Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Installed Squid and Squidguard but it's not filtering.

    Scheduled Pinned Locked Moved pfSense Packages
    14 Posts 3 Posters 11.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      dvserg
      last edited by

      @nambi:

      Log type 
      squidguard_log report disabled

      Enable this option and look this log for error messages.
      Check squidGuard servicxe status.

      SquidGuardDoc EN  RU Tutorial
      Localization ru_PFSense

      1 Reply Last reply Reply Quote 0
      • N Offline
        nambi
        last edited by

        It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

        Thanks

        1 Reply Last reply Reply Quote 0
        • D Offline
          dvserg
          last edited by

          @nambi:

          It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

          Thanks

          Be sure, what you browser configured for proxy use.
          And show you squidGuard config (look last Page/Tab)

          SquidGuardDoc EN  RU Tutorial
          Localization ru_PFSense

          1 Reply Last reply Reply Quote 0
          • N Offline
            nambi
            last edited by

            My browser settings are Default just as it was before when it worked.

            SG log

            /var/squidGuard/log/sg_configurator.log
            10.11.2010 11:48:50 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
            10.11.2010 11:48:50 : sg_reconfigure_user_db: Nothing. User destinations list empty.
            10.11.2010 11:48:50 : sg_create_config: add blacklist entries
            10.11.2010 11:48:50 : sg_create_config: added:
            blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

            10.11.2010 11:48:50 : sg_create_config: add rewrites: success safesearch;
            10.11.2010 11:48:50 : sg_create_config: add Default
            10.11.2010 11:48:50 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
            10.11.2010 11:48:50 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
            10.11.2010 11:48:50 : squid_reconfigure: Remove old redirector options from Squid config.
            10.11.2010 11:48:50 : squid_reconfigure: Add new redirector options to Squid config.
            10.11.2010 11:50:38 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
            10.11.2010 11:50:38 : sg_reconfigure_user_db: Nothing. User destinations list empty.
            10.11.2010 11:50:38 : sg_create_config: add blacklist entries
            10.11.2010 11:50:38 : sg_create_config: added:
            blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

            10.11.2010 11:50:38 : sg_create_config: add rewrites: success safesearch;
            10.11.2010 11:50:38 : sg_create_config: add Default
            10.11.2010 11:50:38 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
            10.11.2010 11:50:38 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
            10.11.2010 11:50:38 : squid_reconfigure: Remove old redirector options from Squid config.
            10.11.2010 11:50:38 : squid_reconfigure: Add new redirector options to Squid config.
            10.11.2010 11:52:27 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
            10.11.2010 11:52:27 : sg_reconfigure_user_db: Nothing. User destinations list empty.
            10.11.2010 11:52:27 : sg_create_config: add blacklist entries
            10.11.2010 11:52:27 : sg_create_config: added:
            blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

            10.11.2010 11:52:27 : sg_create_config: add rewrites: success safesearch;
            10.11.2010 11:52:27 : sg_create_config: add Default
            10.11.2010 11:52:27 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
            10.11.2010 11:52:27 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
            10.11.2010 11:52:27 : squid_reconfigure: Remove old redirector options from Squid config.
            10.11.2010 11:52:27 : squid_reconfigure: Add new redirector options to Squid config.

            Squid config

            /usr/local/etc/squid/squid.conf

            Do not edit manually !

            http_port 192.168.1.1:3128
            icp_port 0

            pid_filename /var/run/squid.pid
            cache_effective_user proxy
            cache_effective_group proxy
            error_directory /usr/local/etc/squid/errors/English
            icon_directory /usr/local/etc/squid/icons
            visible_hostname localhost
            cache_mgr admin@localhost
            access_log /dev/null
            cache_log /var/squid/logs/cache.log
            cache_store_log none
            shutdown_lifetime 3 seconds
            uri_whitespace strip

            cache_mem 8 MB
            maximum_object_size_in_memory 32 KB
            memory_replacement_policy heap GDSF
            cache_replacement_policy heap LFUDA
            cache_dir ufs /var/squid/cache 100 16 256
            minimum_object_size 0 KB
            maximum_object_size 10 KB
            offline_mode off

