Senin, 21 Januari 2008

PROXY SERVER

Tutorial Proxy Server:Pertama-tama kita install dulu program untuk membuat Proxy Server yaitu dengan
aptitude -> / -> squid -> enter -> + -> g -> g ->
setelah program untuk membuat Proxy Server sudah terinstall semua, barulah kita mulai mengedit program tersebut yaitu dengan cara:

mcedit /etc/squid/squid.conf

acl all src 0.0.0.0/0.0.0.0
acl lab1 src 192.168.1.0/255.255.255.0
acl tidak dstdomain www.download.com
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443 # https
acl SSL_ports port 563 # snews
acl SSL_ports port 873 # rsync
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl Safe_ports port 631 # cups
acl Safe_ports port 873 # rsync
acl Safe_ports port 901 # SWAT
acl purge method PURGE
acl CONNECT method CONNECT
serta

# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
# Example rule allowing access from your local networks. Adapt
# to list your (internal) IP networks from where browsing should
# be allowed#acl our_networks src 192.168.1.0/24 192.168.2.0/24
#http_access allow our_networkshttp_access allow localhosthttp_access deny tidakhttp_access allow lab1
# And finally deny all other access to this proxyhttp_access deny all
# TAG: http_access2
# Allowing or Denying access based on defined access lists
#
# Identical to http_access, but runs after redirectors. If not set
# then only http_access is used.
#
#Default:
# none
# TAG: http_reply_access
# Allow replies to client requests. This is complementary to http_access.
#
# http_reply_access allowdeny [!] aclname ...
#
# NOTE: if there are no access lines present, the default is to allow
# all replies
#
# If none of the access lines cause a match the opposite of the
# last line will apply. Thus it is good practice to end the rules
# with an "allow all" or "deny all" entry.
#
#Default:
# http_reply_access allow all
#
#Recommended minimum configuration:
#
# Insert your own rules here.
#
#
# and finally allow by default

http_reply_access allow all

Tidak ada komentar: