|
|
|
|
| LEADER |
16371cam a2200577 a 4500 |
| 001 |
c000406659 |
| 003 |
CARM |
| 005 |
20200922143007.0 |
| 008 |
200922s2011 enka 001 0 eng d |
| 019 |
1 |
|
|a 47176628
|z 48768384
|5 LACONCORD2021
|
| 020 |
|
|
|a 1849513902 (pbk.)
|
| 020 |
|
|
|a 9781849513906 (pbk.)
|
| 020 |
|
|
|a 9781849513913 (electronic bk.)
|
| 020 |
|
|
|a 1849513910 (electronic bk.)
|
| 035 |
|
|
|a (OCoLC)712777365
|5 LACONCORD2021
|
| 040 |
|
|
|a YDXCP
|c YDXCP
|d OCoLC
|d VVUT
|
| 082 |
0 |
4 |
|a 005.2768
|2 22
|
| 100 |
1 |
|
|a Saini, Kulbir.
|
| 245 |
1 |
0 |
|a Squid Proxy Server 3.1 beginner's guide :
|b improve the performance of your network using the caching and access control capabilities of Squid /
|c Kulbir Saini.
|
| 246 |
1 |
8 |
|a Squid Proxy Server 3.1 beginner's guide
|
| 260 |
|
|
|a Birmingham :
|b Packt Pub.,
|c 2011.
|
| 300 |
|
|
|a xi, 308 p. :
|b ill. ;
|c 24 cm.
|
| 500 |
|
|
|a "Professional expertise distilled".
|
| 500 |
|
|
|a "Learn by doing: less theory, more results"--Cover.
|
| 500 |
|
|
|a Includes index.
|
| 505 |
0 |
|
|a 1. Getting Started with Squid. Proxy server -- Reverse proxy -- Getting Squid -- Time for action - identifying the right version. Methods of obtaining Squid. Using source archives -- Time for action - downloading Squid. Obtaining the latest source code from Bazaar VCS -- Time for action - using Bazaar to obtain source code. Using binary packages -- Installing Squid. Installing Squid from source code. Compiling Squid -- Uncompressing the source archive -- Configure or system check -- Time for action - running the configure command -- Time for action - compiling the source -- Time for action - installing Squid -- Time for action - exploring Squid files. Installing Squid from binary packages. Fedora, CentOS or Red Hat -- Debian or Ubuntu -- FreeBSD -- OpenBSD or NetBSD -- Dragonfly BSD -- Gentoo -- Arch Linux -- Summary -- 2. Configuring Squid. Quick start -- Syntax of the configuration file. Types of directives --
|
| 505 |
0 |
|
|a Contents note continued: HTTP port -- Time for action - setting the HTTP port -- Access control lists -- Time for action - constructing simple ACLs -- Controlling access to the proxy server. HTTP access control -- Time for action - combining ACLs and HTTP access. HTTP reply access -- ICP access -- HTCP access -- HTCP CLR access -- Miss access -- Ident lookup access -- Cache peers or neighbors. Declaring cache peers -- Time for action - adding a cache peer. Quickly restricting access to domains using peers -- Advanced control on access using peers -- Caching web documents. Using main memory (RAM) for caching. In-transit objects or current requests -- Hot or popular objects -- Negatively cached objects -- Specifying cache space in RAM -- Time for action - specifying space for memory caching. Maximum object size in memory -- Memory cache mode -- Using hard disks for caching. Specifying the storage space -- Time for action - creating a cache directory. Configuring the number of sub directories --
|
| 505 |
0 |
|
|a Contents note continued: Time for action - adding a cache directory. Cache directory selection -- Cache object size limits -- Setting limits on object replacement -- Cache replacement policies. Least recently used (LRU) -- Greedy dual size frequency (GDSF) -- Least frequently used with dynamic aging (LFUDA) -- Tuning Squid for enhanced caching. Selective caching -- Time for action - preventing the caching of local content. Refresh patterns for cached objects -- Time for action - calculating the freshness of cached objects. Options for refresh pattern -- Aborting the partial retrievals -- Caching the failed requests -- Playing around with HTTP headers. Controlling HTTP headers in requests -- Controlling HTTP headers in responses -- Replacing the contents of HTTP headers -- DNS server configuration. Specifying the DNS program path -- Controlling the number of DNS client processes -- Setting the DNS name servers -- Time for action - adding DNS name servers. Setting the hosts file --
|
| 505 |
0 |
|
|a Contents note continued: Default domain name for requests -- Timeout for DNS queries -- Caching the DNS responses -- Setting the size of the DNS cache -- Logging. Log formats -- Log file rotation or log file backups -- Log access -- Buffered logs -- Strip query terms -- URL rewriters and redirectors -- Other configuration directives. Setting the effective user for running Squid -- Configuring hostnames for the proxy server. Hostname visible to everyone -- Unique hostname for the server -- Controlling the request forwarding. Always direct -- Never direct -- Hierarchy stoplist -- Broken posts -- TCP outgoing address -- PID filename -- Client netmask -- Summary -- 3. Running Squid. Command line options. Getting a list of available options -- Time for action - listing the options. Getting information about our Squid installation -- Time for action - finding out the Squid version. Creating cache or swap directories --
|
| 505 |
0 |
|
|a Contents note continued: Time for action - creating cache directories. Using a different configuration file -- Getting verbose output -- Time for action - debugging output in the console. Full debugging output on the terminal -- Running as a normal process -- Parsing the Squid configuration file for errors or warnings -- Time for action - testing our configuration file. Sending various signals to a running Squid process. Reloading a new configuration file in a running process -- Shutting down the Squid process -- Interrupting or killing a running Squid process -- Checking the status of a running Squid process -- Sending a running process in to debug mode -- Rotating the log files -- Forcing the storage metadata to rebuild -- Double checking swap during rebuild -- Automatically starting Squid at system startup. Adding Squid command to /etc/rc.local file -- Adding init script -- Time for action - adding the init script -- Summary --
|
| 505 |
0 |
|
|a Contents note continued: 4. Getting Started with Squid's Powerful ACLs and Access Rules. Access control lists. Fast and slow ACL types -- Source and destination IP address -- Time for action - constructing ACL lists using IP addresses -- Time for action - using a range of IP addresses to build ACL lists. Source and destination domain names -- Time for action - constructing ACL lists using domain names. Destination port -- Time for action - building ACL lists using destination ports. HTTP methods -- Identifying requests using the request protocol -- Time for action - using a request protocol to construct access rules. Time-based ACLs -- URL and URL path-based identification -- Matching client usernames -- Proxy authentication -- Time for action - enforcing proxy authentication. User limits -- Identification based on various HTTP headers -- HTTP reply status -- Identifying random requests -- Access list rules. Access to HTTP protocol -- Access to other ports -- Enforcing limited access to neighbors --
|
| 505 |
0 |
|
|a Contents note continued: Time for action - denying miss_access to neighbors. Requesting neighbor proxy servers -- Forwarding requests to remote servers -- Ident lookup access -- Controlled caching of web documents -- URL rewrite access -- HTTP header access -- Custom error pages -- Maximum size of the reply body -- Logging requests selectively -- Mixing ACL lists and rules - example scenarios. Handling caching of local content -- Time for action - avoiding caching of local content. Denying access from external networks -- Denying access to selective clients -- Blocking the download of video content -- Time for action - blocking video content. Special access for certain clients -- Time for action - writing rules for special access. Limited access during working hours -- Allowing some clients to connect to special ports -- Testing access control with squidclient --
|
| 505 |
0 |
|
