Connection type | Icon | Description |
All current connections | Displays the total number of connections the SteelHead detects at the time you access the report, refresh the page, or click the Update button. It includes the connections that the SteelHead is passing through unoptimized, and connections that don’t appear in the connections table. | |
Established | Displays the total optimized, active connections. | |
![]() | RiOS - Displays the double-ended, non-SCPS connections. | |
![]() | RiOS + SCPS - Displays the total RiOS and SCPS connections established between two SteelHeads running RiOS 7.0 or later. Because both SteelHeads are SCPS compatible, this is a double-ended connection that benefits from traditional RiOS optimization (SDR and LZ). | |
![]() | SCPS - Displays all current single-ended SCPS-optimized connections as a portion of the total. | |
![]() | TCP proxy - Displays the total non-SCPS single-ended interception connections. An SEI connection is established between a single SteelHead running RiOS 7.0 or later paired with a third-party device running TCP-PEP (Performance Enhancing Proxy). | |
![]() | Packet-mode optimized - Displays the total flows that were optimized packet-by-packet with SDR bandwidth optimization. These include TCP and UDP flows over IPv4 or IPv6. Packet-mode flows are considered to be neither single-ended nor double-ended. In RiOS 8.5, you must enable packet-mode optimization to view optimized UDP flows. To enable packet-mode optimization, choose Optimization > Network Services: General Service Settings. In RiOS 8.5.x and later, you must enable path selection and packet-mode optimization to view optimized UDP flows. To enable path selection, choose Networking > Network Services: Path Selection. | |
Establishing | ![]() | Displays the total newly forming, initiating connections. The connection is being established but doesn’t yet have an inner channel. Establishing connections count toward the connection count limit on the SteelHead because, at any time, they might become a fully opened connection. |
Opening | ![]() | Displays the total half-open active connections. A half-open connection is a TCP connection in which the connection has not been fully established. Half-open connections count toward the connection count limit on the SteelHead because, at any time, they might become a fully opened connection. If you are experiencing a large number of half-open connections, consider a more appropriately sized SteelHead. |
Closing | ![]() | Displays the total half-closed active connections. Half-closed connections are connections that the SteelHead has intercepted and optimized but are in the process of becoming disconnected. These connections count toward the connection count limit on the SteelHead. (Half-closed connections might remain if the client or server doesn’t close its connections cleanly.) If you are experiencing a large number of half-closed connections, consider a more appropriately sized SteelHead. |
Forwarded | ![]() | Displays the total number of connections that were forwarded when you have configured a connection-forwarding neighbor to manage the connection. For details about connection forwarding, see Configuring connection forwarding features. |
Passthrough (unoptimized) | Displays the total number of connections that were passed through unoptimized. You can view and sort these connections by intentional and unintentional pass-through in the connections table that follows this summary. | |
![]() | Failed terminated - Displays the total number of terminated connections that were passed through unoptimized, because of reasons other than in-path rules. | |
![]() | Failed packet-mode - Displays the total number of packet-mode flows that were passed through unoptimized, because of reasons other than in-path rules. In RiOS 8.5, you must enable packet-mode optimization to view UDP flows. To enable packet-mode optimization, choose Optimization > Network Services: General Service Settings. In RiOS 8.5.x and later, you must enable path selection or packet-mode optimization or both to view pass-through UDP flows. To enable path selection, choose Networking > Network Services: Path Selection. | |
![]() | Intentional - Displays the total number of connections that were intentionally passed through unoptimized by in-path rules. | |
Errors | ![]() | Displays all connections that have application or transport protocol errors as a portion of the total connections. |
Connection type | Description |
All current | Displays the total number of connections the SteelHead detects, including the connections that are passed through unoptimized. This selection removes any previous selections or filters. |
Established | Displays the total optimized, active connections. |
Packet-mode optimized | Displays the total connections that were optimized packet-by-packet with SDR bandwidth optimization. These connections include TCP IPv4, TCP IPv6, UDP IPv4, and UDP IPv6 connections. In RiOS 8.5, you must enable packet-mode optimization to view UDP flows. To enable packet-mode optimization, choose Optimization > Network Services: General Service Settings. In RiOS 8.5.x and later, you must enable path selection and packet-mode optimization to view optimized UDP flows. To enable path selection, choose Networking > Network Services: Path Selection. |
Opening | Displays the total half-open active connections. A half-open connection is a TCP connection in which the connection has not been fully established. Half-open connections count toward the connection count limit on the SteelHead because, at any time, they might become a fully opened connection. If you are experiencing a large number of half-open connections, consider a more appropriately sized SteelHead. |
Closing | Displays the total half-closed active connections. Half-closed connections are connections that the SteelHead has intercepted and optimized but are in the process of becoming disconnected. These connections are counted toward the connection count limit on the SteelHead. (Half-closed connections might remain if the client or server doesn’t close its connections cleanly.) If you are experiencing a large number of half-closed connections, consider a more appropriately sized SteelHead. |
Forwarded | Displays the total number of connections forwarded by the connection-forwarding neighbor managing the connection. |
Passthrough (unoptimized) | Displays the total number of connections that were passed through unoptimized. You can view and sort these connections by intentional and unintentional pass-through in the individual connections table that follows the connections summary. |
Failed terminated | Displays the total number of terminated connections that were passed through unoptimized. |
Failed packet-mode | Displays the total number of packet-mode flows that were passed through unoptimized. |
Intentional | Displays the total number of connections that were intentionally passed through unoptimized. |
Column | Icon | Description |
![]() | Click this triangle to display the current connections details. See Viewing the current connection details. Because the details are a snapshot in time, by the time you click the connection, it could be gone or in a different state. If the connection is no longer available, a message tells you that the connection is closed. To refresh the display, click Update. | |
![]() | Protocol Error - Displays a protocol error for both transport and application conditions. This list contains some of the conditions that trigger errors; it is a small subset of possible error conditions: •When the Optimize Connections with Security Signatures feature is enabled (which prevents SMB signing). This is an expected response. For details about preventing SMB signing, see Configuring CIFS optimization. •If a problem occurs while optimizing encrypted MAPI traffic. For details about enabling optimization of encrypted MAPI traffic, see Configuring MAPI optimization. •If a problem occurs with SSL optimization or the secure inner channel. •If a SRDF protocol error occurs when attempting to optimize traffic originating from the LAN side of the SteelHead. Check the LAN-side Symmetrix array for compatibility. Click the connection for more details about the error. | |
CT (Connection Type) | ![]() | Established - Indicates that the connection is established and active. |
![]() | Intentional Passthrough - Indicates that the connection was intentionally passed through unoptimized because of in-path rules. | |
![]() | Failed terminated - Indicates that the connection was passed through unoptimized. | |
![]() | Failed packet-mode - Indicates that the packet-mode flow was passed through unoptimized. | |
![]() | Establishing - Indicates that the connection is initiating and isn’t yet fully established. The source and destination ports appear as n/a. | |
![]() | Opening (Optimized) - Indicates that the connection is half-open and active. A half-open connection is a TCP connection that has not been fully established. | |
![]() | Closing (Optimized) - Indicates that the connection is half-closed and active. A half-closed connection has been intercepted and optimized by the SteelHead but is in the process of becoming disconnected. | |
![]() | Forwarded - Indicates that the connection is forwarded by the connection-forwarding neighbor managing the connection. For details about connection forwarding, see Configuring connection forwarding features. | |
Notes | Displays connection icons that indicate the current state of the connection. The connection states can be one of these: | |
![]() | Compression Enabled - Indicates that LZ compression is enabled. | |
![]() | SDR Enabled - Indicates that SDR optimization is enabled. | |
![]() | WAN Encryption Enabled - Indicates that encryption is enabled on the secure inner channel (WAN). For details, see Configuring secure peers. | |
![]() | Cloud Acceleration ON - Indicates that the legacy cloud acceleration service for SaaS applications is enabled. | |
Source:Port | Displays the connection source IP address and port. | |
Destination:Port | Displays the connection destination IP address and port. | |
LAN/kB WAN/kB | Displays the amount of LAN or WAN throughput, in kilobytes. | |
Reduction | Displays the degree of WAN traffic optimization as a percentage of LAN traffic sent. Higher percentages mean that fewer bytes were sent over the WAN. Red squares indicate that an optimizing connection is currently showing 0 percent data reduction, which might be caused by multiple scenarios. Typically, 0 percent data reduction occurs when the system is optimizing a session containing encrypted payload. You can set up an in-path pass-through rule to prevent the system from interception the connection for optimization. | |
Start Time | Displays the time that the connection was started. This column doesn’t apply to preexisting connections. Select the column heading to sort data start time in ascending or descending order. | |
Application | Displays the application associated with the connection: for example: TCP, CIFS, MAPI, eMAPI-OA (encrypted MAPI Outlook Anywhere), SMB31-ENCRYPED, SMB21-SIGNED, or HTTP. When Application Visibility is enabled (the default), the table displays the hierarchical, DPI-based application name (for example, HTTP > Facebook), instead of just the port-based name (for example, HTTP). When you expand a connection, a new Application row displays the hierarchical name, when available, or the port-based name if not. (For newly formed connections, the application name might have changed from what was reported in the table). Application visibility gives you a better sense of what applications are running instead of just seeing traffic through port numbers or web traffic classified as generic HTTP. | |
User Identity | Starting with RiOS 9.7, this field reports User IDs for SMB encrypted, SMB signed, and MoH connections that are optimized. The User IDs are propagated for any other traffic that uses the same IP address as the SMB or MoH 365 traffic. Starting with RiOS 9.5, this field also displays the user ID for Office 365 traffic when the SaaS User Identity feature is enabled in the Optimization > Protocols: HTTP page. See Configuring HTTP optimization feature settings for details. Starting with RiOS 9.7, user IDs are also propagated for any traffic that uses the same IP address as Office 365 traffic. The following caveats apply to the SMB and MoH reporting feature: •For the user ID to appear in the client-side SteelHead’s current connections report, both the client-side and server-side SteelHeads must be running a RiOS version of 9.7 or later. •Network address translation (NAT) cannot be used before traffic reaches the SteelHead. •The SteelHead appliance extracts and reports User IDs each time any SMB encrypted, SMB signed, and MoH connections are optimized. User IDs are also extracted and reported for Office 365 SaaS connections if SaaS User Identity is enabled. If traffic that does not match those properties is received on the same IP address on which User IDs have been extracted, that traffic is reported as having the same user ID as the last-reported SMB, MoH, or SaaS connection. •This feature is enabled by default; to disable or reenable this feature, enter the [no] user-identity propagation enable and, optionally, [no] user-identity sources enable commands. See the Riverbed Command-Line Interface Reference Manual for command details. |
Field | Description |
Connection type | Shows the connection type icon and whether the connection is established, opening, or closing. |
Connection age | Shows the time since the connection was created. |
Application | Shows the application corresponding to the connection (for example, NFS). When Application Visibility is enabled, more detailed protocol information is shown for some applications. For example, HTTP-SharePoint appears as the WebDAV or FPSE protocols and Office 365 appears as MS-Office-365 instead of HTTP. |
Application error | Displays the application protocol error, if one exists. |
Transport | Shows the transport protocol name: for example, SSL inner. |
Transport error | Displays the transport protocol error, if one exists. |
User Name | Shows the SSO user ID for Office 365 users. |
User Domain | Shows the SSO user domain for Office 365 users. |
Client side | Displays whether this appliance is on the client side. |
Protocol | Shows the low-level protocol that RiOS is using inside the packet-mode channel. The protocol can be UDP, TCP, or variants. |
SaaS application | Shows the SaaS application name, if one exists. |
Cloud acceleration state | Shows the SaaS connection state, if a SaaS application is running (with the legacy cloud acceleration service). |
Inbound QoS class | Shows the QoS inbound class the connection is associated with when shaping is enabled. When the connection carries multiple classes, the report displays Variable. |
Outbound QoS class | Shows the QoS outbound class the connection is associated with when shaping is enabled. When the connection carries multiple classes, the report displays Variable. |
Outbound QoS DSCP | Shows the DSCP marking value for the connection when marking is enabled, even if it is zero. The report displays the value from the inner ToS. When the connection carries multiple values, the report displays Variable. When relevant, the Notes section displays several details that are binary in nature. |
GeoDNS IP result | Shows the GeoDNS IP address that the SteelHead is using to optimize Office 365. The connection summary displays the original destination IP address. |
Notes | In-path- This connection is in-path. SkipWare compression in - The single-ended optimized connection is applying Skipware105 compression on incoming data. SkipWare compression out - The single-ended optimized connection is applying Skipware105 compression on outgoing data. Pre-existing - The connection existed before the last restart of the optimization service. Pre-existing asymmetric - The connection is traveling an asymmetric route and existed before the last restart of the optimization service. Optimized connections might show the following notes: •Client side - The SteelHead is on the client side of the connection. •SDR optimized - SDR optimization is enabled. •LZ compressed - LZ compression is enabled. Packet-mode optimized connections might show the following note: •Incomplete parse - The inner channel exists but the connection through the channel isn’t fully formed. Optimized, nonpacket mode connections might show the following notes: •In-path - This is an in-path connection. •Single-ended - The connection involves only one SteelHead. •WAN encrypted - Encryption is enabled on the secure inner channel (WAN). •Cloud accelerated - The legacy cloud acceleration service for SaaS applications is enabled. SCPS connections show at least one of the following notes: •SCPS initiate: WAN side - The SteelHead has initiated the SCPS connection on the WAN. •SCPS initiate: LAN side - The SteelHead has initiated the SCPS connection on the LAN. •SCPS terminate: WAN side - The SteelHead has terminated the SCPS connection on the WAN. •SCPS terminate: LAN side - The SteelHead has terminated the SCPS connection on the LAN. |
WAN and LAN-Side Statistics | LAN Bytes - Displays the total LAN bytes transmitted. WAN Bytes - Displays the total WAN bytes transmitted. Retransmitted - Displays the total packets retransmitted. Fast Retransmitted - Displays the total packets fast retransmitted. Fast retransmit reduces the time a sender waits before retransmitting a lost segment. If an acknowledgment isn’t received for a particular segment within a specified time (a function of the estimated round-trip delay time), the sender assumes the segment was lost in the network, and retransmits the segment. Timeouts - Displays the number of packet transmissions that timed out because no ACK was received. Congestion Window - Displays number of unACKed packets permitted, adjusted automatically by the SteelHead, depending on WAN congestion. |
Data | Description (varies by connection) |
Relayed | Displays the number of bytes relayed if all uplinks are down. |
Dropped | Displays the number of bytes dropped if all uplinks are down. |
Bypassed | Displays the number of bytes bypassed if all uplinks are down. |
Reflected | Displays the number of bytes reflected. |
Local uplink | Displays the uplink name. |
Remote uplink | Displays the remote uplink name. |
Status | Displays whether the uplink is reachable (Up) or unreachable (Down). |
Last started | Displays the time the connection started using the uplink. |
Bytes | Displays the total number of bytes transferred through the uplink. Note: The LAN kB value and this number don’t match. This value displays only the bytes using path selection on the WAN. |
DSCP | Displays the DSCP marking set for the uplink. |
Data | Description (varies by connection) |
Connection Information | Connection Type - Displays a connection type icon and whether the pass-through was intentional or unintentional. Displays the forwarded reduction percentage bar for forwarded connections. Connection Age - Displays the time since the connection was created. Transport - Displays the transport protocol name: for example, SSL inner. Application - Displays the application corresponding to the connection: for example, NFS. Client-Side - Displays whether the connection is on the client side. Pre-Existing - Displays whether the connection existed before the last restart of the optimization service. Passthrough Reason - Displays the reason for passing through or forwarding the connection. |
Value | Pass-through reason (varies by connection) | Description | Action |
0 | None | None | None |
1 | Preexisting connection | Connection existed before SteelHead started. | Create a connection. |
2 | Connection paused | SteelHead isn’t intercepting connections. | Check that the service is enabled, in-path is enabled, the neighbor configuration, and whether the SteelHead is in admission control. |
3 | SYN on WAN side | Client is on the SteelHead WAN side. | Either this is the server-side SteelHead and there’s no client-side SteelHead, or the client-side SteelHead did not probe. Check the cabling if it is really the client-side SteelHead. |
4 | In-path rule | In-path rule matched on the client-side SteelHead is pass-through. | Check the in-path rules. |
5 | Peering rule | Peering rule matched on the server-side SteelHead is pass-through. | Check the peering rules. |
6 | Inner failed to establish | Inner connection between SteelHeads failed. | Check the connectivity between the client-side SteelHead and the server-side SteelHead. |
7 | Peer in fixed-target rule down | The target of a fixed-target rule is destined to a failed peer. | Check the connectivity between the client-side SteelHead and the server-side SteelHead. |
8 | No SteelHead on path to server | No server-side SteelHead. | Check that the server-side SteelHead is up and check that the connection goes through the server-side SteelHead. |
9 | No route for probe response | No route to send back probe response. | Check in-path gateway on the server-side SteelHead. |
10 | Out of memory | Memory problem while copying packet. | Check if the SteelHead is out of memory. |
11 | No room for more TCP options | Not enough space in TCP header to add probe. | This condition occurs when another device added TCP options before the SteelHead. Take a TCP dump to check which TCP options are in the SYN packet. Search for those options to learn what device uses them. |
12 | No proxy port for probe response | There is no service port configured on server-side SteelHead. | Configure a service port. |
13 | RX probe from failover buddy | The connection is intercepted by failover buddy. | No action is necessary. |
14 | Asymmetric routing | The connection is asymmetric. | Check the asymmetric routing table for reason. |
15 | Middle SteelHead | The SteelHead isn’t the first or last SteelHead. | Only happens when the Enhanced Auto-Discovery Protocol is enabled. |
16 | Error connecting to server | The server-side SteelHead couldn’t connect to the server. | Only happens when the Enhanced Auto-Discovery Protocol is enabled. |
17 | Half open connections above limit | The client has too many half-opened connections. | Check if many connections open quickly from the same client. |
18 | Connection count above QOS limit | There are too many connections for that QoS class. | Check the QoS class. |
19 | Reached maximum TTL | The probe has an incorrect TTL. | Take a trace to check the probe. |
20 | Incompatible probe version | The probe has an incompatible version number. | Check if the new probe format is enabled, it is disabled by default. |
21 | Too many retransmitted SYNs | The client SYN has been retransmitted too many times. | Check if there’s a firewall that doesn’t like the probe TCP option. |
22 | Connection initiated by neighbor | The connection is intercepted by a neighbor. | No action is necessary. |
23 | Connection for local host | The connection is to the in-path interface. | No action is necessary. |
24 | Unknown reason | The pass-through reason doesn’t match any other description. | No action is necessary. |
25 | Connection from proxy target | Because the connection originates from an IP address that is also the IP address of a fixed-target rule, it isn’t intercepted. | No action is necessary. |
26 | SYN before SFE outer completes | The client connection was passed through at the client-side SteelHead and the client's pure SYN was seen at the server-side SteelHead. | Check if there’s a firewall that doesn’t like the probe TCP option. |
27 | Transparent inner on wrong VLAN | The inner connection seen on VLAN is different than the in-path VLAN. | No action is necessary. |
28 | Transparent inner not for this host | The inner connection is not meant for this host. | No action is necessary. |
29 | Error on neighbor side | The neighbor SteelHead returned an error to a connection-forwarding request. | Check the health of the configured neighbors. |
30 | SYN/ACK, but no SYN | There is asymmetric routing - received SYN/ACK but no SYN. | Check your routing. |
31 | Transparency packet from self | For Riverbed internal use only. | No action is necessary. |
32 | System is heavily loaded | The SteelHead is experiencing a heavy traffic load. | Contact Riverbed Support. You might require a larger model SteelHead. |
33 | SYN/ACK at MFE not SFE | There is asymmetric routing around the server-side SteelHead. | Check your routing. |
34 | Windows branch mode detected | The client-side is a SteelHead Mobile. Optimization is occurring between the SteelHead Mobile and the server-side SteelHead, so the connection is passed through on the client-side SteelHead. | No action is necessary. |
35 | Transparent RST to reset firewall state | The optimization service has sent a RST to clear the probe connection created by the SteelHead and to allow for the full transparent inner connection to traverse the firewall. | No action is necessary. |
36 | Error on SSL inner channel | An inner channel handshake has failed with peer. | Check the SSL configuration on both SteelHeads. |
37 | Netflow only: Ricochet packet of optimized connection | This pass-through reason is attributed to a flow reported to a NetFlow v9 collector. A probe and packet have been sent by the SteelHead back through itself. For example, in an in-path setup, if a client-side SteelHead gateway is on its WAN side, all packets sent to the client will first go to the gateway and be sent back through the SteelHead on the way to the client. | Packet ricochet can be avoided in many environments by enabling simplified routing. |
38 | Passthrough due to MAPI admission control | New MAPI connections will be passed through due to high connection count. | New MAPI connections are optimized automatically when the MAPI traffic has decreased. |
39 | A SYN or RST packet contains data | ||
40 | Failed to discover SCPS device | RiOS can’t find a SCPS device. | |
41 | No matching client/server IPv6 scope | RiOS can’t set up the outer channel connection. | RiOS passes all packets through until it creates the outer channel. |
42 | Failed to create sport outer channel | RiOS can’t set up the outer channel connection. | RiOS passes all packets through until it creates the outer channel. |
43 | Flows not matching in-path rule | RiOS can’t match this traffic flow to any packet-mode optimization in-path rule. A packet-mode optimization rule defines the inner channel characteristics. | RiOS passes all packets through while the flow is in this state. Go to Optimization > In-Path rules to add a fixed-target packet-mode optimization in-path rule. |
44 | Packet mode channel setup pending | RiOS is attempting to set up the inner IPv4 or IPv6 channel connection. | RiOS passes all packets through until it creates the inner IPv4 or IPv6 channel. |
45 | Peer does not support packet-mode optimization | The peer SteelHead to which RiOS needs to establish the inner IPv4 or IPv6 channel connection doesn’t support packet-mode optimization or packet-mode optimization isn’t enabled. | RiOS stops trying to optimize connections using packet-mode optimization with the peer. |
46 | Generic Flow error | A packet-mode optimization traffic flow transitions to this state when RiOS encounters one of these unrecoverable errors: •There isn’t enough memory to set up the inner channel. •The system has requested that RiOS kill the traffic flow. When RiOS receives this error, the SteelHead abandons all attempts to optimize the flow. | RiOS passes the flow through for its lifetime. |
47 | Failed to cache sock pointer | While configured for packet-mode optimization, RiOS can’t locate the socket pointer used to exchange packets through the inner channel. The system is attempting to write packets to the ring, but the socket is closed. This condition can occur when the optimization service shuts down unexpectedly. | Go to Administration > Maintenance: Services and restart the optimization service. |
48 | Packet mode optimization disabled | The connection is being passed through because packet-mode optimization is disabled. | Go to Optimization > In-path Rules and enable packet-mode optimization. |
49 | Optimizing local connections only | On a SteelHead EX, the connection is being passed through because it did not originate locally. | |
50 | Netflow only: probe packet of optimized connection | ||
51 | IPv6 connection forwarding requires multi-interface support | RiOS is passing the connection through because the client-side SteelHead is configured without multi-interface connection forwarding. This configuration doesn’t support IPv6. | Go to Networking > Connection Forwarding and enable multiple interface support. |
52 | Neighbor does not support IPv6 | RiOS is passing the connection through because a connection-forwarding neighbor doesn’t support IPv6. | Upgrade the connection-forwarding neighbor to RiOS 8.0 or later. |
53 | Reached the hard limit for the number of entries | RiOS is passing the connection through because it hit the maximum allowed limit for nonreusable connection entries. | |
54 | Connection or flow from GRE IPv4 tunnel |
Value | Reason | Description | Action |
0 | None | None | None |
1 | Optimized connection | Connection is redirected through the SteelHead SaaS to a SaaS service. | No action is necessary. |
Value | Pass-through reason (varies by connection) | Description | Action |
2 | Inner Connection through Cloud Accelerator | An inner connection to a remote SteelHead is running in the cloud. | No action is necessary. |
3 | Not a supported SaaS destination | Connection is through a SaaS service that isn’t supported, subscribed to, or enabled. | No action is necessary; however, if you want to optimize this destination IP address, contact Riverbed Support. |
4 | Due to configured In-path rule | Connection isn’t redirected through the SteelHead SaaS due to an in-path rule to disable cloud acceleration. | Check that the Cloud Acceleration field in the relevant in-path rule is set to Auto. |
5 | Due to configured Peering rule | Connection isn’t redirected through the SteelHead SaaS due to a peering rule to disable cloud acceleration. | Check that the Cloud Acceleration field in the relevant peering rule is set to Auto. |
6 | Cloud acceleration disabled | Connection isn’t redirected through the SteelHead SaaS because it is disabled. | Check the cloud accelerator configuration. Go to Optimization > Cloud Accelerator and select the Enable Cloud Acceleration check box in the Cloud Accelerator page. |
7 | Redirection disabled globally | Connection isn’t redirected through the SteelHead SaaS because cloud acceleration redirection is disabled. | Go to Optimization > Cloud Accelerator and select the Enable Cloud Acceleration Redirection check box in the Cloud Accelerator page. |
8 | Redirection disabled for relay | Connection isn’t redirected through SteelHead SaaS because cloud acceleration redirection for this in-path interface is disabled. | Check the Cloud Accelerator redirection configuration for the relevant in-path interface on the command-line interface. Enter this command on the command-line interface: show service cloud-accel For details, see the Riverbed Command-Line Interface Reference Manual. |
9 | Cloud proxy is down | Connection isn’t redirected through SteelHead SaaS because the redirection service encountered an error. | Contact Riverbed Support. |
10 | No PQID added by first SteelHead | Connection isn’t redirected through SteelHead SaaS because the SteelHead closest to the client has SteelHead SaaS disabled or misconfigured. | Check the Cloud Accelerator configuration on the client-side SteelHead. |
11 | Failed to append CP code | Connection isn’t redirected through SteelHead SaaS because of a packet processing error. | Contact Riverbed Support. |
12 | SYN retransmit (backhauled) | Connection isn’t redirected through SteelHead SaaS because too many SYN retransmits were received from the client. | Check if there’s a firewall that doesn’t allow inbound or outbound UDP packets for the SteelHead. |
13 | SYN retransmit (direct) | Connection isn’t redirected through SteelHead SaaS because too many SYN retransmits were received from the client. | Check if there’s a firewall that doesn’t allow inbound or outbound UDP packets for the SteelHead. |
14 | Passing to downstream SteelHead | Connection isn’t redirected through SteelHead SaaS because admission control is reached and there’s a SteelHead downstream that might optimize the connection. | No action is necessary. |
15 | Passthrough SYN retransmit | Connection isn’t redirected through SteelHead SaaS because too many SYN retransmits were received from the client. | Check if there’s a firewall that doesn’t allow inbound or outbound UDP packets for the SteelHead. |
16 | Rejected by cloud proxy | Connection isn’t redirected through SteelHead SaaS because the SteelHead SaaS network rejected the connection. | Contact Riverbed Support. |
17 | Invalid Entitlement code | Connection isn’t redirected through SteelHead SaaS because of an invalid SteelHead SaaS configuration. | Contact Riverbed Support. |
18 | Invalid timestamp | Connection isn’t redirected through SteelHead SaaS because the clock on the SteelHead isn’t synchronized. | Check the date and time settings on the SteelHead. |
19 | Invalid customer ID | Connection isn’t redirected through SteelHead SaaS because of an invalid SteelHead SaaS configuration. | Contact Riverbed Support. |
20 | Invalid ESH ID | Connection isn’t redirected through SteelHead SaaS because of an invalid SCA configuration. | Contact Riverbed Support. |
21 | Invalid SaaS ID | Connection isn’t redirected through SteelHead SaaS because of an invalid SCA configuration. | Contact Riverbed Support. |
22 | Connection limit reached | Connection isn’t redirected through SteelHead SaaS because the subscription limit for the number of connections is reached. | Contact Riverbed Support. You might require a higher SteelHead SaaS license. |
23 | Bandwidth limit reached | Connection isn’t redirected through SteelHead SaaS because the subscription limit for bandwidth used is reached. | Contact Riverbed Support. You might require a higher SteelHead SaaS license. |
Control | Description |
Send Keep-Alive | For an optimized connection, click to send a keepalive message to the outer remote machine (the machine that is connected to this appliance). This operation isn’t available for a pass-through connection. This button is dimmed for users logged in as a monitor user. |
Refresh Data | Click to retrieve the most recent data for the connection. |
Reset Connection | Click to send a RST packet to both the client and server to close the connection. You can reset both optimized and pass-through connections. You can’t reset a forwarded connection. Note: If no data is being transferred between the client and server when you click Reset Connection, the connection isn’t reset immediately. It resets the next time the client or server tries to send a message. Therefore, when the application is idle, it might take a while for the connection to disappear. This button is dimmed for users logged in as a monitor user. |
Log for this SteelHead | Click to go to the System Logs page. |
Field | Description |
Bytes | The total of transmitted LAN and WAN bytes. |
Packets | The total of transmitted WAN and LAN packets. |
Retransmitted | The total of retransmitted WAN and LAN packets. |
Fast Retransmitted | The total fast-retransmitted packets. Fast retransmit reduces the time a sender waits before retransmitting a lost segment. If an acknowledgment isn’t received for a particular segment within a specified time (a function of the estimated round-trip delay time), the sender assumes the segment was lost in the network, and retransmits the segment. |
Timeouts | The number of packet transmissions that timed out because no ACK was received. |
Congestion Window | Displays number of unACKed packets permitted, adjusted automatically by the SteelHead, depending on WAN congestion. |
Connection type | Description |
Optimized | Displays the total connections, including half-open, half-closed (where half-open and half-closed are TCP connection states), idle, established, and optimized. |
Optimized (Active) | Displays the total active connections that are established and optimized. |
Passthrough | Displays the total connections passed through unoptimized. |
Forwarded | Displays the total number of connections forwarded by the connection-forwarding neighbor managing the connection. |
Optimized (Half Open) | Displays the percentage of half-opened connections represented in the optimized connection total. A half-open connection is a TCP connection that has not been fully established. Half-open connections count toward the connection count limit on the SteelHead because, at any time, they might become a fully open connection. If you are experiencing a large number of half-opened connections, consider a more appropriately sized SteelHead. |
Optimized (Half Closed) | Displays the percentage of half-closed active connections represented in the optimized connection total. Half-closed connections are connections that the SteelHead has intercepted and optimized but are in the process of being disconnected. These connections are counted toward the connection count limit on the SteelHead. (Half-closed connections might remain if the client or server doesn’t close its connections cleanly.) If you are experiencing a large number of half-closed connections, consider a more appropriately sized SteelHead. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Throughput | Displays the throughput in bits per second. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Neighbor | Select a neighbor from the drop-down list or All to display all neighbors. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. Because the system aggregates data on the hour, request hourly time intervals. For example, setting a time interval to 08:30:00 to 09:30:00 from 2 days ago doesn’t create a data display, whereas setting a time interval to 08:00:00 to 09:00:00 from 2 days ago will display data. When you request a custom time interval to view data beyond the aggregated granularity, the data is not visible because the system is no longer storing the data. For example, the following custom time intervals don’t return data because the system automatically aggregates data older than 7 days into 2-hour data points: •Setting a 1-hour time period that occurred 2 weeks ago. •Setting a 75-minute time period that occurred more than 1 week ago. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Units | Select either packets/sec or bps from the drop-down list. |
Classes | Select Total or Selected classes from the drop-down list. Selected classes lets you narrow the report by choosing from drop-down lists of classes and remote sites (up to seven). You can’t select a class or a class @ site more than once. Click Update to change the QoS class selection without updating the chart. When the report display includes the total classes, the data series appear as translucent; selected classes appear as opaque. When the report display includes the total classes, the navigator shadows the total sent series. When the report display includes selected classes and remote sites, the navigator shadows the first nonempty sent series. A data series can be empty if you create a QoS class but it has not seen any traffic yet. Selecting a parent class displays its child classes. For example, the report for an HTTP class with two child classes named WebApp1 and WebApp2 displays statistics for HTTP, WebApp1, and WebApp2. When a selected class has descendant classes, the report aggregates the statistics for the entire tree of classes. It displays the aggregated tree statistics as belonging to the selected class. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. Because the system aggregates data on the hour, request hourly time intervals. For example, setting a time interval to 08:30:00 to 09:30:00 from 2 days ago doesn’t create a data display, whereas setting a time interval to 08:00:00 to 09:00:00 from 2 days ago will display data. When you request a custom time interval to view data beyond the aggregated granularity, the data is not visible because the system is no longer storing the data. For example, these custom time intervals don’t return data because the system automatically aggregates data older than 7 days into 2-hour data points: •Setting a 1-hour time period that occurred 2 weeks ago. •Setting a 75-minute time period that occurred more than 1 week ago. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Units | Select either packets/sec or bps from the drop-down list. |
Classes | Select Total or Selected classes from the drop-down list. Selected classes lets you narrow the report by choosing from drop-down lists of classes and remote sites (up to seven). You can’t select a class or a class @ site more than once. Click Update to change the QoS class selection without updating the chart. When the report display includes the total classes, the data series appear as translucent; selected classes appear as opaque. When the report display includes the total classes, the navigator shadows the total received series. When the report display includes selected classes, the navigator shadows the first nonempty received series. A data series can be empty if you create a QoS class but it has not seen any traffic yet. Selecting a parent class displays its child classes. For example, the report for an HTTP class with two child classes named WebApp1 and WebApp2 displays statistics for HTTP, WebApp1, and WebApp2. When a selected class has descendant classes, the report aggregates the statistics for the entire tree of classes. It displays the aggregated tree statistics as belonging to the selected class. |
Controller properties | Description |
Private Address | Displays the private IP address of the secure transport controller to which the SteelHead has registered. |
Public Address | Displays the public IP address of the secure transport controller to which the SteelHead has registered. |
Status | Displays the current status of the connectivity to the secure transport controller. |
Last Keep-Alive | Displays the last time a keepalive message was sent from the SteelHead to the secure transport controller. |
Group Name | Displays the name of the secure transport group. |
Number of Peers | Displays how many peers are in the secure transport group. |
Peer Name | Displays the peer names within the secure transport group. |
Column | Description |
Rank | Displays the relative position of the traffic flow WAN bandwidth use. |
<Sender> IP Address 1:Port | Displays the first IP address and port for the connection. |
<Receiver> IP Address 2:Port | Displays the second IP address and port for the connection. |
Byte Count | Displays the total number of bytes sent and received by the first IP address. |
Control | Description |
Chart | Select the report display from the drop-down list: By Conversation, By Sender, By Receiver, By Host, or By Application Port. The default setting is By Conversation. |
Period | You can view the traffic statistics for the past hour, the past 24 hours, or all available hours. All is the default setting, which displays statistics for the entire duration the SteelHead has gathered statistics. This duration can be up to 2 days, depending on how long the service has been up and the traffic volume. Select All, Last Hour, or Last Day from the drop-down list. The default setting is All. Note: Top Talker statistics aren’t persistent between service restarts. |
Count | Specify how many top pairs of IP addresses and ports with the highest total traffic (sent and received) appear in the report. Each pair shows the number of bytes and packets sent and received at IP address 1. The default value is 50. Note: You can export the complete list of top talkers to a file in CSV format using the Export report. |
Protocol | Select Both, TCP, or UDP from the drop-down list. The default value is Both. |
Traffic Type | Select Both, Optimized, or Passthrough from the drop-down list. The default value is Both. |
Go | Displays the report. |
Column | Description |
Port | Displays the TCP/IP port number and application for each row of statistics. For SaaS applications, the word “Custom” and the application name is displayed instead of a port number. |
Reduction | Displays the amount of application data reduction. |
LAN Data | Displays the amount of application data on the LAN. |
WAN Data | Displays the amount of application data on the WAN. |
Traffic % | Calculates LAN-side data to indicate the percentage of the total traffic each port represents. |
Control | Description |
Period | Select a period of Last Minute, Last 5 Minutes, Last Hour, Last Day, Last Week, Last Month, or Custom from the drop-down list. For Custom, enter the Start Time and End Time and click Go. Use the following format: YYYY/MM/DD HH:MM:SS |
Type | Select a traffic type of Optimized, Pass Through, or Both from the drop-down list. |
Traffic | Select a traffic direction from the drop-down list: • Bi-Directional - traffic flowing in both directions • WAN-to-LAN - inbound traffic flowing from the WAN to the LAN • LAN-to-WAN - outbound traffic flowing from the LAN to the WAN. |
Refresh | Select a refresh rate from the drop-down list: •To refresh the report every 10 seconds, select 10 seconds. •To refresh the report every 30 seconds, select 30 seconds. •To refresh the report every 60 seconds, select 60 seconds. •To turn refresh off, click Off. |
Go | Displays the report. |
Data series | Description |
Peak Throughput | Displays the peak data activity. |
Average Throughput | Displays the average and total throughput. RiOS calculates the WAN average at each data point by taking the number of bytes transferred, converting that to bits, and then dividing by the granularity. For instance, if the system reports 100 bytes for a data point with a 10-second granularity, RiOS calculates: 100 bytes * 8 bits/byte / 10 seconds = 80 bps This calculation means that 80 bps was the average throughput over that 10-second period. The total throughput shows the data amount transferred during the displayed time interval. The average that appears below the Average Throughput is an average of all displayed averages. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. Because the system aggregates data on the hour, request hourly time intervals. For example, setting a time interval to 08:30:00 to 09:30:00 from 2 days ago doesn’t create a data display, whereas setting a time interval to 08:00:00 to 09:00:00 from 2 days ago will display data. When you request a custom time interval to view data beyond the aggregated granularity, the data is not visible because the system is no longer storing the data. For example, these custom time intervals don’t return data because the system automatically aggregates data older than 7 days into 2-hour data points: •Setting a 1-hour time period that occurred 2 weeks ago. •Setting a 75-minute time period that occurred more than 1 week ago. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Average bps | Displays the average data activity in all flows of an application in bits per second. The minimum sample granularity is 5 minutes. |
Per Flow Average bps | Displays the average trended throughput in all traffic flows of an application in bits per second. This data series indicates how bandwidth intensive an application is per user or flow. RiOS calculates the WAN average at each data point by taking the number of bytes transferred, converting that to bits, and then dividing by the granularity. For instance, if the system reports 100 bytes for a data point with a 10-second granularity, RiOS calculates: 100 bytes * 8 bits/byte / 10 seconds = 80 bps This calculation means that 80 bps was the average throughput over that 10-second period. |
Peak bps | Displays the peak data activity in bits per second. For larger granularity data points, this represents the largest 5 minute average within. For 5 minutes, this is the same as the average. |
Per flow Peak bps | Displays the peak trended data activity per traffic flow in bits per second. This peak is the largest per flow 5-minute bps within a larger sample. |
Control | Description |
Period | Select a period of Last 5 Minutes, Last Hour, Last Day, Last Week, Last Month, or Custom from the drop-down list. For Custom, enter the Start Time and End Time and click Go. Use the format YYYY/MM/DD HH:MM:SS. |
App Name Filter | Click a protocol or application name (for example, TCP, LDAP, SharePoint) to show only the selection. You can select only one filter at a time. For example, if the report is filtering on UDP and you click TCP, the report displays all TCP entries and clears the UDP filter. |
Direction | Select the traffic direction from the drop-down list. The default is outbound LAN > WAN traffic. |
Interface | Select an interface from the drop-down list. The default is all WAN and primary interfaces. |
Update | Click to update the chart without updating the application selection. |
Data series | Description |
App Throughput | Displays the throughput for all traffic flows in bits per second. The minimum sample granularity is 5 minutes. Throughput Peak - Hover the mouse over the data series to display the peak data activity in bits per second. For larger granularity data points, this represents the largest 5 minute average within. For 5 minutes, this is the same as the average. Throughput Average - Hover the mouse over the data series to display the average trended throughput for all traffic flows in kbps. |
Per-Flow Throughput | Displays the throughput per traffic flow in bits-per-second. Per-Flow Peak - Hover the mouse over the data series to display the peak trended data activity per traffic flow in bits per second. This peak is the largest per flow 5-minute bps within a larger sample. Per-Flow Average - Hover the mouse over the data series to display the average trended throughput in all traffic flows of an application in bits per second. This data series indicates how bandwidth-intensive an application is per user or flow. RiOS calculates the WAN average at each data point by taking the number of bytes transferred, converting that to bits, and then dividing by the granularity. For instance, if the system reports 100 bytes for a data point with a 10-second granularity, RiOS calculates: 100 bytes * 8 bits/byte / 10 seconds = 80 bps This calculation means that 80 bps was the average throughput over that 10-second period. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Interface | Select an interface from the drop-down list. The default is all interfaces. |
Direction | Select the traffic direction from the drop-down list. The default is outbound LAN > WAN traffic. |
Application Name | Type the first characters in the application name. When the application name and definition appears, select it from the list. You can select up to seven applications. Click Update Chart to update the chart without changing the application selection. |
Column | Description |
Interface | LAN - Displays statistics for the LAN interface. WAN - Displays statistics for the WAN interface. Primary - Displays statistics for the primary interface. Aux - Displays statistics for the auxiliary interface. Inpath - Displays statistics for the in-path interface. |
IP | Displays the IP address (if application) for the interface. |
Ethernet | Displays the MAC address, speed, and duplex setting for interface. Use this information to troubleshoot speed and duplex problems. Make sure the speed for the SteelHead matches the WAN or LAN interfaces. We recommend setting the speed to 100 and duplex to full. |
Link | Displays true or false to indicate whether the link is up or down. |
Receive Packets | Displays the total number of packets, packets discarded, errors encountered, packets overrun, frames sent, and multicast packets sent. |
Transmit Packets | Displays the total number of packets, packets discarded, errors encountered, packets overrun, carriers used, and collisions encountered. |
Packet Type | Description |
Packets Received | Displays the total packets received. |
Packets Sent | Displays the total TCP packets sent. |
Packets Retransmitted | Displays the total TCP packets retransmitted. |
Packets Fast Retransmitted | Displays the total TCP packets fast retransmitted. Fast retransmit is an enhancement to TCP which reduces the time a sender waits before retransmitting a lost segment. If an acknowledgment isn’t received for a particular segment within a specified time (a function of the estimated round-trip delay time), the sender assumes the segment was lost in the network, and retransmits the segment. |
Time-outs | Displays the number of time-outs. |
Loss Events | Displays the total number of loss events. |
Field | Description |
Peer IP / Hostname | Displays the hostname or IP address of the latency-detected peer appliance. |
Latency | Displays the amount of latency between the selected appliance and the peer in milliseconds. |
Cumulative Optimized Connections | Displays the number of optimized connections between the selected appliance and the peer. |
Cumulative Passthrough Connections | Displays the number of passthrough connections between the selected appliance and the peer. |
Current Peer State | Displays the state of the peer ‑ Optimized or Passthrough ‑ based on the current latency between the selected appliance and the peer. |
Data series | Description |
LAN Peak | Displays the peak data activity. |
LAN P95 | Displays the 95th percentile for data activity. The 95th percentile is calculated by taking the peak of the lower 95 percent of inbound and outbound throughput samples. |
LAN Average | Displays the average throughput. RiOS calculates the LAN average at each data point by taking the number of bytes transferred, converting that to bits, and then dividing by the granularity. For instance, if the system reports 100 bytes for a data point with a 10-second granularity, RiOS calculates: 100 bytes * 8 bits/byte / 10 seconds = 80 bps This calculation means that 80 bps was the average throughput over that 10-second period. The average that appears below the LAN Average is an average of all displayed averages. |
WAN Peak | Displays the peak data activity. |
WAN P95 | Displays the 95th percentile for data activity. The 95th percentile is calculated by taking the peak of the lower 95 percent of inbound and outbound throughput samples. |
WAN Average | Displays the average throughput. RiOS calculates the WAN average at each data point by taking the number of bytes transferred, converting that to bits, and then dividing by the granularity. For instance, if the system reports 100 bytes for a data point with a 10-second granularity, RiOS calculates: 100 bytes * 8 bits/byte / 10 seconds = 80 bps This calculation means that 80 bps was the average throughput over that 10-second period. The average that appears below the WAN Average is an average of all displayed averages. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. Because the system aggregates data on the hour, request hourly time intervals. For example, setting a time interval to 08:30:00 to 09:30:00 from 2 days ago doesn’t create a data display, whereas setting a time interval to 08:00:00 to 09:00:00 from 2 days ago will display data. When you request a custom time interval to view data beyond the aggregated granularity, the data is not visible because the system is no longer storing the data. For example, these custom time intervals don’t return data because the system automatically aggregates data older than 7 days into 2-hour data points: •Setting a 1-hour time period that occurred 2 weeks ago. •Setting a 75-minute time period that occurred more than 1 week ago. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Direction | Select a traffic direction from the drop-down list: • Bi-Directional - traffic flowing in both directions • WAN to LAN - inbound traffic flowing from the WAN to the LAN • LAN to WAN - outbound traffic flowing from the LAN to the WAN |
Port | Select a port or All to display all of the TCP ports on which the SteelHead has seen traffic. The list appends the port name to the number where available. If your SteelHead appliance is SaaS-enabled, select the SaaS application from the drop-down list. To see the definition of the SaaS application (for example, SFDC in the drop-down list refers to Salesforce.com), log in to the Riverbed Cloud Portal and click Cloud Accelerator. The application names and acronyms are listed in the SaaS Services Summary pane. |
Data series | Description |
Data Reduction % | Displays the peak and total decrease of data transmitted over the WAN, according to this calculation: (Data In – Data Out)/(Data In) Displays the capacity increase x-factor below the peak and total data reduction percentages. |
WAN and LAN Throughput | Depending on which direction you select, specifies one of these traffic flows: •Bi-Directional - traffic flowing in both directions •WAN-to-LAN - inbound traffic flowing from the WAN to the LAN •LAN-to-WAN - outbound traffic flowing from the LAN to the WAN |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 week (1w), All, or type a custom date. All includes statistics for the past 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. Because the system aggregates data on the hour, request hourly time intervals. For example, setting a time interval to 08:30:00 to 09:30:00 from 2 days ago doesn’t create a data display, whereas setting a time interval to 08:00:00 to 09:00:00 from 2 days ago will display data. When you request a custom time interval to view data beyond the aggregated granularity, the data is not visible because the system is no longer storing the data. For example, these custom time intervals don’t return data because the system automatically aggregates data older than 7 days into 2-hour data points: •Setting a 1-hour time period that occurred 2 weeks ago. •Setting a 75-minute time period that occurred more than 1 week ago. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Port | Select a port or All to select all ports from the drop-down list. If your SteelHead appliance is SaaS-enabled, select the SaaS application from the drop-down list. To see the definition of the SaaS application (for example, SFDC in the drop-down list refers to Salesforce.com), log in to the Riverbed Cloud Portal and click Cloud Accelerator. The application names and acronyms are listed in the SaaS Services Summary pane. |
Direction | Select a traffic direction (Bi-Directional, WAN to LAN, or LAN to WAN) from the drop-down list. |
Column | Description |
Name | Specifies the name of the peer appliance. |
IP Address | Specifies the IP address of the peer appliance. |
Model | Specifies the appliance model. |
Version | Specifies the appliance version. |
Licenses | Specifies the current appliance licenses. |
Log File | Description |
Recent syncs | Contains logs for the last few share synchronizations. The log includes how many directories, files, and bytes were received and how long it took to receive them. The log also lists any errors or deletions. |
Initial sync | Includes how many directories, files, and bytes were received initially and how long it took to receive them. The log also lists any errors or deletions. |
Last dry run | Includes a log of what would have been synchronized with the current share configuration, without actually synchronizing anything. |
Data series | Description |
Request Rate | Select to display the rate of HTTP objects, URLs, and object prefetch requests. |
Object Prefetch Table Hit Rate | Select to display the hit rate of stored object prefetches per second. The SteelHead stores object prefetches from HTTP GET requests for cascading style sheets, static images, and Java scripts in the Object Prefetch Table. |
URL Learning Hit Rate | Select to display the hit rate of found base requests and follow-on requests per second. The SteelHead learns associations between a base request and a follow-on request. Instead of saving each object transaction, the SteelHead saves only the request URL of object transactions in a Knowledge Base and then generates related transactions from the list. |
Parse and Prefetch Hit Rate | Select to display the hit rate of found and prefetched embedded objects per second. The SteelHead determines which objects are going to be requested for a given web page and prefetches them so that they’re readily available when the client makes its requests. |
Control Panel | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Data From Cache | Displays the cumulative bps of video traffic served from the cache. Cache hits indicate that content is being served locally and avoiding round-trip bandwidth. |
Data From Server | Displays the cumulative bps of video traffic going to and coming from the server over the WAN. |
Video Sessions | Displays how many users are watching the video sessions. A video session is an open connection that has passed a video fragment. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Local Response Rate | Displays the number of NFS calls that were responded to locally. |
Remote Response Rate | Displays the number of NFS calls that were responded to remotely (that is, calls that traversed the WAN to the NFS server). |
Delayed Response Rate | Displays the delayed calls that were responded to locally but not immediately (for example, reads that were delayed while a read ahead was occurring and that were responded to from the data in the read ahead). |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Data Reduction | Specifies the percentage of total decrease in overall data transmitted (when viewing all Symmetrix RDF groups). |
WAN/LAN Throughput | Specifies the total throughput transmitted over the WAN and LAN. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Symmetrix (RDF Group) | Select a Symmetrix server ID from the drop-down list to view detailed statistics per Symmetrix ID. Use the protocol srdf CLI command to map a logical Symmetrix ID to its set of network IP addresses. For example, the following commands create a Symmetrix ID, Sym1, and associate it with traffic originating from IP addresses 10.12.61.42 and 10.12.61.43: protocol srdf symm id Sym1 address 10.12.61.42 protocol srdf symm id Sym1 address 10.12.61.43 RiOS maps SRDF traffic originating from IP addresses that have not been mapped to a Symmetrix ID to the default Symmetrix ID, represented by DefaultSymm for this field. Select an RDF group number from the drop-down list to view data reduction information for individual RDF groups. You can use data reduction information to fine-tune the optimization settings for those RDF groups. The SteelHead automatically identifies and summarizes information by RDF group based on the SRDF traffic seen by the SteelHead. Peak lines appear after one hour for RDF group detail reports. |
Traffic Type | Select either LAN or WAN to display the amount of data transmitted over the LAN/WAN during the selected time period. |
Data series | Description |
Peak LAN/WAN Throughput | Displays the peak LAN/WAN data activity. The system stores peak statistics as bytes transferred over the LAN, but calculates the normal throughput using a granularity of 10 seconds. |
Average LAN/WAN Throughput | Displays the average LAN/WAN data activity. The system stores non-peak statistics as the number of bytes transferred over the LAN/WAN, and calculates the throughput by converting bytes to bits and then dividing the result by the granularity. For instance, if the system reports 100 bytes for a data point with a 10-second granularity, RiOS calculates: 100 bytes * 8 bits/byte / 10 seconds = 80 bps This calculation means that 80 bps was the average throughput over that 10-second period. The total throughput shows the data amount transferred during the displayed time interval. |
Data Reduction | Specifies the percentage of total decrease in overall data transmitted (when viewing all SnapMirror filers). The system calculates data reduction as (total LAN data - total WAN data) / total LAN data. You can use data reduction information to fine-tune the optimization settings for a filer, a filer and a volume, or a filer, volume, and qtree. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Filer (Volume) | Select a filer, a filer and a volume, or a filer, volume, and qtree to view detailed statistics on that filer, along with volume and qtree information when applicable. Select all to view statistics on all filers. The SteelHead automatically identifies and summarizes information by filer, volume, and qtrees based on the SnapMirror traffic seen by the SteelHead. Peak lines appear after one hour for filer detail reports. |