            No redirector configured

            Setup some default acls

            acl all src 0.0.0.0/0.0.0.0
            acl localhost src 127.0.0.1/255.255.255.255
            acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901 3128 1025-65535
            acl sslports port 443 563
            acl manager proto cache_object
            acl purge method PURGE
            acl connect method CONNECT
            acl dynamic urlpath_regex cgi-bin ?
            cache deny dynamic
            http_access allow manager localhost

            http_access deny manager
            http_access allow purge localhost
            http_access deny purge
            http_access deny !safeports
            http_access deny CONNECT !sslports

            Always allow localhost connections

            http_access allow localhost

            request_body_max_size 0 KB
            reply_body_max_size 0 allow all
            delay_pools 1
            delay_class 1 2
            delay_parameters 1 -1/-1 -1/-1
            delay_initial_bucket_level 100
            delay_access 1 allow all

            Setup allowed acls

            Custom options

            redirect_program /usr/local/bin/squidGuard -c /usr/local/etc/squidGuard/squidGuard.conf
            redirector_bypass on
            redirect_children 3

            Default block all to be sure

            http_access deny all

            SG Config log

            /usr/local/etc/squidGuard/squidGuard.conf

            ============================================================

            SquidGuard configuration file

            This file generated automaticly with SquidGuard configurator

            (C)2006 Serg Dvoriancev

            email: dv_serg@mail.ru

            ============================================================

            logdir /var/squidGuard/log
            dbhome /var/db/squidGuard

            dest blk_BL_adv {
            domainlist blk_BL_adv/domains
            urllist blk_BL_adv/urls
            log block.log
            }

            dest blk_BL_aggressive {
            domainlist blk_BL_aggressive/domains
            urllist blk_BL_aggressive/urls
            log block.log
            }

            dest blk_BL_alcohol {
            domainlist blk_BL_alcohol/domains
            urllist blk_BL_alcohol/urls
            log block.log
            }

            dest blk_BL_automobile_bikes {
            domainlist blk_BL_automobile_bikes/domains
            urllist blk_BL_automobile_bikes/urls
            log block.log
            }

            dest blk_BL_automobile_boats {
            domainlist blk_BL_automobile_boats/domains
            urllist blk_BL_automobile_boats/urls
            log block.log
            }

            dest blk_BL_automobile_cars {
            domainlist blk_BL_automobile_cars/domains
            urllist blk_BL_automobile_cars/urls
            log block.log
            }

            dest blk_BL_automobile_planes {
            domainlist blk_BL_automobile_planes/domains
            urllist blk_BL_automobile_planes/urls
            log block.log
            }

            dest blk_BL_chat {
            domainlist blk_BL_chat/domains
            urllist blk_BL_chat/urls
            log block.log
            }

            dest blk_BL_costtraps {
            domainlist blk_BL_costtraps/domains
            urllist blk_BL_costtraps/urls
            log block.log
            }

            dest blk_BL_dating {
            domainlist blk_BL_dating/domains
            urllist blk_BL_dating/urls
            log block.log
            }

            dest blk_BL_downloads {
            domainlist blk_BL_downloads/domains
            urllist blk_BL_downloads/urls
            log block.log
            }

            dest blk_BL_drugs {
            domainlist blk_BL_drugs/domains
            urllist blk_BL_drugs/urls
            log block.log
            }

            dest blk_BL_dynamic {
            domainlist blk_BL_dynamic/domains
            urllist blk_BL_dynamic/urls
            log block.log
            }

            dest blk_BL_education_schools {
            domainlist blk_BL_education_schools/domains
            urllist blk_BL_education_schools/urls
            log block.log
            }

            dest blk_BL_finance_banking {
            domainlist blk_BL_finance_banking/domains
            urllist blk_BL_finance_banking/urls
            log block.log
            }

            dest blk_BL_finance_insurance {
            domainlist blk_BL_finance_insurance/domains
            urllist blk_BL_finance_insurance/urls
            log block.log
            }

