Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Installed Squid and Squidguard but it's not filtering.

    pfSense Packages
    3
    14
    11.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      nambi
      last edited by

      I had to reinstall my pfsense box where I had squid and squidguard working well.

      I installed from scratch and manually set everything up, I followed the tutorials to the T but my squidguard will not filter.

      I can't figure out why, as I had done this quite some time ago and it worked.

      Do I also need to make changes under services/proxy server?

      Other than that I am positive i set all the settings up correctly under services/proxy filter.

      1 Reply Last reply Reply Quote 0
      • ?
        Guest
        last edited by

        check your logs, specifically the squid and squidguard logs to ensure that squid is seeing the requests and that the squidguard redirectors aren't crashing or otherwise erroring out.

        1 Reply Last reply Reply Quote 0
        • N
          nambi
          last edited by

          I reinstalled the packages, squid, then squidguard

          made sure all logs

          Enable log is checked
          Check this for enable log.

          then I go to the last tab

          and it shows

          Log type
          squidguard_log report disabled

          1 Reply Last reply Reply Quote 0
          • D
            dvserg
            last edited by

            @nambi:

            Log type 
            squidguard_log report disabled

            Enable this option and look this log for error messages.
            Check squidGuard servicxe status.

            SquidGuardDoc EN  RU Tutorial
            Localization ru_PFSense

            1 Reply Last reply Reply Quote 0
            • N
              nambi
              last edited by

              It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

              Thanks

              1 Reply Last reply Reply Quote 0
              • D
                dvserg
                last edited by

                @nambi:

                It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

                Thanks

                Be sure, what you browser configured for proxy use.
                And show you squidGuard config (look last Page/Tab)

                SquidGuardDoc EN  RU Tutorial
                Localization ru_PFSense

                1 Reply Last reply Reply Quote 0
                • N
                  nambi
                  last edited by

                  My browser settings are Default just as it was before when it worked.

                  SG log

                  /var/squidGuard/log/sg_configurator.log
                  10.11.2010 11:48:50 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
                  10.11.2010 11:48:50 : sg_reconfigure_user_db: Nothing. User destinations list empty.
                  10.11.2010 11:48:50 : sg_create_config: add blacklist entries
                  10.11.2010 11:48:50 : sg_create_config: added:
                  blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

                  10.11.2010 11:48:50 : sg_create_config: add rewrites: success safesearch;
                  10.11.2010 11:48:50 : sg_create_config: add Default
                  10.11.2010 11:48:50 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
                  10.11.2010 11:48:50 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
                  10.11.2010 11:48:50 : squid_reconfigure: Remove old redirector options from Squid config.
                  10.11.2010 11:48:50 : squid_reconfigure: Add new redirector options to Squid config.
                  10.11.2010 11:50:38 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
                  10.11.2010 11:50:38 : sg_reconfigure_user_db: Nothing. User destinations list empty.
                  10.11.2010 11:50:38 : sg_create_config: add blacklist entries
                  10.11.2010 11:50:38 : sg_create_config: added:
                  blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

                  10.11.2010 11:50:38 : sg_create_config: add rewrites: success safesearch;
                  10.11.2010 11:50:38 : sg_create_config: add Default
                  10.11.2010 11:50:38 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
                  10.11.2010 11:50:38 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
                  10.11.2010 11:50:38 : squid_reconfigure: Remove old redirector options from Squid config.
                  10.11.2010 11:50:38 : squid_reconfigure: Add new redirector options to Squid config.
                  10.11.2010 11:52:27 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
                  10.11.2010 11:52:27 : sg_reconfigure_user_db: Nothing. User destinations list empty.
                  10.11.2010 11:52:27 : sg_create_config: add blacklist entries
                  10.11.2010 11:52:27 : sg_create_config: added:
                  blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

                  10.11.2010 11:52:27 : sg_create_config: add rewrites: success safesearch;
                  10.11.2010 11:52:27 : sg_create_config: add Default
                  10.11.2010 11:52:27 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
                  10.11.2010 11:52:27 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
                  10.11.2010 11:52:27 : squid_reconfigure: Remove old redirector options from Squid config.
                  10.11.2010 11:52:27 : squid_reconfigure: Add new redirector options to Squid config.

                  Squid config

                  /usr/local/etc/squid/squid.conf

                  Do not edit manually !

                  http_port 192.168.1.1:3128
                  icp_port 0

                  pid_filename /var/run/squid.pid
                  cache_effective_user proxy
                  cache_effective_group proxy
                  error_directory /usr/local/etc/squid/errors/English
                  icon_directory /usr/local/etc/squid/icons
                  visible_hostname localhost
                  cache_mgr admin@localhost
                  access_log /dev/null
                  cache_log /var/squid/logs/cache.log
                  cache_store_log none
                  shutdown_lifetime 3 seconds
                  uri_whitespace strip

                  cache_mem 8 MB
                  maximum_object_size_in_memory 32 KB
                  memory_replacement_policy heap GDSF
                  cache_replacement_policy heap LFUDA
                  cache_dir ufs /var/squid/cache 100 16 256
                  minimum_object_size 0 KB
                  maximum_object_size 10 KB
                  offline_mode off

                  No redirector configured

                  Setup some default acls

                  acl all src 0.0.0.0/0.0.0.0
                  acl localhost src 127.0.0.1/255.255.255.255
                  acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901 3128 1025-65535
                  acl sslports port 443 563
                  acl manager proto cache_object
                  acl purge method PURGE
                  acl connect method CONNECT
                  acl dynamic urlpath_regex cgi-bin ?
                  cache deny dynamic
                  http_access allow manager localhost

                  http_access deny manager
                  http_access allow purge localhost
                  http_access deny purge
                  http_access deny !safeports
                  http_access deny CONNECT !sslports

                  Always allow localhost connections

                  http_access allow localhost

                  request_body_max_size 0 KB
                  reply_body_max_size 0 allow all
                  delay_pools 1
                  delay_class 1 2
                  delay_parameters 1 -1/-1 -1/-1
                  delay_initial_bucket_level 100
                  delay_access 1 allow all

                  Setup allowed acls

                  Custom options

                  redirect_program /usr/local/bin/squidGuard -c /usr/local/etc/squidGuard/squidGuard.conf
                  redirector_bypass on
                  redirect_children 3

                  Default block all to be sure

                  http_access deny all

                  SG Config log

                  /usr/local/etc/squidGuard/squidGuard.conf

                  ============================================================

                  SquidGuard configuration file

                  This file generated automaticly with SquidGuard configurator

                  (C)2006 Serg Dvoriancev

                  email: dv_serg@mail.ru

                  ============================================================

                  logdir /var/squidGuard/log
                  dbhome /var/db/squidGuard

                  dest blk_BL_adv {
                  domainlist blk_BL_adv/domains
                  urllist blk_BL_adv/urls
                  log block.log
                  }

                  dest blk_BL_aggressive {
                  domainlist blk_BL_aggressive/domains
                  urllist blk_BL_aggressive/urls
                  log block.log
                  }

                  dest blk_BL_alcohol {
                  domainlist blk_BL_alcohol/domains
                  urllist blk_BL_alcohol/urls
                  log block.log
                  }

                  dest blk_BL_automobile_bikes {
                  domainlist blk_BL_automobile_bikes/domains
                  urllist blk_BL_automobile_bikes/urls
                  log block.log
                  }

                  dest blk_BL_automobile_boats {
                  domainlist blk_BL_automobile_boats/domains
                  urllist blk_BL_automobile_boats/urls
                  log block.log
                  }

                  dest blk_BL_automobile_cars {
                  domainlist blk_BL_automobile_cars/domains
                  urllist blk_BL_automobile_cars/urls
                  log block.log
                  }

                  dest blk_BL_automobile_planes {
                  domainlist blk_BL_automobile_planes/domains
                  urllist blk_BL_automobile_planes/urls
                  log block.log
                  }

                  dest blk_BL_chat {
                  domainlist blk_BL_chat/domains
                  urllist blk_BL_chat/urls
                  log block.log
                  }

                  dest blk_BL_costtraps {
                  domainlist blk_BL_costtraps/domains
                  urllist blk_BL_costtraps/urls
                  log block.log
                  }

                  dest blk_BL_dating {
                  domainlist blk_BL_dating/domains
                  urllist blk_BL_dating/urls
                  log block.log
                  }

                  dest blk_BL_downloads {
                  domainlist blk_BL_downloads/domains
                  urllist blk_BL_downloads/urls
                  log block.log
                  }

                  dest blk_BL_drugs {
                  domainlist blk_BL_drugs/domains
                  urllist blk_BL_drugs/urls
                  log block.log
                  }

                  dest blk_BL_dynamic {
                  domainlist blk_BL_dynamic/domains
                  urllist blk_BL_dynamic/urls
                  log block.log
                  }

