cc/td/doc/product/webscale/webcache
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco Cache Engine, Version 2.0.2

Release Notes for Cisco Cache Engine, Version 2.0.2

September 1999

These release notes are for use with Cisco Cache Engine User Guide, Version 2.0.0 publication and contain information that was not available for inclusion in that manual. These notes discuss the following topics:

New and Changed Features

No-Proxy for Domains

This feature allows user-configurable list of domains for which the Cache Engine will not use any upstream proxy and will contact the end server directly. This feature should be used for enterprise branch office caches that should not use the corporate proxy server when accessing intranet content. This feature is supported in transparent and proxy mode.

The user-configurable list of no-proxy domains or IP addresses is delimited by carriage-returns. List size is unlimited. For example, if domain "xyz.com" is listed by default, this means do not proxy for all domains that end in "xyz.com." But if the domain entry is "^xyz.abc," this means do not proxy for all domains that begin with "xyz.abc." The IP address syntax is different. The full IP address should be specified and any of the four fields can be wild carded. For example, if the IP address entry is "161.102.*.*" then do not proxy for all IP addresses that begin with "161.102."


Note In Version 2.0.2, the Cache Engine can only filter out one local domain, such as "cisco.com," it cannot filter out proxy for sub-local domains, such as "web1.cisco.com" or "web2.cisco.com."

The transparent cache server has the flexibility of selecting the upstream proxy port number. In Version 2.0.1, both the transparent cache server and proxy cache server use the same upstream proxy port. With the addition of the new custom transparent cache server, the three cache servers will all tie up the same upstream proxy port. The Netscape browser provides a way of using the proxy server with an exception of certain domains (e.g. your local domain). To provide a similar functionality, a special flag in the proxy mode configuration is checked if you want to use the outgoing proxy port. The transparent cache server (either default or custom) will then use the default HTTP port 80 instead of the outgoing proxy port.

Cache Engine Management Interface GUI Additions

On the Cache Engine Management Interface GUI, CACHING menu, HTTP Proxy option, a Do not use Outgoing HTTP Proxy for Local Domain check box has been added. Check this box if you want the HTTP cache server not to use the outgoing proxy port for outbound HTTP connections and use the standard HTTP port 80.

Command-Line-Interface Changes and Additions

The global configuration command no-local-domain option has been added to the http global configuration command. Use this option if you want the HTTP cache server not to use the outgoing proxy port for outbound HTTP connections and use the standard HTTP port 80.

http proxy outgoing {hostname | ip-address} port [no-local-domain]

For a complete description on the updated http command, refer to the section "Related Documentation" for CCO location for the updated appendix A, "Command Reference" in the Cisco Cache Engine User Guide, Version 2.0.0 publication.

Custom Web Cache

In Version 2.0.1, the transparent mode web caching is hard-coded on HTTP standard port number 80. The server is always listening to this port number, and it is not configurable through any other means. In Version 2.0.2, this feature provides support for transparent interception on HTTP traffic on any configurable port (1 to 1,600). It is now possible to transparently intercept HTTP traffic on any port. This feature efficiently performs transparent caching at branch offices when enterprises run some of their HTTP traffic on non-port 80 ports.

It provides support for a user-configurable port of interception. The maximum number of simultaneous hashes should be four.

Figure 1 shows a special customer's network topology using transparent web caching.


Figure 1: Network Topology Using Transparent Web Caching


Figure 2 shows a network topology using the custom transparent cache server.


Figure 2: Network Topology Using Custom Transparent Cache Server


Cache Engine Management Interface GUI Additions

On the Cache Engine Management Interface GUI, the Custom Web Cache option has been added under the WCCP menu. This GUI option allows you to configure the Cache Engine to cache custom web traffic (custom configured outgoing port HTTP requests). This service requires you to use WCCP Version 2. Click HELP for information on configuring custom HTTP caching services.

Command-Line-Interface Changes and Additions

The global configuration command wccp custom-web-cache and no wccp custom-web-cache has been added. This command allows you to configure the Cache Engine to cache custom web traffic (custom configured outgoing port HTTP requests). To use this command, you must be using WCCP Version 2.

wccp custom-web-cache router-list-num list-number port port-number [hash-destination-ip | hash-destination-port | hash-source-ip | password word | weight]

  Refer to the section "Related Documentation" for CCO location for the updated appendix A, "Command Reference" in the Cisco Cache Engine User Guide, Version 2.0.0 publication.

Transparent Error Reporting

In Version 2.0.1, error conditions are not handled transparently by the Cache Engine. When an error occurs, either during the processing of the request from the client or during the processing of the response from the server, the Cache Engine sends back a HTML page to the client which contains the error description. The end users ends up seeing this Cache Engine generated page instead of the familiar browser pop-up error window or alert box; therefore, the claim of transparency is affected.

The transparent error reporting feature allows the end users to continue to see browser-generated messages for errors that the Cache Engine encounters while processing the request or response.

Based on how the Cache Engine reports errors to the client, there are three possibilities:

  In order to make the error messages transparent to the user, the client/server pair is added to the bypass list and an HTTP redirect message is sent to the client requesting it to redirect the request to the same URL as before. The client on receiving the redirect message sends back the request once again. This time the request gets bypassed by the cache because the client/server pair is in the bypass list. The request now goes to the server directly. Since the connection was not accepted by the cache, any time-out error or failure to connect to the server or mangled response from the server will be handled by the browser. Thus the error messages will be transparent. Currently all entries in the bypass list will be kept for a configurable period of time (e.g. few minutes).
  When there is an internal failure in the cache while processing a request, a reset is sent back to the client and closes the connection. This is because memory is needed to add the client/server pair to the bypass list. When a browser receives a connection reset, it pops up a "Connection Reset By Peer" alert box.
  For all error conditions, the Cache Engine sends back a reset and closes the connection. It does not send back any error pages. All errors seen by the clients are in the familiar browser error format.
  In this case, the Cache Engine sends back error pages as in Version 2.0.1. When clients are using the Cache Engine as an incoming proxy server, they will continue to see the HTML error pages generated by the clients.

Command-Line-Interface Changes and Additions

error-handling {reset-connection | send-cache-error | transparent}

  Refer to the section "Related Documentation" for CCO location for the updated appendix A, "Command Reference" in the Cisco Cache Engine User Guide, Version 2.0.0 publication.

Flow Protection

In Version 2.0.1, WCCP currently redirects all packets for certain traffic to be intercepted (e.g. HTTP) to the Cache Engines as they come online. The drawbacks is that existing TCP connections to the web server are broken. The same thing happens when WCCP goes down; then the TCP connections established by the Clients to the Cache Engine are broken. This problem is worse when there is a cluster of Cache Engines. As new Cache Engines are added and existing ones removed, the TCP connections end up being redirected to the wrong Cache Engine and the clients get a TCP RESET, which breaks the connection. In Version 2.0.2, the flow protection feature is designed to keep the TCP flow intact as well as not overwhelm the Cache Engines when they come up or are reassigned new traffic. This feature also has a slow start mechanism whereby the Cache Engines try to take load appropriate for their capacity.

Command-Line-Interface Changes and Additions

The global configuration command wccp flow-redirect and no wccp flow-redirect has been added. This command allows you to enable flow redirection. To use this command, you must be using WCCP Version 2.

wccp flow-redirect enable

Refer to the section "Related Documentation" for CCO location for the updated appendix A, "Command Reference" in the Cisco Cache Engine User Guide, Version 2.0.0 publication.

Bypass

The bypass feature has been enhanced as described in the following two subsections. There are two kinds of bypass (load based and authentication based).

In V2.01, the method of doing load bypass was to bypass all new connections for a short period of time (2 to 4 seconds) and then start accepting the connections again. The new method in V2.02, is to do bypass only a bucket at a time but for longer periods of time (10 minutes by default). If the load is still high more buckets are bypassed until the load becomes such that the CE can handle it. Once the Cache Engine has bypassed enough buckets to be able to handle the load, it will start accepting bypassed buckets, one at a time and based on the bucket return configuration, until all buckets are serviced again.

Cache Engine Management Interface GUI Changes and Additions

The Cache Engine Management Interface GUI, WCCP menu, BYPASS Proxy option, has been moved to the CACHING menu, BYPASS option. You now are able to:

Click HELP for information on configuring the bypass feature.

The Authentication bypass feature is also located in this new GUI location. Some web sites, due to IP authentication, may not allow the Cache Engine to connect directly on behalf of the client. In order to avoid a disruption of service, the Cache can use Authentication Bypass to generate a dynamic access-list for these client-server pairs. Authentication Bypass triggers are also propagated upstream and downstream in the case of hierarchical caching. To enable Authentication Bypass on the Cache Engine, select the On radio button. To disable Authentication Bypass without losing your settings, select the Off radio button. Default value is Off.

The packets could be bypassed by authentication bypass even if load bypass is not enabled. Once a client-server pair goes into authentication bypass, it is bypassed for a configurable amount of time (10 minutes by default).

The tunnel bypass option is no longer available. This option was for debugging purposes to force all WCCP-redirected traffic to bypass the Cache Engine.

Command-Line-Interface Changes and Additions

bypass {auth-traffic enable | list timer minutes | load {enable | in-interval seconds | out-interval seconds | time-interval minutes}

show bypass statistics {auth-traffic | load}

  For more information on these commands, refer to the section "Related Documentation" for CCO location for the updated appendix A, "Command Reference" in the Cisco Cache Engine User Guide, Version 2.0.0 publication.

TCP Stack Improvement

Implementation of enhancements to the TCP stack that improve network responsiveness, particularly in high-latency networks (e.g. satellite). Satellite providers need these improvements to fully utilize their satellite links. They want to distribute content to many distributed caches.

Command-Line-Interface Changes and Additions

The global configuration command tcp has been updated to include TCP client and server maximum segment size (client-mss and server-mss) and TCP satellite (client-satellite and server-satellite) options. This command allows you to configure TCP parameters. To disable TCP parameters, use the no form of this command.

tcp {client-mss size | client-receive-buffer kbytes | client-rw-timeout seconds | client-satellite | client-send-buffer kbytes | cwnd-base factor | init-ssthresh value | keepalive-probe-cnt count | keepalive-probe-interval seconds | keepalive-timeout seconds | listen-queue length server-receive-buffer kbytes | server-mss size | server-rw-timeout seconds | server-satellite | server-send-buffer kbytes}

no tcp {client-mss size | client-receive-buffer kbytes | client-rw-timeout seconds | client-satellite | client-send-buffer kbytes | cwnd-base factor | init-ssthresh value | keepalive-probe-cnt count | keepalive-probe-interval seconds | keepalive-timeout seconds | listen-queue length server-receive-buffer kbytes | server-mss size | server-rw-timeout seconds | server-satellite | server-send-buffer kbytes}

The show tcp command TCP configuration output has been updated to show the new TCP setting options:

Console# show tcp ==TCP Configuration== TCP keepalive timeout 300 sec TCP keepalive probe count 4 TCP keepalive probe interval 75 sec TCP client max segment size 1460 TCP server max segment size 1460 TCP client satellite (RFC1323) disable TCP server satellite (RFC1323) disable TCP server R/W timeout 120 sec TCP client R/W timeout 120 sec TCP server send buffer 8 k TCP server receive buffer 32 k TCP client send buffer 32 k TCP client receive buffer 8 k TCP Listen Queue 200 TCP init ssthresh 65536 TCP cwnd base 2

For more information on these commands, refer to the section "Related Documentation" for CCO location for the updated appendix A, "Command Reference" in the Cisco Cache Engine User Guide, Version 2.0.0 publication.

Customizing URL Blocked Message

This feature allows you to customize the blocked message that is sent back to a user when a request from the client matches a blocked URL. This flexibility is provided by allowing you to create your own HTML page called block.html and place it in the /local/etc/ directory. If you want to embed graphics into the HTML page, place the corresponding graphics gif/jpeg file in the /local/lib/gui/pub directory.

An example of the block.html file is:

<HTML> <HEAD> <TITLE> URL Blocked </TITLE> </HEAD> <BODY> The site you are trying to view is blocked. Please contact your system administrator if you need to unblock this site <IMG_SRC = /local/lib/gui/pub/stop.gif width=492 height=94 border=0> </BODY> </HTML>

Once you have created your customized block.html page, you can turn on this feature from the CLI or GUI.

Cache Engine Management Interface GUI Changes and Additions

On the Cache Engine Management Interface GUI, CACHING menu, URL Filtering option, a Display customized URL blocking message (/local/etc/block.html) check box has been added. Check this box to turn on or off the customized URL block message.

Command-Line-Interface Changes and Additions

The global configuration command url-filter has been updated to support this feature. This command allows you to enable URL blocking.

To turn on the customized URL blocking message, enter:

url-filter bad-sites-allow [custom-message]

url-filter good-sites-allow [custom-message]

To turn off the customized URL blocking message, enter:

url-filter bad-sites-allow

url-filter good-sites-allow

To disable URL blocking, use the no form of this command.

Refer to the section "Related Documentation" for CCO location for the updated appendix A, "Command Reference" in the Cisco Cache Engine User Guide, Version 2.0.0 publication.

Changed Information

Installation Changes

Refer to the section "Related Documentation" for CCO location for the updated chapter 2, "Installing the Cache Engine" in the Cisco Cache Engine User Guide, Version 2.0.0 publication. The following changes are described in the updated chapter:

Section "Enabling Cache Support on the Router" starting on page 2-10.

  IOS versions before 12.0(3)T support only WCCP Version 1. IOS versions between 12.0(3)T and 12.0(5)T support only WCCP Version 2. IOS version 12.0(5)T or later support both WCCP Version 1 and Version 2. In IOS version 12.0(5)T or later, the default WCCP version is Version 2. You can override the WCCP default, by using the global configuration command ip wccp version 1.
  If you have WCCP Version 1 configured and attempt to configure any WCCP Version 2 specific features, you will receive a configuration error.
ip wccp enable
  To have the interface redirect packets for port 80 to the Cache Engine, enter the following command for each interface:
ip web-cache redirect ip wccp {web-cache | services} where services is the number of predefined services (0 to 99)
  To have the interface redirect packets for port 80 to the Cache Engine, enter the following command for each interface:
ip wccp {web-cache | services} redirect out

Hardware Caveats

Resolved Caveats

Unresolved Caveats

Related Documentation

  http://www.cisco.com/univercd/cc/td/doc/product/iaabu/webcache/ce20/ver20/index.htm
  http://www.cisco.com/univercd/cc/td/doc/product/iaabu/webcache/ce20/ver20/wc202ins.htm
  http://www.cisco.com/univercd/cc/td/doc/product/iaabu/webcache/ce20/ver20/wc202cli.htm
  http://www.cisco.com/univercd/cc/td/doc/product/iaabu/webcache/ce20/ver20/wc20wcc2.htm

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.


Note Always check the following URLs for the latest software updates and documentation updates to ensure that you have the latest version of software and related documentation.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

CD-ROM Documentation

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.





hometocprevnextglossaryfeedbacksearchhelp
Posted: Sat Sep 28 02:59:25 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.