SlideShare a Scribd company logo
A Seminar Report ON Secure Network
INTRODUCTION  Project “SECURE NETWORK” provides configuration for LAN in an institution or in an organization through LINUX Shell Scripting.  The DHCP server provides automatic IP Addresses when the user connects to the internet  PROXY server is used to block and allow specific websites
OBJECTIVE To automate the whole process of internet configuration Whole process is secured and user friendlyand this is done with the help of dialog boxes.  Logs for daily monitoring of web sites accessed by users are maintained Manage user feature is done by Mac Address binding.
Linux Officially introduced only in 1991 by its famed creator Linux Torvalds Linux is a kernel. Open Source:  source code of the software is made freely available
Why Linux is better than other operating system Security Scalability Not Single Source Software  Rate of Advancement  Support Reliability Cost 
Linux Server and Network Security Threats Server can be used as a base from which attacks on other systems can be launched.  E-mail server could be used as a by spammers. DoS(Denial of Service) attacks which renders servers Credit card numbers or account numbers and passwords can be targets
 SHELL SCRIPTING Shell Script is series of command written in plain text file.
Why to Write Shell Script ? Shell script can take input from user, file and output them on screen. Useful to create our own commands. Save lots of time. To automate some task of day today life. System Administration part can be also automated
DHCP Server in a Network
DHCP Service Profile Package: dhcp Daemon: /usr/sbin/dhcpd Script: /etc/init.d/dhcpd Ports: 67 & 68 Configuration file: /etc/dhcpd.conf
Assignment Conditions IP addresses can be reserved for clients based on MAC addresses and host names For security, the lease of IP addresses can be restricted to clients with known MAC addresses
IP Address Assignment In most cases, the IP address is automatically renewed when a clients logs into a network The IP address assigned is taken from a pool of IP addresses defined as the scope of IP addresses available for assignment  A user can manually release and renew an IP address by typing the commands     "ipconfig /release", followed by    "ipconfig /renew" in the command prompt
Proxy Service Profile Package: squid Daemon: /usr/sbin/squid Script: /etc/init.d/squid Ports: 3128 Configuration file: /etc/squid/squid.conf
Proxy Server To provide indirect Internet access. Firewall Machine. Allow to see who is accessing.
GATEWAY A network point that acts as an entrance to another network Also a proxy server and a firewall server Work on all seven OSI layers Implement in Hardware &  Software
THANKS

More Related Content

What's hot

DockerCon US 2016 - Docker Networking deep dive
DockerCon US 2016 - Docker Networking deep diveDockerCon US 2016 - Docker Networking deep dive
DockerCon US 2016 - Docker Networking deep dive
Madhu Venugopal
 
DockerCon 2016 Recap
DockerCon 2016 RecapDockerCon 2016 Recap
DockerCon 2016 Recap
ehazlett
 
Linux Based Network Proposal
Linux Based Network ProposalLinux Based Network Proposal
Linux Based Network Proposal
Chris Riccio
 
Docker security: Rolling out Trust in your container
Docker security: Rolling out Trust in your containerDocker security: Rolling out Trust in your container
Docker security: Rolling out Trust in your container
Ronak Kogta
 
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Edureka!
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard Fontana
Black Duck by Synopsys
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container Security
Phil Estes
 
Presentation on rhce
Presentation on rhcePresentation on rhce
Presentation on rhce
G Raveena Nair
 
CITI, NFSv4, and ASCI
CITI, NFSv4, and ASCICITI, NFSv4, and ASCI
CITI, NFSv4, and ASCI
peterhoneyman
 
Docker Online Meetup #29: Docker Networking is Now GA
Docker Online Meetup #29: Docker Networking is Now GA Docker Online Meetup #29: Docker Networking is Now GA
Docker Online Meetup #29: Docker Networking is Now GA
Docker, Inc.
 
Docker Online Meetup #22: Docker Networking
Docker Online Meetup #22: Docker NetworkingDocker Online Meetup #22: Docker Networking
Docker Online Meetup #22: Docker Networking
Docker, Inc.
 
Docker Meetup: Docker Networking 1.11, by Madhu Venugopal
Docker Meetup: Docker Networking 1.11, by Madhu VenugopalDocker Meetup: Docker Networking 1.11, by Madhu Venugopal
Docker Meetup: Docker Networking 1.11, by Madhu Venugopal
Michelle Antebi
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
Naiyan Noor
 
Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technology
Frank Victory
 
Kali linux os
Kali linux osKali linux os
Kali linux os
Samantha Lawrence
 
Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...
Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...
Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...
Docker, Inc.
 
Global Operations with Docker Enterprise
Global Operations with Docker EnterpriseGlobal Operations with Docker Enterprise
Global Operations with Docker Enterprise
Nicola Kabar
 
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
Docker, Inc.
 
IIS Smooth Streaming
IIS Smooth StreamingIIS Smooth Streaming
IIS Smooth Streaming
Hossein Sarshar
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
Gabriella Davis
 

What's hot (20)

DockerCon US 2016 - Docker Networking deep dive
DockerCon US 2016 - Docker Networking deep diveDockerCon US 2016 - Docker Networking deep dive
DockerCon US 2016 - Docker Networking deep dive
 
DockerCon 2016 Recap
DockerCon 2016 RecapDockerCon 2016 Recap
DockerCon 2016 Recap
 
Linux Based Network Proposal
Linux Based Network ProposalLinux Based Network Proposal
Linux Based Network Proposal
 
Docker security: Rolling out Trust in your container
Docker security: Rolling out Trust in your containerDocker security: Rolling out Trust in your container
Docker security: Rolling out Trust in your container
 
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
Linux Interview Questions And Answers | Linux Administration Tutorial | Linux...
 
