Objective:
Build a single network card Linux gateway (transparent proxy), the gateway dial into an overseas VPN server, the client set the gateway, the network exit for the overseas VPN server, to achieve accelerated access to some Web sites.
Environmental information:
Hardware: One Dell Machine, single NIC (ip:10.39.100.253);
Machine Name: VPNGW
Operating system: CentOS 6.0 Kernel Linux 2.6.32-71.el6.
Linux Proxy Server-squid positive proxy experiment, squid positive
1. Introduction to the proxy server squid
Squid cache (Squid for short) is a popular free software (GNU General Public License) proxy server and Web cache Server. Squid
Squid optimization full manual (1)
Summary
This article focuses on optimizing squid performance without changing hardware conditions (12:31:57)
By ideal
I. Overview
Squid is an excellent open source proxy server software that can run on multiple system platforms. However, it has obvious disadvantages compared with other commercial products, that is, its
;
Add the start dialing command to the/etc/rc. d/rc. local file:
650) this. width = 650; "src =" http://upload.server110.com/image/20130913/232Q253T-0.jpg "/>
After the router is started, check that the vpn channel device is used.
650) this. width = 650; "src =" http://upload.server110.com/image/20130913/232Q21R4-1.jpg "/>
solution will not be guaranteed.
Solution 2: wired
The cable solution can only deploy single-mode optical fiber cables at a distance of 12 kilometers, which is more time-consuming and costly. You can say you don't have to think about it.
Solution 3: Internet + VPN
The Internet can be said to be a public wide area network, and many telecom operators have established a four-way and eight-way long-distance network, which makes it possible for our compan
Proxy server is the function of network users to obtain network information, it is a transit point for network information. With the widespread use of proxy servers, a series of security issues followed. Because there is no comprehensive and meticulous configuration of the access control policy of proxy server, the user can access many pornographic and reactionary illegal sites through proxy server at will, and these behaviors are often difficult to trace, which brings great inconvenience to the
Use squid to prohibit access/only allow access to the specified URL, squid is prohibited
Install squid
Yum install squid-y
Back up squid. conf
Cp squid. conf squid. conf-list
Vi
Chapter 4 test and run SQUID
1. Preparations
To test whether SQUID is normal, you must first resolve the domain name www.naizhao.com to the IP address 2.2.2.2. As in the previous chapter, if you are a Netcom user and do not need to perform any operations, DNSPod will return the IP address 2.2.2.2 to you. If you are a telecom user or the resolved IP address is not 2.2.2.2, you must modify the hosts table of
Chapter 2 Preparations for installing Squid
Starting from this chapter, you will learn how to install and compile programs under Linux, the optimization methods of program compilation, and the installation of Squid through source code compilation.
1. Basic program installation knowledge in Linux
A. Classification of program installation packagesIn normal times, you usually run the installation program in Wi
Build and configure squid Proxy Server and squid Proxy Server
System Environment: CentOS release 6.5 (Final) (minimal installation)
1. Install squid
# Yum-y install squid
2. Edit the configuration file (Forward proxy)
# Vim/etc/squid. conf
Add the following content:
Cache_di
Rd and RT (mpls vpn bgp)
Rd (route-distinguisher) is used to identify different VPN instances on the PE device. Its main function is to achieve address multiplexing between VPN instances. It and the IP address constitute a 12byte vpnv4 address space, rd and the route are carried together in the bgp update message and published to the peer end. On the one hand, we
5th Chapter Installation Squid Preparation from this chapter, you will learn how to install under Linux, compile the program, but also learn how to compile the program optimization methods, and finally through the source code compiled way to install squid. 1.Linux The basic knowledge of the installation of the program A. Classification of program installation packages Usually you install the program
This article compares the IPSec VPN and ssl vpn technologies in detail, so that users from all walks of life can better understand the VPN technology and select the appropriate VPN product.
Another VPN implementation technology different from the traditional
For squid rejection, but the user's ip address is Internet, why is it not that only Intranet users can access squid?-Linux Enterprise Application-Linux server application information. The following is a detailed description. Squid User Access Report
Period: 2011Apr28-2011Apr28
DENIED
USERIDIP/NAMEDATE/TIMEACCESSED SITE
109.230.221.24109.230.221.2404/28/2011-1
From: http://bbs.chinaunix.net/viewthread.php? Tid = 586242
Preface:I have maintained several squid servers at work. I have read Duane Wessels (he is also the founder of squid) for many times. His original title is "Squid: the definitive guide ", published by o'reilly. I have translated it into Chinese in my spare time, hoping to help Chinese
Squid-usage in Linux
From: http://www.topcmm.com/(17:04:00)
As the most popular operating system, Linux has become increasingly popular. Although Linux software is not rich yet,It is too early to replace windows as an ordinary PC operating system. However, in the server field, Linux is always stable and operable.And has excellent software support. Squid is one of them. Linux and
From: http://bbs.chinaunix.net/viewthread.php? Tid = 575138
Preface:I have maintained several squid servers at work. I have read Duane Wessels (he is also the founder of squid) for many times. His original title is "Squid: the definitive guide ", published by o'reilly. I have translated it into Chinese in my spare time, hoping to help Chinese
Squid is an application-level proxy. After the client host and server host are connected over the network, you must set the client software before using Squid, for example, set the proxy server address and port for Internet Explorer.The WEB Cache function is necessary for a large and busy network. An article on the IBM website details the benefits of WEB Cache for Internet users:Http://www-900.ibm.com/devel
Article Title: detailed explanation of the use of the proxy server Squid. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
As the most popular operating system, Linux has become increasingly popular. Although Linux software is not rich yet, it is too early to replace WINDOWS as an ordinary PC operating system, but i
What does a VPN mean?
The English full name of the VPN is "virtual private network", translation come Over is "the fictitious specialized network". As the name suggests, virtual private network we can understand him as a virtual enterprise internal line.----
This VPN's English full name is "Virtual private network", translates is "The fictitious private network". As the name suggests, Virtual Private Netw
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.