SlideShare a Scribd company logo
1 of 25
PRESENTED BY:

                     Javeria
                  11-arid-3303
                      MIT-3
University Institute of Information Technology ,
           Rawalpindi(UIIT,UAAR)
                    Pakistan
Topics to be covered:
 What is Web Proxy??
 Purpose of using Proxy
 Squid
 Installation & Configuration Of Squid
 Demo
Web Proxy

A web proxy is a is a server (a computer system or an
application) that acts as an intermediary for requests from
clients seeking resources from other servers.




                                                internet

    browser               Web proxy
                           server
Main purpose of using proxies
   Improve Performance

     o   Caching

     o   Bandwidth control

   Provides detailed logs of user activity

   Filter Requests

   Surfing Anonymously

   Security
Some proxies
 – Microsoft Proxy Server
 – Nginx
 – Ccproxy
 – Squid
SQUID
Squid is a free, open source, mostly used proxy caching
server

Internet Service Providers (ISPs) have used Squid proxy
servers since the early 1990s to provide faster download
speeds for delivering rich media and streaming video.

Website operators frequently put a Squid proxy server as a
content accelerator, caching frequently viewed content and
easing loads on Web servers, to improve the experience of
viewers, load balancing and handling traffic spikes for
popular content.
Squid as Proxy Cache
   Squid acts as a proxy cache. It behaves like an agent
    that receives requests from clients (web browsers) and
    passes them to the specified server.
   When the requested objects arrive at the agent, it stores
    a copy in a disk cache.
   When different clients request the same objects: these
    are served directly from the disk cache, much faster
    than obtaining them from the Internet.
   This results in less network traffic and thus saves
    bandwidth.
Squid provides a number of great features useful
    for administrative purpose such as:

   allow/ deny access to specific sites

   allow/ deny access to specific clients/ users

   block URL(s) with specific word

   deny some port numbers
   Squid support the use of a database such as mySQL for
    storing the access control list
   limit the number of connections from a client

   allow some clients/users to use the cache at specific times

   customize, or make your own error messages.

   use proxy-authentication. In this scheme, you assign
    usernames and passwords to individuals. When they first use
    the proxy they are asked to authenticate themselves by
    entering their username and password.

   Maintain user log
   sudo gedit /var/log/squid3/access.log

   You can use this file to find out who is using
    squid server and what they are doing etc
(Access Control Lists)

 Define ACLs in configuration file and apply rules
  on them.
 ACLs have many options to restrict access based
  on source ip address, destination ip address, source
  domain, and destination domain. A properly
  configured set of ACLs can do things like:
    ○ restrict access to websites by IP address,
    ○ limit or block websites by name,
    ○ restrict web access by time and day, or
    ○ regular expression matches, such as .exe files or “game” in
      URL names.
Syntax to create and implement ACL:
     ○ acl aclname acltype argument ...
     ○ aclelement allow(/deny) aclname


   Examples:
     ○ acl blocked_websites dstdomain .reddit.com .twitter.com
     ○ http_access deny blocked_websites


     ○ acl badURL url_regex valentine
     ○ http_access deny badURL


     ○ acl pm_work time MTWHF 15:00-17:00
     ○ http_access deny pm_work
ACL TYPES AVAILABLE
   Squid knows about almost 25 types of ACL. Some of them
    are:
     src: source (client) IP addresses
     dst: destination (server) IP addresses
     srcdomain: source (client) domain name
     dstdomain: destination (server) domain name
     time: time of day, and day of week
     url_regex: URL regular expression pattern matching
     maxconn: a limit on the maximum number of connections from a
      single client IP address
     max_user_ip: a limit on the maximum number of IP addresses one
      user can login from
ACCESS LISTS ELEMENTS AVAILABLE
   There are a number of different access lists elements. Some are:
     http_access: Allows HTTP clients (browsers) to access the HTTP
      port. This is the primary access control list.
     cache: Defines responses that should not be cached.
     url_rewrite_access: Controls which requests are sent through the
      redirector pool.
     always_direct: Controls which requests should always be
      forwarded directly to origin servers.
     never_direct: Controls which requests should never be forwarded
      directly to origin servers.
     delay_access: Controls which requests are handled by what delay
      pool
     log_access: Controls which requests are logged. This is global and
      overrides specific file access lists appended
      to access_log directives.
   Official web site:
          http://www.squid-cache.org/


     Contains:
         FAQ
         Lots of great information!
HARDWARE REQUIREMENTS
      FOR INSTALLING SQUID

 LINUX operating system
 128MB RAM minimum recommended
 Disk
     512MB to 1GB for small user counts
     16GB to 24GB for large user counts
DOWNLOAD AND INSTALL

   In Ubuntu:
    sudo apt-get install squid
[APT stands for “Advanced Packaging Tool”]



   In Redhat / CentOS
    yum install squid
[YUM stands for “Yellowdog Updater, Modified”]
EDIT CONFIGURATION FILE
   Command to Open conf file:
    sudo gedit /etc/squid3/squid.conf

   Make these changes in conf file:
     http_access deny all > change it to http_access allow all
     acl blocked_websites dstdomain .twitter.com
     http_access deny blocked_websites


   Save and close conf file

   Restart squid
    sudo service squid restart
CONNECT TO PROXY SERVER
Open Web Browser
Go to:
 Connection Settings
 Internet Properties
 LAN Settings
 Manual proxy configuration
   Http proxy: ip address of proxy server
   Port : 3128 (default port for Squid proxy server)
UNINSTALLING SQUID

   In Ubuntu:
    sudo apt-get remove squid

   In Redhat / CentOS
    yum remove squid
THANK YOU!


                Javeria
             (11-arid-3303)

More Related Content

What's hot

3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Cloud stack vs openstack vs eucalyptus
Cloud stack vs openstack vs eucalyptusCloud stack vs openstack vs eucalyptus
Cloud stack vs openstack vs eucalyptusAshok Kumar
 
Malicious file upload attacks - a case study
Malicious file upload attacks - a case studyMalicious file upload attacks - a case study
Malicious file upload attacks - a case studyOktawian Powazka
 
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Vietnam Open Infrastructure User Group
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudNetskope
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall introRich Helton
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Canada
 
[KubeConEU2023] Lima pavilion
[KubeConEU2023] Lima pavilion[KubeConEU2023] Lima pavilion
[KubeConEU2023] Lima pavilionAkihiro Suda
 
Web application security I
Web application security IWeb application security I
Web application security IMd Syed Ahamad
 
Web application security
Web application securityWeb application security
Web application securityAkhil Raj
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedFaelix Ltd
 
IBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security SolutionIBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security Solutionhearme limited company
 

What's hot (20)

3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Cloud stack vs openstack vs eucalyptus
Cloud stack vs openstack vs eucalyptusCloud stack vs openstack vs eucalyptus
Cloud stack vs openstack vs eucalyptus
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Malicious file upload attacks - a case study
Malicious file upload attacks - a case studyMalicious file upload attacks - a case study
Malicious file upload attacks - a case study
 
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
Room 1 - 5 - Thủy Đặng - Load balancing k8s services on baremetal with Cilium...
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Web Application Firewall intro
Web Application Firewall introWeb Application Firewall intro
Web Application Firewall intro
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
[KubeConEU2023] Lima pavilion
[KubeConEU2023] Lima pavilion[KubeConEU2023] Lima pavilion
[KubeConEU2023] Lima pavilion
 
Web application security I
Web application security IWeb application security I
Web application security I
 
Web application security
Web application securityWeb application security
Web application security
 
Things I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I startedThings I wish I had known about IPv6 before I started
Things I wish I had known about IPv6 before I started
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
IBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security SolutionIBM AppScan Standard - The Web Application Security Solution
IBM AppScan Standard - The Web Application Security Solution
 
Port scanning
Port scanningPort scanning
Port scanning
 

Viewers also liked

Presentacion Squid
Presentacion SquidPresentacion Squid
Presentacion Squidalexmerono
 
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Max Morales
 
Proxy解說
Proxy解說Proxy解說
Proxy解說Tony Yeh
 
Stupid Web Caching Tricks
Stupid Web Caching TricksStupid Web Caching Tricks
Stupid Web Caching TricksMark Nottingham
 
Unidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistemaUnidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistemavverdu
 
Manual de squid creado por juanextk
Manual de squid creado por juanextkManual de squid creado por juanextk
Manual de squid creado por juanextkjuanextk
 
IPTABLES y SQUID‏
IPTABLES y SQUID‏IPTABLES y SQUID‏
IPTABLES y SQUID‏ingpuma
 
Squid3 - Servidor Proxy
Squid3 - Servidor ProxySquid3 - Servidor Proxy
Squid3 - Servidor ProxyTotus Muertos
 
Presentación de Kerio
Presentación de KerioPresentación de Kerio
Presentación de Kerionovaltec
 
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuInstalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuMarcelo Alcivar
 
Proxy Squid en Ubuntu
Proxy Squid en UbuntuProxy Squid en Ubuntu
Proxy Squid en Ubuntujferrer1974
 

Viewers also liked (20)

Presentacion Squid
Presentacion SquidPresentacion Squid
Presentacion Squid
 
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
 
Ictic4
Ictic4Ictic4
Ictic4
 
Introducción Administración TCP/IP
Introducción Administración TCP/IPIntroducción Administración TCP/IP
Introducción Administración TCP/IP
 
Proxy解說
Proxy解說Proxy解說
Proxy解說
 
Stupid Web Caching Tricks
Stupid Web Caching TricksStupid Web Caching Tricks
Stupid Web Caching Tricks
 
Squid
SquidSquid
Squid
 
Squid
SquidSquid
Squid
 
Unidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistemaUnidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistema
 
Manual de squid creado por juanextk
Manual de squid creado por juanextkManual de squid creado por juanextk
Manual de squid creado por juanextk
 
RESUMEN PROXY
RESUMEN PROXYRESUMEN PROXY
RESUMEN PROXY
 
Squid1
Squid1Squid1
Squid1
 
Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3
 
IPTABLES y SQUID‏
IPTABLES y SQUID‏IPTABLES y SQUID‏
IPTABLES y SQUID‏
 
Squid3 - Servidor Proxy
Squid3 - Servidor ProxySquid3 - Servidor Proxy
Squid3 - Servidor Proxy
 
Presentación de Kerio
Presentación de KerioPresentación de Kerio
Presentación de Kerio
 
Curso Squid avanzado
Curso Squid avanzadoCurso Squid avanzado
Curso Squid avanzado
 
Squid
Squid Squid
Squid
 
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuInstalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
 
Proxy Squid en Ubuntu
Proxy Squid en UbuntuProxy Squid en Ubuntu
Proxy Squid en Ubuntu
 

Similar to Squid

Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlationrahul8590
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Serverswebhostingguy
 
Squid Proxy Server
Squid Proxy ServerSquid Proxy Server
Squid Proxy Server13bcs0012
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy ServerJainul Musani
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-serverHARRY CHAN PUTRA
 
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea webhostingguy
 
Open source technology
Open source technologyOpen source technology
Open source technologyaparnaz1
 
17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]Krisman Tarigan
 
Defending against application level DoS attacks
Defending against application level DoS attacksDefending against application level DoS attacks
Defending against application level DoS attacksChu Xu
 
Information System Security
Information System Security Information System Security
Information System Security Elijah Konzo
 
cara menginstall router
cara menginstall routercara menginstall router
cara menginstall routerBobby Bobby
 
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...MongoDB
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy serverMeera Hapaliya
 

Similar to Squid (20)

Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlation
 
Squid server
Squid serverSquid server
Squid server
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Servers
 
