<font size=2 face="sans-serif">Hi Team;</font>
<br><font size=2 face="sans-serif">I have setup as below-</font>
<ul>
<li><font size=2 face="sans-serif">Squid Kerberos authentication with windows
AD 2012r2. - works fine.</font>
<li><font size=2 face="sans-serif">Now need to restrict access based on
AD Group membership.</font></ul>
<br><font size=2 face="sans-serif">Below configuration done but no luck.
when try to access with user who is not part of the group mention, still
he is able to browse Internet.</font>
<br>
<br><font size=2 face="sans-serif">================================</font>
<br><font size=2 face="Courier New">#</font>
<br><font size=2 face="Courier New"># Recommended minimum configuration:</font>
<br><font size=2 face="Courier New">#</font>
<br>
<br><font size=2 face="Courier New">#auth_param negotiate program /usr/lib64/squid/squid_kerb_auth
-d -s GSS_C_NO_NAME</font>
<br><font size=2 face="Courier New">auth_param negotiate program /usr/lib64/squid/squid_kerb_auth
-s HTTP/proxy02.abcd.co.uk@abcd.co.uk -d</font>
<br><font size=2 face="Courier New">auth_param negotiate children 10</font>
<br><font size=2 face="Courier New">auth_param negotiate keep_alive on</font>
<br><font size=2 face="Courier New">auth_param basic credentialsttl 2 hours</font>
<br><font size=2 face="Courier New">acl ad_auth proxy_auth REQUIRED</font>
<br>
<br><font size=2 face="Courier New">external_acl_type Domain_Admin %LOGIN
/usr/lib64/squid/squid_ldap_group -b "dc=abcd,dc=co,dc=uk" -D
"cn=Nilesh Gavali,ou=Admin User,ou=TCS Users,ou=Staff,dc=abcd,dc=co,dc=uk"
-w "123456" -f "(&(objectclass=person)(sAMAccountName=%v)(memberof=cn=lgInternetAccess,ou=Internet
Access,ou=Groups,dc=abcd,dc=co,dc=uk))" -h xx.xx.2.101</font>
<br><font size=2 face="Courier New">acl AllowDomainAdmin external Domain_Admin
lgInternetAccess</font>
<br>
<br><font size=2 face="Courier New">acl manager proto cache_object</font>
<br><font size=2 face="Courier New">acl localhost src 127.0.0.1/32 ::1</font>
<br><font size=2 face="Courier New">acl to_localhost dst 127.0.0.0/8 0.0.0.0/32
::1</font>
<br>
<br><font size=2 face="Courier New"># Example rule allowing access from
your local networks.</font>
<br><font size=2 face="Courier New"># Adapt to list your (internal) IP
networks from where browsing</font>
<br><font size=2 face="Courier New"># should be allowed</font>
<br><font size=2 face="Courier New">acl localnet src 10.0.0.0/8
# RFC1918 possible internal network</font>
<br><font size=2 face="Courier New">acl localnet src 172.16.0.0/12
# RFC1918 possible internal network</font>
<br><font size=2 face="Courier New">acl localnet src 192.168.0.0/16
# RFC1918 possible internal network</font>
<br><font size=2 face="Courier New">acl localnet src fc00::/7
# RFC 4193 local private network range</font>
<br><font size=2 face="Courier New">acl localnet src fe80::/10
# RFC 4291 link-local (directly plugged) machines</font>
<br>
<br><font size=2 face="Courier New">acl SSL_ports port 443</font>
<br><font size=2 face="Courier New">acl Safe_ports port 80
# http</font>
<br><font size=2 face="Courier New">acl Safe_ports port 21
# ftp</font>
<br><font size=2 face="Courier New">acl Safe_ports port 443
# https</font>
<br><font size=2 face="Courier New">acl Safe_ports port 70
# gopher</font>
<br><font size=2 face="Courier New">acl Safe_ports port 210
# wais</font>
<br><font size=2 face="Courier New">acl Safe_ports port 1025-65535
# unregistered ports</font>
<br><font size=2 face="Courier New">acl Safe_ports port 280
# http-mgmt</font>
<br><font size=2 face="Courier New">acl Safe_ports port 488
# gss-http</font>
<br><font size=2 face="Courier New">acl Safe_ports port 591
# filemaker</font>
<br><font size=2 face="Courier New">acl Safe_ports port 777
# multiling http</font>
<br><font size=2 face="Courier New">acl CONNECT method CONNECT</font>
<br>
<br><font size=2 face="Courier New">#</font>
<br><font size=2 face="Courier New"># Recommended minimum Access Permission
configuration:</font>
<br><font size=2 face="Courier New">#</font>
<br><font size=2 face="Courier New"># Only allow cachemgr access from localhost</font>
<br><font size=2 face="Courier New">http_access allow manager localhost</font>
<br><font size=2 face="Courier New">http_access deny manager</font>
<br>
<br><font size=2 face="Courier New"># Deny requests to certain unsafe ports</font>
<br><font size=2 face="Courier New">http_access deny !Safe_ports</font>
<br>
<br><font size=2 face="Courier New"># Deny CONNECT to other than secure
SSL ports</font>
<br><font size=2 face="Courier New">http_access deny CONNECT !SSL_ports</font>
<br>
<br>
<br><font size=2 face="Courier New"># We strongly recommend the following
be uncommented to protect innocent</font>
<br><font size=2 face="Courier New"># web applications running on the proxy
server who think the only</font>
<br><font size=2 face="Courier New"># one who can access services on "localhost"
is a local user</font>
<br><font size=2 face="Courier New">#http_access deny to_localhost</font>
<br>
<br><font size=2 face="Courier New">#</font>
<br><font size=2 face="Courier New"># INSERT YOUR OWN RULE(S) HERE TO ALLOW
ACCESS FROM YOUR CLIENTS</font>
<br><font size=2 face="Courier New">#</font>
<br><font size=2 face="Courier New">#</font>
<br><font size=2 face="Courier New"># Example rule allowing access from
your local networks.</font>
<br><font size=2 face="Courier New"># Adapt localnet in the ACL section
to list your (internal) IP networks</font>
<br><font size=2 face="Courier New"># from where browsing should be allowed</font>
<br><font size=2 face="Courier New">#http_access allow localnet</font>
<br><font size=2 face="Courier New">#http_access allow localhost</font>
<br><font size=2 face="Courier New">http_access deny !ad_auth</font>
<br><font size=2 face="Courier New">http_access allow ad_auth</font>
<br><font size=2 face="Courier New">http_access deny !AllowDomainAdmin</font>
<br><font size=2 face="Courier New">http_access allow AllowDomainAdmin</font>
<br>
<br><font size=2 face="Courier New"># And finally deny all other access
to this proxy</font>
<br><font size=2 face="Courier New">http_access deny all</font>
<br>
<br><font size=2 face="Courier New"># Squid normally listens to port 3128</font>
<br><font size=2 face="Courier New">http_port 8080</font>
<br><font size=2 face="Courier New">never_direct allow all</font>
<br>
<br><font size=2 face="Courier New">cache_peer xx.xx.2.108 parent 8080
0 default</font>
<br><font size=2 face="Courier New">dns_nameservers xx.xx.2.108</font>
<br>
<br><font size=2 face="Courier New"># We recommend you to use at least
the following line.</font>
<br><font size=2 face="Courier New">#hierarchy_stoplist cgi-bin ?</font>
<br>
<br><font size=2 face="Courier New"># Uncomment and adjust the following
to add a disk cache directory.</font>
<br><font size=2 face="Courier New">cache_dir ufs /var/spool/squid 2048
16 256</font>
<br>
<br><font size=2 face="Courier New"># Leave coredumps in the first cache
dir</font>
<br><font size=2 face="Courier New">coredump_dir /var/spool/squid</font>
<br>
<br><font size=2 face="Courier New"># Log forwarding to SysLog</font>
<br><font size=2 face="Courier New">access_log syslog:local1.info</font>
<br>
<br><font size=2 face="Courier New"># Add any of your own refresh_pattern
entries above these.</font>
<br><font size=2 face="Courier New">refresh_pattern ^ftp:
1440
20% 10080</font>
<br><font size=2 face="Courier New">refresh_pattern ^gopher:
1440 0%
1440</font>
<br><font size=2 face="Courier New">refresh_pattern -i (/cgi-bin/|\?) 0
0% 0</font>
<br><font size=2 face="Courier New">refresh_pattern .
0
20% 4320</font>
<br><font size=2 face="sans-serif">=================================================</font>
<br>
<br>
<ul>
<li></ul><font size=2 face="sans-serif">Thanks & Regards<br>
Nilesh Suresh Gavali<br>
</font><p>=====-----=====-----=====<br>
Notice: The information contained in this e-mail<br>
message and/or attachments to it may contain <br>
confidential or privileged information. If you are <br>
not the intended recipient, any dissemination, use, <br>
review, distribution, printing or copying of the <br>
information contained in this e-mail message <br>
and/or attachments to it are strictly prohibited. If <br>
you have received this communication in error, <br>
please notify us by reply e-mail or telephone and <br>
immediately and permanently delete the message <br>
and any attachments. Thank you</p>
<p></p>