Accelerator OS
Transcription
Accelerator OS
Accelerator OS Software Configuration Guide Software version 6.1.2 Revision 3.0 Pub no. AOSUG_612_GA_141108 This guide is delivered subject to the following conditions and restrictions: This guide contains proprietary information belonging to Expand Networks Inc. Such information is supplied solely for the purpose of assisting explicitly and properly authorized users of the Expand product series. No part of its contents may be used for any other purpose, disclosed to any person or firm or reproduced by any means, electronic, photographic or mechanical, without the express prior written permission of Expand Networks, Inc. The text and graphics are for the purpose of illustration and reference only. The specifications on which they are based are subject to change without notice. The software described in this guide is furnished under a license. The software may be used or copied only in accordance with the terms of that agreement. Information in this guide is subject to change without notice. Corporate and individual names and data used in examples herein are fictitious unless otherwise noted. Copyright© 2008 Expand Networks Inc. All rights reserved. AcceleratorOS™, Accelerator 00™, Accelerator 6800/6810/6920/6840/4800/4810/4820/4920/1800/1810/1820/ 1920™ and ECT™ are trademarks of Expand Networks Inc. Flex 2.5™ includes software developed by the University of California, Berkeley and its contributors. Copyright© 1990, The Regents of the University of California. All rights reserved. Other company and brand product and service names are trademarks or registered trademarks of their respective holders. Table of Contents Chapter 1: Introducing the Accelerator................................... 1 Features and Benefits ........................................................................................ 2 Resiliancy and Redundancy....................................................................... 2 Redefining Application Traffic Management............................................... 2 Next-generation WAN Compression .......................................................... 3 Application-specific Acceleration ........................................................ 3 Layer-7 QoS and Bandwidth Management ................................................ 4 Layer-7 Monitoring and Reporting ...................................................... 5 Branch Office Features ....................................................................... 5 Rapid Deployment/Dependable Results............................................. 6 Maximum Uptime and Reliability ........................................................ 6 The Accelerator Product Line ............................................................................ 7 How the Accelerator Works................................................................................ 8 IP-Based Network ...................................................................................... 8 On-Path .............................................................................................. 8 On-LAN............................................................................................... 8 Configuration and Management......................................................................... 11 Chapter 2:Preparing Network Integration ............................... 13 Working with Bypass Mode................................................................................ 14 Reviewing the Setup Checklist .......................................................................... 15 Performing Setup via the LCD ........................................................................... 17 Performing Setup via the WebUI........................................................................ 19 Studying The WebUI Menu ........................................................................ 19 Performing Setup via the Wizard ....................................................................... 21 Configuring the Wizard............................................................................... 21 Defining Advanced Settings ....................................................................... 22 Setting Links via the Wizard ....................................................................... 22 IV C o nt e nts Setting the Time ......................................................................................... 24 Modifying the Password ............................................................................. 25 Reviewing Wizard Configuration ................................................................ 25 Modifying Basic Setup Configuration ......................................................... 26 Setting Routing Strategy..................................................................... 27 Licensing the Accelerator................................................................................... 28 Activating the I-Key .................................................................................... 29 Activating the License Key ......................................................................... 29 Logging into and out of the Accelerator ............................................................. 30 Integrating the Accelerator into Your Network.................................................... 31 Integrating into a Standard Network........................................................... 31 Integrating into Networks that use Dynamic Routing ................................. 32 Networks Using External QoS or Monitoring Devices................................ 33 Working in Noisy Link Environments.......................................................... 34 Installing On-LAN at a Data Center............................................................ 35 Installing in a High Latency Environment ................................................... 37 Installing in a Web-Intensive Environment ................................................. 38 Using Advanced QoS................................................................................. 39 What is QoS? ..................................................................................... 39 How to Know what’s on Your Network................................................ 39 How to Prioritize Applications ............................................................. 39 Chapter 3:Configuring Networking.......................................... 41 Optimizing the Network Topology ...................................................................... 42 Taking into Account Network-Specific Considerations ............................... 42 Defining WAN Setup .......................................................................................... 44 Setting the Bandwidth ................................................................................ 44 Configuring the WAN.................................................................................. 44 Configuring Secondary IP Addresses ................................................................ 45 Creating and Editing Links ................................................................................. 46 Studying the Links Screen.......................................................................... 47 Adding Links............................................................................................... 47 Editing Links............................................................................................... 50 Using a Virtual IP Address.................................................................. 51 Adding and Editing Links via the CLI.................................................. 52 Setting Subnet Routing ...................................................................................... 53 Configuring Subnets Manually ................................................................... 54 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e V Editing a Subnet.................................................................................. 55 Configuring Remote Subnets Manually ...................................................... 56 Adding Static Routes .......................................................................................... 58 Setting Dynamic Routing.................................................................................... 59 Working with OSPF .................................................................................... 59 Configuring OSPF............................................................................... 60 Working with Router Polling ....................................................................... 61 Enabling Packet Interception ............................................................................. 63 Working with RIP ........................................................................................ 63 Configuring RIP................................................................................... 63 RIP Route Injection ............................................................................. 64 Using RIP for Packet Interception....................................................... 65 Working with WCCP ................................................................................... 65 Using WCCP for Packet Interception.................................................. 66 Setting WCCP on the Router .............................................................. 69 Setting the Accelerator’s Time ........................................................................... 70 Configuring DHCP Servers ................................................................................ 71 Activating DHCP Relay Agent .................................................................... 71 Setting ExpandView Connectivity Parameters ................................................... 73 Chapter 4:Monitoring the Network........................................... 75 Introduction to Monitoring................................................................................... 76 Working with Monitoring ..................................................................................... 77 Installing the JAVA Applet........................................................................... 77 Using Verisign Security Certificate ............................................................. 78 Studying The Monitoring Window ............................................................... 78 Using Link Statistics and Graphs........................................................................ 80 Viewing Throughput Statistics per Link....................................................... 80 Viewing Utilization Statistics per Link ......................................................... 80 Viewing Acceleration Statistics per Link ..................................................... 81 Understanding Acceleration................................................................ 81 Viewing Compression Statistics per Link.................................................... 82 Viewing Statistics per Link .......................................................................... 83 Discovering Traffic.............................................................................................. 86 Viewing Detected Applications ................................................................... 86 Viewing Detailed Traffic Discovery ............................................................. 86 Viewing Monitored Applications.................................................................. 87 R ev isi o n 3. 0 VI C o nt e nts Discovering Layer-7 Applications............................................................... 88 Viewing Applications’ Statistics and Graphs ...................................................... 89 Setting up Graphs............................................................................... 90 Viewing Utilization Statistics per Application .............................................. 90 Viewing Throughput Statistics per Application ........................................... 90 Viewing Acceleration Statistics per Application .......................................... 91 Viewing Compression Statistics per Application ........................................ 91 Viewing Bandwidth Distribution Statistics per Application .......................... 92 Monitoring Applications .............................................................................. 92 Gathering Statistics for Detected Applications ........................................... 93 Viewing Summary Graphs ................................................................................. 95 Viewing Ethernet Statistics................................................................................. 96 Configuring Ethernet Display via the WebUI.............................................. 96 Configuring NetFlow Support............................................................................. 98 Identifying the Traffic .................................................................................. 98 Enabling NetFlow via the WebUI ........................................................ 99 Chapter 5:Applying QoS........................................................... 101 Accelerator QoS................................................................................................. 102 Studying the QoS Solution ......................................................................... 102 Carrying Out Basic QoS Configuration .............................................................. 104 Viewing My Applications ............................................................................ 104 Creating New Applications ......................................................................... 105 Modifying Applications ............................................................................... 109 Layer-7 Applications................................................................................... 110 Creating Web Applications......................................................................... 110 Creating Citrix Applications ........................................................................ 112 Setting Advanced QoS Parameters ................................................................... 115 How QoS Works......................................................................................... 115 Understanding QoS Rules .................................................................. 116 How Traffic Filtering is Applied................................................................... 117 How Traffic Shaping is Applied .................................................................. 118 Studying QoS Bandwidth Allocation ................................................... 118 Setting Inbound QoS.................................................................................. 121 Creating QOS Rules .................................................................................. 122 Editing QoS Rules...................................................................................... 126 Making Decisions for Specific Applications ................................................ 127 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e VII QoS Troubleshooting ......................................................................................... 129 Chapter 6:Optimizing Acceleration Services.......................... 131 Studying TCP Acceleration ................................................................................ 132 Understanding the Shortcomings of TCP ................................................... 132 Studying SCPS, Expand’s TCP Acceleration Solution ............................... 134 Scaling the Transmission Windows .................................................... 134 Error Detection and Proactive Resolution........................................... 135 Congestion Avoidance ........................................................................ 136 Local Network Isolation....................................................................... 136 Link Outage Support ........................................................................... 136 Asymmetric Networks Optimization .................................................... 136 Computing Latency ............................................................................. 137 Configuring TCP Acceleration .................................................................... 139 Enabling TCP Acceleration ................................................................. 141 Understanding Web Acceleration....................................................................... 143 Configuring Web Acceleration via the WebUI ............................................ 144 Configuring HTTP Acceleration .......................................................... 144 Enabling and Disabling HTTP Caching............................................... 145 Settting the Cache Size ...................................................................... 145 Setting Cache Content........................................................................ 145 Clearing HTTP Cache......................................................................... 145 Returning to Default Settings .............................................................. 146 Setting Advanced HTTP Parameters.................................................. 146 Setting HTTP Acceleration Rules ............................................................... 148 Excluding from Caching via the WebUI .............................................. 149 Configuring FTP Acceleration..................................................................... 149 Enabling and Disabling FTP Caching ................................................. 150 Settting the Cache Size ...................................................................... 150 Setting Cache Content........................................................................ 150 Clearing FTP Cache ........................................................................... 150 Returning to Default Settings .............................................................. 151 Setting Advanced FTP Parameters .................................................... 151 Configuring DNS Acceleration.................................................................... 152 Configuring DNS Acceleration ............................................................ 152 Enabling Citrix Acceleration ............................................................................... 156 R ev isi o n 3. 0 VIII C o nt e nts Chapter 7:Configuring and Managing WAFS.......................... 159 Introduction to WAFS ......................................................................................... 160 Expand Networks’ WAFS Solution ............................................................. 160 Supported Servers ..................................................................................... 162 File Servers ........................................................................................ 162 Authentication Servers ....................................................................... 162 Supported Clients....................................................................................... 162 Expand Hardware Device Specifications ............................................ 162 Domains ..................................................................................................... 163 Authentication ............................................................................................ 164 Getting Started with WAFS ................................................................................ 165 Overview .................................................................................................... 165 Enabling WAFS Configuration ........................................................................... 166 Configuring the File Server/Domain Controller .......................................... 166 Defining Shared Directories................................................................ 166 Defining User Permissions ................................................................. 167 Defining Network Settings.......................................................................... 168 Enabling WAFS Operation Mode ............................................................... 171 Excluding Servers or Subnets from WAFS ................................................ 173 Configuring the Data Center and Branch Office ................................................ 174 Setting Up the File Bank Director............................................................... 174 File Server Settings ............................................................................ 175 Summary ............................................................................................ 176 Confirmation and Application.............................................................. 176 Setting Up the File Bank ............................................................................ 178 Overview............................................................................................. 178 Domain Settings ................................................................................. 179 File Bank Director Settings ................................................................. 181 Summary ............................................................................................ 182 Confirmation and Application.............................................................. 182 Installing the License File................................................................................... 184 WAFS Management and Operation Modes ....................................................... 186 The WAFS Management Screen ............................................................... 186 FileBank Director Categories ..................................................................... 187 FileBank Director System........................................................................... 187 File Services............................................................................................... 188 FileBank Director Utilities ........................................................................... 188 FileBank Categories................................................................................... 188 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e IX FileBank System ................................................................................. 189 FileBank Services ............................................................................... 189 Additional Services ............................................................................. 190 FileBank Utilities ................................................................................. 190 Managing the Data Center ................................................................................. 191 Starting the Data Center ............................................................................. 191 Managing File Services .............................................................................. 192 Defining FileBank Director Settings .................................................... 193 Managing System Users..................................................................... 194 Adding File Servers............................................................................. 195 Managing the Compression Filters List............................................... 197 Configuring FileBank Services ................................................................... 199 FileBank Directors............................................................................... 199 Virtual Servers .................................................................................... 200 Windows Domain ................................................................................ 201 Cache Settings.................................................................................... 202 Time to Live (TTL) settings ................................................................. 202 Invalidate Cache ................................................................................. 203 System Users...................................................................................... 203 STF Filters .......................................................................................... 204 Setting Advanced FileBank Features ................................................................. 205 Configuring the Fetch Mechanism.............................................................. 205 Fetch Mechanism Overview................................................................ 205 Fetch User .......................................................................................... 206 Fetch Jobs .......................................................................................... 206 Fetch Settings ..................................................................................... 207 Fetch Activation .......................................................................................... 208 Creating Fetch Jobs............................................................................ 208 Replication Service..................................................................................... 209 Replication User.................................................................................. 210 Replication File Types......................................................................... 210 Replication Schedule .......................................................................... 211 Replication Paths ................................................................................ 211 Replication Service Activation .................................................................... 211 Service Activation on FileBank Director.............................................. 211 Service Activation on FileBank ........................................................... 212 Initial Pre-population of Large Files on FileBank ................................ 212 Configuring Replication Services................................................................ 212 Replication User.................................................................................. 213 R ev isi o n 3. 0 X C o nt e nts Printing Services for the FileBank...................................................................... 215 Configuring Additional Services ................................................................. 215 Print Services ..................................................................................... 215 Configuring Print Services (FileBank) ........................................................ 216 Adding a Network Printer to FileBank................................................. 216 Assigning Printing Administrators....................................................... 217 Point’N’Print Configuration ................................................................. 217 Uploading Printer Drivers ................................................................... 218 First Client Driver Installation.............................................................. 219 Verifying Point’n’Print Installation ....................................................... 220 Manual Client Driver Installation ......................................................... 220 Verifying Driver Installation ................................................................. 221 Printing Setup Troubleshooting .......................................................... 222 Using WAFS Printing Services........................................................................... 225 Adding a WAFS Printer via Windows ......................................................... 225 WAN-OUT Operation ......................................................................................... 227 Cached Content ......................................................................................... 227 Accessing Files and Directories ................................................................. 227 Security ...................................................................................................... 227 Partially Completed Transactions............................................................... 228 Partial Disconnection ................................................................................. 228 Reconnection ............................................................................................. 228 DNS Masquerading............................................................................................ 229 DNS Masquerading Benefits...................................................................... 229 DNS Masquerading Configuration ............................................................. 230 Monitoring WAFS Functionality.......................................................................... 234 Running System Diagnostics ..................................................................... 234 Viewing Logs.............................................................................................. 234 Troubleshooting ................................................................................................. 236 Troubleshooting Tools ................................................................................ 236 Networking ................................................................................................. 236 Windows Domain Join................................................................................ 238 Service ....................................................................................................... 239 Possible Error Messages ........................................................................... 240 Network name no longer exists .......................................................... 240 The network path was not found ........................................................ 240 Access denied .................................................................................... 240 Performance............................................................................................... 242 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XI Advanced Expand Services........................................................................ 244 DHCP Services ................................................................................... 244 DNS Services...................................................................................... 244 Chapter 8:Setting Advanced Parameters................................ 247 Handling WANs .................................................................................................. 248 Handling Interfaces ............................................................................................ 250 Working with VLAN..................................................................................... 251 Creating Static ARP Entries ............................................................................... 255 Defining Authentication Settings ........................................................................ 256 Configuring DNS ................................................................................................ 257 Managing Links .................................................................................................. 259 Setting Remote Subnets for the Links ........................................................ 262 Editing Existing Links.................................................................................. 263 Dial-on-Demand ................................................................................................. 264 Chapter 9:Configuring Management Options......................... 265 Studying the ExpandView System...................................................................... 266 Using Dynamic Network Map ..................................................................... 266 Simplifying WAN Optimization .................................................................... 267 Generating Advanced Alerts for World-Class NOCs .................................. 267 Generating Proactive Reports for Network Provisioning ............................ 267 Defining Scalable QoS ............................................................................... 268 Updating ExpandView Server’s IP Address........................................ 268 Using Out-of-Band Management........................................................................ 269 Using SNMP....................................................................................................... 270 Receiving Log Error Messages .......................................................................... 271 Sending Updates to a Syslog Server.......................................................... 271 Sending Updates via Email ........................................................................ 272 Chapter 10:Resilancy and Redundancy .................................. 275 RAID................................................................................................................... 276 RAID Support in Accelerators' Hard Drives ................................................ 276 Router Redundancy Protocols ........................................................................... 278 R ev isi o n 3. 0 XII C o nt e nts HSRP ......................................................................................................... 279 Enabling HSRP Automatic Detection ................................................. 280 Setting Manual HSRP Configuration .................................................. 280 VRRP ......................................................................................................... 283 Chapter 11:Security................................................................... 287 Studying the AcceleratorOS AAA....................................................................... 288 Configuring AAA via the WebUI......................................................................... 290 Configuring Users ...................................................................................... 290 Deleting Users .................................................................................... 291 Setting Authentication Preferences............................................................ 291 Setting Authentication Servers ........................................................... 291 Setting the Authentication Method...................................................... 292 Defining the Security Settings .................................................................... 293 Auditing Administration Activities ....................................................................... 294 Locking/unlocking the Keypad ........................................................................... 295 Setting the Keypad Lock Definitions .......................................................... 295 Defining Other LCD Settings...................................................................... 296 Chapter 12:Troubleshooting .................................................... 299 Carrying out the Troubleshooting Procedure ..................................................... 300 Recovering the Password .................................................................................. 301 Checking the Event Log..................................................................................... 302 Checking Info Events ................................................................................. 302 Checking Warning Events .......................................................................... 302 Checking Error Events ............................................................................... 302 Checking Fatal Events ............................................................................... 303 Studying Log Message Formats................................................................. 303 Displaying Information for Troubleshooting........................................................ 305 Displaying Information via the WebUI ........................................................ 305 Displaying Statistics in a Compressed, Archived File ................................ 306 Checking the Link Status ................................................................................... 307 Checking Ethernet Settings ............................................................................... 308 Checking Lack of Acceleration........................................................................... 311 Accessing Remote Devices ....................................................................... 311 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XIII Checking Link Malfunction ................................................................................. 312 Checking for Corrupted Terminal........................................................................ 313 Checking HSRP Malfunction .............................................................................. 314 Checking QoS Malfunction................................................................................. 315 Chapter 13:Using the Accelerator Tools ................................. 317 Upgrading the AcceleratorOS Software ............................................................. 318 Using the Configuration Tools ............................................................................ 320 Using the General Tools ..................................................................................... 322 Pinging via the WebUI ................................................................................ 322 Sending a Traceroute Packet ..................................................................... 323 Rebooting the Accelerator via the WebUI .................................................. 323 Gathering Statistics for Technical Support.................................................. 324 Managing User Files .......................................................................................... 325 Viewing System Information............................................................................... 326 Archiving Log Files ............................................................................................. 327 Enabling Accdump ............................................................................................. 328 Appendix A:NetFlow Monitored Statistics .............................. 331 Template Fields .................................................................................................. 334 Full Template .............................................................................................. 334 Long Template ............................................................................................ 334 Short Template ........................................................................................... 334 Appendix B:Pre-Defined Applications..................................... 335 Appendix C:Accelerator Integration ........................................ 345 Acceleration and Citrix Traffic............................................................................. 346 Disabling Citrix NFuse Compression.......................................................... 346 Disabling Citrix Encryption and Compression ............................................ 347 Defining Settings on the Server .......................................................... 348 Setting/checking ICA or RDP listener traffic ....................................... 348 Speed Screen Latency Reduction Manager ....................................... 351 Defining Settings on the Client ................................................................... 351 Turning Compression off in the PNAgent Client ......................................... 352 Understanding the PNA Problem........................................................ 352 Resolving the PNA Problem ............................................................... 352 Identifying Citrix Layer-7 Applications ........................................................ 353 R ev isi o n 3. 0 XIV C o nt e nts Configuring NetFlow .......................................................................................... 355 Studying Traffic Measurement.................................................................... 355 Studying Traffic Monitoring......................................................................... 356 Configuring Accelerator NetFlow ............................................................... 356 Disabling Compression on SAP......................................................................... 358 Calculating Acceleration Figures with an Application other than ExpandView .. 360 Appendix D:MIME Types .......................................................... 363 Application ......................................................................................................... 364 Audio.................................................................................................................. 378 Image ................................................................................................................. 381 Message ............................................................................................................ 383 Model ................................................................................................................. 384 Multipart ............................................................................................................. 385 Text .................................................................................................................... 386 Video.................................................................................................................. 387 Appendix E:Contacting TAC .................................................... 389 Appendix F:tcpdump Optional Flags ...................................... 391 Appendix G:Specifications and Warranty............................... 405 Accelerator 6800 / 6900 Series.......................................................................... 406 Accelerator 1600 / 1800 Series.......................................................................... 407 Accelerator 4800 / 4900 Series.......................................................................... 408 Accelerator 7900 Series..................................................................................... 409 Standards........................................................................................................... 410 RFC / Standard List ................................................................................... 410 Terms and Conditions of Sale ............................................................................ 412 Acceptance ................................................................................................ 412 Price and Payment..................................................................................... 412 Title and Security Interest........................................................................... 412 Risk of Loss................................................................................................ 413 Warranty..................................................................................................... 413 Product Returns ......................................................................................... 413 License Grant............................................................................................. 413 Limitation of Liability................................................................................... 414 Default........................................................................................................ 414 Indemnity.................................................................................................... 414 General ...................................................................................................... 414 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XV Open Source Provisions............................................................................. 415 Chapter H:Command Line Interface ........................................ 417 Understanding the CLI Configuration ................................................................. 418 Understanding Command Modes............................................................... 418 Basic CLI Procedures................................................................................. 419 Getting Started ................................................................................................... 420 Licensing the Accelerator ................................................................................... 421 Displaying the Licensing State of a Specific Accelerator ............................ 422 Performing Basic Setup ..................................................................................... 423 Viewing the Basic Configuration................................................................. 423 Logging into the Accelerator....................................................................... 424 Logging out of the Accelerator .......................................................... 425 Setting Addresses ...................................................................................... 425 Setting the IP Address and Subnet Mask ........................................... 425 Setting a Default Gateway .................................................................. 426 Setting a Secondary IP Address ......................................................... 426 Setting the Deployment Type ..................................................................... 427 Setting Routing Strategy ..................................................................... 427 Setting a Device Name............................................................................... 427 Setting the Default WAN Bandwidth ................................................... 428 Working with Remote Devices.................................................................... 428 Setting the Remote Device ................................................................. 428 Setting the IP Address of the Remote Device..................................... 429 Setting the Bandwidth to a Remote Device ........................................ 429 Setting the Link to Work with IPcomp ................................................. 429 Setting the Link to Work with Router Transparency............................ 430 Configuring Subnets ................................................................................... 430 Adding a Subnet ................................................................................. 431 Advertising a Subnet and Adding a Metric.......................................... 431 Deleting a Subnet ............................................................................... 431 Excluding a Subnet from an Interface................................................. 432 Viewing subnets .................................................................................. 432 Configuring Subnets ........................................................................... 432 Saving/Uploading the Basic Configuration ................................................. 433 Customizing the CLI ........................................................................................... 434 Creating a Custom Banner ......................................................................... 434 R ev isi o n 3. 0 XVI C o nt e nts Applying the Banner................................................................................... 435 Configuration Commands .................................................................................. 436 Entering Configuration Mode ..................................................................... 436 Accessing Configuration Options ............................................................... 437 Alias Management ..................................................................................... 438 Showing Alias Information .................................................................. 438 Changing/Deleting Alias Prefix ........................................................... 439 Showing Virtual Server’s Alias Information......................................... 439 Adding an Alias to a Virtual Server ..................................................... 439 Deleting a Virtual Server’s Alias ......................................................... 440 Configuring OSPF ...................................................................................... 440 Enabling OSPF................................................................................... 440 Setting area ID.................................................................................... 441 Enabling Authentication...................................................................... 441 Setting the Locality Metric .................................................................. 441 Setting Networks ................................................................................ 442 Setting an Authentication Key ............................................................ 442 Setting Neighbors ............................................................................... 442 Viewing OSPF Configuration .............................................................. 443 Configuring Router Polling ......................................................................... 443 Entering the Router Polling Menu Tree .............................................. 443 Setting Polling..................................................................................... 444 Setting Polling Protocols..................................................................... 444 Setting Polling Interval........................................................................ 444 Setting Polling Router......................................................................... 445 Setting Router Polling SNMP Version ................................................ 445 Setting Router Polling SNMP Community .......................................... 445 Configuring RIP ......................................................................................... 446 Enabling RIP....................................................................................... 446 Enabling Authentication...................................................................... 446 Setting an Authentication Key ............................................................ 447 Setting Networks ................................................................................ 447 Setting Neighbors ............................................................................... 447 Setting RIP to Passive Mode.............................................................. 448 Viewing RIP Configuration.................................................................. 448 Configuring WCCP..................................................................................... 448 Enabling WCCP.................................................................................. 449 Activating WCCP ................................................................................ 449 Displaying WCCP Mode, Services, and Routers Lists ....................... 449 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XVII Setting WCCP Authentication ............................................................. 450 Setting WCCP Priority......................................................................... 450 Setting WCCP Router IP..................................................................... 451 Setting WCCP TCP Service ID ........................................................... 451 Setting WCCP UDP Service ID........................................................... 451 Configuring Core Allocation...................................................................... 452 Using the SNTP Server .............................................................................. 453 Enabling the SNTP Server.................................................................. 453 Setting the Interval for Polling the SNTP Server for Time Updates .... 453 Setting the SNTP Server’s IP Address ............................................... 454 Configuring DHCP Servers......................................................................... 454 Uploading the DHCP Configuration File ............................................. 455 Reloading the DHCP Configuration File ............................................. 455 Testing the DHCP Configuration File .................................................. 455 Displaying the DHCP Status Information ............................................ 456 Displaying the End Date of the DHCP Lease Period .......................... 456 Configuring an Accelerator to Carry out DHCP Relay ........................ 457 Configuring WEB Acceleration ................................................................... 458 Setting Web Acceleration.................................................................... 458 Displaying the End Date of the DHCP Lease Period .......................... 458 Clearing the Cache ............................................................................. 459 Viewing Web Acceleration Parameters............................................... 459 Configuring HTTP Acceleration .................................................................. 459 Enabling/Disabling HTTP Acceleration ............................................... 460 Configuring the Proxy Server IP and Port........................................... 460 Specifying Directly Forwarded Requests ............................................ 461 Preventing the Caching of Specific Pages .......................................... 462 Preserving the Client’s Original Source Port....................................... 463 Configuring Transparency Support ..................................................... 463 Setting the HTTP Port......................................................................... 464 Setting Content to be Cached............................................................. 464 Setting the Cache Size ....................................................................... 464 Setting the Maximum Object Size....................................................... 465 Clearing the Cache ............................................................................. 465 Setting the Connection Timeout.......................................................... 465 Setting logs ......................................................................................... 466 Configuring FTP Acceleration..................................................................... 466 Enabling/Disabling FTP Acceleration.................................................. 467 Setting the Cache Size ....................................................................... 467 R ev isi o n 3. 0 XVIII C o nt e nts Setting Content to be Cached ............................................................ 467 Setting the Connection Timeout ......................................................... 468 Allocating Cache per a Specific User ................................................. 468 Setting Minimal Value for the Cache Object Size ............................... 468 Enabling/disabling Unicode Display ................................................... 469 Excluding Servers from Caching ........................................................ 469 Clearing the List of Excluded Servers ................................................ 470 Studying a Subnet Configuration Network ................................................. 470 Configuring Ethernet Display .................................................................... 471 Viewing Interface Statistics ................................................................. 471 Viewing Interface Statistics per Specific Link...................................... 472 Enabling L-7 Traffic Discovery............................................................ 472 Viewing L-7 Traffic .............................................................................. 472 Viewing Application Statistics ............................................................. 473 Setting Applications as Monitored ...................................................... 473 Viewing Application Traffic.................................................................. 473 Enabling / Disabling Statistics History ................................................ 474 Clearing Counters or Statistics ........................................................... 474 Enabling NetFlow ....................................................................................... 474 Setting the Max Queue Length........................................................... 475 Configuring QoS......................................................................................... 475 Viewing Detected Applications ........................................................... 476 Creating a New Application ................................................................ 476 Creating a Web Application ................................................................ 477 Enabling / Disabling Application Acceleration .................................... 477 Enabling / Disabling Application Tunneling......................................... 478 Globally Filtering an Application ......................................................... 478 Filtering an Application per Link ......................................................... 479 Setting the Application Criteria ........................................................... 479 Setting the Order for the Rule............................................................. 479 Setting Minimum Bandwidth (Desired) ............................................... 480 Setting Maximum Bandwidth (Limit) ................................................... 480 Prioritizing the Application .................................................................. 480 Critical Application Pass-through........................................................ 481 Setting Bursts for a Rule..................................................................... 481 Setting the WAN to Work in Strict-priority Mode ................................. 482 Enabling Bursts .................................................................................. 482 Managing Aggregation Classes ................................................................. 482 Configuring Aggregation Classes ....................................................... 483 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XIX Defining the Post Aggregation Class .................................................. 484 Enabling / Disabling Aggregation Classes per Link ............................ 485 Setting Aggregation Limit ................................................................... 485 Setting Aggregation Threshold ........................................................... 486 Setting Aggregation Window............................................................... 486 Applying an Aggregation Class to an Application ............................... 487 Configuring DNS Acceleration.................................................................... 488 Enabling / Disabling DNS Acceleration............................................... 488 Defining Static Hosts........................................................................... 488 Removing Definitions of Static Hosts .................................................. 489 Clearing the Cache ............................................................................. 489 Setting The Cache Size ...................................................................... 489 Displaying the Cache Contents........................................................... 490 Enabling / Disabling DNS Masquerading............................................ 490 Defining the TTL Period ...................................................................... 490 Defining the Query Timeout Period..................................................... 491 Defining the Transparency Mode ........................................................ 491 Displaying the DNS Acceleration Statistics......................................... 492 Enabling / Disabling the Use of the Accelerator DNS ......................... 492 Enabling Traffic Encryption......................................................................... 493 Displaying the Traffic Encryption (crypto) on a Specific Link .............. 493 Displaying the Current Crypto Configuration of a Specific Accelerator493 Displaying the Crypto Details of a Specific Accelerator ...................... 494 Displaying the Process of the IPsec Policy Creation on a Specific Accelerator 494 Configuring ARP......................................................................................... 495 Adding Entries to the ARP Cache....................................................... 495 Clearing the ARP Cache..................................................................... 495 Setting the Limit on the ARP Cache ................................................... 495 Setting Additional Limits on the ARP Cache....................................... 496 Additional Configurations............................................................................ 496 Adding a WAN..................................................................................... 496 Modifying Interface Speed and Duplex ............................................... 497 Setting VLAN ...................................................................................... 497 Autodetecting HSRP Groups .............................................................. 498 Setting HSRP Group Number ............................................................. 498 Setting VRRP Group Number ............................................................. 499 Disabling Bridging ............................................................................... 500 Setting an IP address for Eth 0 ........................................................... 500 R ev isi o n 3. 0 XX C o nt e nts Defining Link Settings ................................................................................ 501 Assigning a Link to a WAN ................................................................. 501 Setting a Link to Work in Large Cache Mode ..................................... 501 Enabling Packet Fragmentation ......................................................... 502 Enabling Packet Aggregation ............................................................. 502 Setting a Link to be Accelerated......................................................... 503 Setting IPcomp Preservation .............................................................. 503 Forcing Tunneling ............................................................................... 504 Including Checksum ........................................................................... 504 Configuring Expand View Settings ............................................................. 505 Enabling / Disabling the ExpandView Agent....................................... 505 Setting the ExpandView Server IP Address ....................................... 505 Setting the ExpandView Server Port .................................................. 506 Displaying ExpandView Status ........................................................... 506 Configuring SNMP ..................................................................................... 506 Enabling / Disabling SNMP ................................................................ 507 Enabling / Disabling SNMP Traps ...................................................... 507 Setting SNMP Trap Community.......................................................... 507 Setting SNMP Community.................................................................. 508 Setting SNMP Version 3 Authentication ............................................. 508 Configuring the Log.................................................................................... 509 Enabling / Disabling the Log............................................................... 509 Setting the Syslog Facility Number..................................................... 509 Setting the Syslog Server’s IP Address.............................................. 510 Defining Sent Events .......................................................................... 510 Enabling / Disabling Event Notification............................................... 511 Creating an Accelerator Messenger Account ..................................... 511 Setting the Notification Recipient........................................................ 511 Setting the Mail Server’s IP Address .................................................. 512 Setting the Mail Server’s Port Number ............................................... 512 Setting SNMP Version3 Authentication .............................................. 513 Creating Log Archives................................................................................ 513 Creating a Log Archive ....................................................................... 513 Deleting a Log Archive ....................................................................... 514 Uploading Log Archive Files............................................................... 514 Displaying Log Archive Files .............................................................. 515 Using Configuration Tools .......................................................................... 515 Displaying the Configuration Settings................................................. 515 Saving the Running Configuration...................................................... 516 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XXI Reverting Back to the Last Saved Startup .......................................... 516 Restoring the Configuration to Factory Default Settings..................... 516 Sending a Ping.................................................................................... 517 Sending a Traceroute.......................................................................... 517 Displaying the Packets’ TraceRoute ................................................... 517 Viewing Technical Support Statistics................................................... 518 Enabling Accdump Files ............................................................................. 518 Accessing the AccDump Configuration Menu..................................... 518 Enabling / Disabling ACCDump .......................................................... 519 Configuring Tcpdump File Size ........................................................... 519 Configuring Tcpdump File Format....................................................... 519 Configuring Tcpdump File Number ..................................................... 520 Configuring Tcpdump Optional Flags.................................................. 520 Uploading Tcpdump Files.................................................................... 520 Selecting the TCPDump Interface ...................................................... 521 Selecting the TCPDump Filter Expressions........................................ 521 Configuring WAFS.............................................................................................. 523 Basic Operations ........................................................................................ 523 Starting the WAFS Module.................................................................. 524 Stopping the WAFS Module ................................................................ 524 Restarting the WAFS Module.............................................................. 524 Rebooting the WAFS Module.............................................................. 525 Shutting down the System .................................................................. 525 Pinging a Remote Machine................................................................. 525 Quiting the CLI .................................................................................... 526 Cache ......................................................................................................... 526 Displaying Cache-related Information................................................. 526 Displaying Cache Time To Live for Directories or Files....................... 526 Resetting Cached Information ............................................................ 527 Print Administration Activities ..................................................................... 527 Displaying Print Administrators ........................................................... 527 Adding and Deleting Print Administrator Users................................... 528 Adding and Deleting Print Administrator Groups ................................ 528 Displaying a List of Local Printers....................................................... 529 Displaying a Printing Driver’s Status ................................................... 529 Setting Drivers ............................................................................................ 529 Setting Automatic Client Driver Installation......................................... 529 Setting Manual Client Driver Installation ............................................. 530 Storing Printer Drivers on the File Bank.............................................. 530 R ev isi o n 3. 0 XXII C o nt e nts Storing Printer Drivers on the File Server ........................................... 530 Using Domain Users for Migrating Drivers ......................................... 531 Managing CUPS ........................................................................................ 531 Restarting the CUPS Service ............................................................. 531 Checking the CUPS Service............................................................... 532 Working with Printer Ports.......................................................................... 532 Displaying the Printer Ports’ List......................................................... 532 Adding and Deleting Printer Ports ...................................................... 533 Forcing the Printer and the Share Name to be Equal......................... 533 Adding a Printer.................................................................................. 533 Deleting a Printer................................................................................ 534 Managing Printers ...................................................................................... 534 Changing an Existing Printer URI....................................................... 534 Displaying a List of all Existing Printers.............................................. 535 Printing a Test Page ........................................................................... 535 Managing WAFS Transparency ................................................................. 535 Enabling / Disabling WAFS Transparency......................................... 536 Excluding Certain Servers from WAFS Transparency........................ 536 Creating Excluded Servers ........................................................................ 536 Displaying the Excluded Servers’ List ................................................ 537 Clearing the Excluded Servers’ List.................................................... 537 Managing CIFS .......................................................................................... 537 Displaying the CIFS Status ................................................................. 537 Compression Filters ................................................................................... 538 Displaying Current Compression Filter’s List...................................... 538 Adding/deleting a Filter to/from a List ................................................. 538 Managing Time and Dates ......................................................................... 539 Changing the System’s Date and Time .............................................. 539 Displaying the System’s Date and Time ............................................. 539 Additional Options ...................................................................................... 539 Diagnostics ......................................................................................... 540 Setting a Domain Name ..................................................................... 540 Displaying the Current Domain Name ................................................ 541 Joining a FileBank to a Domain.......................................................... 541 Switching to a UNIX Command Prompt ............................................. 541 Exiting or Quitting the Shell ................................................................ 542 Fetch .......................................................................................................... 542 Managing Fetch Jobs and Instances .................................................. 542 FileBank Director Configuration Settings ................................................... 543 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XXIII Displaying a List of FileBank Directors ............................................... 543 Adding or Deleting a FileBank Director:.............................................. 544 Defining the IP Port............................................................................. 544 Enabling Disconnected Operation Handling ....................................... 544 Forcing Disconnected Mode ............................................................... 545 Refreshing the List of Servers and Shares ......................................... 545 Getting Disk Utilization Reports .......................................................... 545 Getting WAFS Help .................................................................................... 546 Displaying Help for All Available Commands ...................................... 546 Displaying Command-specific Help Information ................................. 546 Licensing WAFS ......................................................................................... 547 Installing a License ............................................................................. 547 Displaying the License File ................................................................. 547 Checking the Validity of a License File ............................................... 547 WAFS Log Files.......................................................................................... 548 Uploading Logs to a URL.................................................................... 548 Displaying Event Log .......................................................................... 548 Defining Minimal Level for Events to Log............................................ 549 Displaying Log Level........................................................................... 549 Displaying the Syslog Status............................................................... 550 Displaying All Log Archive Files.......................................................... 550 Generating a New Log Archive File .................................................... 550 Uploading a Log Archive File .............................................................. 551 Managing Replication Services .................................................................. 551 Starting an Unscheduled Replication .................................................. 551 Preparing for Replication .................................................................... 552 Stopping Replication ........................................................................... 552 Displaying the Replication Status........................................................ 552 Enabling / Disabling Replication ......................................................... 553 Displaying Replication Logs................................................................ 553 Displaying a Specific Log .................................................................... 553 Setting Up Replication Service ........................................................... 554 Managing the Replication User........................................................... 554 Managing the Replication Filters......................................................... 554 Managing the Replication Instances ................................................... 555 Managing the Replication Paths ......................................................... 555 Managing the Replication User .................................................................. 555 Displaying the Current Replication User ............................................. 556 Defining the Replication User ............................................................. 556 R ev isi o n 3. 0 XXIV C o nt e nts Deleting the Replication User ............................................................. 557 Displaying the Current Replication Filters .......................................... 557 Clearing All Replication Filters............................................................ 557 Adding or Deleting a Replication Filter ............................................... 558 Listing the Replication Instances ........................................................ 558 Displaying all Replication Paths ......................................................... 558 Adding a New Replication Path .......................................................... 559 Deleting a Replication Paths .............................................................. 559 Deleting All Replication Paths ............................................................ 559 Scheduling Events ..................................................................................... 560 Displaying Actions for Scheduling ...................................................... 560 Displaying Scheduled Events ............................................................. 560 Adding Scheduled Events .................................................................. 561 Deleting Scheduled Events ................................................................ 561 Clearing All Scheduled Events ........................................................... 561 Service Management ................................................................................. 562 Enabling or Disabling the Current Service.......................................... 562 Checking whether the Current Service is Enabled ............................. 562 Displaying the List of Services............................................................ 563 Activating a Service ............................................................................ 563 Creating a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> Service563 Creating a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> HA 564 Creating a <Default ¬¹ Font>FileBank<Default ¬¹ Font> Service....... 564 Software ..................................................................................................... 565 Displaying Version Numbers .............................................................. 565 Statistics ..................................................................................................... 565 Displaying File Statistics ..................................................................... 565 Uploading Yearly Statistics ................................................................. 566 Displaying the Current Status ............................................................. 566 Stf_filters .................................................................................................... 566 Displaying Current STF Filters ........................................................... 567 Clearing the List of Current STF Filters .............................................. 567 Adding or Deleting a Filter .................................................................. 567 Transaction Monitoring............................................................................... 568 Displaying the Requested Transactions ............................................. 568 Stopping the Transaction of a Specific ID ........................................... 568 TTCP.......................................................................................................... 569 Measuring the Receiving Host............................................................ 569 Measuring the Sending Host .............................................................. 569 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e XXV Displaying the System’s Current Uptime ............................................ 569 User ............................................................................................................ 570 Displaying a List of All Users .............................................................. 570 Adding or Deleting a User................................................................... 570 Changing a User’s Password.............................................................. 571 Configuring Virtual Memory Statistics......................................................... 571 Displaying Virtual Memory Statistics ................................................... 571 Wins............................................................................................................ 572 Setting a WINS Server Address.......................................................... 572 Deleting Current WINS Server............................................................ 572 Displaying Current WINS Server ........................................................ 572 Configuring Security ........................................................................................... 574 Accessing the Transport Type .................................................................... 574 Enabling or Disabling Access to the Transport Type .......................... 574 Configuring Servers.................................................................................... 574 Configuring the IP Address and Port .................................................. 575 Setting the Radius Server Timeout ..................................................... 575 Configuring the TACACS Server......................................................... 575 Setting the TACACS Server Timeout .................................................. 576 Configuring Authentication.................................................................. 576 Displaying the Authentication Server .................................................. 577 Defining/Deleting the Authentication Server ....................................... 577 Configuring Users’ Accounts ...................................................................... 577 Enabling / Disabling a User’s Account ................................................ 577 Creating and Setting a User’s Access ................................................ 578 Setting the Local Password ................................................................ 578 Viewing AAA Configuration ........................................................................ 579 Unlocking or Locking the Keypad ....................................................... 581 Upgrading the Software OS........................................................................ 582 Copying the New Bundle File.............................................................. 582 Rebooting the Accelerator after Copying the New Bundle File........... 582 Technical Support Information............................................................................ 583 Initiating ByPass Mode ............................................................................... 583 Showing Technical Support Information ..................................................... 583 Listing Log Events............................................................................... 583 Appendix I:Glossary.................................................................. 585 Appendix J:Index....................................................................... 601 R ev isi o n 3. 0 XXVI C o nt e nts Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 1: Introducing the Accelerator Expand Networks’ Accelerator is the ideal Application Traffic Management System for ensuring optimal application performance over the WAN. The Accelerator is a Layer-3 WAN device that dramatically improves application response times through a combination of bandwidth compression, Layer-7 QoS and acceleration plug-ins for specific applications. This chapter includes the following sections: Features and Benefits, on page 2. Next-generation WAN Compression, on page 3. Layer-7 QoS and Bandwidth Management, on page 4. The Accelerator Product Line, on page 7. How the Accelerator Works, on page 8. Configuration and Management, on page 11. 2 C h ap t er 1: Introducing the Accelerator Features and Benefits The Accelerator’s new and improved algorithms provide the highest WAN compression performance available, in an easy to install package that fits seamlessly into various network topologies such as MPLS, QoS clouds, Noisy networks, High BER networks, Load balanced networks, and networks experiencing many out-of-order errors. Features include:: Resiliancy and Redundancy Redefining Application Traffic Management Next-generation WAN Compression Layer-7 QoS and Bandwidth Management Resiliancy and Redundancy Redundant striped swappable drives in Accelerator Hardware elevate fault tolerance and create a virtually seamless work enviornment. For more information, see RAID, on page 276. Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) provide network resilience for IP networks, ensuring that user traffic immediately and transparently recovers from first-hop failures in network edge devices or access circuits.HRSP. For more informaiton, see Router Redundancy Protocols, on page 278. Redundant Links iLO - integrated Lights Out technology allows you virtual control regardlgess of appliance status or location. Redefining Application Traffic Management The Accelerator takes application traffic management to the next level by reducing WAN costs and improving application performance. In addition to bandwidth compression capabilities, the Accelerator provides a rich set of features that improve application response times and provide Layer-7 visibility and control tools, which enable network managers to align network resources with business priorities. Acceleration of application response times is achieved through next-generation Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Fe at u r es a nd B en e fi ts 3 WAN compression, application-specific acceleration, Layer-7 QoS capabilities and sophisticated monitoring and reporting. Next-generation WAN Compression The Accelerators’ bandwidth expansion algorithms provide an effective alternative to WAN upgrades with a 3 to 9 month ROI. Typical capacity gains of 100% to 400%+ additional capacity, peaks of 1000%+. Combination of byte-level caching, packet header reduction and adaptive packet compression. High performance, low latency algorithms Packets incur a maximum of 1 millisecond latency passing through the device. 100% lossless, works on all applications. Supports up to 350 remote sites and 45 Mbps in a single device. Unique On-LAN deployments enable rack-and-stack above 350 sites and 45 Mbps. Verified in over 27,000 production installations. Network transparent RTM (Router Transparency Mode) enables 100% IP header preservation, ensuring guaranteed compatibility with any kind of WAN device. RTM also preserves Layer 4 for TCP & UDP traffic. Dynamic routing enables effortless installation even in complex networks that use OSPF, RIP and other routing protocols. Application-specific Acceleration Application-specific acceleration is a breakthrough approach that works in combination with next-generation compression for improving application response times. Improves application response times by 100% to 400%, peaks of 1000%+ Extensible architecture based on application acceleration plug-ins for additional application support TCP acceleration enables TCP transfer speeds in excess of WAN link speed, even under challenging latency and packet loss conditions. The TCP acceleration plug-in is standards-based, R ev isi o n 2. 0 4 C h ap t er 1: Introducing the Accelerator meeting the SCPS standard (www.scps.org) that was developed by NASA and the DoD for performance optimization in high latency links. HTTP acceleration provides faster web application response times for chatty HTTP transactions by eliminating repetitive download of frequently accessed objects, applets, and so on. FTP acceleration provides faster response times due to elimination of long FTP transactions by keeping local copies of frequently accessed files. DNS acceleration eliminates DNS wait times for applications (for example: web portals) by keeping copies of frequently accessed DNS translations cached at the edge Accelerator. HTTPS acceleration enables compression of encrypted traffic by accelerating and encrypting traffic to the client browser, and ensures faster response times from secure application servers by optimizing TCP connections to browsers and web servers. The Accelerator's full-scale WAFS and CIFS acceleration optimizes file access over the WAN, solving remote server data access from the data center over the WAN. Server consolidation is made possible without paying the price in WAN application performance. Expand Networks’ enhanced WAFS offering addresses the key performance, availability and management issues raised by server consolidation: LAN-like application performance: With Expand Networks’ acceleration architecture a replicated copy of the file is kept in the remote cache, thereby maintaining LAN-like performance for file transfers. Virtual-Server: Expand Networks’ enhanced WAFS offer retains critical remote branch system services such as: DNS, DHCP, and print. Addressing ‘WAN-Outs’: In the event of a network outage, remote users can continue working because files are served from a local cache. Layer-7 QoS and Bandwidth Management The Accelerators’ Instant QoS functionality stops bandwidth abuse, guarantees network resources for critical applications like VoIP and lets network managers prioritize network applications according to business objectives. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Fe at u r es a nd B en e fi ts 5 Low operational cost QoS solution, Layer-7 application discovery Easy to set up—Instant QoS Maximum flexibility for advanced users QoS can be applied for both inbound andoutbound traffic. Bandwidth limits: desired, maximum Burst-ability control Strict priority for real-time traffic Shaping with High, Medium, Low Discard rogue applications Packet fragmentation assures VoIP/video latency budget Integrates with existing environments Mark, honor and preserve QoS based on application or QoS markings Extensible architecture Additional application classification QoS troubleshooting/diagnostics mode Layer-7 Monitoring and Reporting The Accelerators and the ExpandView stand-alone Application Traffic Management System provide powerful monitoring and graphical reporting for full application-level visibility and cost-effective end-to-end network management. Automatic application detection with hundreds of predefined classes. Dozens of historical and real-time reports for WAN and links Throughput, performance, acceleration Applications and hosts Throughput, performance, acceleration System-wide, per link, Peer, IP subnet, application inbound and outbound user customizable Complex rules available for the advanced user, such as nested rules and order matching Export and print functions End-to-end view with ExpandView Branch Office Features The Accelerators offer much more than just a bandwidth increase. These intelligent devices deliver a branch office platform that consolidates multiple devices. Full NetFlow compliance replaces the need for costly probes R ev isi o n 2. 0 6 C h ap t er 1: Introducing the Accelerator Open architecture for future enhancements Rapid Deployment/Dependable Results With minimal configuration and no network architecture changes. 2 minute configuration via front panel keypad Up and running in minutes with environment auto-detection Easy-to-use WebUI and central deployment stations Familiar Cisco-like CLI minimizes staff retraining Secure management with HTTPS, SSH, SNMP (v2c/v3) Integrates with existing user authentication and administration systems RADIUS, TACACS+, and Windows Directory Validated in over 1,000 enterprise and service provider networks Maximum Uptime and Reliability The Accelerators’ resilience features and standards-based implementation guarantee unsurpassed uptime and availability. Network integrity preserved with standards-based implementation, HSRP/VRRP failover External flash card for effortless device swap-out (for non-hard drivebased models: Switch-to-wire and software watchdogs) assure zero network downtime Remote access never compromised Out-of-band management Network integrity preserved with standards-based implementation IPComp tunnels Router Transparency Mode SCPS for TCP Acceleration SNMP for device management NetFlow probe Ac ce ler at o rOS 6 .1 .2 Us er Gui d e T h e A cc el er a to r P r o d uc t L in e The Accelerator Product Line 7 The Accelerator product line consists Accelerators that will cater to a range of facilities from the small office to the Enterprise Network. Check the corporate web site (www.expand.com) for new hardware releases. R ev isi o n 2. 0 8 C h ap t er 1: Introducing the Accelerator How the Accelerator Works Accelerators can be deployed in any network environment, whether the WAN is a private line, frame relay, VPN, IP, ATM, xDSL, ISDN, wireless local loop, or satellite. You can connect Accelerators on the LAN side of the router. Some of the Accelerator’s benefits can be realized with no far-end Accelerator. IP-Based Network In an IP network, you can position the Accelerator on the LAN-side of the router or directly on the LAN. The Accelerator can be located either On-Path or On-LAN. On-Path On-Path configuration places the Accelerator between the LAN and the router on both sides of the IP network. The data from the LAN segment passes through the Accelerator that performs traffic optimization, including compression and QoS, before the data reaches the router. See the sample On-Path application in the following figure. In this configuration, internal-bypass circuitry ensures the Accelerator fails-to-wire, enabling invisible protection of the network in the unlikely event of failure. If the Accelerator fails-to-wire, traffic will continue passing, but will not be accelerated (bypass mode). On-LAN On-LAN configuration places the Accelerator directly on the LAN as a host. The Accelerator becomes the next hop for traffic on the LAN destined to the WAN. The Ac ce ler at o rOS 6 .1 .2 Us er Gui d e H o w t h e A cc el er a t o r Wo r k s 9 accelerated data is redirected to the far-end Accelerator (On-LAN or On-Path) where the data is reconstructed before reaching its destination IP address. Usually, one Accelerator is installed on the LAN segment. However, if resilience is to be enhanced, you can install two or more Accelerators for redundancy purposes. The most common configuration up to Version 6.1.2 involves creating two links (two Accelerators), one of which is assigned a higher priority (metric - ranging from 11 to 10,000), so it will be used as the default link for the connection. If this link fails, traffic switches to the other link. If all transparent Proxy services (such as HTTP acceleration or TCP acceleration) are disabled, you can assign ingoing traffic through one link and outgoing traffic through the other link. Another optional configuration is shown below: In this configuration, Hot Standby Routing Protocol (HSRP) or Virtual Router Redundancy Protocol (VRRP) enables the Accelerator to take part in HSRP/VRRP groups. Starting from Version 6.1.2, a link can be destined to an HSRP/VRRP virtual IP, providing redundancy in cases where an active Accelerator fails. If an AcceleratorOS link is established, and the Source IP of this link is defined to be the HSRP Group’s Virtual IP, the link switches to the next Accelerator in the rare R ev isi o n 2. 0 10 C h ap t er 1: Introducing the Accelerator case of primary Accelerator failure, and all of this link’s services are kept. When the primary Accelerator is available again, the link switches back to it. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur at io n an d M an ag em e nt Configuration and Management 11 You can configure and monitor the AcceleratorOS via a user-friendly Web User Interface (WebUI). The WebUI is accessible from Microsoft Internet Explorer via the HTTP protocol or the secured HTTPS protocol. Console-based administration can be accomplished using a directly connected terminal or terminal software using a serial connection, a Telnet session, or a secured SSH-based connection. You can carry out initial configuration by using the front-panel LCD. The Accelerator operating system, AcceleratorOS, provides a wide range of management features. Like most networking equipment, the Accelerator requires some basic initial configuration in order to function. This configuration is performed locally by using the front-panel LCD, or an RS-232 console, Telnet console or browser-based management console, and includes specifying the Accelerator’s IP address. The initial configuration also involves defining passwords, and the time and date at the Accelerator site. The Accelerator’s user-friendly Installation Wizard guides you through the steps necessary to get your Accelerator up and running. For Quick Installation Instructions, see the Accelerator Quick Installation Guide. R ev isi o n 2. 0 12 C h ap t er 1: Introducing the Accelerator Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 2: Preparing Network Integration This chapter assumes that you have successfully installed and turned on the Accelerator without any errors. If you have not been able to install or turn on the Accelerator successfully, see Troubleshooting, on page 299 and Contacting TAC, on page 389.The AcceleratorOS lets you set up the Accelerator either via the LCD, in conjunction with the Accelerator’s Wizard, or via the Wizard alone, by using the Accelerator’s default IP address (10.0.99.99). In addition, you can use the CLI to perform complete setup. This chapter contains the following topics: Working with Bypass Mode, on page 14. Reviewing the Setup Checklist, on page 15. Performing Setup via the LCD, on page 17. Performing Setup via the WebUI, on page 19 Performing Setup via the Wizard, on page 21 Licensing the Accelerator, on page 28 Logging into and out of the Accelerator, on page 30 Integrating the Accelerator into Your Network, on page 31 14 C h ap t er 2: Preparing Network Integration Working with Bypass Mode When working in On-Path mode, the Accelerator can work in bypass mode to enable transparent data transmission in the unlikely event of Accelerator failure. The move to bypass mode is carried out automatically by the bypass switch on the Accelerator. In addition, all models support invoking the bypass mode through the CLI. ! CAUTION! When bypass is enabled you will lose connectivity to the CLI/WebUI, ! unless Out-of-Band management is used. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Re vie w in g t h e S et u p Ch ec kl ist Reviewing the Setup Checklist 15 Follow this checklist to ensure that you have all of the information necessary to complete Accelerator setup: Network Checklist Information Needed For more information see: What are the port settings of the devices that will be attached to the Accelerator (switch/router)? Speed: 10/100/ 1000 Duplex: Half / Full What is the IP address of the Default Gateway? IP Address: What will the IP address of the Accelerator be? Will there be secondary IP addresses or VLAN IP Addresses? IP Address: Subnet Secondary (up to 10): VLAN: Performing Setup via the Wizard, on page 21 Does this Accelerator have more than one subnet in its network? Subnet: Acc IP Address: Subnet: Acc IP Address: Subnet: Acc IP Address: Setting Subnet Routing, on page 53 Do you have HSRP or VRRP configured? Yes: HSRP / VRRP (circle one) No HSRP, on page 279 Do you have OSPF configured? Yes / No If yes, OSPF Area ID: or IP address: Configuring OSPF, on page 440. Do you have RIP configured? Yes / No Version: 1/2 If yes, RIP Authentication: Configuring RIP, on page 446 IP address of the remote Accelerator? IP Address: Performing Setup via the Wizard, on page 21 WAN bandwidth? Performing Setup via the Wizard, on page 21 Does your network include VLAN 802.1q trunking? Yes / No Working with VLAN, on page 251 Does your network use external traffic monitoring software on the router? Yes / No Encapsulation, on page 23 R ev isi o n 2. 0 16 C h ap t er 2: Preparing Network Integration Network Checklist (Continued) Do you have any ToS implementation? MPLS? Diffserv? Any kind of applications that modify the ToS field? Information Needed Yes / No Yes / No Yes / No For more information see: MPLS, on page 43. ToS on page 261. Yes / No Do you currently use SNMP? Yes / No If Yes, what is the community name? Using SNMP, on page 270. Do you currently collect SNMP traps? Yes / No If Yes, what is the IP address of the trap receiver? Enabling / Disabling SNMP Traps , on page 507. Do you currently use a Syslog server? Yes / No If Yes, what is the IP address of the Syslog Daemon? Sending Updates to a Do you currently use NetFlow? Yes / No Configuring NetFlow Support, on page 98. Does your network have high latency lines above 40 ms? Yes / No If yes, enable TCP Acceleration Studying TCP Acceleration, on page 132. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Syslog Server, on page 271. P er f o r m in g S e tu p v ia t he L C D Performing Setup via the LCD 17 Accelerator configuration is made simple with the front-panel LCD. AcceleratorOS v6.xx should be displayed, where xx is the maintenance release number (for example 6.1.2) in addition to a status display (Ready, Bypass, or various error messages). Press Enter to start configuration. To navigate between the fields: Follow these steps: Press the right/left arrows until the cursor is below the word/value you want to select or change. Press the up/down arrows to change the value of the numbers. Press Enter to navigate to the next screen. Enter setup by making sure the cursor is under Setup and pressing Enter. Setup Local IP Subnet Mask R ev isi o n 2. 0 18 C h ap t er 2: Preparing Network Integration Default Gateway When asked if you want to save the setup, select Yes or No and press Enter. At this point, management can be performed via the Accelerator’s Web UI, via the CLI, Telnet, SSH, or via ExpandView- Centralized Management. To work with ExpandView, you will need to define the ExpandView server IP address via the CLI. For other LCD settings, see section Locking/unlocking the Keypad, on page 295. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e P er f o r m in g S e tu p v ia t he Web U I Performing Setup via the WebUI 19 The Accelerator’s Web User Interface (WebUI) provides you with a user-friendly interface for configuring the Accelerator. To access the WebUI: 1. The Accelerator comes pre-configured with the IP address: 10.0.99.99 255.255.255.0 If no other IP address was assigned via the LCD, use this default address to access the Accelerator. If the Accelerator is connected directly to a management PC, ensure that you set the PC to the same subnet as the Accelerator’s IP address. 2. In the Address field of your web browser, enter the Accelerator’s IP Address. Alternatively, the Accelerator WebUI supports access via Secure HTTP, by typing https:// before the Accelerator IP address. 3. The Accelerator’s WebUI opens and prompts you to log in to use the WebUI. When prompted, log in to the Accelerator by entering a user name and password. The default user name and password (both case sensitive) that must be used on initial login are as follows: user name: expand password: Expand The first time you access the WebUI, the Setup Wizard automatically opens and guides you through the steps of basic Accelerator configuration. Studying The WebUI Menu The following buttons, which are common to all WebUI menu screens, let you carry out basic operations as follows: WebUI Menu Item Description Setup Wizard Click the Setup Wizard link at any time to open the Setup Wizard. Write Click the Write link at any time to write the current configuration. Change Password Click the Change Password link at any time to modify your login password. The password is case sensitive, but the number of characters is not limited. R ev isi o n 2. 0 20 C h ap t er 2: Preparing Network Integration Logout Click the Logout link at any time to log out of the Accelerator. Clicking on this button at any time on any page in the interface will set that page as the default startup page “home page” each time you log into the WEB/UI. There is no confirmation to this action. Click the Refresh button at any time to refresh the data in the WebUI. Click the Help button at any time to open the Accelerator’s online help. This help is pop-up based so make sure your browser’s settings allow pop-ups. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e P er fo r m in g S et up via t h e Wi z ar d Performing Setup via the Wizard 21 The Accelerator’s Setup Wizard guides you on the step-by-step configuration of the basic parameters (all parameters that are set via the front-panel LCD), which are necessary to get your Accelerator up and running. To access the Setup Wizard: 1. The first time you access the Accelerator’s WebUI, the Setup Wizard opens automatically. On subsequent uses, to return to the Setup Wizard, click the Setup Wizard button. If the Accelerator is connected directly to a management PC, ensure that you set the PC to the same subnet as the Accelerator’s IP address. 2. Read carefully the explanations that appear in the Welcome screen and click Next to move to the My Accelerator screen, which lets you define the local Accelerator settings. i NOTE: To carry out any modifications and additions after initial configuration, always use the Basic screen or the My Links screen and not the Wizard. The Wizard resets other parameters to their default values when accessed. Configuring the Wizard Set the following parameters on the Wizard’s My Accelerator screen: Device Name Set a name for the Accelerator of up to 60 characters, without spaces and special characters. IP Address Enter the IP address of the Accelerator. Subnet Mask Enter the Subnet Mask to identify this Accelerator’s local subnet. Default Gateway Enter the network’s Default Gateway to which the Accelerator will forward the traffic it intercepts. Licensing Enter the Accelerator’s serial number (product ID). Select either Evaluation, License Key or License File, and enter the license key or file number. For more information on Licensing, see Licensing the Accelerator, on page 28. R ev isi o n 2. 0 22 C h ap t er 2: Preparing Network Integration Defining Advanced Settings Clicking the Advanced Settings Configuration button opens the Advanced Settings screen, which lets you set advanced information about the Accelerator’s setup, as follows: ! ! i Deployment Type On-Path: See ‚ÄúOn-Path‚Äù on page 8. On-LAN: See ‚ÄúOn-LAN‚Äù on page 8. For additional information on both types of deployment, see the Quick Installation Guide supplied with your Accelerator Deployment Size. From the drop-down list, select the approximate number of Accelerators to which the local Accelerator will be connected: 1 5, 6 - 10, 11 - 20, 21 - 50, 51 - 100, 101 - 200 or 201 - 500. Setting an accurate network size enables the Accelerator to better optimize traffic. In network topologies such as Mesh and Hub, knowing the network size is important for the Accelerator in order to know how to divide its system resources correctly among connected Accelerators. Bandwidth Set the precise bandwidth (in Kbps) of the WAN. 0 is not a valid bandwidth Caching Defines the active cache method: WAFS only (for CIFS traffic), Web Cache only (for HTTP servers), or both or None. Maximum Links Used for defining the maximum number of requested links. You can set here any number between 1 and 450. CAUTION! The WAN bandwidth setting is used by the Accelerator’s QoS mechanism. Ensure that the WAN bandwidth is not set too low, otherwise the Accelerator’s QoS mechanism may drop packets and cause applications to disconnect. NOTE: For the Accelerator’s application optimization to work properly, you are advised to set an accurate WAN bandwidth defining the physical link that the Accelerator sits on. Either select the WAN Bandwidth from the pulldown menu or select Other and enter a specific figure into the provided field along with its correct unit (bps, Kbps, Mbps, Gbps). If you are unsure of your WAN bandwidth setting, use the default setting of 100 Mbps. Setting Links via the Wizard The My Links screen, accessed via the Wizard, lets you set up the basic parameters necessary to define your network and begin working with the Accelerator. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e P er fo r m in g S et up via t h e Wi z ar d 23 Follow these steps to set Link information and click Next to advance to the next screen: i i i Destination IP Enter the IP Address of the remote device. Name Set a name for the link that will let you identify it in the future. Up to 31 characters, no spaces, no special characters. Bandwidth Set the speed of the link that connects the local Accelerator to the remote Accelerator. This should be either the local WAN bandwidth or the remote WAN bandwidth -whichever is lower. To accomplish asymmetrical bandwidth settings, use either the advanced link parameters or the CLI. Encapsulation IPComp: IPComp encapsulation (tunneled encapsulation) compresses the entire packet. This means that the IP header, the transport header and the payload are compressed and the packet traversing the network will have an IPComp header. IPComp is the default setting, which enables the best compression rate. Router Transparency (RTM): In Router Transparency encapsulation, only the packets’ payload is compressed, leaving the original IP header and the original TCP/UDP header in their original forms so that their information is available across the network. Router Transparency encapsulation is appropriate in an environment where header preservation is necessary, including QoS deployments, monitoring (NetFlow), Load Balancing, Billing, encryption, MPLS networks and certain firewall environments. NOTE: When using router transparency mode, the payload of packets destined to the router (SNMP requests, Telnet, and so on) will be compressed, making them unreadable by the router. In this event, it is necessary to set up a decision policy that does not tunnel specific applications, (like SNMP see Creating New Applications, on page 105), or to exclude specific subnets or IP addresses from being accelerated on the link (see Setting Remote Subnets for the Links, on page 262). NOTE: Encapsulation settings can be asymmetric. This means that you can set one Accelerator to Router Transparency while setting the other Accelerator to IPComp in the opposite direction. This is useful for setting RTM mode when one of the Accelerators is On-LAN and the other is On-Path. However, IPComp encapsulation will not function if the IPComp protocol is blocked by a firewall. Therefore, ensure that the IPComp protocol is not blocked before selecting either IPComp or RTM encapsulation NOTE: TCP port 1928 is needed for establishing a connection between Accelerators. Ensure that this port is not blocked by a firewall that is installed between the Accelerators. R ev isi o n 2. 0 24 C h ap t er 2: Preparing Network Integration Use the Delete button to remove added links from the Links Table. i NOTE: Deleting the non-link is impossible, because this link name is a logical entity that represents all un-specified traffic in the QoS and Monitoring engines Click Next to advance to the next screen of the Wizard. Setting the Time Verifying that the Accelerator’s time is accurately set is extremely important in order to have an accurate reading of when events occur and when statistic items are gathered and updated. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e P er fo r m in g S et up via t h e Wi z ar d 25 Modifying the Password Security reasons necessitate changing the default password before exiting the setup Wizard. In the Password screen, enter and confirm a new password, and then click the Next button. NOTE: The following values are not accepted as passwords: An empty field (i.e. a blank password) Expand (the default original password) i Reviewing Wizard Configuration The Summary screen of the Setup Wizard lets you review the parameters set via the Wizard before saving them to the Accelerator. If the configuration is correct, press the Submit button to save the settings to the Accelerator. ! ! CAUTION! Clicking Finish saves the configuration as the Accelerator’s Startup Config. R ev isi o n 2. 0 26 C h ap t er 2: Preparing Network Integration Modifying Basic Setup Configuration To modify the basic Accelerator setup, you can make changes via the Basic screen in the Setup menu of the WebUI. i NOTE: To carry out any modifications and additions after initial configuration, always use the Basic screen or the My Links screen and not the Wizard. The Wizard resets other parameters to their default values when accessed. The parameters on this screen are identical to the parameters configurable via the Setup Wizard’s Basic screen, with the exception of Routing Strategy settings (see Setting Routing Strategy, on page 27). For more information see Performing Setup via the Wizard, on page 21. In addition, the Basic screen lets you add a description to identify the Accelerator. The Basic screen includes specific details concerning the Accelerator device, as follows: Platform Accelerator type Product ID The product ID is the unique number identifying the Accelerator, and is used when licensing the product AcceleratorOS Version Software (AcceleratorOS) version running on the Accelerator Ac ce ler at o rOS 6 .1 .2 Us er Gui d e P er fo r m in g S et up via t h e Wi z ar d System Up-Time The last time the device was rebooted, and how much time has elapsed since. Current Time Time set in the Accelerator 27 Setting Routing Strategy The Basic screen lets you set the Routing Strategy. Routing strategy defines how to route traffic. In environments such as router polling and dynamic routing networks, the Accelerator must route all traffic, and therefore you should set Routing strategy to Routing only. In other environments, non-link traffic and inbound traffic should not be directed to the router (normally, when nonlink traffic is transmitted by the Accelerator, it is directed to the router; but this can cause problems if the destination is a Layer-2 address or for incoming traffic). In such environments you have to set the Routing strategy to Bridge route, which does not route non-link and inbound traffic - only traffic destined to an accelerated link or a virtual link. Routing-Only –typically used in On-LAN deployments, or in environments that require the Accelerator to route all traffic (for example: networks that use Dynamic Routing policies). Bridge Route – typically used in On-Path deployments, where traffic is not necessarily routed through the router. i NOTE: Enabling TCP Acceleration requires you to use “Routing-Only” routing strategy. R ev isi o n 2. 0 28 C h ap t er 2: Preparing Network Integration Licensing the Accelerator Accelerators are shipped with a 30-day grace period, during which you must register the product and a install a license. Once the 30-day grace period has passed, the Accelerator will continue to pass data in passthrough mode and will not optimize traffic in any way. In addition to standard Accelerator license, there is also an additional license for WAFS features. For the WAFS license installation information, see Installing the License File, on page 184. Viewing the license status is possible as follows: Via the Licensing tab of the My Accelerator screen. By entering the CLI—Licensing the Accelerator, on page 421. i i NOTE: The 30-day period counts only days during which the Accelerator is powered on. NOTE: In the unlikely event of Accelerator failure, if you use a non hard drive-based Accelerator, you can immediately replace the Accelerator in the field by inserting the Compact Flash from an Accelerator with a permanent license into another Accelerator. This will enable the second Accelerator to function with a 30-day evaluation license, allowing you time to register the new Accelerator. Licensing an Accelerator involves two steps: Activating the I-Key, on page 29. Activating the License Key, on page 29. Both steps are described in the Licensing Guide that was sent to you by E-mail when you purchased your product. A simplified version is included here for convienence. To renew or upgrade your license, contact Expand’s Help Desk. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Li ce ns in g t he A cc ele ra to r 29 Activating the I-Key To Activate the I-Key: 1. Identify the Accelerator’s Serial number (product ID) in the upper right hand corner of the Basic screen of the WebUI. 2. Open your E-mail and copy the I-Key that was sent to you with your order confirmation. 3. Go to www.expand.com. Click the My Expand Link. When directed to the Customer Portal, enter your login information and click Log In. If you have not yet registered click First Time Here to do so and then log in. 4. Click on the Licensing tab. Then click Manage End-User Keys. 5. Click the Add Product link. 6. In the popup window, enter the software version number, the Site Name, and the Reseller. Copy the Serial Number from the Accelerator WebUI. Re-enter the serial number. Click the Submit button and a new popup window opens. 7. In the I-Key field, enter the I-Key and click the Activate button. The popup window now displays the details of the license key. 8. Copy the information listed in the first line: LICENSE KEY IS: This is the number that you need to enter into the Accelerator to activate the license. Keep this information in a safe place. Go to the next section to continue. Activating the License Key To Activate the License Key: 1. In the Accelerator’s WebUI, click Setup followed by My Accelerator, and then Licensing. 2. Click the Activate New License button and enter the Accelerator’s serial number, paste the License Key as copied from the Portal and click Activate. 3. Select or deselect the checkbox that enables refreshing the Acceleration on all links with the new license feature. To update the new license features, select the Refresh acceleration on all links box. R ev isi o n 2. 0 30 C h ap t er 2: Preparing Network Integration Logging into and out of the Accelerator In the setup of the Accelerator, you set a password. You will need this password to log into the software. To log into the Accelerator: 1. Open a web browser. 2. Enter the IP address of the Accelerator. The login screen appears. 3. If your browser has popups disabled, change the properties so that popups are enabled. 4. Verify that the platform and software version shown on the screen are correct. 5. In the User Name field, enter the user name you used in the Setup Wizard. This is case senstitive. 6. In the Password field, enter the password you used in the Setup Wizard. This is case sensititve. 7. Click Submit. To logout of the Accelerator: 1. From any screen in the WebUI, click Logout. There is no confirmation. You are immediately logged out. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e In te g r at in g t h e A cc el er a to r in t o Yo u r N et w o r k I ntegrati ng the Accelerator i nto Your Network 31 The steps involved in integrating the Accelerator in your network depend entirely on the structure of the network and the various technologies and devices already in place on your network. The following section describes the steps needed to get the Accelerator up and running for various network topologies and technologies. Your network may need one or any combination of the following settings. This section contains the following topics: Integrating into a Standard Network, on page 31. Integrating into Networks that use Dynamic Routing, on page 32. Networks Using External QoS or Monitoring Devices, on page 33. Working in Noisy Link Environments, on page 34. Installing On-LAN at a Data Center, on page 35. Installing in a High Latency Environment, on page 37. Installing in a Web-Intensive Environment, on page 38. Using Advanced QoS, on page 39. Integrating into a Standard Network The Accelerator Installation Wizard is designed to get the Accelerator up and running on a standard network, namely: a network that installs the Accelerators in a point-to-point, or point-to-multipoint configuration, with one router and one or more remote sites. After concluding the first stage of using the wizard, as detailed in the Quick Installation Guide, proceed with the configuration by referring to one of the following sections, depending on the network environment: Integrating into Networks that use Dynamic Routing, on page 32 Networks Using External QoS or Monitoring Devices, on page 33 Working in Noisy Link Environments, on page 34. Installing On-LAN at a Data Center, on page 35. Installing in a High Latency Environment, on page 37. Installing in a Web-Intensive Environment, on page 38. Using Advanced QoS, on page 39. R ev isi o n 2. 0 32 C h ap t er 2: Preparing Network Integration Integrating into Networks that use Dynamic Routing Follow these steps to install the Accelerator on a network that already uses dynamic routing. Use the Installation Wizard to set up basic Accelerator properties. Use the following steps for networks that use OSPF dynamic routing. To configure OSPF: 1. In the Accelerator’s WebUI, click on the Setup tab, and then the My Accelerator tab, followed by the My Routes menu. 2. 3. Under Dynamic Routing, click the OSPF button. Set the parameters as necessary. For more information on OSPF, see Configuring OSPF, on page 62 for networks that use RIP dynamic routing. To configure RIP: 1. In the Accelerator’s WebUI, click on the Setup tab, and then the My Accelerator tab, followed by the My Routes menu. 2. 3. Click the RIP button. Set the parameters as necessary. For more information on RIP, see Configuring RIP, on page 63. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e In te g r at in g t h e A cc el er a to r in t o Yo u r N et w o r k 33 For networks that use dynamic routing other than OSPF or RIP (such as EIGRP, ISIS or IGRP), see Working with Router Polling, on page 61. Networks Using External QoS or Monitoring Devices When QoS is deployed on the network (not via the Accelerator, but by using thirdparty software), setting up the Accelerator is necessary for enabling the QoS device to continue having access to the traffic traversing the Accelerator. To set the Accelerator to enable external QoS: 1. In the WebUI, in the Setup menu, click My Links. 2. Select the link to be affected by a QoS device and set it to work in Router Transparency mode. For more information on Router Transparency mode and Link configuration, see Adding Links, on page 47. R ev isi o n 2. 0 34 C h ap t er 2: Preparing Network Integration 3. If all links from the Accelerator are to be affected by the QoS device, you may find it useful to modify the default Link parameters, in order to make all newly created links use Router Transparency Mode as the default setting. To use Router Transparency Mode as the default setting: a. Select the My links command from the Setup menu. b. Click the Advanced button. c. Set the default link parameters as needed. d. Click the Save to template link button. Working in Noisy Link Environments If you add the Accelerator to a particularly noisy environment, with a high number of BERs, drops or collisions (for example, satellite links or a connection with radio transmissions), the following configuration modifications may help optimize Accelerator performance. To set the Accelerator to work in noisy links environments: 1. In the Setup menu, under My Links, click the Advanced button. In the Create New Link screen, ensure that the Include checksum checkbox is selected (this is the default setting). Checksum causes the Accelerator to automatically resend packets on which errors are detected. 2. Consider enabling TCP Acceleration if links are high-latency, as described in section Installing in a High Latency Environment, on page 37. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e In te g r at in g t h e A cc el er a to r in t o Yo u r N et w o r k 35 Installing On-LAN at a Data Center Installing an Accelerator On-LAN at the data center requires taking extra measures in order to enable redirecting all relevant traffic to the Accelerator. When working in On-LAN mode, the Accelerator needs to intercept packets from the LAN before they are handled by the router. This is accomplished either via RIP Route Injection, or via the Web Cache Communication Protocol (WCCP). For more information, see section Enabling Packet Interception, on page 63. To Configure Packet Interception: 1. Click on Setup followed by Networking and then Packet Interception. 2. In the Packet-Interception menu, select either RIP or WCCP packet-interception. 3. If RIP is selected, enter a number in the Maximum Subnets field (default: 1000) and click the Submit button. 4. If WCCP is selected: R ev isi o n 2. 0 36 C h ap t er 2: Preparing Network Integration a. Select the Authentication checkbox and enter a password (case sensitive) into the Authentication field. b. Enter the WCCP router IP address. c. Enter the TCP service ID and UDP service ID (51 to 99). d. Click the Submit button. For information on configuring the router to support WCCP mode, see section Setting WCCP on the Router, on page 69. If resilience is necessary, and HSRP or VRRP is implemented among the routers at the central site, you can configure the Accelerator to operate within an HSRP or a VRRP group. For more information see section Router Redundancy Protocols, on page 278. To enable the Accelerator to operate within an HSRP group: 1. Click on Setup followed by Networking and then HSRP. 2. You can configure the Accelerator either by using the Auto Detect mode or by manually adding HSRP configuration. The auto detect mode enables filling up the HSRP table automatically with the details of the HSRP groups detected on the network. Alternatively, you can manually add HSRP groups to the Accelerator. Ensure that the Accelerator “joins” all relevant HSRP groups. For more information, see section HSRP, on page 279. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e In te g r at in g t h e A cc el er a to r in t o Yo u r N et w o r k 37 To enable the Accelerator to operate within a VRRP group: 1. Click on Setup followed by Networking and then VRRP. 2. In the VRRP menu, enter the Group ID number, the Virtual IP address, the Priority (0 - 254), the preempt status and the timer setting. 3. Click Add. The VRRP group immediately appears in the Groups table. For more information, see section VRRP, on page 283. Installing in a High Latency Environment TCP, which was designed to ensure reliable IP transmission, does not perform well in high latency and high-packet-loss environments. The TCP limitations are expressed in the long times required for file transfers over the WAN, degraded web performance and unresponsive applications. TCP Acceleration enables optimization and better utilization of WANs that suffer from distance-induced TCP limitations. For more information on TCP Acceleration, see section Studying TCP Acceleration, on page 132. Use the following table to determine whether your network suffers from high-latency and would benefit from enabling TCP Acceleration: Window Size 8 KB 16 KB 32 KB 64 KB R ev isi o n 2. 0 C h ap t er 2: Preparing Network Integration Round Trip Time 38 5 0 160 Kbps 320 Kbps 640 Kbps 1280 Kbps 1 0 0 80 Kbps 160 Kbps 320 Kbps 640 Kbps 1 5 0 53 Kbps 106 Kbps 212 Kbps 424 Kbps 2 0 0 40 Kbps 80 Kbps 160 Kbps 320 Kbps 5 0 0 16 Kbps 32 Kbps 64 Kbps 128 Kbps 1 0 0 0 8 Kbps 16 Kbps 32 Kbps 64 Kbps To enable TCP Acceleration: 1. In the Accelerator’s WebUI, click on Services and then TCP Acceleration. 2. In the TCP Acceleration field, select the Enable TCP Acceleration on All Links box. Enter the typical RTT and Typical Acceleration rate as described in section Studying TCP Acceleration, on page 132. 3. In the bottom right corner, click the Submit button. For more information on TCP Acceleration configuration settings, see section Configuring TCP Acceleration, on page 139. Installing in a Web-Intensive Environment If your network runs many Web-based applications, or a lot of Web browsing takes place between branch offices to the central office’s Internet link, DNS Acceleration may decrease some of the network congestion. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e In te g r at in g t h e A cc el er a to r in t o Yo u r N et w o r k 39 Using Advanced QoS This section covers the topic of QoS, its uses and the way it is implemented in the AcceleratorOS. The section includes the following topics: What is QoS? How to Know what’s on Your Network How to Prioritize Applications What is QoS? QoS (Quality of Service) is a general term for the control mechanisms that can assign different priorities to different users, applications, or data flows. These control mechanisms or priority levels guarantee a certain level (or quality) of performance of the data flow (service) and simultaneously addresses the requests from the application. Quality of Service guarantees are important if the network capacity is limited, especially for real-time multimedia streaming applications, such as VoIP and IPTV. Such applications often require a fixed bit rate, are delaysensitive, and cannot tolerate packets dropping or being delivered in the wrong order. You can use the QoS feature to prevent such factors and to accelerate packets passing through the Accelerator based on your policy and reservation criteria. QoS allows you to maximize the bandwidth you pay for more effectively. The key to managing the traffic and achieving bandwidth effectiveness, is closely tied to your knowledge of the type of traffic that is on your network and to the demands of your users. How to Know what’s on Your Network The Accelerator’s traffic detection, or sniffing, feature lets you obtain a complete picture of your bandwidth use. Traffic is classified according to hundreds of predefined applications, and statistics are gathered as to how much of each traffic type is traversing (or clogging) your network. Often you may find that the applications that should be receiving the most bandwidth are in fact being slowed down by bandwidth-greedy applications that are secondary, or even unwanted and potentially harmful. How to Prioritize Applications Once you know which applications are on your network and how they affect your traffic flow, understanding the building blocks of QoS is essential in order to prioritize applications correctly. R ev isi o n 2. 0 40 C h ap t er 2: Preparing Network Integration Traffic shaping is accomplished primarily by guaranteeing or limiting the amount of bandwidth an application can receive, and by prioritizing applications. Setting a Minimum Bandwidth desired allocates a certain amount of bandwidth for a specific application during periods of congestion. You should set desired bandwidth for mission-critical, time-sensitive applications such as VoIP, which needs 8 to 16 Kb allocated throughput to function. Setting Maximum Bandwidth limit puts a ceiling on the amount of bandwidth that an application can consume. This is useful for bandwidth-greedy applications such as FTP or P2P, to limit the amount of bandwidth they consume. Additionally, you can allocate bandwidth proportionately among applications by setting the priority to Low, Medium or High. You can give critical traffic a higher priority than all these by setting it to RealTime. To prevent the flow of undesired traffic on the network, set it to Blocked. Applications that you may want to prioritize include VoIP, Citrix and video conferencing. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 3: Configuring Networking This chapter describes how to perform networking configuration on the Accelerator, including: Optimizing the Network Topology, on page 42 Defining WAN Setup, on page 44 Configuring Secondary IP Addresses, on page 45 Creating and Editing Links, on page 46 Setting Subnet Routing, on page 53 Adding Static Routes, on page 58 Setting Dynamic Routing, on page 59 Enabling Packet Interception, on page 63 Setting the Accelerator’s Time, on page 70 Configuring DHCP Servers, on page 71 Setting ExpandView Connectivity Parameters, on page 73 42 C h ap t er 3: Configuring Networking Optimizing the Network Topology The Accelerator enables support of many complex network topologies. Some of these environments have special considerations when setting up the Accelerator. Point-to-Point The Accelerator’s default settings are designed with a basic point-to-point network in mind. For point-to-point networks as well as for branch offices connected to headquarters, the basic Wizard configuration should suffice. This is the default setting. Mesh and Hub In a mesh or hub-and-spoke topology it is recommended for the Accelerator to have a correct estimate of the size of the network and the number of Accelerators connected. To adjust the size of the deployment, see Defining Advanced Settings, on page 22. If the Topology-Size is set to a number that is too large, the Accelerator will not use all its resources, resulting in lower acceleration percentages than would be possible if the Topology-Size were set accurately. If the Topology-Size is set to a number that is too small, too many negotiation messages will be sent between the Accelerator and the network. In addition, the amount of time it takes for the Accelerator to reboot and to recover from a disconnected link will be longer than necessary. Taking into Account NetworkSpecific Considerations The Accelerator’s advanced algorithms support multiple complex networks with no added or special configuration. The algorithms automatically optimize Accelerator benefits per network setup. The following are special configuration recommendations for particular networks: Environment Type Customized Configuration Noisy environments Noisy environments are handled automatically via the Accelerator. The Accelerator’s basic configuration settings can automatically optimize problematic networks of this type. Out-of-order Out-of-order environments are handled automatically via the Accelerator. The Accelerator’s basic configuration settings can automatically optimize problematic networks of this type. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e O pt i mi z in g t he N et w o r k Top o lo g y Environment Type Customized Configuration Load balancing In load-balanced environments, you should set the Accelerator to Source IP preservation (CLI configuration only) to maintain the semblance of a session, or RTM encapsulation if necessary. You can perform load balancing per packet or per session. In a load-balanced environment you should either enable IPcomp via the CLI, (see section Setting IPcomp Preservation, on page 503) or use transparent mode to preserve session information. MPLS In MPLS networks, enable ToS bit preservation and source IP preservation. Often it is important to enable router transparency instead, to work with the network’s QoS deployment (see section Setting IPcomp Preservation, on page 503). QoS cloud or working in conjunction with a QoS device Enable router transparency, or ToS bit preservation &/or 43 Source IP Preservation (see section Setting IPcomp Preservation, on page 503). Depending on the fields in use, enabling one or more of the IPComp preservation modes may be necessary in order to use RTM. Monitoring device in a cloud Enable router transparency, or ToS bit preservation &/or Source IP Preservation (see section Setting IPcomp Preservation, on page 503). Depending on the fields in use, enabling one or more of the IPComp preservation modes may be necessary in order to use RTM. R ev isi o n 2. 0 44 C h ap t er 3: Configuring Networking Defining WAN Setup Each Accelerator has a default WAN. The settings on this WAN define the physical connection of the Accelerator to the WAN. The WAN bandwidth setting is the total physical bandwidth of the link between the Accelerator and the network. The default WAN is automatically generated and will suffice for most networks. For details regarding the configuration of complex networks, on which more than one WAN is necessary, see Handling WANs, on page 248. Setting the Bandwidth Correct functioning of the Accelerator’s bandwidth management and flow control mechanisms requires you to configure an accurate bandwidth for the WAN. The Bandwidth setting is enforced once it is set. Ensure that you set the Outbound Bandwidth for the local Accelerator. The Accelerator applies no policy for Inbound Bandwidth unless otherwise specified. Setting inbound QoS on a link requires setting the Bandwidth of the inbound link. For more information see Setting Inbound QoS, on page 121. Configuring the WAN In addition to Bandwidth, you can assign Links per WAN, and configure QoS settings to be applied on the WAN level. For more information about QoS, see Applying QoS, on page 101. To carry out basic WAN configuration, use either the Setup - Basic menu in the WebUI, or the Setup Wizard. For more information on WAN Bandwidth and Links, see Setting Advanced Parameters, on page 247. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n f ig u r in g S e co n da r y IP Ad d r es se s Configuring Secondary IP Addresses 45 You can set on the Accelerator up to 20 Secondary IPs, for connection to multiple subnets on the same network. Out-of-band management is set here. If Out-of-band management is used, it is counted as one of the twenty Secondary IP addresses available. Starting from Version 6.1.2, you can set several IPs on the same subnet, whereas prior to this version, a secondary IP address belonged to a different subnet. To set the number of Accelerators in the network: 1. In the Accelerator’s WebUI, click on Setup > My Accelerator, followed by Secondary IP. 2. Enter the IP address and Subnet Mask to be used, select whether to advertise the IP address and click the Add button. 3. The IP address appears in the Secondary IP List table. 4. To edit or delete an address that is in the table, highlight the row in the Secondary IP List table, select the address, and click Edit to edit, or Delete to delete. R ev isi o n 2. 0 46 C h ap t er 3: Configuring Networking Creating and Editing Links A Link is a logical connection between the Accelerator and a connected remote site and its subnets. The Accelerator optimizes network performance to remote sites with Accelerators deployed via “Accelerated Links”, and to remote sites without Accelerators deployed via “Virtual Links”. The Accelerator’s benefits are greatest when working with another Accelerator on the other side. The Accelerator can provide QoS services to Virtual Links, when no other Accelerators are present on the remote sites. In addition, the Accelerator enables configuration of a single “Non-link”. The Nonlink is the default link for all traffic not assigned to any known subnet or remote Accelerator. Internet traffic is one example of traffic assigned to the Non-link. You can manage this Non-link like any other link, and that lets you determine traffic QoS and bandwidth restrictions for all traffic not destined for your remote networks and Accelerators. When a link is first created or re-established, auto-negotiation occurs between the local and remote ends of the link and uses the inbound and outbound bandwidth settings to determine the resources to be allocated for each link. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C r ea ti n g an d E d it in g L i nk s 47 Studying the Links Screen The Links screen lets you add, edit and manage Accelerator links. Creating a link requires assigning a destination IP address and an outbound bandwidth to the link. The following sections detail the operations you can carry out via the Links screen: Adding Links, on page 47. Editing Links, on page 50. i NOTE: Packet Fragmentation does not work in RTM mode. Adding Links Add links to the Accelerator via the Setup - My Links menu. Note that TCP port 1928 is needed for establishing a connection between Accelerators. Ensure that this port is not blocked by a firewall that is installed between the Accelerators. To add a link: 1. In the Accelerator WebUI, click on the Setup tab, and then the My Links menu. The Links screen opens by default. R ev isi o n 2. 0 48 C h ap t er 3: Configuring Networking 2. Set the basic link properties, as follows: Property Description Source IP IP address of the sending device. By default, the Accelerator’s primary IP is displayed. You can either leave this choice or select another source IP address. The Source IP field, lets you define a source IP for each new link you create, and also changes the source link while the link is active. In addition, you may use a virtual IP address for redundancy purposes. In this case the virtual IP will be a link which, in case of machine failure, can be redirected to another machine, unlike a link whose source is a primary IP address. For more details see Using a Virtual IP Address, on page 51. The valid link source IPs are as follows: Primary IP Secondary IP VLAN IP HSRP IP VRRP IP Name Set a name for the link to let you identify the link in the future. Up to 32 characters, no spaces. Destination IP IP address of the remote device. Bandwidth Set the link’s bandwidth, namely: the maximum throughput allowed to traverse the link. IPComp IPComp encapsulation enables the best compression rate. IPComp encapsulation (tunnelled encapsulation) defines complete compression of the packets intercepted by the Accelerator. This means that the IP header, the TCP/UDP header and the payload are compressed and the packet traversing the network will have an Accelerator-proprietary IPComp header. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C r ea ti n g an d E d it in g L i nk s i Property Description Router Transparency (RTM) In Router Transparency encapsulation, only the packet’s payload is compressed, leaving the original IP header and the original TCP/UDP header in their original forms so that their information is available across the network. Router Transparency encapsulation is appropriate in an environment where header preservation is necessary, including QoS deployments, monitoring (NetFlow), load balancing, billing, encryption, MPLS networks and certain firewall environments. RTM support for On-LAN deployments is available in AcceleratorOS 5.0(6) and higher. 49 NOTE: If you leave the Source IP field empty, the default value is the machine’s primary IP address. 3. If you are finished, click the Add button. For particularly complex networks, the Accelerator enables advanced link configuration. To set additional advanced configuration settings: 1. Click the Advanced button. 2. Open the different sections by clicking on the + sign next to the section title. Use the Parameters section to edit parameters such as Link Name, Destination IP, Source IP, Link Metric, Bandwidth Out and MTU (Maximum Transfer Unit). Use the Acceleration section to define whether to accelerate the link and to use header compression. Use the Tunneling section to define parameters such as the encapsulation type (IPComp, or Transparent), preservation and Include checksum. In the TCP Acceleration settings section, select whether to use the global TCP acceleration settings or to customize these settings by defining the typical round-trip time (RTT) and the typical acceleration rate. In the TCP Acceleration Advanced section, select the type of acceleration you want to implement (Global, link specific, or none). If you choose link specific, you will need to fill in additonal fields. In the Post Acceleration Aggregation section, select whether to enable Citrix (post acceleration) aggregation on your links. Citrix Aggregation operates per link. R ev isi o n 2. 0 50 C h ap t er 3: Configuring Networking In the Bandwidth Adjustment section, select the Enable Bandwidth Adjustment check box and fill in the percentage and interval rates. In the IPsec section, select the Enable IP Sec checkbox and select a policy name and enter a local and remote IP address. 3. To save the settings, click Submit, click Back to Links to return to the My Link screen. For Advanced Configuration options, see Additional Configurations, on page 496. Editing Links You can use the Edit Links screen to fine-tune and modify existing links. This screen lets you set basic link parameters, acceleration, tunneling and TCP Acceleration parameters for the link. To edit an existing link: 1. In the Links table, either click the name of the link to be edited, or click the row of the link to be edited, and click the Edit button. The Edit Link screen appears: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C r ea ti n g an d E d it in g L i nk s 51 2. In the Edit Link screen that opens, use the Parameters section to edit parameters such as Link Name, Destination IP, Link Metric, Bandwidth Out and MTU (Maximum Tranmission Unit). 3. Use the Acceleration section to define whether to accelerate the link and to use header compression. 4. Use the Tunneling section to define parameters such as the encapsulation type (IPComp or Transparent). 5. In the TCP Acceleration settings section, select whether to use the global TCP acceleration settings or to customize these settings by defining the typical roundtrip time (RTT) and the typical acceleration rate. 6. In the Post Acceleration Aggregation section, select whether to enable Citrix (post acceleration) aggregation on your links. Citrix Aggregation operates per link. Each link can have Citrix Aggregation enabled or disabled independently of other links. For details, see Creating Citrix Applications, on page 112. 7. i NOTE: When configuring a link, you are advised to set a link metric for it, which is the actual metric for all the link’s subnets, with the exception of excluded Subnets. If you do not set a link metric for the link, the system automatically sets a default for the link, which is the current maximum metric +10, starting from 11. Use the Link Subnets screen to set the link’s subnets. For configuration details, see section Configuring Remote Subnets Manually,on page 56. Using a Virtual IP Address As mentioned earlier (see section On-LAN,on page 8), in the case of machine failure, a link that uses a Virtual IP can be redirected to another machine. An example of such a case is provided in the figure below. R ev isi o n 2. 0 52 C h ap t er 3: Configuring Networking The source IP (virtual IP) in the sending machine is the destination IP in the receiving machine. If an AcceleratorOS link is established, and the Source IP of this link is defined to be the HSRP Group’s Virtual IP, the link switches to the next Accelerator in the rare case of primary Accelerator failure, and all of this link’s services are kept. When the primary Accelerator is available again, the link switches back to it. Adding and Editing Links via the CLI The CLI procedure for adding and editing links is the same as for creating the first link. For more information, see Defining Link Settings, on page 501. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Setting Subnet Routing S e tt i ng S ub n et R o u ti ng 53 To function properly, the Accelerator must correctly detect the layout of the network to which it is connected. In other words, it must understand where the Accelerator resides as well as all other subnets on both sides of the link that the Accelerator should serve. In this way, the Accelerator will be able to forward the packets it receives to the correct destination, as seen in the figure below. In the figure above, S1 is Accelerator 2’s direct subnet, while S2 and S3 are also subnets of Accelerator 2. Accelerator 1 must forward traffic destined for devices that are part of S2 and S3 to Accelerator 2 via Link1. In order for Accelerator 1 to do this, it must detect S1, S2 and S3 as subnets of Accelerator 2. Accelerator 2 automatically detects S1 and adds it as its local subnet. You can manually add S2 and S3 to Accelerator 2’s Subnets list, or use routing protocols to add them dynamically. If the network supports OSPF or RIP the Accelerator can function as an OSPF or RIP device to receive routing information. If other dynamic protocols are in use, the Accelerator can poll routers to learn their routing tables. Then, Accelerator 2 must advertise its subnet list to Accelerator 1, enabling Accelerator 1 to properly route packets destined to S1, S2 and S3 to Accelerator 2 via Link 1. R ev isi o n 2. 0 54 i C h ap t er 3: Configuring Networking NOTE: The Accelerator supports up to 2500 local subnets and up to 2500 remote subnets per link. Configuring Subnets Manually If the network in which Accelerator resides does not work with dynamic routing or if a subnet was not detected via OSPF or RIP, you will have to add and edit subnets manually. To add a subnet to the Accelerator: 1. In the Accelerator WebUI, click on the Setup tab, and then the My Accelerator tab, followed by the My Subnets menu. 2. Set the parameters as follows: Parameter Item Description IP Address Set the IP address of the Subnet that is connected to the Accelerator. Subnet Mask Set the Subnet Mask of the subnet. Metric The metric setting defines the priority of the route or the subnet. Set a lower number for more desirable routes. For example, on a T3 link with 1 hop, set a low metric value, whereas on a long-haul 128 Kbps link with 8 hops you should set a high number. Advertise Advertised subnets are the Accelerator’s subnets that the Accelerator broadcasts to other Accelerators when link negotiations occur. Select whether to advertise this subnet. By default, subnets that are manually added are advertised. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e tt i ng S ub n et R o u ti ng Parameter Item (Continued) 55 Description Add route rule When adding a subnet, the Add route rule checkbox lets you create a static route rule to define how to reach the subnet. This will add an entry in the My Routes table, which displays access to the subnet via the next hop. NOTE: Once the static route is created, no connection exists between the route-rule added and the subnet. Any change made in the one will not affect the other. Next hop Add a next hop via which the subnet will be accessed. The Edit button lets you modify already added subnets by selecting them in the table and clicking this button. This may be done for manually added subnets as well as dynamically learned subnets. To delete subnets, select them in the table and click this button. When subnets that are set to be advertised are deleted, they are removed from all connected Accelerators. ! CAUTION! The Accelerator’s local subnet is automatically detected and ! added. If more than one local subnet exists, you have to add all additional local subnets. Ensure that the local subnets appear in the Local Subnets Table. Otherwise, in a non-link environment, the Accelerator QoS and Monitoring features will not function properly. Editing a Subnet Once a subnet has been added to the Accelerator, you can use the following steps to edit it. To edit a subnet: 1. In the My Subnets screen, highlight one subnet in the Local Subnet table, and click the Edit button. 2. Edit the IP address, Subnet mask, Metric and Advertise status as necessary and click the Submit button. When subnets that are set to be advertised are edited, the change is broadcasted to all connected Accelerators: R ev isi o n 2. 0 56 C h ap t er 3: Configuring Networking Configuring Remote Subnets Manually If the Accelerator network does not work with dynamic routing, or if a remote subnet was not detected via OSPF or RIP, you have to manually add, edit and delete remote subnets to be advertised by the Accelerator. When adding a subnet, you have to apply it to a specific link of your choice. The Link Subnets screen lets you display all subnets applied to a specific link. You can also use this screen to add, edit and delete subnets to be excluded from the link. To add a remote subnet to the Accelerator: 1. In the Accelerator WebUI, click on the Setup tab, and then the My Links tab, followed by the Link Subnets menu. 2. Set the parameters as follows: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e tt i ng S ub n et R o u ti ng ! Parameter Item Description IP Address Set the IP address of the Subnet you want to connect to the Accelerator. Subnet Mask Set the Subnet Mask of the subnet. Exclude If a subnet has already been added, and specific IP address(es) are to be excluded, enter the IP address and mask and select the Exclude checkbox. 57 CAUTION! The Accelerator’s remote subnet is automatically detected and ! added. If more than one remote subnet exists, you have to add all additional remote subnets. Ensure that the local subnets appear in the Remote Subnets Table. Otherwise, in a non-link environment, the Accelerator QoS and Monitoring features will not function properly. R ev isi o n 2. 0 58 C h ap t er 3: Configuring Networking Adding Static Routes Use the following procedure to add static routes to the Accelerator. i NOTE: The Accelerator supports up to 1500 route entries in the routing table. To add a static route: 1. In the Accelerator WebUI, click on the Setup tab, and then the My Accelerator tab, followed by the My Routes menu. 2. In the static routing section (below Dynamic Routing), enter the subnet IP and Mask, and the next hop to be used for accessing the subnet. 3. Ensure that you select the Add as local subnet checkbox, if the subnet being added is local to the Accelerator. In such a case select also whether to advertise the subnet by checking the Advertise Local Subnet checkbox. 4. Click the Add button. The static route now appears in the Route Rules table. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Setting Dynamic Routing i S e tt in g D yn am i c R o u ti ng 59 NOTE: Static routes created via the My Subnets menu also appears in the Route Rules table. For more information, see sectionConfiguring Subnets Manually, on page 54. Once the static route is created, no connection exists between the route-rule added and the subnet. Any change made in one of them will not affect the other. Due to the continuous changes in routing and the vast complexity of collecting necessary routing parameters, many advanced networks use dynamic routing protocols to enable routers to exchange routing data automatically. In addition to allowing manual routing configuration, the Accelerator supports dynamic routing protocols, including OSPF and RIP v1 and v2 and Router Polling. Supporting dynamic routing protocols enables the Accelerator to use alternate routes in the event of router failure. In addition, the Accelerator learns the cost and length of each route (per bandwidth in the case of OSPF and per hop in the case of RIP), and can forward accelerated packets to the best router. The Accelerator can also load-balance best routes. A subnet whose Advertised status is manually manipulated continues to function dynamically within the routing protocol, but maintains the manually altered Advertising status. The following topics are discussed in this section: Working with OSPF Working with Router Polling i NOTE: Once Subnets are located by using OSPF or RIP, you can perform manual modifications. For example, subnets located via RIP are set by default as Not Advertised; however, you can modify them to be Advertised subnets. For Manual Subnet configuration information, see sectionConfiguring Subnets Manually, on page 54. Working with OSPF Once the Accelerator is set to work with OSPF, it updates its routing and subnets tables according to dynamic information coming from OSPF updates. All local subnets detected via OSPF are automatically set to be “advertised” by default if their metric value is between the high and the low values. Advertised R ev isi o n 2. 0 60 C h ap t er 3: Configuring Networking subnets are the Accelerator’s subnets, which are broadcasted to other Accelerators when link negotiations occur. Configuring OSPF Configuring OSPF is accomplished via the Setup - My Accelerator - My Routes Menu. To configure OSPF: 1. Click on the OSPF button. 2. Set the parameters as follows: Parameter Item Description OSPF Model Enable or Disabled OSPF Mode. Enabling OSPF Mode lets you configure OSPF parameters. Disabling OSPF Mode saves any previously configured OSPF settings, but disables OSPF capabilities. Area ID OSPF divides its networks into areas. Therefore, you must set the Accelerator with its OSPF area identification number, which lets the Accelerator identify itself to local routers. To set the Area of the Accelerator within the OSPF group, use its number or its IP Address format number. The default is 0.0.0.0. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e tt in g D yn am i c R o u ti ng Parameter Item (Continued) Description Low/High Determines a range of subnets to be advertised. If a subnet is between the high value and the low value, it should be advertised. Locality Metric Authentication 61 Authentication on the Accelerator must match the OSPF authentication set across the network. Set the Authentication to None, Key, or MD5: None: When no authentication is necessary to communicate with other OSPF devices. Key: When a non-encrypted authentication password is needed to communicate with other devices in the OSPF network, insert the key used. This key is a common string (non-encrypted) that must be set according to what is set across all devices on the network using OSPF. MD5: When an MD5 authentication password is needed to communicate with other OSPF devices, insert the encrypted key used. This must be the password that is set across all devices on the network using OSPF. Set the ID number according to this authentication password’s ID number across the OSPF network. Neighbor IP The Accelerator automatically detects neighboring OSPF routers. If a router was not auto-detected, you can manually add up to 20 routers to the Neighbors Table. This is particularly important when connecting to nonbroadcast networks, such as an Accelerator on a subnet that does not use OSPF. This enables the Accelerator to receive OSPF routing information from a neighboring router on a subnet that uses OSPF Working with Router Polling The Accelerator’s Router Polling feature enables the Accelerator to retrieve route rules from the router’s routing table. The Accelerator uses SNMP to collect the router’s routing table and add it to the Accelerator’s list of routes. You can filter the list by collecting only routes learned by specific protocols. R ev isi o n 2. 0 62 C h ap t er 3: Configuring Networking To configure router polling: 1. Select Setup - Networking - Router Polling. 2. Set the parameters as follows: Parameter Item Description Router Polling Enable or Disable Router Polling. Enables the Accelerator to retrieve route rules from the router’s routing table. Polling Interval Sets the frequency with which the router is polled (in seconds). Default is 180 seconds. Primary Router IP Address Selects whether to use the local default gateway or to set an IP address manually. Secondary Router IP Address Selects whether not to use a secondary router IP address (default) or to set an IP address manually. SNMP Version Sets the SNMP version to be used for polling the router. SNMP Community Name Sets the SNMP community to be used for polling the router. Polling Protocols Table Lists the polling protocols used for retrieving the route rules from the router’s routing table. Check the checkbox of the route rule you want to apply, or click the checkbox next to status, to select all. The following protocols are supported: BBNSPFIGP BGP CISCO-IGRP EGP ES IS GGP HELLO ICMP IS IS Local OSPF Other RIP Static 3. After making any change, click Submit. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e En ab li ng P ac ket I n te rce p ti on Enabling Packet Interception 63 When the Accelerator is deployed in On-LAN mode, WAN traffic must be redirected through the Accelerator in order for it to work. To do that, one of the following methods can be used: Working with RIP, on page 63 Working with WCCP, on page 65 Working with RIP Once the Accelerator is set to work with RIP, it detects all subnets (including the Accelerator’s local network) connected to all routers on all connected networks and adds these to the Accelerator’s subnet and route tables. By default, all subnets detected via RIP are set to “Not Advertised”. Advertised subnets are the Accelerator’s subnets, which are broadcasted to other Accelerators when link negotiations occur. Configuring RIP Configuring RIP is accomplished via the Setup - My Accelerator - My Routes menu. To configure RIP: 1. In the Accelerator WebUI, Click on the Setup tab, and then the My Accelerators tab, followed by the My Routes menu. 2. Click on the RIP button. 3. Set the parameters as follows: Parameter Item Description RIP Mode Set RIP Mode to Enable, Passive or Disabled. Enabled Mode allows configuration of RIP parameters. Disabled RIP Mode saves any previously configured RIP settings, but disables RIP capabilities. Passive mode enables RIP in a listening mode without sending updates. Version Select the RIP version in use on the network: either RIP version 1 or RIP version 2. Note that in cases where RIP route injection is used, the RIP version should be set to version 2. R ev isi o n 2. 0 64 C h ap t er 3: Configuring Networking Parameter Item Description Authentication Authentication on the Accelerator must match the RIP authentication set across the network. When working with RIP version 1, Authentication is automatically disabled. When working with RIP version 2, set the Authentication to None, Key, or MD5: None: When no authentication is necessary to communicate with other RIP devices. Key: When a non-encrypted authentication password is needed to communicate with other devices in the RIP network, insert the key used. This key is a common string (non-encrypted) that must be set according to what is set across all devices on the network using RIP. MD5: When an MD5 authentication password is needed to communicate with other RIP devices, insert the encrypted key used. This must be the password that is set across all devices on the network that use RIP. Set the ID number according to this authentication password’s ID number across the RIP network. Neighbor IP The Accelerator automatically detects neighboring RIP routers. If a router was not auto-detected, you can manually add up to 20 routers to the Neighbors Table. This is particularly important if the Accelerator is on a subnet that does not use RIP. The Accelerator can receive its RIP routing information from a neighboring router on a subnet that uses RIP. RIP Route Injection RIP Route Injection adds a route rule to the router’s routing table, which forwards all traffic from the Accelerator’s subnets to the Accelerator. The Accelerator then returns the packets to the router after they have been processed by the Accelerator. The routes to these subnets, set on the Accelerator, are learned by the router during RIP negotiation. i NOTE: RIP must be in Active mode and set to version 2 for RIP Route Injection to operate. For more information, see section Working with RIP, on page 63. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e En ab li ng P ac ket I n te rce p ti on i 65 NOTE: For packet-interception with RIP injection, the number of injected routes is as follows: The number of injected subnets = 32 – Mask_Len or if If Mask_Len <= 8, then the formula is: the number of injected subnets = 32 – Mask_Len + 1 For example: for 10.0.0.0/30, 2 subnets for 10.0.0.0/8, 25 subnets Using RIP for Packet Interception RIP (Route Injection Protocol) is the other method used by the AcceleratorOS to enable Accelerators in On-LAN deployment to intercept packets from the LAN. To use RIP for Packet Interception: 1. In the Accelerator WebUI, Click on the Setup tab, and then the Networking tab, followed by the Packet Interception menu. 2. Select the RIP menu. 3. In the Packet Interception - RIP screen that appears now, enable RIP mode. i NOTE: If Router RIP mode is configured as Passive, you should disable Passive mode in order to enable RIP mode. For details, see section Configuring RIP, on page 63. 4. Select the maximal number of subnets that would use packet interception via RIP (any number between 1 and 2500; the default is 1000). 5. Click Submit. Working with WCCP WCCP, the Web Cache Communication Protocol, is another way in which the router can learn to forward all traffic from the Accelerator’s subnets to the On-LAN Accelerator. WCCP, a protocol usually used for directing Web traffic to a local Web Cache Server before forwarding requests across the WAN, enables the Accelerator to receive traffic from the router. Starting from Version 6.1.2, the types of traffic WCCP enables the Accelerator to receive are not only TCP and UDP (service R ev isi o n 2. 0 66 C h ap t er 3: Configuring Networking groups 77 and 78), but also other types such as ICMP, CIFS and TCPPromiscuous. For details, see Setting WCCP on the Router, on page 69. By creating an IP GRE tunnel between the Accelerator and the router, the Accelerator is able to receive and process all relevant traffic and return it to the router before the traffic traverses the WAN, as follows: 1. The Accelerator is set as a WCCP device. 2. The router directs traffic to the Accelerator. 3. The Accelerator returns accelerated traffic to the router in a GRE tunnel. 4. Data is removed from the GRE tunnel, and sent to its destination. The WebUI lets you intercept packets by using either WCCP or RIP. Using WCCP for Packet Interception The AcceleratorOS lets Accelerators in On-LAN deployment intercept packets from the LAN by using either WCCP or RIP. To use WCCP for Packet Interception: 1. In the Accelerator WebUI, click on the Setup tab, and then the Networking tab, followed by the Packet Interception menu. The default screen that appears now is Packet Interception - WCCP. 2. Select whether to enable WCCP. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e En ab li ng P ac ket I n te rce p ti on i 67 NOTE: Enabling WCCP is relevant only with On-LAN deployment. If your currently selected deployment is On-Path, please change it by going to Setup > My Accelerator > Basic > Advanced Settings. Use the Routers Table to add or delete routers to the list of routers to be used for packet interception. When adding a router, you have to indicate its router ID (the IP address used for connecting him to out network, usually the highest value number), as well as the router status (Connected/Disconnected - indicating a connection to the network). If you enable the WCCP Service, and do not set a router IP address, an error will result. 3. Use the Services Table to manage the list of services to be used for packet interception. The Services Table displays by default all of the pre-defined services, which are as follows: Web ICMP UDP TCP-Promiscuous CIFS - WAFS Additional services can be added or deleted from the Services Table. The same services must be configured on the router that is connected to the Accelerator. i NOTE: When you enable the WCCP feature, all pre-defined services are enabled by default, except for Web and CIFS. In addition, if you have multiple Accelerators deployed on your network, the same WCCP services should be enabled on each appliance. To add a WCCP Dynamic Service: 1. In the Services Table header, click the Add button. The default screen that appears now is Add WCCP User Defined Service. R ev isi o n 2. 0 68 C h ap t er 3: Configuring Networking The Parameters box lets you configure the following parameters: Service ID - any number between 0 and 254 (configurable only on dynamic services; this number is not editable on pre-defined services). Protocol ID - any number between 1 and 255 (again, configurable only on dynamic services). Priority - any number between 0 and 255 (default: 100). Weight - used for load balancing. If you have one or more Accelerators that share the router to which your Accelerator is connected, you can use this field to instruct the router what percentage of the traffic that uses this service is to be directed to the current Accelerator (default: 100). Port Direction - lets you set the port direction used for carrying out load balancing through Hash. This load balancing is configured in the router, according to either subnets (IPs) or ports. This box lets you only enable the Hash-assisted load balancing, through the Destination/Source IP, Port or both. Password - lets you enter a password for using the service. The next time your Accelerator synchronizes with the router, the router reads this password and prevents unauthorized access to this service’s traffic. 2. Use the Ports Table to add a port (optional). 3. Click Submit. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e En ab li ng P ac ket I n te rce p ti on 69 Once the new dynamic service was added, you can add it like any other WCCP service. To edit a WCCP service: 1. In the Services Table, click the number (ID) of the service you want to edit, in the ID column of the row of this service (for example, ID 52 in the UDP row). 2. In the Edit WCCP Service screen that appears now, edit the service’s various parameters. As mentioned earlier, the Service ID and Protocol ID parameters can be edited only in dynamic services. 3. Click Submit. Setting WCCP on the Router Using WCCP requires you to configure WCCP to work on the network’s router using the same service settings (the port numbers in the Accelerator must be identical to the Router on a per service basis). You can use CLI commands to configure WCCP on Cisco routers. For more information, see the Configuration Guide supplied with your router. You can use CLI commands to configure WCCP on the Accelerator. When configuring WCCP on multiple appliances, make sure that the WCCP services on each Accelerator is identical. See Configuring WCCP, on page 448. R ev isi o n 2. 0 70 C h ap t er 3: Configuring Networking Setting the Accelerator’s Time By default, time settings are configured automatically on the Accelerator based on the local time of the attached management PC. You can alter the time setting manually, or set it to receive time synchronization from a Simple Network Time Protocol server (SNTP). To set the Accelerator’s Clock: 1. Click on the Setup tab, and then the My Accelerators tab, followed by the Time menu. 2. In the Time menu, select either Set device time or Use SNTP. For manual time settings, insert the local time and date for the Accelerator. For SNTP, enter the server IP address and the frequency with which the server is to be polled for time updates. 3. Click the Submit button. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C o n fi gu r i ng DH CP S e r ve r s Configuring DHCP Servers 71 Managing the DHCP servers on your system requires a configuration file. By default, the DHCP server is disabled. To enable it, you have to download the sample DHCP configuration file and save it on your system. When you have a configuration file, you can either use the current file or customize the file and then upload the customized file. To display the lease data of a selected IP address: 1. In the Accelerator WebUI, Click on the Setup tab, and then the Networking tab, followed by the DHCP menu. 2. In the DHCP Server field, set the status to Enable. 3. In the Lease section, enter an IP address of your choice and click the Show Lease button. The host name, IP address and expiry date are displayed on the screen. Activating DHCP Relay Agent The DHCP relay agent allows placing DHCP clients and DHCP servers on different networks, thus solving the problem that arises because DHCP broadcast messages do not, by default, cross the router interfaces, without using the costly solution of placing a DHCP server on each network segment. Choosing the DHCP relay agent solution lets you use fewer DHCP servers and place these machines in central locations. To solve the problem of DHCP broadcast messages, you can configure the routers to pass DHCP/BOOTP messages selectively, a process known as BOOTP relay. A router or Accelerator that carries out DHCP relay does not just forward BOOTP broadcast messages, but actually examines the packet, makes appropriate changes to it, and only then relays the packet to a DHCP server. The DHCP server to which the packet is relayed is configured by adding a Helper Address on the router or an IP address under the local interface of the Accelerator. The relay agent communicates with a DHCP server and acts as a proxy for DHCP broadcast messages that need to be routed to remote segments. Like the routerbased BOOTP Relay Agent, the DHCP Relay Agent is configured with addresses of DHCP servers to which they should relay the DHCP message. The DHCP Agent communicates with the DHCP server by using unicast communications instead of R ev isi o n 2. 0 72 C h ap t er 3: Configuring Networking broadcast messages. Therefore, the Agent’s requests can be routed to a server on a remote network, regardless of segment boundaries. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et t in g E x pan d View Co n n ec ti vit y P a r am et e r s Setting ExpandView Connectivity Parameters 73 Registered users of ExpandView enjoy the benefit of having ExpandView automatically discover a new registered Accelerator as soon as a link to that Accelerator is established. However, if the default settings of ExpandView are changed (for example, port), or if the auto-discovery fails, you have to update the ExpandView agent’s parameters accordingly To define ExpandView Connectivity parameters: 1. Click on the Setup tab, and then the My Accelerator tab, followed by the ExpandView menu. 2. In the ExpandView menu, select the Enable ExpandView Agent box. 3. Enter the ExpandView Server’s IP address and port number. 4. Click the Submit button to submit the registration request. If all parameters were entered appropriately, the Status line now displays the current status (enabled/disabled). R ev isi o n 2. 0 74 C h ap t er 3: Configuring Networking Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 4: Monitoring the Network This chapter explains how to use and understand the Accelerator’s advanced graphic reporting and statistics feature that enables monitoring of Accelerator performance and throughput. This chapter includes the following sections: Introduction to Monitoring, on page 76 Using Link Statistics and Graphs, on page 80 Discovering Traffic, on page 86 Viewing Applications’ Statistics and Graphs, on page 89 Viewing Summary Graphs, on page 95 Viewing Ethernet Statistics, on page 96 Configuring NetFlow Support, on page 98 76 C h ap t er 4: Monitoring the Network Introduction to Monitoring All statistics generated for these graphic reports are saved in the Accelerator history log, so that if Windows closes or if an Accelerator reboots, you can easily re-access the chart or graph via the Accelerator WebUI. The graphs are automatically updated, according to a set frequency. The Accelerator samples the data behind-the-scenes and stores it in a compact way, which lets you view data up to the minute over a period of up to a year. This sampled data represents the average over the selected period of time. Expand recommends that you open a maximum of five charts per-Accelerator simultaneously. The monitoring feature, available via the Monitor tab, lets you view statistics and graphs for From WAN, To LAN, To WAN, and From LAN traffic, as described in the following figure: i NOTE: In a non-link environment, if a local subnet is not defined as LOCAL, the Accelerator QoS and Monitoring features do not function properly. Ensure that all Local subnets are defined as local. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Working with Monitoring Wo r k in g w i th M on i to r i ng 77 To work with monitoring, you first need to take several steps, defined in the following sections: Installing the JAVA Applet, on page 77 Using Verisign Security Certificate, on page 78 Studying The Monitoring Window, on page 78 i NOTE: The Accelerator’s graphic reporting feature works with the JavaApplet (JRE 1.4 and up, recommended to use the Java-Applet provided on the Expand Networks Extranet). The PC used for viewing the graphs must support Java runtime environments and a Java plug-in must be installed in order to view the Accelerator’s graphs Installing the JAVA Applet To determine whether you need to install the Java plug-in, from the Start button, click Settings > Control Panel > Add or Remove Programs. Search the list for JAVA 2 Runtime Environment. If you do have this software installed and have verified that you are using the correct version, you are ready to begin working with the Accelerator’s Graph Monitoring feature. If the JAVA plugin is not installed on the PC, follow this procedure to download and install the plugin. To download and install the Java plugin: 1. In your Internet Browser window, type the following URL into the Address field: http://www.expand.com/Solutions/Index.aspx?URL=/Solutions/Java-Plug-In.aspx 2. Save the Java installation file onto your PC. 3. Double-click the Java installation file. The Java Plug-in installation wizard opens. Use the default settings to install the Java-Plug-in. This plug-in lets you view the Accelerator’s Graphic-Reporting feature by opening a new Internet Explorer window and entering the Accelerator’s IP address into the Address field. R ev isi o n 2. 0 78 C h ap t er 4: Monitoring the Network Using Verisign Security Certificate In order to work with the Monitoring feature, Windows requests you to verify that the Accelerator is a trusted site, by displaying the popup window shown below. To avoid seeing the popup each time you try to access the Monitoring menu, you are advised to click the Always button. Studying The Monitoring Window Option Description Direction The Accelerator’s monitoring feature lets you view statistics for inbound our outbound traffic on the Accelerator. Link The Accelerator’s monitoring feature lets you view statistics per link, for a specific link, for the total for all Accelerator’s links, for the total for compressible links, for the non-link, or for the total for virtual links. View Last Scroll down in the View Last drop-down menu to select the period for which the graph is displayed. The default period is 30 minutes. Link Speed You can set the link speed in the fields above the graph to add a line to the displayed graph, enabling you to see the limit of throughput that can actually traverse the link. By default, when Auto is selected in the link speed column, the link speed is set to the bandwidth set for the link selected. When total is selected in the Link column, the default link speed (when Auto is selected in the Link speed column) is set to either the total bandwidth set for all links or the sum of all WAN bandwidths; total is the lower value of the two. Peak Data Select the Show checkbox if you want to see the peak lines representing the highest statistics achieved for the reported period. All graphs displayed give an average of the performance for any given interval. Therefore, viewing Peaks is necessary for understanding the Accelerator’s overall performance. Save Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Click the Save button to save the generated graphs as a JPG or a PDF file. You are then directed to browse to a location in which to save the file. The PDF file created displays each graph in the selected Monitoring window and a brief description of each. Wo r k in g w i th M on i to r i ng Option Export to CSV 79 Description Click the Export to CSV button to save the generated graphs as a CSV file. You will be directed to browse to a location in which to save the file. The file created generates a table with the following fields: Name, Description, Period, Interval, Sample Time, In, Peak In, Effective In, Effective Peak In, Inbound Acceleration, Inbound Peak Acceleration, Inbound Compression, Inbound Peak Compression, Out, Peak Out, Effective Out, Effective Peak Out, Outbound Acceleration, Outbound Peak Acceleration, Outbound Compression, Outbound Peak Compression For a description of these fields, see section Gathering Statistics for Detected Applications, on page 93. R ev isi o n 2. 0 80 C h ap t er 4: Monitoring the Network Using Link Statistics and Graphs The link statistics and graphs let you monitor the performance of the Accelerator and its links. Alternatively, you can monitor the Accelerator based on the Applications traversing its links. Viewing Throughput Statistics per Link The Throughput Statistics per Link graph lets you monitor how much traffic passed through the Accelerator. This graph lets you compare between accelerated throughput, (what actually goes over your WAN link) and the pre-accelerated throughput, which is the throughput that would have been used without the Accelerator’s compression mechanisms. The blue area represents the actual bandwidth used with the Accelerator, while the yellow represents the amount of bandwidth that would have been used without the Accelerator. i NOTE: If the Accelerator is not deployed the available bandwidth is reduced, therefore you should expect to see slower rates used by their servers and hosts. Viewing Utilization Statistics per Link Ac ce ler at o rOS 6 .1 .2 Us er Gui d e U sin g L in k Stat i st ics a nd G r ap h s 81 The Utilization Statistics per Link graph lets you monitor how much of the links is being utilized. The traffic displayed is accelerated traffic, and therefore cannot exceed 100% of the link speed. Selecting the link speed is necessary in order for the Utilization graph to display accurate data. Viewing Acceleration Statistics per Link The Acceleration Statistics per Link graph lets you view acceleration percentages for inbound and outbound traffic on the Accelerator per interface/link or for the total for the Accelerator. Understanding Acceleration The Acceleration percentage describes how effectively the Accelerator is processing and compressing the traffic. This statistic does not take into account traffic that bypasses the acceleration mechanism. Acceleration percentages are calculated as follows: To calculate acceleration: Refer to the Monitor > Links > Statistics menu for data to be used in the following procedure. 1. Multiply the number of In Packets by 14. 2. 3. 4. 5. This accounts for the Ethernet Layer-2 header. Subtract this number from the number of In Bytes. Divide this number by the sum of the Out Packets multiplied by 14 and subtracted from Out bytes. Subtract 1 from the sum. Multiply the ratio by 100 to arrive at the acceleration percentage. R ev isi o n 2. 0 82 C h ap t er 4: Monitoring the Network InBytes – 14 X InPackets ------------------------------------------------ – 1 X 100 OutBytes – 14 X OutPackets InBytes—Incoming bytes (from LAN) - Do not tunnel bytesRouting bytes- Passthrough bytes InPackets—Incoming packets (from LAN) - Do not tunnel packets Routing packets - Passthrough packets OutBytes—Outgoing bytes (to the WAN) - Do not tunnel bytes Routing bytes - Passthrough bytes - System messages bytes OutPackets—Outgoing packets (to the WAN) - Do not tunnel packets - Routing packets - Passthrough packets - System messages packets. Parameter Item Description Do Not Tunnel Traffic set with the “Do Not Tunnel” decision, Non-link traffic, Virtual link traffic Routing Traffic between the Accelerator and the local router to retrieve routing information for the local LAN Passthrough Traffic set with the “Do Not Accelerate” decision, overload traffic System Messages Keepalives and so on. For example: in a simple scenario in which the packet size is 1000 bytes: If InBytes = 300,000 and OutBytes = 100,000 then: 300000 – 14 X 300 --------------------------- – 1 X 100 = 208 100000 – 14 X 300 Viewing Compression Statistics per Link The Compression Statistics per Link graph displays the amount by which traffic was reduced by the Accelerator. This graph represents in percents, how much less data is passing over the physical link because of acceleration. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e U sin g L in k Stat i st ics a nd G r ap h s 83 Viewing Statistics per Link The Accelerator’s Statistics table displays data presented in the Link graphs in table format per link or for the entire traffic. To view a statistics table: 1. In the Accelerator’s WebUI, click on Monitor, followed by the Links tab and then the Statistics tab. 2. Select a link from the drop-down menu, or Total to view statistics for all links. 3. From the drop-down menu, select the statistics to be displayed: All, Throughput, Errors, Acceleration. Parameter Item Description In Bytes Number of input bytes. Raw In Bytes Total incoming bytes being accelerated using these links In Packets Number of input packets Dropped In Packets Incoming packets that were dropped by QoS enforcements, such as queues and obsolete Discarded In Packets Incoming packets that were discarded by a rule with discard policy (discard all P2P) Agg Default Incoming packets that were aggregated as part of the default post-acceleration aggregation policy. In packets Agg Custom-1 In Packets Agg Custom-2 In Packets Incoming Packets that were aggregated as part of the custom-1 postacceleration aggregation policy. Incoming Packets that were aggregated as part of the custom-2 postacceleration aggregation policy. Agg Citrix In Packets Incoming Packets that were aggregated as part of the Citrix post-acceleration aggregation policy. CRC Errors Number of CRC-errored packets received Other Errors Unexpected errors received In Acceleration Inbound Acceleration percentage In Actual Acceleration Acceleration that considers all incoming throughput over the selected period In Compression Inbound compression percentage R ev isi o n 2. 0 84 C h ap t er 4: Monitoring the Network Parameter Item (Continued) Description Out Bytes Number of outgoing bytes Raw Out Bytes Total outgoing bytes being accelerated using this link Out Packets Number of outgoing packets Dropped Out Outgoing Packets that were dropped by QoS enforcements (queues, obsolete and so on.) Packets Discarded Out Packets Pass-thru Out Packets Outgoing Packets that were discarded by a rule with discard policy (discard all P2P). Outgoing Packets that were discarded by a rule with discard policy (discard all P2P) Poly Out Packets Number of small packets aggregated, or combined, before transmission Agg Default Outgoing Packets that were aggregated as part of the default post-acceleration aggregation policy Out Packets Agg Custom-1 Out Packets Agg Custom-2 Out Packets Agg Citrix Out Packets Do Not Acc Packets Do Not Tunnel Outgoing Packets that were aggregated as part of the custom-1 postacceleration aggregation policy. Outgoing Packets that were aggregated as part of the custom-2 postacceleration aggregation policy Outgoing Packets that were aggregated as part of the Citrix post-acceleration aggregation policy Number of packets sent out marked as Do not Accelerate. Packets Number of packets sent out marked not to be routed into the link. Out Acceleration Outbound Acceleration percentage Out Actual Acceleration Acceleration that considers all outgoing throughput Out Compression Outbound compression percentage All statistic items are displayed according to: Data—Lists type of statistic gathered. System up—Data transferred over the link selected that was collected since the Accelerator was powered on. Data is listed in KB, in percentages, or in number of packets. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e U sin g L in k Stat i st ics a nd G r ap h s 85 Since Clear—Data transferred over the link selected that was collected since the Accelerator’s counters were last cleared. Data is listed in KB, in percentages, or in number of packets. Last 5 Seconds—Data transferred over the link selected that was collected over the last 5 seconds. Data is listed in Kbps or in percentages. R ev isi o n 2. 0 86 C h ap t er 4: Monitoring the Network Discovering Traffic The Traffic menu lets you view applications running on the network. Traffic is divided into the following categories: Detected traffic (all other applications detected on the network - non-classified traffic that is not part of a predefined or user-configured application type), Monitored traffic (all applications set to enable “collect statistics”), and Layer-7 discovery (the application properties discovered on the network). Viewing Detected Applications The Detected Applications menu lets you view all detected applications that traverse the network. You can view the applications coming in both directions (from LAN to WAN and conversely), the throughput before and after the acceleration, and the acceleration rate. Viewing Detailed Traffic Discovery To view detailed traffic discovery for detected applications: 1. In the Accelerator’s WebUI, click on Monitor, followed by the Traffic Discovery tab and then the Detected Applications tab. 2. Click on the Details column. The Traffic Discovery window appears. This window contains the following items: The Clear Counters button - lets you clear all counters for the discovered application. This is useful in case you want to start collecting new statistics without restarting the system. The Inbound section - details data regarding the inbound traffic. All data items detailed here can be seen since the system was last Ac ce ler at o rOS 6 .1 .2 Us er Gui d e D isc o ver in g Tra f fi c 87 started (System up), since the last time the counters were cleared (Since Clear) or in the last five seconds. The Outbound section - details data regarding the outbound traffic. All data items detailed here can be seen since the system was last started (System up), since the last time the counters were cleared (Since Clear) or in the last five seconds. The Inbound section details the following data items: In Bytes - the amount of compressed bytes that entered the link in this specific system. Raw In Bytes - the amount of pre-compressed bytes that entered the link in this specific system. Queued in bytes - the amount of bytes waiting to enter the system. In Packets - the amount of compressed packets that entered the link in this specific system. Dropped In Packets - the amount of packets that were not accelerated. Discarded In Packets - the amount of packets that were discarded before passing through the link. The Outbound section details the same data items, in the outbound direction. Viewing Monitored Applications The Monitored Applications menu lets you view all monitored applications traversing the network. You can view the applications coming in both directions (from LAN to WAN and conversely), the throughput before and after the acceleration, and the acceleration rate. The Monitored Applications window is as follows: R ev isi o n 2. 0 88 C h ap t er 4: Monitoring the Network Discovering Layer-7 Applications The L-7 table lists the application properties discovered on the network. These may be L7-applications that have been defined already or L7-applications that are not defined but have been detected. To configure the QoS parameters of these applications, double-click the applications in the table. To discover which HTTP/Citrix applications are present on the network: 1. In the Accelerator WebUI, click Monitor, followed by Traffic Discovery and then L7 Discovery. 2. In the Parent L7 Application field, select either HTTP or Citrix. 3. Select the Enable Discovery checkbox. By default this checkbox is disabled. The L7 table lists the application properties discovered on the network. These may be L7-applications that have been defined already or L7-applications that are not defined but have been detected. 4. To configure the QoS parameters of these applications, double-click the applications in the table. This eases the process of defining QoS for the applications, because the L7 application parameters are detected and filled-in automatically (MIME type, URL, Citrix Application name and client and so on). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Vi ewi ng Ap p lic at io n s’ Stat i st ics a nd Grap h s Viewing Applications’ Statistics and Graphs 89 The WebUI lets you display statistics and save them in external formats such as PDF and Excel. In addition, you can monitor the Accelerators in your system. You can to carry out the following operations: Viewing Utilization Statistics per Application, on page 90 Viewing Acceleration Statistics per Application, on page 91 Viewing Compression Statistics per Application, on page 91 Viewing Bandwidth Distribution Statistics per Application, on page 92 Monitoring Applications, on page 92 Gathering Statistics for Detected Applications, on page 93 Graphs viewed per application let you view statistic data items, export them into a CSL file, or save them in Acrobat (PDF) format. For each graph, the following options are available, as seen in the screen below: Parameter Description Application Select an application to view, or select Top 10 or From List. Top 10 displays results for the ten applications that are most prevalent on your network. From List displays the ten applications selected in the Monitored Applications window. Direction The Accelerator’s monitoring feature lets you view data for From WAN, To LAN, To WAN and From LAN traffic on the Accelerator. Link The Accelerator’s monitoring feature lets you view data per link or for the total for all of the Accelerator’s links. View Last Scroll down in the View-last drop-down menu to select the period for which the graph is displayed. The default period is 30 minutes. Link Speed You can set the link speed in the fields above the graph to add a line to the displayed graph, which lets you see the limit of throughput that can actually traverse the link. Peak Data Select the Peak Data checkbox if you want to see the peak lines representing the best statistics achieved for the reported period. Because all graphs displayed give an estimate of the performance for any given interval, viewing the peaks is necessary for getting a full picture of the Accelerator’s overall performance. R ev isi o n 2. 0 90 C h ap t er 4: Monitoring the Network Setting up Graphs Only applications defined as “monitored” applications are displayed in the application graphs. The Traffic Discovery menu lets you view all applications traversing the network. Viewing Utilization Statistics per Application The Utilization Statistics per Application graph lets you monitor how much in percentage the link is being utlized by a single application. This graph lets you compare between inbout and outboutnd utilzation (what actually goes over your WAN vs LAN link). The blue area represents your bandwidth gains with the Accelerator, allowing you to see just how much the Accelerator is really adding to the line. You can view the graph per each application, for the top 10 applications or for ten selected applications. To enable monitoring of a discovered application: 1. Click on Monitor followed by Applications, followed by Utilization. 2. In the Applications table, highlight the applications to be monitored and use the arrow keys to add or remove these applications from the monitored applications table. 3. In the Direction field, select to or from LAN or WAN. Viewing Throughput Statistics per Application The Throughput Statistics per Application graph lets you monitor how much traffic per application passed through the Accelerator. This graph lets you compare between accelerated throughput (what actually goes over your WAN link) and the pre-accelerated throughput, which is the throughput that would have been passed without our advanced compression mechanisms. The blue area represents your bandwidth gains with the Accelerator, allowing you to see just how much the Accelerator is really adding to the line. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Vi ewi ng Ap p lic at io n s’ Stat i st ics a nd Grap h s 91 You can view the graph per each application, for the top 10 applications or for ten selected applications. To enable monitoring of a discovered application: 1. Click on Monitor followed by Applications, followed by Monitor Applications. 2. In the Applications table, highlight the applications to be monitored and use the arrow keys to add or remove these applications from the monitored applications table. 3. In the Apply to Link field, scroll down to select the link whose traffic you want to display Viewing Acceleration Statistics per Application The Acceleration Statistics per Application graph lets you view acceleration percentages for inbound and outbound applications on the Accelerator per interface/ tunnel or for the total for the Accelerator. Viewing Compression Statistics per Application The Compression Winow is as follows: R ev isi o n 2. 