Centos服務(wù)器搭建Squid Http代理請(qǐng)求服務(wù)器教程
更新時(shí)間:2025年12月02日 15:47:12 作者:ZeroTeam_麒麟
文章總結(jié)了作者在配置系統(tǒng)服務(wù)時(shí)的個(gè)人經(jīng)驗(yàn),包括生成密碼文件、測(cè)試密碼文件配置、啟動(dòng)服務(wù)、配置副本(包括無(wú)權(quán)限控制和權(quán)限控制)等步驟,并鼓勵(lì)讀者參考和使用腳本之家
安裝
yum install squid -y yum install httpd-tools -y
生成密碼文件
mkdir /etc/squid3/ #這里密碼是 ceshi htpasswd -cd /etc/squid3/passwords ceshi #回車(chē) 自己輸入密碼
測(cè)試密碼文件
/usr/lib64/squid/basic_ncsa_auth /etc/squid3/passwords #輸入賬號(hào)跟密碼 ceshi 123456 #提示 OK 代表正確 OK
配置
vim /etc/squid/squid.conf # 在最后添加 auth_param basic program /usr/lib64/squid/basic_ncsa_auth /etc/squid3/passwords auth_param basic realm proxy acl authenticated proxy_auth REQUIRED http_access allow authenticated # 這里是端口號(hào),可以按需修改 # http_port 3128 這樣寫(xiě)會(huì)同時(shí)監(jiān)聽(tīng)ipv6和ipv4的端口,推薦適應(yīng)下面的配置方法。 http_port 0.0.0.0:3128
啟動(dòng)服務(wù)
# 開(kāi)啟啟動(dòng) systemctl enable squid.service # 啟動(dòng) systemctl start squid.service # 停止 systemctl stop squid.service # 重啟 systemctl restart squid.service
配置副本–無(wú)權(quán)限控制
# # Recommended minimum configuration: # # Example rule allowing access from your local networks. # Adapt to list your (internal) IP networks from where browsing # should be allowed acl localnet src 10.0.0.0/8 # RFC1918 possible internal network acl localnet src 172.16.0.0/12 # RFC1918 possible internal network acl localnet src 192.168.0.0/16 # RFC1918 possible internal network acl localnet src fc00::/7 # RFC 4193 local private network range acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines acl SSL_ports port 443 acl Safe_ports port 80 # http acl Safe_ports port 21 # ftp acl Safe_ports port 443 # https acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais acl Safe_ports port 1025-65535 # unregistered ports acl Safe_ports port 280 # http-mgmt acl Safe_ports port 488 # gss-http acl Safe_ports port 591 # filemaker acl Safe_ports port 777 # multiling http #acl many_spaces rep_header Disposition -i [k123] acl CONNECT method CONNECT # # Recommended minimum Access Permission configuration: # # Deny requests to certain unsafe ports #http_access allow all !Safe_ports # Deny CONNECT to other than secure SSL ports #http_access deny CONNECT !SSL_ports # Only allow cachemgr access from localhost http_access allow localhost manager http_access deny manager # We strongly recommend the following be uncommented to protect innocent # web applications running on the proxy server who think the only # one who can access services on "localhost" is a local user #http_access deny to_localhost # # INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS # # Example rule allowing access from your local networks. # Adapt localnet in the ACL section to list your (internal) IP networks # from where browsing should be allowed #http_access allow all http_access allow all auth_param basic program /usr/lib64/squid/basic_ncsa_auth /etc/squid3/passwords auth_param basic realm proxy acl authenticated proxy_auth REQUIRED #http_access allow authenticated # And finally deny all other access to this proxy http_access allow all # Squid normally listens to port 3128 http_port 0.0.0.0:3128 # Uncomment and adjust the following to add a disk cache directory. #cache_dir ufs /var/spool/squid 100 16 256 # Leave coredumps in the first cache dir coredump_dir /var/spool/squid # # Add any of your own refresh_pattern entries above these. # refresh_pattern ^ftp: 1440 20% 10080 refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 refresh_pattern . 0 20% 4320
配置副本-權(quán)限控制
