Thanks a lot Christos Tsantilas, It worked!. Another thing I want to ask is, I wonder if we can decrase the size of c-icap logs as well as get some more details under c-icap to corelate c-icap server/access logs with squid or dansguardian logs and easily get the machine IP from which virus threat url was accessed? Currently a virus url access throws a 404 page on client machine, can we send some reason to client machine instead of 404 page? At the moment I am using a cron entry to keep cleaning the excessive logs. Thanks & Regards Anuj Singh On Tue, Mar 31, 2009 at 9:58 PM, Christos Tsantilas <christos@xxxxxxxxxxxx> wrote: > You can use squid acl's to bypass an icap server for certain sites > For example if you have define the icap class "class_respmod" use something > like the following in your squid.conf file: > > acl microsoft dstdomain .microsoft.com > > icap_access class_respmod deny microsoft > icap_access class_respmod allow all > > > -- > Christos > > Anuj Singh wrote: >> >> Hi, >> >> I am using clamav + c-icap + squid + dansguardian on FreeBSD7.1 >> I am able to filter out the viruses, perform content filtering, but i >> am facing problem with windows machine updates threw proxy. >> >> Can we bypass c-icap filter for widows update sites? I checked on a >> different setup with squid+dansguradian, updates are working with >> them, but when i add c-icap module, I have an error on widows >> machines. >> >> Thanks & Regards >> Anuj Singh >> >