Lusca Cache is also known as Lusca web/proxy cache.
Lusca is a fork of the Squid-2 development tree. The Lusca project
aims to fix the shortcomings in the Squid-2 codebase whilst
maintaining the the Squid-2
functionality and stability.
This project provides existing Squid-2 users with a migration path
to an actively
developed codebase and new users with a stable, predictable
software product to deploy.
Like its predecessor, Lusca supports the majority of HTTP/1.0 and
HTTP/1.1 protocol and caching
constructs including ETag/Variant entities. Among other things, it
supports HTTP content load
balancing, fail over, intelligent request/reply routing, high
performance memory and disk caching,
an overly-flexible access control system, support for both high
performance forward and reverse
proxy modes. It supports a variety of clustering protocols,
including ICPv2, ICPv3, CARP and HTCP
for both clustering and control. Lusca supports Cisco WCCPv2
interception in both software and
hardware forwarding modes.
Users, Administrators and Developers alike are invited to
participate in this small
but growing community of users who wish to continue using a
well-understood, stable
web proxy/cache platform but have need of something with more
performance, features
and scalability.
Lusca continues to include fixes and developments from the Squid
project where appropriate
alongside its own growing list of improvements.
It can cache any of the following...:
1.) patches of Online Games i.e Special Force/ Cross Fire /Battle of Immortals /Garena etc...
2.) Video Caching i.e Youtube / Xtube etch. etc...
3.) Windows / Linux Updates / Anti-virus , Anti-Malware i.e. Avira/ Avast / MBAM etc...
4.) well known sites i.e. facebook / google / yahoo etc...
5.) download caching mp3's/mpeg/avi etch. etc...
official website: http://www.lusca.org/
Modified Lusca Cache for Pfsense firewall : http://code.google.com/p/pfsense-cacheboy/
Pfsense 2.0 + Lusca Cache Setup
Pfsense 2.0 + Lusca Cache Setup
Speedtest result (screenshot) using Pfsense + Lusca Cache.
1. Go to Diagnostics > Command Prompt and then execute shell command :
2. Wait for a few minutes, then Look Lusca Cache inside the System > Package Manager.
If Lusca Cache is now available in the lists, it is now ready for download and installation.
Scroll down and look for Lusca Cache.
3. Click the "+" to start the download, extraction and installation of Lusca Cache. Wait another 5 to 30 minutes (it depends on the speed of your internet and system.) to complete the installation.
Tip: Wait and do not browse to other pages of pfsense until completed.
4. After successful installation of Lusca Cache, it should appear inside "Installed Packages"
If not repeat step 2.
5. Go back to Diagnostics > Command Prompt and then execute shell command :
Complete Lusca Cache Setup and screenshot coming soon....
(Right click and open image to a new TAB to view larger image size)
Speedtest result (screenshot) using Pfsense + Lusca Cache.
fetch http://pfsense-cacheboy.googlecode.com/svn/trunk/script/package.sh && chmod +x package.sh && ./package.sh
2. Wait for a few minutes, then Look Lusca Cache inside the System > Package Manager.
If Lusca Cache is now available in the lists, it is now ready for download and installation.
Scroll down and look for Lusca Cache.
3. Click the "+" to start the download, extraction and installation of Lusca Cache. Wait another 5 to 30 minutes (it depends on the speed of your internet and system.) to complete the installation.
Tip: Wait and do not browse to other pages of pfsense until completed.
4. After successful installation of Lusca Cache, it should appear inside "Installed Packages"
If not repeat step 2.
5. Go back to Diagnostics > Command Prompt and then execute shell command :
squid -z
6. It's time to configure Lusca Cache, proceed to Services > Proxy Server.
Complete Lusca Cache Setup and screenshot coming soon....
(Right click and open image to a new TAB to view larger image size)
Pfsense
pfSense is a free, open source customized distribution of FreeBSD
tailored for use as a firewall and router. In addition to being a
powerful, flexible firewalling and routing platform, it includes a long
list of related features and a package system allowing further
expandability without adding bloat and potential security
vulnerabilities to the base distribution. pfSense is a popular project
with more than 1 million downloads since its inception, and proven in
countless installations ranging from small home networks protecting a PC
and an Xbox to large corporations, universities and other organizations
protecting thousands of network devices.
This project started in 2004 as a fork of the m0n0wall project, but focused towards full PC installations rather than the embedded hardware focus of m0n0wall. pfSense also offers an embedded image for Compact Flash based installations, however it is not our primary focus.
