Smooth Wall 3 Advproxy en
Smooth Wall 3 Advproxy en
Smooth Wall 3 Advproxy en
Advanced Web Proxy Server for SmoothWall Express 3.0 Administrator’s Guide
Administrator’s Guide
© Copyright 2004-2009
Author: Marco Sondermann
m.sondermann@directbox.com
http://www.advproxy.net
Table of contents
1 Preface ......................................................................................................................................................... 5
1.1 RIGHTS AND DISCLAIMERS ...................................................................................................................... 5
1.2 TRADEMARKS ......................................................................................................................................... 5
1.3 ACKNOWLEDGEMENTS ............................................................................................................................ 5
2 Introduction ................................................................................................................................................. 6
2.1 OVERVIEW ............................................................................................................................................. 6
2.2 ADVANCED PROXY FEATURE LIST ............................................................................................................ 6
2.3 CLASSROOM EXTENSIONS FEATURE LIST ................................................................................................. 7
2.4 LEGAL BASIS .......................................................................................................................................... 8
2.5 SECURITY NOTES.................................................................................................................................... 8
2.5.1 Installation and replacement of binary files ..................................................................................... 8
2.5.2 Firewall rules .................................................................................................................................... 8
2.5.3 Passwords ....................................................................................................................................... 8
3 Installation ................................................................................................................................................... 9
3.1 INSTALLATION REQUIREMENTS ................................................................................................................ 9
3.2 INSTALLING OR UPDATING THE ADVANCED PROXY ADD-ON ....................................................................... 9
3.3 INSTALLING THE CLASSROOM EXTENSIONS (CRE) ................................................................................... 9
3.4 REMOVING THE ADVANCED PROXY ADD-ON ........................................................................................... 10
3.5 AUTOMATIC UPDATE NOTIFICATION ........................................................................................................ 10
3.6 SPECIFIC PROBLEMS WITH OFFICIAL SMOOTHW ALL UPDATES.................................................................. 10
3.7 INCLUDING USER DEFINED CONFIGURATION DIRECTIVES.......................................................................... 11
4 Web Proxy configuration ......................................................................................................................... 12
4.1 COMMON SETTINGS .............................................................................................................................. 12
4.1.1 Enabled on <Interface> ................................................................................................................. 12
4.1.2 Transparent on <Interface> ........................................................................................................... 12
4.1.3 Proxy Port ...................................................................................................................................... 12
4.1.4 Visible hostname ........................................................................................................................... 12
4.1.5 Cache administrator e-mail ............................................................................................................ 13
4.1.6 Error messages language .............................................................................................................. 13
4.1.7 Error messages design .................................................................................................................. 13
4.1.8 Suppress version information ........................................................................................................ 13
4.1.9 Squid Cache version ...................................................................................................................... 13
4.2 UPSTREAM PROXY ................................................................................................................................ 14
4.2.1 Proxy address forwarding .............................................................................................................. 14
4.2.2 Client IP address forwarding.......................................................................................................... 14
4.2.3 Username forwarding .................................................................................................................... 14
4.2.4 No connection oriented authentication forwarding ........................................................................ 14
4.2.5 Upstream proxy (host:port) ............................................................................................................ 15
4.2.6 Upstream username ...................................................................................................................... 15
4.2.7 Upstream password ....................................................................................................................... 15
4.3 LOG SETTINGS...................................................................................................................................... 16
4.3.1 Enable log ...................................................................................................................................... 16
4.3.2 Log query terms ............................................................................................................................. 16
4.3.3 Log useragents .............................................................................................................................. 16
4.4 CACHE MANAGEMENT ........................................................................................................................... 17
4.4.1 Memory cache size ........................................................................................................................ 17
4.4.2 Harddisk cache size ....................................................................................................................... 17
4.4.3 Min object size ............................................................................................................................... 17
4.4.4 Max object size .............................................................................................................................. 17
4.4.5 Number of level-1 subdirectories ................................................................................................... 17
4.4.6 Memory replacement policy ........................................................................................................... 18
4.4.7 Cache replacement policy ............................................................................................................. 18
4.4.8 Do not cache these destinations.................................................................................................... 18
4.4.9 Enable offline mode ....................................................................................................................... 19
1 Preface
1.1 Rights and Disclaimers
The information contained within this document may change from one version to the next.
All programs and details contained within this document have been created to the best of the authors
knowledge and tested carefully. However, errors cannot be completely ruled out. Therefore the author does
not express or imply any guarantees for errors within this document or consequent damage arising from the
availability, performance or use of this or related material.
1.2 Trademarks
The use of names in general use, names of firms, trade names, etc. in this document, even without special
notation, does not imply that such names can be considered as “free” in terms of trademark legislation and that
they can be used by anyone. All trade names are used without a guarantee of free usage and might be
registered trademarks. As a general rule, the author adheres to the notation of the manufacturer. Other
products mentioned here could be trademarks of the respective manufacturer.
Microsoft, Windows, FrontPage, Internet Explorer and Active Directory are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries/regions.
Novell, NetWare and eDirectory are either registered trademarks or trademarks of Novell, Inc. in the United
States and other countries.
1.3 Acknowledgements
Thanks to all the translators for doing a great job, especially
2 Introduction
2.1 Overview
The Advanced Proxy Server add-on extends the SmoothWall web proxy service with a lot of versatile, flexible
and useful additional features.
All previous proxy settings will be imported to the Advanced Proxy, but remain untouched for all further
configuration changes.
For educational institutions, the Advanced Proxy will provide the Classroom Extensions, an easy to use
administrative interface for the teaching staff.
All extended options are accessible and configurable within the web based GUI
User authentication
ident authentication
RADIUS authentication
Download throttling
The Supervisor may now turn on and off web access for predefined groups (e.g. specific computers in a
classroom) without the need of having administrative access rights or knowledge to the SmoothWall GUI.
In addition to the known Advanced Proxy features, the CRE offers these features:
Predefined client groups can be turned on or off using a standard web browser
All administrative CRE options are accessible and configurable within the web based SmoothWall GUI
Web Access Management rights can be controlled by password and/or by network address
No administrative privileges to the SmoothWall GUI required for the Web Access Management
The Supervisor can not override any Advanced Proxy based restriction set by the SmoothWall Admin
Flexible configuration
The SmoothWall Admin can define client groups with MAC addresses, single IP addresses, IP ranges,
subnets or even all of them.
Warning: Before you are using this software make sure that this will be in accordance with the national law or
other legal regulations.
Explicit warning: In most countries, the user must agree that personal data will be logged, such as date, time,
source and destination in conjunction with the username. Don‟t use this software in a business environment
without the written agreement of the workers council.
2.5.3 Passwords
Note: If you are using authentication, beware of the fact that passwords will be transmitted in plain text
between your client and the Proxy Server. In addition, when using LDAP, NT or RADIUS authentication, the
passwords may be transmitted in plain text between the Proxy Server and the authentication instance (e.g. the
LDAP Server or the Domain Controller). This behaviour is by design and should not be a serious flaw in a
switched local network environment.
3 Installation
3.1 Installation requirements
There are no special requirements to be met before installing this add-on.
Note: Some other add-ons which are modifying the proxy settings (especially certain filter modules) may not
work after installing this add-on.
Note: Some browsers might change the file extension from .tar.gz to .tar.tar
Step 2: Copy the installation package to your SmoothWall box. For Windows clients, this can be done using
the program WinSCP.
Note: Make sure you are using port 222 instead of port 22 for SCP
Step 3: Log in as root on the console or via SSH. For Windows clients, this can be done using the program
PuTTY.
Note: Make sure you are using port 222 instead of port 22 for SSH
Step 6: Open the SmoothWall web GUI. Now under the Service section you will find the entry “Proxy”
extended to “Advanced Proxy”. Select this entry to open the Advanced Proxy GUI page.
Step 7: Change the configuration settings for your needs and restart the Proxy Server to activate the changed
settings.
This installs the Advanced Proxy add-on including the CRE or enables the CRE for an existing installation.
Note: Make sure you are using port 222 instead of port 22 for SSH
Step 3: Open the SmoothWall web GUI. Under the Service section select the entry “Proxy”.
Step 4: All previous configuration settings are now selected by default. Restart the Proxy Server to activate
the previous configuration.
Note: The Advanced Proxy GUI will not check for updates while the RED interface is inactive.
Note: Once a newer version is detected, the notification window will appear permanently and can‟t be
cancelled except by upgrading to the latest Advanced Proxy version.
After applying official updates, you may experience different kinds of problems:
The menu item for Advanced Proxy disappears after applying an update
Some official updates will replace the file /var/smoothwall/header.pl and reset all menu entries to default.