Traffic Type | Select either LAN or WAN to display the amount of data transmitted over the LAN/WAN during the selected time period. |
Data Series | Description |
Requested Connection Rate | Displays the rate of requested SSL connections. |
Established Connection Rate | Displays the rate established SSL connections. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data Series | Description |
Request Rate | Select to display the total number of FPSE and WebDAV requests per second. |
FPSE Metadata Cache Hits | Select to display the Microsoft Front Page Server Extensions (FPSE) metadata cache hits per second. Shows how many FPSE requests were served locally, resulting in performance improvements. SSL connections and files smaller than 5 MB can experience significant performance improvements. Microsoft Office 2007/2010/2013 clients use FPSE when communicating with SharePoint 2007/2010 servers. |
WebDAV Metadata Cache Hits | Select to display the Microsoft Web Distributed Authoring and Versioning (WebDAV) metadata cache hits per second. RiOS predicts and prefetches WebDAV responses, which saves multiple round-trips and makes browsing the SharePoint file repository more responsive. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data | Description |
Synchronization Connection | Indicates the status of the connection between the synchronized SteelHeads. |
Synchronization Catch-Up | Indicates the status of transferring data between the synchronized SteelHeads. Catch-Up is used for synchronizing data that was not synchronized during the Keep-Up phase. |
Synchronization Keep-Up | Indicates the status of transferring new incoming data between the synchronized SteelHeads. |
Data Store Percentage Used (Since Last Clear) | Displays the percentage of the RiOS data store that is used. |
Control | Description |
Refresh | Select a refresh rate from the drop-down list: •To refresh the report every 10 seconds, select 10 seconds. •To refresh the report every 30 seconds, select 30 seconds. •To refresh the report every 60 seconds, select 60 seconds. •To disable refresh, click Off. |
Go | Displays the report. |
Data series | Description |
Compression-Only Due To Disk/CPU Pressure | Displays the adaptive compression occurring due to disk/CPU pressure. |
Compression-Only Due To In-Path Rule | Displays the adaptive compression occurring due to the in-path rule. |
In-Memory SDR Due To Disk/CPU Pressure | Displays the in-memory SDR due to disk/CPU pressure. |
In-Memory SDR Due To In-Path Rule | Displays the maximum in-memory SDR due to the in-path rule. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can view the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Disk Load | Displays the RiOS data store disk load. |
Alarm | SteelHead state | Reason |
Admission Control | Admission Control | •Connection Limit - Indicates that the system connection limit has been reached. Additional connections are passed through unoptimized. The alarm clears when the SteelHead moves out of this condition. •CPU - Indicates that the SteelHead has entered admission control due to high CPU use. During this event, the SteelHead continues to optimize existing connections, but passes through new connections without optimization. The alarm clears automatically when the CPU usage decreases. •MAPI - Indicates that the total number of MAPI optimized connections has exceeded the maximum admission control threshold. By default, the maximum admission control threshold is 85 percent of the total maximum optimized connection count for the client-side SteelHead. The SteelHead reserves the remaining 15 percent so the MAPI admission control doesn’t affect the other protocols. The 85 percent threshold is applied only to MAPI connections. The alarm clears automatically when the MAPI traffic decreases; however, it can take one minute for the alarm to clear. The system preemptively closes MAPI sessions to reduce the connection count in an attempt to bring the SteelHead out of admission control. RiOS closes MAPI sessions in this order: –MAPI prepopulation connections –MAPI sessions with the largest number of connections –MAPI sessions with the most idle connections –Most recently optimized MAPI sessions or the oldest MAPI session –MAPI sessions exceeding the memory threshold •Memory - Indicates that the appliance has entered admission control due to memory consumption. The appliance is optimizing traffic beyond its rated capability and is unable to handle the amount of traffic passing through the WAN link. During this event, the appliance continues to optimize existing connections, but new connections are passed through without optimization. No other action is necessary as the alarm clears automatically when the traffic decreases. •TCP - Indicates that the appliance has entered admission control due to high TCP memory use. During this event, the appliance continues to optimize existing connections, but new connections are passed through without optimization. The alarm clears automatically when the TCP memory pressure decreases. |
Asymmetric Routing | Needs Attention | Indicates that the system is experiencing asymmetric traffic. Indicates OK if the system isn’t experiencing asymmetric traffic. In addition, any asymmetric traffic is passed through, and the route appears in the Asymmetric Routing table. For details about the Asymmetric Routing table, see Configuring asymmetric routing features. |
Connection Forwarding | Degraded | Indicates that the system has detected a problem with a connection-forwarding neighbor. The connection-forwarding alarms are inclusive of all connection-forwarding neighbors. For example, if a SteelHead has three neighbors, the alarm triggers if any one of the neighbors is in error. In the same way, the alarm clears only when all three neighbors are no longer in error. •Cluster Neighbor Incompatible - Indicates that a connection-forwarding neighbor in a SteelHead Interceptor cluster has path selection enabled while path selection isn’t enabled on another appliance in the cluster. This alarm can also indicate that a connection-forwarding neighbor is running a RiOS version that is incompatible with IPv6. Neighbors must be running RiOS 8.5 or later. The SteelHead neighbors pass through IPv6 connections when this incompatibility is detected. •Multiple Interface - Indicates that the connection to an appliance in a connection forwarding cluster has been lost or disconnected due to a configuration incompatibility. •Single Interface - Indicates that the connection to a SteelHead connection-forwarding neighbor is lost. These issues trigger the single connection-forwarding alarm: –The connection-forwarding neighbor has not sent a keepalive message within the time-out period to the neighbor SteelHead(s), indicating that the connection has been lost. –The connection can’t be established with a connection-forwarding neighbor. –The connection has been closed by the connection-forwarding neighbor. –The connection has been lost with the connection-forwarding neighbor due to an error. –The connection has been lost because requests have not been acknowledged by a connection-forwarding neighbor within the set threshold. –The SteelHead has timed out while waiting for an initialization message from a connection-forwarding neighbor. –The amount of latency between connection-forwarding neighbors has exceeded the specified threshold. |
CPU Utilization | Degraded | Indicates that the system has reached the CPU threshold for any of the CPUs in the SteelHead. If the system has reached the CPU threshold, check your settings. For details, see Configuring alarm settings. If your alarm thresholds are correct, reboot the SteelHead. For details, see Rebooting and shutting down the SteelHead. Note: If more than 100 MB of data is moved through a SteelHead while performing PFS synchronization, the CPU utilization might become high and result in a CPU alarm. This CPU alarm isn’t cause for concern. |
Data Store | Critical | •Corruption - Indicates that the RiOS data store is corrupt or has become incompatible with the current configuration. •Data Store Clean Required - Indicates that you must clear the RiOS data store. To clear the data store, choose Administration > Maintenance: Services and select the Clear Data Store check box before restarting the appliance. Clearing the data store degrades performance until the system repopulates the data. •Encryption Level Mismatch - Indicates a RiOS data store error such as an encryption, header, or format error. •Synchronization Error - Indicates that the RiOS data store synchronization between two SteelHeads has been disrupted and the RiOS data stores are no longer synchronized. For details, see Synchronizing peer RiOS data stores. Resetting the Data Store alarm If a data store alarm was caused by an unintended change to the configuration, you can change the configuration to match the previous RiOS data store settings, and then restart the service without clearing the data store to reset the alarm. Typical configuration changes that require a restart with a clear RiOS data store are enabling the extended peer table or changing the data store encryption type. For details, see Configuring peering and Encrypting the RiOS data store. To clear the RiOS data store of data, choose Administration > Maintenance: Services, select Clear Data Store and click Reboot to reboot the optimization service. For details, see Starting and stopping the optimization service. |
Disk Full | Indicates that the system partitions (not the RiOS data store) are full or almost full. For example, RiOS monitors the available space on /var, which is used to hold logs, statistics, system dumps, TCP dumps, and so on. Examine the directory to see if it is storing an excessive amount of snapshots, system dumps, or TCP dumps that you could delete. You could also delete any RiOS images that you no longer use. | |
Domain Authentication Alert | Needs Attention | Indicates that the system is unable to communicate with the DC, has detected an SMB signing error, or delegation has failed. CIFS-signed and Encrypted-MAPI traffic is passed through without optimization. For details, see Configuring CIFS optimization. |
Domain Join Error | Degraded | Indicates an attempt to join a Windows domain has failed. For details, see Troubleshooting a domain join failure. |
Flash Protection Failure | Critical | Indicates that the USB flash drive has not been backed up because there isn’t enough available space in the /var filesystem directory. Examine the /var directory to see if it is storing an excessive amount of snapshots, system dumps, or TCP dumps that you could delete. You could also delete any RiOS images that you no longer use. |
Hardware | Either Critical or Degraded, depending on the state | •Disk Error - Indicates that one or more disks is offline. To see which disk is offline, enter this CLI command from the system prompt: show raid diagram •Fan Error - Indicates that a fan is failing or has failed and must be replaced. •Flash Error - Indicates an error with the flash drive hardware. At times, the USB flash drive that holds the system images might become unresponsive; the SteelHead continues to function normally. When this error triggers you can’t perform a software upgrade, as the SteelHead is unable to write a new upgrade image to the flash drive without first power cycling the system. To reboot the appliance, go to the Administration > Maintenance: Reboot/Shutdown page or enter the CLI reload command to automatically power cycle the SteelHead and restore the flash drive to its proper function. On desktop SteelHead x50 and x55 models, you must physically power cycle the appliance (push the power button or pull the power cord). •IPMI - Indicates an Intelligent Platform Management Interface (IPMI) event (not supported on all appliance models). This alarm triggers when there has been a physical security intrusion. These events trigger this alarm: –chassis intrusion (physical opening and closing of the appliance case) –memory errors (correctable or uncorrectable ECC memory errors) –hard drive faults or predictive failures –power supply status or predictive failure By default, this alarm is enabled. •Management Disk Size Error - Indicates that the size of the management disk is too small for the SteelHead (virtual edition) model. This condition can occur when upgrading a SteelHead (virtual edition) to a VCX model without first expanding the management disk to a size that supports the higher end models. To clear the alarm, increase the size of the management disk. •Memory Error - Indicates a memory error (for example, when a system memory stick fails). |
• Other Hardware Error - Indicates one of these hardware issues: –the SteelHead doesn’t have enough disk, memory, CPU cores, or NIC cards to support the current configuration. –the SteelHead is using a memory Dual In-line Memory Module (DIMM), a hard disk, or a NIC that isn’t qualified by Riverbed. •DIMMs are plugged into the SteelHead but RiOS can’t recognize them because: –a DIMM is in the wrong slot. You must plug DIMMs into the black slots first and then use the blue slots when all of the black slots are in use. —or— –a DIMM is broken and you must replace it. –other hardware issues exist. By default, this alarm is enabled. •Safety Valve: disk access exceeds response times - Indicates that the SteelHead is experiencing increased disk access time and has started the safety valve disk bypass mechanism that switches connections into SDR-A. SDR-A performs data reduction in memory until the disk access latency falls below the safety valve activation threshold. Disk access time can exceed the safety valve activation threshold for several reasons: the SteelHead might be undersized for the amount of traffic it is required to optimize, a larger than usual amount of traffic is being optimized temporarily, or a disk is experiencing hardware issues such as sector errors, failing mechanicals, or RAID disk rebuilding. You configure the safety valve activation threshold and timeout using CLI commands: datastore safety-valve threshold datastore safety-value timeout For details, see the Riverbed Command-Line Interface Reference Manual. To clear the alarm, restart the SteelHead. •Power Supply - Indicates an inserted power supply cord doesn’t have power, as opposed to a power supply slot with no power supply cord inserted. •RAID - Indicates an error with the RAID array (for example, missing drives, pulled drives, drive failures, and drive rebuilds). An audible alarm might also sound. To see if a disk has failed, enter this CLI command from the system prompt: show raid diagram For drive rebuilds, if a drive is removed and then reinserted, the alarm continues to be triggered until the rebuild is complete. Rebuilding a disk drive can take 4-6 hours. | ||
Inbound QoS WAN Bandwidth Configuration | Degraded (Needs Attention) | Indicates that the inbound QoS WAN bandwidth for one or more of the interfaces is set incorrectly. You must configure the WAN bandwidth to be less than or equal to the interface bandwidth link rate. This alarm triggers when the system encounters one of these conditions: •An interface is connected and the WAN bandwidth is set higher than its bandwidth link rate: for example, if the bandwidth link rate is 1536 kbps, and the WAN bandwidth is set to 2000 kbps. •A nonzero WAN bandwidth is set and QoS is enabled on an interface that is disconnected; that is, the bandwidth link rate is 0. •A previously disconnected interface is reconnected, and its previously configured WAN bandwidth was set higher than the bandwidth link rate. The Management Console refreshes the alarm message to inform you that the configured WAN bandwidth is set higher than the interface bandwidth link rate. While this alarm appears, the SteelHead puts existing connections into the default class. The alarm clears when you configure the WAN bandwidth to be less than or equal to the bandwidth link rate or reconnect an interface configured with the correct WAN bandwidth. By default, this alarm is enabled. |
