icon next to the user account or group that you want to view.
The Modifying User Account (or Modifying User Group) window appears.
Step 3 Click the Role Management tab.
The Role Management window appears.
Step 4 Click the View icon next to the role that you want to view.
The Viewing Role window appears, which displays the role name, comments about this role, and the
services that are enabled for this role.
Step 5 After you have finished viewing the settings, click Close.
Note A WAAS domain is not the same as a DNS domain or Windows domain.
When you create a domain, you choose the type of entities that can be associated with the domain. Entity
types include Devices, Device Groups, or None (for file server dynamic shares). For file server dynamic
shares, the dynamic shares are assigned in the dynamic shares configuration.
WAAS can dynamically assign a domain to a user based on their membership in a group as defined on
an external TACACS+ or Windows domain authentication server. To take advantage of this feature, you
must define user group names on the WAAS Central Manager that match the user groups defined on the
external authentication server and you must assign a domain to the user groups on the WAAS Central
Manager. For more information on user groups, see Working with User Groups.
This section contains the following topics:
• Creating a New Domain
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Domains.
The Domains listing window appears.
Step 2 Click the Create New Domain icon in the taskbar.
The Creating New Domain window appears.
Step 3 In the Name field, enter the name of the domain.
Step 4 From the Entity Type drop-down list, choose the entity type (Devices, Device Groups, or None) that you
want to assign to the domain.
Note Choose None if this domain is used for a file server dynamic share.
Step 5 (Optional) In the Comments field, enter comments, if any, about this domain.
Step 6 Click Submit.
If the entity type you chose has not been assigned to the domain, then a message indicating that the entity
type has not been assigned appears.
Step 7 Assign an entity to this domain, as described in Adding an Entity to a Domain. If you chose None for
the Entity Type, do not assign an entity to the domain, instead, the entity is used in a dynamic share
configuration.
For a domain used in a dynamic share configuration, assign the domain to each user having to edit the
dynamic share configuration, as described in Assigning a Domain to a User Account. Only users
assigned to the domain will be able to edit the dynamic share configuration.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Domains.
Step 2 Click the Edit icon next to the domain that you want to modify.
Step 3 Click the Entity Management tab.
The Entity_name Assignments for Domain window for the current domain appears.
You can filter your view of the items in the list. Filtering enables you to find items matching the criteria
that you set, in the list.
You can add or remove entities from the domain as follows:
• To add an entity to the current domain, click the Assign icon (blue cross mark) next to the entity that
you want to add. A green tick mark appears next to the selected entity when you submit the settings.
Alternatively, to add all the entities to the selected domain, click the Assign all icon in the taskbar.
• To remove an entity from the current domain, click the Unassign icon (green tick mark) next to the
name of the entity that you want to remove from the domain. A blue cross mark appears next to the
unassigned entity after you submit the settings.
Alternatively, to remove all the entities from the domain, click the Remove all icon in the taskbar.
Step 4 Click Submit.
Green check marks appear next to the entities that you assigned to the domain.
Step 5 Assign the domain to an account, as described in Assigning a Domain to a User Account.
Note If the role that you assigned to an account or group has the All Devices or All Device Groups service
enabled, you do not have to assign a domain to the account or group. The account or group can
automatically access all the devices or device groups, or both, in the WAAS system. For more
information, see Table 8-4.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users (or Admin > AAA > User
Groups).
The User Accounts (or User Groups) window appears with all the configured user accounts or groups
listed.
Step 2 Click the Edit icon next to the user account or group for which you want to assign domains.
The Modifying User Account (or Modifying User Group) window appears.
Step 3 Click the Domain Management tab.
The Domain Management window appears with all configured domains and their entity types listed.
Step 4 Click the Assign icon (blue cross mark) that appears next to the domain name that you want to assign to
the selected user account or group.
To dissociate a domain from the user account or group, click the Unassign (green tick mark) next to the
domain name.
Note To assign all the domains in the current window to a user account or group, click the Assign all
Domains icon in the taskbar. Alternatively, to unassign all the domains associated with a user
account or group, click the Remove all Domains icon.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Domains.
The Domains window appears.
Step 2 Click the Edit icon next to the domain that you want to modify.
The Modifying Domain window appears. You can modify the domain as follows:
• To delete the domain, click the Delete icon in the taskbar and then click OK to confirm the deletion.
• To modify a domain, make the necessary changes to the fields, and click Submit.
Viewing Domains
To view the domain configuration for a particular user account or group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > Users (or Admin > AAA > User
Groups).
The User Accounts (or User Groups) window appears with all the configured user accounts or groups
listed.
Step 2 Click the Edit icon next to the user account or group for which you want to view the domain
configuration.
The Modifying User Account (or Modifying User Group) window appears.
Step 3 Click the Domain Management tab.
The Domain Management window appears.
Step 4 Click the View (eyeglass) icon next to the domain name to view details about the domain.
The Viewing Domain window appears and displays the domain name, entity type, comments about this
domain, and entities assigned to this domain.
Step 5 After you have finished viewing the settings, click Close.
Note The dynamic assignment of roles and WAAS domains based on external user groups requires a
TACACS+ server that supports shell custom attributes. For example, these are supported in Cisco ACS
(Access Control Server) 4.x and 5.1 and later.
WAAS reads group membership information for each user from the external authentication server.
This section contains the following topics:
• Creating a New User Group
• Assigning Roles to a User Group
• Assigning a Domain to a User Group
• Modifying and Deleting a User Group
• Viewing User Groups
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > User Groups.
The User Groups listing window appears.
Step 2 Click the Create New User Groups icon in the taskbar.
The Creating New User Group window appears.
Step 3 In the Name field, enter the name of the user group.
Ensure that the name matches the name of a user group defined on the external authentication server that
you are using.
Name matching is case sensitive. A user group name cannot contain the following characters: # + " < >
, (comma). A user group name cannot consist solely of numbers, periods (.), or spaces. Any leading
periods, asterisks (*), or spaces are cropped.
Step 4 (Optional) In the Comments field, enter comments, if any, about this user group.
Step 5 Click Submit.
Step 6 Assign a role or WAAS domain to this user group, as described in Assigning Roles to a User Group and
Assigning a Domain to a User Group.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > User Groups.
The User Groups window appears with all the configured user groups listed.
Step 2 Click the Edit icon next to the user group for which you want to assign roles.
The Modifying User Group window appears.
Step 3 Click the Role Management tab.
The Role Management for User Group window appears with all the configured role names listed.
Step 4 Click the Assign icon (blue cross mark) that appears next to the role name that you want to assign to the
selected user group.
Step 5 Click the Unassign (green tick mark) next to the role name to unassign a previously assigned user group
role.
Note Click the Assign all Roles icon in the taskbar to assign all the roles in the current window to a
user group. Alternatively, click the Remove all Roles icon to unassign all the roles associated
with a user group.
Note If the role that you assigned to a user group has the All Devices or All Device Groups service enabled,
you do not have to assign a domain to the user group. The users in that group can automatically access
all the devices, or device groups, or both, in the WAAS system. For more information, see Table 8-4.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA> User Groups.
The User Groups window appears with all the configured user groups listed.
Step 2 Click the Edit icon next to the user group for which you want to assign domains.
The Modifying User Group window appears.
Step 3 Choose the Domain Management tab.
The Domain Management for User Group window appears with all the configured domains and their
entity types listed.
Step 4 Click the Assign icon (blue cross mark) that appears next to the domain name that you want to assign to
the selected user group.
To dissociate a domain from the user group, click the Unassign (green tick mark) next to the domain
name.
Note To assign all the domains in the current window to a user group, click the Assign all Domains
icon in the taskbar. Alternatively, to unassign all the domains associated with a user group, click
the Remove all Domains icon.
Step 1 From the WAAS Central Manager menu, choose Admin > AAA > User Groups.
The User Groups window appears.
Step 2 Click the Edit icon next to the user group that you want to modify.
The Modifying User Group window appears. You can delete or edit user groups as follows:
Note This window can be accessed only by users with administrator-level privileges.
• To delete the user group, click the Delete icon in the taskbar, and then click OK to confirm the
deletion.
• To edit the user group, make the necessary changes to the name and comment information, and click
Submit.
• To change the roles assigned to the user group, click the Role Management tab, make the necessary
changes to the roles, and click Submit.
• To change the domains assigned to the user group, click the Domain Management tab, make the
necessary changes to the domains, and click Submit.
This chapter describes how to use the Cisco Wide Area Application Services (Cisco WAAS) Central
Manager GUI to centrally create and manage IP access control lists (ACLs) for your Cisco WAAS
devices.
This chapter contains the following sections:
• Overview of IP ACLs for WAAS Devices
• Creating and Managing IP ACLs for WAAS Devices
• List of Extended IP ACL Conditions
Note You must log in to the WAAS Central Manager GUI using an account with admin privileges to view, edit, or
create IP ACL configurations.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central
Managers and Cisco Wide Area Application Engines (Cisco WAEs) in your network. The term WAE
refers to WAE appliances, WAE Network Modules (the Cisco NME-WAE family of devices), and Cisco
SRE service modules (SM) running WAAS.
• Interception ACL—Applied globally to a WAAS device. This type of ACL defines what traffic is to
be intercepted. Traffic that is permitted by the ACL is intercepted and traffic that is denied by the
ACL is passed through the WAE. Use the interception access-list global configuration command to
apply an interception ACL. For more information on using interception ACLs, see Configuring
Interception Access Control Lists in Chapter 5, “Configuring Traffic Interception.”
• WCCP ACL—Applied on inbound WCCP-redirected traffic to control access between an external
server and external clients. The WAE acts like a firewall. Use the wccp access-list global
configuration command to apply a WCCP ACL.
• SNMP ACL—Applied on an SNMP agent to control access to the SNMP agent by an external SNMP
server that is polling for SNMP MIBs or SNMP statistics. Use the snmp-server access-list global
configuration command to apply an SNMP ACL.
• Transaction-logs-flow ACL—Applied on the transaction logging facility to restrict the transactions
to be logged. Use the transaction-logs flow access-list global configuration command to apply a
transaction log ACL.
The following examples illustrate how interface ACLs can be used in environments that have WAAS
devices:
• A WAAS device resides on the customer premises and is managed by a service provider, and the
service provider wants to secure the device for its management only.
• A WAAS device is deployed anywhere within the enterprise. As with routers and switches, the
administrator wants to limit access to Telnet, SSH, and the WAAS Central Manager GUI to the IT
source subnets.
To use ACLs, you must first configure ACLs and then apply them to specific services or interfaces on
the WAAS device. The following are some examples of how interface ACLs can be used in various
enterprise deployments:
• An application layer proxy firewall with a hardened outside interface has no ports exposed.
(Hardened means that the interface carefully restricts which ports are available for access, primarily
for security reasons. Because the interface is outside, many types of attacks are possible.) The
WAAS device’s outside address is globally accessible from the Internet, while its inside address is
private. The inside interface has an ACL to limit Telnet, SSH, and GUI access.
• A WAE that is using WCCP is positioned on a subnet off the Internet router. Both the WAE and the
router must have IP ACLs. IP access lists on routers have the highest priority, followed by IP ACLs
that are defined on the WAEs.
Note We strongly recommend that you use the WAAS Central Manager GUI instead of the WAAS CLI to
centrally configure and apply ACLs to your WAAS devices. For more information, see the Creating and
Managing IP ACLs for WAAS Devices.
• Each WAAS Central Manager device can manage up to 50 IP ACLs and a total of 500 conditions
per device.
• When the IP ACL name is numeric, numbers 1 through 99 denote standard IP ACLs and numbers
100 through 199 denote extended IP ACLs. IP ACL names that begin with a number cannot contain
nonnumeric characters.
• The WAAS Central Manager GUI allows the association of standard IP ACLs with SNMP and
WCCP. Any device that attempts to access one of these applications associated with an ACL must
be on the list of trusted devices to be allowed access.
• You can associate any previously configured standard IP ACL with SNMP and WCCP. However, you
can associate an extended IP ACL only with the WCCP application.
• You can delete an IP ACL, including all conditions and associations with network interfaces and
applications, or you can delete only the IP ACL conditions. Deleting all conditions allows you to
change the IP ACL type if you choose to do so. The IP ACL entry continues to appear in the IP ACL
listing. However, it is, in effect, nonexistent.
• If you specify an empty ACL for any of the ACL types used by WAAS, it permits all traffic.
To use the WAAS Central Manager GUI to create and modify an IP ACL for a single WAE, associate an
IP ACL with an application, and then apply it to an interface on the WAE, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Network > TCP/IP Settings > IP ACL.
The IP ACL window appears. By default, there are no IP ACLs defined for a WAE. The IP ACL window
indicates if there are currently no IP ACLs configured for the WAE.
Step 3 Click Add IP ACL on the table heading row.
The IP ACL window appears. Fill in the fields as follows:
• In the Name field, enter a name, for example, test1. IP ACL names must be unique within the device,
must be limited to 30 characters, and cannot contain any white spaces or special characters.
By default, this new IP ACL is created as a standard ACL.
• To change this default setting and create this new ACL as an extended ACL, choose Extended from
the ACL Type drop-down list.
Step 4 Click OK to save the IP ACL named test1. IP ACLs without any conditions defined do not appear on the
individual devices.
Step 5 Add conditions to the standard IP ACL named test1 that you just created:
a. Click the Add IP ACL Condition.
The IP ACL Condition window appears (Figure 9-1).
Note The number of available fields for creating IP ACL conditions depends on the type of IP
ACL that you have created, either standard or extended.
b. Enter values for the properties that are enabled for the type of IP ACL that you are creating, as
follows:
– To set up conditions for a standard IP ACL, go to Step 6.
– To set up conditions for an extended IP ACL, go to Step 7.
Step 6 Set up conditions for a standard IP ACL:
a. From the Purpose drop-down list, choose a purpose (Permit or Deny).
b. In the Source IP field, enter the source IP address.
c. In the Source IP Wildcard field, enter a source IP wildcard address.
d. Click OK to save the condition.
IP ACL conditions for the newly created IP ACL and its configured parameters are displayed in
Table 9-1.
e. To add another condition to the IP ACL, select it and click Add IP ACL Condition.
f. Enter the details of the condition and click OK to save the additional condition.
g. For a newly created IP ACL condition to appear in a particular position, select the position and click
Insert. The IP ACL condition is placed in the selected position.
h. To rearrange your list of conditions, select the condition (or multiple consecutive conditions) and
use the Up or Down arrows, and click Save Moved Rows to commit the changes.
Alternatively, you can select one or multiple consecutive conditions and click Move to, to specify
the row number in which the IP ACL condition should be positioned. This is especially helpful when
there are numerous conditions listed in the table. After you are satisfied with all your entries and the
order in which the conditions are listed, click Save Moved Rows to commit the changes.
Note The order of the conditions listed in the WAAS Central Manager GUI becomes the order in
which IP ACLs are applied to the device.
After you choose a type of extended IP ACL, various options become available in the GUI,
depending on what type you choose.
c. In the fields that are enabled for the chosen type, enter the data. (For more information, see Table 9-4
through Table 9-7.)
d. Click OK to save the condition.
IP ACL conditions for the newly created IP ACL and its configured parameters are displayed in
Table 9-1.
e. To add another condition to the IP ACL, select it and click Add IP ACL Condition.
f. Enter the details of the condition in the window and click OK to save the additional condition.
g. For a newly created IP ACL condition to appear in a particular position, select the position and click
Insert. The IP ACL condition is placed in the selected position.
h. To rearrange your list of conditions, select the condition (or multiple consecutive conditions) and
use the Up or Down arrows. Click Save Moved Rows to commit the changes.
Alternatively, you can select one or multiple consecutive conditions and click Move to, to specify
the row number in which the IP ACL condition should be positioned. This is especially helpful when
there are numerous conditions listed in the table. After you are satisfied with all your entries and the
order in which the conditions are listed, click Save Moved Rows to commit the changes.
Note The order of the conditions listed in the WAAS Central Manager GUI becomes the order in
which IP ACLs are applied to the device.
Cisco WAAS
Central Manager
GUI Parameter Function
SNMP Associates a standard IP ACL with SNMP. This option is supported for all WAAS
devices.
WCCP Associates any of the IP ACLs with WCCP Version 2. This option is supported
only for WAAS devices that are operating in WCCP interception mode and not
for WAAS Central Manager devices.
The Network Interfaces window for the device appears. This window displays all the interfaces
available on that device.
c. Click the Edit icon next to the name of the interface to which you want to apply an IP ACL.
The Network Interface settings window appears.
d. From the Inbound ACL drop-down list at the bottom of the window, choose the name of an IP ACL.
e. From the Outbound ACL drop-down list, choose the name of an ACL.
The only network interface properties that can be altered from the WAAS Central Manager GUI are
the inbound and outbound IP ACLs. All other property values are populated from the device
database and are read-only in the WAAS Central Manager GUI.
Step 11 Click Submit to save the settings.
Step 12 To use an IP ACL to define the traffic that should be intercepted, see the Configuring Interception Access
Control Lists in Chapter 5, “Configuring Traffic Interception.”
Step 13 (Optional) Delete an IP ACL:
a. Click the Edit icon next to the name of the device that has the IP ACL that you want to delete.
b. Choose Configure > Network > TCP/IP Settings > IP ACL.
If you created conditions for the IP ACL, you have two options for deletion:
– Delete ACL—Removes the IP ACL, including all the conditions and associations with network
interfaces and applications.
– Delete All Conditions—Removes all the conditions, while preserving the IP ACL name.
c. To delete the entire IP ACL and its conditions, select the corresponding IP ACL and click Delete.
You are prompted to confirm your action. Click OK. The record is deleted.
d. To delete only the conditions, select the condition or multiple conditions (consecutive or
nonconsecutive conditions) and click Delete. When you are prompted to confirm your action, click
OK. The conditions are deleted.
To define an IP ACL from the CLI, you can use the ip access-list global configuration command, and to
apply the IP ACL to an interface on the WAAS device, you can use the ip access-group interface
configuration command. To configure the use of an IP ACL for SNMP, you can use the snmp-server
access-list global configuration command. To specify an IP ACL that the WAE applies to the inbound
WCCP redirected traffic that it receives, you can use the wccp access-list global configuration
command. To configure an interception ACL, you can use the interception access-list global
configuration command.
This chapter describes how to perform other system tasks such as setting the system clock, modifying
the default system configuration settings, and enabling alarm overload detection, after you have done a
basic configuration of your WAAS device. This chapter also describes how to register and manage Cisco
IOS routers running AppNav-XE and WAAS Express.
Note Throughout this chapter, the term WAAS device is used to refer collectively to the WAAS Central
Managers and WAEs in your network. The term WAE refers to WAE and WAVE appliances, SM-SRE
modules running WAAS, and vWAAS instances.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose device-name > Activation.
The Device Activation window appears with fields for editing the properties of the selected device.
For a WAAS Central Manager device, the only fields that you can change in this window are the name
and NetBIOS name of the device. In addition, the device IP address and role are displayed.
Step 3 Under the General Configuration heading, set or modify the following device properties:
• To change the hostname of the device, enter a new name in the Name field. This name must conform
to the following rules:
– The name must use only alphanumeric characters and hyphens (-).
– The first and last character must be a letter or a digit.
– Maximum length is 30 characters.
– Names are case insensitive.
– The following characters are considered illegal and cannot be used when naming a device:
@, #, $,%, ^, &, *, (), |, \””/, <>.
• To activate or deactivate the device, check or uncheck the Activate check box.When this box is
checked, the device is activated for centralized management through the WAAS Central Manager
GUI.
You can also click the Deactivate icon in the task bar to deactivate the device. Deactivating a device
allows you to replace the device in the event of a hardware failure without losing all of its
configuration settings.
• To change the NetBIOS name of the device, enter the new NetBIOS name for the device in the
provided field. The NetBIOS name must not consist of only numbers; it must include some letters.
This field is not displayed for WAAS Express devices.
Step 4 Under the Locality heading, set or change the location by choosing a new location from the Location
drop-down list. To create a location for this device, see Creating Locations in Chapter 3, “Using Device
Groups and Device Locations.”
Step 5 Under the Management Interface Configuration with NAT heading, configure the NAT settings using the
following fields:
• Check the Use WAE’s primary IP Address check box to enable the WAAS Central Manager to use
the IP address configured on the primary interface of the device to communicate with devices in the
WAAS network that are behind a NAT firewall. This check box is not displayed for WAAS Express
devices.
• Allow the WAAS Central Manager to communicate with devices in the WAAS network that are
behind the NAT firewall using an explicitly configured IP address, by entering the IP address of the
device in the Management IP field. You also need to enter this address in scenarios where the
primary interface for a WAE is set to an inline group interface and management traffic is configured
on a separate IP address (either on a secondary IP address on the same inline group interface or on
a built-in interface).
• In the Port field, enter the port number for the management IP address. If the HTTPS server
configured on a WAAS Express device is using a different port than the default of 443, configure
the same port here.
Note If the WAAS Central Manager cannot contact a device using the primary IP address, it attempts
to communicate using the Management IP address.
Step 6 In the Comments field, enter any comments that you want to appear for this device.
Step 7 Click Submit.
License Description
Transport Enables basic DRE, TFO, and LZ optimization. Cannot be configured if the
Enterprise license is configured.
Enterprise Enables the EPM, HTTP, MAPI, NFS, SSL, SMB, ICA, and Windows Print
application accelerators, the WAAS Central Manager, and basic DRE, TFO, and
LZ optimization. Cannot be configured if the Transport license is configured.
Licenses are installed and managed only on individual WAE devices, not device groups. Not all licenses
are supported on all devices. A WAAS Central Manager device requires only the Enterprise license and
no other licenses can be configured.
Note WAAS Express licenses cannot be managed via the WAAS Central Manager, as WAAS Express devices
do not use the same kind of licenses as WAAS devices. WAAS Express licenses are managed via the
router CLI only.
The exact WAAS Express licensing process depends on the version of IOS running on your WAAS
Express router:
Prior to IOS 15.3(3), the WAAS Express license is managed by using the router CLI command license
install. They use a single license that enables the WAAS Express optimization feature.
As of IOS 15.3(3)M the WAAS Express feature no longer requires a separate license, but is a Right To
Use (RTU) feature included in the AppxK9 license.
As of IOS 15.4(1)T WAAS Express is a Right To Use (RTU) feature that is included in the default license
coming with the router and no specific license needs to be installed anymore.
Regardless of the actual OS release used, the WAAS Express feature license must be purchased.
Note If you are upgrading the WAAS Express devices to IOS 15.3(3)M version, as part of the new Appxk9
license support in WAAS Express IOS 15.3(3)M, you need to upgrade the WAAS Central Manager to
5.3.1 OR later. Else the devices go offline.
To add a license to a WAE from the WAAS Central Manager, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name. (Do not choose a Central
Manager device because you must use the CLI to manage licenses on Central Managers.)
Step 2 Choose Admin > History > License Management.
Step 3 Check the check box next to each license that you want to add.
Step 4 Click Submit.
To add licenses from the CLI, you can use the license add EXEC command.
To remove licenses from the CLI, you can use the clear license EXEC command.
To display the status of all licenses from the CLI, you can use the show license EXEC command.
The setup utility also configures licenses when you first set up a new WAAS device.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Network > Network Services. The Network Services window appears.
Step 3 Check the Enable FTP check box to enable Inetd FTP services. By default, this option is disabled.
Note The Inetd daemon listens for FTP and TFTP services. For Inetd to listen to FTP requests, it must
be explicitly enabled for FTP service.
A “Click Submit to Save” message appears in red next to the Current Settings line when there are
pending changes to be saved after you have applied default or device group settings. You can also revert
to the previously configured settings by clicking the Reset button. The Reset button is visible only when
you have applied default or group settings to change the current device settings but you have not yet
submitted the changes.
If you try to leave this window without saving the modified settings, a warning dialog box prompts you
to submit the changes. This dialog box only appears if you are using the Internet Explorer browser.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Date/Time > NTP. The NTP Settings window appears.
Step 3 In the NTP Server field, enter up to four hostnames or IP addresses, separated by spaces.This field now
accepts IPv6 addresses.
Step 4 Click Submit.
Unexpected time changes can result in unexpected system behavior. We recommend reloading the
system after configuring an NTP server or changing the system clock.
Note Two clocks exist in the system: the software clock and the hardware clock. The software uses the
software clock. The hardware clock is used only at startup to initialize the software clock.
To configure the time zone on a device or device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Date/Time > Time Zone. The Time Zone Settings window appears.
Step 3 To configure a standard time zone, follow these steps:
a. Under the Time Zone Settings section, click the Standard Time Zone radio button. The default is
UTC (offset = 0) with no summer time configured. When you configure a standard time zone, the
system is automatically adjusted for the UTC offset, and the UTC offset need not be specified.
The standard convention for time zones uses a Location/Area format in which Location is a
continent or a geographic region of the world and Area is a time zone region within that location.
b. From the drop-down list, choose a location for the time zone. (For an explanation of the
abbreviations in this list, see Table 10-2.)
The window refreshes, displaying all area time zones for the chosen location in the second
drop-down list.
c. Choose an area for the time zone. The UTC offset is automatically set for standard time zones.
Summer time is built-in for some standard time zones (mostly time zones within the United States),
and will result an automatic change in the UTC offset during summer time. For a list of standard
time zones that can be configured and their UTC offsets, see Table 10-3.
Step 4 To configure a customized time zone on the device, follow these steps:
a. Under the Time Zone Settings section, click the Customized Time Zone radio button.
b. In the Customized Time Zone field, specify the name of the time zone. The time zone entry is
case-sensitive and can contain up to 40 characters including spaces. If you specify any of the
standard time zone names, an error message is displayed when you click Submit.
c. For UTC Offset, choose the + or – sign from the first drop-down list to specify whether the
configured time zone is ahead or behind UTC. Also, choose the number of hours (0–23) and minutes
(0–59) offset from UTC for the customized time zone. The range for the UTC offset is from –23:59
to 23:59, and the default is 0:0.
Step 5 To configure customized summer time, follow these steps under the Customized Summer Time Savings
section.
Note You can specify a customized summer time for both standard and customized time zones.
a. To configure absolute summer time, click the Absolute Dates radio button.
You can configure a start date and end date for summer time in absolute dates or recurring dates.
Absolute date settings apply only once and must be set every year. Recurring dates apply repeatedly
for many years.
b. In the Start Date and End Date fields, specify the month (January through December), day (1–31),
and year (1993–2032) on which summer time must start and end in mm/dd/yyyy format. Make sure
that the end date is always later than the start date.
Alternatively, click the Calendar icon next to the Start Date and End Date fields to display the Date
Time Picker popup window. By default the current date is highlighted in yellow. In the Date Time
Picker popup window, use the left or right arrow icons to choose the previous or following years, if
required. Choose a month from the drop-down list. Click a day of the month. The chosen date is
highlighted in blue. Click Apply. Alternatively, click Set Today to revert to the current day. The
chosen date will be displayed in the Start Date and End Date fields.
c. To configure recurring summer time, click the Recurring Dates radio button.
d. From the Start Day drop-down list, choose a day of the week (Monday-Sunday) to start.
e. From the Start Week drop-down list, choose an option (first, 2nd, 3rd, or last) to set the starting
week. For example, choose first to configure summer time to recur beginning the first week of the
month or last to configure summer time to recur beginning the last week of the month.
f. From the Start Month drop-down list, choose a month (January–December) to start.
g. From the End Day drop-down list, choose a day of the week (Monday–Sunday) to end.
h. From the End Week drop-down list, choose an option (first, 2nd, 3rd, or last) to set the ending
week. For example, choose first to configure summer time to end beginning the first week of the
month or last to configure summer time to stop beginning the last week of the month.
i. From the End Month drop-down list, choose a month (January–December) to end.
Step 6 From the Start Time drop-down lists, choose the hour (0–23) and minute (0–59) at which daylight saving
time should start. From the End Time drop-down lists, choose the hour (0–23) and minute (0–59) at
which daylight saving time should end.
Start Time and End Time fields for summer time are the times of the day when the clock is changed to
reflect summer time. By default, both start and end times are set at 00:00.
Step 7 In the Offset field, specify the minutes offset from UTC (0–1439). (See Table 10-3.)
The summer time offset specifies the number of minutes that the system clock moves forward at the
specified start time and backward at the end time.
Step 8 Click the No Customized Summer Time Configured radio button to not specify a summer or daylight
saving time for the corresponding time zone.
Step 9 Click Submit to save the settings.
A “Click Submit to Save” message appears in red next to the Current Settings line when there are
pending changes to be saved after you have applied default or device group settings. You can also revert
to the previously configured settings by clicking the Reset button. The Reset button is visible only when
you have applied default or group settings to change the current device settings but have not yet
submitted the changes.
If you attempt to leave this window without saving the modified settings, a warning dialog box prompts
you to submit the changes. This dialog box only appears if you are using the Internet Explorer browser.
UTC was formerly known as Greenwich Mean Time (GMT). The offset time (number of hours ahead or
behind UTC) as displayed in the table is in effect during winter time. During summer time or daylight
saving time, the offset may be different from the values in the table and is calculated and displayed
accordingly by the system clock.
Secure store encryption on the Central Manager is always enabled and uses a password that is
auto-generated or user-provided. This password is used to generate the key encryption key according to
secure standards. The WAAS system uses the key encryption key to encrypt and store other keys
generated on the Central Manager or WAE devices. These other keys are used for WAAS functions
including disk encryption, SSL acceleration, or to encrypt and user passwords.
Data on the Central Manager is encrypted using a 256-bit key encryption key generated from the
password and using SHA1 hashing and an AES 256-bit algorithm. When secure store is enabled on a
WAE device the data is encrypted using a 256-bit key encryption key generated using SecureRandom, a
cryptographically strong pseudorandom number generator.
Secure store encryption on a Central Manager uses one of the following modes:
• Auto-generated passphrase mode—The passphrase is automatically generated by the Central
Manager and used to open the secure store after each system reboot. This is the default mode for
new Central Manager devices or after the system has been reinstalled.
• User-provided passphrase mode—The passphrase is supplied by the user and must be entered after
each system reboot to open the secure store. You can switch to this mode, and systems upgraded
from versions prior to 4.4.1, with secure store initialized, are configured in this mode after
upgrading to 4.4.1 or later.
To implement secure store your system must meet the following requirements:
• You must have a Central Manager configured for use in your network.
• Your WAE devices must be registered with the Central Manager.
• Your WAE devices must be online (have an active connection) with the Central Manager. This
requirement applies only if you are enabling secure store on WAE devices.
• All Central Managers and WAE devices must be running WAAS software version 4.0.19 or higher.
To implement strong store encryption, follow these steps:
Step 1 Enable strong storage encryption on your primary Central Manager. See Enabling Secure Store
Encryption on the Central Manager.
Step 2 Enable strong storage encryption on any standby Central Managers. See Enabling Secure Store
Encryption on a Standby Central Manager.
Step 3 Enable strong storage encryption on WAE devices or WAE device groups. See Enabling Secure Store
Encryption on a WAE Device. (Secure store must be enabled on the Central Manager before you enable
it on the WAE devices.)
You can enable secure store independently on the Central Manager and on the WAE devices. To ensure
full protection of your encrypted data, enable secure store on both the Central Manager and the WAE
devices. You must enable secure store on the Central Manager first.
Note When you reboot the Central Manager, if secure store is in user-provided passphrase mode, you must
manually open secure store encryption. All services that use the secure store (disk encryption, SSL
acceleration, AAA, and so on) on the remote WAE devices do not operate properly until you enter the
secure store password on the Central Manager to open secure store encryption.
• Certificate key files are encrypted using the strong encryption key on the Central Manager.
• If a primary Central Manager fails, secure store key management is handled by the standby Central
Manager. (Secure store mode must be enabled manually on the standby Central Manager.)
• Backup scripts back up the secure store passphrase mode (user-provided or auto-generated) of the
device at the time of backup. Backup and restore are supported only on the Central Manager.
• If you have a backup made when the secure store was in user-provided passphrase mode and you
restore it to a system where the secure store is in auto-generated passphrase mode, you must enter
the user passphrase to proceed with the restore. After the restore, the system is in user-provided
passphrase mode. If you have a backup made when the secure store was in auto-generated
passphrase mode and you restore it to a system where the secure store is in user-provided passphrase
mode, you do not need to enter a password. After the restore, the system is in auto-generated
passphrase mode.
• When you enable secure store on a WAE device, the system initializes and retrieves a new
encryption key from the Central Manager. The WAE uses this key to encrypt data credentials and
information on the disk (if disk encryption is also enabled).
• When you reboot the WAE after enabling secure store, the WAE retrieves the key from the Central
Manager automatically, allowing normal access to the data that is stored in WAAS persistent
storage. If key retrieval fails, a critical alarm is raised and secure store should be reopened manually.
Until secure store is reopened, the WAE rejects configuration updates from the Central Manager if
the updates contain dynamic share, or user configuration. Also, the WAE does not include
preposition configuration in the updates that it sends to the Central Manager.
• While secure store encrypts certain system information, it does not encrypt the data on the hard
drives. To protect the data disks, you must enable disk encryption separately.
Step 1 From the WAAS Central Manager menu, choose Admin > Secure Store. The Configure CM Secure
Store window appears.
Step 2 Enter the secure store passphrase in the Current passphrase field under Open Secure Store.
Step 3 Click the Open button.
The secure store is opened. Data is encrypted using the key derived from the password.
To open the secure store from the CLI, use the cms secure-store open EXEC command.
Note Whenever you reboot a Central Manager that is configured in user-provided passphrase mode, you must
reopen the secure store manually. All services that use the secure store (disk encryptionSSL acceleration,
AAA, and so on) on the remote WAE devices do not operate properly until you enter the secure store
password on the Central Manager to reopen the secure store. Switch to auto-generated passphrase mode
to avoid having to reopen the secure store after each reboot.
Note When you enable secure store on the primary Central Manager in user-provided passphrase mode, you
should enable secure store on the standby Central Manager as well. See Enabling Secure Store
Encryption on a Standby Central Manager.
You can check the status of secure store encryption by entering the show cms secure-store command.
Note A standby Central Manager provides limited encryption key management support. If the primary Central
Manager fails, the standby Central Manager provides only encryption key retrieval to the WAE devices
but does not provide new encryption key initialization. Do not enable disk encryption or secure store on
WAE devices when the primary Central Manager is not available.
The secure store passphrase mode on the primary Central Manager is replicated to the standby Central
Manager (within the standard replication time). If the primary Central Manager is switched to
auto-generated passphrase mode, the standby Central Manager secure store changes to the open state. If
the primary Central Manager is switched to user-provided passphrase mode or the passphrase is changed,
the standby Central Manager secure store changes to the initialized but not open state and an alarm is
raised. You must manually open the secure store on the standby Central Manager.
To enable secure store encryption on a standby Central Manager when the primary Central Manager is
in user-provided passphrase mode, open the secure store on the primary Central Manager and then use
the CLI to execute the cms secure-store open EXEC mode command on the standby Central Manager:
Step 1 Enable secure store encryption on the primary Central Manager. See Enabling Secure Store Encryption
on the Central Manager.
Step 2 Wait until the standby Central Manager replicates the data from the primary Central Manager.
The replication should occur in 60 seconds (default) or as configured for your system.
Step 3 Enter the cms secure-store open command on the standby Central Manager to activate secure store
encryption.
The standby Central Manager responds with the “please enter pass phrase” message.
Step 4 Type the password and press Enter.
The standby Central Manager encrypts the data using secure store encryption.
Note Repeat Steps 3 and 4 for each standby Central Manager on your system.
You can check the status of secure store encryption by entering the show cms secure-store command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Note The secure store status must be the same for all WAE devices in a device group. Either all WAE
devices in the group must have secure store enabled, or all must have secure store disabled.
Before you add a WAE device to a device group, set its secure store status to match the others.
See Working with Device Groups in Chapter 3, “Using Device Groups and Device Locations.”
Step 2 Choose Configure > Security > Secure Store. The Secure Store Settings window appears
Step 3 Check the Initialize CMS Secure Store box. (The Open CMS Secure Store box will be checked
automatically.)
Step 4 Click Submit to activate secure store encryption.
A new encryption key is initialized on the Central Manager, and the WAE encrypts the data using secure
store encryption.
To enable secure store from the CLI, use the cms secure-store init EXEC command.
Note If you have made any other CLI configuration changes on a WAE within the datafeed poll rate time
interval (5 minutes by default) before executing the cms secure-store command, those prior
configuration changes are lost and you must redo them.
Note When you enable or disable secure store on a device group, the changes do not take effect on all WAE
devices simultaneously. When you view the WAE devices be sure to give the Central Manager enough
time to update the status of each WAE device.
Step 1 From the WAAS Central Manager menu, choose Admin > Secure Store.
Step 2 In the Switch to CM auto-generated passphrase mode area, enter the password in the Current passphrase
field.
Step 3 Click the Switch button.
The secure store is changed to auto-generated passphrase mode and remains in the open state.
To change from auto-generated to user-provided passphrase mode, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Admin > Secure Store.
Step 2 In the Switch to User-provided passphrase mode area, enter a password in the New passphrase field and
reenter the password in the Confirm passphrase field.
The password must conform to the following rules:
• Be 8 to 64 characters in length
• Contain characters only from the allowed set: A-Za-z0-9~%'!#$^&*()|;:,"<>/
• Contain at least one digit
• Contain at least one lowercase and one uppercase letter
Step 3 Click the Switch button.
Step 4 Click OK in the confirmation message that appears.
The secure store is changed to user-provided passphrase mode and remains in the open state. If you have
a standby Central Manager, you must manually open its secure store (see Enabling Secure Store
Encryption on a Standby Central Manager).
To change secure store passphrase mode from the CLI, use the cms secure-store mode EXEC command.
Note Whenever you reboot a Central Manager that is configured in user-provided passphrase mode, you must
reopen the secure store manually. All services that use the secure store (disk encryption, SSL
acceleration, AAA, and so on) on the remote WAE devices do not operate properly until you enter the
secure store password on the Central Manager to reopen the secure store. Switch to auto-generated
passphrase mode to avoid having to reopen the secure store after each reboot.
Step 1 From the WAAS Central Manager menu, choose Admin > Secure Store.
Step 2 In the Change Secure Store passphrase area, in the Current passphrase field, enter the current password.
Step 3 In the New passphrase field, enter the new password.
The password must conform to the following rules:
• Be 8 to 64 characters in length
• Contain characters only from the allowed set: A-Za-z0-9~%'!#$^&*()|;:,"<>/
Note There may be a delay of a few minutes after you click the Change button before the changes
take effect.
To change the password and generate a new encryption key on the Central Manager from the CLI, use
the cms secure-store change EXEC command.
To generate a new encryption key for a WAE device from the WAAS Central Manager, follow these
steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > Secure Store.
Step 3 Check the Change CMS Secure Store box and then click Submit.
A new encryption key is generated in the Central Manager. The Central Manager replaces the encryption
key in the WAE with the new key. The WAE re-encrypts the stored data using the new encryption key.
Note There may be a delay of a few minutes after you click the Submit button before the changes take
effect.
To configure the secure store encryption key from the CLI, use the cms secure-store change EXEC
command.
Step 1 At the primary Central Manager CLI, enter the cms secure-store reset command to reset secure store
encryption.
Step 2 Wait until the standby Central Manager replicates the data from the primary Central Manager.
The replication should occur in 60 seconds (default) or as configured for your system.
Step 3 Enter the cms secure-store reset command on the standby Central Manager if secure store is in the
initialized and open state.
Step 4 From the primary Central Manager, reset all user account passwords .
For information on resetting user passwords, see Changing the Password for Another Account in Chapter
8, “Creating and Managing Administrative User Accounts and Groups.”
Step 5 On each WAE registered to the Central Manager, follow these steps:
a. If secure store is initialized and open, from the Central Manager, clear secure store (see Disabling
Secure Store Encryption on a WAE Device). Or, from the CLI, enter the cms secure-store clear
EXEC command.
b. From the Central Manager, initialize secure store (see Enabling Secure Store Encryption on a WAE
Device) or from the CLI, enter the cms secure-store init EXEC command. (This step is needed only
if you performed Step 5a.)
c. Enter the crypto pki managed-store initialize command and restart the SSL accelerator.
d. If disk encryption is enabled, from the Central Manager, disable disk encryption or from the CLI,
enter the no disk encrypt enable global configuration command.
e. If disk encryption had been enabled before Step 5d, reload the device. After the reload, reenable disk
encryption and reload the device again.
Note If the WAE is reloaded before doing Step 5, disk encryption, SSL acceleration, and secure store
does not function properly. In this case, you must restore the WAE to factory defaults.
Step 6 From the primary Central Manager, reimport all certificate and key files for all the accelerated and
peering services which are configured on the WAEs.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > Secure Store. The Secure Store Settings window appears.
Step 3 Check the Clear CMS Secure Store box and then click Submit to disable secure store encryption and
return to standard encryption.
You can also enter the cms secure-store clear command to disable secure store encryption and return to
standard encryption.
Consider the following when you disable Secure Store in the WAAS CM or with the cms secure-store
clear command:
• There may be a delay of a few minutes for the changes to take effect, after you either click Submit
at the Secure Store Settings window, or enter the cms secure-store clear command at the CLI.
• If a Windows Domain User account identity has been configured on the device or the device group
for encrypted-mapi acceleration, you will not be able to clear the secure store on the device. You
must remove the Windows domain user account identity configuration from the device or device
group before you can clear secure store.
• You cannot clear secure store on a device that contains an encrypted services user account domain
identity. See Configuring Encrypted MAPI Acceleration in Chapter 12, “Configuring Application
Acceleration” for more information on user account domain identities.
• To disable secure store on a WAE from the CLI, use the cms secure-store clear EXEC command.
• Secure store cannot be disabled on a Central Manager.
Step 1 From the WAAS Central Manager menu, choose Configure > Global > System Properties. The Config
Properties window appears.
Step 2 Click the Edit icon next to the system property that you want to change. The Modifying Config Property
window appears.
Step 3 From a drop-down list, enter a new value or choose a new parameter, depending on the system property
that you want to change.
Step 4 Click Submit to save the settings
Step 1 From the WAAS Central Manager menu, choose Configure > Global > System Properties. The Config
Properties window appears.
Note You cannot enable this feature using the CLI. This feature is disabled by default.
Security Verification
The Web Application Filter feature verifies security using two methods, input verification and
sanitization. Input validation validates all input data before accepting data. Sanitization prevents
malicious configuration and scripts already present in the data from getting executed.
This section contains the following topics:
• Input Validation
• Sanitization
Input Validation
Input validation scans all data that is input to the Central Manager database and is only configurable by
the admin user.
Any input submitted using the Central Manager GUI that is suspicious of XSS is blocked. Blocked input
results in a warning.
Input data is checked against the following XSS filter rules:
• Input is rejected if it contains a semicolon (;)
• Input is rejected if it is enclosed in angle brackets (<>)
• Input is rejected if it can be indirectly used to generate the above tags (<, >, %3c, %3e)
Sanitization
The sanitizer prevents malicious configuration and scripts from getting executed in the browser when
there is an XSS attack on the database. Sanitization is not configurable by the user.
Configuration data coming from the Central Manager that is suspect for XSS is shown in red on the
Device Groups > All Device Groups page.
Step 1 From the WAAS Central Manager menu, choose Configure > Global > Fast Device Offline Detection.
The Configure Fast Offline Detection window appears.
Note The fast detection of offline devices feature is in effect only when the WAAS Central Manager
receives the first UDP heartbeat packet and a getUpdate request from a device.
Step 2 Check the Enable Fast Offline Detection check box to enable the WAAS Central Manager to detect the
offline status of devices quickly.
Step 3 In the Heartbeat Rate field, specify how often devices should transmit a UDP heartbeat packet to the
WAAS Central Manager, in seconds. The default is 30 seconds.
Step 4 In the Heartbeat Fail Count field, specify the number of UDP heartbeat packets that can be dropped
during transmission from devices to the WAAS Central Manager before a device is declared offline. The
default is 1.
Step 5 In the Heartbeat UDP Port field, specify the port number using which devices will send UDP heartbeat
packets to the primary WAAS Central Manager. The default is port 2000.
The Maximum Offline Detection Time field displays the product of the failed heartbeat count and
heartbeat rate.
Maximum Offline Detection Time = Failed heartbeat count * Heartbeat rate
If you have not enabled the fast detection of offline devices feature, then the WAAS Central Manager
waits for at least two polling periods to be contacted by the device for a getUpdate request before
declaring the device to be offline. However, if you enable the fast detection of offline devices feature,
then the WAAS Central Manager waits until the value displayed in the Maximum Offline Detection Time
field is exceeded.
If the WAAS Central Manager receives the Cisco Discovery Protocol (CDP) from a device, then the
WAAS Central Manager GUI displays the device as offline after a time period of 2* (heartbeat rate) *
(failed heartbeat count).
Step 6 Click Submit.
Note Any changes to the Configure Fast WAE offline detection page in the Central Manager could result in
devices temporarily appearing to be offline. Once the configuration changes are propagated to the
devices, they show as online again.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > Alarm Overload Detection. The Alarm Overload Detection
Settings window appears.
Step 3 Uncheck the Enable Alarm Overload Detection check box if you do not want to configure the WAAS
device (or device group) to suspend alarm raise and clear operations when multiple applications report
error conditions. This check box is checked by default.
Step 4 In the Alarm Overload Low Water Mark (Clear) field, enter the number of incoming alarms per second
below which the WAAS device comes out of the alarm overload state.
The low-water mark is the level up to which the number of alarms must drop before alarms can be
restarted. The default value is 1. The low-water mark value should be less than the high-water mark
value.
Step 5 In the Alarm Overload High Water Mark (Raise) field, enter the number of incoming alarms per second
above which the WAAS device enters the alarm overload state. The default value is 10.
Step 6 Click Submit to save the settings.
To configure alarm overload detection from the CLI, you can use the alarm overload-detect global
configuration command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name. You must choose a Central
Manager device.
Step 2 Choose Configure > Monitoring > Email Notification. The Configure Email Server Details window
appears.
Step 3 In the Mail Server Hostname field, enter the hostname of the SMTP e-mail server that is to be used to
send e-mail.
Note Only SMTP mail servers are supported. If any other type of mail server is configured, the email
notification fails.
Step 4 In the Mail Server Port field, enter the port number. The default is port 25.
Step 5 In the Server Username field, enter a valid e-mail account username.
Step 6 In the Server Password field, enter the password for the e-mail account.
Step 7 In the From Address field, enter the e-mail address shown as the sender of the e-mail notification.
Step 8 Click Submit.
If a BMC firmware update is needed, you can download it from cisco.com at the Wide Area Application
Service (WAAS) Firmware download page (registered customers only). The firmware binary image is
named waas-bmc-installer-48a-48a-26a-k9.bin or a newer version may be available. Use the latest
firmware update that is available.
You can use the following command to update the firmware from the image file that is available through
FTP on your network:
copy ftp install ip-address remotefiledir waas-bmc-installer-48a-48a-26a-k9.bin
The update process automatically checks the health status of the BMC firmware. If BMC firmware
corruption is detected, BMC is recovered during the BMC firmware update procedure. The complete
update process can take several minutes and the device may appear unresponsive but do not interrupt the
process or power cycle the device. After the update is complete, you must reload the device.
After the device reboots, you can verify the firmware version by using the show bmc info command.
BMC recovery and BMC firmware update restores the factory defaults on the BMC and all the current
IPMI over LAN configurations are erased.
If BMC firmware corruption happens, a critical alarm is raised.
Step 4 Access the BMC from a remote client over IPMI session v2.0 using the username and password for the
number 2 user. The default cipher suite used to access the BMC is 3, which specifies
RAKP-HMAC-SHA1 authentication, HMAC-SHA1-96 integrity, and AES-CBC-128 encryption
algorithms.
Step 5 To access the BMC over a IPMI session v1.5, change the user 2 IPMI-session-version setting from v2.0
to v1.5.
Step 1 On the WAAS device, configure and enable IPMI over Lan (IoL).
Step 2 On the remote client make sure that the BMC user can do IoL operations successfully over IPMI session
v2.0.
Step 3 On the remote client, change the baud-rate of the terminal to match the WAAS console baud rate of 9600
bps.
Step 4 On the WAAS device, enable IPMI SoL.
Step 5 On the remote client, if the IPMI management tool is ipmitool, check the SoL payload status of the
specific BMC user with the following command:
ipmitool -I lanplus -H bmc-ip-address -U bmc-user-name sol payload status 1 bmc-user-userid
For example:
# ipmitool -I lanplus -H 2.1.4.70 -U user3 sol payload status 1 3
Password:
User 3 on channel 1 is disabled
Step 6 If the SoL payload is disabled for this user, enable the SoL payload for this user with the following
command:
ipmitool -I lanplus -H bmc-ip-address -U bmc-user-name sol payload enable 1 bmc-user-userid
For example:
# ipmitool -I lanplus -H 2.1.4.70 -U user3 sol payload enable 1 3
Password:
# ipmitool -I lanplus -H 2.1.4.70 -U user3 sol payload status 1 3
Password:
User 3 on channel 1 is enabled
Step 7 On the remote client, use the following command to open the serial console to the WAAS device:
ipmitool -I lanplus -H bmc-ip-address -U bmc-user-name sol activate
Step 8 On the remote client, you have now entered the console session of the WAAS device. When you are done,
use the ~. escape character to terminate the connection.
Registering a Cisco IOS Router Device Using the Central Manager GUI
All banner configurations (with keywords such as username, password, hostname etc.) must be removed
from the router, before you register it with the WAAS Central Manager because it interferes with the
registration process and throws up inadvertent errors.
To register a Cisco IOS router device, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Admin > Registration > Cisco IOS Routers. The
Cisco IOS Router Registration window appears.
Note To register a Cisco IOS router device using the Central Manager GUI, SSH v1 or v2 must be
enabled on the router.
Step 2 Select the type of IP address (IPv4 or IPv6) that the Router will use. The IPv6 option is available only
when the Central Manager is configured with a valid IPv6 address.
Step 3 In the IP Address(es) field, enter the router IP addresses to register, separated by commas. The IP
address, hostname, router type, and status are displayed in the Registration Status table.
Note Although an IOS router can have a dot (“.”) in the hostname, this special character is not allowed
in a WAAS device hostname. If you try to import an AppNav-XE device that has a dot in the
hostname, the import will fail and the following error message is displayed: Registration
failed for the device devicename ConstraintException; Invalid AppNav-XE name: X.X
since name includes invalid character ‘.’.
You may also upload a CSV file that contains a list of IP addresses to register. To upload a list, click the
Import CSV file radio button and click the Choose File button to browse to the file and click Open.