0 92 C h ap t er 4: Monitoring the Network The Compression Statistics per Application graph display, in percents, the amount by which data traffic over the physical link was reduced, presented in distribution per single applications. Viewing Bandwidth Distribution Statistics per Application To gain a better picture of what kind of traffic is traveling across your line, the Bandwidth Distribution Graph details the percentage of bandwidth consumed by each selected class. The distribution is for accelerated data, meaning that traffic types that benefit from a high acceleration percentage consume a relatively small percentage of the line, though they constitute a higher percentage of the pre-accelerated data. Monitoring Applications This section explains how to use and understand the Accelerator’s advanced graphic reporting and statistics feature that enables monitoring of accelerated applications. Applications are either predefined or user-defined. By default, 50 of the predefined applications are considered Monitored applications (see Pre-Defined Applications, on page 335), and all user-defined applications are Monitored by default. Monitored applications are applications for which statistics are saved in the Accelerator to be displayed in graphs and charts. You can monitor simultaneously up to 50 applications on each Accelerator, and up to 10 applications on each link. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Vi ewi ng Ap p lic at io n s’ Stat i st ics a nd Grap h s 93 The Monitor Application window is as follows: To gather statistics for a predefined application: 1. In the Accelerator’s WebUI, click on Setup, followed by My Applications. 2. Under View select Defined Applications. 3. Click the application whose statistics are to be saved. The Edit Application screen appears. 4. Select the Collect statistics checkbox. 5. Click Submit. After you selected the applications for which you want to gather statistics, you can use the Monitor Applications menu to select up to 10 applications for which statistics can be provided as a unit. Use the arrow button to move the requested applications from the Applications table to the Monitored Applications table. Gathering Statistics for Detected Applications To enable application statistics gathering: 1. In the Accelerator’s WebUI, click on the Monitor tab, followed by Traffic Discovery. 2. In the Detected Applications window, click on the name of the requested detected application. The Create Application from Discovered Traffic window appears. 3. In this window, select the Collect statistics checkbox. 4. Click the Submit button. R ev isi o n 2. 0 94 C h ap t er 4: Monitoring the Network 5. 6. 7. 8. i The application now appears in the list of Monitored Applications. Under Applications, click Monitor Applications. In the Apply to Link scroll down menu, select the link over which this application should be monitored: this can be all links, a specific link or the Non-link. Highlight the names of applications you want to monitor and use the arrow button to add them to the list of Monitored Applications. Click the Submit button. You can view the newly created list of monitored applications from any of the application graph screens by selecting From List from the Applications scroll down text box. To modify the list, click the Edit List link found next to the From List selection. NOTE: As soon as even one undefined packet is detected (TCP/UDP), it is displayed as an unrecognized port in the traffic discovery list. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Viewing Summary Graphs Vi ewi ng Su mm a ry Grap h s 95 The Accelerator lets you view a selection of important performance graphs to provide you with an overview of your network performance. The Summary menu lets you view several graphs via a single screen. The data used in the graphs is based on the total traffic on all Accelerator links. To view summary graphs: 1. In the Accelerator’s WebUI, click on the Monitor tab, followed by Summary. 2. Select the link, view last, link speed and peak data options. The Summary Window appears. R ev isi o n 2. 0 96 C h ap t er 4: Monitoring the Network Viewing Ethernet Statistics The Accelerator lets you view a statistic detailing of the data displayed on the monitoring graphs. Refer to one of the following sections for details regarding the configuration of Ethernet statistics: Configuring Ethernet Display via the WebUI, on page 96. Configuring Ethernet Display, on page 471 for configuration with the CLI. Configuring Ethernet Display via the WebUI Follow these steps to view, via the WebUI, a statistic detailing of the data displayed on the monitoring graphs: 1. Click on Monitor followed by Interfaces. The Ethernet Statistics window opens. 2. In the Ethernet Statistics screen, select the relevant Ethernet card in the Interface field. The buttons near the Interface field let you clear either the counters of the currently selected interface or all counters of all interfaces. All statistic items, in both inbound and outbound directions, are displayed according to: Data—Lists type of statistic gathered Ac ce ler at o rOS 6 .1 .2 Us er Gui d e View i n g Et he rn et Sta ti st ic s 97 System Up—Data transferred over the selected link, which was collected since the Accelerator was powered on. Data is listed in KB, in percentages, or in number of packets. Since Clear—Data transferred over the selected link, which was collected since the Accelerator’s counters were last cleared. Data is listed in KB, in percentages, or in number of packets. Last 5 Seconds—Data transferred over the selected link, which was collected over the last 5 seconds. Data is listed in Kbps or in percentages. R ev isi o n 2. 0 98 C h ap t er 4: Monitoring the Network Configuring NetFlow Support The Accelerator supports Cisco’s NetFlow protocol (version 5), which enables collecting traffic flow statistics on routing devices. NetFlow is based on identifying packet traffic and reporting the traffic statistics to the collector. The traffic reported is traffic before acceleration, which lets you receive data regarding “real” traffic (not encrypted, tunneled or accelerated). NetFlow does not involve setting any connection-setup protocol either between routers or to any other networking device or end station, and does not require any change externally—either to the traffic or packets themselves or to any other networking device. NetFlow provides various statistical data items (WAN-to-LAN or LAN-to-WAN), in addition to the items generated by the Accelerator. NetFlow uses the following SNMP names: eth 1 (for ETH 0/0) eth 2 (for ETH 0/1) By using these names, the Collector receives on-path indication even when onLAN deployment is used. In the Collector, eth 2 is used as the Out port and eth 1 as the In port in LAN-toWAN deployment, while the opposite happens in WAN-to-LAN deployment (eth 1 is used as the Out port and eth 2 as the In port). When using the CLI to configure NetFlow, you have to indicate which port is used for connecting to the LAN. The following traffic types are not reported: i WAN-to-WAN LAN-to-LAN (including bridgeless traffic). NOTE: The NetFlow collector listening port is needed for establishing a connection between the Accelerator and the collector. Ensure that this port is not blocked by a firewall installed between the Accelerator and the collector. Identifying the Traffic NetFlow detects the local subnets’ source and destination addresses, and determines the traffic direction according to these addresses: the local address are detected as LAN, while the other address are detected as WAN. However, local subnets that were configured in the Accelerator to be excluded (namely: to be connected through a non-link) are detected as WAN. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n f ig u r in g N et Fl o w S u p p or t 99 NetFlow is completely transparent to the existing network, including end stations, application software and network devices like LAN switches. In addition, NetFlow is performed independently on each internetworking device, and need not be operational on each router in the network. NetFlow exports data to a remote workstation for collection and further processing. NetFlow does consume CPU resources; therefore, you should be aware of the resources required on your Accelerator before enabling NetFlow. The Accelerator communicates data to Collector as it is set to act as any other probe on the network, forwarding its packet statistics to the NetFlow Collectors, such as Scrutinizer™ and PRTG™, which let you monitor and analyze Accelerator packets. i NOTE: For your convenience, an evaluation version of the NetFlow collector has been provided for you on the Documentation CD. Enabling NetFlow via the WebUI To enable NetFlow via the WebUI: 1. Click on the Setup tab, followed by Advanced, followed by Netflow. 2. Use the relevant fields to enter the Collector IP address, port number and interface. Alternatively, click the Set Default Values button to reset the Netflow configuration values to factory values. 3. Click the Submit button. R ev isi o n 2. 0 100 C h ap t er 4: Monitoring the Network Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 5: Applying QoS This chapter describes the procedures necessary for configuring the Accelerator’s QoS plug-in. The QoS plug-in lets you prioritize traffic traversing the Accelerator network. The chapter is divided into the following basic sections: i Carrying Out Basic QoS Configuration, on page 104. Basic QoS configuration should be sufficient for relatively simple networks and basic traffic prioritization. Basic QoS configuration lets you view traffic traversing the network, to create applications for unrecognized traffic, and to prioritize these applications as well as predefined applications. Setting Advanced QoS Parameters, on page 115. Advanced QoS enables a higher level of control, enabling the creation of rules for different applications. These rules allow fine-tuning of the type of traffic filtered, as well as the type of shaping set for the application. NOTE: QoS settings take effect when there is congestion. Any minimum bandwidth guaranteed to a traffic type is set aside for this type of traffic only if enough of this type of traffic traverses the line. 102 C h ap t er 5: Applying QoS Accelerator QoS QoS, or Quality of Service, is designed to help manage traffic across the network in order to combat the congestion, latency and greedy and rogue applications that all contribute to poor application and network performance. Organizations need to be able to allocate bandwidth to mission-critical applications, slow down non-critical applications, and stop bandwidth abuse in order to efficiently deliver networked applications to the branch office. Studying the QoS Solution The powerful QoS solution was designed with simplicity of management in mind. Traffic is automatically categorized into application classes - the Accelerator arrives with hundreds of applications predefined in the system. This makes it easier to generate a picture of exactly what is traversing the network, in order to then decide what should be traversing the network. Once a clear picture of the current network and the ideal network is attained, easy to understand shaping policies like “realtime” or “block” govern the flow of traffic. The Accelerator’s QoS mechanism is single-sided, in that it can also work across a Virtual Link, in which the Local Accelerator does not work opposite a Remote Accelerator. For a complete explanation as to how the QoS mechanism functions and is implemented, see Setting Advanced QoS Parameters, on page 115. QoS enables the Accelerator to provide the following: Automatic Traffic Discovery—Accelerators automatically discover and classify hundreds of enterprise applications based on Layer-3 (IP), Layer-4 (TCP, UDP, and so on) and even Layer-7 parameters including web URLs, MIME types (for example: streaming audio) or Citrix (published applications over ICA). End-to-end application performance monitoring—Accelerators provide complete network visibility and enable speedy response to application performance changes on an enterprise-wide scale with end-to-end monitoring and dozens of reports. Transparency to existing QoS infrastructure—Accelerators are transparent to router-based QoS implementations by honoring and preserving priorities set on traffic flowing through them. Advanced networking features such as router-based QoS rely on IP packet header information to be effective. The Accelerators preserve packet header information and compress only the payload that integrates Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ac ce le rator QoS 103 seamlessly with advanced networking features such as router-based QoS, load-balancing, WAN monitoring and MPLS tagging. Priority treatment for critical applications—Accelerators enable important and urgent application traffic to get priority treatment with advanced traffic shaping for both inbound and outbound traffic. Packet fragmentation assures that VoIP/video latency budgets are not violated by large data packets, while packet aggregation ensures higher WAN capacity and stabilizes jitter. Guaranteed bandwidth for specific applications—Accelerators can reserve bandwidth for specific applications. This guarantees that you can allocate delay-sensitive traffic such as VoIP a minimum amount of bandwidth to ensure optimal voice quality even when WAN links are congested or oversubscribed. Restricting rogue and greedy applications—Accelerators restrict greedy applications like file sharing and Internet audio streaming to a maximum bandwidth budget in order to guarantee that other important applications are not bandwidth-starved. Traffic bursts allow applications to take advantage of free capacity if available. Seamless integration with compression—When compression is enabled, the QoS mechanism automatically adjusts to account for the extra available bandwidth created when traffic is compressed. In the Accelerator, rule limit and desired shaping are applied to traffic before it is compressed. However, link shaping (bandwidth for the link and the WAN) is applied to traffic after the traffic has been compressed, because the important result is end-user experience, not the physical link usage. While basic traffic management is simple via the My Applications menu, you can program complex QoS with nested rules, decision trees and other advanced features. R ev isi o n 2. 0 104 C h ap t er 5: Applying QoS C arrying O u t B a s i c Qo S Con f igu ra tio n Basic QoS configuration is accomplished via the My Applications menu, which is populated by all traffic types detected on your network. This menu lets you create new, user-defined applications for traffic not categorized automatically as a predefined application, and to set basic traffic shaping parameters for predefined and user-defined applications - how should the network prioritize and handle each application. i ! ! NOTE: In a non-link environment, if a local subnet is not defined as LOCAL, the Accelerator QoS and Monitoring features do not function properly. CAUTION! By default, the following encrypted applications are not accelerated: pop3s, https, ircs, nntps, ftps, ftps-data, telnets, ssh, sshell, ldaps, smtps, imaps. Viewing My Applications The My Applications Menu in the Accelerator WebUI lets you view traffic per application, filtered by a certain criteria. To view traffic per application: 1. Click on Setup followed by My Applications. 2. In the My Applications screen, select Discovered traffic, Defined Applications, Monitored Applications, Defined L7 Applications, or All from the pull-down menu. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C ar ryi ng O u t B as ic Q o S C o nf ig u ra ti on 105 The table displayed on the My Applications Menu details the Outbound Traffic (by default, only classified traffic is displayed). Basic data about the settings for each traffic type is provided, including Application Name, Minimum bandwidth set (if assigned), Maximum bandwidth set (if assigned), Priority assigned, and acceleration status. The From-LAN statistics pull-down menu lets you customize the statistics type to be viewed for the applications, LAN to WAN (outbound traffic) or WAN to LAN (inbound traffic): Creating New Applications New applications should be created for all traffic types that do not already exist in the list of predefined (classified) traffic applications, or as subsets of these applications to further filter the traffic type selected. R ev isi o n 2. 0 106 C h ap t er 5: Applying QoS To create an application: 1. In the My Applications menu, click the Create Application button. The Create Application menu opens. 2. Update the following parameters to define the Application and how it is handled: Parameter Item Description Application name The default name for a new application is new_application. You have to modify the name of the application to a name indicating the type of traffic considered in this application. Maximum of 31 characters, no spaces. Special characters are allowed. Aggregation class The aggregation Class setting controls the Citrix Plug-in. The Citrix Acceleration Plug-in feature utilizes network resources more efficiently in LAN-based Accelerator deployments and delivers improved acceleration results for Citrix-hosted applications. Citrix MetaFrame users repeatedly access the same content from the network. The Accelerators’ Citrix Acceleration Plug-in feature enhances support for Citrix MetaFrame applications because, through the use of statistical multiplexing, the Citrix Acceleration plug-in allows more Metaframe data to traverse the WAN. The Accelerator achieves this increase in throughput by: Consolidating Citrix header data in pure IP implementations - IP header represents significant overhead in small packets generated by Citrix. It constitutes almost 30% of the Citrix packet. The Citrix Acceleration plug-in removes repeat header information and sends this data only once across the network. Consolidating Citrix payload in all environments - the Citrix Acceleration plug-in extracts data from small packets originating from different Citrix MetaFrame users, and sends packets optimized for specific WAN conditions. The Citrix Acceleration plug-in eliminates all redundant data transmissions across the WAN. Controlling latency and jitter - the Citrix Acceleration plug-in reduces latency and jitter, especially over slow WAN links that are commonly used for Citrix Metaframe deployments. The end-result is better, more consistent Citrix performance; and support of up to four times more Citrix users on the existing infrastructure. Aggregation is performed at the link-level and improves acceleration for traffic with small to medium packets (like Citrix/ICA traffic or Telnet traffic), and aggregates compressed packets. The Aggregation class sets the class to which this application is related. Aggregation reduces the size of the traffic by aggregating compressed packets, before sending them over the WAN. The compressed packets are aggregated in the link per class. The classes are defined via the CLI and set the aggregation packet limit, and allows a pre-defined delay (window) before sending the packets. For aggregation class configuration details, see Managing Aggregation Classes, on page 482. Collect statistics Enabling statistics history saves statistics for this application for up to one year. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C ar ryi ng O u t B as ic Q o S C o nf ig u ra ti on Parameter Item Description Don’t accelerate Traffic set to Don’t Accelerate is not compressed, but it is, however, tunnelled. This setting is useful for traffic that does not compress, but does not need to be transparent (header preservation) to other network devices while crossing the WAN. QoS is still performed on all traffic set to Don’t accelerate. Don’t tunnel Traffic set to Don’t Tunnel is neither tunneled nor compressed. This setting is useful for traffic such as HTTPS or encrypted Citrix. QoS will still be performed on all traffic set to Don’t tunnel. Application criteria The Application Criteria box lets you set the type of traffic to be considered in an application. These fields define a rule for identifying traffic as part of this application TCP Port To set the application to be defined on the basis of a TCP port or a span of TCP ports: Select TCP port from the drop-down menu. In the From field enter the first port to be considered, in the To field enter the last port to be considered. For example, to change HTTP application 80 to HTTP application 8080, enter 8080 into the From field. To define a single port, enter the port number into the From field and leave the To field empty. Click the Add button. The Criteria created appears in the Criteria Table. UDP Port To set the application to be defined on the basis of a UDP port or a span of UDP ports: Select UDP Port from the drop-down menu. In the From field enter the first port to be considered, in the To field enter the last port to be considered. For example, to change the TFTP application from port 69 to port 4444, enter 69 into the From field and 4444 into the To field. To define a single port, enter the port number into the From field and leave the To field empty. Click the Add button. The Criteria created appears in the Criteria Table. Over-IP To define an application based on a specific protocol: Select Over IP from the drop-down menu. In the From field enter the first protocol number to be considered, in the To field enter the last protocol number to be considered. To define a single protocol, enter the number into the From field and leave the To field empty. Click the Add button. The Criteria created appears in the Criteria Table. Criteria Table The criteria table lists all the criteria that must be met in order for traffic to be considered part of this application. To delete entries in the Criteria Table, highlight them and click the Delete button Prioritize The Prioritize box lets you set the shaping or prioritization to be applied to the traffic type. 107 R ev isi o n 2. 0 108 C h ap t er 5: Applying QoS Parameter Item Description Order The order parameter sets the importance of this rule. Traffic that enters the Accelerator is dealt with by the QoS mechanism based on Prioritization order number. Traffic that matches the Application criteria set in order number 100 is handled according to the setting for this application type, even if it may match the criteria of other Applications with other, less important priority order numbers. If the two applications are set with the same order priority, applications are matched according to the highest level of specificity first. For example, if two applications have a priority of 210, but one application is created for all traffic in ports ranging from 2020 to 2060 and the other application is created for traffic on port number 2062, the 2062 traffic is handled first. Another example of higher specificity is when one application defines Layer-7 values and another application with the same priority order defines values only up to Layer-4 values; the Layer-7 application shaping will be applied to the traffic. Most QoS settings do not necessitate setting the Order field. You can set the order from 100 to 65534. Minimum bandwidth (desired) The Minimum bandwidth desired setting should be used carefully. This parameter allocates a certain amount of bandwidth to be saved for a specific application type during periods of congestion. You should set desired bandwidth only for mission-critical, time-sensitive applications, such as VoIP, which need 8 to 16 Kbps allocated throughput to function. Maximum bandwidth (limited) The Maximum bandwidth limit setting puts a ceiling on the amount of bandwidth that an application can consume. This is useful for bandwidth-greedy applications such as FTP or P2P, to limit the amount of bandwidth they consume. ToS You can either preserve the original ToS setting of the packets or set a new ToS value for this application. To preserve the original ToS value, click the Preserve radio button. By default, ToS preservation is enabled. To set a new ToS value for this traffic, click the Set radio button and select one of the following options: ToS value - lets you select a ToS value (0-254) for the Accelerator. Code point - uses the first 6 bits of the ToS field, thereby giving 26 (= 64, namely: 63) different values. CoS ToS - combines the values of the IP precedence field (otherwise known as CoS, which stands for Class of Service) and the ToS (type of service field). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C ar ryi ng O u t B as ic Q o S C o nf ig u ra ti on ! i ! Parameter Item Description Priority You can either preserve the original ToS setting of the packets or set a new ToS value for this application. Set the Priority of the application to: Blocked: Traffic set to Blocked is dropped. Low, Average and High: Traffic set to Low, Average and High are assigned bandwidth on a proportional scale: Low receives the lowest proportion of the bandwidth. Average receives a medium proportion of the bandwidth. High receives the greatest proportion of the bandwidth. Real Time: Real-time traffic always receives bandwidth allocation according to strict priority. This means that as long as real-time traffic is traversing the network, all lower priority traffic types waits until there is free bandwidth, thus starving all lower priority applications with the exception of applications that received a Minimum bandwidth (desired) setting. Diagnostic Mode: You should set traffic to Diagnostic Mode only if the Application is not responding at all to QoS settings. This is because Diagnostic Mode traffic overrides all other QoS settings and starves all other applications (including real-time and Desired bandwidth allocated). If a class is not transmitting at all and seems not to be working, set the class to Pass-thru/Diagnostic mode, thereby disabling the QoS from the traffic type. 109 CAUTION! Ensure that you click the Submit button to save configuration changes before exiting the Create Application menu. NOTE: If you are running a version of AcceleratorOS previous to 5.0(6), note that two new preconfigured applications were added in this version that may affect user-defined applications on the same ports. If applications have been configured for port of 1928 (saved for the expand-internal application) or 2598 (citrix-ica-sr), rename these applications exactly as in the preconfigured application before performing an upgrade. If an application exists for a list of ports or range of ports that include the specified port numbers (1928 and 2598), remove these ports from the list or range, and create applications expand-internal with port 1928, and citrix-ica-sr with port 2598. Then change the policy rules to match this application as well. Modifying Applications Selecting an application lets you modify the application definition (the type of traffic, also known as the traffic rule, or filter) and set up the way the traffic is treated (or prioritized, also known as shaping). R ev isi o n 2. 0 110 C h ap t er 5: Applying QoS To modify an application: 1. In the My Applications menu, click the application name (alternatively, highlight the application line and click the Edit button). The Edit Application menu opens. 2. The Edit Application menu lets you modify all application parameters as listed in section Creating New Applications. 3. In the Aggregation Class drop-down menu you can choose, Default, Custom, or Citrix. 4. Select one or more of the following checkboxes: Collect Statistics Don’t accelerate Don’t tunnel Discover ! ! CAUTION! Ensure that you click the Submit button to save configuration changes before exiting the Edit Application menu. Layer-7 Applications The Accelerator lets you filter HTTP web applications and/or Citrix applications at the application layer (Layer-7). This higher level of specification enables specific applications to receive tailored traffic prioritization within the Accelerator. Creating a Layer-7 or L7 application is the same procedure as described in Creating Web Applications, on page 110. Creating Web Applications You can create and prioritize HTTP web applications per Layer-7 application. New web applications are created much in the same way as new Layer-4 applications, with the addition of Layer-7 (application specific) information. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C ar ryi ng O u t B as ic Q o S C o nf ig u ra ti on 111 To create a web application: 1. In the My Applications menu, click the Create Web Application button. The Create Web Application menu opens. 2. The Web application parameters are identical to the parameters set for all applications, with the following additions. Parameter Item Description Application Criteria You cannot modify the Application Criteria box from within the Create Web Application box. The Layer-4 information for this web-based application is taken from the web definition. To modify the Layer-4 criteria, return to the My Applications menu and click on HTTP to edit the web application. This is also disabled for L7 Applications. R ev isi o n 2. 0 112 C h ap t er 5: Applying QoS Parameter Item Description Layer-7 Information Host Name: the host name of the web application. The Host Name is the internet address up until the first “/”, for example, for the address http:// 172.10.10.10/loginindex.asp, the Host Name is 172.10.10.10. For the Internet site http:// www.expand.com/extranet/support the Host Name is www.expand.com URL Name: the URL name is the internet address after the first “/”. In the example above, “extranet” can be used as the URL name. MIME Type: enter the content type. User Agent: enter the name of the HTTP client (Netscape, Mozilla, and so on) All Layer-7 information criteria use pattern matching, meaning that, for example, if the Host Name is www.expand.com, using expand as the host name is sufficient (up to 128 character string for all HTTP Layer-7 parameters). Prioritize Prioritizing the traffic based on rules is accomplished by setting the same parameters available when creating an application. For more information on available settings, see Creating New Applications, on page 105. ! ! CAUTION! Ensure that you click the Submit button to save configuration changes before exiting the Create Web Application menu. Creating Citrix Applications You can set and prioritize Citrix applications per Layer-7 application. New Citrix applications are created much in the same way as new Layer-4 applications, with the addition of Citrix Layer-7 specific information. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C ar ryi ng O u t B as ic Q o S C o nf ig u ra ti on 113 To create a Citrix application: 1. In the My Applications menu, click the Create Citrix Application button. The Create Citrix Application menu opens. 2. The Citrix application parameters are identical to the parameters set for all applications, with the following additions. Parameter Item Description Application Criteria You cannot modify the Application Criteria box from within the Create Citrix Application box. The Layer-4 information for this Citrix-based application is taken from the Citrix definition. To modify the Layer-4 criteria, return to the My Applications menu and click on Citrix to edit the Citrix application. R ev isi o n 2. 0 114 C h ap t er 5: Applying QoS Parameter Item Description Layer-7 Information The Layer-7 information box lets you set the application-specific details necessary for filtering this web application. Enter any or all data to be treated as criteria for matching this web application type. This means that all traffic considered as part of this Citrix application has to meet all the criteria listed in this box, as follows Published application: List the Citrix application type, such as Word, Calc and Notepad. Client: List the user name of the device you want to set as part of this traffic type. For example, to set the priority of the CEO’s Citrix Client to Real-time for Excel, enter the name of the CEO’s PC into the Client field Layer-7 information for Citrix is not pattern matching, meaning that the published application listed must be the full name of the application traffic that is intended (these parameters can use strings up to 20 characters). Prioritize Prioritizing the traffic based on rules is accomplished by setting the same parameters available when creating an application. For more information on available settings, see section Creating New Applications, on page 105. For more information on working with Citrix, see section Acceleration and Citrix Traffic, on page 346. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et ti ng Ad va n ced QoS Pa ram et e rs Setting Advanced QoS Parameters 115 Advanced configuration of the Accelerator’s QoS mechanism is intended for expert users, and networks that are particularly complex. Understanding how QoS works is necessary in order to properly apply advanced QoS settings. The following sections provide an in-depth knowledge regarding the way QoS operates: How QoS Works, on page 115 How Traffic Filtering is Applied, on page 117 How Traffic Shaping is Applied, on page 118 Setting Inbound QoS, on page 121 Creating QOS Rules, on page 122 Editing QoS Rules, on page 126 Making Decisions for Specific Applications, on page 127 How QoS Works The Accelerator’s QoS mechanism receives packets from the LAN, and passes them to the Accelerator’s compression mechanism. The QoS mechanism automatically adjusts the throughput it transmits to account for the extra available bandwidth created when traffic is compressed. i i NOTE: While the Accelerator enables the same QoS capabilities on inbound and outbound traffic, most QoS is accomplished on outgoing bandwidth only. Incoming traffic shaping is useful for non-links and virtual links, and instances in which limiting or blocking incoming traffic is desired, for example blocking P2P traffic or limiting incoming Internet traffic. NOTE: Using inbound traffic shaping when the remote Accelerator uses outbound traffic shaping is not recommended; in such a case, the inbound shaping may have only a partial effect on the traffic. R ev isi o n 2. 0 116 C h ap t er 5: Applying QoS Follow these steps before working with QoS: 1. Set an accurate Bandwidth for the WAN. This setting ensures that all traffic shaping applied is relative to the actual physical bandwidth on the WAN pipe. The default bandwidth set for the default WAN is 100 Mbps (fast Ethernet). 2. This bandwidth setting assumes the largest possible bandwidth so that the Accelerator does not limit its throughput over the WAN due to a WAN bandwidth setting lower than the actual bandwidth. However, to get an accurate QoS shaping you are advised to modify the bandwidth setting to its actual rate. For more information on setting WAN bandwidth see section Performing Setup via the Wizard, on page 21. 3. You must set the bandwidth of each link on the WAN. For more information on setting the Link Bandwidth, see Performing Setup via the Wizard, on page 21. Understanding QoS Rules The Accelerator’s QoS works on the basis of rules. Rules define how QoS controls applications (streams or sessions). Rules are built out of a filter, a shaper, and can contain a marker. While these rules are transparent to the typical user and are not mentioned in the My Applications screen, for each application defined in the My Applications screen, you can create a rule that you can view and modify via the Services - QoS Menu in the Rules Table. The number of rules you can create is unlimited. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et ti ng Ad va n ced QoS Pa ram et e rs 117 To fine-tune traffic management, it is useful to understand the hierarchy that determines the order in which the QoS mechanism implements traffic shaping rules. Rule Description Filter The Filter defines what kind of traffic qualifies as part of an application. Filters are generally Layer-4 definitions such as port number, protocol number, and traffic type. For example, the application FTP is defined by the traffic type TCP and the port number 20. You can modify and add traffic type and port number for applications that already exist by default in the Accelerator, as well as defining new applications. Shaper The traffic shaper defines how to handle the traffic filtered into this application: what priority the application receives, and how the application is treated by the Accelerator. Shaping the traffic enables setting a desired (or guaranteed) amount of bandwidth to be preserved for a specific application, setting a limit on how much bandwidth an application can consume (to avoid starvation of other applications), and setting the CoS (Class of Service priority) and ToS (Type of Service) values for the application. Shaping is crucial for ensuring application integrity - that critical traffic applications get the bandwidth they need, and that other important applications are not starved completely. Marking An application in the Accelerator can include a marker per application. You can save the ToS marking on the rules, either the original ToS value or a newly defined ToS value. This also means that you can set each application type to be Not-Accelerated or NotTunnelled. This is particularly useful for applications like HTTPS or Encrypted Citrix, whose packets do not compress, and ensures that the Accelerator does not waste resources attempting to process these packets. How Traffic Filtering is Applied The QoS mechanism contains dozens of preconfigured traffic applications (that can be modified and shaped as needed). All preconfigured traffic applications, as well as new traffic applications created (see section Creating New Applications, on page 105), are filtered according to application type. Incoming traffic is matched against the applications one at a time, starting with the application with the highest “Priority Order” number, until a match is found. Once a match is found, the application is handled, despite the fact that it may match other applications as well (this is called overlapping traffic). Applications cannot overlap at the Layer-4 level. This means that because Application FTP is set on TCP port 20, another application cannot be created on port 20 (or including port 20). However, applications can overlap at the Layer-3 level. for example: a TCP application could exist and be set to include traffic over-IP R ev isi o n 2. 0 118 C h ap t er 5: Applying QoS protocol 6. In this case, the Priority Order number given to an application (or rule) determines which application rule governs overlapping traffic. In the above example, if the FTP traffic is set to 200 (the default) and TCP is given an order number of 100, all FTP traffic is treated according to the definition of TCP. If the two applications are set with the same order priority, applications are matched according to the highest level of specificity first. For example, if two applications have a priority of 210, but one application is created for all traffic in ports ranging from 2020 to 2060 and the other application is created for traffic on port number 2062, the 2062 traffic will be handled first. Another example of higher specificity is when one application defines Layer-7 values and another application with the same priority order defines values only up to Layer-4 values; the Layer-7 application shaping will be applied to the traffic. How Traffic Shaping is Applied The QoS mechanism works in a hierarchical fashion. In a complex QoS setup, it is often important to understand which shaping carries the greatest weight and is related to first by the QoS mechanism. Studying QoS Bandwidth Allocation The QoS mechanism allocates bandwidth as follows: WAN Bandwidth—First, the bandwidth set for the WAN is honored. All further application QoS decisions are based on the WAN bandwidth. Link Bandwidth—You can set the bandwidth of the Link with a maximum value, limiting the amount of the total throughput of the WAN available to a particular link. All Application decisions based on a particular link are bound by this bandwidth. i NOTE: Peer oversubscribing is allowed. For example, if the WAN bandwidth is T1 (1.5 Mbps), you can set 10 links at 256 Kbps each, and the bandwidth will be distributed relatively to all links according to the QoS mechanism. Like the WAN bandwidth setting, the bandwidth set for a link can never be exceeded. The bandwidth set for the links is divided by the WAN according to the priority of the traffic coming across the links. This means that if the WAN bandwidth is 128 Kbps, and Link 1 is set to 128 Kbps and Link 2 is set to 128 Kbps, if one link has high priority traffic, the lower priority traffic on the other link Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et ti ng Ad va n ced QoS Pa ram et e rs 119 could be starved. However, if the Link bandwidth is set to a portion of the WAN bandwidth, then the link does not exceed this portion, and bandwidth is left over for other links. Diagnostic Mode Traffic—Traffic set with a priority setting of Diagnostic Mode overrides the QoS mechanism. Diagnostic Mode traffic has all the bandwidth of the WAN at its disposal and supersedes all other traffic and all other QoS settings. The Diagnostic Mode Traffic setting should be used only in emergency cases, where an application is not responding to the QoS mechanism; Diagnostic Mode traffic is forced to override the QoS mechanism. Bandwidth Limits—Maximum bandwidth limits set for applications are honored and the traffic throughput is limited according to this setting. Bursts—In addition to the hierarchy, if, after all bandwidth is allocated, there is spare bandwidth, and an application is set to allow bursts, this application uses all spare bandwidth even if it is set to ordinarily have a maximum bandwidth limit. For example, if on a 64 Kbps link FTP is limited to 16 Kbps, with burst allowed FTP will be able to use the entire 64 Kbps if no other traffic traverses the link, and when there is traffic, the limit of 16 Kbps is enforced on FTP. To allow bursts on applications, you have to ensure that the default setting on the WAN, which allows bursts, is kept. The WAN Burst parameter also lets you set a maximum burst bandwidth, meaning that if the WAN bandwidth is 1 MB, you can set the WAN burst to limit burst traffic to 900 Kbps in order to avoid maximum utilization situations because of burst traffic. By default the WAN bursts are allowed to use the entire WAN bandwidth. In certain environments, lowering the WAN burst by up to 10% may be useful in order to protect the line from congestion caused by bursts. i i NOTE: QoS settings take effect when the WAN link is full. Any limitations and guarantees placed on traffic apply only if not enough bandwidth exists for all traffic to flow freely. NOTE: In the Accelerator, rule limit and desired shaping are applied to traffic before it is compressed, while link shaping (bandwidth for the link and the WAN) is applied to traffic after the traffic has been compressed. R ev isi o n 2. 0 120 C h ap t er 5: Applying QoS Desired Bandwidth—Minimum bandwidth Desired set for applications is allocated to all applications on which a desired minimum bandwidth was set. This is true even for low priority applications. For example, in a 64 Kbps link, the applications will divide up the 64 Kbps plus the Acceleration percentage, like a cake, with the desired bandwidth applications reserving the first piece. As long as no congestion exists, all applications set to Desired receive their guaranteed bandwidth. When there is congestion, if high priority applications are guaranteed bandwidth, they will receive it before low priority applications that were guaranteed bandwidth. If there is not enough bandwidth for numerous high priority applications that were guaranteed a desired bandwidth, the desired bandwidth will be divided proportionately between those applications. Desired bandwidth is useful especially to prevent starvation of lower priority applications. Setting a desired bandwidth for a low priority application ensures that the application receives some small amount of bandwidth even when the high priority applications are consuming the bulk of the bandwidth. While the Minimum bandwidth desired is allocated hierarchically according to the application priority (first to real-time, then to high, then to average, and so on), the desired bandwidth setting is handled before relative spare bandwidth distribution among prioritized applications. For this reason it is important to use the Minimum bandwidth desired setting carefully. For example: If VoIP is prioritized as high priority traffic on a 1 Mbps connection, and HTTP traffic receives low priority, but a minimum desired bandwidth setting of 800 Kbps, these 800 Kbps will be allocated to HTTP traffic and the remaining 200 Kbps is divided proportionally between the VoIP application and the HTTP traffic. Priority—The relative QoS priority set to the application is considered and bandwidth is divided proportionally among the applications as follows: Block—Blocked traffic is discarded. Real-time—Traffic set to real time receives “strict priority”. This means that as long as real-time traffic is traversing the network it will receive the entire bandwidth. All lower priority traffic types wait until there is free bandwidth, thus starving all lower priority applications (unless a Minimum bandwidth (desired) was set for them). For this reason it is important to use the Real-time setting with great care. If a chatty/ Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et ti ng Ad va n ced QoS Pa ram et e rs 121 bandwidth-greedy application constantly transmits traffic, it is possible that no other application will receive bandwidth (except those set with a Minimum bandwidth (desired)). High/Average/Low: High, average and low traffic priorities divide the bandwidth that is still available (after desired and real-time traffic) in a proportional method based on time. High priority traffic waits the shortest amount of time before waiting to be sent, average priority traffic waits longer than the high priority and low priority traffic waits longer than the average traffic to be sent. This does not mean that high priority traffic transmits completely before average traffic starts transmitting, rather high traffic transmits at a faster rate. Setting the priority to high/average/low is appropriate for most traffic types, setting the relative importance between the applications without causing starvation. In advanced configuration, you can set the WAN to handle QoS according to “strict-priority.” This would set the priorities to act deterministically rather than proportionally: high priority traffic receives all the available bandwidth (after desired and real-time traffic), average priority traffic receives bandwidth only if no high priority traffic exists, and so on. If there is constant high-priority traffic, average and low priority traffic are starved completely. i NOTE: Traffic that waits too long to be transmitted is discarded as obsolete so as not to cause application problems by transferring stale packets. What is the difference between real-time and desired? Realtime gets the highest priority; it can cause starvation up to the bandwidth allocated using the “desired” setting. Guaranteed bandwidth is not touched by applications because of their real-time priority setting. Because “desired” is useful to protect lower priority applications from being starved, the default desired setting allocates a minimal amount of bandwidth (1 Kbps) by default. Setting Inbound QoS For Inbound QoS, you can set a bandwidth limitation for the WAN or per link. If a link was created with a bandwidth limitation set for inbound traffic, a rule is automatically created on the sending side, limiting outbound traffic to the link. You can set inbound policy rules globally or per link. R ev isi o n 2. 0 122 C h ap t er 5: Applying QoS Creating QOS Rules Advanced QoS configuration is accomplished by creating and editing rules as they appear in the QoS menu. To create a rule: 1. In the Accelerator’s WebUI, click on the QoS tab, and then select QoS Rules. . 2. In the View rules for application drop-down menu, select the application on which to apply the rule. If the application does not exist, you can use the Setup - My Applications menu to create a new application; for more information see section Creating New Applications, on page 105. While the QoS menu enables fine-tuning of the definition of the traffic type to be filtered into an application, making Layer-4 modifications to the application itself requires using the Setup - My Applications menu. 3. Click the Create new rule button. The Create Rule menu opens. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et ti ng Ad va n ced QoS Pa ram et e rs 123 4. In the Rule Name field, give a name to the rule. Naming the rule is necessary for identifying it, if you need to modify the rule at a later date. 5. Use the Define and Prioritize sections to enter the necessary information per your networking requirements Define Section Options Application Description Select the Application onto which to apply this rule from the drop-down menu. You can define applications only via the My Applications menu. For information, see section Creating New Applications, on page 105. R ev isi o n 2. 0 124 C h ap t er 5: Applying QoS Define Section Options Description Source IP If you want to filter the application by its source IP address: Choose from Other, Any, Single IP, Subnet, Range, or List. Other—Displayed if advanced configuration was made via the CLI, which is more complex than the WebUI display Any—Set the Source IP to Any if the application should consider traffic coming from any device (this is the default). Single IP—Select this option if only traffic coming from a single device should receive the treatment defined in this rule. Enter the IP address Subnet Mask—Select Subnet if only traffic from a particular subnet should receive the treatment defined in this rule. Enter the subnet address and the subnet mask. Range—Select Range if a particular range of source IP addresses should receive the treatment defined in this rule. Enter the first and last IP address to be considered. List—Select List and enter up to four IP addresses to receive the treatment defined in this rule. Destination IP If you want to filter the application by its destination IP address: Choose from Other, Any, Single IP, Subnet, Range, or List. Other—Displayed if advanced configuration was made via the CLI, which is more complex than the WebUI display Any—Set the Source IP to Any if the application should consider traffic coming from any device (this is the default). Single IP—Select single IP if only traffic headed to a single device should receive the treatment defined in this rule. Enter the IP address. Subnet—Select Subnet if only traffic toward a particular subnet should receive the treatment defined in this rule. Enter the subnet address and the subnet mask. Range—Select range if a particular range of destination IP addresses should receive the treatment defined in this rule. Enter the first and last IP address to be considered. List—Select List and enter up to four destination IP addresses to receive the treatment defined in this rule. ToS Bits To filter traffic based on its ToS setting, in the drop-down menu select from Other, Any, and Value. Other—Displayed if advanced configuration was made via the CLI, which is more complex than the WebUI display Any—To set the rule to apply to the application’s traffic, if it has any ToS value set (this is the default). Value—To set a ToS value, thereby limiting traffic on which this rule is applied to the application’s traffic that has a particular ToS value (0 - 255). Links Traffic rules and shaping are applied per link. Select Global to apply to all links, a specific link to determine how traffic is categorized and prioritized over a specific link, or select Nonlink. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et ti ng Ad va n ced QoS Pa ram et e rs 125 Prioritizing the traffic based on rules is accomplished by setting the same parameters available when creating an application. For more information on available settings, see section Creating New Applications, on page 105. The main difference is that this screen lets you also set a ToS Mask (0-254). When entering a number in the ToS Mask field, this value is ANDed to the value entered in the TOS field in the packet’s header and compared against the TOS entered for this rule. You can use the TOS Mask for comparing specific bits (Precedence/Type of Service) from the TOS field in the packet’s IP header against the TOS value entered for this rule. Prioritize Section Options Description Order The order parameter sets the importance of this rule. Traffic that enters the Accelerator is dealt with by the QoS mechanism based on Prioritization order number. Traffic that matches the Application criteria set in order number 100 is handled according to the setting for this application type, even if it may match the criteria of other Applications with other, less important priority order numbers. If the two applications are set with the same order priority, applications are matched according to the highest level of specificity first. For example, if two applications have a priority of 210, but one application is created for all traffic in ports ranging from 2020 to 2060 and the other application is created for traffic on port number 2062, the 2062 traffic is handled first. Another example of higher specificity is when one application defines Layer-7 values and another application with the same priority order defines values only up to Layer-4 values; the Layer-7 application shaping will be applied to the traffic. Most QoS settings do not necessitate setting the Order field. You can set the order from 100 to 65534. Minimum bandwidth (desired) The Minimum bandwidth desired setting should be used carefully. This parameter allocates a certain amount of bandwidth to be saved for a specific application type during periods of congestion. You should set desired bandwidth only for mission-critical, time-sensitive applications, such as VoIP, which need 8 to 16 Kbps allocated throughput to function. Maximum bandwidth (limited) The Maximum bandwidth limit setting puts a ceiling on the amount of bandwidth that an application can consume. This is useful for bandwidth-greedy applications such as FTP or P2P, to limit the amount of bandwidth they consume. R ev isi o n 2. 0 126 C h ap t er 5: Applying QoS Prioritize Section Options Description ToS You can either preserve the original ToS setting of the packets or set a new ToS value for this application. To preserve the original ToS value, click the Preserve radio button. By default, ToS preservation is enabled. To set a new ToS value for this traffic, click the Set radio button and select one of the following options: ToS value - lets you select a ToS value (0-254) for the Accelerator. Code point - uses the first 6 bits of the ToS field, thereby giving 26 (= 64, namely: 63) different values. CoS ToS - combines the values of the IP precedence field (otherwise known as CoS, which stands for Class of Service) and the ToS (type of service field). Priority You can either preserve the original ToS setting of the packets or set a new ToS value for this application. Set the Priority of the application to: Blocked: Traffic set to Blocked is dropped. Low, Average and High: Traffic set to Low, Average and High are assigned bandwidth on a proportional scale: Low receives the lowest proportion of the bandwidth. Average receives a medium proportion of the bandwidth. High receives the greatest proportion of the bandwidth. Real Time: Real-time traffic always receives bandwidth allocation according to strict priority. This means that as long as real-time traffic is traversing the network, all lower priority traffic types waits until there is free bandwidth, thus starving all lower priority applications with the exception of applications that received a Minimum bandwidth (desired) setting. Diagnostic Mode: You should set traffic to Diagnostic Mode only if the Application is not responding at all to QoS settings. This is because Diagnostic Mode traffic overrides all other QoS settings and starves all other applications (including real-time and Desired bandwidth allocated). If a class is not transmitting at all and seems not to be working, set the class to Pass-thru/Diagnostic mode, thereby disabling the QoS from the traffic type. Editing QoS Rules Any changes made to Applications via the My Applications menu appear as rules in the QoS menu. You can use the QoS menu to edit these changes, and any other rules created. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S et ti ng Ad va n ced QoS Pa ram et e rs 127 To edit a rule: 1. Highlight the Rule to be edited in the Rules Table and click . 2. Make the necessary changes. For any necessary explanation, see section Creating QOS Rules, on page 122. Making Decisions for Specific Applications The Decision screen lets you set various aggregation and acceleration parameters for a specific application, such as how many small packets to accumulate for one big packet (aggregation class), and whether the application is accelerated and tunneled. To make a decision for a specific application: 1. Select an application from the Application Name drop-down list. 2. Select the aggregation class. Your choices are as follows: Citrix - enables Citrix acceleration on Citrix, telnet and ms-terminalserver applications. Default - enables acceleration on small-packet, encrypted applications such as pop3s, https and ftps. Custom 1 - enables acceleration on a specific, user-defined link. Custom 2 - enables acceleration on a specific, user-defined link. 3. Select the Tunnel box to send the application as tunneled. 4. Select the Accelerate box to accelerate the application. Selecting this box is possible only if you previously selected the Tunnel box. 5. Click Add to add the newly defined settings. R ev isi o n 2. 0 128 C h ap t er 5: Applying QoS If a decision already exists for this application, a message appears, requesting your confirmation to modify the existing settings. Click OK to confirm. 6. To delete a specific application from the list, highlight the application name in the table and click the Delete button. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e QoS Troubleshooting Q o S Tro ub le sh o o ti ng 129 If the QoS mechanism does not seem to be functioning properly, it could be a result of the Maximum Queue Length. If there is much latency on the line, the packet drops may be the result of the queue buffer size, which is normally set per link rate, or because the packets are waiting too long and are therefore being considered obsolete packets. By default the packets are considered obsolete after 500 ms. If limits do not seem to be enforced on traffic, check to see if it is because of the Burst status. When Burst is enabled during periods of no congestion, limits will appear not to be enforced properly. If a class is not transmitting properly and problems are encountered after QoS has been applied, try setting the class to Diagnostic mode, thereby disabling QoS for this traffic type. R ev isi o n 2. 0 130 C h ap t er 5: Applying QoS Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 6: Optimizing Acceleration Services Expand’s Accelerator lets you reduce the impact of the TCP protocol shortcomings by applying TCP Acceleration, a standards-based plugin that modifies TCP settings to optimize throughput in certain environments. In addition, the Accelerator provides Domain Name Server caching capabilities to shorten the round-trip-time and save bandwidth over the WAN. This chapter contains information about the following topics: Studying TCP Acceleration, on page 132. Understanding Web Acceleration, on page 143. Configuring DNS Acceleration, on page 152. Enabling Citrix Acceleration, on page 156 For information regarding WAFS service, see Configuring and Managing WAFS, on page 159. 132 C h ap t er 6: Optimizing Acceleration Services Studying TCP Acceleration TCP, which was designed to ensure reliable IP transmission, performs well on LANs but does not deal well with the high latency and high-packet-loss found on many WANs. These limitations are expressed in the long times required for file transfers over the WAN, degraded web performance and unresponsive applications. SCPS, the Space Communication Protocol Standards developed by NASA and the US Air Force, is a collection of standards-based TCP enhancements designed to reduce the impact of TCP limitations in Long-Haul WANs. SCPS is implemented by using the TCP Acceleration feature, designed to optimize and better utilize WANs that suffer from distance-induced TCP limitations. Understanding the Shortcomings of TCP To understand how TCP Acceleration works, it is important to understand the shortcomings of TCP: Frequent packet retransmissions: In TCP transmissions, the sender receives an ACK (Acknowledgement packet) for each successful packet transmission. If the ACK is not received, the sender resends the packet. Often, on long distance lines, the packet is retransmitted before the ACK has time to arrive. Transmission Window: To ensure that the receiver gets all data items sent from the sender, TCP sends only part of the data to the receiver in small amounts called a window. The size of the window is specified by the receiver during the setup of a TCP session, and is measured in bytes. The sender transmits a window, and then waits to hear an acknowledgement back from the receiver if the window was received properly. After an acknowledgment is sent from the receiver, the sender transmits more data until all necessary data is sent. The following figure explains the handshake process involved in establishing a TCP connection: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e St u d yin g T C P A cc el er a ti on 133 Once the connection is established, TCP data packets are sent in accordance with the TCP window set - each time the window threshold is met, the receiver responds with an acknowledge packet, as described in the following figure: The time wasted waiting for ACK packets to be sent in a TCP connection dramatically increases latency. R ev isi o n 2. 0 134 C h ap t er 6: Optimizing Acceleration Services Slow Start—Because TCP transmissions have no way to know the size of the bandwidth over which they are being transmitted, each transmission begins slowly, gradually increasing speed until a packet is dropped - at which point TCP assumes that it has reached the maximum bandwidth. On high-bandwidth long-distance lines, this slow start wastes much expensive bandwidth. The more latency present, the slower the session will start. Congestion Avoidance—TCP assumes that any packet lost is due to congestion. Any time a packet is dropped, TCP reduces transmission rate by half, slowly increasing it until the maximum rate at which no drops are experienced. On long-distance lines over which packet drops are often the result of factors other than congestion, transmission is being slowed down unnecessarily. While these TCP functions are useful in controlling and managing congestion over the LAN, they cause expensive long-distance links to appear slow. Studying SCPS, Expand’s TCP Acceleration Solution TCP Acceleration uses the SCPS protocol package to reduce the impact of these well-known TCP limitations according to the standard developed by NASA (http:// www.scps.org): Scaling the Transmission Windows Increases the maximum transmission window to enable ACKs to arrive across long distance links, thereby reducing the amount of unnecessary packet Ac ce ler at o rOS 6 .1 .2 Us er Gui d e St u d yin g T C P A cc el er a ti on 135 retransmissions. Once TCP Acceleration is enabled, the TCP packet transfer process causes less latency, as seen in the following figure: A larger window enables sending more packets before an acknowledge packet is sent, minimizing the number of acknowledge packets sent and lowering latency. Error Detection and Proactive Resolution The SCPS protocol uses SNACK (Selective Negative Acknowledgement), which reduces the amount of data that needs to be retransmitted and increases the speed of retransmissions. This is accomplished by sending only a request for missing R ev isi o n 2. 0 136 C h ap t er 6: Optimizing Acceleration Services packets, as opposed to TCP, which retransmits the missing packet as well as all packets already transmitted after the missing packet. Congestion Avoidance SCPS enhances flexibility of Congestion avoidance mechanisms. TCP automatically uses congestion avoidance, which is not necessary in networks where drops are not the result of congestion. You can configure SCPS in such a way that congestion avoidance is not used when it is unnecessary. If there is congestion on the line, you can select the method of congestion avoidance and control (standard TCP or Vegas). Local Network Isolation The SCPS protocol uses TCP Spoofing to reduce the time required for establishing a TCP session, thereby enabling the transmission of data without waiting for the TCP slow-start. SCPS also enables congestion avoidance by preventing slow traffic build-up before achieving maximum capacity. Link Outage Support TCP Acceleration incorporates several features that support TCP transfers during link outages: avoiding the costly and unnecessary packet retransmissions by halting transfers until communication is re-established, restarting transmissions at the last ACK received, and anticipating potential link outages before they occur. Asymmetric Networks Optimization In asymmetric environments, if in one direction the bandwidth is significantly lower than the other, this direction can become congested with ACK packets being sent in the other direction. TCP Acceleration enables scaling of ACK packets (for example sending an ACK for only every other packet) to better match uplink/ downlink rates. SCPS-based TCP Acceleration enables the Accelerator to maximize capacity over Long-Haul links, thereby guaranteeing optimized throughput across WAN links. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e St u d yin g T C P A cc el er a ti on 137 TCP throughput - Kbps 540msec round-trip-time 4608 With TCP Acceleration and compression 4096 3584 3072 Kbps With TCP Acceleration No TCP Acceleration Newly created bandwidth 2560 2048 Unutilized bandwidth 1536 1024 512 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Time Throughput Link Speed Computing Latency The Accelerator automatically configures TCP Acceleration settings according to the computation that follows. The network in the diagram above will be used for example purposes. The math used for calculating the theoretical maximum throughput is based on this drawing. Substitute the values from your specific network in order to learn the TCP theoretical limitation for a single session in your network. R ev isi o n 2. 0 138 C h ap t er 6: Optimizing Acceleration Services The network poses 150 milliseconds (msec) of latency between the Client (C) and the Server (S). You can use a ping for determining the end-to-end latency between a Client and Server by sending a ping 100 times from the client to the server during business hours with a 750 byte payload. This payload size ensures some stress on the network, and should provide a better measurement for latency than simply sending a 64 or 32 byte ping as some operating systems do. An example of this ping command used on Windows is: ping x.x.x.x –l 750 –n 100 (x.x.x.x = the server’s IP address, –l is the payload size, and -n is the amount of pings) You can use the following formula to calculate the theoretical limitation: Bandwidth equals the window size divided by the round trip time WindowSize ---------------------------- = Bandwidth RoundTripTime Bandwidth (BW)—is the maximum theoretical throughput. The bandwidth of a link is normally represented in bits per second. Window Size (WS)—is the amount of data TCP can send before waiting for an acknowledgement. This value is in bytes; ensure that any values in bytes are converted to bits. Round Trip Time (RTT)—even though this value is in seconds, most network tools, such as ping, report it in milliseconds. In the network example shown above, the latency was 150 msec, and because 1000 msec equals a full second, then the latency of this network can be represented in a fraction as 150/1000 msec. Always convert this fraction into decimal format when calculating the values. In this case the latency will be represented as .15. The default window size for Microsoft XP is 8 KBytes. For additional window size values please consult your operating system vendor. This example assumes that the client is running Windows XP. Using the example network provided above, some of the values needed for this formula are known and can therefore be plugged into the formula in order to determine the maximum theoretical bandwidth for a single TCP session. BW = 64000 / .15 After calculating the values, the BW equals 426,666 Bytes. Remember that because this value is in bytes, it should be multiplied by 8 in order to get the bits Ac ce ler at o rOS 6 .1 .2 Us er Gui d e St u d yin g T C P A cc el er a ti on 139 per second (bps). The product shows that the theoretical maximum bandwidth is 3,413,328 bps. As seen in the example network shown above, the link is a 6 Mb link. 150 msec of latency has limited a session to about half of the link speed. The following Throughput table lists some common Round Trip Times and the effects on TCP: Window Size Round Trip Time 8 KB 16 KB 32 KB 64 KB 50 160 Kbps 320 Kbps 640 Kbps 1280 Kbps 100 80 Kbps 160 Kbps 320 Kbps 640 Kbps 150 53 Kbps 106 Kbps 212 Kbps 424 Kbps 200 40 Kbps 80 Kbps 160 Kbps 320 Kbps 500 16 Kbps 32 Kbps 64 Kbps 128 Kbps 1000 8 Kbps 16 Kbps 32 Kbps 64 Kbps As these calculations demonstrate, the maximum throughput was greatly reduced as the latency increased. The actual maximum throughput that a single TCP session can have in your network may be even lower. Configuring TCP Acceleration You can use the WebUI to configure basic TCP Acceleration, such as typical RTT and typical acceleration rate. In addition, you can set here the Send and Receive windows’ sizes and the degree of transparency. R ev isi o n 2. 0 140 C h ap t er 6: Optimizing Acceleration Services Another significant setting possible through the TCP Acceleration screen is the congestion control, which you can set to one of the following options: None—no congestion avoidance is used Standard—the congestion avoidance conforms to the standard TCP/ IP protocol (Reno) Vegas—TCP Vegas reduces latency and increases overall throughout, by carefully matching the sending rate to the rate at which packets are successfully being transmitted by the network. The Vegas algorithm maintains shorter queues, and is therefore suitable either for low-bandwidth-delay paths, such as DSL, where the sender is constantly over-running buffers, or for high-bandwidth-delay WAN paths, where recovering from losses is an extremely time-consuming process for the sender. The shorter queues should also enhance the performance of other flows that traverse the same bottlenecks. The parameters you can configure via this screen are the send and receive windows’ sizes. The possible values are between 4kb and 50 MB. i i NOTE: Even though the upper limit for the sizes of the receive and send windows is 50MB, setting the size to a value greater than 10MB may adversely affect the system performance, and therefore a warning message notifying you about such a possibility appears when you select a value that exceeds 10MB. NOTE: When TCP acceleration is enabled, all traffic is transferred through the Accelerator in routing-only mode and is not bridged. For additional information see Setting Routing Strategy, on page 27. You can also use the Transparency field to set or update the packets’ transparency per link. The options are as follows: Auto—keeps or reverts to the default option, which is Full in On-Path deployment and semi-wan in On-LAN deployment. Full—keeps the packets fully transparent. Semi—prevents transparency on both sides. Semi-LAN—keeps the packets transparent only to the LAN side. Semi-WAN—keeps the packets transparent only to the WAN side. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e St u d yin g T C P A cc el er a ti on 141 Enabling TCP Acceleration TCP Acceleration should be enabled only over long, high latency links. If you enable TCP Acceleration via the WebUI, the system’s default values will be used for activating TCP Acceleration. Expand recommends configuring TCP Acceleration via the CLI. To enable TCP acceleration: 1. In the Accelerator’s WebUI, click on Services and then TCP Acceleration. 2. Select the box Enable TCP Acceleration on All Links. 3. In the bottom right corner, click the Submit button. If after enabling TCP Acceleration the Accelerator does not perform as expected, you should check the size of the window set by Windows: To check the size of the window set by Windows: 1. Click the Start button on the main menu bar, followed by Run. In the Open field, type regedit. 2. In the Registry Editor, navigate to the following location: HKEY_local_machine\system\CurrentControlSet\Services\ Tcpip\parameters. 3. Search the listed parameters. If TcpWindowSize is not listed, the window size is set to the Windows’ default of 8 KB. If TcpWindowSize is listed, double-click on the registry entry to view the value ! set. WARNING! Editing the registry or using a Registry Editor incorrectly can cause serious, system-wide problems that may require you to reinstall Windows to correct them. Microsoft does not guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Back up your registry first and use Registry Editor at your own risk. To calculate the necessary send window size and receive window size: Use the following formula to calculate the required window size as set by the Accelerator: R ev isi o n 2. 0 142 C h ap t er 6: Optimizing Acceleration Services OutboundBW ( Kbps ) RTT ( mSec ) ----------------------------------------------------------- × CompressionRatio × --------------------------------- × 2 × 1000 8 1000 Outbound Bandwidth in Bytes/Sec—convert the outgoing bandwidth to Bytes per second, for example T1 = 1,544 Kbps (193,000 Bytes per second) Compression Ratio—expected acceleration in a compression ratio format (200% acceleration = 3, 350% acceleration = 4.5) Round trip time—in seconds (for example 500 ms round trip is 0.5 seconds, 650ms round-trip is 0.65 seconds) For example, a T1 line with 600 ms round trip time with outbound acceleration of 230%: Bandwidth in bytes/sec - 193000 Compression ratio – 3.3 193000*3.3*0.6*3 = 1146420 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g Web A cc el er a ti on Understanding Web Acceleration 143 The Web Acceleration plug-in improves response times for HTTP/FTP-based applications. i NOTE: Web Acceleration is supported in hard-drive versions of the Accelerator. On all other Accelerator platforms, HTTP traffic will continue to be accelerated by using Expand Networks’ patented caching and compression algorithms. The Web Acceleration plug-in serves requested objects from its cache. If the object is not in the cache, the plug-in retrieves the object on behalf of the client from the original server, caches it (when relevant) and serves the client's request. Web Acceleration guarantees network transparency. When the Accelerator is deployed on the network, there is no need for any configuration modification of connected LAN clients. In On-Path deployments—HTTP transparency also applies to the Server side, meaning that if a sniffer is used between an Accelerator and the default gateway, HTTP packets will be seen to contain the client and server IP addresses. FTP traffic will be transparent only on the client side. In On-LAN deployments—transparency applies only to the Client side. A sniffer placed between an Accelerator and the default gateway will see packets containing the Accelerator and server IP addresses. This later is necessary to guarantee that replies will travel via the Accelerator’s Web Cache engine and not be delivered directly to the client. Web Acceleration supports both FTP and HTTP caching. FTP caching—the Web Acceleration cache guarantees that objects sent to the client from the cache are always fresh (only supported if the FTP server supports MDTM ex, vsftpd as well as SIZE headers). Both Passive and Active FTP caching modes are supported. HTTP caching—the object will have an aging time in the cache until it is retrieved again from the server. i NOTE: Because the Web Acceleration plugin consumes RAM, it affects the number of tunnels configurable on the Accelerator. Web Acceleration can cache objects up to 1 GB in size. R ev isi o n 2. 0 144 C h ap t er 6: Optimizing Acceleration Services Configuring Web Acceleration via the WebUI The WebUI lets you configure HTTP acceleration and FTP acceleration. To configure a specific HTTP Acceleration or FTP acceleration parameter see the table below: To Reference Configure HTTP Acceleration Configuring HTTP Acceleration, on page 144. Enable/Disable HTTP Caching Enabling and Disabling HTTP Caching, Clearing HTTP Cache Clearing HTTP Cache, on page 145. Setting Cache Content Setting Cache Content, on page 145. Returning to Default Settings Returning to Default Settings, on on page 145. page 146. Setting Advanced HTTP Parameters Setting Advanced HTTP Parameters, on Setting HTTP Acceleration Rules Setting HTTP Acceleration Rules, on Configuring FTP Acceleration Configuring FTP Acceleration, on page 146. page 148. page 149. Configuring HTTP Acceleration You can use the WebUI to enable HTTP Acceleration and carry out most of the advanced configuration. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g Web A cc el er a ti on 145 Enabling and Disabling HTTP Caching By default, HTTP Caching is disabled. To Enable or Disable HTTP Caching: 1. Click the follwing: Services-->Web Acceleration--> HTTP Acceleration->Configuration. 2. In the HTTP Acceleration field, select Enable from the drop-down menu to enble HTTP Caching. To disable, select Disable. Settting the Cache Size To set the Cache Size: 1. Click the following: Services>Web Acceleration> HTTP Acceleration>Configuration. 2. In the Cache Size field, enter a number to represent the size allotment for the cache (between 1 and 60 MB). Setting Cache Content To set the type of content to be cached: 1. Click the following: Services> Web Acceleration> HTTP Acceleration>Configuration. 2. In the Cache content field, scroll down to select one of the following types of content to be cached. Enterprise caches all traffic from links and virtual links. Internet caches all traffic on the non-link. All caches all traffic, be it link, virtual link or non-link. Clearing HTTP Cache To clear the HTTP acceleration cache: 1. Click the following: Services > Web Acceleration> HTTP Acceleration>Configuration. 2. Click the Clear Cache button. R ev isi o n 2. 0 146 C h ap t er 6: Optimizing Acceleration Services Returning to Default Settings To return HTTP Acceleration settings to factory default: 1. Click the following: Services > Web Acceleration> HTTP Acceleration>Configuration. 2. Click the Set Default Values button and click Yes when prompted. Setting Advanced HTTP Parameters To open the Advanced HTTP Parameters menu: 1. Click the following: Services > Web Acceleration> HTTP Acceleration>Configuration. 2. In the Advanced HTTP Parameters menu, click the + in the menu bar. 3. The Advanced HTTP Acceleration Configuration opens, letting you set the following parameters as shown in the following table: Parameter Item Description Connect Timeout The time period (in seconds) that should pass before disconnection (default: 60). To set the Connect timeout, fill in a number (between 1 and 600 seconds) in the field Maximum Cache Object Size Sets the Maximum size an object can be in order to be held in the cache. Object larger than this number are not held. This parameter is set in KB. To set the Maximum Cache Object Size, enter a number between 1 and 1,000,000 KB. By default, the size is 102,400 KB. Note that the Maximum Cache object size must be larger than the Minimum Cache object size. Minumum Cache Object Size Sets the Minimum size an object can be in order to be held in the cache. Object smaller than this number are not held. This parameter is set in KB. To set the Minimum Cache Object Size, enter a number between 1 and 1,000,000 KB. By default, the size is 102,400 KB. Note that the Minimum Cache object size must be smaller than the Maximum Cache object size. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g Web A cc el er a ti on Parameter Item Description Maximum Client Connect Time Sets the ammount of time the client (browser) can be connected to the cache process before a timeout is initiated. This is merely a safeguard against clients that disappear without properly shutting down. It is designed to prevent a large number of sockets from being tied up in a CLOSE_WAIT state. The default for this option is 1440 minutes, or 1 day. Acceptable values are between 1 and 5,000 minutes. To set the Maximum Client Connect time, enter a number in the field between 1 and 5,000 minutes Persistant Timeout Sets the amount of time to wait for an HTTP request from the client after the connection was established, or after the last request was finished. It is set in seconds with acceptable values between 1 and 10,000 seconds. To set the Persistent Timeout value, eter a number between 1 and 10,000. Transparency This command configures the status of the interception proxy. The interception proxy can be configured as transparent (namely, the proxy server’s IP address will not be detected by sniffing). Three statuses are possible: Semi—applying transparency only on the Client side. Full—applying transparency on both the Client and the server sides. Auto—setting the transparency status automatically according to deployment, namely: Semi in On-LAN deployment and Full in On-Path deployment. To set the transparency mode, select one of the options from the drop-down menu Port Transparency When enabled, preserves the origional client’s source port informaiton. By default, this is disabled. When Transparency (above) is set to either Semi or Auto in an On-Lan deployment scenario, it is not recomended to set this feature to enable. TCP Acceleration When TCP Acceleration is configured in the TCP Acceleration menu, you must also enable this parameter in order for the acceleration to work correctly. By default, TCP Acceleration is disabled, but to enable TCP Acceleration, select Enable from the drop-down menu. Cache Authenticated Requests Lets you define whether to cache data that arrives from authenticated servers, such as authentication requests. If you set this option to Enable, the data from such servers is cached even if no Public indication was set in the authenticated server. If any other condition exists, which prevents the data from being cached (for example: a Private flag), the data is not be cached, but it is still accelerated. Collect Statistics Lets you start or stop the statistics collection. (Supposed to be removed) 147 R ev isi o n 2. 0 148 C h ap t er 6: Optimizing Acceleration Services Parameter Item Description Server Ports Table The list in this table represents the port numbers that will be intercepted by HTTP Acceleration. By default Port 80 is used for HTTP traffic. Using this table, you can add additional nonstandard HTTP ports. Make sure the port number you add is not used for other types of traffic. Enable Proxy Server Select this box to enable the proxy server. If this box is selected, you can set manually the proxy IP address and the proxy port number. Setting HTTP Acceleration Rules The HTTP Acceleration Rules screen lets you configure Direct and No Cache rules supported by HTTP acceleration. To set HTTP Acceleration rules: 1. Click the following: Services > Web Acceleration> HTTP Acceleration>Rules. 2. In the Type field, scroll down to select either Direct Rule or No Cache Rule. You should enter regular expressions in the edit fields of both rules. The expression entered in Direct Rule should be valid on a URL, and determines that all requests that match this expression are always forwarded directly to the origin server, without using the proxy server. For example: if you apply rule direct avaya, all requests that match the avaya regular expression are forwarded directly to the origin server. The expression entered in No Cache rule determines that traffic directed to a specific URL, which matches this specific expression (for example: no cache avaya) is neither cached nor retrieved from the cache, and after the traffic is retrieved from the server it will not be cached. In both cases (Direct and No Cache rules) you can define multiple rules. See the diagram below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g Web A cc el er a ti on 149 Excluding from Caching via the WebUI You can use the WebUI to exclude certain components of the traffic from either HTTP or FTP caching. To exclude from HTTP caching: 1. Click the following: Services > Web Acceleration> HTTP Acceleration>Exclusion. 2. In the Exclude by drop-down list choose whether to exclude by IP address, Subnet or Hostname. 3. If you select to exclude by IP address, check the appropriate button to indicate whether this IP Address comes from the Client or from the Server. 4. Enter the IP address you want to exclude. 5. If you previously selected the Server option, select now whether to let AcceleratorOS assign a port number for you, by selecting the All option, or enter a specific port number (preferably 80). 6. Click the Add button. 7. To exclude by Subnet, repeat steps 3. to 6. The only difference is that you have to enter the subnet mask as well. 8. To exclude by Hostname, repeat steps 3. to 6. This option also requires you to enter a Hostname. To enable excluding by Hostname, you first have to configure a DNS that resolves the hostname. For details, see Configuring DNS, on page 257. Configuring FTP Acceleration R ev isi o n 2. 0 150 C h ap t er 6: Optimizing Acceleration Services Enabling and Disabling FTP Caching By default, FTP Caching is disabled. To Enable or Disable FTP Caching: 1. Click the follwing: Services>Web Acceleration>FTP Acceleration>Configuration. 2. In the FTP Acceleration field, select Enable from the drop-down menu to enble FTP Caching. To disable, select Disable. Settting the Cache Size To set the Cache Size: 1. Click the follwing: Services>Web Acceleration> FTP Acceleration>Configuration. 2. In the Cache Size field, enter a number to represent the size allotment for the cache (between 1 and 60 MB). Setting Cache Content To set the type of content to be cached: 1. Click the following: Services > Web Acceleration> FTP Acceleration>Configuration. 2. In the Cache content field, scroll down to select one of the following types of content to be cached: Enterprise caches all traffic from links and virtual links. Internet caches all traffic on the non-link. All caches all traffic, be it link, virtual link or non-link. Clearing FTP Cache To clear the FTP acceleration cache: 1. Click the following: Services > Web Acceleration> FTP Acceleration>Configuration. 2. Click the Clear Cache button. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g Web A cc el er a ti on 151 Returning to Default Settings To return FTP Acceleration settings to factory default: 1. Click the following: Services > Web Acceleration>FTP Acceleration>Configuration. 2. Click the Set Default Values button and click OK when prompted. Setting Advanced FTP Parameters To open the Advanced HTTP Parameters menu: 1. Click the following: Services > Web Acceleration> FTP Acceleration>Configuration. 2. In the Advanced FTP Parameters menu, click the + in the menu bar. The Advanced FTP Acceleration Configuration opens, letting you set the following parameters as shown in the following table: Parameter Item Description Connect Timeout The time period (in seconds) that should pass before disconnection (default: 600). Localization Lets you enable or disable the option to view files in languages that require Unicode characters, such as Chinese. Minimum Cache Object size Lets you set a default for the minimum size of the cache object (0-5000KB, default: 1024). Cache per User Ascribes a cache object to a single user. Namely, when a specific user accesses a file from the server, the file is cached per this user, and the next time a user with the same user accesses the file, it is served from the cache. However, for anyone who logs in with a different user name, the file is fetched directly from the origin server and not from the cache. Transparency Sets the interception proxy as transparent (namely, the proxy server’s IP address will not be detected by sniffing), on both the Client and the Server sides. R ev isi o n 2. 0 152 C h ap t er 6: Optimizing Acceleration Services To Exclude from FTP Caching: 1. Click the following: Services > Web Acceleration> FTP Acceleration>Exclusion. 2. In the Exclude by drop-down list choose whether to exclude by IP address, Subnet or Hostname. 3. If you select to exclude by IP address, check the appropriate button to indicate whether this IP Address comes from the Client or from the Server. 4. Enter the IP address you want to exclude. 5. If you previously selected the Server option, select now whether to let AcceleratorOS assign a port number for you, by selecting the All option, or enter a specific port number (preferably 80). 6. Click the Add button. 7. To exclude by Subnet, repeat steps 3. to 6. The only difference is that you have to enter the subnet mask as well. To exclude by Hostname, repeat steps 3. to 6. This option also requires you to enter a Hostname. To enable excluding by Hostname, you first have to configure a DNS that resolves the hostname. For details, see section Configuring DNS, on page 257. Configuring DNS Acceleration The Accelerator’s Domain Name Server (DNS) Acceleration plugin enables the Accelerator to act as a DNS caching device. By intercepting DNS requests and saving them on the local Accelerator, the DNS caching feature shortens the amount of time an end user waits for Web pages to appear and lessens unnecessary requests from your network to the Domain Name Server asking for Domain Name translations into IP addresses. DNS Caching is extremely useful when the DNS server that the clients are accessing is across the WAN over a high-latency link. Configuring DNS Acceleration You can use the WebUI to set all parameters relevant for DNS acceleration and DNS masquerading. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g Web A cc el er a ti on 153 To set the DNS parameters: 1. Under Services click DNS Acceleration. 2. In the Parameters section, select first whether to enable DNS masquerading. DNS masquerading enables the Accelerator to intercept traffic sent from the Client to the DNS server and back, and masquerade the DNS response’s address. The translation of host names into the Accelerator’s user-defined addresses is defined in the next section of this screen - the Static Hosts table. 3. Select whether to enable DNS acceleration, namely: let the Accelerator cache the DNS addresses, thereby eliminating repetitive queries over the WAN. 4. Select whether to use Accelerator DNS, thereby defining the Accelerator as a DNS client. By so doing, the Accelerator will always intercept traffic and use its setting to process it, even if that traffic was sent to another DNS server. If you enable this option, you have to configure a domain name server under Setup > Networking > DNS. For details, see Configuring DNS, on page 257. 5. Use the Transparency field to select the appropriate transparency method: Semi—the traffic is transparent to the Client, but the server sees it as coming from the Accelerator. Full—the traffic is transparent to both the Client and the Server. R ev isi o n 2. 0 154 C h ap t er 6: Optimizing Acceleration Services Auto—the transparency is determined automatically according to the deployment level: either Semi (in On-LAN deployment) or Full (in On-Path deployment). 6. Use the Min TTL field to determine whether to keep the Time-to-leave settings defined by the DNS server (Preserve TTL) or set your own settings (1-1440 minutes). If the TTL settings you defined here are longer than those set by the DNS Server (for example: 60 minutes compared with 10 minutes, respectively), for any period between these two values (as, in this example, 20 minutes) the Accelerator does not use the DNS Server’s address and takes the address from its own cache. To view the statistics for the queries since the last time the DNS Acceleration feature was enabled, use the Statistics (lowermost) section of the DNS Acceleration screen. 7. Use the Cache Size field to define the maximum number of records that are to be kept in the cache. You can either select Auto to keep the system-defined default, or select your own value. To edit the Static Hosts table: 1. Click DNS Acceleration, and click the + to open the Static Hosts Table. 2. Click the Add button. The Add New Static Host dialog box opens. 3. In the Host Name field, enter the requested host name (for example: www.expand.com). 4. In the IP Address field, enter a user-defined masquerading IP address the Accelerator will use for the host name you had just entered. 5. Click Submit. To edit the static host details, click on the host’s IP address. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g Web A cc el er a ti on 155 To delete a static host from the table, click anywhere on the host’s row to select it and then click Delete. R ev isi o n 2. 0 156 C h ap t er 6: Optimizing Acceleration Services Enabling Citrix Acceleration Citrix Acceleration optimizes applications by using small packets such as Citrix, rdp, and telnet. To configure Citrix Acceleration for such optimizations, match application to class and enable the class on all links. To define advanced configuration settings, such as class configuration and link-specific settings, use the CLI. The application names are predefined in the system. To add a new application, use the Setup > My Applications menu. The aggregation classes are as follows: Citrix—enables Citrix acceleration on Citrix, telnet and ms-terminalserver applications. Default—enables Citrix acceleration on small-packet, encrypted applications such as pop3s, https and ftps. Custom 1—enables Citrix acceleration on a specific, user-defined link. Custom 2—enables Citrix acceleration on a specific, user-defined link. To add a new match between an application name and an application class: 1. Select an application name from the Select Application drop-down list. i 2. Select an aggregation class from the Select Class drop-down list. 3. Click Add. The new match now appears in the Matching Application to Class table. NOTE: The Citrix Acceleration screen lets you apply Citrix aggregation only on all links. To apply Citrix aggregation on a specific link, use the Post Acceleration Aggregation section of the My Links table under Setup tab. For details, see section Editing Existing Links, on page 263. To apply a specific Citrix aggregation class on all links: 1. Select the Enable option for the relevant class. 2. Click the Apply to All Links button. 3. When prompted whether you want to configure Citrix acceleration on all links, click OK. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e E na b lin g C itrix A cc el era ti on 157 R ev isi o n 2. 0 158 C h ap t er 6: Optimizing Acceleration Services Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 7: Configuring and Managing WAFS This chapter introduces you to the Wide Area File Service feature and shows you how to use it and manage it to streamline your buisness while maintaining control over important company documents. Topics covered in this chapter include: Introduction to WAFS Getting Started with WAFS Enabling WAFS Configuration Configuring the Data Center and Branch Office Installing the License File WAFS Management and Operation Modes Managing the Data Center Setting Advanced FileBank Features Replication Service Printing Services for the FileBank Using WAFS Printing Services WAN-OUT Operation DNS Masquerading Monitoring WAFS Functionality Troubleshooting 160 C h ap t er 7: Configuring and Managing WAFS Introduction to WAFS WAFS stands for Wide Area File Service, namely: remote users who access files over a WAN, such as branch office or mobile users accessing centralized storage. Such users often experience poor performance when trying to access files that are stored in a central location. Expand Networks’ WAFS solution allows users fast and efficient access to centralized storage by using intelligent, dynamic caching. i NOTE: This feature is only supported on Accelerators with a hard drive. If your Accelerator does not have a hard drive and you want to have WAFS functionality, contact your supplier. Expand Networks’ WAFS Solution Designed specially for distributed organizations, Expand's intelligent, dynamic caching solution allows users fast and efficient access to centralized storage. Expand enables global and fully secure direct file access to users at multiple sites, as if they were at the same site as the files, eliminating the need for local file servers and unreliable backup procedures. By consolidating corporate resources, IT managers regain total control of enterprise-wide storage, eliminating the cost and complexity associated with remote system administration, replication, backup and maintenance. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e I nt r o d u ct io n t o WAF S 161 The corporate Data Center is equipped with an Expand FileBank Director, and each remote site (requiring access to the center) is equipped with an Expand FileBank. Once these hardware devices are installed, branch office users can immediately work with files located in the Data Center, with the same speed level and efficiency as if they were working on their local file server. Expand uses a patent-pending file system technology that allows direct access to files located in distributed file storage architectures throughout the enterprise. Network architecture can be deployed as a private network of leased lines, or a virtual private network (VPN) that utilizes the public Internet in a secure way. Expand provides the following features and benefits: Centralization of storage and backup resources Synchronous, reliable file operations LAN-like performance WAN Consumption optimization Ease of installation and management Seamless integration Native security support Many-to-many architecture Integrated Branch IT Services High resilience R ev isi o n 2. 0 162 C h ap t er 7: Configuring and Managing WAFS Expand's pass-through authentication technology seamlessly ensures enforcement of enterprise policies such as user authentication, access rights verification and quota management support. Expand devices use regular LAN and power connections. Configuration is simple, and no infrastructure changes are required. No client software is installed on the Data Center file servers or on any of the remote office workstations. Supported Servers File Servers Microsoft Windows® NT Server 4.0 SP3 and above Microsoft Windows® 2000 Server Microsoft Windows® 2003 Server Network Device Filer series (ONTAP 6.x & 7) Authentication Servers Windows NT Server 4.0 Primary Domain Controller (PDC) Windows NT Server 4.0 Backup Domain Controller (BDC) Windows 2000 Server Active Directory Domain Controller Windows 2003 Server Active Directory Domain Controller Supported Clients Microsoft Windows® NT Workstation 4.0 Microsoft Windows® 2000 Microsoft Windows® XP Professional Expand Hardware Device Specifications The Expand solution is available as an installed device (FileBank Director and FileBank). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e I nt r o d u ct io n t o WAF S 163 When planning the hardware specification for the FileBank and FileBank Director, disk capacity is an important consideration, especially in consolidation environments. Most of the device disk capacity is allocated for maintaining the cache optimization state. In general, the chances that a file is available on a FileBank cache improve with cache partition size. However, because the cache is merely an optimization layer (meaning, the files are always available on the file server), its size does not have to be equal to the size of the total data set. Various approaches exist for estimating optimum FileBank disk capacity, the most common of which are as follows: Complete data set size (migrated from the legacy file server) Working set size (for example: 30% of complete data set) Per number of branch users (for example: 0.5GB x number of branch users) The FileBank Director is connected On-LAN to the file servers, and therefore its cache state is less critical than that of the remote branch FileBank, which is connected over the narrow-bandwidth, high-latency WAN. FileBank Director disk capacity planning should take into account the percentage of data that is shared between branches (that is, the level of inter-branch collaboration), and a size estimation of the working set. As a rule of thumb 10-20% of the accumulated branch FileBank cache is sufficient. Both FileBank and FileBank Director employ LRU (Least Recently Used) cache management, so a dynamic, working-set cache is always maintained. Domains The FileBank acts as a server in the Windows Domain hierarchy. Windows Clients at the remote office will see the FileBank as part of this domain when connecting to the network, and after appropriate mapping. When configuring the FileBank for the first time, you are asked which domain to join, so obtain the domain name in advance. In order to perform the join operation, a user with sufficient access rights is required, namely: a user that is part of the domain adminstrators’ group. R ev isi o n 2. 0 164 C h ap t er 7: Configuring and Managing WAFS Authentication Identify the name of the authentication server. The authentication server must be a Windows NT/2000/2003 server that can authenticate users accessing the domain (Windows NT v4.0 Primary/Backup Domain Controller or Windows 2000/2003 Active Directory Server). i NOTE: You are advised to utilize the domain controller of the local remote branch office, when applicable. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e G et ti n g Start ed w i t h WAF S Getting Started with WAFS 165 Overview The main steps for configuring the Data Center are as follows: 1. Enabling WAFS Configuration, on page 166 - to prepare the Accelerator for WAFS Services. 2. Configuring the Data Center and Branch Office, on page 174 - to specify the file bank and file bank director 3. Installing the License File, on page 184 - to install the license file 4. FileBank Categories, on page 188 - to start the WAFS service Note that the order that these steps are taken does matter and performing these steps out of sequence may result in the WAFS services not running. Make sure that you finish a step before proceeding to the next one. R ev isi o n 2. 0 166 C h ap t er 7: Configuring and Managing WAFS Enabling WAFS Configuration There are three steps that need to be done in order to enable WAFS configuration: Configuring the File Server/Domain Controller Defining Network Settings Enabling WAFS Operation Mode Configuring the File Server/Domain Controller Configuration of the File Server/Domain Controller consists of the following steps: Defining the shared directories on the File Server, from which remote and local users can access files Changing the Login scripts (if any are used within your organization) Defining Shared Directories To let users access a specific shared directory: 1. Right-click the folder you want to share (using Windows Explorer, My Computer, or any other Windows convention) and select Properties and the New Share Properties dialog box opens. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e E n ab li ng WA F S C o nf ig u r a ti on 167 2. Click the Sharing tab and define share properties. 3. Repeat this procedure for all directories you want to share. Defining User Permissions To define which users can access the shared directory: 1. Click the Permissions button on the Share Properties dialog and the Permissions for New Share dialog box opens. R ev isi o n 2. 0 168 C h ap t er 7: Configuring and Managing WAFS 2. Add the users who are allowed to access the shared directory and define permissions for each user. 3. Click OK and proceed to the next step, Defining Network Settings. Defining Network Settings To define the network settings, use either the Accelerator 6940 front-panel LCD or the CLI command line. i NOTE: AcceleratorOS v6.xx should be displayed, where xx is the maintenance release number (for example 6.00) in addition to a status display (Ready, Bypass, or various error messages.). To prepare the Accelerator to work in WAFS mode: Follow these steps to establish the WAFS services: 1. Log in to the AcceleratorOS WebUI. 2. Enter the setup wizard. The AcceleratorOS setup wizard appears: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e E n ab li ng WA F S C o nf ig u r a ti on 169 3. If you do not intend to define a link on this device (namely, to use the device as an Accelerator), press Cancel and continue with the FBD configuration. 4. In the dialog box that appears, click OK to confirm the closure operation. 5. In the Basic tab of the My Accelerator screen, fill-in the device name as shown below and click Submit. R ev isi o n 2. 0 170 C h ap t er 7: Configuring and Managing WAFS 6. Move to the Time tab to enter your local time settings. You are advised to set the Accelerator’s time and date manually (default). 7. Select Setup > Networking, and then go to the DNS tab. This tab lets you configure the domain name server. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e E n ab li ng WA F S C o nf ig u r a ti on 171 8. Fill-in the domain name in the Domain Name field. 9. In the Domain Name Table pane, click Add to add the domain name. In the dialog box that opens now, enter the domain name(s) for the servers in the order of preferential usage and click Submit. 10. Selct the IP Domain Lookup type as Enable. 11. Type the domain name server IP address in the field and click Apply. Enabling WAFS Operation Mode To enable the WAFS Operation Mode: 1. Select Services > WAFS. 2. Select File-Bank Director as WAFS operation mode, as shown below: 3. Click Submit. 4. Use the dialog box that appears now to confirm the creation of the WAFS service. 5. The next dialog box prompts you to execute write configuration and perform reboot to enable creation of WAFS service. 6. Click OK and then click the Write command at the top of the screen (encircled below): R ev isi o n 2. 0 172 C h ap t er 7: Configuring and Managing WAFS 7. Click Close. 8. Select Tools > General Tools and click the Reboot button to apply your new settings. 9. In the dialog box that appears now, click OK to confirm the reboot operation. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e E n ab li ng WA F S C o nf ig u r a ti on 173 Excluding Servers or Subnets from WAFS It is possible to exclude specific servers or subnets from receiving the benefit of WAFS services. To exclude servers or subnets: 1. From the Services Menu, click WAFS, then click Exclusion 2. In the Exclude by field select: IP address, Subnet, or Host name. 3. Select either client or server side. 4. Enter a valid IP address and click Add. To delete an entry in the exclude table: 1. Select the row of the entry. 2. Click Delete. R ev isi o n 2. 0 174 C h ap t er 7: Configuring and Managing WAFS Configuring the Data Center and Branch Office There are two components to the Data Center: the File Bank Director, and the File Bank. When put on the network, they work together to create a virtual file server system, in order to accelerate company file sharing as shown in the diagram below. The WAFS screen lets you view the current WAFS operation mode: either FB (FileBank) or FBD (FileBank Director). In addition, this screen lets you select whether to enable WAFS transparency. If you enable this feature, the FB will poll the FBD for all file servers it recognizes, as well as each server that is added or removed. All IP addresses of these file servers are resolved, and all traffic destined to the servers is redirected to the Accelerator. In order for the data center to function, the following steps need to be done: Setting Up the File Bank Director Setting Up the File Bank Setting Up the File Bank Director You should run the Setup Wizard prior to activating the FileBank Director, as part of the initial FileBank Director installation. You can later use the FileBank Director Administration GUI for modifying any of the installation parameters. The Setup Wizard lets you set up FileBank Director in several simple steps. (In the last step, you have the option of modifying parameters before accepting them.) To run the setup wizard for the File Bank Director: 1. Make sure you are logged into the machine you want to set as file bank director. 2. From the AcceleratorOS Home Page, select Services > WAFS. 3. In the WAFS Operation Mode field, choose File-Bank Director from the dropdown menu. 4. You will notice that the WAFS Configuration button is now enabled. Click this button to enter the WAFS Management screen. i NOTE: WAFS Management is a pop-up window, and therefore you need to allow blocked content (pop-up) to be able to display it. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C on f ig u r in g t h e D ata C en t er an d B r an ch O f f ic e 175 5. Click Setup Wizard in the Left Window Pane to envoke the Setup Wizard. The wizard has four main screens: File Server Settings - the one that is open now Summary Confirmation and Application 6. Proceed to the next section, File Server Settings. File Server Settings In this section you will set the Domain Settings. File Server Name Here Alias Here R ev isi o n 2. 0 176 C h ap t er 7: Configuring and Managing WAFS To set the File Server settings: 1. In the fields indicated in the window above, Type in the names of the servers and their aliases. The alias field is optional. When an alias is not defined for a file server, the default alias will be the FileBank Director’s host name. 2. Click Next >> to proceed to the next section, Summary, on page 176. Summary In this section you see the settings that you made from the previous section, File Server Settings, as shown here in the diagram. At this stage the wizard displays a summary of all parameters entered during setup, prior to applying them to the FileBank Director. To confirm the settings: 1. Review the list for any possible errors. If you see an error, click Setup Wizard and make necessary changes. 2. To accept all parameters and configure the FileBank Director device, click Apply. 3. Proceed to the next section, Confirmation and Application. Confirmation and Application The following screen appears to allow you to restart the Accelerator and apply the settings. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C on f ig u r in g t h e D ata C en t er an d B r an ch O f f ic e 177 To apply the settings: 1. To apply the settings, click Restart. To confirm all changes have been made sucessfully, a confirmation screen appears. R ev isi o n 2. 0 178 C h ap t er 7: Configuring and Managing WAFS 2. Install the license as directed in Installing the License File, on page 184. 3. Once the license is intalled go to the machine that will be the File Bank and follow the directions as described in Setting Up the File Bank, on page 178. Setting Up the File Bank You should run the Setup Wizard prior to activating the FileBank, as part of the initial FileBank confiuguration. You can later use the FileBank Administration GUI for modifying any of the installation parameters. The Setup Wizard lets you set up a FileBank in several simple steps. (In the last step, you have the option of modifying parameters before accepting them.) Once Setup is complete, you need to install the license. Overview To configure the branch office: 1. Connecting the FileBank device to the branch office LAN. 2. Setting up the FileBank device. For details, see section Setting Up the File Bank, on page 178. 3. Configure the client computers. To run the setup wizard for the File Bank: 1. Make sure you are logged into the machine you want to set as file bank. 2. From the AcceleratorOS Home Page, select Services > WAFS. 3. In the WAFS Operation Mode field, choose File-Bank from the drop-down menu. 4. You will notice that the WAFS Configuration button is now enabled. Click this button to enter the WAFS Management screen. i NOTE: WAFS Management is a pop-up window, and therefore you need to allow blocked content (pop-up) to be able to display it. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C on f ig u r in g t h e D ata C en t er an d B r an ch O f f ic e 179 1. Click Setup Wizard in the Left Window Pane to envoke the Setup Wizard. The wizard has four main screens: File Server Settings File Bank Director Settings Summary Confirmation and Application 2. Proceed to the next section, File Server Settings. Domain Settings In this section you will set the Domain Settings. R ev isi o n 2. 0 180 C h ap t er 7: Configuring and Managing WAFS To set the domain settings: 1. After the screen appears, fill in the fields with the correct information as shown below: Windows Domain—this is the domain that you will use to connect to the File Bank. You will need to have administrator’s username and password in the screen that follows (see Summary, on page 182) in order to set this parameter. Authentication Server—supply the name of the domain controller. Make sure the name you use is known to the DNS. Virtual Server Prefix—If you are not using WAFS transparency, you should add a prefix to the server’s name so that all requests to the file bank (FB) are directed to the VFS and not to the actual server. You may also add a suffix. Note that this prefix is added to all servers. Virtual Server Suffix—If you are not using WAFS transparency, you should add a suffix to the server’s name so that all requests to the file bank (FB) are directed to the VFS and not to the actual server. You may also add a prefix. Note that this suffix is added to all servers. 2. Once you have filled in these fields, click Next >> and proceed to the next section, File Bank Director Settings, on page 181. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C on f ig u r in g t h e D ata C en t er an d B r an ch O f f ic e 181 File Bank Director Settings In this step, you define the file servers to be exported by the FileBank Director. To indicate the File Bank Director: 1. This step is critical because it will indicate to the File Bank which server or servers are to be the File Bank Director. Type in the names of the file bank director you indicated in File Server Settings, on page 175 and in the order indicated. If you mismatch these settings it may have an effect on user performance. 2. Click Next >> to proceed to the next section, Summary, on page 182. R ev isi o n 2. 0 182 C h ap t er 7: Configuring and Managing WAFS Summary At this stage the wizard displays a summary of all parameters entered during setup, prior to applying them to the FileBank Director. To confirm your settings: 1. Review the list for any possible errors. 2. To accept all parameters and configure the FileBank Director device, click Apply. 3. Proceed to the next section, Confirmation and Application. Confirmation and Application The following screen appears to allow you to restart the Accelerator and apply the settings. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C on f ig u r in g t h e D ata C en t er an d B r an ch O f f ic e 183 To apply your settings: 1. In order to assure that the File Bank is joined properly to the Windows domain that you set in Domain Settings, on page 179, the user that has administrative rights to the Windows domain should enter his/her username and password and click Join. 2. To apply the settings, click Restart. To confirm all changes have been made sucessfully, a confirmation screen appears. 3. Go to the next section, Installing the License File, on page 184. R ev isi o n 2. 0 184 C h ap t er 7: Configuring and Managing WAFS Installing the License File The <Default ¬¹ Font>Expand<Default ¬¹ Font> WAFS feature requires installing a valid license on both the File Bank Director and File Bank machines. The License Settings screen displays the current FileBank License status, which is Invalid at the initial setup stage (or if an earlier license has expired). Use this screen to attach a valid license file, which should be already available on your computer or on the network. To install a license: 1. After the system reboots, log in to the WebUI , click Services>WAFS> and click the WAFS Configuration Button 2. In the left window pane, under Utilities, click on License Settings. 3. Use the License Settings screen to attach a valid license file to the <Default ¬¹ Font>Expand<Default ¬¹ Font> device. The current License Status: "Valid" or "Invalid" is indicated on this screen. i NOTE: Without a valid license installed, the FileBank Director and the File Bank cannot function. 4. Use the Browse button to locate the license file on your system. 5. When the correct path to the file appears in the field, click Install. The license file is installed, and the License Status is updated on the screen. 6. If you have installed the license for the File Bank Director only, see Setting Up the File Bank, on page 178. If you have installed the license for both the File Bank Director and the File Bank you can now start the WAFS service and Ac ce ler at o rOS 6 .1 .2 Us er Gui d e In sta ll in g t he L ic en se F il e 185 proceed to FileBank Categories, on page 188For other WAFS topics, see the table below for additional information. To See Start, stop, restart, or reboot FileBank Categories, on page 188 Define or change File Bank Director settings Defining FileBank Director Settings, on Add or delete system users Managing System Users, on page 194 Add file servers Adding File Servers, on page 195 Change the compression filter setting Managing the Compression Filters List, Consolidate file services Replication Service, on page 209 page 193 on page 197 R ev isi o n 2. 0 186 C h ap t er 7: Configuring and Managing WAFS WAFS Management and Operation Modes This section discribes the management and configuration of the WAFS service under FileBank and FileBank Director operation modes. The following topics are discussed: The WAFS Management Screen FileBank Categories FileBank Director Categories The WAFS Management Screen In general the WAFS Management screen will look the same from both WAFS operation modes (FileBank or FileBank director). Unless indicated, the features described within will be for both modes. The WAFS Management screen is divided into the following sections: Status Bar—along the top Navigation Pane—on the left Workspace—the main area, on the right Clicking a selection from the navigation pane opens the relevant page in the workspace. The navigation pane is divided into the following main categories: System—for detailed description, see Setting Up the File Bank Director , on page 174 and Setting Up the File Bank, on page 178. File Services—for detailed description, see section Managing File Services, on page 192 Additional Services—(FileBank Operation mode only) for a detailed description, see Configuring Additional Services, on page 215. Utilities—for detailed description, see section FileBank Utilities, on page 190. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e WA FS M a n ag em en t a n d O pe r at i on M o de s 187 FileBank Director Categories The following sections describe the WAFS management screen work categories, as viewed when the WAFS operation mode is FBD (FileBank Director): FileBank Director System, on page 187 File Services, on page 188 FileBank Director Utilities, on page 188 FileBank Director System The System category includes the following subsections: Setup Wizard—lets you set up FileBank Director in several simple steps. Once Setup is complete, the FileBank Director can function. You should run the Setup Wizard prior to activating FileBank Director. All parameters set via the Setup Wizard can be modified within the GUI. For more information, see Setting Up the File Bank Director, on page 174. Boot services—lets you control FileBank Director service and device status. Controlling the service status lets you start, stop or restart FileBank Director service. Controlling the device status lets you reboot or shut down the FileBank Director device. For more informaiton see Managing the Data Center, on page 191. R ev isi o n 2. 0 188 C h ap t er 7: Configuring and Managing WAFS File Services This section describes the following functions offered by FileBank Director: FileBank Director Settings—lets you define the Listen Port Assignments settings and set the FileBank Director ID. The TCP (data transfer) and UDP ("keep alive") ports are set to 4049 by default, but can be changed if necessary. System Users—used for managing internal users that are used by specific Expand services (for example: Replication Service). File Servers—to add file severs to be exported through the Expand WAFS solution and the FileBank Director, enter the file server name— and optionally an alias—in this screen. Filters—allow Expand to avoid unnecessary compression attempts on files that are already compressed, thereby improving overall system performance. Replication Services—the method by which the system can be set to optimize the handling of very large files over the bandwidth-limited WAN link. FileBank Director Utilities This section describes the FileBank Director utilities, which are as follows: System Diagnostics—lets you run a diagnostic test on the FileBank Director device to ensure that the device is working properly. The results of the test will be displayed in the Results area of this screen. Logs—lets you generate FileBank Director activity logs for monitoring, optimization, and troubleshooting purposes. License Settings—displays current FileBank Director license status (Valid/Invalid) and is used for attaching a valid license file if this was not done during Setup, or if an earlier license has expired. FileBank Categories The following sections describe the WAFS management screen work categories, as viewed when the WAFS operation mode is FB (FileBank): FileBank System, on page 189 File Services, on page 188 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e WA FS M a n ag em en t a n d O pe r at i on M o de s 189 Additional Services, on page 190 FileBank Utilities, on page 190 FileBank System The System category includes the following subsections: Setup Wizard—lets you set up FileBank in several simple steps. Once Setup is complete, the FileBank can function. You should run the Setup Wizard prior to activating FileBank. All parameters set via the Setup Wizard can be modified within the GUI. Boot services—lets you control FileBank service and device status. Controlling the service status lets you start, stop or restart FileBank service. Controlling the device status lets you reboot or shut down the FileBank device. FileBank Services This section describes FileBank File Services functions, which are as follows: FileBank Directors—displays the current FileBank Director(s) for the FileBank, and lets you add or delete FileBank Directors as necessary. Virtual Servers—lets you configure FileBank to automatically add a prefix and/or suffix to the original file server name defined at the FileBank Director site, to represent the local virtual server. This helps distinguishing the local virtual server name from the Central File Server name. Windows Domain—lets you join the FileBank to the domain, use domain administrator credentials (Username and Password), set the domain name, and add or delete authentication servers. Cache Settings—gives you cache statistics, and lets you control basic cache functionality: cache validation frequency, and manual cache invalidation. Fetch Settings—lets you define which data will be fetched from the Data Center for pre-population of the Cache. Once fetched, this data resides in the Cache and can be accessed immediately. Thus prepopulation optimizes first-time access to this data. System Users—lets you add and delete FileBank system users. Filters—provides smart filters to enhance performance and bandwidth optimization over the WAN. R ev isi o n 2. 0 190 C h ap t er 7: Configuring and Managing WAFS Replication Services—the method by which the system can be set to optimize the handling of very large files over the bandwidth-limited WAN link. Additional Services This section describes the FileBank Additional Services, which are: Print Services—you can configure FileBank to serve as the local branch print server. This screen lets you add network printers, view a list of already existing printers, and delete printers, as required. FileBank Utilities This section describes the FileBank utilities, which are as follows: System Diagnostics—lets you run a diagnostic test on the FileBank device to ensure that the device is working properly. The results of the test will be displayed in the Results area of this screen. Logs—lets you generate FileBank activity logs for monitoring, optimization, and troubleshooting purposes. License Settings—displays current FileBank License status (Valid/ Invalid) and is used for attaching a valid license file if this was not done during Setup, or if an earlier license has expired. System Statistics—displays a list of connected users, with their Session ID, Username, Group and Machine. To update the list, use the Refresh button. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M a n ag in g t h e D ata C en t er Managing the Data Center 191 This section covers The following topics are discussed: Starting the Data Center, on page 191 Managing File Services, on page 192 Configuring FileBank Services, on page 199 Starting the Data Center If you have configured the File Bank and File Bank Director and have installed the license file on each machine you will need to start the WAFS service on each. In addition to starting the WAFS service, the following options can be performed: Start the File Bank Director Service Stop the File Bank Director Service Restart the File Bank Director Service Reboot the File Bank Director Device Shutdown the File Bank Director Device Note that, in order to start the WAFS services, you must follow this step. Caution should be made when stopping, starting, or restarting the WAFS service as this may interfere with other users who have work in progress. To start, stop, restart, reboot, or shutdown: 1. Access the Boot Services screen by clicking Boot Services under the System Menu lets you to control FileBank Director service and device status. R ev isi o n 2. 0 192 C h ap t er 7: Configuring and Managing WAFS 2. Perform one of the following actions: ! ! ! ! Start the File Bank Director Service—Click Start Stop the File Bank Director Service—Click Stop (See warning!) Restart the File Bank Director Service—Click Restart (See warning!) Reboot the File Bank Director Device—Click Reboot (See warning!) Shutdown the File Bank Director Device—Click Shutdown (See warning!) CAUTION! Stopping or Restarting the device while users are connected will interfere with their work in progress. CAUTION! If you click Reboot or Shutdown, there is no confirmation dialog so the operation is carried out immediately. Make sure you want to do this before clicking! Note too that if you reboot or shutdown while users are connected their work progress will be affected. Managing File Services This section describes File Services options, which are as follows: Defining FileBank Director Settings—for FileBank Director mode only, on page 193. Managing System Users, on page 194. Adding File Servers—for FileBank Director mode only, on page 195. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M a n ag in g t h e D ata C en t er 193 Managing the Compression Filters List, on page 197. Replication Service, on page 209. Defining FileBank Director Settings The FileBank Director Settings screen lets you set the Listen Port Assignments and the FileBank Director ID. The TCP (data transfer) and UDP ("keep alive") ports are set to 4049 by default, but can be changed if necessary. FileBank Director Settings is also used for changing the FileBank Director ID in a multi FileBank Director environment—where each FileBank Director is automatically assigned its own, unique, integer ID. FileBank Director ID should not be changed once the system is running, because such a change will result in resetting the cache optimization state (namely, the cache associated with the initial ID will become obsolete). Also, if the ID is changed and matches the ID of another machine, errors will result. R ev isi o n 2. 0 194 C h ap t er 7: Configuring and Managing WAFS To change Listen Port Assignments: 1. Make sure you are using the FileBank Director WAFS operation mode. 2. From the WAFS left menu pane, under File Services select FileBank Director > Settings 3. Type in the new TCP value. 4. Type in the UDP value. 5. Click Apply. To change FileBank Director ID: 1. Make sure you entered the WAFS menu using FileBank Director Operation Mode. 2. From the WAFS left menu pane, under File Services select FileBank Director > Settings 3. Type in the new unique ID. It is best to write this ID down for future reference. 4. Click Apply. Managing System Users The System Users screen (File Services > System Users) is used for managing internal users that are used by specific <Default ¬¹ Font>Expand<Default ¬¹ Font> services (for example: Replication Service). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M a n ag in g t h e D ata C en t er 195 To add a user: 1. From the WAFS left menu pane, under File Services select System Users. 2. Fill in the new user's Domain Name, Username and Password. Verify the password by typing in the same password you entered in the Password field. 3. Click Add and the User’s information is added to the list at the bottom. To delete users from the current list: 1. From the WAFS left menu pane, under File Services select System Users. 2. Select the checkbox for the user, or users, to be deleted 3. Click Delete. Adding File Servers To add more file severs to be exported through the <Default ¬¹ Font>Expand<Default ¬¹ Font> WAFS solution and the FileBank Director, type in the file server name—and optionally an alias—in the File Servers screen (File Services > File Servers). i NOTE: When the FileBank Director is configured to export a DFS root, it is necessary to export all the participating DFS file servers on the FileBank Director side. R ev isi o n 2. 0 196 C h ap t er 7: Configuring and Managing WAFS To add a user: 1. Make sure that you entered the WAFS menu using FileBank Director Operation Mode. 2. Fill in File Server Name, and optionally an Alias 3. Click Add. To delete servers: 1. Make sure that you entered the WAFS menu using FileBank Director operation mode. 2. Fom the Exported File Servers section, select one or more checkboxes. 3. Click Delete. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M a n ag in g t h e D ata C en t er 197 To Set a CIFS User: 1. Make sure that you entered the WAFS menu using FileBank Director operation mode. 2. In the Set a CIFS User section, fill in the following information: Domain Name User Name Password Verify Password—make sure the password you enter here matches the password you enter in the Password field. 3. Click Set. To delete a CIFS User: 1. Make sure that you entered the WAFS menu using FileBank Director operation mode. 2. This will clear all of the listed CIFS users. There is no confirmation and action will take place immediately. 3. Click Clear. Managing the Compression Filters List The <Default ¬¹ Font>Expand<Default ¬¹ Font> WAFS solution compresses data that travels across the WAN, to optimize performance. However, several file types are already compressed and cannot be compressed further. The compression filters allow <Default ¬¹ Font>Expand<Default ¬¹ Font> to avoid unnecessary compression attempts on files that are already compressed, thus improve overall system performance. The Compression Filters list (File Services > Filters) shows you all file extensions that the system will not attempt to compress. If you are using compressed files of a type that is not currently included on the Compression Filters list, you can add it. You can also delete extensions from the list, if you are sure that they are not compressed and were added by mistake. R ev isi o n 2. 0 198 C h ap t er 7: Configuring and Managing WAFS To add a filter: 1. From the WAFS left menu pane, under File Services select Filters. 2. Type in the file extension in the form *.xxx (where xxx is a three or four-letter fileextension). 3. Click Add. To delete filters: 1. From the WAFS left menu pane, under File Services select Filters. 2. Select one or more filter checkboxes. 3. Scroll down to the bottom of the Compression Filters list. ! ! 4. Click Delete. CAUTION! Do not delete filters that were included in the list by <Default ¬¹ Font>Expand<Default ¬¹ Font>! Files of these types are known to be compressed and do not require further compression. You should only delete a filter if was added by mistake. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M a n ag in g t h e D ata C en t er 199 Configuring FileBank Services This section describes FileBank File Services functions that are only accesible through the FileBank Operation mode, which are as follows: FileBank Directors Virtual Servers Windows Domain Cache Settings Fetch Settings FileBank Directors To access the FileBank Directors screen, click File Services > FileBank Directors in the Navigation Pane (see figure below). This screen displays the current FileBank Director(s) for the FileBank, and lets you add or delete FileBank Directors as necessary. R ev isi o n 2. 0 200 C h ap t er 7: Configuring and Managing WAFS To add a FileBank Director: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. Enter the hostname. 3. Enter the TCP port number 4. Enter the UDP port number i 5. Click Add. NOTE: You may leave the TCP and UDP fields blank, in which case the default value - port 4049 - is applied to both. To delete a FileBank Director: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. Select one or more checkboxes of hostnames in the current FileBank Directors list 3. Click Delete. Virtual Servers You can configure FileBank to automatically add a prefix and/or suffix to the original file server name defined at the FileBank Director site, used for representing the local virtual server (File Services > Virtual Servers). This helps distinguishing the local virtual server name from the Central File Server name. i CAUTION! Virtual Server Name = File Server Alias + any prefix/suffix added here. If neither a prefix nor a suffix is defined, DNS Masquerading or WAFS Transparency must be activated, to avoid name resolution conflicts. For details regarding DNS Masquerading, see DNS Masquerading, on page 229. For details regarding WAFS Transparency, see section Managing WAFS Transparency, on page 535. The lower half of the screen lists Exported Virtual Servers and their connection status ("Connected"/"Disconnected"). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M a n ag in g t h e D ata C en t er 201 d To create the virtual server name: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. Type in a prefix and/or a suffix. 3. Click Apply. Windows Domain The Windows Domain screen (File Services > Windows Domain) is used for carrying out the following tasks: Joining the FileBank to the domain. Using domain administrator credentials (Username and Password) Setting the domain name Adding or deleting authentication servers. R ev isi o n 2. 0 202 C h ap t er 7: Configuring and Managing WAFS Cache Settings The Cache Management screen (File Services > Cache Settings) provides you with cache statistics, and lets you control basic cache functionality: cache validation frequency, and manual cache invalidation. Time to Live (TTL) settings These settings determine how often the FileBank verifies directories or file data with the FileBank Director. Time to Live applies only to directory listing and readonly files. Cache coherency is maintained regardless of these settings. Higher values mean better cache performance, whereas lower values mean that read-only data is more accurate. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M a n ag in g t h e D ata C en t er 203 Invalidate Cache The Invalidate button resets the TTL for the cached information, thereby forcing the FB to validate the updated information with the EFS. i NOTE: Access to Data Center versions of cached files is verified prior to the invalidation. Cache files are not invalidated if Data Center versions are not available. System Users The System Users screen (File Services > System Users) lets you add and delete FileBank system users. R ev isi o n 2. 0 204 C h ap t er 7: Configuring and Managing WAFS To delete users from the current list: 1. Select the checkbox for the users to be deleted. 2. Click Delete. The Expand WAFS solution uses smart filters to provide additional performance and bandwidth optimization over the WAN. Two types of filters are listed on the Filters screen (File Services > Filters): Short Term File (STF) filters Compression filters STF Filters Short Term Files (STFs) are files that are saved locally on the FileBank and not sent to the central server. Use the STF Filter for files that exist for a short term and for any other files you do not want to be backed up on the central file server (for example: photos and media files). The STF Filter list displays all file extensions that the system is currently configured not to back up. You can add to or delete from this list as necessary. i NOTE: All Files that match the STF filter extensions selected are notbacked up. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e t ti ng Ad va n ced Fi leB an k F ea tu r e s 205 S e t t i n g A d va n c e d F i l e B a n k Features This section covers advanced features that you can configure to the FileBank for added functionality. Topics covered include: Configuring the Fetch Mechanism, on page 205 Replication Service, on page 209 Replication Service Activation, on page 211 Configuring Replication Services, on page 212 Configuring Additional Services, on page 215 Configuring the Fetch Mechanism This section covers topics related to the Cache. Topics discussed in this section include: Fetch Mechanism Overview, on page 205 Fetch User, on page 206 Fetch Jobs, on page 206 Fetch Settings, on page 207 Creating Fetch Jobs, on page 208 Fetch Mechanism Overview The Fetch mechanism lets you pre-populate the FileBank cache with specific data sets from the data-center file server. Cache pre-population optimizes “first-time” data access to files and directories by utilizing the <Default ¬¹ Font>Expand<Default ¬¹ Font> advantage: once a particular data set is saved in the local FileBank cache, future requests for files from that set will require the transfer of minimal amounts of data over the WAN, speeding up service. Depending on the mode in which files are opened by Clients, FileBank synchronously validates that the cached data is updated, and acquires file locks on the Server. Although cache pre-population is not essential, for performance reasons it is strongly recommended that in file server consolidation scenarios you pre-populate the branch files working set as a minimum (for example: user home drives). i NOTE: File types that have been configured as Short Term Files (STF) or Replication files, are not pre-populated by the Fetch mechanism. R ev isi o n 2. 0 206 C h ap t er 7: Configuring and Managing WAFS Fetch User The fetch user is the internal user that performs the data pre-population on the cache. The fetch user must have sufficient security permissions to traverse the file system and read permissions for the files being transferred. You can configure the fetch user on the FileBank using the user CLI command, or the System Users option in the management web interface. Fetch Jobs The term Fetch jobs describes the entities that will be pre-populated onto the FileBank cache. A fetch job is defined by the path and the fetch user that will be used for fetching that path. The path is expressed in UNC format (starting with virtual server name), and the user command argument is entered in {domain\user} format. A fetch job can aggregate multiple paths under one entity (see the fetch jobs paths option). Activating a multiple path job effectively creates a fetch instance for each specific path. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e t ti ng Ad va n ced Fi leB an k F ea tu r e s 207 Fetch Settings The Fetch Settings screen (File Services > Fetch Settings) controls the prepopulation of the Cache with specific data from the Data Center. Once fetched, this data resides in the Cache and can be accessed immediately. Thus pre-population optimizes first-time access to this data. The Fetch Settings screen lets you define which data will be fetched for pre-population. This screen lists Fetch Jobs and their current status. Fetch Jobs describe the entity that should be fetched (namely, a specific directory on a file server). For details, see section Creating Fetch Jobs, on page 208. Fetch Instances represent Job runs. For details, see section Creating Fetch Jobs, on page 208. R ev isi o n 2. 0 208 C h ap t er 7: Configuring and Managing WAFS Fetch Activation Once configuration is complete, you can activate the Fetch mechanism by running fetch jobs, and subsequently manage it by running fetch instances. Fetch Jobs are created with a single path. You can add paths as necessary, as described below. Creating Fetch Jobs Choose and start the fetch job you want to run. Each time a job is started a new Fetch instance is created. To create a Fetch job: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. In the Add Job area of the Fetch Settings screen (File Services > Fetch Settings), fill-in the following parameters: Vserver - as described in section Virtual Servers, on page 200. Path - a specific folder on a file server. Domain - as described in section Virtual Servers, on page 200. Username - as described in section System Users, on page 203. 3. Click Add. The new job is added to the list of Fetch Jobs. 4. Add one or more paths to this Fetch Job, as required, by typing the requested UNC path and priority, and then clicking Add. The paths are added to the Fetching Paths list, and are now part of this Job. 5. When you have added all necessary paths, click the Back to Fetch Settings link at the bottom of the screen. This link takes you back to the general Fetch Settings screen, for all Fetch Jobs. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e t ti ng Ad va n ced Fi leB an k F ea tu r e s 209 To delete a Fetch job: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. Select the checkbox for the job. 3. Click Delete. To start a Fetch instance: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. In the Fetch Jobs list of the Fetch Settings screen, select the checkbox for the Job. 3. Click Start. An instance of the Fetch Job is started, and is added to the Fetch Instances list. To stop a Fetch instance: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. Select the instance in the Fetch Instance list. 3. Click Stop. To add Fetch instances: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. Fill-in the following parameters for the new user: Domain name Username Password 3. Click Delete. To delete Fetch instances: 1. Make sure that you entered the WAFS menu using FileBank operation mode. 2. Select the checkbox for the instance. 3. Click Delete. Replication Service One of the main challenges resulting from the consolidation of file services in a data center, is how to grant users efficient access to very large files over the WAN, despite limited bandwidth and high latency. The Expand replication service R ev isi o n 2. 0 210 C h ap t er 7: Configuring and Managing WAFS addresses this challenge, by reducing bandwidth consumption at peak hours. With this feature, administrator-defined file types (such as. *.PST, *.GHO) are served locally at the branch by the FileBank virtual server, while a recurring replication process handles daily synchronization with the data center file server (at times of low WAN bandwidth consumption). When you create a new file (of a type that is replicated), this file is synchronously created on the central file server with its security metadata (namely ACLs), but without the actual file data. The file data is then updated asynchronously by the recurring replication process. The same principle applies to changes made to existing files. ! ! CAUTION! Replication is an asynchronous process, and as such, should be activated only for files used exclusively by the branch. Sharing replication files between branches can result in data loss. Replication service configuration includes the following parameters: Replication Replication Replication Replication User, on page 210 File Types, on page 210 Schedule , on page 211 Paths(optional), on page 211 Replication User The Replication User is an internal user that performs file replication for the system. The replication user must have sufficient security permissions for traversing the file system and writing permissions to replicate to the file server. The replication user is set both on the FileBank and on the FileBank Director. Replication File Types The Replication service handles replication on the basis of file extension (for example: *.mdb for Microsoft Access files), not file size. All files whose extension is on the list of Replication File Types are handled by the replication mechanism, regardless of their size. When changes are made to the list of Replication File Types, you must reboot the FileBank for the changes to take effect. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e t ti ng Ad va n ced Fi leB an k F ea tu r e s 211 Replication Schedule Replication is programmed to run once a day to synchronize changes between the FileBank and the Data Center file server. You are advised to run replication at offpeak hours, when WAN bandwidth is least utilized. You define the time of day (UTC value) that replication starts, and you can also force a stop time (namely: stop the process even if replication is not complete). You can also run a non-scheduled replication at any time by using the Replication Start and Stop options, either over the web or through the CLI. i NOTE: AcceleratorOS supports only DNS masquerading and not WINS masquerading. Therefore, all clients who have NT 4.0 or earlier systems, which use WINS servers, need to have DNS servers as well to let us support them. i NOTE: Replication Start and End times are defined as UTC values. Replication Paths By default, the Replication Service searches the entire file system for files that correlate to the Replication File Types list. Alternatively, you may define specific paths to be searched (instead of the entire file system). The replication path can point either to a share or to a directory within a share. Defining replication paths results in a faster replication process. When using this option, files outside the specified paths are not replicated. i NOTE: When no replication paths are defined, the replication feature searches the entire file system for files to be replicated. However, once one or more replication paths are defined, the feature searches only on the defined paths. Replication Service Activation General system configuration must be complete before you activate replication. Once the service is activated, FileBank may be populated with the initial set of files. Service Activation on FileBank Director On the FileBank Director side, you need only to define the replication user and start the replication server that runs on the FileBank Director. Initial service configuration and activation are easily performed, by using either the FileBank Director web management or the replication setup command (CLI). R ev isi o n 2. 0 212 C h ap t er 7: Configuring and Managing WAFS Service Activation on FileBank On the FileBank side, service configuration includes defining: replication user, replication file types, and the daily Start time (the definition of replication paths, and of a Stop time, are optional, as described above). Initial service configuration and activation are easily performed, by using either the FileBank Director web management or the replication setup command (CLI). Once configuration is complete, the replication service must be enabled on the FileBank. Initial Pre-population of Large Files on FileBank Working with replication services on large files requires pre-populating the files located in the paths we want to replicate, before starting to work with the FileBank in the field. Pre-populating involves copying an initial, up-to-date "snapshot" of all qualifying replication files, from the file server that holds them. This "snapshot" consists of file data and metadata (for example: timestamps and security attributes). You can perform the initial pre-population by either running the replication start initial CLI command or using data migration tools (such as Robocopy, or Secure copy) to copy the files from the legacy branch file server to the FileBank virtual server. Once pre-population is complete, users can start working on the files. i i NOTE: File pre-population onto the FileBank is a prerequisite for working on the replication files. NOTE: Replication files that are on the file server but have not been prepopulated onto the FileBank cache are visible in directory listings, but are empty if opened. Configuring Replication Services The Replication Services screen (File Services > Replication Services) displays the current status of the Replication Service, and allows you to Start and Stop it. It also gives you access to the Replication User screen (see section Replication User, on page 210). For details of what the Replication Service does, see section Managing the Compression Filters List, on page 197. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e S e t ti ng Ad va n ced Fi leB an k F ea tu r e s i 213 NOTE: Before you can start the Replication Service for the first time, you must define a valid Replication User. For more details, see section Replication User, on page 213. Replication User The Replication User is an internal user that performs file replication for the system. The Replication User Screen (Replication Services > Replication User) displays the currently defined user, and lets you clear (in other words, delete) the current user, and/or set a different user. i NOTE: The Replication Service cannot function unless a valid Replication User is set. This user must have sufficient security permissions for traversing the file system and writing permissions to replicate to the file server. R ev isi o n 2. 0 214 C h ap t er 7: Configuring and Managing WAFS To set the replication user: 1. In the Replication Services screen (File Services > Replication Services), click the Replication User link. ! ! CAUTION! You should configure the same replication user on the FileBank and the matching FileBank Director. NOTE: The Replication Service cannot function unless a valid Replication User is set. This user must have sufficient security permissions for traversing the file system and writing permissions to replicate to the file server. i 2. Select the checkbox for the required user, and then click Set. To clear the current Replication User (without setting another): 1. In the Replication Services screen (File Services > Replication Services), click the Replication User link. The Replication User screen opens, showing the current user. 2. Click Clear. ! i ! CAUTION! You should configure the same replication user on the FileBank and the matching FileBank Director. The user is no longer the Replication User. NOTE: Using the replication services requires creating a new user.. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pri nt i ng S erv ice s fo r th e F il eB an k Printing Services for the FileBank 215 Configuring Additional Services This section describes the FileBank Additional Services, which currently include the Print Services. Print Services You can configure FileBank to serve as the local branch print server. The Print Services screen (Additional Services > Print Services) lets you add network printers, view a list of already existing printers, and delete printers, as required. For additional information about print functions, see section Setting Advanced FileBank Features, on page 205. R ev isi o n 2. 0 216 C h ap t er 7: Configuring and Managing WAFS To add a printer: 1. Type in the printer name (preferably a descriptive name such as “Konica 7022”, “frontdesk” or “floor5”). 2. Type the printer URI(an identifying string such as socket://192.168.1.21:9100/.) 3. Enter a brief description to help other users identify the printer. 4. Click Add. The printer is added to the list of printers available to branch users (this list displays Name, Description, and URI). To delete a printer: 1. Select the checkbox near the name of the printer you want to delete. 2. Click Delete. Configuring Print Services (FileBank) Once FileBank is installed at the branch office, you can configure it to replace the existing local print server (or servers). FileBank includes the following features: Lets administrators manage network printers and upload end-user drivers through the Windows “Add Printer Wizard” Lets clients download and install drivers and printers via “Point'n'Print”, or install printer drivers locally Supports standard network printing protocols Can be connected directly to the printer Adding a Network Printer to FileBank The first stage when installing a new printer to the FileBank, is to set the printer entry and URI. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pri nt i ng S erv ice s fo r th e F il eB an k 217 Assigning Printing Administrators Only assigned printing administrators can upload printer drivers. Printing administrators must be users with full access and write credentials on the central fileserver PRINT$ share. The default printing administrator values are: Administrator (individual) and @Administrators (group name). In many cases the default setting is not sufficient and you need to assing additional user(s) and groups. i NOTE: Group names must be prefixed with @. i NOTE: Printing administrators must posses full access and write credentials on the central fileserver Prints share. Point’N’Print Configuration Once you have defined printers, printing mode and printing administrators on FileBank, you can upload printer drivers to the print server. This Enables clients to use the “Point'n'Print” feature, which automatically installs the associated printer driver the first time they access a particular printer. Uploaded drivers are stored on the central file server and cached on the local FileBank (a valid network connection between the FileBank and the FileBank Director is required). R ev isi o n 2. 0 218 C h ap t er 7: Configuring and Managing WAFS The initial listing of printers in the FileBank Printers and Faxes folder, accessed from a Client, has no real printer driver assigned to it. The standard Windows Add Printer Wizard (APW), run from NT/2000/XP clients, is used for printer driver upload. NOTE: The existence of PRINT$ share on the central file server is a prerequisite for uploading/downloading printers drivers ("Point’n’Print"). i Uploading Printer Drivers 1. Log in to a workstation as a user who is also defined as a printing administrator. 2. Browse to the FileBank’s virtual server name, by doing one of the following: Open Network Neighborhood and browse to the virtual server name, OR Click Start > Run, and type in the UNC path of the virtual server: \\{virtual server name} 3. Open the Printers and Faxes folder, locate the printer you have added to FileBank, right-click on the printer icon, and select Properties (from the menu). You are trying to view the printer’s properties before a driver has been assigned to it, and therefore the dialog box shown below appears. ! ! CAUTION! Do not click Yes. 4. Click No. 5. Do one of the following: Install a new printer driver (thereby activating the Add Printer Wizard, see next step). OR Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pri nt i ng S erv ice s fo r th e F il eB an k 219 If one or more drivers have already been installed, you can select one of these drivers from the drop-down list. (If no drivers have been installed this list will be empty.) 6. If installing a new driver, follow the Windows Add Printer Driver Wizard. 7. After driver upload is complete, perform the first client driver installation, as described in the next section. First Client Driver Installation After uploading a printer driver or drivers, you must perform the First Client Driver Installation. Once this initiation step is concluded, further clients are easily set up and should not require further attention. 1. Log in to any workstation as a user who is also defined as a printing administrator and has administrator rights on the workstation. 2. Browse to the FileBank’s virtual server name. 3. Right-click on the relevant printer, and select Connect from the menu. 4. The printer is added to the local Printer folder (you can verify this by clicking Start > Settings > Control Panel > Printers and Faxes). 5. use the following procedure to trigger the printer driver startup. Right-click on the printer and select Properties. i NOTE: If Connect still appears on the right-click menu, the driver is not yet installed. Return to step 3 above. R ev isi o n 2. 0 220 C h ap t er 7: Configuring and Managing WAFS On the Advanced tab, click Printing Defaults. Change the current page orientation (Portrait/Landscape) and click Apply. Restore original page orientation and click Apply. At this stage you may also want to set other printing defaults that will apply to all future clients wanting to carry out "Point’n’Print" driver installation. From now on, any client wanting to install this printer can just "Point’n’Print". Verifying Point’n’Print Installation After completing the above two stages, you are advised to verify that "Point'n'Print" is functioning correctly. 1. Log in to any other workstation (with permission to install drivers locally). 2. Locate the printer (Start > Printers and Faxes) and double-click it. 3. Verify that drivers are installed. i NOTE: If you are running Windows 2000, a dialog box may appear at this stage. 4. 5. 6. 7. Open the print queue for the printer. Print a test page. Verify that the print job is added to the print queue and prints out correctly. Verify that printer properties are visible (see the driver-specific fields) Manual Client Driver Installation Once you have defined your printers on the FileBank, you can optionally install printer drivers locally on workstations (without relying on "Point’n’Print"). 1. Log in to a workstation as a user who has administrator rights on the workstation. 2. Browse to the FileBank’s virtual server name, by doing one of the following: Open Network Neighborhood and browse to the virtual server name, OR Click Start > Run, and type in the UNC path of the virtual server: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pri nt i ng S erv ice s fo r th e F il eB an k 221 \\{virtual server name} 3. Open the Printers and Faxes folder (Start > Printers and Faxes), locate the printer you have added to FileBank, right-click on the printer icon, and select Properties (from the right-click menu). You are trying to view the printer’s properties before a driver has been assigned to it. Therefore, the following message appears: 4. Click Yes. The Add Printer Wizard (APW) opens. 5. Select the driver to associate with the printer, install it and connect. Verifying Driver Installation To enable a client to use the FileBank as the print spooler, communicating by using IPP (Internet Printing Protocol): 1. Open the print queue for the printer. 2. Print a test page. 3. Verify that the print job is added to the print queue and prints out correctly. To verify driver installation for each Client: 1. Add a printer to the FileBank. 2. Log in to the workstation to which you to install a printer as the workstation’s administrator. 3. Browse to the Client’s Control Panel. 4. Open the Printers and Faxes folder (Start > Printers and Faxes). 5. On the File menu, click Add Printer. The Add Printer wizard opens. R ev isi o n 2. 0 222 C h ap t er 7: Configuring and Managing WAFS 6. Select the button Connect to a printer on the Internet or on a home or office network. 7. In the URL field, enter the URL for the printer in the following format: http://<FileBank's hostname>:631/printers/<printer’s name> 8. Click Next. 9. Select the appropriate driver to install, and use the wizard for completing the installation. 10. When done, print out a test page.r i NOTE: Installing the IPP printer drivers to a workstation does not require additional settings on the FileBank other than adding the IPP printer URL to the FileBank. i NOTE:Client side IP configuration does not support “Point’n Print.” To connect a printer to the FileBank server: 1. Connect the printer to the FileBank server via USB (or parallel port if no USB is available). 2. Use the WebUI to add a printer. Printing Setup Troubleshooting Issue: I cannot select a new driver to upload, the option is disabled. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pri nt i ng S erv ice s fo r th e F il eB an k 223 1. Ensure that a PRINT$ share is defined on the central file server. 2. Verify that you are logged in as a printing administrator, with full read and write access to the PRINT$ share. 3. Ensure that this user is defined as a printing administrator (see section Assigning Printing Administrators, on page 217.) I get an Access Denied message when trying to upload drivers 1. Verify that PRINT$ share exists on the target's central fileserver. 2. Verify that you are logged in as a printing administrator with full read/write access on the PRINT$ share. 3. Verify that you have set the printing driver to server at the FileBank: > printing drivers set server and then repeat the driver upload procedure (see section Uploading Printer Drivers, on page 218). When I try to print out a test page I get one of the following errors: “Operation could not be completed” “Could not add a print job” R ev isi o n 2. 0 224 C h ap t er 7: Configuring and Managing WAFS 4. 5. 6. 7. 8. “Print test page failed” Ensure that you have initialized the printer by performing the first Client driver installation, before trying to print (see section First Client Driver Installation, on page 219). If the printer driver is not yet installed on the workstation, Ensure that you are logged in as an administrator for this workstation. Verify that the printer is connected and operational (look for errors such as network connection problems, paper jam and out of paper). Print jobs are not cleared from the queue (even after refreshing the queue) and are not printed Verify that the printer is connected and operational ((look for errors such as network connection problems, paper jam and out of paper). Verify that the printer’s URI is defined correctly on the FileBank, and that the printer supports the protocol given and is configured to acknowledge on the specific protocol (IP, port, protocol). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Us in g WAF S P r in t in g S e r vi ce s Using WAFS Printing Services 225 Adding a WAFS Printer via Windows WAFS now lets you use the Windows Add Printer Wizard to add a Server printer on a remote computer. To add a Server printer: 1. Go to the Printers and Faxes section on the server from which you want to add the printer. 2. In the Printer Taks pane, click the Add a Printer button. The Add Printer Wizard dialog box appears: 3. The next screen lets you either select the port you want your printer to use or create a new port: R ev isi o n 2. 0 226 C h ap t er 7: Configuring and Managing WAFS 4. Select the option of creating a standard TCP/IP port. 5. Use the following dialog box to add a printer name or IP address and a port name. 6. Use the standard Windows wizard to continue with the installation. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e WAN-OUT Operation WA N - O U T O p e r a ti on 227 <Default ¬¹ Font>Expand<Default ¬¹ Font>’s WAFS solution includes support for WAN-OUT Operation mode, providing necessary business continuity for cases of temporary WAN outage. When a disconnection event is identified, the system automatically switches to WAN-OUT Mode. Cached Content During WAN-OUT mode all cached content is treated as valid, namely: all cached files are made available to users. However, because the FileBank Director is not in sync with the FileBank, all files that were already cached at the time of the disconnection event remain unchanged in cache until the system resumes normal operation. Therefore, when consulting the cache, TTL values are ignored. Accessing Files and Directories When an application tries to open a file, READ ONLY (RO) access is granted (provided applicable security). Any other access flags - such as WRITE, DELETE, TRUNCATE, CREATE are denied. Users opening files receive a notification as if they have a read-only permission to the file. Copying a file to the Client’s hard-drive is possible, along with all security and permission data, provided that the user has the applicable security to do so. In WAN-OUT mode all operations that attempt to change a file, a file system structure, or data are immediately responded with "Access Denied" by the FileBank. The system is programmed to release locks on the FileBank Director side after a configured period of time, for files that have been locked on the file server by the FileBank Director prior to the disconnection event. Security In WAN-OUT Mode, the system maintains all applicable security measures with respect to access authorization to data and files, hence users are able to open any of the files they are authorized for and that are in the cache for RO at all times in disconnection mode. Users that have been in a session prior to the disconnection event will not have to re-login during the entire process. New user sessions are subject to existence of branch domain control services. R ev isi o n 2. 0 228 C h ap t er 7: Configuring and Managing WAFS Partially Completed Transactions A disconnection event may occur in the middle of a transaction. In this case, the FileBank responds to the user as if the request was received in WAN-OUT mode, namely: unless the FileBank has received an affirmative success response from the FileBank Director regarding the completion of the operation, it assumes the operation has not been successful and will switch to the WAN-OUT mode. Partial Disconnection In some cases, a single FileBank is connected to multiple FileBank Directors at different physical locations. A failure in one or several of these FileBank Directors is possible, resulting in a situation where only a part of the files accessed by the RBO are now under ‘disconnection’. As the FileBank has the notion of the origin of each file (namely: the specific FileBank Director that manages the file), the system selectively enters the WAN-OUT mode for files from FileBank Directors that are disconnected and operates normally with files from FileBank Directors that have valid connection. Reconnection When the reconnection event is identified, the system automatically switches to normal operation mode, and re-establishes the FileBank-FileBank Director connection. Users that have made changes to files and saved them locally (if this was the case) must manually copy the altered files from the local storage to the file server via FileBank. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e DNS Masquerading D NS Ma sq ue rad i ng 229 One primary objective of the <Default ¬¹ Font>Expand<Default ¬¹ Font> solution is to provide a truly dynamic global file system. To ensure that data is always accessible across the distributed organization, <Default ¬¹ Font>Expand<Default ¬¹ Font> must anticipate and overcome challenges introduced by common network issues and user usage patterns. Some key requirements of a global file system include: Common name space – the solution must be fully coherent with the existing naming convention used across different branch offices. For example, a file server named “efs” should be accessible, using this name, to branch offices with or without <Default ¬¹ Font>Expand<Default ¬¹ Font> FileBank. Direct access on failure – users in branch offices should be able to access the file server at the data center should the FileBank at their location become unavailable. Roaming user support – support of mobile users travelling between different branch offices. The system should automatically redirect users to the nearest FileBank according to the user's current location. To meet these requirements, Expand supports DNS Masquerading. Using DNS Masquerading, Expand becomes part of the DNS scheme in the organization, and uses DNS to overcome challenges associated with the above requirements. DNS Masquerading Benefits Common Name Space—To ensure that users across the organization can seamlessly access directories at the Data Center, regardless if their individual office uses FileBank, Expand supports common name space conventions with and without the device. Direct Access on Failure—One of the most important features of any network device is that of fail over and high availability. To ensure that remote office users continue to access the file server at the datacenter, even in cases of planned or unplanned downtime of the FileBank, Expand uses DNS masquerading to redirect users directly to the file server over the WAN. Roaming Users Support—Further complicating the already challenging management of distributed organizations are roaming users who travel between locations. Expand uses DNS masquerading R ev isi o n 2. 0 230 C h ap t er 7: Configuring and Managing WAFS to ensure that roaming users have access to centralized data even when they move from one office to another. Each time the user reboots or wakes the computer from hibernation, the DHCP server pushes a new DNS server list. If the office uses FileBank, the FileBank will be listed as the primary DNS as described above. DNS Masquerading Configuration To configure DNS Masquerading: 1. In the Setup screen, go to the Networking tab. 2. Select the DNS option. 3. Set the IP domain lookup table status to Enable. 4. Fill-in the relevant details in the Servers table, Domain name table and Static host table i NOTE:Configuring the NetBios domain name should be carried out via WAFS CLI. 5. In the Services screen go to the DNS Acceleration tab. 6. Set the DNS Masquerade status to Enabled. Fill-in the relevant IP Address (the FileBank IP Address) and Host Name (Fully qualified domain name) Ac ce ler at o rOS 6 .1 .2 Us er Gui d e D NS Ma sq ue rad i ng 231 7. In the Services screen go to WAFS. Click on WAFS Configuration. 8. In the WAFS Management screen select System Setup wizard. Ensure that the virtual server name includes no prefix, suffix or alias, and is identical to the file server name. At the end of the process, the WAFS details should be similar to the following: 9. Use the WAFS CLI to verify that spnego option is on. (_auth spnego on). This setting is essential in order for DNS Masquerading to function correctly. R ev isi o n 2. 0 232 C h ap t er 7: Configuring and Managing WAFS Do not use the DNS Masquerading option from the Additional Services menu. Do not change any settings on the client. There is no need to change the primary DNS server. When the FileBank reboots, the client is immediately connected to the Fileserver. When the FileBank is up, the client continues to be connected to the original Fileserver. You are advised to reboot the client after the configuration To use a local client for testing DNS masquerading: 1. Update the list of DNS servers configured on the client so that the FileBank is configured as the primary DNS server. Do not define any additional DNS servers. 2. Open the command prompt window. 3. At the command prompt, perform an nslookup. The nslookup should report the FileBank as the primary DNS server. 4. Issue an nslookup request for an existing virtual server (for example: dsefs.demo.com). The IP address of the FileBank should be returned. 5. Issue a request to any other name recognized by the central DNS server. (for example: www.cnn.com). The proper IP address should be returned. General—If you use the domain controller as the file server, consider defining a DNS alias to be used for accessing the file server at the datacenter and the virtual file server at the branch office. For example, you have a domain controller called dc1 that is also used as the file server. Add an alias to the DNS server called efs1, which points to the same IP address as dc1. On the FileBank Director add the file server efs1 (use the command cifs export efs1). Ensure that no prefix or suffix is defined on the FileBank (see above). Testing —DNS masquerading can only be tested when there is an active virtual server. DNS masquerading is automatically turned off when there are no active virtual servers to initiate switching to a secondary DNS server. Switching to and from FileBank Changing the TTL of the file server DNS record—The time is takes for the client to switch between the primary DNS and the secondary DNS servers depends on the TTL of the file server DNS record. You should set the TTL of the file server record to the minimum in order to shorten the fail-over time. The DNS client service does not revert to using the primary DNS server—The Windows 2000 Domain Name System (DNS) Ac ce ler at o rOS 6 .1 .2 Us er Gui d e D NS Ma sq ue rad i ng 233 Client service (DNSCache) follows an algorithm when it decides the order of the DNS servers configured in the TCP/IP properties. Refer to Microsoft Knowledge Base for more information http:// support.microsoft.com/default.aspx?scid=kb;EN-US;286834 CIFS session timeout—In some cases, the client will fall back from the EFS to the FileBank only after its CIFS session with the EFS terminates. The time this takes is influenced by the session timeout on the EFS, and can be configured by using the following command on the Windows file server: net config server /autodisconnect:<minutes> R ev isi o n 2. 0 234 C h ap t er 7: Configuring and Managing WAFS Monitoring WAFS Functionality This section describes the Utilities options, which are as follows: Running System Diagnostics Viewing Logs Running System Diagnostics The System Diagnostics screen lets you run a diagnostic test on the FileBank Director device to ensure that the device is working properly. The results of the test are displayed in the Results area of this screen, and describe any problems with the FileBank Director device. To start the test, click Run Diagnostics. Viewing Logs The Logs screen lets you generate activity logs of the FileBank Director for monitoring, optimization, and troubleshooting purposes. Generating a log archive may take several minutes. When finished, the log file is saved in a default system location, and a link to the log archive appears in the Log Archives section of the screen (newest on top). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M o ni t or in g WAF S Fu n ct io n al it y 235 R ev isi o n 2. 0 236 C h ap t er 7: Configuring and Managing WAFS Troubleshooting In this troubleshooting section it is assumed that: 1. A complete end-to-end Expand WAFS installation has been set up and configured 2. Devices are connected to the network (L1, L2) correctly and the right network (L3) settings have been applied Troubleshooting Tools Internal Diagnostics: An automated internal utility that provides an immediate indication of the Expand device performance and issues. This is the first tool that should be used when troubleshooting is necessary. You should run this tool at both branch and data center ends. For details, see Running System Diagnostics, on page 234 (FileBank), and Running System Diagnostics, on page 234 (FileBank Director). Logs: The internal system logs that can be viewed, archived and uploaded. For details, see Viewing Logs, on page 234 (FileBank) and on page 234 (FileBank Director). Statistics: An internal tool that provides FileBank service statistics (see DNS Masquerading, on page 234). Status: The status CLI command reports on the current system running status. General Network Utilities: Ping, traceroute, ttcp, ifconfig, route, and netstat. Networking No route/connection to the Expand devices Check that the device is operational and is connected correctly to the network (both Ethernet cable ends should be firmly in place). Verify that the green light at the cable socket of each side is on. Verify that network settings are correct, by examining the output of the ifconfig CLI command. Pay particular attention to IP address and netmask. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Tro ub le sh o o ti ng 237 Use the route CLI command to verify that routing tables are correct. Try to ping a machine in the same subnet (typically the gateway, depending on your network topology). No route/connection to the Domain Controller (authentication server) Use the domain controller's IP address to check connectivity. If this fails, refer to the previous section and correct networking/routing problems. Verify the name set for the authentication server. Use the CLI authsrv command, or the relevant Web Interface page. Try to ping the domain controller by its name. Failure to do so indicates a name resolution issue. To resolve this issue, either add the domain controller to the static hosts list (using the hosts add CLI command), or verify correct DNS settings. Ensure that you have applied valid DNS servers. Use the CLI prompt command dns, or the relevant web interface page, to assign/delete/list DNS servers. Ensure that you have added the DNS suffix required to complete the FQDN of the authentication server. Use either the CLI prompt command dns search, or the relevant web page, to apply the required suffix. If the FileBank has not been configured with DNS servers, add the authentication server name under the static hosts. Use the hosts CLI prompt command, or the relevant web interface page, and repeat a connectivity check to the authentication server. No route/connection to Fileserver(s) Ensure that you have correctly defined the server(s) that needs to be exported by FileBank Director. Verify that the file servers’ NetBIOS names are the names you have defined to be exported by FileBank Director. Try to ping the file server's NetBIOS names. Failure to do so indicates a name resolution issue. Verify correct DNS settings, including DNS search path. Alternatively, use 'hosts' static entry to add them to the list, as described in the previous section. FileBank Director cannot access the file server on port 139 FileBank Director requires active ports 139 or 445 on the fileserver. If port 139 (SMB over NetBIOS) is disabled, enable the NetBIOS port as follows: browse the R ev isi o n 2. 0 238 C h ap t er 7: Configuring and Managing WAFS fileservers TCP/IP network properties, select the Enable NetBIOS over TCP/IP checkbox and apply changes. If NetBIOS is to remain disabled on the fileserver, please consult the Expand support team support@expand.com for additional configuration settings. No route/connection from FileBank to the FileBank Director Expand utilizes TCP connection to transfer the data between FileBank and FileBank Director. The UDP port is set to keep alive acknowledgements between the two. Connection ports between FileBank and FileBank Director are set by default to 80. Ensure that the connection ports between the FileBank Director and the FileBank match each other. Use the FileBank Director CLI listenport command, or the relevant web interface page, to verify/alter listen ports. Use FileBank CLI fport command, or the relevant web interface page, to verify/alter connection ports. Ensure that the designated ports (UDP and TCP) are opened on the firewall (if applicable), and that corresponding settings are applied. Check MTU (Maximum Transfer Units) consistency along the network path. This check is especially needed with DSL connections. Inconsistency may result in lack of communication. Test different values for MTU using ifconfig CLI command. Try to reduce the MTU gradually, and find the largest MTU value that works for you (ping to verify). If the problem persists, contact Expand support at support@expand.com for additional information. Windows Domain Join Failed to join FileBank to the domain FileBank must be joined to the domain just like any other domain resource. When joined correctly, it appears as a resource object in the active directory. Verify that the correct domain name is set, and a route to the authentication server (DC) is assigned. Use CLI commands authsrv and domain, or the relevant web interface page, to apply settings correctly. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Tro ub le sh o o ti ng 239 The user that is entered upon joining the domain must have adequate permissions on the domain to join computer objects. Ensure that the hostname of the FileBank is a valid NetBIOS name, and does not exceed 15 characters. If necessary, redefine the hostname and rejoin the FileBank to the domain. If the problem persists, contact Expand support at: support@expand.com. Service System status: "Not Running" Verify the system was started, and try to start it again using restart CLI command. Run the status CLI command, and check reported errors in command output. Run the diagnostics CLI command, and check reported errors in command output. Ensure that the Expand license is installed and valid. If the problem persists, contact Expand support at: support@expand.com System is running, no virtual servers appear on FileBank Run the diagnostics CLI command on the FileBank Director to verify connectivity to the file server/s, and that FileBank Director is able to read file server shares. If FileBank Director cannot read shares, verify the existence of shares by accessing the file server directly frrm a workstation (namely, not via Expand), and define a share listing user (when necessary) using the FileBank Director cifs user CLI command. Run the diagnostics CLI command on FileBank to verify connectivity to FileBank Director. Run the gns refresh CLI command on FileBank. Verify that the defined connection ports associated with the various FileBank Directors match the FileBank Directors’ listen ports (the listen port can be explored at the FileBank Director end, by issuing the listenport CLI command or the relevant Web Interface page). Verify that no firewall is blocking the FileBank Director/FileBank connection ports. Workstations cannot connect to FileBank virtual server(s) R ev isi o n 2. 0 240 C h ap t er 7: Configuring and Managing WAFS 1)Name Resolution Issues Possible Error Messages Network name no longer exists The network path was not found Start troubleshooting by verifying virtual server name resolution. Clients connecting to FileBank virtual server/s require NetBIOS name resolution. Ensure that the client can resolve the virtual server NetBIOS name by using at least one of the following options: Broadcast on the same LAN segment WINS entry Local workstations settings (LMHOST/HOST files) DNS entry (a reverse entry is also needed) i NOTE: A DNS entry can be used when the FileBank exports only one virtual server, If the FileBank exports more than one virtual server, the Expand DNS masquerading feature can be utilized to support a DNS resolution (see also section must be in Active mode and set to version 2 for RIP Route Injection to operate. For more information, see section DNS Masquerading, on page 229. Permissions and domain trust issues Access denied Continue troubleshooting by verifying user permission to access the central server resource, and the existence of necessary domain trust when applicable. Try to connect directly to the central file server (meaning, not via Expand) by using the same domain user. Run the diagnostic command via CLI or the web interface, to validate that FileBank is joined to the domain. Verify that FileBank is joined to the correct domain. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Tro ub le sh o o ti ng 241 If the FileBank is joined to a different domain than the centralized file server, ensure that a trust exists from the central domain to the FileBank domain. Cache pre-population failure Examine the errors in the fetch log. Validate the correctness of the path given to the fetch job. From a workstation browse directly to the FileBank giving the same fetch job path. i NOTE: Fetch paths are case-sensitive. Ensure that a valid domain user is assigned to all fetch jobs. From a workstation, log in as the same user defined in the fetch job, and browse directly to FileBank. Verify that this user has read credentials by trying to read a file whose fetch has failed, according to the logs. If DFS is in use, ensure that the fetch job path is not a DFS path (namely, //<virtual server name>/<DFS root>/<path>), but instead points to the linked virtual server (namely, //<virtual server name>/<share name>/<path>). To view the FileBank virtual server names, use the CLI status command or the relevant web interface page. Replication failure The replication service requires the definition of a replication user. The replication user must have read and write permissions on the paths where files are to be replicated. The same replication user should be used for both FileBank Director and FileBank. Ensure that you set a valid domain user as the replication user. From a workstation, log in as the replication user, and browse directly to the FileBank. Verify that this user has read and write credentials by copying files to a replication folder. Validate the defined replication paths. From a workstation, browse directly to the FileBank, using the defined replication UNC path(s). If DFS is in use, ensure that the replication paths are not DFS paths (i.e. //<virtual server name>/<DFS root>/<path>), but instead point to the linked virtual server (namely, //<virtual server name>/<share name>/<path>). To view the FileBank virtual server names, use the CLI status command or the relevant web interface page. R ev isi o n 2. 0 242 C h ap t er 7: Configuring and Managing WAFS Some of the DFS shares/folders are inaccessible Find the physical server name that contains the inaccessible shares/folders. Ensure that it appears in the exported file server list (using FileBank Director cifs show CLI command or via FileBank Director web interface). Performance If the Expand network environment has not been deployed/configured correctly, users may experience the following problems: Long delays while opening and saving cached files (WAN like) Mapped network drive disconnections Network Interfaces View the NIC settings (use the CLI command ifconfig). Verify that no errors have accumulated on the interface. Errors may indicate a duplex/speed mismatch. Check the Switch/Hub port settings to which the Expand device is connected. The port settings must match the NIC settings of the Expand device. In the case of a mismatch, use the CLI command ifconfig to force settings on the NIC, such as the autonegotiation mode, speed and duplex settings. For optimum performance, ensure that the Link supports 100Mbps FD settings. Quality of Service (QoS) Branch offices that utilize QoS should prioritize the DSFS protocol between FileBank and FileBank Director. This will generally result in an immediate and marked improvement in user experience. The protocol uses by default port 4049, but for QoS you are advised to use a different, distinguishable port. You can change protocol port by using listenport/fport commands on the FileBank Director/ FileBank respectively. Ensure that you change all communicating devices at the same time. Route Investigate the route legs along the communication path from a workstation to the FileBank to the FileBank Director, terminating at the file server. Network location Ensure that there is no significant latency (latency greater than 1ms) between the FileBank Director and its associated file servers. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Tro ub le sh o o ti ng 243 Improved performance may be achieved if the file servers and the FileBank Directors reside on the same LAN segment. Ensure that there is no significant latency latency (latency greater than 1ms), or any link mismatch, between the FileBank and the workstations. Improved performance may be achieved if the workstations and the FileBank reside on the same LAN segment Bandwidth issues Use the ttcp command (for more details, refer to the Expand CLI Reference Guide) to check the available bandwidth between the FileBank and the FileBank Director. Ensure that you compare both directions (the FileBank should be the Client at the first check, the Server at the second). This check can reveal bottlenecks and bad settings along the network path. Name resolution: Failover (WAN) issues Several name resolution techniques, such as DNS masquerading and DFS, can add seamless failover capabilities to the Expand solution. For more details see section DNS Masquerading, on page 229. With DNS masquerading in place, in the case of a failure, workstations are automatically switched to resolve the virtual server name as the centralized file server name. Failover lets the user continue to work without interruption, though there may be a deterioration in user experience. Ensure that workstations resolve the correct virtual server name. You are advised to execute the nslookup command from the workstations command prompt, giving the virtual server name as a parameter. Verify that the IP returned is the same as the IP of the FileBank. Ensure that FileBank is defined as the workstation's primary DNS (use ipconfig /all at the workstation command prompt). To regain the correct name resolution of the virtual server, execute the following steps from all workstation involved in the failover: 1. From each workstation's command prompt execute the following commands (you may want to aggregate the scenario in a batch process during workstations boot): ipconfig /flushdns nbtstat –R R ev isi o n 2. 0 244 C h ap t er 7: Configuring and Managing WAFS nbtstat –RR 2. Validate that the IP of the FileBank is returned upon querying the virtual server name (use the nslookup command). 3. If the problem persists, contact Expand support at: support@expand.com. Advanced Expand Services DHCP Services When FileBank acts as a branch level DHCP, FileBank’s network settings must all be static (DNS, NTP, IP, routes, DNS search path and so on). DNS lookup failed after defining a DHCP service Define a valid FQDN extension for the DHCP server. DNS Services Workstations cannot browse the Internet or network mapping when using the FileBank as a DNS proxy Verify that DNS masquerading is running (for more details see section DNS Masquerading, on page 229). Ensure that the FileBank is defined as the workstation's primary DNS (use ipconfig /all at the workstation command prompt). Use the CLI dns command (or the relevant web interface page) to verify that the primary corporate DNS server is properly set on the FileBank. DNS lookup failed for branch workstations Ensure that the FileBank is defined as the primary DNS for that client, and that a secondary DNS points to an corporate DNS. Use the CLI prompt dns command (or the relevant Web Interface page) to verify that DNS servers are set onto the FileBank. Ensure that a search path (DNS suffix) is configured for the workstations. Duplicate IP error appeared when connecting in file server Error message: System error 52 has occurred: A duplicate name exists on the network. Global Name-Space support (exported virtual servers equals file server alias name): DNS masquerading might generate this error. To resolve, see Microsoft Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Tro ub le sh o o ti ng 245 Knowledge Base 281308 http://support.microsoft.com/default.aspx?scid=kb;enus;281308. R ev isi o n 2. 0 246 C h ap t er 7: Configuring and Managing WAFS Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 8: Setting Advanced Parameters Advanced setup includes complex configuration that should be attempted only by trained and certified Accelerator operators. You can set the following advanced parameters for the Accelerator: Handling WANs: Adding additional WANs, editing the default WAN, adding a WAN via the CLIHandling Interfaces: modifying speed and duplex settings via the My Interfaces menu Creating Static ARP Entries: Modifying the ARP table Defining Authentication Settings: Setting passwords for the Accelerator Dial-on-Demand: Deploying the Accelerator in environments that have routers with dial-up (dial-on-demand) interfaces. 248 C h ap t er 8: Setting Advanced Parameters Handling WANs The Accelerator arrives preconfigured with one default WAN. To define the bandwidth setting for this default WAN, select Setup - My Accelerator - Basic menu, and then click the Advanced Settings button to open the Advanced Settings screen. On large networks (for example in cases where there are two routers or one router with multiple WAN interfaces) in which the Accelerator will optimize the traffic of more than one WAN, you can add additional WANs to the Accelerator. To add a WAN to the Accelerator: 1. Click the Setup tab, followed by Networking, and then My WANs. 2. In the WANs menu, enter the name and Bandwidth Out of the new WAN. Select the Enable Bandwidth In checkbox to set a bandwidth limit on incoming traffic, then select the Bandwidth In value and click Add. The new WAN will appear below the default-WAN in the WAN table. Highlight a WAN and use the Delete button if at any point you want to delete a WAN. 3. To edit an existing WAN, highlight the WAN in the WAN Table and click the Edit WAN button. The Edit WAN popup appears, letting you modify the WAN name, and the Bandwidth In and Bandwidth Out values. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ha nd l in g WAN s i 249 NOTE: The total WAN bandwidth will always be enforced. It is the sum of all WANs configured for the Accelerator R ev isi o n 2. 0 250 C h ap t er 8: Setting Advanced Parameters Handling Interfaces The Accelerator automatically detects the MAC address and Speed and Duplex settings for each of its interfaces. You can perform all required speed and duplex setting modifications via the My Interfaces menu. The interface name corresponds to the name printed on the back panel of the Accelerator and cannot be modified. The MAC address is permanent and cannot be modified. The Speed and Duplex settings let you define the link as either 10 or 100 Mbits (or 1000 Mbits for the Accelerator 6800 series) and as either Half or Full duplex. The Auto setting automatically configures the Accelerator to the detected link speed and duplex setting (this is the default setting). i i NOTE: Setting wrong interface speed and duplex values for the Accelerator may result in many errors on the line towards the router, and even loss of connectivity. If you are uncertain as to the speed and duplex setting required, you can use the Auto setting; however, you are advised to manually set the speed and duplex. NOTE: When the Accelerator is installed in an On-Path deployment, ensure that both interface 0/0 and 0/1 have the same link speed and duplex settings. If the Accelerator operates in bypass mode for any reason, this will enable the two devices adjacent to the Accelerator to interact. In additon, if you are using an Accelerator that has multi-port support, each port will be listed as shown here in the table: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e H an d lin g I nt e r fa ce s 251 To modify interface speed and duplex setting: 1. Click the Setup tab, followed by Advanced, and then My Interfaces. 2. In the Interfaces Table, click on the name of the Interface to be modified, use the Speed & Duplex drop-down menu to select the proper speed and duplex setting and click Submit. Working with VLAN The Accelerator supports protocol 802.1q VLAN. VLAN is a virtual layer on top of the Ethernet that enables the Ethernet to be divided into smaller virtual groups. You can add up to 255 VLAN groups to the Accelerator. You can set Each VLAN group, identifiable by a number, on any basis (precise location, department, primary application, type of user, and so on). The Accelerator can incorporate itself into a VLAN network as follows: you can assign the Accelerator a VLAN ID, enabling it to be considered as part of a VLAN group. If VLANs are defined on the Accelerator, all VLAN traffic passes as bridged traffic. Defining a VLAN as Native means that the Accelerator uses the IP address from its local interface as the IP address for a particular VLAN. The Accelerator will handle packets arriving tagged from the Native VLAN, but will forward them without the tag (this is especially useful in setups in which the router does not support VLAN). Setting the Accelerator to work in with Native tagged will enable the Accelerator to set one VLAN as Native with the IP address from its local interface, but will forward packets received from the native VLAN with the tag. If traffic is already handled (for example if VoIP is set on a separate network and receives priority), the traffic that is not to be handled by the Accelerator should not be set as a VLAN and it should not be advertised anywhere in the Accelerator network - the traffic should be bridged through the Accelerator. R ev isi o n 2. 0 252 C h ap t er 8: Setting Advanced Parameters The following figure depicts working with VLAN in an On-LAN configuration. In the setup depicted, VLAN 1, 2 and 3 are defined in the Accelerator. VLAN 1 is defined as native, meaning that it takes its IP address from the Accelerator’s Local interface. A second 802.1q trunk is created from the Layer-2 switch to the Accelerator enabling VLAN support in an On-LAN environment. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e H an d lin g I nt e r fa ce s 253 The following figure depicts working with VLAN in an On-Path configuration: The Accelerator is connected directly to a Layer-2 switch via a VLAN (802.1q) trunk. VLAN 1, 2 and 3 are defined in the Accelerator and VLAN 1 is defined as Native. To include the Accelerator in a VLAN group: 1. Click the Setup tab, followed by Advanced, and then VLAN Interfaces. 2. 3. In the VLAN Interfaces menu, enter the necessary VLAN ID number (1 to 4094). The Accelerator must have an extra IP address and Subnet Mask for each VLAN group it joins. To enter an IP address and subnet mask to be used within the VLAN group, select the IP address radio button and enter the IP address and subnet mask into the supplied fields. R ev isi o n 2. 0 254 i C h ap t er 8: Setting Advanced Parameters To use the Accelerator’s original IP address and subnet mask as its address within the VLAN group, select the Native IP setting radio button. When Native is selected, it is possible to select the Tagged checkbox to include the VLAN tag in the packets sent from the Native VLAN. 4. Click the Add button. All VLAN interfaces added will appear in the VLAN Interfaces table, at the bottom of the screen. NOTE: It is unusual for the Native VLAN to be tagged. Please check if indeed it is. Otherwise the IP address in the Local Interface will act in the Native VLAN Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Cre at i n g Stat i c A RP E n t r i e s Creating Static ARP Entries 255 If you want to make a replacement within the ARP table, you can add a static ARP entry, by mapping a specific IP address to a specific MAC address. To map a static ARP entry: 1. Click the Setup tab, followed by Networking, and then ARP. 2. In the ARP menu, add the IP address and MAC address to be mapped. 3. If this change is to be permanent, select the Permanent checkbox. Otherwise, this entry will remain until the next Accelerator reboot, or until it is deleted from the ARP table. 4. Click the Add Static Entry button. The entry appears in the ARP table. If you want to delete the entry, click the Delete button. To delete the entire ARP table, including all its entries, click the Clear All button. R ev isi o n 2. 0 256 C h ap t er 8: Setting Advanced Parameters Defining Authentication Settings The Accelerator lets you modify the password necessary for logging in. To modify the password: 1. Click on Setup, followed by Security, and then Users. 2. In the Users table, double-click the name of the user whose password you want to modify. Alternatively, highlight the line of this user and click the Edit button. The Edit User Details dialog box appears: 3. Enter the local password and re-enter it for confirmation. 4. Click the Submit button. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Configuring DNS Co n fi g ur in g DN S 257 The Domain Name Server (DNS) Configuration screen lets you manage Domain Name Servers and define domain name, domain name search path and static hosts. To set a domain name: 1. Click the Setup tab, followed by Networking, and then DNS. 2. Enter the domain name in the Domain Name field. 3. Make sure that there is at least one entry in either the servers table or static host table (see below if you need to add entries). 4. Select whether to enable or disable IP Domain Lookup. 5. Click Apply. The domain now appears in the Domain Name Table. To add a new server: 1. In the Servers table, click Add. 2. In the Add New Server dialog box that opens now, enter the new server’s IP address. 3. By default, the order is sequential and the newest entry is last. If you want to 4. change this order, select the new position in the Order drop down box. The order may also be changed by using the arrows on the side of the table. 5. Click Submit. The newly added server now appears in the Servers Table. To delete an existing server: 1. In the Servers table, highlight the line that contains the server address, in order to select it. 2. Click Delete. You are now prompted to confirm the deletion. 3. Click OK. The server is now removed from the Servers Table. To add a domain name: 1. In the Domain Name table, click Add. 2. In the Add Domain dialog box that opens now, enter the new Domain Name. 3. By default, the order is sequential and the newest entry is last. If you want to 4. change this order, select the new position in the Order drop down box. The order may also be changed by using the arrows on the side of the table. 5. Click Submit. The newly added server now appears in the Domain Name Table. R ev isi o n 2. 0 258 C h ap t er 8: Setting Advanced Parameters To delete an existing domain name: 1. In the Domain Name table, highlight the line that contains the domain name, in order to select it. 2. Click Delete. You are now prompted to confirm the deletion. 3. Click OK. The server is now removed from the Domain Name Table. To add a static host: 1. In the Static Host table, click Add. 2. 3. 4. 5. 6. In the Add Static Host dialog box that opens now, enter the new Host Name. Enter a valid IP address. Click Submit. The newly added server now appears in the Servers Table. To delete an existing static host: In the Static Host table, highlight the line that contains the Static Host name, in order to select it. 7. Click Delete. You are now prompted to confirm the deletion. 8. Click OK. The server is now removed from the Static Host Table. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Managing Links M an ag in g L i nk s 259 A Link is a logical connection between the Accelerator and each connected remote site and its subnets. The Accelerator optimizes network performance over Managed Links as well as Virtual Links. The Accelerator’s benefits are greatest when working opposite another Accelerator, in a “Managed Link” environment. The Accelerator can provide QoS services even to virtual links, when there are no Accelerators present on the remote sites. In addition to Managed and Virtual links, the Accelerator enables configuration of a single “Non-link”. The Non-link is the default link for all traffic not assigned to any known subnet or remote Accelerator (for example: Internet traffic), which can be managed like any other link, allowing you to determine traffic QoS and bandwidth restrictions for all traffic not destined for your remote networks and Accelerators. Clicking the Advanced button from the My Links menu, or highlighting a link in the table and clicking the Edit button, enables complex link configuration. To set advanced link properties: 1. Click the Setup tab, and then My Links. 2. Enter basic link properties (for more information see section Performing Setup via the Wizard, on page 21). 3. Click the Advanced button. 4. In the Link Details Menu, update any additional parameters as necessary. R ev isi o n 2. 0 260 C h ap t er 8: Setting Advanced Parameters Parameter Item Description Link Name Set a name for the link, which will let you identify it in the future (this is especially important for large deployments). Destination IP Set the IP address of the remote device. Bandwidth Set the Outbound and Inbound bandwidth to be dedicated to the link by selecting a value from the first drop-down menu or by selecting Other and then entering a value into the second field, and selecting the relevant units (bps, Kbps, Mbps, Gbps). The link does not exceed this bandwidth. Setting the Inbound bandwidth will automatically enable QoS capabilities on Inbound traffic for this link. MTU Sets the MTU of the link - which should match the router. Only in specific setups should it be lower, for example if a GRE tunnel is configured. WAN Select the WAN over which this link will run. By default, the Default WAN is selected. If other WANs have been added to the Accelerator, use the drop-down menu to select them as necessary. Large Cache Select the Large-Cache checkbox if you would like to work with a cache that can be larger than 16 MB (up to 256 MB). This setting takes into account any information regarding deployment size set in the Topology setting. This setting needs to be symmetrical only on initial setup. Once a link is created, using this command updates only the unit being configured. Fragmenation Enables packets to be fragmented on this link. If packets arrive larger than the set size (68 to 6000), the QoS mechanism breaks them up. This setting, useful for handling latency on low bandwidth links, applies only to traffic set with a CoS value of low, medium and high priority. You do not have to configure fragmentation symmetrically on both ends. Fragmentation is accomplished on outgoing packets before the packets are compressed Note that Packet Fragmentation does not work in RTM mode. Aggregation Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Enables aggregating small packets on this link. If packets arrive smaller than the set size (68 to 6000), the QoS mechanism aggregates them and sends them together across the link. This applies only to traffic set with a CoS value of low, medium and high priority. You do not have to configure aggregation symmetrically on both ends. Aggregation is accomplished on outgoing packets before the packets are compressed. Aggregation is applied only on congested links, to avoid adding unnecessary latency on non-problematic links. M an ag in g L i nk s Parameter Item Description Accelerate By default, all links are set to be accelerated. If the traffic on the link does not benefit from acceleration (for example if there is no Accelerator at the remote and only QoS is required) or should not be accelerated, deselect the Acceleration checkbox. Header Compression The packet header is compressed by default. Deselect this checkbox to decompress the header. Encapsulation EncapsulationSelect either IPComp or Transparent Encapsulation, as follows: IPComp encapsulation enables the best compression rate. IPComp encapsulation (tunnelled encapsulation) sets the packets intercepted by the Accelerator to be completely compressed. This means that the IP header, the TCP/UDP (or any other IP protocol) header and the payload are compressed and the packet traversing the network will have an Accelerator Proprietary IPComp header. Transparent (Router Transparency) encapsulation is appropriate in an environment where header preservation is necessary, including original QoS packet settings, NetFlow, Billing, encryption and certain firewall environments. In Router Transparency encapsulation, only the packets’ payload is compressed, leaving the original IP header and the original TCP/UDP header in their original forms so that their information is available across the network. Router Transparency encapsulation is available in On-Path deployments only. Encapsulation need not be symmetrical - the Accelerator can support different encapsulation in each direction. This allows flexibility when an Accelerator is deployed On-LAN. ToS You can either preserve the original ToS setting of the packets or set a new ToS value for this application. To preserve the original ToS value, select the Preserve button. To set a new ToS value for this traffic, select the Set button and select ToS value, Code Point or CoS ToS from the dropdown menu 261 Note that Setting this value is not required if Transparent Mode is selected TTL Preservation Preserves the original TTL. This option is disabled by default. SRC Preservation Preserves the source IP address of the original IP header. This is useful for Policy Routing, and also enables distinguishing between sessions. This option is disabled by default. Force Tunneling Enables forcing all traffic into the Accelerator encapsulated tunnel. Note that In AcceleratorOS Version 5.0 and above, tunnel-force has no real effect and is supported for backward-compatibility reasons only. R ev isi o n 2. 0 262 C h ap t er 8: Setting Advanced Parameters Parameter Item Description Include Checksum This is an additional checksum for the Acceleration algorithm - over and above regular frame checksums. TCP Acceleration Check the Use Global TCP Acceleration box to use the globally set TCP acceleration values. If you want to set values specific for this link, deselect this box and set the required values in the Typical RTT and Typical Acceleration Rate fields. Save to template link You can create a template that will be used to set default settings for all links to be created. These settings will be displayed in the Advanced links menu for all future created links. To update all fields to be considered in the template to the necessary values, click the Save to Template Link button. The templates set on one Accelerator are not sent to far-end Accelerators. The Status/Compression column in the Links Table reveals the status of each link. The mouse-over callout provides further detail as to the status as follows: Status Description Load Error Internal error occurred during definition of the link in the system Not Managed A Virtual link (no far-end Accelerator) Inactive Remote Accelerator is not available Trying to Connect Link id establishing a connection Negotiating Link parameters (cache size, and so on) are being negotiated Accelerating Link is active and acceleration is on Active Link is active and the link is tunnelling but not accelerating traffic Dropped Communication has been lost Setting Remote Subnets for the Links You can add remote subnets to each link created. For details, see section Configuring Remote Subnets Manually, on page 56. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M an ag in g L i nk s 263 Editing Existing Links You can use the Edit Links screen to fine-tune and modify already existing links. This screen lets you set basic link parameters, acceleration, tunneling and TCP Acceleration parameters for the link. To edit an existing link: 1. In the My Links menu, click the link’s name in the Links Table section. 2. In the Edit Link screen that opens now, use the Parameters section to edit parameters such as Link Name, Destination IP, Bandwidth Out and MTU (Maximum Transfer Unit). 3. Use the Acceleration section to define whether to accelerate the link and to use header compression. 4. Use the Tunneling section to define parameters such as the encapsulation type (IPComp or Transparent), Source preservation and checksum enabling. 5. In the TCP Acceleration settings section, select whether to use the global TCP acceleration settings or to customize these settings by defining the typical roundtrip time (RTT) and the typical acceleration rate. 6. In the Post Acceleration Aggregation section, select whether to enable Citrix (post acceleration) aggregation on your links. Citrix Aggregation operates per link. Each link can have Citrix Aggregation enabled or disabled independently of other links. R ev isi o n 2. 0 264 C h ap t er 8: Setting Advanced Parameters Dial-on-Demand You can deploy the Accelerator in environments that have routers with dial-up (dialon-demand) interfaces. These interfaces initiate a call (dial to) the remote end (typically over ISDN or Satellite links) when “interesting” traffic is being sent. After a specific quiet period, the link goes down again until new “interesting” traffic is sent. Link establishment of the dial-up interfaces and connectivity time can be fairly expensive. Therefore you may sometimes want to keep the link down until new “interesting” traffic is forwarded via the link. The Accelerator poses a problem in these environments as it uses a keep-alive mechanism to check the health of the link between the remote sites. By default, the keep alive messages are considered “interesting” and will keep the dial-up link alive (and costly). The dial-on-demand solution enables the Accelerator to support dial-on-demand environments by not sending keepalive messages. i i i NOTE: Both peers must configure the link in dialup mode with the same timeout. NOTE: The ExpandView agent must be disabled NOTE: Connecting to a link by using its HSRP address will not work. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 9: Configuring Management Options You can configure the Accelerator via CLI via Telnet, SSH, or direct Console connection. Alternatively, you can configure the Accelerator via WebUI, accessed by using HTTP or HTTPS. Logging can be sent to SNMP or SyslogD servers and can be sent via email. i NOTE: By default, all options mentioned above are enabled (Telnet, SSH, direct console, HTTP and HTTPS). To disable a specific service, see section Configuring AAA via the WebUI, on page 290. This chapter contains information on the following: Studying the ExpandView System, on page 266. Using SNMP, on page 270. Logging into the Accelerator, on page 424. Using SNMP, on page 270. Receiving Log Error Messages, on page 271. 266 C h ap t er 9: Configuring Management Options Studying the ExpandView System Expand Networks' ExpandView is a centralized monitoring and management system for Expand Accelerators. ExpandView gives you total visibility, via a Dynamic Network Map, into global WAN operations, thereby letting you implement global changes in minutes. Detailed graphs and reports, easy-to-use QoS templates and tight integration with Expand's award-winning Accelerators make ExpandView the ideal Centralized monitoring and management system for ensuring optimal application performance over the WAN. Using Dynamic Network Map ExpandView is the industry's first to offer a dynamic map that provides a real-time view of the wide area network (WAN), with the ability to monitor and manage Expand's WAN optimization devices via simple click and drag operations. Ideal for NOC (Network Operations Center) operations, the ExpandView map provides an immediate visual representation of the enterprise's global WAN status, performance and alerts. The ExpandView map lets IT managers add Accelerators on-demand, create or remove links between devices, and boost the performance of any application or remote location - Directly from the map! Ac ce ler at o rOS 6 .1 .2 Us er Gui d e St u dy in g t h e E xpa nd Vie w Sy st em 267 Simplifying WAN Optimization ExpandView takes the complexity out of deploying WAN optimization. Once new Accelerators are powered up, ExpandView automatically updates them with all preconfigured parameters and starts collecting statistics. Generating Advanced Alerts for World-Class NOCs ExpandView generates alerts on application performance thresholds for remote Accelerators, thus enabling proactive performance management. Acceleration percentage, CPU utilization and a multitude of other parameters can be used to predict WAN performance incidents, before they happen, giving IT managers the tool to correct them. Generating Proactive Reports for Network Provisioning ExpandView lets you generate trend reports, which detail anticipated future utilization of WAN links based on previous usage and performance of the links. Such reports are useful in helping IT provision networks to accommodate business growth and expansion. R ev isi o n 2. 0 268 C h ap t er 9: Configuring Management Options Defining Scalable QoS Centralized insight into network traffic and application performance enables informed and controlled use of available bandwidth. ExpandView enables group configuration of QoS and policy prioritizing. You can publish new policies to multiple devices in a single step, and enforce QoS policy consistency by creating QoS templates. Updating ExpandView Server’s IP Address To work with ExpandView, each Accelerator must be updated with the IP address of the ExpandView server. The following AcceleratorOS CLI commands enable interaction with ExpandView by setting the ExpandView server IP address and port number: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Us in g O u t -o f -B an d M an ag em e nt Using Out-of-Band Management 269 You can manage the Accelerator remotely from a management station on a LAN external to the accelerated network. When Out-of-band management is used, Ethernet 0 cannot participate in VLAN or HSRP/VRRP, should not be part of OSPF or RIP router polling support, and should not use WCCP or RIP route injection. To use Out-of-band management: 1. Connect the Accelerator’s Ethernet 0 to the remote network. 2. Set Ethernet 0 to be removed from the Accelerator’s bridging capabilities 3. Add a separate IP address for this interface. R ev isi o n 2. 0 270 C h ap t er 9: Configuring Management Options Using SNMP The Accelerator supports SNMP versions 1, 2c and 3, functioning as an SNMP agent for monitoring performance statistics from a Network Management System (NMS). In addition, the Accelerator can send SNMP traps to the NMS and other network devices. To work with the Accelerator’s SNMP management, you have to update the network’s SNMP settings in the Accelerator. Define the following SNMP Communities and enable traps (if requested). To access configuration options: 1. Click on Setup, followed by Advanced, and then SNMP. 2. Select the Enable SNMP checkbox. 3. The default Read Community is public. 4. If you want the Accelerator to receive SNMP traps, select the Enable Traps checkbox, and enter the Community Name and Manager IP. 5. Enter the SNMP Version 3 password and then enter a new password. 6. Click the Submit button in the bottom right hand corner. i SNMP Version 3 user name is expand_user. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R ece iv in g L og E r r o r M es sa ge s Receiving Log Error Messages 271 The Accelerator can send status updates about the Accelerator to a SYSLOG server, to an email address, or to both. The following sections detail how status updates are sent: Sending Updates to a Syslog Server, on page 271 Sending Updates via Email, on page 272 Sending Updates to a Syslog Server Syslog is a method of collecting messages from devices to a server running a syslog daemon. Logging to a central syslog server helps in aggregation of logs and alerts. Accelerator devices can send their log messages to a SYSLOG service. A SYSLOG service simply accepts messages, and stores them in files or prints them according to a simple configuration file. This form of logging can provide protected long-term storage for logs. This is useful both in routine troubleshooting and in incident handling. Set the Syslog parameters to define the syslog server’s IP address and the severity level of events by which error notifications are to be sent. To set syslog parameters: 1. Click on Setup, followed by Advanced, and then Logging. 2. Enter the following parameters as necessary. R ev isi o n 2. 0 272 C h ap t er 9: Configuring Management Options Paremeter Item Description Facility The Facility setting sets the Syslog level (0-23), as follows: KERNEL 0—kernel messages USER 1—random user-level messages MAIL 2—Mail system DAEMON 3—system daemons AUTH 4—security/authorization messages SYSLOG 5—messages generated internally by syslogd LPR 6—line printer subsystem NEWS 7 —network news subsystem UUCP 8—UUCP subsystem CRON 9 —clock daemonother codes through 15 reserved for system use LOCAL0 16—reserved for local use LOCAL1 17 —reserved for local use LOCAL2 18—reserved for local use LOCAL6 19—reserved for local use LOCAL7 20 —reserved for local use LOCAL8 21—reserved for local use LOCAL9 22—reserved for local use LOCAL10 23—reserved for local use Server IP Address Enter the IP address of the Syslog server. Severity Maximum Select the maximum severity that you want to be notified about by email, the default is fatal Severity Minimum Select the minimum severity that you want to be notified about by email, the default is information Sending Updates via Email The Accelerator allows log error messages to be sent via email to notify you of Accelerator status changes. To set the email logging feature: 1. Click on Setup, followed by Advanced, and then Logging. 2. To enable email notification to be sent, ensure that the enabled checkbox in the Mail section is selected. 3. Enter the following parameters as necessary: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R ece iv in g L og E r r o r M es sa ge s Parameter Item Description From Enter the string you want to appear in the From field of the email Recipient In the email field, enter the email address to which the email should be sent and click the Add button. To delete a previously added email, highlight the address to be deleted in the Email table and click the Delete button. Subject Enter the subject that you want to appear in the subject field of the email Server IP Address Enter the IP address of the email server Server port Enter the port number that the email server uses. The default is 25 Severity Maximum Select the maximum severity about which you want to be notified by email; the default is fatal. Severity Minimum Select the minimum severity about which you want to be notified by email; the default is information 273 R ev isi o n 2. 0 274 C h ap t er 9: Configuring Management Options Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 10: Resilancy and Redundancy This chapter explains how to get added resilancy and redundancy with the use of one or more Accelerators. The features documented in this chapter are hardware specific and the Accelerator you purchased may or may not feature all of these benefits. Where noted the feature is model specific. If you want to change your Accelerator model to be able to use these features, contact your account representitve. The topics in this chapter include: RAID, on page 276 Router Redundancy Protocols, on page 278 276 C h ap t er 10: Resilancy and Redundancy RAID RAID (redundant array of independent disks) is a way of storing the same data in different places (thus, redundantly) on multiple hard disks. By placing data on multiple disks, I/O (input/output) operations can overlap in a balanced way, improving performance. Since multiple disks increases the mean time between failures (MTBF), storing data redundantly also increases fault tolerance. A RAID appears to the operating system to be a single logical hard disk. RAID employs the technique of disk striping, which involves partitioning each drive's storage space into units ranging from a sector (512 bytes) up to several megabytes. The stripes of all the disks are interleaved and addressed in order. In a single-user system where large records, such as medical or other scientific images, are stored, the stripes are typically set up to be small (perhaps 512 bytes) so that a single record spans all disks and can be accessed quickly by reading all disks at the same time. In a multi-user system, better performance requires establishing a stripe wide enough to hold the typical or maximum size record. This allows overlapped disk I/O across drives. RAID Support in Accelerators' Hard Drives There are at least nine types of RAID plus a non-redundant array (RAID-0). Accelerator models 79xx feature RAID-5 support with hot-swappable disk drives. RAID-5 Striped set with distributed parity - Distributed parity requires all drives but one to be present to operate; drive failure requires replacement, but the array is not destroyed by a single drive failure. Upon drive failure, any subsequent reads can be calculated from the distributed parity such that the drive failure is masked from the end user. The array will have data loss in the event of a second drive failure and is vulnerable until the data that was on the failed drive is rebuilt onto a replacement drive. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R AI D 277 Using the CLI, you can view the list of disk drives, the disk status, and remove faulty disks. R ev isi o n 2. 0 278 C h ap t er 10: Resilancy and Redundancy Router Redundancy Protocols Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) are router redundancy protocols that provide network resilience for IP networks, ensuring that user traffic immediately and transparently recovers from first-hop failures in network edge devices or access circuits. In HSRP and VRRP, multiple network devices can act in concert to present the illusion of a single virtual router to the hosts on the LAN, by sharing an IP address (known as a Virtual IP Address or VIP) and a MAC address. HSRP is a Router Protocol developed by Cisco (RFC 2281), while VRRP is the IETF standard for redundancy protocols (RFC 2338). The main differences between the two are that HSRP requires you to dedicate an extra IP address as a virtual IP address for the group, while VRRP takes up less network overhead by letting you use the IP address of one of the devices already in the group, or set a dedicated VIP. In HSRP the devices are all configured with a priority status within the group. In general, the device with the highest priority is naturally the Active device; the device with the next-highest priority is the Standby device that takes over in the event of Active device failure or unavailability. Dominant devices in the virtual HSRP group continually exchange status messages, enabling one device to assume the routing responsibility of another, should it stop operating for either planned or unplanned reasons. If the Active device fails, the Standby device assumes the packet-forwarding duties of the Active device. If the Standby device fails or becomes the Active device, another device is selected as the Standby device. VRRP works in much the same way. In general, the Master device is configured to have the highest priority and is active in the group. It acquires the Virtual IP address of the group, but does not have management functionality of the Virtual IP, only the transfer capabilities. The Backup devices perform the standby function. The VRRP can include many backup devices, and this protocol does not support knowing, at any given time, which backup device takes over in the event of failure. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R o ut e r R ed u nd a nc y Pro to c ol s 279 Hosts continue to forward IP packets to a consistent IP and MAC address, and the changeover of devices is transparent. The recovery time of the VRRP is about three times faster than HSRP (the HSRP default is 10 seconds instead of 3 seconds in VRRP). Accelerators can take part in HSRP and VRRP and work in tandem with the routers that provide backup for the network. The following figures display an Accelerator application working with routers in a virtual HSRP and VRRP group. The Accelerator and routers are configured with the MAC address and the IP network address of the virtual HSRP/VRRP group. The Accelerator is configured to have the highest priority and work as the Active/ Master device. It is configured with the IP address and MAC address of the virtual router and forwards any packets addressed to the virtual router. In HSRP, one of the routers acts as the Standby router, so that if, due to severe power failure or any other unlikely event, the Accelerator stops transferring packets, the router protocol gets into effect and the router assumes the duties of the Accelerator and becomes the Active device. In VRRP, both routers are configured as backup routers. Therefore, if due to severe power failure or any other unlikely event the Accelerator stops transferring packets, one of the backup routers assumes the duties of the Accelerator. HSRP The AcceleratorOS lets you set up HSRP groups, either manually or by automatic detection. The following sections describe the options for configuring HSRP groups. Enabling HSRP Automatic Detection, on page 280 Setting Manual HSRP Configuration, on page 280 R ev isi o n 2. 0 280 C h ap t er 10: Resilancy and Redundancy Autodetecting HSRP Groups, on page 498 Setting HSRP Group Number, on page 498 Enabling HSRP Automatic Detection The Accelerator can auto-detect HSRP groups on its networks and add them to its Group Table. When the groups are added, by default the Accelerator does not join the groups. i NOTE: If you have a network with multiple Accelerators, you must enable the same HSRP services on every appliance. To automatically detect all HSRP groups: 1. Click the Setup tab, followed by Networking, and then HSRP. 2. In the HSRP screen, select the Auto Detect checkbox. The HSRP table automatically fills up with the details of the HSRP groups detected on the network. 3. While the Accelerator adds these groups, by default its status in the groups is Not Joined. 4. To Join the HSRP group or to modify other HSRP parameters, highlight the HSRP group in the table and click the Edit button. Setting Manual HSRP Configuration If the Automatic detection does not find an HSRP group, or if you want to manually add or edit an HSRP group, you can modify the parameters as follows. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R o ut e r R ed u nd a nc y Pro to c ol s 281 To manually modify the HSRP configuration: 1. Click the Setup tab, followed by Networking, and then HSRP. 2. In the HSRP menu, enter the Group ID number (0 - 255), the Virtual IP address, the Priority (0 - 255), the Virtual MAC address and the status of the Accelerator in the group (whether the Joined option is Disabled or Enabled). 3. Click Add. The HSRP group immediately appears in the HSRP table. 4. To modify the information, highlight the row in the HSRP table and click the Edit button to modify the following parameters: i NOTE: If you have a network with multiple Accelerators, you must enable the same HSRP services on every appliance. Parameter Item Description Group ID You must enter a group number, even if the target group is group 0 Virtual IP Address All devices in the HSRP group must have the same Virtual IP address. Adding a virtual IP address of 0.0.0.0 puts the group into Learn mode, in which the selected group tries to learn the IP address from the network. Priority Setting the Accelerator’s priority lets you select its status in the HSRP group. If two devices in the HSRP group have the same priority, the Active router is set according to IP address. Expand does not recommend this setup. Virtual MAC Address All devices in the HSRP group must have the same Virtual MAC address. Joined Enable or Disable the Accelerator’s status in the group. Joining the group enables the Accelerator to function as any other router in the HSRP group. Authentication If Authentication is enabled in the HSRP group, the Authentication command lets you set the authentication password to communicate with the routers in the group. The default setting for the authentication command is cisco. If you change the default authentication setting, verify that all other devices in the HSRP group have the same authentication setting. R ev isi o n 2. 0 282 C h ap t er 10: Resilancy and Redundancy Parameter Item (Continued) Description Force Priority Gives the Accelerator the highest priority in the HSRP group at all times. When this setting is enabled, Preempt is also enabled automatically. Force Priority is done per group and enables the Accelerator to hold the highest priority of the selected group. Once the Accelerator is set to have the highest priority, it becomes the active router in the HSRP group. Preempt Used for determining how to react when a higher priority router joins the group. When enabled, the higher priority router prevails; when disabled, the higher priority router assumes the Standby mode until the current Active router experiences a failure. Setting the Accelerator to enable preempt is useful when you want the Accelerator to remain active as much as possible. On the other hand, the change-over between one device and another can take two to three seconds, during which the network has no default gateway, so you have to use preempt carefully. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R o ut e r R ed u nd a nc y Pro to c ol s Parameter Item (Continued) Description Hello and hold timers Set the packet rate between the devices in the HSRP group. Hello time is the interval between Hello messages (an exchange of HSRP priority and state information) and the Hold Time is the interval between a receipt of a Hello message and the presumption that the sending router/Accelerator has failed. You are advised not to change the default timer setting: 3 seconds Hello Time and 10 seconds Hold Time. These definitions comply with the recommended settings of having the Hold Time length more than three times the length of the Hello Time. Decreasing timer-default rates shortens the time that the network has without a default gateway during Active router changeover, but increases the protocol bandwidth overhead and conversely. If the Accelerator is not currently the Active device in the HSRP group, Timer settings are derived from the Active device and any timer configurations that you set in the Accelerator are not saved. All members of the HSRP group must have the same Hello Time and Hold Time. If you change the default parameters, ensure that you update all members of the HSRP group with the new parameters. HSRP over VLAN If the Accelerator is part of a VLAN group, operating with HSRP requires updating the VLAN group number (0 to 4095). 283 VRRP Unlike HSRP, you cannot configure VRRP automatically and must add it manually. R ev isi o n 2. 0 284 C h ap t er 10: Resilancy and Redundancy To manually modify the VRRP configuration: 1. Click the Setup tab, followed by Networking, and then VRRP. 2. In the VRRP menu, enter the Group ID number (0-255), the Virtual IP address, the Priority (1-254), the preempt status and the timer setting. 3. Click Add. The VRRP group immediately appears in the VRRP table. 4. To modify the information, highlight the row in the VRRP table and click the Edit button to change the following parameters: Parameter Item Description Group ID You must enter a group number, even if the target group is group 0. Accelerator VRRP does not have a default group number. Virtual IP All devices in the VRRP group must have the same Virtual IP address. Priority Setting the Accelerator’s priority lets you select its status in the VRRP group. If two devices in the VRRP group have the same priority, the Active router is set according to IP address. Expand does not recommend this setup. Once the Accelerator is set to have the highest priority, it becomes the active router in the VRRP group. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R o ut e r R ed u nd a nc y Pro to c ol s Parameter Item (Continued) Description Preempt Preempt is used for determining how to react when a higher priority router joins the group. When enabled, the higher priority router will prevail, when disabled, the higher priority router will assume the Standby mode until the current Active router experiences a failure. Setting the Accelerator to enable preempt is useful when you want the Accelerator to remain active as much as possible. On the other hand, the change-over between one device and another can take two to three seconds, during which the network has no default gateway, so you have to use preempt carefully. Timer Sets the interval between the Hello messages sent between VRRP group members. All devices in the VRRP group must have the same Timer setting. If for some reason you have to modify this setting, you should modify it for all devices in the group. The default setting is 1. 285 R ev isi o n 2. 0 286 C h ap t er 10: Resilancy and Redundancy Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 11: Security This chapter describes the various methods for ensuring security within the Accelerator. This chapter includes the following sections: Studying the AcceleratorOS AAA, on page 288 Configuring AAA via the WebUI, on page 290 Auditing Administration Activities, on page 294 Locking/unlocking the Keypad, on page 295 288 C h ap t er 11: Security Studying the AcceleratorOS AAA The Accelerator lets you manage access by means of Authentication, Authorization, and Accounting (sometimes called Auditing), also known as AAA. The Accelerator, normally installed in enterprises, government and military organizations, requires strict security for the networks with which it interacts. Therefore, the Accelerator’s AAA enables the system to be secured. Authentication—Validates users' identity in advance of granting login. The Accelerator’s authentication lets you define the users and set the location in which passwords are stored. Each user must be defined locally in the Accelerator as well as in remote AAA servers. Authorization—Lets users access networks and commands. The Accelerator’s authorization lets you define the users and their roles. Accounting—Tracks usage patterns of individual users, service, host, time of day, day of week, and so on. The Accelerator’s accounting lets you receive logs detailing who signed in, when, and whether their attempt to access the Accelerator succeeded or failed. To view the log of these events, use the logging > show events command. These events can be sent via email or sent to a Syslog server. The Accelerator’s AAA functionality includes the Accelerator’s ability to use remotely accessed user-repositories for authenticating users. This functionality enables controlling different levels of users in the system with different authorities and lists the auditing functions performed for various operations. You can configure the Accelerator to make use of a security server via either the TACACS+ or RADIUS security protocols, or both. Authentication is the part of the system that lets users define how they authenticate to the system, allowing the authentication to be based on external authentication servers. On the authentication side, the new functionality will include per-user settings to control access to the Accelerator as well as passwords quality verification functionality and password aging (to be implemented at a later stage). The Accelerator’s AAA supports multiple users per Accelerator, allowing end-users to define additional accounts besides the default expand user. AAA includes control over provided management services, and allows limiting access to certain management options available on the Accelerator, as well as control access to the services from a defined set of sources (subnets for ACL). Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Stu d yi n g th e A cce le rat o rOS A A A 289 Setting different user roles, allowing different access levels to the system is supported with pre-defined roles available in the system. Definition of new roles is user-configurable. AAA includes auditing of all major operations performed on the Accelerator into log entries saved in the system log files and routable to email message, syslog server and SNMP trap. R ev isi o n 2. 0 290 C h ap t er 11: Security Configuring AAA via the WebUI Configuration of AAA parameters is accomplished via the WebUI, in several steps: Configuring Users, on page 290 Setting Authentication Preferences, on page 291 Defining the Security Settings, on page 293 Configuring Users To add a new Accelerator user: 1. Click on Setup followed by Security. 2. In the Users menu, enter a name for the user in the User Name field. 3. Scroll down in the User Role field to select one of the following: Administrator—complete access to the Accelerator and its commands. Only Administrator users can modify AAA settings. Monitor—access the Accelerator’s CLI but cannot modify configuration. NetAdmin—complete access to the Accelerator and its commands with the exception of the Security commands and WAFS management screen. WAFS-Administrator—complete access to WAFS management screen and console, in addition to web acceleration and DNS configuration. 4. If a local password is to be set for this user, select the Enable Local Password checkbox, then enter and confirm a new password for this user. If the checkbox is not checked, only remote authentication servers will be able to authenticate passwords. Passwords must be at least 6 characters in length and cannot be Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C o nf ig u r in g A AA v ia t he Web U I 291 keyboard sequences (qwertyu, 123456), palindromes, or simple recognized dictionary words. i 5. Click the Add button to apply settings. Note: when working with a TACACS server, you must add each user name into the Accelerator. To modify an Accelerator user: 1. Click on Setup followed by Security. 2. In the Users menu, click on the name of the user in the Users Table. 3. Modify details as needed. Click the Submit button to apply settings. Deleting Users To delete an Accelerator user: 1. Click on Setup followed by Security. 2. In the Users menu, highlight the line in the Users Table that includes the name of the user to be deleted. Click the delete button. 3. Click the Submit button to apply settings. Setting Authentication Preferences The Authentication screen lets you set Authentication Servers (Radius, TACACS+ and Local) and manage these servers and their preference order in the Accelerator. S e t t i n R ev isi o n 2. 0 292 C h ap t er 11: Security g Authentication Servers To enter authentication servers: 1. Click on Setup followed by Security. 2. In the Authentication menu, click the add button above the Authentication Servers Table. 3. In the Add New Authentication Server dialog box, enter the following information. Name Descripion Server Name The name of the server you want to add. Server Type The server type (Radius or Tacacs). IP Address The new server’s IP address. Server Port The server’s port. Server Order Defines whether the server is the first, second or third to be addressed. Encryption Key The server’s encryption key Server Timeout Time period after which the connection times out. Setting the Authentication Method The authentication method lets you define which servers are to be checked. If more than one authentication type is used, select the server types in the order in which they are to be authenticated. To set the authentication method: 1. Click on Setup followed by Security. 2. In the Authentication menu, scroll down in the 1 field to set the first level of Authentication. In the 2 field set the second level of Authentication and so on. 3. Click the Submit button to apply settings. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C o nf ig u r in g A AA v ia t he Web U I 293 Defining the Security Settings The Settings screen lets you define security settings, such as which access methods to use when connecting to the Accelerator and the maximum failed login attempts before an account would be disabled. By default, all transport types are set to Enabled, except FTP and TFTP that are set to Disabled. To define security settings: 1. Click on Setup followed by Security. 2. In the Settings menu, select the checkboxes of the types of access methods allowed for connecting to the Accelerator. 3. Click the Submit button to apply settings. R ev isi o n 2. 0 294 C h ap t er 11: Security Auditing Administration Activities The Audit screen lets you select which administration activities to audit (for example: changing the configuration, creating links and adding users.) To select which activities to audit: 1. Click the Setup tab, followed by Security, and then Audit. 2. In the Accelerator’s audit table, select or deselect the boxes that refer to the activities you want to audit or to stop auditing. 3. Click Submit. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e L oc ki ng /u n lo c kin g t h e Ke ypad Locking/unlocking the Keypad 295 The LCD keypad on the front panel of the Accelerator 4820/4830/4920/4930, the Accelerator 1820 and Accelerator 6830/6930/6840/6940 can be locked. To set the lock key combination sequence, see section Installing the Accelerator, on page 13. To lock/unlock the keypad via the WebUI: 1. Click the Setup tab, followed by Security, and then Keypad. 2. In the Keypad menu, from the drop-down menu, select either Locked, AutoLocked or Unlocked. 3. Click the Submit button. Setting the Keypad Lock Definitions Selecting the Auto-Locked value for the keypad lets you set the number of times after which the keypad will automatically lock, as well as the key sequence to be entered for unlocking the keypad once it is locked. To set the auto-lock timer: 1. In the Keypad screen, enter a number (in seconds) into the auto-lock timer field. 2. Click the Submit button. To set an unlock sequence: The unlock sequence sets a the sequence of keypad buttons that must be pressed in order to unlock the LCD. The default is as follows: Up arrow, Down arrow, Right arrow, Left arrow, Enter button. R ev isi o n 2. 0 296 C h ap t er 11: Security The unlock sequence set should be a combination of the buttons, in any order, up to five depressions. 1. In the Keypad screen, in the Unlock Sequence fields, scroll down in the fields to select the button to be pressed in the order intended. 2. Click the Submit button. Defining Other LCD Settings Turning ByPass On Locking the Keypad You can lock the Accelerator’s keypad via the LCD, the WebUI or the CLI. To unlock the keypad, enter the unlock sequence. The default unlock sequence is Right button, Left button, Up button, Down button, Enter. You can modify the lock sequence via the WebUI as described in section Locking/unlocking the Keypad, on page 295, or via the CLI, as described in section Unlocking or Locking the Keypad, on page 581. Product ID Ac ce ler at o rOS 6 .1 .2 Us er Gui d e L oc ki ng /u n lo c kin g t h e Ke ypad 297 Management IP Management Mask R ev isi o n 2. 0 298 C h ap t er 11: Security Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 12: Troubleshooting This chapter describes troubleshooting procedures for the Accelerator and explains Accelerator alerts and events, as follows: Carrying out the Troubleshooting Procedure, on page 300 Recovering the Password, on page 301 Checking the Event Log, on page 302 Displaying Information for Troubleshooting, on page 305 Checking the Link Status, on page 307 Checking Ethernet Settings, on page 308 Checking Lack of Acceleration, on page 311 Checking Link Malfunction, on page 312 300 C h ap t er 12: Troubleshooting Carrying out the Troubleshooting Procedure If there is a problem with your Accelerator, try using the following steps to help diagnose the source of the problem: Check the Event log Check the topology and host settings - is the default gateway set correctly? What is being affected? All the links? Particular links? Use Tools to find the source of the problem Put the local Accelerator and then the remote Accelerator into bypass mode Ac ce ler at o rOS 6 .1 .2 Us er Gui d e R e cover i n g t h e Pa ss wo rd R ec ov eri n g th e Pa ssw o rd 301 If you forget your password, you can use the reset command from the login prompt instead of the password. This command deletes all passwords and configurations and resets all of the Accelerator’s settings, including the device’s passwords, to their default values. After resetting, you can use the default login (expand) and password (Expand) to log in and reconfigure the Accelerator. Trying 172.16.31.12 (PORT:23)... Connected to 172.16.31.12... AcceleratorOS, Accelerator 6800 Series Version v6.1(2) (Build3.53) login: reset i NOTE: To accomplish this result, use a Console connection. R ev isi o n 2. 0 302 C h ap t er 12: Troubleshooting Checking the Event Log The first thing to do when you encounter problems with Accelerator performance is to check the Event log for any unusual errors. The following logging levels are supported: Checking Checking Checking Checking Info Events, on page 302: Informational messages Warning Events, on page 302: Warning conditions exist Error Events, on page 302: Error conditions exist Fatal Events, on page 303: Unit failure These levels are related to the severity levels used by email and broadcast functions. When used with these, the user can define the minimum and maximum event logging (range) that will be emailed or broadcasted. Checking Info Events Info events notify regarding status changes that occur in the normal operation of the system, for example: 06-Jun-07 10:38:41 <INFO> #1 Add QoS global rule, rule id=1, direction outbound Checking Warning Events Warning events identify issues or configuration errors within the Accelerator. The system continues to run, but action may be required to return the Accelerator to normal operating standards, for example: 06-Jun-07 10:29:07 <WARNING> #1 HSRP Message authentication has failed due t11 Checking Error Events Error events occur sporadically, but the Accelerator easily recovers from them, for example: 06-Jun-07 10:38:41 <ERROR> #1 Configuration-load: 'Line# 16, Error:Warning Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ch e cki n g th e Ev en t L og 303 Checking Fatal Events Fatal events are events for which you have to take corrective action in order to return the Accelerator to operation, for example: 06-Jun-07 07:37:59 <fatal> #1 TWDSupervisor.cpp(26) TWDSupervisor:TWDSupervisor Watch Dog: Reboot system due to a failure of client, named: TelnetDaemon. The Accelerator event log records changes in the state of Accelerator links and changes to configuration, saving them in a list format. In the CLI, use the following commands to view events. ACC1# show events 06-Jun-07 10:29:07 <WARNING> #1 HSRP Message authentication has failed due t11, 06-Jun-07 10:29:07 <WARNING> #1 _peer.cppLink 222.0.0.1 status changed from acc 29-Jun-07 10:19:19 <INFO> #2 Link ID 1 was Updated 29-Jun-07 10:20:51 <INFO> #1 Subnets for Remote link CP Id 1 changed 29-Jun-07 10:38:41 <INFO> #1 Link 1 was Added 29-Jun-07 10:38:41 <INFO> #1 Add QoS global rule, rule id=1, direction outbound 29-Jun-07 10:38:41 <ERROR> #1 Configuration-load: 'Line# 16, Error:Warning Studying Log Message Formats Log messages are displayed in the following format: TIMESTAMP: <LEVEL of SEVERITY> #OCCURRENCE: Message-text; Timestamp: Log date and time, in the following format: dd/mmm/ yy hh:mm:ss Level of Severity: Debug, information, warning, error, or fatal. Occurrence: The number of times this log has been recorded. Message-text: Text string containing detailed information about the event being reported. Check the Accelerator’s system time when viewing any event the Accelerator generates. All events are given a timestamp relative to the Accelerator’s local time. R ev isi o n 2. 0 304 C h ap t er 12: Troubleshooting To view the Accelerator system time: ACC1#show clock System time is: THU SEP 04 17:37:57 2003 Time zone offset: 0 minutes Ac ce ler at o rOS 6 .1 .2 Us er Gui d e D is p lay in g I nf o r m at io n f o r Tro ub le sh o o ti ng Displaying Information for Troubleshooting 305 The Accelerator’s show tech-support command lets you aggregate all necessary troubleshooting information in the Accelerator via one simple command providing a window into the Accelerator’s inner workings and configuration. Displaying Information via the WebUI To use the WebUI to display Information for Troubleshooting: 1. Click on Tools, followed by General Tools. 2. Click the Show Technical Support button. The Technical Support dialog box appears: 3. Click the Save button to save this data in the requested location, as either a text or an HTML file. 4. Send an E-mail to technical support at TAC@expand.com and attach the file. Alternatively, you can contact customer support in the methods described in Contacting TAC, on page 389. R ev isi o n 2. 0 306 C h ap t er 12: Troubleshooting Displaying Statistics in a Compressed, Archived File The statistics displayed by using one of the two methods described above is one of the logs that you can concentrate to create one compressed archive file. For details, see section Archiving Log Files, on page 327. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Checking the Link Status C he ck in g t he L in k Stat u s 307 The status of the link may point to the source of a problem. An initial probe is used during the Accelerator’s initial link connection stage. If this probe fails, it attempts to retry until the Accelerator responds. If a link is inactive, a keepalive will be automatically sent to the remote Accelerator. If 10 keepalive packets do not receive a response, the Accelerator assumes that the remote Accelerator is down and the local Accelerator automatically passes the link traffic transparently through to the WAN. ACC1# show interface link summary -------------------------------------------------------LINK|DEST IP ADDRESS|DESCRIPTION|BANDWIDTH|LINK STATUS ----+---------------+-----------+---------+----------1 | 10.2.0.6 non | N/A | L-10.2.0.6|15000/N/A |dropped | non-link | 100000/ N/A | virtual --------------------------------------------------------- Link Status states are as follows: Link Status Initialize The remote Accelerator is initializing. Inactive The remote Accelerator is not active. Trying to Connect Link is establishing connection. Negotiating Link parameters are being negotiated (cache size, and so on). Remote Found Link is active. Accelerating Link is active and acceleration is on. Active Link is active and the link is tunnelling but not accelerating traffic. Active can be either No local license, meaning that the link is inactive because the local Accelerator is not properly licensed; or No remote license, meaning that the remote Accelerator is not properly licensed. Drop Communication has been lost. Load Error Internal error occurred during definition of the link in the system. Virtual A Virtual link (no far-end Accelerator). Unknown Remote Accelerator is not available. R ev isi o n 2. 0 308 C h ap t er 12: Troubleshooting Checking Ethernet Settings Although Ethernet level compatibility is not an issue unique to the Accelerator, it should be considered in all hardware installations. If an Accelerator goes into hardware bypass, the two devices that are cabled to the Accelerator are directly connected, and any incompatibilities between them may cause problems. Ensure that Ethernet settings are correct. As a symptom of incorrect Ethernet settings, discarded packets and loss of connectivity may be experienced on the Accelerator. You can check this by using the appropriate show interface ethernet commands, as follows. ACC1# show interface ethernet 0/0 ? <cr> continuous continuous output ACC1# show interface ethernet 0/0 Description.............................ethernet 0/0 MAC.....................................00:02:B3:C8:4E:9C Hardware type...........................mii Link mode...............................auto (100Mbit-Full) link is up Link detected...........................yes Supports auto-negotiation...............yes Supports link modes.....................10baseT/Half 10baseT/ Full 100baseT/Half 100baseT/Full Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C h eck in g E t h er n e t S et t in g s LAN throughput data System Up Since Clear Last 30 Secs In Bytes 3826461 N/A N/A In Packets 23240 N/A N/A Dropped In Packets 0 N/A N/A Out Bytes 159363519 N/A N/A Out Packets 1723079 N/A N/A Dropped Out Packets 0 N/A N/A LAN throughput data System Up Since Clear In Frame Error 0 N/A N/A In Overruns 0 N/A N/A Dropped In Packets 0 N/A N/A In Total Errors 0 N/A N/A Out Collisions 0 N/A N/A Out Lost Carrier 92 N/A N/A Out Underruns 0 N/A N/A Out Total Errors 92 N/A N/A Last 30 Secs ACC1#show interface ethernet [0 | 0/0 | 0/1] [continuous] Command Purpose 309 Lists all ethernet interface configuration and statistics information per interface, 0, 0/0 and 0/1. Continuous enables the entire output instead of one screen at a time. Ensure that Speed and Duplex settings are set correctly. Expand recommends using the following command to manually set Speed and Duplex values: Command Syntax Description Command Modes link-mode 100Mbit-full 100 Mega bit full duplex 100Mbit-half 100 Mega bit half duplex 10Mbit-full 10 Mega bit full duplex 10Mbit-half 10 Mega bit half duplex auto Auto Enters the mode to set Ethernet interface 0 parameters. configure > interface ethernet (ethernet number) R ev isi o n 2. 0 310 C h ap t er 12: Troubleshooting Default N/A Example Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1# configure ACC1(config)# interface ethernet 0 ACC1(interface)# link-mode 10Mbithalf C he ck in g L ac k o f A cc el era ti on Checking Lack of Acceleration 311 If applications are not being accelerated, often the source of the problem is missing information in the subnets, links and routing tables. Check the following tables to ensure that they contain everything they should: Subnets table—contains all subnets that are part of the Accelerator’s network that need to be advertised. Links table—contains all remote networks that the Accelerator is aware of for Acceleration and QoS, and remote networks that have no Accelerator for QoS only. Local and Remote subnets—use the CLI show subnets command to view all local and remote subnets known to the Accelerator. Routing table—must list all next hops necessary to reach all remote networks. If acceleration percentages are not as expected, it is often due to one or more of the following reasons: Traffic is not associated with the correct link Another link is being used QoS classification (application definition) is wrong QoS rule order is incorrect for the setup Check link utilization - if the link is underutilized, check for greedy applications Accessing Remote Devices If all necessary connections have been made, but the Accelerator is still not functioning as expected, use the tools Pinging via the WebUI and Sending a Traceroute Packet to check routes to remote Accelerators and networks. Can you access a remote device? Can you access the remote Accelerator? Can you access the remote router? From the remote Accelerator, can you ping its router? R ev isi o n 2. 0 312 C h ap t er 12: Troubleshooting Checking Link Malfunction If the link is not operating as expected, ensure that the Accelerator configuration reflects the hardware and software infrastructure. Some external devices may require that the Accelerator be transparent - consider using RTM encapsulation. Perhaps performance is being affected by misapplied MPLS or load balancing in the network. Consider the following: Is bypass disabled on the other side of the link? Are the bandwidth settings correct? Is Acceleration enabled on both sides of the link? Is the MTU size set correctly and not larger than the maximum MTU of the link path? Are the correct subnets advertised to the remote site? Is there bandwidth oversubscription on the WAN or on a link? Are packets being dropped on the link? In case there is a firewall in the path, are IPComp and TCP port 1928 open? Is the correct link destination address configured? Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chec ki ng for C o rrupte d Termi na l Checking for Corrupted Terminal 313 If the terminal settings become corrupted, exit to the login prompt and log into the Accelerator as the user named 'r' with no password. This will reset the terminal settings and let you log in as "expand", as usual. Ensure that the terminal settings on your terminal emulation are correct: 9600 baud; 8 data bits; no parity; 1 stop bit; no flow control. R ev isi o n 2. 0 314 C h ap t er 12: Troubleshooting Checking HSRP Malfunction Ensure that you “join” the HSRP group. In AcceleratorOS 5.0 and above, after HSRP group parameters are updated, the Accelerator must join the group. In the CLI this is accomplished using the join command. Ensure that the correct HSRP group is configured - check the configuration on the other units in the group. Ensure that the correct Priority is configured so the Accelerator does not conflict with the same priority on another unit in the group. Ensure that the correct virtual IP address is configured. If authentication is used, ensure that you use the same password (default cisco) Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C h ec kin g Qo S Ma lf un c ti on Checking QoS Malfunction 315 QoS on a non-link: if QoS is not functioning as expected for non-link traffic, it could be due to the definition of the local subnet. If a local subnet is not defined as LOCAL, the Accelerator QoS and monitoring features do not function properly. Ensure that all local subnets are defined as local. Ensure that the bandwidth statements on the links are correct. Check that the policy rules are applied on the correct links. Check that the application definitions are correct. R ev isi o n 2. 0 316 C h ap t er 12: Troubleshooting Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter 13: Using the Accelerator Tools The Accelerator Tools let you manage AcceleratorOS upgrade versions, save and replace the Accelerator’s configuration file and perform tasks such as traceroute and ping. This chapter contains the following sections: Upgrading the AcceleratorOS Software, on page 318. Using the Configuration Tools, on page 320. Using the General Tools, on page 322. Managing User Files, on page 325. Viewing System Information, on page 326. Archiving Log Files, on page 327. Enabling Accdump, on page 328. 318 C h ap t er 13: Using the Accelerator Tools Upgrading the AcceleratorOS Software You can upgrade the AcceleratorOS software by uploading software from a remote server or from the local drive. To upgrade software: 1. Click on the Tools tab, followed by Upgrade. 2. Scroll down in the Copy method field, to select the way the file will be copied (FTP, TFTP or HTTP). 3. In the fields provided, enter the user name, password and IP address of the device from which the files are to be copied. 4. Enter the path to the file, followed by the file name (the file will be a .tgz file). 5. Click the Submit button to copy the file to the user area. 6. Reboot the Accelerator with the new file name. After rebooting, the Accelerator extracts the file and runs it. 7. Select Locally stored on Accelerator to upgrade to an AcceleratorOS version that is stored locally on the Accelerator, in case of a hard drive-based Accelerator. Alternatively, if your Accelerator uses a Compact Flash card, at least 10 MB of free space is provided on the card for file extraction. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e U pgra di n g the Ac ce le ratorOS S oft wa re i 319 NOTE: If you are running a version of AcceleratorOS previous to 5.0(6), note that two new preconfigured applications were added in this version that may affect user-defined applications on the same ports. If applications have been configured for port of 1928 (saved for the expand-internal application) or 2598 (citrix-ica-sr), rename these applications exactly as in the preconfigured application before performing an upgrade. If an application exists for a list of ports or range of ports that include the specified port numbers (1928 and 2598), remove these ports from the list or range, and create applications expand-internal with port 1928, and citrix-ica-sr with port 2598. Then change the policy-rules to match also this application. R ev isi o n 2. 0 320 C h ap t er 13: Using the Accelerator Tools Using the Configuration Tools Changes made to the Accelerator’s configuration are automatically saved to the Accelerator’s Running Configuration and are applied until changed or until the Accelerator is shut down. Any changes that you want to remain configured on the Accelerator, even after shutdown, must be saved to the Accelerator’s Startup Configuration. To save a startup configuration: 1. In the WebUI, make any changes to be saved. 2. Scroll down in the Copy method field, to select the way the file is copied (FTP, TFTP or HTTP). i NOTE: The running configuration is saved as the startup configuration, and therefore all changes made to the Accelerator since its last shutdown are now saved as the startup configuration 3. Click on Tools, followed by Configuration Tools. 4. Click the Write Startup Configuration button. To erase the startup configuration saved on the Compact Flash Card: 1. Click on Tools, followed by Configuration Tools. 2. Click the Erase Startup Configuration button To export the startup configuration: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e U sin g t h e Co n fi g ur at io n To ol s 321 Exporting the startup configuration opens a web page dialog that displays the Accelerator’s startup configuration in CLI command format. You can either save this file for future reference or upload it to other Accelerators. 1. Click on Tools, followed by Configuration Tools. 2. Click the Export Startup Configuration button. To export the running configuration: Exporting the running configuration opens a web page dialog that displays the Accelerator’s running configuration in CLI command format. You can either save this file for future reference or upload it to other Accelerators. 1. Click on Tools, followed by Configuration Tools. 2. Click the Export Running Configuration button. To import the startup configuration: Importing the startup configuration opens a web page dialog that lets you browse to select a configuration file to be uploaded to the Accelerator. 1. Click on Tools, followed by Configuration Tools. 2. Click the Import Configuration button. R ev isi o n 2. 0 322 C h ap t er 13: Using the Accelerator Tools Using the General Tools General tools are provided to let you use basic networking tools and commands via the Accelerator WebUI. The general tools are as follows: Pinging via the WebUI, on page 322 Sending a Traceroute Packet, on page 323 Rebooting the Accelerator via the WebUI, on page 323 Show Technical Support - see section Displaying Information via the WebUI, on page 305 Pinging via the WebUI The Accelerator lets you use the WebUI to Ping network devices and remote Accelerators. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e U si n g th e G en e ral To ol s 323 To ping a network device: 1. Click Tools followed by General Tools. 2. Under Ping, in the Destination IP Address field, enter the IP address of the device to which the ping is to be sent. 3. In the Packet Size field, enter the size of the ping packets to be sent (default is 64 bytes). 4. In the Number of Times field, enter the number of times to try sending packets to the remote device. 5. Click the Ping button. Sending a Traceroute Packet The Accelerator lets you send a traceroute packet to network devices and remote Accelerators from the Accelerator via the WebUI. To send a traceroute: 1. Click Tools followed by General Tools. 2. Under Traceroute, in the Destination IP Address field, enter the IP address of the device to which the ping is to be sent. 3. In the Maximum Number of Hops field, enter the maximum length the packet can travel before arriving at the designated destination (default is 30). 4. Click the Trace Route button. Rebooting the Accelerator via the WebUI The AcceleratorOS lets you reboot the Accelerator via the WebUI. Rebooting the Accelerator in this way does not save changes from the current running configuration to the Startup configuration. The Accelerator reboots using the previously saved Startup configuration, unless other changes were saved. To reboot the Accelerator: 1. Click Tools followed by General Tools. 2. Under Reboot, click the Reboot button. R ev isi o n 2. 0 324 C h ap t er 13: Using the Accelerator Tools Gathering Statistics for Technical Support In the unlikely event of Accelerator malfunction or error, it may be necessary to gather many statistics for Expand Networks’ Technical Support. You can use one command to gather all necessary information. To view Accelerator troubleshooting statistics: 1. Click Tools followed by General Tools. 2. Under Tech Support, click the Show Technical Support button. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Managing User Files M a na g in g Us er F ile s 325 The User Files screen lets you manage the files that are located in the User Area of your Flash card (or hard drive, for hard drive-based Accelerators). If more space is needed on the Flash card/hard drive, you can use the User Files screen for deleting unneeded files. The date listed for the file is the date when the file was copied. To remove files from the Flash card or hard drive: 1. Click Tools followed by User Files. 2. Highlight the files to be deleted. 3. Click the Delete button. R ev isi o n 2. 0 326 C h ap t er 13: Using the Accelerator Tools Viewing System Information The System Information screen lets you view information regarding several aspects of the system, such as the CPU operating frequency, CPU utilization and memory utilization. To display system information in the Accelerator’s WebUI, click Tools followed by System Information. Almost all parameters shown in this screen are for display only and cannot be changed. The only parameter that you can set is Requested Maximum Links. To set up the requested maximum links: 1. Click Setup followed by My Accelerator. 2. Select the Basic tab. 3. Under Basic, click the Advanced Setting Configuration button. 4. In the Maximum Links section, enter a value in the Requested Max Links field. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Archiving Log Files A rch iv in g L o g F ile s 327 The log archiving feature lets you concentrate all existing log archives in the Accelerator, to create one compressed archive file. You can create archive files for the following types of logs: AOS Webcache WAFS Statistics To create an archive log file: 1. Click Tools followed by Archiving. The following screen appears: 2. Use the Log Archive Prefix field to set the prefix for the log file you want to create (default: acclog). The suffix is predetermined by the system (time stamp). 3. Click the Create Log Archive button to create a new log archive. The newly created log file now appears in the log archive files table. To download one file or more, select these files in the table and click the Download button. To delete one file or more, select these files in the table and click the Delete button. R ev isi o n 2. 0 328 C h ap t er 13: Using the Accelerator Tools Enabling Accdump i NOTE: This feature is only available to Accelerators that are configured with a hard drive. The Accdump feature lets you download and display tcpdump information from the system, namely: to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is connected. You can capture the tcpdump information from various sources, and select whether to receive this information from all these sources or only from a single source. To enable Accdump: 1. Click Tools followed by Accdump. 2. Click on the scroll box near the Accdump field, and select the Enabled option to start the Accdump operation. 3. Under Interface, select whether to enable all interfaces (Any), none available (N/ A) or a particular interface. 4. Under Number of Files, you can select the Auto option, in which case the default number of files (100) and file size (10MB) is used. Alternatively, select Other and insert your customized values. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e E n ab li n g Ac cd u mp i 329 NOTE: The number of files cannot exceed 999, and the maximum size of all files combined must not exceed 1GB. Note too, the files are saved in a cyclic manner. 5. If you want to use one or more optional flags, enter these flags in the Optional Flags field. For a detailed description of the optional flags, see appendix tcpdump Optional Flags, on page 391. 6. If you do not want to dump all of the packets (default), you can use the Filter Expression field to intercept only packets that come from a specific source or IP address, are destined to a specific port or IP address, or belong to a specific type. Use the File Format scroll box to select in which file format the files are to be saved and downloaded to the local host. The available types are Pcap (saves the default format) and Enc (reformats the file). Having set all the requested definitions, you are now ready to enable Accdump and download the tcpdump files. Alternatively, if you want to revert to default values, click the Set Default Values button and confirm this operation. 7. Click the Submit button. 8. Click OK to confirm the operation. To stop the Accdump operation, click on the scroll box near the Accdump field and select the Disabled option. When you enable the Accdump feature again, all existing Accdump files are deleted. To download Accdump files: 1. In the Accdump Files Table, select the checkbox near the files you want to download. 2. Click the Download button. You are prompted that downloading the Accdump files will delete the existing files. 3. Click OK. The dialog box that appears now requests you to select a location for saving the file. 4. Select the requested location and click Save. R ev isi o n 2. 0 330 C h ap t er 13: Using the Accelerator Tools Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Appendix A: NetFlow Monitored Statistics The following table lists all of the Version 9 Field type definitions for statistics that can be collected from the Accelerator and sent to the NetFlow server. Field Type Value Length (bytes) Description IN_BYTES 1 N (default is 4) Incoming counter with length N x 8 bits for number of bytes associated with an IP Flow. IN_PKTS 2 N (default is 4) Incoming counter with length N x 8 bits for the number of packets associated with an IP Flow FLOWS 3 N Number of flows that were aggregated; default for N is 4 PROTOCOL 4 1 IP protocol byte SRC_TOS 5 1 Type of Service byte setting when entering incoming interface TCP_FLAGS 6 1 Cumulative of all the TCP flags seen for this flow L4_SRC_PORT 7 2 TCP/UDP source port number for example: FTP, Telnet, or equivalent IPV4_SRC_ADDR 8 4 IPv4 source address SRC_MASK 9 1 The number of contiguous bits in the source address subnet mask, namely: the subnet mask in slash notation INPUT_SNMP 10 N Input interface index; default for N is 2, but you can use higher values L4_DST_PORT 11 2 TCP/UDP destination port number for example: FTP, Telnet, or equivalent IPV4_DST_ADDR 12 4 IPv4 destination address DST_MASK 13 1 The number of contiguous bits in the destination address subnet mask, namely: the subnet mask in slash notation OUTPUT_SNMP 14 N Output interface index; default for N is 2, but you can use higher values IPV4_NEXT_HOP 15 4 IPv4 address of next-hop router SRC_AS 16 N (defau lt is 2) Source BGP autonomous system number where N could be 2 or 4 332 C h ap t er A: Field Type (Continued) Value DST_AS 17 N (defau lt is 2) Destination BGP autonomous system number where N could be 2 or 4 BGP_IPV4_NEXT_ HOP 18 4 Next-hop router's IP in the BGP domain LAST_SWITCHED 21 4 System uptime at which the last packet of this flow was switched FIRST_SWITCHED 22 4 System uptime at which the first packet of this flow was switched IPV6_SRC_ADDR 27 16 IPv6 Source Address IPV6_DST_ADDR 28 16 IPv6 Destination Address IPV6_SRC_MASK 29 1 Length of the IPv6 source mask in contiguous bits IPV6_DST_MASK 30 1 Length of the IPv6 destination mask in contiguous bits IPV6_FLOW_LABE L 31 3 IPv6 flow label as per RFC 2460definition SAMPLING_INTER VAL 34 4 When using sampled NetFlow, the rate at which packets are sampled for example: a value of 100 indicates that one of every 100 packets is sampled SAMPLING_ALGO RITHM 35 1 The type of algorithm used for sampled NetFlow: 0x01 Deterministic Sampling,0x02 Random Sampling FLOW_ACTIVE_TI MEOUT 36 2 Timeout value (in seconds) for active flow entries in the NetFlow cache FLOW_INACTIVE_ TIMEOUT 37 2 Timeout value (in seconds) for inactive flow entries in the NetFlow cache ENGINE_TYPE 38 1 Type of flow switching engine: RP = 0, VIP/Linecard = 1 ENGINE_ID 39 1 ID number of the flow switching engine TOTAL_BYTES_EX P 40 N (defau lt is 4) Counter with length N x 8 bits for bytes for the number of bytes exported by the Observation Domain TOTAL_PKTS_EXP 41 N (defau lt is 4) Counter with length N x 8 bits for bytes for the number of packets exported by the Observation Domain TOTAL_FLOWS_E XP 42 N (defau lt is 4) Counter with length N x 8 bits for bytes for the number of flows exported by the Observation Domain IP_PROTOCOL_VE RSION 60 1 Internet Protocol Version Set to 4 for IPv4, set to 6 for IPv6. If not present in the template, then version 4 is assumed. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Length (bytes) Description 333 Field Type (Continued) Value Length (bytes) DIRECTION 61 1 Flow direction: 0 - ingress flow, 1 - egress flow IPV6_NEXT_HOP 62 16 IPv6 address of the next-hop router BPG_IPV6_NEXT_ HOP 63 16 Next-hop router in the BGP domain IPV6_OPTION_HEA DERS 64 4 Bit-encoded field identifying IPv6 option headers found in the flow MPLS_LABEL_1 70 3 MPLS label at position 1 in the stack MPLS_LABEL_2 71 3 MPLS_LABEL_3 72 3 MPLS label at position 3 in the stack MPLS_LABEL_4 73 3 MPLS label at position 4 in the stack MPLS_LABEL_5 74 3 MPLS label at position 5 in the stack MPLS_LABEL_6 75 3 MPLS label at position 6 in the stack MPLS_LABEL_7 76 3 MPLS label at position 7 in the stack MPLS_LABEL_8 77 3 MPLS label at position 8 in the stack MPLS_LABEL_9 78 3 MPLS label at position 9 in the stack MPLS_LABEL_10 79 3 MPLS label at position 10 in the stack IN_ PERMANENT _BYTES 85 N (defau lt is 4) Running byte counter for a permanent flow IN_ PERMANENT _PKTS 86 N (defau lt is 4) Running packet counter for a permanent flow Description MPLS label at position 2 in the stack When extensibility is required, the new field types are added to the list. The new field types have to be updated on the Exporter and Collector but the NetFlow export format would remain unchanged. In some cases the size of a field type is fixed by definition, for example PROTOCOL, or IPV4_SRC_ADDR. However, in other cases they are defined as a variant type. This improves the memory efficiency in the collector and reduces the network bandwidth requirement between the Exporter and the Collector. As an example, in the case IN_BYTES, on an access router it might be sufficient to use a 32 bit counter (N = 4), whilst on a core router a 64 bit counter (N = 8) would be required. All counters and counter-like objects are unsigned integers of size N * 8 bits. R ev isi o n 2. 0 334 C h ap t er A: Template Fields The following is a list of NetFlow version 9 template fields exported for each predefined Expand template: full, long and short. Full Template %B YT E S %P K TS %P RO T % TO S % T CP _F L AG S % L4 _ SR C_ P OR T % IP _S R C_ AD D R % SR C_ M AS K % IN P UT _S N MP % L 4_ D ST _P O RT % IP _D S T_ AD D R % DS T_ M AS K % OU T PU T_ S NM P % IP _ NE XT _ HO P % SR C _A S % DS T_ A S %L A ST _ SW IT C HE D % FI R ST _S W IT CH E D % IP V6 _ SR C_ A DD R % IP V6 _ DS T_ A DD R % IP V 6_ SR C _M A SK % I PV 6_ D ST _ MA SK %E NG I NE _ TY PE % EN GI N E_ ID %T O TA L_ B YT ES _ EX P % TO T AL _P K TS _ EX P % TO TA L _F LO W S_ E XP % I P_ PR O TO C OL _V E RS IO N % D IR EC T IO N % FR AG M EN TE D % F IN GE R PR IN T % V LA N_ T AG % N W_ L AT EN C Y_ SE C % NW _L A TE NC Y _N S EC % A PP L_ L AT E NC Y_ S EC % A PP L _L AT E NC Y_ N SE C % PA YL O AD Long Template %B YT E S %P K TS %P RO T % TO S % T CP _F L AG S % L4 _ SR C_ P OR T % IP _S R C_ AD D R % SR C_ M AS K % IN P UT _S N MP % L 4_ D ST _P O RT % IP _D S T_ AD D R % DS T_ M AS K % OU T PU T_ S NM P % IP _ NE XT _ HO P % SR C _A S % DS T_ A S %L A ST _ SW IT C HE D % FI R ST _S W IT CH E D % IP V6 _ SR C_ A DD R % IP V6 _ DS T_ A DD R % IP V 6_ SR C _M A SK % I PV 6_ D ST _ MA SK %E NG I NE _ TY PE % EN GI N E_ ID %T O TA L_ B YT ES _ EX P % TO T AL _P K TS _ EX P % TO TA L _F LO W S_ E XP % I P_ PR O TO C OL _V E RS IO N % D IR EC T IO N % FR AG M EN TE D % F IN GE R PR IN T % V LA N_ T AG Short Template %B YT E S %P K TS %P RO T % TO S % T CP _F L AG S % L4 _ SR C_ P OR T % IP _S R C_ AD D R % SR C _M AS K %L 4_ D ST _ PO RT % IP _D S T_ AD D R % DS T _M AS K % IP _N E XT _H O P %S R C_ A S %D S T_ AS %L AS T _S W IT CH E D %F I RS T_ S WI T CH ED % IP _P R OT OC O L_ V ER SI O N %D I RE C TI ON %F RA G ME N TE D % FI NG E RP R IN T % VL AN _ TA G Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Appendix B: Pre-Defined Applications The following table lists all applications that are predefined in the Accelerator, their port/protocol number and whether they are monitored by the Accelerator by default. Application Port/Protocol Number Automatically Monitored? tcpmux 1 No compressnet-mgmt 2 No compressnet 3 No echo 7 No discard 9 No systat 11 No daytime 13 No qotd 17 No msp 18 No chargen 19 No ftp-data 20 Yes ftp 21 Yes ssh 22 Yes telnet 23 Yes priv-mail 24 No smtp 25 Yes nsw-fe 27 No msg-icp 29 No msg-auth 31 No dsp 33 No priv-print 35 No time 37 No rap 38 No graphics 41 No nicname 43 No ni-ftp 47 No 336 C h ap t er B: Application (Continued) Port/Protocol Number Automatically Monitored? auditd 48 No tacacs 49 No xns-time 52 No domain 53 Yes xns-ch 54 No isi-gl 55 No xns-auth 56 No priv-term 57 No xns-mail 58 No priv-file 59 No ni-mail 61 No acas 62 No whois++ 63 No covia 64 No tacacs-ds 65 No sql*net 66 No gopher 70 No priv-dialout 75 No deos 76 No priv-rje 77 No vettcp 78 No finger 79 No http-www 80 Yes hosts2-ns 81 No xfer 82 No mit-ml-dev 83 No ctf 84 No mfcobol 86 No priv-termlink 87 No su-mit-tg 89 No dnsix 90 No mit-dov 91 No npp 92 No dcp 93 No objcall 94 No dixie 96 No swift-rvf 97 No Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 337 Application (Continued) Port/Protocol Number Automatically Monitored? tacnews 98 No metagram 99 No newacct 100 No hostname 101 No iso-tsap 102 No gppitnp 103 No acr-nema 104 No csnet-ns 105 No 3com-tsmux 106 No snagas 108 No pop2 109 No pop3 110 Yes mcidas 112 No auth 113 No audionews 114 No ansanotify 116 No uucp-path 117 No sqlserv 118 No nntp 119 No erpc 121 No smakynet 122 No ansatrader 124 No locus-map 125 No unitary 126 No locus-con 127 No gss-xlicen 128 No pwdgen 129 No cisco-fna 130 No cisco-tna 131 No cisco-sys 132 No ingres-net 134 No endpoint-mapper 135 No profile 136 No netbios-ns 137 Yes netbios-dgm 138 Yes netbios-ssn 139 Yes emfis-data 140 No R ev isi o n 2. 0 338 C h ap t er B: Application (Continued) Port/Protocol Number Automatically Monitored? emfis-cntl 141 No bl-idm 142 No imap2 143 Yes uma 144 No uaac 145 No iso-tp0 146 No iso-ip 147 No jargon 148 No aed-512 149 No sql-net 150 No bftp 152 No netsc-prod 154 No netsc-dev 155 No sqlsrv 156 No knet-cmp 157 No pcmail-srv 158 No nss-routing 159 No snmp 161 Yes snmptrap 162 Yes xns-courier 165 No s-net 166 No namp 167 No rsvd 168 No send 169 No print-srv 170 No multiplex 171 No cl-1 172 No xyplex-mux 173 No mailq 174 No vmnet 175 No genrad-mux 176 No nextstep 178 No bgp 179 No ris 180 No unify 181 No audit 182 No ocbinder 18 No Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 339 Application (Continued) Port/Protocol Number Automatically Monitored? ocserver 184 No remote-kis 185 No kis 186 No aci 187 No mumps 188 No qft 189 No gacp 190 No prospero 191 No osu-nms 192 No srmp 193 No irc 194 No dn6-nlm-aud 195 No dn6-smm-red 196 No dls 197 No dls-mon 198 No smux 199 No src 200 No at-rtmp 201 No at-nbp 202 No at-3-5-7-8 203 No at-echo 204 No at-zis 206 No quickmail 209 No z39-50 210 No 914c-g 211 No anet 212 No vmpwscs 214 No softpc 215 No cai-lic 216 No dbase 217 No mpp 218 No uarps 219 No imap3 220 No fln-spx 221 No rsh-spx 222 Yes cdc 223 No peer-direct 242 No R ev isi o n 2. 0 340 C h ap t er B: Application (Continued) Port/Protocol Number Automatically Monitored? sur-meas 243 No daynachip 244 No link 245 No dsp3270 246 No bh-fhs 248 No ldap 389 Yes https 443 Yes smtps 465 No exec 512 No login 513 No shell 514 No printer 515 No talk 517 No ntalk 518 No ibm-db2 523 No uucp 540 No rtsp 554 No nntps 563 No banyan-vip 573 No alternate-http 591, 8008, 8080 No sshell 614 No ldaps 636 No doom 666 No ftps-data 989 No ftps 990 No telnets 992 No ircs 994 No pop3s 995 No notes 1352 Yes timbuktu-srv 1419 No ms-sql-server 1433 No ms-sql-monitor 1434 No ms-sna-server 1477 No ms-sna-base 1478 No citrix-ica 1494 Yes sybase_sqlany 1498 Yes t-120 1503 No Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 341 Application (Continued) Port/Protocol Number Automatically Monitored? oracl-tns 1521, 1526, 1527 No ingres-lock 1524 No oracl-srv 1525 Yes oracl-coauthor 1529 No oracl-remdb 1571 No oracl-names 1575 No america-online No h323 1720 No oracl-em1 1748 No oracl-em2 1754 No ms-streaming 1755 No ms-sms No ms-mqs 1801, 2101, 2103, 2105 No oracl-vp2 1808 No oracl-vp1 1809 No openwindows 2000 No gupta-sqlbase 2155 No cvs-pserver 2401 No citrix-ica-sr 2598 No sybase-sqlanywhere 2638 No ccmail 3264 No ms-terminal-server 3389 Yes sap-r3 3200 No ibm-db2-conn-svc 3700 No ibm-db2-int-svc 3701 No ichat 4020 No pc-anywhere-data 5631 No xwin Yes ircu No vdolive 7000 No realaudio 7070 No cu-seeme alternate-rtsp No 8554 the-palace No No quake 26000 No filenet-RPC 32769 No R ev isi o n 2. 0 342 C h ap t er B: Application (Continued) Port/Protocol Number Automatically Monitored? filenet-NCH 32770 No kazaa 1214 No gnutella-svc 6346 No gnutella-rtr 6347 No edonkey 4662 No radius 1812 No radius-acct 1813 No groupwise 1677 No smaclmgr 4660 No nameserver 42 No wins 1512 No pcanywhere 65301 No bittorent winmx No 6699, 6257 No microsoft-ds 445 Yes rlp 39 No re-mail-ck 50 No la-maint 51 No bootps 67 No bootpc 68 No tftp 69 Yes kerberos 88 Yes cfdptkt 120 No ntp 123 Yes xdmcp 177 No ipx-tunnel 213 No subnet-bcast-tftp 247 No backweb 370 No timbuktu 407 No biff 512 No who 513 No syslog 514 No ip-xns-rip 520 No streamworks-xingmpeg 1558 No citrix-icabrowser 1604 No h323-gatekeeper-disc 1718 No Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 343 Application (Continued) Port/Protocol Number Automatically Monitored? h323-gatekeeper-stat 1719 No ms-mqs-discovery 1801 No ms-mqs-ping 3527 No rtp 5004 No rtcp 5005 No pc-anywhere-stat 5632 No ivisit 9943, 9945, 56768 No l2tp 1701 No sgcp 2427 No hsrp 1985 No timed 525 No nfs 2049 Yes dhcp 546, 547, 647, 847 Yes mimix-dr1 Yes mimix-ha1 mimix-rj Yes 3777 Yes novel-netware-over-ip 396 Yes icmp 1 Yes igmp 2 Yes ipencap 4 Yes egp 8 Yes igp 9 Yes trunk-1 23 Yes trunk-2 24 Yes leaf-1 25 Yes leaf-2 26 Yes ipv6 41 Yes rsvp 46 Yes gre 47 Yes ipv6-crypt 50 Yes ipv6-auth 51 Yes ipv6-icmp 58 Yes eigrp 88 Yes ospf 89 Yes ipip 94 Yes pim 103 Yes scps 105 Yes R ev isi o n 2. 0 344 C h ap t er B: Application (Continued) Port/Protocol Number Automatically Monitored? ipcomp 108 Yes ipx-in-ip 111 Yes vrrp 112 Yes l2tp-over-ip 115 Yes stp 118 Yes isis 124 Yes Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Appendix C: Accelerator Integration Integrating the Accelerator into environments in which third party applications run on the network sometimes requires a certain amount of fine tuning. This appendix describes various environments and applications and how to best set them for Accelerator performance. This appendix covers the following topics: Acceleration and Citrix Traffic, on page 346 Configuring NetFlow, on page 355 Disabling Compression on SAP, on page 358 Calculating Acceleration Figures with an Application other than ExpandView, on page 360 346 C h ap t er C: Acceleration and Citrix Traffic The Accelerator utilizes network resources efficiently and delivers improved acceleration results for Citrix-hosted applications. Citrix users repeatedly access the same content from the network. The Accelerator enhances support for Citrix applications, because acceleration allows more Citrix data to traverse the WAN. The Accelerator achieves this increase in throughput by: Consolidating Citrix header data in pure IP implementations—IP header represents significant overhead in small packets generated by Citrix. It constitutes almost 30% of the Citrix packet. The Accelerator removes repeat-header information and sends this data only once across the network. Consolidating Citrix payload in all environments—the Accelerator extracts data from small packets originating from different Citrix users, and sends packets optimized for specific WAN conditions. The Accelerator eliminates all redundant data transmissions across the WAN. Controlling latency and jitter—the Accelerator reduces latency and jitter, especially over slow WAN links that are commonly used for Citrix deployments. The end result is better, more consistent Citrix performance; and support of up to four times more Citrix users on the existing infrastructure. Citrix has its own internal compression mechanism. The results achieved by this mechanism are not at all comparable to the throughput increase achieved by the Accelerator. When accelerating Citrix traffic, Citrix’s internal compression mechanism must be disabled so that the Accelerator can access the original data. Disabling Citrix NFuse Compression You can disable Citrix compression on each Citrix client PC, but disabling compression via the WebUI will cause all links that are not accelerated to become congested and unusable. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e A cc el era ti on an d Ci t rix Tra f fi c 347 To disable Citrix compression: 1. Back up the current copy of the following files: template.ica, launch.vbs, Clogin.vbs, Chtmllogin.vbs. 2. Copy the two ica files provided here into the following directory: C:\Program Files\Citrix\NFuse 3. Copy the three vbs files into the following directory: C:\inetpub\wwwroot\Citrix\MetaFrameXP\site\include\serverscripts 4. This will modify the Web Interface server by creating a drop-down menu on the login page, which will allow users to specify which type of connection is required. Any link connected to an Accelerator should be set to No Compression. Links not connected to Accelerators should be set to With Compression. 5. Restart the World Wide Web service by opening a command prompt and typing: iisreset 6. Select No Compression for all Accelerated clients in the Web Interface Login page. Disabling Citrix Encryption and Compression Citrix is a popular application installed on top of Microsoft’s Remote Desktop Protocol (RDP) that was created in joint development by Microsoft and Citrix. Citrix, also referred to as ICA, adds quite a few features that RDP does not have and therefore is popular for terminal and thin client deployments. Both RDP and Citrix can compress traffic sent to and from the servers. However, these capabilities are limited, and do not perform as well as Expand’s Accelerator. R ev isi o n 2. 0 348 C h ap t er C: Both RDP and Citrix can encrypt traffic sent to and from the servers. However, because encryption is random by definition, its very nature limits the ability of the Accelerators to remove repetitive data. Defining Settings on the Server An administrator can set encryption and compression settings on the server for the RDP and Citrix connections by modifying the protocol’s properties. For Encryption, all Citrix and RDP communications to the server must meet the minimal encryption settings of the ICA and RDP protocol listener. Settings made to the ICA or RDP listener apply to all traffic and applications. Setting/checking ICA or RDP listener traffic To disable compression and encryption in RDP: 1. Open the Terminal Server Configuration console: All Programs>Administrative Tools>Terminal Server Configuration. 2. In the Connections tab, double-click the RDP-Tcp connection. 3. The RDP-Tcp properties window opens 4. Under the General Tab, set the encryption level to Low. 5. Click OK, and close the configuration console. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e A cc el era ti on an d Ci t rix Tra f fi c 349 To use group policies for disabling compression and encryption in RDP: 1. Open the Default Domain Group Policies on the Domain Controller (AD) 2. Browse to Computer Configurations>Administrative Templates >Windows Components>Terminal Services>Encryption and Security. 3. Double-click the “Set client connection encryption level” setting. A properties window opens: 4. Select the option “Enabled” from the radio button. 5. Set the “Encryption Level” to “Low Level” 6. Click OK, and close the configuration console. Once set, the setting will replicate to the environment. To speed up the process, you can manually update the group policy by running the following command from the command line: gpupdate /force R ev isi o n 2. 0 350 C h ap t er C: To disable compression and encryption in Citrix: 1. Open the Citrix Connection Configuration tool and double click on the ICA-TCP connection type. 2. Within the Advanced Connection Settings, set encryption to none. 3. For Published Applications, you can configure each application type individually for encryption. 4. Open the Published Applications Manager tool and view the properties of the application being used. Click on the Client tab and view the encryption required from the Client. If the application is already published, the encryption required is Read only. Publishing the application and recreating the application with the lowest encryption level of Basic can remove encryption. Setting the encryption level for Published Applications can require an identical encryption level from the client. Any company that uses published applications normally requires a certain encryption level via the Published Applications Manager. These encryption levels are the same choices available on the client (see below). To disable compression and encryption in NFUSE and NFUSE Elite Server: Compression and encryption configurations are set during the publishing of the application and are stored within a file called template.ica. The location of this file can vary, however it is typically stored on the web server within the web directory (if necessary, consult with a Citrix administrator for the specific location). Compression is enabled by default even though there is not a specific entry within the template.ica file that mentions this. 1. Edit the template.ica file by adding a line entered under the application name that reads Compress=Off. If multiple applications exist, you have to enter multiple times the command Compress=Off. For additional information on turning off compression, see Citrix documentation: CTX554864 and CTX101865. 2. To disable encryption, publish the application again with the lowest encryption level of Basic. 3. In addition, if SSL certificates are used for creating secure web connections (web connections that begin with HTTPS: instead of HTTP), SSL also provides Ac ce ler at o rOS 6 .1 .2 Us er Gui d e A cc el era ti on an d Ci t rix Tra f fi c 351 encryption for the session. Therefore, disabling encryption requires you to remove SSL. Speed Screen Latency Reduction Manager SpeedScreen Latency Reduction Manager allows an administrator to enable compression for an application depending on the latency of the connection. When enabled, Citrix will monitor the round trip time for responses to and from the server and client and enable compression when needed. Remove any configured application by clicking Delete. Defining Settings on the Client For Citrix NFUSE is controlled via the server, so no settings need to be altered on the client. Custom Connections and Published Applications allow for changes to be made on the clients. Each client has a Citrix Program Neighborhood that contains settings for the connections that can override the settings on the server. For both of these, deselect compression and set encryption to Basic. Published applications use a ‘farm’ concept in which these applications can be grouped together with settings that apply for all the applications. Within the farm settings, a client can set the encryption and compression. To disable compression and encryption for ‘farms’: 1. Right-click the farm and choose Application Set settings. Once the Properties menu is displayed, click on the tab labelled Options to view and/or change the settings. 2. Each specific published application can also have settings for encryption and compression. 3. Right click the specific application and choose Application Set settings. Once the Properties menu is displayed, click on the Options tab to view and or change the settings. 4. Custom connections are created from the client, and you can use the Properties page to set all settings during creation or afterwards. Right-click the custom connection and choose Properties. Once you see the Properties menu, click on the Options tab to view and/or change the settings. R ev isi o n 2. 0 352 C h ap t er C: For RDP Only compression can be set on the client and not encryption as previously discussed regarding the Citrix client. The place to set these values depends on how the RDP session is being launched. For most environments this will be done through the Client Connection Manager. To disable compression on the RDP client: 1. Within the Client Connection Manager, right-click the connection and choose Properties. Navigate to the Connection Options tab and deselect the box labelled Enable data compression if it is selected. 