Troubleshooting guide

1-3
Cisco Wide Area Application Services Configuration Guide
OL-26579-01
Chapter 1 Planning Your WAAS Network
Checklist for Planning Your WAAS Network
For security purposes, plan to change the predefined password for the predefined superuser account
immediately after you have completed the initial configuration of a WAE. For more information, see
“WAAS Login Authentication and Authorization” section on page 1-26.
Determine if you need to create any additional administrative accounts for a WAAS device. For more
information, see Chapter 1, “Creating and Managing Administrator User Accounts and Groups.
Determine if you should group your WAEs into logical groups. For more information, see the
“Logically Grouping Your WAEs” section on page 1-27.
Determine which management access method to use. By default, Telnet is used but SSH may be the
preferred method in certain deployments. For more information, see the “Configuring Login Access
Control Settings for WAAS Devices” section on page 1-7.
3. Plan for application optimization as follows:
Determine and resolve router interoperability issues (for example, the supported hardware and
software versions, router performance with interception enabled). For more information, see the
“Site and Network Planning” section on page 1-4.
Determine the appropriate interception location when the data center or branch office is complex
(for example, if your existing network uses a hierarchical topology).
Determine which WAAS services to deploy. For more information about the different WAAS
services, see Chapter 1, “Introduction to Cisco WAAS.
Determine which WAAS software licenses to install. Software licenses enable specific WAAS
services. For more information about installing software licenses, see the “Managing Software
Licenses” section on page 1-3.
Determine which traffic interception methods to use in your WAAS network (for example, inline
mode, WCCP Version 2, or policy-based routing (PBR)). For more information, see the “Supported
Methods of Traffic Redirection” section on page 1-19.
Note WCCP works only with IPv4 networks.
If you plan to use the WCCP TCP promiscuous mode service as a traffic interception method,
determine whether you should use IP access control lists (ACLs) on your routers.
Note IP ACLs that are defined on a router take precedence over the ACLs that are defined on the
WAE. For more information, see the Access Lists on Routers and WAEs” section on
page 1-25.
Determine whether you need to define IP ACLs or interception ACLs on the WAEs. For more
information, see the Access Lists on Routers and WAEs” section on page 1-25.
Note ACLs that are defined on a WAE take precedence over the WAAS application definition
policies that are defined on the WAE.
If PBR is to be used, determine which PBR method to use to verify PBR next-hop availability for
your WAEs. For more information, see the “Methods of Verifying PBR Next-Hop Availability”
section on page 1-39.