?
Solved

Blocking Access to the Net through Squid

Posted on 2004-10-09
9
Medium Priority
?
202 Views
Last Modified: 2013-12-15
I have installed squid and dhcpd in my linux box 8.0 its working fine, now I am interested to block some user to block internet access, I know there is some authintication tool for squid proxy, pls help.
0
Comment
Question by:ranadastidar
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
9 Comments
 
LVL 34

Expert Comment

by:PsiCop
ID: 12266871
I wouldn't bother - I'd just set up an ACL on the router to the Internet and not let any port 80 traffic out except from the Squid server. That way people HAVE to go thru Squid to gte to the Internet.
0
 
LVL 5

Author Comment

by:ranadastidar
ID: 12305972
But I don't have any router, anyone idea about ncsa configuration?
0
 
LVL 34

Expert Comment

by:PsiCop
ID: 12311538
How do you reach the Internet if you don't have a router?
0
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

 
LVL 5

Author Comment

by:ranadastidar
ID: 12316802
Actually I am using DSL connection and use my isp's DNS server as well as router.
0
 
LVL 34

Accepted Solution

by:
PsiCop earned 400 total points
ID: 12319599
Your DSL connection is a router. Just because it doesn't say "router" on the case doesn't mean its not a router.

Unfortunately, its not a router you probably have control over. And that's what you're trying to get here, isn't it? Control over the connection and how its used.

If your DSL provider cannot give the level of control you want to you, then you needs to:

a) Find a new DSL provider who CAN give you the level of control you want

OR

b) Add the necessary network infrastructure needed to give you the control you want.
0
 
LVL 7

Expert Comment

by:wesbird
ID: 12629974
Possible way of doing PsiCop's b is to add a second NIC to the linux box and only connecter the router to the Linux box, so that everybody has to use the Linux box as a proxy server.

Then you will probably want to also investigate something like squidGuard which allows you to implement blacklisting of millions of sites: http://www.squidguard.org/

It's not so important to authenticate if you can simply stop people going to the sites you don't want them at.




0
 
LVL 7

Expert Comment

by:wesbird
ID: 12630258
PS, what type of DSL router do you have?

Sometimes you can achieve some level of configuration by pointing your web browser at the default gateway address.  You'll almost certainly have to use the command line interface to do anything sophisticated though.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses
Course of the Month15 days, 10 hours left to enroll

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question