07-Layer 3—IP Services Command Reference

HomeSupportReference GuidesCommand ReferencesH3C MSR1000[2600][3600] Routers Command Reference(V9)-R9119-6W10007-Layer 3—IP Services Command Reference
17-WAAS commands
Title Size Download
17-WAAS commands 168.95 KB

WAAS commands

class

Use class to specify a Wide Area Application Services (WAAS) class for a WAAS policy and enter WAAS policy class view.

Use undo class to remove a WAAS class from a WAAS policy.

Syntax

class class-name [ insert-before existing-class ]

undo class class-name

Default

No WAAS class exists in a WAAS policy.

Views

WAAS policy view

Predefined user roles

network-admin

Parameters

class-name: Specifies a WAAS class by its name, a case-insensitive string of 1 to 63 characters. The specified class must already exist.

insert-before existing-class: Inserts the new class before an existing class in the WAAS policy. If you do not specify this option, the new class is placed at the end of the WAAS policy.

Usage guidelines

A WAAS policy can use system-defined WAAS classes (see Table 7).

As a best practice, configure a WAAS class by modifying a system-defined WAAS class.

You can also use this command to arrange existing WAAS classes in a WAAS policy.

A packet is checked against WAAS classes in the specified order. When a packet matches a class, the action for the class is performed on the packet, and the match process ends.

If you do not configure an action for a WAAS class, the device ignores the WAAS class.

Examples

# Specify the system-defined WAAS class AFS for the WAAS policy waas_global, and enter the view of the WAAS class AFS.

<Sysname> system-view

[Sysname] waas policy waas_global

[Sysname-waaspolicy-waas_global] class AFS

[Sysname-waaspolicy-waas_global-AFS]

# Specify the system-defined WAAS class AOL for the WAAS policy waas_global, insert it before AFS, and enter the view of the WAAS class AOL.

<Sysname> system-view

[Sysname] waas policy waas_global

[Sysname-waaspolicy-waas_global] class AOL insert-before AFS

[Sysname-waaspolicy-waas_global-AOL]

# Change the position of the WAAS class AOL in the WAAS policy waas_global by inserting it before AFS, and enter the view of the WAAS class AOL.

<Sysname> system-view

[Sysname] waas policy waas_global

[Sysname-waaspolicy-waas_global] class AOL insert-before AFS

[Sysname-waaspolicy-waas_global-AOL]

Related commands

display waas policy

waas class

waas policy

display waas class

Use display waas class to display WAAS classes.

Syntax

display waas class [ class-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

class-name: Specifies a WAAS class by its name, a case-insensitive string of 1 to 63 characters. If you do not specify a WAAS class, this command displays all WAAS classes.

Examples

# Display the WAAS class class1.

<Sysname> display waas class class1

WAAS class: class1

  match 1 tcp source 1.1.1.0 24 port 50000 60000

  match 6 tcp destination 2.2.2.2 port 1 1024

  match 11 tcp source 1001:: 96 port 50000 60000

  match 16 tcp destination 2002::2222 port 1 1024

Table 1 Command output

Field

Description

match

Match criterion of the WAAS class.

 

Related commands

match tcp

waas class

display waas policy

Use display waas policy to display WAAS policies.

Syntax

display waas policy [ policy-name ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

policy-name: Specifies a WAAS policy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify a WAAS policy, this command displays all WAAS policies.

Examples

# Display the WAAS policy po1.

<Sysname> display waas policy po1

WAAS policy: po1

  class cl1

    optimize TFO DRE LZ

  class cl2

    optimize TFO DRE

  class cl3

    passthrough

  class cl4

    optimize TFO LZ

  class cl5

Table 2 Command output

Field

Description

class

WAAS class in the WAAS policy.

optimize

Optimization actions:

·     TFO (works with only TCP).

·     DRE.

·     LZ compression.

passthrough

Action that does not perform any optimization.

 

Related commands

class

optimize

passthrough

waas policy

display waas session

Use display waas session to display WAAS session information.

Syntax

display waas session { ipv4 | ipv6 } [ client-ip client-ip ] [ client-port client-port ] [ server-ip server-ip ] [ server-port server-port ] [ peer-id peer-id ] [ verbose ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

ipv4: Specifies IPv4 sessions.

ipv6: Specifies IPv6 sessions.

client-ip client-ip: Displays the WAAS session information for the client specified by its IP address.

client-port client-port: Displays the WAAS session information for the clients specified by port number in the range of 1 to 65535.

server-ip server-ip: Displays the WAAS session information for the server specified by its IP address.

server-port server-port: Displays the WAAS session information for the servers specified by port number in the range of 1 to 65535.

peer-id peer-id: Displays the WAAS session information for the peer specified by its bridge MAC address in the format of H-H-H.

verbose: Displays detailed information about WAAS sessions. If you do not specify this keyword, the command displays brief information about WAAS sessions.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays WAAS session information for all cards.

Usage guidelines

If you specify only the ipv4 or ipv6 keyword, this command displays information about all IPv4 or IPv6 WAAS sessions.

Examples

# Display brief information about all IPv4 WAAS sessions.

<Sysname> display waas session ipv4

Peer ID: 0021-90ad-0012

Start Time: Fri Mar 21 10:43:05 2014

Source IP/Port: 1.1.1.1/34572

Destination IP/Port: 2.2.2.2/80

 

Peer ID: 0011-10ad-0012

Start Time: Fri Mar 21 10:45:05 2014

Source IP/Port: 2.2.1.1/34572

Destination IP/Port: 3.2.2.3/80

 

Total 2 sessions found.

