squid之安裝配置運行

1. 下載源碼包 squid-3.4.13.tar.gz
root@master:/home/lihan/work/cluster# ls
nginx-1.8.0  nginx-1.8.0.tar.gz  squid-3.4.13.tar.gz


2. 解壓源碼包
root@master:/home/lihan/work/cluster# tar zxvf squid-3.4.13.tar.gz
root@master:/home/lihan/work/cluster# ls
nginx-1.8.0  nginx-1.8.0.tar.gz  squid-3.4.13  squid-3.4.13.tar.gz


3. 編譯安裝squid
root@master:/home/lihan/work/cluster# cd squid-3.4.13
root@master:/home/lihan/work/cluster/squid-3.4.13# ./configure 
root@master:/home/lihan/work/cluster/squid-3.4.13# make
root@master:/home/lihan/work/cluster/squid-3.4.13# make install


4. 進去squid默認安裝目錄查看
root@master:/usr/local/squid# ls
bin  etc  libexec  sbin  share  var
其中,squid可執行文件位於./sbin, 配置文件squid.conf位於./etc/


5. 修改三個文件夾的權限
# chmod 777 /usr/local/squid/var/logs/
# chmod 777 /usr/local/squid/var/cache/squid
# chmod 777 /var/log/squid


6. 修改配置文件/usr/local/squid/etc/squid.conf

<span style="font-family:Microsoft YaHei;"><span style="font-family:Microsoft YaHei;">#
# Recommended minimum configuration:
#

# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing
# should be allowed
acl localnet src 10.0.0.0/8	# RFC1918 possible internal network
acl localnet src 172.16.0.0/12	# RFC1918 possible internal network
acl localnet src 192.168.0.0/16	# RFC1918 possible internal network
acl localnet src fc00::/7       # RFC 4193 local private network range
acl localnet src fe80::/10      # RFC 4291 link-local (directly plugged) machines

acl SSL_ports port 443
acl Safe_ports port 80		# http
acl Safe_ports port 21		# ftp
acl Safe_ports port 443		# https
acl Safe_ports port 70		# gopher
acl Safe_ports port 210		# wais
acl Safe_ports port 1025-65535	# unregistered ports
acl Safe_ports port 280		# http-mgmt
acl Safe_ports port 488		# gss-http
acl Safe_ports port 591		# filemaker
acl Safe_ports port 777		# multiling http
acl CONNECT method CONNECT

#
# Recommended minimum Access Permission configuration:
#
# Deny requests to certain unsafe ports
http_access deny !Safe_ports

# Deny CONNECT to other than secure SSL ports
http_access deny CONNECT !SSL_ports

# Only allow cachemgr access from localhost
http_access allow localhost manager
http_access deny manager

# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost

#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#

# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access allow localnet
http_access allow localhost

# And finally deny all other access to this proxy
http_access deny all

# Squid normally listens to port 3128
#http_port 3128
#http_port 192.168.100.30:80 vhost
http_port 80 vhost

cache_peer 192.168.100.31 parent 80 0 originserver weight=5 max-conn=30
cache_peer 192.168.100.210 parent 80 0 originserver weight=5 max-conn=30

cache_mem 64 MB        
maximum_object_size 4096 KB           

access_log /var/log/squid/access.log 

# Uncomment and adjust the following to add a disk cache directory.
cache_dir ufs /usr/local/squid/var/cache/squid 100 16 256

# Leave coredumps in the first cache dir
coredump_dir /usr/local/squid/var/cache/squid

#
# Add any of your own refresh_pattern entries above these.
#
refresh_pattern ^ftp:		1440	20%	10080
refresh_pattern ^gopher:	1440	0%	1440
refresh_pattern -i (/cgi-bin/|\?) 0	0%	0
refresh_pattern .		0	20%	4320</span></span>


7. 在前臺運行
root@master:/usr/local/squid/sbin# ./squid -N -d1 #d1(1234的1非dl)

8. 測試

8.1 拓撲

如下圖所示,squid運行於s0服務器上面,其ip地址爲192.168.100.30 ,http端口號爲80. 其配置與/usr/local/squid/etc/squid.conf保持一致. squid對s1, s2進行代理:


圖1 拓撲

8.2 抓包

啓動服務器s0上的wireshark抓;啓動瀏覽器,瀏覽器所在的客戶端ip地址爲192.168.100.31,在瀏覽器地址欄中輸入http://192.168.100.30,不斷的刷新瀏覽器,報文如下: 


圖2 抓包

可見,s0所在squid對192.168.100.31/210的服務器的靜態頁面進行了cache. (192.168.100.31對192.168.100.30進行了http請求,而192.168.100.30並未請求192.168.100.31/210, 而是直接回應了http響應).

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章