Chapter 2. Cisco Wide Area Application Engine (WAE) Family

Chapter 1 introduced the performance challenges created by the WAN and how they are addressed by the Cisco Wide Area Application Services (WAAS) solution. Cisco WAAS is a software component that is resident on a hardware device deployed at each location with users and servers. This hardware device, which can be deployed as a router-integrated network module for the Integrated Services Router (ISR) or as an appliance, is called the Cisco Wide Area Application Engine (WAE). This chapter provides an introduction to the Cisco WAE family, along with an in-depth examination of the hardware and software architecture. This chapter also looks at the licensing options for Cisco WAAS, positioning for each of the WAE platforms, and performance and scalability metrics for each of the platforms.

Cisco WAE Product Architecture

The Cisco WAE product family consists of a series of appliances and router-integrated network modules that are based on an Intel x86 hardware architecture. The product family scales from 512 MB of memory to 24 GB of memory, utilizing single-processor subsystems up to dual quad-core processor subsystems. Each Cisco WAE device, regardless of form factor, is configured with some amount of hard disk storage and a compact flash card. The compact flash card is used for boot-time operation and configuration files, whereas the hard disk storage is used for optimization data, swap space, and as a repository for spawning the operating system. Having a compact flash card allows the WAE device to remain accessible on the network even in the face of an entire hard disk subsystem failure. Also, by using the compact flash card in this way, a WAE device can successfully boot and become accessible on the network if no disks are available.

The foundational layer of the Cisco WAAS software is the underlying Cisco Linux platform. The Cisco Linux platform is hardened to ensure that rogue services are not installed, and secured such that third-party software or other changes cannot be made to the kernel. The Cisco Linux platform hosts a command-line interface (CLI) similar to that of Cisco IOS, which, along with the Central Manager and other interfaces, is the primary means of configuring, managing, and troubleshooting a device or system. All relevant configuration, management, monitoring, and troubleshooting subsystems are made accessible directly through this CLI as opposed to exposing the Linux shell.

The Cisco Linux platform hosts a variety of services for WAAS runtime operation. These include disk encryption, Central Management Subsystem (CMS), interface manager, reporting facilities, network interception and bypass, and Application Traffic Policy (ATP) engine, as shown in Figure 2-1.

Cisco WAAS Hardware and Software Architecture

Figure 2-1. Cisco WAAS Hardware and Software Architecture

The following sections examine each of the Cisco WAE and Cisco Linux architecture items in turn. Cisco WAAS optimization components, including Data Redundancy Elimination (DRE), Persistent LZ Compression (PLZ), Transport Flow Optimization (TFO), and application acceleration, are discussed in detail in Chapter 1, and thus are not discussed in this chapter.

Disk Encryption

Cisco WAE devices can be configured to encrypt the data, swap, and spool partitions on the hard disk drives using encryption keys that are stored on and retrieved from the Central Manager. The disk encryption feature uses AES-256 encryption, the strongest commercially available encryption, and keys are only stored in the WAE memory. Should a WAE be physically compromised or a disk stolen, power is removed from the device, which destroys the copy of the key in memory. This renders data on the disk useless. Keys are stored in the Central Manager database and synchronized among Central Manager WAEs for high availability. If a WAE device is not able to retrieve its key from the Central Manager during boot time, it remains in pass-through mode until connectivity is restored or disk encryption is administratively bypassed.

Central Management Subsystem

CMS is a process that runs on each WAE device, including accelerators and Central Managers. This process manages the configuration and monitoring components of a WAE and ensures that each WAE is synchronized with the Central Manager based on a scheduler known as the Local Central Manager (LCM) cycle. The LCM cycle is responsible for synchronizing the Central Manager CMS process with the remote WAE CMS process to exchange configuration data, fetch health and status information, and gather monitoring and reporting data. The CMS process is also tied to the available management interfaces. For instance, the CMS process on the Central Manager must be running before the secure web user interface is made available (if it weren’t, there wouldn’t be much to show).

