Setting up a Secure Proxy Server using Various Technologies

For General Review

Gavin Henry

Thanks for the DocBook XML documentation guide: Fedora-docs Project

2004-02-27

Revision History
Revision 0.22004-02-27
Spelling mistake corrections. Thanks to Charles Curley.
Revision 0.12003-11-08
Article's initial release for general review.

Abstract

The goal of any Network Engineer or System Administrator is to provide maximum security with maximum functionality. It's no use allowing everyone full internet access without monitoring and content filtering in place, which could possibly breach your IT policy. This is where a secure proxy server comes in.


1. Introduction
2. Packages required
3. Squid installation and configuration
4. squid.conf
5. Password file
6. Installing and configuring SquidGuard
7. Installation
8. SquidGuard Configuration
9. Swatch installation and configuration
10. Swatch installation
11. Swatch Configuration
12. Improvements
13. Troubleshooting

1. Introduction

A proxy server is a must when monitoring, content filtering and security are required, as it allows only one point of entry/exit for internet access. This is where Squid comes in. Squid is a very versatile and configurable proxy server with numerous features, not to mention password authentication and plugin capabilities.

This guide will take any level of user through the necessary steps in setting up a proxy server (squid) with password authentication and content filtering (with a plugin package called squidGuard) and logfile monitoring with email notification, which is handled with a program called swatch.

Extra chapters are included covering:

  • Improvements

  • Troubleshooting