2. When the session for RDP is launched from the ‘raw’ Terminal Services Client icon, the option for compression is presented when choosing the server to log into. Turning Compression off in the PNAgent Client This section instructs you how to resolve the Citrix PNA problem by turning of compression in the PNAgent client. Understanding the PNA Problem Citrix Program Neighborhood Agent (PNA) is a combination of published applications and NFUSE. Data compression in the PNAgent is ON by default if the value disabling it is not present. Resolving the PNA Problem Edit the PNAgent template.ica file on the Web Interface server. This template.ica file is different than the one used by NFUSE, although the same is required for NFUSE as well. To edit the PNA template.ica file: 1. Access the template.ica file: Default location: C:\Inetpub\wwwroot\Citrix\PNAgent\template.ica Ac ce ler at o rOS 6 .1 .2 Us er Gui d e A cc el era ti on an d Ci t rix Tra f fi c 353 If you are unsure of the location on your server, search for the PNAgent directory and look there for a template.ica file. 2. Add the value Compress=Off under the Application tag, as follows: [[NFuse_AppName]] Address=[NFuse_AppServerAddress] InitialProgram=#[NFuse_AppName] LongCommandLine="[NFuse_AppCommandLine]" DesiredColor=[NFuse_WindowColors] TransportDriver=TCP/IP WinStationDriver=ICA 3.0 AutoLogonAllowed=On Compress=Off. Identifying Citrix Layer-7 Applications Monitoring Citrix/ICA Layer-7 traffic requires each Layer-7 application running through Citrix to open a separate TCP session; the Accelerator does not support Citrix session sharing. Citrix Applications work as follows: Applications are published, meaning that the Administrator defines certain applications on the server for users to use on their desktop. The Administrator also assigns names for these applications. The users can either download the applications and their names from the server, or define them manually. When applications are downloaded, for each Citrix application session run between the client and the server, Citrix creates a TCP session for running the application and a UDP session that serves as a control for the application. The Accelerator’s Layer-7 monitoring is aware of both of these sessions, and identifies the open sessions by the new published application name. If Citrix is configured to work in single-session (virtual channel) TCP, in which each application does not open a new TCP session, the Accelerator is unable to access the Layer-7 information it needs. i NOTE: The Accelerator supports both Automatic and Direct Citrix application discovery mode. When applications are added manually, the Accelerator still has to monitor the control session (UDP), which is never encrypted or compressed. R ev isi o n 2. 0 354 C h ap t er C: To disable session sharing in the Citrix server: 1. At the command prompt of the Citrix server, open the registry editor by entering the regedit command. 2. Create the following entry in the server’s registry (which overrides session sharing): HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\C itrix\WFSHELL\TWI 3. Add the following value: Name: SeamlessFlags Data type: REG_DWORD Data value: 1 4. Setting this registry value to 1 overrides session sharing. Note that this flag is SERVER GLOBAL. WARNING! Editing the registry or using a Registry Editor incorrectly can cause serious, system-wide problems that may require you to reinstall ! Windows to correct them. Microsoft does not guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Back up your registry first and use Registry Editor at your own risk. NOTE: When creating Layer-7 Citrix applications in the Accelerator, the application names defined must match the application names exactly as i entered into the Citrix server Due to this requirement, take into account the following considerations: You are advised to create Citrix Layer-7 applications via the Monitoring > Layer-7 Discovery menu, where traffic types are collected and listed, instead of entering them manually. All Citrix application names entered into the Accelerator must be in ALL CAPS. This is because in some environments, when the client communicates with the server, the client converts the published application name to capitals. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Configuring NetFlow C o nf i gu ri ng Ne tF lo w 355 The following configuration modifications are needed in order to use NetFlow with the Expand Accelerator. While previous versions of AcceleratorOS included RMON, the AcceleratorOS 6.0 and up integrates NetFlow support for detailed reporting. This combination enables extracting statistics like in RMON’s Top Talker. The main focus of NetFlow is Traffic Measurement, Traffic Monitoring, Network Optimization and Planning and Detection of Network Security Violations, as follows. Studying Traffic Measurement Traffic Measurement measures usage of relevant traffic activities. NetFlow tracks network usage, generating a series of statistics for hosts sending data through the interface. The necessary information is collected by the host running NetFlow by observing the traffic on the network. This arrangement offloads the processing requirements from operational nodes to the NetFlow host. All packets in the subnet are captured and associated with a sender/receiver pair, thereby letting you track all traffic activities of a particular host. The following are some of the statistics and reports that you can collect by using NetFlow Traffic Measurement: DATA SENT /RECEIVED—(TOP 10) the total traffic (volume and packets) generated or received by the host. The traffic is classified according to network protocol (IP, IPX, AppleTalk, and so on) and IP protocol (FTP, HTTP, NFS, and so on). USED BANDWIDTH—Actual, average and peak bandwidth usage. IP MULTICAST—Total amount of multicast traffic generated or received by the host. TCP SESSIONS HISTORY—Currently active TCP sessions established/accepted by the host and associated traffic statistics. UDP TRAFFIC—Total amount of UDP traffic sorted by port. TCP/UDP - USED SERVICES—List of IP-based services (for example: open and active ports) provided by the host with the list of the last five hosts that used them. TRAFFIC DISTRIBUTION—Local traffic, local to remote traffic, remote to local traffic (local hosts are attached to the broadcast network). IP TRAFFIC DISTRIBUTION—UDP vs. TCP traffic, relative distribution of the IP protocols according to the host name. R ev isi o n 2. 0 356 C h ap t er C: Studying Traffic Monitoring Traffic Monitoring lets you identify those situations where network traffic does not comply with specified policies or when it exceeds a defined threshold. In general, network administrators specify policies that apply to the behavior of elements in the managed network. If a monitoring tool has already been implemented on the network, it may be possible to integrate NetFlow into the existing tool (for example, Concord, and HP OpenView support NetFlow). Several open source NetFlow software platforms are available for free download. Expand recommends NTop-XTRA, which can be downloaded from http://www.openxtra.co.uk/products/ntop-xtra.htm Some NetFlow collectors, such as Crannog’s NetFlow Monitor, require enabling SNMP, because the graphs can be interface-based (IF.Index). The Accelerator’s SNMP feature, even when enabled, does not include the IF.Index for flows because the Accelerator functions as a bridge. Therefore, the NetFlow Monitor software does not present any statistics when working with an Accelerator. Use software that does not require the IF.Index. For example, Crannog software has another Netflow collector called NetFlow Tracker, which does not require the IF.Index for the Netflow statistics and works very well with the Accelerator. When configuring NetFlow on the Accelerator, it is important to specify the version number. i NOTE: Only NetFlow Version 5 is supported. Configuring Accelerator NetFlow accelerator#config accelerator (config) #netflow accelerator (NetFlow) #? exit exit current node ip ip NetFlow command no remove collector show show NetFlow parameters Here is an example of the config needed if 172.16.80.21 is the PC running the NetFlow application: accelerator(NetFlow) ip flow-export 172.16.80.21 port 2055 version 5 interface ethernet 0/0 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C o nf i gu ri ng Ne tF lo w 357 accelerator (NetFlow) # show --------------------------------------------------------# | COLLECTOR IP | PORT | VERSION | INTERFACE --------------------------------------------------------1| 172.16.80.21|2055 i | 5 | Ethernet 0/0 NOTE: In On-Path installations, use Ethernet 0; in On-LAN installations use Ethernet 0/1 when configuring NetFlow. KNOWN LIMITATION—You can enable NetFlow only on ethernet or bridge and not per link or virtual link. You can configure only one NetFlow probe. R ev isi o n 2. 0 358 C h ap t er C: Disabling Compression on SAP If SAP compression must be disabled in order to achieve higher Accelerator efficiency, the following procedure describes how to disable SAP compression. 1. From My computer, click on Properties, or from the Control Panel click on System. 2. Click on Advanced, followed by Environment Variables. 3. In the Environment Variables window, click the New button. 4. Type TDW_NOCOMPRESS in the Variable Name field, and 1 in the Variable Value field. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e D is ab li n g Co m p r es sio n o n S A P 359 To undo this procedure and restore SAP compression, delete this variable, or set the Variable Value to 0. R ev isi o n 2. 0 360 C h ap t er C: Calculating Acceleration Figures with an Application other than ExpandView The following section explains how to calculate the acceleration percentage achieved on the Accelerator via Excel, by using data captured from a Management Application other than ExpandView. If you are using ExpandView to monitor Accelerators, and capture the relevant data, ExpandView will automatically record the acceleration values, and use the Throughput Recorder for generating the graphs. For these reasons it is preferable to use ExpandView for this purpose. Alternatively, you can use the Private MIB to view acceleration figures via external applications, such as What’s Up Gold, HP OpenView, or SNMPc, as follows: accInterfacePerformanceInAccelerationPeriod OID: 1.3.6.1.4.1.3405.3.4.2.1.31 Full path: iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).exp andnetworks( 3405).acceleratorOs(3).accInterfaces(4).accInterfaceTable(2).a ccInterfaceEnt ry(1).accInterfacePerformanceInAccelerationPeriod(30) Module: EXPAND-ACCLERETOROS-MIB Description: Inbound traffic acceleration percentage during last sampling period. accInterfacePerformanceOutAccelerationPeriod OID: 1.3.6.1.4.1.3405.3.4.2.1.34 Full path: iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).exp andnetworks( 3405).acceleratorOs(3).accInterfaces(4).accInterfaceTable(2).a ccInterfaceEnt ry(1).accInterfacePerformanceOutAccelerationPeriod(33) Module: EXPAND-ACCLERETOROS-MIB Description: Outbound traffic acceleration percentage during last sampling period. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ca lcu la t in g Ac ce le r at io n F ig u r es w i th a n A pp li ca ti on ot h er t ha n E x pan dVi ew 361 In AcceleratorOS versions lower than 4.0, in which the Private MIB was not supported, using external applications to view acceleration statistics can be complex and it may be necessary to follow the method outlined below to avoid errors being generated by Excel. Use the standard method for calculating the acceleration percentage: ((Raw Data/Accelerated Data)-1) x 100 In low traffic, when keepalives are sent and no data is transferred, this causes the raw data to be low or the accelerated data to be high, causing Excel to return error messages, or even negative acceleration figures, as seen in the screen capture below: Working with a small amount of data, this does not cause too much of a problem, as it is quite easy to alter the resulting acceleration figure to a zero. However, when working with a large amount of data, it will be almost impossible to remove all these errors, thus resulting in a graph with gaps, and negative acceleration. To avoid this, you can use the following formula: =IF({Accelerated Data}=0,"0",IF({Raw Data}<{Accelerated Data},"0",((({Raw Data}/ {Acc. Data})-1)*100))) Although this looks difficult, the “real” formula is: =IF(D2=0,"0",IF(C2<D2,"0",(((C2/ D2)-1)*100))) In effect, what this formula tells Excel, is: If the Accelerated Data value is 0, then the output, or acceleration percentage will be 0, if the Raw Data value is less than the Accelerated data, then the output will be 0. Only if neither of these statements is true will Excel calculate the acceleration percentage. Although this may be true in terms of the Accelerated Data value being zero, it is a workaround enabling Excel to calculate the acceleration figures needed to produce a graph. R ev isi o n 2. 0 362 C h ap t er C: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Appendix D: MIME Types Thousands of possible MIME types can be used as part of Web application definition. For a definition of and information about MIME types, please see http:// www.faqs.org/rfcs/rfc2045.html, http://www.iana.org/assignments/media-types and http://www.faqs.org/rfcs/rfc2046.html. This appendix provides a a list of some very common MIME types. 364 C h ap t er D: Application andrew-inset applefile atomicmail batch-SMTP beep+xml cals-1840 cnrp+xml commonground cpl+xml csta+xml CSTAdata+xml cybercash dca-rft dec-dx dialog-info+xml dicom dns dvcs EDI-Consent EDIFACT EDI-X12 epp+xml eshop fits font-tdpfr http hyperstudio Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ap p li ca ti on 365 iges im-iscomposing+xml index index.cmd index.obj index.response index.vnd iotp ipp isup kpml-request+xml kpml-response+xml mac-binhex40 macwriteii marc mathematica mbox mikey mpeg4-generic msword news-message-id news-transmission ocsp-request ocsp-response octet-stream oda ogg parityfec pdf R ev isi o n 2. 0 366 C h ap t er D: pgp-encrypted pgp-keys pgp-signature pidf+xml pkcs10 pkcs7-mime pkcs7-signature pkix-cert pkixcmp pkix-crl pkix-pkipath postscript prs.alvestrand.titrax-sheet prs.cww prs.nprend prs.plucker rdf+xml qsig reginfo+xml remote-printing resource-lists+xml riscos rls-services+xml rtf samlassertion+xml samlmetadata+xml sbml+xml sdp set-payment Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ap p li ca ti on 367 set-payment-initiation set-registration set-registration-initiation sgml sgml-open-catalog shf+xml sieve simple-filter+xml simple-message-summary slate soap+xml spirits-event+xml timestamp-query timestamp-reply tve-trigger vemmi vnd.3gpp.pic-bw-large vnd.3gpp.pic-bw-small vnd.3gpp.pic-bw-var vnd.3gpp.sms vnd.3M.Post-it-Notes vnd.accpac.simply.aso vnd.accpac.simply.imp vnd.acucobol vnd.acucorp vnd.adobe.xfdf vnd.aether.imp vnd.amiga.ami vnd.anser-web-certificate-issue-initiation R ev isi o n 2. 0 368 C h ap t er D: vnd.anser-web-funds-transfer-initiation vnd.audiograph vnd.blueice.multipass vnd.bmi vnd.businessobjects vnd.canon-cpdl vnd.canon-lips vnd.cinderella vnd.claymore vnd.commerce-battelle vnd.commonspace vnd.cosmocaller vnd.contact.cmsg vnd.criticaltools.wbs+xml vnd.ctc-posml vnd.cups-postscript vnd.cups-raster vnd.cups-raw vnd.curl vnd.cybank vnd.data-vision.rdz vnd.dna vnd.dpgraph vnd.dreamfactory vnd.dxr vnd.ecdis-update vnd.ecowin.chart vnd.ecowin.filerequest vnd.ecowin.fileupdate Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ap p li ca ti on 369 vnd.ecowin.series vnd.ecowin.seriesrequest vnd.ecowin.seriesupdate vnd.enliven vnd.epson.esf vnd.epson.msf vnd.epson.quickanime vnd.epson.salt vnd.epson.ssf vnd.ericsson.quickcall vnd.eudora.data vnd.fdf vnd.ffsns vnd.fints vnd.FloGraphIt vnd.framemaker vnd.fsc.weblaunch vnd.fujitsu.oasys vnd.fujitsu.oasys2 vnd.fujitsu.oasys3 vnd.fujitsu.oasysgp vnd.fujitsu.oasysprs vnd.fujixerox.ddd vnd.fujixerox.docuworks vnd.fujixerox.docuworks.binder vnd.fut-misnet vnd.genomatix.tuxedo vnd.grafeq vnd.groove-account R ev isi o n 2. 0 370 C h ap t er D: vnd.groove-help vnd.groove-identity-message vnd.groove-injector vnd.groove-tool-message vnd.groove-tool-template vnd.groove-vcard vnd.hbci vnd.hcl-bireports vnd.hhe.lesson-player vnd.hp-HPGL vnd.hp-hpid vnd.hp-hps vnd.hp-PCL vnd.hp-PCLXL vnd.httphone vnd.hzn-3d-crossword vnd.ibm.afplinedata vnd.ibm.electronic-media vnd.ibm.MiniPay vnd.ibm.modcap vnd.ibm.rights-management vnd.ibm.secure-container vnd.informix-visionary vnd.intercon.formnet vnd.intertrust.digibox vnd.intertrust.nncp vnd.intu.qbo vnd.intu.qfx vnd.ipunplugged.rcprofile Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ap p li ca ti on 371 vnd.irepository.package+xml vnd.is-xpr vnd.japannet-directory-service vnd.japannet-jpnstore-wakeup vnd.japannet-payment-wakeup vnd.japannet-registration vnd.japannet-registration-wakeup vnd.japannet-setstore-wakeup vnd.japannet-verification vnd.japannet-verification-wakeup vnd.jisp vnd.kde.karbon vnd.kde.kchart vnd.kde.kformula vnd.kde.kivio vnd.kde.kontour vnd.kde.kpresenter vnd.kde.kspread vnd.kde.kword vnd.kenameaapp vnd.kidspiration vnd.Kinar vnd.koan vnd.liberty-request+xml vnd.llamagraphics.life-balance.desktop vnd.llamagraphics.life-balance.exchange+xml vnd.lotus-1-2-3 vnd.lotus-approach vnd.lotus-freelance R ev isi o n 2. 0 372 C h ap t er D: vnd.lotus-notes vnd.lotus-organizer vnd.lotus-screencam vnd.lotus-wordpro vnd.mcd vnd.mediastation.cdkey vnd.meridian-slingshot vnd.mfmp vnd.micrografx.flo vnd.micrografx.igx vnd.mif vnd.minisoft-hp3000-save vnd.mitsubishi.misty-guard.trustweb vnd.Mobius.DAF vnd.Mobius.DIS vnd.Mobius.MBK vnd.Mobius.MQY vnd.Mobius.MSL vnd.Mobius.PLC vnd.Mobius.TXF vnd.mophun.application vnd.mophun.certificate vnd.motorola.flexsuite vnd.motorola.flexsuite.adsi vnd.motorola.flexsuite.fis vnd.motorola.flexsuite.gotap vnd.motorola.flexsuite.kmr vnd.motorola.flexsuite.ttc vnd.motorola.flexsuite.wem Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ap p li ca ti on 373 vnd.mozilla.xul+xml vnd.ms-artgalry vnd.ms-asf vnd.mseq vnd.ms-excel vnd.msign vnd.ms-lrm vnd.ms-powerpoint vnd.ms-project vnd.ms-tnef vnd.ms-works vnd.ms-wpl vnd.musician vnd.music-niff vnd.nervana vnd.netfpx vnd.noblenet-directory vnd.noblenet-sealer vnd.noblenet-web vnd.nokia.landmark+xml vnd.nokia.landmark+wbxml vnd.nokia.landmarkcollection+xml vnd.nokia.radio-preset vnd.nokia.radio-presets vnd.novadigm.EDM vnd.novadigm.EDX vnd.novadigm.EXT vnd.obn vnd.omads-email+xml R ev isi o n 2. 0 374 C h ap t er D: vnd.omads-file+xml vnd.omads-folder+xml vnd.osa.netdeploy vnd.palm vnd.paos.xml vnd.pg.format vnd.picsel vnd.pg.osasli vnd.powerbuilder6 vnd.powerbuilder6-s vnd.powerbuilder7 vnd.powerbuilder75 vnd.powerbuilder75-s vnd.powerbuilder7-s vnd.previewsystems.box vnd.publishare-delta-tree vnd.pvi.ptid1 vnd.pwg-multiplexed vnd.pwg-xhtml-print+xml vnd.Quark.QuarkXPress vnd.rapid vnd.RenLearn.rlprint vnd.s3sms vnd.sealed.doc vnd.sealed.eml vnd.sealed.mht vnd.sealed.net vnd.sealed.ppt vnd.sealed.xls Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ap p li ca ti on 375 vnd.sealedmedia.softseal.html vnd.sealedmedia.softseal.pdf vnd.seemail vnd.shana.informed.formdata vnd.shana.informed.formtemplate vnd.shana.informed.interchange vnd.shana.informed.package vnd.smaf vnd.sss-cod vnd.sss-dtf vnd.sss-ntf vnd.street-stream vnd.sus-calendar vnd.svd vnd.swiftview-ics vnd.syncml.ds.notification vnd.syncml.+xml vnd.triscape.mxs vnd.trueapp vnd.truedoc vnd.ufdl vnd.uiq.theme vnd.uplanet.alert vnd.uplanet.alert-wbxml vnd.uplanet.bearer-choice vnd.uplanet.bearer-choice-wbxml vnd.uplanet.cacheop vnd.uplanet.cacheop-wbxml vnd.uplanet.channel R ev isi o n 2. 0 376 C h ap t er D: vnd.uplanet.channel-wbxml vnd.uplanet.list vnd.uplanet.listcmd vnd.uplanet.listcmd-wbxml vnd.uplanet.list-wbxml vnd.uplanet.signal vnd.vcx vnd.vectorworks vnd.vidsoft.vidconference vnd.visio vnd.visionary vnd.vividence.scriptfile vnd.vsf vnd.wap.sic vnd.wap.slc vnd.wap.wbxml vnd.wap.wmlc vnd.wap.wmlscriptc vnd.webturbo vnd.wordperfect vnd.wqd vnd.wrq-hp3000-labelled vnd.wt.stf vnd.wv.csp+xml vnd.wv.csp+wbxml vnd.wv.ssp+xml vnd.xara vnd.xfdl vnd.yamaha.hv-dic Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ap p li ca ti on 377 vnd.yamaha.hv-script vnd.yamaha.hv-voice vnd.yamaha.smaf-audio vnd.yamaha.smaf-phrase vnd.yellowriver-custom-menu watcherinfo+xml whoispp-query whoispp-response wita wordperfect5.1 x400-bp xhtml+xml xml xml-dtd xml-external-parsed-entity xmpp+xml xop+xml zip R ev isi o n 2. 0 378 C h ap t er D: Audio 3gpp AMR AMR-WB basic BV16 BV32 clearmode CN DAT12 dsr-es201108 dsr-es202050 dsr-es202211 dsr-es202212 DVI4 EVRC EVRC0 EVRC-QCP G722 G.722.1 G723 G726-16 G726-24 G726-32 G726-40 G728 G729 G729D Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Au d io 379 G729E GSM GSM-EFR iLBC L8 L16 L20 L24 LPC MPA MP4A-LATM mpa-robusta mpeg mpeg4-generic parityfec PCMA PCMU prs.sid QCELP RED SMV SMV0 SMV-QCP telephone-event tone VDVI vnd.3gpp.iufp vnd.audiokoz vnd.cisco.nse R ev isi o n 2. 0 380 C h ap t er D: vnd.cns.anp1 vnd.cns.inf1 vnd.digital-winds vnd.everad.plj vnd.lucent.voice vnd.nokia.mobile-xmf vnd.nortel.vbk vnd.nuera.ecelp4800 vnd.nuera.ecelp7470 vnd.nuera.ecelp9600 vnd.octel.sbc vnd.rhetorex.32kadpcm vnd.sealedmedia.softseal.mpeg vnd.vmx.cvsd Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Image I m ag e 381 cgm fits g3fax gif ief jp2 jpeg jpm jpx naplps png prs.btif prs.pti t38 tiff tiff-fx vnd.cns.inf2 vnd.djvu vnd.dwg vnd.dxf vnd.fastbidsheet vnd.fpx vnd.fst vnd.fujixerox.edmics-mmr vnd.fujixerox.edmics-rlc vnd.globalgraphics.pgb vnd.microsoft.icon R ev isi o n 2. 0 382 C h ap t er D: vnd.mix vnd.ms-modi vnd.net-fpx vnd.sealed.png vnd.sealedmedia.softseal.gif vnd.sealedmedia.softseal.jpg vnd.svf vnd.wap.wbmp vnd.xiff Ac ce ler at o rOS 6 .1 .2 Us er Gui d e M e ssage Me ss ag e 383 CPIM delivery-status disposition-notification external-body http news partial rfc822 s-http sip sipfrag tracking-status R ev isi o n 2. 0 384 C h ap t er D: Model iges mesh vnd.dwf vnd.flatland.3dml vnd.gdl vnd.gs-gdl vnd.gtw vnd.mts vnd.parasolid.transmit.binary vnd.parasolid.transmit.text vnd.vtu vrml Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Multipart M ul ti part 385 alternative appledouble byteranges digest encrypted form-data header-set mixed parallel related report signed voice-message R ev isi o n 2. 0 386 C h ap t er D: Text calendar css csv directory dns ecmascript (obsolete) enriched example html javascript (obsolete) parityfec plain RED rfc822-headers richtext rtx sgml t140 troff uri-list vnd.IPTC.NewsML [IPTC] vnd.IPTC.NITF [IPTC] xml xml-external-parsed-entity Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Video Vid eo 387 3gpp 3gpp2 3gpp-tt BMPEG BT656 CelB DV example H261 H263 H263-1998 H263-2000 H264 JPEG MJ2 MP1S MP2P MP2T mp4 MP4V-ES MPV mpeg mpeg4-generic nv parityfec pointer raw R ev isi o n 2. 0 388 C h ap t er D: rtx SMPTE292M vc1 [ Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Appendix E: Contacting TAC Expand Networks is dedicated to delivering both excellent products and customer support. From our Technical Assistance Center (TAC) to our online Knowledge Base, we are committed to solving your networking problems. TAC is available to all partners and registered customers and allows posting support inquiries directly to Expand’s help desk. The Expand Technical Assistance Center provides around-the-clock support to customers worldwide. Customer call center agents answer calls and dispatch problems to Support Engineers (SEs) for resolution. The SE becomes the call owner and is responsible for ensuring that the problem is addressed and fixed quickly. You can open Priority 1 and 2 cases by calling TAC; to open Priority 3 cases, use Expand’s Extranet or Channel Portal. The TAC works closely with customers to isolate and replicate problems. In a critical network-down problem, TAC SEs work with customers until their problems are resolved. In other instances, SEs may replicate a customer's environment in the TAC laboratory. When deemed necessary, SEs may involve R&D engineers in order to ensure that problem cases are resolved to the customer's satisfaction. The TAC includes highly trained engineers, including Cisco Certified Internetwork Experts (CCIEs) and Microsoft Certified Professionals (MCPs). 390 C h ap t er E : Expand Networks wishes to offer you the best tech support it can. To do this, call our toll free TAC number at: International: +1‐920‐490‐7337 North America: +1‐877‐4‐EXPAND (877‐439‐7263) UK: +08 0 0 404 9 236 Ireland: +18 0 0559 803 Netherlands: +08 0 0 023 3 047 France: +08 0 0906 560 When contacting the TAC, it is essential that information about the nature of the problem be at your disposal. To gather Accelerator troubleshooting information, use the show tech-support command as described above. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Appendix F: tcpdump Optional Flags You may encounter several TCP flags when using tcpdump. The AcceleratorOS supports the following flags: -A, -e, -f, -l, -O, -p, -q, -R, -S, -t, -u, -v, -x, -X. This chapter describes the uses of each of these flags. i NOTE:The -a flag is not supported when ethereal is used. -A Print each packet (minus its link level header) in ASCII. Handy for capturing web pages. -e Print the link-level header on each dump line. -f Print `foreign' IPv4 addresses numerically rather than symbolically (this option is intended to get around serious brain damage in Sun's NIS server --- usually it hangs forever translating non-local internet numbers). The test for `foreign' IPv4 addresses is done using the IPv4 address and netmask of the interface on which capture is being done. If that address or netmask are not available, either because the interface on which capture is being done has no address or netmask or because the capture is being done on the Linux "any" interface, which can capture on more than one interface, this option will not work correctly. -l Make stdout line buffered. Useful if you want to see the data while capturing it. i NOTE: The use of the -l flag by the ‘|’ pipe is not supported in the WebUI, and any attempt for such a use results in an error message. -O 392 C h ap t er F: Do not run the packet-matching code optimizer. This is useful only if you suspect a bug in the optimizer. -p Don't put the interface into promiscuous mode. Note that the interface might be in promiscuous mode for some other reason; hence, `-p' cannot be used as an abbreviation for `ether host {local-hw-addr} or ether broadcast'. -q Quick (quiet?) output. Print less protocol information so output lines are shorter. -R Assume ESP/AH packets to be based on old specification (RFC1825 to RFC1829). If specified, tcpdump will not print replay prevention field. Since there is no protocol version field in ESP/AH specification, tcpdump cannot deduce the version of ESP/ AH protocol. -S Print absolute, rather than relative, TCP sequence numbers. -t Don't print a timestamp on each dump line. -u Print undecoded NFS handles. -v When parsing and printing, produce (slightly more) verbose output. For example, the time to live, identification, total length and options in an IP packet are printed. Also enables additional packet integrity checks such as verifying the IP and ICMP header checksum. When writing to a file with the -w option, report, every 10 seconds, the number of packets captured. -x Print each packet (minus its link level header) in hex. The smaller of the entire packet or snaplen bytes will be printed. Note that this is the entire link-layer packet, so for link layers that pad (For example Ethernet), the padding bytes will also be printed when the higher layer packet is shorter than the required padding. -X Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 393 Print each packet (minus its link level header) in hex and ASCII. This is very handy for analyzing new protocols. type qualifiers say what kind of thing the id name or number refers to. Possible types are host, net and port. For example, `host foo', `net 128.3', `port 20'. If there is no type qualifier, host is assumed. dir qualifiers specify a particular transfer direction to and/or from id. Possible directions are src, dst, src or dst and src and dst. For example, `src foo', `dst net 128.3', `src or dst port ftp-data'. If there is no dir qualifier, src or dst is assumed. For some link layers, such as SLIP and the ``cooked'' Linux capture mode used for the ``any'' device and for some other device types, the inbound and outbound qualifiers can be used to specify a desired direction. proto qualifiers restrict the match to a particular protocol. Possible protos are: ether, fddi, tr, wlan, ip, ip6, arp, rarp, decnet, tcp and udp. For example, `ether src foo', `arp net 128.3', `tcp port 21'. If there is no proto qualifier, all protocols consistent with the type are assumed. For example, `src foo' means `(ip or arp or rarp) src foo' (except the latter is not legal syntax), `net bar' means `(ip or arp or rarp) net bar' and `port 53' means `(tcp or udp) port 53'. [`fddi' is actually an alias for `ether'; the parser treats them identically as meaning ``the data link level used on the specified network interface.'' FDDI headers contain Ethernet-like source and destination addresses, and often contain Ethernet-like packet types, so you can filter on these FDDI fields just as with the analogous Ethernet fields. FDDI headers also contain other fields, but you cannot name them explicitly in a filter expression. Similarly, `tr' and `wlan' are aliases for `ether'; the previous paragraph's statements about FDDI headers also apply to Token Ring and 802.11 wireless LAN headers. For 802.11 headers, the destination address is the DA field and the source address is the SA field; the BSSID, RA, and TA fields aren't tested.] In addition to the above, there are some special `primitive' keywords that don't follow the pattern: gateway, broadcast, less, greater and arithmetic expressions. All of these are described below. R ev isi o n 2. 0 394 More complex filter expressions are built up by using the words and, or and not to combine primitives. For example, `host foo and not port ftp and not port ftp-data'. To save typing, identical qualifier lists can be omitted. For example, `tcp dst port ftp or ftp-data or domain' is exactly the same as `tcp dst port ftp or tcp dst port ftp-data or tcp dst port domain'. Allowable primitives are: dst host host True if the IPv4/v6 destination field of the packet is host, which may be either an address or a name. src host host True if the IPv4/v6 source field of the packet is host. host host True if either the IPv4/v6 source or destination of the packet is host. Any of the above host expressions can be prepended with the keywords, ip, arp, rarp, or ip6 as in: ip host host which is equivalent to: ether proto \ip and host host If host is a name with multiple IP addresses, each address will be checked for a match. ether dst ehost True if the ethernet destination address is ehost. Ehost may be either a name from /etc/ethers or a number (see ethers(3N) for numeric format). ether src ehost True if the ethernet source address is ehost. ether host ehost True if either the ethernet source or destination address is ehost. gateway host R ev isi o n 2. 0 395 C h ap t er F: True if the packet used host as a gateway. I.e., the ethernet source or destination address was host but neither the IP source nor the IP destination was host. Host must be a name and must be found both by the machine's host-name-to-IPaddress resolution mechanisms (host name file, DNS, NIS, etc.) and by the machine's host-name-to-Ethernet-address resolution mechanism (/etc/ethers, etc.). (An equivalent expression is ether host ehost and not host host which can be used with either names or numbers for host / ehost.) This syntax does not work in IPv6-enabled configuration at this moment. dst net net True if the IPv4/v6 destination address of the packet has a network number of net. Net may be either a name from /etc/networks or a network number (see networks(4) for details). src net net True if the IPv4/v6 source address of the packet has a network number of net. net net True if either the IPv4/v6 source or destination address of the packet has a network number of net. net net mask netmask True if the IP address matches net with the specific netmask. May be qualified with src or dst. Note that this syntax is not valid for IPv6 net. net net/len True if the IPv4/v6 address matches net with a netmask len bits wide. May be qualified with src or dst. dst port port True if the packet is ip/tcp, ip/udp, ip6/tcp or ip6/udp and has a destination port value of port. The port can be a number or a name used in /etc/services (see tcp(4P) and udp(4P)). If a name is used, both the port number and protocol are checked. If a number or ambiguous name is used, only the port number is checked (For example, dst port 513 will print both tcp/login traffic and udp/who traffic, and port domain will print both tcp/domain and udp/domain traffic). src port port True if the packet has a source port value of port. port port Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 396 True if either the source or destination port of the packet is port. Any of the above port expressions can be prepended with the keywords, tcp or udp, as in: tcp src port port which matches only tcp packets whose source port is port. less length True if the packet has a length less than or equal to length. This is equivalent to: len <= length. greater length True if the packet has a length greater than or equal to length. This is equivalent to: len >= length. ip proto protocol True if the packet is an IP packet (see ip(4P)) of protocol type protocol. Protocol can be a number or one of the names icmp, icmp6, igmp, igrp, pim, ah, esp, vrrp, udp, or tcp. Note that the identifiers tcp, udp, and icmp are also keywords and must be escaped via backslash (\), which is \\ in the C-shell. Note that this primitive does not chase the protocol header chain. ip6 proto protocol True if the packet is an IPv6 packet of protocol type protocol. Note that this primitive does not chase the protocol header chain. ip6 protochain protocol True if the packet is IPv6 packet, and contains protocol header with type protocol in its protocol header chain. For example, ip6 protochain 6 matches any IPv6 packet with TCP protocol header in the protocol header chain. The packet may contain, for example, authentication header, routing header, or hopby-hop option header, between IPv6 header and TCP header. The BPF code emitted by this primitive is complex and cannot be optimized by BPF optimizer code in tcpdump, so this can be somewhat slow. ip protochain protocol Equivalent to ip6 protochain protocol, but this is for IPv4. ether broadcast True if the packet is an ethernet broadcast packet. The ether keyword is optional. R ev isi o n 2. 0 397 C h ap t er F: ip broadcast True if the packet is an IPv4 broadcast packet. It checks for both the all-zeroes and all-ones broadcast conventions, and looks up the subnet mask on the interface on which the capture is being done. If the subnet mask of the interface on which the capture is being done is not available, either because the interface on which capture is being done has no netmask or because the capture is being done on the Linux "any" interface, which can capture on more than one interface, this check will not work correctly. ether multicast True if the packet is an ethernet multicast packet. The ether keyword is optional. This is shorthand for `ether[0] & 1 != 0'. ip multicast True if the packet is an IP multicast packet. ip6 multicast True if the packet is an IPv6 multicast packet. ether proto protocol True if the packet is of ether type protocol. Protocol can be a number or one of the names ip, ip6, arp, rarp, atalk, aarp, decnet, sca, lat, mopdl, moprc, iso, stp, ipx, or netbeui. Note these identifiers are also keywords and must be escaped via backslash (\). [In the case of FDDI (For example, `fddi protocol arp'), Token Ring (For example, `tr protocol arp'), and IEEE 802.11 wireless LANS (For example, `wlan protocol arp'), for most of those protocols, the protocol identification comes from the 802.2 Logical Link Control (LLC) header, which is usually layered on top of the FDDI, Token Ring, or 802.11 header. When filtering for most protocol identifiers on FDDI, Token Ring, or 802.11, tcpdump checks only the protocol ID field of an LLC header in so-called SNAP format with an Organizational Unit Identifier (OUI) of 0x000000, for encapsulated Ethernet; it doesn't check whether the packet is in SNAP format with an OUI of 0x000000. The exceptions are: iso tcpdump checks the DSAP (Destination Service Access Point) and SSAP (Source Service Access Point) fields of the LLC header; stp and netbeui tcpdump checks the DSAP of the LLC header; Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 398 atalk tcpdump checks for a SNAP-format packet with an OUI of 0x080007 and the AppleTalk etype. In the case of Ethernet, tcpdump checks the Ethernet type field for most of those protocols. The exceptions are: iso, sap, and netbeui tcpdump checks for an 802.3 frame and then checks the LLC header as it does for FDDI, Token Ring, and 802.11; atalk tcpdump checks both for the AppleTalk etype in an Ethernet frame and for a SNAPformat packet as it does for FDDI, Token Ring, and 802.11; aarp tcpdump checks for the AppleTalk ARP etype in either an Ethernet frame or an 802.2 SNAP frame with an OUI of 0x000000; ipx tcpdump checks for the IPX etype in an Ethernet frame, the IPX DSAP in the LLC header, the 802.3-with-no-LLC-header encapsulation of IPX, and the IPX etype in a SNAP frame. decnet src host True if the DECNET source address is host, which may be an address of the form ``10.123'', or a DECNET host name. [DECNET host name support is only available on ULTRIX systems that are configured to run DECNET.] decnet dst host True if the DECNET destination address is host. decnet host host True if either the DECNET source or destination address is host. ifname interface True if the packet was logged as coming from the specified interface (applies only to packets logged by OpenBSD's pf(4)). on interface Synonymous with the ifname modifier. rnr num R ev isi o n 2. 0 399 C h ap t er F: True if the packet was logged as matching the specified PF rule number (applies only to packets logged by OpenBSD's pf(4)). rulenum num Synonomous with the rnr modifier. reason code True if the packet was logged with the specified PF reason code. The known codes are: match, bad-offset, fragment, short, normalize, and memory (applies only to packets logged by OpenBSD's pf(4)). rset name True if the packet was logged as matching the specified PF ruleset name of an anchored ruleset (applies only to packets logged by pf(4)). ruleset name Synonomous with the rset modifier. srnr num True if the packet was logged as matching the specified PF rule number of an anchored ruleset (applies only to packets logged by pf(4)). subrulenum num Synonomous with the srnr modifier. action act True if PF took the specified action when the packet was logged. Known actions are: pass and block (applies only to packets logged by OpenBSD's pf(4)). ip, ip6, arp, rarp, atalk, aarp, decnet, iso, stp, ipx, netbeui Abbreviations for: ether proto p where p is one of the above protocols. lat, moprc, mopdl Abbreviations for: ether proto p where p is one of the above protocols. Note that tcpdump does not currently know how to parse these protocols. vlan [vlan_id] Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 400 True if the packet is an IEEE 802.1Q VLAN packet. If [vlan_id] is specified, only true is the packet has the specified vlan_id. Note that the first vlan keyword encountered in expression changes the decoding offsets for the remainder of expression on the assumption that the packet is a VLAN packet. tcp, udp, icmp Abbreviations for: ip proto p or ip6 proto p where p is one of the above protocols. iso proto protocol True if the packet is an OSI packet of protocol type protocol. Protocol can be a number or one of the names clnp, esis, or isis. clnp, esis, isis Abbreviations for: iso proto p where p is one of the above protocols. l1, l2, iih, lsp, snp, csnp, psnp Abbreviations for IS-IS PDU types. vpi n True if the packet is an ATM packet, for SunATM on Solaris, with a virtual path identifier of n. vci n True if the packet is an ATM packet, for SunATM on Solaris, with a virtual channel identifier of n. lane True if the packet is an ATM packet, for SunATM on Solaris, and is an ATM LANE packet. Note that the first lane keyword encountered in expression changes the tests done in the remainder of expression on the assumption that the packet is either a LANE emulated Ethernet packet or a LANE LE Control packet. If lane isn't specified, the tests are done under the assumption that the packet is an LLCencapsulated packet. llc True if the packet is an ATM packet, for SunATM on Solaris, and is an LLCencapsulated packet. R ev isi o n 2. 0 401 C h ap t er F: oamf4s True if the packet is an ATM packet, for SunATM on Solaris, and is a segment OAM F4 flow cell (VPI=0 & VCI=3). oamf4e True if the packet is an ATM packet, for SunATM on Solaris, and is an end-to-end OAM F4 flow cell (VPI=0 & VCI=4). oamf4 True if the packet is an ATM packet, for SunATM on Solaris, and is a segment or end-to-end OAM F4 flow cell (VPI=0 & (VCI=3 | VCI=4)). oam True if the packet is an ATM packet, for SunATM on Solaris, and is a segment or end-to-end OAM F4 flow cell (VPI=0 & (VCI=3 | VCI=4)). metac True if the packet is an ATM packet, for SunATM on Solaris, and is on a meta signaling circuit (VPI=0 & VCI=1). bcc True if the packet is an ATM packet, for SunATM on Solaris, and is on a broadcast signaling circuit (VPI=0 & VCI=2). sc True if the packet is an ATM packet, for SunATM on Solaris, and is on a signaling circuit (VPI=0 & VCI=5). ilmic True if the packet is an ATM packet, for SunATM on Solaris, and is on an ILMI circuit (VPI=0 & VCI=16). connectmsg True if the packet is an ATM packet, for SunATM on Solaris, and is on a signaling circuit and is a Q.2931 Setup, Call Proceeding, Connect, Connect Ack, Release, or Release Done message. metaconnect True if the packet is an ATM packet, for SunATM on Solaris, and is on a meta signaling circuit and is a Q.2931 Setup, Call Proceeding, Connect, Release, or Release Done message. expr relop expr Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 402 True if the relation holds, where relop is one of >, <, >=, <=, =, !=, and expr is an arithmetic expression composed of integer constants (expressed in standard C syntax), the normal binary operators [+, -, *, /, &, |, <<, >>], a length operator, and special packet data accessors. To access data inside the packet, use the following syntax: proto [ expr : size ] Proto is one of ether, fddi, tr, wlan, ppp, slip, link, ip, arp, rarp, tcp, udp, icmp or ip6, and indicates the protocol layer for the index operation. (ether, fddi, wlan, tr, ppp, slip and link all refer to the link layer.) Note that tcp, udp and other upper-layer protocol types only apply to IPv4, not IPv6 (this will be fixed in the future). The byte offset, relative to the indicated protocol layer, is given by expr. Size is optional and indicates the number of bytes in the field of interest; it can be either one, two, or four, and defaults to one. The length operator, indicated by the keyword len, gives the length of the packet. For example, `ether[0] & 1 != 0' catches all multicast traffic. The expression `ip[0] & 0xf != 5' catches all IP packets with options. The expression `ip[6:2] & 0x1fff = 0' catches only unfragmented datagrams and frag zero of fragmented datagrams. This check is implicitly applied to the tcp and udp index operations. For instance, tcp[0] always means the first byte of the TCP header, and never means the first byte of an intervening fragment. Some offsets and field values may be expressed as names rather than as numeric values. The following protocol header field offsets are available: icmptype (ICMP type field), icmpcode (ICMP code field), and tcpflags (TCP flags field). The following ICMP type field values are available: icmp-echoreply, icmp-unreach, icmp-sourcequench, icmp-redirect, icmp-echo, icmp-routeradvert, icmp-routersolicit, icmp-timxceed, icmp-paramprob, icmp-tstamp, icmp-tstampreply, icmp-ireq, icmpireqreply, icmp-maskreq, icmp-maskreply. The following TCP flags field values are available: tcp-fin, tcp-syn, tcp-rst, tcp-push, tcp-ack, tcp-urg. R ev isi o n 2. 0 403 C h ap t er F: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 404 R ev isi o n 2. 0 Appendix G: Specifications and Warranty Updated Specifications are found on the Expand Networks website. Click the series number below to be directed to the proper document. The following model numbers and topics are available: Accelerator 6800 / 6900 Series Accelerator 1600 / 1800 Series Accelerator 4800 / 4900 Series Accelerator 7900 Series Standards Terms and Conditions of Sale 406 C h ap t er G : Accelerator 6800 / 6900 Series 6830 6840 6930 6940 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ac ce le rat o r 1 600 / 18 00 Se rie s Accelerator 1600 / 1800 Series 407 1820 1610 R ev isi o n 2. 0 408 C h ap t er G : Accelerator 4800 / 4900 Series 4830 4820 4930 4920 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Accelerator 7900 Series Ac ce ler at or 79 00 Se rie s 409 7940 7930 R ev isi o n 2. 0 410 C h ap t er G : Standards RFC / Standard List Modules RFC /Standard # Router Protocols RIP 1058 RIPv2 1723, 2082 OSPFv2 2328, 2370 WCCP 3040 Router Polling 2096 Spanning Tree Protocol IEEE 802.1D Networking VLAN 802.1Q IEEE 802.1Q HSRP 2281 VRRP 3768 SCPS ISO 15893:2000 CCSDS-714.0-B-1 MIL-STD-2045-44000 NetFlow 3954 DNS Acceleration 1034, 1035, 2181 MIB-2 1213 Management Telnet COM port 2217 Telnet service 818 TFTP 1350 FTP 959 HTTP, HTTPS 2045, 2616, 2818 NTP 1361 SSH, SCTF, SFTP IETF drafts HMAC 2104 (HMAC), 2403(96), 2404 (96), 1321 (MD5) HMAC 2404 MD5 Signing 1321 Radius 2138, 2865 TACACS+ 1492 Security Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Sta n da rd s 411 HW Safety approvals UL 1950, CAN/CSA C22.2, EN60950/A4, No. 950-95 EMC approvals FCC Part 15 Class B EN55022:1998 Class B EN55024:1998 IEC EN61000-4-2:1995 IEC EN61000-4-3:1995 IEC EN61000-4-4:1995 IEC EN61000-4-5:1995 IEC EN61000-4-6:1996 IEC EN61000-411:1994 IEC EN61000-3-2:2000 IEC EN61000-3-3:1995 CISPR16-1:1999 CISPR16-2:1999 ITU IEC 60950-1:2001, EN 60950-1:2001. QMS ISO 9001:2000, EN 46001, ISO 13485 Manufacturing ISO 9000 Environmental and Vibration tests ETSI EN 3000192(1999-09), ESTI EN 300019-2(1994), Bellcore standard: GR63-ORE. MTBF Telcordia (Bellcore) R ev isi o n 2. 0 412 C h ap t er G : Terms and Conditions of Sale Please read these terms and conditions carefully before using the product. By using the product you agree to be bound by the terms and conditions of this agreement. If you do not agree with the provisions of these terms and conditions, promptly return the unused products, manual, and related equipment (with proof of payment) to the place of purchase for a full refund. Acceptance These terms and conditions of sale (“Terms and Conditions”) are the terms and conditions upon which Expand Networks, Ltd. and its affiliates and subsidiaries (together “Expand“) make all sales. Expand will not accept any other terms and conditions of sale, unless Purchaser and Expand have executed an agreement that expressly supersedes and replaces these Terms and Conditions. Acceptance of all purchase orders is expressly made conditional upon Purchaser's assent, expressed or implied, to the Terms and Conditions set forth herein without modification or addition. Purchaser's acceptance of these Terms and Conditions shall be indicated by Purchaser's acceptance of any shipment of any part of the items specified for delivery (the “Products”) or any other act or expression of acceptance by Purchaser. Expand's acceptance is expressly limited to the Terms and Conditions hereof in their entirety without addition, modification or exception, and any term, condition or proposals hereafter submitted by Purchaser (whether oral or in writing) which is inconsistent with or in addition to the Terms and Conditions set forth hereon is objected to and is hereby rejected by Expand. Price and Payment The Purchaser agrees to pay the purchase price for the Products as set forth in Expand's invoice on the date of installation. Purchaser shall bear all applicable federal, state, municipal and other government taxes (such as sales, use and similar taxes), as well as import or customs duties, license fees and similar charges, however designated or levied on the sale of the Products (or the delivery thereof) or measured by the purchase price paid for the Products. (Expand's prices set forth on the front side of the invoice does not include such taxes, fees and charges.) Unless otherwise specified, payment terms are COD in United States Dollars. Expand, at its discretion, may require reasonable advance assurances of payment through irrevocable bank letters of credit or otherwise. All unpaid invoices shall bear interest at an amount equal to 1-1/2% of the outstanding balance per month (or the maximum rate of interest allowed to be contracted for by law, whichever is less), commencing upon the date payment is due. Expand shall have no continuing obligation to deliver Products on credit, and any credit approval may be withdrawn by Expand at any time and without prior notice. Title and Security Interest Title to the Products shall vest in the Purchaser upon date of shipment of the Products to Purchaser. Expand shall retain a security interest in the Products until the Products price and all other monies payable hereunder are paid in full. The Purchaser shall execute, upon request by Expand, financing statements deemed necessary or desirable by Expand to perfect its security interest in the Products. Purchaser authorizes Expand to file a copy of the invoice, these Terms and Conditions or a financing statement with the appropriate state authorities at any time thereafter as a financing statement in order to perfect Expand's security interest. A financing statement may be filed without Purchaser's signature on the basis of Expand's invoice or these Terms and Conditions where permitted by law. Purchaser shall keep the Products in good order and condition until the purchase price has been paid in full and shall promptly pay all taxes and assessments upon the Products or use of the Products. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ter m s an d C o nd it i on s o f S al e 413 Risk of Loss Risk of loss or damage to the Products shall pass to the Purchaser upon delivery of the Products to the common carrier, regardless of whether the purchase price has been paid in full. Unless advised otherwise, Expand may insure the Products shipped to full value and all such insurance costs shall be for the Purchaser's account. The Purchaser shall inspect the Products immediately upon receipt and shall promptly file any applicable claims with the carrier when there is evidence of damage during shipping. Warranty Expand warrants to the purchaser for a period of ninety (90) days from shipment that the products shall be free from defects in material and workmanship and shall perform in substantial conformance with specifications published by Expand. Expand's obligations under these terms and conditions shall be limited solely to Expand making, at Expand's cost and expense, such repairs and replacements as are necessary to place the products in good working order and to conform the products to Expand's published specifications. This warranty is in lieu of all other warranties, express or implied, including without limitation, implied warranties of merchantability and fitness for a particular purpose. Product Returns Return of Products purchased hereunder shall be governed by Expand's RMA policies in effect on the date of the invoice. Expand reserves the right to modify or eliminate such policies at any time. The right to return defective Products, as previously described, shall constitute Expand's sole liability and Purchaser's exclusive remedy in connection with any claim of any kind relating to the quality, condition or performance of any Product, whether such claim is based upon principles of contract, warranty, negligence or other tort, breach of any statutory duty, principles of indemnity or contribution, the failure of any limited or exclusive remedy to achieve its essential purpose, or otherwise. In the event Expand issues a return authorization to Purchaser allowing Purchaser to return Product to Expand, Purchaser will deliver the Product to Expand's address in the United States, if so required by Expand, and Purchaser shall bear all applicable federal, state, municipal and other government taxes (such as sales, use and similar taxes) as well as import or customs duties, license fees and similar charges, however designated or levied, on any replacement Product to be shipped by Expand to Purchaser. License Grant The Products, though primarily composed of hardware components, contain software that is proprietary to Expand or its licensors. Expand hereby grants to Purchaser, and Purchaser accepts, a personal nonexclusive, nontransferable license to use the Program, in object code form only, and the accompanying documentation (collectively referred to as the “Software”) only as authorized in these Terms and Conditions. The Software is licensed for Purchaser's internal use and the Software or any derivative or by-product of the Software may not be used by, sub-licensed, re-sold, rented or distributed to any other party. Purchaser agrees that Purchaser will not assign, sublicense, transfer, pledge, lease, rent, or share Purchaser's rights under these Terms and Conditions. Purchaser shall not copy, modify, reverse assemble, reverse engineer, reverse compile, or otherwise translate all or any portions of the Software. The Software and the Documentation are proprietary to Expand and are protected under U.S. and international copyright, trademark, trade secret and patent laws. All right, title, and interest in and to the Software, including associated intellectual property rights, are and shall remain with Expand. R ev isi o n 2. 0 414 C h ap t er G : Limitation of Liability In no event shall Expand be liable for loss of profits, indirect, special, incidental, or consequential damages (including, without limitation, loss of use, income or profits, losses sustained as a result of personal injury or death, or loss of or damage to property including, but not limited to, property handled or processed by the use or application of the products) arising out of any breach of these Terms and Conditions or obligations under these Terms and Conditions. Expand shall not be liable for any damages caused by delay in delivery, installation, or furnishing of the Products hereunder. No action arising out of any claimed breach of these Terms and Conditions or transactions under these Terms and Conditions may be brought by either party more than two years after the cause of action has accrued. Expand's liability under these Terms and Conditions shall in no event exceed the purchase price of the Products. Default The failure of the Purchaser to perform its obligations under these Terms and Conditions including but not limited to payment in full of the purchase price for the Products, or the filing of any voluntary or involuntary petition under the Bankruptcy Code, insolvency, assignment for the benefit of creditors, or liquidation of the Purchaser's business shall constitute a default under these Terms and Conditions and shall afford Expand all the remedies of a secured party under the Uniform Commercial Code. In the event of default, Expand may, with or without demand or notice to Purchaser, declare the entire unpaid amount immediately due and payable, enter the premises where the Products is located and remove it, and sell any or all the Products as permitted under applicable law. Expand may, in addition to any other remedies which Expand may have, refuse to provide service on the Products under any applicable maintenance agreement relating to the Products then in effect between the parties at the time of the default. Indemnity Expand shall defend or settle any suit or proceeding brought against Purchaser based on a claim that Products sold hereunder constitutes an infringement of any existing United States patent, copyright or trade secret providing that Expand is notified promptly in writing and is given complete authority and information required for the defense. Expand shall pay all damages and costs awarded against Purchaser, but shall not be responsible for any cost, expense or compromise incurred or made by Purchaser without Expand's prior written consent. If any Products is in the opinion of Expand likely to or does become the subject of a claim for patent infringement, Expand may, at its sole option, procure for the Purchaser the right to continue using the Products or modify it to become noninfringing. If Expand is not reasonably able to modify or otherwise secure the Purchaser the right to continue using the Products, Expand shall remove the Products and refund the Purchaser the amounts paid in excess of a reasonable rental for past use. Expand shall not be liable for any infringement or claim based upon use of the Products in combination with other Products or with software not supplied by Expand or with modifications made by the Purchaser. General Expand shall not be liable for Expand's failure to perform or for delay in performance of Expand's obligations under these Terms and Conditions if such performance is prevented, hindered or delayed by reason of any cause beyond the reasonable control of Expand. These Terms and Conditions and the rights and duties hereunder shall not be assignable by either party hereto except upon written consent of the other. Purchaser agrees to pay to Expand any reasonable attorney's fees and other costs and expenses incurred by Expand in connection with the enforcement of these Terms and Conditions. These Terms and Conditions and performance hereunder shall be Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Ter m s an d C o nd it i on s o f S al e 415 governed by and construed in accordance with the laws of the State of New York. Each party acknowledges that it has read, fully understands and agrees to be bound by these Terms and Conditions, and further agrees that it is the complete and exclusive statement of the agreement between the parties, which supersedes and merges all prior proposals, understandings and all other agreements, oral and written, between the parties relating to the subject matter of these Terms and Conditions. These Terms and Conditions may not be modified or altered except by a written instrument duly executed by both parties. If any provision of these Terms and Conditions shall be held to be invalid, illegal or unenforceable, the validity, legality and enforceability of the remaining provisions shall in no way be affected or impaired thereby. The failure of either party to exercise in any respect any right provided for herein shall not be deemed a waiver of any right hereunder. Open Source Provisions The Software is accompanied by the following third party products: JfreeChart (Copyright 2000-2004, by Object Refinery Limited. All rights reserved), Cewolf, and JBoss, which are subject to the GNU Lesser General Public License (the “LGPL”), as published by the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA (or found at http://jasperreports.sourceforge.net/license.html#lgpl), and the following terms: Expand agrees, upon request to provide, at the cost of distribution only, a complete machine-readable copy of the source code for JfreeChart, Cewolf, or JBoss software. This offer is valid for three (3) years from installation of the Software. The Software is accompanied by the following third party product: Apache Copyright © 1999-2004, The Apache Software Foundation, which is subject to the Apache License Version 2.0 (found at www.apache.org/licenses/ LICENSE-2.0). The Software is accompanied by the following third party product: TouchGraph Software: (Copyright ©2001-2002 Alexander Shapiro. All rights reserved) developed by TouchGraph LLC (http://www.touchgraph.com/), which is subject to the TouchGraph LLC. Apache-Style Software License. The Software is accompanied by the following third party product: JavaMail, which is subject to the following terms: Copyright 1994-2004 Sun Microsystems, Inc. All Rights Reserved Neither the name of Sun Microsystems, Inc. or the names of contributors may be used to endorse or promote products derived from this software without specific prior written permission. This software is provided “AS IS,” without a warranty of any kind. ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE HEREBY EXCLUDED. SUN MICROSYSTEMS, INC. (“SUN”) AND ITS LICENSORS SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. IN NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR DIRECT, INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE THIS SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. You acknowledge that this software is not designed, licensed or intended for use in the design, construction, operation or maintenance of any nuclear facility. The Software is accompanied by the following third party product: AdventNet SNMP API 4 (Release 4.0.0), which is subject to the following terms: Copyright (c) 1996-2002 AdventNet, Inc. All Rights Reserved. This software may not be distributed in any modified form without the prior consent from AdventNet, Inc. R ev isi o n 2. 0 416 C h ap t er G : Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Chapter H: Command Line Interface This chapter lists and describes the commands that you can use with the Command Line Interface (CLI). Unless noted, the commands herein may also be configured using the WebUI and are referenced accordingly. This chapter is built hierarchically, based on the tree created in the CLI. For a alphabetical listing of commands, see the CLI index. Topics in this chapter include: Understanding the CLI Configuration Getting Started Performing Basic Setup Customizing the CLI Configuration Commands Configuring WAFS Configuring Security Technical Support Information 418 C h ap t er H: Command Line Interface Understanding the CLI Configuration The Accelerator CLI enables complete configuration of the Accelerator, including basic and advanced configuration via a Command Line Interface (CLI). Use of the CLI is for experts and technicians familiar with CLI configuration that you will see and use with a typical router or switch. Command conventions are displayed in tables as shown: Command Description Parameters Example with Syntax Th e co m m an d as s ee n on th e sc r e en w il l be h er e A description of the command here Any parameters or accepted values here An example wi t h parameters h er e In the table you will note that the commands as shown on the screen are in a regular Courier font. Items that you need to enter are shown in a Courier boldface font. Variables for which you supply values are in italic font. The following conventions are used in examples: Examples that contain system prompts denote interactive sessions, indicating that you enter commands at the prompt. The ()# prompt indicates the current command mode. For example, the following prompt indicates global configuration mode: Acc1(config)# Nonprinting characters, are in angle brackets < >. Understanding Command Modes This section describes the Accelerator’s CLI command mode structure. Each command mode supports specific commands. For example, the bypass enable command is used only in configuration mode. Use the following command modes when configuring the scenarios described in this document: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Un d er s tan d in g t he C L I C o nf ig u r a ti on 419 Basic CLI Procedures You have to enter only enough characters for the Accelerator to recognize the command as unique, as described in detail below. For example, the following string is enough for the Accelerator to recognize the show startup configuration command: Acc1# show startup config To get help in a terminal session: 1. You can use the question mark (?) and arrow keys to help you enter commands. 2. For a list of available commands under each command, enter a question mark. For example: Acc1(config)#? To complete a command: To complete a command, enter a few known characters followed by a tab. The CLI will fill in the missing letters For example if you type and press the Tab key: Acc1(config)#sh By pressing the Tab key, the CLI will fill in the following: Acc1(config)#show To get a list of acceptable commands or values: For a list of command variables, enter the command followed by a space and a question mark for example: Acc1(config)# show ? To redisplay a command previously entered: To redisplay a command you previously entered, press the up-arrow key. You can continue to press the up arrow key earlier entered commands. R ev isi o n 2. 0 420 C h ap t er H: Command Line Interface Getting Started Secure Shell (SSH) is an application program that provides authentication and encryption capabilities for secure Internet communications. This lets you log in to the Accelerator via SSH, if SSH is installed. The Accelerator supports accessing the CLI via SSH, as follows. To log into the Accelerator via SSH: In the Accelerator’s CLI, type the command ssh followed by the Accelerator’s IP address. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Li ce ns in g t he A cc ele ra to r Licensing the Accelerator 421 Licensing the Accelerator is accomplished by logging into the Accelerator via the enable mode by using the show licensing command, as shown in "Displaying the Licensing State of a Specific Accelerator", on page 422. When the Accelerator license has expired, or if the Accelerator was installed but its license was not yet activated, the Accelerator’s status is Active, meaning: it would pass the data but not accelerate it (Work in pass-through mode), as shown below: Acc30_6(config)# show interface link summary Link Destination IP Address 1 non 28.0.214.6 N/A Link Status Description Bandwidth L-28.0.214.6 2000 N/A | active non-link 100000 N/A | active To move the Accelerator to accelerating status: 1. Activate the refresh acceleration command, as follows: Acc30_6(config)# interface link 1 refresh-acceleration 2. Afterwards, the Accelerator will start accelerating the traffic passing through it, as shown below: Acc30_6(config)# show interface link summary Link Destination IP Address 1 non 28.0.214.6 N/A Description Bandwidth Link Status L-28.0.214.6 2000 N/A | accelerating non-link 100000 N/A | virtual To activate the license key: 1. Enter the comand string that is shown in the table below: Command Description ACC1(config)#ac t iv a te -l i ce ns e ke y [valid license key number] Enters the valid license key into the Accelerator. [Mandatory] R ev isi o n 2. 0 422 C h ap t er H: Command Line Interface Parameters Example with Syntax Enter a valid license key that was supplied to you from <Default ¬¹ Font>Expand Networks<Default ¬¹ Font>. If you do not have a valid license key contact <Default ¬¹ Font>Expand Networks<Default ¬¹ Font> technical support. ACC1(config)#a ct i va te - li ce n se ke y valid license key number Displaying the Licensing State of a Specific Accelerator To display the licensing state: Enter the comand string that is shown in the table below: Command AC C 1( c on fi g )# sh o w l ic en s in g Description Lets you view the entire details of Accelerator’s licensing state, such as the licensed features and the maximum possible links. Parameters No additional parameters are required. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e AC C 1( c on fi g )# sh o w l ic en s in g Performing Basic Setup Pe rfor mi ng Ba sic Se tup 423 The configuration options contained in this section include: Viewing the Basic Configuration, on page 423 Logging into the Accelerator, on page 424 Setting Addresses, on page 425 Setting the Deployment Type, on page 427 Setting a Device Name, on page 427 Working with Remote Devices, on page 428 Configuring Subnets, on page 430 Saving/Uploading the Basic Configuration, on page 433 The Basic Accelerator CLI Configuration needed to get the Accelerator up and running consists of setting the following parameters: License key—Licensing the Accelerator, on page 421. IP address/subnet mask—Setting Addresses, on page 425. IP default gateway—Setting a Default Gateway, on page 426. Hostname—Setting a Device Name, on page 427. Deployment—Setting the Deployment Type, on page 427. Link destination—Setting the Remote Device, on page 428 and Setting the IP Address of the Remote Device, on page 429. Link bandwidth—Setting the Bandwidth to a Remote Device, on page 429. Viewing the Basic Configuration To view the basic configuration settings: 1. Enter the comand string that is shown in the table below: Command ACC1(config)#sh o w r un ni n g- co n fi g Description Displays the configuration that was set to the Accelerator. This is optional Parameters No additional parameters Example with Syntax ACC1(config)#sh o w r un ni n g- co n fi g AcceleratorOS, Accelerator 4900 Series Version: v6.1 (0) (Build 5.29) R ev isi o n 2. 0 424 C h ap t er H: Command Line Interface login: expand Password: Expand Version: v6.1.2 accelerator> enable accelerator# configure terminal accelerator(config)# activate-license key ENX1-FUXF-HBJ2K3Y6 License successfully activated. The new License state is: Feature License Time Left ------- ------- --------Bandwidth Allowance 45 Mbps Unlimited Last loaded license key: ENX1-FUXF-HBJ2-K3Y6 accelerator(config)# interface local accelerator(local interface)# hostname ACC1 ACC1(local interface)# ip address 10.1.0.6 255.255.0.0 ACC1(local interface)#ip default-gateway 10.1.0.1 ACC1(local interface)#deployment onpath ACC1(local interface)#exit ACC1(config)#wan default ACC1(wan)#bandwidth 256 kbps ACC1(wan)#exit ACC1(config)#interface link ACC1(LINK)#link destination 10.2.0.6 ACC1(LINK)#bandwidth 128 ACC1(LINK)#encapsulation transparent ACC1(LINK)#exit ACC1(config)#write ACC1(config)show running-config Logging into the Accelerator Logging into the Accelerator is accomplished in a series of steps. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pe rfor mi ng Ba sic Se tup 425 When accessing the Accelerator from the CLI, at the login prompt, enter your user name and password. The default user name is expand (case sensitive), and the default password is Expand (case sensitive). Command l o g in : P a s sw o r d Description Logs you into the CLI Parameters Example with Syntax Both login and password are case sensititve l o g in : e xp a n d P a s sw o r d: E x pa n d Logging out of the Accelerator At any point you can use the Exit command to log out of the Accelerator. The Exit command exits each level of the CLI hierarchy one at a time, so you may need to use the Exit command a number of times to leave the Accelerator session. Command exit Description Logs you into the CLI Parameters Example with Syntax Both login and password are case sensititve exit Setting Addresses There are a few addresses you must set in order to set-up the Accelerator. They include: Setting the IP Address and Subnet Mask, on page 425 Setting a Default Gateway, on page 426 Setting a Secondary IP Address, on page 426 Setting the IP Address and Subnet Mask i NOTE: When executing the ‘no’ command for primary IP address, the IP address reverts to the AcceleratorOS ‘ default IP address - 10.0.99.99/24. To set the IP address and Subnet Mask: Enter the following command as shown in the table: R ev isi o n 2. 0 426 C h ap t er H: Command Line Interface ACC1(local interface)#IP address x.x.x.x x.x.x.x or Command ACC1(local interface)#IP address x.x.x.x/x Description Sets an IP address and subnet mask for the Accelerator. You can add the parameter secondary after the command, to set this IP address as the Accelerator’s secondary IP address. Parameters Valid IP address must be supplied Example with Syntax ACC1(local interface)#IP address 10.0.99.99/24 Setting a Default Gateway To set the default gateway: Enter the following command as shown in the table: AC C1 (l oc al i nt er fa ce )# ip d e fa ul t - Command g at e wa y Description Sets a default gateway for the Accelerator. Parameters Valid IP address must be supplied Example with Syntax AC C1 (l oc al i nt er fa ce )# ip d e fa ul t g at e wa y 10.0.99.99/24 Setting a Secondary IP Address To set a secondary IP address: Enter the comand string that is shown in the table below: ACC1(local interface)#i p a d dr es s x.x.x.x/xx secondary Command Description Sets a secondary IP for the Accelerator. Parameters Valid IP address must be supplied Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pe rfor mi ng Ba sic Se tup Example with Syntax 427 ACC1(local interface)#IP address 10.0.99.99/22 secondary Setting the Deployment Type To set the deployment type: Enter the comand string that is shown in the table below: Command ACC1(local interface)#de p lo ym e nt Description Set the deployment type to On-Path or On-LAN.. Parameters Choose the way you want to deploy the Accelerartor. This is dictated by the way you set-up the Accelerator. For infomation about On Path deployment see, See "On-Path", on page 14. For information about On-LAN deployment, see See "On-LAN", on page 14. Example with Syntax ACC1(local interface)#deployment[onpath] Setting Routing Strategy To set the deployment type: Enter the comand string that is shown in the table below: Command ACC1(local interface)#ro u ti ng s t ra t eg y Description Set the routing strategy to On-Path or On-LAN. If you select bridge-route, the Accelerator transfers the packets in Layer-2, regardless of the routing tables. This routing strategy is carried out only in On-Path deployment, on non-link and local traffic. Parameters auto for automatic, bridge-route for layer 2 (on-path only) and routing-only for Example with Syntax ACC1(local interface)#ro u ti ng s t ra t eg y [ auto] Setting a Device Name To set the device name: R ev isi o n 2. 0 428 C h ap t er H: Command Line Interface Enter the comand string that is shown in the table below: ACC1(local interface)#h os tn a me Command Description Sets a name for the Accelerator. Changing the hostname will affect the prompt (in the Example, the hostname set is ACC1). The hostname can be up to 60 characters, and cannot contain spaces or special characters. You can also set the hostname from the conf mode. Parameters Enter up to a 60 character string with no spaces or special characters. Example with Syntax ACC1(local interface)#h os t na me [ ACC1] Setting the Default WAN Bandwidth To set the default WAN Bandwidth: Enter the comand string that is shown in the table below: Command ACC1(config)#w an de fa u lt ACC1(wan)#b an d wi dt h Description Set the precise bandwidth (in Kbps) of the WAN. 0 is not a valid bandwidth. Parameters A number in Kbps larger than 0 and smaller than 1000000 Example with Syntax ACC1(config)#w an de fa u lt ACC1(wan)#b an d wi dt h 10000 Working with Remote Devices Commands within this section include: Setting Setting Setting Setting Setting the the the the the Remote Device, on page 428 IP Address of the Remote Device, on page 429 Bandwidth to a Remote Device, on page 429 Link to Work with IPcomp, on page 429 Link to Work with Router Transparency, on page 430 Setting the Remote Device To set the remote device: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pe rfor mi ng Ba sic Se tup Command ACC1(config)#in t er f ac e l in k Description Creates a link to the remote Accelerator. Parameters No additional parameters necessary. Example with Syntax 429 A CC 1(c on fi g) # interface link Setting the IP Address of the Remote Device To set the IP Address of the remote device: Enter the comand string that is shown in the table below: Command ACC1(link)#l in k d es ti n at i on Description Lets you enter the IP address of the remote device. Parameters Valid IP address. Example with Syntax ACC1(link)#l in k d es ti n at i on 100.125.125.2 Setting the Bandwidth to a Remote Device To set the bandwidth to the remote device: Enter the comand string that is shown in the table below: Command ACC1(link)#b an dw i dt h number Description Set the precise bandwidth (in Kbps) of the WAN. 0 is not valid. Parameters 1-1,000,000 Kbps Example with Syntax ACC1(link)#b an dw i dt h number 50000 Setting the Link to Work with IPcomp To set the link to work with IPcomp Encapsulation: Enter the comand string that is shown in the table below: Command Description ACC1(link)#e nc ap s ul at i on ip -c o mp Sets the link to work with ipcomp encapsulation. R ev isi o n 2. 0 430 C h ap t er H: Command Line Interface Parameters Example with Syntax No additional parameters ACC1(link)#e nc a ps ul a ti on ip - co mp Setting the Link to Work with Router Transparency i i NOTE: Once the link parameters have been modified, saving the parameters requries you to exit the link mode. If after changing the requested parameters you press Cancel instead of Exit, the parameters are not saved NOTE: Encapsulation settings can be asymmetric. This means that you can set one Accelerator to Router Transparency while setting the other Accelerator to IPComp in the opposite direction. This is useful when RTM mode is desired and one of the Accelerators is On-LAN and the other is On-Path. However, IPCOMP encapsulation will not function if the IPCOMP protocol is blocked by a firewall. Therefore, ensure that the IPCOMP protocol is not blocked before selecting either IPCOMP or RTM encapsulation. To set the link to work with Router Transparency: Enter the comand string that is shown in the table below: Command ACC1(link)#e nc a ps ul a ti on tr a ns pa r en t [ Op t io na l ] Description Sets the link to work in router transparent mode. This setting is optional Parameters No additional parameters Example with Syntax ACC1(link)#e nc a ps ul a ti on tr a ns pa r en t Configuring Subnets This section describes subnet configuration and management. The secion includes the following commands: Adding a Subnet, on page 431 Advertising a Subnet and Adding a Metric, on page 431 Deleting a Subnet, on page 431 Excluding a Subnet from an Interface, on page 432 Viewing subnets, on page 432 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Pe rfor mi ng Ba sic Se tup 431 Configuring Subnets, on page 432 Adding a Subnet To add a subnet: Enter the comand string that is shown in the table below: ACC1(SUBNETS)#ne t wo r k Command Description Adds a subnet Parameters Enter a valid IP address for the subnet, followed by the subnet mask. ACC1(SUBNETS)#ne t wo r k 125.125.2.5 101.120.15.2 Example with Syntax Advertising a Subnet and Adding a Metric To advertise a subnet and add a metric: Enter the comand string that is shown in the table below: ACC1(SUBNETS)#ad v er t is e o r no t a d ve r ti se x. x. x .x x. x. x .x | m e tr i c [number] Command Description Sets the subnet to be advertised or not advertised (can optionally add the subnet mask). Adds a metric value to the subnet. Parameters Choose advertise to advertise the subnet and not-advertise to not advertise it. ACC1(SUBNETS)#advertise 10.0.99.99/ 24 | metric [ 10] Example with Syntax Deleting a Subnet To delete a subnet: Enter the comand string that is shown in the table below: Command ACC1(SUBNETS)#n o n et w or k x .x . x. x Description Deletes the subnet (can optionally add the subnet mask). Parameters Enter the IP address od the subnet R ev isi o n 2. 0 432 C h ap t er H: Command Line Interface ACC1(SUBNETS)#no n e tw or k 10.0.99.99 Example with Syntax Excluding a Subnet from an Interface To exclude a subnet: Enter the comand string that is shown in the table below: AC C 1( SU B NE T S) # exit AC C 1( co n fi g )# interface link Command ACC1(LINK)#su bn e t e xc lu d e x. x .x . x x .x . x. x Description Excludes the subnet from the interface. Parameters Enter the IP address od the subnet ACC1(SUBNETS)#no n e tw or k 10.0.99.99 Example with Syntax Viewing subnets To view a subnet: Enter the comand string that is shown in the table below: ACC1(SUBNETS)#sh ow Command Description Displays the configured subnet. Parameters No additional parameters Example with Syntax ACC1(SUBNETS)#sh ow Configuring Subnets To configure a subnet: Enter the comand string that is shown in the table below: Command Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(link)#li nk so u rc e [ pr im a ry ] [ x. x .x .x ] Pe rfor mi ng Ba sic Se tup Description This command lets you define a link source. The valid link source IPs are as follows: Primary IP, Secondary IP, VLAN IP, HSRP IP and VRRP IP. Parameters Use only a valid IP addresss Example with Syntax 433 ACC1(link)#l i nk s o ur c e [p r im ar y ] [ 10.0.99.99] Saving/Uploading the Basic Configuration To save the configuration: Enter the comand string that is shown in the table below: Command ACC1(config)#w r it e Description Saves the basic configuration as the startup configuration. [Mandatory] Parameters No additional parameters Example with Syntax ACC1(config)#w r it e R ev isi o n 2. 0 434 C h ap t er H: Command Line Interface Customizing the CLI You can customize the CLI banner for your viewing pleasure. The standard banner appears as follows: Connected to 10.0.32.99... AcceleratorOS, Accelerator 6800 Series Version v6.1.2 (Build3.53) Creating a Custom Banner You can customize the following fields, which can be displayed as part of the banner: Name, Title, URL, Label, Label LTD., Product Name, Extranet, Product ID, Series, Serial Number, Software Version, Time and Date. To customize the fields: 1. Create a text file called banner.txt and save it in /user_area by using the CLI command: copy <ftp/scp/tftp/http/sftp> <[path]/banner.txt> 2. In the body of the text file, use the following variables to set the desired values: i NOTE: Each variable must be preceded by a $ sign. The default banner is: "$ OE M _P R OD _N A ME , A cc e le ra t or $ S ER IE S S e ri es ” “ $S OF T WA R E_ VE R SI ON ” “ ” (e m pt y -l in e ) $OEM_NAME (for example: “expand”) $OEM_NAME_TITLE (for example: “<Default ¬¹ Font>Expand<Default ¬¹ Font>”) $OEM_URL (“www.expand.com”) $OEM_LABEL (“<Default ¬¹ Font>Expand Networks<Default ¬¹ Font>”) $OEM_LABEL_LTD (“Expand Networks LTD.”) $OEM_PROD_NAME (“AcceleratorOS”) Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Cu st o m iz in g t h e C L I 435 $OEM_EXTRANET (“extranet.expand.com”) $PRODUCT_ID (“4820”) $SERIES (“4800”) $SERIAL_NUMBER (“0030.0257.0005”) $SOFTWARE_VERSION (“Version v5.0(7) (Build1.03)”) $TIME = hh:mm:ss (24-hour format) $DATE = DD-MMM-YYYY (the day-of-month “DD” is two-digit number, with leading '0' if needed). 3. Proceed to the next section to apply the banner. Applying the Banner To apply the banner: Enter the comand string that is shown in the table below: Command ACC1(config)#b a nn er ap p ly Description Causes the CLI to use the uploaded banner. Parameters No additional parameters Example with Syntax ACC1(config)#b a nn er ap p ly R ev isi o n 2. 0 436 C h ap t er H: Command Line Interface Configuration Commands The following sections are configurable in this section: Entering Configuration Mode Accessing Configuration Options Configuring OSPF Configuring Router Polling Configuring RIP Configuring WCCP Configuring Core Allocation Using the SNTP Server Configuring DHCP Servers Configuring WEB Acceleration Configuring HTTP Acceleration Configuring FTP Acceleration Configuring Ethernet Display Enabling NetFlow Configuring QoS Managing Aggregation Classes Configuring DNS Acceleration Configuring ARP Additional Configurations Defining Link Settings Configuring Expand View Settings Configuring SNMP Configuring the Log Creating Log Archives Using Configuration Tools Enabling Accdump Files Entering Configuration Mode To make any configuration changes to your Accelerator, you must be in configuration mode. This section describes how to enter configuration mode while using a terminal or PC that is connected to your router CONSOLE port. To enter the configutation mode: 1. Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 437 ac ce l er at o r> e na bl e [ Ma n da t or y] Command Description Enters enable mode. This is necessary for beginning work with the Accelerator. Once you have entered Enable mode, the prompt at the end of the command line changes from > to # Parameters No additional parameters Example with Syntax ac ce l er at o r> enable Enable mode is indicated by the # in the prompt. You can now carry out various operations in the system, such as deleting data, printing and sending messages. 2. Enter the configure command to enter configuration mode, indicated by the (config)# in the prompt: Acc1# configure Acc1(config)# You can now make changes to the Accelerator configuration. Accessing Configuration Options To access configuration options: 1. Run your terminal-based application, configuring it as follows: Baud rate: 9600 bps Parity: none Data bits: 8 Stop bits: 1 2. Connect to AcceleratorOS Command Line Interface (CLI). Press <Enter> several times until the Accelerator prompt is displayed: accelerator>. 3. Type enable, and press <Enter> to enter the privilege mode (privilege mode 15 enables complete configuration). 4. A # symbol at the end of the prompt indicates that configuration options are enabled, as shown below. accelerator>enable R ev isi o n 2. 0 438 i C h ap t er H: Command Line Interface accelerator#. NOTE: A > symbol at the end of the accelerator prompt indicates that configuration options are disabled. When configuring the Accelerator via a networked Telnet session, you will be prompted to enter a user name and password. The default user name is expand, the password is Expand (both case sensitive). It is recommended that you change the password. For further information, see section See "Logging into the Accelerator", on page 447. 5. In Enable mode, type configure terminal, and press <Enter>. The accelerator prompt is now followed by (config), indicating that AcceleratorOS is now in Primary Configuration mode, as shown below: accelerator #configure terminal accelerator (config)#. Alias Management Displays and manages virtual server aliasing. The following options are available: Showing Alias Information, on page 438. Changing/Deleting Alias Prefix, on page 439. Showing Virtual Server’s Alias Information, on page 439. Adding an Alias to a Virtual Server, on page 439. Deleting a Virtual Server’s Alias, on page 440. Showing Alias Information Displays alias information and manages prefix/suffix for exported names. To show Alias information: 1. Enter the comand string that is shown in the table below: {hostname}:filecontroller0#alias [show] Command Description Shows alias information Parameters No additional parameters Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0#alias [show] Co n fi g ura t io n Co m m an d s 439 Changing/Deleting Alias Prefix To delete the alias prefix: 1. Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#alias set/delete prefix {prefix} Description Changes/removes prefix for all exported aliases. Parameters No additional parameters Example with Syntax {hostname}:filecontroller0#alias set/delete prefix {prefix} Showing Virtual Server’s Alias Information To show the virtual server ’s alias: 1. Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#alias map [list] Description Shows virtual servers alias information Parameters No additional parameters Example with Syntax {hostname}:filecontroller0#alias map [list] Adding an Alias to a Virtual Server To add an alias to a virtual server: 1. Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#alias map add {VSERVER} {ALIAS} Description Adds an alias to a virtual server. Parameters No additional parameters Example with Syntax {hostname}:filecontroller0#alias map add {VSERVER} {ALIAS} R ev isi o n 2. 0 440 C h ap t er H: Command Line Interface Deleting a Virtual Server’s Alias To delete an alias from a virtual server: 1. Enter the comand string that is shown in the table below: {hostname}:filecontroller0#alias map delete {ALIAS} Command Description Deletes a virtual server alias. Parameters No additional parameters {hostname}:filecontroller0#alias map delete {ALIAS} Example with Syntax Configuring OSPF The following options are available: Enabling OSPF, on page 440 Setting area ID, on page 441 Enabling Authentication, on page 441 Setting the Locality Metric, on page 441 Setting Networks, on page 442 Setting an Authentication Key, on page 442 Setting Neighbors, on page 442 Viewing OSPF Configuration, on page 443 Enabling OSPF To enable OSPF: Enter the comand string that is shown in the table below: ACC1(config)#ro ut e r os p f AC C1 (c on fi g- os pf )# ospf-mode Command Description Enables OSPF on the Accelerator Parameters enable to enable, disable to disable. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(config)#ro ut e r os p f AC C1 (c on fi g- os pf )# ospf-mode enable Co n fi g ura t io n Co m m an d s 441 Setting area ID To set the area ID: Enter the comand string that is shown in the table below: Command ACC1(config-ospf)#a r ea n u mb er or (x.x.x.x) Description Sets the Area ID for the OSPF group, either as a decimal value or in IP address format Parameters Enter a valid IP address Example with Syntax ACC1(config-ospf)#a r ea n u mb er or 120.129.23.3 Enabling Authentication To enable authentication: Enter the comand string that is shown in the table below: Command ACC1(config-ospf)# a ut h en t ic at i on m od e e na bl e /d i sa bl e /M D5 Description Sets the Accelerator to require a password to work with other OSPF devices. Authentication mode enables MD5 encrypted authentication. Parameters Enable to enable, disable to disable Example with Syntax ACC1(config-ospf)# a ut h en t ic at i on m od e e na bl e Setting the Locality Metric To set the locality metric: Enter the comand string that is shown in the table below: ACC1(config-ospf)# h ig h l o ca li t yCommand m et ri c [number] lo w l oc a li t y- me t ri c [number] Description These two different commands determine a range of subnets to be advertised. If a subnet is between the high value and the low value, it should be advertised Parameters Enter a high locality metric and a low locality metric. Make sure that the high locality metric is a larger number then the low. R ev isi o n 2. 0 442 C h ap t er H: Command Line Interface ACC1(config-ospf)# h i gh lo ca l it ym et r ic [ 10] l ow l o ca li t y- m et ri c [ 5] Example with Syntax Setting Networks To set the network: Enter the comand string that is shown in the table below: ACC1(config-ospf)# network (ip address) x.x.x.x (subnet mask) x.x.x.x Command Description Sets the networks that the Accelerator broadcasts to its OSPF neighbors. Parameters Enter a valid IP address AC C1 (c on fi g- os pf )# network ( i p add ress) 1 00.100. 50.5 Example with Syntax Setting an Authentication Key To set the authentication key: Enter the comand string that is shown in the table below: ACC1(config-ospf)# a u t h e n t i c a t i o n - k e y string Command Description Sets a non-encrypted authentication password for the Accelerator. Parameters No additional parameters AC C1 (c on fi g- os pf )# Example with Syntax a ut h en ti c at i on -k e y st ri ng Setting Neighbors To set the neighbor: Enter the comand string that is shown in the table below: ACC1(config-ospf)# n e i g h b o r x . x . x . x Command Description Defines an OSPF neighbor for the Accelerator via the IP address. Parameters Enter a valid IP address Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Example with Syntax 443 AA CC1 (c on fi g- os pf )# n ei g hb o r 1 00 .1 0 0. 10 . 3 Viewing OSPF Configuration To view the OSPF Configuration: Enter the comand string that is shown in the table below: Command ACC1(config-ospf)# s h o w Description Displays OSPF settings. Parameters No additional parameters Example with Syntax AC C1( co nf ig -o sp f) # sh o w Configuring Router Polling The following options are available: Entering the Router Polling Menu Tree, on page 443 Setting Polling, on page 444 Setting Polling Protocols, on page 444 Setting Polling Interval, on page 444 Setting Polling Router, on page 445 Setting Router Polling SNMP Version, on page 445 Setting Router Polling SNMP Community, on page 445 Entering the Router Polling Menu Tree To enter router polling menu tree: Enter the comand string that is shown in the table below: Command ACC1(config)# r o u t e r - p o l l i n g Description Enables the Accelerator to retrieve route rules from the router’s routing table. Parameters No additional parameters Example with Syntax A CC 1(c on fi g) # ro u te r -p ol l in g R ev isi o n 2. 0 444 C h ap t er H: Command Line Interface Setting Polling To enable router polling: Enter the comand string that is shown in the table below: ACC1(config)# r ou t er -p o ll in g [e na b le Command | di s ab l e] Description Enables / disables router-polling. Parameters Enable to enable, disable to disables A CC 1( co nf ig )# r ou te r -p o ll in g Example with Syntax en ab l e Setting Polling Protocols To set polling protocols: Enter the comand string that is shown in the table below: ACC1(router-polling)#p ol l [ protocol Command name(s)] Description Lists the protocols that can be polled. Parameters Enter a specific protocol name A CC 1( ro ut er -p ol lin g) # p o ll [ p ro t o c o l Example with Syntax n a m e ( s )] Setting Polling Interval To set polling intervals: Enter the comand string that is shown in the table below: ACC1(router-polling)#p ol li n g- Command in te r va l Description Sets the frequency with which the router is polled (in seconds). Default is 180 seconds Parameters Enter a frequency in seconds Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e A CC 1( ro ut er -p ol lin g) # p o ll in g in te r va l 1 80 Co n fi g ura t io n Co m m an d s 445 Setting Polling Router To set the polling router: Enter the comand string that is shown in the table below: Command ACC1(router-polling)# ro u te r i p ( x.x.x.x) Description Sets the IP address of the router to be polled. Parameters Enter a valid IP address Example with Syntax A CC 1(r ou te r- po ll in g) # ro u te r i p ( 1 0 0 . 1 0 0 . 5 0 . 5) Setting Router Polling SNMP Version To set a router polling SNMP version: Enter the comand string that is shown in the table below: Command ACC1(router-polling)#sn m p v er s io n [ 1 | 2c ] Description Sets the SNMP version to be used for polling the router. Parameters Enter the SNMP version Example with Syntax A CC 1(r ou te r- po ll in g) # s nm p ve r si o n [1] Setting Router Polling SNMP Community To set a router polling SNMP community: Enter the comand string that is shown in the table below: Command ACC1(router-polling)#sn m p co m mu ni t y [ name] Description Sets the SNMP community to be used for polling the router. Parameters Enter the name of the SNMP community Example with Syntax A CC 1(r ou te r- po ll in g) # p ol l in g i n te r va l 1 80 R ev isi o n 2. 0 446 C h ap t er H: Command Line Interface Configuring RIP The following options are available: Enabling RIP, on page 446 Enabling Authentication, on page 446 Setting an Authentication Key, on page 447 Setting Networks, on page 447 Setting Neighbors, on page 447 Setting RIP to Passive Mode, on page 448 Viewing RIP Configuration, on page 448 Enabling RIP To enable RIP: Enter the comand string that is shown in the table below: ACC1(config)#r ou t er r i p ACC1(config-rip)#rip-mode e na bl e / Command di sa b le Description Enables RIP on the Accelerator Parameters Enable to enable, disable to disable ACC1(config)#r ou t er r i p A CC 1( co nf ig -r ip )# rip-mode e na bl e Example with Syntax Enabling Authentication To enable authentication: Enter the comand string that is shown in the table below: ACC1(config-rip)# a ut he n ti c at io n - Command mo de en a bl e/ d is ab l e/ M D5 Description Sets the Accelerator to need a password to work with other RIP devices. authentication mode enables MD5 encrypted authentication. Parameters Enable to enable, disable to disable Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e A CC 1( co nf ig -r ip )# a ut he n ti ca t io n mo de en a bl e Co n fi g ura t io n Co m m an d s 447 Setting an Authentication Key To set an authentication key: Enter the comand string that is shown in the table below: Command ACC1(config-rip)# a ut he n ti ca t io n -k ey string Description Sets a non-encrypted authentication password for the Accelerator. Parameters Enter the name of the authentication key Example with Syntax A CC 1(c on fi g- ri p) # au t he nt i ca t io nk e y st ri ng Setting Networks To set the network that the Accelerator broadcasts: Enter the comand string that is shown in the table below: Command A CC 1(c on fi g- ri p) # network (ip address) x.x.x.x (subnet mask) x.x.x.x Description Sets the networks that the Accelerator broadcasts to its RIP neighbors. Parameters Enter a valid IP address and subnet mask Example with Syntax A CC 1(c on fi g- ri p) # network (ip address) x.x.x.x (subnet mask) x.x.x.x Setting Neighbors To set the RIP neighbor: Enter the comand string that is shown in the table below: Command ACC1(config-rip)# ne i gh bo r x . x. x. x Description Defines a RIP neighbor for the Accelerator via the IP address. Parameters Enter a valid IP address Example with Syntax ACC1(config-rip)# ne i gh bo r x . x. x. x R ev isi o n 2. 0 448 C h ap t er H: Command Line Interface Setting RIP to Passive Mode To set RIP to passive mode: Enter the comand string that is shown in the table below: ACC1(config-rip)# p as si v e- m od e Command [e na b le | di s ab le ] Description Sets RIP to work in Passive mode. Parameters Enable to enable, Disable to disable ACC1(config-rip)# p as si v e- m od e Example with Syntax en ab l e Viewing RIP Configuration To view RIP Configuration: Enter the comand string that is shown in the table below: ACC1(config-rip)# s ho w Command Description Displays RIP settings Parameters No additional parameters required Example with Syntax ACC1(config-rip)# s ho w Configuring WCCP The following options are available: Enabling WCCP, on page 449. Activating WCCP, on page 449. Displaying WCCP Mode, Services, and Routers Lists, on page 449. Setting WCCP Authentication, on page 450. Setting WCCP Priority, on page 450. Setting WCCP Router IP, on page 451. Setting WCCP TCP Service ID, on page 451. Setting WCCP UDP Service ID, on page 451. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 449 Enabling WCCP Note that if you have multiple Accelerators deployed on your network the same WCCP services should be enabled on each appliance. To enable WCCP: Enter the comand string that is shown in the table below: ACC1(config)#pa c ke t -i nt e rc ep t io n Command w c cp Description Enters WCCP configuration mode. Parameters No additional parameters required ACC1(config)#pa c ke t -i nt e rc ep t io n Example with Syntax w c cp Activating WCCP To Activate WCCP: Enter the comand string that is shown in the table below: Command ACC1(packet interception WCCP)#wc cp m o de [e na b le | di s ab le ] Description Activates/deactivates WCCP mode. Parameters Enable to enable, Disable to disable Example with Syntax ACC1(packet interception WCCP)#wc cp m o de en ab l e Displaying WCCP Mode, Services, and Routers Lists To view the WCCP mode and status: Enter the comand string that is shown in the table below: Command ACC1(packet interception WCCP)#sh ow Description Displays the status of the WCCP service (activated/deactivated) and the services and routers’ lists. Parameters No additional parameters required R ev isi o n 2. 0 450 C h ap t er H: Command Line Interface ACC1(packet interception WCCP)#sh o w Example with Syntax The status is shown as in the figure below. Setting WCCP Authentication To set the WCCP Authentication: Enter the comand string that is shown in the table below: ACC1(packet interception WCCP)#au th e nt ic a ti o n [n o ne | Command pa ss w or d word] Description Sets a password for WCCP authentication. Parameters None for no password, or enter a password string. Example with Syntax ACC1(packet interception WCCP)#au th e nt ic a ti o n pa s sw or d Ex pa n d Setting WCCP Priority To set the WCCP priority: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Command ACC1(packet interception WCCP)#p r io ri t y [0-254] Description Sets the WCCP priority. Parameters Enter a number from 0-254 Example with Syntax 451 ACC1(packet interception WCCP)#p r io ri t y 1 Setting WCCP Router IP To set the WCCP Router IP: Enter the comand string that is shown in the table below: Command ACC1(packet interception WCCP)#r ou t er i p [x.x.x.x] Description Sets the WCCP router IP address. Parameters Enter a valid IP address Example with Syntax ACC1(packet interception WCCP)#r ou t er i p [x.x.x.x] Setting WCCP TCP Service ID To set the WCCP TCP service ID: Enter the comand string that is shown in the table below: Command ACC1(packet interception WCCP)#tc ps e rv i ce i d [ 51-99] Description Sets the WCCP TCP service ID. Parameters Enter a valid ID from 51-99 Example with Syntax ACC1(packet interception WCCP)#tc ps e rv i ce i d 6 0 Setting WCCP UDP Service ID To set the WCCP UDP Service ID: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 452 C h ap t er H: Command Line Interface ACC1(packet interception WCCP)#ud p - Command se rv i ce id [ 51-99] Description Sets the WCCP UDP service ID. Parameters Enter a valid ID from51-99 Example with Syntax ACC1(packet interception WCCP)#ud p se rv i ce id 6 5 Configuring Core Allocation In some scenarios, the Topology-Size is not sufficient and optimizing the Accelerator for the environment requires a more granular tuning. In such cases, adjust the Core Allocation. The Accelerator’s memory is divided into cores, or logical memory components used for acceleration. The larger the core allocated to a link, the higher the acceleration. The system allocates cores according to bandwidth settings. For more information on CLI configuration,see "Performing Basic Setup"on page 445. Core configuration is divided into resource-policy topology configuration and greedy-threshold configuration. Resource-policy topology configures the number of Accelerators on the network. Greedy Threshold sets the minimum number of Accelerators that can connect and optimally share the available memory. Once this number has been surpassed, the memory is equally divided according to the number of Accelerators set in the deployment size, and each connected Accelerator gets a percentage of the total memory for the complete deployment (even if fewer Accelerators are actually installed). In deployments in which bandwidth is asymmetric, you can tune core allocation to allocate larger cores for higher bandwidth installations. While you can set topology-size via the WebUI (see section Defining Advanced Settings, on page 30), setting greedy-threshold size is possible only via the CLI, as follows: To assign cores: 1. In the Accelerator’s CLI, in configuration mode, type core-allocation. 2. In core alloc mode, type greedy-threshold followed by the minimum number of Accelerators to equally share memory, as follows: ACC1(CORE ALLOC)# greedy-threshold [minimum number of Accelerators] The default greedy-threshold size is 1. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 453 To set the number of Accelerators in the network: 1. In the Accelerator’s CLI, in configuration mode, type core-allocation. 2. In core alloc mode, type resource-policy topology size followed by the number of Accelerators in the network, as follows: ACC1(CORE ALLOC)# resource-policy topology size [number of Accelerators on the network] The default resource-policy topology size value is 5 . i NOTE: After the core allocation is modified, it is recommended to reboot the Accelerator. Using the SNTP Server The following options are available: Enabling the SNTP Server, on page 453. Setting the Interval for Polling the SNTP Server for Time Updates, on page 453. Setting the SNTP Server’s IP Address, on page 454. Enabling the SNTP Server To enable the SNTP Server: Enter the comand string that is shown in the table below: Command ACC1(config)#SNTP e na b le /d i sa b le Description Enables the SNTP server. Parameters Enable to enable, disable to disable Example with Syntax ACC1(config)#SNTP e na b le Setting the Interval for Polling the SNTP Server for Time Updates To set the interval for polling the SNTP server for time updates: R ev isi o n 2. 0 454 C h ap t er H: Command Line Interface Enter the comand string that is shown in the table below: ACC1(config)#SNTP i n te rv a l h ou rs [ 1- Command 24] | m in ut e s [ 1-1440] Description Polls the SNTP server for time updates by intervals set by this command. Parameters Enter the time in hours from 1-1440 ACC1(config)#SNTP i n te rv a l h ou rs 24 Example with Syntax Setting the SNTP Server’s IP Address To set the SNTP server ’s IP address: Enter the comand string that is shown in the table below: ACC1(config)#SNTP s e rv er [x.x.x.x] Command Description Enter IP address X.X.X.X as the address of the SNTP server. Parameters Enter a valid IP address Example with Syntax ACC1(config)#SNTP s e rv er 100.100.10.5 Configuring DHCP Servers The following options are available: Enabling DHCP Servers, on page 454. Uploading the DHCP Configuration File, on page 455. Reloading the DHCP Configuration File, on page 455. Testing the DHCP Configuration File, on page 455. Displaying the DHCP Status Information, on page 456. Displaying the End Date of the DHCP Lease Period, on page 456. Configuring an Accelerator to Carry out DHCP Relay, on page 457. Enabling DHCP Servers To enable the DHCP server: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Command ACC1(config)#dh c p ACC1(DHCP)#en a bl e /d is a bl e Description Enables or disables the DHCP Server. Enabling the Server requires having a DHCP configuration file. If this file does not exist, you are prompted to upload it. The DHCP configuration file should be in the user_area, otherwise you have to use the copy command to copy it. Alternatively, upload the DHCP configuration file via the WebUI, thereby copying it directly to the user_area. Parameters Enable to enable, disable to disable Example with Syntax 455 ACC1(config)#dh c p A CC 1(D HC P) # enable Uploading the DHCP Configuration File To upload the DHCP configuration file: Enter the comand string that is shown in the table below: Command ACC1(DHCP)#up l oa d [path] [filename] Description Uploads the DHCP configuration file from the user_area. Parameters Enter a path and a file name. Example with Syntax ACC1(DHCP)#up l oa d [path] [filename] Reloading the DHCP Configuration File To reload the DHCP configuration file: Enter the comand string that is shown in the table below: Command ACC1(DHCP)#re l oa d [path] [filename] Description Reloads the DHCP configuration file from the user_area, if you want to update this file with changes you have made in it. Parameters Enter a valid path and filename Example with Syntax ACC1(DHCP)#re l oa d [path] [filename] Testing the DHCP Configuration File To test the DHCP configuration file: R ev isi o n 2. 0 456 C h ap t er H: Command Line Interface Enter the comand string that is shown in the table below: ACC1(DHCP)#t es t [path] [filename] Command Description Tests the syntax of the DHCP configuration file. Parameters Enter a valid path and file name ACC1(DHCP)#t es t [path] [filename] Example with Syntax Displaying the DHCP Status Information To display the DHCP status: Enter the comand string that is shown in the table below: ACC1(DHCP)#s ho w D HC P Command Description Displays the DHCP status (enabled/disabled). Parameters Enter a valid IP address ACC1(packet interception WCCP)#r ou t er - Example with Syntax ip [x.x.x.x] Displaying the End Date of the DHCP Lease Period To display the end date of the DHCP lease period: Enter the comand string that is shown in the table below: ACC1(DHCP)#s ho w l ea s e [hostname] [IP address] Command Description Displays the end date of the DHCP lease server period. Parameters Enter a valid IP address Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(DHCP)#s ho w l ea s e [hostname] [IP address] Co n fi g ura t io n Co m m an d s 457 Configuring an Accelerator to Carry out DHCP Relay Follow these steps to configure an Accelerator for functioning as a DHCP relay agent: 1. Under Local Interface, enter IP helper address X.X.X.X as the address of the DHCP server. 2. Enable DHCP agent under the local interface. Once configured, the following output is displayed: A DHCP relay agent may receive a client DHCP packet forwarded from a BOOTP/DHCP relay agent closer to the client and may or may not already have a DHCP relay agent option on it. Following is a brief description of each dhcprelay option: R ev isi o n 2. 0 458 C h ap t er H: Command Line Interface Append - if the append flag is set, the relay agent appends an agent option field to each request before forwarding it to the server. Discard - discards all options sent by another DHCP relay. Forward - forwards all options from another DHCP relay. Replace - replaces the options sent by another DHCP relay with options set on the Accelerator. Drop-no-match - drops the options without counting the packets. Max-length - this is the maximum length allowed. Configuring WEB Acceleration Some parameters common to both HTTP and FTP Acceleration are configurable as follows: Setting Web Acceleration, on page 458. Displaying the End Date of the DHCP Lease Period, on page 458. Clearing the Cache, on page 459. Viewing Web Acceleration Parameters, on page 459. Setting Web Acceleration To enter the web acceleration configuration mode: Enter the comand string that is shown in the table below: A CC 1 (c o nf ig ) # web-acceleration Command Description Enters Web-Acceleration configuration mode Parameters No additional parameters needed Example with Syntax A CC 1 (c o nf ig ) # web-acceleration Displaying the End Date of the DHCP Lease Period To display the end date of the DHCP lease period: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 459 ACC1(DHCP)#sh o w l ea se [hostname] [IP address] Command Description Displays the end date of the DHCP lease server period. Parameters Enter a valid IP address ACC1(DHCP)#sh o w l ea se [hostname] [IP address] Example with Syntax Clearing the Cache To clear the cache: Enter the comand string that is shown in the table below: Command A CC 1 (w eb - ac ce l er a ti on ) # cache clear Description Clears the HTTP and FTP caches. Parameters No additional parameters required Example with Syntax A CC 1 (w eb - ac ce l er a ti on ) # cache clear Viewing Web Acceleration Parameters To view the web acceleration parameters: Enter the comand string that is shown in the table below: Command A CC 1 (w eb - ac ce l er a ti on ) # show Description Displays Web-Acceleration parameters. Parameters No additional parameters required Example with Syntax A CC 1 (w eb - ac ce l er a ti on ) # show Configuring HTTP Acceleration The following configutations are available: Enabling/Disabling HTTP Acceleration, on page 460 Configuring the Proxy Server IP and Port, on page 460 Specifying Directly Forwarded Requests, on page 461 R ev isi o n 2. 0 460 C h ap t er H: Command Line Interface Preventing the Caching of Specific Pages, on page 462 Preserving the Client’s Original Source Port, on page 463 Configuring Transparency Support, on page 463 Setting the HTTP Port, on page 464 Setting Content to be Cached, on page 464 Setting the Cache Size, on page 464 Setting the Maximum Object Size, on page 465 Clearing the Cache, on page 465 Setting the Connection Timeout, on page 465 "Setting logs", on page 466. Enabling/Disabling HTTP Acceleration To enable or disable HTTP acceleration: Enter the comand string that is shown in the table below: A CC 1 (h t tp -a c ce le r at i on )# http- Command acceleration [enable | disable] Description Enables/disables HTTP Acceleration. By default HTTP Acceleration is disabled. Parameters Enable to enable, disable to disable. Example with Syntax A CC 1 (h t tp -a c ce le r at i on )# httpacceleration [enable | disable] Configuring the Proxy Server IP and Port i NOTE: After proxy was enabled, disabling DNS requires you to disable proxy first. To configure the proxy server IP and port: Enter the comand string that is shown in the table below: A CC 1 (h t tp -a c ce le r at i on )# proxy Command Ac ce ler at o rOS 6 .1 .2 Us er Gui d e outgoing host <proxy IP> <proxy listening port> A CC 1 (h t tp -a c ce le r at i on )# no proxy outgoing host <proxy IP> <proxy listening port> Co n fi g ura t io n Co m m an d s Description Configures the proxy server IP and listening port. You should configure this command only if DNS is configured. Parameters Enter a valid IP address and port 461 A CC 1 (h tt p -a cc e le r at io n )# proxy Example with Syntax outgoing host <proxy IP> <proxy listening port> A CC 1 (h tt p -a cc e le r at io n )# no proxy outgoing host <proxy IP> <proxy listening port> Specifying Directly Forwarded Requests i NOTE: You should configure this command only if proxy is configured. i NOTE: You can define multiple rules. i Follow these steps to configure proxy: In Internet Explorer - Select Tools > Internet Options>Connections tab. In the bottom section of this tab, click the LAN Settings button and use the Proxy server section of the LAN Settings tab to configure a proxy server. In Mozilla FireFox - Select Tools > Options>Connection>Connection Settings button. In the Connection Settings dialog box, select the Manual proxy configuration button and use the Proxy server section of the LAN Settings tab to configure a proxy server. NOTE: Before configuring a rule direct regular expression, you must configure in the client’s browser the same settings configured in the Accelerator. For example: If you want to set a rule direct to all sites beginning with http://www.g4tv, then in Internet Explorer select Tools > Internet Options> Connections>LAN Settings. Select the checkbox Use a Proxy server for your LAN. Then, click the Advanced button and in the Exceptions section of the Proxy Settings tab, indicate http://www.g4tv as the beginning of an address for which proxy server will not be used. In Mozilla Firefox, Select Tools > Options>Connection>Use Connection Settings button. In the Connection Settings dialog box, type http://www.g4tv in the No proxy for field. To specify a direct foward request: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 462 C h ap t er H: Command Line Interface ACC1(http-acceleration)#rule direct <url regex> ACC1(http-acceleration)#no rule direct Command <url regex> ACC1(http-acceleration)#show rule direct <url regex> Description Defining a regular expression that is valid on a URL. For example: rule direct avaya. When this rule is applied, all requests for the avaya URL will be forwarded directly to the avaya server, without passing through the proxy server. Parameters Enter a valid URL A CC 1 (h t tp -a c ce le r at i on )# rule direct Example with Syntax avaya Preventing the Caching of Specific Pages i i NOTE: The CLI does not allow regular expression using the following characters: # ‘ “ ,. A message error will be displayed as a result of any attempt to insert such a character. NOTE: You should configure this command only if proxy is configured. You can define multiple rules. To prevent the caching of a specific page: Enter the comand string that is shown in the table below: A CC 1 (h t tp -a c ce le r at i on )# r ul e n oca ch e < u rl r e ge x> A CC 1 (h t tp -a c ce le r at i on )# n o ru l e no ca ch e < u rl r e ge x> Command A CC 1 (h t tp -a c ce le r at i on )# s ho w r ul e no -c a ch e < ur l r eg e x> Description Setting a regular expression, valid on a URL, which defines that specific pages will never be cached. When this rule is applied, upon any request for these pages data will not be retrieved from the cache, and after these pages were retrieved from the server they will not be cached. Parameters Enter a valid URL Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e A CC 1 (h t tp -a c ce le r at i on )# r ul e n oca ch e http://www.anyurl.com Co n fi g ura t io n Co m m an d s 463 Preserving the Client’s Original Source Port i NOTE: Preserving the port may have bad implications on outgoing traffic from the Web cache. On the other hand, you cannot activate the QoS mechanism according to the source port, if the source port is not preserved. To enable or diable the preservation of the client’s source port: Enter the comand string that is shown in the table below: A CC 1 (h tt p -a cc e le r at io n )# po r tt r an s pa re n cy [ e na b le | di sa b le ] Command Description This command configures whether the Client's original source port will be preserved. By default, port transparency is disabled. Parameters Enable to enable, disable to disable A CC 1 (h tt p -a cc e le r at io n )# po r tt r an s pa re n cy enable Example with Syntax Configuring Transparency Support To configure transparency support: Enter the comand string that is shown in the table below: A CC 1( h tt p -a cc e le ra t io n )# transparency Command [auto | semi | full] A CC 1( f tp - ac ce l er at i on ) # transparency [auto | semi | full] Description This command configures the status of the interception proxy. You can configure the interception proxy as transparent, thereby preventing the detection of the proxy server’s IP address by sniffing). The following statuses are possible: Semi - applying transparency only on the Client side. Full - applying transparency on both the Client and the server sides. Auto - setting the transparency status automatically according to deployment, namely: Semi in On-LAN deployment and Full in On-Path deployment. Parameters Semi, Full, or Auto as explained above. Example with Syntax A CC 1( h tt p -a cc e le ra t io n )# transparency full A CC 1( f tp - ac ce l er at i on ) # transparency full R ev isi o n 2. 0 464 C h ap t er H: Command Line Interface Setting the HTTP Port To configure the HTTP port: Enter the comand string that is shown in the table below: AC C1 ( ht tp - ac c el er a ti on ) # port [p o r t n u m b e r ] Command Description Sets the default port on which HTTP traffic generally arrives. The default is 80. Parameters Enter a valid port number AC C1 ( ht tp - ac c el er a ti on ) # port 80 Example with Syntax Setting Content to be Cached To set the content to be cached: Enter the comand string that is shown in the table below: A C C1 (h t tp - ac ce l er at i on )# c ac h eco n te nt [e nt e rp ri s e | i nt er n et | al l ] Command Description Sets the type of content to be cached: Enterprise caches all traffic from links and virtual links. Internet caches all traffic on the non-link. All caches all link, virtual link and non-link traffic. Parameters Enterprise, Internet or All, as described above. A C C1 (h t tp - ac ce l er at i on )# c ac h eco n te nt all Example with Syntax Setting the Cache Size To set the cache size: Enter the comand string that is shown in the table below: Command A CC 1 (h tt p -a cc e le r at io n )# ca c he si ze [n u m b e r i n M B ] Description Sets the size of the cache (between 1 and 60 GB). Default is 16 GB. Parameters Enter a valid size (between 1-60 GB). Note that, Approximately 10 MB of RAM is needed for each 1 GB of data cached. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 465 A CC 1( h tt p- a cc e le ra t io n) # ca c he s i ze 16 Example with Syntax Setting the Maximum Object Size To set the maximum object size: Enter the comand string that is shown in the table below: AC C1 ( ht t p- ac c el er a ti o n) #m a x c ac h ed -o b je ct - si z e [n u mb er in M B] Command Description Sets the maximum size for objects stored in the cache. Default is 4096 KB. Parameters Enter a valid size (between 1-60 GB). Note that, Approximately 10 MB of RAM is needed for each 1 GB of data cached. AC C1 ( ht t p- ac c el er a ti o n) #m a x c ac h ed -o b je ct - si z e [n u mb er in M B] Example with Syntax Clearing the Cache To clear the cache: Enter the comand string that is shown in the table below: Command AC C1 ( ht t p- ac c el er a ti o n) #c a ch e c le a r Description Clears the HTTP Acceleration cache. Parameters No additional parameters needed. Example with Syntax AC C1 ( ht t p- ac c el er a ti o n) #m a x c ac h ed -o b je ct - si z e [n u mb er in M B] Setting the Connection Timeout To set the connection timeout: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 466 C h ap t er H: Command Line Interface Command AC C 1( h tt pa cc e le r at io n )# co n ne c t- ti m eo ut [ nu m be r ] Description Sets the amounts of time (in seconds, between 1 and 600) for a client to remain connected with no traffic being cached. Default is 600 seconds. Parameters Enter the time ammount in seconds, as described above. Example with Syntax AC C 1( h tt p- a cc el e ra t io n) # connect- timeout 600 Setting logs To set the log: Enter the comand string that is shown in the table below: Command AC C 1( h tt p- a cc el e ra t io n) #lo gl ev e l [ al er t | e r ro r | i n fo | w ar n in g ] Description You can set the Accelerator’s log file to accumulate events that occur in HTTP Acceleration. To set the type of alerts to be accumulated, set the lowest level of alert to be logged. By default, logging is disabled. When enabled, the default level is Error. Parameters Enter the time ammount in seconds, as described above. Example with Syntax AC C 1( h tt p- a cc el e ra t io n) #lo gl ev e l error Configuring FTP Acceleration This section includes the following options: Enabling/Disabling FTP Acceleration, on page 467. Setting Content to be Cached, on page 467. Setting the Connection Timeout, on page 468. Allocating Cache per a Specific User, on page 468. Setting Minimal Value for the Cache Object Size, on page 468. Enabling/disabling Unicode Display, on page 469. Excluding Servers from Caching, on page 469. Clearing the List of Excluded Servers, on page 470. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 467 Enabling/Disabling FTP Acceleration To enable or disable FTP acceleration: Enter the comand string that is shown in the table below: AC C1 ( ft p -a cc e le ra t io n )# ft p a cc e le ra t io n [ en a bl e | d is a bl e] Command Description Enables/disables FTP Acceleration. By default FTP Acceleration is disabled. Parameters Enable to enable, Disable to disable. AC C1 ( ft p -a cc e le ra t io n )# ft p a cc e le ra t io n d is a bl e Example with Syntax Setting the Cache Size To set the cache size: Enter the comand string that is shown in the table below: Command AC C1 ( ft p -a cc e le ra t io n )# ca c he s iz e [ nu m be r i n M B] Description Sets the size of the cache (between 1 and 60 GB). Default is 50 GB. Approximately 360 KB + 8 MB of RAM is needed for each 1 GB of data cached Parameters Enter a valid size as described above. Example with Syntax AC C1 ( ft p -a cc e le ra t io n )# cache- size 50 Setting Content to be Cached To set the content to be cached: Enter the comand string that is shown in the table below: Command Description AC C1 ( ft p -a cc e le ra t io n )# ca c he c on t en t [ e nt er p ri s e | in t er ne t | a ll ] Sets the type of content to be cached: Enterprise caches all traffic from links and virtual links. Internet caches all traffic on the non-link. All caches all link, virtual link and non-link traffic. R ev isi o n 2. 0 468 C h ap t er H: Command Line Interface Parameters Example with Syntax Enter a valid content type as described above. AC C 1( f tp -a c ce le r at i on )# c ac he c on t en t a ll Setting the Connection Timeout To set the connection timeout: Enter the comand string that is shown in the table below: Command AC C 1( f tp -a c ce le r at i on )# c on ne c tt im e ou t [ nu m be r] Description Sets the amount of time (in seconds, between 1 and 600) for a client to remain connected with no traffic being cached. Default is 60 seconds. Parameters Enter a valid time as described above. Example with Syntax AC C 1( f tp -a c ce le r at i on )# c on ne c tt im e ou t 60 Allocating Cache per a Specific User To allocate cache per specific user: Enter the comand string that is shown in the table below: Command AC C 1( f tp -a c ce le r at i on )# cacheper-user [enable | disable] Description Enables/disables the allocation of cache memory per a specific user. Parameters Enable to enable, Disable to disable Example with Syntax AC C 1( f tp -a c ce le r at i on )# cache- per-user enable Setting Minimal Value for the Cache Object Size To set the minimal value for the cache object size: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Command AC C1 ( ft p -a cc e le ra t io n )# mi n c ac h ed -o b je ct - si z e [n u mb er in K B] Description Lets you configure a minimal value for the objects stored in the cache. Parameters Enter a number in KB that is smaller than the Max value. Example with Syntax 469 AC C1 ( ft p -a cc e le ra t io n )# mi n c ac h ed -o b je ct - si z e 60 Enabling/disabling Unicode Display To enable or disable unicode display: Enter the comand string that is shown in the table below: Command AC C1 ( ft p a cc e le ra t io n) #localization [enable | disable] Description Lets you enable or disable the option to view files in languages that require Unicode characters, such as Chinese. Parameters Enable to enable, Disable to disable. Example with Syntax AC C1 ( ft p a cc e le ra t io n) #localization enable Excluding Servers from Caching To exclude servers from caching: Enter the comand string that is shown in the table below: Command AC C1 ( ft p a cc e le ra t io n) # tr a ns pa r en cy e xc l ud e [s o ur ce | d e st in a ti on | W OR D | i p ] Description Excludes servers from caching, as defined by the following parameters: Source - source traffic direction Destination - destination traffic direction WORD - server name IP - server IP or subnet Parameters Enter a valid parameter as described above. R ev isi o n 2. 0 470 C h ap t er H: Command Line Interface Example with Syntax AC C 1( f tp a cc e le r at io n )# tr a ns p ar en c y e xc l ud e source Clearing the List of Excluded Servers To clear the list of excluded servers: Enter the comand string that is shown in the table below: Command AC C 1( f tp a cc e le r at io n )# tr a ns p ar en c y e xc l ud e d- se r ve rs [c l ea r] Description Removes all servers from the list of excluded servers. This command does not affect traffic that traversed these servers when they were excluded, but only traffic that passes after the command entered into effect.. Parameters No additional parameters are necessary Example with Syntax AC C 1( f tp a cc e le r at io n )# tr a ns p ar en c y e xc l ud e d- se r ve rs clear Studying a Subnet Configuration Network The sample Subnet Configuration is as follows: AC C1 # c on f ig u re t e rm in a l Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 471 A C C1 (c o nf ig ) # r ou te r o sp f A C C1 (c o nf ig - os p f) #a r ea 2 0 .0 . 0. 6 A C C1 (c o nf ig - os p f) # a ut he n ti c at io n -m od e e n ab le A C C1 (c o nf ig - os p f) # a ut he n ti c at io n -k ey ac c el er a to r A C C1 (c o nf ig - os p f) # n ei gh b or 30 .0 . 0. 0/ 8 A C C1 # c on fi g ur e t er m in al A C C1 (c o nf ig ) # r ou te r r ip A C C1 (c o nf ig - ri p )# a u th en t ic a ti on - mo de md 5 A C C1 (c o nf ig - ri p )# a u th en t ic a ti on - ke y a cc e le ra t or A C C1 (c o nf ig - ri p )# n e ig hb o r 3 0. 0. 0 .0 /8 A C C1 # c on fi g ur e t er m in al A C C1 (c o nf ig ) # s ub ne t s A C C1 (S U BN ET S )# n et wo r k 30 . 0. 0 .0 2 5 5. 25 5 .0 . 0 A C C1 (S U BN ET S )# n ot -a d ve rt i se 30 .0 . 0. 0 2 55 . 25 5. 0 .0 A C C1 (S U BN ET S )# e xi t Configuring Ethernet Display The following commands let you configure viewing the Ethernet statistics: Viewing Interface Statistics, on page 471. Viewing Interface Statistics per Specific Link, on page 472. Viewing Interface Statistics To view interface statistics: Enter the comand string that is shown in the table below: Command AC C1 # s h ow i n te rf a ce li nk Description Displays Throughput and Performance statistics for all links since up time, since last cleared and for the last 5 seconds. Parameters No additional parameters are necessary Example with Syntax ACC1# sh ow in te r fa c e li n k R ev isi o n 2. 0 472 C h ap t er H: Command Line Interface Viewing Interface Statistics per Specific Link To view interface statistics for a specific link: Enter the comand string that is shown in the table below: ACC1# sh o w in t er f ac e l in k [ name] Command Description Displays Throughput and Performance statistics for a link since up time, since last cleared and for the last 5 seconds. Parameters Enter the name of the link. ACC1# sh o w in t er f ac e l in k [ name] Example with Syntax Enabling L-7 Traffic Discovery To enable L-7 Traffic Discovery: Enter the comand string that is shown in the table below: AC C 1( c on fi g )# statistic ACC1(statistic)# di s co v er [h t tp | Command c it r ix ] [ en a bl e | d i sa bl e ] Description Enables traffic discovery of HTTP or Citrix traffic traversing the network. Parameters Enter the name of the link. AC C 1( c on fi g )# statistic Example with Syntax AC C1 (s ta ti st ic )# discover http enable Viewing L-7 Traffic To view layer seven traffic: Enter the comand string that is shown in the table below: Command ACC1(config)# sh ow di s co ve r ed h tt p | ci tr i x Description Displays list of discovered HTTP or Citrix traffic traversing the network. Parameters http for HTTP, citrix for Citrix Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Example with Syntax 473 ACC1(config)# s h ow di sc o ve re d http Viewing Application Statistics To view application statistics: Enter the comand string that is shown in the table below: Command ACC1(config)# s h ow ap pl i ca ti o n Description Displays statistics for all applications. Parameters No additional parameters required. Example with Syntax ACC1(config)# s h ow ap pl i ca ti o n Setting Applications as Monitored To set applications as monitored: Enter the comand string that is shown in the table below: Command ACC1(config)# m o ni t or ed a pp l ic at i on [ application name] n o rm a l [ link number | Total] Description Sets a specified application to be monitored over a certain link or over all links. Parameters Enter the application name and link number Example with Syntax ACC1(config)# m o ni t or ed a pp l ic at i on [ application name] n o rm a l [ link number | Total] Viewing Application Traffic To view application traffic: Enter the comand string that is shown in the table below: Command ACC1(config)# s h ow tr af f ic d is c ov er y [ al l | application name] Description Displays all applications traversing the network. Parameters Enter all for all applications or a specific application name. R ev isi o n 2. 0 474 C h ap t er H: Command Line Interface ACC1(config)# sh ow tr a ff ic d is c ov e ry all Example with Syntax Enabling / Disabling Statistics History To enable or disable statistics history: Enter the comand string that is shown in the table below: ACC1# co n fi g ACC(config)#[a p pl ic a ti on na m e] ACC1(name)#st a ti st i cs -h i st o ry Command [ en a bl e /d is a bl e] Description Enables gathering statistics for a particular application. Parameters Enable to enable, Disable to disable ACC1# co n fi g ACC(config)#[a p pl ic a ti on na m e] ACC1(name)#st a ti st i cs -h i st o ry enable Example with Syntax Clearing Counters or Statistics To clear the counters: Enter the comand string that is shown in the table below: ACC1# cl e ar c o un t er s l in k a ll Command [ name] Description Clears all counters. Adding a name at the end of the command clears statistics for a specific link only. Parameters Enable to enable, Disable to disable Example with Syntax ACC1# cl e ar c o un t er s l in k all Enabling NetFlow To enable Net Flow: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 475 ACC1# ne tf l ow ACC1(netflow)# i p f lo w -e x po rt [ x. x .x .x ] p or t [ 1 t o 6 55 35 ] v er s io n [ 5] in t er f ac e e th er n et [ 0, 0/ 0, 0/ 1] te m pl at e [ fu l l, l on g , sh o rt ] Command Description Sets the Accelerator to forward all statistic information to the NetFlow server for monitoring and analysis. Enter the IP address and port number of the NetFlow collector, as well as the NetFlow version number. In addition, enter the interface ethernet to be monitored (the LAN interface Ethernet). For more information on NetFlow statistics collected, see NetFlow Monitored Statistics, on page 357 Parameters Enable to enable, Disable to disable Example with Syntax ACC1# ne tf l ow ACC1(netflow)# i p f lo w -e x po rt 100.100.10.5 p or t 80 ve rs i on [ 5] i nt er f ac e e t he r ne t 0 t e mp la t e full Setting the Max Queue Length To set the Max Queue length: 1. In the Accelerator’s CLI, in interface link configuration mode, type priority max-qlen discard [number] low [number] medium [number] high [number] realtime [number] pass-through [number] 2. Follow each parameter by the size of the queue desired. 3. The default greedy-threshold size is 1. ACC1(LINK)#priority max-qlen discard 1000 low 1000 medium 1000 high 1000 real-time 1000 pass-through 1000. Configuring QoS The following lists the commands necessary to perform QoS configuration as described above via the CLI. The following configurations are available: R ev isi o n 2. 0 476 C h ap t er H: Command Line Interface Viewing Detected Applications, on page 476. Creating a New Application, on page 476. Creating a Web Application, on page 477. Enabling / Disabling Application Acceleration, on page 477. Enabling / Disabling Application Tunneling, on page 478. Globally Filtering an Application, on page 478. Filtering an Application per Link, on page 479. Setting the Application Criteria, on page 479. Setting the Order for the Rule, on page 479. Setting Minimum Bandwidth (Desired), on page 480. Setting Maximum Bandwidth (Limit), on page 480. Prioritizing the Application, on page 480. Critical Application Pass-through, on page 481. Setting Bursts for a Rule, on page 481. Setting the WAN to Work in Strict-priority Mode, on page 482. Enabling Bursts, on page 482. Viewing Detected Applications To view detected applications: Enter the comand string that is shown in the table below: Command ACC1(config)#sh o w ap p li ca t io n Description Displays all detected applications. Parameters No additional parameters needed. Example with Syntax ACC1(config)#sh o w ap p li ca t io n Creating a New Application To create a new application: Enter the comand string that is shown in the table below: ACC1(config)#ap p li ca t io n name Command tc p [ p or t n um be r ] ud p [ p or t n um be r /r a ng e] ov e r- i p [p o rt /r a ng e ] Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Description Defines a new application and application criteria. Parameters Enter a valid TCP port number , a valid UDP port number and range and a valid over-IP port number and range. Example with Syntax 477 ACC1(config)#a p pl i ca ti o n name tc p 80 ud p 60 ov er - ip 55 Creating a Web Application To create a web application: Enter the comand string that is shown in the table below: ACC1(config)#a p pl i ca ti o n l- 7 name h tt p Command ho st - na m e [x.x.x.x or name] ur l- n am e [name] mi me - ty p e [name] us er - na m e [name] Description Define a new web application and criteria on the basis of the specified parameters. Parameters Enable to enable, Disable to disable ACC1(config)#a p pl i ca ti o n l- 7 name h tt p Example with Syntax ho st - na m e [x.x.x.x or name] ur l- n am e [name] mi me - ty p e [name] us er - na m e [name] Enabling / Disabling Application Acceleration To enable or disable application acceleration: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 478 C h ap t er H: Command Line Interface Command ACC1(config)#de c is io n ACC1(decision)#ma tc h a p pl ic a ti on [name] ACC1(decision)#se t a cc e le ra t e d is a bl e /en ab l e Description Sets a specific application to accelerate or do not accelerate. Parameters Enable to enable, Disable to disable Example with Syntax ACC1(config)#de c is io n ACC1(decision)#ma tc h a p pl ic a ti on [name] ACC1(decision)#se t a cc e le ra t e enable Enabling / Disabling Application Tunneling To enable or disable application tunneling: Enter the comand string that is shown in the table below: Command ACC1(config)#de c is io n ACC1(decision)#ma tc h a p pl ic a ti on [name] ACC1(decision)#se t t un n el d is a bl e /en ab l e Description Sets a specific application to tunnel or do not tunnel. Parameters Enable to enable, Disable to disable Example with Syntax ACC1(config)#de c is io n ACC1(decision)#ma tc h a p pl ic a ti on [name] ACC1(decision)#se t t un n el enable Globally Filtering an Application To create a global filter application policy: Enter the comand string that is shown in the table below: Command Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(config)#po l ic y- r ul e g lo ba l o ut b ou n d/ in b ou nd Co n fi g ura t io n Co m m an d s Description Defines a new rule for globally handling an application. Parameters Inbound for inbound, outbound for outbound Example with Syntax 479 ACC1(config)#p o li c y- ru l e gl o ba l inbound Filtering an Application per Link To filter an application per link: Enter the comand string that is shown in the table below: Command ACC1(config)#p o li c y- ru l e li n k number ou tb o un d/ i nb o un d Description Defines a new rule for a specific link. Parameters Inbound for inbound, outbound for outbound Example with Syntax ACC1(config)#p o li c y- ru l e li n k number outbound Setting the Application Criteria To set application criteria: Enter the comand string that is shown in the table below: Command ACC1(rule)#m a tc h a pp l ic at i on [ name or l - 7 name] i p [ an y, so ur c e, de st i na ti o n] x .x . x. x t os b i ts Description Defines the filter for what type of traffic is handled by this rule per IP, tos bits and/or application name. Parameters Enter the application name and a valid IP address Example with Syntax ACC1(rule)#m a tc h a pp l ic at i on [ name or l - 7 name] i p [ an y, so ur c e, de st i na ti o n] x .x . x. x t os b i ts Setting the Order for the Rule To set an order for the rule: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 480 C h ap t er H: Command Line Interface Command ACC1(rule)#se t p ol i cy o r de r [ 10 0 t o 6 55 3 4] Description Defines the importance of the rule. Parameters Enter a valid policy order Example with Syntax ACC1(rule)#se t p o li cy or d er 1000 Setting Minimum Bandwidth (Desired) To set a minimum desired bandwidth: Enter the comand string that is shown in the table below: Command ACC1(rule)#se t p ol i cy r a te d es i re d number (1 to 1 0 00 00 0 ) Description Sets a minimum bandwidth for the application. Parameters Enter a valid policy rate Example with Syntax ACC1(rule)#se t p ol i cy r a te d es i re d number 10000 Setting Maximum Bandwidth (Limit) To set a maximum desired bandwidth limit: Enter the comand string that is shown in the table below: Command ACC1(rule)#se t po l ic y ra te l i mi t number (1 to 1 0 00 0 00 ) Description Sets a maximum bandwidth for the application. Parameters Enter a valid policy rate larger than the minimum Example with Syntax ACC1(rule)#se t po l ic y ra te l i mi t number 100000 Prioritizing the Application To priortize the application: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 481 ACC1(rule)#s e t p ol ic y p ri o ri t y Command h ig h l ow m ed i um r ea l -t im e Description Defines the Priority for the application. Parameters Enter a valid poliy priotrity. ACC1(rule)#s e t p ol ic y p ri o ri t y Example with Syntax h ig h l ow m ed i um r ea l -t im e Critical Application Pass-through To set the traffic to pass-through: Enter the comand string that is shown in the table below: Command AC C1 ( ru l e) #s e t po l ic y p as s t hr o ug h Description Sets the traffic type to override the entire QoS mechanism and pass through critical/Diagnostic traffic Parameters Enter a valid poliy priotrity. Example with Syntax ACC1(rule)#s e t p ol ic y p as s t hr o ug h Setting Bursts for a Rule To set the traffic to pass-through: Enter the comand string that is shown in the table below: Command AC C1 ( ru l e) # s et p ol ic y ra te b ur st en ab le Description Sets the traffic defined for this rule to be allowed to send bursts Parameters No additional parameters required Example with Syntax AC C1 ( ru l e) # s et p ol ic y ra te b ur st en ab le R ev isi o n 2. 0 482 C h ap t er H: Command Line Interface Setting the WAN to Work in Strict-priority Mode To set the traffic to pass-through: Enter the comand string that is shown in the table below: ACC1(config)#wa n [name] /[default] Command AC C 1( W AN )# s tr ic t -p r io ri t y e na b le / di sa b le i nb o un d ou t bo u nd bo t h Description Sets strict-priority for inbound and/or outbound traffic. Parameters No additional parameters required Example with Syntax ACC1(config)#wa n [name] /[default] AC C 1( W AN )# s tr ic t -p r io ri t y enable both Enabling Bursts To enable bursts: Enter the comand string that is shown in the table below: Command ACC1(config)#wa n [name] /[default] ACC1(WAN)#bu r st [ n um be r ] Description Enables bursts on the WAN up to the set bandwidth (1 to 1000000). Parameters Enter the bandwidth Example with Syntax ACC1(config)#wa n [name] /[default] ACC1(WAN)#bu r st [ n um be r ] Managing Aggregation Classes Transferring a small packet imposes a high penalty in terms of the bandwidth use. If the average payload size is 15 bytes (typical in a Citrix environment), the overhead is 25 bytes of IP/tunnel headers, which means that about 60% of bandwidth used is wasted. Citrix (Post Acceleration) Aggregation is intended to better handle and optimize such traffic. Citrix Aggregation aggregates several small packets into one big Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 483 packet. If n packets are aggregated, the savings is (n - 1) * 25 bytes of IP/tunnel headers. The smaller the average packet size is, and the greater the number of packets aggregated together, the greater the percentage of acceleration achieved compared with performance results without Citrix Aggregation. Citrix Aggregation operates per link. Each link can have Citrix Aggregation enabled or disabled independently of other links. The following topics are covered: Configuring Aggregation Classes, on page 483. Defining the Post Aggregation Class, on page 484. Enabling / Disabling Aggregation Classes per Link, on page 485. Setting Aggregation Limit, on page 485. Setting Aggregation Threshold, on page 486. Setting Aggregation Window, on page 486. Applying an Aggregation Class to an Application, on page 487. Configuring Aggregation Classes To configure aggregation classes: Enter the comand string that is shown in the table below: ACC1(config)#a g gr e ga ti o n po s t Command c la s s [d e fa ul t | cu st o m- 1 | c us t om 2 | ci t ri x ] gl o ba l [ en a bl e | d is a bl e ] R ev isi o n 2. 0 484 C h ap t er H: Command Line Interface Description Sets the Citrix aggregation classes globally. Citrix Aggregation on a link has 4 predefined classes that let you configure and apply different Citrix Aggregation settings to different types of traffic: default custom-1 custom-2 citrix Different applications may require different Citrix Aggregation class configuration (for example: different window size and aggregated packet size). Several well-known applications are defined as belonging to 'default' or 'citrix' aggregation class (for example: Citrix and Telnet applications predefined to belong to the 'citrix' class, which is pre-configured to properly handle these applications). You can disable, enable or configure each class. You can set each application that exists in the Accelerator to belong to one of the Citrix Aggregation classes. For information on setting and defining Layer-7 applications, see section "Enabling L-7 Traffic Discovery", on page 500. By default, Citrix is enabled but default, custom-1 and custom-2 are disabled. The Citrix Aggregation class parameter configuration is available only per-link. The Global command is for ease of use. This command is not saved in the configuration file, but goes over each link and changes its configuration to enable/disable. To view Citrix Aggregation statistics, use the show interface link command from the config prompt. Parameters Enter the aggregation post class as described above. Example with Syntax ACC1(config)#ag g re ga t io n p os t c la s s [ de fa u lt | cu s to m- 1 | c us t om 2 | c it ri x ] g lo ba l [ en a bl e | d i sa bl e ] Defining the Post Aggregation Class To define the class of the post aggregation setting: Enter the comand string that is shown in the table below: ACC1(conf)#in t er fa c e li n k [ number] ACC1(LINK)#ag g re ga t io n p os t Command Ac ce ler at o rOS 6 .1 .2 Us er Gui d e c la s s [ de fa u lt | cu s to m- 1 | c us t om 2 | c it ri x ] [ di sa b le | e na b le | li m it | t hr e sh ol d | w in d ow ] Co n fi g ura t io n Co m m an d s Description Defines a class of post aggregation settings. You can define settings per link per class or for the entire link. For limit, threshold and window details see below. The Citrix Aggregation class parameter configuration is available only per-link (see section "Enabling / Disabling Aggregation Classes per Link", on page 485). This command is for ease of use. It is not saved in the configuration file, but goes over each link and changes its configuration to enable/disable Parameters Enter the bandwidth 485 ACC1(conf)#i n te r fa ce li nk [ number] ACC1(LINK)#a g gr e ga ti o n po s t Example with Syntax c la s s [d e fa ul t | cu st o m- 1 | c us t om 2 | ci t ri x ] [d i sa bl e | e na b le | li mi t | t hr es h ol d| w in d ow ] Enabling / Disabling Aggregation Classes per Link To enable aggregation classes per link: Enter the comand string that is shown in the table below: Command ACC1(conf)#i n te r fa ce li nk [ number] ACC1(LINK)#a g gr e ga ti o n po s t [ en a bl e | d is a bl e ] Description Sets the Citrix aggregation classes per link. Parameters Enter the bandwidth Example with Syntax ACC1(conf)#i n te r fa ce li nk [ number] ACC1(LINK)#a g gr e ga ti o n po s t enable Setting Aggregation Limit To set an aggregation limit: Enter the comand string that is shown in the table below: Command ACC1(conf)#i n te r fa ce li nk [ number] ACC1(LINK)#a g gr e ga ti o n po s t l im i t [4 0 - 3 0 00 ] R ev isi o n 2. 0 486 C h ap t er H: Command Line Interface Description Sets the upper limit for packets to be aggregated. Number in bytes. The limit, set in bytes, is the upper ceiling of packet size for packets to be eligible for Citrix aggregation: packets that are larger than LIMIT are not aggregated (they are supposed to be big enough to be sent one at a time). You can configure LIMIT in range 40-3000 bytes. The default value is 256 Parameters Enter the bandwidth Example with Syntax ACC1(conf)#in t er fa c e li n k [ number] ACC1(LINK)#ag g re ga t io n p os t l im i t 256 Setting Aggregation Threshold To set an aggregation threshold: Enter the comand string that is shown in the table below: Command ACC1(conf)#in t er fa c e li n k [ number] ACC1(LINK)#ag g re ga t io n p os t t hr e sh o ld [ 4 0 - 3 00 0 | a u to ] Description Sets the post aggregation threshold, number in bytes 40 to 3000 or automatic. The threshold, set in bytes, is the maximum size of aggregated packets. That is, when an aggregate packet reaches this size, it can be sent. You can configure THRESHOLD in range 40-MTU. The default value is auto, which means that the threshold will be calculated dynamically according to available bandwidth as follows: 512 bytes - for bandwidth that is less than or equal to 512 Kbps 1024 bytes - for bandwidth that is greater than 512 Kbps and less then 1Mbps MTU (usually 1500 bytes but no more than 3000) - for bandwidth that is more than 1Mbps If fragmentation is configured in the link, the threshold auto value will not be larger than the fragmentation size. Parameters Enter the correct threashold Example with Syntax ACC1(conf)#in t er fa c e li n k [ number] ACC1(LINK)#ag g re ga t io n p os t t hr e sh o ld 512 Setting Aggregation Window To set an aggregation window: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Command 487 ACC1(conf)#i n te r fa ce li nk [ number] ACC1(LINK)#a g gr e ga ti o n po s t w in d ow [ 1 - 1 0 0 | a ut o ] Description Sets the post-acceleration window, number in bytes 1 to 100 or automatic. The window command is set in units of 10 ms. This is the maximum amount of time a packet can be delayed in Citrix Aggregation queues. This means that when WINDOW * 10 ms elapses, an aggregate packet is sent (even if its total size has not yet reached LIMIT value). This is done to avoid long packet delays. WINDOW can be configured in a range of 1-100 units. The default value is auto, which means that the WINDOW value is calculated dynamically given the bandwidth and the threshold value. An estimated value of the auto value is bandwidth/ Threshold. This enables the aggreagator to wait enough time to get an aggregated packet with the largest size close to the THRESHOLD value. Parameters Enter the correct threashold Example with Syntax ACC1(conf)#i n te r fa ce li nk [ number] ACC1(LINK)#a g gr e ga ti o n po s t t hr e sh ol d 90 Applying an Aggregation Class to an Application To apply an aggregation class to an application: Enter the comand string that is shown in the table below: ACC1(conf)#d e ci s io n ACC1(DECISION)#m a tc h a pp l ic at i on Command Description [ name] ACC1(DECISION)#s e t ag g re g at io n c la s s [c i tr ix | d ef au l t | c us t om -1 | cu s to m -2 ] Sets the post-acceleration class of an application. An application is coupled with a Citrix Aggregation class through a decision. To see which application belongs to which class, type the show decision command. Parameters Enter the application name and the correct aggregation class. R ev isi o n 2. 0 488 C h ap t er H: Command Line Interface ACC1(conf)#de c is io n ACC1(DECISION)#ma tc h a p pl ic a ti on myapplication ACC1(DECISION)#se t a gg r eg at i on c la s s citrix Example with Syntax Configuring DNS Acceleration This section has the following configuration options: Enabling / Disabling DNS Acceleration, on page 488 Defining Static Hosts, on page 488 Removing Definitions of Static Hosts, on page 489 Clearing the Cache, on page 489 Setting The Cache Size, on page 489 Displaying the Cache Contents, on page 490 Enabling / Disabling DNS Masquerading, on page 490 Defining the TTL Period, on page 490 Defining the Query Timeout Period, on page 491 Defining the Transparency Mode, on page 491 Displaying the DNS Acceleration Statistics, on page 492 Enabling / Disabling the Use of the Accelerator DNS, on page 492 Enabling / Disabling DNS Acceleration To enable or disable DNS acceleration: Enter the comand string that is shown in the table below: AC C 1( D NS -A C C) #D n s- a cc el e ra ti o n [ en a bl e | d i sa bl e ] Command Description Enables/disables DNS Acceleration. By default DNS Acceleration is disabled. Parameters Enable to enable, Disable to disable Example with Syntax AC C 1( D NS -A C C) #D n s- a cc el e ra ti o n enable Defining Static Hosts To define a static host: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 489 Enter the comand string that is shown in the table below: AC C1 ( DN S -A CC ) #i p h os t [ WO R D] [I P ] Command Description Lets you define a static host-name to address, by using the WORD parameter followed by an IP address. Parameters Enter the site name and the correct IP address. AC C1 ( DN S -A CC ) #i p h os t mysite Example with Syntax 100.100.20.5 Removing Definitions of Static Hosts To apply an aggregation class to an application: Enter the comand string that is shown in the table below: AC C1 ( DN S -A CC ) #i p h os t [ pu r ge ] Command Description Lets you remove all definitions of static hosts, by using the purge parameter. Parameters No additional parameters required. AC C1 ( DN S -A CC ) #i p h os t purge Example with Syntax Clearing the Cache To clear the cache: Enter the comand string that is shown in the table below: AC C1 ( DN S -A CC ) #c ac h e c le ar Command Description Lets you clear the cache contents. Parameters No additional parameters required. Example with Syntax AC C1 ( DN S -A CC ) # cache clear Setting The Cache Size To set the cache size: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 490 C h ap t er H: Command Line Interface Command AC C 1( D NS -A C C) #c a ch e s iz e [ 10 0 3 00 0 0 | a ut o ] Description Lets you select whether to accept the system-defined value of the cache size or to set your own value (between 100 and 30000). Parameters Enter the application name and the correct aggregation class. Example with Syntax AC C 1( D NS -A C C) #c a ch e s iz e 2400 Displaying the Cache Contents To display the cache content: Enter the comand string that is shown in the table below: Command AC C 1( D NS -A C C) #s h ow ca ch e Description Displays the details of all hosts currently stored in the cache: host name, host address, flags and expiry time (time-to-leave). Parameters No additional parameters required. Example with Syntax AC C 1( D NS -A C C) #s h ow ca ch e Enabling / Disabling DNS Masquerading To enable or disable DNS Masquerading: Enter the comand string that is shown in the table below: Command AC C 1( D NS -A C C) #D n s- m as qu e ra di n g [ en a bl e | d i sa bl e ] Description Enables/disables DNS masquerading. By default DNS masquerading is disabled. Parameters Enable to enable, Disable to disable Example with Syntax AC C 1( D NS -A C C) #D n s- m as qu e ra di n g enable Defining the TTL Period To define the time to leave period: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Command AC C1 ( DN S -A CC ) #m in T T L (m in u te s) [ pr e se rv e -t tl | 1 -1 44 0 ] Description Lets you select whether to keep the system-defined value of the time-to-leave period (preserve-ttl) or to set your own value (between 1 and 1440 minutes). Parameters Enter the a valid time period as described above. Example with Syntax 491 AC C1 ( DN S -A CC ) #m in T T L (m in u te s) p re s er ve - tt l 440 Defining the Query Timeout Period To define the query timeout period: Enter the comand string that is shown in the table below: Command AC C1 ( DN S -A CC ) #q ue r y t im eo u t (0 3 0) Description Lets you set your own value for the query timeout period (between 0 and 30) Parameters Enter a valid timeout period as described above. Example with Syntax AC C1 ( DN S -A CC ) #q ue r y t im eo u t 25 Defining the Transparency Mode To define the transparency mode: Enter the comand string that is shown in the table below: Command AC C1 ( DN S -A CC ) #t ra n sp a re nc y [ au t o | f ul l | s e mi ] Description Lets you set your requested transparency mode: Semi - the traffic is transparent to the Client, but the server sees it as coming from the Accelerator. Full - the traffic is transparent to both the Client and the Server. Auto - the transparency is determined automatically according to the deployment level: either Semi (in On-LAN deployment) or Full (in On-Path deployment). The default value is Auto. Parameters Enter a valid transparency mode as descrbed above. Example with Syntax AC C1 ( DN S -A CC ) #t ra n sp a re nc y auto R ev isi o n 2. 0 492 C h ap t er H: Command Line Interface Displaying the DNS Acceleration Statistics To apply an aggregation class to an application: Enter the comand string that is shown in the table below: Command AC C 1( D NS -A C C) #s h ow st at i st ic s Description Displays the statistics for the queries since the last time the DNS Acceleration feature was enabled: total number of queries, number of hits and number of misses. Parameters No additional parameters required. Example with Syntax AC C 1( D NS -A C C) # show statistics Enabling / Disabling the Use of the Accelerator DNS To enable or disable the Accelerator ’s DNS: Enter the comand string that is shown in the table below: Command AC C 1( D NS -A C C) #u s e- a cc el e ra to r d ns [e n ab le | di s ab l e] Description Enables/disables the use of Accelerator DNS, thereby defining the Accelerator as a DNS client. By so doing, the Accelerator will always intercept traffic and use its setting to process the traffic, even if that traffic was sent to another DNS server. If you enable the use of Accelerator DNS, you have to configure an IP name server under the DNS node. Parameters Enable to enable, Disable to disable. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e AC C 1( D NS -A C C) #u s e- a cc el e ra to r d ns enable Co n fi g ura t io n Co m m an d s 493 Enabling Traffic Encryption i NOTE: In the Accelerator, subnets that are not defined as local subnets are considered by default as remote subnets (subnets over the WAN). Thus, when IPsec is enabled, users sending traffic from such subnets will not be able to communicate with the Accelerator, as their packets will be dropped. Therefore, enabling these subnets to communicate with the Accelerator requires you to define them as local in the Accelerator, by using the following CLI command: subnet network x.x.x.x/y This section features the following options: Displaying the Traffic Encryption (crypto) on a Specific Link, on page 493 Displaying the Current Crypto Configuration of a Specific Accelerator, on page 493 Displaying the Crypto Details of a Specific Accelerator, on page 494 Displaying the Process of the IPsec Policy Creation on a Specific Accelerator, on page 494 Displaying the Traffic Encryption (crypto) on a Specific Link To display traffic encryption details on a specific link: Enter the comand string that is shown in the table below: Command AC C1 ( co n fi g) # sh ow in t er fa c e l in k Description Lets you view whether IPsec is enabled, which IPsec policy is used and other details. Parameters Enter the link number. Example with Syntax AC C1 ( co n fi g) # sh ow in t er fa c e l in k 1 Displaying the Current Crypto Configuration of a Specific Accelerator To display the current configuration: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 494 C h ap t er H: Command Line Interface Command AC C 1( c on fi g )# sh o w r un ni n gc on f ig Description Lets you view the entire details of the current crypto configuration, such as crypto mode, policy rules and decision number. Parameters No additional parameters required. Example with Syntax AC C 1( c on fi g )# sh o w r un ni n gc on f ig Displaying the Crypto Details of a Specific Accelerator To display the crypto details: Enter the comand string that is shown in the table below: Command AC C 1( c on fi g )# sh o w c ry pt o Description Lets you view the entire details of Accelerator’s crypto, such as the crypto mode, the IKE and the IPsec policies. Parameters No additional parameters required. Example with Syntax AC C 1( c on fi g )# sh o w c ry pt o Displaying the Process of the IPsec Policy Creation on a Specific Accelerator To apply an aggregation class to an application: Enter the comand string that is shown in the table below: Command AC C 1( c ry pt o )# sh o w t ec he nc r yp t io n Description Lets you view the IPsec tunnel status and the Pluto log. Parameters No additional parameters required. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e AC C 1( c ry pt o )# sh o w t ec he nc r yp t io n Co n fi g ura t io n Co m m an d s 495 Configuring ARP This section contains the following configurations: Adding Entries to the ARP Cache, on page 495 Clearing the ARP Cache, on page 495 Setting the Limit on the ARP Cache, on page 495 Setting Additional Limits on the ARP Cache, on page 496 Adding Entries to the ARP Cache To add an entry to the ARP Cache: Enter the comand string that is shown in the table below: Command ACC1(config)#a r p [ IP a d dr es s x .x . x. x] [M AC ad d re ss x x :x x :x x: x x: xx : xx ] Description Sets manual ARP cache entries Parameters Enter a valid IP address and MAC address. Example with Syntax ACC1(config)#a r p I P ad d re ss 100.100.50.2 M AC Ad dr e ss 00:06:5B:15:04:B4 Clearing the ARP Cache To clear the ARP Cache: Enter the comand string that is shown in the table below: Command ACC1(config)#a r p c le ar - ta bl e [ vo l at il e ] Description Clears the ARP cache table. Using the volatile variable lets you clear entries from the active ARP without clearing the database. Parameters No additional parameters required. Example with Syntax ACC1(config)#a r p c le ar - ta bl e [ vo l at il e ] Setting the Limit on the ARP Cache To set a limit to the ARP cache: R ev isi o n 2. 0 496 C h ap t er H: Command Line Interface Enter the comand string that is shown in the table below: Command ACC1(config)#ar p c ac h e ma x -s iz e [ number between 128000 and 8000000] Description Sets a limit on the size of the ARP cache Parameters Enter the maximum size within the range listed above. Example with Syntax AC C1 (c on fi g) # a rp ca c he ma x -s iz e 800000 Setting Additional Limits on the ARP Cache To set an additional limit on the ARP cache: Enter the comand string that is shown in the table below: Command ACC1(config)#ar p c ac h e li m it s [ three numbers between 128000 and 8000000] Description Sets three limits on the size of the ARP cache Parameters Enter up to three numbers within the valid range Example with Syntax ACC1(config)#ar p c ac h e li m it s 200000 300000 400000 Additional Configurations This section contains the following configuration options: Adding a WAN, on page 496. Modifying Interface Speed and Duplex, on page 497. Setting VLAN, on page 497. Autodetecting HSRP Groups, on page 498. Setting HSRP Group Number, on page 498. Setting VRRP Group Number, on page 499. Disabling Bridging, on page 500. Setting an IP address for Eth 0, on page 500. Adding a WAN To add a new WAN: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 497 Enter the comand string that is shown in the table below: Command ACC1(config)#w a n [name] Description Creates a new WAN. Parameters Enter the name of the WAN. Example with Syntax ACC1(config)#w a n mywan Modifying Interface Speed and Duplex To modify interface speed and duplex: Enter the comand string that is shown in the table below: ACC1(config)#i n te r fa ce et he r ne t [0, 0/1, 0/0] ACC1(interface)l i nk -m o de 10 00 M bi t -f ul l Command 10 0M b it - fu ll 10 0M b it - ha lf 10 Mb i t- f ul l 10 Mb i t- h al f au to Description Sets the speed and duplex setting of the interface. Parameters No additional parameters required Example with Syntax ACC1(config)#i n te r fa ce et he r ne t 0 ACC1(interface)l i nk -m o de auto Setting VLAN To set a VLAN: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 498 C h ap t er H: Command Line Interface Command ACC1(config)#in t er fa c e vl a n [number] x. x .x . x x .x . x. x (enter ip address and subnet mask) or n at i ve or n at i ve ta gg e d Description Enables VLAN, sets group number and IP address or native or native tagged Accelerator IP address as VLAN group IP address. Parameters Enter a valid group number, a valid IP address and subnet mask. Example with Syntax ACC1(config)#in t er fa c e vl a n 1 100.100.50.5 Autodetecting HSRP Groups To enable or disable the autodetection of HSRP groups: Enter the comand string that is shown in the table below: Command ACC1(config)#HS R P au t od et e ct e na b le / di sa b le Description The Accelerator can auto-detect HSRP groups on its networks and add them to its Group Table Parameters Enable to enable, Disable to disable. Example with Syntax ACC1(config)#HS R P au t od et e ct enable Setting HSRP Group Number i NOTE: In AcceleratorOS versions up to 6.0, adding an HSRP group automatically included the Accelerator in the group. Starting from AcceleratorOS 6.0, after HSRP group parameters are updated, the Accelerator must join the group. In the CLI this is accomplished using the join/leave commands. To set the HSRP group number: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 499 ACC1(config)#H S RP [number] au th e nt i ca ti o n [s t ri n g] fo rc e -p r io ri t y ip ( up da t e I P ad d re ss - c r ea te g ro u p if it d o es no t e xi st ) Command jo in leave (l ea v e H SR P g ro up ) preempt pr io r it y [ nu m be r 0 - 25 4] ti me r s vi rt u al - ma c (virtual MAC address) vlan (assign HSRP group to VLAN) Description Sets manual configuration of HSRP Parameters Enter a valid IP address, a mac address and a HRSP group number ACC1(config)#H S RP 20 au th e nt i ca ti o n myauthentication fo rc e -p r io ri t y ip 100.100.50.2 Example with Syntax jo in pr ee m pt pr io r it y 1 ti me r s vi rt u al - ma c F:F:F:F:F:F:F:F vl an 2 Setting VRRP Group Number To set the VRRP group number: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 500 C h ap t er H: Command Line Interface AC C 1( c on fi g )# VR R P [ nu mb e r] ip (u p da te IP a d dr e ss - c re at e g ro u p i f it do es no t e xi s t) Command pr e em p t pr i or i ty [ n um be r 0 - 25 4 ] ti m er Description Sets manual configuration of VRRP Parameters Enter a valid IP and priority number AC C 1( c on fi g )# VR R P [ nu mb e r] ip 10 0 .1 00 . 23 .4 Example with Syntax pr e em p t pr i or i ty 100 ti m er Disabling Bridging To disable bridging: Enter the comand string that is shown in the table below: Command ACC1(config)#in t er fa c e e t he rn e t 0 ACC1(interface)# b ri d ge d -s ta t e d is a bl e Description Disables bridge support for the Ethernet 0 interface. Parameters No additional parameters needed Example with Syntax ACC1(config)#in t er fa c e e t he rn e t 0 ACC1(interface)# b ri d ge d -s ta t e disable Setting an IP address for Eth 0 To set the IP address for ETH O: Enter the comand string that is shown in the table below: Command ACC1(config)#in t er fa c e e t he rn e t 0 ACC1(interface)# i p a dd r es s [ x. x .x . x y. y .y .y ] Description Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Sets an IP address and subnet mask for the Ethernet 0 interface. Co n fi g ura t io n Co m m an d s Parameters Example with Syntax 501 Enter a valid IP and subnet mask ACC1(config)#i n te r fa ce e th e rn et 0 ACC1(interface)# i p ad d re s s 100.100.23.2 255.255.255.255 Defining Link Settings The following settings can be configured in this section: Assigning a Link to a WAN, on page 501 Setting a Link to Work in Large Cache Mode, on page 501 Enabling Packet Fragmentation, on page 502 Enabling Packet Aggregation, on page 502 Setting a Link to be Accelerated, on page 503 Setting IPcomp Preservation, on page 503 Forcing Tunneling, on page 504 Including Checksum, on page 504 Assigning a Link to a WAN To assign a link to a WAN: Enter the comand string that is shown in the table below: Command ACC1(config)#i n te r fa ce li nk ACC1(LINK)#w a n- i d [ number/ d ef a ul t] Description Sets the WAN to which this Link is assigned. Parameters Enter a valid IP, VRRP group number, and priority number Example with Syntax ACC1(config)#i n te r fa ce li nk ACC1(LINK)#w a n- i d [ number/ d ef a ul t] Setting a Link to Work in Large Cache Mode To set a link to work in large cache mode: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 502 C h ap t er H: Command Line Interface Command ACC1(LINK)# ca c he -s i ze l a rg e e na b le Description Sets the link to work in Large cache size mode. Parameters No additional parameters needed. Example with Syntax ACC1(LINK)# ca c he -s i ze l a rg e enable Enabling Packet Fragmentation To enable packet fragmentation: Enter the comand string that is shown in the table below: Command AC C 1( L IN K) # fr ag m en t at io n a ut o [ nu m be r ] Description Enables packets to be fragmented on this link. If packets arrive larger than the set size (68 to 6000), the QoS mechanism breaks them up. This setting is useful for handling latency on low bandwidth links, and applies only to traffic set with a CoS value of low, medium and high priority. Fragmentation does not have to be configured symmetrically on both ends. Fragmentation is accomplished on outgoing packets before the packets are compressed. Parameters Enter a valid number as described above Example with Syntax AC C 1( L IN K) # fr ag m en t at io n a ut o 900 Enabling Packet Aggregation To enable packet aggregation: Enter the comand string that is shown in the table below: Command Ac ce ler at o rOS 6 .1 .2 Us er Gui d e AC C 1( L IN K) # ag gr e ga t io n a ut o [ nu m be r ] Co n fi g ura t io n Co m m an d s Description Enables small packets to be aggregated on this link. If packets arrive smaller than the set size (68 to 6000), the QoS mechanism aggregates them and sends them together across the link. This only applies to traffic set with a CoS value of low, medium and high priority. Aggregation is accomplished on outgoing packets before the packets are compressed, and therefore you do not have to configure the aggregation symmetrically on both ends. Aggregation is applied only on congested links, to avoid adding unnecessary latency on non-problematic links. Parameters Enter a valid number as described above Example with Syntax 503 AC C1 ( LI N K) #a g gr eg a ti o n au t o 900 Setting a Link to be Accelerated To assign a link be accelerated: Enter the comand string that is shown in the table below: Command ACC1(LINK)# a c ce l er at i on e n ab l e/ d is a bl e Description Sets the link to accelerate all traffic Parameters Enable to enable, Disable to disable Example with Syntax ACC1(LINK)# a c ce l er at i on enable Setting IPcomp Preservation To assign a link to a WAN: Enter the comand string that is shown in the table below: ACC1(LINK)# h e ad e r pr e se rv a ti o n Command [s rc ] [t os ] [t tl ] R ev isi o n 2. 0 504 C h ap t er H: Command Line Interface Description Sets source IP address, ToS bit or ttl header preservation. SRC: Preserves the source IP address of the original IP header. This setting, which is useful for Policy Routing, also enables distinguishing between sessions. The SRC setting is disabled by default. TOS: Preserves the original ToS point settings - this is enabled by default. TTL: Preserves the original TTL. This is disabled by default. Parameters No additional parameters required ACC1(LINK)# he a de r p re se r va t io n src Example with Syntax tos ttl Forcing Tunneling To set the link to force all traffic into the tunnel: Enter the comand string that is shown in the table below: Command ACC1(LINK)# fo r ce e n ab le / di s ab le Description Sets the link to force all traffic into the tunnel. Parameters Enable to enable, Disable to disable Example with Syntax ACC1(LINK)# fo r ce enable Including Checksum To include a checksum: Enter the comand string that is shown in the table below: Command ACC1(LINK)# ch e ck su m e na b le / d is a bl e Description Includes a checksum in all packet transmissions. This setting is useful for high error rate links and troubleshooting purposes. Parameters Enable to enable, Disable to disable Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(LINK)# ch e ck su m enable Co n fi g ura t io n Co m m an d s 505 Configuring Expand View Settings This section demonstrates how to configure the Accelerator to work with ExpandView NMS. For more information on ExpandView, contact your Expand Networks supplier. This section contains the following configuration options: Enabling / Disabling the ExpandView Agent, on page 505 Setting the ExpandView Server IP Address, on page 505 Setting the ExpandView Server Port, on page 506 Displaying ExpandView Status, on page 506 Enabling / Disabling the ExpandView Agent To enable or disable the ExpandView Agent: Enter the comand string that is shown in the table below: ACC1(config)# e x pa n d- vi e w Command AC C1 ( EV I EW )# ag en t [ e na bl e / d is a bl e] Description Enables/Disables interaction with ExpandView. Parameters Enable to enable, Disable to disable Example with Syntax ACC1(config)# e x pa n d- vi e w AC C1 ( EV I EW )# ag en t enable Setting the ExpandView Server IP Address To set the ExpandView Server IP address: Enter the comand string that is shown in the table below: Command AC C1 ( EV I EW )# IP a d dr e ss [ x. x .x .x ] Description Sets the address of the ExpandView server in an Accelerator. Parameters Enter a valid IP address of the ExpandView server Example with Syntax AC C1 ( EV I EW )# IP a d dr e ss 100.100.25.5 R ev isi o n 2. 0 506 C h ap t er H: Command Line Interface Setting the ExpandView Server Port To set the Expand View Server Port: Enter the comand string that is shown in the table below: Command AC C 1( E VI EW ) # po r t [ xx xx ] Description Sets the port to use for interaction with the ExpandView server. Parameters Enter a legal port number that should be used to interact with the ExpandView server. Example with Syntax AC C 1( E VI EW ) # po r t 81 Displaying ExpandView Status To display the ExpandView status: Enter the comand string that is shown in the table below: Command Description Verifies whether the unit is connected to ExpandView. Parameters No additional parameters Example with Syntax i AC C 1( E VI EW ) # show AC C 1( E VI EW ) # show NOTE: For more information on ExpandView, please refer to the ExpandView user guide. Configuring SNMP This section contains the following configuration options: Enabling / Disabling SNMP, on page 507. Enabling / Disabling SNMP Traps, on page 507. Setting SNMP Trap Community, on page 507. Setting SNMP Community, on page 508. Setting SNMP Version 3 Authentication, on page 508. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s 507 Enabling / Disabling SNMP To enable SNMP: Enter the comand string that is shown in the table below: Command ACC1(config)#s n mp en ab l e/ di s ab l e Description Enables/Disables SNMP support in the Accelerator. Parameters Enable to enable, Disable to disable. Example with Syntax ACC1(config)#s n mp enable Enabling / Disabling SNMP Traps To enable SNMP: Enter the comand string that is shown in the table below: Command ACC1(config)#s n mp tr ap s e na b le / d is a bl e Description Enables/Disables SNMP trap support. Parameters Enable to enable, Disable to disable. Example with Syntax ACC1(config)#s n mp tr ap s enable Setting SNMP Trap Community i NOTE: If, after defining snmp trap manager-ip, snmp read community or snmp trap community, you want to clear these values, use the no command to reverse this definition. For example: no snmp read community [name] To set SNMP trap community: Enter the comand string that is shown in the table below: Command ACC1(config)#s n mp tr a p c om mu n it y [ na m e] Description Sets the name of the SNMP trap community. The default is Public. Parameters Enter a valid name as described above. Example with Syntax ACC1(config)#s n mp tr a p c om mu n it y public R ev isi o n 2. 0 508 C h ap t er H: Command Line Interface Setting SNMP Community To set SNMPcommunity: Enter the comand string that is shown in the table below: Command ACC1(config)#sn m p co m mu ni t y [ na m e] ac ce s s [r e ad - on ly / re ad w ri t e] Description Sets the name of the SNMP community (a group of users that are granted access to certain Accelerator devices). Each SNMP community can have either read-only or read-write authorization. The default community is Public, and its authorization is readwrite. Parameters Enter a valid name and access type as described above. Example with Syntax ACC1(config)#sn m p co m mu ni t y Public access read-write Setting SNMP Version 3 Authentication To set SNMP version 3 authentication: Enter the comand string that is shown in the table below: Command ACC1(config)#sn m p ch a ng e- v 3p as s wo r d Description Sets the password SNMP v.3 password. The default password is expand_initial_password and should be changed. Parameters Enter a valid password as described above. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(config)#sn m p ch a ng e- v 3p as s wo r d expand_initial_password Co n fi g ura t io n Co m m an d s i 509 NOTE: When monitoring for specific MIBs, add the index number of the processor even if only one processor exists. Failing to add the index number results in an error message. For example: using the snmpget command with the syntax snmpget -v 1 -c expand 10.65.0.209 1.3.6.1.4.1.3405.1.3.1.1.2.1.3 returns the following error: There is no such variable name in this MIB. Failed object: SNMPv2-SMI:enterprises.3405.1.3.1.1.2.1.3 The correct string would be: snmpget -v 1 -c expand 10.65.0.209 1.3.6.1.4.1.3405.1.3.1.1.2.1.3.1 <processor id> Configuring the Log Enabling / Disabling the Log, on page 509. Setting the Syslog Facility Number, on page 509. Setting the Syslog Server’s IP Address, on page 510. Defining Sent Events, on page 510. Enabling / Disabling the Log To enable or disable the log: Enter the comand string that is shown in the table below: Command ACC1(config)#l o gg i ng ACC1(logging)#s y sl o g ac t iv e [ di s ab le | en a bl e ] Description Enables Syslog events to be sent. Parameters Enable to enable, Disable to disable Example with Syntax ACC1(config)#l o gg i ng ACC1(logging)#s y sl o g ac t iv e enable Setting the Syslog Facility Number To set the syslog facility number: R ev isi o n 2. 0 510 C h ap t er H: Command Line Interface Enter the comand string that is shown in the table below: ACC1(config)#lo g gi ng ACC1(logging)#sy sl o g f ac il i ty [ number] Command Description Sets the Syslog facility number. Parameters Enter a valid number ACC1(config)#lo g gi ng ACC1(logging)#sy sl o g f ac il i ty 23 Example with Syntax Setting the Syslog Server’s IP Address To set the IP address of the syslog server: Enter the comand string that is shown in the table below: ACC1(config)#lo g gi ng ACC1(logging)#sy sl o g s er ve r i p [ IP address (x.x.x.x)] Command Description Sets the IP address of the Syslog server. Parameters Enter a valid IP address as described above. ACC1(config)#lo g gi ng ACC1(logging)#sy sl o g s er ve r i p 100.100.20.3 Example with Syntax Defining Sent Events To define a sent event: Enter the comand string that is shown in the table below: ACC1(config)#lo g gi ng ACC1(logging)#sy sl o g s ev er i ty Command m in i mu m [ in f o | w ar ni n g | e rr or | f a ta l] ma x im um [f at a l | e rr or | w a rn i ng | in fo ] Description Defines which events to send, from the minimum to the maximum. Parameters Enter a valid event as described above. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Example with Syntax 511 ACC1(config)#l o gg i ng ACC1(logging)#s y sl o g se v er it y minimum warning maximum error Enabling / Disabling Event Notification To enable or disable event notification: Enter the comand string that is shown in the table below: Command ACC1(config)#l o gg i ng ACC1(logging)#m a il ac ti v e [ di s ab le | en a bl e ] Description Sets the Accelerator to send email notification when events and alerts are received Parameters Enable to enable, disable to disable Example with Syntax ACC1(config)#l o gg i ng ACC1(logging)#m a il ac ti v e enable Creating an Accelerator Messenger Account To set the email address: Enter the comand string that is shown in the table below: Command ACC1(config)#l o gg i ng ACC1(logging)#m a il fr om [name] Description Sets the name to appear in the From field of emails sent from the Accelerator. Parameters Enter a valid password as described above. Example with Syntax ACC1(config)#l o gg i ng ACC1(logging)#m a il fr om [name] Setting the Notification Recipient To set who will receive the notifications: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 512 C h ap t er H: Command Line Interface Command ACC1(config)#lo g gi ng ACC1(logging)#ma il re c ip ie n t [ name] Description Sets the name to appear in the To field of emails sent from the Accelerator. Parameters Enter a valid email address as described above. Example with Syntax ACC1(config)#lo g gi ng ACC1(logging)#ma il re c ip ie n t username@emailaddress.com Setting the Mail Server’s IP Address To set the mail server ’s IP address: Enter the comand string that is shown in the table below: Command ACC1(config)#lo g gi ng ACC1(logging)#ma il se r ve r i p[ ip address (x.x.x.x)] Description Sets the IP address of the mail server. Parameters Enter a valid IP address as described above. Example with Syntax ACC1(config)#lo g gi ng ACC1(logging)#ma il se r ve r i p 100.100.50.8 Setting the Mail Server’s Port Number To set the port of the mail server: Enter the comand string that is shown in the table below: Command ACC1(config)#lo g gi ng ACC1(logging)#ma il se r ve r p or t [port number] Description Sets the port of the mail server. Parameters Enter a valid port number as described above. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(config)#lo g gi ng ACC1(logging)#ma il se r ve r p or t 86 Co n fi g ura t io n Co m m an d s 513 Setting SNMP Version3 Authentication To set SNMP version 3 authentication: Enter the comand string that is shown in the table below: ACC1(config)#l o gg i ng ACC1(logging)#m a il se ve r it y Command m in i mu m [ in fo | wa r ni ng | er r or | f at a l] m a xi m um [ e rr or | fa t al | i n fo | wa rn i ng ] Description Defines which events are sent, from the minimum to the maximum. Log events are as follows: info - informational events warning - warnings error - errors in acceleration fatal - fatal errors Parameters Enter the event as described above. Example with Syntax ACC1(config)#l o gg i ng ACC1(logging)#m a il se ve r it y minimum info maximum fatal Creating Log Archives The log archive creation does not have its own mode, and can be carried out either from the Enable or Config modes. The following options are available: Creating a Log Archive, on page 513. Deleting a Log Archive, on page 514. Uploading Log Archive Files, on page 514. Displaying Log Archive Files, on page 515. Creating a Log Archive To create a log archive: Enter the comand string that is shown in the table below: Command ACC1#lo g a rc hi v e [ pr ef i x] R ev isi o n 2. 0 514 C h ap t er H: Command Line Interface Description Enables creating a log archive. To insert your selected prefix, type this prefix in the WORD field. Parameters Enter a valid prefix if desired Example with Syntax ACC1#lo g a rc h iv e myprefix Deleting a Log Archive To delete an log archive: Enter the comand string that is shown in the table below: Command ACC1#lo g a rc h iv e [ de l et e] [ fi l en a me ] | [ al l ] Description Enables deleting a log archive. You can select between the following options: WORD - to delete a specific file. all - to delete all files. Parameters Enter a specific file name or All to delete all files as described above. Example with Syntax ACC1#lo g a rc h iv e delete all Uploading Log Archive Files To upload a log archive file: Enter the comand string that is shown in the table below: Command ACC1#lo g u pl o ad [m et h od ] [ fi l en a me ] | [ la t es t ] [ de s ti n at io n ] Description Lets you select the parameters for uploading log archive files: which method to use, which files to upload, and the requested destination. The optional values are as follows: Method - FTP, SFTP, TFTP and SCP Filename - to select a specific file. Latest - to upload the latest generated log archive. Destination - the destination of the file. Parameters Enter parameters as described above Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1#lo g u pl o ad FTP myfilename latest T:\\mynetworkdrive Co n fi g ura t io n Co m m an d s 515 Displaying Log Archive Files To display a log archive file: Enter the comand string that is shown in the table below: Command ACC1#sh ow lo g a rc h iv e Description Lets you view all archived log files, including name, size and time stamp. Parameters No additional parameters required. Example with Syntax ACC1#sh ow lo g a rc h iv e Using Configuration Tools The following topics are available: Displaying the Configuration Settings, on page 515. Saving the Running Configuration, on page 516. Reverting Back to the Last Saved Startup, on page 516. Restoring the Configuration to Factory Default Settings, on page 516. Sending a Ping, on page 517. Sending a Traceroute, on page 517. Viewing Technical Support Statistics, on page 518. Displaying the Configuration Settings To display the configuration: Enter the comand string that is shown in the table below: Command AC C1 ( co n fi g) # wr it e t e rm in a l Description Displays the running configuration on the terminal screen (similar to the show startup-config command). Parameters No additional parameters required Example with Syntax AC C1 ( co n fi g) # write terminal R ev isi o n 2. 0 516 C h ap t er H: Command Line Interface Saving the Running Configuration To save the running configuration: Enter the comand string that is shown in the table below: Command AC C 1( c on fi g )# wr i te st ar t up c on f ig Description Saves the running configuration as the startup configuration. Parameters No additional parameters required Example with Syntax AC C 1( c on fi g )# write startup- config Reverting Back to the Last Saved Startup To revert back to the last saved startup: Enter the comand string that is shown in the table below: Command ACC1(config)#co p y st ar t up -c o nf i g r un n in g -c on f ig Description Reverts the running configuration to the last saved startup configuration. Parameters No additional parameters required Example with Syntax ACC1(config)#co p y st ar t up -c o nf i g r un n in g -c on f ig Restoring the Configuration to Factory Default Settings To restore the default settings: Enter the comand string that is shown in the table below: Command ACC1(config)#er a se s t ar tu p c on f ig u ra ti o n Description Restores the Accelerator’s configuration to the Factory Default Settings. Parameters No additional parameters required Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(config)#er a se s t ar tu p c on f ig u ra ti o n Co n fi g ura t io n Co m m an d s 517 Sending a Ping To send a ping: Enter the comand string that is shown in the table below: ACC1(config)#p i ng [i p (x.x.x.x) | Command hostname] Description Pings network devices Parameters Enter a valid IP and host ACC1(config)#p i ng 100.100.10.4 myhostname Example with Syntax Sending a Traceroute To send a traceroute: Enter the comand string that is shown in the table below: Command ACC1(config)#t r ac e ro ut e [i p (x.x.x.x) | hostname] Description Sends a traceroute to network devices Parameters Enter a valid IP and host Example with Syntax ACC1(config)#t r ac e ro ut e 100.100.10.4 myhostname Displaying the Packets’ TraceRoute To display the packet’s traceroute: Enter the comand string that is shown in the table below: Command Description Parameters Example with Syntax {hostname}:filecontroller0# traceroute [host] Displays the route to a remote machine, where [host] represents the machine host’s name. No additional parameters required. {hostname}:filecontroller0# traceroute [host] R ev isi o n 2. 0 518 C h ap t er H: Command Line Interface Viewing Technical Support Statistics To view technical support statistics: Enter the comand string that is shown in the table below: Command ACC1(config)#sh o w te c h- su p po rt [ co n ti n uo us ] Description Gathers troubleshooting statistics from the Accelerator. Press More to view additional output each time; alternatively, add the parameter cotinuous, to enable continuous output. Parameters Only add the continuous parameter if you want continuous output Example with Syntax ACC1(config)#sh o w te c h- su p po rt continuous Enabling Accdump Files The following configuration options are available: Accessing the AccDump Configuration Menu, on page 518. Enabling / Disabling ACCDump, on page 519. Configuring Tcpdump File Size, on page 519. Configuring Tcpdump File Format, on page 519. Configuring Tcpdump File Number, on page 520. Configuring Tcpdump Optional Flags, on page 520. Uploading Tcpdump Files, on page 520. Selecting the TCPDump Interface, on page 521. Selecting the TCPDump Filter Expressions, on page 521. Accessing the AccDump Configuration Menu To access the accdump menu options: Enter the comand string that is shown in the table below: Command AC C 1( c on fi g )# accdump Description Enables accdump (default) Parameters No additional parameters needed Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e AC C 1( c on fi g )# accdump Co n fi g ura t io n Co m m an d s 519 Enabling / Disabling ACCDump To enable or disable ACCDump: Enter the comand string that is shown in the table below: Command ACC1(ACCDUMP)#i p t c pd um p e na b le / d is a bl e Description Enables or disables accdump. Note: If you choose enable, all values you configured do not affect the database. The database is being updated only after you carry out the exit command. Parameters Enable to enable, Disable to disable Example with Syntax ACC1(ACCDUMP)#i p t c pd um p enable Configuring Tcpdump File Size To configure the TCPDump File Size: Enter the comand string that is shown in the table below: Command ACC1(accdump)#i p t c pd um p f il e s iz e [ number] Description Configures the tcpdump file size. Possible values are 1 to 1000 MB. Parameters Enter a valid number as described above. Example with Syntax ACC1(accdump)#i p t c pd um p f il e s iz e 500 Configuring Tcpdump File Format To configure the TCPDump file format: Enter the comand string that is shown in the table below: Command ACC1(accdump)#i p t c pd um p f il e sf or m at e n c/ pc a p Description Configures the tcpdump file format. The available types are Pcap (saves the default format) and enc (reformats the file) Parameters Enter a valid IP and host R ev isi o n 2. 0 520 C h ap t er H: Command Line Interface Example with Syntax ACC1(accdump)#ip t c pd u mp f i le sf or m at enc Configuring Tcpdump File Number To configure the TCPDump File Number: Enter the comand string that is shown in the table below: Command ACC1(accdump)#ip t c pd u mp f i le sn um b er au to / [ number] Description Configures the tcpdump file number. Possible values are 1 to 1000. If you type auto, the system sets the file number and file size to default (100 and 10MB, respectively). Parameters Enter a valid number or auto as described above Example with Syntax ACC1(accdump)#ip t c pd u mp f i le sn um b er auto Configuring Tcpdump Optional Flags To configure the optional flags: Enter the comand string that is shown in the table below: Command Description ACC1(accdump)#ip t c pd u mp f l ag s ( f l a g n a m e) Lets you select tcpdump optional flags. For a detailed description of the optional flags, see in the appendix, tcpdump Optional Flags, on page 417. Parameters Enter a flag name as described in in the appendix, tcpdump Example with Syntax Optional Flags, on page 417. ACC1(config)#tr a ce ro u te 100.100.10.4 myhostname Uploading Tcpdump Files To upload the TCPDump file: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ura t io n Co m m an d s Command ACC1(accdump)#i p t c pd um p u pl o ad [ me t ho d] [f il e ] [ de st i na ti o n] Description Lets you select the parameters for uploading tcpdump files: which method to use, which files to upload, and the requested destination. The optional values are as follows: Method - FTP, SFTP, TFTP and SCP File - one of the accdump files Destination - like in the Copy operation: user.password@ip/ file_destination_path Parameters Enter a valid IP and host Example with Syntax 521 ACC1(accdump)#i p t c pd um p u pl o ad FTP myfile T:\mynetworkdrive Selecting the TCPDump Interface To select the TCPDump Interface: Enter the comand string that is shown in the table below: Command ACC1(accdump)#i p t c pd um p i nt e rf ac e Description Lets you select one of the following options for an interface: any - capture packets from all interfaces. eth-local - capture packets from local interfaces. eth0 - captures packets from ethernet 0 eth0/0 - captures packets from ethernet 0/0 eth0/0 - captures packets from ethernet 0/1 internal - captures packets from internal interfaces Parameters Enter a valid interface as described above Example with Syntax ACC1(accdump)#i p t c pd um p i nt e rf ac e any Selecting the TCPDump Filter Expressions To select a TCPDump Filter Expression: Enter the comand string that is shown in the table below: Command Description ACC1(accdump)#i p t c pd um p f il t er Lets you filter the download of the tcpdump files by using filter expressions in the formats acceptable by the system, such as net_10.2.3.0/24_and_port_20. R ev isi o n 2. 0 522 C h ap t er H: Command Line Interface Parameters Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Enter a valid expression ACC1(accdump)#ip t c pd u mp f i lt er net_10.2.3.0 Configuring WAFS Co n fi g ur in g WAF S 523 Most of the WAFS configuration is done through the CLI, letting you display and manage printing devices and printing authorizations. The following configurations are available: Basic Operations, on page 523. Basic Operations, on page 523. Print Administration Activities, on page 527. Setting Drivers, on page 529. Managing CUPS, on page 531. Working with Printer Ports, on page 532. Managing Printers, on page 534. Managing WAFS Transparency, on page 535. Creating Excluded Servers, on page 536. Managing CIFS, on page 537. Compression Filters, on page 538. Managing Time and Dates, on page 539. Additional Options, on page 539. Fetch, on page 542. FileBank Director Configuration Settings, on page 543. Getting WAFS Help, on page 546. Licensing WAFS, on page 547. WAFS Log Files, on page 548. Managing Replication Services, on page 551. Managing the Replication User, on page 555. Scheduling Events, on page 560. Service Management, on page 562. Software, on page 565. Statistics, on page 565. Stf_filters, on page 566. Transaction Monitoring, on page 568. TTCP, on page 569. User, on page 570. Wins, on page 572. Basic Operations These operations require a confirmation. R ev isi o n 2. 0 524 C h ap t er H: Command Line Interface The options available include: Starting the WAFS Module, on page 524. Stopping the WAFS Module, on page 524. Restarting the WAFS Module, on page 524. Rebooting the WAFS Module, on page 525. Shutting down the System, on page 525. Pinging a Remote Machine, on page 525. Quiting the CLI, on page 526. Starting the WAFS Module Starts the WAFS module. To start the WAFS module: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# start Description Starts the WAFS module on the logged device. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# start Stopping the WAFS Module Stops the WAFS module. To stop the WAFS Module: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# stop Description Stops the WAFS module on the logged device. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# stop Restarting the WAFS Module Stops and then starts the application again. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 525 To restart the WAFS Module: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# restart Description Stops and then restarts the application. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# restart Rebooting the WAFS Module To reboot the WAFS Module : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r eb o ot Description DIsplays the current syslog status. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# r eb o ot Shutting down the System To shut down the system: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# shutdown Description Shuts down the system. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# shutdown Pinging a Remote Machine To ping a remote machine: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 526 C h ap t er H: Command Line Interface Command {hostname}:filecontroller0#p i ng [ ho s t] Description Pings a remote machine. Parameters Enter a valid IP address Example with Syntax {hostname}:filecontroller0#ping 122.222.22 Quiting the CLI See Exiting or Quitting the Shell, on page 542. Cache Manages and displays cache-related information. The following configuations are available: Displaying Cache-related Information, on page 526. Displaying Cache Time To Live for Directories or Files, on page 526. Resetting Cached Information, on page 527. Displaying Cache-related Information To display the cache related information: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#cache [show] Description Displays cache-related information. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0#cache [show] Displaying Cache Time To Live for Directories or Files To display the cache time to live for directories or files: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 527 Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#cache ttl set directories/files [seconds] Description Displays or sets cache Time To Live for directories or files. The Time To Live is expressed in seconds, where the default is 1800 (30 minutes) and the Maximum is 14,400. Parameters Enter a valid parameter as described above. Example with Syntax {hostname}:filecontroller0#cache ttl set directories/files 2500 Resetting Cached Information To reset the cache: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#cache invalidate Description Resets the TTL for the cached information, thereby forcing the FB to validate the updated information with the EFS. Parameters Enter a valid parameter as described above. Example with Syntax {hostname}:filecontroller0#cache invalidate Print Administration Activities The following configurations are available: Displaying Print Administrators, on page 527. Adding and Deleting Print Administrator Users, on page 528. Adding and Deleting Print Administrator Groups, on page 528. Displaying a List of Local Printers, on page 529. Displaying a Printing Driver’s Status, on page 529. Displaying Print Administrators To display print administrators: R ev isi o n 2. 