34
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET

Central Secured Proxy Network

  • Upload
    harva

  • View
    41

  • Download
    0

Embed Size (px)

DESCRIPTION

Central Secured Proxy Network. Zachary Craig Eastern Kentucky University Dept. of Technology, NET. OUTLINE. Motivation: building a resume, expanding my skills Introduction to problem and research on the topic - PowerPoint PPT Presentation

Citation preview

Page 1: Central Secured Proxy Network

CENTRAL SECURED PROXY NETWORK

Zachary CraigEastern Kentucky University

Dept. of Technology, NET

Page 2: Central Secured Proxy Network

2

OUTLINE Motivation: building a resume, expanding

my skills Introduction to problem and research on

the topic Problem statement: needs network and

there is no security. Also computer is slow and older.

Assumptions: on how the network will work and how the users will use it.

Solution: upgrade PC and install a secure network

Page 3: Central Secured Proxy Network

3

OUTLINE (CONT.) Results: full operating secure network with

net filtering or proxy server and upgrade computer.

Conclusions: importance of knowing how a network operates with a untangle server and that it isn’t so simple to upgrade a computer.

Future work: figure out how to enable a router instead of a switch for wireless users.

references and acknowledgements

Page 4: Central Secured Proxy Network

4

MOTIVATION This issue is

important because most places that I will be working will need a network, security, and have computer issues.

Page 5: Central Secured Proxy Network

5

MOTIVATION CONT. Doing this will progress my

skills and being able to expand my resume

I have never got the opportunity to manage a network this extensively before

Page 6: Central Secured Proxy Network

6

INTRODUCTION Linksys WRT54G2 router is what I

have to work with. It is made by Cisco and costs 40 dollars according to Newegg.com

the router also has wireless capabilities

the upgrades consist of 8 GBs G-skill DDR2 800 MHz RAM and a Seagate terabyte 3.5 inch hard drive

I will use security in the router to protect from unwanted users.

Page 7: Central Secured Proxy Network

7

INTRODUCTION Linksys Cisco 5-port workgroup

switch Untangle is a firewall by definition

but it has the capability of a proxy server plus a lot more.

Untangle applications include anti-spam, content filtering, antivirus, anti-phishing, anti-spyware, intrusion prevention, firewall, Open VPN, router, and web cache software.

Untangle is also an open source software.

Page 8: Central Secured Proxy Network

8

PROBLEM STATEMENT The problem I am trying to

solve is a household has internet connection but has no way to connect all the devices in their house.

They have only one modem outlet.

Page 9: Central Secured Proxy Network

9

PROBLEM STATEMENT CONT. Also the father doesn't want his

son or daughter to visit certain sites on the web.

As well as being secure from outside web attacks.

Lastly the father has a good computer that is four years old and wants to upgrade instead of buying a new one. 

Page 10: Central Secured Proxy Network

10

PROBLEM STATEMENT CONT. The computer needs more speed

but doesn't need a new processor and also needs more storage space because they are constantly having to delete items from there hard drive to make room.

Sub-problem: they have a switch and router but don’t know how to use it.

Page 11: Central Secured Proxy Network

11

ASSUMPTIONS Network Has to support a

family of three. Untangle needs to block

restricted web sites. The father needs to be taught

how to upgrade a computer and manage Untangle.

The router needs to be secure

Page 12: Central Secured Proxy Network

12

PROPOSED SOLUTION1. Upgrade PC with RAM and an additional

hard drive to fix the speed and storage issues.

2. Create a network for the household through router

3. Secure the router by using the router IP address (192.168.1.1)

4. Install an Untangle box for more security and use the web filter application to block certain websites

Page 13: Central Secured Proxy Network

13

PROPOSED SOLUTION

Page 14: Central Secured Proxy Network

14

RESULTS IMAGES

Page 15: Central Secured Proxy Network

15

RESULTS IMAGES

Page 16: Central Secured Proxy Network

16

RESULTS IMAGES

Page 17: Central Secured Proxy Network

17

RESULTS IMAGES

Page 18: Central Secured Proxy Network

18

RESULTS IMAGES

Page 19: Central Secured Proxy Network

19

RESULTS IMAGES

Page 20: Central Secured Proxy Network

20

RESULTS IMAGES

Page 21: Central Secured Proxy Network

21

RESULTS IMAGES

Page 22: Central Secured Proxy Network

22

RESULTS IMAGES

Page 23: Central Secured Proxy Network

23

RESULTS IMAGES

Page 24: Central Secured Proxy Network

24

RESULTS IMAGES

Page 25: Central Secured Proxy Network

25

COMPUTER UPGRADE RESULT VIDEO #2

Page 26: Central Secured Proxy Network

26

COMPUTER UPGRADE RESULT VIDEO #2

Page 27: Central Secured Proxy Network

27

UNTANGLE NETWORK RESULT VIDEO

Page 28: Central Secured Proxy Network

28

RESULTS IMAGES

Page 29: Central Secured Proxy Network

29

RESULTS1. The family has a secure network and

each family member is connected to the internet.

2. The son and daughter cannot access categorized sites and YouTube.com as well as not being able to download music and video files illegally

3. The fathers computer is faster than when it came out of the box and has plenty of storage.

Page 30: Central Secured Proxy Network

30

CONCLUSIONS I first thought that this would be

a little challenging for me. Then I found out how wrong I was. It was extremely challenging when it came to unexpected errors or obstacles.

I learned a lot about Untangle and how well it works with the security aspect of a network.

Page 31: Central Secured Proxy Network

31

FUTURE WORK I could plan to expand this project

by figuring out how to use a router instead of a switch before untangle, so that wireless access can be secure as well.

I could also raid the second hard drive instead of just using it as extra storage.

Page 32: Central Secured Proxy Network

32

REFERENCES Ciscorouterswitch. (2011, March 25). [Web log message]. Retrieved

from http://ciscorouterswitch.over-blog.com/article-to-set-up-a-home-network-in-a-router-70172880.html

Steers, K. (2007, February 27). How to upgrade your pc's ram. Retrieved from http://www.pcworld.com/article/129177how_to_upgrade_your_pcs_ram.html

Upgrading Your PC: What Do I Get? (Cover story). (2005). PC Magazine, 24(4), 112-113.

eHow Contributing Presenter. (2008). How to install a second hard drive [Web]. Retrieved from http://www.ehow.com/video_6030_install-second-hard.html

Fleishman, G. (2009). Securing the home network. Macworld, 26(7), 70-71.

Polenin, M. (2011, June 04). How to use untangle as a proxy. Retrieved from http://www.ehow.co.uk/how_7569423_use-untangle-proxy.html

Page 33: Central Secured Proxy Network

33

ACKNOWLEDGEMENTS I want Acknowledge Professor Chandra and Professor Kilgore

for all the help and guidance that they have given me in my college career

I got the XPS 420 image on slide 13 from this site: http://www.engadget.com/2007/08/22/behold-dells-xps-420-revealed/

I got the “JOBS” picture from this site: http://fuwad.wordpress.com/2011/05/29/getting-a-job-degree-of-separation-2/

I would also like to acknowledge Stephen Riddle for holding the camera as I did my videos and being a great team member

Also Ryne Purcel was a great team member as well when I needed some information that I didn’t have.

Page 34: Central Secured Proxy Network

34

QUESTIONS Thank you for your time Does anyone have any questions?

Contact Information: Zachary Craig Phone: (859) 274-8495 Email:

[email protected]