Skip to main content

Verify Your Setup

Goal: Confirm SafeSquid is installed, licensed, and proxying traffic so you can proceed to policy configuration with confidence.

Prerequisites

Before Running These Tests
  • SafeSquid is installed and the license is activated (see Activate Your License)
  • At least one client is configured to use the proxy (see Connect Your Client)
  • You have SSH access to the SafeSquid server

5-Minute Verification Checklist

Run these checks to confirm SafeSquid is working end-to-end. Each test takes under a minute.

1. Service Is Running

SSH into the SafeSquid server and check:

# Check SafeSquid is listening on port 8080
netstat -lntp | grep 8080

Expected: A line showing SafeSquid listening on 0.0.0.0:8080

# Confirm the process is active
pidof safesquid

Expected: One or more process IDs

# Check service status (systemd systems)
systemctl status safesquid

Expected: Active: active (running)


2. Configuration Interface Loads

From a browser configured to proxy through SafeSquid (port 8080), navigate to:

http://safesquid.cfg/

Expected: The SafeSquid configuration interface loads

Alternative (direct access): If proxy isn't configured yet, try:

https://SAFESQUID-SERVER-IP:8443/
Browser Not Configured?

See Explicit Proxy for a 2-minute setup.


3. License Is Active

In the SafeSquid interface, go to Support in the top menu.

Check the Activation Details section:

  • Product Type: Shows your license tier (Free or Commercial)
  • Status: Shows "active"
  • Expiry: In the future (commercial) or shows no expiry (free)

If Status shows "inactive":

  • Re-upload your activation key (Activate Your License)
  • Check firewall allows outbound HTTPS to api.safesquid.net

4. HTTP Traffic Flows Through the Proxy

From the proxied browser, visit an HTTP site:

http://example.com

Expected: Page loads normally

Then check the SafeSquid access log:

# On SafeSquid server:
tail -20 /var/log/safesquid/access/extended.log

Expected: Log entries showing:

  • Your client IP
  • URL: example.com
  • HTTP status: 200 or 301
  • Timestamp

If no log entries appear:

  • Browser isn't using the proxy
  • Check browser proxy settings
  • Test from command line:
    curl --proxy http://SAFESQUID-IP:8080 http://example.com

5. HTTPS Traffic Flows Through the Proxy

From the proxied browser, visit an HTTPS site:

https://www.google.com

What to expect:

If SSL Inspection is NOT enabled:

  • Page loads with certificate warning (expected)
  • Click through the warning
  • Page loads

If SSL Inspection IS enabled:

  • Page loads normally, no warning
  • Check certificate issuer: Should show SafeSquid CA

Check the log:

tail -20 /var/log/safesquid/access/extended.log

Expected: Entry for www.google.com with status 200

Certificate Warnings Are Normal (Without SSL Inspection)

Until SSL Inspection is configured, HTTPS sites will show certificate warnings. This is expected behavior—SafeSquid is proxying the connection but not inspecting it.


6. DNS Resolution Works

# Test DNS from the SafeSquid server
nslookup example.com 127.0.0.1

Expected: A valid IP address response (e.g., 93.184.216.34)

If DNS fails:

  • BIND9 not running: systemctl status bind9
  • Check BIND9 config: /etc/bind/named.conf
  • See BIND9 Configuration

Quick Troubleshooting

SymptomLikely CauseFix
Port 8080 not listeningSafeSquid not startedsystemctl start safesquid or /etc/init.d/safesquid start
safesquid.cfg not loadingBrowser not using proxySet proxy: SafeSquid-IP:8080 in browser settings
Activation shows inactiveKey not uploaded or can't reach api.safesquid.netRe-upload key; check firewall allows port 443 outbound
No log entries for trafficTraffic not routing through proxyVerify browser proxy settings: chrome://net-internals/#proxy (Chrome) or about:networking (Firefox)
DNS resolution failsBIND9 not runningsystemctl restart bind9; check /var/log/syslog for errors
HTTPS sites don't load at allFirewall blocking, or SafeSquid crashedCheck: systemctl status safesquid; Check firewall: iptables -L
Detailed Troubleshooting

For detailed troubleshooting, see Troubleshooting.


