Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Installed Squid and Squidguard but it's not filtering.

    Scheduled Pinned Locked Moved pfSense Packages
    14 Posts 3 Posters 11.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      nambi
      last edited by

      I reinstalled the packages, squid, then squidguard

      made sure all logs

      Enable log is checked
      Check this for enable log.

      then I go to the last tab

      and it shows

      Log type
      squidguard_log report disabled

      1 Reply Last reply Reply Quote 0
      • D
        dvserg
        last edited by

        @nambi:

        Log type 
        squidguard_log report disabled

        Enable this option and look this log for error messages.
        Check squidGuard servicxe status.

        SquidGuardDoc EN  RU Tutorial
        Localization ru_PFSense

        1 Reply Last reply Reply Quote 0
        • N
          nambi
          last edited by

          It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

          Thanks

          1 Reply Last reply Reply Quote 0
          • D
            dvserg
            last edited by

            @nambi:

            It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

            Thanks

            Be sure, what you browser configured for proxy use.
            And show you squidGuard config (look last Page/Tab)

            SquidGuardDoc EN  RU Tutorial
            Localization ru_PFSense

            1 Reply Last reply Reply Quote 0
            • N
              nambi
              last edited by

              My browser settings are Default just as it was before when it worked.

              SG log

              /var/squidGuard/log/sg_configurator.log
              10.11.2010 11:48:50 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
              10.11.2010 11:48:50 : sg_reconfigure_user_db: Nothing. User destinations list empty.
              10.11.2010 11:48:50 : sg_create_config: add blacklist entries
              10.11.2010 11:48:50 : sg_create_config: added:
              blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

              10.11.2010 11:48:50 : sg_create_config: add rewrites: success safesearch;
              10.11.2010 11:48:50 : sg_create_config: add Default
              10.11.2010 11:48:50 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
              10.11.2010 11:48:50 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
              10.11.2010 11:48:50 : squid_reconfigure: Remove old redirector options from Squid config.
              10.11.2010 11:48:50 : squid_reconfigure: Add new redirector options to Squid config.
              10.11.2010 11:50:38 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
              10.11.2010 11:50:38 : sg_reconfigure_user_db: Nothing. User destinations list empty.
              10.11.2010 11:50:38 : sg_create_config: add blacklist entries
              10.11.2010 11:50:38 : sg_create_config: added:
              blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

              10.11.2010 11:50:38 : sg_create_config: add rewrites: success safesearch;
              10.11.2010 11:50:38 : sg_create_config: add Default
              10.11.2010 11:50:38 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
              10.11.2010 11:50:38 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
              10.11.2010 11:50:38 : squid_reconfigure: Remove old redirector options from Squid config.
              10.11.2010 11:50:38 : squid_reconfigure: Add new redirector options to Squid config.
              10.11.2010 11:52:27 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
              10.11.2010 11:52:27 : sg_reconfigure_user_db: Nothing. User destinations list empty.
              10.11.2010 11:52:27 : sg_create_config: add blacklist entries
              10.11.2010 11:52:27 : sg_create_config: added:
              blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

              10.11.2010 11:52:27 : sg_create_config: add rewrites: success safesearch;
              10.11.2010 11:52:27 : sg_create_config: add Default
              10.11.2010 11:52:27 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
              10.11.2010 11:52:27 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
              10.11.2010 11:52:27 : squid_reconfigure: Remove old redirector options from Squid config.
              10.11.2010 11:52:27 : squid_reconfigure: Add new redirector options to Squid config.

              Squid config

              /usr/local/etc/squid/squid.conf

              Do not edit manually !

              http_port 192.168.1.1:3128
              icp_port 0

              pid_filename /var/run/squid.pid
              cache_effective_user proxy
              cache_effective_group proxy
              error_directory /usr/local/etc/squid/errors/English
              icon_directory /usr/local/etc/squid/icons
              visible_hostname localhost
              cache_mgr admin@localhost
              access_log /dev/null
              cache_log /var/squid/logs/cache.log
              cache_store_log none
              shutdown_lifetime 3 seconds
              uri_whitespace strip

              cache_mem 8 MB
              maximum_object_size_in_memory 32 KB
              memory_replacement_policy heap GDSF
              cache_replacement_policy heap LFUDA
              cache_dir ufs /var/squid/cache 100 16 256
              minimum_object_size 0 KB
              maximum_object_size 10 KB
              offline_mode off

              No redirector configured

              Setup some default acls

              acl all src 0.0.0.0/0.0.0.0
              acl localhost src 127.0.0.1/255.255.255.255
              acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901 3128 1025-65535
              acl sslports port 443 563
              acl manager proto cache_object
              acl purge method PURGE
              acl connect method CONNECT
              acl dynamic urlpath_regex cgi-bin ?
              cache deny dynamic
              http_access allow manager localhost

              http_access deny manager
              http_access allow purge localhost
              http_access deny purge
              http_access deny !safeports
              http_access deny CONNECT !sslports

              Always allow localhost connections

              http_access allow localhost

              request_body_max_size 0 KB
              reply_body_max_size 0 allow all
              delay_pools 1
              delay_class 1 2
              delay_parameters 1 -1/-1 -1/-1
              delay_initial_bucket_level 100
              delay_access 1 allow all

              Setup allowed acls

              Custom options

              redirect_program /usr/local/bin/squidGuard -c /usr/local/etc/squidGuard/squidGuard.conf
              redirector_bypass on
              redirect_children 3

              Default block all to be sure

              http_access deny all

              SG Config log

              /usr/local/etc/squidGuard/squidGuard.conf

              ============================================================

              SquidGuard configuration file

              This file generated automaticly with SquidGuard configurator

              (C)2006 Serg Dvoriancev

              email: dv_serg@mail.ru

              ============================================================

              logdir /var/squidGuard/log
              dbhome /var/db/squidGuard

              dest blk_BL_adv {
              domainlist blk_BL_adv/domains
              urllist blk_BL_adv/urls
              log block.log
              }

              dest blk_BL_aggressive {
              domainlist blk_BL_aggressive/domains
              urllist blk_BL_aggressive/urls
              log block.log
              }

              dest blk_BL_alcohol {
              domainlist blk_BL_alcohol/domains
              urllist blk_BL_alcohol/urls
              log block.log
              }

              dest blk_BL_automobile_bikes {
              domainlist blk_BL_automobile_bikes/domains
              urllist blk_BL_automobile_bikes/urls
              log block.log
              }

              dest blk_BL_automobile_boats {
              domainlist blk_BL_automobile_boats/domains
              urllist blk_BL_automobile_boats/urls
              log block.log
              }

              dest blk_BL_automobile_cars {
              domainlist blk_BL_automobile_cars/domains
              urllist blk_BL_automobile_cars/urls
              log block.log
              }

              dest blk_BL_automobile_planes {
              domainlist blk_BL_automobile_planes/domains
              urllist blk_BL_automobile_planes/urls
              log block.log
              }

              dest blk_BL_chat {
              domainlist blk_BL_chat/domains
              urllist blk_BL_chat/urls
              log block.log
              }

              dest blk_BL_costtraps {
              domainlist blk_BL_costtraps/domains
              urllist blk_BL_costtraps/urls
              log block.log
              }

              dest blk_BL_dating {
              domainlist blk_BL_dating/domains
              urllist blk_BL_dating/urls
              log block.log
              }

              dest blk_BL_downloads {
              domainlist blk_BL_downloads/domains
              urllist blk_BL_downloads/urls
              log block.log
              }

              dest blk_BL_drugs {
              domainlist blk_BL_drugs/domains
              urllist blk_BL_drugs/urls
              log block.log
              }

              dest blk_BL_dynamic {
              domainlist blk_BL_dynamic/domains
              urllist blk_BL_dynamic/urls
              log block.log
              }

              dest blk_BL_education_schools {
              domainlist blk_BL_education_schools/domains
              urllist blk_BL_education_schools/urls
              log block.log
              }

              dest blk_BL_finance_banking {
              domainlist blk_BL_finance_banking/domains
              urllist blk_BL_finance_banking/urls
              log block.log
              }