# Display detailed information about all IPv4 WAAS sessions.

<Sysname> display waas session ipv4 verbose

Peer ID: 0021-90ad0-01221

Start Time: Fri Mar 21 11:43:05 2014

Source IP/Port: 1.1.1.1/34572

Destination IP/Port: 2.2.2.2/80

LAN interface: GigabitEthernet2/0/1

WAN interface: GigabitEthernet2/0/2

Configured Policy: TFO DRE LZ

Negotiated Policy: TFO DRE LZ

LAN->WAN bytes: Original   104884      Optimized  88594

WAN->LAN bytes: Original   744588      Optimized  3355445

LZ section:

  Encode status:

    Bytes in: 0

    Bytes out: 0

    Bypass bytes: 400

    Space saved: 0%

    Average Latency: 0 usec

  Decode status:

    Bytes in: 329

    Bytes out: 393

    Bypass bytes: 63

    Space saved: 16%

    Average Latency: 2 usec

DRE section:

  Encode status:

    Bytes in: 0

    Bytes out: 0

    Bypass bytes: 314

    Space saved: 0%

    Average latency: 0 usec

  Decode status:

    Bytes in: 399

    Bytes out: 332

    Bypass bytes: 0

    Space saved: 0%

    Chunk miss: 0

    Collision: 0

    Average latency: 23 usec

 

Peer ID: 0011-10ad-0012

Start Time: Fri Mar 21 11:43:05 2014

Source IP/Port: 2.2.1.1/34572

Destination IP/Port: 3.2.2.3/80

LAN interface: GigabitEthernet2/0/1

WAN interface: GigabitEthernet2/0/2

Configured Policy: TFO DRE LZ

Negotiated Policy: TFO DRE LZ

LAN->WAN bytes: Original   104884      Optimized  88594

WAN->LAN bytes: Original   744588      Optimized  3355445

LZ section:

  Encode status:

    Bytes in: 0

    Bytes out: 0

    Bypass bytes: 400

    Space saved: 0%

    Average Latency: 0 usec

  Decode status:

    Bytes in: 329

    Bytes out: 393

    Bypass bytes: 63

    Space saved: 16%

    Average Latency: 2 usec

DRE section:

  Encode status:

    Bytes in: 0

    Bytes out: 0

    Bypass bytes: 314

    Space saved: 0%

    Average latency: 0 usec

  Decode status:

    Bytes in: 399

    Bytes out: 332

    Bypass bytes: 0

    Space saved: 0%

    Chunk miss: 0

    Collision: 0

    Average latency 23 usec

 

Total 2 sessions found.

Table 3 Command output

Field

Description

Peer ID

Bridge MAC address of the peer device. A bridge MAC address uniquely identifies a peer device.

Start time

Time when the WAAS session was established.

Source IP/Port

IP address and port number of the client.

Destination IP/Port

IP address and port number of the server.

Configured Policy

Optimization actions configured on the local device, which can be one or any combination of the following actions:

·     TFO (works with only TCP).

·     DRE.

·     LZ compression.

Negotiated Policy

Optimization actions negotiated with the peer device, which can be one or any combination of the following actions:

·     TFO (works with only TCP).

·     DRE.

·     LZ compression.

The negotiated optimization actions are the union of the optimization actions configured on the local device and those configured on the peer device.

LAN->WAN bytes

Statistics for LAN-to-WAN data:

·     Original—Number of bytes before optimization.

·     Optimized—Number of bytes after optimization.

WAN->LAN bytes

Statistics for WAN-to-LAN data:

·     Original—Number of bytes before optimization.

·     Optimized—Number of bytes after optimization.

LZ section

LZ compression statistics.

DRE section

DRE statistics.

Encode status

Compression statistics.

Decode status

Decompression statistics.

Bytes in

Number of input bytes.

Bytes out

Number of output bytes.

Bypass bytes

Number of bytes that bypass DRE.

Space saved

·     Compression ratio: (1–Bytes out/Bytes in) x 100.

·     Decompression ratio: (1–Bytes in/Bytes out) x 100.

Average Latency

Average latency in milliseconds for the most recent compression or decompression. When multiple CPUs are available on a card, the average latency is the latency time divided by the number of CPUs.

Chunk miss

Cumulative number of times that DRE failed to find a dictionary entry according to a dictionary index.

Collision

Cumulative number of times that data checks failed.

 

display waas statistics dre

Use display waas statistics dre to display DRE statistics.

Syntax

display waas statistics dre [ peer peer-id ] [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

peer-id peer-id: Specifies a peer device by its bridge MAC address in the format of H-H-H. If you do not specify a peer device, the command displays DRE statistics for all peer devices.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays DRE statistics for all cards.

Examples

# Display DRE statistics for all peer devices.

<Sysname> display waas statistics dre

Peer-ID: 0016-9d38-ca1d

Peer version: 1.0

Cache in storage: 19426304 bytes

Index number: 75884

Age: 00 weeks, 00 days, 00 hours, 00 minutes, 33 seconds

Total connections: 1

Active connections: 0

Encode Statistics

  Dre msgs: 2

  Bytes in: 392 bytes

  Bytes out: 424 bytes

  Bypass bytes: 0 bytes

  Bytes Matched: 0 bytes

  Space saved: -8%

  Average latency: 0 usec

Decode Statistics

  Dre msgs: 196407

  Bytes in: 29132703 bytes

  Bytes out: 42413368 bytes

  Bypass bytes: 0 bytes

  Space saved: 31%

  Average latency: 0 usec

 

