The information here is current for version 3.1 see acl for the latest configuration guide list of available types. The types of checks are outlined in the next section Access Lists followed by details of how the checks operate. As each processing action needs to take place a check in run to test what action or limitations are to occur for the transaction. To process a transaction another type of line is used. For example the word "Sunday" matches a day of the week, but does not indicate which day of the week you are reading this. Types of tests are outlined in the next section ACL Elements. When loading the configuration file Squid processes all the acl lines (directives) into memory as tests which can be performed against any request transaction. An access list consists of an allow or deny action followed by a number of ACL elements. There are two different components: ACL elements, and access lists. Squid's access control scheme is relatively comprehensive and difficult for some people to understand. I want to authorize users depending on their MS Windows group memberships.I want to put ACL parameters in an external file.I want to use local time zone in error messages.I want to customize, or make my own error messages. I'm trying to deny ''foo.com'', but it's not working.Can I limit the number of connections from a client?.Can I set up ACL's based on MAC address rather than IP?.Problems with IP ACL's that have complicated netmasks.How can I allow some users to use the cache at specific times?.How can I allow some clients to use the cache at specific times?.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |