- Table of Contents
-
- 07-Layer 3—IP Services Command Reference
- 00-Preface
- 01-ARP commands
- 02-IP addressing commands
- 03-DHCP commands
- 04-DNS commands
- 05-IP forwarding basics commands
- 06-Fast forwarding commands
- 07-Multi-CPU packet distribution commands
- 08-Adjacency table commands
- 09-IRDP commands
- 10-IP performance optimization commands
- 11-UDP helper commands
- 12-IPv6 basics commands
- 13-IPv6 neighbor discovery commands
- 14-DHCPv6 commands
- 15-IPv6 fast forwarding commands
- 16-WAAS commands
- 17-HTTP redirect commands
- 18-Web caching commands
- Related Documents
-
Title | Size | Download |
---|---|---|
16-WAAS commands | 380.03 KB |
Contents
display waas statistics packet-dup
display waas tfo auto-discovery blacklist
reset waas statistics packet-dup
reset waas tfo auto-discovery blacklist
waas tfo auto-discovery blacklist enable
waas tfo auto-discovery blacklist hold-time
WAAS commands
class
Use class to specify a Wide Area Application Services (WAAS) class for a WAAS policy and enter WAAS policy class view.
Use undo class to remove a WAAS class from a WAAS policy.
Syntax
class class-name [ insert-before existing-class ]
undo class class-name
Default
No WAAS class exists in a WAAS policy.
Views
WAAS policy view
Predefined user roles
network-admin
Parameters
class-name: Specifies a WAAS class by its name, a case-insensitive string of 1 to 63 characters. The specified class must already exist.
insert-before existing-class: Inserts the new class before an existing class in the WAAS policy. If you do not specify this option, the new class is placed at the end of the WAAS policy.
Usage guidelines
A WAAS policy can use system-defined WAAS classes (see Table 9).
As a best practice, configure a WAAS class by modifying a system-defined WAAS class.
You can also use this command to arrange existing WAAS classes in a WAAS policy.
A packet is checked against WAAS classes in the specified order. When a packet matches a class, the action for the class is performed on the packet, and the match process ends.
If you do not configure an action for a WAAS class, the device ignores the WAAS class.
Examples
# Specify the system-defined WAAS class AFS for the WAAS policy waas_global, and enter the view of the WAAS class AFS.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS]
# Specify the system-defined WAAS class AOL for the WAAS policy waas_global, insert it before AFS, and enter the view of the WAAS class AOL.
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AOL insert-before AFS
[Sysname-waaspolicy-waas_global-AOL]
# Change the position of the WAAS class AOL in the WAAS policy waas_global by inserting it before AFS, and enter the view of the WAAS class AOL.
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AOL insert-before AFS
[Sysname-waaspolicy-waas_global-AOL]
Related commands
display waas policy
waas class
waas policy
display waas class
Use display waas class to display WAAS classes.
Syntax
display waas class [ class-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
class-name: Specifies a WAAS class by its name, a case-insensitive string of 1 to 63 characters. If you do not specify a WAAS class, this command displays all WAAS classes.
Examples
# Display the WAAS class class1.
<Sysname> display waas class class1
WAAS class: class1
match 1 tcp source 1.1.1.0 24 port 50000 60000
match 6 tcp destination 2.2.2.2 port 1 1024
match 11 tcp source 1001:: 96 port 50000 60000
match 16 tcp destination 2002::2222 port 1 1024
Field |
Description |
match |
Match criterion of the WAAS class. |
Related commands
match tcp
waas class
display waas fec peer-info
Use display waas fec peer-info to display the FEC information of peers.
Syntax
display waas fec peer-info { ipv4 | ipv6 } [ vpn-instance vpn-instance-name ] [ source-ip source-ip | source-port source-port | destination-ip destination-ip | destination-port destination-port ] *
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
ipv4: Specifies IPv4 peers.
ipv6: Specifies IPv6 peers.
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command displays the FEC information of peers for the public network.
source-ip source-ip: Specifies a source IP address. If you do not specify a source IP address, this command displays the peer FEC information for all source IP addresses.
source-port source-port: Specifies a source port number in the range of 1 to 65535. If you do not specify a source port number, this command displays the peer FEC information for all source port numbers.
destination-ip destination-ip: Specifies a destination IP address. If you do not specify a destination IP address, this command displays the peer FEC information for all destination IP addresses.
destination-port destination-port: Specifies a destination port number in the range of 1 to 65535. If you do not specify a destination port number, this command displays the peer FEC information for all destination port numbers.
Examples
# Display the FEC information of all peers.
<Sysname> system-view
[Sysname] display waas fec peer-info ipv4
Slot 0:
Source IP/Port: 192.168.56.1/3230, Destination IP/Port: 192.168.157.100/3230
Type: A-FEC
A-FEC info:
Version: 1
Interface : GE2/0/1
[1]Loss ratio (time) : 5% (2020/10/29 17:20:04.409)
[2]Loss ratio (time) : 5% (2020/10/29 17:20:04.419)
[3]Loss ratio (time) : 5% (2020/10/29 17:20:04.429)
Sampling interval(ms) : 10
Average loss ratio : 5%
Receiving count : 10
Last receiving time(ms): 10
Source IP/Port: 192.168.57.1/3230, Destination IP/Port: 192.168.158.100/3230
Type: D-FEC
Source IP/Port: 192.168.58.1/3230, Destination IP/Port: 192.168.159.100/3230
Type: Unknown
Table 2 Command output
Field |
Description |
Interface |
Interface that sends probe packets to the peer. |
Receiving count |
Number of received sampled packets. |
Last receiving time(ms) |
Number of milliseconds that elapsed since the last receiving time. |
display waas policy
Use display waas policy to display WAAS policies.
Syntax
display waas policy [ policy-name ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
policy-name: Specifies a WAAS policy by its name, a case-insensitive string of 1 to 63 characters. If you do not specify a WAAS policy, this command displays all WAAS policies.
Examples
# Display the WAAS policy po1.
<Sysname> display waas policy po1
WAAS policy: po1
class cl1
optimize TFO DRE LZ
class cl2
optimize TFO DRE
class cl3
passthrough
class cl4
optimize TFO LZ
class cl5
Table 3 Command output
Field |
Description |
WAAS class in the WAAS policy. |
|
Optimization actions: · TFO (works with only TCP). · DRE. · LZ compression. |
|
Action that does not perform any optimization. |
Related commands
class
waas policy
display waas session
Use display waas session to display WAAS session information.
Syntax
display waas session { ipv4 | ipv6 } [ client-ip client-ip ] [ client-port client-port ] [ server-ip server-ip ] [ server-port server-port ] [ peer-id peer-id ] [ verbose ] [ slot slot-number ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
ipv4: Specifies IPv4 sessions.
ipv6: Specifies IPv6 sessions.
client-ip client-ip: Displays the WAAS session information for the client specified by its IP address.
client-port client-port: Displays the WAAS session information for the clients specified by port number in the range of 1 to 65535.
server-ip server-ip: Displays the WAAS session information for the server specified by its IP address.
server-port server-port: Displays the WAAS session information for the servers specified by port number in the range of 1 to 65535.
peer-id peer-id: Displays the WAAS session information for the peer specified by its bridge MAC address in the format of H-H-H.
verbose: Displays detailed information about WAAS sessions. If you do not specify this keyword, the command displays brief information about WAAS sessions.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays WAAS session information for all cards.
Usage guidelines
If you specify only the ipv4 or ipv6 keyword, this command displays information about all IPv4 or IPv6 WAAS sessions.
Examples
# Display brief information about all IPv4 WAAS sessions.
<Sysname> display waas session ipv4
Peer ID: 0021-90ad-0012
Start Time: Fri Mar 21 10:43:05 2014
Source IP/Port: 1.1.1.1/34572
Destination IP/Port: 2.2.2.2/80
Peer ID: 0011-10ad-0012
Start Time: Fri Mar 21 10:45:05 2014
Source IP/Port: 2.2.1.1/34572
Destination IP/Port: 3.2.2.3/80
Total 2 sessions found.
# Display detailed information about all IPv4 WAAS sessions.
<Sysname> display waas session ipv4 verbose
Peer ID: 0021-90ad0-01221
Start Time: Fri Mar 21 11:43:05 2014
Source IP/Port: 1.1.1.1/34572
Destination IP/Port: 2.2.2.2/80
LAN interface: GigabitEthernet2/0/1
WAN interface: GigabitEthernet2/0/2
Configured Policy: TFO DRE LZ
Negotiated Policy: TFO DRE LZ
LAN->WAN bytes: Original 104884 Optimized 88594
WAN->LAN bytes: Original 744588 Optimized 3355445
LZ section:
Encode status:
Bytes in: 0
Bytes out: 0
Bypass bytes: 400
Space saved: 0%
Average Latency: 0 usec
Decode status:
Bytes in: 329
Bytes out: 393
Bypass bytes: 63
Space saved: 16%
Average Latency: 2 usec
DRE section:
Encode status:
Bytes in: 0
Bytes out: 0
Bypass bytes: 314
Space saved: 0%
Average latency: 0 usec
Decode status:
Bytes in: 399
Bytes out: 332
Bypass bytes: 0
Space saved: 0%
Chunk miss: 0
Collision: 0
Average latency: 23 usec
Peer ID: 0011-10ad-0012
Start Time: Fri Mar 21 11:43:05 2014
Source IP/Port: 2.2.1.1/34572
Destination IP/Port: 3.2.2.3/80
LAN interface: GigabitEthernet2/0/1
WAN interface: GigabitEthernet2/0/2
Configured Policy: TFO DRE LZ
Negotiated Policy: TFO DRE LZ
LAN->WAN bytes: Original 104884 Optimized 88594
WAN->LAN bytes: Original 744588 Optimized 3355445
LZ section:
Encode status:
Bytes in: 0
Bytes out: 0
Bypass bytes: 400
Space saved: 0%
Average Latency: 0 usec
Decode status:
Bytes in: 329
Bytes out: 393
Bypass bytes: 63
Space saved: 16%
Average Latency: 2 usec
DRE section:
Encode status:
Bytes in: 0
Bytes out: 0
Bypass bytes: 314
Space saved: 0%
Average latency: 0 usec
Decode status:
Bytes in: 399
Bytes out: 332
Bypass bytes: 0
Space saved: 0%
Chunk miss: 0
Collision: 0
Average latency 23 usec
Total 2 sessions found.
Field |
Description |
Bridge MAC address of the peer device. A bridge MAC address uniquely identifies a peer device. |
|
Time when the WAAS session was established. |
|
IP address and port number of the client. |
|
IP address and port number of the server. |
|
Optimization actions configured on the local device, which can be one or any combination of the following actions: · TFO (works with only TCP). · DRE. · LZ compression. |
|
Optimization actions negotiated with the peer device, which can be one or any combination of the following actions: · TFO (works with only TCP). · DRE. · LZ compression. The negotiated optimization actions are the union of the optimization actions configured on the local device and those configured on the peer device. |
|
Statistics for LAN-to-WAN data: · Original—Number of bytes before optimization. · Optimized—Number of bytes after optimization. |
|
Statistics for WAN-to-LAN data: · Original—Number of bytes before optimization. · Optimized—Number of bytes after optimization. |
|
LZ compression statistics. |
|
DRE statistics. |
|
Compression statistics. |
|
Decompression statistics. |
|
Number of input bytes. |
|
Number of output bytes. |
|
Number of bytes that bypass DRE. |
|
· Compression ratio: (1–Bytes out/Bytes in) x 100. · Decompression ratio: (1–Bytes in/Bytes out) x 100. |
|
Average latency in milliseconds for the most recent compression or decompression. When multiple CPUs are available on a card, the average latency is the latency time divided by the number of CPUs. |
|
Cumulative number of times that DRE failed to find a dictionary entry according to a dictionary index. |
|
Cumulative number of times that data checks failed. |
display waas statistics dre
Use display waas statistics dre to display DRE statistics.
Syntax
display waas statistics dre [ peer peer-id ] [ slot slot-number ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
peer-id peer-id: Specifies a peer device by its bridge MAC address in the format of H-H-H. If you do not specify a peer device, the command displays DRE statistics for all peer devices.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays DRE statistics for all cards.
Examples
# Display DRE statistics for all peer devices.
<Sysname> display waas statistics dre
Peer-ID: 0016-9d38-ca1d
Peer version: 1.0
Cache in storage: 19426304 bytes
Index number: 75884
Age: 00 weeks, 00 days, 00 hours, 00 minutes, 33 seconds
Total connections: 1
Active connections: 0
Encode Statistics
Dre msgs: 2
Bytes in: 392 bytes
Bytes out: 424 bytes
Bypass bytes: 0 bytes
Bytes Matched: 0 bytes
Space saved: -8%
Average latency: 0 usec
Decode Statistics
Dre msgs: 196407
Bytes in: 29132703 bytes
Bytes out: 42413368 bytes
Bypass bytes: 0 bytes
Space saved: 31%
Average latency: 0 usec
Peer-ID: 0d38-9d38-ca1d
Peer version: 1.0
Cache in storage: 33554944 bytes
Index number: 131074
Age: 00 weeks, 00 days, 00 hours, 21 minutes, 31 seconds
Total connections: 2
Active connections: 0
Encode Statistics
Dre msgs: 514872
Bytes in: 111390296 bytes
Bytes out: 60085884 bytes
Bypass bytes: 0 bytes
Bytes Matched: 56336640 bytes
Space saved: 46%
Average latency: 0 usec
Decode Statistics
Dre msgs: 4
Bytes in: 849 bytes
Bytes out: 785 bytes
Bypass bytes: 0 bytes
Space saved: -8%
Average latency: 0 usec
# Display DRE statistics for a specific peer device.
<Sysname> display waas statistics dre peer 0016-9d38-ca1d
Peer-ID: 0016-9d38-ca1d
Peer version: 1.0
Cache in storage: 33554944 bytes
Index number: 131074
Age: 00 weeks, 00 days, 00 hours, 21 minutes, 31 seconds
Total connections: 2
Active connections: 0
Encode Statistics
Dre msgs: 514872
Bytes in: 111390296 bytes
Bytes out: 60085884 bytes
Bypass bytes: 0 bytes
Bytes Matched: 56336640 bytes
Space saved: 46%
Average latency: 0 usec
Decode Statistics
Dre msgs: 4
Bytes in: 849 bytes
Bytes out: 785 bytes
Bypass bytes: 0 bytes
Space saved: -8%
Average latency: 0 usec
Table 5 Command output
Field |
Description |
Peer ID |
Bridge MAC address of the peer device. A bridge MAC address uniquely identifies a peer device. |
WAAS version of the peer device. |
|
Disk space used by metadata. Metadata are original data that have indexes in the dictionary. |
|
Number of dictionary indexes. |
|
Amount of time that has elapsed since the local device initially established an optimized TCP connection with the peer. |
|
Total number of DRE connections. |
|
Number of active DRE connections. |
|
Compression statistics. |
|
Decompression statistics. |
|
Number of data blocks. |
|
Bytes in |
Number of input bytes. |
Bytes out |
Number of output bytes. |
Bypass bytes |
Number of bytes that bypass DRE. |
Number of bytes matched by DRE. |
|
Space saved |
· Compression ratio: (1–Bytes out/Bytes in) x 100. · Decompression ratio: (1–Bytes in/Bytes out) x 100. |
Average Latency |
Average latency in milliseconds for the most recent compression or decompression. When multiple CPUs are available on a card, the average latency is the latency time divided by the number of CPUs. |
Related commands
display waas statistics fec
Use display waas statistics fec to display FEC statistics.