Here's the new Pfsense 2.0 Final Release.
Pfsense Dashboard Screenshot
(Right click and open image to a new TAB to view the larger size)
This project started in 2004 as a fork of the m0n0wall project, but focused towards full PC installations rather than the embedded hardware focus of m0n0wall. pfSense also offers an embedded image for Compact Flash based installations, however it is not our primary focus.
Here's the new Pfsense 2.0 Final Release.
Pfsense Dashboard Screenshot
(Right click and open image to a new TAB to view the larger size)
Monowall Virtual Private Network (VPN)
Monowall Virtual Private Network (VPN) Setup and screenshots
IPsec Tunnel
Monowall PPTP Configuration
Monowall PPTP Users
IPsec Tunnel
Monowall PPTP Configuration
Monowall PPTP Users
Monowall Services
Monowall Captive Portal Setup and Screenshots
(Right click on the image and open in new TAB to view original size)
Monowall Captive Portal Pass-Through using MAC Filter
Monowall Proxy APR
Monowall Captive Portal Allowed Addresses
Monowall Captive Portal Fire Manager
Monowall Captive Portal Users
Monowall Captive Portal Vouchers
Monowall DHCP Relay
Monowall DHCP Server
Monowall DNS Forwarder
Monowall Dynamic DNS
Monowall SNMP
(Right click on the image and open in new TAB to view original size)
Monowall Captive Portal Pass-Through using MAC Filter
Monowall Proxy APR
Monowall Captive Portal Allowed Addresses
Monowall Captive Portal Fire Manager
Monowall Captive Portal Users
Monowall Captive Portal Vouchers
Monowall DHCP Relay
Monowall DHCP Server
Monowall DNS Forwarder
Monowall Dynamic DNS
Monowall SNMP
Monowall Interfaces
Monowall Interfaces - Assigning Network Ports
Monowall Local Area Network (LAN)
Monowall WAN Configuration
Monowall Local Area Network (LAN)
Monowall WAN Configuration
Monowall Firewall
Monowall Firewall Setup and Screenshots :
Monowall Firewall Aliases
Monowall Firewall Rules
Monowall NAT 1 to 1
Monowall NAT Inbound
Monowall NAT Outbound
Monowall NAT Server
Monowall Traffic Shaper - Magic Shaper Wizard
Monowall Traffic Shaper Pipes
Monowall Traffic Shaper Queues
Monowall Traffic Shaper Rules
(Right click on the image and open in new TAB to view original size)
Monowall Firewall Aliases
Monowall Firewall Rules
Monowall NAT 1 to 1
Monowall NAT Inbound
Monowall NAT Outbound
Monowall NAT Server
Monowall Traffic Shaper - Magic Shaper Wizard
Monowall Traffic Shaper Pipes
Monowall Traffic Shaper Queues
Monowall Traffic Shaper Rules
(Right click on the image and open in new TAB to view original size)
Monowall Diagnostics
Monowall Diagnostics Setup and screenshots
Monowall ARP Table
Monowall Backup and Restore
Monowall DHCP Leases
Monowall Ping
Monowall Traceroute
Monowall ARP Table
Monowall Backup and Restore
Monowall DHCP Leases
Monowall Ping
Monowall Traceroute
Monowall System
Monowall General Setup
Monowall System Static routes
Monowall Firmware
Monowall Advanced Setup
Monowall User Manager
Monowall Setup and Screenshots
m0n0wall is a project aimed at creating a complete, embedded firewall
software package that, when used together with an embedded PC, provides
all the important features of commercial firewall boxes (including ease
of use) at a fraction of the price (free software).
m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent.
m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format.
Official website : http://m0n0.ch/wall
Monowall Latest Version 1.33 built on Wed Mar 16 12:01:51 CET 2011
m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent.
m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format.
Official website : http://m0n0.ch/wall
Monowall Latest Version 1.33 built on Wed Mar 16 12:01:51 CET 2011
m0n0wall 1.33 adds a new image type for generic PCs with a serial console,
further improves IPv6 support, includes a driver for newer Realtek network chipsets
and contains various small changes and bug fixes.
Linksys WAP54G
Linksys WAP54G - Wireless G Access Point ver. 3.1
Linksys WAP54g Front View
Linksys WAP54g Back View
Linksys WAP54g Inside and Board
Linksys WAP54g Front View
Linksys WAP54g Back View
Linksys WAP54g Inside and Board
Subscribe to:
Posts (Atom)