Thanks for the DocBook XML documentation guide: Fedora-docs Project
Copyright © 2004 Suretec Systems Limited, Gavin Henry
|Spelling mistake corrections. Thanks to Charles Curley.|
|Article's initial release for general review.|
The goal of any Network Engineer or System Administrator is to provide maximum security with maximum functionality. It's no use allowing everyone full internet access without monitoring and content filtering in place, which could possibly breach your IT policy. This is where a secure proxy server comes in.
A proxy server is a must when monitoring, content filtering and security are required, as it allows only one point of entry/exit for internet access. This is where Squid comes in. Squid is a very versatile and configurable proxy server with numerous features, not to mention password authentication and plugin capabilities.
This guide will take any level of user through the necessary steps in setting up a proxy server (squid) with password authentication and content filtering (with a plugin package called squidGuard) and logfile monitoring with email notification, which is handled with a program called swatch.
Extra chapters are included covering: