Central Secured Proxy Network
description
Transcript of Central Secured Proxy Network
![Page 1: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/1.jpg)
CENTRAL SECURED PROXY NETWORK
Zachary CraigEastern Kentucky University
Dept. of Technology, NET
![Page 2: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/2.jpg)
2
OUTLINE Motivation: building a resume, expanding
my skills Introduction to problem and research on
the topic Problem statement: needs network and
there is no security. Also computer is slow and older.
Assumptions: on how the network will work and how the users will use it.
Solution: upgrade PC and install a secure network
![Page 3: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/3.jpg)
3
OUTLINE (CONT.) Results: full operating secure network with
net filtering or proxy server and upgrade computer.
Conclusions: importance of knowing how a network operates with a untangle server and that it isn’t so simple to upgrade a computer.
Future work: figure out how to enable a router instead of a switch for wireless users.
references and acknowledgements
![Page 4: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/4.jpg)
4
MOTIVATION This issue is
important because most places that I will be working will need a network, security, and have computer issues.
![Page 5: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/5.jpg)
5
MOTIVATION CONT. Doing this will progress my
skills and being able to expand my resume
I have never got the opportunity to manage a network this extensively before
![Page 6: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/6.jpg)
6
INTRODUCTION Linksys WRT54G2 router is what I
have to work with. It is made by Cisco and costs 40 dollars according to Newegg.com
the router also has wireless capabilities
the upgrades consist of 8 GBs G-skill DDR2 800 MHz RAM and a Seagate terabyte 3.5 inch hard drive
I will use security in the router to protect from unwanted users.
![Page 7: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/7.jpg)
7
INTRODUCTION Linksys Cisco 5-port workgroup
switch Untangle is a firewall by definition
but it has the capability of a proxy server plus a lot more.
Untangle applications include anti-spam, content filtering, antivirus, anti-phishing, anti-spyware, intrusion prevention, firewall, Open VPN, router, and web cache software.
Untangle is also an open source software.
![Page 8: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/8.jpg)
8
PROBLEM STATEMENT The problem I am trying to
solve is a household has internet connection but has no way to connect all the devices in their house.
They have only one modem outlet.
![Page 9: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/9.jpg)
9
PROBLEM STATEMENT CONT. Also the father doesn't want his
son or daughter to visit certain sites on the web.
As well as being secure from outside web attacks.
Lastly the father has a good computer that is four years old and wants to upgrade instead of buying a new one.
![Page 10: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/10.jpg)
10
PROBLEM STATEMENT CONT. The computer needs more speed
but doesn't need a new processor and also needs more storage space because they are constantly having to delete items from there hard drive to make room.
Sub-problem: they have a switch and router but don’t know how to use it.
![Page 11: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/11.jpg)
11
ASSUMPTIONS Network Has to support a
family of three. Untangle needs to block
restricted web sites. The father needs to be taught
how to upgrade a computer and manage Untangle.
The router needs to be secure
![Page 12: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/12.jpg)
12
PROPOSED SOLUTION1. Upgrade PC with RAM and an additional
hard drive to fix the speed and storage issues.
2. Create a network for the household through router
3. Secure the router by using the router IP address (192.168.1.1)
4. Install an Untangle box for more security and use the web filter application to block certain websites
![Page 13: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/13.jpg)
13
PROPOSED SOLUTION
![Page 14: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/14.jpg)
14
RESULTS IMAGES
![Page 15: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/15.jpg)
15
RESULTS IMAGES
![Page 16: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/16.jpg)
16
RESULTS IMAGES
![Page 17: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/17.jpg)
17
RESULTS IMAGES
![Page 18: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/18.jpg)
18
RESULTS IMAGES
![Page 19: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/19.jpg)
19
RESULTS IMAGES
![Page 20: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/20.jpg)
20
RESULTS IMAGES
![Page 21: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/21.jpg)
21
RESULTS IMAGES
![Page 22: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/22.jpg)
22
RESULTS IMAGES
![Page 23: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/23.jpg)
23
RESULTS IMAGES
![Page 24: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/24.jpg)
24
RESULTS IMAGES
![Page 25: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/25.jpg)
25
COMPUTER UPGRADE RESULT VIDEO #2
![Page 26: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/26.jpg)
26
COMPUTER UPGRADE RESULT VIDEO #2
![Page 27: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/27.jpg)
27
UNTANGLE NETWORK RESULT VIDEO
![Page 28: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/28.jpg)
28
RESULTS IMAGES
![Page 29: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/29.jpg)
29
RESULTS1. The family has a secure network and
each family member is connected to the internet.
2. The son and daughter cannot access categorized sites and YouTube.com as well as not being able to download music and video files illegally
3. The fathers computer is faster than when it came out of the box and has plenty of storage.
![Page 30: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/30.jpg)
30
CONCLUSIONS I first thought that this would be
a little challenging for me. Then I found out how wrong I was. It was extremely challenging when it came to unexpected errors or obstacles.
I learned a lot about Untangle and how well it works with the security aspect of a network.
![Page 31: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/31.jpg)
31
FUTURE WORK I could plan to expand this project
by figuring out how to use a router instead of a switch before untangle, so that wireless access can be secure as well.
I could also raid the second hard drive instead of just using it as extra storage.
![Page 32: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/32.jpg)
32
REFERENCES Ciscorouterswitch. (2011, March 25). [Web log message]. Retrieved
from http://ciscorouterswitch.over-blog.com/article-to-set-up-a-home-network-in-a-router-70172880.html
Steers, K. (2007, February 27). How to upgrade your pc's ram. Retrieved from http://www.pcworld.com/article/129177how_to_upgrade_your_pcs_ram.html
Upgrading Your PC: What Do I Get? (Cover story). (2005). PC Magazine, 24(4), 112-113.
eHow Contributing Presenter. (2008). How to install a second hard drive [Web]. Retrieved from http://www.ehow.com/video_6030_install-second-hard.html
Fleishman, G. (2009). Securing the home network. Macworld, 26(7), 70-71.
Polenin, M. (2011, June 04). How to use untangle as a proxy. Retrieved from http://www.ehow.co.uk/how_7569423_use-untangle-proxy.html
![Page 33: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/33.jpg)
33
ACKNOWLEDGEMENTS I want Acknowledge Professor Chandra and Professor Kilgore
for all the help and guidance that they have given me in my college career
I got the XPS 420 image on slide 13 from this site: http://www.engadget.com/2007/08/22/behold-dells-xps-420-revealed/
I got the “JOBS” picture from this site: http://fuwad.wordpress.com/2011/05/29/getting-a-job-degree-of-separation-2/
I would also like to acknowledge Stephen Riddle for holding the camera as I did my videos and being a great team member
Also Ryne Purcel was a great team member as well when I needed some information that I didn’t have.
![Page 34: Central Secured Proxy Network](https://reader035.fdocuments.us/reader035/viewer/2022062315/56816143550346895dd0bc1a/html5/thumbnails/34.jpg)
34
QUESTIONS Thank you for your time Does anyone have any questions?
Contact Information: Zachary Craig Phone: (859) 274-8495 Email: