SquidGuard

HOME Downloads Documentation Development Blacklists Contributions Contact


  Installing squidGuard


  1. Unpack the source

     tar xvzf squidGuard-1.2.1.tar.gz
    

  2. Compiling
    Let's assume it is squidGuard-1.2.1 we are trying to install:

     cd squidGuard-1.2.1
     ./configure
     make
    

    If no errors occurred squidGuard is now installed in /usr/local/. There are a couple of option you can use when running ./configure. For example:

    Installing in a different location
     ./configure --prefix=/some/other/directory
    

    BerkeleyDB not in /usr/local/BerkeleyDB installed
     ./configure  --with-db=/directory/of/BerkeleyDB/installation
    

    When installed from the sources the BerkeleyDB will be located in /usr/local/BerkeleyDBx.y with x.y denoting the version number.
    Annotation: Make sure that the shared library of your BerkeleyDB installation is known by your system (check /etc/ld.so.conf, add your BerkeleyDB library path if it is not already there and run ldconfig).

    See all ./configure options
     ./configure --help
    


  3. Installing

     su -
     make install
    

  4. Installing the blacklists

    Copy your blacklists into the desired blacklist directory (default: /usr/local/squidGuard/db) and unpack them. In the table below we assume that the default location is used. Make sure that you have the proper permissions to write to that directory.

     cp /path/to/your/blacklist.tar.gz /usr/local/squidGuard/db
     cd /usr/local/squidGuard/db
     gzip -d blacklist.tar.gz
     tar xfv blacklist.tar
    

    Now the blacklists should be ready to use.


Congratulation. You have just completed the installation of squidGuard. The next step is to configure the software according to your needs. After this you should verify your installation before you finally modify your squid configuration to work with squidGuard.

Proceed with:     Basic Configuration of SquidGuard





Documentation
Installation
Configuration
 Getting started
 Destination ACLs
 Source ACLs
 Redirect Rule
 Time Constraints
 Authentication
 Regular Expressions
 Examples

Runtime Options
About blocking
Troubleshooting
Known Issues
Other Sources



  © Powered by Shalla Secure Services KG 2007-2012