Syntax
display waas statistics fec
Views
Any view
Predefined user roles
network-admin
network-operator
Examples
# Display FEC packet statistics.
<Sysname> display waas statistics fec
Encoder:
Received:
Total packets : 661
Sent:
Original packets : 661
Redundant packets : 375
In-order original packets after timeout : 141
Out-of-order original packets after timeout : 0
Decoder:
Received:
Original packets : 0
Redundant packets : 0
Original packets in different group : 0
Redundant packets in different group from cached redundant packets: 0
Redundant packets in different group from cached original packets : 0
Redundant packets with sequence number less than cached ones : 0
Sent:
Original packets : 0
Recovered packets : 0
In-order original packets after timeout : 0
Related commands
reset waas statistics fec
display waas statistics packet-dup
Use display waas statistics packet-dup to display packet statistics of packet duplication.
Syntax
display waas statistics packet-dup { ipv4 | ipv6 }
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
ipv4: Specifies IPv4 packets.
ipv6: Specifies IPv6 packets.
Examples
# Display packet statistics of IPv4 packet duplication.
<Sysname> display waas statistics packet-dup ipv4
Packet Duplication:
Original packets : 522
Duplicated packets : 522
Non-duplicated packets due to fragmentation :0
Packets exceeding MTU : 0
Packet Redundancy:
Passed packets :200
Discarded packets :199
Packet Order Preservation:
In-order packets sent :200
Out-of-order packets sent :19
Out-of-order packets cached :40
Cached packets sent in order :40
Cache failed packets sent :0
Cached packets sent on timeout :0
Out-of-order fragmented packets sent :10
Out-of-order fragmented packets cached :0
Cached fragmented packets sent in order :0
Cached fragmented packets sent on timeout :0
Table 6 Command output
Field |
Description |
Packet Duplication |
Packet statistics for packet duplication on the sender. |
Original packets |
Number of original packets. |
Duplicated packets |
Number of duplicated packets. |
Non-duplicated packets due to fragmentation |
Number of non-duplicated packets due to fragmentation. |
Packets exceeding MTU |
Number of packets with the length exceeding the MTU. |
Packet Redundancy |
Packet statistics for packet redundancy on the receiver. |
Passed packets |
Number of passed packets. |
Discarded packets |
Number of duplicated packets dropped. |
Packet Order Preservation |
Packet statistics for packet order preservation on the receiver. |
In-order packets sent |
Number of in-order packets sent. |
Out-of-order packets sent |
Number of out-of-order packets sent. |
Out-of-order packets cached |
Number of out-of-order packets cached. |
Cached packets sent in order |
Number of cached packets sent in order. |
Cache failed packets sent |
Number of packets sent after failed to be cached. |
Cached packets sent on timeout |
Number of cached packets sent out of order after timeout. |
Out-of-order fragmented packets sent |
Number of out-of-order fragmented packets sent. |
Out-of-order fragmented packets cached |
Number of out-of-order fragmented packets cached. |
Cached fragmented packets sent in order |
Number of cached fragmented packets sent in order. |
Related commands
reset waas statistics packet-dup
display waas status
Use display waas status to display the global WAAS status.
Syntax
display waas status
Views
Any view
Predefined user roles
network-admin
network-operator
Examples
# Display the global WAAS status.
WAAS version: 1.0
Local ID: 02e0-011a-0000
DRE status: Disabled
LZ status: Disabled
BlackList status: Disabled
Total active connections: 7889
Total data storage size: 1468006400 bytes
Total index number: 11513600
Blacklist hold-time:5 minutes
Max TFO connections: 10000
Offset step: Normal
Aging time: 0 minutes
Symmertrical Mode : Yes
UDP compression:
Compression enabled, maximum compressed log messages: 5
Destination host:
DIP Dport
192.168.59.20 200
Interfaces Applied policy
GE2/0/1 waas_global
GE2/0/2 waas_default
GE2/0/3 waas_global
Total policy interfaces: 3
Table 7 Command output
Field |
Description |
Bridge MAC address of the local device. A bridge MAC address uniquely identifies a local device. |
|
Total number of active WAAS connections. |
|
Disk space used by all metadata. Metadata are original data that have indexes in the dictionary. |
|
Total number of dictionary indexes. |
|
Aging time for blacklist entries. |
|
Max connect-threshold |
Maximum number of concurrent connections allowed. |
Offset step |
DRE match offset step: · Fastest. · Faster. · Fast. · Normal. |
Aging time |
Aging time for entries in the data dictionary, in minutes. |
List of interfaces with WAAS policies applied. |
|
Number of interfaces with WAAS policies applied. |
display waas tfo auto-discovery blacklist
Use display waas tfo auto-discovery blacklist to display autodiscovered blacklist information.
Syntax
display waas tfo auto-discovery blacklist { ipv4 | ipv6 } [ slot slot-number ]
Views
Any view
Predefined user roles
network-admin
network-operator
Parameters
ipv4: Specifies IPv4 blacklist information.
ipv6: Specifies IPv6 blacklist information.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command displays autodiscovered blacklist information for all cards.
Examples
# Display all IPv4 blacklist information.
<Sysname> display waas tfo auto-discovery blacklist ipv4
Server IP address/Port Insert Time
1.1.1.1/8080 Fri Mar 21 10:43:05 2014
1.1.1.2/8080 Fri Mar 21 10:43:06 2014
2.2.2.2/443 Fri Mar 21 10:20:37 2014
Total 3 entries found.
Table 8 Command output
Field |
Description |
Time when a blacklist entry was generated. |
Related commands
reset waas tfo auto-discovery blacklist
waas tfo auto-discovery blacklist enable
waas tfo auto-discovery blacklist hold-time
fec average-ratio
Use fec average-ratio to set the FEC average ratio.
Use undo fec average-ratio to restore the default.
Syntax
fec average-ratio ratio
undo fec average-ratio
Default
The FEC average ratio is 35%.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
ratio: Specifies the FEC average ratio in the range of 1 to 50, in percentage.
Usage guidelines
The FEC average ratio determines the number of redundant packets generated for a group of original packets. The greater the FEC average ratio, the more the redundant packets generated. FEC average ratio must be greater than the actual packet loss ratio.
Number of redundant packets = Round up (number of original packets x (FEC average ratio/(1–FEC average ratio))
Examples
# In WAAS class AFS, set the FEC average ratio to 30%.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] fec average-ratio 30
Related commands
fec block-size
fec block-size
Use fec block-size to set the maximum number of original packets that can be encoded at a time.
Use undo fec block-size to restore the default.
Syntax
fec block-size block-size
undo fec block-size
Default
A maximum of 20 original packets can be encoded at a time.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
block-size: Specifies the maximum number of original packets that can be encoded at a time, in the range of 1 to 150
Usage guidelines
In addition to the block size, the encoding timeout time affects the number of original packets that can be encoded at a time. If the maximum number of encoded packets is reached before the encoding timeout time expires, that number applies. If the encoding timeout time expires before the maximum number is reached, the number of actually encoded packets applies. If the block size is too small, the number of generated redundant packets is small. If the block size is too large, the decoder side will take a long time to recover lost packets. You can set an appropriate block size according to your network bandwidth.
Examples
# In WAAS class AFS, set the maximum number of original packets that can be encoded at a time to 20.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] fec block-size 20
Related commands
fec average-ratio
fec decode-timeout
Use fec decode-timeout to set the decoding timeout time.
Use undo fec decode-timeout to restore the default.
Syntax
fec decode-timeout milliseconds
undo fec decode-timeout
Default
The decoding timeout time is 800 milliseconds.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
milliseconds: Specifies the decoding timeout time in the range of 30 to 1000 milliseconds.
Usage guidelines
When the total number of cached original packets and redundant packets reaches or exceeds the set number of original packets before the decoding timeout time expires, the decoder performs the following operations:
1. Decodes the cached packets.
2. Recovers lost packets.
3. Sends original packets and recovered packets, and drops redundant packets.
Otherwise, the decoder sends cached original packets and drops cached redundant packets without decoding any packets.
Examples
# In WAAS class AFS, set the decoding timeout time to 500 milliseconds.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] fec decode-timeout 500
Related commands
fec block-size
fec encode-timeout
fec encode-timeout
Use fec encode-timeout to set the encoding timeout time.
Use undo fec encode-timeout to restore the default.
Syntax
fec encode-timeout milliseconds
undo fec encode-timeout
Default
The encoding timeout time is 500 milliseconds.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
milliseconds: Specifies the encoding timeout time in the range of 30 to 1000 milliseconds.
Usage guidelines
In addition to the encoding timeout time, the block size affects the number of original packets that can be encoded at a time. If the maximum number of encoded packets is reached before the encoding timeout time expires, that number applies. If the encoding timeout time expires before the maximum number is reached, the number of actually encoded packets applies.
Examples
# In WAAS class AFS, set the encoding timeout time to 60 milliseconds.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] fec encode-timeout 60
Related commands
fec block-size
fec loss-recovery-type
Use fec loss-recovery-type to specify the FEC type.
Use undo fec loss-recovery-type to restore the default.
Syntax
fec loss-recovery-type { adaptive-fec | determined-fec }
undo fec loss-recovery-type
Default
The FEC type is D-FEC.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
adaptive-fec: Specifies adaptive FEC (A-FEC).
determined-fec: Specifies determined FEC (D-FEC).
Usage guidelines
If the FEC average ratio is set to a greater value, more bandwidth will be consumed. If the FEC average ratio is set to a small value, lost packets cannot be recovered. A-FEC adjusts the FEC average ratio based on the calculated real-time packet loss ratio. The adjusted FEC average ratio will not be greater than the set FEC average ratio. D-FEC always uses the set FEC average ratio.
Examples
# Set the FEC type to A-FEC.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] fec loss-recovery-type adaptive-fec
fec probe aging-time
Use fec probe aging-time to set the aging time for A-FEC decoder information.
Use undo fec probe aging-time to restore the default.
Syntax
fec probe aging-time seconds
undo fec probe aging-time
Default
The aging time for A-FEC decoder information is 1 second.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
seconds: Specifies the aging time in the range of 0 to 60 seconds.
Usage guidelines
If the encoder receives sampled packets within the aging time, it adjusts the FEC average ratio based on the real-time packet loss ratio. If the encoder does not receive sampled packets within the aging time, it deletes the local decoder information and uses the set FEC average ratio.
Examples
# Set the aging time for A-FEC decoder information to 5 seconds.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] fec probe aging-time 5
fec sample-interval
Use fec sample-interval to set the A-FEC sampling interval.
Use undo fec sample-interval to restore the default.
Syntax
fec sample-interval interval
undo fec sample-interval
Default
The A-FEC sampling interval is 100 milliseconds.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
interval: Specifies the A-FEC sampling interval in the range of 1 to 1000 milliseconds.
Usage guidelines
The decoder regularly sends sampled packets to notify the encoder of the real-time packet loss ratio. The encoder adjusts the FEC average ratio based on the real-time packet loss ratio.
Examples
# Set the aging time for A-FEC decoder information to 50 milliseconds.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] fec sample-interval 50
match acl
Use match acl to configure an ACL match criterion.
Use undo match to restore the default.
Syntax
match [ match-id ] acl [ ipv6 ] { acl-number | name acl-name }
undo match match-id
Default
No ACL match criterion is configured.
Views
WAAS class view
Predefined user roles
network-admin
Parameters
match-id: Specifies the ID of the match criterion, in the range of 1 to 65535. If you specify a nonexistent ID, the command creates a new match criterion. If you specify an existing ID, the command modifies the existing match criterion. If you do not specify an ID, the system automatically assigns the lowest available ID.
ipv6: Specifies the IPv6 ACL type. To specify the IPv4 ACL type, do not use this keyword.
acl-number: Specifies an ACL by its number in the range of 2000 to 2999 for a basic ACL, and in the range of 3000 to 3999 for an advanced ACL.
name acl-name: Specifies an ACL by its name, a case-insensitive string of 1 to 63 characters starting with a letter. The ACL name cannot be all.
Usage guidelines
You cannot configure the same ACL match criteria with different match IDs.
A WAAS class can have a maximum of 65535 match criteria. A packet is checked against match criteria in their configuration order. The packet matches the WAAS class if it matches any one of the match criteria.
When you specify an ACL, follow these guidelines:
· If the specified ACL does not exist or has no rules configured, no packets will match the ACL.
· If the vpn-instance keyword is specified for an ACL rule, the rule applies to only VPN packets. If the vpn-instance keyword is not specified, the rule applies to only public network packets
· In the current software version, WAAS supports matching only the 6-tuple-associated ACL rules.
Examples
# Create a WAAS class named http_class, and configure the class to match packets with IPv4 ACL 2011.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasclass-http_class] match acl 2011
# Create a WAAS class named udp_class, and configure the class to match packets with IPv4 ACL aaa.
<Sysname> system-view
[Sysname] waas class udp_class
[Sysname-waasclass-udp_class] match acl name aaa
# Create a WAAS class named http_class, and configure the class to match packets with IPv6 ACL 3011.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasclass-http_class] match acl ipv6 3011
# Create a WAAS class named udp_class, and configure the class to match packets with IPv6 ACL aaa.
<Sysname> system-view
[Sysname] waas class udp_class
[Sysname-waasclass-udp_class] match acl ipv6 name aaa
Related commands
display waas policy
waas class
match tcp
Use match tcp to configure a TCP match criterion.
Use undo match tcp to delete a TCP match criterion.
Syntax
match [ match-id ] tcp any [ ip-address { ip-address [ mask-length | mask ] | object-group ip-object-group-name } | ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name } ] [ port { port-list | object-group port-object-group-name } ]
match [ match-id ] tcp { destination ip-address { ip-address [ mask-length | mask ] | object-group ip-object-group-name } [ port { port-list | object-group port-object-group-name } ] | source ip-address { ip-address [ mask-length | mask ] | object-group ip-object-group-name } [ port { port-list | object-group port-object-group-name } ] } *
match [ match-id ] tcp { destination ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name } [ port { port-list | object-group port-object-group-name } ] | source ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name } [ port { port-list | object-group port-object-group-name } ] } *
match [ match-id ] tcp { destination | source } port { object-group port-object-group-name | port-list }
undo match match-id
Default
No match criterion exists.
