{"id":6282,"date":"2020-07-04T09:18:08","date_gmt":"2020-07-04T06:18:08","guid":{"rendered":"https:\/\/kifarunix.com\/?p=6282"},"modified":"2024-03-14T22:15:48","modified_gmt":"2024-03-14T19:15:48","slug":"install-and-setup-squid-proxy-on-pfsense","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/install-and-setup-squid-proxy-on-pfsense\/","title":{"rendered":"Install and Setup Squid Proxy on pfSense"},"content":{"rendered":"\n<p>In this tutorial, we are going to learn how to install and setup Squid proxy on pfSense. pfSense&nbsp;is a free and open source firewall and router that also features unified threat management, load balancing, multi WAN and many more features that are comprehensively described on&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.netgate.com\/solutions\/pfsense\/features.html\" target=\"_blank\">pfSense features page<\/a>.<\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"http:\/\/www.squid-cache.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Squid<\/a> is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator.<\/p>\n\n\n\n<p>You can learn how to install pfsense on a KVM Hypervisor by following the link below;<\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/install-pfsense-firewall-on-kvm\/\" target=\"_blank\" rel=\"noreferrer noopener\">Install pfSense Firewall on KVM<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Installing Squid Proxy on pfSense<\/h2>\n\n\n\n<p><strong>Assuming you already have a running pfSense, proceed to install and configure Squid proxy.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Install Squid Package on pfSense<\/h3>\n\n\n\n<p>Squid package can be installed on pfSense by navigating to <strong>System &gt; Package Manager<\/strong> menu on the web interface.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"934\" height=\"479\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-pfsense.png\" alt=\"Install and Setup Squid Proxy on pfSense\" class=\"wp-image-6313\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-pfsense.png?v=1593840737 934w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-pfsense-768x394.png?v=1593840737 768w\" sizes=\"(max-width: 934px) 100vw, 934px\" \/><\/figure>\n\n\n\n<p>Once the Package Manager opens up, click <strong>Available Packages<\/strong> and enter <code><strong>squid<\/strong><\/code> as the search term on the search bar.<\/p>\n\n\n\n<p>Click <strong>Search<\/strong> button to search for the squid package. You should be able to see squid related package.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1445\" height=\"773\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-packages.png\" alt=\"\" class=\"wp-image-6310\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-packages.png?v=1593840135 1445w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-packages-768x411.png?v=1593840135 768w\" sizes=\"(max-width: 1445px) 100vw, 1445px\" \/><\/figure>\n\n\n\n<p>From the search output above, we are only interested in installing Squid. Hence, begin the installation of Squid proxy package by clicking the install button on the far right and confirm the installation.<\/p>\n\n\n\n<p>You should be able to see such a screen once the installation is done.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1435\" height=\"647\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-installed.png\" alt=\"\" class=\"wp-image-6311\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-installed.png?v=1593840578 1435w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-installed-768x346.png?v=1593840578 768w\" sizes=\"(max-width: 1435px) 100vw, 1435px\" \/><\/figure>\n\n\n\n<p>You should now be able to see both packages under <strong>Installed Packages<\/strong> tab.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1444\" height=\"662\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/installed-packages.png\" alt=\"\" class=\"wp-image-6312\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/installed-packages.png?v=1593840657 1444w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/installed-packages-768x352.png?v=1593840657 768w\" sizes=\"(max-width: 1444px) 100vw, 1444px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Configuring Squid Proxy Server on pfSense<\/h3>\n\n\n\n<p>Once the installation is done, you can proceed to configure Squid proxy server on pfSense.<\/p>\n\n\n\n<p>Navigate to <strong>Services<\/strong> &gt; <strong>Squid Proxy Server<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Configure Squid Proxy Server Local Cache<\/h4>\n\n\n\n<p>Click on the <strong>Local Cache<\/strong> tab to define Squid Proxy cache management settings.<\/p>\n\n\n\n<p>In our setup, the we only changed the disk cache size to 3GB (3000MB) and leave the other default settings including the default cache directory, <code><strong>\/var\/squid\/cache<\/strong><\/code>.<\/p>\n\n\n\n<p>Be sure to clear the cache by clicking the <strong>Clear Disk Cache Now<\/strong> button.