{"id":919,"date":"2014-06-25T00:36:10","date_gmt":"2014-06-25T03:36:10","guid":{"rendered":"http:\/\/www.viazap.com.br\/?p=919"},"modified":"2014-07-12T00:27:57","modified_gmt":"2014-07-12T03:27:57","slug":"squid-sarg-iptables-configuracao-rapida","status":"publish","type":"post","link":"https:\/\/blog.clusterweb.com.br\/?p=919","title":{"rendered":"Squid + Sarg + IPtables &#8211; Configura\u00e7\u00e3o r\u00e1pida"},"content":{"rendered":"<table border=\"0\" width=\"100%\" cellspacing=\"3\" cellpadding=\"3\">\n<tbody>\n<tr>\n<td colspan=\"2\"><b>Iniciando \/ Roteamento \/ Kernel<\/b><\/p>\n<div>\n<h1>Iniciando<\/h1>\n<p>A m\u00e1quina que configurei, foi um server Ubuntu 10.04 64 bits, dedicado para o seu fim, controlar o acesso na rede.<\/p>\n<p>Hardware:<\/p>\n<ul>\n<li>Processador Intel Core i7<\/li>\n<li>Memoria DDR3 8 GB<\/li>\n<li>HD 80 GB (humilde)<\/li>\n<li>2 placas de rede 10\/100\/1000<\/li>\n<\/ul>\n<p>Segue o passo a passo de forma f\u00e1cil e r\u00e1pida. Forneci no decorrer do tutorial, todos os arquivos para ajudar.<\/p>\n<p>Configure as placas\u00a0eth0\u00a0e\u00a0eth1. No meu caso, elas estavam desativadas.<\/p>\n<p>D\u00ea o comando, para subir as placas:<!--more--><\/p>\n<p><strong># ifconfig eth_ up<\/strong><\/p>\n<p>Dentro do\u00a0interfaces, configure as placas a seu crit\u00e9rio:<\/p>\n<p><strong># nano \/etc\/network\/interfaces<\/strong><\/p>\n<p>No meu caso, a eth0 10.0.0.10 e eth1 10.0.1.10, m\u00e1scaras 255.0.0.0.<\/p>\n<p>D\u00ea o comando:<\/p>\n<p><strong># \/etc\/network\/networking restart<\/strong><\/p>\n<p>Para aplicar a configura\u00e7\u00e3o das placas.<\/p>\n<p>Ap\u00f3s isso instale o BIND 9, servidor de DNS:<\/p>\n<p><strong># apt-get install bind9<\/strong><\/p>\n<p>Configure o\u00a0resolv.conf\u00a0para usar o DNS local, escrevendo dentro de\u00a0\/etc\/resolv.conf:<\/p>\n<div class=\"codigo\">nameserver\u00a0127.0.0.0<\/div>\n<p>Vale lembrar que, quando reiniciar, este arquivo se reseta, assim como as regras do IPtables. Por isso, adicione dentro de\u00a0rc.local, os comandos a executar em cada boot.<\/p>\n<p>Neste caso, adicione a linha:<\/p>\n<div class=\"codigo\">echo nameserver 127.0.0.0 &gt; \/etc\/resolv.conf<\/div>\n<p>Para gravar no boot o DNS.<\/p>\n<h1>Roteamento e algumas dicas de otimiza\u00e7\u00e3o do kernel<\/h1>\n<p>Agora, \u00e9 hora de ativar o roteamento trocando o\u00a00\u00a0por\u00a01, no arquivo\u00a0\/proc\/sys\/net\/ipv4\/ip_forward.<\/p>\n<p>Este arquivo tamb\u00e9m se reseta em cada boot, por isso, adicione novamente, em\u00a0rc.local, a linha para gravar esta configura\u00e7\u00e3o no boot:<\/p>\n<div class=\"codigo\">echo\u00a01\u00a0&gt;\u00a0\/proc\/sys\/net\/ipv4\/ip_forward<\/div>\n<p>Instalar o DHCP, para que cada m\u00e1quina que entrar na rede, assuma o IP e o gateway desejado, assim, aplicando as regras \u00e0 mesma:<\/p>\n<p><strong># apt-get install dhcp3-server<\/strong><\/p>\n<p>Segue o meu\u00a0dhcpd.conf, eu sempre uso meus arquivos prontos e simplesmente copio e fa\u00e7o as devidas altera\u00e7\u00f5es, para mim, facilita muito e agiliza a configura\u00e7\u00e3o.<\/p>\n<p><strong># nano \/etc\/dhcp3\/dhcpd.conf<\/strong><\/p>\n<div class=\"codigo\">default-lease-time\u00a0600;<br \/>\nmax-lease-time\u00a07200;<br \/>\noption\u00a0subnet-mask\u00a0255.0.0.0;<br \/>\noption\u00a0broadcast-address\u00a010.255.255.255;<br \/>\noption\u00a0routers\u00a010.0.0.10;<br \/>\noption\u00a0domain-name-servers\u00a010.0.0.10;<br \/>\nsubnet\u00a010.0.0.0\u00a0netmask\u00a0255.0.0.0\u00a0{<br \/>\nrange\u00a010.0.1.1\u00a010.0.1.100;}<\/div>\n<p>Li diversas mudan\u00e7as de kernel em minha pesquisa, por\u00e9m, sintetizei as que retornam melhores resultados e s\u00e3o f\u00e1ceis de fazer, s\u00e3o elas:<\/p>\n<p>1. Come\u00e7ar aumentando a quantidade de arquivos abertos, o padr\u00e3o \u00e9 1024. Altera-se com:<\/p>\n<p><strong># ulimit -n 16384<\/strong><\/p>\n<p>2. Confirmando a mudan\u00e7a com o comando\u00a0ulimit -a, na linha com o\u00a0(-n), caso continue 1024 refa\u00e7a o comando.<\/p>\n<p>3. Outra mudan\u00e7a boa aplicada, foi aumentar as conex\u00f5es simult\u00e2neas, escrevendo ao final do arquivo\u00a0\/etc\/sysctl.conf\u00a0as seguintes linhas:<\/p>\n<div class=\"codigo\"><span class=\"comentario\">####### TUNNING PARA SQUID ######## #\u00a0Reduzir\u00a0o\u00a0tempo\u00a0de\u00a0limpeza\u00a0da\u00a0tabela\u00a0ARP<br \/>\n#\u00a0Expandir\u00a0o\u00a0seu\u00a0tamanho<\/span><br \/>\nnet.ipv4.neigh.default.gc_interval\u00a0=\u00a015<br \/>\nnet.ipv4.neigh.default.gc_thresh1\u00a0=\u00a04096<br \/>\nnet.ipv4.neigh.default.gc_thresh2\u00a0=\u00a08192<br \/>\nnet.ipv4.neigh.default.gc_thresh3\u00a0=\u00a016384<span class=\"comentario\"># Aumento\u00a0do\u00a0numero\u00a0de\u00a0conexoes\u00a0simultaneas<br \/>\n#\u00a0Reducao\u00a0do\u00a0tempo\u00a0de\u00a0espera\u00a0entre\u00a0as\u00a0conexoes<\/span><br \/>\nnet.core.somaxconn\u00a0=\u00a020480<br \/>\nnet.core.netdev_max_backlog\u00a0=\u00a02048<br \/>\nnet.ipv4.tcp_fin_timeout\u00a0=\u00a010<br \/>\nnet.ipv4.tcp_tw_recycle\u00a0=\u00a01<br \/>\nnet.ipv4.tcp_tw_reuse\u00a0=\u00a01<br \/>\nnet.ipv4.tcp_syn_retries\u00a0=\u00a01<br \/>\nnet.ipv4.tcp_synack_retries\u00a0=\u00a01<br \/>\nnet.ipv4.tcp_max_syn_backlog\u00a0=\u00a02048<br \/>\n<span class=\"comentario\">###############################<\/span><\/div>\n<p>Ap\u00f3s escrito, dar o comando\u00a0sysctl -p, para ativar as mudan\u00e7as.<\/p>\n<p>Pronto, o tuning no kernel para otimizar o Squid est\u00e1 pronto.<\/p>\n<p>Agora, continuamos.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><b>Configurando o Squid<\/b><\/p>\n<div>\n<p>Agora, o server est\u00e1 pronto para receber o servi\u00e7o principal, o\u00a0<em>Squid<\/em>.<\/p>\n<p>Sintetizei os meus estudos em um arquivo muito f\u00e1cil e intuitivo, espero que agradem a todos e fique de f\u00e1cil entendimento.<\/p>\n<p>Instale o Squid:<\/p>\n<p><strong># apt-get install squid<\/strong><\/p>\n<p>Alterar o\u00a0\/etc\/squid\/squid.conf, pelo arquivo pronto abaixo:<\/p>\n<div class=\"codigo\"><span class=\"comentario\">################################################<br \/>\n#####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Porta,\u00a0Nome\u00a0e\u00a0Cache\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#####<br \/>\n################################################<br \/>\n#<\/span><br \/>\nhttp_port\u00a03128\u00a0transparent<br \/>\nvisible_hostname\u00a0APA-Proxy<br \/>\n<span class=\"comentario\">#<br \/>\n##\u00a0Criar\u00a0cache\u00a0na\u00a0memoria\u00a0de\u00a04\u00a0GB\u00a0##<\/span><br \/>\ncache_mem\u00a04096\u00a0MB<br \/>\nmaximum_object_size_in_memory\u00a02\u00a0MB<br \/>\nmaximum_object_size\u00a04\u00a0MB<br \/>\nminimum_object_size\u00a010\u00a0KB<br \/>\ncache_swap_low\u00a080<br \/>\ncache_swap_high\u00a095<br \/>\nrefresh_pattern\u00a0^ftp:\u00a015\u00a020%\u00a02280<br \/>\nrefresh_pattern\u00a0^gopher:\u00a015\u00a00%\u00a02280<br \/>\nrefresh_pattern\u00a0.