I'm trying to understand how WCCP works when doing IP spoofing on Assymetric networks. I have not been able to find any documentation that explains the actual exchanges of packets/information when this happens, for instance:
Which traffic goes inside GRE tunnels and which one does not?
How are TCP sessions handled?
How is the IP spoofing performed?
How does the ACK/SEQ rewriting happens?
When an end user request was received by a router, spoofed and sent to the origin server, it may come back to another router (assymetric network). How is this handled?
I do not have access to the protocol as I am making a high level design in order to choose whether WCCP is appropriate for my network.
Does anybody know a good document where WCCP IP Spoofing is properly explained and detailed?
We are pleased to announce availability of Beta software for 16.6.3. 16.6.3 will be the second rebuild on the 16.6 release train targeted towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are looking for early feedback from custome...