Follow us on...
Follow us on G+ Follow us on Twitter Follow us on Facebook Watch us on YouTube
Results 1 to 3 of 3
  1. #1
    banana's Avatar
    Join Date
    Aug 2008
    Read 0 Reviews
    Feedback Score

    help - konfigursi squid

    suhu suhu
    ada yg punya konfigurasi squid yg udah jalan ngak ?
    bagi2 ya.

    thx before.

    sekalian minta pendapat
    squid vs proxy mt
    bagusan mana y?

  2. #2
    donipermono1982's Avatar
    Join Date
    Feb 2008
    Jakarta Selatan
    Read 0 Reviews
    Feedback Score

    System Requirements: Windows NT/2000/XP/2003/Vista
    Duration: 10 hours/40 Videos on 1-DVD

    LinuxCBT Proxy Edition feat. Squid encompasses: 1. Proxy Security.
    LinuxCBT Proxy Edition feat. Squid is unparalleled in content, depth and expertise. It entails 10-hours, or over 1-day of classroom

    training. LinuxCBT Proxy Edition feat. Squid prepares you or your organization for successfully securing GNU/Linux & Open

    Source-based solutions. As a by-product, many of the covered concepts, utilities and tricks are applicable to heterogeneous

    computing environments, ensuring your coverage of the fundamentals of securing corporate infrastructures.

    Let LinuxCBT Proxy Edition feat. Squid cost-effectively sharpen your GNU/Linux & Open Source Security skills!

    Recommended Prerequisites for:

    * Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions)
    o Open mind & determination to master Linux and related open-source applications
    o Basic understanding of networking concepts
    o Access to a PC to follow the exercises

    Proxy Security - Module 1

    * Squid Proxy Initialization
    o Discuss Squid concepts & applications
    o Discuss DNS application
    o Configure DNS on primary SuSE Linux server for the Squid Proxy environment
    o Confirm DNS environment
    o Start Squid and evaluate default configuration
    o Install Squid Proxy server
    * General Proxy Usage
    o Configure web browser to utilize proxy services
    o Grant permissions to permit local hosts to utilize proxy services
    o Discuss ideal file system layout - partitioning
    o Explore key configuration files
    o Use client to test the performance of proxy services
    o Discuss HIT/MISS logic for serving content
    o Configure proxy support for text-based (lftp/wget/lynx) HTTP clients
    * Squid Proxy Logs
    o Discuss Squid Proxy logging mechanism
    o Identify key log files
    o Discuss & explore the Access log to identify HITS and/or MISSES
    o Discuss & explore the Store log to identify cached content
    o Convert Squid logs to the Common Log Format (CLF) for easy processing
    o Discuss key CLF fields
    o Configure Webalizer to process Squid-CLF logs
    o Revert to Squid Native logs
    o Discuss key Native log fields
    o Configure Webalizer to process Squid Native logs
    * Squid Network Configuration & System Stats
    o Discuss cachemgr.cgi Common Gateway Interface(CGI) script
    o Explore the available metrics provided by cachemgr.cgi
    o Change default Squid Proxy port
    o Modify text/graphical clients and test communications
    o Discuss Safe Ports - usage & applications
    * Squid Access Control Lists (ACLs)
    o Intro to Access Control Lists (ACLs) - syntax
    o Define & test multiple HTTP-based ACLs
    o Define & test ACL lists - to support multiple hosts/subnets
    o Define & test time-based ACLs
    o Nest ACLs to tighten security
    o Implement destination domain based ACLs
    o Exempt destination domains from being cached to ensure content freshness
    o Define & test Anded ACLs
    o Discuss the benefits of Regular Expressions (Regexes)
    o Implement Regular Expressions ACLs to match URL patterns
    o Exempt hosts/subnets from being cached or using the Squid cache
    o Force cache usage
    o Configure enterprise-class Cisco PIX firewall to deny outbound traffic
    o Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
    o Discuss delay pool concepts & applications - bandwidth management
    o Configure delay pools - to support rate-limiting
    o Examine results of various delay pool classes
    o Enforce maximum connections to deter Denial of Service (DoS) attacks
    o Verify maximum connections comply with security policy
    * Squid Proxy Hierarchies
    o Discuss Squid cache hierarchy concepts & applications
    o Ensure communications through a primary cache server - double-auditing
    o Discuss and configure parent-child bypass based on ACLs
    o Configure Intranet ACLs for peer-cache bypass
    o Discuss & implement Squid cache hierarchy siblings
    o Configure transparent proxy services

    semoga berguna buat yang lagi setting squid dan yang ingin belajar squid

    yang serius ya belajarnya

    jangan lupa klik " thanks " yg ikhlas....

    gunakan fasilitas search atau lihat thread2 yang ada sebelum posting.

    coba klik thread yang gw kasih.. thank for the coorection

    Click here to enlarge
    Last edited by donipermono1982; 11-09-2008 at 19:47.

  3. The Following 2 Users Say Thank You to donipermono1982 For This Useful Post:

  4. #3
    banana's Avatar
    Join Date
    Aug 2008
    Read 0 Reviews
    Feedback Score
    Click here to enlarge

    The file could not be found. Please check the download link



Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 40
    Last Post: 23-02-2010, 15:27
  2. Squid zph and Mikrotik
    By unique_leader in forum Tutorial
    Replies: 72
    Last Post: 22-02-2010, 06:09
  3. setting squid box
    By blogggger in forum General Networking
    Replies: 17
    Last Post: 11-08-2009, 17:14
  4. Squid zph dan Mikrotik V.3.13
    By shiratc in forum Tutorial
    Replies: 13
    Last Post: 21-11-2008, 00:09
  5. mikrotik gtw + squid box
    By parot in forum Wireless Networking
    Replies: 3
    Last Post: 07-12-2007, 15:18

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts