0 Membres et 3 Invités sur ce sujet
Nouveau firmware beta pour l'edgemax !http://community.ubnt.com/t5/EdgeMAX-Beta/Beta-release-v1-5-0beta1/m-p/827460/thread-id/3950Cité dans le log, pour les options dhcp Le truc dont on discutait plus haut semble donc disponible, il semblent assez réactifs aux demandes des utilisateurs.
Je mets en vrac les infos pour enlever les pubs avec le Edgemax# Activer le proxy transparent configureset service webproxy listen-address 192.168.2.1commit# Activer le proxy non transparent sur le port 3128configureset service webproxy default-port 3128set service webproxy listen-address 192.168.2.1 disable-transparentcommit# Bypass du proxy pour une IP specifiqueconfigureset service webproxy proxy-bypass <ip address>commit# Mise a jour des categories (obligation afin de desactiver les pubs)update webproxy blacklists# Interdire un site precisconfigureset service webproxy url-filtering squidguard local-block twitter.comcommit# Desactiver les publicitesconfigureset service webproxy url-filtering squidguard block-category adscommit# Exemple de config prise sur le web (ca peut aider a voir les differentes categories par exempleset service webproxy cache-size 4096set service webproxy default-port 3128set service webproxy enable-access-logset service webproxy listen-address 127.0.0.1 disable-transparentset service webproxy listen-address 192.168.0.1 disable-transparentset service webproxy listen-address 192.168.1.1 disable-transparentset service webproxy listen-address 192.168.2.1 disable-transparentset service webproxy maximum-object-size 256set service webproxy mem-cache-size 64set service webproxy url-filtering squidguard allow-ipaddr-urlset service webproxy url-filtering squidguard auto-update update-hour 0set service webproxy url-filtering squidguard block-category adsset service webproxy url-filtering squidguard block-category adultset service webproxy url-filtering squidguard block-category aggressiveset service webproxy url-filtering squidguard block-category agressifset service webproxy url-filtering squidguard block-category arjelset service webproxy url-filtering squidguard block-category dangerous_materialset service webproxy url-filtering squidguard block-category drogueset service webproxy url-filtering squidguard block-category drugsset service webproxy url-filtering squidguard block-category gamblingset service webproxy url-filtering squidguard block-category hackingset service webproxy url-filtering squidguard block-category malwareset service webproxy url-filtering squidguard block-category mixed_adultset service webproxy url-filtering squidguard block-category phishingset service webproxy url-filtering squidguard block-category pornset service webproxy url-filtering squidguard block-category proxyset service webproxy url-filtering squidguard block-category publiciteset service webproxy url-filtering squidguard block-category redirectorset service webproxy url-filtering squidguard block-category remote-controlset service webproxy url-filtering squidguard block-category strict_redirectorset service webproxy url-filtering squidguard block-category strong_redirectorset service webproxy url-filtering squidguard block-category tricheurset service webproxy url-filtering squidguard block-category violenceset service webproxy url-filtering squidguard block-category warezset service webproxy url-filtering squidguard default-action allowset service webproxy url-filtering squidguard enable-safe-searchset service webproxy url-filtering squidguard local-ok bit.co.idset service webproxy url-filtering squidguard local-ok supermicro.comset service webproxy url-filtering squidguard local-ok supermicro.com.twset service webproxy url-filtering squidguard local-ok kaskus.co.idset service webproxy url-filtering squidguard redirect-url 'http://192.168.2.254/blank.GIF'set service webproxy url-filtering squidguard rule 1 allow-ipaddr-urlset service webproxy url-filtering squidguard rule 1 block-category adsset service webproxy url-filtering squidguard rule 1 block-category adultset service webproxy url-filtering squidguard rule 1 block-category aggressiveset service webproxy url-filtering squidguard rule 1 block-category agressifset service webproxy url-filtering squidguard rule 1 block-category arjelset service webproxy url-filtering squidguard rule 1 block-category dangerous_materialset service webproxy url-filtering squidguard rule 1 block-category drogueset service webproxy url-filtering squidguard rule 1 block-category drugsset service webproxy url-filtering squidguard rule 1 block-category gamblingset service webproxy url-filtering squidguard rule 1 block-category hackingset service webproxy url-filtering squidguard rule 1 block-category malwareset service webproxy url-filtering squidguard rule 1 block-category mixed_adultset service webproxy url-filtering squidguard rule 1 block-category phishingset service webproxy url-filtering squidguard rule 1 block-category pornset service webproxy url-filtering squidguard rule 1 block-category proxyset service webproxy url-filtering squidguard rule 1 block-category publiciteset service webproxy url-filtering squidguard rule 1 block-category redirectorset service webproxy url-filtering squidguard rule 1 block-category remote-controlset service webproxy url-filtering squidguard rule 1 block-category strict_redirectorset service webproxy url-filtering squidguard rule 1 block-category strong_redirectorset service webproxy url-filtering squidguard rule 1 block-category tricheurset service webproxy url-filtering squidguard rule 1 block-category violenceset service webproxy url-filtering squidguard rule 1 block-category warezset service webproxy url-filtering squidguard rule 1 block-category audio-videoset service webproxy url-filtering squidguard rule 1 default-action allowset service webproxy url-filtering squidguard rule 1 description 'Working Hours Policy'set service webproxy url-filtering squidguard rule 1 enable-safe-searchset service webproxy url-filtering squidguard rule 1 local-ok bit.co.idset service webproxy url-filtering squidguard rule 1 local-ok supermicro.comset service webproxy url-filtering squidguard rule 1 local-ok supermicro.com.twset service webproxy url-filtering squidguard rule 1 local-ok kaskus.co.idset service webproxy url-filtering squidguard rule 1 redirect-url 'http://192.168.2.254/blank.GIF'set service webproxy url-filtering squidguard rule 1 source-group Kantorset service webproxy url-filtering squidguard rule 1 time-period Workingset service webproxy url-filtering squidguard source-group Kantor address 192.168.0.0/16set service webproxy url-filtering squidguard source-group Kantor description 'All BIT LAN'set service webproxy url-filtering squidguard time-period Working days weekdays time '08:00-17:00'P.S. Je n'ai pas mis de save apres le commit j'ai un doute en faut t'il un ?
client-option "send vendor-class-identifier \"neufbox-emailgmail.com\";"