Hi Dieter,
Are you using a self-signed certificate on the router? If yes, you need to make sure, to configure a persistent trustpoint on the router as documented here:
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t14/feature/guide/gtpsscer.html
Also make sure to stick to the following order when configuring the router:
1. Install the trusted certificate to authenticate the Central Manager
2. Configure the persistent trustpoint on the router
3. Enable the HTTP server and associate the persistent trustpoint
4. Use "waas cm-register" command to register with the Central Manager
If you do not use persistent certificates, the router will re-generate the certificate after every reload, which will break the connection between the router and the WAAS Central Manager.
Now, regarding your questions:
> How can i verify/analyze SSL handshake process between CM and WAAS express?
Besides collecting packets captures of the traffic between the router and the CM (e.g. using tcpdump or tethereal on the CM itself, or using RITE on the router), the enabling the following debugs on the router will give some details on the SSL handshake process:
* debug waas management errors
* debug waas management events
* debug ssl openssl errors
* debug ssl openssl msg
* debug ssl openssl states
> Is there an guide available how to remove all "CM registration relevant" configuration.
There is no guide available, unfortunately. The best you can do on the WAAS Express side is completely disable WAAS express including the removal of all config with the "no waas enable remove-config" command on the interface on which you have enabled WAAS Express. Afterwards delete the trustpoint.
Let me know, if you have further questions.
Regards,
Michael