<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WCCP Redirection on Firepower FTD 2110 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3844412#M1064918</link>
    <description>&lt;P&gt;I had the same problem. No enough documentation available online but here is what I did with a couple of 2130s.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used the template and modified it with some information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#set( $service = "web-cache")&lt;BR /&gt;#if( $isServiceIdentifier == "true")&amp;nbsp; &amp;lt;--Changed this object from false to true&lt;BR /&gt;#set( $service = "$serviceIdentifier")&amp;nbsp; &amp;lt;- Change this value to 90 o 91 depends of what port you need to filter 80 or 443&lt;BR /&gt;#end&lt;BR /&gt;#set ( $wccpCli = "wccp")&lt;BR /&gt;#set ( $wccpCli = "$wccpCli $service")&lt;BR /&gt;####wccpGroupList is place-holder for extended ACL.&lt;BR /&gt;####Replace wccpGroupList with extended ACL defined in FMC by inserting policy-object of type extended ACL.&lt;BR /&gt;#if( $wsas )&lt;BR /&gt;#set( $wccpCli = "$wccpCli group-list $wsas1")&amp;nbsp; &amp;lt;- This is the ACL with the WSA IP running WCCP&lt;BR /&gt;#end&lt;BR /&gt;####wccpRedirectList is place-holder for extended ACL.&lt;BR /&gt;####Replace wccpRedirectList with extended ACL defined in FMC by inserting policy-object of type extended ACL.&lt;BR /&gt;#if( $Redirect_List )&lt;BR /&gt;#set( $wccpCli = "$wccpCli redirect-list $Redirect_List1")&amp;nbsp; &amp;lt;-- This is the ACL with the redirection policies.&lt;BR /&gt;#end&lt;/P&gt;&lt;P&gt;$wccpCli&lt;/P&gt;&lt;P&gt;#### Assiging wccp onto interface&lt;BR /&gt;#foreach( $inside1 in $inside2)&amp;nbsp; &amp;lt;- updated this inside interface in inside zone&lt;BR /&gt;wccp interface inside 90 redirect in&amp;nbsp; &amp;lt;- This is clear text using the service ID you defined above (do not insert, just type it).&lt;BR /&gt;#end&lt;/P&gt;</description>
    <pubDate>Wed, 24 Apr 2019 19:08:41 GMT</pubDate>
    <dc:creator>Alex Garcia</dc:creator>
    <dc:date>2019-04-24T19:08:41Z</dc:date>
    <item>
      <title>WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3219612#M1064901</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone configured transparent WCCP redirection on Cisco FTD managed by FMC? I couldn't find any online referrals for this. Appreciate the expert help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Nimalraj&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:47:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3219612#M1064901</guid>
      <dc:creator>nimalrajphilips</dc:creator>
      <dc:date>2020-02-21T14:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3228608#M1064904</link>
      <description>&lt;P&gt;There is a flexconfig template for it as of release 6.2. I've not had any success with getting it to work just yet though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I admit comprehension of the Velocity scripting language they use in the template is poor ...but the explanation of the template is even more poor. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/flexconfig_policies.html#id_39923" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/flexconfig_policies.html#id_39923&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2017 13:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3228608#M1064904</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-07T13:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3308294#M1064907</link>
      <description>&lt;P&gt;Marvin, did you had any luck with WCCP in getting it to work?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 13:46:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3308294#M1064907</guid>
      <dc:creator>sajjadazamkhan-sirius</dc:creator>
      <dc:date>2018-01-09T13:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3308702#M1064911</link>
      <description>&lt;P&gt;No - I haven't had time to dig back into it. It's on my "to do list" though.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd be happy to learn from somebody else though.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 01:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3308702#M1064911</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-01-10T01:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3310593#M1064914</link>
      <description>&lt;P&gt;This is&amp;nbsp;what I ended up with for wccp in FlexConfig.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;wccp&amp;nbsp;80&amp;nbsp;redirect-list&amp;nbsp;$wccpRedirectList&amp;nbsp;group-list&amp;nbsp;$wccpGroupList&amp;nbsp;password&amp;nbsp;@wccpPassword&lt;/DIV&gt;
