Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Transparent Proxy and ARM > Transparent interception strategies > Transparent interception with WCCP v2 devices
Transparent interception with WCCP v2 devices
Help | Content Gateway | Version 8.1.x
 
Related topics:
Content Gateway supports transparent interception with WCCP v2-enabled routers and switches.
HTTP, HTTPS, FTP, and DNS protocols are supported. Default ARM redirection rules are included for HTTP, HTTPS, and FTP communicating on standard ports.
A list of WCCP v2 supported features follows the setup outline.
 
Important 
Following is a WCCP v2 setup outline.
1.
On each WCCP v2 device:
*
*
*
See Configuring WCCP v2 routers.
2.
*
In addition to network interface, protocols, ports, authentication (if used), and multicast communication (if used), also configure:
*
*
*
If Content Gateway is deployed in a cluster, assignment method load distribution, if desired.
*
See Enabling WCCP v2 in Content Gateway and The ARM.
3.
WCCP v2 supported features
Content Gateway supports the following WCCP v2 features:
*
*
*
*
*
*
*
In a Content Gateway cluster, it is recommended that you not enable virtual IP failover in WCCP environments. WCCP v2 and the Content Gateway configuration handles node failures and restarts. (See WCCP load distribution and Virtual IP failover.) However, if a Content Gateway cluster uses WCCP exclusively, virtual IP failover can be used if no user authentication features are used. Note that the WCCP assignment method - not virtual IP failover - is the recommended method for managing load distribution. If a Content Gateway cluster receives requests both explicitly and transparently (the networks must be separate; this type of deployment is not recommended), virtual IP failover can be used on the explicit proxy network segment.
Content Gateway also supports cache affinity. If a node becomes unavailable and then recovers, the node's cache does not need to be repopulated.
How WCCP v2 interception works:
1.
2.
3.
4.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Transparent Proxy and ARM > Transparent interception strategies > Transparent interception with WCCP v2 devices
Copyright 2016 Forcepoint LLC. All rights reserved.