Licensing | Needs Attention, Degraded, or Critical, depending on the state | Indicates whether your licenses are current. •Appliance Unlicensed - This alarm triggers if the SteelHead a license installed for its currently configured model or feature set. For details about updating licenses, see Managing licenses and model upgrades. •Autolicense Critical Event - This alarm triggers on a SteelHead (virtual edition) appliance when the Riverbed Licensing Portal can’t respond to a license request with valid licenses. The Licensing Portal can’t issue a valid license for one of these reasons: –A newer SteelHead (virtual edition) appliance is already using the token, so you can’t use it on the SteelHead (virtual edition) appliance displaying the critical alarm. Every time the SteelHead (virtual edition) appliance attempts to refetch a license token, the alarm retriggers. –The token has been redeemed too many times. Every time the SteelHead (virtual edition) appliance attempts to refetch a license token, the alarm retriggers. Discontinue use of the other SteelHead (virtual edition) appliance or contact Riverbed Support. •Autolicense Informational Event - This alarm triggers if the Riverbed Licensing Portal has information regarding the licenses for a SteelHead (virtual edition) appliance. For example, the SteelHead (virtual edition) appliance displays this alarm when the portal returns licenses that are associated with a token that has been used on a different SteelHead (virtual edition) appliance. Make sure that any previous SteelHead (virtual edition) appliances that were licensed with that token are no longer running. The alarm clears automatically the next time the SteelHead (virtual edition) appliance fetches the licenses from the Licensing Portal. •Licenses Expired - This alarm triggers if one or more features has at least one license installed, but all of them are expired. •Licenses Expiring - This alarm triggers if the license for one or more features is going to expire within two weeks. Note: The licenses expiring and licenses expired alarms are triggered per feature. For example, if you install two license keys for a feature, LK1-FOO-xxx (expired) and LK1-FOO-yyy (not expired), the alarms don’t trigger, because the feature has one valid license. If the Licenses Expiring alarm triggers, the system status changes to Needs Attention. The Licenses Expired alarm changes the system status to Degraded. Depending on the expiring license, other alarms might trigger simultaneously. For example, if the primary license expires, the Appliance Unlicensed alarm triggers and changes the health to Critical. |
Link Duplex | Degraded | Indicates that an interface was not configured for half-duplex negotiation but has negotiated half-duplex mode. Half-duplex significantly limits the optimization service results. The alarm displays which interface is triggering the duplex error. Choose Networking > Networking: Base Interfaces and examine the SteelHead link configuration. Next, examine the peer switch user interface to check its link configuration. If the configuration on one side is different from the other, traffic is sent at different rates on each side, causing many collisions. To troubleshoot, change both interfaces to automatic duplex negotiation. If the interfaces don’t support automatic duplex, configure both ends for full duplex. You can enable or disable the alarm for a specific interface. To disable an alarm, choose Administration: System Settings > Alarms and select or clear the check box next to the link alarm. |
Link I/O Errors | Degraded | Indicates that the error rate on an interface has exceeded 0.1 percent while either sending or receiving packets. This threshold is based on the observation that even a small link error rate reduces TCP throughput significantly. A properly configured LAN connection experiences few errors. The alarm clears when the error rate drops below 0.05 percent. You can change the default alarm thresholds by entering the alarm link_io_errors err-threshold <threshold-value> CLI command at the system prompt. For details, see the Riverbed Command-Line Interface Reference Manual. To troubleshoot, try a new cable and a different switch port. Another possible cause is electromagnetic noise nearby. You can enable or disable the alarm for a specific interface. For example, you can disable the alarm for a link after deciding to tolerate the errors. To enable or disable an alarm, choose Administration > System Settings: Alarms and select or clear the check box next to the link name. |
Link State | Degraded | Indicates that the system has lost one of its Ethernet links due to an unplugged cable or dead switch port. Check the physical connectivity between the SteelHead and its neighbor device. Investigate this alarm as soon as possible. Depending on what link is down, the system might no longer be optimizing, and a network outage could occur. You can enable or disable the alarm for a specific interface. To enable or disable the alarm, choose Administration > System Settings: Alarms and select or clear the check box next to the link name. |
Memory Error | Degraded | Indicates that the system has detected a memory error. A system memory stick might be failing. First, try reseating the memory first. If the problem persists, contact Riverbed Support for an RMA replacement as soon as practically possible. |
Memory Paging | Degraded | Indicates that the system has reached the memory paging threshold. If 100 pages are swapped approximately every two hours the SteelHead is functioning properly. If thousands of pages are swapped every few minutes, reboot the SteelHead. For details, see Rebooting and shutting down the SteelHead. If rebooting doesn’t solve the problem, contact Riverbed Support at https://support.riverbed.com. |
Neighbor Incompatibility | Degraded | Indicates that the system has encountered an error in reaching a SteelHead configured for connection forwarding. For details, see Configuring connection forwarding features. |
Network Bypass | Critical | Indicates that the system is in bypass failover mode. If the SteelHead is in bypass failover mode, restart the optimization service. If restarting the service doesn’t resolve the problem, reboot the SteelHead. If rebooting doesn’t resolve the problem, shut down and restart the SteelHead. For details, see Rebooting and shutting down the SteelHead, and Starting and stopping the optimization service. |
NFS V2/V4 Alarm | Degraded | Indicates that the system has detected either NFSv2 or NFSv4 is in use. The SteelHead supports only NFSv3 and passes through all other versions. For details, see Configuring NFS optimization. |
Optimization Service | Critical | •Internal Error - The optimization service has encountered a condition that might degrade optimization performance. Go to the Administration > Maintenance: Services page and restart the optimization service. •Unexpected Halt - The optimization service has halted due to a serious software error. See if a system dump was created. If so, retrieve the system dump and contact Riverbed Support immediately. For details, see Viewing logs. •Service Status - The optimization service has encountered an optimization service condition. The message indicates the reason for the condition: –optimization service is not running This message appears after an optimization restart. For more information, review the SteelHead logs. –in-path optimization is not enabled This message appears if an in-path setting is disabled for an in-path SteelHead. For more information, review the SteelHead logs. –optimization service is initializing This message appears after a reboot. The alarm clears. For more information, review the SteelHead logs. –optimization service is not optimizing This message appears after a system crash. For more information, review the SteelHead logs. –optimization service is disabled by user This message appears after entering the CLI command no service enable or shutting down the optimization service from the Management Console. For more information, review the SteelHead logs. –optimization service is restarted by user This message appears after the optimization service is restarted from either the CLI or Management Console. You might want to review the SteelHead logs for more information. |
Outbound QoS WAN Bandwidth Configuration | Degraded (Needs Attention) | Indicates that the outbound QoS WAN bandwidth for one or more of the interfaces is set incorrectly. You must configure the WAN bandwidth to be less than or equal to the interface bandwidth link rate. This alarm triggers when the system encounters one of these conditions: •An interface is connected and the WAN bandwidth is set higher than its bandwidth link rate: for example, if the bandwidth link rate is 1536 kbps, and the WAN bandwidth is set to 2000 kbps. •A nonzero WAN bandwidth is set and QoS is enabled on an interface that is disconnected; that is, the bandwidth link rate is 0. •A previously disconnected interface is reconnected, and its previously configured WAN bandwidth was set higher than the bandwidth link rate. The Management Console refreshes the alarm message to inform you that the configured WAN bandwidth is set higher than the interface bandwidth link rate. While this alarm appears, the SteelHead puts existing connections into the default class. The alarm clears when you configure the WAN bandwidth to be less than or equal to the bandwidth link rate or reconnect an interface configured with the correct WAN bandwidth. By default, this alarm is enabled. |
Path Selection Path Down | Degraded | Indicates that one of the predefined paths for a connection is unavailable because it has exceeded either the timeout value for path latency or the threshold for observed packet loss. When a path fails, the SteelHead directs traffic through another available path. When the original path comes back up, the SteelHead redirects the traffic back to it. |
Path Selection Path Probing Error | Degraded | Indicates that a path selection monitoring probe for a predefined path has received a probe response from an unexpected relay or interface. |
Process Dump Creation Error | Degraded | Indicates that the system has detected an error while trying to create a process dump. This alarm indicates an abnormal condition in which RiOS can’t collect the core file after three retries. It can be caused when the /var directory, which is used to hold system dumps, is reaching capacity or other conditions. When this alarm is raised, the directory is blacklisted. Contact Riverbed Support to correct the issue. |
Proxy File Service | Degraded | Indicates that there has been a PFS operation or configuration error. •Proxy File Service Configuration - Indicates that a configuration attempt has failed. If the system detects an configuration failure, attempt the configuration again. •Proxy File Service Operation - Indicates that a synchronization operation has failed. If the system detects an operation failure, attempt the operation again. |
Secure Transport | Indicates that a peer SteelHead has encountered a problem with the secure transport controller connection. The secure transport controller is a SteelHead that typically resides in the data center and manages the control channel and operations required for secure transport between SteelHead peers. The control channel between the SteelHeads uses SSL to secure the connection between the peer SteelHead and the secure transport controller. •Connection with Controller Lost - Indicates that the peer SteelHead is no longer connected to the secure transport controller for one of these reasons: –The connectivity between the peer SteelHead and the secure transport controller is lost. –The SSL for the connection isn’t configured correctly. •Registration with Controller Unsuccessful - Indicates that the peer SteelHead isn’t registered with the secure transport controller, and the controller doesn’t recognize it as a member of the secure transport group. | |
Secure Vault | Degraded | Indicates a problem with the secure vault. •Secure Vault Locked - Needs Attention - Indicates that the secure vault is locked. To optimize SSL connections or to use RiOS data store encryption, the secure vault must be unlocked. Go to Administration > Security: Secure Vault and unlock the secure vault. •Secure Vault New Password Recommended - Degraded - Indicates that the secure vault requires a new, nondefault password. Reenter the password. •Secure Vault Not Initialized - Critical - Indicates that an error has occurred while initializing the secure vault. When the vault is locked, SSL traffic isn’t optimized and you can’t encrypt the RiOS data store. For details, see Unlocking the secure vault. |
Software Compatibility | Needs Attention or Degraded, depending on the state | Indicates that there’s a mismatch between software versions in the Riverbed system. •Peer Mismatch - Needs Attention - Indicates that the appliance has encountered another appliance that is running an incompatible version of system software. Refer to the CLI, Management Console, or the SNMP peer table to determine which appliance is causing the conflict. Connections with that peer will not be optimized, connections with other peers running compatible RiOS versions are unaffected. To resolve the problem, upgrade your system software. No other action is required as the alarm clears automatically. •Software Version Mismatch - Degraded - Indicates that the appliance is running an incompatible version of system software. To resolve the problem, upgrade your system software. No other action is required as the alarm clears automatically. By default, this alarm is enabled. |
SSD Write Cycle Level Exceeded | Degraded | Indicates that the accumulated Solid-State Disk (SSD) write cycles are exceeding a predefined write cycle level (95 percent) on SteelHead models with SSDs. If the alarm triggers, the administrator can swap out the disk before any problems arise. RiOS tracks the number of writes to each block. To view the associated statistics, enter this CLI command: show stats alarm ssd_wear_warning For details, see the Riverbed Command-Line Interface Reference Manual. |
SSL | Needs Attention | Indicates that an error has been detected in your secure vault or SSL configuration. For details about checking your settings, see Verifying SSL and secure inner channel optimization. •Non-443 SSL Servers - Indicates that during a RiOS upgrade (for example, from 8.5 to 9.0), the system has detected a preexisting SSL server certificate configuration on a port other than the default SSL port 443. SSL traffic might not be optimized. To restore SSL optimization, you can add an in-path rule to the client-side SteelHead to intercept the connection and optimize the SSL traffic on the nondefault SSL server port. After adding an in-path rule, you must clear this alarm manually by entering this CLI command: stats alarm non_443_ssl_servers_detected_on_upgrade clear •SSL Certificates Error - Indicates that an SSL peering certificate has failed to re-enroll automatically within the Simple Certificate Enrollment Protocol (SCEP) polling interval. •SSL Certificates Expiring - Indicates that an SSL certificate is about to expire. Two types of certificates can trigger this alarm: Certificate Authority certificates used to validate servers and SSL Server Certificates that the SteelHead uses when acting as a trusted man in the middle. Depending on the type of certificate, you can review the expiring certificates on the Optimization: SSL > Certificate Authorities page or the Optimization: SSL > SSL Main Settings page. (The alarm only redirects you to the Certificate Authorities page, but you might need to review the SSL Main Settings page for your certificate.) Note, certificates are sorted by name and the expiring certificates might not be visible until you scroll through the list. •SSL Certificates SCEP - Indicates that an SSL certificate has failed to reenroll automatically within the SCEP polling interval. •SSL HSM private key not accessible - Indicates that the server-side SteelHead can’t import the private key corresponding to the proxy certificate from a SafeNet Luna Hardware Security Module (HSM) server. The private key is necessary to establish mutual trust between the SteelHead and the HSM for proxied SSL traffic optimization. Check that the server-side SteelHead can access the HSM device and that the private key exists on the HSM server. For details, see the Riverbed Command-Line Interface Reference Manual. |