Interface Manager

The Cisco WAE interface manager manages the physical and logical interfaces that are available to the WAE. Each WAE includes two integrated Gigabit Ethernet interfaces (including the WAE network modules, one interface is internal, the other is external). Each WAE appliance has expansion slots to support one or more additional feature cards, such as the inline bypass adapter, which has two two-port fail-to-wire pairs. The interface manager also provides management over logical interfaces that can be configured over physical interfaces. Logical interfaces include active/standby interfaces, where one physical interface is used as a primary interface and a second interface is used as a backup in the event the primary interface fails. Another logical interface is the PortChannel interface, which can be used to team WAE interfaces together for the purposes of high availability and load balancing. It should be noted that active/standby interfaces are used when WAE interfaces connect to separate switches, whereas PortChannel interfaces are used when the WAE interfaces connect to the same switch.

Reporting Facilities

Cisco Linux provides an interface for the Cisco WAAS software to use for purposes of reporting and generating alarms. Cisco Linux supports the Simple Network Management Protocol (SNMP) versions 1, 2c, and 3, as well as definition of up to four syslog servers.

Network Interception and Bypass Manager

The network interception and bypass manager is used by the Cisco WAE to establish relationships with intercepting devices where necessary and ensure low-latency bypass of traffic that the WAE is not intended to handle. The Web Cache Coordination Protocol version 2 (WCCPv2) is a protocol managed by the network interception and bypass manager to allow the WAE to successfully join a WCCPv2 service group with one or more adjacent routers, switches, or other WCCPv2-capable server devices. WCCPv2 is discussed in more detail in Chapter 4, “Network Integration and Interception”. Other network interception options, which are also discussed in Chapter 4, include policy-based routing (PBR), physical inline interception, and Application Control Engine (ACE). As flows are intercepted by the WAE and determined to be optimization candidates, they are handed to the Application Traffic Policy (ATP) engine, which is discussed in the next section.

Application Traffic Policy Engine

While the foundational platform component of Cisco WAAS is Cisco Linux, the foundational optimization layer of the Cisco WAAS software (which is as much a component of the Cisco Linux platform as it is the software) is the ATP engine. The ATP is responsible for examining details of each incoming flow (after being handled by the interception and bypass mechanisms) in an attempt to identify the application or protocol associated with the flow. This association is done by comparing the packet headers against a set of predefined or administratively configured classifiers, each with its own set of one or more match conditions. Flows that do not have a match with an existing classifier are considered “other” traffic and are handled according to the policy defined for other traffic.

When a classifier match is found, the ATP examines the policy configuration for that classifier to determine how to optimize the flow. The ATP also notes the application group that the classifier belongs to in order to route statistics gathered to the appropriate application group for proper reporting. The configured policy dictates which optimization subsystems are enacted upon the flow. The list of optimization actions that can be configured within a policy include the following:

  • Pass-throughThis traffic should not be optimized by Cisco WAAS.

  • TFO onlyApply only TCP optimization.

  • TFO+LZApply TCP optimization in conjunction with PLZ.

  • TFO+DREApply TCP optimization in conjunction with DRE.

  • Full optimizationApply TCP optimization, PLZ, and DRE.

  • AcceleratorFirst route the flow through a specific application acceleration component for latency optimization and other techniques. This policy is applicable for traffic using a protocol that has an associated application accelerator, such as Common Internet File System (CIFS). This list will be extended in releases beyond v4.0.13.

Policies from the preceding list can be employed in conjunction with one another. For instance, the CIFS policy is, by default, configured to leverage the CIFS accelerator prior to leveraging the “full optimization” (DRE, PLZ, TFO) capabilities of the underlying WAN optimization layer. This is defined in a single policy, thereby simplifying overall system policy management. Classifiers within the ATP can be defined based on source or destination IP addresses or TCP port numbers, or ranges of these values. The ATP is examined during the establishment of a new connection when a TCP synchronize (SYN) packet is seen. By making a comparison against the ATP using the SYN packet of the connection being established, the ATP does not need to be consulted for traffic flowing in the reverse direction. Classification performed by the ATP is done once against the SYN packet and is applicable for both directions of traffic flow. In this way, classification does not need to be performed for traffic flowing in the reverse direction.

Figure 2-2 shows how the ATP engine interacts with a flow and a particular policy.

Connection Interaction with Application Traffic Policy

Figure 2-2. Connection Interaction with Application Traffic Policy

Hardware Family

The Cisco WAE hardware family consists of five appliances and three router-integrated network modules. With such a diverse hardware portfolio, Cisco WAAS can be deployed in each location with the appropriate amount of optimization capacity for the needs of the users or servers in that particular location. This section examines the specifics of each of the hardware platforms and positioning of each. Performance and scalability metrics for each are examined later in this chapter.

Router-Integrated Network Modules

The Cisco WAE router-integrated network modules are designed to provide optimization services for the remote branch office or enterprise edge. These modules, which are single-processor systems based on the Network Module Enhanced (NME) hardware, can occupy an open NME-capable slot in a Cisco Integrated Services Router (ISR), including models 2811, 2821, 2851, 3825, and 3845. The ISR is an ideal platform for the branch office in that it provides a converged service platform for the remote office, including routing, switching, wireless, voice, security, and WAN optimization in a single chassis (platform, software version, and slot capacity dependent). Figure 2-3 shows a picture of the Cisco NME-WAE family and the ISR family.

Cisco ISR Family and WAAS Network Modules

Figure 2-3. Cisco ISR Family and WAAS Network Modules

The Cisco NME-WAE family includes three models: the NME-WAE-302, NME-WAE-502, and NME-WAE-522. Each network module has a single hard disk with capacity ranging from 80 to 160 GB. With only a single drive, the NME-WAE is not capable of RAID. NME-WAE devices integrate into the network using WCCPv2 as a means of interception (PBR can also be used, but WCCPv2 is preferred). Each NME-WAE has two network interfaces—one internal (connected to the ISR backplane) and one external (accessible through the front of the module). Figure 2-4 shows the architecture of the NME, internal and external interfaces, and intersection points between the NME and the ISR.

Cisco WAAS Network Module Architecture

Figure 2-4. Cisco WAAS Network Module Architecture

NME-WAE Model 302

The Cisco NME-WAE model 302 (NME-WAE-302) is designed for customers that want to employ only basic WAN optimization capabilities, which are permitted through the use of the Transport license (licensing is discussed later in this chapter). These capabilities include the ATP engine, DRE, PLZ, and TFO. This module is not capable of running the advanced services enabled by the Enterprise license (discussed later in the chapter), including application layer acceleration or disk encryption. The NME-WAE-302 is a single-processor system with 512 MB of RAM and a single 80-GB hard disk.

NME-WAE Model 502

The Cisco NME-WAE model 502 (NME-WAE-502) is designed for customers that want to employ WAN optimization capabilities and some of the Enterprise license features for an enterprise edge location. The NME-WAE-502 can be configured with the Enterprise license, providing full WAN optimization functionality and all edge application acceleration functionality. The NME-WAE-502 is a single-processor system with 1 GB of RAM and a single 120-GB hard disk. The NME-WAE-502 is capable of supporting a larger number of users than the NME-WAE-302, as discussed in the “Performance and Scalability Metrics” section later in this chapter.

NME-WAE Model 522

The Cisco NME-WAE model 522 (NME-WAE-522) is designed for customers that want to employ appliance-equivalent functionality to an enterprise edge location. The NME-WAE-522 supports the full suite of Enterprise license features, including all WAN optimization and application acceleration capabilities as either a core or edge device. The NME-WAE-522 is a single-processor system with 2 GB of RAM and a 160-GB hard disk, serving as the most powerful network module available as of this writing.

Appliances

The Cisco WAE appliance family is designed to be deployed in a location of any size, including the small branch office, campus networks, or the largest of enterprise data center networks. The Cisco WAE appliance family includes models 512, 612, 7326, 7341, and 7371. Each WAE appliance has externally accessible hard disk drives and RAID (some models support hot-swappable disk drives). The WAE appliance has two built-in Gigabit Ethernet interfaces, which can be deployed independently of one another or as a pair in either an active/standby configuration or PortChannel configuration. Such interface configurations are discussed in Chapter 5, “Branch Office Network Integration,” and Chapter 6, “Data Center Network Integration”. The WAE appliance family also has one or more PCI expansion slots that support installation of additional feature cards, such as the in-path card. Each WAE appliance can be deployed using a variety of network interception techniques, including physical inline interception, WCCPv2, PBR, and ACE (all of which are described in Chapter 4). Any appliance model can be used as a core or edge device. Figure 2-5 shows an image of the Cisco WAE appliance family.

Cisco WAAS Appliance Family

Figure 2-5. Cisco WAAS Appliance Family

WAE Model 512

The Cisco WAE model 512 (WAE-512) is a single-processor system that is designed for deployment in small and medium-sized branch office locations or small data center locations. The WAE-512 can be configured with 1 or 2 GB of RAM. In a 1-GB RAM configuration, the WAE-512 can provide full WAN optimization, edge application acceleration, and advanced services capabilities, whereas with 2 GB of RAM, the WAE-512 can be configured with any feature. Regardless of memory configuration, the WAE-512 can be configured with the Transport or Enterprise license. The WAE-512 supports two 250-GB SATA2 hard disk drives, which are configured automatically for software RAID-1.

WAE Model 612

The Cisco WAE model 612 (WAE-612) is a dual-core processor system that is designed for deployment in medium-sized branch office locations or medium-sized data center locations. The WAE-612 can be configured with 2 GB or 4 GB of RAM and, in any configuration, supports the full breadth of features and capabilities offered by any available Cisco WAAS license. The WAE-612 supports two 300-GB or 750-GB SAS hard disk drives, which are configured automatically for software RAID-1.

WAE Model 7326

The Cisco WAE model 7326 (WAE-7326) is a dual processor system that is designed for deployment in large branch office locations or large data center locations. The WAE-7326 includes 4 GB of RAM and up to six 300-GB SAS hard disk drives, which are configured automatically for software RAID-1. Each pair of drives is configured in a RAID-1 mirror, totaling three RAID-1 pairs when the WAE-7326 is fully populated with disk drives. The WAE-7326 supports the full breadth of features and capabilities offered by any available Cisco WAAS license.

WAE Model 7341

The Cisco WAE model 7341 (WAE-7341) is a quad-core system (four processors) that is designed for deployment in large to enterprise data centers. The WAE-7341 includes 12 GB of RAM and four 300-GB SAS hard disk drives, which are configured automatically for hardware RAID-5. The WAE-7341 supports the full breadth of features and capabilities offered by any available Cisco WAAS license.

WAE Model 7371

The Cisco WAE model 7371 (WAE-7371) is a dual quad-core system (eight processors) that is designed for deployment in the largest of enterprise data centers and under the most demanding conditions. The WAE-7371 includes 24 GB of RAM and six 300-GB SAS hard disk drives, which are configured automatically for hardware RAID-5. The WAE-7371 supports the full breadth of features and capabilities offered by any of the available Cisco WAAS licenses.

Licensing

Each Cisco WAE device, whether it is an appliance or a router-integrated network module, must be configured with a license. This license dictates what features are permitted to be configured on a WAE device. Three licenses exist for Cisco WAAS:

  • Transport licenseAllows a WAE to apply only basic WAN optimization capabilities to a particular flow. It supports use of TFO, DRE, and PLZ. WAE devices configured with the Transport license cannot provide application-acceleration capabilities or disk encryption. WAE devices configured with the Transport license can, however, register with and be managed and monitored by a Central Manager WAE.

  • Enterprise licenseAllows a WAE to apply all of the WAN optimization provided by the Transport license and all of the application acceleration functionality and disk encryption. Like the Transport license, WAE devices configured with the Enterprise license can register with and be managed and monitored by a Central Manager WAE.

  • Central Manager licenseAllows a WAE to be configured as a Central Manager WAE. A WAE configured as a Central Manager acts as the owner and manager for configuration and monitoring data, and for disk encryption keys. Although most Central Manager deployments involve two WAE devices (one active and one standby), multiple standby Central Manager WAEs can be deployed in a given Cisco WAAS network.

Performance and Scalability Metrics

Design of a Cisco WAAS solution involves many factors, but the cornerstone of the solution design is based on the performance and scalability metrics required for the solution as a whole and for each individual location. Every component in an end-to-end system has a series of static and dynamic system limits. For instance, a server may be limited in terms of the number of connections it can support, disk I/O throughput, or network throughput. Likewise, each Cisco WAE device has static and dynamic system limits that dictate how and when a particular WAE device is selected for a location within an end-to-end design. This section examines the performance and scalability metrics of the Cisco WAE family, and provides a definition of what each item is and how it is relevant to a localized (per location) design and an end-to-end system design.

