Вы находитесь на странице: 1из 108
Advanced Troubleshooting Cisco Wide Area Application Services BRKAPP-3006 BRKAPP-3006 © 2012 Cisco and/or its affiliates.

Advanced Troubleshooting Cisco Wide Area Application Services

BRKAPP-3006

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

2

Agenda

WAE Overview Diagnostic Reports Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

3

WAE Overview

> WAE Overview Diagnostic Reports Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Reports Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Wide Area Application Engine (WAE)

Wide Area Application Services Version 4.5 and above

IOS Platform with Services and CLI

CIFS

AO

MAPI

AO

HTTP

AO

SSL

AO

Video

AO

NFS

AO

ICA

AO

EPM

TCP Proxy with Scheduler Optimizer (SO) DRE, LZ, TFO

WoW

Virtual

Virtual

Blade

Blade

# 2

# 3

Virtual Blades

Configuration

Management

System

(CMS)

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Flash IOS Shell Linux

Application

Storage

Object

Storage

DRE

Storage

Shell Linux Application Storage Object Storage DRE Storage Virtual Blade Storage /vbspace Ethernet Network I/O

Virtual Blade Storage /vbspace

Ethernet

Network

I/O

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

5

Diagnostic Reports

WAE Overview

> Diagnostic Reports Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Reports Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Self Diagnostic Tool

A good place to start

Self Diagnostic Tool A good place to start BRKAPP-3006 © 2012 Cisco and/or its affiliates. All

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

7

Self Diagnostic Tool

Self Diagnostic Tool BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

8

WAAS System Report

WAAS system report (sysreport)

Compressed archive Relevant support and system health information

The sysreport includes the following:

Command output Logs

Configurations State Information

The sysreport can be generated from the WAE Manager GUI or CLI:

WAE# copy sysreport <disk | ftp | tftp>

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

9

Physical Components

WAE Overview Diagnostic Reports

> Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Reports > Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Wide Area Application Engine (WAE)

Wide Area Application Services Version 4.5 and above

IOS Platform with Services and CLI

CIFS

AO

MAPI

AO

HTTP

AO

SSL

AO

Video

AO

NFS

AO

ICA

AO

EPM

TCP Proxy with Scheduler Optimizer (SO) DRE, LZ, TFO

WoW

Virtual

Virtual

Blade

Blade

# 2

# 3

Virtual Blades

Configuration

Management

System

(CMS)

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Flash IOS Shell Linux

Application

Storage

Object

Storage

DRE

Storage

Shell Linux Application Storage Object Storage DRE Storage Virtual Blade Storage /vbspace Ethernet Network I/O

Virtual Blade Storage /vbspace

Ethernet

Network

I/O

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

11

Disk Health and Status

Online Defunct Missing <null> Rebuilding
Online
Defunct
Missing
<null>
Rebuilding

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

12

Replacing Failed Disks

Disk failures are automatically detected by the system

Failed disks are automatically removed from service Not present or not responding (Shutdown)

Administrator can also shutdown disk for scheduled replacement:

WAE(config)# disk disk-name disk01 shutdown Device maybe busy while going offline mdadm: set /dev/sdb1 faulty
WAE(config)# disk disk-name disk01 shutdown
Device maybe busy while going offline
mdadm: set /dev/sdb1 faulty in /dev/md0
mdadm: set /dev/sdb2 faulty in /dev/md1
please wait!
RAID-1

< snip >

WAE# disk disk-name disk01 replace Controllers found: 1

RAID-5

Command completed successfully.

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

13

Disk Partitions

WAE# show disks details

Physical disk information:

disk00: Present

3LN2T3LG000098183V64 (h00 c00 i128 l00 - Int DAS-SAS)

140011MB(136.7GB)

disk01: Present 3LN2RN2P00009818KUM7 (h00 c01 i128 l00 - Int DAS-SAS) 140011MB(136.7GB) Mounted file systems: MOUNT
disk01: Present
3LN2RN2P00009818KUM7 (h00 c01 i128 l00 - Int DAS-SAS)
140011MB(136.7GB)
Mounted file systems:
MOUNT POINT
/sw
/swstore
/state
TYPE
DEVICE
SIZE
INUSE
FREE USE%
internal
/dev/md0
991MB
912MB
79MB
92%
internal
/dev/md1
991MB
879MB
112MB 88%
internal
/dev/md2
5951MB
196MB
5755MB
3%
/local/local1
SYSFS
/dev/md5
6943MB
978MB
5965MB 14%
/disk00-04
CONTENT
/dev/md4
117798MB
1786MB 116012MB
1%
/local1/spool
PRINTSPOOL /dev/md6
991MB
16MB
975MB
1%

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

14

Important Directories and Log Files

The following directories are used by Cisco WAAS for log files

/local1 – Root directory for all log files /local1/logs – Service log files (aka admin logs) /local1/errorlog – Service log files (aka debug logs) /local1/core_dir – Process core dump files

File system navigation commands

cd

pwd

dir

type

find-pattern

type-tail <filename> <lines>

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

15

Ethernet Interface Errors

WAE# show int gi 1/0 Type:Ethernet Ethernet address:00:14:5E:AC:2D:79 Internet address:10.88.80.135 Broadcast address:10.88.80.255

Netmask:255.255.255.128

Maximum Transfer Unit Size:1500

Metric:1

Packets Received: 160661

Input Errors: 0 Input Packets Dropped: 0 Input Packets Overruns: 0 Input Packets Frames: 0 Packet Sent: 122371 Output Errors: 0 Output Packets Dropped: 0 Output Packets Overruns: 0 Output Packets Carrier: 0 Output Queue Length:1000 Collisions: 0

Interrupts:16

Verify Interface Statistics for Errors

0 Interrupts:16 Verify Interface Statistics for Errors Flags:UP BROADCAST RUNNING MULTICAST Link State: Interface

Flags:UP BROADCAST RUNNING MULTICAST Link State: Interface is up,line protocol up Mode: autoselect, full-duplex, 1000baseTX WAE#

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

16

Ethernet Interface Speed / Duplex

WAE# show int gi 1/0 Type:Ethernet Ethernet address:00:14:5E:AC:2D:79 Internet address:10.88.80.135 Broadcast address:10.88.80.255

Netmask:255.255.255.128

Maximum Transfer Unit Size:1500

Metric:1 Packets Received: 160661 Input Errors: 0 Input Packets Dropped: 0 Input Packets Overruns: 0
Metric:1
Packets Received: 160661
Input Errors: 0
Input Packets Dropped: 0
Input Packets Overruns: 0
Input Packets Frames: 0
Packet Sent: 122371
Output Errors: 0
Output Packets Dropped: 0
Output Packets Overruns: 0
Output Packets Carrier: 0
Output Queue Length:1000
Collisions: 0
Interrupts:16
Flags:UP BROADCAST RUNNING MULTICAST
Link State: Interface is up,line protocol up
Mode: autoselect, full-duplex, 1000baseTX

