Solved

Browsing problem in squid through leased line

Posted on 2004-10-27
253 Views
Last Modified: 2010-03-17

 I'm having an ADSL and a leased line connection.I've setup squid proxy whose gateway is ADSL. Now browsing both at server and clients are working fine.But now when I changed the Internet gateway at the squid proxy server to that of the leased line ,none of the clients are able to browse.Browsing at server is OK. The clients are able to browse when their gateway is configured as the Leased Line Router.The problem comes only when they are redirected through the proxy - when the proxy's gateway is Leased Line.The clients get the message like conecting to and it stays like that foe 2 minutes and then gets the message "Page cannot be displayed".
0
Question by:jomygm
    1 Comment
     
    LVL 2

    Accepted Solution

    by:
    There could be several issues here

    1. The Squid proxy is configured incorrect. Check Access lists and squid proxy logs to see if you see any errors when your clients access. Best is that the client machine try to access internet using the squid proxy and you monitor the squid logs realtime.
    Verify your config using default settings
     Also go here for a quick start guide http://squid.visolve.com/squid/sqguide.htm

    2. Your Squid SERVER is not configured as a Gateway Box. To configure the squid box (running linux i assume ) as a gateway. Go here for a guide : http://www.yolinux.com/TUTORIALS/LinuxTutorialIptablesNetworkGateway.html

    then forward all port 80 connections through the squid-proxy.

    Another solution is to configure SQUID server as a transparent proxy. But you need two network cards (since you don't have a intelligent switch) for it to work. One side would be connected to your network and the other is directly connected to the ADSL line. so all Web traffic is magically cached and the client machines are un-aware as to a proxy. This is the best method of using a cache.



    0

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Suggested Solutions

    I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
    Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
    In this Experts Exchange video Micro Tutorial, I'm going to show how small business owners who use Google Apps can save money by setting up what is called a catch-all email address in their Gmail accounts. By using the catch-all feature, small busin…
    Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

    884 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now