340 likes | 462 Views
Central Secured Proxy Network. Zachary Craig Eastern Kentucky University Dept. of Technology, NET. OUTLINE. Motivation: building a resume, expanding my skills Introduction to problem and research on the topic
E N D
Central Secured Proxy Network Zachary Craig Eastern Kentucky University Dept. of Technology, NET
OUTLINE • Motivation: building a resume, expanding my skills • Introduction to problem and research on the topic • Problem statement: needs network and there is no security. Also computer is slow and older. • Assumptions: on how the network will work and how the users will use it. • Solution: upgrade PC and install a secure network
OUTLINE (cont.) • Results: full operating secure network with net filtering or proxy server and upgrade computer. • Conclusions: importance of knowing how a network operates with a untangle server and that it isn’t so simple to upgrade a computer. • Future work: figure out how to enable a router instead of a switch for wireless users. • references and acknowledgements
MOTIVATION • This issue is important because most places that I will be working will need a network, security, and have computer issues.
Motivation cont. • Doing this will progress my skills and being able to expand my resume • I have never got the opportunity to manage a network this extensively before
INTRODUCTION • Linksys WRT54G2 router is what I have to work with. It is made by Cisco and costs 40 dollars according to Newegg.com • the router also has wireless capabilities • the upgrades consist of 8 GBs G-skill DDR2 800 MHz RAM and a Seagate terabyte 3.5 inch hard drive • I will use security in the router to protect from unwanted users.
INTRODUCTION • Linksys Cisco 5-port workgroup switch • Untangle is a firewall by definition but it has the capability of a proxy server plus a lot more. • Untangle applications include anti-spam, content filtering, antivirus, anti-phishing, anti-spyware, intrusion prevention, firewall, Open VPN, router, and web cache software. • Untangle is also an open source software.
PROBLEM STATEMENT • The problem I am trying to solve is a household has internet connection but has no way to connect all the devices in their house. • They have only one modem outlet.
Problem Statement cont. • Also the father doesn't want his son or daughter to visit certain sites on the web. • As well as being secure from outside web attacks. • Lastly the fatherhas a good computer that is four years old and wants to upgrade instead of buying a new one.
Problem Statement Cont. • The computer needs more speed but doesn't need a new processor and also needs more storage space because they are constantly having to delete items from there hard drive to make room. • Sub-problem: they have a switch and router but don’t know how to use it.
Assumptions • Network Has to support a family of three. • Untangle needs to block restricted web sites. • The father needs to be taught how to upgrade a computer and manage Untangle. • The router needs to be secure
PROPOSED SOLUTION • Upgrade PC with RAM and an additional hard drive to fix the speed and storage issues. • Create a network for the household through router • Secure the router by using the router IP address (192.168.1.1) • Install an Untangle box for more security and use the web filter application to block certain websites
RESULTS • The family has a secure network and each family member is connected to the internet. • The son and daughter cannot access categorized sites and YouTube.com as well as not being able to download music and video files illegally • The fatherscomputer is faster than when it came out of the box and has plenty of storage.
CONCLUSIONS • I first thought that this would be a little challenging for me. Then I found out how wrong I was. It was extremely challenging when it came to unexpected errors or obstacles. • I learned a lot about Untangle and how well it works with the security aspect of a network.
FUTURE WORK • I could plan to expand this project by figuring out how to use a router instead of a switch before untangle, so that wireless access can be secure as well. • I could also raid the second hard drive instead of just using it as extra storage.
REFERENCES • Ciscorouterswitch. (2011, March 25). [Web log message]. Retrieved from http://ciscorouterswitch.over-blog.com/article-to-set-up-a-home-network-in-a-router-70172880.html • Steers, K. (2007, February 27). How to upgrade your pc's ram. Retrieved from http://www.pcworld.com/article/129177how_to_upgrade_your_pcs_ram.html • Upgrading Your PC: What Do I Get? (Cover story). (2005). PC Magazine, 24(4), 112-113. • eHow Contributing Presenter. (2008). How to install a second hard drive [Web]. Retrieved from http://www.ehow.com/video_6030_install-second-hard.html • Fleishman, G. (2009). Securing the home network. Macworld, 26(7), 70-71. • Polenin, M. (2011, June 04). How to use untangle as a proxy. Retrieved from http://www.ehow.co.uk/how_7569423_use-untangle-proxy.html
ACKNOWLEDGEMENTS • I want Acknowledge Professor Chandra and Professor Kilgore for all the help and guidance that they have given me in my college career • I got the XPS 420 image on slide 13 from this site: http://www.engadget.com/2007/08/22/behold-dells-xps-420-revealed/ • I got the “JOBS” picture from this site: http://fuwad.wordpress.com/2011/05/29/getting-a-job-degree-of-separation-2/ • I would also like to acknowledge Stephen Riddle for holding the camera as I did my videos and being a great team member • Also RynePurcel was a great team member as well when I needed some information that I didn’t have.
Questions • Thank you for your time • Does anyone have any questions? • Contact Information: • Zachary Craig • Phone: (859) 274-8495 • Email: Chronotrigger66@hotmail.com