![]() Since the client and server are now out of sequence, this causes the session to slow and usually fail. ![]() That wouldn't necessarily be a problem, but the proxy also sometimes modifies the packets of bypassed sessions by changing payload sizes, thus modifying TCP sequence numbers. The WCCP router simply sends reply packets for these sessions straight to the client, rather than back to the proxy. This is because for a bypassed session the proxy maintains the client IP address as the source IP when sending the packet to the OCS. We've found that for any session that has a static bypass, the proxy only sees client-initiated packets. ![]() The proxy has a number of static bypass entries for both source and destination hosts and networks. Our WCCP router ACL forwards all port 80 and 443 traffic to the proxy. We've recently changed our proxy topology from in-line transparent now to WCCP.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |