<help>The port number where Squid sends and receives ICP queries to
and from neighbor caches. Leave blank to disable (default). The standard UDP port for ICP is 3130.
</help>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.logging.enable.accessLog</id>
<label>Enable access logging</label>
<type>checkbox</type>
<help>Enable access logging.</help>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.logging.enable.storeLog</id>
<label>Enable store logging</label>
<type>checkbox</type>
<help><![CDATA[Enable store logging.]]></help>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.alternateDNSservers</id>
<label>Use alternate DNS-servers</label>
<type>select_multiple</type>
<style>tokenize</style>
<help>
<![CDATA[Type IPs of alternative DNS servers you like to use. <div class="text-info"><b>TIP: </b>You can also paste a comma seperated list into this field.</div>]]></help>
<hint>Type IP adresses, followed by Enter or comma.</hint>
<allownew>true</allownew>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.dnsV4First</id>
<label>Enable DNS v4 first</label>
<type>checkbox</type>
<help><![CDATA[This option reverses the order of preference to make Squid contact dual-stack websites over IPv4 first.
Squid will still perform both IPv6 and IPv4 DNS lookups before connecting.
<div class="alert alert-warning"><bclass="text-danger">Warning:</b> This option will restrict the situations under which IPv6
connectivity is used (and tested). Hiding network problems
which would otherwise be detected and warned about.</div>]]></help>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.useViaHeader</id>
<label>Use Via header</label>
<type>checkbox</type>
<help><![CDATA[If set (default), Squid will include a Via header in requests and
replies as required by RFC2616.]]></help>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.forwardedForHandling</id>
<label>X-Forwarded for header handling</label>
<type>dropdown</type>
<help><![CDATA[Select what to do with X-Forwarded for header.]]></help>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.suppressVersion</id>
<label>Suppress version string</label>
<type>checkbox</type>
<help><![CDATA[Suppress Squid version string info in HTTP headers and HTML error pages.]]></help>
<advanced>true</advanced>
</field>
<field>
<id>proxy.general.uriWhitespaceHandling</id>
<label>Whitespace handling of URI</label>
<type>dropdown</type>
<help><![CDATA[Select what to do with URI that contain whitespaces.<br/>
<divclass="text-info"><b>NOTE:</b> the current Squid implementation of encode and chop violates
RFC2616 by not using a 301 redirect after altering the URL.</div>]]></help>
<help><![CDATA[Select interface(s) the proxy will bind to.]]></help>
<hint>Type or select interface.</hint>
</field>
<field>
<id>proxy.forward.port</id>
<label>Proxy port</label>
<type>text</type>
<help><![CDATA[The port the proxy service will listen to.]]></help>
</field>
<!--
<field>
<id>proxy.forward.transparentMode</id>
<label>Enable Transparent HTTP proxy</label>
<type>checkbox</type>
<help><![CDATA[Enable transparent proxy mode to forward all requests for destination port 80 to the proxy server without any additional configuration.]]></help>
</field>
-->
<field>
<id>proxy.forward.addACLforInterfaceSubnets</id>
<label>Allow interface subnets</label>
<type>checkbox</type>
<help>
<![CDATA[When enabled the subnets of the selected interfaces will be added to the allow access list.]]></help>
<help><![CDATA[Select interface(s) the ftp proxy will bind to.]]></help>
<hint>Type or select interface (Leave blank to disable ftp proxy).</hint>
</field>
<field>
<id>proxy.forward.ftpPort</id>
<label>FTP proxy port</label>
<type>text</type>
<help><![CDATA[The port the proxy service will listen to.]]></help>
</field>
<!--
<field>
<id>proxy.forward.ftpTransparentMode</id>
<label>Enable Transparent mode</label>
<type>checkbox</type>
<help>
<![CDATA[Enable transparent ftp proxy mode to forward all requests for destination port 21 to the proxy server without any additional configuration.]]></help>
</field>
-->
</subtab>
<subtabid="proxy-forward-acl"description="Access Control List">
<field>
<id>proxy.forward.acl.allowedSubnets</id>
<label>Allowed Subnets</label>
<type>select_multiple</type>
<style>tokenize</style>
<help>
<![CDATA[Type subnets you want to allow acces to the proxy server, use a comma or press Enter for new item. <div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>]]></help>
<![CDATA[Type IP adresses you want to allow acces to the proxy server, use a comma or press Enter for new item. <div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>]]></help>
<hint>Type IP adresses (ex. 192.168.1.100)</hint>
<allownew>true</allownew>
</field>
<field>
<id>proxy.forward.acl.bannedHosts</id>
<label>Banned host IP adresses</label>
<type>select_multiple</type>
<style>tokenize</style>
<help>
<![CDATA[Type IP adresses you want to deny acces to the proxy server, use a comma or press Enter for new item. <div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>]]></help>
<help><![CDATA[This specifies for how long (in hours) the proxy server assumes an externally validated username and password combination is valid (Time To Live).<br/>
When the TTL expires, the user will be prompted for credentials again.]]></help>
</field>
<field>
<id>proxy.forward.authentication.children</id>
<label>Authentication processes</label>
<type>text</type>
<help><![CDATA[The total number of authenticator processes to spawn.]]></help>
'help':'The port number where Squid sends and receives ICP queries to
and from neighbor caches. Leave blank to disable (default). The standard UDP port for ICP is 3130.',
'advanced':'true'
],
['id': 'proxy.general.logging.enable.accessLog',
'label':'Enable access logging',
'type':'checkbox',
'help':'Enable access logging.',
'advanced':'true'
],
['id': 'proxy.general.logging.enable.storeLog',
'label':'Enable store logging',
'type':'checkbox',
'help':'Enable store logging.',
'advanced':'true'
],
['id': 'proxy.general.alternateDNSservers',
'label':'Use alternate DNS-servers',
'type':'select_multiple',
'style':'tokenize',
'help':'Type IPs of alternative DNS servers you like to use. <div class="text-info"><b>TIP: </b>You can also paste a comma seperated list into this field.</div>',
'hint':'Type IP adresses, followed by Enter or comma.',
'allownew':'true',
'advanced':'true'
],
['id': 'proxy.general.dnsV4First',
'label':'Enable DNS v4 first',
'type':'checkbox',
'help':'This option reverses the order of preference to make Squid contact dual-stack websites over IPv4 first.
Squid will still perform both IPv6 and IPv4 DNS lookups before connecting.
<div class="alert alert-warning"><b class="text-danger">Warning:</b> This option will restrict the situations under which IPv6
connectivity is used (and tested). Hiding network problems
which would otherwise be detected and warned about.</div>',
'advanced':'true'
],
['id': 'proxy.general.useViaHeader',
'label':'Use Via header',
'type':'checkbox',
'help':'If set (default), Squid will include a Via header in requests and
replies as required by RFC2616.',
'advanced':'true'
],
['id':'proxy.general.forwardedForHandling',
'label':'X-Forwarded for header handling',
'type':'dropdown',
'help':'Select what to do with X-Forwarded for header.',
'advanced':'true'
],
['id': 'proxy.general.suppressVersion',
'label':'Suppress version string',
'type':'checkbox',
'help':'Suppress Squid version string info in HTTP headers and HTML error pages.',
'advanced':'true'
],
['id':'proxy.general.uriWhitespaceHandling',
'label':'Whitespace handling of URI',
'type':'dropdown',
'help':'Select what to do with URI that contain whitespaces.<br/>
<div class="text-info"><b>NOTE:</b> the current Squid implementation of encode and chop violates
RFC2616 by not using a 301 redirect after altering the URL.</div>',
'help':'Select interface(s) the proxy will bind to.',
'hint':'Type or select interface.'
],
['id': 'proxy.forward.port',
'label':'Proxy port',
'type':'text',
'help':'The port the proxy service will listen to.'
],
['id': 'proxy.forward.transparentMode',
'label':'Enable Transparent HTTP proxy',
'type':'checkbox',
'help':'Enable transparent proxy mode to forward all requests for destination port 80 to the proxy server without any additional configuration.'
,'disable':true
],
['id': 'proxy.forward.addACLforInterfaceSubnets',
'label':'Allow interface subnets',
'type':'checkbox',
'help':'When enabled the subnets of the selected interfaces will be added to the allow access list.',
'advanced':'true'
]}
],
[ 'proxy-forward-ftp','FTP Proxy Settings',
{['id': 'proxy.forward.ftpInterfaces',
'label':'FTP proxy interfaces',
'type':'select_multiple',
'style':'tokenize',
'help':'Select interface(s) the ftp proxy will bind to.',
'hint':'Type or select interface (Leave blank to disable ftp proxy).'
],
['id': 'proxy.forward.ftpPort',
'label':'FTP proxy port',
'type':'text',
'help':'The port the proxy service will listen to.'
],
['id': 'proxy.forward.ftpTransparentMode',
'label':'Enable Transparent mode',
'type':'checkbox',
'help':'Enable transparent ftp proxy mode to forward all requests for destination port 21 to the proxy server without any additional configuration.'
,'disable':true
]}
],
[ 'proxy-forward-acl','Access Control List',
{['id': 'proxy.forward.acl.allowedSubnets',
'label':'Allowed Subnets',
'type':'select_multiple',
'style':'tokenize',
'help':'Type subnets you want to allow acces to the proxy server, use a comma or press Enter for new item. <div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'help':'Type IP adresses you want to allow acces to the proxy server, use a comma or press Enter for new item. <div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'hint':'Type IP adresses (ex. 192.168.1.100)',
'allownew':'true'
],
['id': 'proxy.forward.acl.bannedHosts',
'label':'Banned host IP adresses',
'type':'select_multiple',
'style':'tokenize',
'help':'Type IP adresses you want to deny acces to the proxy server, use a comma or press Enter for new item. <div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'hint':'Type IP adresses (ex. 192.168.1.100)',
'allownew':'true'
],
['id': 'proxy.forward.acl.whiteList',
'label':'Whitelist',
'type':'select_multiple',
'style':'tokenize',
'help':'Whitelist destination domains.<br/>
You may use a regular expression, use a comma or press Enter for new item.<br/>
<div class="alert alert-info">
<b>Examples:</b><br/>
<b class="text-primary">.mydomain.com</b> -> matches on <b>*.mydomain.com</b><br/>
<b class="text-primary">^http(s|)://([a-zA-Z]+)\.mydomain\.*</b> -> matches on <b>http(s)://*.mydomain.*</b><br/>
<b class="text-primary">\\.+\.gif$</b> -> matches on <b>\*.gif</b> but not on <b class="text-danger">\*.gif\test</b><br/>
<b class="text-primary">\\.+[0-9]+\.gif$</b> -> matches on <b>\123.gif</b> but not on <b class="text-danger">\test.gif</b><br/>
</div>
<div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'hint':'Regular expressions are allowed. ',
'allownew':'true'
],
['id': 'proxy.forward.acl.blackList',
'label':'Blacklist',
'type':'select_multiple',
'style':'tokenize',
'help':'Blacklist destination domains.<br/>
You may use a regular expression, use a comma or press Enter for new item.<br/>
<div class="alert alert-info">
<b>Examples:</b><br/>
<b class="text-primary">.mydomain.com</b> -> matches on <b>*.mydomain.com</b><br/>
<b class="text-primary">^http(s|)://([a-zA-Z]+)\.mydomain\.*</b> -> matches on <b>http(s)://*.mydomain.*</b><br/>
<b class="text-primary">\\.+\.gif$</b> -> matches on <b>\*.gif</b> but not on <b class="text-danger">\*.gif\test</b><br/>
<b class="text-primary">\\.+[0-9]+\.gif$</b> -> matches on <b>\123.gif</b> but not on <b class="text-danger">\test.gif</b><br/>
</div>
<div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'hint':'Regular expressions are allowed.',
'allownew':'true'
],
['id': 'proxy.forward.acl.browser',
'label':'Block browser/user-agents',
'type':'select_multiple',
'style':'tokenize',
'help':'Block user-agents.<br/>
You may use a regular expression, use a comma or press Enter for new item.<br/>
<div class="alert alert-info">
<b>Examples:</b><br/>
<b class="text-primary">^(.)+Macintosh(.)+Firefox/37\.0</b> -> matches on <b>Macintosh version of Firefox revision 37.0</b><br/>
<b class="text-primary">^Mozilla</b> -> matches on <b>all Mozilla based browsers</b><br/>
</div>
<div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'hint':'Regular expressions are allowed.',
'allownew':'true',
'advanced':'true'
],
['id': 'proxy.forward.acl.mimeType',
'label':'Block specific MIME type reply',
'type':'select_multiple',
'style':'tokenize',
'help':'Block specific MIME type reply.<br/>
You may use a regular expression, use a comma or press Enter for new item.<br/>
<div class="alert alert-info">
<b>Examples:</b><br/>
<b class="text-primary">video/flv</b> -> matches on <b>Flash Video</b><br/>
<b class="text-primary">application/x-javascript</b> -> matches on <b>javascripts</b><br/>
</div>
<div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'hint':'Regular expressions are allowed.',
'allownew':'true',
'advanced':'true'
],
['id': 'proxy.forward.acl.safePorts',
'label':'Allowed destination TCP port',
'type':'select_multiple',
'style':'tokenize',
'help':'Allowed destination TCP ports, you may use ranges (ex. 222-226) and add comments with collon (ex. 22:ssh).<br/>
<div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'hint':'Type port number or range.',
'allownew':'true',
'advanced':'true'
],
['id': 'proxy.forward.acl.sslPorts',
'label':'Allowed SSL ports',
'type':'select_multiple',
'style':'tokenize',
'help':'Allowed destination SSL ports, you may use ranges (ex. 222-226) and add comments with collon (ex. 22:ssh).<br/>
<div class="text-info"><b>TIP: </b>You can also paste a comma separated list into this field.</div>',
'help':'This specifies for how long (in hours) the proxy server assumes an externally validated username and password combination is valid (Time To Live).<br/>
When the TTL expires, the user will be prompted for credentials again. '
],
['id': 'proxy.forward.authentication.children',
'label':'Authentication processes',
'type':'text',
'help':'The total number of authenticator processes to spawn.'