Storage Profile Switch Failed | Either Critical or Needs Attention, depending on the state | On a SteelHead EX, indicates that an error has occurred while repartitioning the disk drives during a storage profile switch. The repartitioning was unsuccessful. A profile switch changes the disk space allocation on the drives to allow VE and VSP to use varying amounts of storage. It also clears the SteelFusion and VSP data stores, and repartitions the data stores to the appropriate sizes. You switch a storage profile by entering the disk-config layout CLI command at the system prompt or by choosing Administration > System Settings: Disk Management on an EX or EX+SteelFusion SteelHead and selecting a storage profile. A storage profile switch requires a reboot of the SteelHead. The alarm appears after the reboot. These reasons can cause a profile switch to fail: •RiOS can’t validate the profile. •The profile contains an invalid upgrade or downgrade. •RiOS can’t clean up the existing VDMKs. During cleanup, RiOS uninstalls all slots and deletes all backups and packages. When you encounter this error, reboot the SteelHead and then switch the storage profile again. If the switch succeeds, the error clears. If it fails, RiOS reverts the SteelHead to the previous storage profile. •If RiOS successfully reverts the SteelHead to the previous storage profile, the alarm status displays needs attention. •If RiOS is unable to revert the SteelHead to the previous storage profile, the alarm status becomes critical. For assistance, contact Riverbed Support: |
System Detail Report | Degraded | Indicates that the system has detected a problem with an optimization or system module. For details, see Viewing System Details reports. |
Temperature | Critical or Warning | •Critical - Indicates that the CPU temperature has exceeded the critical threshold. The default value for the rising threshold temperature is 80ºC; the default reset threshold temperature is 67ºC. •Warning - Indicates that the CPU temperature is about to exceed the critical threshold. |
Web Proxy | Degraded | •Configuration - Indicates that the system has detected an error with the web proxy configuration. •Service Status - Indicates that the system has detected an error with the web proxy service. |
Control | Description |
Time Interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can quickly see the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Display Mode | Select one of these displays from the drop-down menu: •Brief - Displays the CPU utilization percentage of all CPU cores combined as a systemwide average. Detailed - Displays the CPU percentages for each RiOS core individually. The individual cores appear with a number and a color in the data series. To hide or display a core in the plot area, select or clear the check box next to the core name. |
Data series | Description |
Page Swap Out Rate | Specifies the total number of pages swapped per second. If 100 pages are swapped approximately every two hours, the SteelHead is functioning properly. If thousands of pages are swapped every few minutes, contact Riverbed Support at https://support.riverbed.com. |
Control | Description |
Time Interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can quickly see the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Max Threshold | Displays the maximum amount of memory bytes that the TCP stack can allocate for its needs. |
Cutoff Threshold | Displays the number of memory bytes allocated until the TCP memory allocation subsystem doesn’t apply memory-saving mechanisms and rules. As soon as the TCP memory consumption reaches the cutoff limit, the TCP stack enters a “memory pressure” state. This state applies several important limitations that restrict memory use by incoming and transmitted packets. In practice, this means that part of the incoming packets can be discarded, and user space code is limited in its abilities to send data. |
Enable Threshold | Displays the lower boundary of TCP memory consumption, when the memory pressure state is cleared and the TCP stack can use the regular memory allocation approach again. |
Memory Usage | Displays the average memory consumption by the TCP/IP stack. |
Memory Pressure | Displays the maximum percentage of time that the kernel has spent under TCP memory pressure. |
Control | Description |
Time Interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can quickly see the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Column | Description |
Disk | Displays the disk number. |
Status | Displays the disk status: •Degraded - Indicates a failure of one or more of the RAID arrays. The disk itself has not failed. •Failed - Indicates the disk has failed. The alarm email notification denotes whether the failure is on a management or data store disk. The optimization service continues to run normally without interruption or dropped connections when a single disk fails, albeit with reduced data store capacity and performance degradation. This message can also indicate that a disk has been inserted into an incorrect slot or that the disk has already been used in another SteelHead. If all disks fail, the optimization service halts. Consult the system log for more information. Riverbed replaces the failed component at Riverbed’s expense as long as the device is covered by a current support contract. Depending on the level of support contract, a trained engineer could be on site with the replacement part within four hours. If the report displays a failed disk status, go to Riverbed Support at https://support.riverbed.com. •Missing - There is no disk in the slot. •Rebuilding - The disk is rebuilding after it has been inserted into the slot. Rebuilding a data store disk takes approximately one hour or less to rebuild; a management disk that is part of a RAID mirror can take longer (4-6 hours). The status continues to be rebuilding until the drive is completely rebuilt. •Online - Disk is up and working. |
Task | Displays the system component the disk is used for: either data store or management. If the disk is used for both, the task column doesn’t appear. |
Column | Description |
Module | Displays the SteelHead module. Select a module name to view details. A right arrow to the left of a module indicates that the report includes detailed information about a submodule. Click the arrow to view submodule details. This report examines these modules: •CPU - Displays information about idle time, system time, and user time per CPU. •Memory - Displays information about the total, used, and free memory by percentage and in kilobytes. •CIFS - Click the right arrow and the submodule name to view details for unexpected shutdowns and round-trip statistics. •HTTP - Click the right arrow and the submodule name to view details for the URL Learning, Parse and Prefetch, Object Prefetch Table, and Stream Splitting optimization schemes. •Intercept - Click the right arrow to view statistics for message queue, GRE, and WCCP. Also includes table length and watchdog status. •Lotus Notes - Displays whether Lotus Notes optimization is enabled. •MAPI - Click the right arrow and the submodule name to view details for: Accelerators - Displays how many accelerator objects have been created for read-ahead, write-behind, and cached-mode folder synchronization. One accelerator object corresponds to the optimization of one particular Outlook action. –Read-ahead is for downloading an email attachment (in noncached Outlook mode or for public folders). –Write-behind is for uploading an email attachment. –Cache-sync is for downloading the new contents of a folder (in cached mode). Requests and responses - Displays the number of MAPI round-trips used and saved. Includes the number of responses and faults along with the fault reason: for example, access denied. MAPI decryption and encryption (RPCCR) - Displays whether MAPI decryption and encryption is enabled. Includes the number of client-side and server-side SteelHead encrypted MAPI sessions, along with details about how many sessions were not encrypted, how many sessions were successfully decrypted and encrypted, how many sessions were passed through, and how many sessions experienced an authentication failure. Connection sessions - Displays the number of client-side and server-side SteelHead MAPI sessions, counting the number of MAPI 2000, 2003, 2007, and pass-through sessions. •Oracle Forms - Click the right arrow and submodule name to view details for native and HTTP mode key. •Secure Peering - Click the right arrow and submodule name to view details for secure inner channels, including information about certificate and private key validity, peer SteelHead trust, and blacklisted servers. •Splice Policy - Displays details about the splice policy in use. •SSL - Displays whether SSL optimization is enabled and details about the SSL configuration, such as which advanced settings are in use. Click the right arrow and the submodule name to view details for the SSL outer and inner channels. |
Status | Displays one of these results: •OK (Green) •Warning (Yellow) •Error (Red) •Disabled (Gray). Appears when you manually disable the module. |
Control | Description |
Gateway Test | Determines if each configured gateway is connected correctly. Run this test to ping each configured gateway address with 4 packets and record the number of failed or successful replies. The test passes if all 4 packets are acknowledged. The default packet size is 64 bytes. •Internet Protocol - Select IPv4 or IPv6 from the drop-down list. •Run - Click to run the test. If the test fails and all packets are lost, ensure the gateway IP address is correct and the SteelHead is on the correct network segment. If the gateway is reachable from another source, check the connections between the SteelHead and the gateway. If the test fails and only some packets are lost, check your duplex settings and other network conditions that might cause dropped packets. |
Cable Swap Test | Ensures that the WAN and LAN cables on the SteelHead are connected to the LAN and WAN of the network. The test enumerates the results by interface (one row entry per pair of bypass interfaces). By default, this test is disabled. Note: Certain network topologies might cause an incorrect result for this test. For the following topologies, we recommend that you confirm the test result manually: •SteelHeads deployed in virtual in-path mode. •Server-side SteelHeads that receive significant amounts of traffic from nonoptimized sites. •SteelHeads that sit in the path between other SteelHeads that are optimizing traffic. If the test fails, ensure a straight-through cable is not in use between an appliance port and a router, or that a crossover cable is not in use between an appliance port and a switch. |
Duplex Test | Determines if the speed and duplex settings match on each side of the selected interface. If one side is different from the other, then traffic is sent at different rates on each side, causing a great deal of collision. This test runs the ping utility for 5 seconds with a packet size of 2500 bytes against the interface. •Interface - Specify an interface to test. •IP Address - Specify an IPv4 or IPv6 address that is on the testing interface side. •Run - Click to run the test. The test passes if the system acknowledges 100 percent of the packets and receives responses from all packets. If any packets are lost, the test fails. If the test fails, ensure the speed and duplex settings of the appliance's Ethernet interface matches that of the switch ports to which it’s connected. The test output records the percentage of any lost packets and number of collisions. Note: For accurate test results, traffic must be running through the SteelHead. |
Peer Reachability Test | Select to send a test probe to a specified peer and await the probe response. If a response is not received, the test fails. To view the current peer appliances, choose Reports > Optimization: Peers. •IP Address - Specify the IPv4 or IPv6 address of the peer appliance to test. •Run - Click to run the test. Notes: •This test might not be accurate when the peer SteelHead is configured out-of-path. •Do not specify the primary or auxiliary IP of the same SteelHead displayed in the Peers report (the primary or auxiliary IP to which the SteelHead is connected). If the test fails, ensure that there are no firewalls, IDS/IPS, VPNs, or other security devices that might be stripping or dropping connection packets between SteelHeads. |
IP Port Reachability Test | Select to determine whether a specified IP address and optional port is correctly connected. If you specify only an IP address, the test sends an ICMP message to the IP address. If you specify a port number, the test telnets to the port. •Interface - Optionally, specify an interface to test. •IP Address - Specify the IP4 or IPv6 address to test. •Port - Optionally, specify a port to test. •Run - Click to run the test. If the test fails, ensure that dynamic or static routing on your network is correctly configured and that the remote network is reachable from hosts on the same local subnet as this appliance. |
Run Selected | Runs the selected tests. |
View or Hide Test Output | Click to view or hide the test results. |
Control | Description |
Test DNS | Checks SteelHead DNS settings, which must be correct for Windows domain authentication, SMB signing, SMB2/3 signing, and encrypted MAPI optimization. A test status appears for the most recent test run: Passed, Failed, or Undetermined. •Domain/Realm - Specify the fully qualified Active Directory domain in which the SteelHead is a member. Typically, this is your company domain name. •Test DNS - Click to run the test. The Management Console dims this button until you specify the domain name. |
Test Join | Confirms that the SteelHead is correctly joined to the Windows domain by verifying that the domain join configuration of the SteelHead is valid on the backend domain controller in Active Directory. A test status appears for the most recent test run: Passed, Failed, or Undetermined. •Test Join - Click to run the test. |
Test Delegation Setup | Checks whether an account has the necessary Active Directory privileges for delegation or automatic delegation. A test status appears for the most recent test run: Passed, Failed, or Undetermined. •Delegation Domain/Realm - Select the fully qualified domain in which the SteelHead is a member. Typically, this is your company domain name. •Domain Controller - Specify the host that provides user login service in the domain. •Test Delegation Setup - Click to run the test. The Management Console dims this button until you specify all required information. |
Test Delegation Privileges | Confirms delegation privileges for a particular server by verifying that the correct privileges are set to perform constrained delegation. Within SMB signing, SMB2/3 signing, and encrypted MAPI in delegation mode, the SteelHead and the AD environment must have correct privileges to obtain Kerberos tickets for the CIFS or Exchange Server and perform the subsequent authentication. A test status appears for the most recent test run: Passed, Failed, or Undetermined. •Delegation Domain/Realm - Select the domain in which the SteelHead is a member. Typically, this is your company domain name. •Server - Specify a delegate server hostname. •Server IP - Specify the delegate server IP address. •Service - Select either CIFS or Exchange MDB. •Account to Delegate - Specify a domain username. •Test Delegation Privileges - Click to run the test. The Management Console dims this button until you specify all required information. |