WAE#

protocol up Mode: autoselect, full-duplex, 1000baseTX WAE# Verify Interface State, Speed and Duplex BRKAPP-3006 © 2012

Verify Interface State, Speed and Duplex

1000baseTX WAE# Verify Interface State, Speed and Duplex BRKAPP-3006 © 2012 Cisco and/or its affiliates. All

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

17

CPU Utilization (Historical)

CPU Utilization (Historical) BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 18

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

18

CPU Utilization (Real Time)

WAE# show processes cpu

CPU utilization:

CPU name cpu:

User

Nice

System

Idle

IOwait

IRQ softIRQ

Steal

0.06%

1.51%

0.46%

97.90%

0.05%

0.00%

0.01%

0.00%

cpu0:

0.05%

1.51%

0.42%

97.95%

0.05%

0.00%

0.03%

0.00%

cpu1:

0.08%

1.45%

0.51%

97.89%

0.05%

0.00%

0.01%

0.00%

cpu2:

0.05%

1.46%

0.40%

98.03%

0.05%

0.00%

0.01%

0.00%

cpu3:

0.08%

1.64%

0.51%

97.71%

0.05%

0.00%

0.01%

0.00%

Average:

N/A

N/A

N/A

N/A

N/A

-

-

N/A

Peak:

N/A

N/A

N/A

N/A

N/A

-

-

N/A

Overall current CPU utilization (100 - (Idle + IOwait))% : 2.05%

User - Percent of CPU time that the system spent in user mode. Nice - Percent of CPU time that the system spent on low priority tasks. System - Percent of CPU time that the system spent in system mode. Idle - Percent of CPU time when the system is idle.

IOwait - Percent of CPU time when the system is waiting for I/O to complete. IRQ - Percent of CPU time when the system is servicing interrupts. softIRQ - Percent of CPU time when the system is servicing softirqs. Steal - Percent of CPU time that the system spent on involuntary wait. Average - Average CPU utilization since reboot.

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

19

Platform

>

WAE Overview Diagnostic Reports Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Reports Physical Components Platform Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Wide Area Application Engine (WAE)

Wide Area Application Services Version 4.5 and above

IOS Platform with Services and CLI

CIFS

AO

MAPI

AO

HTTP

AO

SSL

AO

Video

AO

NFS

AO

ICA

AO

EPM

TCP Proxy with Scheduler Optimizer (SO) DRE, LZ, TFO

WoW

Virtual

Virtual

Blade

Blade

# 2

# 3

Virtual Blades

Configuration

Management

System

(CMS)

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Flash IOS Shell Linux

Application

Storage

Object

Storage

DRE

Storage

Shell Linux Application Storage Object Storage DRE Storage Virtual Blade Storage /vbspace Ethernet Network I/O

Virtual Blade Storage /vbspace

Ethernet

Network

I/O

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

21

WCCP Configuration Recommendations

WCCP on a software-based platform

WCCP on a hardware-based platform

GRE Forwarding (Default) L2 Forwarding

GRE Forwarding (Default)

L2 Forwarding

Hash Assignment (Default)

Mask Assignment

Inbound or Outbound Interception

Inbound Interception

"ip wccp redirect exclude in" on WCCP client interface (outbound interception only)

WAAS Egress Method: IP Forwarding, Negotiated Return

No "ip wccp redirect exclude in"

WAAS Egress Method: IP Forwarding, Generic GRE (Cat6k PFC-based systems only)

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

22

WCCPv2 Interception Verification

show ip wccp [detail] provides WCCP inventory

Number of routers and WAEs or search service group, packets re-directed in software, forwarding and return method

L2 Forwarding and GRE Forwarding Hash assignment

On software IOS routers only

Verify hash allotment

Mask assignment

On L3 switches and some IOS versions

Mask is configurable

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

23

WCCPv2 Interception Verification (IOS)

Router# show ip wccp

Global WCCP information:

Router information:

Router Identifier:

10.88.81.242

 

Protocol Version:

2.0

Service Identifier: 61

 

Number of Service Group Clients:

1

Number of Service Group Routers:

1

Total Packets s/w Redirected:

68755

Process:

2

CEF:

68753

Service mode:

Open

Service access-list:

-none-

Total Packets Dropped Closed:

0

Redirect access-list:

-none-

Total Packets Denied Redirect:

0

Total Packets Unassigned:

0

Group access-list:

-none-

Total Messages Denied to Group:

0

Total Authentication failures:

0

Total Bypassed Packets Received:

0

--More--

Client = WAE

to Group: 0 Total Authentication failures: 0 Total Bypassed Packets Received: 0 --More-- Client = WAE

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

24

WCCPv2 Interception Verification (IOS)

Router# show ip wccp

Global WCCP information:

Router information:

Router Identifier:

10.88.81.242

 

Protocol Version:

2.0

Service Identifier: 61 Number of Service Group Clients:

1

 

Number of Service Group Routers:

1

Total Packets s/w Redirected:

68755

Process:

2

CEF:

68753

Service mode:

Open

Service access-list:

-none-

Total Packets Dropped Closed:

0

-none- Total Packets Dropped Closed: 0 Redirect access-list: Total Packets Denied Redirect: Total

Redirect access-list:

Total Packets Denied Redirect:

Total Packets Unassigned:

Group access-list:

Total Messages Denied to Group:

Total Authentication failures:

Total Bypassed Packets Received:

Verify That Counters Are Incrementing on Software- Based Platforms (e.g. ISR)

0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

25

WCCPv2 Interception Verification (IOS)

Router# show ip wccp

Global WCCP information:

Router information:

Router Identifier:

10.88.81.242

 

Protocol Version:

2.0

Service Identifier: 61 Number of Service Group Clients:

1

 

Number of Service Group Routers:

1

Total Packets s/w Redirected:

102

Process:

1

CEF:

101

Service mode:

Open

Service access-list:

-none-

Total Packets Dropped Closed:

0

-none- Total Packets Dropped Closed: 0 Redirect access-list: Total Packets Denied Redirect: Total

Redirect access-list:

Total Packets Denied Redirect:

Total Packets Unassigned:

Group access-list:

Total Messages Denied to Group:

Total Authentication failures:

Total Bypassed Packets Received:

Verify That Counters Are Not Incrementing on Hardware- Based Platforms (e.g. Cat6k)

0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

26

WCCPv2 Interception Verification (IOS)

Router# show ip wccp

Global WCCP information:

Router information:

Router Identifier:

10.88.81.242

Protocol Version: 2.0 1 Number of Service Group Routers: 1 Total Packets s/w Redirected: 68755
Protocol Version:
2.0
1
Number of Service Group Routers:
1
Total Packets s/w Redirected:
68755
Process:
2
CEF:
68753
Service mode:
Open
Counter Will Increment for
Packets That Match
Service Group but Do Not
Match Redirect-List
Service access-list:
-none-
Total Packets Dropped Closed:
0
Redirect access-list:
-none-
Total Packets Denied Redirect:
0
Total Packets Unassigned:
0
Group access-list:
-none-
Total Messages Denied to Group:
0
Total Authentication failures:
0
Total Bypassed Packets Received:
0

Service Identifier: 61 Number of Service Group Clients:

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

27

WCCPv2 Interception Verification (IOS)

Router# show ip wccp

Global WCCP information:

Router information:

Router Identifier:

10.88.81.242

Protocol Version:

2.0

Service Identifier: 61 Number of Service Group Clients:

1

Number of Service Group Routers:

1

Total Packets s/w Redirected:

68755

Process:

CEF:

Increments for Every Packet Received with Incorrect Service Group Password

Every Packet Received with Incorrect Service Group Password Service mode: Service access-list: Total Packets Dropped

Service mode:

Service access-list:

Total Packets Dropped Closed:

Redirect access-list:

Total Packets Denied Redirect:

0

Total Packets Unassigned:

0

Group access-list:

-none-

Total Messages Denied to Group:

0

Total Authentication failures:

0

Total Bypassed Packets Received:

0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

28

WCCPv2 Interception Verification (IOS) - SW

Verify WAE State in Service Group

Router# show ip wccp 61 detail

WCCP Client information:

WCCP Client ID:

ip wccp 61 detail WCCP Client information: WCCP Client ID: 10.88.81.242 Protocol Version: 2.0 State: Usable

10.88.81.242

Protocol Version:

2.0

State:

Usable

Redirection:

GRE

Packet Return:

GRE

Assignment:

HASH

Initial Hash Info:

Assigned Hash Info:

FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF 256 (100.00%)

Hash Allotment:

Packets s/w Redirected: 68755

Connect Time:

Bypassed Packets Process:

68753

s/w Redirected: 68755 Connect Time: Bypassed Packets Process: 68753 3w6d 2 % of Hash Buckets Assigned

3w6d

2

s/w Redirected: 68755 Connect Time: Bypassed Packets Process: 68753 3w6d 2 % of Hash Buckets Assigned

% of Hash Buckets Assigned

CEF:

Errors:

0

Current Time in the Service Group

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

29

WCCPv2 Interception Verification (IOS) - HW

Cat6k# sh ip wccp 61 det

WCCP Client information:

WCCP Client ID:

10.88.80.135

Protocol Version:

2.0

State:

Usable

Redirection:

L2

Packet Return:

GRE

Packets Redirected:

0

Connect Time:

1d18h

Assignment:

MASK

Mask SrcAddr

DstAddr

SrcPort DstPort

---- ------- ------- ------- ------- 0000: 0x00000f00 0x00000000 0x0000 0x0000

Value SrcAddr

DstAddr

0x00000f00 0x00000000 0x0000 0x0000 Value SrcAddr DstAddr SrcPort DstPort CE-IP Service group mask ----- -------

SrcPort DstPort CE-IP

Service group mask

----- ------- ------- ------- ------- -----

0000: 0x00000000 0x00000000 0x0000 0x0000 0x0A585087 (10.88.80.135)

0001: 0x00000001 0x00000000 0x0000 0x0000 0x0A585087 (10.88.80.135) 0002: 0x00000040 0x00000000 0x0000 0x0000 0x0A585087 (10.88.80.135) 0003: 0x00000041 0x00000000 0x0000 0x0000 0x0A585087 (10.88.80.135)

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

30

Interception Verification (IOS) - HW

Catalyst 6500 / 7600 platforms are capable of WCCP in both software and hardware forwarding paths

Inspecting TCAM programming shows whether WCCP is handled in software or hardware

Cat6k# show tcam interface Vlan900 acl in ip

* Global Defaults not shared

Entries from Bank 0

Entries from Bank 1

Defaults not shared Entries from Bank 0 Entries from Bank 1 permit tcp host 10.88.80.135 any

permit

tcp host 10.88.80.135 any

punt

ip any any (8 matches)

Punt entries caused by:

Hash Assignment

Outbound Redirection

Redirect Exclude In

Unknown WAE MAC

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

31

Interception Verification (IOS) - HW

Cat6k# sh tcam int vlan 900 acl in ip •Global Defaults not shared Entries from
Cat6k# sh tcam int vlan 900 acl in ip
•Global Defaults not shared
Entries from Bank 0
‘ policy-route ’ entries = full
hardware redirection
Entries from Bank 1
permit
tcp host 10.88.80.135 any
policy-route tcp any 0.0.0.0 255.255.232.190 (60 matches)
policy-route tcp any 0.0.0.1 255.255.232.190 (8 matches)
policy-route tcp any 0.0.0.64 255.255.232.190 (16 matches)
policy-route tcp any 0.0.0.65 255.255.232.190 (19 matches)
policy-route tcp any 0.0.1.0 255.255.232.190
policy-route tcp any 0.0.1.1 255.255.232.190
policy-route tcp any 0.0.1.64 255.255.232.190
policy-route tcp any 0.0.1.65 255.255.232.190
policy-route tcp any 0.0.2.0 255.255.232.190
policy-route tcp any 0.0.2.1 255.255.232.190
policy-route tcp any 0.0.2.64 255.255.232.190
policy-route tcp any 0.0.2.65 255.255.232.190 (75 matches)
policy-route tcp any 0.0.3.0 255.255.232.190 (222195 matches)
BRKAPP-3006
© 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Public

32

Interception Verification (IOS) - HW

Cat6k# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Cat6k(config)# service internal Cat6k(config)# end

Cat6k# show ip wccp 61 internal Internal WCCP client information (1): Index: 0 WCCP Client
Cat6k# show ip wccp 61 internal
Internal WCCP client information (1):
Index:
0
WCCP Client ID:
10.88.80.135
Protocol Version:
2.0
State:
0007 (AUV )
Connect Time:
00:00:05
Redirection:
L2
MAC:
0000.0000.0000
Packet Return:
GRE
L2 Address Changes:
0
Assignment:
MASK
Redirect Assignments:
Received:
0
Invalid:
0
Duplicate:
0
HIA from WAE must enter
same interface that WAE
MAC is known through
< snip >
BRKAPP-3006
© 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Public

33

WCCPv2 Interception Verification (WAE)

WAE# show wccp services Services configured on this File Engine TCP Promiscuous 61 TCP Promiscuous
WAE# show wccp services
Services configured on this File Engine
TCP Promiscuous 61
TCP Promiscuous 62
Verify WCCP Is Configured
and Enabled
WAE# show wccp status
WCCP version 2 is enabled and currently active
WAE# show wccp routers
Router Information for Service: TCP Promiscuous 61
Routers Seeing this Wide Area Engine(1)
Router Id
Sent To
Recv ID
AssKeyIP
AssKeyCN
MemberCN
44.77.22.3
10.88.80.129
00090C46
10.88.80.133
1
5
Routers not Seeing this Wide Area Engine
-NONE-
Routers Notified of from other WAE's
-NONE-
Multicast Addresses Configured
Verify Bi-Directional
Communication with WCCP-
-NONE-
Enabled Routers
BRKAPP-3006
© 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Public

34

show wccp gre

WAE# show wccp gre

Transparent GRE packets received: 5531561 Transparent non-GRE packets received: 0 Transparent non-GRE non-WCCP packets
Transparent GRE packets received:
5531561
Transparent non-GRE packets received:
0
Transparent non-GRE non-WCCP packets received: 0
Total packets accepted:
5051
Invalid packets received:
0
Packets received with invalid service:
0
Packets received on a disabled service:
0
Packets received too small:
0
Packets dropped due to zero TTL:
0
Packets dropped due to bad buckets:
0
Packets dropped due to no redirect address:
0
Packets dropped due to loopback redirect:
0
Pass-through pkts dropped on assignment update:0
Either of These
Counters Should Be
Incrementing If WCCP
Redirection Is Working
Connections bypassed due to load:
0
Packets sent back to router:
0
GRE packets sent to router (not bypass)
Packets sent to another WAE:
0
0
GRE fragments redirected:
0
GRE encapsulated fragments received:
0
Packets failed encapsulated reassembly:
0
Packets failed GRE encapsulation:
0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

35

show wccp gre

WAE# show wccp gre

Transparent GRE packets received:

0

Transparent non-GRE packets received:

234624

Transparent non-GRE non-WCCP packets received: 0

Total packets accepted:

0

0

0

0

0

0

0

0

Pass-through pkts dropped on assignment update:0

Connections bypassed due to load:

Packets sent back to router:

GRE packets sent to router (not bypass) Packets sent to another WAE:

0

0

0

0

0

0

Packets dropped due to loopback redirect:

Packets dropped due to no redirect address:

Packets dropped due to bad buckets:

Packets dropped due to zero TTL:

Packets received too small:

Packets received on a disabled service:

Packets received with invalid service:

72511

Invalid packets received:

GRE fragments redirected:

GRE encapsulated fragments received:

Packets failed encapsulated reassembly:

Packets failed GRE encapsulation:

0

0

GRE encapsulated fragments received: Packets failed encapsulated reassembly: Packets failed GRE encapsulation: 0 0

For Packets Redirected Using WCCP L2- Redirect Forwarding Method

Packets Redirected Using WCCP L2- Redirect Forwarding Method --More-- BRKAPP-3006 © 2012 Cisco and/or its affiliates.

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

36

show wccp gre

WAE# show wccp gre

Transparent GRE packets received: 0 Transparent non-GRE packets received: 0 Transparent non-GRE non-WCCP packets
Transparent GRE packets received:
0
Transparent non-GRE packets received:
0
Transparent non-GRE non-WCCP packets received: 102764
Total packets accepted:
98723
Invalid packets received:
0
Packets received with invalid service:
0
Packets received on a disabled service:
0
Packets received too small:
0
Packets dropped due to zero TTL:
0
Packets dropped due to bad buckets:
0
Packets dropped due to no redirect address:
0
Packets dropped due to loopback redirect:
0
Pass-through pkts dropped on assignment update:0
Connections bypassed due to load:
0
For Packets L2
Redirected Using Non-
WCCP (L4, PBR, Etc.)
Interception Method
Packets sent back to router:
0
GRE packets sent to router (not bypass)
Packets sent to another WAE:
0
0
GRE fragments redirected:
0
GRE encapsulated fragments received:
0
Packets failed encapsulated reassembly:
0
Packets failed GRE encapsulation:
0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

37

show wccp gre

WAE-612# show wccp gre

Transparent GRE packets received: 753110 Transparent non-GRE packets received: 0 Transparent non-GRE non-WCCP packets
Transparent GRE packets received:
753110
Transparent non-GRE packets received:
0
Transparent non-GRE non-WCCP packets received: 0
Total packets accepted:
505123
Invalid packets received:
0
Packets received with invalid service:
0
Packets received on a disabled service:
0
Packets received too small:
0
Packets dropped due to zero TTL:
0
Packets dropped due to bad buckets:
0
Packets dropped due to no redirect address:
0
Packets dropped due to loopback redirect:
0
Pass-through pkts dropped on assignment update:0
Connections bypassed due to load:
0
Packets Accepted for
Optimization (I.E. Auto-
Discovery Found
Peer WAE)
Packets sent back to router:
0
GRE packets sent to router (not bypass)
Packets sent to another WAE:
0
0
GRE fragments redirected:
0
GRE encapsulated fragments received:
0
Packets failed encapsulated reassembly:
0
Packets failed GRE encapsulation:
0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

38

show wccp gre

WAE-612# show wccp gre

Transparent GRE packets received: 345678 Transparent non-GRE packets received: 0 Transparent non-GRE non-WCCP packets
Transparent GRE packets received:
345678
Transparent non-GRE packets received:
0
Transparent non-GRE non-WCCP packets received: 0
Total packets accepted:
5051
Invalid packets received:
0
Packets received with invalid service:
0
Packets received on a disabled service:
0
Packets received too small:
0
Packets dropped due to zero TTL:
0
Packets dropped due to bad buckets:
0
Packets dropped due to no redirect address:
0
Only Includes Packets
Handled Using WCCP
Return Egress Method
Packets dropped due to loopback redirect:
0
Pass-through pkts dropped on assignment update:0
Connections bypassed due to load:
0
Packets sent back to router:
0
GRE packets sent to router (not bypass) 234514
Packets sent to another WAE:
0
GRE fragments redirected:
0
GRE encapsulated fragments received:
0
Packets failed encapsulated reassembly:
0
Packets failed GRE encapsulation:
0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