                  dest blk_BL_education_schools {
                  domainlist blk_BL_education_schools/domains
                  urllist blk_BL_education_schools/urls
                  log block.log
                  }

                  dest blk_BL_finance_banking {
                  domainlist blk_BL_finance_banking/domains
                  urllist blk_BL_finance_banking/urls
                  log block.log
                  }

                  dest blk_BL_finance_insurance {
                  domainlist blk_BL_finance_insurance/domains
                  urllist blk_BL_finance_insurance/urls
                  log block.log
                  }

                  dest blk_BL_finance_moneylending {
                  domainlist blk_BL_finance_moneylending/domains
                  urllist blk_BL_finance_moneylending/urls
                  log block.log
                  }

                  dest blk_BL_finance_other {
                  domainlist blk_BL_finance_other/domains
                  urllist blk_BL_finance_other/urls
                  log block.log
                  }

                  dest blk_BL_finance_realestate {
                  domainlist blk_BL_finance_realestate/domains
                  urllist blk_BL_finance_realestate/urls
                  log block.log
                  }

                  dest blk_BL_finance_trading {
                  domainlist blk_BL_finance_trading/domains
                  urllist blk_BL_finance_trading/urls
                  log block.log
                  }

                  dest blk_BL_fortunetelling {
                  domainlist blk_BL_fortunetelling/domains
                  urllist blk_BL_fortunetelling/urls
                  log block.log
                  }

                  dest blk_BL_forum {
                  domainlist blk_BL_forum/domains
                  urllist blk_BL_forum/urls
                  log block.log
                  }

                  dest blk_BL_gamble {
                  domainlist blk_BL_gamble/domains
                  urllist blk_BL_gamble/urls
                  log block.log
                  }

                  dest blk_BL_government {
                  domainlist blk_BL_government/domains
                  urllist blk_BL_government/urls
                  log block.log
                  }

                  dest blk_BL_hacking {
                  domainlist blk_BL_hacking/domains
                  urllist blk_BL_hacking/urls
                  log block.log
                  }

                  dest blk_BL_hobby_cooking {
                  domainlist blk_BL_hobby_cooking/domains
                  urllist blk_BL_hobby_cooking/urls
                  log block.log
                  }

                  dest blk_BL_hobby_games-misc {
                  domainlist blk_BL_hobby_games-misc/domains
                  urllist blk_BL_hobby_games-misc/urls
                  log block.log
                  }

                  dest blk_BL_hobby_games-online {
                  domainlist blk_BL_hobby_games-online/domains
                  urllist blk_BL_hobby_games-online/urls
                  log block.log
                  }

                  dest blk_BL_hobby_gardening {
                  domainlist blk_BL_hobby_gardening/domains
                  urllist blk_BL_hobby_gardening/urls
                  log block.log
                  }

                  dest blk_BL_hobby_pets {
                  domainlist blk_BL_hobby_pets/domains
                  urllist blk_BL_hobby_pets/urls
                  log block.log
                  }

                  dest blk_BL_homestyle {
                  domainlist blk_BL_homestyle/domains
                  urllist blk_BL_homestyle/urls
                  log block.log
                  }

                  dest blk_BL_hospitals {
                  domainlist blk_BL_hospitals/domains
                  urllist blk_BL_hospitals/urls
                  log block.log
                  }

                  dest blk_BL_imagehosting {
                  domainlist blk_BL_imagehosting/domains
                  urllist blk_BL_imagehosting/urls
                  log block.log
                  }

                  dest blk_BL_isp {
                  domainlist blk_BL_isp/domains
                  urllist blk_BL_isp/urls
                  log block.log
                  }

                  dest blk_BL_jobsearch {
                  domainlist blk_BL_jobsearch/domains
                  urllist blk_BL_jobsearch/urls
                  log block.log
                  }

                  dest blk_BL_library {
                  domainlist blk_BL_library/domains
                  urllist blk_BL_library/urls
                  log block.log
                  }

                  dest blk_BL_military {
                  domainlist blk_BL_military/domains
                  urllist blk_BL_military/urls
                  log block.log
                  }

                  dest blk_BL_models {
                  domainlist blk_BL_models/domains
                  urllist blk_BL_models/urls
                  log block.log
                  }

                  dest blk_BL_movies {
                  domainlist blk_BL_movies/domains
                  urllist blk_BL_movies/urls
                  log block.log
                  }

                  dest blk_BL_music {
                  domainlist blk_BL_music/domains
                  urllist blk_BL_music/urls
                  log block.log
                  }