Squid Proxy Server
Squid Proxy ServerSquid Proxy Server
Squid Proxy Server
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Apache Web Server Setup 4
Apache Web Server Setup 4Apache Web Server Setup 4
Apache Web Server Setup 4
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-server
 
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]
 
Defending against application level DoS attacks
Defending against application level DoS attacksDefending against application level DoS attacks
Defending against application level DoS attacks
 
Information System Security
Information System Security Information System Security
Information System Security
 
cara menginstall router
cara menginstall routercara menginstall router
cara menginstall router
 
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 
PostgreSQL : Introduction
PostgreSQL : IntroductionPostgreSQL : Introduction
PostgreSQL : Introduction
 

More from Syeda Javeria

تعلق باللہ Relationship with Allah
تعلق باللہ  Relationship with Allahتعلق باللہ  Relationship with Allah
تعلق باللہ Relationship with AllahSyeda Javeria
 
Social Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread IslamSocial Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread IslamSyeda Javeria
 
Management by Objectives
Management by ObjectivesManagement by Objectives
Management by ObjectivesSyeda Javeria
 
Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)Syeda Javeria
 
Nabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deenNabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deenSyeda Javeria
 
Windows Movie Maker Tutorial
Windows Movie Maker TutorialWindows Movie Maker Tutorial
Windows Movie Maker TutorialSyeda Javeria
 
Direct and Online marketing
Direct and Online marketingDirect and Online marketing
Direct and Online marketingSyeda Javeria
 
TRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCESTRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCESSyeda Javeria
 

More from Syeda Javeria (15)

تعلق باللہ Relationship with Allah
تعلق باللہ  Relationship with Allahتعلق باللہ  Relationship with Allah
تعلق باللہ Relationship with Allah
 
Whatsapp
Whatsapp Whatsapp
Whatsapp
 
Haya aur Iman
Haya aur ImanHaya aur Iman
Haya aur Iman
 
Social Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread IslamSocial Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread Islam
 
Phishing
PhishingPhishing
Phishing
 
Management by Objectives
Management by ObjectivesManagement by Objectives
Management by Objectives
 
Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)
 
Hazrat ibrahim a.s.
Hazrat ibrahim a.s.Hazrat ibrahim a.s.
Hazrat ibrahim a.s.
 
Nabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deenNabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deen
 
Link list
Link listLink list
Link list
 
Depreciation
DepreciationDepreciation
Depreciation
 
Windows Movie Maker Tutorial
Windows Movie Maker TutorialWindows Movie Maker Tutorial
Windows Movie Maker Tutorial
 
Direct and Online marketing
Direct and Online marketingDirect and Online marketing
Direct and Online marketing
 
Branding
BrandingBranding
Branding
 
TRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCESTRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCES
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Squid