Each Cisco WAE device has a series of associated static and dynamic limits. These limits are used as a means of identifying which device is best suited to provide services to a particular location in the network. The device may be deployed as an edge device, where it connects to potentially many peer devices in one or more data center locations, or as a core device, where it serves as an aggregation point for many connected edges. WAEs can also be deployed as devices to optimize links between data center locations, where each side is realistically a core device. A fundamental understanding of the performance and scalability metrics is paramount in ensuring a sound design. This section examines each of the performance and scalability system limits, both static and dynamic, that should be considered. These include device memory, disk capacity, number of optimized TCP connections, WAN bandwidth and LAN throughput, number of peers and fan-out, and number of devices managed.

Device Memory

The amount of memory installed in a device dictates the level of performance and scalability the device can provide. As the memory capacity increases, the ability of a WAE to handle a larger number of connections or a larger addressable index space for compression also increases. Having larger amounts of memory also enables the WAE to run additional services, such as application acceleration or disk encryption, and positions the device to accept additional features that may be introduced in future software releases.

The NME-WAE family members all have fixed memory capacity and cannot be upgraded. From the WAE appliance family, the WAE-7326, 7341, and 7371 have fixed memory configurations. The WAE-512 and WAE-612, however, have configurable memory options, in that the WAE-512 can be configured with 1 GB or 2 GB of memory, and the WAE-612 can be configured with 2 GB or 4 GB of memory.

The amount of installed memory directly impacts what license is supported on each of the WAE models. The Transport license can be configured on any WAE model that has 512 MB of memory or more, which includes the entire product family. WAE models that have 1 GB of memory or more can be configured with the Enterprise license, which allows the WAE to operate some or all of the Enterprise license features. 1-GB WAE models configured with the Enterprise license (that is, NME-WAE-502 and WAE-512-1GB) can use disk encryption and perform application acceleration for CIFS as an edge device but not as a core device, but can terminate WAN optimized connections as a core device. WAE models with 2 GB or more (including the NME-WAE-522, WAE-512-2GB, WAE-612, WAE-7326, WAE-7341, and WAE-7371) can run the full suite of Enterprise license features as either a core or edge device.

Disk Capacity

Optimization services within the Cisco WAE leverage both memory and disk. From a disk perspective, the larger the amount of available capacity, the larger the amount of optimization history that can be leveraged by the WAE during run-time operation. For instance, a WAE-502 has 120 GB of physical disk capacity, of which 47 GB is available for use by DRE for compression history. With 47 GB of compression history, one can estimate the length of the compression history given WAN conditions, expected network utilization, and assumed redundancy levels.

Table 2-1 shows how the length of the compression history can be calculated for a particular WAE device, along with an example. This example assumes a T1 WAN that is 75 percent utilized during business hours (8 hours per day) and 50 percent utilized during nonbusiness hours (16 hours per day), and assumes that data traversing the network is 75 percent redundant. This table also assumes an NME-WAE-502 with 50 GB of allocated capacity for DRE compression history.

Table 2-1. Calculating Compression History

Step

Action

Example Result

1

Convert WAN capacity to bytes (divide by 8)

(T1 = 1.544 Mbps) / 8 = 193 KB/sec

2

Identify maximum WAN throughput for a given day

193 KB/sec × 60 sec/min

11.58 MB/min × 60 min/hr

694.8 MB/hr × 24 hr/day

Total 16.68 GB/day

3

Identify WAN throughput given utilization

(694.8 MB/hr × 8 hours) × 75% utilization = 4.168 GB

(694.8 MB/hr × 16 hours) × 50% utilization = 5.56 GB

Total = 9.72 GB/day

4

Identify WAN throughput given utilization and expected redundancy

9.72 GB/day × .25 (as .75 is 75% redundancy) = 2.43 GB/day

5

Calculate compression history

Storage capacity of unit divided by daily throughput

47 GB / 2.43 GB/day = 19.3 days of history

It is generally recommended that at minimum ten days of compression history be available in a WAE device. In the example in Table 2-1, the NME-WAE-502 contains enough storage capacity to provide an effective compression history of almost three weeks.

The disk capacity available to a WAE device is split among four major components:

  • DRE compression historyThis capacity is used for storing DRE chunk data and signatures.

  • CIFS accelerationThis capacity is preallocated on all devices, and used when a WAE is configured as a CIFS edge device (requires Enterprise license).

  • Print servicesThis capacity is preallocated for print spool capacity. Print services require that the Enterprise license be configured and that CIFS edge services be configured.

  • Platform servicesThis capacity is preallocated for operating system image storage, log files, and swap space.

Table 2-2 shows the storage allocation for each WAE device for each of these components.

Table 2-2. Disk Capacity Allocation per Platform

Platform

Total Capacity (Usable Capacity)

DRE

CIFS

Print

Platform

Network Modules

302

80 GB (79 GB)

55 GB

0 GB

1 GB

23 GB

502

120 GB (118 GB)

47 GB

47 GB

1 GB

23 GB

522

160 GB (158 GB)

67 GB

67 GB

1 GB

23 GB

Appliances

512-1GB

250 GB (209 GB) RAID-1

75 GB

110 GB

1 GB

23 GB

512-2GB

250 GB (244 GB) RAID-1

110 GB

110 GB

1 GB

23 GB

612-2GB

300 GB (284 GB) RAID-1

130 GB

130 GB

1 GB

23 GB

612-4GB

300 GB (284 GB) RAID-1

130 GB

130 GB

1 GB

23 GB

7326

900 GB (704 GB) RAID-1

380 GB

300 GB

1 GB

23 GB

7341

900 GB (824 GB) RAID-5

500 GB

300 GB

1 GB

23 GB

7371

1500 GB (1324 GB) RAID-5

1 TB

300 GB

1 GB

23 GB

Number of Optimized TCP Connections

Each WAE device has a static number of TCP connections that can be optimized concurrently. Each TCP connection is allocated resources within the system, and if the concurrently optimized TCP connection static limit is met, additional connections are handled in a pass-through fashion. The TCP connection limit of each WAE can be roughly correlated to the number of users supported by a given WAE model, but note that the number of TCP connections open on a particular node may vary based on user productivity, application behavior, time of day, and other factors. It is commonly assumed that a user will have 5 to 15 connections open at any given time, with roughly 4 to 7 of those connections requiring optimization. If necessary, policies can be adjusted on the WAAS Central Manager to pass through certain applications that may realize only a small amount of benefit from WAAS. This type of change could potentially help increase the number of users that can be supported by a particular WAE device.

Table 2-3 shows the optimized TCP connection capacity per Cisco WAE model.

Table 2-3. Optimized TCP Connection Capacity per Platform

Network Module

Connection Capacity

Appliance

Connection Capacity

302

250

512-1GB

750

502

500

512-2GB

1500

522

800

612-2GB

2000

  

612-4GB

6000

  

7326

7500

  

7341

12,000

  

7371

50,000

WAN Bandwidth and LAN Throughput

WAE devices are not restricted in software or hardware in terms of the amount of WAN bandwidth or LAN throughput supported. However, recommendations are in place to specify which WAE should be considered for a specific WAN environment. WAN bandwidth is defined as the amount of WAN capacity that the WAE can fully utilize when employing the full suite of optimization capabilities (this includes DRE and PLZ). LAN throughput is defined as the maximum amount of application layer throughput (precompression) that can be achieved with the particular WAE model and an equivalent or more-powerful peer deployed in the path.

Another factor is for deployments where the WAE is providing TCP optimization only. Cisco WAAS TFO provides a powerful suite of optimizations to better allow communicating nodes to “fill the pipe” (that is, fully leverage available WAN bandwidth capacity) when the application protocol is not restricting throughput due to application-induced latency. Each Cisco WAE has a TFO-only throughput capacity that can be considered when WAEs are deployed strictly for TCP optimization only (compression and other optimizations are not being applied).

Table 2-4 shows the WAN bandwidth supported by each WAE model and the maximum LAN-side throughput and TFO-only throughput capacity.

