Summary

We have learned a lot about access control lists and access list rules in this chapter. We had a detailed look at the various types of ACL and how to construct ACL lists for different scenarios. We took examples describing a general situation in which we needed to use a mixture of ACL types and rules to achieve the desired access control.

Specifically, we covered:

  • Different types of ACL which can identify individual requests and replies.
  • Different types of access list rules which can be used to control access to various components of the Squid proxy server.
  • Achieving desired access control by mixing various ACL types with access rules.
  • Testing our new Squid configuration with the squidclient before actually using it in a production environment. ...

Get Squid Proxy Server 3.1 Beginner's Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.