Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SquidGuard blocking for all IP range

    Scheduled Pinned Locked Moved Cache/Proxy
    4 Posts 2 Posters 3.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Abhishek
      last edited by

      PFsense ,squid3(non transparent-wpad),squidguard are latest version  and its working perfect in blocking but  its blocking all IP range instead of selected ip range

      Settings -  Common AC (whitelist(allow)  , blacklist (Deny)  , default access (All )allow

      • multimedia > Name: Working_Hours >  Multimedia block during working hours (09:3-1:30 & 2:15 to 6:30)
        client IP (192.168.0.2-192.168.0.229)    , and rebooted

      But issue is  squidguard is blocking multimedia for IP's above 192.168.0.229 (shown in pic below)

      kindly help me to fix the issue

      Proxy COnfig

      
      # This file is automatically generated by pfSense
      # Do not edit manually !
      
      http_port 192.168.0.1:3128
      http_port 127.0.0.1:3128
      icp_port 0
      dns_v4_first off
      pid_filename /var/run/squid/squid.pid
      cache_effective_user proxy
      cache_effective_group proxy
      error_default_language en
      icon_directory /usr/pbi/squid-amd64/local/etc/squid/icons
      visible_hostname sssssss
      cache_mgr sssssss
      access_log /var/squid/logs/access.log
      cache_log /var/squid/logs/cache.log
      cache_store_log none
      netdb_filename /var/squid/logs/netdb.state
      pinger_enable on
      pinger_program /usr/pbi/squid-amd64/local/libexec/squid/pinger
      
      logfile_rotate 0
      debug_options rotate=0
      shutdown_lifetime 3 seconds
      # Allow local network(s) on interface(s)
      acl localnet src  192.168.0.0/24 127.0.0.0/8
      forwarded_for on
      uri_whitespace strip
      
      acl dynamic urlpath_regex cgi-bin ?
      cache deny dynamic
      
      cache_mem 64 MB
      maximum_object_size_in_memory 256 KB
      memory_replacement_policy heap GDSF
      cache_replacement_policy heap LFUDA
      minimum_object_size 0 KB
      maximum_object_size 200 MB
      cache_dir ufs /var/squid/cache 50000 16 256
      offline_mode off
      cache_swap_low 90
      cache_swap_high 95
      cache allow all
      # Add any of your own refresh_pattern entries above these.
      refresh_pattern ^ftp:    1440  20%  10080
      refresh_pattern ^gopher:  1440  0%  1440
      refresh_pattern -i (/cgi-bin/|?) 0  0%  0
      refresh_pattern .    0  20%  4320
      
      #Remote proxies
      
      # Setup some default acls
      # From 3.2 further configuration cleanups have been done to make things easier and safer. The manager, localhost, and to_localhost ACL definitions are now built-in.
      # acl localhost src 127.0.0.1/32
      acl allsrc src all
      acl safeports port 21 70 80 210 280 443 488 563 591 631 777 901  3128 3129 1025-65535 
      acl sslports port 443 563  
      
      # From 3.2 further configuration cleanups have been done to make things easier and safer. The manager, localhost, and to_localhost ACL definitions are now built-in.
      #acl manager proto cache_object
      
      acl purge method PURGE
      acl connect method CONNECT
      
      # Define protocols used for redirects
      acl HTTP proto HTTP
      acl HTTPS proto HTTPS
      http_access allow manager localhost
      
      http_access deny manager
      http_access allow purge localhost
      http_access deny purge
      http_access deny !safeports
      http_access deny CONNECT !sslports
      
