Securing Web Access Senior Design III – Spring 2009 Matt Shea

Preview:

DESCRIPTION

Introduction Problem Problem No way to monitor Web access No way to monitor Web access Bandwidth Usage Bandwidth Usage Security Issues Security Issues

Citation preview

Securing Web Access

Senior Design III – Spring 2009Matt Shea

OverviewIntroductionProject Description and Intended UseDesign ProtocolsDeliverablesDemonstrationConclusion

Introduction

ProblemNo way to monitor Web accessBandwidth UsageSecurity Issues

Project Description/Intended UseSetup Web Proxy Server

Open-sourceFiltering Capabilities

By DomainBy File/MIME Type

Reporting features

Design ProtocolsCentOS v. 4.7

Clone of Red Hat Enterprise LinuxSquid Proxy Server

Open Source Proxy ServerMySQL Squid Access Report

Reporting and Analysis ToolSquidGuard

Content filter plug-inPerl

Used for Custom Script

Network Topology

Data FlowInternet

Router

Squid Proxy

Router

Switch

Client

DeliverablesInstall/Configure CentOS v 4.7 Virtual MachineSetup Windows XP Client Virtual MachineInstall/Configure Squid Proxy ServerInstall/Configure MySQL Squid Access ReportInstall/Configure SquidGuard Content FilterWrite Script to translate IP Address to MAC AddressSetup Linux machine as a router to forward all

Web requests from clients to the proxy server

Demonstration

ConclusionWeb Proxy Solution for Accounting Firm

Utilized Open Source ToolsHas Reporting and Filtering

FunctionalityMeets need of Business

Questions?

Recommended