Verify Your Setup
Goal: Confirm SafeSquid is installed, licensed, and proxying traffic so you can proceed to policy configuration with confidence.
Prerequisites
- SafeSquid is installed and the license is activated (see Activate Your License)
- At least one client is configured to use the proxy (see Connect Your Client)
- You have SSH access to the SafeSquid server
5-Minute Verification Checklist
Run these checks to confirm SafeSquid is working end-to-end. Each test takes under a minute.
1. Service Is Running
SSH into the SafeSquid server and check:
# Check SafeSquid is listening on port 8080
netstat -lntp | grep 8080
Expected: A line showing SafeSquid listening on 0.0.0.0:8080
# Confirm the process is active
pidof safesquid
Expected: One or more process IDs
# Check service status (systemd systems)
systemctl status safesquid
Expected: Active: active (running)
2. Configuration Interface Loads
From a browser configured to proxy through SafeSquid (port 8080), navigate to:
http://safesquid.cfg/
Expected: The SafeSquid configuration interface loads
Alternative (direct access): If proxy isn't configured yet, try:
https://SAFESQUID-SERVER-IP:8443/
See Explicit Proxy for a 2-minute setup.
3. License Is Active
In the SafeSquid interface, go to Support in the top menu.
Check the Activation Details section:
- Product Type: Shows your license tier (Free or Commercial)
- Status: Shows "active"
- Expiry: In the future (commercial) or shows no expiry (free)
If Status shows "inactive":
- Re-upload your activation key (Activate Your License)
- Check firewall allows outbound HTTPS to
api.safesquid.net
4. HTTP Traffic Flows Through the Proxy
From the proxied browser, visit an HTTP site:
http://example.com
Expected: Page loads normally
Then check the SafeSquid access log:
# On SafeSquid server:
tail -20 /var/log/safesquid/access/extended.log
Expected: Log entries showing:
- Your client IP
- URL:
example.com - HTTP status:
200or301 - Timestamp
If no log entries appear:
- Browser isn't using the proxy
- Check browser proxy settings
- Test from command line:
curl --proxy http://SAFESQUID-IP:8080 http://example.com
5. HTTPS Traffic Flows Through the Proxy
From the proxied browser, visit an HTTPS site:
https://www.google.com
What to expect:
If SSL Inspection is NOT enabled:
- Page loads with certificate warning (expected)
- Click through the warning
- Page loads
If SSL Inspection IS enabled:
- Page loads normally, no warning
- Check certificate issuer: Should show SafeSquid CA
Check the log:
tail -20 /var/log/safesquid/access/extended.log
Expected: Entry for www.google.com with status 200
Until SSL Inspection is configured, HTTPS sites will show certificate warnings. This is expected behavior—SafeSquid is proxying the connection but not inspecting it.
6. DNS Resolution Works
# Test DNS from the SafeSquid server
nslookup example.com 127.0.0.1
Expected: A valid IP address response (e.g., 93.184.216.34)
If DNS fails:
- BIND9 not running:
systemctl status bind9 - Check BIND9 config:
/etc/bind/named.conf - See BIND9 Configuration
Quick Troubleshooting
| Symptom | Likely Cause | Fix |
|---|---|---|
| Port 8080 not listening | SafeSquid not started | systemctl start safesquid or /etc/init.d/safesquid start |
| safesquid.cfg not loading | Browser not using proxy | Set proxy: SafeSquid-IP:8080 in browser settings |
| Activation shows inactive | Key not uploaded or can't reach api.safesquid.net | Re-upload key; check firewall allows port 443 outbound |
| No log entries for traffic | Traffic not routing through proxy | Verify browser proxy settings: chrome://net-internals/#proxy (Chrome) or about:networking (Firefox) |
| DNS resolution fails | BIND9 not running | systemctl restart bind9; check /var/log/syslog for errors |
| HTTPS sites don't load at all | Firewall blocking, or SafeSquid crashed | Check: systemctl status safesquid; Check firewall: iptables -L |
For detailed troubleshooting, see Troubleshooting.
Post-Installation Client Checklist
Before marking the installation complete, verify these items from a client workstation:
Network Connectivity
- Ping Test:
ping <PROXY-IP>succeeds from client machine - Port Connectivity:
telnet <PROXY-IP> 8080connects (use PuTTY on Windows)
Client Configuration
- Browser Proxy Settings: Configured to use SafeSquid (HTTP proxy:
<PROXY-IP>:8080) - System Proxy Settings: (Optional) OS-level proxy configured for all applications
License & Interface Access
- Admin Interface Access:
http://safesquid.cfg/loads when proxy is configured - Activation Key Imported: License uploaded via SafeSquid interface
- License Status Verified: Check Support → Activation Details shows "active"
Remote Management (Optional)
- SSH Client Installed: PuTTY, Terminal, or equivalent
- SSH Keys Configured: Public key added to proxy server if using key-based authentication
- SSH Connection Test:
ssh administrator@<PROXY-IP>succeeds
SafeSquid Integration Validation
Use this checklist to verify that SafeSquid is fully integrated and ready for production use.
Authentication & Identity
- AD/LDAP Integration: Users authenticate with domain credentials
- User Identification: Test that usernames appear in logs (
/var/log/safesquid/extended.log) - Group-Based Policies: (If configured) Verify different user groups receive different policies
Policy Enforcement
- URL Filtering: Test that blocked categories are actually blocked
- URL Categorization: Verify SafeSquid correctly categorizes websites
- Time-Based Policies: (If configured) Check policies activate/deactivate at scheduled times
- SSL Inspection: HTTPS sites show SafeSquid's SSL certificate (after CA deployment)
Security & Content Filtering
- Antivirus Scanning: Upload EICAR test file; verify it's blocked
- Content Filtering: Test keyword blocking (if enabled)
- File Type Blocking: Upload restricted file types; confirm they're blocked
Operations & Monitoring
- Logging Verified: Check
/var/log/safesquid/contains access logs - Updates Configured: SafeSquid can reach update servers
- Update Schedule Set: Automatic or manual update policy defined
- Monitoring/Alerting: (Optional) Integrated with monitoring tools (Splunk, ELK, etc.)
- Reporting Dashboard: SafeSquid admin interface reports load correctly
Testing & Documentation
- Connectivity from Clients: Multiple devices can browse through SafeSquid
- Policy Test Matrix: Documented test cases for each policy rule
- Backup Configuration: Config backed up (
/usr/local/safesquid/config/directory) - Disaster Recovery Plan: Documented procedure for failover/restore
Verification Complete ✅
If all 6 checks passed:
✅ SafeSquid is installed and running
✅ License is activated
✅ HTTP traffic flows through the proxy
✅ HTTPS traffic flows through the proxy
✅ DNS is working
✅ You're ready to configure policies
Next Steps
-
SSL Inspection — Enable HTTPS decryption so SafeSquid can inspect and filter encrypted traffic (required for policy enforcement on HTTPS sites)
-
Authentication — Integrate with Active Directory or LDAP for user-aware policies
-
Access Restriction — Set up URL filtering, category blocking, and time-based policies
-
Troubleshooting — Bookmark this for when issues arise (logs, diagnostics, common fixes)
Production Readiness Checklist:
Before going live with all users:
- SSL Inspection configured and CA deployed to all endpoints
- Authentication configured (AD/LDAP)
- Basic access policies defined (block malware, adult content, etc.)
- High availability configured (Proxy Clustering) if uptime requirements demand it
- Monitoring and alerting set up
- Support process defined for users