      # Always allow localhost connections
      # From 3.2 further configuration cleanups have been done to make things easier and safer.
      # The manager, localhost, and to_localhost ACL definitions are now built-in.
      # http_access allow localhost
      
      quick_abort_min 0 KB
      quick_abort_max 0 KB
      request_body_max_size 0 KB
      reply_body_max_size 153600 KB allsrc 
      delay_pools 1
      delay_class 1 2
      delay_parameters 1 2097152/2097152 -1/-1
      delay_initial_bucket_level 100
      # Throttle extensions matched in the url
      acl throttle_exts urlpath_regex -i '/var/squid/acl/throttle_exts.acl'
      delay_access 1 allow throttle_exts
      delay_access 1 deny allsrc
      
      # Reverse Proxy settings
      
      # Package Integration
      url_rewrite_program /usr/pbi/squidguard-amd64/bin/squidGuard -c /usr/pbi/squidguard-amd64/etc/squidGuard/squidGuard.conf
      url_rewrite_bypass off
      url_rewrite_children 16 startup=8 idle=4 concurrency=0
      
      # Custom options before auth
      
      # Setup allowed ACLs
      # Allow local network(s) on interface(s)
      http_access allow localnet
      # Default block all to be sure
      http_access deny allsrc
      
      

      Filter config

      
      # ============================================================
      # SquidGuard configuration file
      # This file generated automaticly with SquidGuard configurator
      # (C)2006 Serg Dvoriancev
      # email: dv_serg@mail.ru
      # ============================================================
      
      logdir /var/squidGuard/log
      dbhome /var/db/squidGuard
      
      # Working Hours
      time Working_Hours {
      	weekly * 09:30-13:30
      	weekly * 14:10-18:30
      }
      
      # Multimedia block during working hours
      src multimedia {
      	ip     192.168.0.1-192.168.0.220
      }
      
      # 
      dest blk_BL_adv {
      	domainlist blk_BL_adv/domains
      	urllist blk_BL_adv/urls
      	redirect http://192.168.0.1:80/sgerror.php?url=blank_img&msg=&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
      	log block.log
      }
      
      # 
      dest blk_BL_aggressive {
      	domainlist blk_BL_aggressive/domains
      	urllist blk_BL_aggressive/urls
      	log block.log
      }
      
      # 
      dest blk_BL_alcohol {
      	domainlist blk_BL_alcohol/domains
      	urllist blk_BL_alcohol/urls
      	log block.log
      }
      
      # 
      dest blk_BL_anonvpn {
      	domainlist blk_BL_anonvpn/domains
      	urllist blk_BL_anonvpn/urls
      	log block.log
      }
      
      # 
      dest blk_BL_automobile_bikes {
      	domainlist blk_BL_automobile_bikes/domains
      	urllist blk_BL_automobile_bikes/urls
      	log block.log
      }
      
      # 
      dest blk_BL_automobile_boats {
      	domainlist blk_BL_automobile_boats/domains
      	urllist blk_BL_automobile_boats/urls
      	log block.log
      }
      
      # 
      dest blk_BL_automobile_cars {
      	domainlist blk_BL_automobile_cars/domains
      	urllist blk_BL_automobile_cars/urls
      	log block.log
      }
      
      # 
      dest blk_BL_automobile_planes {
      	domainlist blk_BL_automobile_planes/domains
      	urllist blk_BL_automobile_planes/urls
      	log block.log
      }
      
      # 
      dest blk_BL_chat {
      	domainlist blk_BL_chat/domains
      	urllist blk_BL_chat/urls
      	log block.log
      }
      
      # 
      dest blk_BL_costtraps {
      	domainlist blk_BL_costtraps/domains
      	urllist blk_BL_costtraps/urls
      	log block.log
      }
      
      # 
      dest blk_BL_dating {
      	domainlist blk_BL_dating/domains
      	urllist blk_BL_dating/urls
      	log block.log
      }
      
      # 
      dest blk_BL_downloads {
      	domainlist blk_BL_downloads/domains
      	urllist blk_BL_downloads/urls
      	log block.log
      }
      
      # 
      dest blk_BL_drugs {
      	domainlist blk_BL_drugs/domains
      	urllist blk_BL_drugs/urls
      	log block.log
      }
      
      # 
      dest blk_BL_dynamic {
      	domainlist blk_BL_dynamic/domains
      	urllist blk_BL_dynamic/urls
      	log block.log
      }
      
      # 
      dest blk_BL_education_schools {
      	domainlist blk_BL_education_schools/domains
      	urllist blk_BL_education_schools/urls
      	log block.log
      }
      
      # 
      dest blk_BL_finance_banking {
      	domainlist blk_BL_finance_banking/domains
      	urllist blk_BL_finance_banking/urls
      	log block.log
      }
      
      # 
      dest blk_BL_finance_insurance {
      	domainlist blk_BL_finance_insurance/domains
      	urllist blk_BL_finance_insurance/urls
      	log block.log
      }
      
      # 
      dest blk_BL_finance_moneylending {
      	domainlist blk_BL_finance_moneylending/domains
      	urllist blk_BL_finance_moneylending/urls
      	log block.log
      }
      
      # 
      dest blk_BL_finance_other {
      	domainlist blk_BL_finance_other/domains
      	urllist blk_BL_finance_other/urls
      	log block.log
      }
      
      # 
      dest blk_BL_finance_realestate {
      	domainlist blk_BL_finance_realestate/domains
      	urllist blk_BL_finance_realestate/urls
      	log block.log
      }
      
      # 
      dest blk_BL_finance_trading {
      	domainlist blk_BL_finance_trading/domains
      	urllist blk_BL_finance_trading/urls
      	log block.log
      }
      
      # 
      dest blk_BL_fortunetelling {
      	domainlist blk_BL_fortunetelling/domains
      	urllist blk_BL_fortunetelling/urls
      	log block.log
      }
      
      # 
      dest blk_BL_forum {
      	domainlist blk_BL_forum/domains
      	urllist blk_BL_forum/urls
      	log block.log
      }
      
      # 
      dest blk_BL_gamble {
      	domainlist blk_BL_gamble/domains
      	urllist blk_BL_gamble/urls
      	log block.log
      }
      
      # 
      dest blk_BL_government {
      	domainlist blk_BL_government/domains
      	urllist blk_BL_government/urls
      	log block.log
      }
      
      # 
      dest blk_BL_hacking {
      	domainlist blk_BL_hacking/domains
      	urllist blk_BL_hacking/urls
      	log block.log
      }
      
      # 
      dest blk_BL_hobby_cooking {
      	domainlist blk_BL_hobby_cooking/domains
      	urllist blk_BL_hobby_cooking/urls
      	log block.log
      }
      
      # 
      dest blk_BL_hobby_games-misc {
      	domainlist blk_BL_hobby_games-misc/domains
      	urllist blk_BL_hobby_games-misc/urls
      	log block.log
      }
      
      # 
      dest blk_BL_hobby_games-online {
      	domainlist blk_BL_hobby_games-online/domains
      	urllist blk_BL_hobby_games-online/urls
      	log block.log
      }
      
      # 
      dest blk_BL_hobby_gardening {
      	domainlist blk_BL_hobby_gardening/domains
      	urllist blk_BL_hobby_gardening/urls
      	log block.log
      }
      
      # 
      dest blk_BL_hobby_pets {
      	domainlist blk_BL_hobby_pets/domains
      	urllist blk_BL_hobby_pets/urls
      	log block.log
      }
      
      # 
      dest blk_BL_homestyle {
      	domainlist blk_BL_homestyle/domains
      	urllist blk_BL_homestyle/urls
      	log block.log
      }
      
      # 
      dest blk_BL_hospitals {
      	domainlist blk_BL_hospitals/domains
      	urllist blk_BL_hospitals/urls
      	log block.log
      }
      
      # 
      dest blk_BL_imagehosting {
      	domainlist blk_BL_imagehosting/domains
      	urllist blk_BL_imagehosting/urls
      	log block.log
      }
      