\u00a015\u00a020%\u00a02280<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n#####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Log\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#####<br \/>\n################################################<br \/>\n#<\/span><br \/>\ncache_access_log\u00a0\/var\/log\/squid3\/access.log<br \/>\ncache_store_log\u00a0\/var\/log\/squid3\/store.log<br \/>\ncache_log\u00a0\/var\/log\/squid3\/cache.log<br \/>\n##\u00a0Criar\u00a0um\u00a0cache\u00a0em\u00a0disco\u00a0de\u00a05\u00a0GB\u00a0##<br \/>\ncache_dir\u00a0aufs\u00a0\/var\/spool\/squid3\u00a05120\u00a016\u00a0256<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n#####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0ACLs\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#####<br \/>\n################################################<br \/>\n#<\/span><br \/>\nacl\u00a0all\u00a0src\u00a00.0.0.0\/0.0.0.0<br \/>\nacl\u00a0manager\u00a0proto\u00a0cache_object<br \/>\nacl\u00a0localhost\u00a0src\u00a0127.0.0.1\/255.255.255.255<br \/>\nacl\u00a0SSL_ports\u00a0port\u00a0443\u00a0563<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a080\u00a0#\u00a0http<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a021\u00a0#\u00a0ftp<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a0443\u00a0563\u00a0#\u00a0https,\u00a0snews<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a070\u00a0#\u00a0gopher<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a0210\u00a0#\u00a0wais<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a0280\u00a0#\u00a0http-mgmt<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a0488\u00a0#\u00a0gss-http<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a0591\u00a0#\u00a0filemaker<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a0777\u00a0#\u00a0multiling\u00a0http<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a0901\u00a0#\u00a0swat<br \/>\nacl\u00a0Safe_ports\u00a0port\u00a01025-65535\u00a0#\u00a0portas\u00a0altas<br \/>\nacl\u00a0purge\u00a0method\u00a0PURGE<br \/>\nacl\u00a0CONNECT\u00a0method\u00a0CONNECT<br \/>\n<span class=\"comentario\">#Bloquear\u00a0as\u00a0portas\u00a0n\u00e3o\u00a0sitadas<\/span><br \/>\nhttp_access\u00a0deny\u00a0!Safe_ports<br \/>\nhttp_access\u00a0deny\u00a0CONNECT\u00a0!SSL_ports<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n#####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Direitos\u00a0de\u00a0Acessos\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0#####<br \/>\n################################################<\/span>http_access\u00a0allow\u00a0manager\u00a0localhost<br \/>\nhttp_access\u00a0deny\u00a0manager<br \/>\nhttp_access\u00a0allow\u00a0purge\u00a0localhost<br \/>\nhttp_access\u00a0deny\u00a0purge<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n##\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0CONTROLE\u00a0DE\u00a0BANDA\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0##<br \/>\n################################################<br \/>\n#<br \/>\n#acl\u00a0livre\u00a0src\u00a0192.168.0.0\/255.255.255.0<br \/>\n#acl\u00a0extensoes\u00a0url_regex\u00a0-i\u00a0.exe$\u00a0.mp3$\u00a0.vqf$\u00a0.tar.gz$\u00a0.gz$\u00a0.rpm$\u00a0.zip$\u00a0.rar$\u00a0.avi$\u00a0.mpeg$\u00a0.mpe$\u00a0.mpg$\u00a0.ram$\u00a0.rm$\u00a0.iso$\u00a0.raw$\u00a0.wav$\u00a0.mov$<\/span>#delay_pools\u00a02<br \/>\n#<br \/>\n#\u00a0Classe\u00a01\u00a0&#8211;\u00a0Acesso\u00a0a\u00a0Internet\u00a0a\u00a0512k<br \/>\n#<br \/>\n# delay_class\u00a01\u00a02<br \/>\n# delay_parameters\u00a01\u00a0-1\/-1\u00a069000\/69000<br \/>\n#<br \/>\n#\u00a0Classe\u00a02\u00a0&#8211;\u00a0Download\u00a0a\u00a0180k<br \/>\n#<br \/>\n# delay_class\u00a02\u00a02<br \/>\n# delay_parameters\u00a02\u00a0-1\/-1\u00a022500\/22500<br \/>\n#delay_access\u00a01\u00a0allow\u00a0livre<br \/>\n#delay_access\u00a02\u00a0allow\u00a0extensoes<br \/>\n#<br \/>\n################################################<br \/>\n####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Liberando\u00a0IP&#8217;S\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0####<br \/>\n################################################<br \/>\n#<br \/>\nacl\u00a0liberados\u00a0src\u00a0&#8220;\/etc\/squid\/liberados.conf&#8221;<br \/>\n<span class=\"comentario\">#<\/span><br \/>\nhttp_access\u00a0allow\u00a0liberados<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0BLOQUEAR\u00a0PALAVRAS\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0####<br \/>\n################################################<br \/>\n#<\/span><br \/>\nacl\u00a0bloquear_palavras\u00a0url_regex\u00a0-i\u00a0&#8220;\/etc\/squid3\/bloqueios.conf&#8221;<br \/>\n<span class=\"comentario\">#<\/span><br \/>\nhttp_access\u00a0deny\u00a0bloquear_palavras<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n#####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Rede\u00a0Local\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0####<br \/>\n################################################<\/span><br \/>\nacl\u00a0redelocal\u00a0src\u00a010.0.0.0\/255.0.0.0<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Liberando\u00a0as\u00a0Redes\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0####<br \/>\n################################################<\/span><br \/>\nhttp_access\u00a0allow\u00a0localhost<br \/>\nhttp_access\u00a0allow\u00a0redelocal<br \/>\n<span class=\"comentario\">#<br \/>\n################################################<br \/>\n####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Bloqueando\u00a0todo\u00a0o\u00a0Resto\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0####<br \/>\n################################################<\/span><br \/>\nhttp_access\u00a0deny\u00a0all<br \/>\nhttp_access\u00a0deny\u00a0bloquear_palavras<br \/>\n<span class=\"comentario\">#######################################################<br \/>\n####\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Diretorio\u00a0de\u00a0erro\u00a0com\u00a0imagem\u00a0personalizada\u00a0\u00a0\u00a0####<br \/>\n################################################<\/span><br \/>\nerror_directory\u00a0\/usr\/share\/squid3\/errors\/portuguese<\/p>\n<p><span class=\"comentario\">#######################################################<\/span><\/p>\n<\/div>\n<p>O arquivo acima, traz as configura\u00e7\u00e3o mais f\u00e1ceis e mais utilizadas do Squid, deve-se trocar os IPs pelos seus pr\u00f3prios, e n\u00e3o esquecer de mudar o nome de host logo abaixo da porta.