            dest blk_BL_finance_moneylending {
            domainlist blk_BL_finance_moneylending/domains
            urllist blk_BL_finance_moneylending/urls
            log block.log
            }

            dest blk_BL_finance_other {
            domainlist blk_BL_finance_other/domains
            urllist blk_BL_finance_other/urls
            log block.log
            }

            dest blk_BL_finance_realestate {
            domainlist blk_BL_finance_realestate/domains
            urllist blk_BL_finance_realestate/urls
            log block.log
            }

            dest blk_BL_finance_trading {
            domainlist blk_BL_finance_trading/domains
            urllist blk_BL_finance_trading/urls
            log block.log
            }

            dest blk_BL_fortunetelling {
            domainlist blk_BL_fortunetelling/domains
            urllist blk_BL_fortunetelling/urls
            log block.log
            }

            dest blk_BL_forum {
            domainlist blk_BL_forum/domains
            urllist blk_BL_forum/urls
            log block.log
            }

            dest blk_BL_gamble {
            domainlist blk_BL_gamble/domains
            urllist blk_BL_gamble/urls
            log block.log
            }

            dest blk_BL_government {
            domainlist blk_BL_government/domains
            urllist blk_BL_government/urls
            log block.log
            }

            dest blk_BL_hacking {
            domainlist blk_BL_hacking/domains
            urllist blk_BL_hacking/urls
            log block.log
            }

            dest blk_BL_hobby_cooking {
            domainlist blk_BL_hobby_cooking/domains
            urllist blk_BL_hobby_cooking/urls
            log block.log
            }

            dest blk_BL_hobby_games-misc {
            domainlist blk_BL_hobby_games-misc/domains
            urllist blk_BL_hobby_games-misc/urls
            log block.log
            }

            dest blk_BL_hobby_games-online {
            domainlist blk_BL_hobby_games-online/domains
            urllist blk_BL_hobby_games-online/urls
            log block.log
            }

            dest blk_BL_hobby_gardening {
            domainlist blk_BL_hobby_gardening/domains
            urllist blk_BL_hobby_gardening/urls
            log block.log
            }

            dest blk_BL_hobby_pets {
            domainlist blk_BL_hobby_pets/domains
            urllist blk_BL_hobby_pets/urls
            log block.log
            }

            dest blk_BL_homestyle {
            domainlist blk_BL_homestyle/domains
            urllist blk_BL_homestyle/urls
            log block.log
            }

            dest blk_BL_hospitals {
            domainlist blk_BL_hospitals/domains
            urllist blk_BL_hospitals/urls
            log block.log
            }

            dest blk_BL_imagehosting {
            domainlist blk_BL_imagehosting/domains
            urllist blk_BL_imagehosting/urls
            log block.log
            }

            dest blk_BL_isp {
            domainlist blk_BL_isp/domains
            urllist blk_BL_isp/urls
            log block.log
            }

            dest blk_BL_jobsearch {
            domainlist blk_BL_jobsearch/domains
            urllist blk_BL_jobsearch/urls
            log block.log
            }

            dest blk_BL_library {
            domainlist blk_BL_library/domains
            urllist blk_BL_library/urls
            log block.log
            }

            dest blk_BL_military {
            domainlist blk_BL_military/domains
            urllist blk_BL_military/urls
            log block.log
            }

            dest blk_BL_models {
            domainlist blk_BL_models/domains
            urllist blk_BL_models/urls
            log block.log
            }

            dest blk_BL_movies {
            domainlist blk_BL_movies/domains
            urllist blk_BL_movies/urls
            log block.log
            }

            dest blk_BL_music {
            domainlist blk_BL_music/domains
            urllist blk_BL_music/urls
            log block.log
            }

            dest blk_BL_news {
            domainlist blk_BL_news/domains
            urllist blk_BL_news/urls
            log block.log
            }

            dest blk_BL_podcasts {
            domainlist blk_BL_podcasts/domains
            urllist blk_BL_podcasts/urls
            log block.log
            }

            dest blk_BL_politics {
            domainlist blk_BL_politics/domains
            urllist blk_BL_politics/urls
            log block.log
            }