      # 
      dest blk_BL_isp {
      	domainlist blk_BL_isp/domains
      	urllist blk_BL_isp/urls
      	log block.log
      }
      
      # 
      dest blk_BL_jobsearch {
      	domainlist blk_BL_jobsearch/domains
      	urllist blk_BL_jobsearch/urls
      	log block.log
      }
      
      # 
      dest blk_BL_library {
      	domainlist blk_BL_library/domains
      	urllist blk_BL_library/urls
      	log block.log
      }
      
      # 
      dest blk_BL_military {
      	domainlist blk_BL_military/domains
      	urllist blk_BL_military/urls
      	log block.log
      }
      
      # 
      dest blk_BL_models {
      	domainlist blk_BL_models/domains
      	urllist blk_BL_models/urls
      	log block.log
      }
      
      # 
      dest blk_BL_movies {
      	domainlist blk_BL_movies/domains
      	urllist blk_BL_movies/urls
      	log block.log
      }
      
      # 
      dest blk_BL_music {
      	domainlist blk_BL_music/domains
      	urllist blk_BL_music/urls
      	log block.log
      }
      
      # 
      dest blk_BL_news {
      	domainlist blk_BL_news/domains
      	urllist blk_BL_news/urls
      	log block.log
      }
      
      # 
      dest blk_BL_podcasts {
      	domainlist blk_BL_podcasts/domains
      	urllist blk_BL_podcasts/urls
      	log block.log
      }
      
      # 
      dest blk_BL_politics {
      	domainlist blk_BL_politics/domains
      	urllist blk_BL_politics/urls
      	log block.log
      }
      
      # 
      dest blk_BL_porn {
      	domainlist blk_BL_porn/domains
      	urllist blk_BL_porn/urls
      	log block.log
      }
      
      # 
      dest blk_BL_radiotv {
      	domainlist blk_BL_radiotv/domains
      	urllist blk_BL_radiotv/urls
      	log block.log
      }
      
      # 
      dest blk_BL_recreation_humor {
      	domainlist blk_BL_recreation_humor/domains
      	urllist blk_BL_recreation_humor/urls
      	log block.log
      }
      
      # 
      dest blk_BL_recreation_martialarts {
      	domainlist blk_BL_recreation_martialarts/domains
      	urllist blk_BL_recreation_martialarts/urls
      	log block.log
      }
      
      # 
      dest blk_BL_recreation_restaurants {
      	domainlist blk_BL_recreation_restaurants/domains
      	urllist blk_BL_recreation_restaurants/urls
      	log block.log
      }
      
      # 
      dest blk_BL_recreation_sports {
      	domainlist blk_BL_recreation_sports/domains
      	urllist blk_BL_recreation_sports/urls
      	log block.log
      }
      
      # 
      dest blk_BL_recreation_travel {
      	domainlist blk_BL_recreation_travel/domains
      	urllist blk_BL_recreation_travel/urls
      	log block.log
      }
      
      # 
      dest blk_BL_recreation_wellness {
      	domainlist blk_BL_recreation_wellness/domains
      	urllist blk_BL_recreation_wellness/urls
      	log block.log
      }
      
      # 
      dest blk_BL_redirector {
      	domainlist blk_BL_redirector/domains
      	urllist blk_BL_redirector/urls
      	log block.log
      }
      
      # 
      dest blk_BL_religion {
      	domainlist blk_BL_religion/domains
      	urllist blk_BL_religion/urls
      	log block.log
      }
      
      # 
      dest blk_BL_remotecontrol {
      	domainlist blk_BL_remotecontrol/domains
      	urllist blk_BL_remotecontrol/urls
      	log block.log
      }
      
      # 
      dest blk_BL_ringtones {
      	domainlist blk_BL_ringtones/domains
      	urllist blk_BL_ringtones/urls
      	log block.log
      }
      
      # 
      dest blk_BL_science_astronomy {
      	domainlist blk_BL_science_astronomy/domains
      	urllist blk_BL_science_astronomy/urls
      	log block.log
      }
      
      # 
      dest blk_BL_science_chemistry {
      	domainlist blk_BL_science_chemistry/domains
      	urllist blk_BL_science_chemistry/urls
      	log block.log
      }
      
      # 
      dest blk_BL_searchengines {
      	domainlist blk_BL_searchengines/domains
      	urllist blk_BL_searchengines/urls
      	log block.log
      }
      
      # 
      dest blk_BL_sex_education {
      	domainlist blk_BL_sex_education/domains
      	urllist blk_BL_sex_education/urls
      	log block.log
      }
      
      # 
      dest blk_BL_sex_lingerie {
      	domainlist blk_BL_sex_lingerie/domains
      	urllist blk_BL_sex_lingerie/urls
      	log block.log
      }
      
      # 
      dest blk_BL_shopping {
      	domainlist blk_BL_shopping/domains
      	urllist blk_BL_shopping/urls
      	log block.log
      }
      
      # 
      dest blk_BL_socialnet {
      	domainlist blk_BL_socialnet/domains
      	urllist blk_BL_socialnet/urls
      	log block.log
      }
      
      # 
      dest blk_BL_spyware {
      	domainlist blk_BL_spyware/domains
      	urllist blk_BL_spyware/urls
      	log block.log
      }
      
      # 
      dest blk_BL_tracker {
      	domainlist blk_BL_tracker/domains
      	urllist blk_BL_tracker/urls
      	log block.log
      }
      
      # 
      dest blk_BL_updatesites {
      	domainlist blk_BL_updatesites/domains
      	urllist blk_BL_updatesites/urls
      	log block.log
      }
      
      # 
      dest blk_BL_urlshortener {
      	domainlist blk_BL_urlshortener/domains
      	urllist blk_BL_urlshortener/urls
      	log block.log
      }
      
      # 
      dest blk_BL_violence {
      	domainlist blk_BL_violence/domains
      	urllist blk_BL_violence/urls
      	log block.log
      }
      
      # 
      dest blk_BL_warez {
      	domainlist blk_BL_warez/domains
      	urllist blk_BL_warez/urls
      	log block.log
      }
      
      # 
      dest blk_BL_weapons {
      	domainlist blk_BL_weapons/domains
      	urllist blk_BL_weapons/urls
      	log block.log
      }
      
      # 
      dest blk_BL_webmail {
      	domainlist blk_BL_webmail/domains
      	urllist blk_BL_webmail/urls
      	log block.log
      }
      
      # 
      dest blk_BL_webphone {
      	domainlist blk_BL_webphone/domains
      	urllist blk_BL_webphone/urls
      	log block.log
      }
      
      # 
      dest blk_BL_webradio {
      	domainlist blk_BL_webradio/domains
      	urllist blk_BL_webradio/urls
      	log block.log
      }
      
      # 
      dest blk_BL_webtv {
      	domainlist blk_BL_webtv/domains
      	urllist blk_BL_webtv/urls
      	log block.log
      }
      
      # Whitelist
      dest Whitelist {
      }
      
      # Blacklist
      dest Blacklist {
      }
      
      # 
      rew safesearch {
      	s@(google..*/search?.*q=.*)@&safe=active@i
      	s@(google..*/images.*q=.*)@&safe=active@i
      	s@(google..*/groups.*q=.*)@&safe=active@i
      	s@(google..*/news.*q=.*)@&safe=active@i
      	s@(yandex..*/yandsearch?.*text=.*)@&fyandex=1@i
      	s@(search.yahoo..*/search.*p=.*)@&vm=r&v=1@i
      	s@(search.live..*/.*q=.*)@&adlt=strict@i
      	s@(search.msn..*/.*q=.*)@&adlt=strict@i
      	s@(.bing..*/.*q=.*)@&adlt=strict@i
      	log block.log
      }
      
