| Description | This article describes how to verify the traffic is being inspected by FortiGate when the firewall policy is set to proxy-based inspection using deep inspection. |
| Scope | FortiGate. |
| Solution |
Firewall policy Configuration:
SSL inspection profile configuration:
The certificate that is used in the custom deep inspection profile is installed on the user's PC as a trusted root authority. For a test visit the website example.com in the browser on user pc.
Use the following debugging command to run WAD debug on FortiGate:
diagnose wad debug enable category all diagnose wad filter src a.a.a.a <----- Source IP address of the client. diagnose wad filter dst x.x.x.x <----- Destination IP of the website (where applicable). diagnose debug enable di deb dis diagnose debug reset diagnose wad filter clear
The following WAD debug output shows it matching with firewall policy 1: [I][p:2460][s:22958] wad_tcp_port_learn_session_config :443 vf_id=0 ses_ctx=0x7f6bb4872e28 policy-id=1, sec_profile=0x7f6bb4aeee78 app_type=http The below output shows traffic is being inspected using a custom deep inspection SSL profile:
The certificate that is used in the SSL inspection profile and the certificate FortiGate uses for inspection are the same. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.