Click here to load reader
Upload
elfrieda-baker
View
216
Download
0
Embed Size (px)
DESCRIPTION
Introduction Problem Problem No way to monitor Web access No way to monitor Web access Bandwidth Usage Bandwidth Usage Security Issues Security Issues
Citation preview
Securing Web Access
Senior Design III – Spring 2009Matt Shea
OverviewIntroductionProject Description and Intended UseDesign ProtocolsDeliverablesDemonstrationConclusion
Introduction
ProblemNo way to monitor Web accessBandwidth UsageSecurity Issues
Project Description/Intended UseSetup Web Proxy Server
Open-sourceFiltering Capabilities
By DomainBy File/MIME Type
Reporting features
Design ProtocolsCentOS v. 4.7
Clone of Red Hat Enterprise LinuxSquid Proxy Server
Open Source Proxy ServerMySQL Squid Access Report
Reporting and Analysis ToolSquidGuard
Content filter plug-inPerl
Used for Custom Script
Network Topology
Data FlowInternet
Router
Squid Proxy
Router
Switch
Client
DeliverablesInstall/Configure CentOS v 4.7 Virtual MachineSetup Windows XP Client Virtual MachineInstall/Configure Squid Proxy ServerInstall/Configure MySQL Squid Access ReportInstall/Configure SquidGuard Content FilterWrite Script to translate IP Address to MAC AddressSetup Linux machine as a router to forward all
Web requests from clients to the proxy server
Demonstration
ConclusionWeb Proxy Solution for Accounting Firm
Utilized Open Source ToolsHas Reporting and Filtering
FunctionalityMeets need of Business
Questions?