Question: How do I upgrade my FreeBSD server and ports tree using our proxy server, which requires username and password based authentication?
Squid Web Proxy and Cache Server
Tutorials, howtos, and tips about Squid web proxy and cache software under *nix. It includes a wide variety of uses, from speeding up a web server by caching repeated requests; to caching web, DNS and other computer network lookups for a group of people sharing network resources; to aiding security by filtering traffic ( rss feed )
I've Squid Proxy server with over 100 Windows workstation. I see following error message in my cache.log file - "WARNING! Your cache is running out of filedescriptors". Do I need to filter proxy server requests to avoid this problem? How do I fix this problem under CentOS / Fedora / RHEL / Debian Linux?
[icon type="bash"]I'm behind a squid proxy server. How do I access internet via proxy server when I use wget, lynx and other utilities from a shell prompt on a Linux or Unix-like systems?
How do I disable Squid Proxy Serer under CentOS Linux operating system so that I can directly connect to the internet?
Q. How do I block any website accessing the Internet using squid proxy server? A. You can simply use squid ACL to block access to any web site. There are 3 steps: #1. Create a text file with blocked domain name list such as baddomain1.com, mail.yahoo.com, gmail.com and so on #2. Define Acl #3. Restart [...]
Q. I'm using squid proxy server under CentOS Linux version 5. How to filter a particular MAC address under squid? A. Not all operating system supports Mac address based filtering. For some operating systems. Squid calls these "ARP ACLs" and they are supported on Linux, Solaris, and BSD variants. Open squid.conf: # vi /etc/squid/squid.conf Local [...]
Q. I was referring to your Squid transparent proxy configuration howto, and my question to you - can proxy authentication be done in transparent mode? A. Short answer: noop, you cannot use Squid proxy authentication in transparent mode. From official squid docs: Authentication cannot be used in a transparently intercepting proxy as the client then [...]