Squid Proxy Server 3.1 beginner's guide : improve the performance of your network using the caching and access control capabilities of Squid /

Enregistré dans:
Détails bibliographiques
Auteur principal: Saini, Kulbir
Format: Livre
Langue:English
Publié: Birmingham : Packt Pub., 2011.
Sujets:
LEADER 16371cam a2200577 a 4500
001 c000406659
003 CARM
005 20200922143007.0
008 200922s2011 enka 001 0 eng d
019 1 |a 47176628  |z 48768384  |5 LACONCORD2021 
020 |a 1849513902 (pbk.) 
020 |a 9781849513906 (pbk.) 
020 |a 9781849513913 (electronic bk.) 
020 |a 1849513910 (electronic bk.) 
035 |a (OCoLC)712777365  |5 LACONCORD2021 
040 |a YDXCP  |c YDXCP  |d OCoLC  |d VVUT 
082 0 4 |a 005.2768  |2 22 
100 1 |a Saini, Kulbir. 
245 1 0 |a Squid Proxy Server 3.1 beginner's guide :  |b improve the performance of your network using the caching and access control capabilities of Squid /  |c Kulbir Saini. 
246 1 8 |a Squid Proxy Server 3.1 beginner's guide 
260 |a Birmingham :  |b Packt Pub.,  |c 2011. 
300 |a xi, 308 p. :  |b ill. ;  |c 24 cm. 
500 |a "Professional expertise distilled". 
500 |a "Learn by doing: less theory, more results"--Cover. 
500 |a Includes index. 
505 0 |a 1. Getting Started with Squid. Proxy server -- Reverse proxy -- Getting Squid -- Time for action - identifying the right version. Methods of obtaining Squid. Using source archives -- Time for action - downloading Squid. Obtaining the latest source code from Bazaar VCS -- Time for action - using Bazaar to obtain source code. Using binary packages -- Installing Squid. Installing Squid from source code. Compiling Squid -- Uncompressing the source archive -- Configure or system check -- Time for action - running the configure command -- Time for action - compiling the source -- Time for action - installing Squid -- Time for action - exploring Squid files. Installing Squid from binary packages. Fedora, CentOS or Red Hat -- Debian or Ubuntu -- FreeBSD -- OpenBSD or NetBSD -- Dragonfly BSD -- Gentoo -- Arch Linux -- Summary -- 2. Configuring Squid. Quick start -- Syntax of the configuration file. Types of directives -- 
505 0 |a Contents note continued: HTTP port -- Time for action - setting the HTTP port -- Access control lists -- Time for action - constructing simple ACLs -- Controlling access to the proxy server. HTTP access control -- Time for action - combining ACLs and HTTP access. HTTP reply access -- ICP access -- HTCP access -- HTCP CLR access -- Miss access -- Ident lookup access -- Cache peers or neighbors. Declaring cache peers -- Time for action - adding a cache peer. Quickly restricting access to domains using peers -- Advanced control on access using peers -- Caching web documents. Using main memory (RAM) for caching. In-transit objects or current requests -- Hot or popular objects -- Negatively cached objects -- Specifying cache space in RAM -- Time for action - specifying space for memory caching. Maximum object size in memory -- Memory cache mode -- Using hard disks for caching. Specifying the storage space -- Time for action - creating a cache directory. Configuring the number of sub directories -- 
505 0 |a Contents note continued: Time for action - adding a cache directory. Cache directory selection -- Cache object size limits -- Setting limits on object replacement -- Cache replacement policies. Least recently used (LRU) -- Greedy dual size frequency (GDSF) -- Least frequently used with dynamic aging (LFUDA) -- Tuning Squid for enhanced caching. Selective caching -- Time for action - preventing the caching of local content. Refresh patterns for cached objects -- Time for action - calculating the freshness of cached objects. Options for refresh pattern -- Aborting the partial retrievals -- Caching the failed requests -- Playing around with HTTP headers. Controlling HTTP headers in requests -- Controlling HTTP headers in responses -- Replacing the contents of HTTP headers -- DNS server configuration. Specifying the DNS program path -- Controlling the number of DNS client processes -- Setting the DNS name servers -- Time for action - adding DNS name servers. Setting the hosts file -- 
505 0 |a Contents note continued: Default domain name for requests -- Timeout for DNS queries -- Caching the DNS responses -- Setting the size of the DNS cache -- Logging. Log formats -- Log file rotation or log file backups -- Log access -- Buffered logs -- Strip query terms -- URL rewriters and redirectors -- Other configuration directives. Setting the effective user for running Squid -- Configuring hostnames for the proxy server. Hostname visible to everyone -- Unique hostname for the server -- Controlling the request forwarding. Always direct -- Never direct -- Hierarchy stoplist -- Broken posts -- TCP outgoing address -- PID filename -- Client netmask -- Summary -- 3. Running Squid. Command line options. Getting a list of available options -- Time for action - listing the options. Getting information about our Squid installation -- Time for action - finding out the Squid version. Creating cache or swap directories -- 