39

show wccp gre

WAE# show wccp gre

Transparent GRE packets received: 23534 Transparent non-GRE packets received: 0 Transparent non-GRE non-WCCP packets
Transparent GRE packets received:
23534
Transparent non-GRE packets received:
0
Transparent non-GRE non-WCCP packets received: 0
Total packets accepted:
5051
Invalid packets received:
0
Packets received with invalid service:
0
Packets received on a disabled service:
0
Packets received too small:
0
Packets dropped due to zero TTL:
0
Packets dropped due to bad buckets:
0
Packets dropped due to no redirect address:
0
Packets dropped due to loopback redirect:
0
Packets Forwarded
Directly Between
WAE’ s Due to WCCP
Flow Protection
Pass-through pkts dropped on assignment update:0
Connections bypassed due to load:
0
Packets sent back to router:
0
GRE packets sent to router (not bypass)
Packets sent to another WAE:
0
1444
GRE fragments redirected:
0
GRE encapsulated fragments received:
0
Packets failed encapsulated reassembly:
0
Packets failed GRE encapsulation:
0

--More--

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

40

Egress Method Mismatch

Only WCCP GRE Return is supported as a negotiated-returnegress method

Generic GRE egress method only supports WCCP GRE as the intercept-method

Alarm cleared when mismatch is resolved by altering the egress method and/or WCCP configuration

Verify configured and used egress method with sh egress-method CLI command

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

41

Egress Method

WAE# show egress-methods

Intercept method : WCCP

TCP Promiscuous 61 :

WCCP negotiated return method : WCCP GRE

Egress Method Configured

Egress Method Used

WCCP Negotiated Return WCCP GRE

Destination

----------- ---------------------- -------------

any

TCP Promiscuous 62 :

WCCP negotiated return method : WCCP GRE

Egress Method Configured

Egress Method Used

Destination

----------- ---------------------- -------------

any

WCCP Negotiated Return WCCP GRE

IP Forwarding, WCCP GRE, or Generic GRE

< snip >

IP Forwarding, WCCP GRE, or Generic GRE < snip > WAE674# BRKAPP-3006 © 2012 Cisco and/or

WAE674#

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

42

Egress Method – Mismatch

WAE# sh egress-methods

Intercept method : WCCP TCP Promiscuous 61 :

WCCP negotiated return method : WCCP GRE

Egress Method Destination Configured

Egress Method Used

----------- ---------------------- -------------

any

WARNING: WCCP has negotiated WCCP L2 as the intercept method for

Generic GRE

IP Forwarding

which generic GRE is not supported as an egress method in this release. This device
which generic GRE is not supported as an egress method
in this release. This device uses IP forwarding as the
egress method instead of the configured generic GRE
egress method.
TCP Promiscuous 62 :
WCCP negotiated return method : WCCP GRE
Destination
Egress Method
Configured
Egress Method
Used
----------- ---------------------- -------------
any Generic GRE
IP Forwarding
WARNING: WCCP has negotiated WCCP L2 as the intercept method for

which generic GRE is not supported as an egress method in this release. This device uses IP forwarding as the egress method instead of the configured generic GRE egress method.

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

43

Inline Interception

WAE-612# show interface inlineGroup 1/0 Interface is in intercept operating mode. Standard NIC mode is
WAE-612# show interface inlineGroup 1/0
Interface is in intercept operating mode.
Standard NIC mode is off.
Disable bypass mode is off.
VLAN IDs configured for inline interception: All
Watchdog timer is enabled.
Timer frequency: 1600 ms.
Autoreset frequency 500 ms.
The watchdog timer will expire in 1452 ms.
Intercept Operating Mode
or Bypass Operating Mode
WAE-612#

Intercept operating mode – Packet are passed to WAAS for (potential) optimization

Bypass operating mode – Mechanical bypass between ports in InlineGroup during failure or admin shutdown

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

44

show interface inlinePort

WAE# show interface inlinePort 1/0/wan

Device name Packets Received

: eth4. Bypass master interface. : 54231

Packets Intercepted: 0

: 54231

Packets Forwarded : 0

Packets Dropped

Packets Received on native

Packets Bridged

:

0

:

0
0

Active flows for this interface : 0

WAE# show interface inlinePort 1/0/lan Device name Packets Received : eth5. Bypass slave interface. :
WAE# show interface inlinePort 1/0/lan
Device name
Packets Received
: eth5. Bypass slave interface.
: 334602
Use ‘ sh int inlinep’ to
Determine Device Name
for Any Inlineport
Packets Intercepted: 0
Packets Bridged
: 334599
Packets Forwarded : 0
Packets Dropped
:
3
Packets Received on native
:
0
Active flows for this interface : 0
The Device Name
Is Needed for Packet
Captures
WAE-612#
0 The Device Name Is Needed for Packet Captures WAE-612# BRKAPP-3006 © 2012 Cisco and/or its

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

45

Auto Discovery - Refresher

Client s SYN forwarded by WAE1 with Auto Discovery Options

SYN forwarded again by WAE2 with Auto Discovery Options

SYN/ACK processed by WAE2, Auto Discovery Options added

SYN/ACK processed by WAE1, to determine Auto Discovery success, SYN/ACK sent to Client and ACK with options sent to WAE2

ACK with options processed by WAE2 to determine Auto Discovery success, ACK sent to server.

WCCPv2

or PBR

Auto Discovery success, ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2

WCCPv2

or PBR

success, ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 ©
WAN
WAN
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012
ACK sent to server. WCCPv2 or PBR WCCPv2 or PBR WAN WAE1 WAE2 BRKAPP-3006 © 2012

WAE1

WAE2

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

46

Automatic Discovery Verification

Client

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN BRKAPP-3006 © 2012 Cisco and/or its

WAE

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN BRKAPP-3006 © 2012 Cisco and/or its

WAE

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN BRKAPP-3006 © 2012 Cisco and/or its

Server

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN BRKAPP-3006 © 2012 Cisco and/or its
Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN BRKAPP-3006 © 2012 Cisco and/or its

Client:Server TCP SYN

Verification Client WAE WAE Server Client:Server TCP SYN BRKAPP-3006 © 2012 Cisco and/or its affiliates. All

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

47

Automatic Discovery Verification

Client

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN Client:Server TCP SYN+OPT BRKAPP-3006 © 2012

WAE

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN Client:Server TCP SYN+OPT BRKAPP-3006 © 2012

WAE

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN Client:Server TCP SYN+OPT BRKAPP-3006 © 2012

Server

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN Client:Server TCP SYN+OPT BRKAPP-3006 © 2012
Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN Client:Server TCP SYN+OPT BRKAPP-3006 © 2012

Client:Server TCP SYN

Verification Client WAE WAE Server Client:Server TCP SYN Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or

Client:Server TCP SYN+OPT

WAE Server Client:Server TCP SYN Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or its affiliates. All

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

48

Automatic Discovery Verification

Client

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or its

WAE

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or its

WAE

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or its

Server

Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or its
Automatic Discovery Verification Client WAE WAE Server Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or its