This can be fixed by re-installing the add-on again. There is no need to uninstall the add-on first, because it
refreshes all necessary menu modifications and keeps the current add-on settings.
It may be possible that some binary files necessary for Advanced Proxy will be replaced.
This can be fixed by re-installing the add-on again. There is no need to uninstall the add-on first, because it
installs all required files again and keeps the current add-on settings.
Note: The ACL file /var/smoothwall/proxy/acl will not be processed by the Advanced Proxy.
Note: If the proxy service is disabled, all client requests will be forwarded directly to the destination address
without passing the proxy service and therefore the requests will bypass all configured ACLs.
Note: Transparent mode works only for destination port 80. All other requests (e.g. port 443 for SSL) will
bypass the Proxy Server.
Note: When using any type of authentication, the Proxy may not run in transparent mode.
Note: To enforce the usage of the Proxy Server in non-transparent mode, you will have to block all outgoing
ports usually used for http traffic (80, 443, 8000, 8080, etc.).
Note: In transparent mode, all client requests for port 80 will automatically redirected to this port.
Note: In non-transparent mode, make sure that your clients are configured to use this port. Otherwise they will
bypass the Proxy Server and all ACLs will be ignored.
Note: When a Visible hostname (see 4.1.4) is defined, the standard design will be used.
Note: If the last proxy in chain doesn‟t strip this field, it will be forwarded to the destination host!
192.168.1.37
This can useful for source based ACLs or logging on remote proxy servers.
Note: If the last proxy in chain doesn‟t strip this field, it will be forwarded to the destination host!
This can useful for user based ACLs or logging on remote proxy servers.
Note: This is for ACL or logging purposes only and doesn‟t work, if the upstream proxy requires a real login.
Note: This forwarding is limited to the username, the password will not be forwarded.
Note: You can enter PASS for the username to forward the users credentials to a parent proxy using basic
HTTP authentication. The username PASS must be entered in upper case:
Note: If you enter a password, the username forwarding (see 4.2.3) will be disabled.
Note: Enabling “Log query terms” may break the privacy of your clients!
This log file option should only be activated for debugging purposes and the result is not shown within the GUI
based log viewer.
Note: This parameter does not specify the maximum process size. It only places a limit on how much
additional RAM the Web Proxy will use as a cache of objects.
Note: Setting the cache size to 0 will turn off the harddisk cache.
Each level-1 directory contains 256 subdirectories, so a value of 256 level-1 directories will use a total of
65536 directories for the harddisk cache. This will significantly slow down the startup process of the proxy
service but can speed up the caching under certain conditions.
Note: The recommended value for level-1 directories is 16. You should increase this value only when it‟s
necessary.
Note: If using the LFUDA replacement policy, the value of Max object size should be increased above its
default of 4096 KB to maximize the potential byte hit rate improvement of LFUDA.
For more information about the GDSF and LFUDA cache replacement policies see
http://www.hpl.hp.com/techreports/1999/HPL-1999-69.html and
http://fog.hpl.external.hp.com/techreports/98/HPL-98-173.html .
Example:
*.advproxy.net
*.google.com
Single hosts
www.advproxy.net
www.google.com
IP addresses
81.169.145.75
74.125.39.103
URLs
www.advproxy.net/download
www.google.com/images
Note: You can enter all of these destination types in any order.
Note: The ports can be defined as a single port number or a range of ports.
You can add other subnets like subnets behind GREEN in larger environments to this list. All subnets not listed
here will be blocked for web access.
Example:
While proxy access is enabled for GREEN and PURPLE, usually all requests will be forwarded to RED. But
when a client from PURPLE wants to access a web server on GREEN, the Proxy Server takes the internal
shortcut between the PURPLE and the GREEN interface, regardless of any firewall rules.
Note: To protect your servers on GREEN, it‟s recommended to enable this option and use Networking /
internal if necessary.
Example:
While proxy access is enabled for GREEN and PURPLE, usually all requests will be forwarded to RED. But
when a client from PURPLE wants to access a web server on GREEN, the Proxy Server takes the internal
shortcut between the PURPLE and the GREEN interface, regardless of any firewall rules.
Note: If enabled, clients on PURPLE can only access web servers on PURPLE or RED.
Time restrictions
Size limits for download requests
Download throttling
Browser check
MIME type filter
Authentication (will be required by default for theses addresses, but can be turned off)
Concurrent logins per user (only available if authentication is enabled)
Time restrictions
Size limits for download requests
Download throttling
Browser check
MIME type filter
Authentication (will be required by default for theses addresses, but can be turned off)
Concurrent logins per user (only available if authentication is enabled)
Using MAC addresses instead of IP addresses can be useful if the DHCP service is enabled without having
fixed leases defined.
00-00-00-00-00-00 or 00:00:00:00:00:00
Note: The Proxy Server can only determine MAC addresses from clients configured for the subnets of the
GREEN, PURPLE or ORANGE interfaces.
Using MAC addresses instead of IP addresses can be useful if the DHCP service is enabled without having
fixed leases defined.
00-00-00-00-00-00 or 00:00:00:00:00:00
Note: The Proxy Server can only determine MAC addresses from clients configured for the subnets of the
GREEN, PURPLE or ORANGE interfaces.
The option “allow” allows web access and the option “deny” blocks web access within the selected time. The
choice of “allow” or “deny” will depend on the time rules you want to apply.
The default is set to allow access every day around the clock.
The values are given in KB. A reason for transfer limits could be that you want to prevent downloading large
files, such as CD images.
The default is set to 0 KB for upload and download. This value turns off any limitation.
Note: These limits refer to each single request. It‟s not the total amount for all requests.
Note: Download throttling works on a per machine basis and not per user
Example:
Note: Selecting one of these options disables throttling for all other types of traffic.
If enabled, the filter checks all incoming headers for their MIME type. If the requested MIME type is listed to be
blocked, the access to this content will be denied. This way you can block content, no matter of the given file
name extension.
Examples:
Add this MIME type if you want to block the download of PDF files:
application/pdf
Add these MIME types if you want to block the download of MPEG and QuickTime video files:
video/mpeg
video/quicktime
Note: The MIME type are processed as regular expressions. This means, the MIME type
javascript
application/x-javascript
text/javascript
Note: MIME type blocking will not be effective for these clients:
Note: Browser based access control will not be effective for these clients:
Adding custom clients could be necessary if you want to allow your AntiVirus software to download updated
definitions. If you don‟t know the useragent of this software, you can enable the useragent logging in the
section “Log settings” and watch the file /var/log/squid/useragent.log
name,display,(regexp)
name is required for internal processing of the Advanced Proxy and should be a short name in alphanumeric
capital letters without spaces.
display is the string which appears in the GUI list and should contain the common name for this client.
(regexp) is a regular expression which matches the browser useragent string and must always be enclosed
with brackets.
4.12 Privacy
This allows the modification of some HTTP header fields to protect your privacy.
With the “Fake useragent” option you have the ability to rewrite this string for all your clients. For outgoing
requests the useragent header field will be changed by the Proxy Server and submitted to external sites
instead of the original useragent string. This can be useful to protect your privacy or to enforce a desired level
of compatibility.
Examples:
The following string will make external servers believe that all your clients are using the Firefox browser:
Even though it‟s possible to enter a free defined string, a useragent like
Examples:
This replaces the source URL with a reference to the Advanced Proxy:
http://xxxxxxxxxxxxxxxxxxxxxxxxxxx
Note: This violates the HTTP standard and may sometimes lead to difficulties. Some websites are blocking
requests with an invalid referer to protect themselves against so called deep links or the abuse by “stealing”
graphics from their website.
The red number between the square brackets indicates the version number of the installed URL filter.
This is an optional configuration item and is only available if the URL filter add-on is installed.
The URL filter add-on integrates in the Advanced Proxy but is not part of the Advanced Proxy package and
must be installed separately.
The red number between the square brackets indicates the version number of the installed Update accelerator.
This is an optional configuration item and is only available if the Update accelerator add-on is installed.
The Update accelerator add-on integrates in the Advanced Proxy but is not part of the Advanced Proxy
package and must be installed separately.
Note: There is no SmoothWall version of the Update accelerator ad-on available yet.
5 Authentication configuration
Note: When using authentication and enabling the web proxy log files, the requesting user name will be logged
in addition to the requested URL. Before enabling log files while using authentication, make sure not to violate
existing laws.
5.1.1 None
Authentication is disabled. Users don‟t need to authenticate when accessing web sites.