Peer-ID: 0d38-9d38-ca1d

Peer version: 1.0

Cache in storage: 33554944 bytes

Index number: 131074

Age: 00 weeks, 00 days, 00 hours, 21 minutes, 31 seconds

Total connections: 2

Active connections: 0

Encode Statistics

  Dre msgs: 514872

  Bytes in: 111390296 bytes

  Bytes out: 60085884 bytes

  Bypass bytes: 0 bytes

  Bytes Matched: 56336640 bytes

  Space saved: 46%

  Average latency: 0 usec

Decode Statistics

  Dre msgs: 4

  Bytes in: 849 bytes

  Bytes out: 785 bytes

  Bypass bytes: 0 bytes

  Space saved: -8%

  Average latency: 0 usec

# Display DRE statistics for a specific peer device.

<Sysname> display waas statistics dre peer 0016-9d38-ca1d

Peer-ID: 0016-9d38-ca1d

Peer version: 1.0

Cache in storage: 33554944 bytes

Index number: 131074

Age: 00 weeks, 00 days, 00 hours, 21 minutes, 31 seconds

Total connections: 2

Active connections: 0

Encode Statistics

  Dre msgs: 514872

  Bytes in: 111390296 bytes

  Bytes out: 60085884 bytes

  Bypass bytes: 0 bytes

  Bytes Matched: 56336640 bytes

  Space saved: 46%

  Average latency: 0 usec

Decode Statistics

  Dre msgs: 4

  Bytes in: 849 bytes

  Bytes out: 785 bytes

  Bypass bytes: 0 bytes

  Space saved: -8%

  Average latency: 0 usec

Table 4 Command output

Field

Description

Peer ID

Bridge MAC address of the peer device. A bridge MAC address uniquely identifies a peer device.

Peer version

WAAS version of the peer device.

Cache in storage

Disk space used by metadata. Metadata are original data that have indexes in the dictionary.

Index number

Number of dictionary indexes.

Age

Amount of time that has elapsed since the local device initially established an optimized TCP connection with the peer.

Total connections

Total number of DRE connections.

Active connections

Number of active DRE connections.

Encode Statistics

Compression statistics.

Decode Statistics

Decompression statistics.

Dre msgs

Number of data blocks.

Bytes in

Number of input bytes.

Bytes out

Number of output bytes.

Bypass bytes

Number of bytes that bypass DRE.

Bytes Matched

Number of bytes matched by DRE.

Space saved

·     Compression ratio: (1–Bytes out/Bytes in) x 100.

·     Decompression ratio: (1–Bytes in/Bytes out) x 100.

Average Latency

Average latency in milliseconds for the most recent compression or decompression. When multiple CPUs are available on a card, the average latency is the latency time divided by the number of CPUs.

 

Related commands

reset waas statistics dre

display waas status

Use display waas status to display the global WAAS status.

Syntax

display waas status

Views

Any view

Predefined user roles

network-admin

network-operator

Examples

# Display the global WAAS status.

<Sysname> display waas status

WAAS version: 1.0

Local ID: 02e0-011a-0000

DRE status: Disabled

LZ status: Disabled

BlackList status: Disabled

Total active connections: 7889

Total data storage size: 1468006400 bytes

Total index number: 11513600

Blacklist hold-time:5 minutes

Max TFO connections: 10000

Offset step: Normal

Aging time: 0 minutes

Symmertrical Mode : Yes

UDP compression:

  Compression enabled, maximum compressed log messages: 5

  Destination host:

  DIP                 Dport

  192.168.59.20       200

Interfaces             Applied policy

GE2/0/1                waas_global

GE2/0/2                waas_default

GE2/0/3                waas_global

 

Total policy interfaces: 3

Table 5 Command output

Field

Description

Local ID

Bridge MAC address of the local device. A bridge MAC address uniquely identifies a local device.

Total active connections

Total number of active WAAS connections.

Total data storage size

Disk space used by all metadata. Metadata are original data that have indexes in the dictionary.

Total index number

Total number of dictionary indexes.

Blacklist hold-time

Aging time for blacklist entries.

Max connect-threshold

Maximum number of concurrent connections allowed.

Offset step

DRE match offset step:

·     Fastest.

·     Faster.

·     Fast.

·     Normal.

Aging time

Aging time for entries in the data dictionary, in minutes.

Interfaces

List of interfaces with WAAS policies applied.

Total policy interfaces

Number of interfaces with WAAS policies applied.

 

display waas tfo auto-discovery blacklist

Use display waas tfo auto-discovery blacklist to display autodiscovered blacklist information.

Syntax

display waas tfo auto-discovery blacklist { ipv4 | ipv6 } [ slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

Parameters

ipv4: Specifies IPv4 blacklist information.

ipv6: Specifies IPv6 blacklist information.

slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays autodiscovered blacklist information for all cards.

Examples

# Display all IPv4 blacklist information.

<Sysname> display waas tfo auto-discovery blacklist ipv4

Server IP address/Port           Insert Time

1.1.1.1/8080                     Fri Mar 21 10:43:05 2014

1.1.1.2/8080                     Fri Mar 21 10:43:06 2014

2.2.2.2/443                      Fri Mar 21 10:20:37 2014

 

Total 3 entries found.

Table 6 Command output

Field

Description

Insert Time

Time when a blacklist entry was generated.

 

Related commands

reset waas tfo auto-discovery blacklist

waas tfo auto-discovery blacklist enable

waas tfo auto-discovery blacklist hold-time

match tcp

Use match tcp to configure a match criterion.

Use undo match tcp to delete a match criterion.

Syntax

match [ match-id ] tcp { any | destination | source } [ ip-address ipv4-address [ mask-length | mask ] | ipv6-address ipv6-address [ prefix-length ] ] [ port port-list ]

undo match match-id

Default

No match criterion exists.

Views

WAAS class view

Predefined user roles

network-admin

Parameters

match-id: Specifies the ID of the match criterion, in the range of 1 to 65535. If you specify an unused ID, you can create a new match criterion. If you specify a used ID, you can modify the existing match criterion. If you do not specify an ID, the system automatically assigns the lowest available ID.

tcp: Matches TCP packets.

any: Matches any TCP packets.

destination: Specifies destination elements for matching TCP packets.

source: Specifies source elements for matching TCP packets.

ip-address ipv4-address: Specifies an IPv4 address for matching TCP packets.

mask-length: Specifies the mask length for the IPv4 address, in the range of 0 to 32. The default is 32.

mask: Specifies the mask for the IPv4 address. The default is 255.255.255.255.

ipv6-address ipv6-address: Specifies an IPv6 address for matching TCP packets.

prefix-length: Specifies the prefix length for the IPv6 address, in the range of 0 to 128. The default is 128.

port port-list: Specifies a space-separated list of up to 10 port items for matching TCP packets. Each item specifies a port number or a range of port numbers in the form of port-number1 to port-number2. The value for port-number2 must be greater than or equal to the value for port-number1. The value range for the port-number argument is 1 to 65535. If you do not specify a port list, all port numbers are matched.

Usage guidelines

If you specify the destination or source keyword, you must specify the ip-address (or ipv6-address) option, the port option, or both.

If you specify the any keyword, the ip-address (or ipv6-address) option, and the port option, the ip-address (or ipv6-address) and port options match either source or destination fields of packets.

You cannot configure the same match criteria with different match IDs.

A WAAS class can have a maximum of 65535 match criteria. A packet is checked against match criteria in their order of appearance. The packet belongs to the WAAS class if it matches any one of the match criteria.

A WAAS class without any match criteria is not used to match packets.

Examples

# Create a WAAS class named http_class, and configure the class to match packets with source IP address 192.168.0.1/16 and port number 80 or port number in the range of 8000 to 8080.

<Sysname> system-view

[Sysname] waas class http_class

[Sysname-waasclass-http_class] match tcp source ip-address 192.168.0.1 16 port 80 8000 to 8080

# Create a WAAS class named http_class, and configure the class to match any TCP packets.

<Sysname> system-view

[Sysname] waas class http_class

[Sysname-waasclass-http_class] match tcp any

Related commands

display waas policy

waas class

optimize

Use optimize to configure optimization actions for a WAAS class.

Use undo optimize to restore the default.

Syntax

optimize tfo [ dre | lz ] *

undo optimize

Default

No optimization actions are configured for a WAAS class.

Views

WAAS policy class view

Predefined user roles

network-admin

Parameters

tfo: Specifies TFO.

dre: Specifies DRE.

lz: Specifies LZ compression.

Usage guidelines

An optimization action takes effect only when the corresponding feature is enabled.

An optimization action does not optimize the traffic that matches a blacklist entry.

If you configure both this command and the passthrough command, the most recent configuration takes effect.

Examples

# Configure optimization actions TFO, DRE, and LZ for the WAAS class AFS.

<Sysname> system-view

[Sysname] waas policy waas_global

[Sysname-waaspolicy-waas_global] class AFS

[Sysname-waaspolicy-waas_global-AFS] optimize tfo dre lz

Related commands

class

display waas policy

passthrough

waas policy

waas tfo optimize dre

waas tfo optimize lz

passthrough

Use passthrough to configure the pass-through action for a WAAS class.

Use undo passthrough to restore the default.

Syntax

passthrough

undo passthrough

Default

The pass-through action is not configured.

Views

WAAS policy class view

Predefined user roles

network-admin

Usage guidelines

The pass-through action allows packets to pass through unoptimized.

If you configure both this command and the optimize command, the most recent configuration takes effect.

Examples

# Configure the pass-through action for the WAAS class AFS.

<Sysname> system-view

[Sysname] waas policy waas_global

[Sysname-waaspolicy-waas_global] class AFS

[Sysname-waaspolicy-waas_global-AFS] optimize tfo dre lz

Related commands

class

display waas policy

optimize

waas policy

reset waas cache dre

Use reset waas cache dre to clear DRE data dictionaries.

Syntax

reset waas cache dre [ peer-id peer-id ]

Views

User view

Predefined user roles

network-admin

Parameters

peer-id peer-id: Specifies a peer device by its bridge MAC address in the format of H-H-H. If you do not specify a peer device, this command clears DRE data dictionaries for all peer devices.

Examples

# Clear the DRE data dictionary for the peer device with the bridge MAC address 0789-445d-effa.

<Sysname> reset waas cache dre peer 0789-445d-effa

Related commands

display waas statistics dre

reset waas statistics dre

Use reset waas statistics dre to clear DRE statistics.

Syntax

reset waas statistics dre [ peer-id peer-id ]

Views

User view

Predefined user roles

network-admin

Parameters

peer-id peer-id: Specifies a peer device by its bridge MAC address in the format of H-H-H. If you do not specify a peer device, this command clears DRE statistics for all peer devices.

Examples

# Clear DRE statistics for all peer devices.

<Sysname> reset waas statistics dre

Related commands

display waas statistics dre

reset waas tfo auto-discovery blacklist

Use reset waas tfo auto-discovery blacklist to clear all autodiscovered blacklist entries.

Syntax

reset waas tfo auto-discovery blacklist

Views

User view

Predefined user roles

network-admin

Examples

# Clear all autodiscovered blacklist entries.

<Sysname> reset waas tfo auto-discovery blacklist

Related commands

display waas tfo auto-discovery blacklist

waas tfo auto-discovery blacklist enable

waas tfo auto-discovery blacklist hold-time

waas apply policy

Use waas apply policy to apply a WAAS policy to an interface.

Use undo waas apply policy to restore the default.

Syntax

waas apply policy [ policy-name ]

undo waas apply policy

Default

No WAAS policy is applied to an interface.

Views

Interface view

Predefined user roles

network-admin

Parameters

policy-name: Specifies a WAAS policy by its name, a case-insensitive string of 1 to 63 characters. The specified policy must already exist. If you do not specify a WAAS policy, this command applies the system-defined WAAS policy waas_default.