Client:Server TCP SYN+OPT

Verification Client WAE WAE Server Client:Server TCP SYN+OPT BRKAPP-3006 © 2012 Cisco and/or its affiliates. All

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

49

Automatic Discovery Verification

Client

Automatic Discovery Verification Client WAE WAE Server Server:Client TCP SYN+ACK+OPT Server:Client TCP SYN+ACK BRKAPP-3006

WAE

Automatic Discovery Verification Client WAE WAE Server Server:Client TCP SYN+ACK+OPT Server:Client TCP SYN+ACK BRKAPP-3006

WAE

Automatic Discovery Verification Client WAE WAE Server Server:Client TCP SYN+ACK+OPT Server:Client TCP SYN+ACK BRKAPP-3006

Server

Automatic Discovery Verification Client WAE WAE Server Server:Client TCP SYN+ACK+OPT Server:Client TCP SYN+ACK BRKAPP-3006
Automatic Discovery Verification Client WAE WAE Server Server:Client TCP SYN+ACK+OPT Server:Client TCP SYN+ACK BRKAPP-3006
Automatic Discovery Verification Client WAE WAE Server Server:Client TCP SYN+ACK+OPT Server:Client TCP SYN+ACK BRKAPP-3006

Server:Client TCP SYN+ACK+OPT

Server:Client TCP SYN+ACK

Server:Client TCP SYN+ACK+OPT Server:Client TCP SYN+ACK BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

50

Auto-Discovery Statistics

WAE# show stat auto-discovery Auto discovery failure: No peer or asymmetric route: 100 Insufficient option
WAE# show stat auto-discovery
Auto discovery failure:
No peer or asymmetric route:
100
Insufficient option space:
0
Invalid connection state:
0
Missing Ack conf:
0
Intermediate device:
0
Auto discovery success TO:
Internal server:
40
External server:
0
Auto discovery success FOR:
Could not find a peer WAE
Internal client:
External client:
0
Auto discovery success SYN retransmission:
Zero retransmit:
2902
One retransmit:
0
Two+ retransmit:
0
Auto discovery Miscellaneous:
RST received:
0
SYNs found with our device id:
0
SYN retransmit count resets:
0

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

51

Auto-Discovery Statistics

WAE# show stat auto-discovery Auto discovery failure: No peer or asymmetric route: 0 Insufficient option
WAE# show stat auto-discovery
Auto discovery failure:
No peer or asymmetric route:
0
Insufficient option space:
0
Invalid connection state:
0
Missing Ack conf:
0
Intermediate device:
0
Auto discovery success TO:
Internal server:
40
External server:
0
Auto discovery success FOR:
Internal client:
2902
External client:
Auto discovery success SYN retransmission:
Zero retransmit:
One retransmit:
Not enough space in TCP
Options header for AD
option
Two+ retransmit:
Auto discovery Miscellaneous:
RST received:
0
SYNs found with our device id:
0
SYN retransmit count resets:
0

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

52

Auto-Discovery Statistics

WAE# show stat auto-discovery

Auto discovery failure:

No peer or asymmetric route:

0

Insufficient option space:

0

Invalid connection state:

0

Missing Ack conf:

0

Intermediate device:

1

0 Invalid connection state: 0 Missing Ack conf: 0 Intermediate device: 1 Auto discovery success TO:

Auto discovery success TO:

Internal server: 40 External server: 0 Auto discovery success FOR: Internal client: 2902 External client:
Internal server:
40
External server:
0
Auto discovery success FOR:
Internal client:
2902
External client:
Auto discovery success SYN retransmission:
Zero retransmit:
The WAE is not closest to
the server or client
One retransmit:
0
Two+ retransmit:
0
Auto discovery Miscellaneous:
RST received:
0
SYNs found with our device id:
0
SYN retransmit count resets:
0
with our device id: 0 SYN retransmit count resets: 0 BRKAPP-3006 © 2012 Cisco and/or its

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

53

Auto-Discovery Statistics

WAE# show stat auto-discovery Auto discovery failure: No peer or asymmetric route: 0 Insufficient option
WAE# show stat auto-discovery
Auto discovery failure:
No peer or asymmetric route:
0
Insufficient option space:
0
Invalid connection state:
0
Missing Ack conf:
0
Intermediate device:
0
Auto discovery success TO:
Internal server:
External server:
Auto discovery success FOR:
Internal client:
Packet received with our own
TCP option - indicates a
redirection loop
External client:
Auto discovery success SYN retransmission:
Zero retransmit:
2902
One retransmit:
0
Two+ retransmit:
0
Auto discovery Miscellaneous:
RST received:
0
SYNs found with our device id:
0
SYN retransmit count resets:
0

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

54

Redirection Problems

Proper network interception configuration is critical to the success of a WAAS deployment

Failure to insure that egress packets from the WAE are not re-intercepted can lead to a redirection loop:

%WAAS-SYS-3-900000: 137.34.79.11:1192 - 137.34.77.196:139 - opt_syn_rcv:

137.34.79.11:1192 - 137.34.77.196:139 - opt_syn_rcv: Routing Loop detected - Packet has our own devid. Packet

Routing Loop detected - Packet has our own devid. Packet dropped.

You can search syslog.txt for instances of the above message using the following command:

WAE# find match “ Routing Loop” syslog.txt As well as in the TFO filtering statistics:
WAE# find match “ Routing Loop” syslog.txt
As well as in the TFO filtering statistics:
WAE# show stat filtering
Syn packets dropped with our own id in the options:
0
Syn packets dropped with our own id in the options: 0 BRKAPP-3006 © 2012 Cisco and/or

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

55

Redirection Problems

During normal operation, there are 3 different connection segments for an optimized flow

WAN WAN X ?
WAN
WAN
X
?

In the event of an interception failure, packets from an original connection could be received on the optimized segment by a peer WAE

%WAAS-SYS-3-900000:src=10.56.46.183:4386

dst=10.56.46.164:445 Unoptimised packet received on optimized socket: seq=2796284443 end_seq=279628444

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

56

vPath Interception

vWAAS# show statistics vn-service vpath

VPATH Statistics

*****************

Packet Statistics

-----------------

VPATH Enabled = YES VPATH Packet received = 4783472 Optimized TCP Packets VPATH returned = 918762 WAAS Bypassed VPATH packets returned = 15537 VPATH encapsulated IP pkts(excluding TCP) returned = 0 VPATH encapsulated Non-IP packets returned = 26 VPATH Fragments received = 0 VPATH Fragments returned = 0 VPATH Packets returned when VPATH not configured = 0 Non-VPATH Packets received = 810022

Error Statistics

-----------------

VPATH intercepted packets dropped = 0 VPATH Packet CRC failures = 0 VPATH packets with unsupported Version = 0 VPATH packets with wrong request type = 0