Table 2-4. WAN Bandwidth and LAN Throughput Capacity per WAE

WAE Model

WAN Supported

LAN Throughput Maximum

TFO-Only Throughput Maximum

NME-WAE-302

4 Mbps

90 Mbps

100 Mbps

NME-WAE-502

4 Mbps

150 Mbps

150 Mbps

NME-WAE-522

8 Mbps

150 Mbps

250 Mbps

WAE-512-1GB

8 Mbps

100 Mbps

350 Mbps

WAE-512-2GB

20 Mbps

150 Mbps

400 Mbps

WAE-612-2GB

45 Mbps

250 Mbps

450 Mbps

WAE-612-4GB

90 Mbps

350 Mbps

500 Mbps

WAE-7326

155 Mbps

450 Mbps

600 Mbps

WAE-7341

310 Mbps

600 Mbps

800 Mbps

WAE-7371

1 Gbps

>1 Gbps

>1 Gbps

Number of Peers and Fan-Out

Each Cisco WAE has a static system limit in terms of the number of concurrent peers it can actively communicate with at any one given time. When designing for a particular location where the number of peers exceeds the maximum capacity of an individual device, multiple devices can be deployed, assuming an interception mechanism that uses load balancing is employed (such as WCCPv2 or ACE; these are discussed in Chapter 4). In cases where load balancing is used, TCP connections are distributed according to the interception configuration, thereby allowing for near-linear scalability increases in connection count, peer count, and WAN bandwidth, as devices are added to the pool.

Peer relationships time out after 10 minutes of inactivity (that is, no active connections are established between two peers for 10 minutes). When the peer relationship is timed out, it becomes reusable by another peer. Data stored in the DRE compression history remains intact even if a peer becomes disconnected due to inactivity, unless the DRE compression history becomes full. In cases where the DRE compression history becomes full, an eviction process is initiated to remove the oldest set of data in the DRE compression history to make room for new data.

Table 2-5 shows the maximum number of concurrent peers supported per WAE platform. If peers are connected beyond the allocated limit, the WAE permits the connections to be established and gracefully degrades performance as needed. Connections associated with peers in excess of the maximum fan-out ratio are able to use the existing compression history but will not be able to add new chunks of data to it. The end result is lower effective compression ratios for the connections using peers that are in excess of the specified fan-out ratio.

Table 2-5. Maximum Supported Peers per WAE

Network Module

Concurrent Peers

Appliance

Concurrent Peers

302

5

512-1GB

15

502

15

512-2GB

40

522

40

612-2GB

40

  

612-4GB

96

  

7326

96

  

7341

200

  

7371

400

Number of Devices Managed

Each Cisco WAAS deployment must have a Central Manager. The Central Manager is responsible for system-wide policy definition, synchronization of configuration, device monitoring, and reporting. The Central Manager can be deployed only on appliances, and may be deployed in an active/standby fashion. When a certain WAE device is configured as a Central Manager, it is able to, based on the hardware platform selected for the Central Manager, manage a maximum number of WAEs within the topology. Only WAE appliances can be configured as Central Manager WAEs, and in high-availability configurations, each Central Manager WAE should be of the same hardware configuration. While hardware disparity between Central Manager WAEs will work, it is not a recommended practice given the difference in the number of devices that can be managed among the WAE hardware models.

Table 2-6 shows the maximum number of managed nodes that can be supported by each WAE appliance when configured as a Central Manager.

Table 2-6. Central Manager Scalability

Appliance

Managed Nodes

WAE-512-1GB

500

WAE-512-2GB

1000

WAE-612-2GB

2000

WAE-612-4GB

2500

WAE-7326

2500

Summary

The Cisco WAE family includes three network modules for the ISR and five appliance models. This provides customers with the flexibility necessary to allocate the right platform for each network location where WAN optimization and application acceleration capabilities are needed. Three licenses are available for Cisco WAAS, including the Transport license (WAN optimization capabilities only), Enterprise license (all product features), and Central Manager license (to manage a network of Cisco WAE devices). Sizing of a Cisco WAAS solution requires consideration of a number of factors, including network conditions, number of users and concurrent TCP connections, disk capacity, memory, and fan-out. By following the recommended guidelines for performance and scalability, a robust Cisco WAAS design can be realized, thereby allowing administrators to deploy the solution confidently.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.14.251.57