Usage guidelines

Apply a WAAS policy to an interface that connects to the WAN (not an interface that connects to the LAN). The device optimizes or passes through the traffic entering and leaving the WAN according to the configured policy. If the incoming and outgoing interfaces of the traffic are both connected to the WAN, the traffic is not optimized.

Examples

# Apply the WAAS policy global_policy to the interface GigabitEthernet 1/0/1.

<Sysname> system-view

[Sysname] interface gigabitethernet 1/0/1

[Sysname-GigabitEthernet1/0/1] waas apply policy global_policy

Related commands

display waas policy

display waas status

waas policy

waas asymmetric

Use waas asymmetric to configure WAAS to operate in asymmetric mode.

Use undo waas asymmetric to restore the default.

Syntax

waas asymmetric

undo waas asymmetric

Default

WAAS operates in symmetric mode.

Views

System view

Predefined user roles

network-admin

Usage guidelines

Configure this command if the device sends and receives packets on different interfaces.

If the device sends and receives packets on the same interface, the device should operate in symmetric mode.

Examples

# Configure WAAS to operate in asymmetric mode.

<Sysname> system-view

[Sysname] waas asymmetric

waas class

Use waas class to create a WAAS class and enter its view, or enter the view of an existing WAAS class.

Use undo waas class to delete a WAAS class.

Syntax

waas class class-name

undo waas class class-name

Default

Only system-defined WAAS classes exist.

Views

System view

Predefined user roles

network-admin

Parameters

class-name: Specifies a name for the WAAS class, a case-insensitive string of 1 to 63 characters.

Usage guidelines

As a best practice, configure a WAAS class by modifying a system-defined WAAS class (see Table 7).

Examples

# Create a WAAS class named waas_global and enter WAAS class view.

<Sysname> system-view

[Sysname] waas class waas_global

[Sysname-waasclass-waas_global]

Related commands

class

display waas class

waas config remove-all

Use waas config remove-all to delete all WAAS settings.

Syntax

waas config remove-all

Views

System view

Predefined user roles

network-admin

Usage guidelines

This command deletes all configuration data and running data for WAAS and exits the WAAS process.

Examples

# Delete all WAAS settings.

<Sysname> system-view

[Sysname] waas config remove-all

The command will clear all the WAAS configuration. Continue? [Y/N]:y

waas config restore-default

Use waas config restore-default to restore system-defined WAAS settings.

Syntax

waas config restore-default

Views

System view

Predefined user roles

network-admin

Usage guidelines

This command restores the system-defined WAAS policy and WAAS classes to their settings at the time when the WAAS process starts for the first time.

To successfully restore system-defined WAAS settings, make sure none of the interfaces has a WAAS policy applied.

Examples

# Restore system-defined WAAS settings.

<Sysname> system-view

[Sysname] waas config restore-default

The command will restore all the WAAS configuration to default. Continue? [Y/N]:y

waas dre cache aging

Use waas dre cache aging to set the aging time for entries in the data dictionary.

Use undo waas dre cache aging to restore the default.

Syntax

waas dre cache aging minutes

undo waas dre cache aging

Default

Entries in the data dictionary are not aged out, and the newly created entry overwrites the oldest entry if the number of data dictionary entries reaches the limit.

Views

System view

Predefined user roles

network-admin

Parameters

minutes: Specifies the aging time for entries in the data dictionary, in the range of 10 to 60 minutes.

Usage guidelines

The device polls all data dictionary entries and deletes the entries that are not hit within the aging time. If the number of data dictionary entries reaches the limit, the device no longer creates new entries.

The amount of time used by the device to poll all data dictionary entries depends on the number of data dictionary entries on the device.

You must set the same aging time on the local and peer devices.

Examples

# Set the aging time to 10 minutes for entries in the data dictionary.

<Sysname> system-view

[Sysname] waas dre cache aging 10

waas dre offset-step

Use waas dre offset-step to set the DRE match offset step.

Use undo waas dre offset-step to restore the default.

Syntax

waas dre offset-step { general | fast | fastest | normal }

undo waas dre offset-step

Default

The DRE match offset step is normal.

Views

System view

Predefined user roles

network-admin

Parameters

general: Specifies the DRE match offset step as general.

fast: Specifies the DRE match offset step as fast.

fastest: Specifies the DRE match offset step as fastest.

normal: Specifies the DRE match offset step as normal.

Usage guidelines

The following DRE match offset step levels are listed from high to low:

·     fastest.

·     fast.

·     general.

·     normal.

The higher the step level, the lower the match precision. As a best practice, use a higher-level offset step on high-speed links to improve match efficiency. Use a lower-level offset step on low-speed links to ensure match precision.

Examples

# Set the DRE match offset step to fast.

<Sysname> system-view

[Sysname] waas dre offset-step fast

waas policy

Use waas policy to create a WAAS policy and enter its view, or enter the view of an existing WAAS policy.

Use undo waas policy to delete a WAAS policy.

Syntax

waas policy policy-name

undo waas policy policy-name

Default

Only the system-defined WAAS policy waas_default exists.

Views

System view

Predefined user roles

network-admin

Parameters

policy-name: Specifies a name for the WAAS policy, a case-insensitive string of 1 to 63 characters.

Usage guidelines

To delete a WAAS policy applied to an interface, first remove the WAAS policy from the interface.

As a best practice, configure a WAAS policy by entering the system-defined WAAS policy view and modifying the system-defined WAAS policy. The system-defined WAAS policy is created by the system when the WAAS process starts for the first time. The system-defined WAAS policy uses all system-defined WAAS classes. Only system-defined WAAS classes FTP-Data and FTPS-Data use source ports as match options. All other system-defined WAAS classes use destination ports as match options.

Table 7 System-defined WAAS policy

System-defined WAAS class

WAAS actions

Source ports

Destination ports

AFS

LZ+TFO+DRE

N/A

7000–7009

Altiris-CarbonCopy

Passthrough

N/A

1680

Amanda

TFO

N/A

10080

AOL

Passthrough

N/A

5190–5193

Apple-AFP

LZ+TFO+DRE

N/A

548

Apple-iChat

Passthrough

N/A

5297, 5298

Apple-NetAssistant

Passthrough

N/A

3283

AppSocket

LZ+TFO+DRE

N/A

9100

BackupExpress

TFO

N/A

6123

Basic-TCP-services

Passthrough

N/A

1–19

BFTP

LZ+TFO+DRE

N/A

152

BGP

LZ+TFO+DRE

N/A

179

BitTorrent

Passthrough

N/A

6881–6889, 6969

BMC-Patrol

Passthrough

N/A

6161, 6162, 6767, 6768, 8160, 8161, 10128

Borland-Interbase

LZ+TFO+DRE

N/A

3050

CIFS

LZ+TFO+DRE

N/A

139, 445

CIFS-non-wafs

LZ+TFO+DRE

N/A

139, 445

Cisco-CallManager

Passthrough

N/A

2443, 2748

Cisco-NetFlow

Passthrough

N/A

7544, 7545

Citrix-ICA

LZ+TFO+DRE

N/A

1494, 2598

Clearcase

LZ+TFO+DRE

N/A

371

CommVault

TFO

N/A

8400–8403

Connected-DataProtector

TFO

N/A

16384

ControlIT

TFO

N/A

799

CU-SeeMe

Passthrough

N/A

7640, 7642, 7648, 7649

CVS

LZ+TFO+DRE

N/A

2401

Danware-NetOp

TFO

N/A

6502

DNS

Passthrough

N/A

53

Documentum

LZ+TFO+DRE

N/A

1489

Double-Take

LZ+TFO+DRE

N/A

1100, 1105

eDonkey

Passthrough

N/A

4661, 4662

EMC-Celerra-Replicator

LZ+TFO+DRE

N/A

8888

EMC-SRDFA-IP

LZ+TFO+DRE

N/A

1748

ezMeeting

Passthrough

N/A

10101–10103, 26260–26261

FCIP

LZ+TFO+DRE

N/A

3225

Filenet

LZ+TFO+DRE

N/A

32768–32774

FTP

Passthrough

N/A

21

FTP-Data

LZ+TFO+DRE

20

N/A

FTPS

TFO

N/A

990

FTPS-Data

Passthrough

989

N/A

GnomeMeeting

Passthrough

N/A

30000–30010

Gnutella

Passthrough

N/A

6346–6349, 6355, 5634

Grouper

Passthrough

N/A

8038

HotLine

Passthrough

N/A

5500–5503

HP-OpenMail

LZ+TFO+DRE

N/A

5729, 5755, 5757, 5766, 5767, 5768

HP-OpenView

Passthrough

N/A

7426–7431, 7501, 7510

HP-Radia

LZ+TFO+DRE

N/A

3460, 3461, 3464, 3466

HTTP

LZ+TFO+DRE

N/A

80, 3128, 8000, 8001, 8080

HTTPS

TFO

N/A

443

HTTPS

TFO

N/A

443

IBM-DB2

LZ+TFO+DRE

N/A

523

IBM-NetView

Passthrough

N/A

729–731

IBM-Tivoli

LZ+TFO+DRE

N/A

94, 627, 1580, 1581, 1965

IBM-TSM

TFO+LZ+DRE

N/A

1500–1502

iFCP

LZ+TFO+DRE

N/A

3420

Intel-Proshare

Passthrough

N/A

5713–5717

Internet-Mail

LZ+TFO+DRE

N/A

25, 110, 143, 220

Internet-Mail-secure

TFO

N/A

465, 993, 995

InterSystems-Cache

LZ+TFO+DRE

N/A

1972

IPP

LZ+TFO+DRE

N/A

631

IRC

Passthrough

N/A

531, 6660–6669

iSCSI

LZ+TFO+DRE

N/A

3260

iSNS

Passthrough

N/A

3205

Jabber

Passthrough

N/A

5222, 5269

Kazaa

Passthrough

N/A

1214

Kerberos

Passthrough

N/A

88, 464, 543, 544, 749, 754, 888, 2053

L2TP

TFO

N/A

1701

LANDesk

LZ+TFO+DRE

N/A

9535, 9593–9595

Laplink-Host

TFO

N/A

1547

Laplink-PCSync

TFO

N/A

8444

Laplink-PCSync-secure

TFO

N/A

8443

Laplink-ShareDirect

Passthrough

N/A

2705

LDAP

LZ+TFO+DRE

N/A

389, 8404

LDAP-Global-Catalog

LZ+TFO+DRE

N/A

3268

LDAP-Global-Catalog-Secure

Passthrough

N/A

3269

LDAP-secure

Passthrough

N/A

636

Legato-NetWorker

TFO

N/A

7937, 7938, 7939

Legato-RepliStor

TFO

N/A

7144, 7145

Liquid-Audio

LZ+TFO+DRE

N/A

18888

Lotus-Notes

LZ+TFO+DRE

N/A

1352

Lotus-Sametime-Connect

Passthrough

N/A

1533

MDaemon

LZ+TFO+DRE

N/A

3000, 3001

MS-Chat

Passthrough

N/A

6665, 6667

MS-Content-Replication-Service

TFO

N/A

560, 507

MS-Message-Queuing

LZ+TFO+DRE

N/A

1801, 2101, 2103, 2105

MS-NetMeeting

Passthrough

N/A

522, 1503, 1731

MS-NetShow

LZ+TFO+DRE

N/A

1755

MSN-Messenger

Passthrough

N/A

1863, 6891–6900

MS-SQL

LZ+TFO+DRE

N/A

1433

MS-Terminal-Services

TFO

N/A

3389

MySQL

LZ+TFO+DRE

N/A

3306

Napster

Passthrough

N/A

6666, 6677, 6700, 6688, 7777, 8875

Netapp-SnapMirror

LZ+TFO+DRE

N/A

10565–10569

NetIQ

Passthrough

N/A

2220, 2735, 10113–10116

Netopia-netOctopus

Passthrough

N/A

1917, 1921

Netopia-Timbuktu

TFO

N/A

407, 1417–1420

NFS

LZ+TFO+DRE

N/A

2049

NNTP

LZ+TFO+DRE

N/A

119

NNTP-secure

TFO

N/A

563

Novell-Groupwise

LZ+TFO+DRE

N/A

1099, 1677, 2800, 3800, 7100, 7101, 7180, 7181, 7205, 9850

Novell-NetWare

LZ+TFO+DRE

N/A

524

Novell-ZenWorks

LZ+TFO+DRE

N/A

517, 1761–1763, 2037, 2544, 8039

NTP

Passthrough

N/A

123

OpenVPN

TFO

N/A

1194

Oracle

LZ+TFO+DRE

N/A

66, 1521, 1525

Other-Secure

Passthrough

N/A

261, 44, 684, 695, 994, 2252, 2478, 2479, 2482, 2484, 2679, 2762, 2998, 3077, 3078, 3183, 3191, 3220, 3410, 3424, 3471, 3496,3509, 3529, 3539, 3660, 3661, 3747, 3864, 3885, 3896, 3897, 3995, 4031, 5007, 5989, 5990, 7674, 9802, 12109

PCAnywhere

TFO

N/A

73, 5631, 5632, 65301

PCMail-Server

LZ+TFO+DRE

N/A

158

PDMWorks

LZ+TFO+DRE

N/A

30000, 40000

Pervasive-SQL

LZ+TFO+DRE

N/A

1583

PostgreSQL

LZ+TFO+DRE

N/A

5432

PPTP

TFO

N/A

1723

ProjectWise-FileTransfer

LZ+TFO+DRE

N/A

5800

QMTP

LZ+TFO+DRE

N/A

209

Qnext

Passthrough

N/A

44, 5555

RAdmin

TFO

N/A

4899

Remote-Anything

TFO

N/A

3999, 4000

Remote-Replication-Agent

TFO

N/A

5678

Rsync

TFO

N/A

873

RTSP

LZ+TFO+DRE

N/A

554, 8554

SAP

LZ+TFO+DRE

N/A

3200–3219, 3221–3224, 3226–3267, 3270–3282, 3284–3305, 3307–3388, 3390–3399, 3600–3659, 3662–3699

SASL

Passthrough

N/A

3659

Scalable-SQL

LZ+TFO+DRE

N/A

3352

Service-Location

Passthrough

N/A

427

Siebel

LZ+TFO+DRE

N/A

2320, 2321, 8448

Simple-FTP

LZ+TFO+DRE

N/A

115

SIP-secure

Passthrough

N/A

5061

SOAP

LZ+TFO+DRE

N/A

7627

SoulSeek

Passthrough

N/A

2234, 5534

SQL-Service

LZ+TFO+DRE

N/A

156

SSH

TFO

N/A

22

SSL-Shell

Passthrough

N/A

614

Sun-RPC

Passthrough

N/A

111

SUN-Xprint

LZ+TFO+DRE

N/A

8100

Sybase-SQL

LZ+TFO+DRE

N/A

1498, 2439, 2638, 3968

Symantec-AntiVirus

LZ+TFO+DRE

N/A

2847, 2848, 2967, 2968, 38037, 38292

TACACS

Passthrough

N/A

49

Telnet

Passthrough

N/A

23, 107, 513

Telnets

Passthrough

N/A

992

TFTPS

TFO

N/A

3713

UniSQL

LZ+TFO+DRE

N/A

1978, 1979

Unix-Printing

LZ+TFO+DRE

N/A

170, 515

Unix-Remote-Execution

Passthrough

N/A

512, 514

VDOLive

LZ+TFO+DRE

N/A

7000

Veritas-BackupExec

TFO

N/A

1125, 3527, 6101, 6102, 6106

Veritas-NetBackup

TFO

N/A

13720, 13721, 13782, 13785

Vmware-VMConsole

TFO

N/A

902

VNC

TFO

N/A

5801–5809, 6900–6909

VocalTec

Passthrough

N/A

1490, 6670, 22555, 25793

VoIP-Control

Passthrough

N/A

1300, 1718–1720, 2000-2002, 2428, 5060, 11000–11999

WAAS-FlowMonitor

TFO

N/A

7878

WASTE

Passthrough

N/A

1337

WBEM

Passthrough

N/A

5987, 5988

WinMX

Passthrough

N/A

6699

WINS

Passthrough

N/A

42, 137, 1512

X400

LZ+TFO+DRE

N/A

102

XWindows

TFO

N/A

6000–6063

Yahoo-Messenger

Passthrough

N/A

5000, 5001, 5050, 5100

 

Examples

# Enter system-defined WAAS policy view.

<Sysname> system-view

[Sysname] waas policy waas_default

[Sysname-waaspolicy-waas_default]

Related commands

display waas policy

waas tfo auto-discovery blacklist enable

Use waas tfo auto-discovery blacklist enable to enable the TFO blacklist autodiscovery feature.

Use undo waas tfo auto-discovery blacklist enable to disable the TFO blacklist autodiscovery feature.

Syntax

waas tfo auto-discovery blacklist enable

undo waas tfo auto-discovery blacklist enable

Default

The TFO blacklist autodiscovery feature is disabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

This feature automatically discovers servers that cannot receive TCP packets with options and adds the server IP addresses and port numbers to a blacklist.

During the 3-way handshake, the local device considers the TCP connection attempt failed if either of the following situations occurs:

·     The peer device does not respond within the specified time period.

·     The peer device closes the TCP connection.

Examples

# Enable the TFO blacklist autodiscovery feature.

<Sysname> system-view

[Sysname] waas tfo auto-discovery blacklist enable

Related commands

display waas tfo auto-discovery blacklist

waas tfo auto-discovery blacklist hold-time

Use waas tfo auto-discovery blacklist hold-time to set the aging time for autodiscovered blacklist entries.

Use undo waas tfo auto-discovery blacklist hold-time to restore the default.

Syntax

waas tfo auto-discovery blacklist hold-time minutes

undo waas tfo auto-discovery blacklist hold-time

Default

The aging time for autodiscovery blacklist entries is 5 minutes.

Views

System view

Predefined user roles

network-admin

Parameters

minutes: Specifies the aging time for autodiscovered blacklist entries, in the range of 1 to 10080 minutes.

Usage guidelines

An aging timer is started when a blacklist entry is created. The system automatically deletes an autodiscovered blacklist entry to make room for a new blacklist entry when the aging timer expires.

Examples

# Set the aging time to 30 minutes for autodiscovered blacklist entries.

<Sysname> system-view

[Sysname] waas tfo auto-discovery blacklist hold-time 30

Related commands

display waas tfo auto-discovery blacklist

waas tfo auto-discovery blacklist enable

waas tfo base-congestion-window

Use waas tfo base-congestion-window to set the initial congestion window size for slow start.

Use undo waas tfo base-congestion-window to restore the default.

Syntax

waas tfo base-congestion-window segments

undo waas tfo base-congestion-window

Default

The initial congestion window size is two TCP segments.

Views

System view

Predefined user roles

network-admin

Parameters

segments: Specifies the initial congestion window size in the range of 1 to 10 TCP segments.

Usage guidelines

The congestion window size changes with the congestion status and transmission speed. An appropriate initial congestion window size can quickly restore the network to its full transmission capacity after congestion occurs.

Examples

# Set the initial congestion window size to three segments.

<Sysname> system-view

[Sysname] waas tfo base-congestion-window 3

waas tfo congestion-method

Use waas tfo congestion-method to specify a TCP congestion control algorithm for the WAN side.

Use undo waas tfo congestion-method to restore the default.

Syntax

waas tfo congestion-method { bic | reno }

undo waas tfo congestion-method

Default

WAAS uses BIC as the TCP congestion control algorithm on the WAN side.

Views

System view

Predefined user roles

network-admin

Parameters

bic: Specifies BIC as the TCP congestion control algorithm.

reno: Specifies Reno as the TCP congestion control algorithm.

Examples

# Specify Reno as the TCP congestion control algorithm for the WAN side.

<Sysname> system-view

[Sysname] waas tfo congestion-method reno

waas tfo connect-limit

Use waas tfo connect-limit to set the maximum number of concurrent connections.

Use undo waas tfo connect-limit to restore the default.

Syntax

waas tfo connect-limit limit

undo waas tfo connect-limit

Default

The maximum number of concurrent connections is 10000.

Views

System view

Predefined user roles

network-admin

Parameters

limit: Specifies the maximum number of concurrent connections, in the range of 1000 to 4294967295.

Usage guidelines

After the maximum number of concurrent connections is reached, WAAS does not optimize traffic for newly established connections. Configure the maximum number of concurrent connections according to your available memory resources, because optimizing TCP flows consumes memory resources.

You must set the same maximum number of concurrent connections on the local and peer devices.

Examples

# Set the maximum number of concurrent connections to 20000.

<Sysname> system-view

[Sysname] waas tfo connect-limit 20000

waas tfo keepalive

Use waas tfo keepalive to enable TFO keepalives.

Use undo waas tfo keepalive to disable TFO keepalives.

Syntax

waas tfo keepalive

undo waas tfo keepalive

Default

TFO keepalives are enabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

After you enable TFO keepalives, the system starts the 2-hour TCP keepalive timer. If the local device does not send or receive any data when the timer expires, it sends a keepalive to the peer to maintain the connection.

Examples

# Disable TFO keepalives.

<Sysname> system-view

[Sysname] undo waas tfo keepalive

waas tfo optimize dre

Use waas tfo optimize dre to enable DRE.

Use undo waas tfo optimize dre to disable DRE.

Syntax

waas tfo optimize dre

undo waas tfo optimize dre

Default

DRE is enabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

The DRE optimization action configured in a WAAS policy takes effect only when DRE is enabled.

Examples

# Disable DRE.

<Sysname> system-view

[Sysname] undo waas tfo optimize dre

Related commands

display waas status

waas tfo optimize lz

Use waas tfo optimize lz to enable LZ compression.

Use undo waas tfo optimize lz to disable LZ compression.

Syntax

waas tfo optimize lz

undo waas tfo optimize lz

Default

LZ compression is enabled.

Views

System view

Predefined user roles

network-admin

Usage guidelines

The LZ optimization action configured in a WAAS policy takes effect only when LZ compression is enabled.

Examples

# Disable LZ compression.

<Sysname> system-view

[Sysname] undo waas tfo optimize lz

Related commands

display waas status

waas tfo receive-buffer

Use waas tfo receive-buffer to set the TFO receiving buffer size.

Use undo waas tfo receive-buffer to restore the default.

Syntax

waas tfo receive-buffer buffer-size

undo waas tfo receive-buffer

Default

The TFO receiving buffer size is 64 KB.

Views

System view

Predefined user roles

network-admin

Parameters

buffer-size: Specifies the TFO receiving buffer size in the range of 32 to 16384 KB.

Usage guidelines

The TFO receiving buffer size affects network throughput.

Examples

# Set the TFO receiving buffer size to 1024 KB.

<Sysname> system-view

[Sysname] waas tfo receive-buffer 1024

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网