Squid Proxy CentOS 6.4 Prepared by : Mr. Sopheap Position : IT Support Location : Deam Computer Date : 24/July/2013.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

Enabling Secure Internet Access with ISA Server
Virtual Private Servers VPS David Nevala Lukins Annis PS.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Workshop 5: IPSec Security Ricky Mok 4 Apr Preparation Group yourself into groups of 2 people. – You will take turn to be “client” and “server”.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
DVG-N5402SP.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Proxy Servers Dr. Ronald Bergmann, CIO, ISO. Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local.
14 July CONFIGURING A PROXY SERVER IN LINUX BY ROHIT KAUL CS, BITS-PILANI.
1  Teacher : KIM Bunthoeurn  Group 3  Group members: o ENG Phally o CHHENG Sounly o POV Sopheap o SRORNG Voleak o NGET Phanny  Topic: Company description.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Proxy servers By Akshit, Jay and Bhum Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients.
APACHE SERVER By Innovationframes.com »
1 Enabling Secure Internet Access with ISA Server.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
1 Guide to Network Defense and Countermeasures Chapter 6.
CIS 193A – Lesson10 Protecting Your Network. CIS 193A – Lesson10 Focus Question What information contained in packets can be used as matching criteria.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Internet Filtering with DansGuardian By Daniel Zobel Director of Technology Heyworth CUSD#4.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Virtual Company Group 8 Presentation Date: June /04/2017
Configuring the MagicInfo Pro Display
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
LANDesk Management Gateway
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Web Proxy Squid Setup. A proxy is a host which relays web access requests from clients a proxy server is an application program that acts as an intermediary.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Topics ABOUT SQUID SQUID BASICS INSTRALLATION OF SQUID SQUID SERVICE CONFIGURATION UNDERSTANDING ACCESS CONTROL LIST LOGS TRANSPARENT PROXY MONITORING.
System Administration and Maintenance. Proxy Server 1 Purpose – – To separate internal network from internet (NAT) To cache often used content User control:
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Introduction to HTML. What is a HTML File?  HTML stands for Hyper Text Markup Language  An HTML file is a text file containing small markup tags  The.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Web Access. Overview  Purpose  Prerequisites  Install Components  Enable Virtual Directories  IIS Configuration & Security  Troubleshooting.
Implementing ISA Server Caching
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
PROXY. SQUID Squid is a fully-featured HTTP/1.0 proxy which is almost (but not quite -- we're getting there!) HTTP/1.1 compliant. Squid offers a rich.
Part One: System administration Training Handouts.
Squid Jon Larsen Omaha Linux User Group May 2nd, 2006.
Web and Proxy Server.
Installing TMG & Choosing a Client Type
Module 3: Enabling Access to Internet Resources
Lecture 5 Blocking practices
Enabling Secure Internet Access with TMG
ECE 544: Middlebox lab Abhigyan Sharma.
FORTINET Network Security NSE8 Dumps - 100% Success
Ad-blocker circumvention System
LINUX ADMINISTRATION 1
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Welcome To : Group 1 VC Presentation
Configuring Internet-related services
Chapter 7 Network Applications
Presentation transcript:

Squid Proxy CentOS 6.4 Prepared by : Mr. Sopheap Position : IT Support Location : Deam Computer Date : 24/July/2013

Infrastructure

Requirement Squid Proxy Server = CentOS 6.4  IP = /24 ; Eth0 = WAN  IP = /24 ; Eth1 = LAN Client Windows XP  IP = /24 – /24

What Type of Proxy Server? Transparent Proxy This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) Anonymous Proxy This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. Distorting Proxy This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. High Anonymity Proxy This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.

Anonymous Proxy & Transparent Proxy Now I will choose two type of proxy server for show everyone  Anonymous Proxy  Transparent Proxy

Anonymous Proxy Hostname

Anonymous Proxy

IP address WAN Anonymous Proxy

IP Address WAN Anonymous Proxy

IP Address LAN Anonymous Proxy

Stop Service Iptables Anonymous Proxy

Install Squid Proxy Anonymous Proxy

Enable Service Squid Anonymous Proxy

Copy default configure squid Anonymous Proxy

Edit file squid configuration Anonymous Proxy

Edit file squid configuration Anonymous Proxy

Edit file squid configuration Anonymous Proxy

Edit file squid configuration Anonymous Proxy

Save and Start service squid Anonymous Proxy

Enable IP address Squid Proxy on Client Anonymous Proxy

Client access internet Anonymous Proxy

Create blacklist website for block on client Anonymous Proxy

Create blacklist website for block on client Anonymous Proxy

Create rule in squid for block blacklist website on client Anonymous Proxy

Client access blacklist website Anonymous Proxy

Create rule unlimited access for specific ip address Anonymous Proxy

Create rule unlimited access for specific ip address Anonymous Proxy

Create rule unlimited access for specific ip address

Client use unlimited ip address access blacklist website Anonymous Proxy

Create rule for block file torrent Anonymous Proxy

Client access website torrent Anonymous Proxy

Create rule for block image url Anonymous Proxy

Client access website that image url block Anonymous Proxy

Create rule for authentication with squid proxy Anonymous Proxy

Create rule for authentication with squid proxy

Install service httpd Anonymous Proxy

Edit file /etc/hosts Anonymous Proxy

Restart service httpd Anonymous Proxy

Create user htpasswd Anonymous Proxy

Client access internet by authenticated with squid proxy Anonymous Proxy

After client type user name and password Anonymous Proxy

Create file for block extension Anonymous Proxy

Create rule for block video content; extension and video reply Anonymous Proxy

Client access website that have video content Anonymous Proxy

Client download file that have extension.exe Anonymous Proxy

Limited speed download for client and unlimited ip address Anonymous Proxy

Client use unlimited ip address download unlimited speed Anonymous Proxy

Client Lan ip address download speed Anonymous Proxy

Create file index.htm for redirect blacklist website Anonymous Proxy

Create file index.htm for redirect blacklist website Note for this file we can create by our self or we can download file html

Type command redirect this file Anonymous Proxy

When access blacklist website it will redirect to /index.htm Anonymous Proxy

Create rule for authenticated specific time Anonymous Proxy

Client access internet during 3:20 PM so client do not authentication with squid proxy. Anonymous Proxy

Edit file squid on http_port 3128 intercept or http_port 3128 transparent Transparent Proxy

Enables port forwarding in /etc/sysctl.conf Transparent Proxy

Delete all rule in /etc/sysconfig/iptables Transparent Proxy

After delete all rule in /etc/sysconfig/Iptables we need to restart service Iptables and save service iptables Transparent Proxy

After we restart service iptables already we need to create file iptables for create new rule and restart service iptables like above. Transparent Proxy

Restart service iptables and new file be create (sh flush.sh) Transparent Proxy

Client access internet by do not put ip address and port of squid proxy Transparent Proxy

Client access internet by do not put ip address and port of squid proxy

Client still cannot access website blacklist Transparent Proxy

We can monitor client access blacklist by type tail –f /var/log/squid/access.log Transparent Proxy

Squid Proxy Preparation by Mr. Sopheap The End