Summary
We have learned about the basics of interception caching in this chapter. We have also learned how the requests flow and packets are diverted to our Squid server so that Squid can fetch content on behalf of clients, without explicitly configuring all the clients on our network.
Specifically, we have covered:
Interception caching and how it works.
Different ways in which to implement interception caching.
Advantages and drawbacks of interception caching.
Configuring our operating systems to forward IP packets.
Configuring IP filtering tools for our operating systems to redirect web traffic to the Squid server.
Various compile options that can be used to implement interception caching on different operating systems.
In the next chapter, we'll learn about writing Squid plugins or helpers to customize Squid's behavior.