Views
WAAS class view
Predefined user roles
network-admin
Parameters
match-id: Specifies the ID of the match criterion, in the range of 1 to 65535. If you specify an unused ID, you can create a new match criterion. If you specify a used ID, you can modify the existing match criterion. If you do not specify an ID, the system automatically assigns the lowest available ID.
tcp: Matches TCP packets.
any: Matches any TCP packets.
destination: Specifies destination elements for matching TCP packets.
source: Specifies source elements for matching TCP packets.
ip-address { ip-address [ mask-length | mask ] | object-group ip-object-group-name }: Specifies IPv4 addresses for matching TCP packets.
· ip-address: Specifies an IPv4 address in dotted decimal notation.
· mask-length: Specifies the mask length for the IPv4 address, in the range of 0 to 32. The default is 32.
· mask: Specifies the mask for the IPv4 address. The default is 255.255.255.255.
· object-group ip-object-group-name: Specifies an IPv4 address object group by its name, a case-insensitive string of 1 to 63 characters.
ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name }: Specifies IPv6 addresses for matching TCP packets.
· ipv6-address: Specifies an IPv6 address.
· prefix-length: Specifies the prefix length for the IPv6 address, in the range of 0 to 128. The default is 128.
· object-group ipv6-object-group-name: Specifies an IPv6 address object group by its name, a case-insensitive string of 1 to 63 characters.
port { port-list | object-group port-object-group-name }: Specifies port numbers for matching TCP packets.
· port port-list: Specifies a space-separated list of up to 10 port items. Each item specifies a port number or a range of port numbers in the form of port-number1 to port-number2. The value for port-number2 must be greater than or equal to the value for port-number1. The value range for the port-number argument is 1 to 65535. If you do not specify a port list, all port numbers are matched.
· object-group port-object-group-name: Specifies a port object group by its name, a case-insensitive string of 1 to 63 characters.
Usage guidelines
If you specify the destination or source keyword, you must specify the ip-address (or ipv6-address) option, the port option, or both.
If you specify the any keyword, the ip-address (or ipv6-address) option, and the port option, the ip-address (or ipv6-address) and port options match either source or destination fields of packets.
You cannot configure the same match criteria with different match IDs.
A WAAS class can have a maximum of 65535 match criteria. A packet is checked against match criteria in their order of appearance. The packet belongs to the WAAS class if it matches any one of the match criteria.
A WAAS class without any match criteria is not used to match packets.
Examples
# Create a WAAS class named http_class, and configure the class to match packets with source IP address 192.168.0.1/16 and port number 80 or port number in the range of 8000 to 8080.
[Sysname] waas class http_class
[Sysname-waasclass-http_class] match tcp source ip-address 192.168.0.1 16 port 80 8000 to 8080
# Create a WAAS class named http_class, and configure the class to match any TCP packets.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasclass-http_class] match tcp any
# Create a WAAS class named http_class, and configure the class to match TCP packets with source IP address 10.0.3.1/24 and destination IP address 11.0.3.1/24.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasrtpclass-http_class] match tcp source ip-address 10.0.0.1 24 destination ip-address 11.0.3.1 24
# Create a WAAS class named http_class, and configure the class to match TCP packets with the source IP address in the address object group group1 and the destination IP address in the address object group group2.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasrtpclass-http_class] match tcp source ip-address object-group group1 destination ip-address object-group group2
Related commands
display waas policy
waas class
match udp
Use match udp to configure a UDP match criterion.
Use undo match udp to delete a UDP match criterion.
Syntax
match [ match-id ] udp any [ ip-address { ip-address [ mask-length | mask ] | object-group ip-object-group-name } ] | ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name } [ port { port-list | object-group port-object-group-name } ]
match [ match-id ] udp { destination ip-address { ip-address [ mask-legnth | mask ] | object-group ip-object-group-name } [ port { port-list | object-group port-object-group-name } ] | source ip-address { ip-address [ mask-legnth | mask ] | object-group ip-object-group-name } [ port { port-list | object-group port-object-group-name } ] } *
match [ match-id ] udp { destination ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name } [ port { port-list | object-group port-object-group-name } ] | source ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name } [ port { port-list | object-group port-object-group-name } ] } *
match [ match-id ] udp { destination | source } port { port-list | object-group port-object-group-name }
undo match match-id
Default
No UDP match criterion exists.
Views
WAAS class view
Predefined user roles
network-admin
Parameters
match-id: Specifies the ID of the match criterion, in the range of 1 to 65535. If you specify a nonexistent ID, the command creates a new match criterion. If you specify an existing ID, the command modifies the existing match criterion. If you do not specify an ID, the system automatically assigns the lowest available ID.
udp: Matches UDP messages.
any: Matches any UDP messages.
destination: Specifies destination elements for matching UDP messages.
source: Specifies source elements for matching UDP messages.
ip-address { ip-address [ mask-length | mask ] | object-group ip-object-group-name }: Specifies IPv4 addresses for matching UDP messages.
· ipv4-address: Specifies an IPv4 address in dotted decimal notation.
· mask-length: Specifies the mask length for the IPv4 address, in the range of 0 to 32. The default is 32.
· mask: Specifies the mask for the IPv4 address. The default is 255.255.255.255.
· object-group ip-object-group-name: Specifies an IPv4 address object group by its name, a case-insensitive string of 1 to 63 characters.
ipv6-address { ipv6-address [ prefix-length ] | object-group ipv6-object-group-name }: Specifies IPv6 addresses for matching TCP packets. This parameter is supported only by a WAAS class.
· ipv6-address: Specifies an IPv6 address.
· prefix-length: Specifies the prefix length for the IPv6 address, in the range of 0 to 128. The default is 128.
· object-group ipv6-object-group-name: Specifies an IPv6 address object group by its name, a case-insensitive string of 1 to 63 characters.
port { port-list | object-group port-object-group-name }: Specifies port numbers for matching UDP messages.
· port port-list: Specifies a space-separated list of up to 10 port items. Each item specifies a port number or a range of port numbers in the form of port-number1 to port-number2. The value for port-number2 must be greater than or equal to the value for port-number1. The value range for the port-number argument is 1 to 65535. If you do not specify a port list, all port numbers are matched.
· object-group port-object-group-name: Specifies a port object group by its name, a case-insensitive string of 1 to 63 characters.
Usage guidelines
If you specify the destination or source keyword, you must specify the ip-address or port-related option.
If you specify the any keyword, the ip-address option matches either source or destination IP address of packets.
You cannot configure the same match criteria with different match IDs.
A WAAS class can have a maximum of 65535 match criteria. A packet is checked against match criteria in their configuration order. The packet matches the WAAS class if it matches any one of the match criteria.
Examples
# Create a WAAS class named http_class, and configure the class to match UDP messages with source IP address 192.168.0.1/16 and port number 80 or port number in the range of 8000 to 8080.
<Sysname> system-view
[Sysname-waasclass-http_class] match udp source ip-address 192.168.0.1 16 port 80 8000 to 8080
# Create a WAAS class named udp_class, and configure the class to match any UDP messages.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasclass-http_class] match udp any
# Create a WAAS class named http_class, and configure the class to match UDP messages with source IP address 10.0.3.1/24 and destination IP address 11.0.3.1/24.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasclass-http_class] match udp source ip-address 10.0.0.1 24 destination ip-address 11.0.3.1 24
# Create a WAAS class named http_class, and configure the class to match UDP messages with the source IP address in the address object group group1 and the destination IP address in the address object group group2.
<Sysname> system-view
[Sysname] waas class http_class
[Sysname-waasclass-http_class] match udp source ip-address object-group group1 destination ip-address object-group group2
Related commands
display waas rtp-class
waas class
optimize
Use optimize to configure optimization actions for a WAAS class.
Use undo optimize to restore the default.
Syntax
optimize tfo { packet-dup | fec | tfo [ dre | lz ] * }
undo optimize
Default
No optimization actions are configured for a WAAS class.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
packet-dup: Specifies the packet duplication optimization action.
fec: Specifies FEC.
tfo: Specifies TFO.
dre: Specifies DRE.
lz: Specifies LZ compression.
Usage guidelines
An optimization action takes effect only when the corresponding feature is enabled.
An optimization action does not optimize the traffic that matches a blacklist entry.
If you configure both this command and the passthrough command, the most recent configuration takes effect.
Examples
# Configure optimization actions TFO, DRE, and LZ for the WAAS class AFS.
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] optimize tfo dre lz
# Configure optimization action FEC for the WAAS class AFS.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class FEC
[Sysname-waaspolicy-waas_global-AFS] optimize fec
# Configure the packet duplication optimization action for WAAS class PKT.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class PKT
[Sysname-waaspolicy-waas_global-PKT] optimize packet-dup
Related commands
class
display waas policy
passthrough
waas policy
waas tfo optimize dre
waas tfo optimize lz
packet-dup reorder timeout
Use packet-dup reorder timeout to set the packet duplication reorder timeout timer.
Use undo packet-dup reorder timeout to restore the default.
Syntax
packet-dup reorder timeout timeout
undo packet-dup reorder timeout
Default
The packet duplication reorder timeout timer is 100 ms.
Views
WAAS policy class view
Predefined user roles
network-admin
Parameters
timeout: Specifies the packet duplication reorder timeout timer, in the range of 1 to 65535 milliseconds.
Usage guidelines
With the packet reorder feature, the sender numbers the packets to be sent based on the order in which the packets will be sent, for example, 1, 2... n, and then replicates and forwards the packets. The receiver discards the packets with the same sequence number and reorders them before forwarding them. If no packet with a smaller sequence number is received, the receiver will cache the received packets and send the packets in sequence after a packet with a smaller sequence number arrives. If the receiver does not receive a packet with a smaller sequence number before the reorder timeout timer expires, the receiver will directly send the cached packets.
Examples
# Set the packet duplication reorder timeout timer to 100 milliseconds for WAAS class AFS.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] packet-dup reorder timeout 100
packet-dup rir enable
Use packet-dup rir enable to enable packet duplication RIR.
Use undo packet-dup rir enable to disable packet duplication RIR.
Syntax
packet-dup rir enable
undo packet-dup rir enable
Default
Packet duplication RIR is disabled.
Views
WAAS policy class view
Predefined user roles
network-admin
Usage guidelines
With packet duplication RIR enabled, the device selects a path based on the link priority, link quality, and link bandwidth.
Packet duplication RIR takes effect only if RIR is enabled on the device. For more information about RIR, see RIR configuration in Layer 3—IP Routing Configuration Guide.
The sender can select a path by using the packet duplication RIR feature or by using a static path.
· If a path is manually specified on the device and a path calculated by using the packet duplication RIR algorithm exists, the device uses the path selected by using the packet duplication RIR algorithm.
· If the device detects that neither a path selected by using the packet duplication RIR feature nor a manually specified path exists, it selects the first path in the routing table that has the same cost as the original path by using the packet duplication algorithm.
Examples
# Enable packet duplication RIR for WAAS policy class AFS.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] packet-dup rir enable
Related commands
optimize
passthrough
Use passthrough to configure the pass-through action for a WAAS class.
Use undo passthrough to restore the default.
Syntax
passthrough
undo passthrough
Default
The pass-through action is not configured.
Views
WAAS policy class view
Predefined user roles
network-admin
Usage guidelines
The pass-through action allows packets to pass through unoptimized.
If you configure both this command and the optimize command, the most recent configuration takes effect.
Examples
# Configure the pass-through action for the WAAS class AFS.
<Sysname> system-view
[Sysname] waas policy waas_global
[Sysname-waaspolicy-waas_global] class AFS
[Sysname-waaspolicy-waas_global-AFS] optimize tfo dre lz
Related commands
class
display waas policy
optimize
waas policy
reset waas cache dre
Use reset waas cache dre to clear DRE data dictionaries.
Syntax
reset waas cache dre [ peer-id peer-id ]
Views
User view
Predefined user roles
network-admin
Parameters
peer-id peer-id: Specifies a peer device by its bridge MAC address in the format of H-H-H. If you do not specify a peer device, this command clears DRE data dictionaries for all peer devices.
Examples
# Clear the DRE data dictionary for the peer device with the bridge MAC address 0789-445d-effa.
<Sysname> reset waas cache dre peer 0789-445d-effa
Related commands
display waas statistics dre
reset waas statistics dre
Use reset waas statistics dre to clear DRE statistics.
Syntax
reset waas statistics dre [ peer-id peer-id ]
Views
User view
Predefined user roles
network-admin
Parameters
peer-id peer-id: Specifies a peer device by its bridge MAC address in the format of H-H-H. If you do not specify a peer device, this command clears DRE statistics for all peer devices.
Examples
# Clear DRE statistics for all peer devices.
<Sysname> reset waas statistics dre
Related commands
display waas statistics dre
reset waas statistics fec
Use reset waas statistics fec to clear FEC packet statistics.
Syntax
reset waas statistics fec
Views
User view
Predefined user roles
network-admin
Examples
# Clear FEC packet statistics.
<Sysname> reset waas statistics dre
Related commands
display waas statistics fec
reset waas statistics packet-dup
Use reset waas statistics packet-dup to clear packet statistics of packet duplication.
Syntax
reset waas statistics packet-dup { ipv4 | ipv6 }
Views
User view
Predefined user roles
network-admin
Parameters
ipv4: Specifies IPv4 packets.
ipv6: Specifies IPv6 packets.
Examples
# Clear packet statistics of IPv4 packet duplication.
<Sysname> reset waas statistics packet-dup ipv4
Related commands
display waas statistics packet-dup
reset waas tfo auto-discovery blacklist
Use reset waas tfo auto-discovery blacklist to clear all autodiscovered blacklist entries.
Syntax
reset waas tfo auto-discovery blacklist
Views
User view
Predefined user roles
network-admin
Examples
# Clear all autodiscovered blacklist entries.
<Sysname> reset waas tfo auto-discovery blacklist
Related commands
display waas tfo auto-discovery blacklist
waas tfo auto-discovery blacklist enable
waas tfo auto-discovery blacklist hold-time
waas apply policy
Use waas apply policy to apply a WAAS policy to an interface.
Use undo waas apply policy to restore the default.
Syntax
waas apply policy [ policy-name ]
undo waas apply policy
Default
No WAAS policy is applied to an interface.
Views
Interface view
Predefined user roles
network-admin
Parameters
policy-name: Specifies a WAAS policy by its name, a case-insensitive string of 1 to 63 characters. The specified policy must already exist. If you do not specify a WAAS policy, this command applies the system-defined WAAS policy waas_default.
Usage guidelines
Apply a WAAS policy to an interface that connects to the WAN (not an interface that connects to the LAN). The device optimizes or passes through the traffic entering and leaving the WAN according to the configured policy. If the incoming and outgoing interfaces of the traffic are both connected to the WAN, the traffic is not optimized.
A global logical interface (such as a Layer 3 aggregate interface or VLAN interface) that spans multiple cards or IRF member devices can be used to connect to the WAN. To ensure the traffic optimization effect for such an interface, use the service command to specify one of these cards or IRF member devices to forward traffic for the interface.
Examples
# Apply the WAAS policy global_policy to the interface GigabitEthernet 1/0/1.
[Sysname] interface gigabitethernet 1/0/1
[Sysname-GigabitEthernet1/0/1] waas apply policy global_policy
Related commands
display waas policy
display waas status
waas policy
waas asymmetric
Use waas asymmetric to configure WAAS to operate in asymmetric mode.
Use undo waas asymmetric to restore the default.
Syntax
waas asymmetric
undo waas asymmetric
Default
WAAS operates in symmetric mode.
Views
System view
Predefined user roles
network-admin
Usage guidelines
Configure this command if the device sends and receives packets on different interfaces.
If the device sends and receives packets on the same interface, the device should operate in symmetric mode.
If the device uses logical interfaces, such as aggregate interfaces and tunnel interfaces, you must execute this command for WAAS to take effect.
Examples
# Configure WAAS to operate in asymmetric mode.
<Sysname> system-view
[Sysname] waas asymmetric
waas class
Use waas class to create a WAAS class and enter its view, or enter the view of an existing WAAS class.
Use undo waas class to delete a WAAS class.
Syntax
waas class class-name
undo waas class class-name
Default
No WAAS classes exist.
Views
System view
Predefined user roles
network-admin
Parameters
class-name: Specifies a name for the WAAS class, a case-insensitive string of 1 to 63 characters.
Usage guidelines
As a best practice, configure a WAAS class by modifying a system-defined WAAS class (see Table 9).
Examples
# Create a WAAS class named waas_global and enter WAAS class view.
<Sysname> system-view
[Sysname] waas class waas_global
[Sysname-waasclass-waas_global]
Related commands
class
display waas class
waas config remove-all
Use waas config remove-all to delete all WAAS settings.
Syntax
waas config remove-all
Views
System view
Predefined user roles
network-admin
Usage guidelines
This command deletes all configuration data and running data for WAAS and exits the WAAS process.
Examples
# Delete all WAAS settings.
<Sysname> system-view
[Sysname] waas config remove-all
The command will clear all the WAAS configuration. Continue? [Y/N]:y
waas config restore-default
Use waas config restore-default to restore or create the predefined WAAS policy.
Syntax
waas config restore-default
Views
System view
Predefined user roles
network-admin
Usage guidelines
Application scenarios
After the WAAS process starts, perform this task to create predefined WAAS classes and a predefined WAAS policy named waas_default. For predefined WAAS classes, see Table 9.
You can modify the predefined WAAS classes and predefined WAAS policy. After the modification, you can perform this task to restore the predefined WAAS classes and predefined WAAS policy.
Restrictions and guidelines
To successfully execute this command, first start the WAAS process by using a WAAS-related command, such as the waas class command.
To successfully execute this command, make sure none of the interfaces has a WAAS policy applied.
Examples
# Restore or create the predefined WAAS policy.
<Sysname> system-view
[Sysname] waas config restore-default
The command will restore or add the predefined WAAS policy. Continue? [Y/N]:y
Related commands
display waas policy
waas policy
waas dre cache aging
Use waas dre cache aging to set the aging time for entries in the data dictionary.
Use undo waas dre cache aging to restore the default.
Syntax
waas dre cache aging minutes
undo waas dre cache aging
Default
Entries in the data dictionary are not aged out, and the newly created entry overwrites the oldest entry if the number of data dictionary entries reaches the limit.
Views
System view
Predefined user roles
network-admin
Parameters
minutes: Specifies the aging time for entries in the data dictionary, in the range of 10 to 60 minutes.
Usage guidelines
The device polls all data dictionary entries and deletes the entries that are not hit within the aging time. If the number of data dictionary entries reaches the limit, the device no longer creates new entries.
The amount of time used by the device to poll all data dictionary entries depends on the number of data dictionary entries on the device.
You must set the same aging time on the local and peer devices.
Examples
# Set the aging time to 10 minutes for entries in the data dictionary.
<Sysname> system-view
[Sysname] waas dre cache aging 10
waas dre offset-step
Use waas dre offset-step to set the DRE match offset step.
Use undo waas dre offset-step to restore the default.
Syntax
waas dre offset-step { general | fast | fastest | normal }
undo waas dre offset-step
Default
The DRE match offset step is normal.
Views
System view
Predefined user roles
network-admin
Parameters
general: Specifies the DRE match offset step as general.
fast: Specifies the DRE match offset step as fast.
fastest: Specifies the DRE match offset step as fastest.
normal: Specifies the DRE match offset step as normal.
Usage guidelines
The following DRE match offset step levels are listed from high to low:
· fastest.
· fast.
· general.
· normal.
The higher the step level, the lower the match precision. As a best practice, use a higher-level offset step on high-speed links to improve match efficiency. Use a lower-level offset step on low-speed links to ensure match precision.
Examples
# Set the DRE match offset step to fast.
<Sysname> system-view
[Sysname] waas dre offset-step fast
waas policy
Use waas policy to create a WAAS policy and enter its view, or enter the view of an existing WAAS policy.
Use undo waas policy to delete a WAAS policy.
Syntax
waas policy policy-name
undo waas policy policy-name
Default
A predefined WAAS policy named waas_default exists.
Views
System view
Predefined user roles
network-admin
Parameters
policy-name: Specifies a name for the WAAS policy, a case-insensitive string of 1 to 63 characters.
Usage guidelines
To delete a WAAS policy applied to an interface, first remove the WAAS policy from the interface.
As a best practice, configure a WAAS policy by entering the system-defined WAAS policy view and modifying the system-defined WAAS policy. The system-defined WAAS policy uses all system-defined WAAS classes. Only system-defined WAAS classes FTP-Data and FTPS-Data use source ports as match options. All other system-defined WAAS classes use destination ports as match options.
Table 9 System-defined WAAS policy
WAAS actions |
Source ports |
Destination ports |
|
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
3200–3219, 3221–3224, 3226–3267, 3270–3282, 3284–3305, 3307–3388, 3390–3399, 3600–3659, 3662–3699 |
||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
Passthrough |
N/A |
||
N/A |
|||
N/A |
|||
Passthrough |
N/A |
Examples
# Enter system-defined WAAS policy view.
<Sysname> system-view
[Sysname] waas policy waas_default
[Sysname-waaspolicy-waas_default]
Related commands
display waas policy
waas tfo auto-discovery blacklist enable
Use waas tfo auto-discovery blacklist enable to enable the TFO blacklist autodiscovery feature.
Use undo waas tfo auto-discovery blacklist enable to disable the TFO blacklist autodiscovery feature.
Syntax
waas tfo auto-discovery blacklist enable
undo waas tfo auto-discovery blacklist enable
Default
The TFO blacklist autodiscovery feature is disabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
This feature automatically discovers servers that cannot receive TCP packets with options and adds the server IP addresses and port numbers to a blacklist.
