Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Installed Squid and Squidguard but it's not filtering.

    Scheduled Pinned Locked Moved pfSense Packages
    14 Posts 3 Posters 11.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      nambi
      last edited by

      It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

      Thanks

      1 Reply Last reply Reply Quote 0
      • D
        dvserg
        last edited by

        @nambi:

        It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

        Thanks

        Be sure, what you browser configured for proxy use.
        And show you squidGuard config (look last Page/Tab)

        SquidGuardDoc EN  RU Tutorial
        Localization ru_PFSense

        1 Reply Last reply Reply Quote 0
        • N
          nambi
          last edited by

          My browser settings are Default just as it was before when it worked.

          SG log

          /var/squidGuard/log/sg_configurator.log
          10.11.2010 11:48:50 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
          10.11.2010 11:48:50 : sg_reconfigure_user_db: Nothing. User destinations list empty.
          10.11.2010 11:48:50 : sg_create_config: add blacklist entries
          10.11.2010 11:48:50 : sg_create_config: added:
          blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

          10.11.2010 11:48:50 : sg_create_config: add rewrites: success safesearch;
          10.11.2010 11:48:50 : sg_create_config: add Default
          10.11.2010 11:48:50 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
          10.11.2010 11:48:50 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
          10.11.2010 11:48:50 : squid_reconfigure: Remove old redirector options from Squid config.
          10.11.2010 11:48:50 : squid_reconfigure: Add new redirector options to Squid config.
          10.11.2010 11:50:38 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
          10.11.2010 11:50:38 : sg_reconfigure_user_db: Nothing. User destinations list empty.
          10.11.2010 11:50:38 : sg_create_config: add blacklist entries
          10.11.2010 11:50:38 : sg_create_config: added:
          blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

          10.11.2010 11:50:38 : sg_create_config: add rewrites: success safesearch;
          10.11.2010 11:50:38 : sg_create_config: add Default
          10.11.2010 11:50:38 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
          10.11.2010 11:50:38 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
          10.11.2010 11:50:38 : squid_reconfigure: Remove old redirector options from Squid config.
          10.11.2010 11:50:38 : squid_reconfigure: Add new redirector options to Squid config.
          10.11.2010 11:52:27 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
          10.11.2010 11:52:27 : sg_reconfigure_user_db: Nothing. User destinations list empty.
          10.11.2010 11:52:27 : sg_create_config: add blacklist entries
          10.11.2010 11:52:27 : sg_create_config: added:
          blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

          10.11.2010 11:52:27 : sg_create_config: add rewrites: success safesearch;
          10.11.2010 11:52:27 : sg_create_config: add Default
          10.11.2010 11:52:27 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
          10.11.2010 11:52:27 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
          10.11.2010 11:52:27 : squid_reconfigure: Remove old redirector options from Squid config.
          10.11.2010 11:52:27 : squid_reconfigure: Add new redirector options to Squid config.

          Squid config

          /usr/local/etc/squid/squid.conf

          Do not edit manually !

          http_port 192.168.1.1:3128
          icp_port 0

          pid_filename /var/run/squid.pid
          cache_effective_user proxy
          cache_effective_group proxy
          error_directory /usr/local/etc/squid/errors/English
          icon_directory /usr/local/etc/squid/icons
          visible_hostname localhost
          cache_mgr admin@localhost
          access_log /dev/null
          cache_log /var/squid/logs/cache.log
          cache_store_log none
          shutdown_lifetime 3 seconds
          uri_whitespace strip

          cache_mem 8 MB
          maximum_object_size_in_memory 32 KB
          memory_replacement_policy heap GDSF
          cache_replacement_policy heap LFUDA
          cache_dir ufs /var/squid/cache 100 16 256
          minimum_object_size 0 KB
          maximum_object_size 10 KB
          offline_mode off

