Squid Proxy Server is a generally utilized Open Source web intermediary. As it were, squid proxy server is a storing intermediary server which supports HTTP, HTTPS and FTP.
- It can be utilized as a quickening server, along these lines diminish response time and lessens data transfer capacity.
- It can likewise be utilized with the end goal of web sifting because of accessibility of broad access controls.
Web Proxy
An proxy is a mediator/center operator between PC/PCs and different assets, for the most part, web. It looks for demands from customer and exchanges them to web.
Benefits of a Web Proxy
- It can be utilized to quicken the web as a proxy, which makes it less demanding and quicker to stack many.
- Can be utilized to block/permit sites as required
- Likewise can be utilized to sidestep another web intermediary.
- For instance in numerous associations social systems administration sites like Facebook, Twitter, YouTube and so forth are not permitted. So a web intermediary can be utilized to sidestep those confinements and give access to limited sites.
SARG (Squid Analysis Report Generator)
It is an Open-Source apparatus, which causes us to examine Squid Proxy logs and creates reports in HTML and arrange with all the data from logs displayed in the decent and straightforward organization. Likewise, it gives data about user’s IP addresses, add up to an independently utilized transmission capacity and so forth with access to Daily, Weekly and Monthly reports.
SQUID Tips and Tricks
We can check some moved decisions that can be outlined with squid mediator server to make it more important.
- Setting up squid with a customized port
Default port number for Squid intermediary server is 3128 yet we can change it to some other port according to our necessity.
- Limit download size of the files
We can likewise set a download constrain in light of record measure for squid intermediary clients by giving order in squid.conf document.
- Limit upload size of the files
To force furthest reaches of size of record that can be transferred, we utilize the characteristic “request_body_max_size”.
- Allow Squid proxy to cache all requests
To store every one of the solicitations that are made in squid server, we can include the accompanying mandate in squid.conf document,
# vim /etc/squid/squid.conf
cache allow all
- Deny all cache requests
To deny all stored demands made to squid server, include the following mandate in squid.conf record
cache deny all
How to install SquidGuard with Squid proxy server
SquidGuard is a free and open-source application, which is essentially utilized as a URL redirectors programming, which we can use to overseeing access to sites. Squidguard utilizes blacklists to control access to sites and characterize the site to which URL must be diverted. We have the choice to make a custom blacklist or we can utilize one of numerous accessible on the web. SquidGuard can be introduced on Linux and Unix.
Pre-requisites
Package to introduce SquidGuard are not accessible with default Centos/RHEL repos, we have to empower the EPEL storehouse on our framework to introduce squidguard.
RHEL/CentOS 7
# rpm -Uvh https://dl.fedoraproject.org/pub/epel/7/x86_64/Packages/e/epel-release-7-11.noarch.rpm
RHEL/CentOS 6 (64 Bit)
# rpm -Uvh http://download.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch.rpm
RHEL/CentOS 6 (32 Bit)
# rpm -Uvh http://dl.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
Install SquidGuard
We can install squid with the following command,
# yum install squid
Now install squidguard with the following command,
# yum install squidGuard
Configuring Squidguard
We will firstly create a folder for keeping a blacklist named ‘test’ in folder .
# mkdir -p /var/squidGuard/test>
In the folder test, we will make two records, one by the name ‘domains’ and other by the name ‘urls’ with the list of domains and URLs we want to redirect/block.
# cd /var/squidGuard/test
# vi domains
www.abc.com
www.xyz.com
# vi urls
www.abc.com
www.xyz.com
We have our blacklist ready to use. We will now configure the squidGuard and will create ACL for the blacklist.
For that, we need to open the squidguard configuration file & make the following entries,
# vi /etc/squid/squid.conf
dbhome /var/squidGuard/db
logdir /var/log/squidGuard
dest deny {
domainlist test/domains
urllist test/urls
}
acl {
default {
pass !test all
redirect https://google.com
}
}
Above record has some default designs, you can either erase the substance of the document or would back up the document to another area or by another name. Presently roll out an improvement to squid design document also mention the URL redirection setting to squid configuration file,
Add the following line to the bottom of the file,
url_rewrite_program /usr/bin/squidGuard -c /etc/squid/squidGuard.conf
Next make sure that all the squidguard related files & folders have ownership for user squid,
# chown -R squid:squid /var/squidGuard
Execute the following command to create the db files for the blacklist.
# squidGuard -b -d -C all
Once complete, either restart the squid server or reconfigure it with the following command,
# squid -k reconfigure
We now have our fully operational SquidGuard with squid proxy server. We should simply to make the intermediary settings in the customer machine and we can use the squidGuard redirection abilities.
Configuring a Blacklist
First download the blacklist,
& extract the blacklist,
# tar -xvzf shallist.tar.gz -C /var/squidGuard/
There will be a few organizers (in light of the URL class ) in the envelope, pick the classifications that you have to square and make the ACL for that in squidGuard.conf.
Update the squidguard DB & reconfigure the squid server,
# squidGuard -b -d -C all
” margin_top=”50px” margin_bottom=”” animation_type=”slide” animation_direction=”left” animation_speed=”0.3″ class=”” id=””]
Leave A Comment
You must be logged in to post a comment.