&lt;DIV&gt;&lt;BR /&gt;wccp&amp;nbsp;interface&amp;nbsp;egh-inside&amp;nbsp;80&amp;nbsp;redirect&amp;nbsp;in&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Just the two lines.&amp;nbsp; The "$wccpRedirectList" represents the redirect extended ACLand the "$wccpGroupList" represents the wccp server extended ACL.&lt;/DIV&gt;
&lt;DIV&gt;Those were both entered via the drop down box as "insert--&amp;gt;insert policy object--&amp;gt;Extended ACL Object"&lt;/DIV&gt;
&lt;DIV&gt;The "@wccpPassword" represents the secret password.&amp;nbsp; Entered via drop down box as "&lt;SPAN&gt;insert--&amp;gt;Insert Secret Key".&amp;nbsp; Add an object from the FlexConfig text object pre-defined as "wccpPassword" and enter the real password.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;It should look like this from the FTD device command line.&amp;nbsp; the command line puts in the real ACL names.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;wccp 80 redirect-list&amp;nbsp;"Real ACL Name for Redirect"&amp;nbsp;group-list "Real ACL Name for Servers"&amp;nbsp;password *****&lt;BR /&gt;wccp interface inside 80 redirect in&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;I hope this helps someone, because I couldn't find anything online either.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 18:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3310593#M1064914</guid>
      <dc:creator>rpineur</dc:creator>
      <dc:date>2018-01-12T18:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3336327#M1064916</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, I had configured the WCCP redirection on FTD 2100's using FMC in both transparent and non transparent modes. Just make sure&amp;nbsp;one thing in any scenario, both web users and client(proxy server) have to be behind the same interface but not necessarily in the same network. rest of the wccp configuration on FTD is similar to ASA but using flexconfig.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 00:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3336327#M1064916</guid>
      <dc:creator>nagarjunabezawada1411</dc:creator>
      <dc:date>2018-02-23T00:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3844412#M1064918</link>
      <description>&lt;P&gt;I had the same problem. No enough documentation available online but here is what I did with a couple of 2130s.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used the template and modified it with some information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#set( $service = "web-cache")&lt;BR /&gt;#if( $isServiceIdentifier == "true")&amp;nbsp; &amp;lt;--Changed this object from false to true&lt;BR /&gt;#set( $service = "$serviceIdentifier")&amp;nbsp; &amp;lt;- Change this value to 90 o 91 depends of what port you need to filter 80 or 443&lt;BR /&gt;#end&lt;BR /&gt;#set ( $wccpCli = "wccp")&lt;BR /&gt;#set ( $wccpCli = "$wccpCli $service")&lt;BR /&gt;####wccpGroupList is place-holder for extended ACL.&lt;BR /&gt;####Replace wccpGroupList with extended ACL defined in FMC by inserting policy-object of type extended ACL.&lt;BR /&gt;#if( $wsas )&lt;BR /&gt;#set( $wccpCli = "$wccpCli group-list $wsas1")&amp;nbsp; &amp;lt;- This is the ACL with the WSA IP running WCCP&lt;BR /&gt;#end&lt;BR /&gt;####wccpRedirectList is place-holder for extended ACL.&lt;BR /&gt;####Replace wccpRedirectList with extended ACL defined in FMC by inserting policy-object of type extended ACL.&lt;BR /&gt;#if( $Redirect_List )&lt;BR /&gt;#set( $wccpCli = "$wccpCli redirect-list $Redirect_List1")&amp;nbsp; &amp;lt;-- This is the ACL with the redirection policies.&lt;BR /&gt;#end&lt;/P&gt;&lt;P&gt;$wccpCli&lt;/P&gt;&lt;P&gt;#### Assiging wccp onto interface&lt;BR /&gt;#foreach( $inside1 in $inside2)&amp;nbsp; &amp;lt;- updated this inside interface in inside zone&lt;BR /&gt;wccp interface inside 90 redirect in&amp;nbsp; &amp;lt;- This is clear text using the service ID you defined above (do not insert, just type it).&lt;BR /&gt;#end&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 19:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3844412#M1064918</guid>
      <dc:creator>Alex Garcia</dc:creator>
      <dc:date>2019-04-24T19:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3855541#M1064920</link>
      <description>&lt;P&gt;Have any of you use WCCP on 6.3.0 release. We have 6.3.0 deployed with WCCP configuration but it is not working. I can see the config in the FTD when using the show commands but it is not sending any traffic to the WCCP appliance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 00:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3855541#M1064920</guid>
      <dc:creator>jamestomassoni</dc:creator>