          No redirector configured

          Setup some default acls

          acl all src 0.0.0.0/0.0.0.0
          acl localhost src 127.0.0.1/255.255.255.255
          acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901 3128 1025-65535
          acl sslports port 443 563
          acl manager proto cache_object
          acl purge method PURGE
          acl connect method CONNECT
          acl dynamic urlpath_regex cgi-bin ?
          cache deny dynamic
          http_access allow manager localhost

          http_access deny manager
          http_access allow purge localhost
          http_access deny purge
          http_access deny !safeports
          http_access deny CONNECT !sslports

          Always allow localhost connections

          http_access allow localhost

          request_body_max_size 0 KB
          reply_body_max_size 0 allow all
          delay_pools 1
          delay_class 1 2
          delay_parameters 1 -1/-1 -1/-1
          delay_initial_bucket_level 100
          delay_access 1 allow all

          Setup allowed acls

          Custom options

          redirect_program /usr/local/bin/squidGuard -c /usr/local/etc/squidGuard/squidGuard.conf
          redirector_bypass on
          redirect_children 3

          Default block all to be sure

          http_access deny all

          SG Config log

          /usr/local/etc/squidGuard/squidGuard.conf

          ============================================================

          SquidGuard configuration file

          This file generated automaticly with SquidGuard configurator

          (C)2006 Serg Dvoriancev

          email: dv_serg@mail.ru

          ============================================================

          logdir /var/squidGuard/log
          dbhome /var/db/squidGuard

          dest blk_BL_adv {
          domainlist blk_BL_adv/domains
          urllist blk_BL_adv/urls
          log block.log
          }

          dest blk_BL_aggressive {
          domainlist blk_BL_aggressive/domains
          urllist blk_BL_aggressive/urls
          log block.log
          }

          dest blk_BL_alcohol {
          domainlist blk_BL_alcohol/domains
          urllist blk_BL_alcohol/urls
          log block.log
          }

          dest blk_BL_automobile_bikes {
          domainlist blk_BL_automobile_bikes/domains
          urllist blk_BL_automobile_bikes/urls
          log block.log
          }

          dest blk_BL_automobile_boats {
          domainlist blk_BL_automobile_boats/domains
          urllist blk_BL_automobile_boats/urls
          log block.log
          }

          dest blk_BL_automobile_cars {
          domainlist blk_BL_automobile_cars/domains
          urllist blk_BL_automobile_cars/urls
          log block.log
          }

          dest blk_BL_automobile_planes {
          domainlist blk_BL_automobile_planes/domains
          urllist blk_BL_automobile_planes/urls
          log block.log
          }

          dest blk_BL_chat {
          domainlist blk_BL_chat/domains
          urllist blk_BL_chat/urls
          log block.log
          }

          dest blk_BL_costtraps {
          domainlist blk_BL_costtraps/domains
          urllist blk_BL_costtraps/urls
          log block.log
          }

          dest blk_BL_dating {
          domainlist blk_BL_dating/domains
          urllist blk_BL_dating/urls
          log block.log
          }

          dest blk_BL_downloads {
          domainlist blk_BL_downloads/domains
          urllist blk_BL_downloads/urls
          log block.log
          }

          dest blk_BL_drugs {
          domainlist blk_BL_drugs/domains
          urllist blk_BL_drugs/urls
          log block.log
          }

          dest blk_BL_dynamic {
          domainlist blk_BL_dynamic/domains
          urllist blk_BL_dynamic/urls
          log block.log
          }

          dest blk_BL_education_schools {
          domainlist blk_BL_education_schools/domains
          urllist blk_BL_education_schools/urls
          log block.log
          }

          dest blk_BL_finance_banking {
          domainlist blk_BL_finance_banking/domains
          urllist blk_BL_finance_banking/urls
          log block.log
          }

          dest blk_BL_finance_insurance {
          domainlist blk_BL_finance_insurance/domains
          urllist blk_BL_finance_insurance/urls
          log block.log
          }

          dest blk_BL_finance_moneylending {
          domainlist blk_BL_finance_moneylending/domains
          urllist blk_BL_finance_moneylending/urls
          log block.log
          }

