Squid


Duane. Wessels
Bok Engelsk 2009 · Electronic books.
Annen tittel
Utgitt
Sebastopol : : O'Reilly Media, , 2009.
Omfang
1 online resource (865 p.)
Opplysninger
Description based upon print version of record.. - Squid: The Definitive Guide; Recommended Reading; Conventions Used in This Book; Comments and Questions; Acknowledgments; 1. Introduction; 1.2. A Brief History of Squid; 1.3. Hardware and Operating System Requirements; 1.4. Squid Is Open Source; 1.5. Squid&s Home on the Web; 1.6. Getting Help; 1.6.2. Mailing Lists; 1.6.2.2. squid-announce; 1.6.2.3. squid-dev; 1.6.3. Professional Support; 1.7. Getting Started with Squid; 1.8. Exercises; 2. Getting Squid; 2.2. Use the Source, Luke; 2.3. Precompiled Binaries; 2.4. Anonymous CVS; 2.5. devel.squid-cache.org; 2.6. Exercises. - 3. Compiling and Installing3.2. Unpacking the Source; 3.3. Pretuning Your Kernel; 3.3.1.2. Linux; 3.3.1.3. Solaris; 3.3.2. Mbuf Clusters; 3.3.3. Ephemeral Port Range; 3.4. The configure Script; 3.4.2. Running configure; 3.5. make; 3.6. make Install; 3.7. Applying a Patch; 3.8. Running configure Later; 3.9. Exercises; 4. Configuration Guide for the Eager; 4.2. User IDs; 4.3. Port Numbers; 4.4. Log File Pathnames; 4.5. Access Controls; 4.6. Visible Hostname; 4.7. Administrative Contact Information; 4.8. Next Steps; 4.9. Exercises; 5. Running Squid; 5.2. Check Your Configuration File for Errors. - 5.3. Initializing Cache Directories5.4. Testing Squid in a Terminal Window; 5.5. Running Squid as a Daemon Process; 5.6. Boot Scripts; 5.6.2. init.d and rc.d; 5.6.3. /etc/inittab; 5.7. A chroot Environment; 5.8. Stopping Squid; 5.9. Reconfiguring a Running Squid Process; 5.10. Rotating the Log Files; 5.11. Exercises; 6. All About Access Controls; 6.1.1.2. Domain names; 6.1.1.3. Usernames; 6.1.1.4. Regular expressions; 6.1.1.5. TCP port numbers; 6.1.1.6. Autonomous system numbers; 6.1.2. ACL Types; 6.1.2.2. dst; 6.1.2.3. myip; 6.1.2.4. dstdomain; 6.1.2.5. srcdomain; 6.1.2.6. port. - 6.1.2.7. myport6.1.2.8. method; 6.1.2.9. proto; 6.1.2.10. time; 6.1.2.11. ident; 6.1.2.12. proxy_auth; 6.1.2.13. src_as; 6.1.2.14. dst_as; 6.1.2.15. snmp_community; 6.1.2.16. maxconn; 6.1.2.17. arp; 6.1.2.18. srcdom_regex; 6.1.2.19. dstdom_regex; 6.1.2.20. url_regex; 6.1.2.21. urlpath_regex; 6.1.2.22. browser; 6.1.2.23. req_mime_type; 6.1.2.24. rep_mime_type; 6.1.2.25. ident_regex; 6.1.2.26. proxy_auth_regex; 6.1.3. External ACLs; 6.1.4. Dealing with Long ACL Lists; 6.1.5. How Squid Matches Access Control Elements; 6.2. Access Control Rules; 6.2.2. How Squid Matches Access Rules. - 6.2.3. Access List Style6.2.4. Delayed Checks; 6.2.5. Slow and Fast Rule Checks; 6.3. Common Scenarios; 6.3.2. Blocking a Few Misbehaving Clients; 6.3.3. Denying Pornography; 6.3.4. Restricting Usage During Working Hours; 6.3.5. Preventing Squid from Talking to Non-HTTP Servers; 6.3.6. Giving Certain Users Special Access; 6.3.7. Preventing Abuse from Siblings; 6.3.8. Denying Requests with IP Addresses; 6.3.9. An http_reply_access Example; 6.3.10. Preventing Cache Hits for Local Sites; 6.4. Testing Access Controls; 6.5. Exercises; 7. Disk Cache Basics; 7.1.2. Directory; 7.1.3. Size. - 7.1.3.2. The relationship between disk space and process size. - Squid is the most popular Web caching software in use today, and it works on a variety of platforms including Linux, FreeBSD, and Windows. Squid improves network performance by reducing the amount of bandwidth used when surfing the Web. It makes web pages load faster and can even reduce the load on your web server. By caching and reusing popular web content, Squid allows you to get by with smaller network connections. It also protects the host on your internal network by acting as a firewall and proxying your internal web traffic. You can use Squid to collect statistics about the
Emner
Sjanger
Dewey
ISBN
0596001622

Bibliotek som har denne