      <dc:date>2019-05-14T00:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3856385#M1064922</link>
      <description>&lt;P&gt;Hi James,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The configuration I posted few days ago is running in a FTD2130 with FXOS 2.4 and FTD 6.3.0.2.&amp;nbsp; It is working like a champ.&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2019 01:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3856385#M1064922</guid>
      <dc:creator>Alex Garcia</dc:creator>
      <dc:date>2019-05-15T01:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3872340#M1064924</link>
      <description>Hi Alex&lt;BR /&gt;&lt;BR /&gt;I have 2 virtual WSAs for redundancy, both running in transparent mode. We currently have our ASAs using one as a primary and the other as a secondary(not forwarding unless the primary dies). Do you know what the template would look like to accommodate two WSA?&lt;BR /&gt;&lt;BR /&gt;Current config&lt;BR /&gt;wccp 90 redirect-list wccp-hosts group-list proxy01 password *****&lt;BR /&gt;wccp 91 redirect-list wccp-hosts group-list proxy02 password *****&lt;BR /&gt;wccp interface INSIDE 90 redirect in&lt;BR /&gt;wccp interface INSIDE 91 redirect in&lt;BR /&gt;&lt;BR /&gt;New config&lt;BR /&gt;Would I need to use two entries for the service identifier???&lt;BR /&gt;#set ( $service = "$90")&lt;BR /&gt;#set ( $service = "$91")&lt;BR /&gt;&lt;BR /&gt;Would I use two lines and reference two separate ACLs???&lt;BR /&gt;#set( $wccpCli = "$wccpCli group-list $proxy01")&lt;BR /&gt;#set( $wccpCli = "$wccpCli group-list $proxy02")&lt;BR /&gt;&lt;BR /&gt;Would I use two lines for each redirection, one per service identifier???&lt;BR /&gt;wccp interface $INSIDE $90 redirect in&lt;BR /&gt;wccp interface $INSIDE $91 redirect in&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Jun 2019 10:51:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/3872340#M1064924</guid>
      <dc:creator>Gavin Lodge</dc:creator>
      <dc:date>2019-06-13T10:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: WCCP Redirection on Firepower FTD 2110</title>
      <link>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/5283455#M1120672</link>
      <description>&lt;P&gt;I am going nutz trying to get mine working. If I have the proxy coded in the browser, it works just fine, but without it, I get no where.&amp;nbsp;&amp;nbsp; According to&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-management-center-virtual/222849-configure-and-troubleshoot-wccp-on-ftd-u.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-management-center-virtual/222849-configure-and-troubleshoot-wccp-on-ftd-u.html&lt;/A&gt;&amp;nbsp; The configuration is to have the proxy on a DMZ interface.&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://www.cisco.com/c/dam/en/us/support/docs/security/secure-firewall-management-center-virtual/222849-configure-and-troubleshoot-wccp-on-ftd-u-00.png" border="0" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two established WCCP tunnels, port 80 Web0Cache, and port 443 HTTPS. Both show traffic redirected, but never hits the proxy. Using a Ironport WSA for this.&lt;/P&gt;&lt;P&gt;Global WCCP information:&lt;BR /&gt;Router information:&lt;BR /&gt;Router Identifier: 192.168.186.254&lt;BR /&gt;Protocol Version: 2.0&lt;/P&gt;&lt;P&gt;Service Identifier: web-cache&lt;BR /&gt;Number of Cache Engines: 1&lt;BR /&gt;Number of routers: 1&lt;BR /&gt;Total Packets Redirected: 492&lt;BR /&gt;Redirect access-list: Redirect-HTTP&lt;BR /&gt;Total Connections Denied Redirect: 0&lt;BR /&gt;Total Packets Unassigned: 0&lt;BR /&gt;Group access-list: Monpss-Iport-02&lt;BR /&gt;Total Messages Denied to Group: 0&lt;BR /&gt;Total Authentication failures: 0&lt;BR /&gt;Total Bypassed Packets Received: 0&lt;/P&gt;&lt;P&gt;Service Identifier: 70&lt;BR /&gt;Number of Cache Engines: 1&lt;BR /&gt;Number of routers: 1&lt;BR /&gt;Total Packets Redirected: 7815&lt;BR /&gt;Redirect access-list: Redirect-HTTPS&lt;BR /&gt;Total Connections Denied Redirect: 0&lt;BR /&gt;Total Packets Unassigned: 5&lt;BR /&gt;Group access-list: Monpss-Iport-02&lt;BR /&gt;Total Messages Denied to Group: 0&lt;BR /&gt;Total Authentication failures: 0&lt;BR /&gt;Total Bypassed Packets Received: 0&lt;/P&gt;&lt;P&gt;I don't know what I can run to follow the packets, but I know they hit the WCCP and from there go???&amp;nbsp; I have packet captures going and never see the IP from the workstation anywhere on the Proxy interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Apr 2025 17:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/wccp-redirection-on-firepower-ftd-2110/m-p/5283455#M1120672</guid>
      <dc:creator>tahscolony</dc:creator>
      <dc:date>2025-04-21T17:06:32Z</dc:date>
    </item>
  </channel>
</rss>

