Hi Amos, You're right. That was the reason of my question here. I thought maybe there is a way to do it and I don't see it. The drive behind this question is related to the illegal activities that some users can perform behind the proxy coverage. We wanted to avoid storage of access logs but keep the network design we use now. Thank you for all the details and the help, Julian -- View this message in context: http://squid-web-proxy-cache.1019090.n4.nabble.com/source-address-ip-spoofing-tp4667417p4667461.html Sent from the Squid - Users mailing list archive at Nabble.com.