Имеется сервер с Centos7(rout) на KVM и есть физический роутер Asus(Роутер). А так же локальная сеть в которой нужно некоторым пользователям(желательно по имени ПК) запретить ходить туда, где «снег бошка упадет».
rout является dns и dhcp сервером и клиентом vpn. так же установлен пакет squid(вроде даже настроен)
имеется два интерфейса смотрят в сети 192.168.0.0/24 и 192.168.1.0/24
используется только 192.168.0.0/24
вопрос в том как мне пустить трафик через програмный роутер на centos и контролировать кто куда ходит и блокировать сайты на которые ходить незя.
на клиентах прописан шлюзом rout и все кроме контроля трафика работает. на клиентах wi-fi пришлось прописать шлюзом 192.168.0.1 т.к. иначе качество интернета падает дальше некуда.
вопрос: как мне все наки заставить squid контролировать трафик?
листинги ip route (rout)
ip route
0.0.0.0/24 via 192.168.0.1 dev ens3 proto zebra
default via 192.168.0.1 dev ens3
10.13.5.0/24 via 10.13.5.5 dev tun0
10.13.5.5 dev tun0 proto kernel scope link src 10.13.5.6
169.254.0.0/16 dev ens3 scope link metric 1002
169.254.0.0/16 dev ens9 scope link metric 1003
192.168.0.0/24 dev ens3 scope link
192.168.1.0/24 dev ens9 proto kernel scope link src 192.168.1.254
192.168.2.0/24 dev ens9 proto kernel scope link src 192.168.2.254
cat /etc/squid/squid.conf
#
# Recommended minimum configuration:
#
# Example rule allowing access from your local networks.
# Adapt to list your (internal) IP networks from where browsing
# should be allowed
acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
acl localnet src 172.16.0.0/12 # RFC1918 possible internal network
acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
acl localnet src fc00::/7 # RFC 4193 local private network range
acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
acl bl url_regex -i /etc/squid/bl
acl SSL_ports port 443
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
#
# Recommended minimum Access Permission configuration:
#
# Deny requests to certain unsafe ports
http_access deny !Safe_ports
# Deny CONNECT to other than secure SSL ports
http_access deny CONNECT !SSL_ports
# Only allow cachemgr access from localhost
http_access allow localhost manager
http_access deny manager
# We strongly recommend the following be uncommented to protect innocent
# web applications running on the proxy server who think the only
# one who can access services on "localhost" is a local user
#http_access deny to_localhost
#
# INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
#
# Example rule allowing access from your local networks.
# Adapt localnet in the ACL section to list your (internal) IP networks
# from where browsing should be allowed
http_access deny bl
http_access allow localnet
http_access allow localhost
# And finally deny all other access to this proxy
http_access deny all
# Squid normally listens to port 3128
http_port 3128 intercept
# Uncomment and adjust the following to add a disk cache directory.
#cache_dir ufs /var/spool/squid 100 16 256
# Leave coredumps in the first cache dir
coredump_dir /var/spool/squid
#
# Add any of your own refresh_pattern entries above these.
#
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
refresh_pattern . 0 20% 4320
p -c a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 52:54:00:2a:a7:83 brd ff:ff:ff:ff:ff:ff
inet 192.168.0.254/24 brd 192.168.0.255 scope global ens3
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fe2a:a783/64 scope link
valid_lft forever preferred_lft forever
3: ens9: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
link/ether 52:54:00:83:ab:08 brd ff:ff:ff:ff:ff:ff
inet 192.168.1.254/24 brd 192.168.1.255 scope global ens9
valid_lft forever preferred_lft forever
inet 192.168.2.254/24 brd 192.168.2.255 scope global ens9
valid_lft forever preferred_lft forever
inet6 fe80::5054:ff:fe83:ab08/64 scope link
valid_lft forever preferred_lft forever
4: tun0: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 100
link/none
inet 10.13.5.6 peer 10.10.0.5/32 scope global tun0
valid_lft forever preferred_lft forever
inet6 fe80::85d2:8575:3414:a592/64 scope link flags 800
valid_lft forever preferred_lft forever