Presentation is loading. Please wait.

Presentation is loading. Please wait.

CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.

Similar presentations


Presentation on theme: "CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET."— Presentation transcript:

1 CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET

2 2 OUTLINE Motivation: building a resume, expanding my skills Introduction to problem and research on the topic Problem statement: needs network and there is no security. Also computer is slow and older. Assumptions: on how the network will work and how the users will use it. Solution: upgrade PC and install a secure network

3 3 OUTLINE (CONT.) Results: full operating secure network with net filtering or proxy server and upgrade computer. Conclusions: importance of knowing how a network operates with a untangle server and that it isn’t so simple to upgrade a computer. Future work: figure out how to enable a router instead of a switch for wireless users. references and acknowledgements

4 4 MOTIVATION This issue is important because most places that I will be working will need a network, security, and have computer issues.

5 5 MOTIVATION CONT. Doing this will progress my skills and being able to expand my resume I have never got the opportunity to manage a network this extensively before

6 6 INTRODUCTION Linksys WRT54G2 router is what I have to work with. It is made by Cisco and costs 40 dollars according to Newegg.com the router also has wireless capabilities the upgrades consist of 8 GBs G-skill DDR2 800 MHz RAM and a Seagate terabyte 3.5 inch hard drive I will use security in the router to protect from unwanted users.

7 7 INTRODUCTION Linksys Cisco 5-port workgroup switch Untangle is a firewall by definition but it has the capability of a proxy server plus a lot more. Untangle applications include anti-spam, content filtering, antivirus, anti-phishing, anti-spyware, intrusion prevention, firewall, Open VPN, router, and web cache software. Untangle is also an open source software.

8 8 PROBLEM STATEMENT The problem I am trying to solve is a household has internet connection but has no way to connect all the devices in their house. They have only one modem outlet.

9 PROBLEM STATEMENT CONT. Also the father doesn't want his son or daughter to visit certain sites on the web. As well as being secure from outside web attacks. Lastly the father has a good computer that is four years old and wants to upgrade instead of buying a new one. 9

10 PROBLEM STATEMENT CONT. The computer needs more speed but doesn't need a new processor and also needs more storage space because they are constantly having to delete items from there hard drive to make room. Sub-problem: they have a switch and router but don’t know how to use it. 10

11 11 ASSUMPTIONS Network Has to support a family of three. Untangle needs to block restricted web sites. The father needs to be taught how to upgrade a computer and manage Untangle. The router needs to be secure

12 12 PROPOSED SOLUTION 1. Upgrade PC with RAM and an additional hard drive to fix the speed and storage issues. 2. Create a network for the household through router 3. Secure the router by using the router IP address (192.168.1.1) 4. Install an Untangle box for more security and use the web filter application to block certain websites

13 PROPOSED SOLUTION 13

14 RESULTS IMAGES 14

15 RESULTS IMAGES 15

16 RESULTS IMAGES 16

17 RESULTS IMAGES 17

18 RESULTS IMAGES 18

19 RESULTS IMAGES 19

20 RESULTS IMAGES 20

21 RESULTS IMAGES 21

22 RESULTS IMAGES 22

23 RESULTS IMAGES 23

24 RESULTS IMAGES 24

25 COMPUTER UPGRADE RESULT VIDEO #2 25

26 COMPUTER UPGRADE RESULT VIDEO #2 26

27 UNTANGLE NETWORK RESULT VIDEO 27

28 RESULTS IMAGES 28

29 29 RESULTS 1. The family has a secure network and each family member is connected to the internet. 2. The son and daughter cannot access categorized sites and YouTube.com as well as not being able to download music and video files illegally 3. The fathers computer is faster than when it came out of the box and has plenty of storage.

30 30 CONCLUSIONS I first thought that this would be a little challenging for me. Then I found out how wrong I was. It was extremely challenging when it came to unexpected errors or obstacles. I learned a lot about Untangle and how well it works with the security aspect of a network.

31 31 FUTURE WORK I could plan to expand this project by figuring out how to use a router instead of a switch before untangle, so that wireless access can be secure as well. I could also raid the second hard drive instead of just using it as extra storage.

32 REFERENCES Ciscorouterswitch. (2011, March 25). [Web log message]. Retrieved from http://ciscorouterswitch.over-blog.com/article-to-set-up-a-home-network-in-a- router-70172880.html Steers, K. (2007, February 27). How to upgrade your pc's ram. Retrieved from http://www.pcworld.com/article/129177how_to_upgrade_your_pcs_ram.html Upgrading Your PC: What Do I Get? (Cover story). (2005). PC Magazine, 24(4), 112-113. eHow Contributing Presenter. (2008). How to install a second hard drive [Web]. Retrieved from http://www.ehow.com/video_6030_install-second-hard.html Fleishman, G. (2009). Securing the home network. Macworld, 26(7), 70-71. Polenin, M. (2011, June 04). How to use untangle as a proxy. Retrieved from http://www.ehow.co.uk/how_7569423_use-untangle-proxy.html 32

33 ACKNOWLEDGEMENTS I want Acknowledge Professor Chandra and Professor Kilgore for all the help and guidance that they have given me in my college career I got the XPS 420 image on slide 13 from this site: http://www.engadget.com/2007/08/22/behold-dells-xps-420- revealed/ I got the “JOBS” picture from this site: http://fuwad.wordpress.com/2011/05/29/getting-a-job-degree-of- separation-2/ I would also like to acknowledge Stephen Riddle for holding the camera as I did my videos and being a great team member Also Ryne Purcel was a great team member as well when I needed some information that I didn’t have. 33

34 QUESTIONS Thank you for your time Does anyone have any questions? Contact Information: Zachary Craig Phone: (859) 274-8495 Email: Chronotrigger66@hotmail.com 34


Download ppt "CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET."

Similar presentations


Ads by Google