Hi Amos,
You're right.
That was the reason of my question here.
I thought maybe there is a way to do it and I don't see it.
The drive behind this question is related to the illegal activities that
some users can perform behind the proxy coverage. We wanted to avoid storage
of access logs but keep the network design we use now.
Thank you for all the details and the help,
Julian
-- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/source-address-ip-spoofing-tp4667417p4667461.html Sent from the Squid - Users mailing list archive at Nabble.com.Received on Fri Aug 29 2014 - 17:08:18 MDT
This archive was generated by hypermail 2.2.0 : Sat Aug 30 2014 - 12:00:07 MDT