Estou tentando configurar um servidor proxy transparente sem cache, mas não está dando certo. Segue abaixo algumas configurações:
Distribuição linux
root@debian:~# lsb_release -a
No LSB modules are available.
Distributor ID: Debian
Description: Debian GNU/Linux 10 (buster)
Release: 10
Codename: buster
squid.conf
acl localnet src 0.0.0.1-0.255.255.255 # RFC 1122 "this" network (LAN)
acl localnet src 10.0.0.0/8 # RFC 1918 local private network (LAN)
acl localnet src 100.64.0.0/10 # RFC 6598 shared address space (CGN)
acl localnet src 169.254.0.0/16 # RFC 3927 link-local (directly plugged) machines
acl localnet src 172.16.0.0/12 # RFC 1918 local private network (LAN)
acl localnet src 192.168.0.0/16 # RFC 1918 local private network (LAN)
acl localnet src fc00::/7 # RFC 4193 local private network range
acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
acl redelocal src 192.168.0.0/24
acl SSL_ports port 443
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localhost manager
http_access deny manager
include /etc/squid/conf.d/*
http_access allow localhost
http_access allow redelocal
http_access deny all
http_port 3128 transparent
http_port 3129
visible_hostname redelocal
coredump_dir /var/spool/squid
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
refresh_pattern . 0 20% 4320
firewall.sh
#!/bin/sh
case "$1" in
start)
#-------------------------
# || Limpando as regras ||
#-------------------------
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
#-----------------------
# || Políticas Padrão ||
#-----------------------
iptables -P INPUT DROP
iptables -P FORWARD DROP
#---------------------------
# || Encaminhando Pacotes ||
#---------------------------
echo "1" > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A POSTROUTING -o enp1s0 -j MASQUERADE
iptables -t nat -A PREROUTING -i enp2s0 -p tcp --dport 80 -j REDIRECT --to-port 3128
iptables -t nat -A PREROUTING -i enp2s0 -p tcp --dport 443 -j REDIRECT --to-port 3128
iptables -A INPUT -i enp2s0 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -p icmp -j ACCEPT
iptables -A FORWARD -p icmp -j ACCEPT
iptables -A FORWARD -p udp --dport 53 -j ACCEPT
iptables -A FORWARD -p udp --sport 53 -j ACCEPT
#-------------------------
# || Libera portas XBOX ||
#-------------------------
iptables -A FORWARD -p udp -i enp2s0 --dport 88 -j ACCEPT
iptables -A FORWARD -p tcp -i enp2s0 --dport 3074 -j ACCEPT
iptables -A FORWARD -p udp -i enp2s0 --dport 3074 -j ACCEPT
iptables -A FORWARD -p tcp -i enp2s0 --dport 53 -j ACCEPT
iptables -A FORWARD -p udp -i enp2s0 --dport 53 -j ACCEPT
iptables -A FORWARD -p udp -i enp2s0 --dport 500 -j ACCEPT
iptables -A FORWARD -p udp -i enp2s0 --dport 3544 -j ACCEPT
iptables -A FORWARD -p udp -i enp2s0 --dport 4500 -j ACCEPT
echo "----------------------------"
echo "Regras de firewall ativadas"
echo "----------------------------"
;;
stop)
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -X
echo "1" > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A POSTROUTING -o enp1s0 -j MASQUERADE
iptables -P INPUT ACCEPT
iptables -P FORWARD ACCEPT
echo "Regras de firewall desativadas"
;;
*)
echo "-------------------"
echo "Parâmetro Inválido!"
echo "-------------------"
;;
esac
interfaces
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
source /etc/network/interfaces.d/*
# The loopback network interface
auto lo
iface lo inet loopback
# The primary network interface
allow-hotplug enp1s0
iface enp1s0 inet dhcp
auto enp2s0
iface enp2s0 inet static
address 192.168.0.1
netmask 255.255.255.0