1 / 34

Central Secured Proxy Network

Central Secured Proxy Network. Zachary Craig Eastern Kentucky University Dept. of Technology, NET. OUTLINE. Motivation: building a resume, expanding my skills Introduction to problem and research on the topic

harva
Download Presentation

Central Secured Proxy Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Central Secured Proxy Network Zachary Craig Eastern Kentucky University Dept. of Technology, NET

  2. OUTLINE • Motivation: building a resume, expanding my skills • Introduction to problem and research on the topic • Problem statement: needs network and there is no security. Also computer is slow and older. • Assumptions: on how the network will work and how the users will use it. • Solution: upgrade PC and install a secure network

  3. OUTLINE (cont.) • Results: full operating secure network with net filtering or proxy server and upgrade computer. • Conclusions: importance of knowing how a network operates with a untangle server and that it isn’t so simple to upgrade a computer. • Future work: figure out how to enable a router instead of a switch for wireless users. • references and acknowledgements

  4. MOTIVATION • This issue is important because most places that I will be working will need a network, security, and have computer issues.

  5. Motivation cont. • Doing this will progress my skills and being able to expand my resume • I have never got the opportunity to manage a network this extensively before

  6. INTRODUCTION • Linksys WRT54G2 router is what I have to work with. It is made by Cisco and costs 40 dollars according to Newegg.com • the router also has wireless capabilities • the upgrades consist of 8 GBs G-skill DDR2 800 MHz RAM and a Seagate terabyte 3.5 inch hard drive • I will use security in the router to protect from unwanted users.

  7. INTRODUCTION • Linksys Cisco 5-port workgroup switch • Untangle is a firewall by definition but it has the capability of a proxy server plus a lot more. • Untangle applications include anti-spam, content filtering, antivirus, anti-phishing, anti-spyware, intrusion prevention, firewall, Open VPN, router, and web cache software. • Untangle is also an open source software.

  8. PROBLEM STATEMENT • The problem I am trying to solve is a household has internet connection but has no way to connect all the devices in their house. • They have only one modem outlet.

  9. Problem Statement cont. • Also the father doesn't want his son or daughter to visit certain sites on the web. • As well as being secure from outside web attacks. • Lastly the fatherhas a good computer that is four years old and wants to upgrade instead of buying a new one. 

  10. Problem Statement Cont. • The computer needs more speed but doesn't need a new processor and also needs more storage space because they are constantly having to delete items from there hard drive to make room. • Sub-problem: they have a switch and router but don’t know how to use it.

  11. Assumptions • Network Has to support a family of three. • Untangle needs to block restricted web sites. • The father needs to be taught how to upgrade a computer and manage Untangle. • The router needs to be secure

  12. PROPOSED SOLUTION • Upgrade PC with RAM and an additional hard drive to fix the speed and storage issues. • Create a network for the household through router • Secure the router by using the router IP address (192.168.1.1) • Install an Untangle box for more security and use the web filter application to block certain websites

  13. Proposed solution

  14. RESULTS images

  15. RESULTS images

  16. RESULTS images

  17. RESULTS images

  18. RESULTS images

  19. RESULTS images

  20. RESULTS images

  21. RESULTS images

  22. RESULTS images

  23. RESULTS images

  24. RESULTS images

  25. Computer Upgrade RESULT Video #2

  26. Computer upgrade result video #2

  27. Untangle Network RESULT Video

  28. RESULTS images

  29. RESULTS • The family has a secure network and each family member is connected to the internet. • The son and daughter cannot access categorized sites and YouTube.com as well as not being able to download music and video files illegally • The fatherscomputer is faster than when it came out of the box and has plenty of storage.

  30. CONCLUSIONS • I first thought that this would be a little challenging for me. Then I found out how wrong I was. It was extremely challenging when it came to unexpected errors or obstacles. • I learned a lot about Untangle and how well it works with the security aspect of a network.

  31. FUTURE WORK • I could plan to expand this project by figuring out how to use a router instead of a switch before untangle, so that wireless access can be secure as well. • I could also raid the second hard drive instead of just using it as extra storage.

  32. REFERENCES • Ciscorouterswitch. (2011, March 25). [Web log message]. Retrieved from http://ciscorouterswitch.over-blog.com/article-to-set-up-a-home-network-in-a-router-70172880.html • Steers, K. (2007, February 27). How to upgrade your pc's ram. Retrieved from http://www.pcworld.com/article/129177how_to_upgrade_your_pcs_ram.html • Upgrading Your PC: What Do I Get? (Cover story). (2005). PC Magazine, 24(4), 112-113. • eHow Contributing Presenter. (2008). How to install a second hard drive [Web]. Retrieved from http://www.ehow.com/video_6030_install-second-hard.html • Fleishman, G. (2009). Securing the home network. Macworld, 26(7), 70-71. • Polenin, M. (2011, June 04). How to use untangle as a proxy. Retrieved from http://www.ehow.co.uk/how_7569423_use-untangle-proxy.html

  33. ACKNOWLEDGEMENTS • I want Acknowledge Professor Chandra and Professor Kilgore for all the help and guidance that they have given me in my college career • I got the XPS 420 image on slide 13 from this site: http://www.engadget.com/2007/08/22/behold-dells-xps-420-revealed/ • I got the “JOBS” picture from this site: http://fuwad.wordpress.com/2011/05/29/getting-a-job-degree-of-separation-2/ • I would also like to acknowledge Stephen Riddle for holding the camera as I did my videos and being a great team member • Also RynePurcel was a great team member as well when I needed some information that I didn’t have.

  34. Questions • Thank you for your time • Does anyone have any questions? • Contact Information: • Zachary Craig • Phone: (859) 274-8495 • Email: Chronotrigger66@hotmail.com

More Related