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

57

Redirection Problems

WCCP Group 1 WCCP Group 2
WCCP Group 1
WCCP Group 2

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

58

Redirection Problems

WCCP Group 1
WCCP Group 1

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

59

Transport Optimizations

WAE Overview Diagnostic Reports Physical Components Platform

> Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Reports Physical Components Platform > Transport Optimizations Application Acceleration Packet Capture Debugs Summary

Wide Area Application Engine (WAE)

Wide Area Application Services Version 4.5 and above

IOS Platform with Services and CLI

CIFS

AO

MAPI

AO

HTTP

AO

SSL

AO

Video

AO

NFS

AO

ICA

AO

EPM

TCP Proxy with Scheduler Optimizer (SO) DRE, LZ, TFO

WoW

Virtual

Virtual

Blade

Blade

# 2

# 3

Virtual Blades

Configuration

Management

System

(CMS)

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Flash IOS Shell Linux

Application

Storage

Object

Storage

DRE

Storage

Shell Linux Application Storage Object Storage DRE Storage Virtual Blade Storage /vbspace Ethernet Network I/O

Virtual Blade Storage /vbspace

Ethernet

Network

I/O

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

61

Verify Global TFO Status

WAE# show stat tfo Total number of connections No. of active connections

: 108

:

1

 

No. of pending (to be accepted) connections

:

0

:

1

 

No. of bypass connections No. of normal closed conns No. of reset connections Socket write failure Socket read failure

: 96

: 11

:

4

:

0

Socket read failure : 96 : 11 : 4 : 0 WAN socket close while waiting
Socket read failure : 96 : 11 : 4 : 0 WAN socket close while waiting

WAN socket close while waiting to write

AO socket close while waiting

WAN socket error close while waiting to read

Total number of TCP optimized connections Total number of TCP connections that were optimized since the last TFO statistics reset.

AO socket error close while waiting to read

DRE decode failure DRE encode failure Connection init failure

Buffer allocation or manipulation failed Peer received reset from end host DRE connection state out of sync Memory allocation failed for buffer heads Unoptimized packet received on optimized side <snip>

Unoptimized packet received on optimized side <snip> WAN socket unexpected close while waiting to read :
WAN socket unexpected close while waiting to read : 5 Exceeded maximum number of supported
WAN socket unexpected close while waiting to read : 5
Exceeded maximum number of supported connections : 0
:
0
:
0
:
0
:
0
:
0

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

62

Pass Through Statistics

WAE# show statistics pass-through

Outbound

PT Client:

Bytes Packets PT Server:

----------------------

0

0

Bytes

530626936

Packets PT In Progress:

829570

Bytes

93109057

Packets

253459

Active and historical pass- through connection counts

253459 Active and historical pass- through connection counts   Active ---------------------- Completed
 

Active ----------------------

Completed ----------------------

Overall

0

98343

No Peer

0

16598

Rjct Capabilities

0

0

Rjct Resources

0

0

App Config

0

10

Global Config

0

0

Asymmetric

0

60111

In Progress

0

21624

Intermediate

0

0

Overload

0

0

Internal Error

0

0

App Override

0

0

Server Black List

0

0

AD Version Mismatch

0

0

AD AO Incompatible

0

0

AD AOIM Progress

0

0

DM Version Mismatch

0

0

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

63

CM Connection Statistics

CM Connection Statistics BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 64

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

64

CM Connection Statistics

CM Connection Statistics BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 65

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

65

CM Connection Statistics

Client
Client
CM Connection Statistics Client WAE Compressio nRatio OptimizedR eadBytes OptimizedW riteBytes OriginalRe adBytes

WAE

CM Connection Statistics Client WAE Compressio nRatio OptimizedR eadBytes OptimizedW riteBytes OriginalRe adBytes
CM Connection Statistics Client WAE Compressio nRatio OptimizedR eadBytes OptimizedW riteBytes OriginalRe adBytes
CM Connection Statistics Client WAE Compressio nRatio OptimizedR eadBytes OptimizedW riteBytes OriginalRe adBytes

Compressio nRatio

OptimizedR eadBytes OptimizedW riteBytes

OriginalRe adBytes OriginalWr iteBytes

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

66

Connection Statistics

WAE# show stat connection

Current Active Optimized Flows:

3

Current Active Optimized TCP Plus Flows:

3

Current Active Optimized TCP Only Flows:

0

Current Active Optimized TCP Preposition Flows:

0

Current Active Auto-Discovery Flows:

2

Current Active Pass-Through Flows:

0

Historical Flows:

100

D:DRE,L:LZ,T:TCP Optimization, A:AOIM,C:CIFS,E:EPM,G:GENERIC,H:HTTP,M:MAPI,N:NFS,S:SSL,V:VIDEO

ConnID

26527

26528

26529

Source IP:Port

Dest IP:Port

PeerID

Accel

212.1.4.10:1884

212.1.5.24:135

00:16:9d:38:8e:a3

TE

212.1.4.10:1886

212.1.5.22:80

00:16:9d:38:8e:a3

THDL

212.1.4.10:1887

212.1.5.24:1026

00:16:9d:38:8e:a3

TDL

212.1.5.24:1026 00:16:9d:38:8e:a3 TDL BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

67

Detailed Connection Statistics

WAE# show stat connection conn-id 26528

Connection Id:

26528

Peer Id:

Connection Type:

Start Time:

Source IP Address:

Source Port Number:

Destination IP Address:

00:16:9d:38:8e:a3

EXTERNAL CLIENT Mon Dec 14 04:17:49 2009

212.1.4.10

1886

212.1.5.22

Matched application and classifier

Configured and negotiated policies

and classifier Configured and negotiated policies Destination Port Number: 80 Application Name: Web

Destination Port Number: 80

Application Name:

Web

Classifier Name:

HTTP

Map Name:

basic

Directed Mode:

FALSE

Preposition Flow:

FALSE

Directed Mode: FALSE Preposition Flow: FALSE Policy Details: Configured: Derived: Peer:

Policy Details:

Configured:

Derived:

Peer:

Negotiated:

Applied:

TCP_OPTIMIZE + DRE + LZ TCP_OPTIMIZE + DRE + LZ TCP_OPTIMIZE + DRE + LZ TCP_OPTIMIZE + DRE + LZ TCP_OPTIMIZE + DRE + LZ

Accelerator Details:

Configured:

HTTP

Derived:

HTTP

Applied:

 

HTTP

Hist:

None

Bytes read and written on optimized and non- optimized sockets

AO Applied

 

Original

Optimized

-------------------- --------------------

Bytes Read:

301

5235140

Bytes Written:

5570619

5657

301 5235140 Bytes Written: 5570619 5657 BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