Usernames will be used only for logging rather than for authentication
The identd authentication method requires an identd service or daemon running on the client.
LDAP authentication will be useful if you have already a directory service in your network and don‟t want to
maintain additional user accounts and passwords for web access.
Note: The protocol LDAPS (Secure LDAP) is not supported by Advanced Proxy.
Windows NT 4.0 Server or Windows 2000/2003/2008 Server (even with Active Directory enabled)
Advanced Proxy works with Windows integrated authentication (transparent) or with standard authentication
(explicit with username and password).
You can maintain lists with authorized user names (whitelist) or unauthorized user names (blacklist).
Note: Workgroup based authentication may probably work, but is neither recommended nor supported.
You can maintain lists with authorized user names (whitelist) or unauthorized user names (blacklist).
Note: If the user opens a new session, the credentials must always be entered, even if the TTL has not
expired for another session.
Note: This takes no effect if running Local authentication and the user is a member of the Extended group.
A value greater than 0 is only reasonable while using a limit for concurrent IP addresses per user.
Note: Any domains listed here are destination DNS domains and not source Windows NT domains.
Example:
*.advproxy.net
*.google.com
Single hosts
www.advproxy.net
www.google.com
IP addresses
81.169.145.75
74.125.39.103
URLs
www.advproxy.net/download
www.google.com/images
Note: You can enter all of these destination types in any order.
To allow access to Windows Update without authentication add these destinations to the list:
*.download.microsoft.com
*.windowsupdate.com
windowsupdate.microsoft.com
User management
This button opens the local user manager.
Within the user manager page, all available accounts are listed in alphabetically order.
Group definitions
Standard The default for all users. All given restrictions apply to this group.
Extended Use this group for unrestricted users. Members of this group will bypass any time and filter
restrictions.
Disabled Members of this group are blocked. This can be useful if you want to disable an account
temporarily without loosing the password.
The following changes to user accounts will require a restart of the proxy service:
a new user account was added and the user is not a member of the Standard group
the group membership for a certain user has been changed
The following changes to user accounts will not require a restart of the proxy service:
a new user account was added and the user is a member of the Standard group
the password for a certain user has been changed
an existing user account has been deleted
Group
Select the group membership for this user.
Password
Enter the password for the new account.
Password (confirm)
Confirm the previously entered password.
Create user
This button creates a new user account. If this username already exists, the account for this username will be
updated with the new group membership and password.
Note: The username can not be modified. This field is read-only. If you need to rename a user, delete this user
and create a new account.
https://smoothwall-green-ip:441/cgi-bin/chpasswd.cgi
The web page dialog requires the username, the current password and the new password (twice for
confirmation):
In addition to the authentication you can define positive or negative user based access control lists.
For Windows clients, there are several free identd implementations available.
This one works for Windows XP and Vista: http://rndware.info/content/Windows+Ident+Server
Note: The proxy can not run in transparent mode when using mandatory identd authentication.
Ident timeout
Maximum time in seconds for the Proxy to wait for ident lookups to be completed.
Note: Unlisted clients will gain access without authentication, even if the option “Require ident authentication”
is enabled.
Note: Any domains listed here are destination DNS domains and not source Windows NT domains.
Example:
*.advproxy.net
*.google.com
Single hosts
www.advproxy.net
www.google.com
IP addresses
81.169.145.75
74.125.39.103
URLs
www.advproxy.net/download
www.google.com/images
Note: You can enter all of these destination types in any order.
Enabled
Enables access control lists for authorized or unauthorized users.
If you are unsure about your internal directory structure, you can examine your LDAP server using the
command line based ldapsearch tool.
Windows clients can use the free and easy to use Softerra LDAP browser for this:
http://www.ldapbrowser.com
Base DN
This is base where to start the LDAP search. All subsequent Organizational Units (OUs) will be included.
Refer to your LDAP documentation for the required format of the base DN.
cn=users,dc=ads,dc=local
This will search for users in the group users in the domain ads.local
ou=users,o=acme
This will search for users in the Organizational Unit users (and below) in the Organization acme
Note: If the Base DN contains spaces, you must “escape” these spaces using a backslash.
cn=internet\ users,dc=ads,dc=local
LDAP type
You can select between different types of LDAP implementations:
LDAP v2 andv 3
LDAP Server
Enter the IP address of your LDAP Server.
