3proxy.cfg.sample 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. # By Mark Dreuband
  2. nserver 10.1.2.1
  3. nscache 65536
  4. # we can grab wpad file from provider and feed it to dighosts
  5. # to build list of free networks
  6. # system "c:\3proxy\dighosts.exe -m http://wpad.security.nnov.ru/wpad.dat c:\3proxy\freenetworks.net"
  7. service
  8. internal 192.168.1.1
  9. external 10.1.1.1
  10. dnspr
  11. log &3proxylog,root
  12. #log c:\3proxy\logs\proxy.log D
  13. #logformat "Linsert into log (timestamp, username, service, clientip, remoteip, remoteport, bytesin, bytesout,request,error) values (
  14. #logformat "%t '%U' '%N' '%C' '%R' %r %I %O '%T' %E"
  15. logformat "-\'+_Linsert into log (time, bytesin, bytesout, username, url, host, port, service) values ('%Y-%m-%d %H:%M:%S', %I, %O, '%U', '%T', '%n', %r, '%N');"
  16. archiver zip c:\3proxy\zip.exe -m -qq %A %F
  17. rotate 50
  18. auth strong
  19. users temp:CL:password root:CL:password
  20. # access free networks directly
  21. allow * * $c:\3proxy\freenetworks.net
  22. # redirect web traffic for non-free networks to provider's proxy
  23. allow * * * 80
  24. parent 1000 http 10.1.2.5 3128
  25. # allow rest of traffic
  26. allow *
  27. proxy
  28. flush
  29. auth iponly
  30. allow *
  31. pop3p
  32. tcppm 25 mail.security.nnov.ru 25
  33. flush
  34. # redirect port 80 traffic via SOCKS server to local HTTP proxy to
  35. # have URLs logged
  36. allow * * * 80
  37. parent 1000 http 0.0.0.0 0
  38. allow *
  39. socks
  40. #daemon