Post-Installation Client Checklist

Before marking the installation complete, verify these items from a client workstation:

Network Connectivity

  • Ping Test: ping <PROXY-IP> succeeds from client machine
  • Port Connectivity: telnet <PROXY-IP> 8080 connects (use PuTTY on Windows)

Client Configuration

  • Browser Proxy Settings: Configured to use SafeSquid (HTTP proxy: <PROXY-IP>:8080)
  • System Proxy Settings: (Optional) OS-level proxy configured for all applications

License & Interface Access

  • Admin Interface Access: http://safesquid.cfg/ loads when proxy is configured
  • Activation Key Imported: License uploaded via SafeSquid interface
  • License Status Verified: Check Support → Activation Details shows "active"

Remote Management (Optional)

  • SSH Client Installed: PuTTY, Terminal, or equivalent
  • SSH Keys Configured: Public key added to proxy server if using key-based authentication
  • SSH Connection Test: ssh administrator@<PROXY-IP> succeeds

SafeSquid Integration Validation

Use this checklist to verify that SafeSquid is fully integrated and ready for production use.

Authentication & Identity

  • AD/LDAP Integration: Users authenticate with domain credentials
  • User Identification: Test that usernames appear in logs (/var/log/safesquid/extended.log)
  • Group-Based Policies: (If configured) Verify different user groups receive different policies

Policy Enforcement

  • URL Filtering: Test that blocked categories are actually blocked
  • URL Categorization: Verify SafeSquid correctly categorizes websites
  • Time-Based Policies: (If configured) Check policies activate/deactivate at scheduled times
  • SSL Inspection: HTTPS sites show SafeSquid's SSL certificate (after CA deployment)

Security & Content Filtering

  • Antivirus Scanning: Upload EICAR test file; verify it's blocked
  • Content Filtering: Test keyword blocking (if enabled)
  • File Type Blocking: Upload restricted file types; confirm they're blocked

Operations & Monitoring

  • Logging Verified: Check /var/log/safesquid/ contains access logs
  • Updates Configured: SafeSquid can reach update servers
  • Update Schedule Set: Automatic or manual update policy defined
  • Monitoring/Alerting: (Optional) Integrated with monitoring tools (Splunk, ELK, etc.)
  • Reporting Dashboard: SafeSquid admin interface reports load correctly

Testing & Documentation

  • Connectivity from Clients: Multiple devices can browse through SafeSquid
  • Policy Test Matrix: Documented test cases for each policy rule
  • Backup Configuration: Config backed up (/usr/local/safesquid/config/ directory)
  • Disaster Recovery Plan: Documented procedure for failover/restore

Verification Complete ✅

If all 6 checks passed:

✅ SafeSquid is installed and running
✅ License is activated
✅ HTTP traffic flows through the proxy
✅ HTTPS traffic flows through the proxy
✅ DNS is working
✅ You're ready to configure policies


Next Steps

  1. SSL Inspection — Enable HTTPS decryption so SafeSquid can inspect and filter encrypted traffic (required for policy enforcement on HTTPS sites)

  2. Authentication — Integrate with Active Directory or LDAP for user-aware policies

  3. Access Restriction — Set up URL filtering, category blocking, and time-based policies

  4. Troubleshooting — Bookmark this for when issues arise (logs, diagnostics, common fixes)


Production Readiness Checklist:

Before going live with all users:

  • SSL Inspection configured and CA deployed to all endpoints
  • Authentication configured (AD/LDAP)
  • Basic access policies defined (block malware, adult content, etc.)
  • High availability configured (Proxy Clustering) if uptime requirements demand it
  • Monitoring and alerting set up
  • Support process defined for users