• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Installed Squid and Squidguard but it's not filtering.

Scheduled Pinned Locked Moved pfSense Packages
14 Posts 3 Posters 11.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N
    nambi
    last edited by Nov 9, 2010, 10:13 PM

    I had to reinstall my pfsense box where I had squid and squidguard working well.

    I installed from scratch and manually set everything up, I followed the tutorials to the T but my squidguard will not filter.

    I can't figure out why, as I had done this quite some time ago and it worked.

    Do I also need to make changes under services/proxy server?

    Other than that I am positive i set all the settings up correctly under services/proxy filter.

    1 Reply Last reply Reply Quote 0
    • ?
      Guest
      last edited by Nov 10, 2010, 3:41 AM

      check your logs, specifically the squid and squidguard logs to ensure that squid is seeing the requests and that the squidguard redirectors aren't crashing or otherwise erroring out.

      1 Reply Last reply Reply Quote 0
      • N
        nambi
        last edited by Nov 10, 2010, 3:50 PM

        I reinstalled the packages, squid, then squidguard

        made sure all logs

        Enable log is checked
        Check this for enable log.

        then I go to the last tab

        and it shows

        Log type
        squidguard_log report disabled

        1 Reply Last reply Reply Quote 0
        • D
          dvserg
          last edited by Nov 10, 2010, 4:34 PM

          @nambi:

          Log type 
          squidguard_log report disabled

          Enable this option and look this log for error messages.
          Check squidGuard servicxe status.

          SquidGuardDoc EN  RU Tutorial
          Localization ru_PFSense

          1 Reply Last reply Reply Quote 0
          • N
            nambi
            last edited by Nov 10, 2010, 4:38 PM

            It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

            Thanks

            1 Reply Last reply Reply Quote 0
            • D
              dvserg
              last edited by Nov 10, 2010, 5:03 PM

              @nambi:

              It IS checked, services are also running, I did not setup any ACL's I removed them I thought this may be the issue so I only have General ahd Default Tab configured.

              Thanks

              Be sure, what you browser configured for proxy use.
              And show you squidGuard config (look last Page/Tab)

              SquidGuardDoc EN  RU Tutorial
              Localization ru_PFSense

              1 Reply Last reply Reply Quote 0
              • N
                nambi
                last edited by Nov 10, 2010, 5:09 PM

                My browser settings are Default just as it was before when it worked.

                SG log

                /var/squidGuard/log/sg_configurator.log
                10.11.2010 11:48:50 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
                10.11.2010 11:48:50 : sg_reconfigure_user_db: Nothing. User destinations list empty.
                10.11.2010 11:48:50 : sg_create_config: add blacklist entries
                10.11.2010 11:48:50 : sg_create_config: added:
                blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

                10.11.2010 11:48:50 : sg_create_config: add rewrites: success safesearch;
                10.11.2010 11:48:50 : sg_create_config: add Default
                10.11.2010 11:48:50 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
                10.11.2010 11:48:50 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
                10.11.2010 11:48:50 : squid_reconfigure: Remove old redirector options from Squid config.
                10.11.2010 11:48:50 : squid_reconfigure: Add new redirector options to Squid config.
                10.11.2010 11:50:38 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
                10.11.2010 11:50:38 : sg_reconfigure_user_db: Nothing. User destinations list empty.
                10.11.2010 11:50:38 : sg_create_config: add blacklist entries
                10.11.2010 11:50:38 : sg_create_config: added:
                blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

                10.11.2010 11:50:38 : sg_create_config: add rewrites: success safesearch;
                10.11.2010 11:50:38 : sg_create_config: add Default
                10.11.2010 11:50:38 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
                10.11.2010 11:50:38 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
                10.11.2010 11:50:38 : squid_reconfigure: Remove old redirector options from Squid config.
                10.11.2010 11:50:38 : squid_reconfigure: Add new redirector options to Squid config.
                10.11.2010 11:52:27 : sg_reconfigure_user_db: Begin with '/var/db/squidGuard'
                10.11.2010 11:52:27 : sg_reconfigure_user_db: Nothing. User destinations list empty.
                10.11.2010 11:52:27 : sg_create_config: add blacklist entries
                10.11.2010 11:52:27 : sg_create_config: added:
                blk_BL_adv; blk_BL_aggressive; blk_BL_alcohol; blk_BL_automobile_bikes; blk_BL_automobile_boats; blk_BL_automobile_cars; blk_BL_automobile_planes; blk_BL_chat; blk_BL_costtraps; blk_BL_dating; blk_BL_downloads; blk_BL_drugs; blk_BL_dynamic; blk_BL_education_schools; blk_BL_finance_banking; blk_BL_finance_insurance; blk_BL_finance_moneylending; blk_BL_finance_other; blk_BL_finance_realestate; blk_BL_finance_trading; blk_BL_fortunetelling; blk_BL_forum; blk_BL_gamble; blk_BL_government; blk_BL_hacking; blk_BL_hobby_cooking; blk_BL_hobby_games-misc; blk_BL_hobby_games-online; blk_BL_hobby_gardening; blk_BL_hobby_pets; blk_BL_homestyle; blk_BL_hospitals; blk_BL_imagehosting; blk_BL_isp; blk_BL_jobsearch; blk_BL_library; blk_BL_military; blk_BL_models; blk_BL_movies; blk_BL_music; blk_BL_news; blk_BL_podcasts; blk_BL_politics; blk_BL_porn; blk_BL_radiotv; blk_BL_recreation_humor; blk_BL_recreation_martialarts; blk_BL_recreation_restaurants; blk_BL_recreation_sports; blk_BL_recreation_travel; blk_BL_recreation_wellness; blk_BL_redirector; blk_BL_religion; blk_BL_remotecontrol; blk_BL_ringtones; blk_BL_science_astronomy; blk_BL_science_chemistry; blk_BL_searchengines; blk_BL_sex_education; blk_BL_sex_lingerie; blk_BL_shopping; blk_BL_socialnet; blk_BL_spyware; blk_BL_tracker; blk_BL_updatesites; blk_BL_violence; blk_BL_warez; blk_BL_weapons; blk_BL_webmail; blk_BL_webphone; blk_BL_webradio; blk_BL_webtv;

                10.11.2010 11:52:27 : sg_create_config: add rewrites: success safesearch;
                10.11.2010 11:52:27 : sg_create_config: add Default
                10.11.2010 11:52:27 : sg_redirector_base_url: Select redirector base url (http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u)
                10.11.2010 11:52:27 : sg_reconfigure: save squidGuard config to '/usr/local/etc/squidGuard/squidGuard.conf'.
                10.11.2010 11:52:27 : squid_reconfigure: Remove old redirector options from Squid config.
                10.11.2010 11:52:27 : squid_reconfigure: Add new redirector options to Squid config.

                Squid config

                /usr/local/etc/squid/squid.conf

                Do not edit manually !

                http_port 192.168.1.1:3128
                icp_port 0

                pid_filename /var/run/squid.pid
                cache_effective_user proxy
                cache_effective_group proxy
                error_directory /usr/local/etc/squid/errors/English
                icon_directory /usr/local/etc/squid/icons
                visible_hostname localhost
                cache_mgr admin@localhost
                access_log /dev/null
                cache_log /var/squid/logs/cache.log
                cache_store_log none
                shutdown_lifetime 3 seconds
                uri_whitespace strip

                cache_mem 8 MB
                maximum_object_size_in_memory 32 KB
                memory_replacement_policy heap GDSF
                cache_replacement_policy heap LFUDA
                cache_dir ufs /var/squid/cache 100 16 256
                minimum_object_size 0 KB
                maximum_object_size 10 KB
                offline_mode off

                No redirector configured

                Setup some default acls

                acl all src 0.0.0.0/0.0.0.0
                acl localhost src 127.0.0.1/255.255.255.255
                acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901 3128 1025-65535
                acl sslports port 443 563
                acl manager proto cache_object
                acl purge method PURGE
                acl connect method CONNECT
                acl dynamic urlpath_regex cgi-bin ?
                cache deny dynamic
                http_access allow manager localhost

                http_access deny manager
                http_access allow purge localhost
                http_access deny purge
                http_access deny !safeports
                http_access deny CONNECT !sslports