505 0 |a Contents note continued: Time for action - creating cache directories. Using a different configuration file -- Getting verbose output -- Time for action - debugging output in the console. Full debugging output on the terminal -- Running as a normal process -- Parsing the Squid configuration file for errors or warnings -- Time for action - testing our configuration file. Sending various signals to a running Squid process. Reloading a new configuration file in a running process -- Shutting down the Squid process -- Interrupting or killing a running Squid process -- Checking the status of a running Squid process -- Sending a running process in to debug mode -- Rotating the log files -- Forcing the storage metadata to rebuild -- Double checking swap during rebuild -- Automatically starting Squid at system startup. Adding Squid command to /etc/rc.local file -- Adding init script -- Time for action - adding the init script -- Summary -- 
505 0 |a Contents note continued: 4. Getting Started with Squid's Powerful ACLs and Access Rules. Access control lists. Fast and slow ACL types -- Source and destination IP address -- Time for action - constructing ACL lists using IP addresses -- Time for action - using a range of IP addresses to build ACL lists. Source and destination domain names -- Time for action - constructing ACL lists using domain names. Destination port -- Time for action - building ACL lists using destination ports. HTTP methods -- Identifying requests using the request protocol -- Time for action - using a request protocol to construct access rules. Time-based ACLs -- URL and URL path-based identification -- Matching client usernames -- Proxy authentication -- Time for action - enforcing proxy authentication. User limits -- Identification based on various HTTP headers -- HTTP reply status -- Identifying random requests -- Access list rules. Access to HTTP protocol -- Access to other ports -- Enforcing limited access to neighbors -- 
505 0 |a Contents note continued: Time for action - denying miss_access to neighbors. Requesting neighbor proxy servers -- Forwarding requests to remote servers -- Ident lookup access -- Controlled caching of web documents -- URL rewrite access -- HTTP header access -- Custom error pages -- Maximum size of the reply body -- Logging requests selectively -- Mixing ACL lists and rules - example scenarios. Handling caching of local content -- Time for action - avoiding caching of local content. Denying access from external networks -- Denying access to selective clients -- Blocking the download of video content -- Time for action - blocking video content. Special access for certain clients -- Time for action - writing rules for special access. Limited access during working hours -- Allowing some clients to connect to special ports -- Testing access control with squidclient -- 
505 0 |a Contents note continued: Time for action - testing our access control example with squidclient -- Time for action - testing a complex access control -- Summary -- 5. Understanding Log Files and Log Formats. Log messages -- Cache log or debug log -- Time for action - understanding the cache log -- Access log. Understanding the access log -- Time for action - understanding the access log messages. Access log syntax -- Time for action - analyzing a syntax to specify access log. Log format -- Time for action - learning log format and format codes. Log formats provided by Squid -- Time for action - customizing the access log with a new log format -- Selective logging of requests -- Time for action - using access_log to control logging of requests -- Referer log -- Time for action - enabling the referer log -- Time for action - translating the referer logs to a human-readable format -- User agent log -- Time for action - enabling user agent logging -- 
505 0 |a Contents note continued: Emulating HTTP server-like logs -- Time for action - enabling HTTP server log emulation -- Log file rotation -- Other log related features. Cache store log -- Summary -- 6. Managing Squid and Monitoring Traffic. Cache manager. Installing the Apache Web server -- Time for action - installing Apache Web server. Configuring Apache for providing the cache manager web interface -- Time for action - configuring Apache to use cachemgr.cgi. Accessing the cache manager web interface. Configuring Squid -- Log in to cache manger -- General Runtime Information -- IP Cache Stats and Contents -- FQDN Cache Statistics -- HTTP Header Statistics -- Traffic and Resource Counters -- Request Forwarding Statistics -- Cache Client List -- Memory Utilization -- Internal DNS Statistics -- Log file analyzers. Calamaris. Installing Calamaris -- Time for action - installing Calamaris. Using Calamaris to generate statistics -- Time for action - generating stats in plain text format -- 
505 0 |a Contents note continued: Time for action - generating graphical reports with Calamaris -- Summary -- 7. Protecting your Squid Proxy Server with Authentication. HTTP authentication -- Basic authentication -- Time for action - exploring Basic authentication. Database authentication. Configuring database authentication -- NCSA authentication -- Time for action - configuring NCSA authentication. NIS authentication -- LDAP authentication -- SMB authentication -- PAM authentication -- Time for action - configuring PAM service -- MSNT authentication -- Time for action - configuring MSNT authentication. MSNT multi domain authentication -- SASL authentication -- Time for action - configuring Squid to use SASL authentication. Getpwnam Authentication -- POP3 authentication -- RADIUS authentication -- Time for action - configuring RADIUS authentication. Fake Basic authentication -- Digest authentication -- Time for action - configuring Digest authentication. File authentication -- 
505 0 |a Contents note continued: LDAP authentication -- Edirectory Authentication -- Microsoft NTLM authentication. Samba's NTLM authentication -- Fake NTLM authentication -- Negotiate authentication -- Time for action - configuring Negotiate authentication -- Using multiple authentication schemes -- Writing a custom authentication helper -- Time for action - writing a helper program -- Making non-concurrent helpers concurrent -- Common issues with authentication -- Summary -- 8. Building a Hierarchy of Squid Caches. Cache hierarchies -- Reasons to use hierarchical caching -- Problems with hierarchical caching -- Joining a cache hierarchy -- Time for action - joining a cache hierarchy. ICP options -- HTCP options -- Peer or neighbor selection. Options for peer selection methods -- Other cache peer options -- Controlling communication with peers. Domain-based forwarding -- 
505 0 |a Contents note continued: Time for action - configuring Squid for domain-based forwarding. Cache peer access -- Time for action - forwarding requests to cache peers using ACLs. Switching peer relationship -- Time for action - configuring Squid to switch peer relationship. Controlling request redirects -- Peer communication protocols. Internet Cache Protocol -- Cache digests. Squid and cache digest configuration -- Hypertext Caching Protocol -- Summary -- 9. Squid in Reverse Proxy Mode. What is reverse proxy mode? Exploring reverse proxy mode -- Configuring Squid as a server surrogate -- HTTP port. HTTP options in reverse proxy mode -- HTTPS port. HTTPS options in reverse proxy mode -- Adding backend web servers. Cache peer options for reverse proxy mode -- Time for action - adding backend web servers. Support for surrogate protocol. Understanding the surrogate protocol -- Configuration options for surrogate support -- Support for ESI protocol. Configuring Squid for ESI support -- 
505 0 |a Contents note continued: Logging messages in web server log format. Ignoring the browser reloads -- Time for action - configuring Squid to ignore the browser reloads -- Access controls in reverse proxy mode. Squid in only reverse proxy mode -- Squid in reverse proxy and forward proxy mode -- Example configurations -- Web server and Squid server on the same machine -- Accelerating multiple backend web servers hosting one website -- Accelerating multiple web servers hosting multiple websites -- Summary -- 10. Squid in Intercept Mode. Interception caching -- Time for action - understanding interception caching -- Advantages of interception caching -- Problems with interception caching -- Diverting HTTP traffic to Squid. Using a router's policy routing to divert requests -- Using rule-based switching to divert requests -- Using Squid server as a bridge -- Using WCCP tunnel -- Implementing interception caching -- Configuring the network devices -- 
505 0 |a Contents note continued: Configuring the operating system -- Time for action - enabling IP forwarding -- Time for action - redirecting HTTP traffic to Squid. Configuring Squid -- Configuring HTTP port -- Summary -- 11. Writing URL Redirectors and Rewriters. URL redirectors and rewriters. Understanding URL redirectors. HTTP status codes for redirection -- Understanding URL rewriters -- Issues with URL rewriters -- Squid, URL redirectors, and rewriters. Communication interface -- Time for action - exploring the message flow between Squid and redirectors -- Time for action - writing a simple URL redirector program. Concurrency -- Handling whitespace in URLs. Using the uri_whitespace directive -- Making redirector programs intelligent -- Writing our own URL redirector program -- Time for action - writing our own template for a URL redirector -- Configuring Squid. Specifying the URL redirector program -- Controlling redirector children -- 
505 0 |a Contents note continued: Controlling requests passed to the redirector program -- Bypassing URL redirector programs when under heavy load -- Rewriting the Host HTTP header -- A special URL redirector - deny_info -- Popular URL redirectors. SquidGuard -- Squirm -- Ad Zapper -- Summary -- 12. Troubleshooting Squid. Some common issues. Cannot write to log files -- Time for action - changing the ownership of log files. Could not determine hostname -- Cannot create swap directories -- Time for action - fixing cache directory permissions. Failed verification of swap directories -- Time for action - creating swap directories. Address already in use -- Time for action - finding the program listening on a specific port. URLs with underscore results in an invalid URL. Enforce hostname checks -- Allow underscore -- Squid becomes slow over time -- The request or reply is too large -- Access denied on the proxy server -- Connection refused when reaching a sibling proxy server -- 
505 0 |a Contents note continued: Debugging problems -- Time for action - debugging HTTP requests -- Time for action - debugging access control. Getting help online and reporting bugs -- Summary. 
630 0 0 |a Squid 
650 0 |a Client/server computing. 
650 0 |a Cache memory. 
650 0 |a Web servers. 
852 8 |b CARM  |i F11015  |p 0656562  |f BK 
852 8 |b SCAN  |h A3:AJ37B0  |i F11015  |p 0656562  |f BK 
852 8 |b SCAN  |h A3:AJ37B0  |i F11015  |p 0656562  |f BK 
999 f f |i 398ebe7e-ecad-584d-a2a7-bfa742a3a192  |s 8ae92428-df5b-526a-abca-1a47305f9f5d 
952 f f |p Can circulate  |a CAVAL  |b CAVAL  |c CAVAL  |d CARM 1 Store  |e F11015  |h Other scheme  |i book  |m 0656562 
952 f f |a CAVAL  |b CAVAL  |c CAVAL  |d Unmapped Location  |e F11015  |f A3:AJ37B0  |h Other scheme