            dest blk_BL_porn {
            domainlist blk_BL_porn/domains
            urllist blk_BL_porn/urls
            log block.log
            }

            dest blk_BL_radiotv {
            domainlist blk_BL_radiotv/domains
            urllist blk_BL_radiotv/urls
            log block.log
            }

            dest blk_BL_recreation_humor {
            domainlist blk_BL_recreation_humor/domains
            urllist blk_BL_recreation_humor/urls
            log block.log
            }

            dest blk_BL_recreation_martialarts {
            domainlist blk_BL_recreation_martialarts/domains
            urllist blk_BL_recreation_martialarts/urls
            log block.log
            }

            dest blk_BL_recreation_restaurants {
            domainlist blk_BL_recreation_restaurants/domains
            urllist blk_BL_recreation_restaurants/urls
            log block.log
            }

            dest blk_BL_recreation_sports {
            domainlist blk_BL_recreation_sports/domains
            urllist blk_BL_recreation_sports/urls
            log block.log
            }

            dest blk_BL_recreation_travel {
            domainlist blk_BL_recreation_travel/domains
            urllist blk_BL_recreation_travel/urls
            log block.log
            }

            dest blk_BL_recreation_wellness {
            domainlist blk_BL_recreation_wellness/domains
            urllist blk_BL_recreation_wellness/urls
            log block.log
            }

            dest blk_BL_redirector {
            domainlist blk_BL_redirector/domains
            urllist blk_BL_redirector/urls
            log block.log
            }

            dest blk_BL_religion {
            domainlist blk_BL_religion/domains
            urllist blk_BL_religion/urls
            log block.log
            }

            dest blk_BL_remotecontrol {
            domainlist blk_BL_remotecontrol/domains
            urllist blk_BL_remotecontrol/urls
            log block.log
            }

            dest blk_BL_ringtones {
            domainlist blk_BL_ringtones/domains
            urllist blk_BL_ringtones/urls
            log block.log
            }

            dest blk_BL_science_astronomy {
            domainlist blk_BL_science_astronomy/domains
            urllist blk_BL_science_astronomy/urls
            log block.log
            }

            dest blk_BL_science_chemistry {
            domainlist blk_BL_science_chemistry/domains
            urllist blk_BL_science_chemistry/urls
            log block.log
            }

            dest blk_BL_searchengines {
            domainlist blk_BL_searchengines/domains
            urllist blk_BL_searchengines/urls
            log block.log
            }

            dest blk_BL_sex_education {
            domainlist blk_BL_sex_education/domains
            urllist blk_BL_sex_education/urls
            log block.log
            }

            dest blk_BL_sex_lingerie {
            domainlist blk_BL_sex_lingerie/domains
            urllist blk_BL_sex_lingerie/urls
            log block.log
            }

            dest blk_BL_shopping {
            domainlist blk_BL_shopping/domains
            urllist blk_BL_shopping/urls
            log block.log
            }

            dest blk_BL_socialnet {
            domainlist blk_BL_socialnet/domains
            urllist blk_BL_socialnet/urls
            log block.log
            }

            dest blk_BL_spyware {
            domainlist blk_BL_spyware/domains
            urllist blk_BL_spyware/urls
            log block.log
            }

            dest blk_BL_tracker {
            domainlist blk_BL_tracker/domains
            urllist blk_BL_tracker/urls
            log block.log
            }

            dest blk_BL_updatesites {
            domainlist blk_BL_updatesites/domains
            urllist blk_BL_updatesites/urls
            log block.log
            }

            dest blk_BL_violence {
            domainlist blk_BL_violence/domains
            urllist blk_BL_violence/urls
            log block.log
            }

            dest blk_BL_warez {
            domainlist blk_BL_warez/domains
            urllist blk_BL_warez/urls
            log block.log
            }

            dest blk_BL_weapons {
            domainlist blk_BL_weapons/domains
            urllist blk_BL_weapons/urls
            log block.log
            }

            dest blk_BL_webmail {
            domainlist blk_BL_webmail/domains
            urllist blk_BL_webmail/urls
            log block.log
            }

            dest blk_BL_webphone {
            domainlist blk_BL_webphone/domains
            urllist blk_BL_webphone/urls
            log block.log
            }

            dest blk_BL_webradio {
            domainlist blk_BL_webradio/domains
            urllist blk_BL_webradio/urls
            log block.log
            }

            dest blk_BL_webtv {
            domainlist blk_BL_webtv/domains
            urllist blk_BL_webtv/urls
            log block.log
            }

            rew safesearch {
            s@(google../search?.q=.)@\1&safe=active@i
            s@(google..
            /images.q=.)@\1&safe=active@i
            s@(google../groups.q=.)@\1&safe=active@i
            s@(google..
            /news.q=.)@\1&safe=active@i
            s@(yandex../yandsearch?.text=.)@\1&fyandex=1@i
            s@(search.yahoo..
            /search.p=.)@\1&vm=r@i
            s@(search.live../.q=.)@\1&adlt=strict@i
            s@(search.msn..
            /.q=.)@\1&adlt=strict@i
            log block.log
            }

            acl {

            default {
            pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none
            redirect http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
            rewrite safesearch
            log block.log
            }
            }

            1 Reply Last reply Reply Quote 0
            • D Offline
              dvserg
              last edited by

              pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none

              In Default Tab you setup default rule (last rule) to deny -> result: you clients can't browse sites.
              Setup this rule as allow - this mean what you allow All sites, but deny blacklisted sites.

              SquidGuardDoc EN  RU Tutorial
              Localization ru_PFSense

              1 Reply Last reply Reply Quote 0
              • N Offline
                nambi
                last edited by

                Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.

                Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                Thank You,

                1 Reply Last reply Reply Quote 0
                • D Offline
                  dvserg
                  last edited by

                  @nambi:

                  Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.
                  Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                  Not sure, permissions check each time while you configure SG.
                  Please do this :

                  • disable squid transparent mode if you use.
                  • delete Bypass Proxy option in squid (if you enter this option)
                  • check squid selected interface / to be sure /
                  • enter to you browser proxy option as squid configured (PFSenseLanIP:Port) (192.168.1.1:3128)
                  • in squid Custom options change redirector_bypass on -> redirector_bypass off

                  How browse sites now ?

                  SquidGuardDoc EN  RU Tutorial
                  Localization ru_PFSense

                  1 Reply Last reply Reply Quote 0
                  • N Offline
                    nambi
                    last edited by

                    Sorry to pester you with this, when I Installed squid and squid guard I had only setup the "proxy filter area" I did not change any of the "proxy server" side, should I be? or do the default settings work?

                    Also when I try to change a few settings under proxy server I get an error saving stating.

                    The following input errors were detected:

                    * The field 'Log store directory' is required.
                        * The field 'Proxy port' is required.
                        * You must start log location with a / mark
                        * That is not a valid log location dir

                    This is because I had never initially set this up.  Would this be the problem?

                    1 Reply Last reply Reply Quote 0
                    • D Offline
                      dvserg
                      last edited by

                      The following input errors were detected:

                      * The field 'Log store directory' is required. > /
                          * The field 'Proxy port' is required.
                          * You must start log location with a / mark
                          * That is not a valid log location dir

                      Port 3128
                      Dir /var/squid/logs

                      SquidGuardDoc EN  RU Tutorial
                      Localization ru_PFSense

                      1 Reply Last reply Reply Quote 0
                      • N Offline
                        nambi
                        last edited by

                        Thank You
                        Thank You
                        Thank You!

                        it's working now, it was the settings I omitted in the proxy server area which prevented the blocking to work.

                        though these settings are enabled, and if they are not the blocking is bypassed

                        • squid transparent mode if you use.
                        • Bypass Proxy option in squid (if you enter this option)

                        I also set the port you specified, can you use any port or is 3128 what is recommend?

                        1 Reply Last reply Reply Quote 0
                        • D Offline
                          dvserg
                          last edited by

                          @nambi:

                          I also set the port you specified, can you use any port or is 3128 what is recommend?

                          Default port is 3128

                          SquidGuardDoc EN  RU Tutorial
                          Localization ru_PFSense

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.