LinuxQuestions.org

LinuxQuestions.org (/questions/)
-   Linux - Networking (http://www.linuxquestions.org/questions/linux-networking-3/)
-   -   squid configuration for icap server (http://www.linuxquestions.org/questions/linux-networking-3/squid-configuration-for-icap-server-901334/)

Tahir Saleh 09-06-2011 12:09 AM

squid configuration for icap server
 
I am to configure an icap server (GreasySpoon) using squid but the problem is I am not able to configure squid 3 alone using source as per requirement I believe for GreasySpoon. Here is the configuration file squid.conf:

Code:

#
# Recommended minimum configuration:
#
acl manager proto cache_object
acl localhost src 127.0.0.1/32 ::1
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32 ::1

# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing
# should be allowed
acl localnet src 10.0.0.0/8        # RFC1918 possible internal network
acl localnet src 172.16.0.0/12        # RFC1918 possible internal network
acl localnet src 192.168.0.0/24        # RFC1918 possible internal network
acl localnet src fc00::/7      # RFC 4193 local private network range
acl localnet src fe80::/10      # RFC 4291 link-local (directly plugged) machines

#acl mylan src 192.168.0.0-192.168.0.60/24

acl SSL_ports port 443
acl Safe_ports port 80                # http
acl Safe_ports port 21                # ftp
acl Safe_ports port 443                # https
acl Safe_ports port 70                # gopher
acl Safe_ports port 210                # wais
acl Safe_ports port 1025-65535        # unregistered ports
acl Safe_ports port 280                # http-mgmt
acl Safe_ports port 488                # gss-http
acl Safe_ports port 591                # filemaker
acl Safe_ports port 777                # multiling http
acl CONNECT method CONNECT

#
# Recommended minimum Access Permission configuration:
#
# Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager

# Deny requests to certain unsafe ports
http_access deny !Safe_ports

# Deny CONNECT to other than secure SSL ports
http_access deny CONNECT !SSL_ports

# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost

#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#

# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access allow localnet
http_access allow localhost
#http_access allow mylan

# And finally deny all other access to this proxy
http_access deny all

# Squid normally listens to port 3128
http_port 3128

# We recommend you to use at least the following line.
hierarchy_stoplist cgi-bin ?

# Uncomment and adjust the following to add a disk cache directory.
#cache_dir ufs /var/spool/squid 100 16 256

# Leave coredumps in the first cache dir
coredump_dir /var/spool/squid

# Add any of your own refresh_pattern entries above these.
refresh_pattern ^ftp:                1440        20%        10080
refresh_pattern ^gopher:        1440        0%        1440
refresh_pattern -i (/cgi-bin/|\?) 0        0%        0
refresh_pattern .                0        20%        4320

#  TAG: cache_peer
#        To specify other caches in a hierarchy, use the format:
#
#                cache_peer hostname type http-port icp-port [options]




#cache_peer localhost parent 51966 0 default no-query no-digest no-netdb-exchange

#  TAG: never_direct
#        Usage: never_direct allow|deny [!]aclname ...
#


#never_direct allow all


#http_port 3128 ssl-bump cert=/usr/local/squid3/etc/CA-priv+pub.pem

# Bumped requests have relative URLs so Squid has to use reverse proxy
# or accelerator code. By default, that code denies direct forwarding.
# The need for this option may disappear in the future.
#always_direct allow all

# ICAP OPTIONS
# -----------------------------------------------------------------------------

#  TAG: icap_enable        on|off
#        If you want to enable the ICAP module support, set this to on.
#
#Default:
# icap_enable off
icap_enable on
#logformat icap_squid %ts.%03tu %6icap::tr %>a %icap::to/%03icap::Hs %icap::<st %icap::rm %icap::ru -/%icap::<A -
#icap_log /var/log/squid3/icap.log icap_squid

#  TAG: icap_service_revival_delay
#        The delay specifies the number of seconds to wait after an ICAP
#        OPTIONS request failure before requesting the options again. The
#        failed ICAP service is considered "down" until fresh OPTIONS are
#        fetched.
#
#        The actual delay cannot be smaller than the hardcoded minimum
#        delay of 30 seconds.
#
#Default:
# icap_service_revival_delay 180
icap_service_revival_delay 30

#  TAG: icap_send_client_ip        on|off
#        This adds the header "X-Client-IP" to ICAP requests.
#
#Default:
# icap_send_client_ip off
icap_send_client_ip on

#  TAG: icap_send_client_username        on|off
#        This sends authenticated HTTP client username (if available) to
#        the ICAP service. The username value is encoded based on the
#        icap_client_username_encode option and is sent using the header
#        specified by the icap_client_username_header option.
#
#Default:
# icap_send_client_username off
icap_send_client_username on


#  TAG: icap_service
#        Defines a single ICAP service
# SQUID 3.1
icap_service service1 reqmod_precache 0 icap://localhost:1344/reqmod
adaptation_access service_req allow all
icap_service service_resp respmod_precache 0 icap://localhost:1344/respmod
adaptation_access service_resp allow all

Any help will be appreciated.


All times are GMT -5. The time now is 01:32 PM.