Securing Web Access Senior Design III – Spring 2009 Matt Shea Overview Introduction Project Description and Intended Use Design Protocols Deliverables Demonstration Conclusion Introduction Problem No way to monitor Web access Bandwidth Usage Security Issues Project Description/Intended Use Setup Web Proxy Server Open-source Filtering Capabilities By Domain By File/MIME Type Reporting features Design Protocols CentOS v. 4.7 Clone of Red Hat Enterprise Linux Squid Proxy Server Open Source Proxy Server MySQL Squid Access Report Reporting and Analysis Tool SquidGuard Content filter plug-in Perl Used for Custom Script Network Topology Data Flow Internet Router Squid Proxy Router Switch Client Deliverables Install/Configure CentOS v 4.7 Virtual Machine Setup Windows XP Client Virtual Machine Install/Configure Squid Proxy Server Install/Configure MySQL Squid Access Report Install/Configure SquidGuard Content Filter Write Script to translate IP Address to MAC Address Setup Linux machine as a router to forward all Web requests from clients to the proxy server Demonstration Conclusion Web Proxy Solution for Accounting Firm Utilized Open Source Tools Has Reporting and Filtering Functionality Meets need of Business Questions?