                  dest blk_BL_news {
                  domainlist blk_BL_news/domains
                  urllist blk_BL_news/urls
                  log block.log
                  }

                  dest blk_BL_podcasts {
                  domainlist blk_BL_podcasts/domains
                  urllist blk_BL_podcasts/urls
                  log block.log
                  }

                  dest blk_BL_politics {
                  domainlist blk_BL_politics/domains
                  urllist blk_BL_politics/urls
                  log block.log
                  }

                  dest blk_BL_porn {
                  domainlist blk_BL_porn/domains
                  urllist blk_BL_porn/urls
                  log block.log
                  }

                  dest blk_BL_radiotv {
                  domainlist blk_BL_radiotv/domains
                  urllist blk_BL_radiotv/urls
                  log block.log
                  }

                  dest blk_BL_recreation_humor {
                  domainlist blk_BL_recreation_humor/domains
                  urllist blk_BL_recreation_humor/urls
                  log block.log
                  }

                  dest blk_BL_recreation_martialarts {
                  domainlist blk_BL_recreation_martialarts/domains
                  urllist blk_BL_recreation_martialarts/urls
                  log block.log
                  }

                  dest blk_BL_recreation_restaurants {
                  domainlist blk_BL_recreation_restaurants/domains
                  urllist blk_BL_recreation_restaurants/urls
                  log block.log
                  }

                  dest blk_BL_recreation_sports {
                  domainlist blk_BL_recreation_sports/domains
                  urllist blk_BL_recreation_sports/urls
                  log block.log
                  }

                  dest blk_BL_recreation_travel {
                  domainlist blk_BL_recreation_travel/domains
                  urllist blk_BL_recreation_travel/urls
                  log block.log
                  }

                  dest blk_BL_recreation_wellness {
                  domainlist blk_BL_recreation_wellness/domains
                  urllist blk_BL_recreation_wellness/urls
                  log block.log
                  }

                  dest blk_BL_redirector {
                  domainlist blk_BL_redirector/domains
                  urllist blk_BL_redirector/urls
                  log block.log
                  }

                  dest blk_BL_religion {
                  domainlist blk_BL_religion/domains
                  urllist blk_BL_religion/urls
                  log block.log
                  }

                  dest blk_BL_remotecontrol {
                  domainlist blk_BL_remotecontrol/domains
                  urllist blk_BL_remotecontrol/urls
                  log block.log
                  }

                  dest blk_BL_ringtones {
                  domainlist blk_BL_ringtones/domains
                  urllist blk_BL_ringtones/urls
                  log block.log
                  }

                  dest blk_BL_science_astronomy {
                  domainlist blk_BL_science_astronomy/domains
                  urllist blk_BL_science_astronomy/urls
                  log block.log
                  }

                  dest blk_BL_science_chemistry {
                  domainlist blk_BL_science_chemistry/domains
                  urllist blk_BL_science_chemistry/urls
                  log block.log
                  }

                  dest blk_BL_searchengines {
                  domainlist blk_BL_searchengines/domains
                  urllist blk_BL_searchengines/urls
                  log block.log
                  }

                  dest blk_BL_sex_education {
                  domainlist blk_BL_sex_education/domains
                  urllist blk_BL_sex_education/urls
                  log block.log
                  }

                  dest blk_BL_sex_lingerie {
                  domainlist blk_BL_sex_lingerie/domains
                  urllist blk_BL_sex_lingerie/urls
                  log block.log
                  }

                  dest blk_BL_shopping {
                  domainlist blk_BL_shopping/domains
                  urllist blk_BL_shopping/urls
                  log block.log
                  }

                  dest blk_BL_socialnet {
                  domainlist blk_BL_socialnet/domains
                  urllist blk_BL_socialnet/urls
                  log block.log
                  }

                  dest blk_BL_spyware {
                  domainlist blk_BL_spyware/domains
                  urllist blk_BL_spyware/urls
                  log block.log
                  }

                  dest blk_BL_tracker {
                  domainlist blk_BL_tracker/domains
                  urllist blk_BL_tracker/urls
                  log block.log
                  }

                  dest blk_BL_updatesites {
                  domainlist blk_BL_updatesites/domains
                  urllist blk_BL_updatesites/urls
                  log block.log
                  }

                  dest blk_BL_violence {
                  domainlist blk_BL_violence/domains
                  urllist blk_BL_violence/urls
                  log block.log
                  }

                  dest blk_BL_warez {
                  domainlist blk_BL_warez/domains
                  urllist blk_BL_warez/urls
                  log block.log
                  }

                  dest blk_BL_weapons {
                  domainlist blk_BL_weapons/domains
                  urllist blk_BL_weapons/urls
                  log block.log
                  }

                  dest blk_BL_webmail {
                  domainlist blk_BL_webmail/domains
                  urllist blk_BL_webmail/urls
                  log block.log
                  }

                  dest blk_BL_webphone {
                  domainlist blk_BL_webphone/domains
                  urllist blk_BL_webphone/urls
                  log block.log
                  }

                  dest blk_BL_webradio {
                  domainlist blk_BL_webradio/domains
                  urllist blk_BL_webradio/urls
                  log block.log
                  }

                  dest blk_BL_webtv {
                  domainlist blk_BL_webtv/domains
                  urllist blk_BL_webtv/urls
                  log block.log
                  }

                  rew safesearch {
                  s@(google../search?.q=.)@\1&safe=active@i
                  s@(google..
                  /images.q=.)@\1&safe=active@i
                  s@(google../groups.q=.)@\1&safe=active@i
                  s@(google..
                  /news.q=.)@\1&safe=active@i
                  s@(yandex../yandsearch?.text=.)@\1&fyandex=1@i
                  s@(search.yahoo..
                  /search.p=.)@\1&vm=r@i
                  s@(search.live../.q=.)@\1&adlt=strict@i
                  s@(search.msn..
                  /.q=.)@\1&adlt=strict@i
                  log block.log
                  }

                  acl {

                  default {
                  pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none
                  redirect http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
                  rewrite safesearch
                  log block.log
                  }
                  }

                  1 Reply Last reply Reply Quote 0
                  • D
                    dvserg
                    last edited by

                    pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none

                    In Default Tab you setup default rule (last rule) to deny -> result: you clients can't browse sites.
                    Setup this rule as allow - this mean what you allow All sites, but deny blacklisted sites.

                    SquidGuardDoc EN  RU Tutorial
                    Localization ru_PFSense

                    1 Reply Last reply Reply Quote 0
                    • N
                      nambi
                      last edited by

                      Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.

                      Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                      Thank You,

                      1 Reply Last reply Reply Quote 0
                      • D
                        dvserg
                        last edited by

                        @nambi:

                        Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.
                        Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                        Not sure, permissions check each time while you configure SG.
                        Please do this :

                        • disable squid transparent mode if you use.
                        • delete Bypass Proxy option in squid (if you enter this option)
                        • check squid selected interface / to be sure /
                        • enter to you browser proxy option as squid configured (PFSenseLanIP:Port) (192.168.1.1:3128)
                        • in squid Custom options change redirector_bypass on -> redirector_bypass off

                        How browse sites now ?

                        SquidGuardDoc EN  RU Tutorial
                        Localization ru_PFSense

                        1 Reply Last reply Reply Quote 0
                        • N
                          nambi
                          last edited by

                          Sorry to pester you with this, when I Installed squid and squid guard I had only setup the "proxy filter area" I did not change any of the "proxy server" side, should I be? or do the default settings work?

                          Also when I try to change a few settings under proxy server I get an error saving stating.

                          The following input errors were detected:

                          * The field 'Log store directory' is required.
                              * The field 'Proxy port' is required.
                              * You must start log location with a / mark
                              * That is not a valid log location dir

                          This is because I had never initially set this up.  Would this be the problem?

                          1 Reply Last reply Reply Quote 0
                          • D
                            dvserg
                            last edited by

                            The following input errors were detected:

                            * The field 'Log store directory' is required. > /
                                * The field 'Proxy port' is required.
                                * You must start log location with a / mark
                                * That is not a valid log location dir

                            Port 3128
                            Dir /var/squid/logs

                            SquidGuardDoc EN  RU Tutorial
                            Localization ru_PFSense

                            1 Reply Last reply Reply Quote 0
                            • N
                              nambi
                              last edited by

                              Thank You
                              Thank You
                              Thank You!

                              it's working now, it was the settings I omitted in the proxy server area which prevented the blocking to work.

                              though these settings are enabled, and if they are not the blocking is bypassed

                              • squid transparent mode if you use.
                              • Bypass Proxy option in squid (if you enter this option)

                              I also set the port you specified, can you use any port or is 3128 what is recommend?

                              1 Reply Last reply Reply Quote 0
                              • D
                                dvserg
                                last edited by

                                @nambi:

                                I also set the port you specified, can you use any port or is 3128 what is recommend?

                                Default port is 3128

                                SquidGuardDoc EN  RU Tutorial
                                Localization ru_PFSense

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.