Squid3 постоянно режет трафик http?

Добрый день, есть офис в качестве шлюза выступает ubuntu 14 serv, на нем поднят squid3. С недавнего времени squid начал блокировать сайты которые работают по http. Очистка кэш-а помогла на некоторое время, сейчас вообще ничего не помогает, отрабатывают только https сайты. Что можно поправить?
Конф squid3

#url_rewrite_program /usr/bin/squidGuard
#url_rewrite_children 10

cache_mem 300 MB
maximum_object_size_in_memory 10 MB

memory_pools on
memory_pools_limit 30 MB

cache_dir ufs /var/spool/squid3 6000 16 256

http_port 3128 transparent

acl office src 10.49.1.0/24
#ac1 NOCACHEDOMAIN dstdomain mafia.ua deny NOCACHEDOMAIN

acl manager proto cache_object
acl localhost src 127.0.0.1/32
acl to_localhost dst 127.0.0.0/8 0.0.0.0/32
acl SSL_ports port 443
acl Safe_ports port 80 # http
acl Safe_ports port 21 # ftp
acl Safe_ports port 443 # https
acl Safe_ports port 70 # gopher
acl Safe_ports port 210 # wais
acl Safe_ports port 1025-65535 # unregistered ports
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT

http_access allow office

http_access allow manager localhost
http_access deny manager
http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports
http_access allow localhost
http_access deny all
hierarchy_stoplist cgi-bin?
access_log /var/log/squid3/access.log squid
refresh_pattern ^ftp: 1440 20% 10080
refresh_pattern ^gopher: 1440 0% 1440
refresh_pattern (cgi-bin|\?) 0 0% 0
refresh_pattern. 0 20% 4320
coredump_dir /var/spool/squid3

Конф iptables

iptables -P FORWARD DROP
iptables -P INPUT DROP
iptables -P OUTPUT ACCEPT

iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A INPUT -p tcp --dport 4491 -j ACCEPT
iptables -A INPUT -p icmp -j ACCEPT
iptables -A INPUT -i $TUN_IF -j ACCEPT
iptables -A INPUT -i $INT_IF1 -j ACCEPT
iptables -A INPUT -i $GUEST_IF -s $GUEST_NET -j ACCEPT
iptables -A INPUT -j LOG --log-prefix INPUT_ -m limit --limit 5/min

iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT

#socseti
# iptables -A FORWARD -m string --string «vk.com» --algo kmp --to 65535 -j DROP
# iptables -A FORWARD -m string --string «vkontakte.ru» --algo kmp --to 65535 -j DROP
# iptables -A FORWARD -m string --string «facebook.com» --algo kmp --to 65535 -j DROP

# for i in 87.240.128.0/18 217.20.144.0/20 173.194.113.0/24 173.252.64.0/18; do iptables -A FORWARD -i $INT_IF1 -s $INT_NET1 -d "$i" -j DROP; done
#socseti

iptables -A FORWARD -i $TUN_IF -o $INT_IF1 -j ACCEPT
iptables -A FORWARD -i $INT_IF1 -o $TUN_IF -j ACCEPT
iptables -A FORWARD -i $INT_IF1 -o $EXT_IF1 -j ACCEPT
iptables -A FORWARD -i $GUEST_IF -s $GUEST_NET -d mail.shf.com.ua -j ACCEPT
iptables -A FORWARD -i $GUEST_IF -o $EXT_IF1 -j ACCEPT
iptables -A FORWARD -j LOG --log-prefix FORWARD_ -m limit --limit 5/min

#unifi
iptables -A FORWARD -d 10.49.1.2 -p tcp -m multiport --dports 8443 -j ACCEPT

iptables -t nat -A PREROUTING -i $INT_IF1 -s $INT_NET1 -p tcp --dport 80! -d 192.168/16 -j REDIRECT --to-port 3128

## NAT Prerouting

iptables -t nat -A PREROUTING -p tcp -d x.x.73.197 --dport 8443 -j DNAT --to-destination 10.49.1.2:8443

iptables -t nat -A POSTROUTING -s $INT_NET1 -o $EXT_IF1 -p icmp -j MASQUERADE
iptables -t nat -A POSTROUTING -s $INT_NET1 -o $EXT_IF1 -p tcp -j MASQUERADE
iptables -t nat -A POSTROUTING -s $INT_NET1 -o $EXT_IF1 -p udp -j MASQUERADE

iptables -t nat -A POSTROUTING -s $GUEST_NET -o $EXT_IF1 -j MASQUERADE

#iptables -t nat -A POSTROUTING -o $EXT_IF1 -j SNAT --to-source $EXT_IP1

#iptables -t nat -A POSTROUTING -o $INT_IF1 -d 192.168.38.252 -j SNAT --to-source $INT_IP1

}