          dest blk_BL_finance_other {
          domainlist blk_BL_finance_other/domains
          urllist blk_BL_finance_other/urls
          log block.log
          }

          dest blk_BL_finance_realestate {
          domainlist blk_BL_finance_realestate/domains
          urllist blk_BL_finance_realestate/urls
          log block.log
          }

          dest blk_BL_finance_trading {
          domainlist blk_BL_finance_trading/domains
          urllist blk_BL_finance_trading/urls
          log block.log
          }

          dest blk_BL_fortunetelling {
          domainlist blk_BL_fortunetelling/domains
          urllist blk_BL_fortunetelling/urls
          log block.log
          }

          dest blk_BL_forum {
          domainlist blk_BL_forum/domains
          urllist blk_BL_forum/urls
          log block.log
          }

          dest blk_BL_gamble {
          domainlist blk_BL_gamble/domains
          urllist blk_BL_gamble/urls
          log block.log
          }

          dest blk_BL_government {
          domainlist blk_BL_government/domains
          urllist blk_BL_government/urls
          log block.log
          }

          dest blk_BL_hacking {
          domainlist blk_BL_hacking/domains
          urllist blk_BL_hacking/urls
          log block.log
          }

          dest blk_BL_hobby_cooking {
          domainlist blk_BL_hobby_cooking/domains
          urllist blk_BL_hobby_cooking/urls
          log block.log
          }

          dest blk_BL_hobby_games-misc {
          domainlist blk_BL_hobby_games-misc/domains
          urllist blk_BL_hobby_games-misc/urls
          log block.log
          }

          dest blk_BL_hobby_games-online {
          domainlist blk_BL_hobby_games-online/domains
          urllist blk_BL_hobby_games-online/urls
          log block.log
          }

          dest blk_BL_hobby_gardening {
          domainlist blk_BL_hobby_gardening/domains
          urllist blk_BL_hobby_gardening/urls
          log block.log
          }

          dest blk_BL_hobby_pets {
          domainlist blk_BL_hobby_pets/domains
          urllist blk_BL_hobby_pets/urls
          log block.log
          }

          dest blk_BL_homestyle {
          domainlist blk_BL_homestyle/domains
          urllist blk_BL_homestyle/urls
          log block.log
          }

          dest blk_BL_hospitals {
          domainlist blk_BL_hospitals/domains
          urllist blk_BL_hospitals/urls
          log block.log
          }

          dest blk_BL_imagehosting {
          domainlist blk_BL_imagehosting/domains
          urllist blk_BL_imagehosting/urls
          log block.log
          }

          dest blk_BL_isp {
          domainlist blk_BL_isp/domains
          urllist blk_BL_isp/urls
          log block.log
          }

          dest blk_BL_jobsearch {
          domainlist blk_BL_jobsearch/domains
          urllist blk_BL_jobsearch/urls
          log block.log
          }

          dest blk_BL_library {
          domainlist blk_BL_library/domains
          urllist blk_BL_library/urls
          log block.log
          }

          dest blk_BL_military {
          domainlist blk_BL_military/domains
          urllist blk_BL_military/urls
          log block.log
          }

          dest blk_BL_models {
          domainlist blk_BL_models/domains
          urllist blk_BL_models/urls
          log block.log
          }

          dest blk_BL_movies {
          domainlist blk_BL_movies/domains
          urllist blk_BL_movies/urls
          log block.log
          }

          dest blk_BL_music {
          domainlist blk_BL_music/domains
          urllist blk_BL_music/urls
          log block.log
          }

          dest blk_BL_news {
          domainlist blk_BL_news/domains
          urllist blk_BL_news/urls
          log block.log
          }

          dest blk_BL_podcasts {
          domainlist blk_BL_podcasts/domains
          urllist blk_BL_podcasts/urls
          log block.log
          }

          dest blk_BL_politics {
          domainlist blk_BL_politics/domains
          urllist blk_BL_politics/urls
          log block.log
          }

          dest blk_BL_porn {
          domainlist blk_BL_porn/domains
          urllist blk_BL_porn/urls
          log block.log
          }

          dest blk_BL_radiotv {
          domainlist blk_BL_radiotv/domains
          urllist blk_BL_radiotv/urls
          log block.log
          }

          dest blk_BL_recreation_humor {
          domainlist blk_BL_recreation_humor/domains
          urllist blk_BL_recreation_humor/urls
          log block.log
          }

          dest blk_BL_recreation_martialarts {
          domainlist blk_BL_recreation_martialarts/domains
          urllist blk_BL_recreation_martialarts/urls
          log block.log
          }

          dest blk_BL_recreation_restaurants {
          domainlist blk_BL_recreation_restaurants/domains
          urllist blk_BL_recreation_restaurants/urls
          log block.log
          }

          dest blk_BL_recreation_sports {
          domainlist blk_BL_recreation_sports/domains
          urllist blk_BL_recreation_sports/urls
          log block.log
          }

          dest blk_BL_recreation_travel {
          domainlist blk_BL_recreation_travel/domains
          urllist blk_BL_recreation_travel/urls
          log block.log
          }

          dest blk_BL_recreation_wellness {
          domainlist blk_BL_recreation_wellness/domains
          urllist blk_BL_recreation_wellness/urls
          log block.log
          }

          dest blk_BL_redirector {
          domainlist blk_BL_redirector/domains
          urllist blk_BL_redirector/urls
          log block.log
          }

          dest blk_BL_religion {
          domainlist blk_BL_religion/domains
          urllist blk_BL_religion/urls
          log block.log
          }

          dest blk_BL_remotecontrol {
          domainlist blk_BL_remotecontrol/domains
          urllist blk_BL_remotecontrol/urls
          log block.log
          }

          dest blk_BL_ringtones {
          domainlist blk_BL_ringtones/domains
          urllist blk_BL_ringtones/urls
          log block.log
          }

          dest blk_BL_science_astronomy {
          domainlist blk_BL_science_astronomy/domains
          urllist blk_BL_science_astronomy/urls
          log block.log
          }

          dest blk_BL_science_chemistry {
          domainlist blk_BL_science_chemistry/domains
          urllist blk_BL_science_chemistry/urls
          log block.log
          }

          dest blk_BL_searchengines {
          domainlist blk_BL_searchengines/domains
          urllist blk_BL_searchengines/urls
          log block.log
          }

          dest blk_BL_sex_education {
          domainlist blk_BL_sex_education/domains
          urllist blk_BL_sex_education/urls
          log block.log
          }

          dest blk_BL_sex_lingerie {
          domainlist blk_BL_sex_lingerie/domains
          urllist blk_BL_sex_lingerie/urls
          log block.log
          }

          dest blk_BL_shopping {
          domainlist blk_BL_shopping/domains
          urllist blk_BL_shopping/urls
          log block.log
          }

          dest blk_BL_socialnet {
          domainlist blk_BL_socialnet/domains
          urllist blk_BL_socialnet/urls
          log block.log
          }

          dest blk_BL_spyware {
          domainlist blk_BL_spyware/domains
          urllist blk_BL_spyware/urls
          log block.log
          }

          dest blk_BL_tracker {
          domainlist blk_BL_tracker/domains
          urllist blk_BL_tracker/urls
          log block.log
          }

          dest blk_BL_updatesites {
          domainlist blk_BL_updatesites/domains
          urllist blk_BL_updatesites/urls
          log block.log
          }

          dest blk_BL_violence {
          domainlist blk_BL_violence/domains
          urllist blk_BL_violence/urls
          log block.log
          }

          dest blk_BL_warez {
          domainlist blk_BL_warez/domains
          urllist blk_BL_warez/urls
          log block.log
          }

          dest blk_BL_weapons {
          domainlist blk_BL_weapons/domains
          urllist blk_BL_weapons/urls
          log block.log
          }

          dest blk_BL_webmail {
          domainlist blk_BL_webmail/domains
          urllist blk_BL_webmail/urls
          log block.log
          }

