How to Confirm WCCP Is Working on a FortiGate Firewall

So you’ve enabled WCCP on your FortiGate firewall. High five! But now comes the big question: Is it actually working? Don’t worry. You don’t need a detective badge. You just need a few simple checks and a bit of curiosity.

In this guide, we’ll walk through how to confirm WCCP is doing its job. We’ll keep it simple. We’ll keep it fun. And we’ll make sure you end up feeling like a FortiGate wizard.

TL;DR: To confirm WCCP is working on a FortiGate firewall, check the WCCP session status in the CLI, verify cache engine registration, monitor traffic counters, and confirm redirection is happening. Use diagnostic commands like diagnose sys wccp and review logs. If traffic flows through the cache engine and counters increase, you’re good. If not, it’s time to troubleshoot.


First, What Is WCCP (In Simple Terms)?

WCCP stands for Web Cache Communication Protocol.

It allows your FortiGate firewall to redirect certain traffic to a cache engine or proxy server. Think of it like this:

  • The firewall sees web traffic.
  • It taps the proxy on the shoulder.
  • It says, “Hey, take a look at this.”

The proxy then inspects, filters, or caches the traffic. Everyone is happy. Especially your bandwidth.

Read also :   How to Rotate a Video 90 Degrees in Sony Vegas

But happiness means nothing if it’s not actually working.


Step 1: Check if WCCP Is Enabled

Let’s start basic. Is WCCP even turned on?

Log into your FortiGate via CLI and run:

show system settings | grep wccp

Or check the full configuration:

config system settings
    show
end

You should see WCCP configuration settings. If not, that’s your first issue.

No config. No WCCP.

Simple.


Step 2: Check WCCP Service Status

This is where the fun starts.

Run the following command:

diagnose sys wccp

This is your magic window.

You want to see:

  • Registered cache engines
  • Service group information
  • Assignment details
  • Packet counters

If you see zero cache engines, that’s not good.

If you see a cache engine IP listed? That’s promising.

No proxy registration means no redirection.

Image not found in postmeta

Step 3: Confirm the Cache Engine Is Registered

The proxy or cache engine must register with the firewall.

In the diagnostic output, verify:

  • Router ID is correct
  • Cache engine IP appears
  • Service group ID matches configuration
  • Status shows active or assigned

If the cache engine does not appear:

  • Check Layer 3 connectivity
  • Confirm WCCP is enabled on the proxy
  • Verify service group numbers match
  • Make sure firewalls between devices allow GRE traffic

Yes. GRE. That’s important.

WCCP uses GRE tunnels for traffic redirection.

If GRE is blocked, WCCP won’t work. Ever.


Step 4: Check Traffic Counters

This is the moment of truth.

In the WCCP diagnostic output, look at packet counters.

These counters should increase when users browse the web.

If numbers go up:

Congratulations. Traffic is being redirected.

If counters stay at zero:

Something is broken.

Try generating traffic manually. Open multiple websites from a client machine. Then check counters again.

Read also :   Alternative Games for Minecraft Players

No movement? Time to dig deeper.


Step 5: Verify Firewall Policy Matches

WCCP works only if traffic matches firewall policies.

Check:

  • Source interface
  • Destination interface
  • Service (HTTP, HTTPS)
  • NAT settings

If traffic bypasses the policy tied to WCCP, it won’t be redirected.

Policies are gatekeepers.

Wrong gate. Wrong result.


Step 6: Sniff the Traffic (Advanced but Fun)

Feeling adventurous?

Use packet sniffing.

diagnose sniffer packet any "host <proxy IP>" 4

This lets you see if traffic flows between FortiGate and proxy.

If you see GRE packets:

That’s good news.

No GRE traffic?

Investigate network paths and filters.


Step 7: Check Logs

Logs never lie. Well, almost never.

Go to:

  • Log & Report
  • Traffic logs

Look for:

  • Sessions involving proxy IP
  • Forwarded traffic entries
  • Unexpected denies

If traffic appears between FortiGate and proxy, WCCP likely works.

If you see denied GRE packets, you found your culprit.


Step 8: Verify Proxy Is Receiving Traffic

Now switch to the proxy side.

Ask these questions:

  • Is it receiving requests?
  • Are logs filling up?
  • Are sessions increasing?

If the FortiGate says it’s redirecting traffic, but the proxy sees nothing, something is off.

Networking is a two-way street.


Common Problems and Quick Fixes

Problem What You See Likely Cause Fix
No cache engine listed Empty registration info Proxy not registering Check WCCP service ID and connectivity
Counters at zero No packet increase Policy mismatch Adjust firewall policy
No GRE traffic No tunnel packets GRE blocked Allow GRE protocol
Traffic bypasses proxy Direct internet access Wrong policy order Move WCCP policy higher
Proxy gets partial traffic Some sites missing Service group mismatch Match service IDs

Step 9: Confirm Service Group Configuration

WCCP uses service groups. Each has an ID number.

This number must:

  • Match on FortiGate
  • Match on proxy
  • Match across all routers involved
Read also :   The Complete Handbook of SEO for Clothing Brand

A mismatch equals silence.

Double-check with:

config system wccp
    show
end

Look carefully. Typos happen more than we admit.


Step 10: Perform a Live Browsing Test

This one is simple.

Open a browser from a client behind the firewall.

Visit:

  • News websites
  • Video platforms
  • Random blogs

Then check:

  • WCCP counters
  • Firewall sessions
  • Proxy logs

If everything increases at the same time, you’ve confirmed success.

It’s like watching three meters go up together.

Beautiful.


Bonus Tip: Use Debug Mode (Carefully)

If things still don’t make sense, enable debugging.

diagnose debug enable
diagnose debug application wccp -1

This provides detailed output.

Warning: It can get noisy.

Disable it after testing:

diagnose debug disable

Use this only during maintenance windows if possible.


Signs That WCCP Is Definitely Working

Here’s your success checklist:

  • Cache engine is registered
  • Assignment status is active
  • Packet counters increase
  • GRE traffic visible
  • Proxy logs show requests
  • Users’ traffic passes through proxy

If you check most of these boxes, relax.

You did it.


Final Thoughts

Confirming WCCP is working on a FortiGate firewall isn’t hard.

It just requires a methodical approach.

Start simple.

Check registration.

Review counters.

Verify traffic flow.

Most problems come down to:

  • Service ID mismatches
  • GRE being blocked
  • Firewall policy order

Remember. Firewalls follow rules strictly. They don’t guess. They don’t assume. They follow configuration exactly as written.

So when WCCP doesn’t work, it’s not magic. It’s configuration.

Take it step by step.

And soon you’ll not just confirm WCCP is working.

You’ll understand why it’s working.

And that’s even better.