http_port 3128 transparent
hierarchy_stoplist cgi-bin ?
acl QUERY urlpath_regex cgi-bin \?
cache deny QUERY
acl apache rep_header Server ^Apache
broken_vary_encoding allow apache
access_log /var/log/squid/access.log squid
hosts_file /etc/hosts
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern . 0 20% 4320
acl all src 0.0.0.0/0.0.0.0
acl LOCAL src 10.23.118.0/24
acl manager proto cache_object
acl localhost src 127.0.0.1/255.255.255.255
acl to_localhost dst 127.0.0.0/8
acl SSL_ports port 443 # https
acl SSL_ports port 563 # snews
acl SSL_ports port 873 # rsync
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 #
gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 #
unregistered ports
acl Safe_ports port 280 #
http-mgmt
acl Safe_ports port 488 #
gss-http
acl Safe_ports port 591 #
filemaker
acl Safe_ports port 777 # multiling
http
acl Safe_ports port 631 # cups
acl Safe_ports port 873 # rsync
acl Safe_ports port 901 # SWAT
acl purge method PURGE
acl CONNECT method CONNECT
http_access allow manager localhost
http_access deny manager
http_access allow purge localhost
http_access deny purge
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localhost
http_access allow LOCAL
http_access deny all
http_reply_access allow all
icp_access allow all
cache_effective_group proxy
coredump_dir /var/spool/squid
#!/bin/bash
IPTABLES=/sbin/iptables
MODPROBE=/sbin/modprobe
echo "1" > /proc/sys/net/ipv4/ip_forward
$IPTABLES -F
$IPTABLES -t nat -F
$IPTABLES -t mangle -F
#######################################################
##
MODULOS ##
#######################################################
$MODPROBE iptable_nat
$MODPROBE iptable_filter
$MODPROBE iptable_mangle
$MODPROBE ip_nat_ftp
$MODPROBE ip_conntrack_ftp
$MODPROBE ipt_MASQUERADE
$MODPROBE ipt_REDIRECT
#######################################################
##
POLITICAS ##
#######################################################
$IPTABLES -P INPUT DROP
$IPTABLES -P OUTPUT DROP
$IPTABLES -P FORWARD DROP
#######################################################
##
REGRAS INPUT
##
#######################################################
# PERMITE INTERFACE LOOPBACK
$IPTABLES -A INPUT -i lo -j ACCEPT
# PERMITE ACESSO
A INTERNET DO FIREWALL
$IPTABLES -A INPUT -p tcp -m multiport --sport
1863,80,443,20,21 -j ACCEPT
# PERMITE ACESSO
A INTERNET DO FIREWALL
$IPTABLES -A INPUT -p udp --sport 53 -j ACCEPT
# PERMITE
ATUALIZACAO DINAMICA NO-IP
$IPTABLES -A INPUT -p tcp --sport 8245 -j ACCEPT
# PERMITE RESOLUCAO NOMES DNS
$IPTABLES -A INPUT -p udp -s 10.23.118.0/24 --dport 53
-j ACCEPT
# PERMITE ACESSO
AO PROXY
$IPTABLES -A
INPUT -p tcp -s 10.23.118.0/24 --dport 3128 -j ACCEPT
# PERMITE ACESSO
AO MSN
$IPTABLES -A INPUT -p tcp -s 10.23.118.0/24 --dport
1863 -j ACCEPT
# TRAFEGO REDE EXTERNA
$IPTABLES -A INPUT -p tcp -i ppp+ -j ACCEPT
# PERMITE SSH
$IPTABLES -A INPUT -p tcp --dport 22 -j ACCEPT
# PERMITE ICMP
$IPTABLES -A INPUT -p icmp -j ACCEPT
# LOG
$IPTABLES -A
INPUT -j LOG --log-prefix "BLOQUEIO INPUT "
#######################################################
## REGRAS OUTPUT ##
#######################################################
# PERMITE TODO TRAFEGO
LOCAL PARA QUALQUER DESTINO
$IPTABLES -A OUTPUT -j ACCEPT
# PERMITE
ATUALIZACAO DINAMICA NO-IP
$IPTABLES -A OUTPUT -p tcp --dport 8245 -j ACCEPT
# LOG
$IPTABLES -A
OUTPUT -j LOG --log-prefix "BLOQUEIO OUTPUT "
#######################################################
## NAT ##
#######################################################
# REGRA
DIRECIONAMENTO DEMAIS CONEXOES
$IPTABLES -t nat -A POSTROUTING -o ppp+ -j MASQUERADE
# PROXY TRANSPARENTE
$IPTABLES -t nat -A PREROUTING -i eth1 -p tcp --dport
80 -j REDIRECT --to-port 3128
#######################################################
## REGRAS FORWARD ##
#######################################################
# REGRAS ACESSO
REDE INTERNA
$IPTABLES -A FORWARD -p tcp -s 10.23.118.0/24 -j
ACCEPT
$IPTABLES -A FORWARD -p tcp -d 10.23.118.0/24 -j
ACCEPT
# LOG
$IPTABLES -A
FORWARD -j LOG --log-prefix "BLOQUEIO FORWARD "