              dest blk_BL_finance_insurance {
              domainlist blk_BL_finance_insurance/domains
              urllist blk_BL_finance_insurance/urls
              log block.log
              }

              dest blk_BL_finance_moneylending {
              domainlist blk_BL_finance_moneylending/domains
              urllist blk_BL_finance_moneylending/urls
              log block.log
              }

              dest blk_BL_finance_other {
              domainlist blk_BL_finance_other/domains
              urllist blk_BL_finance_other/urls
              log block.log
              }

              dest blk_BL_finance_realestate {
              domainlist blk_BL_finance_realestate/domains
              urllist blk_BL_finance_realestate/urls
              log block.log
              }

              dest blk_BL_finance_trading {
              domainlist blk_BL_finance_trading/domains
              urllist blk_BL_finance_trading/urls
              log block.log
              }

              dest blk_BL_fortunetelling {
              domainlist blk_BL_fortunetelling/domains
              urllist blk_BL_fortunetelling/urls
              log block.log
              }

              dest blk_BL_forum {
              domainlist blk_BL_forum/domains
              urllist blk_BL_forum/urls
              log block.log
              }

              dest blk_BL_gamble {
              domainlist blk_BL_gamble/domains
              urllist blk_BL_gamble/urls
              log block.log
              }

              dest blk_BL_government {
              domainlist blk_BL_government/domains
              urllist blk_BL_government/urls
              log block.log
              }

              dest blk_BL_hacking {
              domainlist blk_BL_hacking/domains
              urllist blk_BL_hacking/urls
              log block.log
              }

              dest blk_BL_hobby_cooking {
              domainlist blk_BL_hobby_cooking/domains
              urllist blk_BL_hobby_cooking/urls
              log block.log
              }

              dest blk_BL_hobby_games-misc {
              domainlist blk_BL_hobby_games-misc/domains
              urllist blk_BL_hobby_games-misc/urls
              log block.log
              }

              dest blk_BL_hobby_games-online {
              domainlist blk_BL_hobby_games-online/domains
              urllist blk_BL_hobby_games-online/urls
              log block.log
              }

              dest blk_BL_hobby_gardening {
              domainlist blk_BL_hobby_gardening/domains
              urllist blk_BL_hobby_gardening/urls
              log block.log
              }

              dest blk_BL_hobby_pets {
              domainlist blk_BL_hobby_pets/domains
              urllist blk_BL_hobby_pets/urls
              log block.log
              }

              dest blk_BL_homestyle {
              domainlist blk_BL_homestyle/domains
              urllist blk_BL_homestyle/urls
              log block.log
              }

              dest blk_BL_hospitals {
              domainlist blk_BL_hospitals/domains
              urllist blk_BL_hospitals/urls
              log block.log
              }

              dest blk_BL_imagehosting {
              domainlist blk_BL_imagehosting/domains
              urllist blk_BL_imagehosting/urls
              log block.log
              }

              dest blk_BL_isp {
              domainlist blk_BL_isp/domains
              urllist blk_BL_isp/urls
              log block.log
              }

              dest blk_BL_jobsearch {
              domainlist blk_BL_jobsearch/domains
              urllist blk_BL_jobsearch/urls
              log block.log
              }

              dest blk_BL_library {
              domainlist blk_BL_library/domains
              urllist blk_BL_library/urls
              log block.log
              }

              dest blk_BL_military {
              domainlist blk_BL_military/domains
              urllist blk_BL_military/urls
              log block.log
              }

              dest blk_BL_models {
              domainlist blk_BL_models/domains
              urllist blk_BL_models/urls
              log block.log
              }

              dest blk_BL_movies {
              domainlist blk_BL_movies/domains
              urllist blk_BL_movies/urls
              log block.log
              }

              dest blk_BL_music {
              domainlist blk_BL_music/domains
              urllist blk_BL_music/urls
              log block.log
              }

              dest blk_BL_news {
              domainlist blk_BL_news/domains
              urllist blk_BL_news/urls
              log block.log
              }

              dest blk_BL_podcasts {
              domainlist blk_BL_podcasts/domains
              urllist blk_BL_podcasts/urls
              log block.log
              }

