Chapter 4. Getting Started with Squid's Powerful ACLs and Access Rules
In the previous chapters, we learned about installing, configuring, and running Squid in different modes. We also learned the basics of protecting our Squid proxy server from unauthorized access, and granting or revoking access based on different criteria. We previously had a brief overview of Access Control Lists in Chapter 2, Configuring Squid. However, in this chapter, we are going to explore Access Control Lists in detail. We'll also construct rules for a few example scenarios.
In this chapter, we will learn about:
Various types of ACL lists
Types of access rules
Mixing ACL lists and access list rules to achieve complex access rules
Testing access rules with
squidclient
Once we have a Squid proxy server up and running, we can define rules for allowing or denying access to different people or to control the usage of resources. It is also possible to define lower and upper limits on the usage of different resources. Access...