|a Contents note continued: Time for action - testing our access control example with squidclient -- Time for action - testing a complex access control -- Summary -- 5. Understanding Log Files and Log Formats. Log messages -- Cache log or debug log -- Time for action - understanding the cache log -- Access log. Understanding the access log -- Time for action - understanding the access log messages. Access log syntax -- Time for action - analyzing a syntax to specify access log. Log format -- Time for action - learning log format and format codes. Log formats provided by Squid -- Time for action - customizing the access log with a new log format -- Selective logging of requests -- Time for action - using access_log to control logging of requests -- Referer log -- Time for action - enabling the referer log -- Time for action - translating the referer logs to a human-readable format -- User agent log -- Time for action - enabling user agent logging --
|
| 505 |
0 |
|
|a Contents note continued: Emulating HTTP server-like logs -- Time for action - enabling HTTP server log emulation -- Log file rotation -- Other log related features. Cache store log -- Summary -- 6. Managing Squid and Monitoring Traffic. Cache manager. Installing the Apache Web server -- Time for action - installing Apache Web server. Configuring Apache for providing the cache manager web interface -- Time for action - configuring Apache to use cachemgr.cgi. Accessing the cache manager web interface. Configuring Squid -- Log in to cache manger -- General Runtime Information -- IP Cache Stats and Contents -- FQDN Cache Statistics -- HTTP Header Statistics -- Traffic and Resource Counters -- Request Forwarding Statistics -- Cache Client List -- Memory Utilization -- Internal DNS Statistics -- Log file analyzers. Calamaris. Installing Calamaris -- Time for action - installing Calamaris. Using Calamaris to generate statistics -- Time for action - generating stats in plain text format --
|
| 505 |
0 |
|
|a Contents note continued: Time for action - generating graphical reports with Calamaris -- Summary -- 7. Protecting your Squid Proxy Server with Authentication. HTTP authentication -- Basic authentication -- Time for action - exploring Basic authentication. Database authentication. Configuring database authentication -- NCSA authentication -- Time for action - configuring NCSA authentication. NIS authentication -- LDAP authentication -- SMB authentication -- PAM authentication -- Time for action - configuring PAM service -- MSNT authentication -- Time for action - configuring MSNT authentication. MSNT multi domain authentication -- SASL authentication -- Time for action - configuring Squid to use SASL authentication. Getpwnam Authentication -- POP3 authentication -- RADIUS authentication -- Time for action - configuring RADIUS authentication. Fake Basic authentication -- Digest authentication -- Time for action - configuring Digest authentication. File authentication --
|
| 505 |
0 |
|
|a Contents note continued: LDAP authentication -- Edirectory Authentication -- Microsoft NTLM authentication. Samba's NTLM authentication -- Fake NTLM authentication -- Negotiate authentication -- Time for action - configuring Negotiate authentication -- Using multiple authentication schemes -- Writing a custom authentication helper -- Time for action - writing a helper program -- Making non-concurrent helpers concurrent -- Common issues with authentication -- Summary -- 8. Building a Hierarchy of Squid Caches. Cache hierarchies -- Reasons to use hierarchical caching -- Problems with hierarchical caching -- Joining a cache hierarchy -- Time for action - joining a cache hierarchy. ICP options -- HTCP options -- Peer or neighbor selection. Options for peer selection methods -- Other cache peer options -- Controlling communication with peers. Domain-based forwarding --
|
| 505 |
0 |
|
|a Contents note continued: Time for action - configuring Squid for domain-based forwarding. Cache peer access -- Time for action - forwarding requests to cache peers using ACLs. Switching peer relationship -- Time for action - configuring Squid to switch peer relationship. Controlling request redirects -- Peer communication protocols. Internet Cache Protocol -- Cache digests. Squid and cache digest configuration -- Hypertext Caching Protocol -- Summary -- 9. Squid in Reverse Proxy Mode. What is reverse proxy mode? Exploring reverse proxy mode -- Configuring Squid as a server surrogate -- HTTP port. HTTP options in reverse proxy mode -- HTTPS port. HTTPS options in reverse proxy mode -- Adding backend web servers. Cache peer options for reverse proxy mode -- Time for action - adding backend web servers. Support for surrogate protocol. Understanding the surrogate protocol -- Configuration options for surrogate support -- Support for ESI protocol. Configuring Squid for ESI support --