          dest blk_BL_webphone {
          domainlist blk_BL_webphone/domains
          urllist blk_BL_webphone/urls
          log block.log
          }

          dest blk_BL_webradio {
          domainlist blk_BL_webradio/domains
          urllist blk_BL_webradio/urls
          log block.log
          }

          dest blk_BL_webtv {
          domainlist blk_BL_webtv/domains
          urllist blk_BL_webtv/urls
          log block.log
          }

          rew safesearch {
          s@(google../search?.q=.)@\1&safe=active@i
          s@(google..
          /images.q=.)@\1&safe=active@i
          s@(google../groups.q=.)@\1&safe=active@i
          s@(google..
          /news.q=.)@\1&safe=active@i
          s@(yandex../yandsearch?.text=.)@\1&fyandex=1@i
          s@(search.yahoo..
          /search.p=.)@\1&vm=r@i
          s@(search.live../.q=.)@\1&adlt=strict@i
          s@(search.msn..
          /.q=.)@\1&adlt=strict@i
          log block.log
          }

          acl {

          default {
          pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none
          redirect http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
          rewrite safesearch
          log block.log
          }
          }

          1 Reply Last reply Reply Quote 0
          • D
            dvserg
            last edited by

            pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none

            In Default Tab you setup default rule (last rule) to deny -> result: you clients can't browse sites.
            Setup this rule as allow - this mean what you allow All sites, but deny blacklisted sites.

            SquidGuardDoc EN  RU Tutorial
            Localization ru_PFSense

            1 Reply Last reply Reply Quote 0
            • N
              nambi
              last edited by

              Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.

              Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

              Thank You,

              1 Reply Last reply Reply Quote 0
              • D
                dvserg
                last edited by

                @nambi:

                Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.
                Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                Not sure, permissions check each time while you configure SG.
                Please do this :

                • disable squid transparent mode if you use.
                • delete Bypass Proxy option in squid (if you enter this option)
                • check squid selected interface / to be sure /
                • enter to you browser proxy option as squid configured (PFSenseLanIP:Port) (192.168.1.1:3128)
                • in squid Custom options change redirector_bypass on -> redirector_bypass off

                How browse sites now ?

                SquidGuardDoc EN  RU Tutorial
                Localization ru_PFSense

                1 Reply Last reply Reply Quote 0
                • N
                  nambi
                  last edited by

                  Sorry to pester you with this, when I Installed squid and squid guard I had only setup the "proxy filter area" I did not change any of the "proxy server" side, should I be? or do the default settings work?

                  Also when I try to change a few settings under proxy server I get an error saving stating.

                  The following input errors were detected:

                  * The field 'Log store directory' is required.
                      * The field 'Proxy port' is required.
                      * You must start log location with a / mark
                      * That is not a valid log location dir

                  This is because I had never initially set this up.  Would this be the problem?

                  1 Reply Last reply Reply Quote 0
                  • D
                    dvserg
                    last edited by

                    The following input errors were detected:

                    * The field 'Log store directory' is required. > /
                        * The field 'Proxy port' is required.
                        * You must start log location with a / mark
                        * That is not a valid log location dir

                    Port 3128
                    Dir /var/squid/logs

                    SquidGuardDoc EN  RU Tutorial
                    Localization ru_PFSense

                    1 Reply Last reply Reply Quote 0
                    • N
                      nambi
                      last edited by

                      Thank You
                      Thank You
                      Thank You!

                      it's working now, it was the settings I omitted in the proxy server area which prevented the blocking to work.

                      though these settings are enabled, and if they are not the blocking is bypassed

                      • squid transparent mode if you use.
                      • Bypass Proxy option in squid (if you enter this option)

                      I also set the port you specified, can you use any port or is 3128 what is recommend?

                      1 Reply Last reply Reply Quote 0
                      • D
                        dvserg
                        last edited by

                        @nambi:

                        I also set the port you specified, can you use any port or is 3128 what is recommend?

                        Default port is 3128

                        SquidGuardDoc EN  RU Tutorial
                        Localization ru_PFSense

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.