Linux - ServerThis forum is for the discussion of Linux Software used in a server related context.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Hi Team,
We have RedHat 5 installed and configured squid-2.6.STABLE6-3.el5. Squid has configured as proxy as well as "Transparent", proxy. My question is, Can we able usage report which user is accessing internet via Transperent.
Did you think about what you're asking?? You've got a proxy server set up that doesn't require users to authenticate (transparent). And you want to run a report on which users are using it? Do you see any problems with that question? If the proxy server doesn't know about individual users, how do you expect to be able to report on them??
You MIGHT be able to run a report based on IP addresses, but if your clients are using DHCP, then you'll have a hard time of knowing which user is which. Sarg is frequently used for Squid reporting...based on your question, though, it seems pointless.
Tbone :- Sarg is frequently used for Squid reporting...based on your question, though, it seems pointless.
In our organization Squid has configured as both proxy as well as transparent proxy.
But i am not much sound with Squid, Just I want confirming, If my one user accessing internet via "Transparent1 proxy" , Are her browsing url come in Sarg report.
If i am doing mistake, Please correct me. Thanks in advance.
Sarg is frequently used for Squid reporting...based on your question, though, it seems pointless. In our organization Squid has configured as both proxy as well as transparent proxy. But i am not much sound with Squid, Just I want confirming, If my one user accessing internet via "Transparent1 proxy" , Are her browsing url come in Sarg report.
If i am doing mistake, Please correct me. Thanks in advance.
Again, are you actually reading and understanding what you're posting? Are you saying that you have ONE USER on a proxy server, and want a report on internet usage? Again, seems pointless, since ANY internet usage would all be used by ONE USER, and you already KNOW who it is.
If you are using a transparent proxy, that means the only identifiers you'll find in your squid logs will be IP addresses. Again, you CAN report on it, but in order to tie it back to a particular user, you would also have to have DHCP logs, to know at what times/dates which workstations had which IP addresses, which you could then identify with a user. If you have static addresses, then you have workstation identifiers, and know which users have which addresses. In either case, sarg can report.
Distribution: RHEL, CentOS, Debian, Oracle Solaris 10
Posts: 1,420
Rep:
A Transparent Proxy is a AAA server that satisfies the definition of a Proxy, but does not enforce any local policies (meaning that it does not add, delete or modify attributes or modify information within messages it forwards).
And they are used for cache for data.
Whenever data is requested, it may be satisfied by retrieving it from the proxy(cache) because that same data request was made at an earlier time. This would mean that a transaction to the original source for the second, and subsequent, requests for that same data would not be required, resulting in possible cost savings.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.