              dest blk_BL_politics {
              domainlist blk_BL_politics/domains
              urllist blk_BL_politics/urls
              log block.log
              }

              dest blk_BL_porn {
              domainlist blk_BL_porn/domains
              urllist blk_BL_porn/urls
              log block.log
              }

              dest blk_BL_radiotv {
              domainlist blk_BL_radiotv/domains
              urllist blk_BL_radiotv/urls
              log block.log
              }

              dest blk_BL_recreation_humor {
              domainlist blk_BL_recreation_humor/domains
              urllist blk_BL_recreation_humor/urls
              log block.log
              }

              dest blk_BL_recreation_martialarts {
              domainlist blk_BL_recreation_martialarts/domains
              urllist blk_BL_recreation_martialarts/urls
              log block.log
              }

              dest blk_BL_recreation_restaurants {
              domainlist blk_BL_recreation_restaurants/domains
              urllist blk_BL_recreation_restaurants/urls
              log block.log
              }

              dest blk_BL_recreation_sports {
              domainlist blk_BL_recreation_sports/domains
              urllist blk_BL_recreation_sports/urls
              log block.log
              }

              dest blk_BL_recreation_travel {
              domainlist blk_BL_recreation_travel/domains
              urllist blk_BL_recreation_travel/urls
              log block.log
              }

              dest blk_BL_recreation_wellness {
              domainlist blk_BL_recreation_wellness/domains
              urllist blk_BL_recreation_wellness/urls
              log block.log
              }

              dest blk_BL_redirector {
              domainlist blk_BL_redirector/domains
              urllist blk_BL_redirector/urls
              log block.log
              }

              dest blk_BL_religion {
              domainlist blk_BL_religion/domains
              urllist blk_BL_religion/urls
              log block.log
              }

              dest blk_BL_remotecontrol {
              domainlist blk_BL_remotecontrol/domains
              urllist blk_BL_remotecontrol/urls
              log block.log
              }

              dest blk_BL_ringtones {
              domainlist blk_BL_ringtones/domains
              urllist blk_BL_ringtones/urls
              log block.log
              }

              dest blk_BL_science_astronomy {
              domainlist blk_BL_science_astronomy/domains
              urllist blk_BL_science_astronomy/urls
              log block.log
              }

              dest blk_BL_science_chemistry {
              domainlist blk_BL_science_chemistry/domains
              urllist blk_BL_science_chemistry/urls
              log block.log
              }

              dest blk_BL_searchengines {
              domainlist blk_BL_searchengines/domains
              urllist blk_BL_searchengines/urls
              log block.log
              }

              dest blk_BL_sex_education {
              domainlist blk_BL_sex_education/domains
              urllist blk_BL_sex_education/urls
              log block.log
              }

              dest blk_BL_sex_lingerie {
              domainlist blk_BL_sex_lingerie/domains
              urllist blk_BL_sex_lingerie/urls
              log block.log
              }

              dest blk_BL_shopping {
              domainlist blk_BL_shopping/domains
              urllist blk_BL_shopping/urls
              log block.log
              }

              dest blk_BL_socialnet {
              domainlist blk_BL_socialnet/domains
              urllist blk_BL_socialnet/urls
              log block.log
              }

              dest blk_BL_spyware {
              domainlist blk_BL_spyware/domains
              urllist blk_BL_spyware/urls
              log block.log
              }

              dest blk_BL_tracker {
              domainlist blk_BL_tracker/domains
              urllist blk_BL_tracker/urls
              log block.log
              }

              dest blk_BL_updatesites {
              domainlist blk_BL_updatesites/domains
              urllist blk_BL_updatesites/urls
              log block.log
              }

              dest blk_BL_violence {
              domainlist blk_BL_violence/domains
              urllist blk_BL_violence/urls
              log block.log
              }

              dest blk_BL_warez {
              domainlist blk_BL_warez/domains
              urllist blk_BL_warez/urls
              log block.log
              }

              dest blk_BL_weapons {
              domainlist blk_BL_weapons/domains
              urllist blk_BL_weapons/urls
              log block.log
              }

              dest blk_BL_webmail {
              domainlist blk_BL_webmail/domains
              urllist blk_BL_webmail/urls
              log block.log
              }

              dest blk_BL_webphone {
              domainlist blk_BL_webphone/domains
              urllist blk_BL_webphone/urls
              log block.log
              }

              dest blk_BL_webradio {
              domainlist blk_BL_webradio/domains
              urllist blk_BL_webradio/urls
              log block.log
              }

              dest blk_BL_webtv {
              domainlist blk_BL_webtv/domains
              urllist blk_BL_webtv/urls
              log block.log
              }

              rew safesearch {
              s@(google../search?.q=.)@\1&safe=active@i
              s@(google..
              /images.q=.)@\1&safe=active@i
              s@(google../groups.q=.)@\1&safe=active@i
              s@(google..
              /news.q=.)@\1&safe=active@i
              s@(yandex../yandsearch?.text=.)@\1&fyandex=1@i
              s@(search.yahoo..
              /search.p=.)@\1&vm=r@i
              s@(search.live../.q=.)@\1&adlt=strict@i
              s@(search.msn..
              /.q=.)@\1&adlt=strict@i
              log block.log
              }

              acl {

              default {
              pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none
              redirect http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
              rewrite safesearch
              log block.log
              }
              }

              1 Reply Last reply Reply Quote 0
              • D
                dvserg
                last edited by

                pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none

                In Default Tab you setup default rule (last rule) to deny -> result: you clients can't browse sites.
                Setup this rule as allow - this mean what you allow All sites, but deny blacklisted sites.

                SquidGuardDoc EN  RU Tutorial
                Localization ru_PFSense

                1 Reply Last reply Reply Quote 0
                • N
                  nambi
                  last edited by

                  Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.

                  Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                  Thank You,

                  1 Reply Last reply Reply Quote 0
                  • D
                    dvserg
                    last edited by

                    @nambi:

                    Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.
                    Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                    Not sure, permissions check each time while you configure SG.
                    Please do this :

                    • disable squid transparent mode if you use.
                    • delete Bypass Proxy option in squid (if you enter this option)
                    • check squid selected interface / to be sure /
                    • enter to you browser proxy option as squid configured (PFSenseLanIP:Port) (192.168.1.1:3128)
                    • in squid Custom options change redirector_bypass on -> redirector_bypass off

                    How browse sites now ?

                    SquidGuardDoc EN  RU Tutorial
                    Localization ru_PFSense

                    1 Reply Last reply Reply Quote 0
                    • N
                      nambi
                      last edited by

                      Sorry to pester you with this, when I Installed squid and squid guard I had only setup the "proxy filter area" I did not change any of the "proxy server" side, should I be? or do the default settings work?

                      Also when I try to change a few settings under proxy server I get an error saving stating.

                      The following input errors were detected:

                      * The field 'Log store directory' is required.
                          * The field 'Proxy port' is required.
                          * You must start log location with a / mark
                          * That is not a valid log location dir

                      This is because I had never initially set this up.  Would this be the problem?

                      1 Reply Last reply Reply Quote 0
                      • D
                        dvserg
                        last edited by

                        The following input errors were detected:

                        * The field 'Log store directory' is required. > /
                            * The field 'Proxy port' is required.
                            * You must start log location with a / mark
                            * That is not a valid log location dir

                        Port 3128
                        Dir /var/squid/logs

                        SquidGuardDoc EN  RU Tutorial
                        Localization ru_PFSense

                        1 Reply Last reply Reply Quote 0
                        • N
                          nambi
                          last edited by

                          Thank You
                          Thank You
                          Thank You!

                          it's working now, it was the settings I omitted in the proxy server area which prevented the blocking to work.

                          though these settings are enabled, and if they are not the blocking is bypassed

                          • squid transparent mode if you use.
                          • Bypass Proxy option in squid (if you enter this option)

                          I also set the port you specified, can you use any port or is 3128 what is recommend?

                          1 Reply Last reply Reply Quote 0
                          • D
                            dvserg
                            last edited by

                            @nambi:

                            I also set the port you specified, can you use any port or is 3128 what is recommend?

                            Default port is 3128

                            SquidGuardDoc EN  RU Tutorial
                            Localization ru_PFSense

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.