Thanks so much for the quick reply. That was some really great info.
So, if I setup something like
THIS, then I should be able to monitor traffic?
I've been reading through a LOT of guides on configuring squid, and there seems to be a heap of contradicting info.
First step will be to activate DHCP on router 2, and giving it the 192.168.1.0 network.
From what I can gather, my config should look somthing like this:
Code:
acl internal_network src 192.168.1.0/24
acl localhost src 127.0.0.1/255.255.255.255
acl SSL_ports port 443 563 # https, snews
acl SSL_ports port 873 # rsync
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 563 # https, snews
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl Safe_ports port 631 # cups
acl Safe_ports port 873 # rsync
acl Safe_ports port 901 # SWAT
acl purge method PURGE
acl CONNECT method CONNECT
http_access allow manager localhost
http_access allow internal_network
http_access deny manager
http_access allow purge localhost
http_access deny purge
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localhost
http_access deny all
http_reply_access allow all
icp_access allow all
The I should run these IPtables commands:
Code:
iptables -t nat -A PREROUTING -i eth0 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.0.1:3128
Code:
iptables -t nat -A PREROUTING -i eth1 -p tcp -m tcp --dport 80 -j REDIRECT --to-ports 3128
Where:
192.168.0.1 is my router with internet access
eth0 is the proxy's connection to router 2 (the lan)
eth1 is the proxy's connection to router 1 (the internet modem/router)
Will that allow un-athenticated access through the proxy for everyone on the 192.168.0.1.0 network?
Again, thanks to anyone who takes time to reply.