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1419\" height=\"709\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/local-cache.png\" alt=\"\" class=\"wp-image-6314\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/local-cache.png?v=1593840771 1419w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/local-cache-768x384.png?v=1593840771 768w\" sizes=\"(max-width: 1419px) 100vw, 1419px\" \/><\/figure>\n\n\n\n<p>Once you are done with the settings, click <strong>Save<\/strong> button at the bottom of the page.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Configure Squid Proxy Server General Settings<\/h4>\n\n\n\n<p>Click on the <strong>General<\/strong> tab to enable Squid Proxy server and to define other general settings.<\/p>\n\n\n\n<p>Under <strong>Squid General Settings<\/strong> section;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check the box adjacent to <strong>Enable Squid Proxy<\/strong> to enable Squid.<\/li>\n\n\n\n<li>Choose the interface(s) the proxy server will bind to, we chose <strong>LAN<\/strong> interface in this demo.<\/li>\n\n\n\n<li>Set the proxy port, we use the default <strong>3128<\/strong> in this demo<\/li>\n\n\n\n<li>Check the box adjacent to <strong>Allow users on interface<\/strong> to give the users connected to the same subnets as the Proxy LAN interface selected automatic access without the need for creating an allow <strong>Access Control<\/strong> <strong>List<\/strong> for them.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1428\" height=\"824\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-general.png\" alt=\"\" class=\"wp-image-6315\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-general.png?v=1593840854 1428w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-general-768x443.png?v=1593840854 768w\" sizes=\"(max-width: 1428px) 100vw, 1428px\" \/><\/figure>\n\n\n\n<p>We will skip the use of <strong>Transparent Proxy<\/strong> and <strong>SSL filtering<\/strong> settings in this demo.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Configure Squid Proxy Logging Settings<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable logging<\/li>\n\n\n\n<li>Set the logs storage directory,<code> \/var\/squid\/logs<\/code>, by default<\/li>\n\n\n\n<li>Set how long the log files should be kept.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1429\" height=\"425\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-logging.png\" alt=\"\" class=\"wp-image-6316\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-logging.png?v=1593840981 1429w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-logging-768x228.png?v=1593840981 768w\" sizes=\"(max-width: 1429px) 100vw, 1429px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Configure Other Squid Proxy customizations<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure other customizations including the visible squid hostname, admin email, proxy server messing language. These details are displayed on an error message<\/li>\n\n\n\n<li>Enable your Squid proxy to append your client&#8217;s IP address in the HTTP requests it forwards.<\/li>\n\n\n\n<li>Disable Squid Via header in requests and replies<\/li>\n\n\n\n<li>Enable suppression of squid version string info in HTTP headers and HTML error pages.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1425\" height=\"601\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-customizations.png\" alt=\"\" class=\"wp-image-6317\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-customizations.png?v=1593841081 1425w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/squid-customizations-768x324.png?v=1593841081 768w\" sizes=\"(max-width: 1425px) 100vw, 1425px\" \/><\/figure>\n\n\n\n<p>You can click <strong>Show Advanced Options<\/strong> for further configuration options.<\/p>\n\n\n\n<p>Click <strong>Save<\/strong> once you are done with configurations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configure Squid Proxy Server Access Control Lists<\/h3>\n\n\n\n<p>You can now proceed to configure Squid proxy access control list to define what elements to allow or deny access on proxy server.<\/p>\n\n\n\n<p>If you noticed in the general settings above, we enabled <strong>Allow Users on Interface<\/strong>. This means that, user who are connected to the Proxy LAN Interface subnet are automatically allowed to connect via the proxy without the need for an ACL for that specific subnet.<\/p>\n\n\n\n<p>In our setup, we have three interfaces as highlighted below;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"734\" height=\"409\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/interfaces.png\" alt=\"\" class=\"wp-image-6318\" title=\"\"><\/figure><\/div>\n\n\n<p>As such, we set our Proxy Interface to LAN, which means, any users that will be connected to that subnet, will not need any ACL to use the proxy.<\/p>\n\n\n\n<p>We also have the third interface <strong>OPT1<\/strong>, as in the above screenshot. Our clients will be connecting to Proxy through this subnet. Let us create an ACL for this subnet;<\/p>\n\n\n\n<p>Click <strong>ACLs<\/strong> tab and under allowed subnets, enter your subnet to be allowed to connect through Proxy.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1436\" height=\"458\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/allowed_subnet.png\" alt=\"\" class=\"wp-image-6319\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/allowed_subnet.png?v=1593841321 1436w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/allowed_subnet-768x245.png?v=1593841321 768w\" sizes=\"(max-width: 1436px) 100vw, 1436px\" \/><\/figure>\n\n\n\n<p>You can further set your ACLs for unrestricted IPs, blacklist, whitelist, banned hosts, blocked user agents&#8230;<\/p>\n\n\n\n<p>Define your Safe ports if any to add to the already predefined ports.<\/p>\n\n\n\n<p>If you have any other custom settings you want to define, click <strong>Show Advanced Options<\/strong> to configure them.<\/p>\n\n\n\n<p>Click <strong>Save<\/strong> after configurations.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Allow Hosts in OPT1 interface to use Proxy on the Firewall<\/h4>\n\n\n\n<p>Next, you need to define the destination IP and Port for the proxy server and set the firewall to allow all hosts on your specific subnet to pass all the traffic through the proxy server.<\/p>\n\n\n\n<p>Navigate to <strong>Firewall &gt; Rules<\/strong> &gt; choose your Interface, in this case, <strong>OPT1<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Click on either of the add button to add the firewall rule.<\/li>\n\n\n\n<li>Allow traffic through by setting action to <strong>Pass<\/strong><\/li>\n\n\n\n<li>Select the interface from which traffic comes from, select IP address family and the protocol.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1428\" height=\"518\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/rule-action.png\" alt=\"\" class=\"wp-image-6320\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/rule-action.png?v=1593841643 1428w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/rule-action-768x279.png?v=1593841643 768w\" sizes=\"(max-width: 1428px) 100vw, 1428px\" \/><\/figure>\n\n\n\n<p>Define the source and destination as shown in the screenshot below. <strong>Note<\/strong> that we set the destination to the LAN interface we configured Proxy to bind to.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1427\" height=\"438\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/src-dst-proxy.png\" alt=\"\" class=\"wp-image-6321\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/src-dst-proxy.png?v=1593841687 1427w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/src-dst-proxy-768x236.png?v=1593841687 768w\" sizes=\"(max-width: 1427px) 100vw, 1427px\" \/><\/figure>\n\n\n\n<p>Once done configuring the rule, click <strong>Save<\/strong> and then <strong>Apply Changes<\/strong> to reload the firewall configurations.<\/p>\n\n\n\n<p>You rule should now be looking like;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1437\" height=\"582\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/allow-proxy-firewall.png\" alt=\"\" class=\"wp-image-6323\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/allow-proxy-firewall.png?v=1593841926 1437w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/allow-proxy-firewall-768x311.png?v=1593841926 768w\" sizes=\"(max-width: 1437px) 100vw, 1437px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Testing Squid Proxy<\/h2>\n\n\n\n<p>Literally, your proxy server is now ready. I will be testing from an Ubuntu 20.04 desktop with the following IP details;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>ip add show enp0s3<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>2: enp0s3: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000\n    link\/ether 08:00:27:99:9a:af brd ff:ff:ff:ff:ff:ff\n    inet 192.168.10.10\/24 brd 192.168.10.255 scope global noprefixroute enp0s3\n       valid_lft forever preferred_lft forever\n    inet6 fe80::1b2a:9fab:fa5b:a375\/64 scope link noprefixroute \n       valid_lft forever preferred_lft forever<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>ip route show default<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>default via 192.168.10.1 dev enp0s3 proto static metric 20100<\/code><\/pre>\n\n\n\n<p>Testing the reachability to the Proxy IP;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>ping 192.168.57.100 -c 4<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>PING 192.168.57.100 (192.168.57.100) 56(84) bytes of data.\n64 bytes from 192.168.57.100: icmp_seq=1 ttl=64 time=1.22 ms\n64 bytes from 192.168.57.100: icmp_seq=2 ttl=64 time=1.23 ms\n64 bytes from 192.168.57.100: icmp_seq=3 ttl=64 time=1.09 ms\n64 bytes from 192.168.57.100: icmp_seq=4 ttl=64 time=0.964 ms\n\n--- 192.168.57.100 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3007ms\nrtt min\/avg\/max\/mdev = 0.964\/1.126\/1.226\/0.107 ms<\/code><\/pre>\n\n\n\n<p>Check the connectivity to the Proxy port;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>telnet 192.168.57.100 3128<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>Trying 192.168.57.100...\nConnected to 192.168.57.100.\nEscape character is '^]'.