Who Should Read This Manual? : Manual Organization

Manual Organization
This section outlines the chapters and summarizes their content.
“Getting Started,” describes the fundamentals and considerations of setting up a basic first deployment. Additionally, it describes how to work with the routing table, modify network interface parameters, configure gigabit etherchannel bonding, and add SSL certificates and keys for optimizing encrypted traffic.
“Creating Tunnels,” describes characteristics of tunnels and how their endpoints determine the source and destination IP addresses that go into the tunnel packets. It discusses auto-tunnels and manually created tunnels, as well as jumbo frames and MTU interworking.
“Building Policy Maps,” describes how the Silver Peak appliance optimizes traffic by allowing you to define flows with MATCH criteria and direct flows with policy maps. It also describes techniques for streamlining your network management by using Access Control Lists (ACLs), user-defined applications, and application groups.
“Route Policy,” focuses on the SET actions that are specific to the Route policy. It discusses subnet sharing, auto-optimization, and how to determine if you need to configure traffic redirection.
“Bandwidth Management & QoS Policy,” describes the QoS Policy’s SET actions and how the Shaper defines and manages the traffic classes assigned in the QoS Policy. It also explains how to configure traffic classes in the Shaper for optimized and pass-through traffic, along with providing best practices guidelines for effectively managing bandwidth..
“Optimization Policy,” describes how the appliance optimizes tunnelized traffic — improving the performance of applications across the WAN.
“Using Flow Redirection to Address TCP Asymmetry,” describes how flow redirection enables Silver Peak appliances to optimize asymmetrically routed flows by redirecting packets between appliances.
“Configuring and Managing VLANs,” describes how to configure and manage VLANs .
“Monitoring Traffic,” describes how to view realtime and historical statistics for applications, current flows, QoS, tunnels, data reduction, bandwidth optimization, flow counts, latency, flow redirection, NetFlow, interfaces, and bridge mode.
“Administration Tasks,” describes administrative tasks such as configuring log settings, viewing event and alarm logs, managing debug files, pre-positioning file server data into Network Memory, configuring SNMP, managing user accounts, configuring settings for web protocols and web users, and contacting Silver Peak Support.
“System Maintenance,” describes tasks related to maintaining the hardware, software, and database. This includes tasks such as managing the software images and the configuration files, testing network connectivity, managing the hard disks, erasing Network Memory, and restarting the appliance.
“Monitoring Alarms,” describes alarms categories and definitions. It also describes how to view and handle alarm notifications.
“Specifications, Compliance, and Regulatory Statements,” lists model specification, warning statements, compliance statements, TCP/IP port usage, and provides annotated diagrams of each hardware model’s interfaces, LEDs, and disk layout.
“Power Cords & Cable Pinouts,” lists and illustrates power cords by country.
“Glossary,” provides definitions of terms related to WAN acceleration technology and equipment.

Please send comments or suggestions regarding user documentation to techpubs@silver-peak.com.