How to distribute "Proxy Settings" automatically to clients. (Proxy Server is on Ubuntu Linux-based )

Posted on 2009-04-29
Last Modified: 2013-12-16
We are running following servers:

(1) DHCP Server on a Windows 2003 Server. (

(2) Squid Proxy and Bind DNS and Fireall on Ubuntu Linux Server. (

Now, I want to configure my Linux Server so that client browers can detect Proxy Server automatically. Because we have arround 400 Client PCs and configuring them manually is a lenghty and cumborsome job.

Previously, we were using ISA 2006 as proxy and I had made WPAD entry in Windows-based DHCP to distribute proxy address: http://isaserver:8080/wpad.dat, and it was working well.

But now, I have removed ISA and using Linux-based Proxy and I don't know"

1. How and where to make wpad.dat file ?

2. Will I need to configure Apache so that clients get wpad.dat file using "http://myapacheserver:3128/wpad.dat ? (Proxy Server is listening on by default 3128 port number)

Please note that everything is running well. I just want to know how can I distribute the "proxy settings" automatically.

Question by:JatinHemant
    LVL 17

    Accepted Solution

    Have a look at
    If you do it this way you wont have to send any proxy settings at all.
    LVL 10

    Assisted Solution

    Without any DHCP options,  and the " automatically detect proxy settings" checked in your browser, the browser will look for a server named wpad in the doamin suffix search order and attempt to download a file from the it on port 80 named, yes, wpad.dat.

    I would run another instance of apache on port 80 on either the same server or another server that will serve the wpad.dat file. Put a dns entry for You can look up how to craft the wpad file by looking at netscape's java pac file syntax, as nobody is autogenerating the file like ISA used to.

    Or do transparent proxy, you have options.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Security Threats Are You Missing?

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
    Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now