Each IP address must be on a separate line.
Step 4 Configure the router login credentials by entering the username, password, and enable password. If you
need to create a user on the router, see Configuring a User.
Note Be sure to choose the HTTP authentication type that is currently configured on the router. If you
choose an HTTP authentication type that differs from your current configuration, your existing
configuration on the router will be overwritten and you may not be able to use HTTP to
communicate with the router. Communications with routers with previously established
authentication credentials will fail.
Step 6 In the Central Manager IP Address field, enter the IP address you want the router to use for the Central
Manager. This field is initially filled in with the current Central Manager IP address but you may need
to change this in a NAT environment.
Step 7 Click the Register button and verify that the registration status was successful.
You may view the results in the log file: /local/local1/errlog/waasx-audit.log
After you successfully register a Cisco IOS router device, the Central Manager displays it in the
Registration Status table and in the All Devices list.
In case your want to register additional devices, use the Reset button to clear data from all the fields, to
enter the next configuration.
You may need to install a software license on the Cisco IOS router device. For details, see Installing a
License on the Router.
Step 1 From the WAAS Central Manager menu, choose Admin > Security > Cisco IOS Router Global
Credentials. The Cisco IOS Router Global Credentials window appears.
Step 2 In the Username field, enter a username that is defined on the Cisco IOS router. If you need to create a
user on the router, see Configuring a User.
Note The username field is optional if you are not using local or AAA authentication for the HTTP
server on the Cisco IOS router device; that is, if you use the default HTTP server configuration
of ip http authentication enable. (See Enabling the HTTP Secure Server on the Router.)
Step 3 In the Password field, enter the password for the specified username.
To configure credentials at the device group or individual device level, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).The Device/ Device Group Home page appears. Go to Admin > Authentication >
WAAS Express Credentials/AppNav-XE Credentials menu item.
Step 2 In the Username field, enter a username that is defined on the Cisco IOS router. If you need to create a
user on the router, see Configuring a User.
Note The username field is optional if you are not using local or AAA authentication for the HTTP
server on the Cisco IOS router device; that is, if you use the default HTTP server configuration
of ip http authentication enable. (See Enabling the HTTP Secure Server on the Router.)
Step 3 In the Password field, enter the password for the specified username.
Step 4 Click Submit.
Note Changing the router credentials on the Central Manager does not change the configuration on the router
device itself. It affects only the router credentials that are stored on the Central Manager.
Table 10-5 Checklist for Registering a Cisco IOS Router Using the CLI
Table 10-5 Checklist for Registering a Cisco IOS Router Using the CLI (continued)
Configuring a User
The first step in setting up your router and Central Manager to communicate is to configure the same
user on the router and the Central Manager.
To configure a user, follow these steps:
Note This command varies based on the IOS and IOS XE version. For more information see
Authentication commands.
Step 3 Configure a local user with privilege level 15 on the router by using the username IOS configuration
command:
router#config t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)#username cisco privilege 15 password 0 cisco
router(config)#exit
Alternatively, you can configure an external TACACS+ or RADIUS user; see details after this procedure.
Step 4 Save the running configuration:
router#write memory
Building configuration...
[OK]
Step 5 In the WAAS Central Manager, configure the router credentials as described in Configuring Router
Credentials.
To configure an external TACACS+ user on the router, use the following configuration commands on the
router:
router#config t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)#aaa new-model
router(config)#aaa authentication login default group tacacs+
router(config)#aaa authorization exec default group tacacs+
router(config)#tacacs-server host host-ip
router(config)#tacacs-server key keyword
To configure an external RADIUS user on the router, use the following configuration commands on the
router:
router#config t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)#aaa new-model
router(config)#aaa authentication login default group radius
router(config)#aaa authorization exec default group radius
router(config)#radius-server host host-ip
router(config)#radius-server key keyword
The external authentication server for TACACS+ or RADIUS must be Cisco ACS 4.x or 5.x.
...
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Step 3 Copy the certificate text, which is the part in between the BEGIN CERTIFICATE and END
CERTIFICATE lines in the output.
Step 4 Log in to the router CLI.
Step 5 Configure a certificate for the Central Manager:
router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Step 6 Paste in the certificate that you copied from the Central Manager in Step 3.
Note Due to CSCsy03412, you must configure ip domain name name before enrolling the certificate.
If you do not configure ip domain name, IOS regenerates the self-signed certificate upon reload
and this affects the communication with the WAAS Central Manager.
router#config t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)#crypto pki trustpoint local
router(ca-trustpoint)#enrollment selfsigned
router(ca-trustpoint)#subject-alt-name routerFQDN
router(ca-trustpoint)#exit
router(config)#crypto pki enroll local
% Include the router serial number in the subject name? [yes/no]: yes
% Include an IP address in the subject name? [no]: yes
Enter Interface name or IP Address[]: 10.10.10.25
Generate Self Signed Router Certificate? [yes/no]: yes
For an AppNav XE device, if the self signed certificate is generated with key label as hostname and if
you change the hostname through the CM GUI or router CLI, then there is a SSL handshake failure and
the device goes offline. This is because the existing certificate is a valid only with respect to the old host
name and the certificate needs to be validated against the hostname with which it was generated.
To prevent this handshake failure, whenever you change the hostname, you need to re-generate the
certificate for that hostname and reimport it.
Additionally, if the router certificate changes after the router is registered with the Central Manager, you
must reimport the certificate into the Central Manager. For details, see Reimporting a Router Device
Certificate.
Note Be sure to choose the HTTP authentication type that is currently configured on the router. If you
choose an HTTP authentication type that differs from your current configuration, your existing
configuration on the router will be overwritten and you will not be able to use HTTP to
communicate with the router.
Step 2 Configure authentication for the HTTP server for a local user as follows:
router(config)#ip http authentication local
If you are using external TACACS+ or RADIUS user authentication, configure authentication for the
HTTP server as follows:
router(config)#ip http authentication aaa
Note If you do not configure local or AAA authentication for the HTTP server, only the enable password is
used for authentication. (The default is ip http authentication enable, which uses only the enable
password and no username.) If this default configuration is used, it is not necessary to define a username
credential for the router on the Central Manager. (See Configuring a User.)
Step 1 Obtain and copy the appropriate license to a location accessible to the license command on the router.
Step 2 On the router, install the license:
router#license install ftp://infra/licenses/FHH122500AZ_20100811190225615.lic
This example uses FTP to get and install the license but there are various options available for this
command. Choose one that best suits your deployment.
Step 3 Save the running configuration:
router#write memory
Building configuration...
[OK]
Note In case of newer releases, router registration using the CLI fails if the router supports only
weaker ciphers. You need to either upgrade to a version that supports newer ciphers or register
using the WAAS Central Manager GUI.
Step 1 For a WAAS Express router, register with the Central Manager as follows:
router#waas cm-register https://CM_IP_Address:8443/wcm/register
If you want to register the WAAS Express router with an IPv6 address, register it as follows:
router#waas cm-register https://[CM_IPv6_Address]:8443/wcm/register
For an AppNav-XE router, register with the Central Manager as follows:
router#appnav cm-register https://CM_IP_Address:8443/wcm/register
In the URL for this command, specify the Central Manager IP address as indicated. Be sure to include a
colon and the port number of 8443.
If a permanent WAAS license is not installed on the router, you must accept the terms of the evaluation
license to continue. The evaluation license is valid for 60 days.
Step 2 Save the running configuration:
router#write memory
Building configuration...
[OK]
After the successful registration of the router in the Central Manager, the Central Manager initially
shows the device on the Manage Devices page with a management status of Pending and a license status
of Active. After the Central Manager retrieves the device configuration and status, the management
status changes to Online and the license status changes to Permanent (or Evaluation, Expires in x weeks
y days).
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Admin > Authentication > Identity Certificate. The Certificate window appears
The Certificate Info tab shows the certificate information for the device. The Certificate in PEM Encoded
Format tab shows the certificate in PEM format. You can copy the certificate from this tab to use in the
paste operation in the next step.
Step 3 Import this certificate into the Central Manager by selecting one of the following radio buttons that are
shown above the tabs:
• Upload PEM file—Click Choose File and locate the PEM file containing the certificate.
• Manual—Paste the PEM-encoded certificate in the text field that appears.
Step 4 Click Submit.
Creating a new WAAS Central Manager IOS user on pre-registered IOS devices
A router that has already been registered with the WAAS Central Manager (WCM) before the system
property was enabled needs to be migrated to communicate with the WCM. To enable this
communication, you need to create a new WAAS CM IOS user so that the ongoing communication uses
the same to communicate with the WCM.
The WAAS Express User Creation Tool window is visible only when the System.WcmIosUser.enable is
enabled on the Home > Configure > System Properties > WcmIosUser.
To create a new WAAS Central Manager IOS user on the registered IOS device, follow the steps:
Step 1 From the WAAS Central Manager menu, choose Home > Admin > Security > WCM Cisco IOS User
Creation Tool. The WAAS Express User Creation Tool window appears.
Step 2 Configure the router login credentials by entering the username, password, and enable.
Step 3 Select the Router IP address type - IPv4 or IPv6. Next select the Router IP Address entry method.
In the IP Address(es) field, enter the WAAS Express router IP addresses to migrate, separated by
commas. The IP address, hostname and status are displayed in the Status table.
You may also upload a CSV file that contains a list of IP addresses to migrate. To upload a list, click the
Upload File check box and click the Choose File button to browse to the file and click Open. Each IP
address must be on a separate line.
Step 4 Click the Update button to create a new WAAS CM IOS user on the router and verify that the user
creation status was successful.
In case your want to migrate additional pre- registered routers, use the Reset button to clear data from
all the fields, to enter the next configuration.
If you create a Cisco IOS WCM user, using the Home > Admin > Security > WCM Cisco IOS User
Creation Tool by specifying the Cisco IOS username, password and enable, you need to manually log
in to the Cisco IOS router and save the running configuration using the write memory EXEC command.
If you do not save the running configuration and reload the device, the Cisco IOS router goes off line in
the WAAS Central Manager.
Note Do not add Virtual Routing and Forwarding (VRF) to VirtualPortGroup31. VRF will cause
VirtualPortGroup31 to lose its IP address and will disable AppNav. To re-establish these,
you must uninstall and reinstall ISR-WAAS without VRF.
For more information on VirtualPortGroup31, see the Configuration Guide for Integrated
AppNav/AppNav-XE and ISR-WAAS on Cisco 4000 Series ISRs.
Note To change the ISR-WAAS profile of an active ISR-WAAS, you must first de-install and then
re-install the ISR-WAAS.
If you only de-activate the existing ISR-WAAS instance and then change the ISR-WAAS
profile, the ISR-WAAS will become unstable and the TFO limit will show Zero on the
ISR-WAAS console.
ISR-WAAS Router DRAM (GB) SSDs (200GB each) Compact Flash (GB)
ISR-WAAS-750 8 1 16
ISR-WAAS-1300 16 1 16
ISR-WAAS-2500 16 2 32
For information on how to deploy and register an ISR-WAAS, see the Configuration Guide for
Integrated AppNav/AppNav-XE and ISR-WAAS on Cisco ISR 4451-X.
Step 1 Verify that the ISR-WAAS device is online by choosing Devices > device-name.
The Device Dashboard window appears, and displays information including device status: Pending,
Installed, Online, or Inactive.
Note During a fresh OVA deployment of an ISR-WAAS instance, the ISR-WAAS default hostname is
router-name isr-waas. After the hostname is changed on the kwaas instance, the kwaas instance
does not get an update from the router until you change it in the kwaas instance with the CLI
command no-hostname.
Step 2 To change the ISR WAAS hostname, choose Devices > ISR WAAS Device > Activation.
The Device Activation appears, with fields for editing properties of the selected device. The Name field
initially has the default ISR-WAAS hostname, router-hostname-isr-waas.
Step 3 In the Name field of the Activation window, enter the new name of the ISR-WAAS hostname. A
maximum of 30 alphanumeric characters, including a hyphen, can be entered. The hostname is case
sensitive. Special characters such as $, #, or * are not allowed.
Step 4 Click Submit.
Step 5 To verify that the new hostname is saved, click the show hosts command.
Step 1 Use the router CLI command show virtual-service list to verify that the ISR-WAAS device is online.
The show virtual-service list displays the status for each device, as shown in Figure 10-1. Possible
states are Initializing, Installing, Installed, Install Failed, Activating, Activated, Activated Failed,
Deactivating, Deactivated, and Error.
Router# config
Router (config)# hostname isr-waas-rs4a
Step 4 Use the show hosts command to verify that the new ISR-WAAS hostname has been saved.
This chapter describes how to configure file services, which allows branch office users to access data
stored at centralized data centers more efficiently. The file services feature overcomes the WAN latency
and bandwidth limitations by caching data on Edge Wide Area Application Engines (WAEs) near branch
office users. Cisco Wide Area Application Services (WAAS) file services use Server Message Block
(SMB) application accelerators.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the Cisco WAAS
Central Managers and WAEs in your network. The term WAE refers to WAE and Cisco Wide Area
Virtualization Engine (WAVE) appliances Cisco Services Ready Engine (Cisco SRE) service modules
(SRE-SM) WAAS,and Cisco Virtual WAAS (vWAAS) instances.
The WAN between the enterprise’s data center and its remote offices tends to be unreliable and slow,
with limited bandwidth and high latency. In addition, the WAN creates other obstacles to the
implementation of the data center solution.
One obstacle is created by the file server protocols that operate over the WAN. Every file operation
generates several exchanges of protocol messages between the client and the file server. This situation
is usually not noticeable on the LAN, but quickly causes high latency over the WAN. Occasionally, this
high latency breaks the file server protocol altogether.
Even in cases where the file server protocol is able to function correctly over the WAN, there are
typically long delays between each transaction. These delays can often cause timeouts in user
applications such as word-processing programs, image-editing programs, and design tools, which stops
applications from functioning correctly.
All of these problems—unreliable WANs, file system protocol compatibility, and user application
compatibility—contribute to an unfriendly work environment that negatively affects the user experience
and diminishes productivity.
The WAAS File Services feature overcomes WAN latency and bandwidth limitations by caching data on
Edge WAEs near the user. This data caching method allows branch office users to access centralized data
at LAN-like speeds over the WAN. The solution is based on several key concepts:
• Use the WAN as little as possible—By minimizing the number of operations that need to traverse
the WAN, WAAS effectively shields users from many of the obstacles that WANs create.
• Use the WAN optimally—The File Services feature uses sophisticated caching, compression, and
network optimization technologies, which enable the system to use the WAN optimally.
• Preserve file system protocol semantics—Although WAAS software uses its own proprietary
protocol over the WAN, it leaves the complete semantics of the standard file system protocol
commands intact. This is essential to preserve the correctness and coherency of the data in the
network.
• Make the solution transparent to users—The best solutions are the ones that do their jobs unnoticed,
without interfering with end users’ operations or forcing users to change their ways of doing
business. The WAAS file services solution does not require any software installations, either on the
server side or at the client-side, and does not require a user to learn anything new. Users derive all
the benefits of having a secure data center without needing to change any of their work habits.
By using the WAAS File Services feature, enterprises can consolidate their file servers to a data center
that provides the facilities, IT personnel, and storage devices required to manage the data properly.
Figure 11-1 shows a typical deployment scenario after WAAS file services have been set up.
WAN
192.168.29.0
T1, 120 ms RT
192.168.2.0
Domain Domain
Controller Controller
CIFS/SMB WAAS Central
Edge WAE client Manager
Note Legacy-mode Cisco Wide Area File Services (WAFS) is no longer supported beginning with WAAS
Version 4.4.1. Legacy WAFS users must migrate to the SMB accelerator before upgrading.
Automatic Discovery
The automatic discovery feature allows you to enable SMB without having to register individual file
servers in the WAAS Central Manager. With the automatic discovery feature, WAAS attempts to
automatically discover and connect to a new file server when a SMB request is received.
Data Coherency
WAAS software ensures data integrity across the system by using two interrelated features – coherency,
which manages the freshness of data, and concurrency, which controls the access to data by multiple
clients.
Maintaining multiple copies of data files in multiple locations increases the likelihood that one or more
of these copies will be changed, causing it to lose consistency or coherency with the others. Coherency
semantics are used to provide guarantees of freshness (whether the copy is up-to-date or not) and the
propagation of updates to and from the origin file server.
The WAAS software applies the following coherency semantics to its built-in coherency policies:
• Strict SMB behavior for intra-site—Users of the same cache are always guaranteed standard, strict
SMB coherency semantics.
• Cache validation on SMB open—In SMB, the File Open operation is passed through to the file
server. For coherency purposes, WAAS software validates the freshness of the file on every file that
is open, and invalidates the cached file if a new version exists on the file server.
WAAS software validates data by comparing the time stamp of a file in the cache to the time stamp
of the file on the file server. If the time stamps are identical, the cached copy in the Edge WAE is
considered valid, and the user is permitted to open the file from the Edge WAE cache.
If the time stamps are different, the Edge WAE removes the file from its cache and requests a fresh
copy from the file server.
• Proactive cache updating—WAAS software supports the use of change notifications in SMB
environments as a way to keep cached data on the Edge WAEs up-to-date.
When a client makes a change to a directory or file, the Edge WAE sends a change notification to
the file server. The file server then sends a change notification to all the Edge WAEs, which includes
a list of the modified directories and files. Upon receiving the change notification, each Edge WAE
checks its cache and invalidates the directories and files listed in the notification, and then updates
its cache with the latest versions.
For example, if a user edits an existing Word document and saves the changes to the Edge WAE
cache, the Edge WAE sends a change notification to the file server so that it knows that the file has
been modified. The Edge WAE then sends the changed sections to the file server, and the file server
proactively sends change notifications to the other Edge WAEs in the network. These Edge WAEs
then update their cache so that the file is consistent across all access points.
This process is also applicable when you rename a directory, add a new subdirectory, rename a file,
or create a new file in a cached directory.
• Flush on SMB close—In SMB, the File Close operation forces all the write buffers to be flushed to
the file server, and the Close request is only granted after all the updates have been propagated to
the file server. From a coherency standpoint, the combination of validate on file open and flush on
file close ensures that well-behaved applications, such as Microsoft Office, operate in session
semantics. The Open, Lock, Edit, Unlock, and Close commands are guaranteed to work correctly on
the WAAS network.
This authorization process prevents users from accessing directories and files in the cache that they
do not have permission to access on the file server.
Data Concurrency
Concurrency control is important when multiple users access the same cached data to read, or write, or
both. Concurrency control synchronizes this access by establishing and removing file system locks. This
file-locking feature ensures data integrity and provides the following benefits:
• Enables a client to aggressively cache file data so that it does not have to rely on retrieving data from
the remote file server.
• Provides a performance boost in many applications running on existing CIFS client
implementations.
• Preserves data integrity because only one user at a time can make changes to a section of a file.
WAAS software supports the CIFS oplocks feature, which allows a user to lock a file so that the user can
safely read and write data to its local cache instead of using network bandwidth to perform these
functions over the WAN on the file server. By using oplocks, a user can proactively cache read-ahead
data because it knows that no other user is accessing the file, and therefore, there is no chance of the
cached data becoming stale. The user can also write data to its local cache and does not have to update
the file server until it closes the file or until another user requests that the same file be opened.
Oplocks only applies to files. The file server does not grant oplock requests on directories and named
pipes.
File-Locking Process
When a user opens a file, it sends a lock request to the file server. The Edge WAE intercepts and forwards
all lock requests from the user to the file server as well as all the responses from the file server to the
user. If no other user has a lock on the file, the file server grants an exclusive lock request so that the
user can safely cache the file.
If a second user requests that the same file be opened, the following actions occur:
• The file server revokes the exclusive file lock obtained by the first user.
• The first user performs the following actions:
– Flushes any file changes stored in its cache to the file server. This action ensures that the second
user opening the file receives the latest information from the file server.
– Deletes any of its read-ahead buffers for the file because that data is no longer guaranteed to
remain up-to-date since a second user will open the file.
• The file server allows the second user to open the file.
Prepositioning
The prepositioning feature allows system administrators to proactively push frequently used files from
the central storage into the cache of selected Edge WAEs. This operation provides users with faster
first-time file access, and makes more efficient use of available bandwidth. You can create preposition
directives from the WAAS Central Manager GUI.
When an end user attempts to open a file that is not found in the Edge WAE cache, the Edge WAE
retrieves it across the WAN from the file server where it is stored. Prepositioning is a feature that allows
administrators to push large, frequently accessed files from file servers to selected Edge WAE caches
according to a predefined schedule. Through the proper use of prepositioning, administrators can allow
users to benefit from cache-level performance even during first-time access of these files. Prepositioning
improves WAN bandwidth utilization by transferring heavy content when the network is otherwise idle,
for example, at night, which frees up bandwidth for other applications during the day.
The WAAS Central Manager GUI allows administrators to create multiple, overlapping preposition
policies (each with its own schedule), a list of target Edge WAEs, and defined time and size constraints.
Prepositioning includes the ability to configure multiple roots. See Creating a New Preposition
Directive.
Note Other file servers may operate with WAAS, but only those listed in the table were tested. The file server
must support opportunistic locking (oplocks) and CIFS notifications.
Note The CIFS application accelerator does not support file servers that use the FAT32 file system. You can
use the policy rules to exclude FAT32 file servers, if any, from CIFS accelerator optimization.
Note Certain combinations of operating systems and file systems on a file server can result in the server
responding with different timestamp precision for different SMB commands. In such a situation, you
may not get the highest possible CIFS optimization if the CIFS application accelerator avoids using
cached files with mismatched timestamps in favor of preserving data coherency.
Note Dynamic share configuration on the WAAS Central Manager overrides any dynamic share configuration
set up directly on the WAE device using the CLI.
Step 1 From the WAAS Central Manager menu, choose Configure > CIFS File Services > Dynamic Shares.
A list of dynamic shares appears. The Dynamic Shares window shows all the dynamic shares that are
configured. From this window, you can perform the following tasks:
• Edit the configuration of an existing dynamic share by clicking the Edit icon next to the share. You
can delete a dynamic share, or modify any of the dynamic share settings.
• Add a new dynamic share definition.
Step 2 Click the Create New Dynamic Share icon in the taskbar to add a new dynamic share.
The Creating a new Dynamic Share window appears.
Step 3 In the Name field, enter a name for the dynamic share.
The following characters are not supported in the dynamic share name: /, \, :, *, ?, ", <, >, |. From the
Assigned Domain drop-down list, choose the WAAS domain that you want to assign to the dynamic
share. Only administrators who are also assigned to this WAAS domain have permission to edit the
dynamic share configuration. The domain does not affect a client’s access to the dynamic share.
Note A WAAS domain is not the same as a DNS domain or Windows domain. For more information
on WAAS domains, see Working with Domains.
This kind of WAAS domain does not use entities. When defining the WAAS domain, choose None for
the Entity Type. The WAAS domain must be assigned to each WAAS admin user who needs to edit the
dynamic share configuration (see Assigning a Domain to a User Account).
Step 4 In the File Server field, enter the name or IP address of the file server with the dynamic share.
If you specify the file server name, the Edge WAE resolves it to an IP address.
The registered file servers are displayed in a drop-down list.
Step 5 In the User name, Password, and Confirm Password fields, enter the username and password credentials
for the file server. If the username is in a Windows domain, specify the domain name as part of the User
name field, as follows: domain\username.
These credentials are used only to access the file server when you click Browse.
Step 6 In the Share Name field, specify the location of the dynamic share by doing one of the following tasks:
• Enter the name of the dynamic share on the file server. The following characters cannot be used in
the share name: \, /, :, *, ?, “, <, >, |.
• Click Browse next to the Share Name field to navigate to the correct root directory.
Note The Browse button appears only if you have at least one WAE device with the CIFS
accelerator enabled and registered to the WAAS Central Manager.
Step 7 Ensure that the status of the share is set to Enabled. If you change the status to Disabled, the share will
not be set up as a dynamic share in your WAAS environment.
Step 8 Click Submit.
The specified directory now functions as a dynamic share on the Edge WAE cache.
Note When preposition updates are sent to the Central Manager, if any preposition file server credentials
cannot be decrypted, all further preposition updates are not sent from the WAE to the Central Manager,
and decryption failure error messages are logged in errorlog/cms_log.current. You must reconfigure the
preposition credentials from the CLI.
Prepositioning includes the ability to configure multiple roots. See Creating a New Preposition
Directive.
When using prepositioning, both branch and data center WAEs are required (the same as for any other
accelerated traffic). The branch WAE retrieves prepositioned files through an optimized connection.
Verify that you have connectivity between the following network entities:
• Client to branch WAE
• Branch WAE to data center WAE
• Branch WAE to file server
• Data center WAE to file server
You will need to change any ACLs that might be blocking prepositioning traffic.
Note Although preposition directives can be created and managed by using the CLI, we recommend that you
use the Central Manager GUI because you can manage prepositioning for groups of WAEs from the
Central Manager. If you mix GUI and CLI configuration, unpredictable results may occur because
changes on one device can affect other devices.
The following topics describe how to create and manage a preposition directive:
• Creating a New Preposition Directive
• Assigning Edge Devices to a Preposition Directive
• Creating a New Preposition Schedule
• Checking the Preposition Status
• Starting and Stopping Preposition Tasks
Step 1 From the WAAS Central Manager menu, choose Configure > CIFS File Services > Preposition.
The Preposition Directives window appears. This window displays the following information about
preposition directives that exist on the system:
• Preposition Directive—Name of the preposition directive.
• Type—Whether the preposition directive affects all files (Full) or just those that have changed since
the last preposition task (Differential).
– When the type is Full, all the files that match the other filters of the task and that are found on
the file server are sent to the Edge to be compared with the cache.
– When the type is Differential, only the files that are found as changed since the last successful
preposition are sent to the Edge cache. The time of the last successful preposition is taken from
the Edge device, so ensure that the clock is synchronized with the file server. The first scan is
always a full scan. If you change the preposition task, the last successful scan time is reset.
– When the type is Since, only the files that are found as changed within a specified time period
are sent to the Edge cache.
• Status—Whether the preposition directive is enabled or disabled.
• File Server—Name of the exported file server.
From the Preposition Directive window, you can perform the following tasks:
• Edit the configuration of an existing preposition directive by clicking the Edit icon next to the
corresponding directive. You can then delete the preposition directive, or modify any of the settings.
• Add a new preposition directive, as described in the following steps.
Step 2 Click the Create New Preposition Directive icon in the taskbar to create a new preposition directive.
The Creating New Preposition Directive window appears. (Figure 11-2)
Step 3 Enter a unique name for the directive. The name cannot contain characters other than letters, numbers,
period, hyphen, and underscore; the double quote (") character is not allowed in the name.
Step 4 From the Status drop-down list, choose either enabled or disabled. (Disabled directives are not put into
effect.)
Step 5 (Optional) Define the time and size limitations using the provided fields.
Note Table 11-3 describes the time and size limitation fields.If one of these limits is exceeded during
a prepositioning task, the task is terminated and a message is sent to the Administrator log. Any
remaining files are exported the next time the task is run. If a user requests one of the missing
files before this happens, it is fetched over the WAN through WAAS software as usual.
Step 6 (Optional) Check the Ignore Hidden Directories check box if you want to prevent hidden directories
on the file server from being prepositioned. This check box is unchecked by default. If you leave this
box unchecked, hidden directories are prepositioned.
Step 7 In the File Server field, enter the unique name of a file server to export. The name cannot contain
characters other than letters, numbers, period, hyphen, and underscore; the double quote (") or forward
slash (/) characters are not allowed in the name.
Step 8 From the Location drop-down list, choose the device location that will provide browsing services for the
file server. Normally, this is the data center WAE. For the best browsing performance, specify a location
that is close to the file server. The location is used only for browsing; each edge WAE will retrieve
prepositioned files directly from the file server, not from this location. For more information on defining
locations, see Working with Device Locations.
Step 9 In the User name, Password, and Confirm Password fields, enter the username and password credentials
for the file server. If the username is in a Windows domain, specify the domain name as part of the User
name field, as follows: domain\username.
The access credentials that you enter must allow read access to the prepositioned root directories and to
their parent directories.
Step 10 (Optional) Check the DSCP value for high priority messages check box if you want to assign a DSCP
marking value to the prepositioning traffic. Choose a DSCP value from the drop-down list or enter a
number from 0 to 63 in the text field.
DSCP is a field in an IP packet that enables different levels of service to be assigned to the network
traffic. Levels of service are assigned by marking each packet on the network with a DSCP code and
associating a corresponding level of service. DSCP is the combination of IP Precedence and Type of
Service (ToS) fields. For more information, see RFC 2474.
Step 11 In the Root Share and Directories field, enter the directories on the file server that you want to export.
Use any of the following methods to identify a directory:
• Manually enter one or more directory paths in the following format: protocol://server/share or
server\share, for example, cifs://win12srv/home or win12srv\home. You can enter multiple lines for
multiple directories, with each full directory path on its own line. You cannot specify the root
directory (/) as a root share.
When you define multiple root shares, the preposition sequence that is performed for a single root
configuration is repeated for each root serially.
• Click Browse to browse the directories on the file server. To navigate to a directory, click the File
Folder icon to the left of the directory name. Check the check box next to the directory that you want
to export and then click Select Directory. The browse window allows you to choose multiple
directories.
The browse function operates best when you choose the location of the nearest CIFS accelerator to
the file server, from the Location drop-down list. If you do not choose a location, the browse request
is sent to all the devices that have the CIFS accelerator enabled, and the request may time out.
• Check the Include Sub Directories check box to include all the subdirectories under the specified
root directory. If this option is not selected, only the files in the specified root directory are
prepositioned and you cannot select subdirectories when you are browsing.
• Narrow the policy definition to a particular type of file by choosing a pattern operator from the File
Name drop-down list and entering the text that describes the pattern in the adjacent text box, for
example, enter ends with .doc. Do not use a space or the following special characters:
|, :, >, <, ", ?, *, /, \.
Step 12 Click Submit.
The directive is saved and additional tabs appear at the top of the window.
Note Prepositioning includes the ability to configure multiple roots. See Creating a New Preposition
Directive.
To assign an Edge WAE or device group to a preposition directive, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Configure > CIFS File Services > Preposition.
The Preposition Directives window appears, which lists the preposition directives that exist on the
system.
Step 2 Click the Edit icon next to the preposition directive that you want to assign to an Edge WAE or device
group.
Step 3 Click one of the following tabs at the top of the window:
• Assign Edge Devices—Allows you to select one or more Edge WAEs to assign to this directive.
• Assign Edge Groups—Allows you to select a device group to assign to this directive.
The Edge Device Assignments window or the Device Groups Assignments window appears, depending
on the selected option.
For either view, the assignments window lets you filter your view of the items in the list. Filtering
enables you to find items in the list that match the criteria that you set.
Step 4 Choose the Edge WAEs or device groups to assign to this preposition directive by doing either of the
following:
• Click (Assign All) in the taskbar to assign all the available Edge WAEs or device groups to this
directive.
• Click next to the individual Edge WAE or device group that you want to assign to this directive.
The icon changes to when selected.
Note If a device or device group is offline (identified by ), then you cannot assign that device or
group to this directive. The preposition directive, when assigned to a device group, is applied
only to connected Edge devices in the assigned device group.
When assigning a CIFS accelerator preposition directive to a device group, the directive is
applied only to those devices enabled for CIFS acceleration in the assigned device group.
Note If the CIFS accelerator is disabled on a WAE, the WAE is removed from any preposition directives to
which it is assigned. Also, the preposition directive is removed from the device’s running configuration.
Step 1 From the WAAS Central Manager menu, choose Configure > CIFS File Services > Preposition.
The Preposition Directives window appears, which lists the preposition directives that exist on the
system.
Step 2 Click the Edit icon next to the preposition directive for which you want to create a schedule.
Step 3 Click the Schedule tab at the top of the window.
The Creating New Preposition Schedule window appears. By default, no schedule is configured.
Step 4 Choose one of the following scheduling options:
• Not Scheduled—Prepositioning is not scheduled at this time.
• Now—Prepositioning occurs within a few minutes after you submit this schedule.
A Now schedule begins again each time you make a change to the preposition directive and click
Submit button.
A Now schedule also begins again as soon as an Edge device that has been reloaded comes back
online.
• Daily—Prepositioning occurs daily at the defined time.
• Date—Prepositioning occurs at the defined time and date.
• Weekly—Prepositioning occurs on the selected days of the week at the defined time.
• Monthly Days—Prepositioning occurs on the selected days of the month at the defined time.
• Monthly Weekdays—Prepositioning occurs on the defined day (as opposed to a defined date) and
time during the month. For example, you can schedule prepositioning to occur on the second
Tuesday of every month.
Step 5 Specify a start time for the prepositioning task.
The time is expressed in 24-hour format with 00:00 representing midnight. The time refers to the local
time of the Edge WAE where the data is to be prepositioned. If there are multiple Edge WAEs in different
time zones, the time refers to the local time of the Core WAE.
Note You cannot schedule a start time for the Now option.
Step 7 Verify that the preposition directive has completed successfully by checking the preposition status. For
more information, see Checking the Preposition Status.
Step 1 From the WAAS Central Manager menu, choose Configure > CIFS File Services > Preposition.
The Preposition Directives window, which lists the preposition directives that exist on the system,
appears.
Step 2 Click the Edit icon next to the preposition directive that you want to check.
Step 3 Click the Preposition Status tab at the top of the window.
The Preposition Status window displays the following information:
• WAE—The name of each Edge WAE that received the prepositioned files in its cache.
• Start Time—The time the preposition task started.
• Duration—The amount of time it took the preposition task to be completed.
• Amount Copied—The amount of data copied to the WAE cache, in bytes.
• Status—Whether the preposition task is completed successfully.
• Reason—The reason a preposition task failed.
Step 4 Ensure that the Status column shows Completed.
If this column shows Failure, look in the Reason column for an explanation that can help you
troubleshoot why the preposition task failed. After resolving the issue, you can schedule the preposition
task to run again now, or wait until the scheduled start time and verify the status again later.
Note Cisco SMB AO supports accelerating client connections to Microsoft DFS shares. However, Cisco SMB
prepositioning does not support Microsoft DFS.
Note When preposition updates are sent to the Central Manager, if any preposition file server credentials
cannot be decrypted, all further preposition updates are not sent from the WAE to the Central Manager,
and decryption failure error messages are logged in errorlog/cms_log.current. You must reconfigure the
preposition credentials from the CLI.
Prepositioning includes the ability to configure multiple roots. See Creating a New Preposition
Directive.
When using prepositioning, both branch and data center WAEs are required (the same as for any other
accelerated traffic). The branch WAE retrieves prepositioned files through an optimized connection.
Verify that you have connectivity between the following network entities:
• Client to branch WAE
• Branch WAE to data center WAE
• Branch WAE to file server
• Data center WAE to file server
You will need to change any ACLs that might be blocking prepositioning traffic.
Note Although preposition directives can be created and managed by using the CLI, we recommend that you
use the Central Manager GUI because you can manage prepositioning for groups of WAEs from the
Central Manager. If you mix GUI and CLI configuration, unpredictable results may occur because
changes on one device can affect other devices.
Note We recommend that you configure not more than 25 preposition directives per device.
If you want to enable DRE, you will need to select the SMB Preposition DRE settings checkbox, by
navigating to the Device> Configure > Acceleration > SMB Preposition Settings. It is disabled by
default.
Whenever DRE is enabled for the all prepositioning tasks, files are cached in Object Cache and DRE
cache, particularly when the size of the prepositioned files is huge and this could affect the normal
traffic. Else the files will be cached only in Object Cache.
The following topics describe how to create and manage a preposition directive:
• Creating a New Preposition Directive, page 11-18
• Assigning Edge Devices to a Preposition Directive, page 11-22
• Creating a New Preposition Schedule, page 11-23
• Checking the Preposition Status, page 11-24
Step 1 From the WAAS Central Manager menu, choose Configure > SMB File Services > Preposition.
The Preposition Directives window appears. This window displays the following information about
preposition directives that exist on the system:
• Preposition Directive—Name of the preposition directive.
• Status—Whether the preposition directive is enabled or disabled.
• File Server—Name of the exported file server.
• Schedule Details—Schedule to determine how often content is prepositioned.
From the Preposition Directive window, you can perform the following tasks:
• Edit the configuration of an existing preposition directive by clicking the Edit icon next to the
corresponding directive. You can then delete the preposition directive, or modify any of the settings.
• Assign the Device or Device Group (s) to the preposition operation by clicking the Assign
Device/DeviceGroup(s) icon and select the appropriate one.
• Collect Preposition Status by clicking the Collect Preposition Status link.
• Add a new preposition directive, as described in the following steps.
Step 2 Click the Create New Preposition icon in the taskbar to create a new preposition directive.
The Creating New Preposition Directive window appears. (Figure 11-3)
Step 3 Under Preposition Settings, enter a unique name for the directive. The name cannot contain characters
other than letters, numbers, period, hyphen, and underscore; the double quote (") character is not allowed
in the name.
Step 4 Click the Enable Preposition check box. This denotes status of preposition. This is unchecked by
default. If you disable it, preposition is not possible.
Step 5 (Optional) Define the time and size limitations using the provided fields.
Table 11-3 describes the time and size limitation fields.
Field Description
Total Size as % of Percentage of the overall Edge WAE cache that prepositioned files can
Cache Volume consume. For example, if you do not want this prepositioning directive to
consume more than 30 percent of a WAE’s cache, enter 30 in this field. The
default value is 5 percent.
The percentage of the cache defined for a preposition task defines the
maximum size that can be prepositioned in a single iteration of the task
regardless of how much is already in the cache.
The total size of the files to be prepositioned will always be less than or equal
to the total percentage of object cache size specified. Example, if the user had
specified max-cache directive as 10% and total object-cache size is 100 GB,
then the maximum size of the total files to be prepositioned for the task would
be 10 GB(10% of 100 GB). If there are 100 files in the configured shares and
first 50 files size up to 10 GB,then the rest of the files would not be
prepositioned.
When the cache is full, regardless of the reason, prepositioning operates like
on-demand caching: an eviction process begins and the files with the oldest
time-last-accessed values are removed from the cache.
Max File Size Maximum file size that can be exported. Files that are larger than this value are
not exported to the WAE cache.
Min File Size Minimum file size that can be exported. Files that are smaller than this value
are not exported to the WAE cache. It is inefficient to preposition files smaller
than 20 KB because these files can be retrieved quickly over the WAN through
normal WAAS.
The default value is 20 KB.
Duration Maximum amount of time it should take WAAS to export the file server. If it
takes WAAS longer than this amount of time to export the file server, WAAS
stops the exporting process before all files are copied to the Edge WAE cache.
If the preposition task does not start at the scheduled start time, for example,
because the Edge and the Core have no connection, the start retries are counted
in the duration.
If you do not specify a value for this field, WAAS takes as much time as needed
to export this file server.
Note If one of these limits is exceeded during a prepositioning task, the task is terminated and a
message is sent to the Administrator log. Any remaining files are exported the next time the task
is run. If a user requests one of the missing files before this happens, it is fetched over the WAN
through WAAS software as usual.
Step 6 Under File Server Settings, check the SMBv2 checkbox to enable prepositioning of this traffic. This is
disabled by default.
Step 7 In the File Server field, enter the unique name of a file server to export. The name cannot contain
characters other than letters, numbers, period, hyphen, and underscore; the double quote (") or forward
slash (/) characters are not allowed in the name.
Step 8 From the Nearest Device drop-down list, choose the device location that will provide browsing services
for the file server. Normally, this is the data center WAE. For the best browsing performance, specify a
location that is close to the file server. The location is used only for browsing; each edge WAE will
retrieve prepositioned files directly from the file server, not from this location. For more information on
defining locations, see Working with Device Locations.
Step 9 In the User name, Password, and Confirm Password fields, enter the username and password credentials
for the file server. If the username is in a Windows domain, specify the domain name in the Domain name
field.
The access credentials that you enter must allow read access to the prepositioned root directories and to
their parent directories.
The following characters are not allowed to be used as username ; | && || : \ / * ? < > + = , [ ] “ ` !.
The following characters are not allowed to be used in server names ; | && || , ~ : ! ` @ # $ % ^ & ‘ { }
()_“
The following characters are not allowed to be used as domain names ; | && || : \ / * ? < > “ ` !
Step 10 Under Content Settings, in the Root Share and Directories field, enter the directories on the file server
that you want to export. Use any of the following methods to identify a directory:
• Manually enter one or more directory paths in the following format: protocol://server/share or
server\share, for example, cifs://win12srv/home or win12srv\home. You can enter multiple lines for
multiple directories, with each full directory path on its own line. You cannot specify the root
directory (/) as a root share. Special characters like ; | && || : * ? < > “ ` ! [ ] + = , are not allowed
for top level shares. Additionally, when you create subdirectories inside the shares, the following
special characters are not allowed: ; | && || : * ? < > “ ` !
Note Do not use the special character “;“ in files and directory names, else it will throw up errors.
Additionally, we do not support extended Unicode characters in files and directories for
release 6.2.1 and any such files or directories would be skipped and not prepositioned.
When you define multiple root shares, the preposition sequence that is performed for a single root
configuration is repeated for each root serially.
• Click Browse to browse the directories on the file server. To navigate to a directory, click the File
Folder icon to the left of the directory name. Check the check box next to the directory that you want
to export and then click Select Directory. The browse window allows you to choose multiple
directories.
The browse function operates best when you choose the location of the nearest SMB accelerator to
the file server, from the Location drop-down list. If you do not choose a location, the browse request
is sent to all the devices that have the SMB accelerator enabled, and the request may time out.
• Check the Include Sub Directories check box to include all the subdirectories under the specified
root directory. If this option is not selected, only the files in the specified root directory are
prepositioned and you cannot select subdirectories when you are browsing.
• Narrow the policy definition to a particular type of file by choosing a pattern operator from the File
Name drop-down list and entering the text that describes the pattern in the adjacent text box, for
example, enter ends with .doc. Do not use a space or the following special characters:
; | && || : * ? < > \ / “ ` !
Step 11 By default, a Now schedule begins (if the status is enabled) again each time you make a change to the
preposition directive page. A new schedule also begins again as soon as an edge device that has been
reloaded comes back online. Under Schedule Settings, select the frequency of preposition from the
Frequency drop-down list.
– Not-Scheduled- By default this option will be displayed to user.
– Immediate- Prepositioning occurs within a few minutes after click on ok button in schedule
dialog.
– Date - Prepositioning occurs at the defined time and date..
– Daily-Prepositioning occurs daily at the defined time.
– Weekly-Prepositioning occurs on the selected days of the week at the defined time.
– Monthly Days-Prepositioning occurs on the selected days of the month at the defined time.
– Monthly WeekDays - Prepositioning occurs on the selected month weekdays at the defined time
Step 12 Specify the preposition start time from the Start Time drop-down list.
The time is expressed in 24-hour format with 00:00 representing midnight. The time refers to the local
time of the Edge WAE where the data is to be prepositioned. If there are multiple Edge WAEs in different
time zones, the time refers to the local time of the Core WAE.
Step 13 Click OK.
The directive is saved and is added to the preposition directive table.
Note Prepositioning includes the ability to configure multiple roots. See Creating a New Preposition
Directive.
To assign an Edge WAE or device group to a preposition directive, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Configure > SMB File Services > Preposition.
The Preposition Directives window appears, which lists the preposition directives that exist on the
system.
Step 2 Select the appropriate Preposition Directive to assign it to the Device /Device Groups and click on
Assign Devices/ Device Groups icon. The Assign Device/Device Groups Assignments window appears.
The assignments window lets you filter your view of the items in the list. Filtering enables you to find
items in the list that match the criteria that you set.
Step 3 Choose the Edge WAEs or device groups to assign to this preposition directive and click Assign. The
Assigned Status column changes to Assigned next to the selected Device/Device Groups. You can also
un-assign a Device/Device Group by clicking on Unassign. The Assigned Status column changes to Not
Assigned accordingly.
Step 4 In case there is a delay in sending the preposition details to the device, the Assigned Status column
displays NOTIFY UPDATES IN-PROGRESS for the Device/Device Group. Click on Refresh to see a
change in status once the preposition changes have been made on the device.
Note If a device or device group is offline (identified by ), then you cannot assign that device or
group to this directive. The preposition directive, when assigned to a device group, is applied
only to connected Edge devices in the assigned device group.
When assigning a SMB accelerator preposition directive to a device group, the directive is
applied only to those devices enabled for SMB acceleration in the assigned device group.
Note If the SMB accelerator is disabled on a WAE, the SMB accelerator preposition task will fail with error
that SMB accelerator is not enabled on the WAE.
Step 1 From the WAAS Central Manager menu, choose Configure > SMB File Services > Preposition.
The Preposition Directives window appears, which lists the preposition directives that exist on the
system.
Step 2 Click the Edit icon next to the preposition directive for which you want to create a schedule.
Step 3 Click the Schedule tab at the top of the window.
The Creating New Preposition Schedule window appears. By default, no schedule is configured.
Step 4 Choose one of the following scheduling options:
• Not Scheduled—Prepositioning is not scheduled at this time.
• Now—Prepositioning occurs within a few minutes after you submit this schedule.
A Now schedule begins again each time you make a change to the preposition directive and click
Submit. A Now schedule also begins again as soon as an Edge device that has been reloaded comes
back online.
• Daily—Prepositioning occurs daily at the defined time.
• Date—Prepositioning occurs at the defined time and date.
• Weekly—Prepositioning occurs on the selected days of the week at the defined time.
• Monthly Days—Prepositioning occurs on the selected days of the month at the defined time.
• Monthly Weekdays—Prepositioning occurs on the defined day (as opposed to a defined date) and
time during the month. For example, you can schedule prepositioning to occur on the second
Tuesday of every month.
Step 5 Specify a start time for the prepositioning task.
The time is expressed in 24-hour format with 00:00 representing midnight. The time refers to the local
time of the Edge WAE where the data is to be prepositioned. If there are multiple Edge WAEs in different
time zones, the time refers to the local time of the Core WAE.
Note You cannot schedule a start time for the Now option.
Step 1 From the WAAS Central Manager menu, choose Configure > SMB File Services > Preposition.
The Preposition Directives window, which lists the preposition directives that exist on the system,
appears.
Step 2 Select the SMB preposition directive that you want to check and click the Collect Preposition Status
tab at the top of the window.
The Preposition Status window displays the following information:
• WAE—The name of each Edge WAE that received the prepositioned files in its cache.
• Start Time—The time the preposition task started.
• Duration—The amount of time it took the preposition task to be completed.
• Amount Copied—The amount of data copied to the WAE cache, in bytes.
• Status—Whether the preposition task is completed successfully.
• Error Reason—The reason a preposition task failed.
Ensure that the Status column shows Completed.
If this column shows Failure, look in the Reason column for an explanation that can help you
troubleshoot why the preposition task failed. After resolving the issue, you can schedule the preposition
task to run again now, or wait until the scheduled start time and verify the status again later.
Step 3 Click OK.
You can also export this data and save it to your local machine.
Note Dynamic share configuration on the WAAS Central Manager overrides any dynamic share configuration
set up directly on the WAE device using the CLI.
Step 1 From the WAAS Central Manager menu, choose Devices > Configure > SMB File Services > Dynamic
Shares.
A list of dynamic shares appears. The Dynamic Shares window shows all the dynamic shares configured.
From this window, you can perform the following tasks:
Edit the configuration of an existing dynamic share by clicking the Edit icon next to the share. You can
delete the dynamic share, or modify any of the dynamic share settings.
Add a new dynamic share definition, as described in the next steps.
Step 2 Click the Add Dynamic Share icon in the taskbar to add a new dynamic share. The Creating a new
Dynamic Share window appears.
Step 3 In the File Server field, enter the name or IP address of the file server with the dynamic share.
If you specify the file server name, the edge WAE resolves it to an IP address.
The registered file servers are displayed in a drop-down list.
Step 4 In the Share name field, specify the location of the dynamic share by doing one of the following tasks:
Enter the name of the dynamic share on the file server. The following characters cannot be used in the
share name: \ / : * ? “ < > |
Click Browse next to the Share Name field to navigate to the correct root directory.
Note The Browse button appears only if you have at least one WAE device with the SMB accelerator
enabled and registered to the WAAS Central Manager.
This chapter describes how to configure the optimization policies, which determine the types of
application traffic that is accelerated over your WAN on your WAAS system.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the Cisco Wide
Area Application Services (Cisco WAAS) Central Managers and Cisco Wide Area Application Engines
(WAEs) in your network. The term WAE refers to WAE and Cisco Wide Area Virtualization Engine
(WAVE) appliances, Cisco Services Ready Engine (SRE) service modules (SMs) running WAAS, and
Cisco Virtual WAAS (vWAAS) instances.
• Policy—Combines the application definition and class map into a single policy. This policy also
determines the optimization and acceleration features, if any, that a WAAS device applies to the
defined traffic. You can create up to 512 policies. A policy can also contain a differentiated services
code point (DSCP) marking value that is applied to the traffic and that overrides a DSCP value set
at the application or global level.
You can use the WAAS Central Manager GUI to modify the predefined policies and to create additional
policies for other applications. For more information on creating optimization policies, see Creating a
New Traffic Optimization Policy. For more information on viewing reports, restoring policies,
monitoring applications, and other functions, see Managing Application Acceleration.
Note All application definitions configured in the WAAS Central Manager are globally applied to all the
WAAS devices that register with the WAAS Central Manager, regardless of the device group
membership configuration.
Note The application accelerators require specific types of licenses to operate: a Transport license for TFO,
DRE, and LZ optimization, and an Enterprise license for all other application accelerators. For more
information on installing and managing licenses, see Managing Software Licenses in Chapter 10,
“Configuring Other System Settings.”
Note You must enable the accelerator on both of the peer WAEs at either end of a WAN link for all application
accelerators to operate.
However, in case of SMART-SSL acceleration, you do not need a peer WAE to exist or for both WAEs
to have the SSL Interposer accelerator enabled.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > Enabled Features.
The Enabled Features window appears.
Note On WAAS Express devices, only a subset of the standard features are available. On ISR-WAAS
devices, the SMB application accelerator is enabled by default. In the Enabled Features window
for a device group, two SMB Accelerator options are shown, one for ISR-WAAS devices and
one for all other kinds of WAEs.