0 528 C h ap t er H: Command Line Interface Enter the comand string that is shown in the table below: Command {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g a d mi ns li st Description Displays a list of printer administrators’ users and groups Parameters No additional parameters required Example with Syntax {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g a d mi ns li st Adding and Deleting Print Administrator Users To add or delete print administrators: Enter the comand string that is shown in the table below: {hostname}:filecontroller0#p r in ti Command n g a dm i ns a d d| de l et e u se r { [d o ma i n\ ]u s er } Description Lets you add or delete printer administrators users. Parameters No additional parameters required Example with Syntax {hostname}:filecontroller0#p r in ti n g a dm i ns a d d| de l et e u se r { [d o ma i n\ ]u s er } Adding and Deleting Print Administrator Groups To add or delete a print administrator group: Enter the comand string that is shown in the table below: Command {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g a d mi ns ad d| d el e te g r ou p { [d o ma i n\ ]u s er } Description Lets you add or delete printer administrators’ groups. Parameters Enter the username/group for the printer administrator Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g a d mi ns ad d username Co n fi g ur in g WAF S 529 Displaying a List of Local Printers To display a list of local printers: Enter the comand string that is shown in the table below: {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g d ev i ce s l is t Command Description Shows information regarding locally connected printers. Parameters No additional parameters required {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g d ev i ce s list Example with Syntax Displaying a Printing Driver’s Status To display a printing driver ’s status: Enter the comand string that is shown in the table below: {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g d ri v er s [ sh o w] Command Description Displays the status of the printing drivers. Parameters No additional parameters required Example with Syntax {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g d ri v er s show Setting Drivers The following configurations are available: Setting Automatic Client Driver Installation, on page 529. Setting Manual Client Driver Installation, on page 530. Storing Printer Drivers on the File Bank, on page 530. Storing Printer Drivers on the File Server, on page 530. Using Domain Users for Migrating Drivers, on page 531. Setting Automatic Client Driver Installation To set automatic client driver installation: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 530 C h ap t er H: Command Line Interface Command {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g d r iv er s s et se r ve r Description Setting point and print mode for client driver installation. Parameters No additional parameters required Example with Syntax {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g d r iv er s s et se r ve r Setting Manual Client Driver Installation To set manual client driver installation: Enter the comand string that is shown in the table below: Command {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g d r iv er s s et cl i en t Description Setting manual mode for client driver installation. Parameters No additional parameters required Example with Syntax {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g d r iv er s s et cl i en t Storing Printer Drivers on the File Bank To store printer drivers on the file bank: Enter the comand string that is shown in the table below: Command {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g d r iv er s s et lo c al Description Store uploaded printer drivers on local print $ share (on the File Bank). Parameters No additional parameters required Example with Syntax {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g d r iv er s s et lo c al Storing Printer Drivers on the File Server To store printer drivers on the file server: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 531 {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g d ri v er s s et re mo t e Command Description Store uploaded printer drivers on remote print $ share (on the File Server). Parameters Enter a valid UserID and domain name {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g a dm i ns a d d usermyuser Example with Syntax Using Domain Users for Migrating Drivers To use the domain user for migrating drivers: Enter the comand string that is shown in the table below: {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g d ri v er s m ig r at e { do m ai n| u se r} Command Description Use domain user to migrate drivers from File Server to the File Bank Parameters Enter a valid UserID and domain name {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g a dm i ns a d d usermyuser Example with Syntax Managing CUPS The following configurations are available: Restarting the CUPS Service, on page 531. Checking the CUPS Service, on page 532. Restarting the CUPS Service To restart the CUPS service: Enter the comand string that is shown in the table below: Command Description {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g r es t ar t Restarts the CUPS service, which is responsible for the print spooling and processing in the system. R ev isi o n 2. 0 532 C h ap t er H: Command Line Interface Parameters Example with Syntax No additional parameters required {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g restart Checking the CUPS Service To check the CUPS service: Enter the comand string that is shown in the table below: Command {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g s t at us Description Cheks the status of the CUPS service. This command checks only whether this service is supposed to run, and not the service’s actual state Parameters No additional parameters required Example with Syntax {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g s t at us Working with Printer Ports The following configurations are available: Displaying the Printer Ports’ List, on page 532. Adding and Deleting Printer Ports, on page 533. Forcing the Printer and the Share Name to be Equal, on page 533. Adding a Printer, on page 533. Deleting a Printer, on page 534. Displaying the Printer Ports’ List To display the printer ports list: Enter the comand string that is shown in the table below: Command Description Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g p o rt s Displays the list of the existing printer ports, with their names and URI. Accelerator Local Port is the default printer port, which appears always, and only its name is displayed. All other printers added afterwards appear with both their names and URIs Co n fi g ur in g WAF S Parameters Example with Syntax 533 No additional parameters required {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p or t s Adding and Deleting Printer Ports To add or delete printer ports: Enter the comand string that is shown in the table below: Command {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p or t [ de l et e | a d d] [ n am e] Description Lets you add or delete a printing port. The default port Accelerator Local Port - cannot be modified or deleted. Parameters Enter a valid printing port name Example with Syntax {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p or t a dd Accelerator Local Port2 Forcing the Printer and the Share Name to be Equal To force the printer and the share names to be equal: Enter the comand string that is shown in the table below: Command {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g s et t in gs fo r ce [ sh ow ] [ en a bl e| d is ab l e] Description Prevents the Windows Client from renaming the printer when uploading a new driver. Changing this setting requires restarting SAMBA. You should pay attention to the warning that appears in the CLI: "Changing this setting may cause clients that are connected to exported printer queues to be unable to print until they delete and reconnect to the print queue” Parameters No additional parameters required Example with Syntax {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g s et t in gs fo r ce show Adding a Printer To add a printer: R ev isi o n 2. 0 534 C h ap t er H: Command Line Interface Enter the comand string that is shown in the table below: {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g p r in te r s ad d [ n am e] [ UR I |I D ] [d e sc ri p ti o n] Command Description Adds a specific printer, inclduing the printer’s alphanumeric name, URI or ID and (optionally) a textual description. Parameters Enter a valid printer name, URI, ID and a descrption. {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g p r in te r s ad d myprinter Example with Syntax laserjet Deleting a Printer To delete a printer: Enter the comand string that is shown in the table below: Command {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g p r in te r s de l et e [ na m e] Description Deletes a specific printer by indicating the printer’s alphanumeric name. Parameters Enter the printer name Example with Syntax {h o st n am e} : fi le c on t ro ll e r0 #p r in t in g p r in te r s de l et e myprinter Managing Printers The following configurations are available: Changing an Existing Printer URI, on page 534. Displaying a List of all Existing Printers, on page 535. Printing a Test Page, on page 535. Changing an Existing Printer URI To change a printer ’s URI: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 535 {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p ri n te rs se t [ na m e] [ n ew U RI ] [ ne w c om m en t ] Command Description Changes the URI of an existing printer. Parameters Enter a valid domain and user {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g a dm i ns add user Example with Syntax {mydomain\myuser} Displaying a List of all Existing Printers To display a list of all existing printers: Enter the comand string that is shown in the table below: {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p ri n te rs [l i st ] Command Description Displays a list of all printers. Parameters No additional parameters required {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p ri n te rs list Example with Syntax Printing a Test Page To print a test page: Enter the comand string that is shown in the table below: Command {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p ri n te rs te s tp ag e { na m e} Description Prints a test page. Parameters Enter name of printer Example with Syntax {h os t na m e} :f i le co n tr o ll er 0 #p ri n t in g p ri n te rs te s tp ag e myprinter Managing WAFS Transparency The following configurations are available: Enabling / Disabling WAFS Transparency, on page 536. R ev isi o n 2. 0 536 C h ap t er H: Command Line Interface Excluding Certain Servers from WAFS Transparency, on page 536. Enabling / Disabling WAFS Transparency To add or delete print administrators: Enter the comand string that is shown in the table below: AC C 1( c on fi g )# wa f s Command AC C 1( W AF S) # tr an s pa r en cy e na b le | d is a bl e Description Enables or disables WAFS transparency. When WAFS transparency is enabled, the FileBank polls all servers by default. Parameters Enable to enable, disable to disable Example with Syntax AC C 1( c on fi g )# wa f s AC C 1( W AF S) # tr an s pa r en cy enable Excluding Certain Servers from WAFS Transparency To exclude certain servers from WAFS Transparency: Enter the comand string that is shown in the table below: Command AC C 1( W AF S) # tr an s pa r en cy e xc l ud e e xc l ud e d- se r ve rs Description Defines which servers to exclude from WAFS transparency. Parameters No additional parameters required Example with Syntax AC C 1( W AF S) # tr an s pa r en cy e xc l ud e e xc l ud e d- se r ve rs Creating Excluded Servers The following configurations are available: Displaying the Excluded Servers’ List, on page 537. Clearing the Excluded Servers’ List, on page 537. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 537 Displaying the Excluded Servers’ List To display the excluded server ’s list: Enter the comand string that is shown in the table below: ACC1(W AF S )# s ho w t ra ns p ar e nc y e xc l ud ed - se rv e rs Command Description Displays the list of servers that are excluded from WAFS transparency. Parameters No additional parameters required ACC1(W AF S )# s ho w t ra ns p ar e nc y e xc l ud ed - se rv e rs Example with Syntax Clearing the Excluded Servers’ List To clear the excluded server ’s list: Enter the comand string that is shown in the table below: AC C1 ( WA F S) #t r an sp a re n cy e xc l ud ed se rv e rs cl ea r Command Description Clears the excluded servers’ list. Parameters No additional parameters required Example with Syntax AC C1 ( WA F S) #t r an sp a re n cy e xc l ud ed se rv e rs cl ea r Managing CIFS The following configurations are available: Displaying the CIFS Status, on page 537. Displaying the CIFS Status To display the CIFS status: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#cifs status R ev isi o n 2. 0 538 C h ap t er H: Command Line Interface Description Displays status of CIFS connections, shares and locks. Parameters No additional parameters required Example with Syntax {hostname}:filecontroller0#cifs status Compression Filters Displays and manages the list of compression filters. The followig configurations are available: Displaying Current Compression Filter’s List, on page 538. Adding/deleting a Filter to/from a List, on page 538. Displaying Current Compression Filter’s List To display the current compression filter ’s list: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#comp_f ilters list/clear Description Displays/clears a list of current compression filters. Parameters No additional parameters required Example with Syntax {hostname}:filecontroller0#comp_f ilters list/clear Adding/deleting a Filter to/from a List To add or delete a filter to/from the list: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#comp_f ilters add/delete {filter} Description Adds/deletes a given filter to/from a list. Parameters Add to add Delete to delete Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S Example with Syntax 539 {hostname}:filecontroller0#comp_f ilters delete {filter} Managing Time and Dates Changes and displays current date and/or time. The following options are available: Changing the System’s Date and Time, on page 539. Displaying the System’s Date and Time, on page 539. Changing the System’s Date and Time To change the date or time: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#date [DATE] [TIME] Description Changes the current system’s date and time. Parameters Make sure the date is mmddyyyy and time is hh:mm:ss Example with Syntax {hostname}:filecontroller0#date [DATE] [TIME] Displaying the System’s Date and Time To change the date or time: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#date Description Displays the current system’s date and time. Parameters No additional parameters necessary Example with Syntax {hostname}:filecontroller0#date Additional Options The following configurations are available: R ev isi o n 2. 0 540 C h ap t er H: Command Line Interface Diagnostics, on page 540. Setting a Domain Name, on page 540. Displaying the Current Domain Name, on page 541. Joining a FileBank to a Domain, on page 541. Switching to a UNIX Command Prompt, on page 541. Exiting or Quitting the Shell, on page 542. Diagnostics Runs Diagnostic Tests To run a diagnostic test: Enter the comand string that is shown in the table below: Command {h o s tn a m e} : f il e c on t r ol l e r0 # d ia g n os t ic s al l se t t in g s ha r d wa r e co m m un i c at i o n Description Runs diagnostics tests. You can use this command to diagnose either the full system, the configuration settings of the Accelerator, hardware problems or communication problems. Parameters All for complete diagnostics, settings to check the settings, hardware to check hardware functioning, or communication to test communication settings. Example with Syntax {h o s tn a m e} : f il e c on t r ol l e r0 # d ia g n os t ic s all Setting a Domain Name Sets or displays the Windows NT domain on a local network. This command also defines a domain name. To set the domain name: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#domain set Description Sets a domain name. Parameters No additional parameters needed Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S Example with Syntax 541 {hostname}:filecontroller0#domain set Displaying the Current Domain Name To display the domain name: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#domain show Description Displays the current domain name. Parameters No additional parameters needed Example with Syntax {hostname}:filecontroller0#domain show Joining a FileBank to a Domain To join the file bank to a domain name: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#domain join Description Joins a FileBank to the current domain. Parameters No additional parameters needed Example with Syntax {hostname}:filecontroller0#domain join Switching to a UNIX Command Prompt To switch toa UNIX command prompt: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#enable Description Switches to privileged mode command prompt (root shell). Requires knowledge of the root password. Parameters No additional parameters needed. Enter password when prompted. R ev isi o n 2. 0 542 C h ap t er H: Command Line Interface Example with Syntax {hostname}:filecontroller0#enable Exiting or Quitting the Shell To exit or quit the UNIX shell: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#exit/ quit Description Logs out from shell. Parameters No additional parameters needed. Example with Syntax {hostname}:filecontroller0#quit Fetch Manages fetch jobs and instances. The fetch commands are used for prepopulating the FileBank’s cache. Fetch jobs describe the entity that should be fetched, namely: a specific directory on a file server. Fetch instances perform the actual work. The following configuration options are available: Managing Fetch Jobs and Instances, on page 542. Displaying the Log of Fetch Instances, on page 543. Managing Fetch Jobs and Instances To manage Fetch jobs and instances: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#fetch jobs/instances Description Manages fetch jobs/instances. Parameters No additional parameters needed. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0#fetch jobs Co n fi g ur in g WAF S 543 Displaying the Log of Fetch Instances To manage Fetch jobs and instances: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#fetch log Description Shows the log of current and completed fetch instances. Parameters No additional parameters needed. Example with Syntax {hostname}:filecontroller0#fetch log FileBank Director Configuration Settings Displays or manages the connected <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> configuration. The following configurations are available: Displaying a List of FileBank Directors, on page 543. Adding or Deleting a FileBank Director:, on page 544. Defining the IP Port, on page 544. Enabling Disconnected Operation Handling, on page 544. Forcing Disconnected Mode, on page 545. Refreshing the List of Servers and Shares, on page 545. Getting Disk Utilization Reports, on page 545. Displaying a List of FileBank Directors To display a list of FileBank directors: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#fport list Description Shows a list of <Default ¬¹ Font>FileBank Director<Default ¬¹ Font>s. Parameters No additional parameters needed. Example with Syntax {hostname}:filecontroller0#fport list R ev isi o n 2. 0 544 C h ap t er H: Command Line Interface Adding or Deleting a FileBank Director: To add or delete a FileBank Director: Enter the comand string that is shown in the table below: {hostname}:filecontroller0#fport {add | delete} {FP} Command Description Adds or deletes a named <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> to or from the FileBank Directors’ list. Default ports: UDP 4049, TCP 4049 are then assigned to this {FP}. Parameters Use a legal port number. {hostname}:filecontroller0#fport 4049 add FP Example with Syntax Defining the IP Port To define the IP port: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#fport {TCP | UDP} {FP}{PORT} Description Defines the IP port {PORT} for networking with the specified <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> {FP}. Parameters Use a legal port number. Example with Syntax {hostname}:filecontroller0#fport {TCP | UDP} {FP}{PORT} Enabling Disconnected Operation Handling To enable disconnected operation handling: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#fport disconnected handle {FP}[on|off] Description Enable/disable disconnected operation handling for {FP}. Changes take effect only after FileBank reset. Parameters Use on to enable and Off to disable Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S Example with Syntax 545 {hostname}:filecontroller0#fport disconnected handle on Forcing Disconnected Mode To force disconnected operation mode: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#fport disconnected force {FP}[on|off] Description Force / unforce {FP} to be in disconnected mode. Changes take effect only after FileBank reset. Parameters Use on to enable and Off to disable Example with Syntax {hostname}:filecontroller0#fport disconnected force on Refreshing the List of Servers and Shares To refresh the list of File Servers and shares: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#gns refresh Description Refreshes the list of file servers. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0#gns refresh Getting Disk Utilization Reports To display the disk utilization report: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#iostat Description Shows the disk utilization report. Parameters No additional parameters required. R ev isi o n 2. 0 546 C h ap t er H: Command Line Interface Example with Syntax {hostname}:filecontroller0#iostat Getting WAFS Help Displays general or command-specific usage information. The following configurations are available: Displaying Help for All Available Commands, on page 546. Displaying Command-specific Help Information, on page 546. Displaying Help for All Available Commands To display help for all availabe commands: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#help Description Lists the commands and parameters. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0#help Displaying Command-specific Help Information To display help for all specific commands: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#help <command>/help <command> <subcommand> Description Provides command-specific help information. If a command is typed without a required parameter (or a wrong parameter), usage information is provided. Parameters No additional parameters required. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0#help license install Co n fi g ur in g WAF S 547 Licensing WAFS Manages and displays license files. The following options are available: Installing a License, on page 547. Displaying the License File, on page 547. Checking the Validity of a License File, on page 547. Installing a License To install a license: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#license install {path} Description Installs a license file from the specified path. Parameters enter a valid path to the file. Example with Syntax {hostname}:filecontroller0#l ic e ns e i n st al l m yP a th t om yS e rv er Displaying the License File To install a license: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#l ic e ns e s h ow Description Shows the current license file. Parameters No additional parameters are required. Example with Syntax {hostname}:filecontroller0#license install myPathtomyServer Checking the Validity of a License File To check the validity of a license: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 548 C h ap t er H: Command Line Interface {hostname}:filecontroller0#l i ce ns Command e c h ec k [ {p a th }] Description Checks the validity of a license file (specified or current). Parameters No additional parameters are required. {hostname}:filecontroller0#license Example with Syntax check [{path}] WAFS Log Files Creates a log file and uploads it to a destination URL. This command also lists the event log, shows the current level of the log file and sets the minimal level. The following configurations are available: Uploading Logs to a URL, on page 548. Displaying Event Log, on page 548. Defining Minimal Level for Events to Log, on page 549. Displaying Log Level, on page 549. Displaying the Syslog Status, on page 550. Displaying All Log Archive Files, on page 550. Generating a New Log Archive File, on page 550. Uploading a Log Archive File, on page 551. Uploading Logs to a URL To upload logs to a URL : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#log upload {URL} Description Uploads the current logs to the indicated URL. Parameters No additional parameters are required. Example with Syntax {hostname}:filecontroller0#log upload www.myurl.com Displaying Event Log To upload logs to a URL : Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 549 Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#log show [all|communication|security|system] Description Lists the event log. Parameters No additional parameters are required. Example with Syntax {hostname}:filecontroller0#log show all Defining Minimal Level for Events to Log To define minimal level for events to be logged : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#log level set {info|warning|error|critical} Description Sets minimal level for events to log. The lowest level being info and the highest being critical. Any log events below the level you set are not logged. Parameters Enter the log level (info, warning, error, critical) Example with Syntax {hostname}:filecontroller0#log level set info Displaying Log Level To display the log level : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#log level show Description Displays the current log level. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0#log level show R ev isi o n 2. 0 550 C h ap t er H: Command Line Interface Displaying the Syslog Status To display the Syslog status : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#log syslog status Description DIsplays the current syslog status. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0#log syslog status Displaying All Log Archive Files To display the log archive status : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#l og ar ch i ve [l is t ] Description Lists all log archive files. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0#log archive [list] Generating a New Log Archive File To generate a new log file : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#l og ar ch i ve ge ne r at e Description Generates a new log archive file. Parameters No additional parameters are needed Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0#l og ar ch i ve ge ne r at e Co n fi g ur in g WAF S 551 Uploading a Log Archive File To upload a log archive file : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#l og a rc h iv e u pl oa d Description Uploads a log archive file to an FTP server. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0#log archive upload Managing Replication Services The following options are available: Starting an Unscheduled Replication, on page 551. Preparing for Replication, on page 552. Stopping Replication, on page 552. Displaying the Replication Status, on page 552. Enabling / Disabling Replication, on page 553. Displaying Replication Logs, on page 553. Displaying a Specific Log, on page 553. Setting Up Replication Service, on page 554. Managing the Replication User, on page 554. Managing the Replication Filters, on page 554. Managing the Replication Instances, on page 555. Managing the Replication Paths, on page 555. Starting an Unscheduled Replication To start an unscheduled replication : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic at i on s t ar t Description Starts an unscheduled replication process now. Parameters No additional parameters are needed R ev isi o n 2. 0 552 C h ap t er H: Command Line Interface Example with Syntax {hostname}:filecontroller0# r ep l ic a ti on st ar t Preparing for Replication To prepare for a replication : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic a ti on st ar t i n it ia l Description Starts initial pre-population of replication files from the file server to the FileBank Director. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# r ep l ic a ti on st ar t i n it ia l Stopping Replication To stop the replication process: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic a ti on st op Description Stops the replication process. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# replication stop Displaying the Replication Status To display the replication status : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic a ti on st at u s Description Displays the replication process status. Parameters No additional parameters are needed Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 553 {hostname}:filecontroller0# Example with Syntax r ep l ic at i on s t at u s Enabling / Disabling Replication To enable replication : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic at i on e n ab l e/ di s ab le Description Enables or disables the replication service. Parameters Enable to enable, Disable to disable. Example with Syntax {hostname}:filecontroller0# r ep l ic at i on enable Displaying Replication Logs To display a replication log: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic at i on l o g l is t Description Lists all replication log files. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# r ep l ic at i on l o g l is t Displaying a Specific Log To display a specific replication log: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic at i on l o g [ sh ow ] Description Displays a specific replication log. Parameters No additional parameters are needed R ev isi o n 2. 0 554 C h ap t er H: Command Line Interface Example with Syntax {hostname}:filecontroller0# replication log [show] Setting Up Replication Service To start an unscheduled replication : Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic a ti on se tu p Description Sets up replication service. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# replication setup Managing the Replication User To manage the replication user: Enter the comand string that is shown in the table below: Command Description {hostname}:filecontroller0# r ep l ic a ti on us er Manages the replication user. For details see Managing the Replication User, on page 555. Parameters Example with Syntax No additional parameters are needed {hostname}:filecontroller0# replication user Managing the Replication Filters To manage the replication filter: Enter the comand string that is shown in the table below: Command Description {hostname}:filecontroller0# r ep l ic a ti on fi lt e rs Manages the replication filters. For details see Replication Service, on page 209. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S Parameters 555 No additional parameters are needed {hostname}:filecontroller0# Example with Syntax replication filters Managing the Replication Instances To manage a replication instance: Enter the comand string that is shown in the table below: {hostname}:filecontroller0# Command Description replication instances Manages the replication instances. For details see Replication Service, on page 209. Parameters No additional parameters are needed {hostname}:filecontroller0# Example with Syntax replication instances Managing the Replication Paths To manage a replication path: Enter the comand string that is shown in the table below: {hostname}:filecontroller0# Command Description r ep l ic at i on p a th s Manages the replication paths. For details see section Replication Service, on page 209. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# r ep l ic at i on p a th s Managing the Replication User You must first define the internal replication user on the system with the user command (see User, on page 570.), and then assign this user as replication user with the Replication User command. The following are available: Displaying the Current Replication User, on page 556. R ev isi o n 2. 0 556 C h ap t er H: Command Line Interface Defining the Replication User, on page 556. Deleting the Replication User, on page 557. Displaying the Current Replication Filters, on page 557. Clearing All Replication Filters, on page 557. Adding or Deleting a Replication Filter, on page 558. Listing the Replication Instances, on page 558. Adding a New Replication Path, on page 559. Deleting a Replication Paths, on page 559. Deleting All Replication Paths, on page 559. Displaying the Current Replication User To display a replication user: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic a ti on us er [s h ow ] Description Displays the current replication user. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# r ep l ic a ti on us er [s h ow ] Defining the Replication User To define a replication user: Enter the comand string that is shown in the table below: {hostname}:filecontroller0# Command r ep l ic a ti on us er se t { do m ai n \u se r na me } Description Sets the replication user. Parameters No additional parameters are needed Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0# r ep l ic a ti on us er se t { do m ai n \u se r na me } Co n fi g ur in g WAF S 557 Deleting the Replication User To delete a replication user: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic at i on u s er de le t e Description Deletes the current replication user. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# r ep l ic at i on p a th s Displaying the Current Replication Filters To display the current replication filter: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic at i on f i lt e rs [ l is t] Description Lists the current replication filters (file types). Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# r ep l ic at i on f i lt e rs [ l is t] Clearing All Replication Filters To clear all replication filters: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic at i on f i lt e rs c l ea r Description Clears the current replication filters (file types). Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# replication filters clear R ev isi o n 2. 0 558 C h ap t er H: Command Line Interface Adding or Deleting a Replication Filter To delete a replication user: Enter the comand string that is shown in the table below: {hostname}:filecontroller0# Command r ep l ic a ti on fi lt e rs ad d/ d el et e { fi l te r } Description Adds or deletes the current replication filter. Parameters No additional parameters are needed Example with Syntax {hostname}:filecontroller0# replication filters add myfilter Listing the Replication Instances To list a replication instance: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# r ep l ic a ti on in st a nc e s [l i st ] Description Displays all replication instances. The possible values are as follows: Running The instance is running FinishedThe instance has finished successfully FailedThe instance has failed due to an error (see log) AbortedThe instance has been aborted by the user Parameters Enter one of the parameters above Example with Syntax {hostname}:filecontroller0# replication instances running Displaying all Replication Paths To display all replication paths: Enter the comand string that is shown in the table below: Command Description Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0# r ep l ic a ti on pa th s [ l is t] List all current replication paths. Co n fi g ur in g WAF S Parameters Example with Syntax 559 Enter one of the parameters above {hostname}:filecontroller0# r ep l ic at i on p a th s [ li s t] Adding a New Replication Path To add a new replication path: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# replication paths add {UNCPATH} [PRIORITY] Description Adds a new replication path. Parameters Path and priority Example with Syntax {hostname}:filecontroller0# replication paths add {UNCPATH} [PRIORITY] Deleting a Replication Paths To delete a replication path: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# replication paths delete {PATH-ID Description Deletes a replication path. Parameters Enter the name of the path Example with Syntax {hostname}:filecontroller0# replication paths delete {PATH-ID Deleting All Replication Paths To delete all replication paths: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# replication paths clear Description Deletes all replication paths. Parameters Enter one of the parameters above R ev isi o n 2. 0 560 C h ap t er H: Command Line Interface Example with Syntax {hostname}:filecontroller0# replication paths clear Scheduling Events Displays and manages scheduled events. The following actions can be performed: Displaying Scheduled Events, on page 560. Adding Scheduled Events, on page 561. Deleting Scheduled Events, on page 561. Clearing All Scheduled Events, on page 561. Displaying Actions for Scheduling To display actions for scheduling: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# schedule actions Description Lists all actions that can be scheduled. Replication schedule actions: replication.start and replication.stop Parameters No additional parameters required Example with Syntax {hostname}:filecontroller0# schedule actions Displaying Scheduled Events To display scheduled events: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# schedule events [list] Description Lists all events. Parameters No additional parameters required Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0# schedule events [list] Co n fi g ur in g WAF S 561 Adding Scheduled Events To add a scheduled event: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# schedule events add {ACTION NAME] {TIME} Description Adds a new daily recurring event. Parameters Enter the following: A name for the action that appears on the list of actions A time for it to occur. HH:MM Example with Syntax {hostname}:filecontroller0# schedule events add clear 23:00 Deleting Scheduled Events To delete a scheduled event: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# schedule events delete {EVENT ID} Description Deletes a scheduled event. Parameters Enter one of the parameters above Example with Syntax {hostname}:filecontroller0# schedule events delete {EVENT ID} Clearing All Scheduled Events To clear all scheduled events: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# schedule events clear Description Clears all scheduled events. Parameters Enter one of the parameters above Example with Syntax {hostname}:filecontroller0# schedule events clear R ev isi o n 2. 0 562 C h ap t er H: Command Line Interface Service Management Lets you enable or disable the current service, and also check whether the service is enabled. The following actions can be performed: Enabling or Disabling the Current Service, on page 562. Checking whether the Current Service is Enabled, on page 562. Displaying the List of Services, on page 563. Activating a Service, on page 563. Creating a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> Service, on page 563. Creating a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> HA, on page 564. Creating a <Default ¬¹ Font>FileBank<Default ¬¹ Font> Service, on page 564. Enabling or Disabling the Current Service To enable or disable the current service: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# service [enable] [disable] Description Enables or disables the current service. Parameters Enable to enable, Disable to disable Example with Syntax {hostname}:filecontroller0# service enable Checking whether the Current Service is Enabled To check if the current service is enabled: Enter the comand string that is shown in the table below: Command Description Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0# service [status] Checks whether the current service is enabled. Co n fi g ur in g WAF S Parameters Example with Syntax 563 No additional parameters needed {hostname}:filecontroller0# service [status] Displaying the List of Services To display a list of services: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# services [list] Description Displays the list of services Parameters No additional parameters needed Example with Syntax {hostname}:filecontroller0# services [list] Activating a Service To activate a service: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# services set {service-name} Description Sets the SERVICE as active. All operations will act on SERVICE from now on. Service-name should be a valid service name (for example: FileBank Director0/FileBank Director1), monitored by cluster. Parameters enter the service’s name Example with Syntax {hostname}:filecontroller0# services set {service-name} Creating a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> Service To create a FileBank director service: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 564 C h ap t er H: Command Line Interface Command {hostname}:filecontroller0# services create FileBank Director Description Creates a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> service. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# services create FileBank Director Creating a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> HA To create a FileBank director HA: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# services create FileBank Director ha Description Creates a <Default ¬¹ Font>FileBank Director<Default ¬¹ Font> HA. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# services create FileBank Director ha Creating a <Default ¬¹ Font>FileBank<Default ¬¹ Font> Service To create a file bank service: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# services create filecontroller Description Creates a <Default ¬¹ Font>FileBank<Default ¬¹ Font> service. Parameters No additional parameters required. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0# services create filecontroller Co n fi g ur in g WAF S 565 Software Displays version numbers for all currently installed software packages. The following configuration options are available: Displaying Version Numbers, on page 565. Displaying Version Numbers To display the version number: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# software version Description Displays the version numbers of all currently installed software packages. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# software version Statistics Shows product statistics. The following configuration options are available: Displaying File Statistics, on page 565. Uploading Yearly Statistics, on page 566. Displaying the Current Status, on page 566. Displaying File Statistics To display file statistics: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# stastics Description Displays a table of indicated file statistics for today/past week/ past month. Parameters No additional parameters required. R ev isi o n 2. 0 566 C h ap t er H: Command Line Interface Example with Syntax {hostname}:filecontroller0# stastics Uploading Yearly Statistics To create a file bank service: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# statistics upload {FTP_URL} Description Uploads the yearly statistics file to the destination URL. Note: The URL protocol must be FTP and the URL must end in a filename. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# statistics upload {FTP_URL} Displaying the Current Status Displays the current status of the system. To create a file bank service: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# status Description Shows the current status of the system. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# status Stf_filters Displays, adds and deletes STF (Short Term Files) filters. STF filters define the files which are not sent by the <Default ¬¹ Font>FileBank<Default ¬¹ Font> to the <Default ¬¹ Font>FileBank Director<Default ¬¹ Font>. For example, the default STF filter in the <Default ¬¹ Font>FileBank<Default ¬¹ Font> includes *.TMP files which are not sent by the <Default ¬¹ Font>FileBank<Default ¬¹ Font> to the <Default ¬¹ Font>FileBank Director<Default ¬¹ Font>. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S 567 The following configuration options are available: Displaying Current STF Filters, on page 567. Clearing the List of Current STF Filters, on page 567. Adding or Deleting a Filter, on page 567. Displaying Current STF Filters To display current STF filters: Enter the comand string that is shown in the table below: Command Description Parameters Example with Syntax {hostname}:filecontroller0# stf filters list Lists current STF filters. No additional parameters required. {hostname}:filecontroller0# stf filters list Clearing the List of Current STF Filters To clear the list of current filters: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# stf filters clear Description Clears the list of filters. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# stf filters clear Adding or Deleting a Filter To add or delete filters: Enter the comand string that is shown in the table below: Command Description {hostname}:filecontroller0# stf filters add/delete {FILTER} Add or deletes a given filter to/from the list. R ev isi o n 2. 0 568 C h ap t er H: Command Line Interface Parameters Example with Syntax No additional parameters required. {hostname}:filecontroller0# stf filters delete filtername Transaction Monitoring Enables the monitoring of Read and Write transactions. The following configuration options are available: Displaying the Requested Transactions, on page 568. Stopping the Transaction of a Specific ID, on page 568. Displaying the Requested Transactions To display the requested transaction: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# transaction list Description Lists transactions that match the filter. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# transaction list Stopping the Transaction of a Specific ID To stop a transaction of a specific ID: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# transaction stop [id] Description Stops the transaction of the given ID. Parameters No additional parameters required. Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e {hostname}:filecontroller0# transaction stop [id] Co n fi g ur in g WAF S 569 TTCP Times the transmission and reception of the data between two systems using TCP protocol. Client should receive a server's hostname parameter, which indicates the remote TCP server destination. Measuring the Receiving Host To measure the receiving host: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# ttcp server Description Run this on the host to which you want measure traffic. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# ttcp server Measuring the Sending Host To measure the sending host: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# ttcp client {server} Description Run this on the host from which you want measure traffic. Specify the host on which you run the 'ttcp server' as SERVER. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# ttcp client {server} Displaying the System’s Current Uptime To display the system’s current uptime: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# uptime R ev isi o n 2. 0 570 C h ap t er H: Command Line Interface Description Displays the period of time for which the system has been running since it was last booted. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# uptime User Manages the users’ database. The following configuration options are available: Displaying a List of All Users, on page 570. Adding or Deleting a User, on page 570. Changing a User’s Password, on page 571. Displaying a List of All Users To display a list of all users: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# user list Description Lists all users. Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# user list Adding or Deleting a User To add or delete a user: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# user add/ delete {domain\user} Description Adds or deletes a given user to/from the list. Parameters Add to add, Delete to delete. You also need the domain and UserName. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S Example with Syntax 571 {hostname}:filecontroller0# user delete mydomain\myuser Changing a User’s Password To change a user ’s password: Enter the comand string that is shown in the table below: Command Description Parameters Example with Syntax {hostname}:filecontroller0# user password {domain\user} Changes the given user's password (prompts for new password). old password, new password {hostname}:filecontroller0# user password mydomain\myuser Configuring Virtual Memory Statistics Reports virtual memory statistics. The report is repeated 10 times at 5 seconds’ intervals. The following configuration options are available: Displaying Virtual Memory Statistics, on page 571. Displaying Virtual Memory Statistics To virtual memory statistics: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0# vmstat Description Reports virtual memory statistics. The report is repeated 10 times at 5 second intervals. Note:Press Ctrl-C to interrupt Parameters No additional parameters required. Example with Syntax {hostname}:filecontroller0# uptime R ev isi o n 2. 0 572 C h ap t er H: Command Line Interface Wins Manages WINS server settings for automatic registration. The following configuration options are available: Setting a WINS Server Address, on page 572. Deleting Current WINS Server, on page 572. Displaying Current WINS Server, on page 572. Setting a WINS Server Address To set a WINS server address: Enter the comand string that is shown in the table below: Command Description Parameters Example with Syntax {hostname}:fp0# wins server set {ADDRESS} Sets the WINS server address. No additional parameters required. {hostname}:fp0# wins server set {ADDRESS} Deleting Current WINS Server To delete the current WINS server: Enter the comand string that is shown in the table below: Command {hostname}:fp0# wins server delete Description Deletes the current WINS server settings. Parameters No additional parameters required. Example with Syntax {hostname}:fp0# wins server delete Displaying Current WINS Server To display the current WINS server: Enter the comand string that is shown in the table below: Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Co n fi g ur in g WAF S Command {hostname}:fp0# wins server [show] Description Shows the current WINS server settings. Parameters No additional parameters required. Example with Syntax 573 {hostname}:fp0# wins server [show] R ev isi o n 2. 0 574 C h ap t er H: Command Line Interface Configuring Security You can set the following basic AAA parameters: Accessing the Transport Type ! WARNING! Disabling Console access immediately disconnects you from the Accelerator’s CLI Enabling or Disabling Access to the Transport Type To enable or disable access to the transport type: Enter the comand string that is shown in the table below: ACC1(conf)#aa a Command Description AC C 1( a aa )# t ra ns p or t i np u t ( te l ne t |s sh | co ns o le | we b| s ec ur e w eb | ft p |s nm p |t ft p ) ( en a bl e |d is a bl e) Enables or disables access to the transport type. For example, typing: transport input web disable disables access to the Accelerator via the WebUI. By default, all transport types are set to enabled, except FTP and TFTP which are set to disabled Parameters Enter parameter string as described above ACC1(conf)#aa a Example with Syntax AC C 1( a aa )# t ra ns p or t i np u t ( te l ne t |s sh | co ns o le | we b| s ec ur e w eb | ft p |s nm p |t ft p ) ( en a bl e |d is a bl e) Configuring Servers The following options are available: Configuring the IP Address and Port, on page 575. Setting the Radius Server Timeout, on page 575. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C o n fi gu r i ng S ec ur it y 575 Configuring the TACACS Server, on page 575. Setting the TACACS Server Timeout, on page 576. Configuring Authentication, on page 576. Displaying the Authentication Server, on page 577. Defining/Deleting the Authentication Server, on page 577. Configuring the IP Address and Port To configure the raduis server: Enter the comand string that is shown in the table below: Command AC C1 ( aa a )# ra d iu s n a me [ server name] i p [ x. x. x .x ]| ke y [ encryption key] | p or t [ tcp port for the server]) Description Sets the RADIUS server and server information including IP address, encryption key and TCP port. The default port is 49. Parameters Enter server name, IP address and port number Example with Syntax AC C1 ( aa a )# ra d iu s n a me [ server name] i p [ x. x. x .x ]| ke y [ encryption key] | p or t [ tcp port for the server]) Setting the Radius Server Timeout To set the radius server timeout: Enter the comand string that is shown in the table below: Command AC C1 ( aa a )# ra d iu s n a me [ server name] t im e ou t Description Sets the timeout in seconds between 0 and 5000 to wait for a server to reply. The default timeout is 180 seconds. Parameters Enter parameter string as described above Example with Syntax AC C1 ( aa a )# ra d iu s n am e myserver t im e ou t 180 Configuring the TACACS Server To configure the TACACS Server: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 576 C h ap t er H: Command Line Interface Command AC C 1( a aa )# t ac ac s + n am e [ server name] i p [ x. x .x .x ] | k ey [ encryption key] | or de r [ server authentication order] | p or t [ tcp port for the server] Description Sets the TACACS server and server information including IP address, encryption key and TCP port. The default port is 1645. Parameters Enter parameter string as described above Example with Syntax ACC1(aaa)#tacacs+ name myserver ip 122.22.222| key mykey | order 2| port 8080 Setting the TACACS Server Timeout To set the TACACS server timeout: Enter the comand string that is shown in the table below: Command AC C 1( a aa )# t ac ac s na me [ server name] t im e ou t Description Sets the timeout in seconds between 0 and 5000 to wait for a server to reply. The default timeout is 180 seconds. Parameters Enter parameter string as described above Example with Syntax ACC1(aaa)#tacacs name myserver timeout 2000 Configuring Authentication To set the server to be authenticated: Enter the comand string that is shown in the table below: Command AC C 1( a aa )# a ut he n ti c at io n l og i n [ lo c al | ra d iu s | t a ca cs ] Description Sets server to be checked. If more than one authentication type is used, lists the server types in the order in which they are to be authenticated. Parameters Enter parameter string as described above Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e ACC1(aaa)#authentication login local C o n fi gu r i ng S ec ur it y 577 Displaying the Authentication Server To display the authentication server: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#authsr v [list] Description Displays current authentication server. Parameters No additional parameters required Example with Syntax {hostname}:filecontroller0#authsr v [list] Defining/Deleting the Authentication Server To set the server to be authenticated: Enter the comand string that is shown in the table below: Command {hostname}:filecontroller0#authsr v add/delete {host} Description Defines or deletes current authentication server. Parameters Add to add, Delete to delete Example with Syntax {hostname}:filecontroller0#authsr v add/delete {host} Configuring Users’ Accounts This section contains the following configuration options Enabling / Disabling a User’s Account Creating and Setting a User’s Access Setting the Local Password Enabling / Disabling a User’s Account To enable or disable a specified user ’s account: Enter the comand string that is shown in the table below: R ev isi o n 2. 0 578 C h ap t er H: Command Line Interface A CC 1 (a aa ) #u se r [ user name] [ l oc k |u nl o ck ] Command Description Disables or enables the specified user’s account. Parameters Enter the user name and Lock to lock, Unlock to unlock. A CC 1 (a aa ) #u se r myusername lock Example with Syntax Creating and Setting a User’s Access To create and set a specified user ’s access level: Enter the comand string that is shown in the table below: AC C 1( aa a )# u se r [ user name] r ol e [ ad m in is t ra t or | n et ad m in | mo ni t or ] p as s wo rd lo c al [ password | n o ne ] Command Description Creates users and sets the user’s access level: Administrators have complete access to the Accelerator and its commands. netadmins have complete access to the Accelerator and its commands with the exception of the Security commands. monitors can access the Accelerator’s CLI but cannot modify configuration. Only administrator users can write a configuration. To set a local password, type in the user name and local password and press Enter. You will be prompted to enter a password. If local is set to none, passwords are necessary only for the remote authentication servers. Parameters Enter parameter string as described above Example with Syntax AC C 1( aa a )# u se r myuser ro l e administrator p as sw o rd lo ca l mypassword Setting the Local Password To set the local password: Enter the comand string that is shown in the table below: Command AC C 1( a aa )# e xi t Ac c 1# pa ss w or d l oc a l Description To set a local password, type in the user name and local password and press Enter. You will be prompted to enter a password. Parameters Enter parameter string as described above Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C o n fi gu r i ng S ec ur it y AC C1 ( aa a )# ex i t Example with Syntax i 579 Ac c1 # p a ss wo r d lo c al myusername mypssword NOTE: Use the command no user [name] to remove a user. You cannot remove a root user, but you can modify the password. (Changing an <Default ¬¹ Font>Expand<Default ¬¹ Font> user’s password will automatically change the root user as well.) Viewing AAA Configuration You can use the following show commands to view AAA configuration: show aaa You can enter the show aaa command from the configuration mode. This command lists all the AAA options and their settings. Acc1(config)# show aaa telnet transport-input status.....enable ssh transport-input status........enable console transport-input status....enable web transport-input status........enable secure-web transport-input status.enable ftp transport-input status........disable tftp transport-input status.......disable snmp transport-input status.......enable User Name Status Role root permitted administrator <Default ¬¹ Font>expand<Default ¬¹ Font> permitted administrator user1 permitted administrator user2 permitted netadmin user3 permitted monitor First Authentication Method.......Local Second Authentication Method......Radius Third Authentication Method.......TACACS+ Maximum Failed Login Attempts.....5 R ev isi o n 2. 0 580 C h ap t er H: Command Line Interface Server Name Server Order IP Port Time-out radius first rad2 10.0.130.139 1645 180 radius second rad3 10.0.130.132 1645 180 radius third rad4 24.0.214.160 1645 180 tacacs first tac2 21.0.214.160 49 180 Co nf i gu ra t io n C ha n ge A u di t E ve n t. .d i sa b le Cr ea t e Li n k A ud it Ev en t .. . .. .. . .. .d i sa b le show authentication order The show authentication order command lists which of the authentication servers is set as the first, second and third level authentication server. Ac c1 ( aa a) # s h ow a u th en t ic a ti on lo gi n o r de r Fi rs t A ut h en t ic at i on M e th o d. .. . .. .L o ca l Se co n d Au t he n ti ca t io n M et h od .. . .. .R a di u s Th ir d A ut h en t ic at i on M e th o d. .. . .. .T A CA C S+ show servers The show servers command lists the authentication servers defined in the Accelerator. Ac c1 ( aa a) # s h ow s e rv er s Server Order Server Name IP Port Time-out radius first rad2 10.0.130.139 1645 180 radius second rad3 10.0.130.132 1645 180 radius third rad4 24.0.214.160 1645 180 tacacs first tac2 21.0.214.160 49 180 -+ show transport input The show transport input command lists all possible management protocols and services available and their status. Ac c1 ( aa a) # s h ow t r an sp o rt in pu t te ln e t tr a ns p or t- i np ut st a tu s. . .. .e n ab l e ss h t ra ns p or t -i np u t st a tu s .. .. . .. .e n ab l e Ac ce ler at o rOS 6 .1 .2 Us er Gui d e C o n fi gu r i ng S ec ur it y 581 c o ns ol e t ra n sp o rt -i n pu t s ta t us .. . .e na b le w e b tr a ns po r t- i np ut st at u s. . .. .. . .e na b le s e cu re - we b t ra n sp or t -i np u t s ta tu s .e na b le f t p tr a ns po r t- i np ut st at u s. . .. .. . .d is a bl e t f tp t r an sp o rt - in pu t s ta t us . .. .. . .d is a bl e s n mp t r an sp o rt - in pu t s ta t us . .. .. . .e na b le show user The show user command lists the users and their authorization levels. A c c1 (a a a) # s ho w u se r User Name Status Role root permitted administrator expand permitted administrator user1 permitted administrator user2 permitted netadmin user3 permitted monitor Unlocking or Locking the Keypad i NOTE: If you lock the keypad via the WebUI or via the CLI, you cannot use the keypad’s unlock sequence to unlock the keypad. In such a case, the unlock operation can be carried out only via the CLI or the WebUI To lock or unlock the keypad: Enter the comand string that is shown in the table below: Command ACC1(config)#l c d l oc k | u nl o ck Description Locks/unlocks the keypad. Parameters Lock to lock, Unlock to unlock Example with Syntax ACC1(config)#l c d lock R ev isi o n 2. 0 582 C h ap t er H: Command Line Interface Upgrading the Software OS Copying the New Bundle File To copy the new bundle file: Enter the comand string that is shown in the table below: Command AC C1 # copy [scp | sftp | tftp | ftp | http] [bu n d l e n a m e ] [b u n d l e location] Description This command, used for copying any file, lets you upgrade the AcceleratorOS in any of the methods mentioned above, by copying the upgrade bundle file from its location. You should use the following format for specifying the location: user:password@ip/file-path. Parameters Enter the parameters as described above Example with Syntax AC C1 # copy ftp mybundlename mybundlelocation Rebooting the Accelerator after Copying the New Bundle File To reboot after copying the file: Enter the comand string that is shown in the table below: Command AC C1 # reboot [b u n d l e n a m e ] Description This command should be used when upgrading, for the Accelerator to use the new bundle file after rebooting. Parameters Enter the same bundle name you entered in the previous section Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e AC C1 # reboot mybundlename Tech n ic al S u p p or t In fo r m a ti on Technical Support Information 583 Initiating ByPass Mode Showing Technical Support Information To show technical support information: Enter the comand string that is shown in the table below: ACC1#sh ow te ch - su p po rt [ co n ti nu o us ] Command Description Lists all information necessary to troubleshoot Accelerator problems. Information gathered here includes: version information, license state, CPU and memory utilization, events, link statistics, interface statistics, QoS configuration, route-rules, discovered traffic, running configuration and startup configuration. Press More to view additional output each time; alternatively, add the parameter Continuous to enable continuous output. Parameters Enter the same bundle name you entered in the previous section Example with Syntax ACC1#sh ow te ch - su p po rt continuous Listing Log Events To reboot after copying the file: Enter the comand string that is shown in the table below: Command AC C1 # sh o w AC C 1# sh o w e ve nt s [ lo n g | s ho rt ] f i lt er se ve r it y f ro m [ fa ta l | w ar n in g | er r or | i nf o ] to [f at a l | w ar n in g | e rr o r |i n fo ] t ai l [ nu m be r o f l as t x e v en ts to be d i sp la y ed ] R ev isi o n 2. 0 584 C h ap t er H: Command Line Interface Description Lists Accelerator events. Long gives all available information on the event, while short gives a brief summary of each event. Parameters Enter the same bundle name you entered in the previous section Example with Syntax Ac ce ler at o rOS 6 .1 .2 Us er Gui d e AC C 1# s ho w A CC 1 #s ho w ev en t s long filter severity from fatal to info tail 100 Appendix I: Glossary This chapter provides brief descriptions of some key terms mentioned in this user guide, together with the relevant context of these terms to the AcceleratorOS. A AAA Protocols AAA stands for Authentication, authorization, and accounting, a system used in IP-based networking for controlling access to computer resources, enforcing policies, and tracking the activity of users over a network Authentication provides a means for identifying a user, usually by having the user enter a valid user name and valid password before access is granted. Authorization grants or denies a user access to network resources, after the user has logged in to a system (namely: has been authenticated via the username and password). Accounting tracks the user activity while accessing the network and measures the resources a user consumes during access, such as the amount of data a user has sent and/or received during a session. This data is used for purposes such as auditing, billing and trend analysis. The AcceleratorOS supports the AAA functionality as a fundamental method for ensuring security within the Accelerator. For details, see section Security, on page 287. 586 C h ap t er I: Glossary ACL An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to execute the file (if it is an executable file, or program). Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and Unix-based systems are among the operating systems that use access control lists. The list is implemented differently by each operating system. ARP ARP (Automatic Resolution Protocol) is a low-level protocol within the TCP-IP suite, which maps IP addresses to a physical address, for example: a corresponding Ethernet or MAC address. The AcceleratorOS lets you add a static ARP entry, by mapping a specific IP address to a specific MAC address. For details, see section Creating Static ARP Entries, on page 255. Authentication server A Windows domain controller (either a PDC, BDC or Active Directory) to be used for authenticating users. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 587 B Bit Error Rate (BER) Bit Error Ratio (BER) is the ratio of bits that have errors compared with the total number of bits received in a transmission, used for measuring the quality of a signal path.The BER is usually shown as a negative exponent (for example: 10-6, which means one of 1,000,000 bits is in error). AcceleratorOS offers WAN compression over various network topologies, including High BER networks. For details, see section Features and Benefits, on page 2. C Citrix/ICA Citrix ICA stands for Citrix® Independent Computing Architecture. This protocol enables Citrix to separate screen updates and user input processing from the rest of the application’s logic. When using a Citrix ICA Client, all application logic executes on the server and only screen updates, mouse movements and keystrokes are transmitted via the Citrix ICA session. Almost any application can run on a Citrix server, and therefore use Citrix ICA. The AcceleratorOS uses Citrix (Post Acceleration) Aggregation, which handles and optimizes the transfer of small packets by aggregating several small packets into one big packet. CIFS Common Internet File System (CIFS) is a standard proposed by Microsoft for remote file-system access protocol for use over the Internet. CIFS lets groups of users work together and share documents across the Internet or within corporate Intranets, by enabling programs to make requests for files and services on remote computers on the Internet. R ev isi o n 2. 0 588 C h ap t er I: Glossary The WAFS solution integrated within the AcceleratorOS accelerates CIFS traffic. For details, see section Application-specific Acceleration, on page 3. CLI Command Line Interface D DC Domain Controller DFS Distributed File System DHCP DHCP stands for Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network. You can choose to enable DHCP so that the IP address and default gateway are determined dynamically at startup time. A DHCP server must be running on your network to use this feature. Reserve static IP addresses for the EXPAND devices. The MAC address for each device is printed on the device. Dynamic addressing enables a device to have a different IP address every time it connects to the network. The AcceleratorOS offers DHCP server functionality in the remote branch. For details, see section Configuring DHCP Servers, on page 71. DNS servers Domain Name Service. Up to 3 DNS servers can be used to dynamically lookup host names. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e DSFS DiskSites File Services E EFS Enterprise Filing System Ethernet The most widely-installed LAN standard, which is used for connecting network peripherals, such as scanners, printers and computers, within the same building or campus. The original form of Ethernet is officially known as the IEEE 802.3 Ethernet standard. However, with the advance of technology and networks speed, several faster adaptations have emerged, with data rates of 10 Mbits/sec, 100 Mbits/sec (Fast Ethernet), and 1,000 Mbits/ sec (Gigabit Ethernet). All Accelerator models have a dedicated Ethernet port, which supports both 10 Mbits/sec and 100 Mbits/sec rates. For details, see section Connecting the Network Cables, on page 16. You can also use the WebUI for viewing a statistic detailing of the data displayed on the monitoring graphs. For details, see section Viewing Ethernet Statistics, on page 96. 590 C h ap t er I: Glossary H Hop An intermediate connection between two network devices, for example: transferring a data packet from one router to the next in a routed network such as the Internet. The larger the number of hops in a routing process, the longer it takes for a data packet to travel from source to destination. In On-LAN configuration, the Expand Accelerator becomes the next hop for traffic on the LAN destined to the WAN. For details, see section OnLAN, on page 8. HSRP HSRP (Hot Standby Routing Protocol) is Cisco routing protocol that enables automatic switching to a backup router in the event of failure. Using HSRP, several routers act as a single virtual router, so that if a certain router fails, the routing responsibilities are transferred to another router in a process that is transparent to the user. Using HSRP, Expand Accelerators can take part in HSRP/VRRP groups with available routers or Layer-3 switches (or even other available Accelerators) to provide backup in the rare case of Accelerator failure. For details, see section On-LAN, on page 8. HTTP HTTP (Hypertext Transfer Protocol) is an application protocol that runs on top of the TCP/IP suite of protocols and is used for transferring files of any type on the World Wide Web between Web clients and Web servers. The AcceleratorOS offers HTTP acceleration. For details, see section Configuring HTTP Acceleration, on page 144. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 591 I IPCOMP The IP Payload Compression protocol (IPComp) reduces the size of IP dekagrams by compressing the datagrams to increase the communication performance between two partners. The intent is to increase overall communication performance when the communication is over slow or congested links. IPComp does not provide any security and must be used along with either an AH or an ESP transform when the communication occurs over a VPN connection. When setting up a link, the AcceleratorOS lets you select IPCOMP as one of the methods to encapsulate the packets streaming through your network. For details, see section Adding Links, on page 47. J Jitter In Voice over IP (VoIP), jitter refers to a packet delay that affects the quality of the voice conversation. Expand Networks’ Citrix Acceleration plug-in reduces latency and jitter, especially over slow WAN links. L LAN Local Area Network Latency Latency refers to the time it takes a packet to cross a network connection, from sender to receiver. In networking, latency and bandwidth determine the speed of your connection; high latency and low bandwidth lead to slow, inefficient connection speed. Latency typically increases when moving from LAN to WAN. R ev isi o n 2. 0 592 C h ap t er I: Glossary Real-time applications, such as robotics and aircraft, and interactive applications, such as desktop conferencing, are extremely sensitive to high latency. The AcceleratorOS offers several measures for combatting high latency, such as: WAN compression, TCP acceleration and using QoS for prioritizing the traffic. For details see section Application-specific Acceleration, on page 3, and chapter Applying QoS, on page 101. M MIME Type A file identification method, based on the MIME encoding system. The MIME type has become the de facto standard for identifying content on the Internet. For example, an e-mail message that contains an attachment has a MIME type embedded in its header, in order to identify the attachment type. MIME Type is one of the main parameters used for detecting applications to provide the QoS service. Expand supports many MIME types. For details and examples of the most common MIME types supported by the AcceleratorOS, see appendix MIME Types. MPLS MPLS (Multi Protocol Label Switching) is a packet switching protocol, which adds a 32-bit label to each packet to improve network efficiency and to enable routers to direct packets along predefined routes in accordance with the required quality of service (QoS). The label is added when the packet enters the MPLS network, and is based on an analysis of the packet header. The label contains information on the route along which the packet may travel, and the forwarding equivalence class (FEC) of the packet. Packets with the same FEC are routed through the network in the same way. The use of FECs allows guaranteeing QoS levels to be guaranteed, and MPLS allows creating IP tunnels through a network, so that VPNs can be implemented without encryption. MPLS is one of the various network topologies to which the AcceleratorOS fits seamlessly, providing the highest WAN compression Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 593 performance available. For details, see section Features and Benefits, on page 2. N Nagle The Nagle algorithm is used for reducing LAN and other network congestion from TCP applications, by automatically concatenating several small buffer messages. This process (called nagling) increases the efficiency of a network application system by decreasing the number of packets that must be sent. When properly applied, the nagling process enables TCP applications to use network resources more efficiently. O OSPF OSPF (Open Shortest Path First) is a routing protocol that determines the best path for routing IP traffic over a TCP/IP network based on distance between nodes and several quality parameters. Using OSPF, a host that obtains a change to a routing table or detects a change in the network immediately multicasts the information to all other hosts in the network so that all hosts will have the same routing table information. The AcceleratorOS can be configured to work with dynamic routing protocols, such as OSPF and RIP. For details, see section Working with OSPF, on page 59. R ev isi o n 2. 0 594 C h ap t er I: Glossary P Packet Header Packet header is the portion of data packet that is placed at the beginning of a block of data being stored or transmitted. In internet transmissions, the header contains data necessary for successful transmission, such as the sender’s and recipient’s IP addresses and timing information. Expand Networks’ Router Transparency encapsulation (RTM) enables compressing only the packets’ payload, while leaving the original IP header and the original TCP/UDP header in their original forms so that their information is available across the network. Policy-Based Routing Policy-based routing (PBR) enables routing packets based on policies set by network administrators, instead of by using routing tables. This technique may be useful when needing to specify a path or a higher priority for certain traffic, or when the packet should be forwarded based on a different criteria than set by the routing table. PBR is one of the methods used for redirecting WAN traffic through the Accelerator, to enable the Accelerator’s deployment in On-LAN mode. For details, see section Enabling Packet Interception, on page 63. Q QoS QoS, which stands for Quality of Service, is a mechanism for controlling and ensuring resource reservation. Setting a QoS policy helps system administrators prioritze the traffic that flows across the network, in order to prevent greedy and rogue applications from dumping the network, and to combat the congestion and latency that all contribute to poor application and network performance. Using QoS enables organizations to allocate bandwidth to mission-critical applications, slow down noncritical applications, and stop bandwidth abuse in order to efficiently deliver networked applications to the branch office. Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 595 The AcceleratorOS offers a powerful yet simple QoS solution, which lets system administrators quickly obtain a comprehensive picture of the traffic that traverses the network, and easily apply the QoS policy. For details see chapter Applying QoS, on page 101. R RADIUS RADIUS (Remote Authentication Dial-In User Service) is an open and scalable client/server security system. RADIUS is one of the AAA Protocols used for applications such as network access or IP mobility, and it is intended to work in both local and roaming situations. The RADIUS server is one of the authentication servers that the AcceleratorOS lets you set and manage in the Accelerator. For details, see Setting Authentication Preferences, on page 291. RIP RIP (Routing Information Protocol) is a routing protocol used for exchanging the entire routing table among routers in an autonomous network, such as a corporate LAN or an interconnected group of such LANs. The routing table transmission takes place every 30 seconds, thereby making RIP more suitable for small homogenous networks. In larger, more complicated networks the major alternative to RIP, OSPF, is generally used. The AcceleratorOS can be configured to work with dynamic routing protocols, such as OSPF and RIP. For details, see section Working with RIP, on page 63. S SCPS SCPS (Space Communication Protocol Standard) is a protocol suite, designed to enable communication over challenging environments such as satellite and wireless links. This suite was jointly developed by R ev isi o n 2. 0 596 C h ap t er I: Glossary NASA and the Department of Defense USSPACECOM, as TCP/IP was frequently found inefficient in such environments, due to latency created by long transmission path lengths and the noise associated with wireless links. However, SCPS’ transport protocol (SCPS-TP) functioning over the existing terrestrial Internet system was found to be as good as that of TCP/IP, and SCPS was adopted as a standard by ISO. For additional details regarding SCPS, see SCPS website ((http:// www.scps.org). Expand Networks’ TCP Acceleration uses the SCPS protocol package to reduce the impact of TCP limitations. For more details, see section Studying SCPS, Expand’s TCP Acceleration Solution, on page 134. SNACK SNACK (Selective Negative Acknowledgement) is a method used by the SPCS-TP protocol for reducing the amount of data that needs to be transmitted and increasing the retransmissions’s speed. SNACK does that by sending only a request for missing packets, unlike TCP, which retransmits the missing packet as well as all packets already transmitted after the missing packet. For additional details, see section Error Detection and Proactive Resolution, on page 135. STF Short Term Files T TACACS+ TACACS+ (Terminal Access Controller Access Control System+) is a TCP-based authentication protocol, which enables administration of user passwords in a central database that resides on a separate server, instead of in individual routers, thereby providing an easily scalable network security solution. TACACS+ is an open protocol that can be ported to any username or password database. The AcceleratorOS lets you set Authentication Servers (Radius, TACACS+ and Local) and Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 597 manage these servers and their preference order in the Accelerator. For details, see section Setting Authentication Preferences, on page 291. TCP TCP (Transmission Control Protocol) is used, together with the Internet protocol (IP) for sending data in the form of message units between computer over the Internet. TCP manages the assembling of a message or file into smaller packets that are transmitted over the Internet and received by a TCP layer that reassembles the packets into the original message. In the Open System Interconnection (OSI) model, TCP is in Layer-4, the Transport Layer. TCP performs well on LANs but does not deal well with the high latency and high-packet-loss found on many WANs. For details, see section Studying SCPS, Expand’s TCP Acceleration Solution, on page 134. Tunneling A technology that enables one network (usually a private, corporate network) to send its data via another network’s connections (usually a public network). Tunneling works by encapsulating the private network data and protocol information within the public network transmission units so that the private network protocol information appears to the public network as data. Tunneling allows the use of the Internet, which is a public network, to convey data on behalf of a private network. AcceleratorOS lets you set a link so that all its traffic is forced into the tunnel. U UDP UDP (User Datagram Protocol), just like TCP, is a communication protocol used together with the Internet protocol (IP) for sending data in the form of message units between computer over the Internet. However, unlike TCP, UDP transfers packets as a whole and does not provide the services of dividing, reassembling and sequencing the packets. Therefore, this protocol is suitable for network applications that R ev isi o n 2. 0 598 C h ap t er I: Glossary want to save processing time because they have very small data units to exchange and very little reassembling to do. In the Open System Interconnection (OSI) model, UDP is in Layer-4, the Transport Layer. Expand Networks’ encapsulation accelerates the transmission of either UDP or TCP packets, by compressing either the entire packet or only the packet’s payload. V VRRP VRRP (Virtual Router Redundancy Protocol) is an Internet protocol that enables having one or more backup routers when using a statically configured router on a LAN. Two or more routers are set up with VRRP, and one is elected the "master." The master router continuously sends advertisement packets to the backups, and if the advertisements stop, one of the backup routers becomes the master. All routers share a "virtual IP" address, so they are all seen as one address. VRRP can also be used for load sharing. Using HSRP, Expand Accelerators can take part in HSRP/VRRP groups with available routers or Layer-3 switches (or even other available Accelerators) to provide backup in the rare case of Accelerator failure. For details, see section On-LAN, on page 8. W WAN Wide Area Network WCCP The Web Cache Communication Protocol (WCCP) is a Ciscodeveloped content-routing technology that specifies interactions between one or more routers (or Layer 3 switches) and one or more Ac ce ler at o rOS 6 .1 .2 Us er Gui d e 599 web-caches. The purpose of the interaction is to establish and maintain the transparent redirection of selected types of traffic flowing through a group of routers. “Transparent” in this context means that end users need not configure their browsers to use a web proxy, but rather use the target URL to request content, and have their requests automatically redirected to a cache engine. The traffic redirection optimizes resource usage and lowers response times. WCCP is one of the methods used for redirecting WAN traffic through the Accelerator in order for the ON-LAN deployment to work. For additional details, see section Enabling Packet Interception, on page 63. R ev isi o n 2. 0 600 C h ap t er I: Glossary Ac ce ler at o rOS 6 .1 .2 Us er Gui d e Appendix J: Index A AAA configuring via the CLI 574 configuring the Radius server 574 configuring users 577 viewing AAA configuration 579 configuring via the WebUI 290 configuring users 290 defining the security settings 293 setting authentication preferences 291 description 288 ACC1 421 AccDump 328 download files 329 enable 328 access authentication 288 activating WCCP 449 Active Directory 586 adding entries to the ARP cache 495 advanced QoS configuring 122 setting parameters 115 using 39 aggregation aided by Syslog server 271 applying aggregation classes to an application 487 configuring classes 482 defining aggregation class 106 enabling classes per link 485 prioritizing applications 103 selecting a class 156 setting by using the Decision screen 127 setting in the My Links screen 260 setting limit 485, 486 setting window 486 ARP adding entries to the ARP cache via the CLI 495 clearing the ARP cache 495 creating static ARP entries 255 Assigning 501 assigning a link to a wan 501 Authentication 164 Authentication server 586 Authentication servers, compatibility with 162 B bandwidth setting a minimum bandwidth desired 40 bandwidth management Layer-7 and bandwidth management 4 setting the bandwidth 44 bypass mode carrying out the troubleshooting procedure 300 checking the link status 307 602 C h ap t er J: Index description 14 in an On-Path deployment 250 C Cache Management 202 checking Ethernet settings 308 checking for corrupted terminals 313 checking HSRP malfunction 314 checking lack of acceleration 311 checking link malfunction 312 checking QoS malfunction 315 CIFS defining active cache method 22 clearing the ARP cache 495 Compact Flash replacing the Accelerator in the field 28 upgrading the AcceleratorOS software 318 compression by using IPComp 23, 48 by using IPComp encapsulation 261 Citrix’s internal compression mechanism 346 configuring header compression 261 disabling compression disabling Citrix encryption and compression 347 disabling Citrix NFuse compression 346 in the PNAgent client 352 on SAP 358 next-generation WAN compression 3 QoS’ integration with 103 viewing compression statistics per application 91 per link 82 Compression filter 197 Configuring 159 configuring Accelerator NetFlow 356 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e configuring Accelerator networking 41 configuring DHCP servers 71 configuring OSPF via the WebUI 60 configuring remote subnets manually 56 configuring RIP via the CLI 446 via the WebUI 63 configuring router polling via the CLI 443 via the WebUI 61 configuring secondary IP addresses 45 configuring subnets manually 54 via the CLI 425, 433 Configuring the File Server/Domain Controller 166 configuring the WAN 44 configuring the wizard 21 configuring WCCP via CLI 448 copying last saved startup configuration to running configuration 516 new bundle file 582 rebooting the Accelerator after 582 running configuration as startup configuration 320 core allocation tuning in deployments with asymmetric bandwidth 452 creating static ARP entries 255 D Defining Shared Directories 166 deployment Citrix deployment benefits in terminal and thin client deployments 347 603 Citrix metaframe deployments 106 controlling latency and jitter 346 configuring via the CLI 424 defining deployment size 22 defining deployment type 22 setting deployment type via the CLI 427 transparency configuring transparency support 147, 463 in On-LAN deployments 143 in On-Path deployments 143, 261 DFS 195, 588 DHCP servers configuring via the CLI 454 via the WebUI 71 Disconnected Operation 227 reconnection 228 DISKSITES Services Issues DHCP services 244 displaying information for troubleshooting 305 DNS 229 DNS acceleration 152 benefits 4, 38 DNS Acceleration Configuring via the WebUI 152 DNS servers 588 Domains 163 DSFS 589 dynamic routing a feature in WAN compression 3 configuring RIP dynamic routing 32 configuring router polling 33 integrating into networks that use 32 setting routing strategy 27 E Editing 50 Enabling Packet Interception 63 enabling WCCP 449 encryption 104 Ethernet checking Ethernet settings 308 Ethernet port configuring NetFlow 356 connecting out-of-band management 269 Ethernet statistics viewing via the CLI 471 via the WebUI 96 event log checking for unusual errors checking error events 302 checking fatal events 303 checking info events 302 checking warning events 302 Expand solution 160 ExpandView working with Accelerators via 247 external monitoring devices 33 external QoS devices integrating into 33 F Fetch Settings 207 Fetch Users 203 File Server/Domain configuring 166 File servers 195 File servers, compatibility with 162 File Services Functions 199 FileBank adding FileBank Directors 199 cache management 202 deleting FileBank Directors 199 fetch settings 207 filters 204 license settings 184 R ev isi o n 2. 0 604 C h ap t er J: Index print services 215 short term files filter 204 Time to Live settings 202 users 203 Windows domain 201 FileBank Director compression filter 197 file servers 195 file services 193 settings 193 Setup Wizard 174, 178 system functions 174, 178 FileBank Director Settings 193 Filters 204 FTP acceleration configuring via the WebUI 149 definition 4 H high latency environment installing in 37 HSRP configuring autodetecting HSRP groups 498 enabling HSRP automatic detection 280 setting HSRP group number 498 setting manual HSRP configuration 280 understanding router redundancy protocols 256 HTTP acceleration configuring 144 via the CLI 459 via the WebUI 144 definition 4 setting rules 148 HTTP transparency in On-Path deployment 143 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e I installing the Accelerator On-Path using bypass mode 14 OnPath 8 IP address configuration 21 configuring router polling 62 configuring secondary 45 configuring subnets manually 54 configuring the Accelerator 425 creating QoS rules 124 creating static ARP entries 255 defining OSPF and RIP neighbors defining a RIP neighbor 447 defining an OSPF neighbor 442 editing a subnet 55 enabling NetFlow 475 settings 22, 25 setting a network for broadcasting the Accelerator’s rules 442 setting ExpandView agent parameters 73 setting links via the wizard 23 setting the Accelerator’s clock 70 setting the remote device 429 setting the WCCP router IP 451 L latency causing slower session start 134 computing 137 increased by waiting for ACK packets 133 installing in a high latency environment 37 SpeedScreen Latency Reduction Manager 351 TCP poor handling of high latency 132 605 using Citrix acceleration plug-in to reduce 106 using packet fragmentation to prevent violation of VoIP/video latency budgets 103 ways to reduce DNS acceleration 152 DNS caching 152 packet aggregation 503 packet fragmentation 260, 502 scaling the transmission window 135 TCP Vegas 140 using QoS 102, 594 using SCPS 135 Layer-7 applications classifying 110 discovering 88 identifying Citrix Layer-7 applications 353 Layer-7 QoS 4 monitoring and reporting 5 License Settings 184 links adding via the my links screen 47 assigning a link to a WAN 501 creating and editing 46 via the CLI 52 defining advanced settings 22 defining maximum number of 22 editing via the my links screen 50 enabling citrix acceleration 156 generating trend reports via ExpandView 267 managing 259 noisy links 34 setting applications as monitored 473 setting definitions for a new link 260 setting the Accelerator to enable external QoS 33 setting the bandwidth of 118 checking QoS malfunction 315 setting to work in large cache mode 501 traffic discovery 94 using graphs to view link statistics 80 acceleration 81 compression 82 summary graphs 95 utilization 80 using the statistics table to view link statistics 83 checking lack of acceleration 311 viewing interface statistics for a specific link 472 for all links 471 M monitoring window description 78 my links screen uses adding links 47 editing links 50 using for setting links 23 N NetFlow configuring NetFlow support 98 enabling via the CLI 474 via the WebUI 99 identifying the traffic 98 NetFlow compliance as an Expand benefit 5 NetFlow monitored statistics 331 requiring router transparency encapsulation 49 template fields 334 network topology optimizing 42 R ev isi o n 2. 0 606 C h ap t er J: Index networks asymmetric networks optimization 136 computing latency 138 congestion avoidance 136 defining printers for 190 IP-based network On-LAN 8 On-Path 8 managing links 259 overviewing your network performance 95 preparing network integration 13, 54 Non-Link 46 O On-LAN deployment asymmetrical encapsulation settings 261 configuring transparency support 147 defining encapsulation settings 430 enabling packet interception 63 RTM support for 49 setting routing strategy 27 setting the deployment type in the CLI 427 using WCCP to forward traffic to an On-LAN accelerator 65 working with VLAN in 252 On-LAN installation at a data center 35 configuring Accelerator NetFlow in 357 defining encapsulation settings 23 use in IP-based network 8 On-Path deployment applying HTTP transparency to the server side 143 configuring NetFlow support 98 configuring transparency support 147 defining encapsulation settings 23 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e enabling router transparency encapsulation 261 operating in bypass mode 250 setting the deployment type in the CLI 427 using bridge route 27 working with bypass mode 14 working with VLAN 253 On-Path installation configuring NetFlow 357 operating requirements 21 OSPF adding remote subnets manually 56 configuring 32, 60 configuring subnets manually 54 setting dynamic routing 53, 59 using out-of-band management 269 working with 59 P packet interception configuring 35 enabling 63 Print Services 215 prioritizing applications methods of 39 when creating a new Citrix application 112 when creating a new Web application 110 when creating a QoS rule 123 when filtering traffic 117 prioritizing traffic by using traffic shaping 119, 120 Q QoS And router transparency 594 applications 607 creating 105, 109 creating Citrix applications 111 creating Web applications 110 modifying 109 benefits of the Expand QoS solution end-to-end application performance monitoring 102 guaranteed bandwidth for specific applications 103 restricting rouge and greedy applications 103 seamless integration with compression 103 transparent to existing QoS infrastructure 102 checking lack of acceleration 311 malfunction 315 configuring the WAN 44 configuring via the CLI 475 defining scalable 268 dropped out packets 84 external QoS devices 33 Layer-7 QoS bandwidth management 4 managing links 259 part of On-Path configuration 8 providing QoS services to virtual links 46 router transparency 23 rules creating 122 editing 126 understanding 116 setting inbound 121 understanding how QoS works QoS rules 116 studying QoS bandwidth allocation 118 traffic filtering 117 traffic shaping 118 using advanced 39 R RAID 277 RDP description 347 disabling compression and encryption 348 recovering the password 301 redundancy 277 RIP configuring 63, 65, 66 via the CLI 446 via the WebUI 32, 63 packet interception 35 setting routing 53 dynamic routing 59 subnet routing 53 setup checklist 15 working with 63 RIP dynamic routing configuring 32 router polling configuring via the CLI 443 setting dynamic routing 59 setting routing strategy 27 using out-of-band management 269 working with 61 router redundancy HSRP 278 On-LAN deployment 9 understanding router redundancy protocols 278 VRRP 278 router transparency creating new links 261 monitoring device in a cloud 43 preserving network integrity 6 setting links via the wizard 23 setting the link to work with 430 WAN compression 3 with a QoS device 43 R ev isi o n 2. 0 608 C h ap t er J: Index RS232 console 11 rules route rules working with router polling 61 S SCPS standard compliance of TCP acceleration with 4 congestion avoidance 136 description 132 error detection via SNACK 135 link outage support 136 preserving network integrity 6 standard number 410 studying SCPS 134 TCP spoofing 136 secondary IP address configuring in the WebUI 45 Security 287 security Accelerator’s AAA 288 authentication setting authentication method 292, 293 setting authentication servers 292 entering user-defined password 25, 256 locking and unlocking the keypad 295 managing users defining authorization for a new user 290 deleting users 291 modifying authorization for an existing user 291 using Verisign security certificate 78 setup via the WebUI 19 setup wizard accessing 21 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e configuring 21 defining advanced settings 22 reviewing configuration 25 setting links via 22 setting time 24 Shared Directories defining 166 Short Term Files filter 204 SNACK use in SCPS protocol 135 SNTP setting the Accelerator’s time 70 SSH enabling secure management 6, 18 logging into the Accelerator via 420 subnet routing setting 53 summary graphs viewing 95 T TCP acceleration computing latency 137 configuring 139 via the WebUI 139 editing links 50 enabling 141 link outage support 136 optimizing WANs in a high latency environment 37 understanding the shortcomings of TCP 132 TCP service ID setting 36 technical support displaying information for troubleshooting 305 time setting the Accelerator time 70 Time to Live settings 202 traffic discovery 609 discovering Layer-7 applications 88 enabling L-7 traffic discovery via the CLI 472 gathering statistics for detected applications 93, 95, 99 viewing detailed 86 traffic shaping how it is applied 118 prioritizing applications 39, 103 role in the QoS mechanism 115 transparency support configuring 147, 463 Troubleshooting 299 DISKSITES services issues 244 general 236 networking issues 236, 239 security issues 238, 242 troubleshooting displaying information for 305 U UDP service ID setting 36 upgrading the AcceleratorOS software via the CLI 582 via the WebUI 318 V Verisign security certificate using 78 virtual links 46 VLAN including the Accelerator in a VLAN group 253 setting in the CLI 497 working with in an On-LAN configuration 252 in an On-Path configuration 253 VRRP Setting VRRP Group Number 499 understanding router redundancy protocols 256 W WAFS FileBank categories 192 additional services 190 file services 189 system 189 utilities 190 FileBank Director categories 187 file services 187 system 187 utilities 188 WAFS transparency enabling 536 excluding servers from 536 WAN adding via the CLI 497 via the WebUI 248 addressing ‘WAN-Outs’ 4 assigning a link to 501 configuring configuring NetFlow support 98 configuring the WAN 44 defining link speed 78 enabling bursts 482 enabling packet interception 63 identifying ongoing traffic 98 setting the bandwidth of QoS bandwidth allocation 118 setting inbound QoS 121 via the CLI 428 via the WebUI 22 setting to work in strict-priority mode 482 viewing detected applications 86 WAN bandwidth R ev isi o n 2. 0 610 C h ap t er J: Index configuring the Accelerator 428 setting 22 studying QoS bandwidth allocation 118 WAN bursts 119 WCCP configuring via the CLI 448 activating 449 enabling 449 setting authentication 450 setting priority 450 setting router IP 451 setting TCP service ID 451 setting UDP service ID 451 installing On-LAN at a data center 35 using out-of-band management 269 Web-intensive environment installing in 38 Windows Domain 201 Windows domain controller 586 Working with Accelerators Via ExpandView 205 Ac ce ler at o rOS 6 .1 .2 Us er Gui d e