An optimized application in the WAN Optimization Manager™ (WOM®) context is a virtual server with which the BIG-IP® system associates an iSession™ profile and other relevant WAN optimization profiles. WAN optimization on the BIG-IP system requires an optimized application on the initiating side of the WAN and an iSession listener (iSession-terminating virtual server) on the receiving side of the WAN to complete the connection for all application traffic.
For some types of application traffic, such as CIFS and FTP, the system also requires an application-specific virtual server (also listed as an optimized application) on the receiving side. After the iSession listener terminates the connection, BIG-IP WOM directs the traffic to this virtual server for additional handling. Being able to create more than one virtual server for an application on the receiving side allows you to apply different profiles to selected application traffic that has different destinations.
For each application you select on the Quick Start screen, BIG-IP WOM automatically configures an optimized application. In addition, you can customize the system-supplied optimized applications and manually create new ones to specify where and how you want BIG-IP WOM to optimize specified application traffic.
The iSession™ profile tells the system how to optimize traffic. WAN optimization requires an iSession profile at both ends of the iSession connection. WAN Optimization Manager™ (WOM®) includes the parent iSession profile isession, which is appropriate for all application traffic, and other iSession profiles that have been pre-configured for specific applications. The name of each pre-configured iSession profile indicates the application for which it was configured, such as isession-cifs.
When you configure optimized applications on the Quick Start screen, the system automatically associates an iSession profile with every virtual server it creates for the selected optimized applications. The system also associates the system-supplied iSession profile isession with the iSession listener isession-virtual it creates for inbound traffic.
You must associate an iSession profile with any virtual server you create for a custom optimized application for outbound traffic, and with any iSession listener you create for inbound traffic.
|Compression||This option activates the compression feature, according to the method or methods you choose.|
|Deflate||This high quality compression algorithm is typically slower than LZO, unless the system platform supports hardware acceleration. If you enable Deflate and disable Adaptive, you can also select the Deflate Level.|
|LZO||The Lempel_Ziv_Oberhumer algorithm is best for interactive protocols (such as telnet) or high-bandwidth protocols that compress easily (such as those used for data replication).|
|Bzip2||The bzip2 data compression algorithm improves compression ratios on low-bandwidth data links.|
|Adaptive||This option chooses the best algorithm for current traffic from among those that are enabled, and changes as traffic conditions change. If it selects Deflate, it also selects an optimum Deflate Level.|
|Deduplication||This option tells the system to use symmetric data deduplication.
Note: For deduplication to take place, the iSession listener that receives this traffic must have associated with it an iSession profile that also has this setting enabled.
The following screen capture shows the pertinent compression settings.
To handle SLL encrypted traffic all the way from the request initiator (client) to the receiver (server), include the following settings when you configure the optimized application virtual servers.
The following illustration shows a pair of BIG-IP® WOM®systems configured for SSL application traffic. It shows the additional profiles you need to add to the virtual servers to decrypt incoming traffic from the WAN, encrypt it through the iSession connection, decrypt it at the receiving side, and then re-encrypt it to send it to its destination.
Common Internet File System (CIFS) is a remote file access protocol that forms the basis of Microsoft® Windows® file sharing. Various CIFS implementations (for example, Samba) are also available on other operating systems such as Linux™. CIFS is the protocol most often used for transferring files over the network. WAN Optimization Manager™ (WOM®) can optimize CIFS traffic, resulting in faster performance for transferring CIFS files, opening Microsoft applications, and saving files. CIFS optimization is particularly useful when two offices that are located far apart frequently need to share and exchange files.
|Write Behind||Specifies whether the system speeds up CIFS file uploads to the server by fulfilling write requests through the BIG-IP® WOM® system that is closer to the request initiator.|
|Read Ahead||The system speeds up CIFS file downloads by prefetching the file data on the BIG-IP WOM system that is closer to the request initiator.|
|Record and Replay||The system opens CIFS files faster by performing more intelligent read-ahead operations.|
|Office 2003 Extended||The system performs read-ahead operations based on parsing the Microsoft® CDF file and understanding its structure.|
|Fast Close||The system speeds up file close operations by fulfilling them through the BIG-IP WOM system that is closer to the request initiator.|
|Fast Set File Information||The system speeds up file metadata change requests by fulfilling the requests through the BIG-IP WOM system that is closer to the request initiator.|
Messaging Application Program Interface (MAPI) is the email protocol that Microsoft® Exchange Server and Outlook® clients use to exchange messages. Optimization of MAPI traffic across the WAN requires a virtual server for each Exchange-based server so that the BIG-IP® system can use the IP addresses of the Exchange-based servers to locate MAPI traffic.
You can configure WAN Optimization Manager™ (WOM®) to automatically discover the Exchange-based servers and create virtual servers for them, or you can create the virtual servers manually using Local Traffic Manager™. The advantage to automatic discovery is that when new Exchange-based servers are added to the network, or the IP addresses of existing servers change, BIG-IP WOM discovers the changes and creates new MAPI virtual servers for the new and moved Exchange-based servers.