Looking for good internal Proxy solution (50-100 users)

Posted on 2014-02-10
Medium Priority
Last Modified: 2014-02-17

I am using SQUID proxy system running under Linux for my company.
I would like to replace it with an easiest solution regarding maintenance and monitoring.

I would like to rely on your experience and get your feedback on what is the best free proxy product according to you ?

Easy to administrate,configure,efficient and reliable. All this for free if possible!

Thank you for your help
Question by:Kooljacks
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2

Author Comment

ID: 39847339
I forget to mention that I am looking for a proxy solution for 50-100 computers, not for a thousand.

Thank you
LVL 33

Expert Comment

by:Dave Howe
ID: 39847575
Why not run Squid under windows then? you are already familiar with it, can literally cut and paste the current config across, and the price is more than reasonable :)

Author Comment

ID: 39847747
Thank you Dave for your answer,

Unfortunately I am not so used to Squid.
It was managed by someone else before I join the company.

Squid generates a lot of logs. It's hard for me to easily analyse them.
That's why I was thinking to change my proxy solution.
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

LVL 33

Expert Comment

by:Dave Howe
ID: 39847875
hmm. squid logs are the standard, most log analysis packages accept the format, still, if you want an alternative.. MS have TMG, which is overpriced and overblown for what you want to do with it, but does have a pretty gui.

if you are looking to do some web filtering as well, you might want to look at websense and similar; I have used wingate for a number of small businesses, but it isn't particularly cheap per-user and you are talking 50-100 users.

alternatively, it might be cheaper and easier for you or someone else on staff to get some training on squid, and save the cash on buying a windows based solution :)
LVL 13

Accepted Solution

Sandy earned 1000 total points
ID: 39849461
use Artica... Free and this will even give you Squid/dansguardian/filters etc...

LVL 33

Expert Comment

by:Dave Howe
ID: 39849598
might be worth looking at gui tools for squid too. The ever popular WebMin has support for configuring squid and if you are going down the ClamAV (or other ICAP scanner) route to do scanning at the proxy level, there is a gui tool for SquidGuard and SquidClamAV

Squid is well worth the investment in time and training - as a free/open source solution, the money you save year-on-year can be considerable :)
LVL 13

Expert Comment

ID: 39849615
Agree Dave :)

Author Comment

ID: 39849775
Thank you Dave and Sandy.
It seems to be clear that I have to keep Squid solution and learn how does it work by using your suggestions. And help myself using some GUI.

What I need is the shortest way to make it work fine on my network. I am not a Linux guy(looser.. I know :))

Artica is amazing. There is an appliance all set up with Squid. So I don't even have to configure LInux.
I will give it a try.

Thank you
LVL 33

Assisted Solution

by:Dave Howe
Dave Howe earned 1000 total points
ID: 39849885
You don't need to be a Linux guy - you are probably already surrounded by Linux and don't even know it :)

Much Cisco or Juniper kit (and almost all internet routers) are linux; most appliances of any sort are linux, or some sort of bsd derivative; mac osx is bsd based, as is ios; android is very linux-derived, even many TV sets and (believe it not) some slow-cooker "crockpots" run linux.

In every case, the reason you don't notice is that there is a well crafted user interface that hides the "black screen, white text" command line that so terrifies the non-unix-geek and provides an easy, often web-browser based way to configure and use the system.

Artica's prebuilt squid appliance is a good example - drop into vmware, spend a couple of minutes configuring via a browser, done!

There are similar, dedicated projects that are designed to install a dedicated-purpose linux example, either into vmware or onto a physical server, such as IPCop (which is also designed to sit as a firewall between your network and the internet) - you can get those for other purposes too; for example, Openfiler and FreeNAS both make a commodity server into a storage host for use by workstations and servers (you can build a vmware cluster against an iscsi target, for example) - all without having to learn a single linux command or know what vi or emacs are....

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Hey fellow admins! This time, I have a little fairy tale for you. As many tales do, it starts boring and then gets pretty gory. I hope you like it. TL;DR: It is about an important security matter, you should read it if you run or administer Windows …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question