                Always allow localhost connections

                http_access allow localhost

                request_body_max_size 0 KB
                reply_body_max_size 0 allow all
                delay_pools 1
                delay_class 1 2
                delay_parameters 1 -1/-1 -1/-1
                delay_initial_bucket_level 100
                delay_access 1 allow all

                Setup allowed acls

                Custom options

                redirect_program /usr/local/bin/squidGuard -c /usr/local/etc/squidGuard/squidGuard.conf
                redirector_bypass on
                redirect_children 3

                Default block all to be sure

                http_access deny all

                SG Config log

                /usr/local/etc/squidGuard/squidGuard.conf

                ============================================================

                SquidGuard configuration file

                This file generated automaticly with SquidGuard configurator

                (C)2006 Serg Dvoriancev

                email: dv_serg@mail.ru

                ============================================================

                logdir /var/squidGuard/log
                dbhome /var/db/squidGuard

                dest blk_BL_adv {
                domainlist blk_BL_adv/domains
                urllist blk_BL_adv/urls
                log block.log
                }

                dest blk_BL_aggressive {
                domainlist blk_BL_aggressive/domains
                urllist blk_BL_aggressive/urls
                log block.log
                }

                dest blk_BL_alcohol {
                domainlist blk_BL_alcohol/domains
                urllist blk_BL_alcohol/urls
                log block.log
                }

                dest blk_BL_automobile_bikes {
                domainlist blk_BL_automobile_bikes/domains
                urllist blk_BL_automobile_bikes/urls
                log block.log
                }

                dest blk_BL_automobile_boats {
                domainlist blk_BL_automobile_boats/domains
                urllist blk_BL_automobile_boats/urls
                log block.log
                }

                dest blk_BL_automobile_cars {
                domainlist blk_BL_automobile_cars/domains
                urllist blk_BL_automobile_cars/urls
                log block.log
                }

                dest blk_BL_automobile_planes {
                domainlist blk_BL_automobile_planes/domains
                urllist blk_BL_automobile_planes/urls
                log block.log
                }

                dest blk_BL_chat {
                domainlist blk_BL_chat/domains
                urllist blk_BL_chat/urls
                log block.log
                }

                dest blk_BL_costtraps {
                domainlist blk_BL_costtraps/domains
                urllist blk_BL_costtraps/urls
                log block.log
                }

                dest blk_BL_dating {
                domainlist blk_BL_dating/domains
                urllist blk_BL_dating/urls
                log block.log
                }

                dest blk_BL_downloads {
                domainlist blk_BL_downloads/domains
                urllist blk_BL_downloads/urls
                log block.log
                }

                dest blk_BL_drugs {
                domainlist blk_BL_drugs/domains
                urllist blk_BL_drugs/urls
                log block.log
                }

                dest blk_BL_dynamic {
                domainlist blk_BL_dynamic/domains
                urllist blk_BL_dynamic/urls
                log block.log
                }

                dest blk_BL_education_schools {
                domainlist blk_BL_education_schools/domains
                urllist blk_BL_education_schools/urls
                log block.log
                }

                dest blk_BL_finance_banking {
                domainlist blk_BL_finance_banking/domains
                urllist blk_BL_finance_banking/urls
                log block.log
                }

                dest blk_BL_finance_insurance {
                domainlist blk_BL_finance_insurance/domains
                urllist blk_BL_finance_insurance/urls
                log block.log
                }

                dest blk_BL_finance_moneylending {
                domainlist blk_BL_finance_moneylending/domains
                urllist blk_BL_finance_moneylending/urls
                log block.log
                }

                dest blk_BL_finance_other {
                domainlist blk_BL_finance_other/domains
                urllist blk_BL_finance_other/urls
                log block.log
                }

                dest blk_BL_finance_realestate {
                domainlist blk_BL_finance_realestate/domains
                urllist blk_BL_finance_realestate/urls
                log block.log
                }

                dest blk_BL_finance_trading {
                domainlist blk_BL_finance_trading/domains
                urllist blk_BL_finance_trading/urls
                log block.log
                }

                dest blk_BL_fortunetelling {
                domainlist blk_BL_fortunetelling/domains
                urllist blk_BL_fortunetelling/urls
                log block.log
                }

                dest blk_BL_forum {
                domainlist blk_BL_forum/domains
                urllist blk_BL_forum/urls
                log block.log
                }

                dest blk_BL_gamble {
                domainlist blk_BL_gamble/domains
                urllist blk_BL_gamble/urls
                log block.log
                }

                dest blk_BL_government {
                domainlist blk_BL_government/domains
                urllist blk_BL_government/urls
                log block.log
                }

                dest blk_BL_hacking {
                domainlist blk_BL_hacking/domains
                urllist blk_BL_hacking/urls
                log block.log
                }

                dest blk_BL_hobby_cooking {
                domainlist blk_BL_hobby_cooking/domains
                urllist blk_BL_hobby_cooking/urls
                log block.log
                }

                dest blk_BL_hobby_games-misc {
                domainlist blk_BL_hobby_games-misc/domains
                urllist blk_BL_hobby_games-misc/urls
                log block.log
                }

                dest blk_BL_hobby_games-online {
                domainlist blk_BL_hobby_games-online/domains
                urllist blk_BL_hobby_games-online/urls
                log block.log
                }

                dest blk_BL_hobby_gardening {
                domainlist blk_BL_hobby_gardening/domains
                urllist blk_BL_hobby_gardening/urls
                log block.log
                }

                dest blk_BL_hobby_pets {
                domainlist blk_BL_hobby_pets/domains
                urllist blk_BL_hobby_pets/urls
                log block.log
                }

                dest blk_BL_homestyle {
                domainlist blk_BL_homestyle/domains
                urllist blk_BL_homestyle/urls
                log block.log
                }

                dest blk_BL_hospitals {
                domainlist blk_BL_hospitals/domains
                urllist blk_BL_hospitals/urls
                log block.log
                }

                dest blk_BL_imagehosting {
                domainlist blk_BL_imagehosting/domains
                urllist blk_BL_imagehosting/urls
                log block.log
                }

                dest blk_BL_isp {
                domainlist blk_BL_isp/domains
                urllist blk_BL_isp/urls
                log block.log
                }

                dest blk_BL_jobsearch {
                domainlist blk_BL_jobsearch/domains
                urllist blk_BL_jobsearch/urls
                log block.log
                }

                dest blk_BL_library {
                domainlist blk_BL_library/domains
                urllist blk_BL_library/urls
                log block.log
                }

                dest blk_BL_military {
                domainlist blk_BL_military/domains
                urllist blk_BL_military/urls
                log block.log
                }

                dest blk_BL_models {
                domainlist blk_BL_models/domains
                urllist blk_BL_models/urls
                log block.log
                }

                dest blk_BL_movies {
                domainlist blk_BL_movies/domains
                urllist blk_BL_movies/urls
                log block.log
                }

                dest blk_BL_music {
                domainlist blk_BL_music/domains
                urllist blk_BL_music/urls
                log block.log
                }

                dest blk_BL_news {
                domainlist blk_BL_news/domains
                urllist blk_BL_news/urls
                log block.log
                }

                dest blk_BL_podcasts {
                domainlist blk_BL_podcasts/domains
                urllist blk_BL_podcasts/urls
                log block.log
                }

                dest blk_BL_politics {
                domainlist blk_BL_politics/domains
                urllist blk_BL_politics/urls
                log block.log
                }

                dest blk_BL_porn {
                domainlist blk_BL_porn/domains
                urllist blk_BL_porn/urls
                log block.log
                }

                dest blk_BL_radiotv {
                domainlist blk_BL_radiotv/domains
                urllist blk_BL_radiotv/urls
                log block.log
                }

                dest blk_BL_recreation_humor {
                domainlist blk_BL_recreation_humor/domains
                urllist blk_BL_recreation_humor/urls
                log block.log
                }

                dest blk_BL_recreation_martialarts {
                domainlist blk_BL_recreation_martialarts/domains
                urllist blk_BL_recreation_martialarts/urls
                log block.log
                }

                dest blk_BL_recreation_restaurants {
                domainlist blk_BL_recreation_restaurants/domains
                urllist blk_BL_recreation_restaurants/urls
                log block.log
                }

                dest blk_BL_recreation_sports {
                domainlist blk_BL_recreation_sports/domains
                urllist blk_BL_recreation_sports/urls
                log block.log
                }

                dest blk_BL_recreation_travel {
                domainlist blk_BL_recreation_travel/domains
                urllist blk_BL_recreation_travel/urls
                log block.log
                }

                dest blk_BL_recreation_wellness {
                domainlist blk_BL_recreation_wellness/domains
                urllist blk_BL_recreation_wellness/urls
                log block.log
                }

                dest blk_BL_redirector {
                domainlist blk_BL_redirector/domains
                urllist blk_BL_redirector/urls
                log block.log
                }

                dest blk_BL_religion {
                domainlist blk_BL_religion/domains
                urllist blk_BL_religion/urls
                log block.log
                }

                dest blk_BL_remotecontrol {
                domainlist blk_BL_remotecontrol/domains
                urllist blk_BL_remotecontrol/urls
                log block.log
                }

                dest blk_BL_ringtones {
                domainlist blk_BL_ringtones/domains
                urllist blk_BL_ringtones/urls
                log block.log
                }

                dest blk_BL_science_astronomy {
                domainlist blk_BL_science_astronomy/domains
                urllist blk_BL_science_astronomy/urls
                log block.log
                }

                dest blk_BL_science_chemistry {
                domainlist blk_BL_science_chemistry/domains
                urllist blk_BL_science_chemistry/urls
                log block.log
                }

                dest blk_BL_searchengines {
                domainlist blk_BL_searchengines/domains
                urllist blk_BL_searchengines/urls
                log block.log
                }

                dest blk_BL_sex_education {
                domainlist blk_BL_sex_education/domains
                urllist blk_BL_sex_education/urls
                log block.log
                }

                dest blk_BL_sex_lingerie {
                domainlist blk_BL_sex_lingerie/domains
                urllist blk_BL_sex_lingerie/urls
                log block.log
                }

                dest blk_BL_shopping {
                domainlist blk_BL_shopping/domains
                urllist blk_BL_shopping/urls
                log block.log
                }

                dest blk_BL_socialnet {
                domainlist blk_BL_socialnet/domains
                urllist blk_BL_socialnet/urls
                log block.log
                }

                dest blk_BL_spyware {
                domainlist blk_BL_spyware/domains
                urllist blk_BL_spyware/urls
                log block.log
                }

                dest blk_BL_tracker {
                domainlist blk_BL_tracker/domains
                urllist blk_BL_tracker/urls
                log block.log
                }

                dest blk_BL_updatesites {
                domainlist blk_BL_updatesites/domains
                urllist blk_BL_updatesites/urls
                log block.log
                }

                dest blk_BL_violence {
                domainlist blk_BL_violence/domains
                urllist blk_BL_violence/urls
                log block.log
                }

                dest blk_BL_warez {
                domainlist blk_BL_warez/domains
                urllist blk_BL_warez/urls
                log block.log
                }

                dest blk_BL_weapons {
                domainlist blk_BL_weapons/domains
                urllist blk_BL_weapons/urls
                log block.log
                }

                dest blk_BL_webmail {
                domainlist blk_BL_webmail/domains
                urllist blk_BL_webmail/urls
                log block.log
                }

                dest blk_BL_webphone {
                domainlist blk_BL_webphone/domains
                urllist blk_BL_webphone/urls
                log block.log
                }

                dest blk_BL_webradio {
                domainlist blk_BL_webradio/domains
                urllist blk_BL_webradio/urls
                log block.log
                }

                dest blk_BL_webtv {
                domainlist blk_BL_webtv/domains
                urllist blk_BL_webtv/urls
                log block.log
                }

                rew safesearch {
                s@(google../search?.q=.)@\1&safe=active@i
                s@(google..
                /images.q=.)@\1&safe=active@i
                s@(google../groups.q=.)@\1&safe=active@i
                s@(google..
                /news.q=.)@\1&safe=active@i
                s@(yandex../yandsearch?.text=.)@\1&fyandex=1@i
                s@(search.yahoo..
                /search.p=.)@\1&vm=r@i
                s@(search.live../.q=.)@\1&adlt=strict@i
                s@(search.msn..
                /.q=.)@\1&adlt=strict@i
                log block.log
                }

                acl {

                default {
                pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none
                redirect http://192.168.1.1:80/sgerror.php?url=403%20Page%20is%20Blocked%20By%20Prism%20Powder%20Coatings%20Ltd.&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
                rewrite safesearch
                log block.log
                }
                }