# # Recommended minimum configuration: # # Example rule allowing access from your local networks. # Adapt to list your (internal) IP networks from where browsing # should be allowed acl localnet src 10.0.0.0/8 # RFC1918 possible internal network acl localnet src 172.16.0.0/12 # RFC1918 possible internal network acl localnet src 192.168.0.0/16 # RFC1918 possible internal network acl localnet src fc00::/7 # RFC 4193 local private network range acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines acl SSL_ports port 443 acl Safe_ports port 80 # http acl Safe_ports port 21 # ftp acl Safe_ports port 443 # https acl Safe_ports port 70 # gopher acl Safe_ports port 210 # wais acl Safe_ports port 1025-65535 # unregistered ports acl Safe_ports port 280 # http-mgmt acl Safe_ports port 488 # gss-http acl Safe_ports port 591 # filemaker acl Safe_ports port 777 # multiling http #acl many_spaces rep_header Disposition -i [k123] acl CONNECT method CONNECT # # Recommended minimum Access Permission configuration: # # Deny requests to certain unsafe ports #http_access allow all !Safe_ports # Deny CONNECT to other than secure SSL ports #http_access deny CONNECT !SSL_ports # Only allow cachemgr access from localhost http_access allow localhost manager http_access deny manager # We strongly recommend the following be uncommented to protect innocent # web applications running on the proxy server who think the only # one who can access services on "localhost" is a local user #http_access deny to_localhost # # INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS # # Example rule allowing access from your local networks. # Adapt localnet in the ACL section to list your (internal) IP networks # from where browsing should be allowed #http_access allow all #http_access allow all auth_param basic program /usr/lib64/squid/basic_ncsa_auth /etc/squid3/passwords auth_param basic realm proxy acl authenticated proxy_auth REQUIRED http_access allow authenticated #http_access allow many_spaces # And finally deny all other access to this proxy http_access deny all # Squid normally listens to port 3128 http_port 0.0.0.0:3128 # Uncomment and adjust the following to add a disk cache directory. #cache_dir ufs /var/spool/squid 100 16 256 # Leave coredumps in the first cache dir coredump_dir /var/spool/squid # # Add any of your own refresh_pattern entries above these. # refresh_pattern ^ftp: 1440 20% 10080 refresh_pattern ^gopher: 1440 0% 1440 refresh_pattern -i (/cgi-bin/|\?) 0 0% 0 refresh_pattern . 0 20% 4320
總結(jié)
以上為個(gè)人經(jīng)驗(yàn),希望能給大家一個(gè)參考,也希望大家多多支持腳本之家。
您可能感興趣的文章:
- CentOS環(huán)境下Nginx配置SSL證書(shū)實(shí)現(xiàn)https請(qǐng)求詳解
- Centos服務(wù)器搭建簡(jiǎn)單的ftp服務(wù)實(shí)踐
- 本地下載MySQL 8.0.37并上傳服務(wù)器Centos7.9安裝的完整指南
- Centos7配置與安裝DNS服務(wù)器全過(guò)程
- 如何在CentOS?7上搭建GitLab服務(wù)器(完整指南)
- Centos基于Nginx搭建RTMP服務(wù)器的實(shí)現(xiàn)
- CentOS服務(wù)器安全配置最全攻略分享
- docker在Centos上做DNS服務(wù)器的配置全過(guò)程
- Centos環(huán)境下搭建Tomcat服務(wù)器的實(shí)戰(zhàn)詳解
相關(guān)文章
linux 可執(zhí)行文件與寫(xiě)操作的同步問(wèn)題(文件讀寫(xiě)操作產(chǎn)生的鎖機(jī)制)
在哪種系統(tǒng)下都會(huì)有文件操作產(chǎn)生的同步問(wèn)題,今天說(shuō)說(shuō)linux下讀寫(xiě)文件的鎖機(jī)制。2013-10-10
基于Apache的支持.NET2.0的Web服務(wù)器搭建
在Windows XP下如果沒(méi)有IIS,那么Apache HTTP Server無(wú)疑是最好的替代品了。而它也能夠很好的支持ASP.NET1.1/2.0。下面就介紹一下如何搭建該環(huán)境。2009-08-08
Linux系統(tǒng)實(shí)現(xiàn)日志的無(wú)損遷移的完整方案介紹
這篇文章主要為大家詳細(xì)介紹了Linux系統(tǒng)實(shí)現(xiàn)日志的無(wú)損遷移的完整方案,文中的示例代碼簡(jiǎn)潔易懂,具有一定的借鑒價(jià)值,有需要的小伙伴可以了解下2025-09-09
Linux parted磁盤(pán)分區(qū)實(shí)現(xiàn)步驟解析
這篇文章主要介紹了Linux parted磁盤(pán)分區(qū)實(shí)現(xiàn)步驟解析,文中通過(guò)示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友可以參考下2020-08-08
Linux下SFTP用戶權(quán)限設(shè)置條件及實(shí)現(xiàn)命令
SFTP賬號(hào)是基于SSH賬號(hào)的,其擁有的權(quán)限是比較大的,今天主要教大家如何進(jìn)行SFTP用戶權(quán)限設(shè)置,感興趣的你可不要錯(cuò)過(guò)了哈,希望本文知識(shí)可以幫助到你2013-02-02
淺析CentOS8虛擬機(jī)訪問(wèn)Windows10主機(jī)文件夾方法
這篇文章主要介紹了CentOS8虛擬機(jī)訪問(wèn)Windows10主機(jī)文件夾方法,本文圖文并茂給大家介紹的非常詳細(xì),具有一定的參考借鑒價(jià)值,需要的朋友可以參考下2019-10-10