For WAAS Express, the following Express versions of application accelerators are supported:
• HTTP accelerator express (See Configuring HTTP Acceleration)
• SSL accelerator express (See Configuring SSL Acceleration)
Note For a Cisco WAAS device running WAAS Version 6.x and a Cisco WAAS Express peer
device running Cisco IOS Release 15.6(3)M, 15.6(2)T1 or later, TLS1 is supported, but SSL3
is removed. Before upgrading WAAS Express to one of these IOS releases, configure TLS1
in the WAAS Express Device Group:
1. Navigate to Device Groups > DeviceGroupName > Configure > Enabled Features.
2. Select the SSL Accelerator Express Peering Service.
3. At the SSL Version: dropdown list, select TLS1.
4. Click Submit.
5. Upgrade the WAAS Express.
For information on upgrading and interoperability, see the Release Note for Cisco Wide Area
Application Services.
Not all of the properties in the standard WAAS device are available in the WAAS Express version of the
application accelerators, including SMART-SSL acceleration.
Note If you try to enable DRE on a WAAS Express device on which it is not supported, a message
stating that it is not supported is displayed.
The Restore Predefined Settings icon for WAAS Express applies the predefined settings for
HTTP/HTTPS, and SSL cipher list and peering service.
Step 3 Check the check boxes adjacent to the optimization features that you want to enable, and uncheck the
check boxes adjacent to the features that you want to disable. For a description of each of the
optimization features, see Key Services of Cisco WAAS in Chapter 1, “Introduction to Cisco WAAS.”
Some features have additional settings that you can configure by clicking the link next to the setting
name. Hover your cursor over the small target icon next to the link to see a dialog box that shows the
current settings.
• If you check the Data Redundancy Elimination check box, you can click the DRE Settings link as
a shortcut to the DRE Settings Configuration window. For more information, see Configuring DRE
Settings.
• If you check the HTTP Accelerator check box, you can click the HTTP Settings link as a shortcut
to the HTTP/HTTPS Settings window. For more information, see Configuring HTTP Acceleration.
• If you check the ICA Accelerator check box, you can click the ICA Settings link as a shortcut to
the ICA Acceleration Configuration window. For more information, see Configuring ICA
Acceleration.
• If you check the MAPI Accelerator check box, you can click the MAPI Settings link as a shortcut
to the MAPI Settings window. For more information, see Configuring MAPI Acceleration.
Note When you check the MAPI Accelerator check box, Encrypted MAPI Traffic Optimization is
enabled by default.
• If you check the Encrypted MAPI Traffic Optimization check box, you can click the Mandatory
Encryption Configuration link as a shortcut to the Encrypted Services Configuration window. For
more information, see Configuring Encrypted MAPI Acceleration.
Note You must enable MAPI acceleration first for Encrypted MAPI acceleration to be enabled.
• If you check the SMB Accelerator check box, you can click the SMB Settings link as a shortcut to
the SMB Acceleration Configuration window. For more information, see Configuring SMB
Acceleration.
• If you check the SSL Accelerator check box, you must configure additional settings to enable SSL
acceleration. For more information, see Configuring SSL Acceleration. With release 6.2.1, you can
accelerate o365 traffic. For more information, see office365 optimization using Azure vWAAS.
• If you check the SSL Interposer (SSL Accelerator V2) check box, you must configure additional
settings to enable SMART-SSL acceleration. By default, the SSL Interposer is disabled. For more
information, see Configuring SMART-SSL Accelerator.
Step 4 To enable the object cache, in the Object Cache Settings section, check the Object Cache check box.
WAAS performs object caching to increase client application performance for SMB file access. Object
caching also minimizes bandwidth and latency over the WAN, by avoiding the repeated transfer of data
over the WAN.
To enable an individual application accelerator object cache, use the following guideline:
• Controls to enable and disable an individual object cache are displayed in that application
accelerator’s Advanced Settings screen.
Note To ensure that the object cache and individual application accelerator object cache work successfully,
note these guidelines:
• Each application accelerator object cache can be enabled or disabled independent of whether or not
the global object cache is enabled or disabled.
• Enabling the object cache does not automatically enable individual application accelerator object
caches.
• You can enable or disable an individual application accelerator object cache whether or not the
associated application accelerator is enabled or disabled.
• Verify that disk assignments have been made to object cache before you enable object cache.
• The object cache has a limit of 15 GB. A request of a size larger than this limit will not cache the
complete file. For example, for a file size of 25 GB, only 15 GB of this file would be cached.
Note To ensure that the object cache and SMB application accelerator work successfully, enable the object
cache before you enable the SMB application accelerator.
Step 5 In the Advanced Settings area, uncheck the Blacklist Operation check box if you want to disable it.
This feature allows a WAE to better handle situations in which TCP setup packets that have options are
blocked or not returned to the WAE device. This behavior can result from network devices (such as
firewalls) that block TCP setup packets that have options, and from asymmetric routes. The WAE can
keep track of origin servers (such as those behind firewalls) that cannot receive optioned TCP packets,
and learns not to send out TCP packets with options to these blacklisted servers. WAAS is still able to
accelerate traffic between branch and data center WAEs in situations where optioned TCP packets are
dropped. We recommend that you leave this feature enabled.
Step 6 If you want to change the default Blacklist Server Address Hold Time of 60 minutes, enter the new time
in minutes in the Blacklist Server Address Hold Time field. The valid range is 1 minute to 10080 minutes
(1 week).
When a server IP address is added to the blacklist, it remains there for the configured hold time. After
that time, subsequent connection attempts will again include TCP options so that the WAE can
redetermine if the server can receive them. It is useful to retry sending TCP options periodically because
network packet loss may cause a server to be erroneously blacklisted.
You can shorten or lengthen the blacklist time by changing the Blacklist Server Address Hold Time field.
Step 7 Click Submit.
To configure TFO optimization, DRE, and persistent compression from the CLI, use the tfo optimize
global configuration command.
To configure EPM acceleration from the CLI, use the accelerator epm global configuration command.
To configure HTTP acceleration from the CLI, use the accelerator http global configuration command.
To configure ICA acceleration from the CLI, use the accelerator ica global configuration command.
To configure MAPI acceleration from the CLI, use the accelerator mapi global configuration command.
To configure NFS acceleration from the CLI, use the accelerator nfs global configuration command.
To configure SMB acceleration from the CLI, use the accelerator smb global configuration command.
To configure SSL acceleration from the CLI, use the accelerator ssl global configuration command.
To configure global object cache from the CLI, use the object-cache enable global configuration
command.
When object cache is enabled, you are prompted to confirm the repurposing of SMB resources if the disk
has not already been partitioned for object cache.
If this is the first time disk resources are being assigned to object cache, the object-cache enable
command will prompt you to reboot the device, since the disk partitioning only takes effect on the next
reboot. The configuration is then saved, and the object cache does not have to be re-enabled on the next
reboot.
Note To ensure success of the object-cache enable command, verify the following two conditions:
• Disk assignments have been made to object cache before you use this command.
• Use this command before you use the accelerator smb global configuration command.
To enable a specified application accelerator object cache, use the accelerator ao-name object-cache
enable global configuration command.
Note To ensure that each application accelerator object cache and the global object cache function
successfully, note these guidelines:
• Each application accelerator object cache can be enabled or disabled independent of whether or not
the global object cache is enabled or disabled.
• You must disable all individual application accelerator object caches before you use the no
object-cache enable global configuration command to disable the global object cache.
• The object-cache enable global configuration command does not automatically enable individual
application accelerator object caches.
• You can enable or disable an individual application accelerator object cache whether or not the
associated application accelerator is enabled or disabled.
To configure the Blacklist Operation feature from the CLI, use the auto-discovery global configuration
command.
To display status and statistics on the application accelerators from the CLI, use the show accelerator
and show statistics accelerator EXEC commands.
To display statistics on the SMB print accelerator, use the show statistics accelerator smb EXEC
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > DRE Settings.
The DRE Settings window appears.
Step 3 Check the Enable DRE auto bypass check box to generate an alarm and automatically DRE bypass
application traffic.
Note If you do not enable DRE auto bypass, the Device Status alarm displays yellow and the traffic
gets bypassed without forwarding to the Service Node (SN). We recommend that you do not
disable DRE through the configuration. Instead, configure individual policies to bypass DRE
functionality.
Step 4 Check the Enable DRE Load Monitor check box to enable load report.
• The disk latency maximum can be set from 1-1000; the default value is 5.
• The DRE load threshold can be set from 50-99; the default value is 95.
Step 5 Click Submit.
The changes are saved to the device or device group.
To enable DRE auto bypass from the CLI, use the dre auto-bypass enable global configuration
command.
To enable DRE load monitor from the CLI, use the dre load-monitor report global configuration
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > HTTP/HTTPS Settings.
The HTTP Acceleration Settings window appears (Figure 12-1).
Note For WAAS Express, the HTTP acceleration settings are the same, but the fields are laid out
differently in the HTTP/HTTPS Settings window.
Step 3 Check the Enable HTTP metadatacache caching check box to enable the WAE to cache HTTP header
(metadata) information. The default setting is checked.
This check box must be checked to enable any of the other settings in the Metadata Cache Settings area.
If this box is not checked, no header caching is done.
For details on HTTP metadata caching, see About HTTP Metadata Caching.
Step 4 Check the Enable HTTPS metadatacache caching check box to enable the WAE to cache HTTPS
header (metadata) information (HTTP as payload in SSL traffic). The default setting is checked.
For details on HTTP metadata caching, see About HTTP Metadata Caching.
Step 5 In the Maximum age of a Cache entry field, enter the maximum number of seconds to retain HTTP
header information in the cache. The default is 86400 seconds (24 hours). Valid time periods range from
5–2592000 seconds (30 days).
Step 6 In the Minimum age of a Cache entry field, enter the minimum number of seconds for which to retain
HTTP header information in the cache. The default is 60 seconds. Valid time periods range from 5 to
86400 seconds (24 hours).
Step 7 Check the Enable local HTTP 301 redirect messages check box to enable the WAE to cache and locally
serve HTTP 301 messages. The default setting is checked.
Step 8 Check the Enable local HTTP 401 Authentication-required messages check box to enable the WAE
to cache and locally serve HTTP 401 messages. The default setting is checked.
Step 9 Check the Enable local HTTP 304 Not-Modified messages check box to enable the WAE to cache
HTTP 200 and 304 messages and locally serve HTTP 304 messages. The default setting is checked.
Step 10 To configure specific file extensions to which metadata caching is to be applied, enter the file extensions
in the File extension filters field at the far right. Separate multiple extensions with a comma, for example,
jpeg, gif, png, and do not include the dot at the beginning of the file extension.
By default, no file extension filters are defined and therefore, metadata caching applies to all file types.
Step 11 Check the Enable Pre-fetch Optimization check box to allow the edge WAAS device to prefetch data.
This setting is not enabled by default.
This optimization benefits Web browser-based Microsoft Office applications when they access
Microsoft Office documents (MS Word and Excel only) hosted on a Microsoft SharePoint Server 2010.
For viewing Word documents, the client must have Microsoft Silverlight installed.
By checking this check box, you are telling the edge WAAS device to prefetch the subsequent pages of
the documents from the SharePoint server before the client actually requests them, and serve them from
the cache when the request from the client arrives. You can now seamlessly scroll through the document
without having to wait for the content to load.
Note SharePoint prefetch optimization works with view in browser mode only.
Step 12 Check the Suppress server compression for HTTP and HTTPS check box to configure the WAE to
suppress server compression between the client and the server. The default setting is checked.
By checking this check box, you are telling the WAE to remove the Accept-Encoding value from HTTP
and HTTPS request headers, preventing the web server from compressing HTTP and HTTPS data that it
sends to the client. This allows the WAE to apply its own compression to the HTTP and HTTPS data,
typically resulting in much better compression than the web server for most files. For some file types
that rarely change, such as .css and .js files, this setting is ignored and web server compression is
allowed.
Step 13 Check the Enable DRE Hints for HTTP and HTTPS check box to send DRE hints to the DRE module
for improved DRE performance. The DRE hint feature is enabled by default.
Step 14 Click Submit.
The changes are saved to the device or device group.
To configure HTTP acceleration from the CLI, use the accelerator http global configuration command.
To show the contents of the metadata cache, use the show cache http-metadatacache EXEC command.
To clear the metadata cache, use the clear cache http-metadatacache EXEC command.
To enable or disable specific HTTP accelerator features for specific clients or IP subnets, use the HTTP
accelerator subnet feature. For more details, see Using an HTTP Accelerator Subnet.
• Requests and responses that are not compliant with RFC standards
• URLs containing over 255 characters
• 301 and 401 responses with cookie headers
• Use of HEAD method
• Pipelined transactions
Note The metadata caching feature is introduced in WAAS Version 4.2.1, but Version 4.2.1 is needed only on
the branch WAE. This feature can interoperate with an HTTP accelerator on a data center WAE that has
a lower version.
Step 1 Enable global configuration for all the HTTP accelerator features that you want to use.
Step 2 Create an IP access list to use for a subnet of traffic:
WAE(config)# ip access-list extended md_acl
WAE(config-ext-nacl)# permit ip 1.1.1.0 0.0.0.255 any
WAE(config-ext-nacl)# permit ip 2.2.2.0 0.0.0.255 3.3.3.0 0.0.0.255
WAE(config-ext-nacl)# exit
Step 3 Associate the ACL with a specific HTTP accelerator feature. Refer to the accelerator http global
configuration command in Cisco Wide Area Application Services Command Reference for information
on associating an ACL with an HTTP accelerator feature:
WAE(config)# accelerator http metadatacache access-list md_acl
In this example, the HTTP metadata cache feature applies to all the connections that match the
conditions specified in the extended access-list md_acl.
In the following example, the HTTP suppress-server-encoding feature applies to all the connections that
match the conditions specified in the standard access-list 10:
WAE(config)# ip access-list standard 10
WAE(config-std-nacl)# permit 1.1.1.0 0.0.0.255
WAE(config-std-nacl)# exit
WAE(config)# accelerator http suppress-server-encoding accesslist 10
For the features (DRE hints and HTTPS metadata cache in this example) that do not have an ACL
associated with them, global configuration is used and the features are applicable to all the connections.
Note Microsoft Outlook 2007 and 2010 have encryption enabled by default. You must disable encryption to
benefit from the MAPI application accelerator.
The EPM application accelerator must be enabled for the MAPI application accelerator to operate. EPM
is enabled by default. Additionally, the system must define an optimization policy of type EPM, specify
the MAPI UUID, and have an Accelerate setting of MAPI. This policy, MAPI for the
Email-and-Messaging application, is defined by default.
EPM traffic, such as MAPI, does not normally use a predefined port. If your Outlook administrator has
configured Outlook in a nonstandard way to use a static port, you must create a new basic optimization
policy that accelerates MAPI traffic with a class map that matches the static port that was configured for
Outlook.
Note If the WAE becomes overloaded with connections, the MAPI application accelerator continues to
accelerate MAPI connections by using internally reserved connection resources. If the reserved
resources are also exceeded, new MAPI connections are passed through until connection resources
become available.
To enable the MAPI accelerator, check the MAPI Accelerator check box in the Enabled Features
section.
Note When you enable MAPI acceleration, Encrypted MAPI acceleration is enabled by default.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > MAPI Settings.
The MAPI Acceleration Settings window appears (Figure 12-2).
Step 3 In the Reserved Pool Size Maximum Percent field, enter the maximum percent of connections in order
to restrict the maximum number of connections reserved for MAPI optimization during TFO overload.
It is specified as a percent of the TFO connection limit of the platform. Valid percent ranges from 5 to
50 percent. The default is 15 percent, which reserves approximately 0.5 connection for each client-server
Association Group (AG) optimized by the MAPI accelerator.
The client maintains at least one AG per server it connects to with an average of about three connections
per AG. For deployments that see a greater average number of connections per AG, or where TFO
overload is a frequent occurrence, a higher value for reserved pool size maximum percent is
recommended.
Reserved connections remain unused when the device is not under TFO overload. Reserved connections
are released when the AG is terminated.
Step 4 Click Submit.
The changes are saved to the device or device group.
Note You must enable MAPI acceleration first for Encrypted MAPI acceleration to be enabled. Encrypted
MAPI acceleration is enabled by default.
For more information about verifying that WAE devices are registered and are online with the WAAS
Central Manager, see Devices Window in Chapter 15, “Monitoring Your WAAS Network.”
Step 4 Configure the SSL Peering Service.
For more information about configuring the SSL Peering Service, see Configuring SSL Peering Service.
Step 5 Verify if WAN Secure mode is enabled.
The default mode is Auto. You can verify the state of WAN Secure mode using the following EXEC
command:
show accelerator wansecure
If necessary, you can change the state of WAN Secure using the following global configuration
command:
accelerator mapi wansecure-mode {always | auto | none}
Step 6 (Optional on data center WAEs if only user accounts are used for domain identity configuration in Step
7.) Configure Windows domain settings and perform a domain join. (A domain join automatically
creates the machine account in Active Directory.) It is sufficient to create any one identity account, either
machine or user. Domain-join is required only for machine account used as an identity account.
Note Performing a domain join of the WAE is not required on branch WAE devices.
To configure Windows Domain Server Authentication settings, see Configuring Windows Domain
Server Authentication Settings in Chapter 7, “Configuring Administrative Login Authentication,
Authorization, and Accounting.”
Note Kerberos and Windows NT LAN Manager (NTLM) authentication are used for Encrypted MAPI
acceleration. For WAAS 5.3.1, encrypted NTLM traffic is supported for EMAPI, and the WAE
device optimizes NTLM traffic for domains configured with NTLM authentication.
You can utilize up to four optional user accounts for additional security. Multiple user accounts
provide greater security than having all of the core devices using a single user account. You must
configure a user account identity for each user account, whether you are utilizing an existing user
account or creating a new one.
To create a user account and configure a user account identity, see Creating and Configuring a User
Account.
Step 8 Enable Windows Domain Encrypted Service. (This is enabled by default.)
a. From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
b. From the menu, choose Configure > Security > Windows Domain > Encrypted Services.
The Encrypted Services window appears.
c. Check the Enable Encrypted Service check box.
d. Click Submit to save your changes.
Step 9 Enable Encrypted MAPI Traffic Optimization.
In the Enabled Features window, check the Encrypted MAPI Traffic Optimization check box (the
MAPI Accelerator check box must also be checked), and click Submit. (Encrypted MAPI traffic
optimization is enabled by default.)
For more information on the Enabled Features window, see Enabling and Disabling the Global
Optimization Features.
Note For definitions of machine account identity and other Microsoft Active Directory terms, see Terms Used
with Microsoft Active Directory.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 From the menu, choose Configure > Security > Windows Domain > Encrypted Services.
The Encrypted Services window appears.
Step 3 Click the Add Domain Identity button.
The Domain Identity dialog box appears (Figure 12-3).
Note Every WAAS device that has to be accelerated must have a domain identity.
a. In the Domain Identity dialog box that is displayed, choose Machine Account from the Account
Type drop-down list.
Note Windows domain join must be completed before creating the machine account domain
identity. For more information, see Configuring Windows Domain Server Settings on a
WAAS Device in Chapter 7, “Configuring Administrative Login Authentication,
Authorization, and Accounting.”
b. Enter the identity name in the Identity Name field. Only alphanumeric characters are allowed.
Space, ?, and | are not allowed. The length is not to exceed 32 characters.
Note The domain identity must have sufficient privileges in the Windows Domain Active
Directory to replicate the desired domain information to optimize encrypted traffic. To
configure privileges, see Configuring Microsoft Active Directory.
Step 4 Click the Add Match Domain button to add the child domains of the domain (with which the device is
registered) for which the Domain Identity should optimize the encrypted traffic. You can add up to 32
child domains. If you do not want the Domain Identity to optimize the traffic for any of the child
domains, you can delete the selected match domain items.
Note This is available only on devices running WAAS Version 5.4 and above.
To configure and verify Encrypted Services Domain Identities from the CLI, use the windows-domain
encrypted-service global configuration command and the show windows-domain encrypted-service
EXEC command.
Note For definitions of user accounts and other Microsoft Active Directory terms, see Terms Used with
Microsoft Active Directory.
To create a user account and configure a user account identity, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 From the menu, choose Configure > Security > Windows Domain > Encrypted Services.
The Encrypted Services window appears (Figure 12-5).
Step 3 Click Add Domain Identity to add a user account domain identity.
The Domain Identity window appears (Figure 12-6).
Note The domain identity must have sufficient privileges in the Windows Domain Active Directory to
replicate the desired domain information to optimize encrypted traffic. For information about
configuring privileges, see Configuring Microsoft Active Directory.
Note Secure store encryption is used for the user account domain identity password. If secure store
cannot be opened, an alarm is raised indicating that the configuration updates could not be stored
on the device. After secure store can be opened and the configuration updates are successfully
stored on the device, the alarm is cleared.
To configure and verify Encrypted Services Domain Identities from the CLI, use the windows-domain
encrypted-service global configuration command and the show windows-domain encrypted-service
EXEC command.
Step 1 Using an account with Domain Administrator privileges, launch the Active Directory Users and
Computers application.
Step 2 Create a new group.
Note This group is for accounts that WAAS will use to optimize Exchange traffic. Normal users and
computers should not be added to this group.
a. Right-click the Unit to contain the new group and choose New > Group (Figure 12-7).
b. Enter a name in the Group name field and select the following attributes:
– Group scope: Universal
– Group type: Security
c. Click OK.
Step 3 Configure the permissions required by WAAS.
a. In the Active Directory Users and Computers application window, choose View >
Advanced Features from the menu bar.
b. Right-click the root of the domain and choose Properties.
c. Click the Security tab (Figure 12-8).
You can modify the attributes of an existing domain identity on a WAAS device, if needed.
Note If the password for a user account has been changed in the Active Directory, you must edit the user
account domain identity on the WAAS device to match the new Active Directory password. For
definitions of user account and machine account identity, see Terms Used with Microsoft Active
Directory.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 From the menu, choose Configure > Security > Windows Domain > Encrypted Services.
The Encrypted Services window appears.
Step 3 Select the user account domain identity to modify and click the Edit icon.
The Domain Identity window appears.
Step 4 Change the password in the Password field. The password should be the same as the password for the
account in Active Directory.
Step 5 Click OK.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 From the menu, choose Configure > Security > Windows Domain > Encrypted Services.
The Encrypted Services window appears.
Step 3 Select one or more domain identities to delete and click the Delete icon to remove the domain identity
configured on the WAAS device.
A warning message appears if the domain identity is being used for optimizing encrypted traffic.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Disable Encrypted Service.
a. From the menu, choose Configure > Security > Windows Domain > Encrypted Services.
The Encrypted Services window appears.
b. Uncheck the Enable Encrypted Service check box.
c. Click Submit to save your changes.
Step 3 Disable Encrypted MAPI Traffic Optimization.
a. From the menu, choose Configure > Acceleration > Enabled Features.
The Enabled Features window appears.
b. Uncheck the Encrypted MAPI Traffic Optimization check box.
c. Click Submit to save your changes.
To view the statistics for Encrypted MAPI connections, see Using Predefined Reports to Monitor WAAS
in Chapter 15, “Monitoring Your WAAS Network,” and see the MAPI acceleration reports.
Microsoft Outlook and Exchange Versions Supported for Cisco WAAS MAPI RPC over HTTP(S)
Table 12-2 shows the clients and servers supporting WAAS MAPI RPC over HTTP(S):
Table 12-2 Clients and Servers Supporting WAAS MAPI RPC over HTTP(S)
Exchange 2013 and Exchange 2016 can be configured for MAPI over HTTP support. MAPI over HTTP
traffic will not be optimized by MAPI accelerator. However, MAPI over HTTP traffic will get L4
optimization benefits from WAAS (THSDL).
Step 1 Ensure that the SSL, HTTP and MAPI accelerators are enabled.
Step 2 Configure SSL acceleration. For more information, see Configuring SSL Acceleration.
Step 3 When you configure SSL acceleration, be sure to enable protocol chaining, by checking the Enable
protocol chaining check box on the SSL Accelerated Services window.
Note If protocol chaining is not enabled, the WAAS device will only optimize SSL traffic on the
specified IP address and port.
Step 4 Configure a windows domain identity on the core device, for encrypted MAPI connections.
Step 5 Ensure encryption is enabled in MAPI accelerator. For more information, refer to Configuring Encrypted
MAPI Settings
MAPI Acceleration Charts for Cisco WAAS MAPI RPC over HTTP(S)
The MAPI Acceleration report displays MAPI acceleration statistics. For WAAS Version 5.5.3 and
above, the following MAPI acceleration charts are added or modified:
• MAPI: Handled Traffic Pattern—A new pie diagram that shows the three different types of traffic
handled by the MAPI AO. For more information, see MAPI: Handled Traffic Pattern in Chapter 15,
“Monitoring Your WAAS Network.”
• MAPI: Connection Details—An existing chart for MAPI session connection statistics, MAPI:
Connection Details now includes a new classification for optimized TCP and RPC-HTTP(S) MAPI
connections. For more information, see MAPI: Connection Details in Chapter 15, “Monitoring Your
WAAS Network.”
• DRE-LZ Hints—The SMB accelerator provides DRE hints to improve system performance and
resources utilization. At the connection level, the SMB accelerator uses the BEST_COMP latency
sensitivity level for all connections, because it gives the best compression. At the message level, the
SMB accelerator provides message-based DRE hints for each message to be transmitted over the
WAN.
• Microsoft Optimization—The SMB accelerator optimizes file operations for Microsoft applications
by identifying lock request sequences for file name patterns supported by Microsoft Office
applications.
• Invalid FID Optimization—The SMB accelerator optimizes SMB2 and SMB3 clients by locally
denying attempts to access files with invalid file handle values instead of sending such requests to
the file servers.
• Batch Close Optimization—The SMB accelerator performs asynchronous file close optimizations
on all SMB traffic.
• Read Cache optimization—The SMB accelerator optimizes read operations in SMB2 by caching
read response data so that files can be served locally.
• Write Optimization —The SMB accelerator improves system performances by performing
asynchronous write operations.
• Signed Optimization — The SMB accelerator provides L7 optimization of all SMB traffic.
• SMB v3 Encrypted Optimization - The SMB accelerator provides L7 optimization of encrypted
SMB v3 traffic.
To enable the SMB accelerator, check the SMB Accelerator check box in the Enabled Features window.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > SMB Settings.
The SMB Settings window appears (Figure 12-9).
Step 3 From the Highest Dialect Optimized drop-down list, choose the highest dialect to optimize. The
available options are:
• NTLM 0.12 or NTLM 1.0
• SMB 2.0
• SMB 2.1
• SMB 3.0
• SMB 3.02
Step 4 From the Highest Dialect Optimized Exceed Action drop-down list, choose the action for the dialects
that are higher than the one chosen as the highest dialect to optimize:
• Mute—The dialects higher than the one chosen as the highest dialect to optimize are removed from
the negotiation list. This is the default selection.
Note The Mute option of SMB AO is deprecated in dialects 3.x and 2.0 of SMB; muting within
these versions has been found to be unsuccessful in terms of optimization.
• Handoff—If the negotiated dialect is higher than the chosen highest dialect to optimize, the
connection is handed off to the generic accelerator.
Note For SMB 2.1 only, you must configure the Handoff parameter from the CLI using the
accelerator smb smb2-1 exceed-action handoff global configuration command. If you use
the Central Manager to select the Handoff parameter for SMB 2.1, the Highest Dialect
Optimized Exceed Action will not take effect, and “Handoff” will not be displayed in
commands like the show running-configuration command or the show accelerator smb
command.
Step 5 In the Bypass File Name Pattern field, enter the patterns for the file names that you want the SMB
accelerator to bypass optimization for. The files whose names match the specified expressions are not
optimized.
Step 6 Check the SMB Object Cache check box if you want to enable disk caching for SMB traffic.
Step 7 Check the Signing Optimization check box to enable optimization of signed SMB v2 and v3 traffic.
This check box is checked by default.
An SMB connection request can originate from the Branch office to the Data Center or vice-versa. For
every connection, the WAE near the requestor, takes the Edge WAE’s role and WAE near the smb server
takes the Core WAE’s role.
The following prerequisites, at the Core and Edge WAE, are necessary to ensure that a signed connection
is optimized:
a. On the Core WAE, configure a valid user-identity with administrator privileges to enable
secret-retrieval to fetch and cache the long term service key of the smb server using the global
configuration command:
(config)#windows-domain encryption-service identity [identity] user-account name
[admin-username] domain <your.domain] realm [YOUR.DOMAIN] password
For Kerberos Authentication, ensure time synchronization between Client, Server, Core WAE and
the Domain Controller.
If you want to verify if a connection is signed or not you can do so by looking into the SMBv2
Negotiate packet. The Signing Required field should be set to “True” in either the Negotiate
Request or the Negotiate Response exchange.
These configurations are similar to the eMAPI configuration. For more information, see Step 6 of
Configuring Encrypted MAPI Settings.
b. Verify that the WAN Secure mode is enabled. WAN Secure’s secure connection enables the key to
be transported to the Edge WAE.
The default recommended mode is Auto. You can verify the state of WAN Secure mode using the
following EXEC command:
show accelerator wansecure
If necessary, you can change the state of WAN Secure using the following global configuration
command:
accelerator smb wansecure-mode {always | auto | none}
c. Verify if the WAE devices are registered and are online with the WAAS Central Manager.
Step 8 Click the SMBV1 Optimization Settings tab to perform the following tasks:
– Check the Meta Data Optimization check box to enable metadata optimization. This check
box is checked by default.
– Check the Microsoft Office Optimization check box to enable optimizations for all versions
of Microsoft Office. The SMB accelerator does not perform read-ahead, write, and lock-ahead
optimizations for Microsoft Office if this optimization is disabled. This check box is checked
by default.
– Check the Named Pipe Optimization check box to enable named pipe optimization by caching
named pipe sessions and positive RPS responses. This check box is checked by default.
– Check the ‘Not Found’ Cache Optimization check box to enable caching pathnames of files
not found. This check box is checked by default.
– Check the Print Optimization check box to enable SMB to configure a centralized print
deployment. This check box is checked by default.
– Check the Read Ahead Optimization check box to enable the SMB to optimize the quantity of
read-ahead data from the file. The SMB performs a read-ahead optimization only when the file
is opened using the oplocks feature. This check box is checked by default.
– Check the Write Optimization check box to enable the write optimization by speeding up the
write responses to the client. This check box is checked by default
Click SMBV2 Optimization Settings tab to perform the following tasks:
– Check the Batch Close Optimization check box to enable asynchronous files close
optimizations. This check box is checked by default.
– Check the Invalid FID Optimization check box to enable optimization of files with invalid file
handle values. This check box is checked by default.
– Check the SMBV2 Read Cache Optimization check box to enable read response caching. This
check box is checked by default.
– Check the SMBV2 Write Optimization check box to enable asynchronous write operations.
This check box is checked by default.
– Check the Directory Service Optimization check box to enable optimization of directory
browsing performance for SMB v2 traffic. The check box is checked by default. Directory
service optimization is available only on devices or device groups running software image 6.1.1.
Click SMBV3 Optimization Settings tab to perform the following tasks:
– Check the SMB v3 Batch Close Optimization check box to enable asynchronous files close
optimizations. This check box is checked by default.
– Check the SMB v3 Invalid FID Optimization check box to enable optimization of files with
invalid file handle values. This check box is checked by default.
– Check the SMB v3 Read Cache Optimization check box to enable read response caching. This
check box is checked by default.
– Check the SMB v3 Write Optimization check box to enable asynchronous write operations.
This check box is checked by default.
– Select the type of optimization you want from the SMB v3 Encryption Optimization drop
down box - L7 Optimization, L4 only optimization or disable SMB v3 encrypted optimization.
L7 optimization is selected by default.
Step 9 Click Submit to save the changes.
To configure SMB acceleration from the CLI, use the accelerator smb global configuration command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > ICA Settings.
The ICA Acceleration Configuration window appears.
Step 3 Check the Enable Multi Stream ICA check box to allow the client and server up to three additional
TCP connections that optimize multistream ICA traffic.
Step 4 From the WAN Secure Mode drop-down list, choose the mode. The options are:
• None—Disables WAN Secure mode for ICA. This is the default.
• Always—Enables WAN Secure mode for ICA.
Note The state of WAN Secure mode in both Branch WAE and Data Center WAE must match for
connections to get optimized with the ICA accelerator.
Step 5 In the DSCP Settings (QoS) under ICA Streams section, check the Enable DSCP Tagging check box to
configure DSCP values for MSI priority levels. These values override the defaults. The valid range is
from 0 to 63.
Note Configure DSCP values for MSI priority levels in the descending order of the priority.
a. Very High-Priority MSI—Typically real-time traffic, such as audio. The default is af41.
b. High-Priority MSI—Typically interactive traffic. The default is af41.
c. Medium-Priority MSI—Typically bulk data. The default is af21.
d. Low-Priority MSI—Typically background traffic, such as printing. The default is 0—best effort.
Note MSI priority configuration might not apply to devices earlier than WAAS Version 5.1.x.
To configure ICA acceleration from the CLI, use the accelerator ica global configuration command.
To verify the status of WAN Secure mode from the CLI, use the show accelerator wansecure EXEC
command.
Note When you are configuring SSL acceleration, be sure to enable protocol chaining. If protocol chaining is
not enabled, the WAAS device will only optimize SSL traffic on the specified IP Address and Port.
Note On a WAAS Express device, only SSL cipher list, SSL certificate authorities, and SSL peering service
configuration are supported.
Note The SSL accelerator does not optimize protocols that do not start their SSL/TLS handshake from the
very first byte. The only exception is HTTPS that goes through a proxy (where the HTTP accelerator
detects the start of SSL/TLS). In this case, both HTTP and SSL accelerators optimize the connection.
The SSL application accelerator supports SSL Version 3 (SSLv3) and Transport Layer Security Version
1 (TLSv1) protocols. If a TLSv1.1 or TLSV1.2 client request is received, negotiation will not occur.
Manual bypass of TLSv1.1 or TLSv1.2 packets is required in order to make these client/server
connections.
Table 12-3 provides an overview of the steps you must complete to set up and enable SSL acceleration.
Before you configure SSL acceleration, you should know the following information about your network:
• The services that you want to be accelerated on the SSL traffic
• The server IP address and port information
• The public key infrastructure (PKI) certificate and private key information, including the certificate
common name and CA-signing information
• The cipher suites supported
WAE to WAE
Branch WAE Peering Service Data Center WAE
Common Name =
hr.analog.com
WAN1
SSL Data
SSL Sessions
Client to Data Center SSL Core to Server SSL
Session Session
243495
TCP Session
When you configure SSL acceleration, you must configure SSL-accelerated service on the server-side
(Data Center) WAE devices. The client-side (Branch) WAE should have its secure store initialized and
unlocked or opened, but does not have to have the SSL-accelerated service configured. However, the SSL
accelerator must be enabled on both Data Center and Branch WAEs for SSL acceleration services to
work. The WAAS Central Manager provides SSL management services and maintains the encryption
certificates and keys.
Before you can use SSL acceleration on your WAAS system, you must enable secure store encryption
on the WAAS CM. For more information on this procedure, see Configuring Secure Store Settings in
Chapter 10, “Configuring Other System Settings.”
Before you can use SSL acceleration on your WAAS system, you must enable the Enterprise license. For
more information on this procedure, see Managing Software Licenses in Chapter 10, “Configuring Other
System Settings.”
Before you can use SSL acceleration on your WAAS system, you must enable SSL acceleration on
WAAS devices. For more information on this procedure, see Enabling and Disabling the Global
Optimization Features.
Note If the SSL accelerator is already running, you must wait for two datafeed poll cycles to be completed
when registering a new WAE with a Central Manager before making any configuration changes.
Otherwise the changes may not take effect.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > SSL > Global Settings.
The SSL Global Settings window appears (Figure 12-12).
Step 3 To configure a device to use the SSL settings from a particular device group, choose the device group
from Select a Device Group drop-down list located in the SSL global settings toolbar. A device can
either use its own SSL settings, or SSL settings from a device group. However, it is not possible to
configure a device to use SSL settings from multiple device groups.
Note If you have configured the device with specific SSL Accelerated Services and assigned it to a
Device Group, those configurations are lost when you click on the Override Group Settings on
the Device Group > Configure > Security > SSL > Global Settings page.
Step 4 From the SSL version drop-down list, choose the type of SSL protocol to use. Choose SSL3 for the SSL
Version 3 protocol, choose TLS1 for the Transport Layer Security Version 1 protocol, or choose All to
accept both SSL3 and TLS1 SSL protocols.
Step 5 (Optional) Set the Online Certificate Status Protocol (OCSP) parameters for certificate revocation:
a. From the OCSP Revocation check drop-down list, choose the OCSP revocation method.
Choose ocsp-url SSL accelerator to use OCSP responder specified in the OCSP Responder URL
field to check the revocation status of certificates. Choose ocsp-cert-url to use the OCSP responder
URL specified in the Certificate Authority.
b. If the Ignore OCSP failures check box is enabled, the SSL accelerator will treat the OCSP
revocation check as successful if it does not get a definite response from the OCSP responder.
Step 6 From the Cipher List drop-down list, choose a list of cipher suites to be used for SSL acceleration. For
more information, see Working with Cipher Lists.
Step 7 Choose a certificate/key pair method (Figure 12-13).
• Click Generate Self-signed Certificate Key to have the WAAS devices use a self-signed
certificate/key pair for SSL.
• Click Import Existing Certificate Key to upload or paste an existing certificate/key pair.
• Click Export Certificate Key to export the current certificate/key pair.
• Click Generate Certificate Signing Request to renew or replace the existing certificate/key pair.
The certificate signing request is used by the CA to generate a new certificate.
Note The file that you import or export must be in either a PKCS12 format or a PEM format.
• Click Import existing client certificate and optionally private key to use the client configured
certificate.
For information about service certificate and private key configuration, see Configuring a Service
Certificate and Private Key.
Step 8 Click Submit.
Step 1 To generate a self-signed certificate and private key (Figure 12-14), follow these steps:
a. Check the Mark private key as exportable check box to export this certificate/key in the WAAS
Central Manager and device CLI later.
b. Fill in the certificate and private key fields.
c. Operating Considerations for Key Size field:
• For WAAS Version 6.1.x and earlier, the Key Size drop-down list values are 512, 768, 1024,
1536, and 2048.
Note A self-signed certificate on WAAS Version 6.1.x or earlier with an RSA modulus size
of 512 is not compatible with Mozilla FireFox Version 39 and later, or with Google
Chrome Version 48 and later. A self-signed certificate on WAAS Version 6.1.x or earlier
with an RSA modulus size of 512 is compatible with Internet Explorer 8 and later.
If you have previously configured the RSA modulus size as 512: to access the WAAS
CM with Mozilla FireFox Version 39 and later, or with Google Chrome Version 48 and
later, you must regenerate the self-signed certificate with an RSA modulus size of 2048,
and then upgade to the specified version of Mozilla FireFox or Google Chrome.
• For WAAS Version 6.2.x and later, the Key Size drop-down list values are 768, 1024, 1536, and
2048. The key size 512 is not used with WAAS Version 6.2.x and later.
Step 2 To import an existing certificate or certificate chain and, optionally, private key (Figure 12-15), follow
these steps:
Note The Cisco WAAS SSL feature only supports RSA signing/encryption algorithm and keys.
a. Check the Mark private key as exportable check box to export this certificate/key in the WAAS
Central Manager and device CLI later.
b. To import existing certificate or certificate chain and private key, perform one of the following tasks:
• Upload the certificate and key in PKCS#12 format (also as known Microsoft PFX format)
• Upload the certificate and private key in PEM format
• Paste the certificate and private key PEM content
If the certificate and private key are already configured, you can update only the certificate. In this
case, the Central Manager constructs the certificate and private key pair using the imported
certificate and current private key. This functionality can be used to update an existing self-signed
certificate to one signed by the CA, or to update an expiring certificate.
The Central Manager allows importing a certificate chain consisting of an end certificate that must
be specified first, a chain of intermediate CA certificates that sign the end certificate or intermediate
CA certificate, and end with a root CA.
The Central Manager validates the chain and rejects it if the validity date of the CA certificate is
expired, or the signing order of certificates in the chain is not consequent.
c. Enter a pass-phrase to decrypt the private key, or leave this field empty if the private key is not
encrypted.
Step 3 To export a configured certificate and private key (Figure 12-16), follow these steps:
Note Central Manager will not allow the export of certificate and private key if the certificate and key
were marked as nonexportable when they were generated or imported.
Step 4 To generate a certificate-signing request from a current certificate and private key ( Figure 12-17), follow
these steps:
Step 5 To update the current certificate with one signed by the Certificate Authority:
a. Generate PKCS#10 certificate signing request.
b. Send generated certificate signing request to Certificate Authority to generate and sign certificate.
c. Import certificate received from the Certificate Authority using the Importing existing certificate
and optionally private key option.
Note The size of the key for a generated certificate request is the same as the size of the key in the
current certificate.
Step 6 To import an existing client certificate or certificate chain and, optionally, private key (Figure 12-18),
follow these steps:
Figure 12-18 Import existing client certificate and optionally private key
a. Check the Mark private key as exportable check box to export this certificate/key in the WAAS
Central Manager and device CLI later.
b. To import existing client certificate and private key, perform one of the following:
• Upload certificate and key in PKCS#12 format (also as Microsoft PFX format)
• Upload certificate and private key in PEM format
• Paste certificate and private key PEM content
If the certificate and private key are already configured, you can update the certificate only. In this
case, the Central Manager constructs the certificate and private key pair using the imported client
certificate and current private key. This functionality can be used to update an existing self-signed
certificate to one signed by the Certificate Authority, or to update an expiring certificate.
The Central Manager allows importing a certificate chain consisting of an end certificate that must
be specified first, a chain of intermediate CA certificates that sign the end certificate or intermediate
CA certificate, and end with a root CA.
c. Enter a pass-phrase to decrypt the private key, or leave this field empty if the private key is not
encrypted.
d. Click Choose File to navigate to the client configured certificate and Import Client Cert to
successfully import the above certificate.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > SSL > Cipher Lists.
The SSL Cipher Lists window appears (Figure 12-19).
Note For a WAAS Express device, the SSL Cipher Lists window shows the same name and cipher
fields, but in a slightly different format.
Note For a WAAS Express device, click Add Cipher List to add a new cipher list.
Step 4 Type a name for your cipher list in the Cipher List Name field.
Step 5 Click Add Cipher to add cipher suites to your cipher list.
Note For a WAAS Express device, select the ciphers you wish to add, skip to Step 12.
Step 6 From the Ciphers drop-down list, choose the cipher suite that you want to add.
Note If you are establishing an SSL connection to a Microsoft IIS server, do not select a DHE-based
cipher suite.
Step 7 Choose the priority for the selected cipher suite in the Priority field.
Note When SSL peering service is configured, the priority associated with a cipher list on a core
device takes precedence over the priority associated with a cipher list on an edge device.
Step 8 Click Add to include the selected cipher suite on your cipher list, or click Cancel to leave the list as it is.
Step 9 Repeat Step 5 through Step 8 to add more cipher suites to your list as desired.
Step 10 (Optional) To change the priority of a cipher suite, check the cipher suite check box and then use the up
or down arrow buttons located below the cipher list to prioritize.
Note The client-specified order for ciphers overrides the cipher list priority assigned here if the cipher
list is applied to an accelerated service. The priorities assigned in this cipher list are only
applicable if the cipher list is applied to SSL peering and management services.
Step 11 (Optional) To remove a cipher suite from the list, check the cipher suite’s box and then click Delete.
Step 12 Click Submit when you are done configuring the cipher list.
Note For a WAAS Express device, click OK to save the cipher list configuration.
SSL configuration changes will not be applied on the device until the security license has been
enabled on the device.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > SSL > Certificate Authorities.
The SSL CA Certificate List window appears (Figure 12-21).
Note For a WAAS Express device, the SSL CA Certificate List window shows the same Name, Issued
To, Issuer, and Expiry Date fields, but in a slightly different format.
There is also an Aggregate Settings field configurable as Yes or No. To finish the procedure for
WAAS Express, skip to Step 4.
Step 3 Add one of the preloaded CA certificates that is included with WAAS as follows:
a. Click Well-known CAs.
b. Choose the pre-existing CA certificate you want to add and click Import. The CA certificate that
you selected is added to the list on the SSL CA Certificate List display.
Step 4 Add your own CA certificate as follows:
a. Click Create.
The Creating New CA Certificate window appears (Figure 12-22).
Note For a WAAS Express device, click Add CA to add your own CA certificate. Enter the name
and the URL, and then click Get CA Certificate. After this, skip to Step 6.
This option automatically configures the certificate authority using Simple Certificate
Enrollment Protocol (SCEP). If you are using the automated certificate enrollment procedure,
enter the CA URL and click Get Certificate. The contents of the certificate are displayed in text
and PEM formats.
To complete the automated certificate enrollment procedure, configure the SSL auto enrollment
settings in Configuring SSL Auto Enrollment.
f. Click Submit to save your changes.
Step 5 (Optional) To remove a CA from the list, select it and then click the Delete icon located in the toolbar.
Step 6 Click Submit after you are done configuring the CA certificate list.
Note For a WAAS Express device, click OK to save the CA certificate configuration.
The WAAS SSL acceleration feature allows you to enroll certificates automatically for a device (or
device group) using SCEP. After the CA certificate is obtained, configure the SSL auto enrollment
settings.
Note You must configure the CA authority before configuring auto enrollment settings.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Security > SSL > Auto Enrollment.
The SSL Auto Enrollment Settings window appears (Figure 12-23).
Note CA, CA URL, and Challenge Password are mandatory for enabling SSL auto enrollment.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Security > Management Service.
The Management Services window appears (Figure 12-24).
Step 3 From the SSL version drop-down list, choose the type of SSL protocol to use. Choose SSL3 for the SSL
version 3 protocol, TLS1 for the Transport Layer Security version 1 protocol, or All to use both SSL3
and TLS1 SSL protocols.
Note Management-service SSL version and cipher settings configured for the WAAS Central Manager
are also applied to SSL connections between the WAAS Central Manager and the browser of the
user.
Primary and standby Central Managers must share a common management service version or
cipher list. Changing the management service version and cipher list settings may result in a loss
of connectivity between the primary Central Manager and the standby Central Manager and
WAE devices.
The following cipher lists are supported in SSL Acceleration (Legacy SSL Acceleration).
• dhe-rsa-with-aes-256-cbc-sha
• rsa-with-aes-256-cbc-sha
• dhe-rsa-with-aes-128-cbc-sha
• rsa-with-aes-128-cbc-sha
• dhe-rsa-with-3des-ede-cbc-sha
• rsa-with-3des-ede-cbc-sha
• rsa-with-rc4-128-sha
• rsa-with-rc4-128-md5
• dhe-rsa-with-des-cbc-sha
• rsa-export1024-with-rc4-56-sha
• rsa-export1024-with-des-cbc-sha
• dhe-rsa-export-with-des40-cbc-sha
• rsa-export-with-des40-cbc-sha
• rsa-export-with-rc4-40-md5
• rsa-with-des-cbc-sha
Note In case you need to configure additional ciphers, see the supported ciphers in Preparing to use
SMART-SSL acceleration/ SSL Accelerator v2.
Note All browsers support SSLv3 and TLSv1 protocols, but TLSv1 may not be enabled by default on
certain browsers. Therefore, you must enable it in your browser.
Configuring ciphers or protocols that are not supported in your browser will result in connection
loss between the browser and the Central Manager. If this occurs, configure the Central Manager
management service SSL settings to the default in the CLI to restore the connection.
Some browsers, such as Internet Explorer, do not correctly handle a change of SSL version and
cipher settings on the Central Manager, which can result in the browser showing an error page
after you submit the changes. If this occurs, reload the page.
Step 4 In the Cipher List pane, choose a list of cipher suites to be used for SSL acceleration. See Working with
Cipher Lists for additional information.
You can export the SSL CA signed certificate to enable trusted SSL communication between the WAAS
Central Manager and the web browser. The default certificate for enabling SSL communication is the
WAAS Central Manager self signed certificate. However, if you would like to use a different certificate,
you need to configure it.
Step 1 From the WAAS Central Manager menu, choose Devices>CM>Configure> Security> SSL Admin
Service.
The default certificate is displayed.
Step 2 Select the PKI operation
a. Click Import Existing Certificate Key to upload or paste an existing certificate/key pair.
b. Click Export Certificate Key to export the current certificate/key pair.
The file that you import or export must be in either a PKCS12 format or a Privacy Enhanced Mail
(PEM) format.
c. Click Generate Self-signed Certificate Key to have the Central Manager and WAAS device use a
self-signed certificate/key pair for SSL.
Operating Considerations for Key Size field:
• For WAAS Version 6.1.x and earlier, the Key Size drop-down list values are 512, 768, 1024,
1536, and 2048.
Note A self-signed certificate on WAAS Version 6.1.x or earlier with an RSA modulus size
of 512 is not compatible with Mozilla FireFox Version 39 and later, or with Google
Chrome Version 48 and later. A self-signed certificate on WAAS Version 6.1.x or earlier
with an RSA modulus size of 512 is compatible with Internet Explorer 8 and later.
If you have previously configured the RSA modulus size as 512: to access the WAAS
CM with Mozilla FireFox Version 39 and later, or with Google Chrome Version 48 and
later, you must regenerate the self-signed certificate with an RSA modulus size of 2048,
and then upgade to the specified version of Mozilla FireFox or Google Chrome.
• For WAAS Version 6.2.x and later, the Key Size drop-down list values are 768, 1024, 1536, and
2048. The key size 512 is not used with WAAS Version 6.2.x and later.
Step 3 Click Submit to register the certificate.
The Central Manager now uses the selected certificate for SSL communication.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Configure > Security > Peering Service.
The Peering Service window appears (Figure 12-25).
Note For a WAAS Express device, the Peering Service window shows a subset of the fields in the
standard Peering Service window in a slightly different format.
The cipher list Priority setting and the Disable revocation check of peer certificates options
are not applicable to WAAS Express.
Step 3 From the SSL Version drop-down list, choose the type of SSL protocol to use, or choose Inherited to
use the SSL protocol configured in global SSL settings. Choose SSL3 for the SSL version 3 protocol,
TLS1 for the Transport Layer Security version 1 protocol, or All to use both SSL3 and TLS1 SSL
protocols.
Note In a WAAS Express device, only SSL3 and TLS1 are supported for the SSL version.
Step 4 To enable verification of peer certificates, check the Enable Certificate Verification check box. If
certificate verification is enabled, WAAS devices that use self-signed certificates will not be able to
establish peering connections to each other and, thus, not be able to accelerate SSL traffic.
Step 5 Check the Disable revocation check for this service check box to disable OCSP certificate revocation
checking.
Step 6 In the Cipher List pane, choose a list of cipher suites to be used for SSL acceleration between the WAE
device peers, or choose Inherited to use the cipher list configured in SSL global settings.
Note In a WAAS Express device, the list of cipher suites to be used for SSL acceleration is shown in
the Cipher List pane.
Note In a WAAS Express device, SSL configuration changes will not be applied on the device until
the security license has been enabled on the device.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > SSL Accelerated Services.
Step 3 To delete an accelerated service, select the service and click Delete.
Step 4 Click Create to define a new accelerated service. A maximum of 512 accelerated services are allowed.
The Basic SSL Accelerated Services Configuration window appears (Figure 12-26).
Step 5 Enter a name for the service in the Service Name field.
Step 6 To enable this accelerated service, check the In service check box.
Step 7 To enable client version rollback check, check the Client version rollback check check box.
Enabling the client version rollback check does not allow connections with an incorrect client version to
be optimized.
Step 8 To match subject alternative names, enable the Match Server Name Indication check box. For more
information, see Configuring SSL Acceleration for SaaS Applications.
Step 9 To enable protocol chaining, check the Enable protocol chaining check box.
Enabling protocol chaining allows other protocols to be optimized over SSL.
Step 10 (Optional) Type a description of the service in the Description field.
Step 11 From the Server drop-down list, choose IP Address, Hostname, or Domain as the SSL service endpoint
type.
Step 12 Type the server IP address (or proxy IP address) , hostname, or domain of the accelerated server. Use the
keyword Any to specify any server IP address.
Note Hostname and domain server address types are supported only when using WAAS software
Version 4.2.x or later. Server IP address keyword Any is supported only when using WAAS
Software Version 4.2.x or later.
• Click Generate Self-signed Certificate Key to have the WAAS devices use a self-signed
certificate/key pair for SSL.
• Click Import Existing Certificate Key to upload or paste an existing certificate/key pair.
Note In case of SaaS applications, the certificate should have the Subject Alternative Name (SAN)
information.
Note If you change the certificate or key for an existing SSL-accelerated service, you must uncheck
the In service check box and click Submit to disable the service, and then wait 5 minutes and
check the In service check box and click Submit to re-enable the service. Alternatively, in the
WAE, you can use the no inservice SSL-accelerated service configuration command, wait a few
seconds, and then use the inservice command. If you are changing the certificate or key for
multiple SSL-accelerated services, you can restart all the accelerated services by disabling and
then re-enabling the SSL accelerator.
Step 17 Click the Advanced Settings tab to configure SSL parameters for the service.
The Advanced SSL Accelerated Services Configuration window appears (Figure 12-28).
Step 18 (Optional) From the SSL version drop-down list, choose the type of SSL protocol to use, or choose
Inherited to use the SSL protocol configured in global SSL settings. Choose SSL3 for the SSL Version
3 protocol, TLS1 for the Transport Layer Security Version 1 protocol, or All to use both SSL3 and TLS1
SSL protocols.
Step 19 (Optional) From the Cipher List drop-down list, choose a list of cipher suites to be used for SSL
acceleration between the WAE device peers, or choose Inherited to use the cipher list configured in SSL
global settings. For more information, see Working with Cipher Lists.
Step 20 (Optional) To set the OCSP parameters for certificate revocation, follow these steps:
a. To enable the verification of client certificate check, check the Verify client certificate check box.
b. Check the Disable revocation check for this service check box to disable OCSP client certificate
revocation checking.
c. To enable verification of server certificate check, check the Verify server certificate check box.
d. Check the Disable revocation check for this service check box to disable OCSP server certificate
revocation checking.
Note If the server and client devices are using self-signed certificates and certificate verification is
enabled, WAAS devices will not be able to accelerate SSL traffic.
Step 21 Click Submit after you have finished configuring the SSL accelerated service.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > SSL Accelerated Services.
Step 3 Click Edit SSL Accelerated Service button in the Name column for the service in question.
Step 4 Choose a certificate and key pair method (Figure 12-27) to either re-generate a self-signed certificate
and private key or to import an updated certificate and/or key.
Step 5 Depending on the chosen method fill out the required details, then click Generate or Import and next
click Submit.
Note When you update a certificate for a SSL Accelerated Service and want it to be used by it, it is
important to stop and start the configured SSL Accelerated Service. This step is required because
the existing certificate and key are stored in memory on the accelerators. Updating the
certificate/key via the steps described above is insufficient because it does not update the
certificate/key in memory.
To ensure the updated certificate for the SSL Accelerated Service is used, make sure to follow
the steps below as well.
Step 6 Click the Edit SSL Accelerated Service button in the Name column for the service in question.
Step 7 Remove the check mark for In service, then click Submit.
Step 8 Click the Edit SSL Accelerated Service button in the Name column for the service in question for one
last time.
Step 9 Enable the check mark for In service then click Submit.
Step 1 Create an SSL-accelerated service for a SaaS application using Step 1 through Step 8 outlined in Using
SSL Accelerated Services.
Step 2 To match subject alternative names, check the Match Server Name Indication check box. Alternately,
use the match sni command on the core WAAS device.
If enabled, the SSL accelerator parses the initial SSL connection setup message for the destination
hostname (in the SSL protocol extension called Server Name Indication) and uses that to match it with
the Subject Alternate Names list in the SSL certificate on the WAAS device.
Note We recommend this setting for optimizing cloud-based SaaS applications to avoid
namespace/certificate mismatch errors that are caused due to the changing nature of the SaaS
server domains and IP addresses.
Note Most modern browsers provide Server Name Indication (SNI) support. Ensure that you use a
browser that supports SNI.
Note The Match Server Name Indication option is available only on devices running WAAS 5.3.5 or
later.
Step 3 Use the keyword Any to specify the server IP address of the accelerated server.
Step 4 Direct all SSL traffic for SAAS applications to port 443.
The above configuration overrides any wildcard configuration.
Note If you have configured port 443 for traffic other than SaaS applications, you should review and
reconfigure it appropriately.
Step 5 Click Import Existing Certificate Key to upload or paste a certificate/key pair. The certificate should
be specifically used for the SaaS-accelerated service and should contain the Subject Alternate Names for
the server domains that need to be optimized. Identify the server domains that need to be added for
optimizing SaaS applications, by following the steps outlined in Determining Server Domains Used by
SaaS Applications.
Note You must create a new certificate with the missing server domain names derived from the list at
regular intervals to ensure that the connections are optimized.
Step 6 Click Submit to complete configuring the SSL-accelerated service for the SaaS application.
Step 1 Identify the relevant servers to be added. Use the sh crypto ssl services accelerated-service
service-name to see additional details regarding the count and last seen information of the server name.
If you need additional information to view the IP address and hostnames, use the debug accelerator ssl
sni command to enable SNI debugs.
Step 2 Log in to the Microsoft Management Console(MMC), OpenSSL, or any other available customer tool to
create a new Certificate Signing Request (CSR) with the relevant server domain names of the SaaS
applications in the subject alternative names extension of the certificate. Refer to the highlighted area in
the example certificate below.
Note When you add the SAN to the certificate, domain names should be separated by a comma. Note
that a list of hostnames on a domain can be secured with a single certificate. For example,
a.b.c.com and c.b.com can be added as *.b.c.com. However, for a new hostname on another
domain, you have to make a new entry. For example, for b.c.com you have to add it as b.c.com
or *.c.com. Additionally, you can also secure hostnames on different base domains in the same
certificate, for example a.b.com and a.b.net.
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
ec:aa:9b:10:fa:9d:09:95
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US, ST=California, L=San Jose, O=Cisco
Systems Inc, OU=WAAS,
CN=Cisco_WAAS_CA/[email protected]
Validity
Not Before: Jul 31 06:49:56 2013 GMT
Not After : Aug 30 06:49:56 2013 GMT
Subject: C=US, ST=California, L=San Jose, O=Cisco
Systems Inc, OU=WAAS,
CN=Office365/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:c6:85:0d:f9:df:4e:4f:c4:53:d5:3e:0f:c4:cb:
53:42:34:34:7d:92:7f:ea:c1:75:0b:21:3f:5f:a1:
be:34:f1:40:c3:32:52:a1:05:79:26:7b:a3:29:c5:
5e:9f:3f:92:6b:d1:b2:fd:bc:c9:2b:8b:e2:9f:1a:
91:83:9b:c8:7f:3f:d9:56:92:75:be:b6:ed:39:39:
2f:1a:2f:ba:39:1b:06:76:0a:17:b5:f0:ec:dd:4c:
fa:94:be:ea:7c:e0:4e:51:b4:d2:75:4d:8b:d9:6e:
de:34:10:c7:c5:e8:97:5f:f2:7f:97:1e:9a:e0:e2:
fc:b4:58:11:45:82:19:14:11
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Subject Alternative Name:
DNS:*.office365.com, DNS:outlook.com, DNS:*.aadcdn.microsoftonline-p.com,
DNS:*.aspnetcdn.com, DNS:*.client.hip.live.com, DNS:*.hip.live.com,
DNS:*.linkedinlabs.com, DNS:*.live.com, DNS:*.microsoft.com, DNS:*.microsoftonline-p.com,
DNS:*.microsoftonline-p.net, DNS:*.microsoftonline.com, DNS:*.microsoftonlineimages.com,
DNS:*.microsoftonlinesupport.net, DNS:*.msecnd.net, DNS:*.msocdn.com, DNS:*.office.net,
DNS:*.office365.com, DNS:*.officeapps.live.com, DNS:*.officecdn.microsoft.com,
DNS:*.onmicrosoft.com, DNS:*.outlook.com, DNS:*.res.outlook.com, DNS:*.sharepoint.com,
DNS:*.sharepointonline.com, DNS:*.telemetry.microsoft.com,
DNS:*.testexchangeconnectivity.com, DNS:*.vo.msecnd.net, DNS:*.webtrends.com
Note The Enterprise root CA should be present in browser as trusted root CA.
Step 5 Uncheck the In service checkbox and click Submit to disable the accelerated service.
Step 6 Upload the new certificate and re-enable the service.
The table below provides an overview of the steps you must complete to set up and enable SMART-SSL
acceleration.
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, /* 0x006B */
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, /* 0x0084 */
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, /* 0x0088 */
TLS_RSA_WITH_SEED_CBC_SHA, /* 0x0096 */
TLS_DHE_RSA_WITH_SEED_CBC_SHA, /* 0x009A */
TLS_RSA_WITH_AES_128_GCM_SHA256, /* 0x009C */
TLS_RSA_WITH_AES_256_GCM_SHA384, /* 0x009D */
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, /* 0x009E */
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, /* 0x009F */
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, /* 0xC012 */
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, /* 0xC013 */
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, /* 0xC014 */
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, /* 0xC027 */
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, /* 0xC028 */
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, /* 0xC02F
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 /* 0xC030 */
• SSL compression is not supported.
Step 1 If your organization already has a well known root CA, you can use it. You can also import a new CA
using the WAAS Central Manager GUI. For more information, see Working with Certificate Authorities.
Alternately, if you need to create a new CA, use a Linux machine with openssl version of 1.0.1e or
greater to create these certificates. Create the root CA key. This signs all issued certificates.
openssl genrsa -out rootCA.key.pem 2048
Step 2 Create the self-signed root CA certificate, with the key generated above.
openssl req -x509 -new -nodes -key rootCA.key -days 365 -out rootCA.crt
Step 3 Verify the root certificate.
Step 4 Import the certificate from the Enterprise CA to the Trusted Root Certification Authorities store on the
client browser and install the root CA certificate and intermediate CA certificate.
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
NGSSL Demo Certificate
X509v3 Subject Key Identifier:
65:C1:42:98:47:81:0E:04:7A:7D:83:A7:43:C9:A3:B8:1F:DB:BF:1E
X509v3 Authority Key Identifier:
keyid:8C:F6:0A:BC:E4:EB:2C:D9:6B:68:95:09:1B:B5:82:66:CE:ED:6B:77
X509v3 Subject Alternative Name:
DNS:*.google.com, DNS:*.android.com, DNS:*.appengine.google.com, DNS:*.cloud.google.com,
DNS:*.google-analytics.com, DNS:*.google.ca, DNS:*.google.cl, DNS:*.google.co.in,
DNS:*.google.co.jp, DNS:*.google.co.uk, DNS:*.google.com.ar, DNS:*.google.com.au,
DNS:*.google.com.br, DNS:*.google.com.co, DNS:*.google.com.mx, DNS:*.google.com.tr,
DNS:*.google.com.vn, DNS:*.google.de, DNS:*.google.es, DNS:*.google.fr, DNS:*.google.hu,
DNS:*.google.it, DNS:*.google.nl, DNS:*.google.pl, DNS:*.google.pt,
DNS:*.googleadapis.com, DNS:*.googleapis.cn, DNS:*.googlecommerce.com,
DNS:*.googlevideo.com, DNS:*.gstatic.cn, DNS:*.gstatic.com, DNS:*.gvt1.com,
DNS:*.gvt2.com, DNS:*.metric.gstatic.com, DNS:*.urchin.com, DNS:*.url.google.com,
DNS:*.youtube-nocookie.com, DNS:*.youtube.com, DNS:*.youtubeeducation.com,
DNS:*.ytimg.com, DNS:android.clients.google.com, DNS:android.com, DNS:g.co, DNS:goo.gl,
DNS:google-analytics.com, DNS:google.com, DNS:googlecommerce.com, DNS:urchin.com,
DNS:www.goo.gl, DNS:youtu.be, DNS:youtube.com, DNS:youtubeeducation.com
Alternately, if you want to create a CSR from the CM GUI, you can follow the steps in Configuring a
Service Certificate and Private Key.
Step 3 Create new proxy server certificate by signing the above generated CSR with your existing Enterprise
Root CA, or the one created above. This will generate .crt or .pem certifcate file.
Note that the CA certificate used to sign this accelerated service certificate should be present in the client
browser root CA store for the accelerated service proxy certificate created to be authenticated and
accepted by the client browser.
• IE or Chrome: settings- advanced settings - certificates - import - add the root ca -into trusted root
authorities. Clear the browser cache and reload the browser for the cloud application and it should
pick up the new certificate.
• Mozilla: options - advanced - Certificates> View certificates > Import - click all the three for the
trusted zones and import the certificate. Clear the browser cache and reload the browser for the cloud
application and it should pick up the new certificate.
Step 4 WAAS allows importing certificates with pkcs12 format. To generate the pcks12 format from the
certificate file and your private key use the open ssl command.
openssl pkcs12 -export -out server.p12 -inkey proxyserver.key -in proxyserver.crt
-certfile CACert.crt
Step 5 Import this certificate into the WAAS device group using crypto import EXEC command and thereafter
be used in the accelerated server configuration as server-cert-key.
WAE#crypto import pkcs12 newcert.p12 pkcs12{disk| ftp | http | sftp | tftp}
for e.g.
WAE#crypto import pkcs12 youtube.p12 pkcs12 disk youtube_newcert.p12
Step 6 It is important to note that the CA cert used to sign this ASVC cert will need to exist in the browser
rootCA store for the accelerated service proxy certificate create to be authenticated and accepted by the
browser.
Note The WAAS CM CA repository does not include the 'CN=GTE CyberTrust Global Root'
certificate. You will need to manually import and configure it from the Central Manager or the
device to use it to validate o365 certificates.
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name, to select the
device group created above. Add only branch devices to this group.These devices will optimize the SSL
traffic as it passes through them.
Step 2 Choose Configure > Acceleration > Enabled Features.
Step 3 Check the SSL Interposer (SSL Accelerator V2) check box to enable SMART-SSL acceleration.
Step 4 Create an SSL accelerated service for the device group. Choose Acceleration > SSL Accelerated
Services and click the Create button. The Creating new SSL Accelerated Service page opens.
Step 5 In the SSL Accelerated Service section, name your service, and select In service box. You can also
provide a short description.
Step 6 In the Server Addresses section, enter “any” in the IP Address box and “443” in the Server Port box.
Then click Add.
Step 7 In the Certificate and Private Key section, click Import Existing Certificate and Optionally Private
Key and select Upload File in PKCS#12 Format. Supply the password used to export the certificate (
Using the Browse button, locate the certificate. Then click the Import button.
A confirmation screen with the certificate information appears.
Step 8 Click Submit to complete configuring the SSL-accelerated service to use single sided optimization.
Alternatively, if you want to automate the entire process using a script, we recommend that you get in
touch with the Cisco Technical Assistance Center (TAC).
Step 9 Monitor the SMART-SSL accelerated service optimization statistics using the Cisco WAAS Central
Manager and the command-line interface (CLI) using the show statistics encryption-services exec
command.
Alternately, to enable SMART-SSL acceleration from the CLI, use the (config) crypto
encryption-service enable global configuration command.
The SSL accelerator and the SMART-SSL accelerator use the same configuration commands. However,
for the SMART-SSL configuration, only a limited set of keywords are supported. The following table
elaborates the supported keywords.
Prerequisites
Before you create an o365 accelerated service on the WAAS Central Manger, you must have completed
the following:
• Deployed Virtual Network in Azure
• Deployed CSR 1000v for secure network extension and DNAT
• Deplpyed Azure vWAAS
• Configured Azure Route tables
• Configured Azure CSR
• Registered the Azure vWAAS device with the WAAS Central Manager.
The table below provides an overview of the steps you must complete to set up and enable o365
accelerationn from the WAAS Central Manager.
A root SSL certificate is a certificate issued by a trusted certificate authority and is in turn trusted by
domain clients. This is used to sign all issued certificates. This CA needs to be capable of accepting
certificate signing requests (CSRs) that include subject alternative names and generate certificates that
include subject alternative names. The subject alternative name is an extension to the X.509 protocol that
allows various values to be associated with a security certificate (SSL certificate). Subject alternative
names can include IP addresses, email addresses, universal resource identifiers (URIs), alternative
common Domain Name System (DNS) names, alternatives to the distinguished name, and other
information.You can install this on all machines that will be communicating with services using SSL
certificates generated by this root certificate. If your organization already has a root CA for its internal
use, you can use it instead of a new root CA. If not, use a Linux machine with openssl version of 1.0.1e
or greater to create these certificates.
Step 1 Create the root CA key. This signs all issued certificates.
Step 2 Create the self-signed root CA certificate, with the key generated above.
Step 3 Verify the root certificate.
Import the certificate from the Enterprise CA to the Trusted Root Certification Authorities store on the
client browser and install the root CA certificate and intermediate CA certificate.
To create the certificate to be used with the accelerated service, follow the steps below:
Step 1 Log in to the Microsoft Management Console(MMC), OpenSSL, or any other available customer tool to
create a new Certificate Signing Request (CSR) with the relevant server domain names of the o365
application in the subject alternative names extension of the certificate. Refer to the highlighted area in
the example certificate below.
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
ec:aa:9b:10:fa:9d:09:95
Note The Enterprise root CA should be present in browser as trusted root CA.
Step 4 Ensure that the CA certificate used to sign this accelerated service certificate should be present in the
client browser root CA store for the accelerated service proxy certificate created to be authenticated and
accepted by the client browser.
• IE or Chrome: settings- advanced settings - certificates - import - add the root ca -into trusted root
authorities. Clear the browser cache and reload the browser for the cloud application and it should
pick up the new certificate.
• Mozilla: options - advanced - Certificates> View certificates > Import - click all the three for the
trusted zones and import the certificate. Clear the browser cache and reload the browser for the cloud
application and it should pick up the new certificate.
Step 1 Register your Azure vWAAS device with the WAAS Central Manager. If the Central Manager is in a
different network add routes for reachability.
Step 2 Create an o365 accelerated service for the device group. Choose Acceleration > SSL Accelerated
Services and click the Create button. The Creating New SSL Accelerated Service page opens.
Step 3 In the SSL Accelerated Service section, name your service “o365”, and select both In Service and
Match Server Name Indication boxes. You can also provide a short description.
Step 4 In the Server Addresses section, enter “any” in the IP Address box and “443” in the Server Port box.
Then click Add.
Step 5 In the Certificate and Private Key section, click Import Existing Certificate and Optionally Private
Key and select Upload File in PKCS#12 Format to upload the multi-domain certificate created earlier.
Supply the password used to export the certificate Using the Browse button, locate the certificate created
earlier. Then click the Import button.
A confirmation screen with the certificate information appears.
Step 6 Click Submit to complete configuring the o365 accelerated service.
Alternately, you could use the CLI to copy the o365 certificate ( o365.pfx) to the data center WAE and
import the certificate using the crypto import pkcs12 Azure_o365.p12 pkcs12 disk office365.pfx
EXEC command. Instead of importing multi-domain certificate from device disk, you can use remote
methods (such as ftp, http) to import the certificate from servers. You can also configure the application
accelerated service in th WAE with the importedcertificate using the crypto ssl services
accelerated-service Azure_o365 EXEC command.
Step 7 Monitor the accelerated service optimization statistics using the Cisco WAAS Central Manager and the
command-line interface (CLI) using the show statistics connections optimized EXEC command
• Cisco Support for Microsoft Windows Update and Akamai Cache Engine
08/28/2015 12:24:31.448 (fl=27520) 300 134.949 0.000 355 344 3591542 568 172.25.30.4
191.234.4.50 2f25 m-s - - rm-f 200 GET
http://fg.v4.download.windowsupdate.com/d/msdownload/update/software/secu/2013/07/wind
ows8-rt-kb2863725-x64_dd8522e527483cd69bf61d98ee849a2406b97172.psf - -
Example 2:
Example 2 shows a cache hit when a range is requested on an object that is either completely in
cache, or in the process of being downloaded. If it is in the process of being downloaded, then the
main transaction has latched onto a sub-transaction like the one shown in Example 1.
08/28/2015 03:34:36.906 (fl=26032) 300 0.000 50.373 346 - - 13169 172.25.30.4
8.254.217.62 2905 h - - - 206 GET
http://fg.v4.download.windowsupdate.com/d/msdownload/update/software/secu/2013/07/wind
ows8-\ rt-kb2863725-x64_dd8522e527483cd69bf61d98ee849a2406b97172.psf - -
Cisco Support for Microsoft Windows Update and Akamai Cache Engine
Cisco support for Microsoft Windows Update enables Akamai Cache Engine to support Windows
Update caching in two ways:
• Download and cache full objects even when ranges within objects that not in cache are requested.
• Future range requests on the objects can be served out of cache.
There is a limit, set by OTT metadata during the Akamai Connect registration process, from the start of
the object—the number of bytes or the percent of file length—where the download functionality is
triggered. A request of a size above the set limit does not initiate a full object download, and the request
is forwarded to the origin as is.
Caution Cisco Support for Microsoft Windows update is enabled by default, and enabled only for specific sites.
The enabled sites are updated via OTT metadata.
If you want to disable Cisco Support for Microsoft Windows Update, you must disable OTT caching. To
do this, uncheck the Over the Top Cache check box. However, note that unchecking the Over the Top
Cache check box disables all OTT functionality, both global and custom OTT configurations.
For more information on the Akamai Connect registration process, see Activating the Akamai Connect
License in Chapter 13, “Configuring Cisco WAAS with Akamai Connect.”
Step 1 From the WAAS Central Manager menu, choose Configure > Acceleration > Applications.
The Applications window appears, which displays a list of all the applications on your WAAS system.
It also lists the device or device group from which it gets the settings.
Step 2 From this window, perform the following tasks:
• Select an application and click the Edit icon in the task bar to modify the definition, or click the
Delete icon in the task bar to delete.
• Determine if your WAAS system is collecting statistics on an application. The Enable Statistics
column displays Yes if statistics are being collected for the application.
• Create a new application, as described in the steps that follow.
Step 3 Click the Add Application icon in the taskbar.
The Application window appears.
Step 4 Enter a name for this application.
The name cannot contain spaces and special characters.
Step 5 (Optional) Enter a comment in the Comments field.
The comment you enter appears in the Applications window.
Step 6 Check the Enable Statistics check box to allow the WAAS Central Manager to collect data for this
application. To disable data collection for this application, uncheck this check box.
The WAAS Central Manager GUI can display statistics for up to 25 applications and 25 class maps. An
error message is displayed if you try to enable more than 25 statistics for either. However, you can use
the WAAS CLI to view statistics for all the applications that have policies on a specific WAAS device.
For more information, refer to the Cisco Wide Area Application Services Command Reference.
Note If you are collecting statistics for an application, and decide to disable statistics collection, and
then reenable statistics collection at a later time, the historical data is retained, but a gap in data
will exist for the period when statistics collection was disabled. An application cannot be deleted
if there is an optimization policy using it. However, if you delete an application that you had
collected statistics for, and then later recreate the application, the historical data for the
application is lost. Only data collected since the re-creation of the application is displayed.
Note The WAAS Central Manager does not start collecting data for this application until you finish
creating the entire optimization policy.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > Optimization Policies.
The Optimization Policies window appears (Figure 12-29).
Note In a WAAS Express device, the Optimization Policies window shows a subset of the fields in the
standard Optimization Policies window.
Enable Service Policy option, DSCP option, and the Protocol column in the list of policy rules
are not applicable to WAAS Express.
Note When Cisco WAAS Express is used on the Cisco Integrated Services Router Generation 2 (ISR
G2) with the Cisco VPN Internal Service Module (VPN-ISM) or with Group Encrypted
Transport (GETVPN) enabled, the WAAS Express does not optimize FTP data.
To ensure that FTP data is optimized when WAAS Express is used with the Cisco ISR G2, use
the ISR G2's IOS crypto map software.
This window displays information about all the optimization policies that reside on the selected device
or device group and the position of each policy. The position determines the order in which WAAS refers
to that policy when determining how to handle application traffic. To change the position of a policy, see
Modifying the Position of an Optimization Policy. This window also displays the class map, source and
destination IP addresses, source and destination ports, protocol, application, action, and accelerates
assigned to each policy.
Note If there are WAAS Version 4.x devices, you can click the Legacy View taskbar icon to view the
policies as they appear in a WAAS Version 4.x device.
From the Optimization Policies window, you can perform the following tasks:
• Configure a description, configure the Enable Service Policy setting, and configure the DSCP
setting. This DSCP setting field configures DSCP settings at the device (or device group) level.
Note The device will only use this policy setting to determine what optimizations are performed
if Enable Service Policy is set.
• Select one or more optimization policies that you want to delete, and click the Delete icon to delete
the selected policies.
• Select an optimization policy and click the Edit icon to modify the checked policy.
• Restore predefined policies and class maps. For more information, see Restoring Optimization
Policies and Class Maps.
• Create an optimization policy, as described in the steps that follow.
Step 3 Click the Add Policy Rule icon in the taskbar to create a new optimization policy.
The Optimization Policy Rule pop-up window appears (Figure 12-30).
Step 4 From the Class-Map Name drop-down list, select an existing class map for this policy, or click Create
New to create a new class map for this policy. For information on creating a new class map, see Creating
an Optimization Class Map.
Step 5 From the Action drop-down list, choose the action that your WAAS device should take on the defined
traffic. Table 12-8 describes each action.
Note For a WAAS Express device, only a subset of actions are available: Passthrough, TFO Only, TFO
with LZ, TFO with DRE, and TFO with DRE and LZ.
Action1 Description
Passthrough Prevents the WAAS device from optimizing the application traffic defined
in this policy by using TFO, DRE, or compression. Traffic that matches
this policy can still be accelerated if an accelerator is chosen from the
Accelerate drop-down list.
TFO Only Applies a variety of transport flow optimization (TFO) techniques to
matching traffic. TFO techniques include BIC-TCP, window size
maximization and scaling, and selective acknowledgement. For a more
detailed description of the TFO feature, see Transport Flow Optimization
in Chapter 1, “Introduction to WAAS.”
TFO with DRE (Adaptive Applies both TFO and DRE with adaptive caching to matching traffic.
Cache)
TFO with DRE Applies both TFO and DRE with unidirectional caching to matching
(Unidirectional Cache) traffic.
TFO with DRE Applies both TFO and DRE with bidirectional caching to matching traffic.
(Bidirectional Cache)
TFO with LZ Applies both TFO and the LZ compression algorithm to matching traffic.
Compression LZ compression functions similarly to DRE, but uses a different
compression algorithm to compress smaller data streams and maintains a
limited compression history.
TFO with DRE (Adaptive Applies TFO, DRE with adaptive caching, and LZ compression to
Cache) and LZ matching traffic.
Action1 Description
TFO with DRE Applies TFO, DRE with unidirectional caching, and LZ compression to
(Unidirectional Cache) matching traffic.
and LZ
TFO with DRE Applies TFO, DRE with bidirectional caching, and LZ compression to
(Bidirectional Cache) and matching traffic.
LZ
1. When configuring a device running a WAAS version prior to 4.4.1, options that include Unidirectional or Adaptive caching
are not shown in the Action list.
Note When ICA acceleration is enabled, all the connections are processed with the DRE mode as
unidirectional, and acceleration type is shown as TIDL (TCP optimization, ICA acceleration,
DRE, and LZ).
Note When configuring optimization policies on a device group, if the device group contains devices
running a WAAS version prior to 4.4.1 and you are configuring an action that includes
Unidirectional or Adaptive caching, the caching mode is converted to bidirectional. Similarly,
when devices running a WAAS version prior to 4.4.1 join a device group that is configured with
optimization policies that use Unidirectional or Adaptive caching, the caching mode is converted
to bidirectional. In such cases, we recommend that you upgrade all the devices to the same
software version or create different device groups for devices with incompatible versions.
Step 6 From the Accelerate drop-down list, choose one of the following additional acceleration actions that
your WAAS device should take on the defined traffic:
• None—No additional acceleration is done.
• MS PortMapper—Accelerate using the Microsoft Endpoint Port Mapper (EPM).
• SMB Adaptor—Accelerate using the SMB Accelerators.
• HTTP Adaptor—Accelerate using the HTTP Accelerator.
• MAPI Adaptor—Accelerate using the MAPI Accelerator.
• NFS Adaptor—Accelerate using the NFS Accelerator.
• ICA Adaptor—Accelerate using the ICA Accelerator.
Step 7 Specify the application that you want to associate with this policy by performing either of the following:
• From the Application drop-down list, choose an existing application such as the one that you
created, as described in Creating an Application Definition. This list displays all the predefined and
new applications on your WAAS system.
• Click New Application to create an application. You can specify the application name and enable
statistics collection. After specifying the application details, click OK to save the new application
and return to the Optimization Policy window. The new application is automatically assigned to this
device or device group.
Step 8 (Optional) Choose a value from the DSCP Marking drop-down list. You can choose copy, which copies
the DSCP value from the incoming packet and uses it for the outgoing packet. If you choose
inherit-from-name from the drop-down list, the DSCP value defined at the application or global level
is used.
DSCP is a field in an IP packet that enables different levels of service to be assigned to network traffic.
Levels of service are assigned by marking each packet on the network with a DSCP code and associating
a corresponding level of service. DSCP is the combination of IP Precedence and Type of Service (ToS)
fields. For more information, see RFC 2474.
DSCP marking does not apply to pass-through traffic.
Note In a WAAS Express device, the DSCP Marking drop-down list is not shown.
For the DSCP marking value, you can choose to use the global default values (see Defining Default
DSCP Marking Values) or select one of the other defined values. You can choose copy, which copies the
DSCP value from the incoming packet and uses it for the outgoing packet.
Step 9 Click OK.
The new policy appears in the Optimization Policies window (Figure 12-29).
Step 1 Enter a name for this application class map. The name cannot contain spaces or special characters.
Note You must create a unique class map name across all types. For example, you cannot use the
same name for an optimization class map and an AppNav class map.
Note In WAAS Express, the class map name cannot contain the following prefixes (case
sensitive): class, optimize, passthrough, application, accelerate, tfo, dre, lz, or
sequence-interval. Existing class map names containing any of these prefixes must be
changed manually.
Step 4 Click the Add Match Condition icon to enter the conditions (Figure 12-31).
Note For a WAAS Express device, Protocol and EPM Custom UUID settings are not applicable.
Step 5 Enter a value in one of the destination or source condition fields to create a condition for a specific type
of traffic.
For example, to match all the traffic going to IP address 10.10.10.2, enter that IP address in the
Destination IP Address field.
Note To specify a range of IP addresses, enter a wildcard subnet mask in either the destination or
source IP Wildcard field in dotted decimal notation, such as 0.0.0.255 for /24.
To match traffic that uses dynamic port allocation, choose the corresponding application identifier from
the Protocol drop-down list. For example, to match Microsoft Exchange Server traffic that uses the
MAPI protocol, choose mapi. To enter a custom EPM UUID, choose epm-uuid and enter the UUID in
the EPM Custom UUID field.
Note If you try to create a class map with an EMP UUID match condition that is already being used,
that class map is removed and an error message is displayed stating that a class map already
exists with the same EPM UUID match condition.
Step 6 Add additional match conditions, as needed. If any one of the conditions is matched, the class is
considered as matched.
Step 7 Click OK to save the class map.
Note When a CPU overload condition occurs, the polling interval is reduced to an interval of 2 seconds.
Although the average CPU utilization may fall below the threshold during this time and the overload
condition cleared, the CPU alarm may still be present. The CPU alarm is only cleared when the overload
condition does not reappear in the next 2-minute-interval poll.
To modify the accelerator load indicator threshold and cpu load monitoring for a WAE device, follow
these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > Accelerator Threshold.
The Accelerator Threshold window appears.
Step 3 To enable CPU Load Monitoring, check the Enable check box. (The default is enabled.)
Step 4 In the Accelerator Load Indicator Threshold field, enter a percent value between 80 and 100. The
default is 95.
Step 5 In the CPU Load Higher Monitoring Threshold field, enter a percent value between 1 and 100. The
default is 98.
Step 6 In the In the CPU Load Lower Monitoring Threshold field, enter a percent value between 1 and 100.
The default is 90.
Step 7 In the Window Size field enter a value between 1 to 16. The default value is 4.
Step 8 In the Sampling Intervals Avg Time field enter a value between 1 and 120. The default is 10.
Step 9 In the Overloaded State Time field, enter a value between 1to 120. The default value is 10.
Step 10 Click Submit.
If the device group has the 6.x software image, you can configure additional settings to monitor the cpu
load for the device group.
Step 11 To enable CPU Load Monitoring, check the Enable check box. (The default is enabled.)
Step 12 To enable softirq monitoring , check the Enable softirq Monitoring checkbox.
Step 13 In the Accelerator Load Indicator Threshold field, enter a percent value between 80 and 100. The
default is 95.
Step 14 In the CPU Load Monitoring Threshold field, enter a percent value between 80 and 100. The default
is 95.
Step 15 In the CPU Load Higher Monitoring Threshold field, enter a percent value between 1 and 100. The
default is 98.
Step 16 In the In the CPU Load Lower Monitoring Threshold field, enter a percent value between 1 and 100.
The default is 90.
Step 17 In the Window Size field enter a value between 1 to 16. The default value is 4.
Step 18 In the Sampling Intervals Avg Time field enter a value between 1 and 120. The default is 10.
Step 19 In the Overloaded State Time field, enter a value between 1to 120. The default value is 10.
Step 20 Click Submit.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > Optimization Policies.
The Optimization Policies window appears.
Step 3 Click the Application column header to sort the column by application name so that you can locate a
specific application more easily.
Note If there are WAAS Version 4.x devices, click the Legacy View taskbar icon to view the policies
as they appear in a WAAS Version 4.x device.
To edit an optimization policy, check the box next to the application and click the Edit taskbar icon.
If you determine that one or more policies are not needed, check the check box next to each of these
applications and click the Delete taskbar icon.
If you determine that a new policy is needed, click the Add Policy Rule taskbar icon (see Creating an
Optimization Policy).
Step 1 From the WAAS Central Manager menu, choose Configure > Acceleration > Optimization Policy
Report (Figure 12-32).
The Policy Report for Devices tab appears. This report lists each device (or device group) and the overall
policy count on the device (or device group) referencing this application. It includes both active policies
(those in use by the device or device group), and backup policies (those not in use by the device when
the device gets its configuration from a device group). When the device is deassigned from the device
group, the backup policies are applied back to the device and become active again.
An application cannot be deleted unless the No. of Policies field is 0.
Step 2 Click the Policy Report for Device-Groups tab to view the number of devices per device group and the
number of active policies in the device group.
Step 3 To see the optimization policies that are defined on a particular device or group, click the corresponding
device or device group. The policies are displayed in the Optimization Policies window.
For information about viewing a class map report, see Viewing a Class Map Report.
Step 1 From the WAAS Central Manager menu, choose Configure > Acceleration > Optimization Policy
Report.
The Policy Report for Devices tab appears.
Step 2 Click the Class-Map Report tab to view a report of the devices and device groups on which the class
map is configured.
Step 3 Select the class map and click the View icon to see the devices or device groups on which the class maps
reside.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > Optimization Policies.
The Optimization Policies window appears.
Step 3 Click the Restore Default taskbar icon to restore over 150 policies and class maps that shipped with the
WAAS software and remove any new policies that were created on the system. If a predefined policy has
been changed, these changes are lost and the original settings are restored.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > Optimization Policies.
The Optimization Policies window appears.
Step 3 Choose a value from the DSCP drop-down list. The default setting is copy, which copies the DSCP value
from the incoming packet and uses it for the outgoing packet.
Step 4 Click OK to save the settings.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > Optimization Policies.
The Optimization Policies window appears (Figure 12-33).
Note For a WAAS Express device, all policies are grouped under the waas_global category.
Step 3 Modify the position of the optimization policy in any of the following ways:
• Select the policy you want to move and use the up and down arrow ( ) icons in the taskbar to
move that policy higher or lower in the list.
• Select the policy you want to move and click Move To to specify the exact position.
• Select the policy and drag and drop it into the desired position
Note The Save Moved Rows icon must be clicked to save the new policy positions.
You can also create a new optimization policy at a particular position by selecting the policy above the
location and then clicking Insert.
If a device goes through all the policies in the list without making a match, the WAAS device passes
through the traffic unoptimized.
Note For a WAAS Express device, the class default policy should be last. This policy cannot be
modified or deleted.
Step 4 Click the Save Moved Rows icon to save changes, if any, that you made to policy positions.
Step 5 If you determine that a policy is not needed, follow these steps to delete the policy:
a. Select the policy you want to delete.
b. Click the Delete icon in the taskbar.
Note A default policy that maps to a default class map matching any traffic cannot be deleted.
Step 6 If you determine that a new policy is needed, click the Add Policy taskbar icon to create the policy (see
Creating an Optimization Policy).
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > TCP Settings. The Acceleration TCP Settings window appears.
Step 3 Check the Send TCP Keepalive check box. (By default, this check box is checked.)
Checking the Send TCP Keepalive check box allows this WAE device or group to disconnect the TCP
connection to its peer device if no response is received from the TCP keepalive exchange. In this case,
the two peer WAE devices will exchange TCP keepalives on a TCP connection, and if no response is
received for the keepalives for a specific period, the TCP connection will be torn down. When the
keepalive option is enabled, any short network disruption in the WAN will cause the TCP connection
between peer WAE devices to be disconnected.
If the Send TCP Keepalive check box is not checked, TCP keepalives will not be sent and connections
will be maintained unless they are explicitly disconnected.
Step 4 Modify the TCP acceleration settings, as needed. See Table 12-9 for a description of these settings.
For information on how to calculate these settings for high BDP links, see Calculating the TCP Buffers
for High BDP Links.
Step 5 If you are deploying the WAE across a high Bandwidth-Delay-Product (BDP) link, you can set
recommended values for the send and receive buffer sizes by clicking Set High BDP recommended
values. For more information about calculating TCP buffers for high BDP links, see Calculating the TCP
Buffers for High BDP Links.
Step 6 Click Submit.
Note If the original and optimized maximum segment sizes are set to their default values and you configure a
jumbo MTU setting, the segment sizes are changed to the jumbo MTU setting minus 68 bytes. If you
have configured custom maximum segment sizes, their values are not changed if you configure a jumbo
MTU. For more information on jumbo MTU, see Configuring a Jumbo MTU in Chapter 6, “Configuring
Network Settings.”
To configure TCP keepalives from the CLI, use the tfo tcp keepalive global configuration command.
To configure TCP acceleration settings from the CLI, use the following global configuration commands:
tfo tcp optimized-mss, tfo tcp optimized-receive-buffer, tfo tcp optimized-send-buffer, tfo tcp
original-mss, tfo tcp original-receive-buffer, and tfo tcp original-send-buffer.
To show the TCP buffer sizes, use the show tfo tcp EXEC command.
• WAE-512—Default BDP is 32 KB
• WAE-612—Default BDP is 512 KB
• WAE-674—Default BDP is 2048 KB
• WAE-7341—Default BDP is 2048 KB
• WAE-7371—Default BDP is 2048 KB
• All WAVE platforms—Default BDP is 2048 KB
If your network provides higher bandwidth, or higher latencies are involved, use the following formula
to calculate the actual link BDP:
BDP [Kbytes] = (link BW [Kbytes/sec] * Round-trip latency [Sec])
When multiple links 1..N are the links for which the WAE is optimizing traffic, the maximum BDP
should be calculated as follows:
MaxBDP = Max (BDP(link 1),..,BDP(link N))
If the calculated MaxBDP is greater than the DefaultBDP for your WAE model, the Acceleration TCP
settings should be modified to accommodate that calculated BDP.
After you calculate the size of the Max BDP, enter a value that is equal to or greater than twice the Max
BDP in the Send Buffer Size and Receive Buffer Size fields for the optimized connection on the
Acceleration TCP Settings window.
Note These manually configured buffer sizes are applicable only if TCP adaptive buffering is disabled. TCP
adaptive buffering is normally enabled, and allows the WAAS system to dynamically vary the buffer
sizes. For more information on TCP adaptive buffering, see Modifying the TCP Adaptive Buffering
Settings.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Acceleration > TCP Adaptive Buffering Settings.
The TCP Adaptive Buffering Settings window appears.
Step 3 To enable TCP adaptive buffering, check the Enable check box. (By default, this is enabled.)
Step 4 In the Send Buffer Size and Receive Buffer Size fields, enter the maximum size, in kilobytes, of the send
and receive buffers.
Step 5 Click Submit.
To configure the TCP adaptive buffer settings from the CLI, use the tfo tcp adaptive-buffer-sizing
global configuration command:
WAE(config)# tfo tcp adaptive-buffer-sizing receive-buffer-max 8192
To disable TCP adaptive buffering from the CLI, use the no tfo tcp adaptive-buffer-sizing enable
global configuration command.
To show the default and configured adaptive buffer sizes, use the show tfo tcp EXEC command.
This chapter describes how to configure Cisco WAAS with Akamai Connect, which is an integrated
solution that combines WAN optimization and intelligent object caching to accelerate HTTP/S
applications, video, and content.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the Cisco Wide
Area Application Services (Cisco WAAS) Central Managers and Cisco Wide Area Application Engines
(WAEs) in your network. The term WAE refers to WAE and Cisco Wide Area Virtualization Engine
(WAVE) appliances, Cisco Services Ready Engine (SRE) service modules (SMs) running WAAS, and
Cisco Virtual WAAS (vWAAS) instances.
Note Akamai Connect is the HTTP/S object cache component added to Cisco WAAS, integrated into the
existing WAAS software stack and leveraged via the HTTP Application Optimizer. WAAS with Akamai
Connect helps to reduce latency for HTTP/S traffic for business and web applications.
Akamai Connected Cache is a component of Akamai Connect, which allows the Cache Engine to cache
content that is delivered by an Edge server on the Akamai Intelligent Platform.
Dual-Sided Deployment
Dual-sided deployment (Figure 13-1) provides the benefits of WAAS technology plus Akamai caching
for HTTP and HTTPS traffic:
• Transparent caching of customer-owned, Intranet web resources
• Caching in branch only.
• Includes prepositioning (for non-SSL content).
Single-Sided Deployment
Single-sided deployment (Figure 13-2) provides the benefits of WAAS technology plus Akamai caching
for HTTP and HTTPS traffic:
the benefits of HTTP object caching.
• Generic web resources that utilize proxy-specific HTTP cache-control headers.
• Caching in branch only.
• Includes prepositioning (for non-SSL content).
• Single-sided deployment is on by default with transparent caching in Standard mode.
• There is no separate cache for HTTPS content. However, data is stored differently for the same site
if both HTTP and HTTPS are accessing. (The way the sites are stored in the cache is based on the
URL, and this will change between HTTP and HTTPS.)
The Cache Engine has no explicit integration with AppNav. The AppNav status is based on the HTTP
application accelerator.
Note The terms mode, profile, and policy are sometimes used interchangeably to describe caching types and
processes. This document uses these terms as follows:
Profile—The set of host rules and caching types applied as a group, and which follows the Cache Engine
order of precedence.
Policy—The set of rules and the conditions of caching, applied either singly or as a group, to device or
device group.
Table 13-1 Supported WAAS Platforms for Akamai Caching up to 6,000 Connections
Note If you are upgrading from a version earlier than vWAAS Version 5.4, you will need a third disk and
possibly more memory added. For more information, see the Akamai Connect and vWAAS section of the
Cisco Wide Area Application Services vWAAS Installation and Configuration Guide.
WAVE and vWAAS Models for Akamai Connect beyond 6,000 Connections
For WAAS Version 6.2.1 and later, the Akamai Connect Cache Engine is supported for scaling beyond
6,000 connections on the following platforms:
• WAVE-7541, WAVE-7571, and WAVE-8541
• vWAAS-12000 and vWAAS-50000
Table 13-2 shows supported vWAAS models for Akamai caching beyond 6,000 connections, and disk
and memory requirements for Akamai caching beyond 6,000 connections
Table 13-2 Supported vWAAS Models and Memory/Disk Requirements for Akamai Connect
beyond 6,000 Connections
Note For vWAAS with WAAS Version 6.2.x, vWAAS with Akamai Connect beyond 6,000 connections is not
supported for Cisco vWAAS on RHEL KVM or KVM on CentOS.
Caution When a WAE—a WAVE model used for Akamai Connect beyond 6,000 connections—is assigned to a
device group in the WAAS Central Manager after Akamai Connect is already enabled, you must
manually reload the device. Akamai Connect will remain in shutdown state until the reload is performed.
Scaling for these platforms is based on memory availability and scale performance. Table 13-3 shows
the total HTTP object cache connections, memory required for the cache engine, cache engine cache
disk, and additional resources, if needed.
The Akamai Connect Cache Engine connection-handling capacity is determined by the upper limit of
memory that is given to the Akamai Connect Cache Engine at startup. The Akamai Connect Cache
Engine will allocate memory as needed up to the upper limit. In case of overload, the connection will be
optimized by HTTP-AO, without a caching benefit.
Note For vWAAS-12000 and vWAAS-50000, HTTP object cache will scale up to the platform TFO limit. To
achieve this, you must augment the platform resources (CPU, RAM, and disk) during provisioning.
For vWAAS-1200 and vWAAS-50000, you must allocate Cache Engine cache disk resources. Cache disk
requirements are shown in Table 13-3.
Table 13-3 WAAS Mid to High End Platform Memory/Disk Requirements for HTTP-OC
Step 1 Upgrade the WAAS Central Manager and WAE devices to WAAS Version 6.2.1 or later.
For complete upgrade instructions, including critical prerequisites before upgrading the WAAS Central
Manager to WAAS Version 6.2.1 or later, see the Release Note for Cisco Wide Area Application Services
for your WAAS release.
After upgrade, the Device Profile feature—Device > device-name > Configure > Caching > Device
Profile—is initially disabled, and the Branch check box in the Device Profile screen section is
unchecked. See Step for how to enable Device Profile after an upgrade.
Step 2 After upgrade is complete enable HTTP-OC, from the WAAS Central Manager or from the WAAS CLI.
Step 3 When you enable HTTP-OC for WAVE-7541/7571/8541, you will receive a message to run the disk
delete-data-partitions EXEC command and to restart the system.
Note The disk delete-data-partitions command deletes all data partitions on all logical drives,
including CONTENT, PRINTSPOOL, and SYSFS partitions. These partitions include all DRE
and SMB object cache files, SYSFS and print spool files. New partitions are created at system
restart.
Step 4 Upgrading the system and configuring HTTP-OC from the WAAS Central Manager (to upgrade from the
WAAS CLI, see Step 5):
a. Enable Akamai Connect.
b. A message is displayed with two requirements, for disk delete data partitions and Device Profile
enable, and includes an approval request for these.
c. After user approval, the WAAS Central Manager will initiate disk delete data partitions process
and enable the Device Profile feature.
d. Restart the system.
e. By default, from the WAAS Central Manager, Akamai Connect will be enabled at restart.
Note For WAVE models 7541 and 8541, the Device Profile feature is automatically set/unset
when you enable/disable HTTP OC. For WAVE-7571, the Device Profile setting
requires you to reboot to change the Device Profile feature status.
Step 5 Upgrading the system and configuring HTTP-OC from the CLI (to upgrade from the WAAS Central
Manager, see Step 4):
a. Enable Akamai Connect.
b. A message is displayed to run the disk delete-data-partitions EXEC command.
c. By default, from the CLI, Akamai Connect is not enabled at system restart.
d. Enable Akamai Connect.
e. Here are operating considerations when Akamai Connect is enabled:
• You can disable the Device Profile feature if you disable Akamai Connect on the device. To
disable the Device Profile feature, uncheck the Branch check box.
• For WAVE models 7541 and 8541, the Device Profile feature is automatically set/unset when
you enable/disable HTTP OC. For WAVE-7571, the Device Profile setting requires you to
reboot to change the Device Profile feature status.
• You can disable the Device Profile feature if you disable Akamai Connect on the device. To
disable the Device Profile feature, uncheck the Branch check box.
• To enable the Device Profile feature from the CLI, use the device mode global configuration
command, to configure the device to function as application accelerator
(application-accelerator) or WAAS Central Manager (central-manager).
Note For the WAVE-7571, you can also use the device mode command to configure the device
to function as a branch device (profile-branch), to configure pre-allocation resrouces for
various WAAS services to be branch traffic scenario and branch services.
The branch profile enabled connection count used for computing memory for
pre-allocation is 3/4 of the TFO limit.
f. To show device profile settings, use the show device-mode current EXEC command.
g. To show the configured device mode (the mode that is configured but has not yet taken effect),
use the show device-mode configured EXEC command.
To configure HTTP-OC on vWAAS-12000 or vWAAS-50000 with the additional Akamai Cache disk
removed and then reinstalled, follow these steps:
Step 1 The device is at WAAS Version 6.2.x, with Akamai Connect enabled.
Step 2 Disable Akamai Connect.
Step 3 Power down the device.
Step 4 Remove the additional Akamai Cache disk.
Step 5 Power on the device.
Step 6 Downgrade from WAAS Version 6.2.x WAAS Version 5.x.
Step 7 Upgrade the WAAS Central Manager and WAE devices to WAAS Version 6.2.x.
Step 8 After upgrade is complete, power off the device.
To configure HTTP-OC on vWAAS-12000 or vWAAS-50000 with the additional Akamai Cache disk
remaining in place, follow these steps:
Step 1 Upgrade the WAAS Central Manager and WAE devices to WAAS Version 6.2.1 or later.
Step 2 Enable Akamai Connect.
Step 3 Downgrade from WAAS Version 6.2.x to WAAS Version 5.x.
Step 4 Upgrade the WAAS Central Manager and WAE devices to WAAS Version 6.2.x.
Step 5 Run the disk delete-data-partitions EXEC command and restart the system.
• From the CLI, a message is displayed to run the disk delete-data-partitions EXEC command and
restart the system.
• The WAAS Central Manager does not display this message.
Note After the upgrade, You must run the disk delete-data-partitions command to enable Akamai
Connect.
Note The disk delete-data-partitions command deletes all data partitions on all logical drives,
including CONTENT, PRINTSPOOL, and SYSFS partitions. These partitions include all DRE
and SMB object cache files, SYSFS and print spool files. New partitions are created at system
restart.
Task Section
1. Confirm that your WAAS • Supported WAAS Platforms for Akamai Connect
configuration has all requisite
• Prerequisites for WAAS with Akamai Connect
components to work with Akamai
Connect.
2. Enable Akamai Connect. • Enabling Akamai Connect
3. Register and activate Akamai • Activating the Akamai Connect License
Connect.
4. Enable Akamai Connected Cache. • Enabling Akamai Connected Cache
5. (Optional) Enable OTT caching. • Enabling OTT Caching
6. (If needed) De-register and • Deregistering and Reregistering a WAAS Device
re-register a WAAS device.
7. (If needed) Replace an expired • Replacing an Inactive or Expired Akamai Connect
Akamai Connect license. License
8. Set one caching policy for all sites. • Caching Types and Setting Caching Policies
9. Set an individual caching policy for • Caching Types and Setting Caching Policies
specific sites.
10. Set Force IMS policies. • Cisco Cloud Web Security and Force IMS Features
11. Configure cache prepositioning • Configuring Cache Prepositioning for Akamai Connect
12. View cache prepositioning status. • Viewing Cache Prepositioning Task Status
13. (Optional) Copy cache • Copying Cache Prepositioning Tasks
prepositioning tasks.
14. (Optional) Configure HTTP/S • Configuring HTTP/S Preposition Proxy for Akamai
preposition proxy. Connect
15. View Akamai Connected Cache • Akamai Connected Cache Charts in Chapter 15,
Statistics. “Monitoring Your WAAS Network”
16. (If needed) Set up HTTP proxy • Using HTTP Proxy for Connections to the Akamai
connections to the Akamai network. Network
If the WAAS devices cannot go direct to the Internet, you can configure them to use the WAAS
Central Manager as a proxy.
Note The Akamai Connected Cache feature will stop functioning if WAAS loses communication
with the AMG for more than 48 hours.
Step 1 From the WAAS Central Manager menu, from either the Device Groups or Devices tab, choose
Configure > Caching > Akamai Connect.
The Akamai Connect window appears, with two tabs: Cache Settings and Cache Prepositioning.
Step 2 Choose the Cache Settings tab.
Note If you are configuring the Akamai Connect feature for a device group, the device group should
have only devices that support Akamai Connect. For more information, see Supported WAAS
Platforms for Akamai Connect.
Step 3 Check the Enable Akamai Connect check box to turn on the Akamai Connect Cache Engine. When the
End-User License Agreement (EULA) dialog box appears, click Accept.
Step 4 Click Submit.
Note When you create settings for the first time, either at the device or the group level, the Akamai
license upload file is displayed, and you can select the license file supplied and click Submit.
For more information on activating the Akamai Connect license, see Activating the Akamai
Connect License.
Note Turning on the Cache Engine starts active caching in Standard mode. If you want Advanced or
Bypass mode, you must specify it. This step is described in Setting Caching Policies.
Step 5 Continue to Edit Settings screen section, described in , or Advanced Cached Settings screen section,
described in .
Note To edit any settings, including advanced settings and cache preposition, the Akamai Connect
feature must remain enabled.
Note For information on the status of an active Akamai Connect license, see Akamai Connect Diagnostics
Using the Central Manager in Chapter 16, “Troubleshooting Your WAAS Network.”
To receive and activate the Akami Connect activation file, follow these steps:
Step 1 Purchase a license for Akamai Connect from your Cisco account representative or reseller.
Step 2 The account representative or reseller enters the order into the Cisco Commerce Workspace (CCW)
system. The order must specify an email address for eDelivery of the Activation file.
Step 3 CCW contacts the Akamai Luna Portal to request a license or licenses for the number and type of Akamai
licenses entered.
Step 4 Akamai generates and sends the license(s) to the CCW system in the form of a single activation file.
Step 5 The CCW system sends an email, with the activation file attached, to the email address specified in the
order. The order of priority for selecting the email address in a CCW order is::
• Priority1: eDelivery email address
• Priority2: end customer email address
• Priority3: shipping contact email address
Note If you do not provide an email address in your order, you will not receive an activation file.
Step 6 Enable Akamai Caching on each WAE. There are two paths available to reach the Akamai Connect
screen. You can use either one to enable Akamai Connect to use any of the transparent caching methods,
Akamai Connected Cache, or OTT. If this is the first time you are navigating to the Akamai Connect
screen, you will be prompted to provide the activation file for licensing.
• From the WAAS Central Manager choose Device/Device Group > Configure > Caching >
Akamai Connect.
OR
• From the WAAS Central Manager choose Home > Admin > Licenses > Akamai Connect. This
path can be used later to add more licenses, if needed.
Note The activation process for WAAS devices may take between 15-60 minutes to complete, and for this time
period, the Connectivity to Akamai status displays as Activating. During this time, device(s) may not
be able to communicate with the Akamai Network, because they are not recognized by the AMGs until
the activation process is complete, and the Connectivity to Akamai status displays as Connected.
Step 11 For the last steps in the registration process, Luna sends the Connected Cache credentials to the AMG
and to the Edge Servers on the Akamai Grid network. The AMG forwards Connected Cache credentials
on to WAAS. With the Connected Cache credentials on both WAAS and the Edge Servers, the Connected
Cache is enabled, and caching requests can be served by the Edge servers. This authenticated connection
can then service requests for Connected Cache and OTT caching from the Akamai Grid network Edge
Servers.
Step 12 The registration of each WAE begins. The WAAS Central Manager provides information to the Akamai
Luna Portal for each device that will be running Akamai Connect.
Note Connected Operational Status can take several minutes to complete. Rollout of the activation to
the Edge servers can take up to 45 minutes to complete. A device may take from a few minutes
to up to two hours to show an Active Activation Status, depending on when the request was
made, traffic conditions, and other variables.
Step 13 Each WAE that has been sent the entitlement code will try to make an SSL connection to the AMG using
amg.terra.akamai.com. The Luna Portal will push out the Akamai Connected Cache credentials to the
AMG and Akamai Grid Network (to the Akamai Edge Servers).
• The AMG will push the Akamai Connected Cache credentials out to each of the WAEs that are
configured for Akamai Connected Cache. If OTT is enabled, the OTT metadata needed to help
cache YouTube objects is also processed at this time.
• The Akamai Connected Cache credentials are sent by the WAE Cache Engine when going to the
origin server. If the WAE Cache Engine has valid credentials according to the Akamai Edge
Server, the Akamai Edge Server then provides objects to the WAE Cache Engine that are not
normally cacheable to other devices.
Step 14 The WAE Cache Engine will request new credentials daily and will be good for two days. The
connections are always established from WAE or WAAS Central Manager over TCP 443 to the AMG.
• For security, firewalls are usually deployed by performing statefull insepction on traffic from
within the company to the outside. They are also configured to block unknown traffic from the
outside to the inside. Since connection should not initiate from AMG to any WAAS Central
Manager or WAE at any time, there should not be an issue. If there is, then a hole will need to
be made to allow the WAAS Central Manager or WAE to speak to any device on port 443.
Note The Devices listing on the All Devices screen includes a column titled Akamai Connect, which
shows the status of each device: Active, Not Supported, Connected, Disconnected.
Step 15 As needed, configure HTTP proxy or external HTTP proxy, as described in Using HTTP Proxy for
Connections to the Akamai Network.
• If no device group is configured with Akamai Connect/HTTP cache settings, the registration is done
individually.
After the device is registered, it will get a new entitlement key.
Step 1 When a license is inactive or expired, a notification is displayed in one of two WAAS Central Manager
screens:
• At the Home > Admin > Licenses > Akamai Connect screen: “Akamai Connect License is
Inactive. Please remoeve current license and import valid license.”
• At the Home > Monitor > Troubleshoot > Akamai Diagnostics screen: “Akamai Connect
License is Inactive. Please remove existing license and import new one using Akamai License
page.”
Step 2 Remove the inactive or expired license.
Step 3 To upload a new license file, at the Home > Admin > Licenses > Akamai Connect screen, click Choose
File to browse to the new license file and click Upload.
Step 4 If you import an expired license, you will see the message: “Unable to communicate to Akamai server (Error:
License is inactive or expired). See Central Manager log file for detailed error information.”
Step 5 To obtain a new license, contact your Cisco account representative or reseller.
Step 1 To enable Akamai caching, check the Akamai Connected Cache check box. The default is enabled.
When you enable Akamai connected cache, it is enabled for all suitable Akamaized content.
Step 2 Click Submit.
Step 3 After you enable Akamai Connected Cache, you can set a caching policy for all sites, or an individual
caching policy for specific sites, as described in Setting Caching Policies.
Step 4 After you enable Akamai Connected Cache, you can configure cache prepositioning, as described in
Configuring Cache Prepositioning for Akamai Connect.
Note OTT is disabled by default, but enabled after HTTP application accelerator object cache is enabled. For
how to enable or disable OTT, see Procedure for Enabling OTT Caching.
If the dynamic ID associated with the video has changed, the video will be served from the origin,
and this will result in a miss. A new cache key is generated for that ID and is then stored.
Step 1 To enable Over the Top (OTT) caching, check the Over the Top Cache check box. In the initial release,
OTT caching applies only to YouTube.
Step 2 Click Submit or continue to Advanced Cache Settings. For more information on Advanced Cache
Settings, see Advanced Mode.
Note For Cisco WAAS with Akamai Connect, the terms Mode, Profile, and Policy are defined as follows:
Profile—The set of host rules and caching types applied as a group, and which follows the Cache Engine
order of precedence.
Policy—The set of rules and the conditions of caching, applied either individually or as a group, to a
device or device group.
Transparent Caching
This section contains the following topics:
• Overview of Transparent Caching
• Four Modes of Transparent Caching
Note When accessing transparent caching via HTTPS, the default caching mode is Basic mode. This ensures
that no sensitive content is accidentally cached (in Basic mode, only content that you explicitly mark is
cached). If you want content cached in a different mode with HTTPS, create a host rule that matches the
HTTPS server location. For more information on creating a host rule, see Setting Caching Policies.
Basic Mode
In Basic mode, the Cache Engine works in strict RFC-2616 behavior, and therefore, only caches
responses that are marked explicitly as cacheable with Cache-Control Headers or that have an Expire
header - to service and accelerate traffic from a datacenter to a branch office over any type of IP network.
Caching is only in the branch or local router, and content can be cached from the Internet regardless of
the location of the original source.
In Standard mode (default), the Cache Engine also follows RFC-2616 behavior for cache control
headers, but with the following differences from Basic mode:
• In Standard mode, the Cache Engine does not honor client cache override behavior, for example,
must-revalidate and proxy-revalidate.
• If cache-control or expire headers are not present, and Last Modified Time appears, the Cache
Engine performs a heuristic based on the Last Modified Time and stores objects for 10 percent of
their apparent age, up to a maximum of one day.
Caution A properly configured website will work with Standard mode, but login pages, cookie setting
pages, or dynamic content not properly marked as cacheable may break. We recommend that
you test the website; this is especially important for a newly-created website or one that does
not have many users.
Advanced Mode
In Advanced mode, the Cache Engine caches media types more aggressively, and caches all object types
for longer times (when there is no explicit expiration time). Most of the benefits of Advanced mode over
Standard mode occur if the website has not already marked cacheable media content properly. Advanced
mode is best suited for media-rich Intranet sites.
If cache-control or expire headers are not present and Last Modified Time appears, the Cache Engine
performs a heuristic based on the Last Modified Time and stores objects for 20 percent of their apparent
age, up to a maximum of one day.
For certain media file types, listed in Table 13-6, Advanced Mode will cache these for a full day if the
media type is not specified as uncacheable or the media type has no obvious age in the request. For all
other media types, the system caches the object for a minimum of one hour to a maximum of seven days
- regardless of whether the Last Modified Time is present.
Table 13-6 Advanced Mode: Media types that may be cached for a full day
Advanced Mode: Media types that may be cached for a full day
(if not specified as uncacheable or has no obvious age in the request)
3g2 3gp aac aif aiff asf asx au avi bin bmp
cab carb cct cdf class css dcr doc docx dtd dv
dvd dvr dvr-ms exe flv gcf gff gif grv hdml hqx
ico ini jpeg jpg js m1v m4a midi mov mp3 mp4
mpeg mpg mpv nv pct pdf png ppc ppt pptx pws
qt swa swf tif txt vbs w32 wav wbmp wma wml
wmlc wmls wmlsc wmv xsd xsl xls xlsx zip
Caution A properly configured website will work in Advanced mode, but Advanced mode may break
the presentation of certain web pages if there are even minor caching misconfigurations. We
recommend that you test the performance of this caching mode for your applications before
you bring the Cache Engine into production. When testing, pay particular attention to dynamic
URLs and to content that requires authentication to be presented to a client.
Bypass Mode
In Bypass mode, the Cache Engine turns off caching for one or more configured sites. When Transparent
Bypass mode is set for a particular hostname, the caching for the hostname specified in a rule is
suppressed.
Bypass mode is useful when you want to turn off Akamai Connected Cache or OTT caching for a site or
for a part of a site.
For example, if you have servers of the type images#.bar.com, you can configure a bypass rule so that
only images2.bar.com is excluded from caching. All other images#.bar.com servers will continue to be
cached under the existing rules.
Note When cache prepositioning is turned on, it has the same priority as any other caching type.
Note Akamai Connect determines cache type based on most exact hostname match followed by cache
priorities. www.host.com is more exact than *.host.com. In this scenario, if a lower-priority cache, such
as Akamai Connected Cache (Order of Precedence #2), has a more exact match than a higher priority
cache, such as transparent (Order of Precedence #1), the caching will occur with the more exact match
and lower-priority cache.
Step 1 From Devices or Device Groups, navigate to Configure > Caching > Akamai Connect.
Step 2 Choose the Cache Settings tab.
Step 3 In the Advanced Cache Settings section, at the Default Transparent Caching Policy drop-down list,
choose a caching policy:
• Basic
• Standard (default)
• Advanced
• Bypass
Step 4 To set a default caching policy for all sites, choose a caching policy and click Submit. To enable
transparent caching for a specific site, see Step 5.
Step 5 To enable transparent caching for a specific site, change the Default Transparent Caching Policy to
Bypass.
Step 6 At the Site Specific Transparent Caching Policy section, click Add Hostname/IP. The Site Caching
Policy Task dialog box opens.
a. In the Hostname/IP field, specify the hostname of the site to be configured. The hostname can be a
specific server, or a domain name that contains a wildcard, such as *.cisco.com.
Note When you configure Bypass mode as the site-specific transparent caching policy, you must
specify a complete server name or complete (FQDN) domain name. If you use a wildcard to
specify sites for Bypass mode, the sites will still be optimized via Akamai Cache.
b. At the Transparent Caching Policy drop-down list, select the cache policy for this site: Basic,
Standard, Advanced, or Bypass.
c. Click OK. The new hostname/IP is added as a line item to the Site Specific Transparent Caching
Policy table.
Note The policy you set for a specific site takes precedence over the default caching policy set for all
sites.
You can configure up to 512 hostnames for each site-specific transparent caching policy.
Step 7 Configure Cisco Cloud Web Security (CWS) user policy. For more information see Cisco Cloud Web
Security and Force IMS Features.
Step 8 Configure HTTP Proxy:
• To configure WAAS Central Manager as HTTP proxy, see Using the WAAS Central Manager
as HTTP Proxy
• To configure external HTTP proxy, see Configuring External HTTP Proxy.
Deployment Scenario Deployment Connections WAAS Central Manager WAAS HTTP Cache Engine
to Luna API Servers to Akamai AMG
No HTTP proxy use Direct/ Direct Direct Direct
WAAS Central Direct/ Direct WAAS Central Manager as
Manager as HTTP WAAS Central Manager as HTTP proxy
proxy proxy
External HTTP proxy Direct/ Direct External HTTP proxy
External HTTP proxy
External HTTP proxy External HTTP proxy/ External HTTP proxy Direct
Direct
External HTTP proxy External HTTP proxy/ External HTTP proxy External HTTP proxy
External HTTP proxy
Note WAAS v5.5.1 does not support HTTP proxy user authentication. It is recommended that you restrict
access to proxy using IP address ACLs.
To use the WAAS Central Manager as HTTP proxy, follow these steps:
Step 1 From Devices or Device Groups, navigate to Configure > Caching > Akamai Connect.
Step 2 Choose the Cache Settings tab.
Step 3 Check the Use HTTP proxy for connections to Akamai network check box.
Step 4 At the HTTP Proxy: dropdown list, select Central Manager as HTTP Proxy.
Step 5 Click Submit.
Note HTTP proxy must support HTTP CONNECT for tunneling HTTPS connections.
Step 1 From Devices or Device Groups, navigate to Configure > Caching > Akamai Connect.
Step 2 Check the Use HTTP proxy for connections to Akamai network check box.
Step 3 At the HTTP Proxy: dropdown list, select External HTTP Proxy.
Step 4 Specify a Proxy Host and a Proxy Port:
• Proxy Host field - Enter a hostname or address.
• Proxy Port field- Enter a value between 1-65535.
Note If the WAAS Central Manager is already using an external HTTP proxy, there is no option
displayed to use the WAAS Central Manager as proxy; these fields will display the currently
configured HTTP proxy.
Traffic is transparently proxyed by an ASA or ISR to cloud-based CWS servers (called towers), where
the web traffic is scanned and if deemed acceptable is provided to the origin server. All traffic coming
back is through the CWS tower.
Note For WAAS Version 6.2.1 and later, the CWS feature enforces content filtering by enabling force IMS (If
Modified Since) for every cached object, for both single-sided and dual-sided deployment.
For WAAS Versions earlier than 6.2.1, content filtering is enforced on single-sided deployments.
Note the following considerations when using the Cisco CWS and option:
• CWS can be used only when one WAAS device is present in the path.
• When you enable CWS, the Akamai Cache Engine always adds an “if modified since” header to the
request so that the response needs to go remote to the origin server (in this case, the Scansafe tower)
- so all requests get scanned and no security is bypassed. If a 304 Not Modified is returned, then the
Akamai Cache Engine provides the object from the cache. If a 200 Okay is returned, then the object
is fetched from the origin server.
• If preposition is enabled and is possible that the flow may be redirected to a CWS tower, follow these
recommendations:
– (Preferred choice) configure a white-list on the ISR or CWS tower to bypass the WAE IP
address.
– On the CWS tower, configure a user or group that the WAE will fall into for authentication and
allow it access to all sites on which the preposition is occurring.
To enforce the Cisco CWS user policy, follow these steps:
Step 1 Navigate to Configure > Caching > Akamai Connect > Cache Settings tab.
Step 2 At the Advanced Settings section, check the Force IMS DIA check box to enable CWS user policy
enforcement for content access in case of DIA.
Step 3 At the Advanced Settings section, check the Force IMS Always check box to apply CWS user policy
enforcement for content access in case of all flows.
Step 4 Click Submit.
Note In order for HTTPS content to be prepositioned, you must define an SSL accelerated service; otherwise,
any HTTP requests encountered in the job will fail, although the preposition task will continue and any
objects available via HTTP will be retrieved. For more information on how to define an SSL accelerated
service, see Configuring SSL Acceleration in Chapter 12, “Configuring Application Acceleration.
When a scheduled fetch operation begins or is complete, it is added to the Cache Preposition Status table.
Step 1 From Devices or Device Groups, navigate to Configure > Caching > Akamai Connect.
The Akamai Connect window appears with two tabs: Cache Settings and Cache Prepositioning.
Step 2 Choose the Cache Prepositioning tab. At this tab, you can add, edit, or delete cache prepositioning
tasks, as well as monitor cache preposition task status.
Step 3 (Optional) Check the Preposition with DRE check box to enable DRE for preposition connections. The
default is disabled, to prevent negative impact to the DRE byte cache for data that will be stored at the
object level.
Step 4 Click Add Cache Preposition Task.
The Cache Prepositioning Task dialog box opens.
Step 5 Enter values in the Cache Prepositioning Task dialog box fields, shown in Table 13-7.
Field Description
Name The name of the preposition task. Preposition task name is an alphanumeric
identifier up to 47 characters. Special characters like ‘,/,\,{,},(,),?,”,<,>,[,],&,*,”
are not allowed.
Note the following when specifying a task:
• You can configure up to 10 URLs per task.
• You can configure up to 10 schedules per task.
• You can configure up to 50 tasks per device or device group.
URLs The base URLs for prepositioning. The maximum length for the URL is 900
characters. Characters that are not allowed in the URL are space, double quotes
(“). ASCII characters are allowed in the range of ASCII 33 through ASCII 125.
• Use a space to separate multiple URLs.
• You can configure up to 10 URLs per task.
Include Types The object types to include in caching, such as .jsp or .asp, each separated by a
comma. The list of object name patterns to be included has a total pattern field
limit of 47 characters.
Exclude Types The object types to exclude from caching, such as .jsp or .asp, each separated by
a comma. The list of object name patterns to be excluded has a total pattern field
limit of 47 characters.
Download Rate The maximum download rate, in KBps. Select any value between 0 to 10,000,000
KBps. The default is 20 KBps. A selection of 0 indicates unlimited, or no
enforced rate limiting.
Recursion Depth The depth of the link level at which the content is retrieved. Recursion depth is
active only if you check the Recursive Task check box. Select 1, 2, 3, 5, 8, 13,
or 21 from the drop-down list, or enter any custom value between 1 to 1000. The
default is 1.
Duration The maximum amount of time, in minutes, a preposition task can run before it is
halted. The default is no set duration. To set a duration time, select from a range
of 1 to 2,147,483,647 minutes.
Setting the duration of a task is especially useful to:
• Ensure that preposition tasks do not overlap with each other.
• Ensure that preposition tasks do not overlap with times of higher user traffic.
Field Description
User Agent Provides information on browser and operating system type that servers use to
identify and respond to. The server populates the cache with content that is
dependent in part on the type of user agent used for this cache prepositioning
task.
Enter browser and operating system information, in an alphanumeric string, up
to a maximum of 256 characters.
You can also user the user-agent useragent-name global configuration command
to configure the user agent string
Enable Task Check the Enable Task check box to enable the specified preposition task to run.
For the task to run, you must specify at least one URL and one schedule
(described in Step 5).
Enable Proxy For WAAS Version 6.2.1 and later, you can configure a HTTP/S proxy support
for preposition tasks.
Check the Enable Proxy check box to configure external proxy for this
preposition task. For details on configuring external proxy for a preposition task,
see Configuring HTTP/S Preposition Proxy for Akamai Connect.
Step 6 At the Advanced Settings section of the Cache Prepositioning Task dialog box, you can specify
recursion delay time and recursion hostnames:
Field Description
Recursion Delay The delay time, in seconds, between requests during recursive download. This
Time simulates user wait time. Recursive delay time is necessary because some servers
use the lack of time between requests to detect and restrict web spiders.
• Enter a value between 0 to 600 seconds. The default is 2 seconds.
• A value of zero provides the best performance when there are no web
spider restrictions.
Recursion The list of server domain suffixes for which recursive spidering is permitted. If
Domains the list is empty, then spidering is only permitted within the same domain as the
specified URL.
You can configure up to ten servers:
• The server name is up to 255 characters.
• Server names are separated by comma or space.
Field Description
Schedule Name The name of the schedule for this preposition task. Schedule name is an
alphanumeric identifier up to 256 characters. The Schedule Name allows you to
provide your own representation of a schedule. For example, for a schedule that
occurs each Monday, Wednesday, and Friday at 10:30 a.m. can be named as
Weekly MWF 10:30AM or Every Week - MON-WED-FRI at 10:30AM.
Frequency The specified time for prepositioning: yearly, daily, weekly, or monthly days. If
you choose monthly days, a calendar with check boxes opens for you to check
one, some, or all the days in a month for this schedule.
Start Time From the two drop-down lists, choose the hour and minute at which the task
(HH:MM) schedule should start.
Field Description
Device Name The name of the selected device.
Start Time The date, hour, and minute for the task schedule to start.
End Time The date, hour, and minute for the task schedule to end.
Byte Count The total number of bytes in cache during the most recent preposition task run.
Object Count The total count of objects in cache during the most recent preposition task run.
Refresh Bytes The number of bytes refreshed in cache during the most recent preposition task run.
Refresh Count The count of objects refreshed in cache during the most recent preposition task run.
Store Bytes The number of unmodified bytes for objects found in cache during the most recent
task run.
Store Count The count of unmodified objects found in cache during the most recent task run.
Field Description
Uncacheable The number of bytes of uncacheable objects encountered during the most recent task
Bytes run.
Uncacheable The count of uncacheable objects encountered during the most recent task run.
Count
Status The status of the task, such as Scheduled, Complete, or Error.
Error If the task status is “Error,” an error message describing the task status is
displayed.
Note Cache Preposition Tasks and WAAS versions: You can also use the Copy Tasks feature to copy a
cache preposition task between WAAS Version 5.5.1 devices and device groups and WAAS versions
earlier than Version 5.5.1 devices and device groups.
Step 1 Navigate to Configure > Caching > Akamai Connect > Cache Prepositioning tab > Cache
Prepositioning section.
Step 2 Click the Copy Tasks button.
The Cache Prepositioning Task dialog box opens.
Step 3 At the From drop-down list, select a device or device group as the source.
Step 4 At the next drop-down list, select a device or device group as the destination.
Note If you try to copy a task with the same name between device and device groups, the following
error message is displayed: One or more preposition tasks with the same name already
exists in the destination device/DG.
Step 5 At the Existing Cache Prepositioning Tasks table, select one, some or all of the preposition tasks to be
copied.
Step 6 Click OK.
The selected cache prepositioning tasks are copied from the source to the destination.
Step 1 From the WAAS Central Manager menu, from either the Device Groups or Devices tab, choose
Configure > Caching > Akamai Connect.
The Akamai Connect window appears, with two tabs: Cache Settings and Cache Prepositioning.
Step 2 Choose the Cache Prepositioning tab.
Step 3 In the Proxy Host field, enter the hostname or IP address for the proxy host.
Step 4 In the Proxy Port field, enter the port number. Valid port numbers are 0 to 65535.
Step 5 Click Submit.
Step 6 Create a preposition task, as described in Configuring a Cache Preposition Task.
Step 7 In the Cache Prepositioning Task dialog box, check the Enable Proxy check box.
Step 8 Schedule the task, as described in Steps 7 through 9 of Configuring a Cache Preposition Task.
Step 9 Click Submit.
Step 1 From the WAAS Central Manager menu, from either the Device Groups or Devices tab, choose
Configure > Caching > Akamai Connect.
The Akamai Connect window appears, with two tabs: Cache Settings and Cache Prepositioning.
Step 2 Choose the Cache Prepositioning tab.
Step 3 Select a cache prepositioning task that you have configured as proxy.
Step 4 Modify the particular setting or settings.
Step 5 Check the Enable Task check box.
Step 6 Check the Enable Proxy check box.
Step 7 In the Cache Prepositioning Schedule dialog box, select parameters to reschedule the task.
Step 8 Click OK.
Step 9 In the Cache Prepositioning Task dialog box, click OK.
Step 10 Click Submit.
Step 1 From the WAAS Central Manager menu, from either the Device Groups or Devices tab, choose
Configure > Caching > Akamai Connect.
The Akamai Connect window appears, with two tabs: Cache Settings and Cache Prepositioning.
Step 2 Choose the Cache Prepositioning tab.
Step 3 Select a cache prepositioning task that you have configured as proxy.
Step 4 Check the Enable Task check box.
Step 5 Uncheck the Enable Proxy check box.
Step 6 In the Cache Prepositioning Schedule dialog box, select parameters to reschedule the task.
Step 7 Click OK.
Step 8 In the Cache Prepositioning Task dialog box, click OK.
Step 9 Click Submit.
08/28/2015 12:24:31.448 (fl=27520) 300 134.949 0.000 355 344 3591542 568 172.25.30.4
191.234.4.50 2f25 m-s - - rm-f 200 GET
http://fg.v4.download.windowsupdate.com/d/msdownload/update/software/secu/2013/07/wind
ows8-rt-kb2863725-x64_dd8522e527483cd69bf61d98ee849a2406b97172.psf - -
Example 2:
Example 2 shows a cache hit when a range is requested on an object that is either completely in
cache, or in the process of being downloaded. If it is in the process of being downloaded, then the
main transaction has latched onto a sub-transaction like the one shown in Example 1.
Cisco Support for Microsoft Windows Update and Akamai Cache Engine
Cisco support for Microsoft Windows Update enables Akamai Cache Engine to support Windows
Update caching in two ways:
• Download and cache full objects even when ranges within objects that not in cache are requested.
• Future range requests on the objects can be served out of cache.
There is a limit, set by OTT metadata during the Akamai Connect registration process, from the start of
the object—the number of bytes or the percent of file length—where the download functionality is
triggered. A request of a size above the set limit does not initiate a full object download, and the request
is forwarded to the origin as is.
Caution Cisco Support for Microsoft Windows update is enabled by default, and enabled only for specific sites.
The enabled sites are updated via OTT metadata.
If you want to disable Cisco Support for Microsoft Windows Update, you must disable OTT caching. To
do this, uncheck the Over the Top Cache check box. However, note that unchecking the Over the Top
Cache check box disables all OTT functionality, both global and custom OTT configurations.
For more information on the Akamai Connect registration process, see Activating the Akamai Connect
License.
This chapter describes the tasks that you should perform to maintain your WAAS system.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the Cisco WAAS
Central Managers and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE
refers to WAE and WAVE appliances, Cisco Service-Ready Engine service modules (SRE-SM) running
Cisco WAAS, and Cisco Virtual WAAS (vWAAS) instances.
WAAS Central Manager Version 5.4.1 can manage WAE devices running Version 4.3.1 and later. Some
WAAS Central Manager windows (with new features) are not applicable to WAAS devices that are
running a version lower than 5.4.1. If you modify the configuration in such windows, the configuration
is saved, but it has no effect on the device until the device is upgraded to Version 5.4.1.
Note WAAS Version 5.4 is not supported running in a mixed-version WAAS network, where any WAAS
device is running a software version lower than 4.3.1. If you have WAAS devices running versions earlier
than 4.3.1, you must first upgrade them to Version 4.3.1 (or a later version) before you install version
5.2 on the Central Manager. Do not upgrade any device to a version later than the existing Central
Manager version. After all the devices are upgraded to Version 4.3.1 or a later, you can begin the upgrade
to Version 5.4.1 on the WAAS Central Manager. Directly upgrading a device from Version 4.0, 4.1 or
4.2 to 5.4.1 is not supported.
Note When a SM-SRE device registered to a Central Manager (both running the same software version) is
downgraded to a lower version, the SM-SRE device goes offline. You need to de-register the device from
the Central Manager and reload it twice for the configuration to take effect. Next you need to register
the device to the Central Manager for it to work properly.
Upgrading is supported only from certain older releases to a particular release. If you have a WAAS
device that is running a release from which upgrading to the desired release is not supported, first
upgrade the device to an intermediate supported release and then to the final desired release. For details
on what versions are supported for upgrades, see the Release Note for Cisco Wide Area Application
Services for the software version to which you want to upgrade.
Note Before starting the upgrade, disable WCCP on all WAEs in an AppNav cluster. After upgrade is
complete, confirm the following before you re-enable WCCP.
• The WAEs are up and running.
• The AppNav cluster is re-converged properly.
• All disks are ready (not initializing).
• No alarms on the device.
• The show accelerator command shows all enabled Application Optimizers are healthy.
After you have confirmed that each of these is complete, you can re-enable WCCP.
Installing a software version on a SM-SRE device from a router using IPv6 address is not supported.
To downgrade or roll back the WAAS software to a lower version, first downgrade or roll back the WAE
devices’ version, then the standby Central Manager (if applicable), and finally the primary Central
Manager. For more information about downgrading, see the Release Note for Cisco Wide Area
Application Services.
Note The software version is not upgraded until a software upgrade is successfully completed. If a
software upgrade is in progress, the version number displayed is the base version, not the
upgraded version number.
Alternatively, in the device context, choose Monitor > CLI Commands > Show Commands. Choose
version and click Submit. A secondary window is displayed with the CLI output for the show version
command.
Step 1 Launch your web browser and access the cisco.com website:
http://www.cisco.com/cisco/software/navigator.html
Step 2 Navigate to the Application Networking Services > Wide Area Application Services > Cisco Wide
Area Application Services (WAAS) Software download area.
Step 3 Choose the WAAS software version that you want and download the appropriate software image.
Step 4 Register the location of the software file in the WAAS Central Manager GUI, as described in Specifying
the Location of the Software File in the WAAS Central Manager GUI.
Specifying the Location of the Software File in the WAAS Central Manager GUI
To upgrade your WAAS software, you must first specify the location of the WAAS software file in the
WAAS Central Manager GUI and configure the software file settings.
There are two types of WAAS software files:
• Universal—Includes Central Manager, Application Accelerator, and AppNav Controller
functionality. You can use this type of software file to upgrade a device operating in any mode.
• Accelerator only—Includes Application Accelerator and AppNav Controller functionality only. You
can use this type of software file to upgrade only an Application Accelerator or AppNav Controller
device. If you want to change an Application Accelerator or AppNav Controller to a Central
Manager, you must install the Universal software file, reload the device, change the device mode to
central-manager, and then reload the device again. Additionally, kdump analysis functionality is not
included in the Accelerator only image.
To configure the software file settings form, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Admin > Version Management > Software Update.
Step 2 Click the Create New Software File icon in the taskbar.
The Creating New Software File window appears. (See Figure 14-1.)
Step 3 In the Software File URL field, specify the location of the new WAAS software file as follows:
a. Choose a protocol (http or ftp) from the Software File URL drop-down list.
b. Enter the URL for the .bin software file that you downloaded from Cisco.com. For example, a valid
URL might look like the following:
http://internal.mysite.com/waas/WAAS-xxxx-K9.bin
http://2012:3:3:3::8/waas/WAAS-xxxx-K9.bin
Here, WAAS-xxxx-K9.bin is the name of the software upgrade file. (The filename typically includes
the version number.)
Be sure that the URL identifies the correct type of software image for the devices you want to
upgrade, either Universal or Accelerator only.
If the Central Manager has been configured with an IPV6 address, it can be accessed using
https://[CM ipv6 address]:8443/
Software update configuration with IPv6 address will be filtered in the device /device group level
usage pages for unsupported device models / versions.
Step 4 (Optional) If your server requires user login authentication, enter your username in the Username field
and enter your login password in the Password field. Enter the same password in the Confirm Password
field.
The Software Version and Image Type fields cannot be edited. They are filled in automatically after
you submit the settings and the image is validated.
Step 5 In the Advanced Settings section, check the Auto Reload check box to automatically reload a device
when you upgrade the software. If you do not check this check box, you should manually reload a device
after you upgrade the software on it to complete the upgrade process.
Step 6 (Optional) Enter comments in the Comments field.
Step 7 Click Submit.
The software image file is validated and the Software Version and Image Type fields are filled in with
the appropriate information extracted from the image file.
Caution If your browser is configured to save the username and password for the WAAS Central Manager GUI,
the browser will autopopulate the Username and Password fields in the Creating New Software File
window. You must clear these fields before you click Submit.
The software file that you want to use is now registered with the WAAS Central Manager. When you
perform the software upgrade or downgrade, the URL that you just registered becomes one of the choices
available in the Update Software window.
To reload a device from the CLI, use the reload EXEC command.
Note When you are viewing the list of registered software files, if the Image Type column shows
Unknown for a software file, it indicates that the software file was added under a WAAS version
previous to 4.2.1. These Unknown software files must be resubmitted if you want to use them.
Click the Edit icon next to the file to open the Modifying Software File window, and then click
the Submit button to resubmit the file.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
The Device Dashboard window appears.
Step 2 Verify that the device is not already running the version to which you plan to upgrade.
Step 3 Click the Update link.
The Software Update window appears.
Step 4 Choose the software file URL from the Software Files list by clicking the radio button next to the
corresponding filename.
The list displays only software files with an image type of Universal, because you are upgrading a
Central Manager device. If no such images are available, you must create a software file, as described in
Specifying the Location of the Software File in the WAAS Central Manager GUI.
The WAAS Central Manager may reboot at the conclusion of the upgrade procedure (if Auto Reload is
in the Creating New Software File window), causing you to temporarily lose contact with the device and
the GUI.
Note This procedure is for WAE devices only. WAAS Central Manager devices cannot be upgraded using
device groups.
To upgrade to a more recent WAAS software release on multiple devices, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name.
Step 2 Choose Admin > Versioning > Software Update.
The Software Update for Device Group window appears.
Step 3 Choose the software file URL from the Software File URL list by clicking the radio button next to the
filename. If no images are available, create a software file, as described in Specifying the Location of
the Software File in the WAAS Central Manager GUI.
If you are updating many devices and you want to use a smaller size software file to save network
bandwidth, specify a software file with an image type of Accelerator only, which is smaller than a
Universal image. If you later want to change an Accelerator-only device to a Central Manager, you must
install the Universal software file, reload the device, change the device mode to central-manager, and
then reload the device again.
Step 4 Click Submit.
To view the progress of an upgrade, go to the All Devices window (Devices > All Devices) and view the
software upgrade status message in the Software Version column. These intermediate messages are also
written to the system log on WAAS devices. See Table 14-2 for a description of the upgrade status
messages.
Note Performing a database backup of the former Central Manager and restoring it on the new device prevents
it from being used as a WAE later.
To upgrade to a new Central Manager and convert an existing Central Manager to a WAE, follow these
steps:
Step 1 Add a hardware device as the new Central Manager and configure it as a standby Central Manager. There
might be multiple standby Central Managers in the system. For more information, see Configuring the
Central Manager Role.
Step 2 Enable the new hardware device to be the primary Central Manager after it is available online and has
finished synchronizing with other systems. For more information, see Converting a Standby Central
Manager to a Primary Central Manager
Step 3 Disable CMS service and execute the cms deregister command at the former Central Manager CLI
interface to remove it from the CM database. If there is no connectivity between the devices anymore,
use the cms deregister force command and manually delete the former Central Manager in the new
Central Manager GUI.
wae# cms deregister force
Deregistering WAE device from Central Manager will result in loss of data on encrypted
file systems, imported certificate/private keys for SSL service and wafs preposition
credentials. If secure store is initialized and open, clear secure store and wait for one
datafeed poll rate to retain wafs preposition credentails.
Do you really want to continue (yes|no) [no]?yes Disabling management service.
management services stopped
Sending de-registration request to CM
Failed to contact CM(Unmarshaled: 9001). Please check connectivity with CM device and
status of management service on CM.
Device de-regsitration failed, removing device registration information.
Please delete the device record on the Central Manager.
Removing cms database tables.
Re-initializing SSL managed store and restarting SSL accelerator.Deregistration complete.
Save current cli configuration using 'copy running-config startup-config' command because
CMS service has been disabled.
#
Step 4 Rename the former Central Manager, change the IP address, change its mode using the device mode
command, and reload using the reload command:
wae# configure
wae(config)# device mode application-accelerator
The new configuration will take effect after reload.
wae# reload
Step 5 Rename the new primary Central Manager and change its IP address to fully replace the former one.
Otherwise, you will need to update the configuration of your devices to point to the new address of the
Central Manager. Contact a Cisco TAC member for scripts.
wae(config)# hostname old primary central-manager name
wae(config-if)# ip address ipaddress netmask.
Note You may want to wait a few days before removing a software file in the event that you may have to
downgrade your system for any reason.
Step 1 From the WAAS Central Manager menu, choose Admin > Version Management > Software Update.
Step 2 Click the Edit icon next to the software file that you want to delete. The Modifying Software File
window appears.
Step 3 Click the Trash icon in the taskbar.
You are prompted to confirm your decision to delete the software file.
Step 4 Click OK.
The selected software file is removed from the WAAS network.
To back up the CMS database for the WAAS Central Manager, use the cms database backup EXEC
command. For database backups, specify the location, password, and user ID of the remote server that
you want to store the backup file in. If you want to back up only the configuration information, use the
cms database backup config EXEC command.
Note If you have already performed a backup when the secure store was in user-passphrase mode and you
restored it to a system where the secure store is in auto-passphrase mode, you must enter the user
passphrase to proceed with the restore. After the restore, the system is in user-passphrase mode. If you
already performed a backup when the secure store was in auto-passphrase mode and you restored it to a
system where the secure store is in user-passphrase mode, you do not have to enter a password. After the
restore, the system is in auto-passphrase mode.
Step 1 On the WAAS Central Manager GUI, use the cms database backup command to back up the CMS
database to a file, as shown in the following example:
CM# cms database backup
Creating database backup file backup/cms-db-11-05-2010-15-22_4.3.1.0.1.dump
Backup file backup/cms-db-11-05-2010-15-22_4.3.1.0.1 is ready.
Please use `copy' commands to move the backup file to a remote host.
Step 2 Save the file to a remote server by using the copy disk ftp command. This command copies the file from
a local disk to a remote FTP server.
CM# cd /local1/backup
CM# copy disk ftp 10.86.32.82 /incoming cms-db-7-22-2008-17-36_4.1.3.0.1.dump
cms-db-7-22-2008-17-36_4.1.3.0.1.dump
Note Stopping the CMS service disables the WAAS Central Manager GUI. All the users who are
currently logged in to this GUI are automatically logged out after the CMS service is
disabled.
Note After the restore, any WAEs that were registered with the Central Manager during the time
since the backup was created will be disconnected from the Central Manager because there
is no information about them in the backup file. To bring these WAEs online, you must
deregister and reregister them with the Central Manager. On each WAE that was
disconnected, use the following commands:
WAE# cms deregister force
WAE# configure
WAE(config)# cms enable
Note If you want to upgrade the Central Manager to a newer model, backing up the former Central Manager’s
database and restoring it on the new device prevents it from being used as a WAE later. For more
information, see the Upgrading Central Manager to New Hardware and Converting an Existing Central
Manager to a WAE.
Note The backup and restore methods described in this section apply only to a WAE device that is not
configured as a WAAS Central Manager. For information on backing up the WAAS Central Manager
device, see Backing Up and Restoring the WAAS Central Manager Database.
You can use either of the following methods to back up and restore the database of an individual WAE
device:WAE Device Manager.
• CLI—Use the copy running-config command to back up and restore a device’s configuration. This
command saves the currently running configuration.
Additionally, you can restore a WAE to the default configuration that it was manufactured with at any
time by removing the user data from the disk and Flash memory, and erasing all the existing files cached
on the appliance. Basic configuration information, such as network settings, can be preserved. The
appliance is accessible through Telnet and Secure Shell (SSH) after it reboots.
Note If software upgrades have been applied, the restoration process returns to the defaults of the currently
installed version and not the factory defaults.
To restore a WAE to its factory defaults or the defaults of the current configuration from the CLI, use the
restore factory-default [preserve basic-config] EXEC command.
For more information about the CLI commands, see the Cisco Wide Area Application Services Command
Reference Guide.
Caution If you upgraded your software after you received your software recovery CD-ROM or image files, using
the recovery software images may downgrade your system. Ensure that you are using the desired
software recovery version.
The .sysimg component is provided for recovery purposes and allows for repair of flash memory
only without modifying the disk contents.
Note The system image that is used depends on your device. For all WAVE devices (64-bit platforms),
use the 64-bit system image (with “x86_64” in its name). For all other devices, use the 32-bit
system image named without this designator.
A Network Processing Engine (NPE) image that has the disk encryption feature disabled for use
in countries where disk encryption is not permitted, is provided.
If you have a WAVE appliance that requires a USB flash drive for software recovery, your USB flash
drive must contain both of the needed software images in the form of an ISO archive file that you copy
to the flash drive. (See Preparing the USB Flash Drive).
These options are available from the software recovery installer menu:
• Option 1: Configure Network—If the .bin image you need to install is located on the network instead
of the CD-ROM or USB flash drive (which may be the case when an older CD-ROM or USB image
is used to install new software), then you must choose this option to configure the network before
attempting to install the .bin image.
This option is performed automatically if you install a .sysimg file from the network.
• Option 2: Manufacture Flash—This option verifies the flash memory and, if invalid, automatically
reformats it to contain a Cisco standard layout. If reformatting is required, a new cookie is installed
automatically.
This option is performed automatically as part of a .bin or .sysimg installation.
• Option 3: Install Flash Cookie—This option generates a hardware-specific platform cookie and
installs it in flash memory. Use this option only if there has been a change in the hardware
components, such as replacing the motherboard, or if you moved a flash memory card between
systems.
This option is performed automatically during the flash manufacturing process, if needed, as part of
a .bin or .sysimg installation.
• Option 4: Install Flash Image from Network and Option 5: Install Flash Image from
USB/CD-ROM —These options allow installation of only the flash memory .sysimg and do not
modify disk contents. They can be used when a new chassis has been provided and populated with
a customer’s old disks that need to be preserved.
These options automatically perform flash verification and hardware cookie installation, if required.
When installing from the network, you are prompted to configure the network if you have not
already done so.
• Option 6: Install Flash Image from Disk—This option is reserved for future expansion and is not
available.
• Option 7: Re-create RAID device—This option applies only to WAVE-7541, WAVE-7571, and
WAVE-8541 devices and re-creates the RAID array.
• Option 8: Wipe Out Disks and Install .bin Image—This option provides the preferred procedure for
installing the WAAS software.
Caution Option 8 erases the content from the all disk drives in your device.
a. Checks that flash memory is formatted to Cisco specifications. If yes, the system continues to
step b. If no, the system reformats the flash memory, which installs the Cisco file system, and
generates and installs a platform-specific cookie for the hardware.
b. Erases data from all drives.
c. Re-manufactures the default Cisco file system layout on the disk.
d. Installs the flash memory component from the .bin image.
e. Installs the disk component from the .bin image.
• Option 9: Exit (reboot)—This option ejects the CD-ROM (if applicable) and reboots the device. If
you are using a USB flash drive for software installation, remove it from the device before rebooting.
The following sections describe how to reinstall the WAAS system software:
• Preparing the USB Flash Drive—Read this section if you have a WAVE appliance that requires a
USB flash drive instead of a CD to install the system software.
• Reinstalling the System Software—Describes how to reinstall the system software from a CD or
USB flash drive.
• Ensuring that RAID Pairs Rebuild Successfully—Describes how to ensure that RAID disks rebuild
successfully.
Step 1 Transfer the software recovery files on to the computer, noting the directory in which they are stored.
Step 2 Insert the USB flash drive into a USB port on the computer.
Step 3 Open My Computer (Windows) or Disk Utility (MAC).
Step 4 Format the USB flash drive:
• For Windows, right click the Removable Disk (drive letter will vary with system) and select
Format.
– In the formatting tool, from the File System drop-down list, select FAT32.
– In the Format Options sections, check the Quick Format check box, and then click Start.
To continue reinstalling the system software from the prepared USB flash drive, follow the instructions
in Reinstalling the System Software.
Step 1 Connect a serial console to the WAAS appliance and use the console for the following steps.
Step 2 Insert the software recovery CD-ROM in the CD drive of the WAE device or, if the device uses a USB
flash drive for recovery, insert a bootable USB flash drive with the software recovery files into the USB
port of the device (see Preparing the USB Flash Drive). WAVE-294/594/694/7541/7571/8541 devices do
not have CD drives; they use a USB flash drive for software recovery.
Step 3 Reboot the WAE. During the boot process, the boot loader pauses for 30 seconds and you must choose
the VGA console if you are using vWAAS. The prompt is displayed as follows:
Type "serial" for WAE/WAVE appliance.
Type "vga" for vWAAS.
boot:
Enter the vga command at the prompt to continue the boot process for the VGA console on vWAAS.
After 30 seconds with no input, the boot process continues with the standard serial console for WAAS
appliances.
After the WAE boots, you will see the following:
Installer Main Menu:
1. Configure Network
2. Manufacture flash
3. Install flash cookie
4. Install flash image from network
5. Install flash image from usb/cdrom
6. Install flash image from disk
Note The option numbers in the installer main menu may vary, depending on the WAAS software
release being installed.
To reinstall the system software on an NME-WAE network module installed in a Cisco access router,
follow these steps:
Step 1 Log in to the Cisco router in which the NME-WAE module is installed, and reload the NME-WAE
module:
router-2851> enable
router-2851# service-module integrated-Service-Engine 1/0 reload
Step 3 While the module is loading, you will see the following option during boot phase 3. Enter *** as
instructed:
[BOOT-PHASE3]: enter `***' for rescue image: ***
Step 4 The Rescue Image dialog is displayed. The following example shows how to interact with the Rescue
Image dialog box (user input is denoted by entries in bold typeface):
This is the rescue image. The purpose of this software is to let
you install a new system image onto your system's boot flash
device. This software has been invoked either manually
(if you entered `***' to the bootloader prompt) or has been
invoked by the bootloader if it discovered that your system image
in flash had been corrupted.
Please enter the IP address for the FTP server where you wish
to obtain the new system image:
[Enter Server IP Address]: 10.107.193.240
Please enter the directory containing the image file on the FTP server:
[Enter Directory on server (e.g. /)]: /
Please enter the file name of the system image file on the FTP server:
[Enter Filename on server]: WAAS-5.1.1.10-K9.sysimg
Current config:
IP Address: 10.1.13.2
Netmask: 255.255.255.240
Gateway Address: 10.1.13.1
Server Address: 10.107.193.240
Username: username
Password: *********
Image directory: /
Image filename: WAAS-5.1.1.10-K9.sysimg
Attempting download...
Downloaded 15821824 byte image file
A new system image has been downloaded.
You should write it to flash at this time.
Please enter 'yes' below to indicate that this is what you want to do:
[Enter confirmation ('yes' or 'no')]: yes
Ok, writing new image to flash
.................................................................................. done.
Finished writing image to flash.
Enter 'reboot' to reboot, or 'again' to download and install a new image:
[Enter reboot confirmation ('reboot' or 'again')]: reboot
Restarting system.
Step 5 After the module reboots, install the .bin image from an HTTP server:
NM-WAE-1# copy http install 10.77.156.3 /waas WAAS-5.1.1.10-k9.bin
After the module reboots, it runs the newly installed WAAS software.
Caution You must ensure that all the RAID pairs have completed rebuilding before you reboot your WAE device.
If you reboot while the device is still rebuilding, you risk corrupting the file system.
RAID pairs will rebuild on the next reboot after you use the restore factory-default command, replace
or add a hard disk drive, delete disk partitions, or reinstall WAAS from the booted recovery CD-ROM
or USB flash drive.
To view the status of the drives and check if the RAID pairs are in “NORMAL OPERATION” or in
“REBUILDING” status, use the show disk details EXEC command. When you see that RAID is
rebuilding, you must let it complete that rebuild process. This rebuild process can take several hours.
If you do not wait for the RAID pairs to complete the rebuild process before you reboot the device, you
may see the following symptoms indicating a problem:
• The device is offline in the Central Manager GUI.
• CMS cannot be loaded.
• Error message stating that the file system is read-only is displayed.
The syslog contains errors such as:
—Aborting journal on device md2
—Journal commit I/O error
—Journal has aborted
—ext3_readdir: bad entry in directory
• Other unusual behaviors related to disk operations or the inability to perform them are visible.
If you encounter any of these symptoms, reboot the WAE device and wait until the RAID rebuild finishes
normally.
Note The system image used depends on your device. For all WAVE and WAE devices (64-bit
platforms), use the 64-bit system image (with “x86_64” in its name). For all other devices, use
the 32-bit system image named without this designator.
An NPE image that has the disk encryption feature disabled for use in countries where disk
encryption is not permitted is provided.
To install a new system image using the rescue image, follow these steps:
Step 1 Download the system image file (*.sysimg) to a host that is running an FTP server.
Step 2 Establish a console connection to the WAAS device and open a terminal session.
Step 3 Reboot the device by toggling the power on/off switch.
After a few seconds, the bootloader pauses and prompts you to enter 1 to boot WAAS, r to boot the rescue
image, x to reboot, or 9 to escape to the loader prompt. You have 10 seconds to respond before the normal
boot process continues.
Step 4 Enter r to boot the rescue image.
The Rescue Image dialog box is displayed and differs depending on whether your WAAS device was
initially manufactured with Version 4.x or 5.x. Step 5 describes the rescue image on a device that was
initially manufactured with Version 5.x. Step 6 describes the rescue image on a device that was initially
manufactured with Version 4.x.
Step 5 If you see the following output (from a device that was initially manufactured with Version 5.x), log in
and use the copy install command to install the WAAS system software image (.bin file), as shown in
the following example (user input is denoted by entries in bold typeface):
The device is running WAAS rescue image. WAAS functionality is unavailable
in a rescue image. If the rescue image was loaded by accident, please reload
the device. If the rescue image was loaded intentionally to reinstall WAAS software
please use the following command:
SW up-to-date
...
Username: admin
Password:
System Initialization Finished.
Installing system image to flash... Creating backup of database content before database
upgrade.
The new software will run after you reload.
WAVE# reload
Proceed with reload?[confirm]yes
Shutting down all services, will timeout in 15 minutes.
reload in progress ..Restarting system.
Step 6 If you see the following output (from a device that was initially manufactured with Version 4.x), log in
and install the WAAS system image (.sysimg file), as shown in the following example (user input is
denoted by entries in bold typeface):
This is the rescue image. The purpose of this software is to let
you download and install a new system image onto your system's
boot flash device. This software has been invoked either manually
(if you entered `***' to the bootloader prompt) or has been
invoked by the bootloader if it discovered that your system image
in flash had been corrupted.
Please enter the IP address for the FTP server where you wish
to obtain the new system image:
[Enter Server IP Address]: 172.16.10.10
Please enter the directory containing the image file on the FTP server:
[Enter Directory on server (e.g. /)]: /
Please enter the file name of the system image file on the FTP server:
[Enter Filename on server (e.g. WAAS-x86_64-4.x.x-K9.sysimg)]:
waas-x86_64-5.1.1.12-k9.sysimg
Attempting download...
Step 7 Log in to the device with the username admin. Verify that you are running the correct version by entering
the show version command:
Username: admin
Password:
Note You cannot restore a lost administrator password. You must reset the password, as described in this
procedure.
Step 1 Establish a console connection to the device and open a terminal session.
Step 2 Reboot the device.
While the device is rebooting, watch for the following prompt, and press Enter when you see it:
Cisco WAAS boot:hit RETURN to set boot flags:0009
Step 4 When the device completes the boot sequence, you are prompted to enter the username to access the CLI.
Enter the default administrator username (admin).
Cisco WAE Console
Username: admin
Step 5 When you see the CLI prompt, set the password for the user using the username passwd command in
global configuration mode:
WAE# configure
WAE(config)# username admin passwd
This command invokes interactive password configuration. Follow the CLI prompts.
Step 6 Save the configuration change:
WAE(config)# exit
WAE# write memory
Rebooting is optional. However, we recommend that you reboot to ensure that the boot flags are reset,
and to ensure that subsequent console administrator logins do not bypass the password check.
Note In the WAAS software, the bootflags are reset to 0x0 on every reboot.
Step 1 Mark the failed device as Inactive and Replaceable by completing the following steps:
a. From the Central Manager menu, choose Devices > device-name.
b. Choose device-name > Activation.
c. Uncheck the Activate check box. The window refreshes, displaying a check box for marking the
device as replaceable.
d. Check the Replaceable check box, and click Submit.
Note This check box appears in the GUI only when the device is inactive.
Step 2 If the failed device is configured as a nonoptimizing peer with another device, disable the peer settings
on the other device.
A message is displayed if the failed device is a nonoptimizing peer, indicating that the device is a
nonoptimizing peer. When a device is replaced, its device ID changes and therefore, the nonoptimizing
peer configuration must be updated.
a. From the WAAS Central Manager menu, choose Configure > Global > Peer Settings. The Peer
Settings window for all the devices appears.
b. Click the Edit icon next to the nonoptimizing device identified in the message, which will appear in
red because its peer is unknown. The Peer Settings window for that device appears.
c. Click the Remove Device Settings icon in the taskbar.
d. Click Submit.
Step 3 Configure a system device recovery key as follows:
a. From the WAAS Central Manager menu, choose Configure > Global > System Properties.
b. Click the Edit icon next to the System.device.recovery.key property. The Modifying Config
Property window appears.
c. Enter the password in the Value field, and click Submit. The default password is default.
Step 4 Configure the basic network settings for the new device.
Step 5 Open a Telnet session to the device CLI and enter the cms recover identity keyword EXEC command.
Here, keyword is the device recovery key that you configured in the WAAS Central Manager GUI.
When the WAAS Central Manager receives the recovery request from the WAAS device, it searches its
database for the device record that meets the following criteria:
• The record is inactive and replaceable.
• The record has the same hostname or primary IP address, as given in the recovery request.
If the recovery request matches the device record, then the WAAS Central Manager updates the existing
record and sends the requesting device a registration response. The replaceable state is cleared so that
no other device can assume the same identity. When the WAAS device receives its recovered registration
information, it writes it to file, initializes its database tables, and starts.
Step 6 Enter the following commands to enable the CMS service on the device:
WAE# config
WAE(config)# cms enable
WAE(config)# exit
Note If the removal event (such as, a disk failure or software shutdown) occurs while the RAID array is in the
rebuild process, the RAID removal process may take up to 1 minute to complete. The duration of this
process depends on the size of the disk.
If the WAAS software removes a failed disk during the RAID rebuild process, a RAID rebuild failure
alarm is generated. If you administratively shut down the disk during the RAID rebuild process, a RAID
rebuild abort alarm is generated instead.
When you install a replacement disk, the WAAS software detects the replacement disk and performs
compatibility checks on the disk, initializes the disk by creating partitions, and adds the disk to the
software RAID to start the RAID rebuild process.
If the newly inserted disk has the same disk ID as a disk that was previously marked bad in the same
physical slot, then the disk will not be mounted, and the post-replacement checks, initialization, and
RAID rebuilding will not occur.
A newly installed disk must be of the same type and speed as the old disk and it must meet the following
compatibility requirements:
• If the replacement disk is for disk00, disk02, or disk04 of a RAID pair, the replacement disk must
be the same size as the running disk in the array.
• If the replacement disk is for disk01, disk03, or disk05 of a RAID pair, then the replacement disk
must have the same or greater RAID capacity as the running disk in the array.
Compatibility checks, which are a part of the hot-swap process, check for capacity compatibility.
Incompatibility generates an alarm and aborts the hot-swap process.
To perform disk maintenance, follow these steps:
b. Wait for the disk to be completely shut down before you physically remove the disk from the WAE.
When the RAID removal process is complete, WAAS generates a disk failure alarm and trap. In
addition, a syslog error message is logged.
Note We recommend that you disable the disk error-handling reload option if it is enabled
because it is not necessary to power down the system to remove a disk.
Step 2 Insert a replacement disk into the slot in the WAE. The replacement disk must have a disk ID number
that is different from the disk that it is replacing.
Step 3 Re-enable the disk by running the no disk disk-name diskxx shutdown global configuration command.
Step 1 Enter the disk disk-name diskxx replace command in EXEC mode from the WAAS CLI on the WAE.
Step 2 Verify that the disk drive diskxx is in Defunct state by entering the show disks details command in EXEC
mode. The RAID logical drive is in Critical state at this point.
Step 3 Move the handle on the drive to the open position (perpendicular to the drive).
Step 4 Pull the hot-swap drive assembly from the bay.
Step 5 Wait for one minute and then insert the new drive into the same slot by aligning the replacement drive
assembly with guide rails in the bay and sliding the drive assembly into the bay until it stops. Make sure
that the drive is properly seated in the bay.
Step 6 Close the drive handle.
Step 7 Check the hard disk drive status LED to verify that the hard disk drive is operating correctly. If the amber
hard disk drive status LED for a drive is lit continuously, that drive is faulty and must be replaced. If the
green hard disk drive activity LED is flashing, it means the drive is being accessed.
Note If a disk is shut down using the disk disk-name diskxx replace EXEC command and the same disk is
removed and reinserted, it can be reenabled by using the EXEC command disk disk-name diskxx
enable force. This process is applicable even if the disk is not removed and needs to be re-enabled. This
command is not applicable if a new disk is inserted.
Step 8 Wait for 1 minute and then verify that the replaced disk drive is in the Rebuilding state by using the show
disks details command in EXEC mode.
Note The ServeRAID controller automatically starts the rebuild operation when it detects the removal
and reinsertion of a drive that is a part of the logical RAID drive.
Step 9 Wait until the rebuild operation is complete. You can check if the rebuild operation is complete by using
the show disks details command in EXEC mode. The physical drive state will be Online and the RAID
logical drive state will be Okay after the rebuild operation is completed.
Step 10 Reinstall the software on the device. For more information, refer to Upgrading the WAAS Software
Step 11 Add the license. For more information, refer to Managing Software Licenses in Chapter 10,
“Configuring Other System Settings.”
Step 12 Register the WAE to the WAAS Central Manager.
Step 1 From the global configuration mode, run the disk logical shutdown command to disable the RAID-5
array.
Step 2 Run the write command in EXEC mode to save the running configuration to NV-RAM.
Step 3 Run the reload command in EXEC mode to reload the system.
Step 4 Run the show disks details command in EXEC mode to check the system configuration after the system
is reloaded. At this point, the disks are not mounted and the logical RAID drive should be in the
Shutdown state.
Step 5 Run the disk recreate-raid command in EXEC mode to recreate the RAID-5 array.
Step 6 After successful execution of the disk recreate-raid command, enter global configuration mode and run
the no disk logical shutdown command to disable the logical disk shutdown configuration.
Step 7 Run the write command in EXEC mode to save the configuration to NV-RAM.
Step 8 Run the reload command in EXEC mode to reload the system.
Step 9 Run the show disks details command in EXEC mode to check the system configuration after the system
is reloaded. At this point, the disks should be mounted and the logical RAID drive should not be in the
Shutdown state.
Step 10 Wait until the rebuild operation is complete. You can check if the rebuild operation is complete by
running the show disks details command in EXEC mode. The physical drive state will be Online and
the RAID logical drive state will be Okay after the rebuild operation is completed.
Note Primary and standby Central Managers communicate on port 8443. If your network includes a firewall
between primary and standby Central Managers, you must configure the firewall to allow traffic on port
8443 so that the Central Managers can communicate and stay synchronized.
Step 1 Deregister the WAE from the Central Manager using the cms deregister force command:
WAE# cms deregister force
This command cleans up any previous association to any other Central Manager.
Step 2 Configure the device mode as Central Manager using the device mode command:
WAE# configure
WAE(config)# device mode central-manager
Step 3 You must reload the device to apply the changes. For more information on reloading and rebooting a
device, see Rebooting a Device or Device Group.
Step 4 Configure the Central Manager role as standby using the central-manager role standby command:
WAE(config)# central-manager role standby
Step 5 Configure the address of the primary Central Manager using the central-manager address command:
WAE(config)# central-manager address cm-primary-address
Step 6 Enable the CMS service using the cms enable command:
WAE(config)# cms enable
Step 1 Deregister the Central Manager using the cms deregister command:
WAE# cms deregister
This command cleans up any previous association to any other Central Manager.
Step 2 Configure the Central Manager role as standby using the central-manager role standby command:
WAE# configure
WAE(config)# central-manager role standby
Step 3 Configure the address of the primary Central Manager using the central-manager address command:
Step 4 Enable the CMS service using the cms enable command:
WAE(config)# cms enable
This command changes the role from standby to primary and restarts the management service to
recognize the change.
If a previous failed primary Central Manager becomes available again, you can recover it to make it the
primary Central Manager again. For details, see Central Manager Failover and Recovery.
If you switch a warm standby Central Manager to primary while your primary Central Manager is still
online and active, both Central Managers detect each other, automatically shut themselves down, and
disable management services. The Central Managers are switched to halted, which is automatically
saved in flash memory.
To return halted WAAS Central Managers to an online status, decide which Central Manager should be
the primary device and which should be the standby device. On the primary device, execute the following
CLI commands:
WAE# configure
WAE(config)# central-manager role primary
WAE(config)# cms enable
Caution When you switch a WAAS Central Manager from primary to standby, the configuration on the Central
Manager is erased. The Central Manager, after becoming a standby, will begin replicating its
configuration information from the current primary Central Manager. If standby and primary units are
not synchronized before switching roles, important configuration information can be lost.
Step 1 Ensure that your Central Manager devices are running the same version of WAAS software.
Step 2 Synchronize the physical clocks on both devices so that both the WAAS Central Managers have the same
Coordinated Universal Time (UTC) configured.
Step 3 Ensure that the standby is synchronized with the primary by checking the status of the following items:
a. Check the online status of your devices.
The original standby Central Manager and all currently active devices should be showing as online
in the Central Manager GUI. This step ensures that all other devices know about both Central
Managers.
b. Check the status of recent updates from the primary WAAS Central Manager.
Use the show cms info EXEC command and check the time of the last update. To be current, the
value of the Time of last config-sync field should be between 1 and 5 minutes old. This time range
verifies that the standby WAAS Central Manager has fully replicated the primary WAAS Central
Manager configuration.
If the update time is not current, determine whether or not there is a connectivity problem or if the
primary WAAS Central Manager is down. Fix the problem, if necessary, and wait until the
configuration has replicated, as indicated by the time of the last update.
Step 4 Switch roles in the following order:
a. Switch the original primary to standby mode:
WAE1# configure
WAE1(config)# central-manager role standby
WAE(config)# cms enable
The CMS service is restarted automatically after you configure a role change.
Step 1 Convert a standby Central Manager to be the primary Central Manager, as described in Converting a
Standby Central Manager to a Primary Central Manager.
Step 2 When the failed Central Manager is available again, configure it as a standby Central Manager, as
described in Converting a Primary Central Manager to a Standby Central Manager, beginning with Step
2. Skip Step 1 and do not use the cms deregister command.
Step 3 Switch both the Central Manager roles, as described in Switching Both the Central Manager Roles.
Note In some scenarios, when a Standby Central Manager (SCM) is registered newly with a WAAS Central
Manager that is already managing more than 1000 WAEs, the devices may go off line. To avoid this, in
case of large deployments, we recommend that you register the SCM to the Primary Central Manager
(PCM) at the beginning of the deployment so that in case of an unexpected fail over the SCM takes up
the PCM’s role.
Note When a backup operation is in progress on a SCM that is supporting a PCM managing more than 1000
WAEs, the SCM goes off line, if the backup operation takes more than 10 minutes. Additionally you will
not be able to login to the PCM GUI when a backup operation is in progress.
Note If a WAE is unable to reach the WAAS Central Manager during a reboot, it will do everything except
mount the encrypted partitions. In this state, all traffic will be handled as pass-through. After
communication with the WAAS Central Manager is restored (and the encryption key is obtained), the
encrypted partitions are mounted. There is no loss of cache content.
To enable and disable disk encryption from the Central Manager GUI, choose Devices > device-name,
then choose Configure > Storage > Disk Encryption. To enable disk encryption, check the Enable
check box and click Submit. This check box is unchecked by default. To disable disk encryption,
uncheck the Enable check box and click Submit.
To enable and disable disk encryption from the WAE CLI, use the disk encrypt global configuration
command.
Note If you are using an NPE image, note that the disk encryption feature is disabled in countries where disk
encryption is not permitted.
When you enable or disable disk encryption, the file system is reinitialized during the first subsequent
reboot. Reinitialization may take from ten minutes to several hours, depending on the size of the disk
partitions. During this time, the WAE will be accessible, but it will not provide any service.
If you change the Central Manager IP address, or if you relocate the Central Manager, or replace one
Central Manager with another Central Manager that has not copied over all of the information from the
original Central Manager, and you reload the WAE when disk encryption is enabled, the WAE file system
will not be able to complete the reinitialization process or obtain the encryption key from the Central
Manager.
If the WAE fails to obtain the encryption key, disable disk encryption by using the no disk encrypt
enable global configuration command from the CLI, and reload the WAE. Ensure connectivity to the
Central Manager before you enable disk encryption and reload the WAE. This process will clear the disk
cache.
Note When a standby Central Manager has been in service for at least two times, the datafeed poll rate time
interval (approximately 10 minutes), and has received management updates from the primary Central
Manager, the updates will include the latest version of the encryption key. Failover to the standby in this
situation occurs transparently to the WAE. The datefeed poll rate defines the interval for the WAE to poll
the Central Manager for configuration changes. This interval is 300 seconds by default.
To view the encryption status details, use the show disks details EXEC command. While the file system
is initializing, show disks details displays the following message: “System initialization is not
finished, please wait...” You can also view the disk encryption status, whether it is enabled or
disabled, in the Central Manager GUI’s Device Dashboard window.
If the bad disk drive is a critical disk drive, and the automatic reload feature is enabled, then the WAAS
software marks the disk drive bad and the WAAS device is automatically reloaded. After the WAAS
device is reloaded, a syslog message and an SNMP trap are generated.
Note The automatic reload feature is automatically enabled, but is not configurable on devices running WAAS
Version 4.1.3 and later.
To configure a disk error-handling method using the WAAS Central Manager GUI, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Storage > Disk Error Handling.
The Disk Error Handling Current Settings window appears.
Step 3 The Disk Error Handling Current Settings window has two check boxes:
• Check the Enable check box to enable the window for configuration
• Check the Enable Disk Error Handling Remap. This forces the disks to attempt to remap disk
errors automatically. This is checked (enabled) by default.
Step 4 Click Submit to save the settings.
Limitations
The following limitations for Data Cache Management are applicable:
• If you want to configure data cache management from the WAAS Central Manager GUI, both the
WAAS Central Manager and the devices registered with it need to be running version 6.1.1.
• The device needs to be in Application Accelerator mode to configure Akamai and Object Cache
capability.
• The Central Manager supports mixed mode of devices in different versions. When you configure
Data Cache Management at the Device level, the configurations apply only to the devices running
version 6.1.1 and not to those below version 6.1.1.
• Data Cache Management is not supported on the following hardware platforms - 7541, 7571 and
8541, vWAAS 12K and vWAAS 50K.
To enable data cache management using the WAAS Central Manager GUI, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Storage > Cache Size Management.
The Cache Size Management window appears.
Step 3 Select from the available options.
• Default - Sets the available partition size for Akamai cache and Object cache according to
predefined values.
• Akamai-Object Cache-Equal - Sets the available partition size to 50% each, for both Akamai cache
and Object cache.
• Akamai-weight1- Sets the partition size to 60% for Akamai cache and 40% for Object cache.
• Akamai-weight2 - Sets the partition size to 80% for Akamai cache and 20% for Object cache.
• ObjectCache-weight1 - Sets the partition size to 60% for Object cache and 40% for Akamai cache.
• ObjectCache-weight2 - Sets the partition size to80% for Object cache and 20% for Akamai cache.
Step 4 Click Submit to save the settings.
The data partition is effective only after the device is reloaded.
To enable data cache management the CLI, use the disk cache enable global configuration command.
If you want to view the data cache details go to Devices >device-name (or Device Groups >
device-group-name) > Monitor > CLI Commands > Show Commands and select the show disk
cache-details command. The cache details are displayed for devices that are running version 6.1.1.
Note When you downgrade a device from 6.1.1 to any 5.x.x version, object-cache is no longer valid. As a
result the associated clis are also not visible on the devices.
Step 1 From the WAAS Central Manager menu, choose Devices > All Devices.
The All Devices window appears.
Step 2 Click the Activate all inactive WAEs icon in the taskbar.
The Activate All Inactive WAEs window appears.
Step 3 Choose an existing location for all the inactivated WAAS devices by clicking the Select an existing
location for all inactive WAEs radio button, and then choose a location from the corresponding
drop-down list.
Alternatively, choose to create a new location for each inactive device by clicking the Create a new
location for each inactive WAE radio button. Specify a parent location for all newly created locations
by choosing a location from the Select a parent location for all newly created locations drop-down list.
Step 4 Click Submit.
The inactive WAEs are reactivated and placed in the specified location.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
The device Dashboard appears.
Step 2 Click the Reload icon in the Device Info pane.
You are prompted to confirm your decision.
Step 3 Click OK to confirm that you want to reboot the device.
To reboot a device from the CLI, use the reload EXEC command.
If you reboot a WAAS Central Manager that has the secure store enabled with user-provided passphrase
mode, you must reopen the secure store after the reboot by using the cms secure-store open EXEC
command.
To reboot an entire device group, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Device Groups > device-group-name.
The Modifying Device Group window appears.
Step 2 In the taskbar, click the Reboot All Devices in Device Group icon.
You are prompted to confirm your decision.
Step 3 Click OK to confirm that you want to reboot the device group.
Caution If a controlled shutdown is not performed, the WAAS file system can be corrupted. It also takes longer
to reboot the appliance if it was not properly shut down.
You can perform a controlled shutdown from the CLI by using the shutdown EXEC command. For more
details, see the Cisco Wide Area Application Services Command Reference Guide.
If you are running WAAS on a network module that is installed in a Cisco access router, perform a
controlled shutdown from the router CLI by using the service-module integrated-service-engine
slot/unit shutdown EXEC command. For more details, see the document Configuring Cisco WAAS
Network Modules for Cisco Access Routers.
This chapter describes the monitoring tools available in the Cisco WAAS Central Manager GUI that can
help you monitor activity, configure flow monitoring, and customize reports.
For information on Cisco WAAS system logging and troubleshooting, see Chapter 16, “Troubleshooting
Your WAAS Network” and see the Cisco WAAS Troubleshooting Guide for Release 4.1.3 and Later on
Cisco DocWiki.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central
Manager and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE refers to
WAE and Wide Area Application Virtual Engine (WAVE) appliances, Cisco Service Ready Engine
Service Module (SRE-SM) modules running WAAS, and Cisco Virtual WAAS (vWAAS) instances.
Note For information on viewing the alarm panel and on viewing device alarms, see WAAS Central Manager
Alarm Panel in Chapter 16, “Troubleshooting Your WAAS Network.”
The information displayed in the charts in the System Dashboard window is based on a snapshot of your
WAAS network that represents the state of your WAE devices at the end of every two polling periods.
You can configure the interval between polls in the WAAS Central Manager GUI (Configure > Global >
System Properties > System.monitoring.collectRate). The default polling rate is 300 seconds (5
minutes). Alarms are presented in real time and are independent of the polling rate.
Numbers shown in charts and graphs are rounded to whole units (KB, MB, or GB), while those displayed
in tables are rounded to three decimal places. Data values exported to CSV files are in bytes, and are
therefore, not rounded.
You can customize the graphical displays and tables that are displayed on the system dashboard. For
more information, see Customizing a Dashboard or Report. Individual charts are described in more detail
in WAAS Chart Descriptions.
Much of the device, statistical, and alarm information that is presented in the system dashboard and
associated graphs and charts is also available programmatically through the monitoring API. For more
information, see Cisco Wide Area Application Services API Reference.
Note You must synchronize the clock on each WAE device within 5 minutes of the primary and secondary
WAAS Central Managers for statistics to be consistent and reliable. For information on using an NTP
server to keep all your WAAS devices synchronized, see Configuring NTP Settings in Chapter 10,
“Configuring Other System Settings.” Additionally, if the network delay in the Central Manager
receiving statistical updates from the WAEs is greater than 5 minutes, statistics aggregation may not
operate as expected.
Note For information on how to troubleshoot device alarms, see Troubleshooting Devices Using Alerts in
Chapter 16, “Troubleshooting Your WAAS Network.”
Devices Window
The Devices window lists all the WAAS devices that are registered with the WAAS Central Manager. To
view this list, choose Devices > All Devices in the WAAS Central Manager GUI.
Figure 15-2 shows an example of the Devices window.
Service Description
CM (Primary) The device has been enabled as the primary WAAS Central Manager.
CM (Standby) The device has been enabled as a standby WAAS Central Manager.
Application The device has been enabled as an application accelerator.
Accelerator
AppNav Controller The device has been enabled as an AppNav Controller.
AppNav-XE The device is a router using Cisco IOS XE with the AppNav-XE controller
Controller functionality enabled.
WAAS Express The device is a router using Cisco IOS with the WAAS Express functionality
enabled.
Note After the devices has been registered to the WAAS Central Manager (WCM), a WCM DB VACUUM
(runs between 1 AM – 2 AM) process takes more time (Min:2 min, Avg:7 min, Max:25min) due to the
augmented load on computing resources.
- Some of the WAEs may go temporarily offline. They are online automatically once the VACUUM
process is complete.
- Statistics Aggregation threads may take more than 5 minutes and the same would be indicated in the
logs. As a result statistics samples, might be missing at network level.
- User, including the administrator will not be able to use (login) the WCM as the complete DB will be
locked.
The Device Dashboard window for a WAAS Express or AppNav-XE device looks slightly different. It
lacks some WAE-specific information and controls.
From the Device Dashboard window, you can perform the following tasks:
• View charts and graphs about the application traffic processed by the selected WAE device. (No
charts or graphs are displayed if a WAAS Central Manager device is selected.)
• Customize the charts displayed in the window. For more information, see Customizing a Dashboard
or Report. Individual charts are described in more detail in WAAS Chart Descriptions.
• View basic details, such as whether the device is online, the device’s IP address and hostname, the
software version running on the device, and the amount of memory installed in the device, the
license status, and so forth.
• View the device groups to which the device belongs. For more information about device groups, see
Chapter 3, “Using Device Groups and Device Locations.” (Not available on AppNav-XE devices.)
• View the users that are defined on the device and unlock any locked-out users. For more information,
see Viewing and Unlocking Device Users. (Not available on WAAS Express and AppNav-XE
devices.)
• Click the Update link to update the software on the device. For more information, see Chapter 14,
“Maintaining Your WAAS System.” (Not available on WAAS Express and AppNav-XE devices.)
• Click the Telnet icon to establish a Telnet session into the device and issue CLI commands.
Table 15-3 displays information about each column in the Device Status Dashboard window:
Table 15-3 Column and Field Descriptions for the Device Status Dashboard Window
Taskbar icons and controls across the top of the dashboard or report allow you to do the following:
• Time Frame—Allows you to choose one of the several common time frames from the drop-down
list:
– Last Hour—Displays data for the past hour, in five-minute intervals (default). You can change
the interval using the System.monitoring.collectRate configuration setting described in
Modifying the Default System Configuration Properties in Chapter 10, “Configuring Other
System Settings.”
– Last Day—Displays data for the past day (in hourly intervals).
– Last Week—Displays data for the past week (in daily intervals).
– Last Month—Displays data for the past month (in daily intervals).
– Custom—Enter starting and ending dates in the From and To fields. Click the calendar icon to
choose dates from a pop-up calendar.
The time frame setting is stored individually for each report and Central Manager user. Additionally,
the System.monitoring.timeFrameSettings system property controls the system default time frame
setting (see Modifying the Default System Configuration Properties in Chapter 10, “Configuring
Other System Settings”).
Note If you create a chart with a custom date setting that spans more than two months prior to the
current date, data for the most recent two months are plotted with daily data and data for all the
earlier months are plotted with aggregated monthly data. The chart might appear to have a large
drop in traffic for the most recent two months because the daily traffic totals are likely to be
much smaller than the monthly traffic totals. However, this difference is normal.
• Time Zone—Allows you to choose one of the following options from the Time Zone drop-down list:
– UTC—Sets the time zone of the report to UTC.
– CM Local Time—Sets the time zone of the report to the time zone of the WAAS Central
Manager (default).
When you change the time zone, the change applies globally to all reports. The time zone setting is
stored individually for each Central Manager user.
• Save—Saves the dashboard or report with its current settings. The next time you view it, it is
displayed with these settings.
• Save As—Saves the report with its current settings under a new name. A dialog box allows you to
enter a report name and an optional description. You can enter only the following characters:
numbers, letters, spaces, periods, hyphens, and underscores. The report will be available in the
Monitor > Reports > Reports Central window.
• Customize—Allows you to add a chart or table to a dashboard or report. For information on adding
a chart or table, see Adding a Chart or Table.
• Schedule—Allows you to schedule reports to be generated once, or periodically, such as hourly,
daily, weekly, or monthly. When a scheduled report is generated, you can have a PDF copy of the
report e-mailed to you automatically.
– In the Date field, enter the schedule date in the format DD/MM/YYYY or click the calendar
icon to display a calendar from which to choose the date.
– From the Hours drop-down list, choose the hours. The time represents the local time at the
WAAS Central Manager.
– From the Minutes drop-down list, choose the minutes. The time represents the local time at the
WAAS Central Manager.
– From the Frequency drop-down list, choose Once, Hourly, Daily, Weekly, or Monthly for the
report frequency.
– In the No. of Reports field, enter the number of times that a reoccurring report is to be generated.
(After a report is generated a specified number of times, the report is no longer generated.)
– In the Email Id(s) field, enter the email addresses of the report recipients, separated by commas.
– In the Email Subject field, enter the subject of the email message.
• Reports—Allows you to view the scheduled reports. For instructions about viewing scheduled
reports, see Viewing or Deleting a Scheduled Report.
• PDF—Generates a PDF format of a report, including the charts and table data. If you want a custom
logo in your PDF report, you can upload the logo by choosing Home Dashboard> Admin> Custom
Logo, and clicking Upload. The custom logo is displayed in the PDF format of the report.
Additionally, when you schedule a report, you can select Custom Logo for the logo to appear on the
scheduled report. This option is available only when you have uploaded the custom logo.
• Export—Exports the chart and table statistical data to a CSV file. The statistical data shown in charts
is rounded to whole units (KB, MB, or GB), while the exported data contains exact byte values.
Controls at the top of individual charts allow you to customize the chart as follows (not all controls are
available in every chart):
• Chart title—Allows you to click and drag in order to move the chart to a different location in the
report pane.
• Edit icon—Allows you to edit the chart settings, as described in Configuring Chart Settings.
• Collapse/Expand icon—Allows you to collapse or expand the chart. When a chart is collapsed, this
icon changes to Expand, which restores the chart to its normal size.
• Close icon—Closes the chart.
• Tabs—Allows you to have a choice of multiple tab views that you can access by clicking the desired
tab name. Note that not all charts have this feature.
• Check box to show additional data—Allows you to check the check box labeled with an optional
data statistic to include the data in the chart. Note that not all charts have this feature.
Chart-type icons at the bottom of individual charts allow you to choose the chart type as follows: column
chart, line chart, area chart, stacked line chart, stacked area chart. Note that not all charts have this
feature.
Step 1 From the dashboard or report chart panel, click the Customize icon in the taskbar. The Customize
window is displayed, as shown in Figure 15-6.
Step 2 Expand any of the chart categories by clicking on the small triangle next to the corresponding category.
Step 3 Check the check box next to each chart or table that you want to be displayed as a report. Individual
charts are described in more detail in WAAS Chart Descriptions.
Charts that are currently included in the dashboard or report are marked with an asterisk (*). A report
can contain a maximum of eight charts and tables (the Network Summary report can contain 12 charts
and tables).
Note At the WAAS Express device level, only charts for supported accelerators are available.
Step 4 To preview a chart, click the chart’s title. The preview is displayed on the right of the pane.
Step 5 Click OK.
To delete a chart or table from a dashboard or report, click Close on the chart and save the report.
Step 1 Click the Edit icon in the upper right corner of a chart. The Settings window is displayed.
Note Not all settings are available for all chart types.
Step 2 (Optional) From the Traffic Direction drop-down list, choose one of the following options:
Use these options are to include or exclude single-sided optimization. The single-side statistics
option is available only for the Traffic Summary, Effective WAN capacity, Traffic Volume and
Reduction, Compression Summary, Traffic Summary over time, Compression Summary over time,
Throughput Summary and Optimized Connections Over Time charts.
Step 4 (Optional) From the Select Series For drop-down list, choose one of the following:
• Application—The chart data is based on application statistics.
• Classifier—The chart data is based on classifier (class map) statistics.
Step 5 (Optional) In the Application or Classifier list, check the check box next to the applications or
classifiers whose statistics you want to include in the chart data. To include all the applications, check
the All Traffic check box. You can filter the list items by using the Quick Filter above the list. These
lists are available only for some chart types.
Step 6 (Optional) Some charts have other types of data series from which to choose. Check the check box next
to each of the data series that you want to include in the chart data.
Step 7 Click OK.
Note Data collection for applications and classifiers occurs at slightly different times in the Central Manager.
Therefore, the statistics can be different when viewing the same time period for an application and a
classifier that report similar data.
All charts are created using the Central Manager local time zone, unless the chart settings are customized
to use a different time zone.
Note At the device level for WAAS Express devices, only charts for supported accelerators are available. In
all charts, pass-through traffic for WAAS Express devices is considered as zero.
Compression Summary
The Compression Summary chart displays a bar chart depicting the percentage of traffic reduction
(excluding pass-through traffic) for the top ten applications with the highest percentage of traffic
reduction. Two additional tabs allow you to see the compression of the top ten applications by volume
and the bottom ten applications with the lowest compression.
Formula:
% Reduction Excluding Pass-Through = (Original Excluding Pass-Through – Optimized) / (Original
Excluding Pass-Through)
Formula:
% Reduction = (Original Excluding Pass-Through – Optimized) / (Original Excluding Pass-Through)
Formula:
Effective WAN Capacity = 1 / (1-% Reduction Excluding Pass-Through)
% Reduction Excluding Pass-Through = (Original Excluding Pass-Through – Optimized) / (Original
Excluding Pass-Through)
Throughput Summary
The Throughput Summary chart displays the amount of average and peak throughput for the
LAN-to-WAN (outbound) or WAN-to-LAN (inbound) directions depending on the selected tab. The
throughput units (KBps, MBps, or GBps) at the left side vary depending on the range. The Peak
Throughput series is not applicable for Last Hour graphs. This chart is available only at the device and
location levels. The chart, which is in PDF, displays a maximum of 10 series.
Formula:
% Reduction Excluding Pass-Through = (Original Excluding Pass-Through – Optimized) / (Original
Excluding Pass-Through)
Note The WAN to LAN Throughput and the LAN to WAN Throughput charts for the Last Week and Last
Month time periods do not display peak throughput data until after two days of data have accumulated.
You may see 0 for peak throughput if it has been less than two days since a new WAAS software
installation or upgrade.
Traffic Summary
The Traffic Summary chart displays the top nine applications that have the highest percentage of traffic
as seen by WAAS. Each section in the pie chart represents an application as a percentage of the total
traffic on your network or device. Unclassified, unmonitored, and applications with less than 2 percent
of the total traffic are grouped together into a tenth category named Other Traffic (shown only if it totals
at least 0.1 percent of all traffic). You can choose to display Original traffic or Optimized traffic by
clicking the tab, and you can include pass-through traffic by checking the Include Pass-Through check
box.
Formula:
(App Traffic/ Total Traffic) * 100
App Traffic is the Original traffic (Original Excluding Pass-Through) or Optimized traffic (Optimized
Excluding Pass-Through) flowing for an application.
Formula:
% Reduction Excluding Pass-Through = (Original Excluding Pass-Through – Optimized) / (Original
Excluding Pass-Through)
Acceleration Charts
This section describes these charts:
• HTTP Acceleration Charts
• HTTPS Acceleration Charts
• Secure Sockets Layer (SSL) Acceleration Charts
• Messaging Application Programming Interface (MAPI) Acceleration Charts
• Network File System (NFS) Acceleration Charts
• Server Message Block (SMB) Acceleration Charts
• Independent Computing Architecture (ICA) Acceleration Charts
The HTTP Connection Details chart displays the HTTP session connection statistics, showing the
average number of active HTTP connections per device (at the device level, it shows the exact number
for the last hour.) Click the Details tab to display the newly handled HTTP connections, optimized
connections, dropped connections, and handed off connections over time.
The HTTP Effective WAN Capacity chart displays the effective bandwidth capacity of the WAN link as
a result of HTTP acceleration, as a multiplier of its base capacity. The capacity data for all traffic and
HTTP traffic is shown.
Note If the chart has no data, monitoring may be disabled for the application definition that includes this type
of traffic. Verify that monitoring is enabled for the web application.
The HTTP Estimated Time Savings chart displays a graph of the estimated percentage of the response
time saved by the HTTP accelerator due to SharePoint prefetch optimization and metadata caching.
The HTTP Optimization Count chart displays a graph of the number of different kinds of optimizations
performed by the HTTP accelerator. These optimizations are displayed in different colors. The
optimizations included in this chart are metadata caching and SharePoint prefetch.
The HTTP Optimization Techniques pie chart displays the different kinds of optimizations performed
by the HTTP accelerator. The optimizations included in this chart are metadata caching, suppressed
server compression, SharePoint prefetch, and DRE hinting.
The HTTP Response Time Savings chart displays a graph of the round-trip response time saved by the
HTTP accelerator due to metadata caching and SharePoint prefetch optimizations. These optimizations
are displayed in different colors. The time units (milliseconds, seconds, or minutes) at the left side
depend on the range.
The HTTPS Connection Details chart displays the HTTPS session connection statistics, showing the
average number of active HTTPS connections per device (at the device level, it shows the exact number
for the last hour). Click the Details tab to display the newly handled HTTPS connections and optimized
connections.
The HTTPS Effective WAN Capacity chart displays the effective bandwidth capacity of the WAN link
as a result of HTTP acceleration, as a multiplier of its base capacity. The capacity data for all traffic and
SSL traffic (which includes HTTPS traffic) is shown.
Note If the chart has no data, monitoring may be disabled for the application definition that includes this type
of traffic. Make sure that monitoring is enabled for the SSL application.
The HTTPS Estimated Time Savings chart displays the estimated percentage of response time saved by
using metadata caching for HTTPS connections.
The HTTPS Optimization Count chart displays a graph of the number of different kinds of metadata
caching optimizations performed by the HTTPS accelerator. These optimizations are displayed in
different colors.
The HTTPS Optimization Techniques pie chart displays the different kinds of optimizations performed
by the HTTPS accelerator. The optimizations included in this chart are metadata caching, suppressed
server compression, and DRE hinting.
The HTTPS Response Time Savings chart displays a graph of the round-trip response time saved by the
HTTPS accelerator due to metadata caching optimizations, which are displayed in different colors. The
time units (milliseconds, seconds, or minutes) at the left side depend on the range.
The Secure Sockets Layer (SSL) Acceleration Bypass Reason pie chart displays the reasons because of
which SSL traffic is not accelerated: version mismatch, unknown, nonmatching domain, server name
indication mismatch, cipher mismatch, revocation failure, certificate verification failure, other failure,
and non-SSL traffic.
The SSL Connection Details chart displays the SSL session connection statistics, showing the average
number of active SSL connections per device (at the device level, it shows the exact number for the last
hour). Click the Details tab to display the newly handled SSL connections, optimized connections,
handed-off connections, dropped connections, HTTPS connections, and Independent Computing
Architecture (ICA) connections over SSL.
The SSL Effective WAN Capacity chart displays the effective bandwidth capacity of the WAN link as a
result of SSL acceleration, as a multiplier of its base capacity. The capacity data for all traffic and SSL
traffic is shown.
Note If the chart has no data, monitoring may be disabled for the application definition that includes this type
of traffic. Verify that monitoring is enabled for the SSL application.
The Messaging Application Programming Interface (MAPI) Acceleration Bypass Reason pie chart
displays the reasons because of which encrypted MAPI traffic is not accelerated: acceleration disabled,
secret retriever disabled, unsupported cipher, unsupported authentication mechanism, misconfigured
domain identity, failure in secret retrieval, general security failure, insufficient system resources, and
recovery mode connections.
Click the Non-Encrypted tab to display the bypass reasons for unencrypted MAPI traffic: reservation
failure (non-overload), reservation failure (overload), signed MAPI request, malformed RPC packet,
handover request from peer, unsupported server version, user in denied list, unsupported client version,
secured connections (encrypted), unsupported DCERPC protocol version, association group not tracked,
and other.
The MAPI Average Response Time Saved chart displays a graph of the estimated percentage of response
time saved by the MAPI accelerator. The time units (microseconds, milliseconds, seconds, or minutes)
at the left side depend upon the range.
The MAPI Connection Details chart displays the MAPI session connection statistics, showing the
average number of active MAPI connections per device (at the device level, it shows the exacat number
for the last hour). Click the Details tab to display the newly handled MAPI connections, optimized
connections, handed-off connections, and dropped connections. Click the Optimized Encrypted vs
Non-Encrypted tab to display the new encrypted and unencrypted MAPI connections.
The MAPI Effective WAN Capacity chart displays the effective bandwidth capacity of the WAN link as
a result of MAPI acceleration, as a multiplier of its base capacity. The capacity data for all traffic and
MAPI traffic is shown.
Note If the chart has no data, monitoring may be disabled for the application definition that includes this type
of traffic. Verify that monitoring is enabled for the Email-and-Messaging application.
The MAPI Request Optimization chart displays the percentage of local and remote MAPI command
responses. A local response is a response that is sent to the client from the local WAE. A remote response
comes from the remote server. Click the Encrypted vs Non-Encrypted tab to display the percentage of
local and remote responses for encrypted and unencrypted MAPI connections.
The MAPI Response Time Optimization chart compares the average time used for local and remote
MAPI responses. The time units (microseconds, milliseconds, seconds, or minutes) at the left side
depend upon the range. Click the Encrypted vs Non-Encrypted tab to display the average time used for
local and remote responses for encrypted and unencrypted MAPI connections.
The MAPI Average Accelerated Client Sessions pie chart displays the average number of encrypted
sessions that are accelerated from different versions (2000, 2003, 2007, and 2010) of the Microsoft
Outlook client. Click the Non-Encrypted tab to display the unencrypted session counts.
For WAAS Versions 5.5.3 and later, MAPI Acceleration reports include the MAPI: Handled Traffic
Pattern pie chart. As shown in Figure 15-7, this chart displays the percentage of three types of traffic:
• Total handled MAPI connections
• Total handled MAPI RPC-HTTP connections
• Total handled MAPI RPC-HTTPS connections
The MAPI Connection Details chart displays MAPI session connection statistics, showing the average
number of active MAPI connections per device (at the device level, it shows the exact number for the
last hour). In addition to information on newly handled MAPI connections, optimized connections,
handed-off connections, dropped connections, and optimized vs. non-encrypted MAPI connections,
WAAS Version 5.5.3 and later also provides information on optimized TCP vs. RPC-HTTP(S) MAPI
connections, as shown in Figure 15-8.
The Network File System (NFS) Acceleration Bypass Reason pie chart displays the reasons because of
which NFS traffic is not accelerated: unknown authentication flavor or unknown NFS version.
The NFS Connection Details chart displays the NFS session connection statistics, showing the average
number of active NFS connections per device (at the device level, it shows the exact number for the last
hour). Click the Details tab to display the newly handled NFS connections, optimized connections,
handed-off connections, and dropped connections.
The NFS Effective WAN Capacity chart displays the effective bandwidth capacity of the WAN link as a
result of NFS acceleration, as a multiplier of its base capacity. The capacity data for all traffic and NFS
traffic is shown.
Note If the chart has no data, monitoring may be disabled for the application definition that includes this type
of traffic. Verify that monitoring is enabled for the File-System application.
The NFS Estimated Time Savings chart displays a graph of the estimated percentage of response time
saved by the NFS accelerator.
The NFS Request Optimization chart displays the percentage of local and remote NFS command
responses. A local response is a response that is sent to the client from the local WAE. A remote response
comes from the remote server.
The NFS Response Time Optimization chart compares the average time used for local and remote NFS
responses. The time units (milliseconds, seconds, or minutes) at the left side depend upon the range.
The NFS Versions Detected pie chart displays the number of NFS messages detected for each NFS
version (2, 3, and 4). The NFS accelerator works with NFS Version 3 traffic.
The Server Message Block (SMB) Average Response Time Saved chart displays the average response
time saved for SMB responses. The time units (milliseconds, seconds, or minutes) at the left side depend
upon the range.
The SMB Client Average Throughput chart displays the average client throughput for the SMB
accelerator.
The SMB Connection Details chart displays the SMB session connection statistics, showing the average
number of active SMB connections per device (at the device level, it shows the exact number for the last
hour). Click the Details tab to display the newly handled SMB connections, optimized connections,
handed-off connections, dropped connections, and signed connections.
The SMB Effective WAN Capacity chart displays the effective bandwidth capacity of the WAN link as
a result of SMB acceleration, as a multiplier of its base capacity. The capacity data for all traffic and
SMB traffic is shown.
Note If the chart has no data, monitoring may be disabled for the application definition that includes this type
of traffic.
The SMB Request Optimization chart displays the percentage of SMB command responses that use the
following optimizations: read ahead, metadata, write, and other.
The SMB Response Time Savings chart displays a graph of the round-trip response time saved by the
SMB accelerator due to the following optimizations, which are displayed in different colors: read ahead,
metadata, Microsoft Office, async write, named pipe, print, and other. The time units (milliseconds,
seconds, or minutes) at the left side depend on the range.
The SMB Versions Detected pie chart displays the number of SMB messages detected for each SMB
version:
• SMB v1.0 optimized, SMB v1.0 unoptimized, SMB v1.0 signed.
• SMB v2.0 optimized, SMB v2.0 unoptimized, SMBv 2.0 signed optimized and SMB v2.0 signed
unoptimized.
• SMB v2.1 optimized, SMB v2.1 unoptimized, SMB v2.1 signed optimized, SMB v2.1 signed
unoptimized.
• SMB v3.0 optimized, and SMB v3.0 unoptimized, SMB v3.0 signed, SMBv3.0 Encryption L4
optimized, SMBv3.0 Encryption L7 optimized, SMBv3.0 Encryption unoptimized
• SMBv3.02 optimized, SMB v3.02 unoptimized and SMB v3.02 signed, SMBv3.02 Encryption L4
optimized, SMBv3.02 Encryption L7 optimized, SMBv3.02 Encryption unoptimized
The Indepdendent Computing Architecture (ICA) Client Versions pie chart displays the number of ICA
messages detected for each ICA version: online plugin 11.0, online plugin 11.2, online plugin 12.0,
online plugin 12.1, Citrix Receiver 13.0, and other.
The ICA Connection Details chart displays the ICA session connection statistics, showing the average
number of active ICA connections per device (at the device level, it shows the exact number for the last
hour). Click the Details tab to display the newly handled ICA connections, optimized connections,
handed-off connections, and dropped connections. Click the ICA vs ICA over SSL tab to display the
the number of newly handled ICA connections and the number of newly handled ICA over SSL
connections.
The ICA Effective WAN Capacity chart displays the effective bandwidth capacity of the WAN link as a
result of ICA acceleration, as a multiplier of its base capacity. The capacity data for all traffic and ICA
traffic is shown.
Note If the chart has no data, monitoring may be disabled for the application definition that includes this type
of traffic. Verify that monitoring is enabled for the Citrix application.
The ICA Unaccelerated Reasons chart displays the reasons that ICA traffic is bypassed: unrecognized
protocol, unsupported client version, CGP session ID unknown, client on denied list, no resource, and
other. Click the Dropped tab to display the reasons because of which ICA traffic is dropped:
unsupported client version, I/O error, no resource, AO parsing error, maximum sessions reached, and
other.
Note Except for the Top Sites chart, you can view monitoring information at the device, network, location, or
AppNav cluster levels.
As shown in Figure 15-9, the Response Time Savings chart displays the aggregated amount of time saved
due to Akamai Connect caching, showing the response time saved as a percentage, and total response
time saved, for cache hit transactions, in minutes.
Note Output from the show statistics accelerator http CLI command also displays information on response
time, including the fields Total Time Saved and Percentage of Connection Time Saved. For more
information on CLI commands, see the Cisco Wide Area Application Services Command Reference
Guide.
Throughput Summary
The Throughput Summary chart displays information on web-optimized and original throughput.
Depending in the tab you click for this chart, LAN-to-WAN (outbound) or WAN-to-LAN (inbound),
throughput is displayed. The WAN-to-LAN report is the default report.
If you hover your mouse over a bar, the total optimized or average throughput, in KBps, for a given time
range is displayed.
The HTTP: Bandwidth Savings chart displays how much traffic, by percentage, is actually served by the
Cache Engine (CE) that did not have to be fetched from the source.
When this information is combined with overall incoming traffic into the router from the WAN, it
indicates how effective the cache is in boosting the WAN performance in terms of request-response
latency. The combination of the incoming (WAN) traffic flow to the router, plus the WAN data offload
incoming traffic provides a truer measure of the traffic flow the router’s clients (in aggregate) experience.