  • 1.
  • 2.
  • 3. PRESENTED BY: Javeria 11-arid-3303 MIT-3 University Institute of Information Technology , Rawalpindi(UIIT,UAAR) Pakistan
  • 4. Topics to be covered:  What is Web Proxy??  Purpose of using Proxy  Squid  Installation & Configuration Of Squid  Demo
  • 5. Web Proxy A web proxy is a is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. internet browser Web proxy server
  • 6. Main purpose of using proxies  Improve Performance o Caching o Bandwidth control  Provides detailed logs of user activity  Filter Requests  Surfing Anonymously  Security
  • 7. Some proxies – Microsoft Proxy Server – Nginx – Ccproxy – Squid
  • 8.
  • 9. SQUID Squid is a free, open source, mostly used proxy caching server Internet Service Providers (ISPs) have used Squid proxy servers since the early 1990s to provide faster download speeds for delivering rich media and streaming video. Website operators frequently put a Squid proxy server as a content accelerator, caching frequently viewed content and easing loads on Web servers, to improve the experience of viewers, load balancing and handling traffic spikes for popular content.
  • 10. Squid as Proxy Cache  Squid acts as a proxy cache. It behaves like an agent that receives requests from clients (web browsers) and passes them to the specified server.  When the requested objects arrive at the agent, it stores a copy in a disk cache.  When different clients request the same objects: these are served directly from the disk cache, much faster than obtaining them from the Internet.  This results in less network traffic and thus saves bandwidth.
  • 11. Squid provides a number of great features useful for administrative purpose such as:  allow/ deny access to specific sites  allow/ deny access to specific clients/ users  block URL(s) with specific word  deny some port numbers  Squid support the use of a database such as mySQL for storing the access control list
  • 12. limit the number of connections from a client  allow some clients/users to use the cache at specific times  customize, or make your own error messages.  use proxy-authentication. In this scheme, you assign usernames and passwords to individuals. When they first use the proxy they are asked to authenticate themselves by entering their username and password.  Maintain user log
  • 13. sudo gedit /var/log/squid3/access.log  You can use this file to find out who is using squid server and what they are doing etc
  • 14. (Access Control Lists)  Define ACLs in configuration file and apply rules on them.  ACLs have many options to restrict access based on source ip address, destination ip address, source domain, and destination domain. A properly configured set of ACLs can do things like: ○ restrict access to websites by IP address, ○ limit or block websites by name, ○ restrict web access by time and day, or ○ regular expression matches, such as .exe files or “game” in URL names.
  • 15. Syntax to create and implement ACL: ○ acl aclname acltype argument ... ○ aclelement allow(/deny) aclname  Examples: ○ acl blocked_websites dstdomain .reddit.com .twitter.com ○ http_access deny blocked_websites ○ acl badURL url_regex valentine ○ http_access deny badURL ○ acl pm_work time MTWHF 15:00-17:00 ○ http_access deny pm_work
  • 16. ACL TYPES AVAILABLE  Squid knows about almost 25 types of ACL. Some of them are:  src: source (client) IP addresses  dst: destination (server) IP addresses  srcdomain: source (client) domain name  dstdomain: destination (server) domain name  time: time of day, and day of week  url_regex: URL regular expression pattern matching  maxconn: a limit on the maximum number of connections from a single client IP address  max_user_ip: a limit on the maximum number of IP addresses one user can login from
  • 17. ACCESS LISTS ELEMENTS AVAILABLE  There are a number of different access lists elements. Some are:  http_access: Allows HTTP clients (browsers) to access the HTTP port. This is the primary access control list.  cache: Defines responses that should not be cached.  url_rewrite_access: Controls which requests are sent through the redirector pool.  always_direct: Controls which requests should always be forwarded directly to origin servers.  never_direct: Controls which requests should never be forwarded directly to origin servers.  delay_access: Controls which requests are handled by what delay pool  log_access: Controls which requests are logged. This is global and overrides specific file access lists appended to access_log directives.
  • 18. Official web site: http://www.squid-cache.org/  Contains:  FAQ  Lots of great information!
  • 19.
  • 20. HARDWARE REQUIREMENTS FOR INSTALLING SQUID  LINUX operating system  128MB RAM minimum recommended  Disk  512MB to 1GB for small user counts  16GB to 24GB for large user counts
  • 21. DOWNLOAD AND INSTALL  In Ubuntu: sudo apt-get install squid [APT stands for “Advanced Packaging Tool”]  In Redhat / CentOS yum install squid [YUM stands for “Yellowdog Updater, Modified”]
  • 22. EDIT CONFIGURATION FILE  Command to Open conf file: sudo gedit /etc/squid3/squid.conf  Make these changes in conf file:  http_access deny all > change it to http_access allow all  acl blocked_websites dstdomain .twitter.com  http_access deny blocked_websites  Save and close conf file  Restart squid sudo service squid restart
  • 23. CONNECT TO PROXY SERVER Open Web Browser Go to:  Connection Settings  Internet Properties  LAN Settings  Manual proxy configuration  Http proxy: ip address of proxy server  Port : 3128 (default port for Squid proxy server)
  • 24. UNINSTALLING SQUID  In Ubuntu: sudo apt-get remove squid  In Redhat / CentOS yum remove squid
  • 25. THANK YOU! Javeria (11-arid-3303)