Summary
We have learned a lot about access control lists and access list rules in this chapter. We had a detailed look at the various types of ACL and how to construct ACL lists for different scenarios. We took examples describing a general situation in which we needed to use a mixture of ACL types and rules to achieve the desired access control.
Specifically, we covered:
Different types of ACL which can identify individual requests and replies.
Different types of access list rules which can be used to control access to various components of the Squid proxy server.
Achieving desired access control by mixing various ACL types with access rules.
Testing our new Squid configuration with the
squidclient
before actually using it in a production environment.
We also discussed some example scenarios which can serve as the base configuration for various organizations.
Now that we have learned about compiling, installing, configuring, and running Squid, we can try to deploy Squid on some test machines and...