User Tools

Site Tools


squid:acls:acl_types

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
squid:acls:acl_types [2020/04/04 15:55] – [snmp_community string ...] petersquid:acls:acl_types [2020/07/15 09:30] (current) – external edit 127.0.0.1
Line 717: Line 717:
 ===== snmp_community string ... ===== ===== snmp_community string ... =====
  
-Provides matching against community string to limit access to your SNMP Agent.+matching against SNMP community stringS to limit access to your SNMP Agent.
  
-Matching done on snmp community strings. 
  
 <code> <code>
Line 741: Line 740:
  
 Matches when the client's IP address has more than the specified number of HTTP connections established. Matches when the client's IP address has more than the specified number of HTTP connections established.
- 
-Matching is true when the defined number of HTTP connections has been established for a client. 
  
 <code> <code>
Line 753: Line 750:
   * **number**:  Maximum number of HTTP connections.   * **number**:  Maximum number of HTTP connections.
  
-Example(s)+Example:
  
 <code> <code>
Line 768: Line 765:
 ===== max_user_ip ===== ===== max_user_ip =====
  
-This will be matched when the same user attempts to log in for more than the specified number of times from different ip addresses,+This will be matched when the same user attempts to log in for more than the specified number of times from different  addresses,
  
 If -s is specified then the limit is strict, denying browsing from any further IP addresses until the ttl has expired. If -s is specified then the limit is strict, denying browsing from any further IP addresses until the ttl has expired.
  
-Without -s Squid will just annoy the user by "randomly" denying requests. (the counter is then reset each time the limit is reached and a request is denied).+Without -s Squid will just annoy the user by "randomly" denying requests.  (the counter is then reset each time the limit is reached and a request is denied).
  
-The authenticate_ip_ttl parameter controls the timeout on the ip entries.+The authenticate_ip_ttl parameter controls the timeout on the IP entries.
  
 <WRAP info> <WRAP info>
 **NOTE:** **NOTE:**
  
-1. Any authentication program must be running for this. NCSA will a simple configuration.+1. Any authentication program must be running for this.  NCSA will a simple configuration. 
 2. In acceleration mode or where there is mesh of child proxies, clients may appear to come from multiple addresses if they are going through proxy farms, so a limit of 1 may cause user problems. 2. In acceleration mode or where there is mesh of child proxies, clients may appear to come from multiple addresses if they are going through proxy farms, so a limit of 1 may cause user problems.
 </WRAP> </WRAP>
Line 792: Line 790:
   * **number**:  Number of times to login.   * **number**:  Number of times to login.
  
-Example(s)+Example:
  
 <code> <code>
Line 819: Line 817:
   * **mime_type**:  Mime type at the requesting side.   * **mime_type**:  Mime type at the requesting side.
  
-Example(s)+Example:
  
 <code> <code>
Line 836: Line 834:
  
 ===== req_header ===== ===== req_header =====
- 
-Match against any of the known request headers. 
  
 Regular Expression match against any of the known request headers. Regular Expression match against any of the known request headers.
Line 852: Line 848:
   * **header-name**:  Name at the requesting side.   * **header-name**:  Name at the requesting side.
  
-Example(s)+Example:
  
 <code> <code>
Line 866: Line 862:
 Match against the mime type of the reply received by Squid. Match against the mime type of the reply received by Squid.
  
-~Also, using this, you can detect file download or some types HTTP tunneling requests.+Using this, you can detect file download or some types HTTP tunneling requests.
  
-This has no effect in **http_access** rules.  It only has effect in rules that affect the reply data stream such as http_reply_access.+This has no effect in **http_access** rules.  It only has effect in rules that affect the reply data stream such as **http_reply_access**.
  
 <code> <code>
Line 879: Line 875:
   * **mime_type**:  Mime type at the receiving side.   * **mime_type**:  Mime type at the receiving side.
  
-Example(s)+Example:
  
 <code> <code>
Line 891: Line 887:
    
 ===== rep_header ===== ===== rep_header =====
- 
-Match against any of the known response headers. 
  
 Regular Expression match against any of the known response headers. Regular Expression match against any of the known response headers.
Line 905: Line 899:
   * **header-name**:  Header name at the receiving side.   * **header-name**:  Header name at the receiving side.
  
-Example(s)+Example:
  
 <code> <code>
Line 926: Line 920:
   * **class_name**:  Defined by external_acl_type tag.   * **class_name**:  Defined by external_acl_type tag.
  
-Example(s)+Example:
  
 <code> <code>
squid/acls/acl_types.1586015711.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki