Created Jun 13, Code Revisions 1 Stars 5 Forks 1. Embed What would you like to do? Embed Embed this gist in your website. Share Copy sharable link for this gist.
Learn more about clone URLs. Download ZIP. This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below.
To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters. Below the line we added previously, add the following lines to block Facebook. The first line must contain between quotation marks the correct path to the file containing blocked sites. You also can define what devices will be allowed to connect through Squid proxy by implementing acl directives. The following line allows traffic only from IP address You also can implement basic login with user and password.
Create a password file by running the command below. After creating the password file, create the username and password running the following command, and fill the password fields when required, as shown in the screenshot.
As you can see, implementing Squid proxy is very advantageous for networking and sysadmins. By implementing Squid proxy system administrators, or even teachers can easily control the network traffic and implement policies and rules. Configuring Squid proxy is also easy and very well documented. I hope this tutorial explaining the Squid proxy configuration on Linux was useful.
Keep following Linux Hint for more Linux tips and tutorials. David Adams is a System Admin and writer that is focused on open source technologies, security software, and computer systems.
Turning it into a filtering server requires installing the additional squidguard package. In addition, squid-cgi provides a querying and administration interface for a Squid proxy.
Prior to installing, care should be taken to check that the system can identify its own complete name: the hostname -f must return a fully-qualified name including a domain. The official computer name should be validated with the network administrator in order to avoid potential name conflicts. Configuring a Cache.
The following example shows the modifications made by the Falcot Corp administrators:.
0コメント