Port
Enter the port your LDAP Server is listening to LDAP requests. The default is 389.
Note: The protocol LDAPS (Secure LDAP, port 636) is not supported by Advanced Proxy.
Bind DN username
Enter the full distinguished name for a Bind DN user.
Note: The Bind DN user must be allowed to browse the directory and read all user attributes.
Note: If the Bind DN username contains spaces, you must “escape” these spaces using a backslash.
Bind DN password
Enter the password for the Bind DN user.
In addition to a correct authentication, a membership within this group will be required for web access.
Note: If the group name contains spaces, you must “escape” these spaces using a backslash.
In addition to the authentication you can define positive or negative user based access control lists.
Domain
Enter the name of the domain you want to use for authentication. If you are running a Windows 2000 or
Windows 2003 Active Directory, you‟ll have to enter the NetBIOS domain name.
PDC hostname
Enter the NetBIOS hostname of the Primary Domain Controller here. If you are running a Windows 2000 or
Windows 2003 Active Directory, you can enter the name of any Domain Controller.
Note: For Windows 2000 and above the Primary Domain Controller is not assigned to a specific server. The
Active Directory PDC emulator is a logical role and can be assigned to any server.
Important: The PDC hostname must be resolvable for the SmoothWall Server. This can be done by adding
the hostname at “Services / Edit Hosts” (recommended) or by editing the file /etc/hosts directly.
If the PDC doesn‟t respond to authentication requests, the authentication process will ask the BDC instead.
Important: The BDC hostname must be resolvable for the SmoothWall Server. This can be done by adding
the hostname at “Services / Edit Hosts” (recommended) or by editing the file /etc/hosts directly.
If integrated authentication is disabled, the user will be requested explicitly for username and password.
Enabled
Enables access control lists for authorized or unauthorized users.
Note: If Windows integrated authentication is enabled, the username must be entered with the domain name
as a prefix for the username, separated by a backslash.
Example for user based access control lists using integrated authentication:
Note: When using integrated authentication, the user must be logged in to the domain, otherwise the name of
the local workstation instead of the domain name will be added to the username.
Example for user based access control lists using explicit authentication:
Note: Explicit authentication grants access to the user, even though the user is not logged in to the domain, as
long as the username will be the same and the local workstation password and the domain password does
match.
In addition to the authentication you can define positive or negative user based access control lists.
RADIUS Server
Enter the IP address of the RADIUS Server you want to use for authentication.
Port
Enter the port that will be used to communicate with the RADIUS Server. The default is port 1812, some
RADIUS servers may use the depreciated port 1645 instead.
Identifier
This is an optional field and can be used to identify your SmoothWall for the RADIUS Server. If this is left
empty, the IP address of your SmoothWall will be used for identification.
Shared secret
This is the shared secret for the authentication of your SmoothWall against the RADIUS Server. This must be
the same password that you have entered at your RADIUS Server.
Enabled
Enables access control lists for authorized or unauthorized users.
6.1.2 Enabled
This enables the Supervisor management interface for the classroom extensions.
Note: After disabling the CRE and restarting the Proxy Server, all groups will be allowed for web access.
Note: For security reasons, either a Supervisor password or Supervisor IP addresses should be defined.
This can be used to increase security or to simplify management if you don't want to configure a Supervisor
password.
Note: All machines not listed here will get the management interface in view-only mode.
Note: If the client IP address is not listed here, the web access management interface will appear in a view-
only mode.
Note: If the client IP address is not listed here, the web access management interface will appear in a view-
only mode.
[groupname]
client MAC address or client IP address or IP range or IP subnet
client MAC address or client IP address or IP range or IP subnet
client MAC address or client IP address or IP range or IP subnet
Example:
Group label
A label is a group name in included in square brackets. All clients listed below this label belong to this group.
Group name
A group name is the name that will be shown in the web access management interface. The group name is the
part of a label between the square brackets.
Note: A group name may contain square brackets, but must be included in a pair of additional square brackets
for the group label.
The classroom group definitions may have an unlimited number of group labels.
Examples:
Host range
192.168.1.11-192.168.1.19
Depending on the selected error messages design, the destination path may vary:
/usr/local/squid/advproxy/errors.swe/language/
/usr/local/squid/advproxy/errors/language/
Note: Replace language with the language you have selected at the Advanced Proxy GUI:
Example: /usr/local/squid/advproxy/errors.swe/English/ERR_ACCESS_DISABLED
Note: This file is already included in the Advanced Proxy installation archive but not installed by default.
https://192.168.1.1:445/cgi-bin/webaccess.cgi
The access can be controlled by clicking the button belonging to the target group.
By default, there are no restrictions and the access can be managed from all clients.
If the Admin has set a password at the Advanced Proxy GUI, the management will be the same as described
in chapter 7.3.1.
Client access: Disabling the proxy service gives direct access for all clients.
Result: The proxy service will never be used. Logging, filtering and authentication will not be available.
Client access: All clients without explicit proxy configuration will bypass the proxy service.
Client access: All clients configured for proxy usage will use the proxy for all destination ports (80, 443, 8080,
etc.) and even for browser based FTP access.
Result: It depends on the client configuration whether the proxy service will be used or not. Unconfigured
clients will bypass logging, filtering and authentication.
Client access: All requests with destination port 80 will be internally redirected to the proxy service. Requests
with other destination ports (e.g. 443 for https) will bypass the proxy service.
Result: Not all but most requests will pass the proxy service. Therefore filtering, logging and authentication will
not be reliable.
Complex implementation
Require custom proxy.pac or wpad.dat files
Flexible configuration
Most browsers support this configuration method
Complex implementation
Only reasonable for medium to large environments
Requires a centralized network management system (Active Directory, ZENworks, etc.)
Flexible and mandatory configuration
Works only for Win32 clients and certain browser types
Note: This will be the only way to prevent bypassing the proxy service for unauthorized access.
The following example drops all direct access from inside to the destination ports 80 and 443 outside.
/sbin/iptables -F
/sbin/iptables -X
# IP blocker
/sbin/iptables -N ipblock
/sbin/iptables -A INPUT -i ppp0 -j ipblock
/sbin/iptables -A INPUT -i ippp0 -j ipblock
Note: Replace ppp0 with the name of your RED interface if ppp0 is not your RED interface.
Note: The recommended ports to be blocked for web access are: 80,81,443,3128,6588,8000,8080,8181
Note: Adding port 21 (FTP) forces web browser based FTP clients to pass the proxy but prevents most native
FTP clients from establishing connections with external FTP hosts.
The client must be configured to use the proxy service. See chapter 8.2
These settings enables client IP address and username forwarding from Advanced Proxy to DansGuardian.
DansGuardian settings:
Privoxy settings:
# 4.1. listen-address
# ===================
#
listen-address 127.0.0.1:8118
# 5.1. forward
# ============
#
forward / .
Note: The syntax for forwarding is forward <slash> <dot> to forward all requests to it‟s external destination.
#############################################################################
# Defaults
#############################################################################
{ \
..
+hide-forwarded-for-headers \
..
}
/ # Match all URLs
Right click on the domain and select New > User from the menu.
Enter the name for the Bind DN user. Make sure that the username does not contain spaces or special
characters.
Enter the password for the Bind DN user and select the options User cannot change password and Password
never expires. Make sure that the option User must change password at next logon is unchecked.
Complete the Wizard to create the Bind DN user. The Active Directory username will be
ldapbind@ads.local
cn=ldapbind,dc=ads,dc=local
This account will be used to bind the Advanced Proxy to the LDAP server. This is necessary because Active
Directory doesn't allow anonymous browsing.
Right click the domain and select Delegate Control from the menu.
Start the Control Delegation Wizard and select the ldapbind user account.
Open the Advanced Proxy GUI page, select LDAP from the section Authentication method and hit Save.
Note: If you are configuring LDAP authentication for the first time, Advanced Proxy may complain about the
missing LDAP Base DN.
Now enter the following LDAP settings into the Advanced Proxy GUI:
Save the settings and restart the Advanced Proxy by clicking the Save and restart button. Congratulations,
LDAP authentication is working now ...
Right click on the Users folder and select New > Group from the menu.
Note: It's possible to add users from different Organizational Units to this group.
Open the Advanced Proxy GUI page, select LDAP from the section Authentication method and hit Save.
Note: If you are configuring LDAP authentication for the first time, Advanced Proxy may complain about the
missing LDAP Base DN.
Now enter the following LDAP settings into the Advanced Proxy GUI:
Save the settings and restart the Advanced Proxy by clicking the Save and restart button. From now on, only
members of the given group will be able to access the proxy ...