68

Detailed Connection Statistics

<continued> ----------------- Flow 26528 dre stats -----------------

Conn-ID: 26528 212.1.4.10:1886 -- 212.1.5.22:80 Peer No: 0 Status: Active

------------------------------------------------------------------------------

Open at 12/14/2009 04:17:49, Still active

Encode:

Overall: msg:

1, in:

305 B, out:

336 B, ratio:

0.00%

DRE: msg:

1, in:

301 B, out:

362 B, ratio:

0.00%

DRE Bypass: msg:

1, in:

4 B

LZ: msg:

1, in:

372 B, out:

336 B, ratio:

9.68%

LZ Bypass: msg:

0, in:

0 B

Avg latency:

0.168 ms

Delayed msg:

0

Encode th-put:

1772 KB/s

Message size distribution:

0-1K=0% 1K-5K=0% 5K-15K=0% 15K-25K=0% 25K-40K=0% >40K=0%

Decode:

Overall: msg:

DRE: msg:

DRE Bypass: msg:

LZ: msg:

LZ Bypass: msg:

Avg latency:

1138, in:

1138, in:

5101 KB, out:

5413 KB, out:

5440 KB, ratio:

5440 KB, ratio:

6.23%

0.50%

1, in:

4 B

696, in:

2460 KB, out:

2772 KB, ratio: 11.25%

442, in:

2640 KB

0.124 ms

Decode th-put: 38662 KB/s Message size distribution:

0-1K=3% 1K-5K=65% 5K-15K=29% 15K-25K=1% 25K-40K=0% >40K=0%

1K-5K=65% 5K-15K=29% 15K-25K=1% 25K-40K=0% >40K=0% BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

69

Encode and Decode – LZ and DRE

Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or

BRKAPP-3006

Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or

Decode

Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or

Encode

Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or
Encode and Decode – LZ and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or

Encode

Decode

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

and DRE BRKAPP-3006 Decode Encode Encode Decode © 2012 Cisco and/or its affiliates. All rights reserved.

70

Detailed Connection Statistics

WAE# show statistics dre

 

Cache:

 
 

Status: Usable, Oldest Data (age): 109d

   

Total usable disk size: 55456 MB, Used: 2.51%

Hash table RAM size:

211 MB, Used: 2.00%

Connections:

Total (cumulative): 8

Active: 0

Encode:

 
 

Overall: msg:

1906, in:

143 MB, out:

24861 KB, ratio: 83.03% 25496 KB, ratio: 82.59%

DRE: msg:

1906, in:

143 MB, out:

DRE Bypass: msg:

9, in:

 
 

LZ: msg:

83, in:

36 B 3872 KB, out:

3237 KB, ratio: 16.40%

LZ Bypass: msg:

Avg latency:

1823, in:

2.701 ms

21624 KB Delayed msg:

 

1924

Encode th-put: 28449 KB/s Message size distribution:

 

0-1K=0% 1K-5K=0% 5K-15K=1% 15K-25K=3% 25K-40K=7% >40K=85%

Decode:

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

71

Transaction Logs

Every transaction generates log Multiple transaction attributes recorded

TCP connection start time TCP connection end time Optimization done (AO, DRE, LZ, TFO, or PT) Flow identification information (L3/L4/L5) Bytes

TFO, or PT) Flow identification information (L3/L4/L5) Bytes Origin received/sent Optimized received/sent BRKAPP-3006 ©

Origin received/sent Optimized received/sent

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Optimized received/sent BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 72

Cisco Public

72

Transaction Logs – CM

Enable transaction logging on WAEs

Written to /local1/logs/tfo/

Archive log schedule

The archive filenames use this format:

tfo_log_IPADDRESS_YYYY

MMDD_HHMMSS.txt

Export log schedule

tfo_log_IPADDRESS_YYYY MMDD_HHMMSS.txt Export log schedule BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

73

TFO Transaction Logs

WAE# cd logs/tfo WAE# WAE# ls ftp_export.status

WAE# cd logs/tfo WAE# WAE# ls ftp_export.status tfo_log_22.1.43.10_20090508_190000.txt

tfo_log_22.1.43.10_20090508_190000.txt

tfo_log_22.1.43.10_20090508_200000.txt

tfo_log_22.1.43.10_20090508_210000.txt

working.log

Location of logs

working.log Location of logs The archive files and the current log files WAE# WAE#

The archive files and the current log files

WAE# WAE# type-tail working.log

Log entries (fields delimited by : )

Fri May 8 21:08:19 2009 :22.1.43.10 :42029 :22.1.43.20 :443 :BP :NO_PEER :

(TFO) (TFO) (None) :<None> :(None) (None) :<None> :<None> Fri May 8 21:08:34 2009 :22.1.41.10 :13113 :22.1.43.20 :443 :BP :ASYMMETRIC :

(TFO) (None) (TFO) :<None> :(None) (None) :<None> :<None>

<date and time>:<src IP>:<src port>:<dst IP>:<port>:BP:<pass-through reason>::

IP>:<port>:BP:<pass-through reason>:: BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

74

Sawmill Transaction Log Analysis

Sawmill Transaction Log Analysis Sawmill understands WAAS transaction logs Syslog or FTP/SFTP transfer Extensive
Sawmill Transaction Log Analysis Sawmill understands WAAS transaction logs Syslog or FTP/SFTP transfer Extensive

Sawmill understands WAAS transaction logs Syslog or FTP/SFTP transfer Extensive reports

logs Syslog or FTP/SFTP transfer Extensive reports BRKAPP-3006 © 2012 Cisco and/or its affiliates. All rights

BRKAPP-3006

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Public

75

Application Acceleration

WAE Overview Diagnostic Reports Physical Components Platform Transport Optimizations

> Application Acceleration Packet Capture Debugs Summary

Reports Physical Components Platform Transport Optimizations > Application Acceleration Packet Capture Debugs Summary

Wide Area Application Engine (WAE)

Wide Area Application Services Version 4.5 and above

IOS Platform with Services and CLI

CIFS

AO

MAPI

AO

HTTP

AO

SSL

AO

Video

AO

NFS

AO

ICA

AO

EPM

TCP Proxy with Scheduler Optimizer (SO) DRE, LZ, TFO

WoW

Virtual

Virtual

Blade

Blade

# 2

# 3

Virtual Blades

Configuration

Management

System

(CMS)

Cisco Linux Kernel Policy Engine, Filter-Bypass, Egress Method, Directed Mode, Auto-Discovery

Flash IOS Shell Linux

Application

Storage

Object

Storage

DRE

Storage

Shell Linux Application Storage Object Storage DRE Storage Virtual Blade Storage /vbspace Ethernet Network I/O

Virtual Blade Storage /vbspace

Ethernet