• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Blocking http traffic when using transparent proxy

Scheduled Pinned Locked Moved Firewalling
3 Posts 3 Posters 2.0k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • F
    fluca1978
    last edited by Aug 3, 2011, 2:52 PM

    Hi,
    I'm using 1.2.3 with transparent proxy enabled on port 80. Since I'm experiencing some network problems, I'd like to cut off a few protocols at a time in order to inspect, but I got problems while blocking http.
    I placed a rule on my lan (192.168.1.0/24) as the follows:

    block drop in log quick on rl0 inet proto tcp from 192.168.1.0/24 os "MacOS" to any port = http
    

    which should block my mac clients, but it does not work. I have no logs and the macs still browse the web. I suspect this is someway related to the use of squid as transparent proxy, that maybe intercepts the connection before the firewalling and allow the traffic to come and go, am I right?
    Is there a way to selectively block http traffic without having to reconfigure transparent proxy and without having to manually black list clients?

    Thanks

    1 Reply Last reply Reply Quote 0
    • J
      jimp Rebel Alliance Developer Netgate
      last edited by Aug 8, 2011, 2:23 PM

      You can't use firewall rules for HTTP and use squid. Squid will get all of the HTTP traffic, regardless of your rules. You need to use squid's access controls to allow/deny people access to HTTP.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • E
        edjunk30
        last edited by Oct 21, 2011, 2:58 PM

        Sorry to drag this thread up again (especially as it's my first post), but is there any way to change this behaviour so that port 80 is redirected to squid after the firewall rules are evaluated, so after a pass/accept? The reason I ask is that I have some internal web pages, some of which need to be accessed from an interface. There are about 5 pages I need accessible atm, but I would like access to all other private IPs blocked. Keeping both the filter and firewall rules updated together is much less desirable, particularly as my current infrastructure is changing.

        Note: I would still like private pages cached as some reside the other side of a bandwidth metered VPN connection.

        Also I presume this doesn't effect any hosts blocked by snort does it? Ie it doesn't allow block hosts to still use port 80 through squid?

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
          [[user:consent.lead]]
          [[user:consent.not_received]]