\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"firefoxproxysettings\"><a href=\"#firefoxproxysettings\">Configure Proxy settings on Firefox browser.<\/a><\/h4>\n\n\n\n<p>On your Firefox, configure it to connect external network via your Squid server.&nbsp;<strong>Preferences<\/strong>&nbsp;&gt;&nbsp;<strong>Genera<\/strong>l &gt;&nbsp;<strong>Network Settings &gt; Manual Proxy Configuration<\/strong>. Check&nbsp;<strong>Use this proxy server for all protocols.<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"837\" height=\"508\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/firefox-proxy-settings.png\" alt=\"\" class=\"wp-image-6324\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/firefox-proxy-settings.png?v=1593842113 837w, https:\/\/kifarunix.com\/wp-content\/uploads\/2020\/07\/firefox-proxy-settings-768x466.png?v=1593842113 768w\" sizes=\"(max-width: 837px) 100vw, 837px\" \/><\/figure><\/div>\n\n\n<p>You should now be able to access internet via Squid Proxy.<\/p>\n\n\n\n<p>What if you are using Google Chrome, how do you set the proxy server settings? Learn how to configure system wide proxy settings by following the link below<\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/how-to-set-system-wide-proxy-in-ubuntu-18-04\/#systemwideproxy\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">How to configure System Wide Proxy settings on Ubuntu systems<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Checking Squid Logs<\/h4>\n\n\n\n<p>You can tail squid logs to verify connection.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>tail -f \/var\/squid\/logs\/access.log<\/code><\/pre>\n\n\n\n<p>For example, these are the sample logs trying to access YouTube;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>...\n1593755589.111   1184 192.168.10.10 TCP_TUNNEL\/200 9507 CONNECT yt3.ggpht.com:443 - HIER_DIRECT\/216.58.223.65 -\n1593755589.131   1180 192.168.10.10 TCP_TUNNEL\/200 7861 CONNECT yt3.ggpht.com:443 - HIER_DIRECT\/216.58.223.65 -\n1593755589.133   1197 192.168.10.10 TCP_TUNNEL\/200 9363 CONNECT yt3.ggpht.com:443 - HIER_DIRECT\/216.58.223.65 -\n1593755589.177    257 192.168.10.10 TCP_TUNNEL\/200 7716 CONNECT yt3.ggpht.com:443 - HIER_DIRECT\/216.58.223.65 -\n1593755589.185    272 192.168.10.10 TCP_TUNNEL\/200 9518 CONNECT yt3.ggpht.com:443 - HIER_DIRECT\/216.58.223.65 \n...<\/code><\/pre>\n\n\n\n<p>Your Squid Proxy server is now running on a pfSense gateway.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reference<\/h3>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/docs.netgate.com\/pfsense\/en\/latest\/cache-proxy\/setup-squid-as-a-transparent-proxy.html\" target=\"_blank\" rel=\"noreferrer noopener\">Configuring Squid Proxy on pfSense<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Related Tutorials<\/h3>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/install-and-setup-squid-proxy-on-ubuntu-20-04\/\" target=\"_blank\" rel=\"noreferrer noopener\">Install and Setup Squid Proxy on Ubuntu 20.04<\/a><\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/install-and-setup-haproxy-on-centos-8\/\" target=\"_blank\" rel=\"noreferrer noopener\">Install and Setup HAProxy on CentOS 8<\/a><\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/install-and-configure-squid-proxy-on-centos-8\/\" target=\"_blank\" rel=\"noreferrer noopener\">Install and Configure Squid Proxy on CentOS 8<\/a><\/p>\n\n\n\n<p><a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/configure-apt-proxy-on-debian-10-buster\/\" target=\"_blank\" rel=\"noreferrer noopener\">Configure APT Proxy on Debian 10 Buster<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/configure-highly-available-haproxy-with-keepalived-on-ubuntu-20-04\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Configure Highly Available HAProxy with Keepalived on Ubuntu 20.04<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this tutorial, we are going to learn how to install and setup Squid proxy on pfSense. pfSense&nbsp;is a free and open source firewall and<\/p>\n","protected":false},"author":1,"featured_media":10750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[121,250,34],"tags":[1756,1755,1757,251,277,1758],"class_list":["post-6282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-howtos","category-proxy","category-security","tag-configure-squid-proxy-on-pfsense","tag-install-squid-proxy-on-pfsense","tag-pfsense","tag-squid","tag-squid-proxy","tag-system-proxy-settings","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/6282"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=6282"}],"version-history":[{"count":14,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/6282\/revisions"}],"predecessor-version":[{"id":21458,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/6282\/revisions\/21458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/10750"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=6282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=6282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=6282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}