As shown in Figure 15-11:
• The bar graph is the absolute byte count for data served out of cache for the specified interval
• The line graph represents the percentage of total bytes requested that were served out of cache for
the specified interval.
Top Sites
The Top Sites chart displays the top sites being served by the Cache Engine (CE) in terms of hostname
and traffic, in bar chart format. The Top Sites chart displays the following types of information:
• WAN Offload (Default report)—The top URLs by number of bytes served out of the cache, and as
a result did not come over the WAN.
• Response Time Saving—The response time saved due to Akamai Connect caching. The time unit,
(milliseconds, seconds, or minutes) at the bottom of the chart depend on the time range specified for
the chart.
• Hit Count—The top URLs by number of cache hits.
• WAN Response—The top URLs by number of bytes served over the WAN.
Figure 15-12 Top Sites Chart Showing Response Time Saving by Site
Note Information in the Top Sites chart corresponds to the output for the show statistics accelerator
http object-cache EXEC command. Top ten sites information is shown as top hosts information,
in the Object cache top hosts ordered by: hit count, output section for 0 to 10 hosts. For more
information on CLI commands, see the Cisco Wide Area Application Services Command
Reference Guide.
The Cache Statistics (Hits) chart displays information on cache hits or on data served from the cache, in
bar chart format. For each type of Cache Statistics chart, you can specify a time frame of Last Hour, Last
Day, Last Week, Last Month, or set a Custom one.
• The Cache Statistics Hits chart shows the percentage and the number of cache hits (in millions) over
a specified time frame.
If you hover your mouse over a data point, the total percentage of cache hits for that data point is
displayed.
If you hover your mouse over a bar, the number of hits, in millions, is displayed.
• The Cache Statistics Data Served from Cache chart shows the percentage and the amount of data
served from cache (in MB) over a specified time frame.
If you hover your mouse over a data point, the total percentage of cache hits for that data point is
displayed.
If you hover your mouse over a bar, the total amount, in MB, of data served from the cache, is
displayed.
Figure 15-13 Example of Cache Statistics Hits Chart Showing a Detailed View of a Data Point
You can view the peak pass-through connection values for all the data points in the chart by checking
the Peak Connections check box.
Note This chart is available only when a specific WAAS device or location is selected, and can be added only
to the Connection Trend report.
Formula:
Pass-Through Connections for a Device = Total Pass-Through Connections for all applications
Optimized Connections for a Device = Total Optimized Connections for all applications
Device Connections limit usage % = 100 * Average Optimized connections / Device connection Limit
where,
Average Optimized connections = Sum of Optimized Connections / No. of samples
AppNav Charts
This section describes these charts:
• Total AppNav Traffic
• AppNav Policies
• Top 10 AppNav Policies
• Top 10 WAAS Node Group Distribution
• WAAS Node Group Distribution
• Pass-Through Reasons
• Top 10 Pass-Through Reasons
AppNav Policies
The AppNav Policies chart displays a graph of the amount of intercepted, distributed, or pass-through
traffic processed by the AppNav Cluster (ANC) or ANC device for each policy rule, depending on which
tab you select. The units at the left side depend upon the range.
From the Show Details For drop-down list, select a policy rule for viewing.
Pass-Through Reasons
The Pass-Through Reasons chart displays a graph of the amount of pass-through traffic for each of the
pass-through reasons. The units at the left side depend upon the range.
From the Show Details For drop-down list, select a reason whose details you want to view.
Platform Charts
This section describes these charts:
• CPU Utilization
• Disk Utilization
CPU Utilization
The CPU Utilization chart displays the percentage of CPU utilization for a device. This chart is available
only when a specific WAAS device is selected. This chart can be added only to the Monitor > Reports >
Reports Central > Resource Utilization report page.
Disk Utilization
The Disk Utilization chart displays the percentage of disk utilization for a device. This chart is available
only when a specific WAAS device is selected. This chart can be added only to the Monitor > Reports >
Reports Central > Resource Utilization report page.
When the device closer to the LAN is not overloaded, the pass through numbers on that device accurately represent the overall pass-through traffic. But,
if that device goes into overload, the second device in the cluster starts optimizing traffic that was passed through by the first one, which needs to be
accounted for. In such a scenario, the overall pass-through numbers for the cluster can be obtained as follows. Note that this calculation has to be done
even if the first device went into overload in the past and came out of it.
Consider that W1 and W2 are part of a serial cluster, and W1 is toward the LAN (closer to the client if the cluster is in the branch, or closer to the server
if the cluster is in the data center) and W2 is toward the WAN. The amount of traffic that is passed through the cluster without optimization by either W1
or W2 can be obtained by the following formula: (W1 pass-through traffic) – (W2 original traffic)
Table 15-12 Predefined Reports Available at System, AppNav Cluster, Location, and Device Level
Table 15-13 shows the predefined reports available at specified WAAS levels.
Note In a WAAS network where there are 1000 or more WAEs, there may be a delay of up to 90 seconds to
redisplay the table when you click a table column to sort a system-level report table. You may experience
a similar delay when you click the Print icon in the taskbar before you see the report.
Location-Level Reports
Location-level reports aggregate data from all the WAEs present in a particular location. For more
information about locations, see Working with Device Locations in Chapter 3, “Using Device Groups
and Device Locations.”
To view a location-level report, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Locations > location-name.
Step 2 From the WAAS Central Manager menu, choose Monitor and choose the report from the Optimization
or Acceleration categories.
When scheduling any report, you can also select one or more locations; the report will include data from
all the devices within the selected locations. For more information, see Scheduling a Report.
The maximum number of devices supported in a location-level report is 25 by default. This number is
configurable up to 250 by the System.monitoring.maxDevicePerLocation system property. For more
information, see Modifying the Default System Configuration Properties in Chapter 10, “Configuring
Other System Settings.”
Note The ICA charts in WAAS Version 5.0 and later are different from those used in Version 4.5. If you are
viewing the data from a Version 4.5 WAAS device, the charts appear empty due to the different data that
the device is collecting. The ICA data for Version 4.5 WAAS devices is available in the system-level TCP
Summary Report. For more information, see TCP Summary Report.
Summary Report
The Summary Report is a predefined report that can be used to monitor system operation. It is available
at the system level. This report displays the following charts and tables by default:
• Traffic Summary
• Effective WAN Capacity
• Traffic Summary Over Time
• Traffic Volume and Reduction
• Compression Summary
• Compression Summary Over Time
• HTTP: Estimated Time Savings
• HTTP: Effective WAN Capacity
• MAPI: Effective WAN Capacity
• SSL: Effective WAN Capacity
• MAPI: Average Response Time Saved
• Network Application Traffic Details Table
The Summary Report can be customized to display the charts that you require. Use the Customize
taskbar icon to select the charts that you want to be displayed in this report. Only 12 charts can be
displayed in the report.
Topology Report
The Topology report at the system level displays a topology map that shows a graphical representation
of all the connections between the WAAS devices.
The topology map uses blue squares to show connections between devices. Use the legend to the right
of the grid to associate the device name with the number that appears at the top of the grid. Use the
drop-down lists at the top of the window to perform the following tasks:
• Display connections between your various locations instead of between devices.
• Sort the grid by the number of connections instead of by device name.
Click the View icon next to the WAE to view a list of peer devices for a specific WAE. The Peer List
window appears, which is the same as the device level Topology report.
At the device level, the Topology report lists all the peer devices connected to a specific WAE so that
you can see the relationship between devices in your WAAS network. The Peer List window displays
information about each peer device involved in optimized connections with this WAE. To go to the
system level Topology report, click the Topology icon in the taskbar.
If a peer device is not registered with the WAAS Central Manager, the message Unknown, this peer
is not being managed by CM is displayed for the name and Unknown is displayed for the IP address.
Note The WAAS Central Manager device does not have any peers because it does not participate with any
WAEs to optimize traffic. For this reason, the topology feature is not available on the WAAS Central
Manager device.
Note In case of a clock or timezone change in the WAE, the exact time for device timezone is reflected after
the configuration synchronization cycles.
The Connection Statistics table displays the following information about each connection:
• Source IP address and port.
• Destination IP address and port.
• Peer ID—Hostname of the peer device.
• Applied Policy/Bypass Reason—Displays icons representing the applied optimization policies,
including TFO, DRE, LZ, and an application accelerator, respectively. (Hover your mouse over the
icon to see its meaning.) If the connection is not optimized, the bypass reason is shown.
• Connection Start Time—Date and time at which the connection was started.
• Open Duration—Number of hours, minutes, and seconds that the connection has been open.
• Total number of original bytes.
• Total number of optimized bytes.
• Percentage of compression.
• Class map name—If no class map exists for the connection, this column contains a dash. To create
a class map for this connection, click the radio button at the left of the row and then click the Create
Class-Map taskbar icon to display the Optimization Class-Map pane. For details on creating a class
map and match conditions, see Chapter 12, “Configuring Application Acceleration”.
Note If the WAE is inheriting policies from a device group, the Create Class-Map button is dimmed, to prevent
a user from unknowingly overriding device group policies. To create a class map, you must first override
the device group policy page and then return to the Connection Statistics report.
The data in the Connections Statistics table is retrieved from the device once when you view the table
for the first time.
From the Connections Statistics table, you can perform the following tasks:
• Apply filter settings to display particular connections based on specific criteria, by choosing Quick
Filter from the Show drop-list in the taskbar.
• Refresh the table by clicking the Refresh taskbar icon.
• Export the table to a spreadsheet by clicking the Export taskbar icon.
• View connection details by clicking the Details icon next to the connection entry.
The Connection Details window contains connection addresses, port information, policy information,
and traffic statistics. It also displays graphs that plot real-time traffic statistics and are refreshed every
two seconds.
Note In the Connection Details window, if the value for Percentage Compression is negative, the
Percentage Compression and Effective Capacity values do not appear.
In some cases, the Central Manager is not able to fetch the Connections Statistics page details at the
WAE device level. This happens when the WAE uses internal IP for management purpose with the
Central Manager and external IP (NAT) for RPC or registration purpose with the WAAS Central
Manager, and if the internal IP not reachable from the WAAS Central Manager.
Disks Report
The Disks Report displays physical and logical disk information.
The report window displays the following information about each disk:
• Physical disk information, including the disk name, serial number, and disk size.
• Present status. The Present field will show either Yes if the disk is present or Not Applicable if the
disk is administratively shut down.
• Operational status—NORMAL, REBUILD, BAD, UNKNOWN, or Online.
• Administrative status—ENABLED or DISABLED. When the Administrative Status field shows
DISABLED, the Present field will show Not Applicable.
• Current and future disk encryption status.
• RAID level. For RAID-5 devices, the Disk Information window includes the RAID device name,
RAID status, and RAID device size.
• Error information, if any errors are detected.
From this window, you can save all disk information details to an Excel spreadsheet by clicking the
Export Table icon in the taskbar.
AppNav Report
The AppNav report displays AppNav flow distribution information. This report is available at the
AppNav Cluster level, where it shows statistics for the whole AppNav Cluster, and at the device level
for AppNav Controllers (ANCs), where it shows statistics for a single ANC.
The following charts and tables are included:
• Total AppNav Traffic
• AppNav Policies
• Top 10 AppNav Policies
• Top 10 WAAS Node Group Distribution
• WAAS Node Group Distribution
• Pass-Through Reasons
• Top 10 Pass-Through Reasons
At the AppNav Cluster level, the following additional controls appear in the taskbar:
• The Scope drop-down list allows you to choose to display data for the whole cluster or for an
individual ANC.
• The AppNav Policy Rule drop-down list allows you to choose the AppNav policy for which data is
displayed (shown for WAAS appliance AppNav clusters only.)
• The Context drop-down list allows you to choose the AppNav context (or all contexts) for which
data is displayed (shown for AppNav-XE clusters only.)
Note At the AppNav Cluster level, the charts may not show data if the configuration on all ANCs in the cluster
does not match. To resolve this situation, choose AppNav Clusters > cluster-name from the Central
Manager menu and click the taskbar icon named Force Settings on all Devices in a Group. After about
15 minutes, the AppNav charts will display data.
Exported Reports
Using the spreadsheet icon in the Central Manager taskbar, you can export chart values to a CSV file.
Table 15-14 provides descriptions of report column headings for exported reports. Because there are
many report column headings, the table is divided into categories by types of traffic, in alphabetical
order. For these heading descriptions, a time specification (for example, milliseconds) is not noted, as
the time specification may change depending on the time period specified for the report (for example,
hour or week).
week).
• Akamai Connected Cache
• Akamai Connected Cache Top Sites
• Application, Time, and Time Saved
• Cache Control Header and Cache
Managing Reports
The WAAS Central Manager allows you to edit any of the predefined reports and to create custom
reports. Additionally, you can schedule reports to be generated periodically such as hourly, daily,
weekly, or monthly. When a scheduled report is generated, a link to the report is e-mailed to notify the
recipients.
This section contains the following topics:
• Creating a Custom Report
• Viewing and Editing a Report
• Scheduling a Report
• Viewing or Deleting a Scheduled Report
Step 1 From the WAAS Central Manager menu, choose Monitor > Reports > Reports Central.
Step 2 Click the Create taskbar icon. The Create Report pane appears, as shown in Figure 15-14.
Step 3 In the Name field, enter a name for the report. The maximum is 64 characters. Only numerals, letters,
spaces, periods, hyphens, and underscores are allowed.
Step 4 (Optional) In the Description field, enter a description of the report.
Step 5 In the list at the left side of the pane, check the check box next to each chart and table that you want to
be displayed in the report. See WAAS Chart Descriptions for a description of the charts.
Expand the categories by clicking the small triangle next to the category name. See a preview and
description of a chart by clicking the chart name. Tables are listed in the last category, Statistics Details.
Step 6 Click OK.
Step 7 (Optional) Customize any of the chart settings as follows:
a. Display the report by clicking the report name in the Report Templates table.
b. You can customize report settings, such as the time frame and the time zone, as described in
Customizing a Dashboard or Report.
c. Click the Edit icon in the upper left of a chart to customize the chart settings. For more information,
see Configuring Chart Settings.
d. Click OK.
Repeat the steps for each chart you want to customize.
Another way in which you can create a report is to copy a similar report that already exists and modify
it into a new report. To copy a report, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Monitor > Reports > Reports Central.
Step 2 Check the box next to the report that you want to copy.
Step 3 Click the Copy taskbar icon. The copy report window appears.
Step 4 In the Name field, enter a name for the report.
Step 5 (Optional) In the Description field, enter a description of the report.
Step 6 Click OK.
The report is added to the Reports table.
Step 1 From the WAAS Central Manager menu, choose Monitor > Reports > Reports Central.
Step 2 Click the name of the report that you want to view or edit.
You can filter the list by choosing Quick Filter from the Show drop-down list and entering filter criteria.
Step 3 To change any of the charts or tables in the report, use the standard chart editing methods, as described
in Customizing a Dashboard or Report.
Step 4 Click Save to save the report, or click Save As to save the report under a different name.
To delete a report from the Reports table, check the check box next to the corresponding report and click
the Delete taskbar icon.
Admin users can view, edit, and delete reports created by all users and can view and edit predefined
reports. Nonadmin users can view, edit, and delete only reports created by themselves, and can view and
edit predefined reports.
Scheduling a Report
You can schedule reports to be generated once or periodically, such as daily, weekly, or monthly. When
a scheduled report is generated, a copy of the report can be emailed.
Note You cannot delete a scheduled custom report after you have scheduled it and it is in pending status. You
can delete a report only after it has been generated.
Step 1 From the WAAS Central Manager menu, choose Monitor > Reports > Reports Central.
Step 2 Check the check box next to the report that you want to schedule.
Step 3 Click the Schedule icon in the taskbar. The scheduling window appears, as shown in Figure 15-15.
Step 4 In the Date field, enter the schedule date in the format DD/MM/YYYY, or click the calendar icon to
display a calendar from which to choose the date.
Step 5 In the Hours drop-down list, choose the hours. The time represents the local time at the WAAS Central
Manager.
Step 6 In the Minutes drop-down list, choose the minutes. The time represents the local time at the WAAS
Central Manager.
Step 7 In the Frequency drop-down list, choose the report frequency (Once, Hourly, Daily, Weekly, or
Monthly).
Step 8 In the No. of Reports field, enter the number of times a reoccurring report is to be generated. You can
schedule it to be generated for up to 1825 times. After being generated the specified number of times,
the report is no longer generated.
Step 9 Select the Email PDF or Email CSV check box to receive the report in the format of your choice.
Step 10 In the Email Id field (enabled only when the Email PDF or Email CSV check box is checked), enter the
e-mail addresses of the report recipients, separated by commas.
Step 11 In the Email Subject field, enter the subject of the email message.
Step 12 From the Select drop-down list, choose an option (Device(s), DeviceGroup, Cluster, or Location) to
display a list of the chosen entities.
Step 13 In the Select entity area, choose the devices that are to be included in the statistics for the report. Check
the check box next to each device, device group, cluster, or location that you want to include.
To locate an entity in a long list, choose Quick Filter from the Show drop-down list and enter the
complete or partial entity name in the field above the list. The search is case sensitive.
Step 14 Click OK.
Step 15 Configure the e-mail server settings for e-mail notification when reports are generated. For more
information, see Configuring the E-mail Notification Server in Chapter 10, “Configuring Other System
Settings.”
Note In a WAAS network where there are 1000 or more WAEs, a scheduled report might take up to 4 minutes
to generate. And if you schedule more than one report at the same time, the reports will be generated
with a delay of up to 20 minutes, depending on the number of reports and devices.
Step 1 From the WAAS Central Manager menu, choose Monitor > Reports > Reports Central.
The lower part of the Reports window lists the completed and pending scheduled reports, depending on
the tab you choose. (You can use the Show filter above the table to filter the reports that are displayed.)
Step 2 (Optional) To view a completed report instance in the Completed Reports tab, click the Completed link
in the Status column.
Note For each completed instance of a scheduled report, the Frequency column shows Once and the
Completed Time shows the date and time that the report was generated.
Step 3 (Optional) If you want to view a list of pending reports, click the Pending Reports tab.
Step 4 (Optional) If you want to delete a report in either the Completed Reports or Pending Reports tabs, check
the box next to one or more report instances that you want to delete and click the Delete taskbar icon.
WAAS stores the 10 most recently completed or failed report instances for each custom report. This
number is configurable by the System.monitoring.maxReports system property. For details on changing
this property, see Modifying the Default System Configuration Properties in Chapter 10, “Configuring
Other System Settings.”
Admin users can view reports scheduled by all users or the name of the report creator. Nonadmin users
can view only reports scheduled by themselves.
Any changes to predefined report settings are stored separately for individual users. That is, if one user
changes a predefined scheduled report, only that user sees the changes, and other users (including admin
users) continue to see the report with default settings.
Reports scheduled by an external user are deleted if the maximum limit of days without a login passes
and the user is deleted. For more information, see the cdm.remoteuser.deletionDaysLimit system
configuration property in Chapter 10, “Configuring Other System Settings.”
Note You cannot delete a scheduled custom report after you have scheduled it and it is in pending status. You
can delete a report only after it has been generated.
• You can view the state of these connections and various operation statistics display with the show
statistics flow monitor tcpstat-v1 EXEC mode command. Connection errors and data transfer
errors trigger alarms on the WAE and in the Central Manager GUI. For information on flow
monitoring alarms, see Troubleshooting Flow Monitoring Information.
• To display debug information, use the debug flow monitor tcpstat-v1 EXEC mode command.
Step 1 Create a new device group for configuring flow monitoring on multiple devices by choosing Device
Groups > device-group-name > Create New Device Group.
a. When you create a device group, check the Automatically assign all newly activated devices to
this group check box to enable this option.
b. Add your existing WAE devices to this new device group.
Step 2 In the Device Group listing window, click the Edit icon next to the name of the flow monitoring
configuration device group that you want to configure.
Step 3 Choose Configure > Monitoring > Flow Monitor. The Flow Monitor Settings for Device Group
window appears.
Step 4 In the Destination IP Address field, enter the IP address of the monitoring agent console.
This configuration allows the WAE to establish a temporary connection (a control connection) to the
console for the purpose of obtaining the IP address of the collector device. You must configure the
collector IP address information from the console device. (See the configuration documentation for the
NetQoS flow monitoring application software.)
Step 5 Check the Enable Flow Monitor check box.
Step 6 Click Submit to apply the settings to the devices in this device group.
To configure NetQoS flow monitoring on the WAE using the CLI, follow these steps:
Step 1 Register the WAE with the IP address of the monitoring agent console.
WAE(config)# flow monitor tcpstat-v1 host 10.1.2.3
This configuration allows the WAE to establish a temporary connection (a control connection) to the
console (or host) for the purpose of obtaining the IP address of the collector device. You must configure
the collector IP address information from the console device. (See the configuration documentation for
the NetQoS flow monitoring application software.)
Step 2 Enable flow monitoring on the WAE appliance.
WAE(config)# flow monitor tcpstat-v1 enable
Step 3 Check the configuration by using the show running-config EXEC command.
Note When you use flow monitoring with the NetQoS SuperAgent, the flow monitor on the WAE captures
optimized traffic only.
Step 1 From the WAE CLI or Central Manager GUI, enter the SuperAgent Master Console IP address in the
Destination IP Address field on your WAE appliances.
If you are configuring multiple WAAS devices through a device group, wait for the configuration to
propagate to all the devices in the device list.
Step 2 From the NetQoS SuperAgent console, assign a WAE to a SuperAgent Aggregator (known as the
collector in WAAS terminology) and configure the NetQoS networks, servers, and applications entities.
Note For information about using the NetQoS SuperAgent Master Console and configuring NetQoS
SuperAgent entities, go to http://support.ca.com
Step 1 Use the following command to create a flow record to configure which fields to collect as part of Netflow
export:
WAE(config)# flow record RecordName
WAE(config)# collect waas ?
Step 2 Use the following command to create the flow exporter, which includes the destination IP address and
port for the Netflow:
WAE(config)# flow exporter ExporterName
WAE(config-flow_exporter)# destination 2.2.2.2
WAE(config-flow_exporter)# description Descriptive name
WAE(config-flow_exporter)# export-protocol IPFIX
WAE(config-flow_exporter)# transport udp 12000
WAE(config-flow_exporter)# exit
Step 3 Use the following command to create the flow monitor and associate the flow record with the flow
exporter:
WAE(config)# flow monitor MonitorName
WAE(config-flow_monitor)# description Descriptivename
WAE(config-flow_monitor)# exporter ExporterName
WAE(config-flow_monitor)# record RecordName
WAE(config-flow_monitor)# enable
Disabling NetFlow v9
By default, flow monitoring is enabled on all devices. Use the following command to disable monitoring
for a particular class:
WAE(config)# policy-map type waas PmapName
WAE(config)# class ClassName
WAE(config)# {no} flow-monitor enable
22 PE_CONN_PT_RJCT_RESOURCES
23 PE_CONN_PT_NO_LICENSE
24 PE_CONN_PT_ASYMMETRIC
25 PE_CONN_PT_INTERMEDIATE
26 PE_CONN_PT_FB_INT_ERROR
27 PE_CONN_PT_AD_INT_ERROR
28 PE_CONN_PT_SQ_INT_ERROR
29 PE_CONN_PT_APP_OVERRIDE
30 PE_CONN_PT_SVR_BLACKLIST
31 PE_CONN_PT_AD_VER_MISMATCH
32 PE_CONN_PT_AD_AO_INCOMPAT
33 PE_CONN_PT_AD_AOIM_PROGRESS
34 PE_CONN_PT_DIRM_VER_MISMATCH
35 PE_CONN_PT_DIRM_INT_ERROR
36 PE_CONN_PT_PEER_OVERRIDE
37 PE_CONN_PT_AD_OPT_PARSE_FAIL
38 PE_CONN_PT_AD_SERIAL_MODE_PEER
39 PE_CONN_PT_INTERCEPTION_ACL
40 PE_CONN_PT_WCCP_SHUTDOWN_ACTIVE
41 PE_CONN_PT_AD_IP_FRAG
This chapter describes the troubleshooting and diagnostics tools available in the Cisco WAAS Central
Manager that can help you identify and resolve issues with your WAAS system.
For additional advanced Cisco WAAS troubleshooting information, see the Cisco WAAS
Troubleshooting Guide for Release 4.1.3 and Later on Cisco DocWiki. For information on flow
monitoring, see Configuring Flow Monitoring in Chapter 15, “Monitoring Your WAAS Network.”
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central
Manager and Cisco Wide Area Application Engines (WAEs) in your network. The term WAE refers to
WAE and Wide Area Application Virtual Engine (WAVE) appliances, Cisco Service Ready Engine
Service Module (SRE-SM) modules running WAAS, and Cisco Virtual WAAS (vWAAS) instances.
Caution Do not reboot the WAAS device unless it is absolutely necessary. Some information that is important to
troubleshooting may not survive a reboot. Try to gather as much information as possible before
rebooting.
The WAAS device can track packet information for network traffic that passes through it. The attributes
of the packet are defined by an ACL. The WAAS device buffers the captured packets, and you can copy
the buffered contents to a file or to a remote server. You can also display the captured packet information
on your console or terminal.
Two packet capture utilities are available: tcpdump and tethereal. These commands require admin
privileges.
Consider these guidelines when you use tcpdump or tethereal to capture packets:
• By default, these commands capture only the first 64 bytes of each packet. We recommend that you
use the -s 1600 option to capture full packet data.
• If you will be taking large traces, use tcpdump to create rolling packet captures in multiple files.
(The -C option sets the maximum size of each captured file in KB and the -M option sets the
maximum number of log files to create.)
• If you need to filter the packets captured, use tethereal with the -R read filter option. You can use
tcpdump to create a large packet capture, then use tethereal against the captured file to perform
filtering.
• Be careful when using tcpdump in a WCCP environment because tcpdump filters do not look within
the GRE wrapper. You will need to use tethereal if you need to do that.
• With both commands, use the -i any option to capture all interfaces, or separate telnet sessions to
capture on separate interfaces. Use ^c (CTRL+c) to stop the packet capture.
• For detailed information on how to use tcpdump and tethereal, see the Cisco Wide Area Application
Services Command Reference.
There are several packet analysis tools that you can use to analyze packet capture files after you have
captured them, including Wireshark, Ethereal, Microsoft Netmon and Sniffer Pro.
To use the show version command from the WAAS Central Manager:
Step 1 Navigate to Devices > DeviceName > Monitor > CLI Commands > show commands
Step 2 From the show commands dropdown list, select show version
Step 3 Click Submit.
Step 1 Navigate to Devices > DeviceName > Monitor > CLI Commands > show commands
Step 2 From the show commands dropdown list, select show version
Step 3 In the Arguments field, enter pending.
Step 4 Click Submit.
The alarm panel also allows you to filter your view of the alarms in the list. Filtering allows you to find
alarms in the list that match the criteria that you set.
Figure 16-1 shows the alarm panel.
Acknowledging an Alarm
To acknowledge an active alarm, follow these steps:
Step 1 In the alarm panel, check the check box next to the name of the alarm that you want to acknowledge.
Step 2 Click the Acknowledge taskbar icon.
The Acknowledge Alarm Comments dialog box that allows you to enter comments about the alarm is
displayed.
Step 3 Enter a comment and click OK. Alternatively, click Cancel to return to the alarm panel without
completing the acknowledge action.
Comments enable you to share information about the cause or solution of a particular problem that
caused the alarm. The comments field accepts up to 512 characters. You can use any combination of
alpha, numeric, and special characters in this field.
Step 1 From the Show drop-down list, choose one of the following filtering options:
• All
• Quick Filter
• Unacknowledged Alarms
• Acknowledged Alarms
Device Alarms
Device alarms are associated with device objects and pertain to applications and services running on
your WAAS devices. Device alarms are defined by the reporting application or service. Device alarms
can also reflect reporting problems between the device and the WAAS Central Manager GUI. Table 16-2
describes the various device alarms that can appear.
Step 1 From the WAAS Central Manager menu, choose Devices > All Devices.
Step 2 Click the device alarm light bar in the Device Status column to view the alarms on a single device.
The Troubleshooting Devices pane appears, either in the WAAS Central Manager window or as a
separate dialog box. (See Figure 16-2.)
Step 3 In the Alarm Information column, hover your mouse over an alarm message until the Troubleshooting
tools contextual menu appears. The pop-up menu provides links to the troubleshooting and monitoring
windows in the WAAS Central Manager GUI.
Step 4 From the drop-down list that is displayed, choose the troubleshooting tool that you want to use, and click
the link. The link takes you to the appropriate window in the WAAS Central Manager GUI. Table 16-3
describes the tools available for device alarms.
You can view the Troubleshooting Devices window for all devices by choosing Monitor >
Troubleshoot > Alerts from the global context.
Using the show and clear Commands from the Central Manager
You can use the show and clear EXEC commands from either the WAAS CLI or the WAAS Central
Manager. To use the show and clear command from the CLI, see the Cisco Wide Area Application
Services Command Reference.
To use the show and clear commands from the WAAS Central Manager, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Monitor > CLI Commands > Show Commands or Clear Commands.
Step 3 From the Command drop-down list, choose either a show or clear command.
Step 4 Enter arguments for the command, if any.
Step 5 Click Submit to display the command output.
A window displays the command output for that device.
Note The show and clear CLI commands that are available differ depending on the type of device that
you select.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > Log Settings > System Log. The System Log Settings window
appears. (See Figure 16-3.)
To configure system logging from the CLI, you can use the logging global configuration command.
This section contains the following topics:
• Priority Levels
• Multiple Hosts for System Logging
Priority Levels
Table 16-4 lists the different priority levels of detail that can be sent to the recipient of syslog messages
for a corresponding event.
Each syslog host can receive different priority levels of syslog messages. You can configure different
syslog hosts with a different syslog message priority code to enable the WAAS device to send varying
levels of syslog messages to the four external syslog hosts. For example, a WAAS device can be
configured to send messages that have a priority code of error (level 3) to the remote syslog host that
has an IP address of 10.10.10.1 and messages that have a priority code of warning (level 4) to the remote
syslog host that has an IP address of 10.10.10.2.
Note Setting a logging priority to Levels 1-4 can be CPU-intensive, and can generate a large amount of output.
To achieve syslog host redundancy or failover to a different syslog host, you must configure multiple
syslog hosts on the WAAS device and assign the same priority code to each configured syslog host, for
example, assigning a priority code of critical (level 2) to syslog host 1, syslog host 2, and syslog host 3.
In addition to configuring up to four logging hosts, you can also configure the following for multiple
syslog hosts:
• A port number that is different from the default port number, 514, on the WAAS device to send
syslog messages to a logging host.
• A rate limit for the syslog messages, which limits the rate at which messages are sent to the remote
syslog server (messages per second) in order to control the amount of bandwidth used by syslog
messages.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > Log Settings > Transaction Log for TFO transaction logging or
Configure > Monitoring > Log Settings > Video Acceleration Transaction Log for video transaction
logging. The Transaction Log Settings window appears. (See Figure 16-4.) (The Video Transaction Log
Settings window looks the same, but does not include the General Settings area at the top.)
Step 3 Under the General Settings area title, check the TFO Transaction Log Enable check box to enable
transaction logging. (This check box does not appear for video transaction logging.)
The fields on the window become active.
Step 4 (Optional) In the Access Control List Name field, enter the name of an access control list that you want
to use to limit transaction logging. If you specify an access control list, only transactions from hosts that
are defined in that access list are logged. (This field does not appear for video transaction logging.)
Use the ip access-list global configuration command to define an access list.
Step 5 Under the Archive Settings area title, specify values for the following fields:
• Max Size of Archive File—Maximum size (in kilobytes) of the archive file to be maintained on the
local disk. This value is the maximum size of the archive file to be maintained on the local disk. The
range is 1000 to 2000000. The default is 2000000.
• Archive Occurs Every (interval)—Interval at which the working log data is cleared and moved into
the archive log.
Step 6 Configure the fields in the Export Settings area to export the transaction log file to an FTP server.
Table 16-5 describes the fields in the Export Settings area.
Field Function
Enable Export Enables transaction logging to be exported to an FTP server.
Compress Files before Export Enables compression of archived log files into gzip format before
exporting them to external FTP servers.
Export occurs every (interval) Interval at which the working log should be cleared by moving data to
the FTP server.
Export Server The FTP export feature can support up to four servers. Each server
must be configured with a username, password, and directory that are
valid for that server.
• Export Server—The IP address or hostname of the FTP server.
• Name—The user ID of the account used to access the FTP server.
• Password/Confirm Password—The password of the FTP user
account specified in the Name field. You must enter this password
in both the Password and Confirm Password fields. Do not use the
following characters: space, backward single quote (`), double
quote ("), pipe (|), or question mark (?).
• Directory—The name of a working directory that will contain the
transaction logs on the FTP server. The user specified in the Name
field must have write permission to this directory.
• SFTP—If the specified FTP server is a secure FTP server, check
the SFTP check box.
Note This dialog box is displayed only if you are using the Internet Explorer browser.
To enable and configure transaction logging from the CLI, use the transaction-logs global configuration
command.
Transaction Logs
TFO transaction logs are maintained in the local disk in the /local1/logs/tfo directory. Video (Windows
media) logs are maintained in the /local1/logs/wmt/wms-90 directory.
When you enable transaction logging, you can specify the interval at which the working log should be
archived, by moving the data to an archive log. The archive log files are located on the local disk in the
local/local1/logs/working.log directory.
Because multiple archive files are saved, the filename includes the time stamp of when the file was
archived. Because the files can be exported to an FTP or SFTP server, the filename also contains the IP
address of this WAAS device.
The archive filenames for TFO transactions use this format:
tfo_IPADDRESS_YYYYMMDD_HHMMSS.txt.
The archive filenames for Windows media transactions use this format:
wms_90_IPADDRESS_YYYYMMDD_HHMMSS.txt.
The transaction log format is documented in Appendix B, “Transaction Log Format.”
Step 1 From the WAAS Central Manager menu, choose Admin > Logs > System Messages. The System
Message Log window appears.
Note If no name is available for a node, “Unavailable” is displayed. This situation might occur if a
node has been deleted or has been reregistered with the WAAS software.
Step 2 (Optional) Choose Quick Filter from the Show drop-down list, and enter a value in one or more fields
to filter the log to include only the entries with the specified values.
Step 3 (Optional) Truncate the message log to ensure that not as many messages appear in the table, by
completing the following steps:
a. Click the Truncate icon in the taskbar. The Truncate System Message Log pane appears.
b. Choose one of the following options:
– Size Truncation—Limits the messages in the log to the number you specify. The log uses a first
in, first out process to remove old messages once the log reaches the specified number.
– Date Truncation—Limits the messages in the log to the number of days you specify.
– Message Truncation—Removes messages that match the specified pattern from the log.
Step 1 From the WAAS Central Manager menu, choose Admin > Logs > Audit Trail Logs.
The Audit Log window appears. All the logged activities in the WAAS Central Manager are listed by
user, the IP address of the machine that was used, date and time, and operation that was logged.
Step 2 (Optional) Choose Quick Filter from the Show drop-down list, and enter a value in one or more fields
to filter the log to include only the entries with the specified values.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name.
Step 2 Choose Admin > Logs > Device Logs. The Device Log window appears.
Step 3 (Optional) Choose Quick Filter from the Show drop-down list, and enter a value in one or more fields
to filter the log to include only the entries with the specified values.
CLI Commands for Verifying and Viewing Logs and System Image
• Verify the WAAS image—Use the show version command to display the version of the software
image that is currently running in your WAAS device. This command also displays information
including device model and WAE uptime.
• Verify no pending software—Use the show version pending command to verify that there is no
pending software upgrade (waiting for a device reboot).
• Verify WAAS error logging—General system error WAAS logging to the disk file
/local1/syslog.txt is enabled by default. Use the show logging command to verify that logging is
enabled.
• Enable console logging—Use the (config) logging console enable command to enable logging to the
console. You can set the following logging priority levels: Alert (Priority 1), Critical (Priority 2),
Error (Priority 3), Warning (Priority 4), Notice (Priority 5), Information (Priority 6), and Debug
(Priority 7).
Note Setting a logging priority to Levels 1-4 can be CPU-intensive, and can generate a large
amount of output.
• Navigating and viewing log files—The following directories are used for WAAS log files:
– /local1—Root directory for all log files and location of syslog.txt
– /local1/logs—Service log files (admin and transaction logs)
– /local1/errorlog—Service log files (debug logs)
– /local1/errorlog/cifs—CIFS internal log files (for WAAS versions earlier than Version 6.x)
– /local1/core_dir—Process core dump files
Use the following commands to navigate and view these log files:
– cd
– pwd
– dir
– type-tail filename line follow
– find-pattern
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Monitor > Tools > Diagnostics Tests. The Diagnostic Tool window appears.
Step 3 Check the check box next to each diagnostic test you want to run, or check the top check box, Test, to
run all tests. The following tests are available:
• Device Operation—Checks the device’s status and the presence of coredump files or alarms of major
or critical severity.
• Basic Configuration—Checks the device’s basic network configuration.
• Basic Connectivity—Checks the device’s connectivity to configured external devices (DNS,
authentication, NTP servers, and so forth).
• Physical Interface—Checks the configuration and operation of the device’s physical interfaces.
Note The inline configuration and operation test is not available for vWAAS devices.
Note If any of the tests fail, error messages describe the problem and provide recommended solutions.
You can run the same diagnostic tests again and refresh the results by clicking the Refresh icon in the
taskbar.
To print the results, click the Print icon in the taskbar.
The output associated with the debug command is written to either the syslog file in /local1/syslog.txt
or the debug log associated with the module in the file /local1/errorlog/module_name-errorlog.current
file.
The output associated with the debug accelerator name module command for an application accelerator
is written to the file ao-errorlog.currentname, where name is the accelerator name. The accelerator
information manager debug output is written to the aoim-errorlog.current file.
The debug log file associated with a module will be rotated to a backup file when the current file reaches
its maximum size. The backup files are named as follows: name-errorlog.#, where # is the backup file
number.
For debug commands, system logging must be enabled. The command that enables logging, logging
disk enable, which is a global configuration command, is enabled by default.
If a debug command module uses the syslog for debug output, the logging disk priority debug global
configuration command must be configured (the default is logging disk priority notice).
If a debug command module uses the debug log for output, the output can be filtered based on a
priority-level configuration for the four different levels of debug log output:
• For filtering of critical debug messages only, use the global configuration command: logging disk
priority critical.
• For filtering of critical and error-level debug messages, use the global configuration command:
logging disk priority error.
• For filtering of critical, error, and trace debug level debug messages, use the global configuration
command: logging disk priority debug.
• For seeing all debug log messages, including critical, error, trace and detail messages, use the
following global configuration command: logging disk priority detail.
Regardless of the priority-level configuration, syslog messages at the LOG_ERROR or higher severity
will be automatically written to the debug log associated with a module.
For more details on these CLI commands, see Cisco Wide Area Application Services Command
Reference.
Step 1 From the WAAS Central Manager menu, choose Home > Monitor > Troubleshoot > Akamai
Diagnostics.
The Akamai Diagnostics screen appears (Figure 16-5).
Step 2 The upper section of the Akamai Diagnostics screen shows the Akamai Connect License status (Step 3)
and the Akamai registration service status (Step 4).
Step 3 Click the Akamai Connect License Details button to display a dialog box of additional information:
The upper half of the dialog box provides details on the Akamai API credentials used by the WAAS
Central Manager for this license (including API host, client ID, and customer ID).
The lower half of the dialog box shows test information, with the message “Below are results of previous
test. Please click ‘Test” button to get up-to-date results.”
a. Click Test to test the connection to the API server.
b. A Device Registration Status table listing is displayed, showing the total number of devices, and
with columns displaying each WAAS Device, Akamai ID, Akamai Device Status
(ActivationInProgress or Active), and Akamai Operational Status (Disconnected, Connected, or
Running).
Step 4 Click the Akamai Registration Service Status Details button to display a dialog box that shows additional
status information (including external HTTP proxy, last synchronization with Akamai, number of
pending operations, and number of API errors).
a. At the Akamai Registration Service Status dialog box, check the Enable debugging Akamai API
calls check box to enable debugging of Akamai API calls.
The Device Registration Service Status dialog box displays an API error log with the total number
of API errors, and a table listing with columns labeled When, Device, Operation (such as Refresh
All Devices), and Error Message (such as Read timed out(HTTP status code -1)).
Step 5 The lower section of the Akamai Diagnostics screen is a table listing of WAAS devices with Akamai
Connect, with columns for WAAS Device, Akamai Device Status (ActivationInProgress or Active),
Operational Status (Disconnected, Connected, or Running), and Connectivity to Akamai (Disconnected,
Activating, or Connected).
The table heading provides two buttons: Unregister (Step 6) and Synchronize (Step 7).
Step 6 To unregister a device from this table listing:
a. Select the device(s).
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Monitor > Tools > Kernel Debugger. The Kernel Debugger window appears.
Step 3 Check the Enable check box to enable the kernel debugger, and click Submit. (By default, this option
is disabled.)
To use the WAAS Central Manager TCP Traceroute tool, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Monitor > Troubleshoot > WAAS Tcptraceroute.
Alternatively, you can choose a device first and then choose this menu item to run the traceroute from
that device.
Step 2 From the WAAS Node drop-down list, choose a WAAS device from which to run the traceroute. (This
item does not appear if you are in the device listing.)
Step 3 In the Destination IP and Destination Port fields, enter the IP address and port of the destination for
which you want to run the traceroute
Step 4 Click Run TCPTraceroute to display the results.
WAAS nodes in the traced path are displayed in the table below the fields. From the Show drop-down
list, choose a filter setting to filter the devices, as needed. You can use a quick filter to filter any value,
or show all devices.
You can view traceroute information from the CLI by using the waas-tcptrace EXEC command.
Another troubleshooting tool that you can use to trace connections on a WAAS appliance ANC is the
Connection Trace tool. For details, see AppNav Connection Tracing in Chapter 4, “Configuring
AppNav.”
Step 1 Check all cable connections on the switch or router that may impact the WAAS device.
Step 2 Use the ping command to send an ICMP Echo request to the peer WAE. For example:
WAE# ping 10.1.1.2 172.19.131.189
PING 172.19.131.189 (172.19.131.189) from 10.1.1.21 : 56(84) bytes of data.
64 bytes from 172.19.131.189: icmp_seq=0 ttl=249 time=613 usec
64 bytes from 172.19.131.189: icmp_seq=1 ttl=249 time=485 usec
64 bytes from 172.19.131.189: icmp_seq=2 ttl=249 time=494 usec
64 bytes from 172.19.131.189: icmp_seq=3 ttl=249 time=510 usec
64 bytes from 172.19.131.189: icmp_seq=4 ttl=249 time=493 usec
Step 3 If a device is one hop away and you are unable to reach the device, then ping the intermediary gateway.
If the gateway is not reachable, use the show ip routes command to verify that the correct route is
displayed.
Step 4 If necessary, enter a static route for the gateway.
Note Firewalls may block ICMP traffic, and ICMP traffic does not follow the WCCP redirection path.
Therefore, using the ping command does not verify redirection or acceleration. As an alternative way to
verify redirection or acceleration, we recommend that you use a third-party tool that performs a
TCP-based ping.
• Contact TAC
• Contact the Small Business Support Center (SBSC)
This chapter provides information about the integration of the Cisco Network Analysis Module (NAM)
in the Wide Area Application Services (WAAS) Central Manager and describes how to configure and
use the NAM.
This chapter includes the following sections:
• Information About NAM Integration
• Prerequisites for NAM Integration
• Guidelines and Limitations for NAM Integration
• Configuring the NAM
• Monitoring and Analyzing Traffic
Basic Configuration
The basic NAM configuration includes the following tasks:
• Configuring the setup (see Configuring the Basic Setup).
– Connect to a NAM server by providing the server’s IP address, protocol, and port.
– Establish account credentials.
– Associate a WAAS device group or WAAS Express device group with configured policies.
– Enable Flow Agent.
• Configuring Sites—To display accurate data on charts and dashboards, every site on which WAAS
is planned to be deployed must be configured on the NAM (see Configuring a Site).
– Define sites
– Use definition rules
– Specify sites using subnets
• Configuring monitored servers (see Configuring a Cisco WAAS-Monitored Server).
– Specify the servers to be monitored by the NAM using the WAAS device’s flow monitoring.
– Enabling NetFlow and flow agent data sources on the actual devices, with the NAM as the
collector, to automatically create the device entries in the NAM.
Advanced Configuration
Advanced NAM configuration includes the following tasks:
• Configuring and synchronizing user-defined Classifiers and Applications with the NAM (see
Synchronizing Classifiers and Applications).
• Creating and editing an auto-created WAAS data source to monitor WAAS traffic statistics (see
Configuring a Data Source).
• Changing system preferences (see Setting Preferences for a NAM Module).
• Launching the NAM user interface (see Launching the NAM User Interface).
Step 1 From the WAAS Central Manager menu, choose Configure > Network Analysis Module > Basics >
Setup.
The Setup window appears (Figure 14-1). This window allows you to configure the NAM IP address and
accounts.
To set up a site or sites on the NAM module, perform the following steps:
Step 3 To use the pre-configured login credentials to access the NAM server, select the Use Default credentials
option. Proceed to Step 8.
The following preconfigured login credentials are used the Central Manager:
• Configuration user:
– Username—admin
– Password—admin
• MonitorView user:
– Username—waasro
– Password—waasrao
Note These credentials work only if you have configured the NAM with these details explicitly after
installation.
Step 4 In the NAM Configuration User field, enter the username of an existing configuration user on the NAM
server.
Step 5 In the NAM Configuration Password field, enter the password of the configuration user that was
specified in Step 4.
Step 6 In the NAM MonitorView User field, enter the username of an existing collection-view user configured
on the NAM server.
Step 7 In the NAM MonitorView Password field, enter the password of the existing collection-view user that
you specified in Step 3.
Step 8 Click the Test Connectivity/Credentials button, to verify if the NAM server is accessible and to check
if the user credentials that you specified are valid.
Step 9 The WAAS Integration Preferences area allows you to configure a WAAS device group to work with the
NAM server:
a. From the Device Group drop-down list, choose a device group from which Cisco WAAS
applications and classifier definitions are pushed to the NAM when performing a synchronization
operation.
The AllWAASDevices or AllWAASExpressDevices device group is the default selection for POC
deployments. For production deployments, choose a suitable device group with a subset of devices
for which you require the NAM integration and APM functionality.
b. Check the Enable Flow Agent check box to enable sending flow agent reports from the Cisco
WAAS devices in the selected device group to NAM.
This check box is disabled for the WAAS Express device group because WAAS Express does not
support the flow agent or flow monitor. In this scenario, you must use a NAM Performance Agent
(PA) from Cisco IOS routers to view the response-time metrics. The NAM charts that display
response times in the Central Manager also automatically handle the PA from routers.
c. Check the Sync all classifiers/apps to NAM on submit check box to initiate a classifier and
application synchronization with NAM and to apply Cisco WAAS definitions automatically.
Step 10 Click Submit.
Configuring a Site
A site is a collection of hosts—or network endpoints—partitioned into views that help you to monitor
traffic and troubleshoot problems. These views allow you to see measurements of application
performance on networks where Cisco WAAS devices are deployed and dashboards that show the traffic
levels between sites and alarm levels per site. You can use other NAM features without defining any sites
(the default configuration).
If you have set up sites, you can choose a particular site to view in the Interactive Report and view data
relevant to that site only. In some cases, you can select both a client site and a server site to view data
that pertains to the interaction between hosts at different sites.
Note If you configure multiple data sources for the same site, the same traffic might be accounted for more
than once, which results in inflated traffic statistics. For example, if you configure the NAM to receive
SPAN traffic for a particular site, and it is also receiving NetFlow records for that same site, both SPAN
traffic and NetFlow records are combined into the traffic statistics. In this case, if you want to see only
the statistics for a particular data source, use the Interactive Report window on the left side of the Sites
window to specify both the site and data source.
Note Classification of received data from data sources to sites is done only after the sites are configured. Any
old data from these data sources (before the sites were configured) are counted under the default
'Unassigned’ site.
The site definition is very flexible and can accommodate various scenarios. It is used not only for
viewing data, but for data export and data retention as well. Typically, a site is defined by its subnets,
but a site can also be defined using the following rules:
• Subnet (IP address prefix)
• Subnet from a data source
• Subnet from a given VLAN of a SPAN data source
• WAE device serving the site
We recommend that you define sites using subnets whenever possible.
Note If you are configuring a Cisco WAAS device, you must add the Cisco WAAS servers to the NAM. See
Auto Creating a New WAAS Device.
To display accurate data on charts and dashboards, you must configure every site on which Cisco WAAS
is to be deployed on the NAM. To get a breakdown of the traffic volume and response time for each
branch and data center, configure the IP subnets for all the sites that have WAAS deployed.
This section includes the following topics:
• Definition Rules
• Viewing Defined Sites
• Defining a Site
• Detecting a Subnet
• Editing a Site
• Deleting a Site
Definition Rules
Typically, subnets alone are sufficient to define a site, for example:
Site Data-Center = subnet 172.20.0.0/16
In certain scenarios, when there are overlapping IP address spaces in the networks (for example, in
private networks where hosts from different sites have the same IP addresses), you can use data sources
or VLANs to differentiate the subnets, for example:
Site NewYork = subnet 10.11.0.0/16 from "NDE-NewYork" data source.
Site LosAngeles = subnet 10.11.0.0/16 from "NDE-LosAngeles" data source.
Site Sale-Dept = subnet 10.11.0.0/16 from VLAN 10 of "DATA PORT 1" data source.
Site Finance-Dept = subnet 10.11.0.0/16 from VLAN 12 of "DATA PORT 1" data source.
For WAAS traffic, you can define a site associated with a WAE device without specifying the site's
subnets. Simply select all of the WAAS data sources coming from the WAE devices serving that site.
Site SanJose = WAE-SJ-Client, WAE-SJ-CltWAN, and WAE-SJ-Passthrough data sources.
Note We recommend that you use subnets to specify WAAS-optimized sites. Use this method only if the site's
subnets cannot be determined.
You can define a site using a combination of multiple rules, as described in Definition Rules. For
example, if a site has both optimized and nonoptimized traffic, it can be defined using a combination of
WAAS data sources and a subnet from a NetFlow Data Export (NDE) data source.
When you define a site using multiple data sources, ensure that those data sources do not have duplicated
traffic to avoid counting the site traffic statistics twice.
Conflicting rules are not allowed in site definitions. Of the following two scenarios, the second one is
not allowed:
• 1.2.3.0/24 from SPAN1 = SiteA
• 1.2.3.0/24 from SPAN1 = SiteB
Using a prefix is the preferred method. The data source and VLAN are secondary. In the following two
scenarios, the first receives higher priority:
• 1.2.3.0/24 = Site D
• WAE1-Client datasrc = Site E
The longest prefix has higher priority. It has the same data source and VLAN. In the following two
scenarios, the first receives higher priority:
• 1.2.3.0/24 from SPAN1 = Site A
• 1.2.0.0/16 from SPAN1 = Site C
The more refined (specific) rule has higher priority. In the following two scenarios, the first receives
higher priority.
• 1.2.3.0/24 from SPAN1 = Site A
• 1.2.3.0/24 (any datasrc) = Site D
Step 1 From the WAAS Central Manager menu, choose Configure > Network Analysis Module > Basics >
Sites.
The Sites window appears. The defined sites are listed in a table.
The following details are displayed:
• Name—Lists the name of the site.
• Description—Describes what the site includes.
• Rule—Lists the first rule that is assigned to the selected site. If you see ellipsis (...) next to the site
rule, it means that multiple rules are created for that site. To see all the rules, click the quick view
icon (after highlighting the site, click the small arrow on the right).
• Status—Shows if the site is enabled or disabled.
Defining a Site
To define a site, follow these steps:
Step 1 From the WAAS Central Manager menu, choose Configure > Network Analysis Module > Basics >
Sites.
The Sites window appears. This window lists the sites that are set up on the NAM module.
Step 2 Click Create.
The Sites Configuration window displays.
Step 3 In the Name field, enter a name for the site.
Step 4 In the Description field, enter a description for the site.
Step 5 Check the Disable Sites check box if you want the NAM to skip this site when classifying traffic. This
feature is useful if the site is no longer active, but you would still like to access historical site data in the
database. Otherwise, you should delete sites that are not needed.
Step 6 In the Subnet field, enter the IP address subnet (IPv4 or IPv6 address and mask); for example,
10.1.1.0/24.
Step 7 Click the blue i to get information about the site rules.
Step 8 Click Detect to tell the NAM to look for subnets in the traffic. See Detecting a Subnet.
Step 9 In the Data Source field, specify the data source from where the site traffic is coming from.
Note Leave this field blank if the site traffic is coming from multiple data sources.
Step 10 In the VLAN field, specify the VLAN where the site traffic is coming from. This field is not valid for
NDE and WAAS data sources.
Leave this field blank if the site traffic can come from multiple VLANs.
Step 11 Click Submit.
Note The Unassigned site (with a description of Unclassified hosts) includes sites that do not match
any of your site configurations. Sites are classified at the time the packets are processed.
Detecting a Subnet
Step 1 Choose Configure > Network Analysis Module > Basics > Sites > Sites Configuration.
Step 2 In the Sites Configuration window, click Detect.
The NAM looks for subnets detected within the past hour and the Subnet Configuration window is
displayed. This window allows you to specify the details of the sources in which you want NAM to detect
subnets.
Step 3 In the Subnet Mask field, enter the subnet mask.
Note If the bit mask is less than 32, the NAM detects an IPv4 subnet. If the bit mask is between 32
and 64, the NAM detects an IPv6 subnet.
Step 4 From the Data Source drop-down list, choose the data source in which you would like to detect subnets.
Step 5 From the Interface drop-down list, choose the interface in which you would like to detect subnets.
Step 6 In the Filter Subnets within Network field, enter an IPv4 or IPv6 address.
Step 7 Check the Unassigned site check box to include sites that do not match any of your site configurations.
Sites are classified at the time of packet processing.
Step 8 Click Detect.
The NAM finds the subnets that meet the criteria that you entered.
Editing a Site
To edit sites that have been created, follow these steps:
Step 1 Choose Configure > Network Analysis Module > Basics > Sites.
A list of configured sites is displayed.
Step 2 Select the site that you want to edit.
Step 3 Click Edit.
The Site Configuration window displays.
Step 4 Edit the required field (Name, Priority, Data Sources, or Prefix/Mask).
Deleting a Site
To delete sites that have been created, follow these steps:
Step 1 Choose Configure > Network Analysis Module > Basics > Sites.
A list of configured sites is displayed.
Step 2 Select the site that you want to delete.
Step 3 Click Delete.
Note The NAM is unable to monitor WAAS traffic until you set up Cisco WAAS-monitored servers. The NAM
displays the status of Cisco WAAS devices as pending until you set up Cisco WAAS-monitored servers.
Step 1 Choose Configure > Network Analysis Module > Basics > Monitored Servers.
The WAAS Servers window appears.
Step 2 Choose Select All to add all the servers, or select the required servers from the list.
Step 3 Click Add.
Step 1 Choose Configure > Network Analysis Module > Basics > Monitored Servers.
The WAAS Servers window is displayed.
Step 2 Choose the monitored WAAS server to delete, and click Delete.
A confirmation dialog box asks you if you want to delete the selected Cisco WAAS-monitored server.
Step 3 Click OK to delete the Cisco WAAS-monitored server.
Step 1 Choose Configure > Network Analysis Module > Advanced > Classifier/App Sync.
The Classifier/App Sync Preferences window appears.
The Classifier/AppSync Preferences results are displayed under the following categories:
• Conflicting classifiers/applications—You can choose one or all the WAAS classifiers and
applications for synchronization with the NAM. By default, all the classifier and applications are
selected.
• NAM-only applications/application groups—Applications and application groups in the NAM are
displayed. If required, you can manually add the NAM-only applications and application group
definitions in WAAS at the device-group or device levels.
Step 2 To view the differences in classifier definitions in WAAS and the NAM, click on the arrow next to
Classifier Definition Differences.
Step 3 Choose the WAAS classifiers that you want to synchronize with the NAM applications and provide the
required information to define the filter criteria.
Step 4 Click Go.
The differences in the definitions are displayed.
Step 5 To view applications and application groups in the NAM, click on the arrow next to NAM-Only
Applications. Information about the applications and application groups is displayed. If required, you
can manually add these definitions in WAAS at the device-group or device levels.
Step 6 To refresh the Classifier/App Sync page, click Refresh.
Step 7 Click Submit to start the synchronization process.
Note If you have configured sites, you can assign data sources to that particular site. If you do assign data
sources to a site, and you also configure the data sources, the two could overlap because sites can also
be a primary view into data sources. If there is a mismatch between the two, you will not see any data.
Note We recommend that you configure a site using subnets instead of selecting a data source.
The following areas contain specific information about the types of data sources:
• SPAN
• ERSPAN
• VACL
• NetFlow
• WAAS
The NAM Data Sources window lists the data sources that are configured for that NAM module, and
contains the following fields:
• Device—DATA PORT if it is a local physical port or the IP address of the learned device.
• Type—The source of traffic for the NAM.
– DATA PORT if it is a local physical port.
– WAAS, ERSPAN, or NETFLOW if a data stream is exported from the router, switch, or WAE
device.
• Activity—Most recent activity.
• Status—ACTIVE or INACTIVE.
• Data Source—Name given to the data source.
• Data Source Details—Physical Port, or information about the data source being enabled or disabled.
This section includes the following topics:
• Adding a Data Source for a New WAAS Device
• Auto Creating a New WAAS Device
• Editing a WAAS Data Source
• Deleting a WAAS Data Source
Step 1 Choose Configure > Network Analysis Module > Advanced > Data Sources.
Step 2 Click Create.
The NAM Data Source Configuration dialog box is displayed.
Step 3 Choose WAAS from the Types drop-down list.
Step 4 In the IP field, enter the device IP address.
Step 5 Check the check boxes pertaining to the appropriate WAAS segments.
You can configure the WAAS data sources to monitor the following WAAS segments:
• Client—Configures the WAE device to export the original (LAN side) TCP flows that originated
from its clients to the NAM for monitoring.
• Client WAN—Configures the WAE device to export the optimized (WAN side) TCP flows that
originated from its clients to the NAM for monitoring.
• Server WAN—Configures the WAE device to export the optimized (WAN side) TCP flows from its
servers to the NAM for monitoring.
• Server—Configures the WAE device to export the original (LAN side) TCP flows from its servers
to the NAM for monitoring.
• Passthrough—This setting configures the WAE device to export the TCP flows that are passed
through unoptimized.
Step 6 Click Submit to add the new WAAS custom data source.
Note If most of your WAE devices are edge WAE devices, you might want to set the auto config option as an
edge device, and manually configure the data center WAE, for example, choose the Client segment for
monitoring.
Step 1 Choose Configure > Network Analysis Module > Advanced > Data Sources.
Step 1 Choose Configure > Network Analysis Module > Advanced > Data Sources.
The Data Sources window is displayed.
Step 2 Select the WAAS device that you want to modify, and click Edit. The NAM Data Source Configuration
dialog box is displayed.
Step 3 Modify the segments as required.
Step 4 Click the Edit button to edit the WAAS custom data source.
Step 1 Choose Configure > Network Analysis Module > Advanced > Data Sources.
The data sources window is displayed.
Step 2 Select the WAAS custom data source that you want to delete, and click Delete.
A confirmation dialog box asks you to confirm that you want to delete the selected WAAS monitored
server.
Step 3 Click OK if you want to proceed with a deletion of the WAAS custom data source.
Step 1 Choose Configure > Network Analysis Module > Advanced > Preferences.
The Preferences window is displayed.
Step 2 Specify the following preferences:
Navigation
This section includes the following topics:
• Interactive Report
• Saving Filter Parameters
• Setting up a Scheduled Export
Interactive Report
On most monitoring dashboards, you can use the Interactive Report on the left column to redefine the
parameters of the information displayed in the dashboards. Click the Filter button to change the
parameters of the information that appears in the charts.
You can choose from various parameters, such as the time interval for the data being displayed.
The reporting-time interval selection changes depending upon the dashboard that you are viewing, and
the NAM platform that you are using:
• The NAM appliance supports the following short term intervals: Last 5 minutes, last 15 minutes, last
1 hour, last 4 hours, and last 8 hours.
• The Branch Routers (NME-NAM) support the following short term intervals: Last 5 minutes, last
15 minutes, and last 1 hour.
• The other platforms support the following short term intervals: Last 5 minutes, last 15 minutes, last
1 hour, and last 4 hours.
• The Long Term interval selections (Last 1 day, 1 week, and 1 month) are disabled from the following
dashboards: RTP Streams, Voice Call Statistics, Calls Tables, RTP Conversations, Host
Conversations, Conversations, and Response Time Details Views.
• A maximum interval for up to 1 hour is supported for the following dashboards: RTP Streams, Voice
Call Statistics, Calls Tables, RTP Conversations, Host Conversations, Conversations, Response
Time Details Views.
Note The From and To fields are enabled only when the Time Range is set to Custom.
Step 1 At the Interactive Report on the monitoring dashboard, enter a name in the Filter Name field.
A filter is saved only if a filter name is entered. Only saved filters are persisted across multiple login
sessions.
Step 2 Click Submit.
The filter is now saved and displayed underneath the Interactive Report. You can save up to five filters.
You can set up scheduled jobs that will generate a daily report at a specified time, in the specified
interval, and then e-mail it to a specified e-mail address. You can also obtain a report on the spot by
clicking Preview, rather than wait for the scheduled time. This report can also be sent after you preview
it.
To set up a Scheduled Export, follow these steps:
Step 1 On most windows under Network Analysis, the Interactive Report is available on the left side of the
screen. Click the Export button in the Interactive Report area.
The Create Scheduled Report window is displayed.
Step 2 From the Export Type drop-down list, choose Daily or Weekly.
Step 3 From the Export Time drop-down list (when you would like the report delivered to you), choose Day
and Hour.
Step 4 Choose the Report Time (if Daily) or the Data Time Range (if Weekly). This is the time interval you
want measured.
The Report Time for a daily report is restricted to the current 24 hours.
The Report Time for a weekly report is always from 5:00 p.m to 5:00 p.m. (17:00 to 17:00), for however
many days chosen.
For example, if you choose Export Type Weekly, Data Time Range Last 2 Days, and Export Time: Day
Wednesday and Hour 13:00, the report will show data from Sunday at 17:00 to Tuesday at 17:00.
If you choose Export Time: Day Wednesday and Hour 18:00, the report will show data from Monday at
17:00 to Wednesday at 17:00.
Step 5 Enter the e-mail address to which you would like the report delivered.
Step 6 Choose the delivery option (HTML or CSV).
Step 7 Enter the report description, that will appear at the end of the filename of the report delivered to you.
Step 8 Depending on the task you want to perform, perform one or more of the following tasks:
• Click Reset to clear the values in the dialog box.
• Click Preview to preview the report.
• Click Submit to submit the request for the scheduled job.
• Click Cancel to close the dialog box and return to the previous screen.
Throughput Dashboards
This section includes the following topics:
• Network Dashboard
• Top Applications Dashboard
• Application Dashboard
Network Dashboard
The Network dashboard enables you to view LAN versus WAN throughput for WAAS users both in the
incoming and outgoing directions. To view these reports, configure interface groups that comprise WAN
and LAN interfaces. The displayed information represents the total data collected since the collection
was created, or since the NAM was restarted. To view the Network dashboard, choose Monitor >
Network Analysis Module > Throughput > Network.
Choose an interface group view from the Interface Selector on the left side of the window to see traffic
in the charts. Click the arrow icon to the left of the NDE data source name to display all interfaces
groups, and then select an interface group view. If the charts show no data, and you see the message
“Interface needs to be selected,” you have not yet chosen an interface group view.
Once chose the interface group view, you see the following charts populated:
• Interface Traffic (Ingress % Utilization and Egress % Utilization)
• Top N Applications—Ingress
• Top N Applications—Egress
• Top N Hosts—Ingress
• Top N Hosts—Egress
• Top N DSCP Aggr—Ingress
• Top N DSCP Aggr—Egress
You can enter the interface speed manually through the Interface capacity table, or the speed can be auto
configured if the SNMP settings for the NDE device are entered in the data source table.
Applications Over Time shows you all of the applications that have been running for a specific time
period. The color-coded legend shows you what the applications are running.
If you place your cursor over any of the data points, you get more details about the exact value for each
of the applications that are running.
Application Dashboard
• In the Application window (Monitor > Network Analysis Module > Throughput > Application),
you can see the traffic level for a given application over a selected period of time. It is available
under the . This window shows you the following:
• A graph of application traffic over time.
• Top hosts that transmit and receive traffic on that application for a selected time period.
• Application Configuration that shows the criteria by which the NAM classifies packets as that
application. This criteria is typically a list of TCP or UDP ports or both that identify the application.
Note Note that some applications are identified by heuristic or other state-based algorithms.
Application Dashboard
The Application dashboard provides the transaction time performance for an application as well as the
original and optimized traffic volume reported by the flow agent. Information about how the transaction
time is broken up across client, WAN, and server segments is also provided. For example, if the
transaction time is dominated by the server segment time (due to a slow server), WAAS may not be able
to improve the performance as much as when it is dominated by WAN network time. To view the
Application performance analysis dashboard, choose Monitor > Network Analysis Module >
Performance Analysis > Application.
The charts that are available on this dashboard are as follows:
• Transaction Time (Client Experience)
• Traffic Volume and Compression Ratio
• Average Concurrent Connections (Optimized vs. Passthru)
• Multi-Segment Network Time (Client LAN - WAN - Server LAN)
The Response Time Across Multiple Segments window shows the response time metrics of the selected
server or client-server pair from applicable data sources.
This chapter describes how to configure Simple Network Management Protocol (SNMP) traps,
recipients, community strings, group associations, user security model groups, and user access
permissions.
Note Throughout this chapter, the term Cisco WAAS device is used to refer collectively to the WAAS Central
Manager and WAEs in your network. The term WAE refers to WAE appliances, WAE Network Modules
(the Cisco Network Modules-WAE family of devices), and Cisco Services Ready Engine service
modules (SRE-SM) running WAAS.
Understanding SNMP
SNMP is an interoperable standards-based protocol that allows for external monitoring of Cisco WAAS
devices through an SNMP agent.
An SNMP-managed network consists of the following primary components:
• Managed device—A network node that contains an SNMP agent and resides on a managed network.
Managed devices include routers, access servers, switches, bridges, hubs, computer hosts, and
printers. Each WAAS device running the WAAS software has an SNMP agent.
• SNMP agent—A software module that resides on a managed device. An agent has local knowledge
of management information and translates that information into a form that is compatible with
SNMP. The SNMP agent gathers data from the MIB, which is the repository for information about
device parameters and network data. The agent can also send traps, or notification of certain events,
to the management system.
• Management station—Also known as the SNMP host, the management station uses SNMP to send
the agent an SNMP Get request to obtain information from the WAAS device. The managed devices
then collect and store management information and use SNMP to make this information available
to the management station.
Before you can access this SNMP information, you must have deployed an SNMP management
application on a management station. This SNMP management station is referred to as the SNMP host
because it uses SNMP to send the device agent an SNMP Get request to obtain information from the
WAAS device.
This section contains the following topics:
• SNMP Communication Process
• Supported SNMP Versions
• SNMP Security Models and Security Levels
• Enabling the SNMP Agent on a WAAS Device
Note The SNMP agent on the WAAS device only initiates communication with the SNMP host
under unusual conditions; it will initiate communication when it has a trap it needs to send
to the host. For more information on this topic, see Enabling SNMP Traps.
3. After locating the specified information in the MIB, the agent uses SNMP to send the information
to the SNMP management station.
Figure 17-1 illustrates these SNMP operations for an individual WAAS device.
SNMP
requests
WAAS
Central Manger GUI SNMP traps
WAE and statistics
SNMP agent
247103
WAAS CLI Local management database
SNMPv3 provides security models as well as security levels. A security model is an authentication
process that is set up for a user and the group in which the user resides. A security level is the permitted
level of security within a security model. A combination of a security model and a security level
determines which security process is used when an SNMP packet is handled. Three security models are
available: SNMPv1, SNMPv2c, and SNMPv3.
Table 17-1 describes the combinations of security models and security levels.
Cisco-Supported MIBs
This section contains the following topics:
• About Cisco-Supported MIBs and CISCO-SMI
• Types of MIB Output for SNMP Monitoring
• Types of Cisco-Supported MIBs
• Downloading MIB Files
• Using MIBs to Monitor WAAS
Figure 17-2 Sample MIB Output for DRE Cache Information with cwoDreCacheStats
If you want to monitor the trend of how DRE disk space is being used over a particular period of time,
you could run the cwoDreCacheStatsUsed MIB for a specified time range. As shown below in
Figure 17-3, you could view data for a specified time range that displays the usage trend for the DRE
cache disk space.
Figure 17-3 Sample MIB Output for Percentage of DRE Disk Space Being Used
For more information on MIB usage with SNMP monitoring, and for more examples of MIB output, see
Using MIBs to Monitor WAAS.
Alarms (CISCO-CONTENT-ENGINE-MIB)
Table 17-3 describes CISCO-CONTENT-ENGINE-MIB objects that are used to verify if there are
critical, major, or minor alarms raised on the system.
AOs (CISCO-WAN-OPTIMIZATION-MIB)
The CISCO-WAN-OPTIMIZATION-MIB group displays information about the status and statistics
associated with application optimizers.
The Application Optimizers (AOs), also known as Application Acclerators, statistics MIB group
displays status information such as configuration or license information for AOs including HTTP, SSL,
MAPI, SMB, and ICA.
This section contains the following tables for the cwoAoStats MIB objects:
• Table 17-4, “AO Name, Configuration, and License MIB Objects”
• Table 17-5, “AO Operational Status, Startup Time, and Reset Time MIB Objects”
• Table 17-6, “AO Summary Connection Information MIB Objects”
• Table 17-7, “AO Current Connection Information MIB Objects”
• Table 17-8, “AO Load Status and Bandwidth Information MIB Objects”
Table 17-5 AO Operational Status, Startup Time, and Reset Time MIB Objects
Applications (CISCO-WAN-OPTIMIZATION-MIB)
The cwoAppStats MIB object displays information about application optimization and traffic.
AppNav (CISCO-APPNAV-MIB)
The CISCO-APPNAV-MIB group displays information about AppNavwhen the WAAS device is in
AppNav Controller mode.
This section contains the following topics:
• AppNav Controller MIB Objects
• AppNav Controller Group MIB Objects
• AppNav Service Node MIB Objects
• AppNav Service Node Group MIB Objects
• AppNav Service Context MIB Objects
An AppNav Controller is a device that intercepts network traffic and, based on a flow policy, distributes
that traffic to one more WAAS nodes for optimization. Table 17-10 displays AppNav Controller MIB
objects.
An AppNav Controller Group is a group of AppNav Controllers that together provide the necessary
intelligence for handling asymmetric flows and high availability. Table 17-11 displays AppNav
Controller Group MIB objects.
A WAAS node is also known as a service node. Table 17-12 displays AppNav service node MIB objects.
cAppNavSNSNGName The name of the service node group to which the specified service
node belongs.
cAppNavSNCurrentCMState The current cluster membership state of the specified service node.
• Green (1)—Operational with no error conditions
• Yellow (2)—Degraded (overloaded, joining cluster, or has other
noncritical operational issues)
• Red (3)—Critical (one or more processes is in a critical state)
• Gray (4)—Disabled
• Black (5)—Unknown status
A service context is used to tie the AppNav Controller group, service node group, and AppNav policy
map together. Table 17-15 displays the AppNav Service Context MIB objects.
Configuration (CISCO-CONFIG-MAN-MIB)
The CISCO-CONFIG-MAN-MIB group represents a model of configuration data that exists in various
locations:
• Running—In use by the running system
• Terminal—Saved to whatever hardware is attached as the terminal
• Local—Saved locally in NVRAM or in flash memory
• Remote—Saved to a server on the network
Note The CISCO-CONFIG-MAN-MIB group includes only operations that are specifically related to
configuration, although some of the system functions can be used for general file storage and transfer.
CISCO-CDP-MIB Group
The CISC-CDP-MIB group displays the ifIndex value of the local interface.
For example:
• For 802.3 repeaters on which the repeater ports do not have ifIndex values assigned, this value is a
unique value for the port and is greater than any ifIndex value supported by the repeater.
• In this example, the specific port is indicated by the corresponding values of cdpInterfaceGroup
and cdpInterfacePort, where these values correspond to the group number and the port number
values of RFC 1516.
CISCO-ENTITY-ASSET-MIB Group
For example, a manufacturing date in the serial number, consider all data items to be a single unit.
Do not decompose the items or parse them. Use only string equal and unequal operations on them.
HTTP (CISCO-WAN-OPTIMIZATION-MIB)
Table 17-20 shows the HTTP AO information MIB objects, which provide information such as the
percentage estimated time saved due to optimizations done by HTTP AO since it was started or the total
number of SharePoint Optimized HTTP sessions.
Note Discontinuities in the value of these HTTP counters can occur at re-initialization of the HTTP AO. The
last discontinuity time is indicated by the value of cwoAoStatsLastResetTime for the HTTP AO.
Interfaces (IF-MIB)
The IF-MIB group supports querying for interface-related statistics including 64-bit interface counters.
These counters include received and sent octets, unicast, multicast, and broadcast packets on the device
interfaces. All the objects from ifXEntry are supported except for ifCounterDiscontinuityTime. This
MIB is documented in RFC 2233.
Loopback interface interface information are not reported.
A transmission error or discard can point to Layer 1 or Layer 2 problems, such as a bad cable or a
speed/duplex mismatch on a connected switch or router.
This section contains the following types of MIB objects for the IF-MIB group:
• Interface Description MIB Object
• Interface Status MIB Objects
• Interface Discards MIB Objects
• Interface Errors MIB Objects
The ifDescr MIB object displays information about the interface, including the name of the
manufacturer, the product name, and the version of the hardware or software interface.
Note At system startup, all interfaces start with ifAdminStatus down. After either management
action or configuration information, ifAdminStatus is changed to either up or testing, or
remains down.
Note If ifAdminStatus is down, then ifOperStatus should also be down. If ifAdminStatus is up, then
ifOperStatus should also be up.
Note Discontinuities in the value of ifInDiscards or of ifOutDiscards can occur at re-initialization of the
management system and at other times, as indicated by the value ifCounterDiscontinuityTime.
Note Discontinuities in the value of ifInErrors or of ifOutErrors can occur at re-initialization of the
management system and at other times, as indicated by the value ifCounterDiscontinuityTime.
IP-MIB Group
The IP-MIB group manages IP and ICMP implementations, excluding their management of IP routes.
IP-FORWARD-MIB Group
MIB-II Group
The MIB-II group is the Internet Standard MIB, and is used with network management protocols in
TCP/IP-based internets. The MIB-II is documented in RFC 1213, and is found in the RFC1213-MIB file
in the v1 directory on the download site (other MIBs are in the v2 directory).
Note The following objects from this MIB are not supported:
—ifInUnknownProtos
—ifOutNUcastPkts
—ipRouteAge
—TcpConnEntry group
—egpInMsgs
—egpInErrors
—egpOutMsgs
—egpOutErrors
—EgpNeighEntry group
—egpAs
—atTable
—ipRouteTable
MAPI (CISCO-WAN-OPTIMIZATION-MIB)
Table 17-23 displays the Message Application Programming Interface (MAPI) AO MIB objects.
Note For these MIB objects, discontinuities in the value of the counter can occur at re-initialization of the
MAPI AO. The last discontinuity time is indicated by the value of cwoAoStatsLastResetTime for the
MAPI AO.
NFS (CISCO-WAN-OPTIMIZATION-MIB)
Table 17-24 displays the Network File System (NFS) application accelerator MIB objects.
Note For these MIB objects, discontinuities in the value of the counter can occur at re-initialization of the NFS
AO. The last discontinuity time is indicated by the value of cwoAoStatsLastResetTime for the NFS AO.
EVENT-MIB Group
The EVENT-MIB group defines the event triggers and actions for network management purposes. This
MIB is described in RFC 2981.
HOST-RESOURCES-MIB Group
This MIB manages host systems. The term “host” implies any computer that communicates with other
similar computers connected to the Internet.
The HOST-RESOURCES-MIB provides attributes that are common to all Internet hosts, for example,
personal computers and systems that run variants of UNIX. It does not apply to devices whose primary
function is communications services (terminal servers, routers, bridges, monitoring equipment).
Note The following objects from this MIB are not supported:
—HrPrinterEntry
—hrSWOSIndex
—hrSWInstalledGroup
SMB (CISCO-WAN-OPTIMIZATION-MIB)
The CISCO-WAN-OPTIMIZATION-MIB group displays information about the status and statistics
associated with optimization and application accelerators.
Note For these MIB objects, discontinuities in the value of the counter can occur at re-initialization of the
SMB AO. The last discontinuity time is indicated by the value of cwoAoStatsLastResetTime for the
SMB AO.
This section describes the cwoAoSmbxStats MIB objects, and contains the following topics:
• About SMB Statistics MIB Objects
• cwoAoSmbxStats MIB Objects for Cache Information
• cwoAoSmbxStats MIB Objects for Client and Server Information
• cwoAoSmbxStats MIB Objects for LAN and WAN Information
• cwoAoSmbxStats MIB Objects for RTT, Response Time, and File Information
• cwoAoSmbxStats MIB Objects for SMB Requests Information
The Server Message Block (SMB) application accelerator (AO) transparently accelerates traffic and
supports prepositioning of files. It relies on automatic discovery. You can fine-tune this accelerator for
specific traffic needs.
MIB Object
cwoAoSmbxStatsBytesReadCache The total number of bytes read from the SMB AO cache
(Read-ahead and Metadata cache) since it was started.
cwoAoSmbxStatsBytesWriteCache The total number of bytes written to SMB AO cache
(Read-ahead and Metadata) since it was started.
cwoAoSmbxStatsMDCacheHitCount The SMB AO Metadata cache hit count since SMB AO was
started.
cwoAoSmbxStatsMDCacheHitRate The SMB AO Metadata cache hit rate since it was started.
cwoAoSmbxStatsMaxRACacheSize The maximum disk space that can be allocated for Read
Ahead data in the SMB AO cache.
cwoAoSmbxStatsMaxMDCacheSize The maximum disk space that can be allocated for Metadata
in the SMB AO cache
cwoAoSmbxStatsRAEvictedAge The amount of time spent in the SMB AO Read Ahead cache
by the resource that was last evicted since last update.
cwoAoSmbxStatsTotalFilesInRACache The total number of files in the SMB AO Read Ahead cache.
cwoAoSmbxStats MIB Objects for RTT, Response Time, and File Information
Table 17-29 SMB RTT, Response Time, and File Information MIB Objects
TFO (CISCO-WAN-OPTIMIZATION-MIB)
The CISCO-WAN-OPTIMIZATION-MIB group displays information about the status and statistics
associated with optimization and application accelerators.
This section describes the cwoTfoStats MIB objects, and contains the following topics:
• About TFO Statistics MIB Objects
• cwoTfoStats MIB Object for TFO Load Status
WAAS uses a variety Transport Flow Optimization (TFO) features to optimize TCP traffic intercepted
by the WAAS devices. TFO protects communicating clients and servers from negative WAN conditions,
such as bandwidth constraints, packet loss, congestion, and retransmission.
Note On both branch and datacenter devices, the cache age should provide an effective
capacity-to-reduction ratio. It is important that you baseline this value and set triggers
according to your specific use case.
For a datacenter device, the cache age should be approximately 5-7 days. However, there
are scenarios where your cache age could be much lower and WAAS is still providing a very
good reduction ratio; for example, in replication or backup scenarios.
For a branch device, the cache age in practice will likely be more than 5-7 days.
• To display DRE cache information, including the portion of the disk space allocated for DRE cache,
the age of the oldest data unit the data block, and the amount of data units replaced in the last hour,
use cwoDreCacheStats MIB objects:
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsTotal.0 = Counter64: 77822 MB
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsUsed.0 = Gauge32: 96 percent
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsDataUnitUsage.0 = Counter64: 0 MB
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsReplacedOneHrDataUnit.0 = Counter64: 0 MB
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsDataUnitAge.0 = STRING: 0s
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsSigblockUsage.0 = Counter64: 1695 MB
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsReplacedOneHrSigblock.0 = Counter64: 0 MB
CISCO-WAN-OPTIMIZATION-MIB::cwoDreCacheStatsSigblockAge.0 = STRING: 14d17h
• To display compression ratio values, use cwoDrePerfStats MIB objects. For datacenter devices, it
is especially useful to view Encode compression ratio values, and for branch devices, it is especially
useful to view Decode compression ratio values.
CISCO-WAN-OPTIMIZATION-MIB::cwoDrePerfStatsEncodeCompressionRatio.0 = Gauge32: 9 percent
• To display compression latency values, use cwoDrePerfStats MIB objects. For datacenter devices,
it is especially useful to view Encode compression latency values, and for branch devices, it is
especially useful to view Decode compression latency values.
CISCO-WAN-OPTIMIZATION-MIB::cwoDrePerfStatsEncodeCompressionLatency.0 = Counter64: 0 ms
CISCO-WAN-OPTIMIZATION-MIB::cwoDrePerfStatsDecodeCompressionLatency.0 = Counter64: 0 ms
Note Set a baseline for the latency value. If the latency value begins to deviate higher than normal,
it could indicate a potential disk problem or failing disk, or it could indicate that a new traffic
pattern is driving higher than normal disk input/output.
• To display the average size of all the messages handled by DRE during encoding or decoding, use
cwoDrePerfStats MIB objects:
CISCO-WAN-OPTIMIZATION-MIB::cwoDrePerfStatsEncodeAvgMsgSize.0 = STRING: 1991 B
CISCO-WAN-OPTIMIZATION-MIB::cwoDrePerfStatsDecodeAvgMsgSize.0 = STRING: 1082 B
• To check if there are any transmission-related errors which could point to L1 and L2 problems (e.g.
bad cable or speed/duplex mismatch on connected switch/router), use ifInErrors and ifInDiscards.
IF-MIB::ifInErrors.1 = Counter32: 0
IF-MIB::ifInErrors.2 = Counter32: 0
IF-MIB::ifOutErrors.1 = Counter32: 0
IF-MIB::ifOutErrors.2 = Counter32: 0
IF-MIB::ifInDiscards.1 = Counter32: 0
IF-MIB::ifInDiscards.2 = Counter32: 0
IF-MIB::ifOutDiscards.1 = Counter32: 0
IF-MIB::ifOutDiscards.2 = Counter32: 0
To be able to assess what normal load and benefits WAAS provides for your network, we recommend
that you perform some trend and baseline analysis. Then, based on the results, you can create traps and
alerts if the counters are above or below your defined thresholds - whichever is appropriate for the
specific counter.
To monitor the system to determine if, from a connection standpoint, you need a larger device, follow
these steps:
Step 1 To verify key connection information, use the following MIB to verify the maximum number of
connections the system can optimize.
CISCO-WAN-OPTIMIZATION-MIB::cwoTfoStatsMaxActiveConn.0 = Counter64: 750
Step 2 Use the following MIB object to verify the total number of active optimized connections:
CISCO-WAN-OPTIMIZATION-MIB::cwoTfoStatsActiveOptConn.0 = Counter64: 21
Step 3 After verifying the maximum number of connections and the total active optimized connections, you can
do one of the following:
• Set an alert in your monitoring tool.
Or
• Set an SNMP trap if the number gets close to the limit on a consistent basis.
For example, the WAAS poll interval is every 5 minutes. An alert is triggered if within a 1-hour or
4-hour period the total number of active optimized connections crosses 90% of the maximum number
of connections the system can optimize 10 times.
For how to set an SNMP trap, see Enabling SNMP Traps.
Note If the TFO load status shows Unknown(1), Yellow(3) or Red(4), then the TFO is overloaded or has some
other error condition, and no optimization can occur at any other level, such as DRE, LZ, or AO.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > General Settings. The SNMP General Settings window
appears. (See Figure 17-4.) Table 17-35 describes the fields in this window.
To enable SNMP traps from the CLI, you can use the snmp-server enable traps global configuration
command.
To control access to the SNMP agent by an external SNMP server, use the snmp-server access-list
global configuration command to apply an SNMP ACL.
Note If you are using an SNMP server ACL, you must permit the loopback interface.
Note If you override the device group settings from the SNMP General Settings window, the Central Manager
deletes the SNMP community, SNMP group, SNMP user, SNMP view, and SNMP host settings. You are
asked to confirm this behavior.
To define additional SNMP traps for other MIB objects of interest to your particular configuration, see
Defining SNMP Triggers to generate User-Defined Traps.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > Trigger. The SNMP Trigger List Entries window appears.
The columns in this window are the same as the parameters described in Table 17-36.
Step 3 In the taskbar, click the Create New SNMP Trigger List Entry icon. The Creating New SNMP Trigger
window appears. Table 17-36 describes the fields in this window.
Step 4 In the appropriate fields, enter the MIB name, frequency, test, sample type, threshold value, and
comments.
Note You can create valid triggers only on read-write and read-only MIB objects. If you create a
trigger on a read-create MIB object, it is deleted from the Central Manager configuration after
one one data feed poll cycle.
The new SNMP trigger is listed in the SNMP Trigger List window.
You can edit an SNMP trigger by clicking the Edit icon next to the MIB name in the SNMP Trigger List
Entries window.
You can delete an SNMP trigger by clicking the Edit icon next to the MIB name and then clicking the
Delete taskbar icon.
Note If you delete any of the default SNMP triggers, they will be restored after a reload.
Note When you upgrade a WAE from an earlier version to the 6.0 version, all triggers are deleted.
When you upgrade the Central Manager to 6.0, all the Device Group triggers will be copied to a WAE
running a previous software version (if any) and all the Device Group triggers will be deleted. Also the
Trigger Aggregate Settings will be set to false for all the WAES (running a version earlier than 6.0) that
are being managed by the Central Manager (running version 6.0). This ensures that the DG triggers are
no longer applied to any of the devices running a version earlier than 6.0.
Note When you downgrade a WAE from a 6.0 to an earlier release all the IPv6 configurations will be removed.
All the triggers and the monitor user configurations are deleted.
You can use the snmp trigger global configuration command to define SNMP traps from the CLI.
To control access to the SNMP agent by an external SNMP server, use the snmp-server access-list
global configuration command to apply an SNMP ACL.
Note If you are using an SNMP server ACL, you must permit the loopback interface.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > Host. The SNMP Hosts window appears.
Step 3 In the taskbar, click the Create New SNMP Host icon. The Creating New SNMP Host window appears.
Table 17-37 describes the fields in this window.
Step 4 Enter the hostname or IP address of an SNMP trap host, SNMP community or user name, security model
to send notification, and retry count and timeout for inform requests.
Step 5 Click Submit.
To specify the SNMP host from the CLI, you can use the snmp-server host global configuration
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > Community. The SNMP Community Strings window
appears.
Step 3 In the taskbar, click the Create New SNMP Community String icon. The Creating New SNMP
Community String window appears. Table 17-38 describes the fields in this window.
Step 4 In the appropriate fields, enter the community string, choose whether or not read-write access to the
group is allowed, and enter the group name.
Step 5 Click Submit.
To configure a community string from the CLI, you can use the snmp-server community global
configuration command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > View. The SNMP Views window appears.
Step 3 In the taskbar, click the Create New View icon. The Creating New SNMP View window appears.
Table 17-39 describes the fields in this window.
Step 4 In the appropriate fields, enter the view name, the family name, and the view type.
Step 5 Click Submit.
Step 6 Create an SNMP group that will be assigned to this view as described in the section that follows.
To create an SNMP view from the CLI, you can use the snmp-server view global configuration
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > Group. The SNMP Group Strings for WAE window
appears.
Step 3 In the taskbar, click the Create New SNMP Group String icon. The Creating New SNMP Group String
for WAE window appears. Table 17-40 describes the fields in this window.
Step 4 In the appropriate fields, enter the SNMP group configuration name, the security model, and the names
of the read, write, and notify views.
Step 5 Click Submit.
Step 6 Create SNMP users that belong to this new group as described in the section that follows.
To create an SNMP group from the CLI, you can use the snmp-server group global configuration
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > User. A list of SNMP users for the device or device group
appears.
Step 3 In the taskbar, click the Create New SNMP User icon. The Creating New SNMP User window appears.
Table 17-41 describes the fields in this window.
Note For SNMPv3 users using WAAS Software Version 6.x and later,
the private password must be a minimum of 8 alphanumeric
characters and a maximum of 256 characters.
Confirmation Password Private password for confirmation. The reentered password must be the
same as the one entered in the previous field.
Step 4 In the appropriate fields, enter the username, the group to which the user belongs, the engine identity of
the remote entity to which the user belongs, the authentication algorithm used to protect SNMP traffic
from tampering, the user authentication parameters, and the authentication parameters for the packet.
Step 5 Click Submit.
To create an SNMP user from the CLI, you can use the snmp-server user global configuration
command.
Additionally, if you want to set up a monitor user to monitor the configured triggers, you can select it
from the Monitor User Settings drop-down box.
Any SNMP V3 user can be configured as a Monitor User. All the SNMP users created with a group
having V3 authentication other than v3-private are eligible to be a Monitor User. A monitor user cannot
be deleted, while being in that role. Similarly the corresponding monitor user group also cannot be
deleted when a monitor user is configured with that group.
To create a monitor user from the CLI, you can use the snmp-server monitor user global configuration
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > Asset Tag. The SNMP Asset Tag Settings window appears.
Step 3 In the Asset Tag Name field, enter a name for the asset tag.
To configure SNMP asset tag settings from the CLI, you can use the asset tag global configuration
command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name (or Device Groups >
device-group-name).
Step 2 Choose Configure > Monitoring > SNMP > Contact Information. The SNMP Contact Settings
window appears.
Step 3 Enter a contact name and location in the provided fields.
Step 4 Click Submit.
To configure SNMP contact settings from the CLI, you can use the snmp-server contact global
configuration command.
Step 1 From the WAAS Central Manager menu, choose Devices > device-name. (This setting is not supported
from device groups.)
Step 2 Choose Configure > Monitoring > SNMP > Trap Source. The SNMP Trap Source Settings window
appears.
Step 3 From the Trap Source drop-down list, choose the interface to be used as the trap source. From the
available physical, standby, and port-channel interfaces, only those with IP addresses are shown in the
list. For vWAAS devices, virtual interfaces with assigned IP addresses are shown in the list.
Note An interface assigned as a trap source cannot be removed until it is unassigned as a trap source.
To configure SNMP trap source settings from the CLI, you can use the snmp-server trap-source global
configuration command.
The WAAS software includes over 200 predefined optimization policy rules that help your WAAS
system classify and optimize some of the most common traffic on your network. Table A-1 lists the
predefined applications and class maps that WAAS will either optimize or pass through based on the
policy rules that are provided with the system.
Before you create an optimization policy, we recommend that you review the predefined policy rules and
modify them as appropriate. Often, you can more easily modify an existing policy rule than create a new
one.
When reviewing Table A-1, note the following information:
• The subheadings represent the application names, and the associated class maps are listed under
these subheadings. For example, Authentication is a type of application and Kerberos is a class map
for that application.
• Applications and class maps with the word (monitored) next to them are monitored by the WAAS
Central Manager, which can monitor statistics for up to 25 applications and 25 class maps at a time.
To view statistics for one of the unmonitored applications, use one of the following methods:
– Use the WAAS CLI, which can display statistics for all applications and class maps on a WAAS
device. For more information, see the Cisco Wide Area Application Services Command
Reference.
– Modify the application or class map settings so the WAAS Central Manager GUI displays
statistics for the desired application or class map. For more information, see Chapter 12,
“Configuring Application Acceleration.”
• WAAS Express devices have similar default policy rules but provide application acceleration only
for HTTP, SSL, and SMB traffic. Where a different application accelerator is listed in Table A-1, it
is not part of the WAAS Action for a WAAS Express device.
The WAAS software uses the following optimization technologies based on the type of traffic that it
encounters:
• TFO (transport flow optimization)—A collection of optimization technologies such as automatic
windows scaling, increased buffering, and selective acknowledgment that optimize all TCP traffic
over your network.
• DRE (data redundancy elimination)—A compression technology that reduces the size of transmitted
data by removing redundant information before sending the shortened data stream over the WAN.
DRE operates on significantly larger streams and maintains a much larger compression history than
LZ compression. DRE can use bidirectional, unidirectional, or adaptive caching. Unless noted in
Table A-1, DRE caching is bidirectional.
• LZ (compression)—Another compression technology that operates on smaller data streams and
keeps limited compression history compared to DRE.
• Application accelerator—A collection of individual application accelerators for the following traffic
types: EPM, HTTP, ICA, MAPI, NFS, SSL, and streaming video. (Some application accelerators are
not available on WAAS Express devices.)
.
Table A-1 Predefined Traffic Policy Rules
You can use the transaction logging feature to log individual TCP transactions for a WAAS device. For
information on configuring transaction logging, see the Configuring Transaction Logging in Chapter 16,
“Troubleshooting Your WAAS Network.”
TFO transaction logs are kept on the local disk in the local/local1/logs/working.log directory.
There are several kinds of transaction log messages that have different templates, as follows
• Optimized Flow Start message:
Time_Stamp :Conn_ID :Src_IP :Src_Port :Dst_IP :Dst_Port :OT :Log_type :Conn_type :Peer_ID
:App_map_name :App_name :App_classifier_name :Flag_directed_mode :TFO_cfgd_policy
:TFO_drvd_policy :TFO_peer_policy :TFO_neg_policy :TFO_applied_policy :TFO_reject_reason
:AO_cfgd_policy :AO_drvd_policy :AO_neg_policy :AO_reject_reason :SSL_reject_reason :DSCP
:Link_rtt
• Optimized Flow End Message:
Time_Stamp :Conn_ID :Src_IP :Src_Port :Dst_IP :Dst_Port :OT :Log_type :Conn_type
:AO_neg_policy :Original_bytes_read :Original_bytes_written :Optimized_bytes_read
:Optimized_bytes_written
• Pass Through Flow Message:
Time_Stamp :Src_IP :Src_Port :Dst_IP :Dst_Port :BP :Bypass_Reason :TFO_cfgd_policy
:TFO_drvd_policy :TFO_peer_policy :TFO_reject_reason :AO_cfgd_policy :AO_drvd_policy
:AO_reject_reason
• Optimized Flow TFO End Message:
Time_Stamp :Conn_ID :Src_IP :Src_Port :Dst_IP :Dst_Port :SODRE :END :Original_bytes_read
:Original_bytes_written :Optimized_bytes_read :Optimized_bytes_written :Conn_close_state
• System Restart Message:
Time_Stamp :0 :0 :0 :0 :0 :RESTART
Table B-1 describes the fields found in the transaction log messages.
Field Description
Time_Stamp Time stamp indicating when the log message was generated.
Conn_ID A unique identifier for the connection.
Src_IP, Src_Port Source IP address and port number for the connection.
Field Description
Dst_IP, Dst_Port Destination IP address and port number for connection.
OT Indicates an optimized connection.
BP Indicates a pass-through connection.
SODRE Indicates a log message generated by TFO.
Log_type START or END indicates the start or end of the flow.
Conn_type Type of connection:
INTERNAL CLIENT–locally initiated connection from the WAE,
EXTERNAL CLIENT–WAE acting as branch device for the connection,
INTERNAL SERVER–locally terminated connection at the WAE,
EXTERNAL SERVER–WAE acting as data center device for the
connection.
Peer_ID Device ID of the peer WAE.
App_map_name Map name.
App_classifier_name Classifier name.
App_name Application name.
TFO_cfgd_policy The TFO configured policy on the local device.
TFO_drvd_policy The TFO derived policy on the local device based on the configured and
dynamic conditions. This policy is used to negotiate with the peer WAE.
TFO_peer_policy The TFO derived policy on the peer that is sent to the local device.
TFO_neg_policy The TFO negotiated policy, which is the lowest common policy between the
derived and peer policies.
TFO_applied_policy The final policy applied to the connection. After the connection has been
established, policy changes may be made to the connection based on the
data on the connection, thus the applied policy can differ from the
negotiated policy.
TFO_reject_reason Indicates the reason for a rejected connection. “None” indicates the reject
reason is not set.
AO_cfgd_policy The application accelerator configured on the local device. This is derived
from the accelerator configured in the corresponding policy.
AO_drvd_policy The application accelerator derived policy on the local device.
AO_neg_policy The application accelerator negotiated policy, which is the lowest common
policy between the derived and peer policies.
AO_reject_reason Indicates the reason an application accelerator rejected the connection.
“None” indicates the reject reason is not set.
SSL_reject_reason Indicates the reason the SSL accelerator rejected the connection. “None”
indicates the reject reason is not set.
DSCP Differentiated Services Code Point value set on the outgoing connection.
Link_rtt Link round trip time in milliseconds.
Original_bytes_read Bytes read on the original side of the connection.
Original_bytes_written Bytes written on the original side of the connection.
Field Description
Optimized_bytes_read Bytes read on the optimized side of the connection.
Optimized_bytes_written Bytes written on the optimized side of the connection.
RESTART Indicates that the WAE was reloaded and the transaction log process was
started.
Pass-Through Connection
Thu Jul 24 03:09:34 2008 :2.75.52.130 :40027 :2.75.52.2 :80 :BP :GLB_CFG :(DRE,LZ,TFO) (None) (None) :<Global
Config> :(HTTP) (None) :<Global Config>
System Restart
Sun Oct 25 17:46:32 2009 :0 :0 : 0 :0 :0 :RESTART
passthrough 13-55
Numerics
TFO only 13-55
10 Gigabit Ethernet interfaces TFO with DRE (Adaptive Cache) 13-55
modifying 6-7 TFO with DRE (Bidirectional Cache) 13-55
TFO with DRE (Unidirectional Cache) 13-55
TFO with LZ compression 13-55
A
types 13-55
AAA accounting activating devices 16-35
configuring 7-34 adaptive buffering, TFO 13-66
AAA-based management systems 2-26, 7-2 adding
acceleration charts 17-13
about 1-7, 13-1 administrative login authentication and authorization
features 1-7 default 7-4
TCP adaptive buffering settings 13-66 for WAEs 7-2
TCP settings 13-64 local database description 7-6
accelerators overview of 7-1
enabling 13-3 RADIUS overview 7-12
accelerator threshold 13-58 TACACS+ overview 7-14
accounts Windows domain overview 7-16
creating 8-4 administrative login authentication failover 7-27
creation process 8-2 alarm overload detection, enabling 10-23
deleting 8-6 alarm panel
local CLI 8-2 system dashboard window 17-3
roles-based 8-2 alarms
types 8-1 device reporting 17-4
viewing 8-8 alerts 17-5
ACL application acceleration
interception 5-28 about 1-7, 13-1
See also IP ACL enabling 13-3
action application classifiers
full optimization (adaptive cache) 13-55 creating 13-53
full optimization (bidirectional cache) 13-55 match condition 13-57
full optimization (unidirectional cache) 13-55 restoring 13-61
K
WCCP 5-11
interception ACL 5-28 kernel debugger
interface enabling 17-63
assigning to bridge group 6-20
interface-level DHCP
description 2-9
L
interface module inline mode 5-43 Layer 2 redirection 5-16
interfaces LDAP server signing
configuring 6-1
P R
domains 8-14
managing 8-7 vWAAS
modifying and deleting 8-6 virtual interface configuration 6-14
roles
assigning to 8-12
creating 8-10
W
modifying and deleting 8-13
viewing 8-13 WAAS
viewing 8-8 benefits 1-20
viewing domains 8-17 interfaces 1-10
user authentication. See login authentication WAAS Central Manager
user groups backing up 16-10
about 8-17 restoring 16-10
assigning roles to 8-18 upgrading 16-5
assigning to domains 8-19 WAAS Central Manager GUI
creating 8-18 about 1-10
deleting 8-20 accessing 1-11
viewing 8-20 components 1-12
UTC offsets 10-8 taskbar icons 1-16
See also GMT offsets WAAS CLI, about 1-19
WAAS Express
configuring a device certificate 10-32
V
configuring an NTP server 10-34
version of software 16-3 configuring a user 10-30
video accelerator configuring optimization on interfaces 6-16
configuring 13-23 enabling HTTP secure server 10-33
enabling 13-3 importing Central Manager certificate 10-31
viewing installing a license 10-33
application list 13-59 registering with the Central Manager 10-34
classifier report 13-60 registration process 10-28
logs in the WAE device manager 11-21 reimporting a certificate to the Central
Manager 10-34
policy report 13-60
WAAS interfaces
role settings 8-13
CLI 1-19
WAAS Central Manager GUI 1-10
virtual interfaces
WAE Device Manager GUI 1-18
modifying 6-14
WAAS networks
and IOP interoperability 2-11
VLAN ID check 5-46
network planning for 2-1
VLAN support 5-45