                1 Reply Last reply Reply Quote 0
                • D
                  dvserg
                  last edited by Nov 10, 2010, 5:29 PM Nov 10, 2010, 5:27 PM

                  pass !blk_BL_aggressive !blk_BL_alcohol !blk_BL_drugs !blk_BL_gamble !blk_BL_hacking !blk_BL_porn !blk_BL_sex_lingerie !blk_BL_spyware !blk_BL_warez !blk_BL_weapons none

                  In Default Tab you setup default rule (last rule) to deny -> result: you clients can't browse sites.
                  Setup this rule as allow - this mean what you allow All sites, but deny blacklisted sites.

                  SquidGuardDoc EN  RU Tutorial
                  Localization ru_PFSense

                  1 Reply Last reply Reply Quote 0
                  • N
                    nambi
                    last edited by Nov 10, 2010, 5:42 PM

                    Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.

                    Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                    Thank You,

                    1 Reply Last reply Reply Quote 0
                    • D
                      dvserg
                      last edited by Nov 10, 2010, 5:57 PM Nov 10, 2010, 5:49 PM

                      @nambi:

                      Thank you but this i recently switch so I could see if PF sense would actually block access. but it did not even with this set.
                      Now I set it to allow and no it is still not filtering,  Could this be a file permission problem?

                      Not sure, permissions check each time while you configure SG.
                      Please do this :

                      • disable squid transparent mode if you use.
                      • delete Bypass Proxy option in squid (if you enter this option)
                      • check squid selected interface / to be sure /
                      • enter to you browser proxy option as squid configured (PFSenseLanIP:Port) (192.168.1.1:3128)
                      • in squid Custom options change redirector_bypass on -> redirector_bypass off

                      How browse sites now ?

                      SquidGuardDoc EN  RU Tutorial
                      Localization ru_PFSense

                      1 Reply Last reply Reply Quote 0
                      • N
                        nambi
                        last edited by Nov 10, 2010, 7:41 PM

                        Sorry to pester you with this, when I Installed squid and squid guard I had only setup the "proxy filter area" I did not change any of the "proxy server" side, should I be? or do the default settings work?

                        Also when I try to change a few settings under proxy server I get an error saving stating.

                        The following input errors were detected:

                        * The field 'Log store directory' is required.
                            * The field 'Proxy port' is required.
                            * You must start log location with a / mark
                            * That is not a valid log location dir

                        This is because I had never initially set this up.  Would this be the problem?

                        1 Reply Last reply Reply Quote 0
                        • D
                          dvserg
                          last edited by Nov 10, 2010, 8:24 PM

                          The following input errors were detected:

                          * The field 'Log store directory' is required. > /
                              * The field 'Proxy port' is required.
                              * You must start log location with a / mark
                              * That is not a valid log location dir

                          Port 3128
                          Dir /var/squid/logs

                          SquidGuardDoc EN  RU Tutorial
                          Localization ru_PFSense

                          1 Reply Last reply Reply Quote 0
                          • N
                            nambi
                            last edited by Nov 11, 2010, 2:03 AM

                            Thank You
                            Thank You
                            Thank You!

                            it's working now, it was the settings I omitted in the proxy server area which prevented the blocking to work.

                            though these settings are enabled, and if they are not the blocking is bypassed

                            • squid transparent mode if you use.
                            • Bypass Proxy option in squid (if you enter this option)

                            I also set the port you specified, can you use any port or is 3128 what is recommend?

                            1 Reply Last reply Reply Quote 0
                            • D
                              dvserg
                              last edited by Nov 11, 2010, 5:13 AM

                              @nambi:

                              I also set the port you specified, can you use any port or is 3128 what is recommend?

                              Default port is 3128

                              SquidGuardDoc EN  RU Tutorial
                              Localization ru_PFSense

                              1 Reply Last reply Reply Quote 0
                              14 out of 14
                              • First post
                                14/14
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                                This community forum collects and processes your personal information.
                                consent.not_received