Solved

Allowing Certain Ports to Pass Through Squid

Posted on 2009-06-29
5
565 Views
Last Modified: 2012-05-07
I have set up a squid proxy server. It seems to be working OK except for when people try to go to a site through a certain port (ex: www.greencastle.com:8383). I assume this is because they are not going through to the squid server on 3128? How can I tell squid to allow certain ports through?
0
Comment
Question by:dajwilso
  • 2
  • 2
5 Comments
 
LVL 14

Expert Comment

by:small_student
ID: 24739308
HI there

Add an ACL , open the squid configuration file

#vim /etc/squid/squid.conf

look for acl safeports in the file, you will find a group of ports , just add a new similar line with the port you want, 8383 is for Windows IMAIL

Best Regards
0
 
LVL 5

Expert Comment

by:ABLComputers
ID: 24748694
A very good tool to use to manage your server is Webmin. This gives up a GUI interface for apps like squid and other Linux apps.
0
 

Author Comment

by:dajwilso
ID: 24748975
I'll check into that webmin tool. I did add port 8383 in to the Safe_ports acl but it still gives me an error. Is it because the computer is trying to go to a site without going through proxy port? I worked around this for now by defining a group policy on my server that puts an exception in for websites with ports like that.
0
 
LVL 14

Accepted Solution

by:
small_student earned 500 total points
ID: 24761419
Is it an internal site, I mean within your LAN , if so from your Browser settings check the box that says bypass for or NO proxy for and put the IP address of the server

Can you post the error please

0
 

Author Comment

by:dajwilso
ID: 24762302
It isn't, it's external. But if the browser settings are the best way to go (that is what I am doing now) then that is fine.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Best way to virtualise a remote Linux server 2 52
CMDB relationships for hardware assets 2 31
Reset Root Password on CentOS 6 4 44
nexus filter logs 3 28
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now