Download presentation
Presentation is loading. Please wait.
Published byShona Farmer Modified over 9 years ago
1
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET
2
2 OUTLINE Motivation: building a resume, expanding my skills Introduction to problem and research on the topic Problem statement: needs network and there is no security. Also computer is slow and older. Assumptions: on how the network will work and how the users will use it. Solution: upgrade PC and install a secure network
3
3 OUTLINE (CONT.) Results: full operating secure network with net filtering or proxy server and upgrade computer. Conclusions: importance of knowing how a network operates with a untangle server and that it isn’t so simple to upgrade a computer. Future work: figure out how to enable a router instead of a switch for wireless users. references and acknowledgements
4
4 MOTIVATION This issue is important because most places that I will be working will need a network, security, and have computer issues.
5
5 MOTIVATION CONT. Doing this will progress my skills and being able to expand my resume I have never got the opportunity to manage a network this extensively before
6
6 INTRODUCTION Linksys WRT54G2 router is what I have to work with. It is made by Cisco and costs 40 dollars according to Newegg.com the router also has wireless capabilities the upgrades consist of 8 GBs G-skill DDR2 800 MHz RAM and a Seagate terabyte 3.5 inch hard drive I will use security in the router to protect from unwanted users.
7
7 INTRODUCTION Linksys Cisco 5-port workgroup switch Untangle is a firewall by definition but it has the capability of a proxy server plus a lot more. Untangle applications include anti-spam, content filtering, antivirus, anti-phishing, anti-spyware, intrusion prevention, firewall, Open VPN, router, and web cache software. Untangle is also an open source software.
8
8 PROBLEM STATEMENT The problem I am trying to solve is a household has internet connection but has no way to connect all the devices in their house. They have only one modem outlet.
9
PROBLEM STATEMENT CONT. Also the father doesn't want his son or daughter to visit certain sites on the web. As well as being secure from outside web attacks. Lastly the father has a good computer that is four years old and wants to upgrade instead of buying a new one. 9
10
PROBLEM STATEMENT CONT. The computer needs more speed but doesn't need a new processor and also needs more storage space because they are constantly having to delete items from there hard drive to make room. Sub-problem: they have a switch and router but don’t know how to use it. 10
11
11 ASSUMPTIONS Network Has to support a family of three. Untangle needs to block restricted web sites. The father needs to be taught how to upgrade a computer and manage Untangle. The router needs to be secure
12
12 PROPOSED SOLUTION 1. Upgrade PC with RAM and an additional hard drive to fix the speed and storage issues. 2. Create a network for the household through router 3. Secure the router by using the router IP address (192.168.1.1) 4. Install an Untangle box for more security and use the web filter application to block certain websites
13
PROPOSED SOLUTION 13
14
RESULTS IMAGES 14
15
RESULTS IMAGES 15
16
RESULTS IMAGES 16
17
RESULTS IMAGES 17
18
RESULTS IMAGES 18
19
RESULTS IMAGES 19
20
RESULTS IMAGES 20
21
RESULTS IMAGES 21
22
RESULTS IMAGES 22
23
RESULTS IMAGES 23
24
RESULTS IMAGES 24
25
COMPUTER UPGRADE RESULT VIDEO #2 25
26
COMPUTER UPGRADE RESULT VIDEO #2 26
27
UNTANGLE NETWORK RESULT VIDEO 27
28
RESULTS IMAGES 28
29
29 RESULTS 1. The family has a secure network and each family member is connected to the internet. 2. The son and daughter cannot access categorized sites and YouTube.com as well as not being able to download music and video files illegally 3. The fathers computer is faster than when it came out of the box and has plenty of storage.
30
30 CONCLUSIONS I first thought that this would be a little challenging for me. Then I found out how wrong I was. It was extremely challenging when it came to unexpected errors or obstacles. I learned a lot about Untangle and how well it works with the security aspect of a network.
31
31 FUTURE WORK I could plan to expand this project by figuring out how to use a router instead of a switch before untangle, so that wireless access can be secure as well. I could also raid the second hard drive instead of just using it as extra storage.
32
REFERENCES Ciscorouterswitch. (2011, March 25). [Web log message]. Retrieved from http://ciscorouterswitch.over-blog.com/article-to-set-up-a-home-network-in-a- router-70172880.html Steers, K. (2007, February 27). How to upgrade your pc's ram. Retrieved from http://www.pcworld.com/article/129177how_to_upgrade_your_pcs_ram.html Upgrading Your PC: What Do I Get? (Cover story). (2005). PC Magazine, 24(4), 112-113. eHow Contributing Presenter. (2008). How to install a second hard drive [Web]. Retrieved from http://www.ehow.com/video_6030_install-second-hard.html Fleishman, G. (2009). Securing the home network. Macworld, 26(7), 70-71. Polenin, M. (2011, June 04). How to use untangle as a proxy. Retrieved from http://www.ehow.co.uk/how_7569423_use-untangle-proxy.html 32
33
ACKNOWLEDGEMENTS I want Acknowledge Professor Chandra and Professor Kilgore for all the help and guidance that they have given me in my college career I got the XPS 420 image on slide 13 from this site: http://www.engadget.com/2007/08/22/behold-dells-xps-420- revealed/ I got the “JOBS” picture from this site: http://fuwad.wordpress.com/2011/05/29/getting-a-job-degree-of- separation-2/ I would also like to acknowledge Stephen Riddle for holding the camera as I did my videos and being a great team member Also Ryne Purcel was a great team member as well when I needed some information that I didn’t have. 33
34
QUESTIONS Thank you for your time Does anyone have any questions? Contact Information: Zachary Craig Phone: (859) 274-8495 Email: Chronotrigger66@hotmail.com 34
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.