      # 
      acl  {
      	# Multimedia block during working hours
      	multimedia  within Working_Hours {
      		pass Whitelist !Blacklist !blk_BL_adv !blk_BL_downloads !blk_BL_movies !blk_BL_music !blk_BL_podcasts !blk_BL_porn !blk_BL_spyware !blk_BL_warez all
      		} else {
      		pass all
      		redirect http://192.168.0.1:80/sgerror.php?url=403%20&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
      	}
      	# 
      	default  {
      		pass !Blacklist !blk_BL_adv !blk_BL_movies !blk_BL_music !blk_BL_porn Whitelist all
      		redirect http://192.168.0.1:80/sgerror.php?url=403%20&a=%a&n=%n&i=%i&s=%s&t=%t&u=%u
      	}
      }
      

      CommonACL.PNG
      CommonACL.PNG_thumb
      GroupACL_01.PNG
      GroupACL_01.PNG_thumb
      GroupACL_02.PNG
      GroupACL_02.PNG_thumb
      Squidguard_Log1.PNG
      Squidguard_Log1.PNG_thumb

      2.3-RC (amd64)
      built on Mon Apr 04 17:09:32 CDT 2016
      FreeBSD 10.3-RELEASE
      Intel(R) Core(TM)2 Duo CPU E4500 @ 2.20GHz

      darkstat 3.1.2_1
      Lightsquid 3.0.3_1
      mailreport 3.0_1
      pfBlockerNG 2.0.9_1  
      RRD_Summary 1.3.1_2
      snort 3.2.9.1_9  
      squid 0.4.16_1  
      squidGuard 1.14_1
      syslog-ng 1.1.2_2

      1 Reply Last reply Reply Quote 0
      • A
        Abhishek
        last edited by

        anyone know how to fix it

        2.3-RC (amd64)
        built on Mon Apr 04 17:09:32 CDT 2016
        FreeBSD 10.3-RELEASE
        Intel(R) Core(TM)2 Duo CPU E4500 @ 2.20GHz

        darkstat 3.1.2_1
        Lightsquid 3.0.3_1
        mailreport 3.0_1
        pfBlockerNG 2.0.9_1  
        RRD_Summary 1.3.1_2
        snort 3.2.9.1_9  
        squid 0.4.16_1  
        squidGuard 1.14_1
        syslog-ng 1.1.2_2

        1 Reply Last reply Reply Quote 0
        • C
          C0RR0SIVE
          last edited by

          Have you tried setting a group that's above the range you are wanting to filter?

          Group #1 = 192.168.0.2-192.168.0.229 = filtered @ those times
          Group #2 = 192.168.0.230-192.168.0.254 = Not filtered

          Never tried to use groups, so I have no honest idea, but it's a thought.

          1 Reply Last reply Reply Quote 0
          • A
            Abhishek
            last edited by

            checked ,
            Group 1 (192.168.0.230-192.168.0.254)

            with Movies and other allowed

            Group 2 192.168.0.2 -192.168.0.229

            with movies blocked ,

            now when there is two groups with first group in allow all  , squid guard filtering is not doing even thought squidguard is showing its running but its not blocking any sites

            2.3-RC (amd64)
            built on Mon Apr 04 17:09:32 CDT 2016
            FreeBSD 10.3-RELEASE
            Intel(R) Core(TM)2 Duo CPU E4500 @ 2.20GHz

            darkstat 3.1.2_1
            Lightsquid 3.0.3_1
            mailreport 3.0_1
            pfBlockerNG 2.0.9_1  
            RRD_Summary 1.3.1_2
            snort 3.2.9.1_9  
            squid 0.4.16_1  
            squidGuard 1.14_1
            syslog-ng 1.1.2_2

            1 Reply Last reply Reply Quote 1
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.