<\/p>\n<p>Caso queira personalizar mais, pode alterar a seu gosto os caches, pois, nem todas as m\u00e1quinas tem este hardware dispon\u00edvel, fica a seu crit\u00e9rio.<\/p>\n<p>Voc\u00ea dever\u00e1 criar 2 arquivos de texto:<\/p>\n<ul>\n<li>liberados.conf<\/li>\n<li>bloqueios.conf<\/li>\n<\/ul>\n<p><strong># nano &#8220;\/etc\/squid\/liberados.conf&#8221;<\/strong>\u00a0\u00a0\u00a0\u00a0<span class=\"comentario\"># Neste coloque nos IPs que ficam fora do bloqueio, pois na minha empresa tenho as m\u00e1quinas da ger\u00eancia aonde excluo elas do bloqueio.<\/span><\/p>\n<p><strong># nano &#8220;\/etc\/squid\/bloqueios.conf&#8221;<\/strong>\u00a0\u00a0\u00a0\u00a0<span class=\"comentario\"># Neste deve-se colocar as palavras que deseja bloquear quando aparecerem na URL.<\/span><\/p>\n<p>Outra linha relevante, \u00e9 a ERROR_DIRECTORY, explicaremos ela, logo mais na p\u00e1gina do Sarg.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\"><b>Apache 2 \/ Sarg com p\u00e1gina de bloqueio personalizada<\/b><\/p>\n<div>\n<p>Instale o Apache 2, que vai servir a p\u00e1gina para visualizar o relat\u00f3rio de acesso do Squid:<\/p>\n<p><strong># apt-get install apache2<\/strong><\/p>\n<p>Instale o\u00a0<em>Sarg<\/em>, o nosso visualizador de relat\u00f3rio do Squid:<\/p>\n<p><strong># apt-get install sarg<\/strong><\/p>\n<p>No Apache, n\u00e3o se configura nada, somente usamos a pasta compartilhada dele para enviar nossos arquivos do Sarg.<\/p>\n<h1>Configurando o Sarg com p\u00e1gina personalizada<\/h1>\n<p>Entre no\u00a0sarg.conf:<\/p>\n<p><strong># nano \/etc\/sarg\/sarg.conf<\/strong><\/p>\n<p>Edite a linha\u00a0output_dir, da forma que fique assim:<\/p>\n<div class=\"codigo\">output_dir\u00a0\/var\/www\/squid-reports<\/div>\n<p>Dentro do mesmo arquivo, procure a linha que esteja escrito &#8220;RELATORIO DE ACESSO&#8221; e personalize. No meu caso: &#8220;Relatorio de acesso [nome da empresa]&#8221;.<\/p>\n<p>Desta forma, o Squid est\u00e1 configurado.<\/p>\n<p>Agora, a parte que eu acho a mais legal: criar uma p\u00e1gina personalizada de bloqueio. Quando os usu\u00e1rios tentarem acessar uma p\u00e1gina bloqueada, aparece a p\u00e1gina de erro padr\u00e3o do Squid, ensinarei a mudar-la para aparecer algo com a sua cara, pois podes criar uma p\u00e1gina pessoal bem amig\u00e1vel.<\/p>\n<p>Dentro do\u00a0squid.conf\u00a0da p\u00e1gina anterior, a \u00faltima linha era uma &#8220;ERROR_DIRECTORY&#8221;. Ela indica a pasta de erro a buscar um arquivo HTML, a ser mostrado na p\u00e1gina de bloqueio.<\/p>\n<p>Por\u00e9m, se a pasta indicada na linha n\u00e3o existe, crie ela:<\/p>\n<p><strong># mkdir \/usr\/share\/squid\/errors\/portuguese<\/strong><\/p>\n<p>Dentro dessa pasta, deve conter um arquivo de nome &#8220;ERR_ACCESS_DENIED&#8221;, um arquivo de texto com o seu c\u00f3digo HTML, vou postar o meu arquivo pronto para poderem editar:<\/p>\n<div class=\"codigo\">&lt;html&gt;&lt;head&gt;&lt;body&gt;&lt;\/br&gt;&lt;\/br&gt;<br \/>\n&lt;b&gt;&lt;center&gt;&lt;font\u00a0size=7\u00a0color=red&gt;A\u00a0Pagina\u00a0que\u00a0voce\u00a0esta\u00a0tentando\u00a0acessar\u00a0esta\u00a0bloqueada!!!&lt;\/font&gt;<br \/>\n&lt;div\u00a0align=center&gt;&lt;img\u00a0src=http:\/\/10.0.0.10\/bloqueio.jpg&gt;&lt;\/div&gt;&lt;\/head&gt;&lt;\/body&gt;&lt;\/html&gt;<\/div>\n<p>Se souber HTML, fa\u00e7a um arquivo como quiser, esta \u00e9 a parte legal desta p\u00e1gina de bloqueio, o que voc\u00ea colocar a\u00ed, aparece na hora do bloqueio.<\/p>\n<p>Colocando imagens, precisa usar da seguinte forma:\u00a0http:\/\/ipdoservidor\/nomedaimagem<\/p>\n<p>No meu caso, tenho um arquivo de imagem apontado. Sempre que tiver imagens, devem ser colocados na pasta\u00a0\/var\/www\/, a pasta p\u00fablica que o Apache cria. Se n\u00e3o estiver dentro dela, n\u00e3o aparece.<\/p>\n<h1>Finalizando com IPtables<\/h1>\n<p>Agora tudo pronto, servi\u00e7os iniciados, p\u00e1gina de bloqueio ativa, servidor DNS e DHCP resolvendo e distribuindo perfeitamente. S\u00f3 falta mandar que as conex\u00f5es sejam direcionadas \u00e0 porta do Squid para come\u00e7ar a ativar os bloqueios, e definir a regra de NAT GLOBAL.<\/p>\n<p>Inserindo a NAT GLOBAL:<\/p>\n<p><strong># iptables -t nat -A POSTROUTING -o eth(internet) -p tcp -j MASQUERADE<\/strong><\/p>\n<p>Inserindo a regra de redirecionamento da 80 para a 3128:<\/p>\n<p><strong># iptables -t nat -A PREROUTING -s (seu net id\/mascara) -p tcp &#8211;dport 80 -j REDIRECT &#8211;to-port 3128<\/strong><\/p>\n<p>Pronto, seu proxy est\u00e1 ativo, r\u00e1pido e f\u00e1cil.<\/p>\n<p>Apenas de quebra, vou deixar a linha para DROPAR o Facebook e impedir o acesso via IPtables, j\u00e1 que o maior objetivo dos Squids, s\u00e3o sempre as redes sociais:<\/p>\n<p><strong># iptables -A POSTROUTING -s (sua rede \/ mascara) -m string &#8211;algo bm &#8211;string &#8220;facebook.com&#8221; -J DROP<\/strong><\/p>\n<h1>Conclus\u00e3o<\/h1>\n<p>Espero ter ajudado quem, assim como eu, teve muitos problemas com o Squid, pois sintetizei tudo da maneira mais f\u00e1cil poss\u00edvel.<\/p>\n<p>Com habilidade, este esquema est\u00e1 pronto em 30 minutos, no m\u00e1ximo 1 hora, se der algum imprevisto.<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Iniciando \/ Roteamento \/ Kernel Iniciando A m\u00e1quina que configurei, foi um server Ubuntu 10.04 64 bits, dedicado para o seu fim, controlar o acesso na rede. Hardware: Processador Intel Core i7 Memoria DDR3 8 GB HD 80 GB (humilde) 2 placas de rede 10\/100\/1000 Segue o passo a passo de forma f\u00e1cil e r\u00e1pida. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[455,1,79,42,51,85,68,271,111],"tags":[639,117,638,86],"class_list":["post-919","post","type-post","status-publish","format-standard","hentry","category-apache2","category-viazap","category-firewall","category-leitura-recomendada","category-linux-linuxrs","category-proxy","category-redes-2","category-seguranca-2","category-squid-2","tag-configuracao-rapida","tag-iptables","tag-sarg","tag-squid"],"_links":{"self":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts\/919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=919"}],"version-history":[{"count":2,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts\/919\/revisions"}],"predecessor-version":[{"id":945,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=\/wp\/v2\/posts\/919\/revisions\/945"}],"wp:attachment":[{"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.clusterweb.com.br\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}