Test NTLM Authentication | Tests whether NTLM can successfully authenticate a user to the joined domain. A test status appears for the most recent test run: Passed, Failed, or Undetermined. •Username - Specify an Active Directory domain username. •Password - Specify a password. •Domain/Realm - Specify the fully qualified domain of the Active Directory in which the SteelHead is a member. Typically, this is your company domain name. •Short Domain Name - Specify the short domain (NetBIOS) name if it doesn’t match the first portion of the Active Directory domain name. Case matters; NBTTECH isn’t the same as nbttech. •Test NTLM Authentication - Click to run the test. The Management Console dims this button until you specify all required information. |
Test Replication Setup | Tests the ability to replicate the server account by attempting to replicate a server account using the replication user for the domain. A test status appears for the most recent test run: Passed, Failed, or Undetermined. •Delegation Domain/Realm - Select the fully qualified domain of the Active Directory in which the replication user is a trusted member. For example, REPLICATION.TEST. •Short Domain Name - Specify the short domain (NetBIOS) name (or replication server) if it doesn’t match the first portion of the Active Directory domain name. Case matters; NBTTECH isn’t the same as nbttech. •Replication Server - Specify a CIFS or Exchange replication server hostname. •Test Replication Setup - Click to run the test. The Management Console dims this button until you specify all required information. |
Test Replication PRP | Ensures that the server account can be replicated as per the password replication policy (PRP) on the domain controller. This test only works for Windows 2008 and later domains. A test status appears for the most recent test run: Passed, Failed, or Undetermined. •Replication Domain/Realm - Select the fully qualified domain of the Active Directory in which the replication user is a trusted member: for example, REPLICATION.TEST •Domain Controller - Specify the host that provides user login service in the domain. •Replication Server - Specify a CIFS or Exchange replication server hostname. •Test Replication PRP - Click to run the test. The Management Console dims this button until you specify all required information. |
Control | Description |
Show | Select one of the archived logs or Current Log from the drop-down list. |
Lines per Page | Specify the number of lines you want to display in the page. |
Jump to | Select one of these options from the drop-down list: •Page - Specify the number of pages you want to display. •Time - Specify the time for the log you want to display. |
Filter | Select one of these filtering options from the drop-down list: •Regular expression - Specify a regular expression on which to filter the log. •Error or higher - Displays Error level logs or higher. •Warning or higher - Displays Warning level logs or higher. •Notice or higher - Displays Notice level logs or higher. •Info or higher - Displays Info level logs or higher. |
Go | Displays the report. |
Control | Description |
Show | Select one of the archived logs or Current Log from the drop-down list. |
Lines per page | Specify the number of lines you want to display in the page. |
Jump to | Select one of these options from the drop-down list: •Page - Specify the number of pages you want to display. •Time - Specify the time for the log you want to display. |
Regular Expression Filter | Select one of these filtering options from the drop-down list: •Regular expression - Specify a regular expression on which to filter the log. •Error or higher - Displays Error level logs or higher. •Warning or higher - Displays Warning level logs or higher. •Notice or higher - Displays Notice level logs or higher. •Info or higher - Displays Info level logs or higher. |
Go | Displays the report. |
Control | Description |
Add a New TCP Dump | Displays the controls for creating a capture file. |
Capture Name | Specify the name of the capture file. Use a unique filename to prevent overwriting an existing capture file. The default filename uses this format: hostname_interface_timestamp.cap hostname is the hostname of the SteelHead, interface is the name of the interface selected for the trace (for example, lan0_0, wan0_0), and timestamp is in the YYYY-MM-DD-HH-MM-SS format. If this capture file relates to an open Riverbed Support case, specify the capture filename case_number where number is your Riverbed Support case number: for example, case_12345. Note: The .cap file extension isn’t included with the filename when it appears in the capture queue. |
Endpoints (non-Interceptor deployments) | Specify IP addresses and port numbers to capture packets between them: IPs - Specify IP addresses of endpoints on one side. Separate multiple IP addresses using commas. You can enter IPv6 addresses separated by commas. The default setting is all IP addresses. Ports - Specify ports on one side. Separate multiple ports using commas. The default setting is all ports. —and— IPs - Specify IP addresses of endpoints on the other side. Separate multiple IP addresses using commas. You can enter IPv6 addresses separated by commas. The default setting is all IP addresses. Ports - Specify ports on the other side. Separate multiple ports using commas. The default setting is all ports. Note: To capture traffic flowing in only one direction or to enter a custom command, use the CLI tcpdump command. For details, see the Riverbed Command-Line Interface Reference Manual. |
Endpoints (Interceptor deployments) | Select Interceptor Location - Select either Client or Server. Your choice determines the endpoints you can specify. The endpoints are IP addresses and port numbers in your network. If you select Client: •IPs - Specify All to capture traffic on all IP addresses between the client side and server side (the default). You can limit the capture to specific endpoints connected to the client-site SteelHead by specifying the IP addresses of those endpoints. You can also limit capture to specific IP addresses on the server-side SteelHead by specifying those IP addresses. You can use either IPv4 or IPv6 addresses. Separate multiple addresses with commas. •Ports - Specify All to capture all ports on the client side (the default). You can also specify one or more SteelHead ports, endpoint ports, or both. Separate multiple ports using commas. If you select Server: •IPs - Specify All to capture traffic on all IP addresses between the server side and client side (the default). You can limit the capture to specific endpoints connected to the server-site SteelHead by specifying the IP addresses of those endpoints. You can also limit capture to specific IP addresses on the client-side SteelHead by specifying those IP addresses. You can use either IPv4 or IPv6 addresses. Separate multiple addresses with commas. •Ports - Specify All to capture all ports on the server side (the default). You can also specify one or more SteelHead ports, endpoint ports, or both. Separate multiple ports using commas. Capture Inner Channel Data - Select this check box to capture all inner and redirected traffic between the Interceptor and SteelHead for the specified IP address and port. This check box is deselected by default. Appliance IP address - Specify the in-path IP address of the local SteelHead. Service Port - Specify the service port of the local SteelHead. The default service port number is 7800. Note: To capture traffic flowing in only one direction or to enter a custom command, use the CLI tcpdump command. For details, see the Riverbed Command-Line Interface Reference Manual. |
Capture Interfaces | Captures packet traces on the selected interfaces. You can select all interfaces or a base or in-path interface. The default setting is none. You must specify a capture interface. If you select several interfaces at a time, the data is automatically placed into separate capture files. When path selection is enabled, we recommend that you collect packet traces on all LAN and WAN interfaces. |
Capture Parameters | These parameters let you capture information about dot1q VLAN traffic. You can match traffic based on VLAN-tagged or untagged packets, or both. You can also filter by port number or host IP address and include or exclude ARP packets. Select one of these parameters for capturing VLAN packets: •Capture Untagged Traffic Only - Select this option for these captures: –All untagged VLAN traffic. –Untagged 7850 traffic and ARP packets. You must also specify or arp in the custom flags field in this page. –Only untagged ARP packets. You must also specify and arp in the custom flags field in this page. •Capture VLAN-Tagged Traffic Only - Select this option for these captures: –Only VLAN-tagged traffic. –VLAN-tagged packets with host 10.11.0.6 traffic and ARP packets. You must also specify 10.11.0.6 in the IPs field, and specify or arp in the custom flags field in this page. –VLAN-tagged ARP packets only. You must also specify and arp in the custom flags field in this page. •Capture both VLAN and Untagged Traffic - Select this option for these captures: –All VLAN traffic. –Both tagged and untagged 7850 traffic and ARP packets. You must also specify the following values in the custom flags field in this page: (port 7850 or arp) or (vlan and (port 7850 or arp)) –Both tagged and untagged 7850 traffic only. You must also specify 7850 in one of the port fields in this page. No custom flags are required. –Both tagged and untagged ARP packets. You must also specify the following values in the custom flags field in this page: (arp) or (vlan and arp) |
Capture Duration (Seconds) | Specify a positive integer to set how long the capture runs, in seconds. The default value is 30. Specify 0 or continuous to initiate a continuous trace. For continuous capture, we recommend specifying a maximum capture size and a nonzero rotate file number to limit the size of the TCP dump. |
Maximum Capture Size | Specify the maximum capture file size in megabytes. The default value is 100. After the file reaches the maximum capture size, TCP dump starts writing capture data into the next file, limited by the Number of Files to Rotate field. We recommend a maximum capture file size of 1024 MB (1 GB). |
Buffer Size | Optionally, specify the maximum amount of data, in kilobytes, allowed to queue while awaiting processing by the capture file. The default value is 154 kilobytes. |
Snap Length (bytes) | Optionally, select the snap length value for the capture file or specify a custom value. The snap length equals the number of bytes the report captures for each packet. Having a snap length smaller than the maximum packet size on the network enables you to store more packets, but you might not be able to inspect the full packet content. Select 65535 for a full packet capture (recommended for CIFS, MAPI, and SSL captures). The default value is 1518 bytes. When using jumbo frames, we recommend selecting 9018. The default custom value is 16383 bytes. |
Number of Files to Rotate | Specify how many capture files to keep for each interface before overwriting the oldest file. To stop file rotation, you can specify 0; however, we recommend rotating files, because stopping the rotation can fill the disk partition. This control limits the number of files created to the specified number and begins overwriting files from the beginning, thus creating a rotating buffer. The default value is 5. The maximum value is 2147483647. |
Custom Flags | Specify custom flags as additional statements within the filter expression. Custom flags are added to the end of the expression created from the Endpoints fields and the Capture Parameters radio buttons (pertaining to VLANs). If you require an “and” statement between the expression created from other fields and the expression that you are entering in the custom flags field, you must include the “and” statement at the start of the custom flags field. Do not use host, src, or dst statements in the custom flags field. Although it is possible in trivial cases to get these statements to start without a syntax error, they don’t capture GRE-encapsulated packets that some modes of SteelHead communications use, such as WCCP deployments or Interceptor connection-setup traffic. We recommend using bidirectional filters by specifying endpoints. For complete control of your filter expression, use the CLI tcpdump command. For details, see the Riverbed Command-Line Interface Reference Manual. For examples, see Custom flag use examples. |
Schedule Dump | Schedules the capture to run at a later date and time. |
Start Date | Specify a date to initiate the capture, in this format: YYYY/MM/DD. |
Start Time | Specify a time to initiate the capture, in this format: HH:MM:SS. |
Add | Adds the capture request to the capture queue. |
Filter purpose | Custom flag |
To capture all traffic on VLAN 10 between two specified endpoints: 1.1.1.1 and 2.2.2.2 | and vlan 10 |
To capture any packet with a SYN or an ACK | tcp[tcpflags] & (tcp-syn|tcp-ack) != 0 |
To capture any packet with a SYN | tcp[tcpflags] & (tcp-syn) != 0 —or— tcp[13] & 2 == 2 |
To capture any SYN to or from host 1.1.1.1 | and (tcp[tcpflags] & (tcp-syn) != 0) —or— and (tcp[13] & 2 == 2) |
Filter purpose | Custom flag |
To capture all FIN packets to or from host 2001::2002 | and (ip6[53] & 1!=0) |
To capture all IPv6 SYN packets | ip6 or proto ipv6 and (ip6[53] & 2 == 2) |
Data series | Description |
Miss Rate | Displays the rate of cache misses. |
Hit Rate | Displays the rate of cache hits. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can quickly see the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Data series | Description |
Cache Entries | Displays the number of DNS entries in the cache. |
Memory Use | Displays the cache memory used, in bytes. |
Control | Description |
Time interval | Select a report time interval of 5 minutes (5m), 1 hour (1h), 1 day (1d), 1 week (1w), All, or type a custom date. All includes statistics for the last 30 days. Time intervals that don’t apply to a particular report are dimmed. For a custom time interval, enter the start time and end time using the format YYYY/MM/DD HH:MM:SS. You can quickly see the newest data and see data points as they’re added to the chart dynamically. To display the newest data, click Show newest data. |
Control | Description |
Report | Select the type of report you want to export from the drop-down list. |
Period | Select a report time interval of custom, last five minutes, last hour, last day, last week, or last month. |
Email Delivery | Sends the report to an email address. |
Email Address | Specify the email address of the recipient. |
Export | Exports the report data. |
Data series | Description |
Rule ID | The in-path rule ID. This ID corresponds to the Rule ID in the Optimization > Network Services: In-Path Rules page. |
Rule Summary | A summary of the rule's attributes. |
Description | The description, which corresponds to the optional Description field for the rule in the Optimization > Network Services: In-Path Rules page. |
Hit Count | The number of hits the rule has received. |
Last Hit Time | The last time the in-path rule was matched. |
Counter Clear Time | The last time the counter was cleared. |
Creation time | The time that the rule was created. |
Hostname | The hostname of the machine from where the user has logged in. |
Created by | The SteelHead user ID of the user that created the rule (for example, admin). |
Clear Stats | Clears the statistics. |
Email Notify | This field applies only if you specify a pass-through in-path rule, and indicates whether emails are sent when one or more pass-through in-path rules are configured. Reminder emails are also sent every 15 days. To enable email notifications, verify the following additional changes: •Select the Enable Email Notification check box when creating the rule in the Optimization > Network Services: In-Path Rules page. •Select the Send Reminder of Passthrough Rules via email check box in the Administration > System Settings: Email page. •Select the Report Events via Email check box and specify an email address in the in the Administration > System Settings: Email page. |
Ignore Latency Detection | Indicates if the rule applies latency-detection passthrough. |