So far we have mainly dealt with ACLs that filter based on source IP address or destination port, but there are many other ACL types. Though most people implement only very basic access control, Squid's access system is very powerful and flexible, allowing for in-depth filtering of access to cache resources. ![]() Below are just a few of the many things Squid can do. ![]() ![]() In many cases, the basic configuration we've seen in the previous chapter can be sufficient for accelerating web access and protecting the network, but Squid can do much more.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |