Hi below i have pasted my squid configuation,I have wirtten the squid what u have mentioned but still i cannot able to block googletalk and
https://wwwl.meebo.com
Please guide me how to block these link and chat below mentioned please gothrough my squid proxy configuration
thanks
xamples:
#acl myexample dst_as 1241
#acl password proxy_auth REQUIRED
#acl fileupload req_mime_type -i ^multipart/form-data$
#acl javascript rep_mime_type -i ^application/x-javascript$
#
#Recommended minimum configuration:
acl all src 0.0.0.0/0.0.0.0
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443 563
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 563 # https, snews
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
# TAG: http_access
# Allowing or Denying access based on defined access lists
#
# Access to the HTTP port:
# http_access allow|deny [!]aclname ...
#
# NOTE on default values:
#
# If there are no "access" lines present, the default is to deny
# the request.
#
# If none of the "access" lines cause a match, the default is the
# opposite of the last line in the list. If the last line was
# deny, the default is allow. Conversely, if the last line
# is allow, the default will be deny. For these reasons, it is a
# good idea to have an "deny all" or "allow all" entry at the end
# of your access lists to avoid potential confusion.
#
#Default:
# http_access deny all
#
#Recommended minimum configuration:
#
# Only allow cachemgr access from localhost
http_access allow manager localhost
http_access deny manager
# Deny requests to unknown ports
http_access deny !Safe_ports
# Deny CONNECT to other than SSL ports
http_access deny CONNECT !SSL_ports
#
# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
# Example rule allowing access from your local networks. Adapt
# to list your (internal) IP networks from where browsing should
# be allowed
#acl our_networks src 192.168.1.0/24 192.168.2.0/24
#http_access allow our_networks
#Yahoo MSN AOL Google Chat blocking
#
##### Block AOL, YAHOO MSN Google Talk
acl aolyahoo dstdomain login.oscar.aol.com
acl aolyahoo dstdomain insider.msg.yahoo.com
acl aolyahoo dstdomain pager.yahoo.com
acl aolyahoo dstdomain shttp.msg.yahoo.com
acl aolyahoo dstdomain update.messenger.yahoo.com
acl aolyahoo dstdomain update.pager.yahoo.com
acl aolyahoo dstdomain pgq.yahoo.com
acl aolyahoo dstdomain mtab.games.yahoo.com
acl https_sites dstdomain talk.l.google.com
acl https_sites dstdomain talk.google.com
acl https_sites dstdomain meebo.com
acl aolyahoo dstdomain messenger.com
acl https_port port 5222
acl https_port port 5223
acl https_port port 443
acl site_block url_regex -i chatenabled.mail.google.com
acl site_block url_regex -i talk.google.com
acl site_block url_regex -i meebo.com
acl site_block url_regex -i meeboo.com
acl site_block url_regex -i youtube.com
acl site_block url_regex -i orkut.com
acl site_block url_regex -i naukri.com
acl site_block url_regex -i monster.com
acl site_block url_regex -i monsterindia.com
acl webmsn dstdomain webmessenger.msn.com
##### Mime blocking
##### Blocking reqested mine types
acl mimeblockq req_mime_type ^application/x-msn-messenger$
acl mimeblockq req_mime_type ^app/x-hotbar-xip20$
acl mimeblockq req_mime_type ^application/x-icq$
acl mimeblockq req_mime_type ^.*AIM.*
acl mimeblockq req_mime_type ^application/x-comet-log$
acl mimeblockq req_mime_type ^application/x-pncmd$
##### Blocking sent mime types
acl mimeblockp rep_mime_type ^application/x-msn-messenger$
acl mimeblockp rep_mime_type ^app/x-hotbar-xip20$
acl mimeblockp rep_mime_type ^application/x-icq$
acl mimeblockp rep_mime_type ^.*AIM.*
acl mimeblockp rep_mime_type ^.*AIM/HTTP
acl mimeblockp rep_mime_type ^application/x-comet-log$
acl mimeblockp rep_mime_type ^application/x-pncmd$
#
#end
###### Allow Bernad for MSN ##########
acl bernad src 192.168.0.139/255.255.255.255
acl vandana src 192.168.0.46/255.255.255.255
acl noel1 src 192.168.0.54/255.255.255.255
acl noel src 192.168.0.122/255.255.255.255
acl sudha src 192.168.0.129/255.255.255.255
#acl bernad src 192.168.0.5/255.255.255.255
# And finally deny all other access to this proxy
http_access allow bernad
http_access allow vandana
http_access allow noel1
http_access allow noel
http_access allow sudha
http_access allow localhost
http_access deny webmsn
http_access deny block_port
http_access deny aolyahoo
http_access https_sites https_port deny
http_access deny site_block
http_access deny mimeblockq
http_reply_access deny mimeblockp
http_access allow all
# TAG: http_reply_access
# Allow replies to client ::
requests. This is complementary to http_access.
#
# http_reply_access allow|deny [!] aclname ...