The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.
#Recommended minimum configuration: # # Only allow cachemgr access from localhost http_access allow manager localhost http_access deny manager # Deny requests to unknown ports http_access deny !Safe_ports # Deny CONNECT to other than SSL ports http_access allow CONNECT !SSL_ports # # We strongly recommend the following be uncommented to protect innocent # web applications running on the proxy server who think the only # one who can access services on "localhost" is a local user #http_access deny to_localhost # # INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS acl ncsa_users proxy_auth REQUIRED http_access allow ncsa_users ### added by squish (begin) # acl's for squish - autodetected, sometimes acl SQUISHLOC dst http://www.www.com acl SQUISHED1 proxy_auth -i "/etc/squid/squished" acl password proxy_auth REQUIRED acl SQUISHED2 ident "/etc/squid/squished" acl SQUISHED3 src "/etc/squid/squished" # Error info that says you're squished deny_info http://www.www.com SQUISHED1 deny_info http://www.www.com SQUISHED2 deny_info http://www.www.com SQUISHED3 # HTTP access controls for squish http_access allow SQUISHLOC http_access allow password !SQUISHED1 http_access deny SQUISHED1 http_access deny SQUISHED2 http_access deny SQUISHED3 ### added by squish (end) #http_access deny !ncsa_users # Example rule allowing access from your local networks. Adapt # to list your (internal) IP networks from where browsing should # be allowed # And finally deny all other access to this proxy http_access allow localhost http_access deny all
Add your voice to the tech community where 5M+ people just like you are talking about what matters.
Join the community of 500,000 technology professionals and ask your questions.