|
| 505 |
0 |
|
|a Contents note continued: Logging messages in web server log format. Ignoring the browser reloads -- Time for action - configuring Squid to ignore the browser reloads -- Access controls in reverse proxy mode. Squid in only reverse proxy mode -- Squid in reverse proxy and forward proxy mode -- Example configurations -- Web server and Squid server on the same machine -- Accelerating multiple backend web servers hosting one website -- Accelerating multiple web servers hosting multiple websites -- Summary -- 10. Squid in Intercept Mode. Interception caching -- Time for action - understanding interception caching -- Advantages of interception caching -- Problems with interception caching -- Diverting HTTP traffic to Squid. Using a router's policy routing to divert requests -- Using rule-based switching to divert requests -- Using Squid server as a bridge -- Using WCCP tunnel -- Implementing interception caching -- Configuring the network devices --
|
| 505 |
0 |
|
|a Contents note continued: Configuring the operating system -- Time for action - enabling IP forwarding -- Time for action - redirecting HTTP traffic to Squid. Configuring Squid -- Configuring HTTP port -- Summary -- 11. Writing URL Redirectors and Rewriters. URL redirectors and rewriters. Understanding URL redirectors. HTTP status codes for redirection -- Understanding URL rewriters -- Issues with URL rewriters -- Squid, URL redirectors, and rewriters. Communication interface -- Time for action - exploring the message flow between Squid and redirectors -- Time for action - writing a simple URL redirector program. Concurrency -- Handling whitespace in URLs. Using the uri_whitespace directive -- Making redirector programs intelligent -- Writing our own URL redirector program -- Time for action - writing our own template for a URL redirector -- Configuring Squid. Specifying the URL redirector program -- Controlling redirector children --
|
| 505 |
0 |
|
|a Contents note continued: Controlling requests passed to the redirector program -- Bypassing URL redirector programs when under heavy load -- Rewriting the Host HTTP header -- A special URL redirector - deny_info -- Popular URL redirectors. SquidGuard -- Squirm -- Ad Zapper -- Summary -- 12. Troubleshooting Squid. Some common issues. Cannot write to log files -- Time for action - changing the ownership of log files. Could not determine hostname -- Cannot create swap directories -- Time for action - fixing cache directory permissions. Failed verification of swap directories -- Time for action - creating swap directories. Address already in use -- Time for action - finding the program listening on a specific port. URLs with underscore results in an invalid URL. Enforce hostname checks -- Allow underscore -- Squid becomes slow over time -- The request or reply is too large -- Access denied on the proxy server -- Connection refused when reaching a sibling proxy server --
|
| 505 |
0 |
|
|a Contents note continued: Debugging problems -- Time for action - debugging HTTP requests -- Time for action - debugging access control. Getting help online and reporting bugs -- Summary.
|
| 630 |
0 |
0 |
|a Squid
|
| 650 |
|
0 |
|a Client/server computing.
|
| 650 |
|
0 |
|a Cache memory.
|
| 650 |
|
0 |
|a Web servers.
|
| 852 |
8 |
|
|b CARM
|i F11015
|p 0656562
|f BK
|
| 852 |
8 |
|
|b SCAN
|h A3:AJ37B0
|i F11015
|p 0656562
|f BK
|
| 852 |
8 |
|
|b SCAN
|h A3:AJ37B0
|i F11015
|p 0656562
|f BK
|
| 999 |
f |
f |
|i 398ebe7e-ecad-584d-a2a7-bfa742a3a192
|s 8ae92428-df5b-526a-abca-1a47305f9f5d
|
| 952 |
f |
f |
|p Can circulate
|a CAVAL
|b CAVAL
|c CAVAL
|d CARM 1 Store
|e F11015
|h Other scheme
|i book
|m 0656562
|
| 952 |
f |
f |
|a CAVAL
|b CAVAL
|c CAVAL
|d Unmapped Location
|e F11015
|f A3:AJ37B0
|h Other scheme
|