Solved

How to setup a Squid Reverse Proxy

Posted on 2006-11-29
6
7,025 Views
Last Modified: 2012-05-05
Hello,

I have a website (windows IIS) that is very busy and I wanted to setup an SQUID Reverse proxy to offload some of the traffic. I wanted to know what are the best practices, and how to setup it up on a Linux (CentOS)?

Thanks in advance,

Patrick B.
 
0
Comment
Question by:blueglacier
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 48

Expert Comment

by:Tintin
ID: 18042799
Firstly, my recommendation would be to *NOT* use squid as a reverse proxy.  I had a very large client using Squid as a reverse proxy for around 10 websites and the limitations around SSL and redirections/rewriting became apparent very early on.

Using Apache in reverse proxy mode is much more efficient and SSL management is so much easier than you can do in squid.
0
 
LVL 43

Assisted Solution

by:ravenpl
ravenpl earned 125 total points
ID: 18043441
Tintin: I'm suprised with Your experience. On the other side of the world, I know popular portals that are accelerated(and protected) by squid farms - works fine.
http://sial.org/howto/squid/#s3.2 # for one host
http://www.option-c.com/xwiki/Squid_Reverse_Proxy # for host based
0
 
LVL 48

Expert Comment

by:Tintin
ID: 18048550
If you have a very basic and straight forward reverse proxy environment, then squid will be just fine.  However, once you start getting into more complex requirements such as rewrite/redirections, SSL bridging, URL/HTML URL mapping etc, then Apache is far superior.

The current stable release of squid is 2.6, and its SSL support is limited compared to Apache.
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 1

Author Comment

by:blueglacier
ID: 18048659
Tintin that sounds interesting.  So instead of setting up  squid, I would replace it with Apache.  Is this what you are suggesting?

 [internet]--[Firewall]--[Apache(as reverse proxy)]--[IIS(wtih ASP.NET Application]

Also, the only problems you found is with SSL right. So only the part that handles payment procesing will be affected?

Do you have any examples/docs on this setup.

Thanks,

Patrick
PS: Thanks for the feedback Ravenpl I am checking those links today.
0
 
LVL 48

Accepted Solution

by:
Tintin earned 125 total points
ID: 18048776
My preference is for Apache, but Squid is still OK if you don't have complex rules as described in my previous posts.  Additionally, squid will probably be a bit better if the main thing you want to use it for is a reverse proxy cache, although the mod_cache Apache module was vastly improved in Apache 2.2

For info on Reverse Proxy Apache tutorial, see:

http://www.serverwatch.com/tutorials/article.php/3290851

Note that this is for Apache 2.0.  There are some improvements/enhancements in Apache 2.2, but it all depends on your exact requirements.  If you have just a very straight forward environment, then the details in this tutorial will be just fine.

0
 
LVL 1

Author Comment

by:blueglacier
ID: 18052027
Thanks for the help.

Patrick
0

Featured Post

Tutorials alone can't teach real engineering

So we built better training tools.

-Hands-on Labs
-Instructor Mentoring
-Scenario-Based Tests
-Dedicated Cloud Servers

All at your fingertips. What are you waiting for?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question