>>>>> "neeraj" == n e e r a j <[EMAIL PROTECTED]> writes:
neeraj> 1. .Is there some limit to the no of users that can use
neeraj> proxy .
Not with squid. With MS proxy server or something, you might have to
buy the required number of client licenses.
neeraj> 2. What is the funda of cache in proxy .Does it come along
neeraj> with squid or its something different .
Cache means that squid will store pages that it fetches, and will
serve from the cache instead of actually retrieving repeatedly from
the website, if it feels that the page has not changed since it last
fetched it. This can considerably reduce loading time of many web
pages with static content, and also software downloads. Squid is
indeed a caching proxy server.
neeraj> 3.What is the difference when one says that run apache as
neeraj> a proxy and running squid as proxy .
Nothing, but I don't think that apache does caching. Also, use the
tool designed to do your work, and not a patchwork on a tool that does
something else...
neeraj> 4.Is there some web based administration tool which can be
neeraj> used to allow /dissallow net connections to users .
squid comes with a program called cachemgr.cgi, which can be used to
administer it via a web interface. But its config file (and indeed,
the whole package) is so well documented that I have never felt a need
to use it.
neeraj> 5.I am talking of a setup with 400 netusers in a network
neeraj> with approx 15 VLANS .+ 50 Dial up users connecting and
neeraj> accessing the net thro ths same proxy ...
Good enough - but I'd suggest dedicating a machine for the proxy
server. Also, devote lots of space for the cache - maybe one GB or so.
neeraj> 6 .Any precautions to be taken as of security ... would
neeraj> it be possible to give authentication based on ip
neeraj> addressof the specific m/c .
Hmm... squid is completely acl based. You can authenticate via a
variety of modules that come with squid - even from databases, and if
you use PAM, the full functionality of PAM also can be used
(authenticating from NT etc.). Restrictions/Access can be based on URL
regexes, client IP address, client browser software (;-), method of
access (GET, POST, CONNECT etc.), protocol (http/https/ftp/gopher),
date/time and a variety of other things.
neeraj> Any link /suggestions would be of great help .
http://www.squid-cache.org and http://squid.nlanr.net are the official
pages of squid. The mailing list archives has a wealth of information
as well.
Binand
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/linux-india-help