During the 3-way handshake, the local device considers the TCP connection attempt failed if either of the following situations occurs:
· The peer device does not respond within the specified time period.
· The peer device closes the TCP connection.
Examples
# Enable the TFO blacklist autodiscovery feature.
[Sysname] waas tfo auto-discovery blacklist enable
Related commands
display waas tfo auto-discovery blacklist
waas tfo auto-discovery blacklist hold-time
Use waas tfo auto-discovery blacklist hold-time to set the aging time for autodiscovered blacklist entries.
Use undo waas tfo auto-discovery blacklist hold-time to restore the default.
Syntax
waas tfo auto-discovery blacklist hold-time minutes
undo waas tfo auto-discovery blacklist hold-time
Default
The aging time for autodiscovery blacklist entries is 5 minutes.
Views
System view
Predefined user roles
network-admin
Parameters
minutes: Specifies the aging time for autodiscovered blacklist entries, in the range of 1 to 10080 minutes.
Usage guidelines
An aging timer is started when a blacklist entry is created. The system automatically deletes an autodiscovered blacklist entry to make room for a new blacklist entry when the aging timer expires.
Examples
# Set the aging time to 30 minutes for autodiscovered blacklist entries.
<Sysname> system-view
[Sysname] waas tfo auto-discovery blacklist hold-time 30
Related commands
display waas tfo auto-discovery blacklist
waas tfo auto-discovery blacklist enable
waas tfo base-congestion-window
Use waas tfo base-congestion-window to set the initial congestion window size for slow start.
Use undo waas tfo base-congestion-window to restore the default.
Syntax
waas tfo base-congestion-window segments
undo waas tfo base-congestion-window
Default
The initial congestion window size is two TCP segments.
Views
System view
Predefined user roles
network-admin
Parameters
segments: Specifies the initial congestion window size in the range of 1 to 10 TCP segments.
Usage guidelines
The congestion window size changes with the congestion status and transmission speed. An appropriate initial congestion window size can quickly restore the network to its full transmission capacity after congestion occurs.
Examples
# Set the initial congestion window size to three segments.
<Sysname> system-view
[Sysname] waas tfo base-congestion-window 3
waas tfo congestion-method
Use waas tfo congestion-method to specify a TCP congestion control algorithm for the WAN side.
Use undo waas tfo congestion-method to restore the default.
Syntax
waas tfo congestion-method { bbrv1 | bbrv2 | bic | reno }
undo waas tfo congestion-method
Default
WAAS uses BIC as the TCP congestion control algorithm on the WAN side.
Views
System view
Predefined user roles
network-admin
Parameters
bbrv1: Specifies BBRv1 as the TCP congestion control algorithm.
bbrv2: Specifies BBRv2 as the TCP congestion control algorithm.
bic: Specifies BIC as the TCP congestion control algorithm.
reno: Specifies Reno as the TCP congestion control algorithm.
Usage guidelines
Different TCP congestion control algorithms have the following characteristics.
· Reno—As a best practice, use this algorithm in a scenario with low packet loss ratio, low bandwidth, and low requirements for latency. Reno uses packet loss to detect network congestion, and it cannot distinguish between random errors and congestion loss. The congestion window size is cut in half when packet loss is detected, and the congestion window size is increased linearly. This algorithm does not actively decrease the sending rate only if no packet loss occurs. However, the congestion window takes a long time to reach the maximum value and so the bandwidth is reduced in the scenario with high latency and high bandwidth.
· BIC—Binary increase congestion control. As a best practice, use this algorithm in the scenario with low packet loss ratio, high bandwidth, and low requirements for latency. BIC also uses packet loss to detect network congestion, and it cannot distinguish between random errors and congestion loss. When packet loss is detected, the congestion window size is cut in half. BIC tries to find the maximum congestion window (CWND) by binary search increase and additive increase. BIC provides faster convergence than Reno.
· BBR—Bottleneck Bandwidth and Round-trip propagation time. As a best practice, use this algorithm in the scenario with certain packet loss ratio, high bandwidth, and high requirements for latency. BBR does not use packet loss to detect network congestion. Instead, BBR calculates the congestion window and sending rate according to the periodically detected latency and bandwidth, so BIC can send packets smoothly. Compared with Reno and BIC, BBR provides faster convergence, higher packet loss avoidance capabilities, lower queuing latency, and higher bandwidth usage and throughput.
Examples
# Specify Reno as the TCP congestion control algorithm for the WAN side.
<Sysname> system-view
[Sysname] waas tfo congestion-method reno
waas tfo connect-limit
Use waas tfo connect-limit to set the maximum number of concurrent connections.
Use undo waas tfo connect-limit to restore the default.
Syntax
waas tfo connect-limit limit
undo waas tfo connect-limit
Default
The maximum number of concurrent connections is 10000.
Views
System view
Predefined user roles
network-admin
Parameters
limit: Specifies the maximum number of concurrent connections, in the range of 1000 to 4294967295.
Usage guidelines
After the maximum number of concurrent connections is reached, WAAS does not optimize traffic for newly established connections. Configure the maximum number of concurrent connections according to your available memory resources, because optimizing TCP flows consumes memory resources.
You must set the same maximum number of concurrent connections on the local and peer devices.
Examples
# Set the maximum number of concurrent connections to 20000.
<Sysname> system-view
[Sysname] waas tfo connect-limit 20000
waas tfo keepalive
Use waas tfo keepalive to enable TFO keepalives.
Use undo waas tfo keepalive to disable TFO keepalives.
Syntax
waas tfo keepalive
undo waas tfo keepalive
Default
TFO keepalives are enabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
After you enable TFO keepalives, the system starts the 2-hour TCP keepalive timer. If the local device does not send or receive any data when the timer expires, it sends a keepalive to the peer to maintain the connection.
Examples
# Disable TFO keepalives.
<Sysname> system-view
[Sysname] undo waas tfo keepalive
waas tfo optimize dre
Use waas tfo optimize dre to enable DRE.
Use undo waas tfo optimize dre to disable DRE.
Syntax
waas tfo optimize dre
undo waas tfo optimize dre
Default
DRE is enabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
The DRE optimization action configured in a WAAS policy takes effect only when DRE is enabled.
Examples
# Disable DRE.
<Sysname> system-view
[Sysname] undo waas tfo optimize dre
Related commands
display waas status
waas tfo optimize lz
Use waas tfo optimize lz to enable LZ compression.
Use undo waas tfo optimize lz to disable LZ compression.
Syntax
waas tfo optimize lz
undo waas tfo optimize lz
Default
LZ compression is enabled.
Views
System view
Predefined user roles
network-admin
Usage guidelines
The LZ optimization action configured in a WAAS policy takes effect only when LZ compression is enabled.
Examples
# Disable LZ compression.
<Sysname> system-view
[Sysname] undo waas tfo optimize lz
Related commands
display waas status
waas tfo receive-buffer
Use waas tfo receive-buffer to set the TFO receiving buffer size.
Use undo waas tfo receive-buffer to restore the default.
Syntax
waas tfo receive-buffer buffer-size
undo waas tfo receive-buffer
Default
The TFO receiving buffer size is 64 KB.
Views
System view
Predefined user roles
network-admin
Parameters
buffer-size: Specifies the TFO receiving buffer size in the range of 32 to 16384 KB.
Usage guidelines
The TFO receiving buffer size affects network throughput.
Examples
# Set the TFO receiving buffer size to 1024 KB.
<Sysname> system-view
[Sysname] waas tfo receive-buffer 1024