Containers for Lawyers Richard Fontana
Containers for Lawyers  Richard FontanaContainers for Lawyers  Richard Fontana
Containers for Lawyers Richard Fontana
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container Security
 
Presentation on rhce
Presentation on rhcePresentation on rhce
Presentation on rhce
 
CITI, NFSv4, and ASCI
CITI, NFSv4, and ASCICITI, NFSv4, and ASCI
CITI, NFSv4, and ASCI
 
Docker Online Meetup #29: Docker Networking is Now GA
Docker Online Meetup #29: Docker Networking is Now GA Docker Online Meetup #29: Docker Networking is Now GA
Docker Online Meetup #29: Docker Networking is Now GA
 
Docker Online Meetup #22: Docker Networking
Docker Online Meetup #22: Docker NetworkingDocker Online Meetup #22: Docker Networking
Docker Online Meetup #22: Docker Networking
 
Docker Meetup: Docker Networking 1.11, by Madhu Venugopal
Docker Meetup: Docker Networking 1.11, by Madhu VenugopalDocker Meetup: Docker Networking 1.11, by Madhu Venugopal
Docker Meetup: Docker Networking 1.11, by Madhu Venugopal
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technology
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...
Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...
Automation and Collaboration Across Multiple Swarms Using Docker Cloud - Marc...
 
Global Operations with Docker Enterprise
Global Operations with Docker EnterpriseGlobal Operations with Docker Enterprise
Global Operations with Docker Enterprise
 
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
DockerCon EU 2015: Docker and PCI-DSS - Lessons learned in a security sensiti...
 
IIS Smooth Streaming
IIS Smooth StreamingIIS Smooth Streaming
IIS Smooth Streaming
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 

Viewers also liked

30032010 Gaming And Addiction Final
30032010   Gaming And Addiction Final30032010   Gaming And Addiction Final
30032010 Gaming And Addiction Finalmaublo
 
el louvre de pasada
el louvre de pasadael louvre de pasada
el louvre de pasada
hgleonor
 
At the playground
At the playgroundAt the playground
At the playground
Asniem CA
 
What good coaches do
What good coaches doWhat good coaches do
What good coaches doAsniem CA
 
Cable modems
Cable modemsCable modems
Cable modemsadarud09
 
Grandma's house
Grandma's houseGrandma's house
Grandma's house
Asniem CA
 
Showcasing Stories year 4
Showcasing Stories year 4Showcasing Stories year 4
Showcasing Stories year 4
Asniem CA
 
PPPM dan SISC
PPPM dan SISCPPPM dan SISC
PPPM dan SISC
Asniem CA
 
DSKP Bahasa Inggeris (SJK) Tahun 5
DSKP Bahasa Inggeris (SJK) Tahun 5DSKP Bahasa Inggeris (SJK) Tahun 5
DSKP Bahasa Inggeris (SJK) Tahun 5Asniem CA
 
Fun writing activities.pptx
Fun writing activities.pptxFun writing activities.pptx
Fun writing activities.pptx
Asniem CA
 
Using words you know
Using words you knowUsing words you know
Using words you know
Asniem CA
 
King of Kites
King of KitesKing of Kites
King of Kites
Asniem CA
 
PVP Formula
PVP FormulaPVP Formula
PVP Formula
Asniem CA
 
Jerayawara sip+ dan_sisc+_jpn_perlis[1]
Jerayawara sip+ dan_sisc+_jpn_perlis[1]Jerayawara sip+ dan_sisc+_jpn_perlis[1]
Jerayawara sip+ dan_sisc+_jpn_perlis[1]
Asniem CA
 
One fine face
One fine faceOne fine face
One fine face
Asniem CA
 
Vocabulary Enrichment
Vocabulary EnrichmentVocabulary Enrichment
Vocabulary Enrichment
Asniem CA
 
Item analysis for new format 2016
Item analysis for new format 2016Item analysis for new format 2016
Item analysis for new format 2016
Asniem CA
 

Viewers also liked (18)

30032010 Gaming And Addiction Final
30032010   Gaming And Addiction Final30032010   Gaming And Addiction Final
30032010 Gaming And Addiction Final
 
el louvre de pasada
el louvre de pasadael louvre de pasada
el louvre de pasada
 
Taketori monogatari
Taketori monogatariTaketori monogatari
Taketori monogatari
 
At the playground
At the playgroundAt the playground
At the playground
 
What good coaches do
What good coaches doWhat good coaches do
What good coaches do
 
Cable modems
Cable modemsCable modems
Cable modems
 
Grandma's house
Grandma's houseGrandma's house
Grandma's house
 
Showcasing Stories year 4
Showcasing Stories year 4Showcasing Stories year 4
Showcasing Stories year 4
 
PPPM dan SISC
PPPM dan SISCPPPM dan SISC
PPPM dan SISC
 
DSKP Bahasa Inggeris (SJK) Tahun 5
DSKP Bahasa Inggeris (SJK) Tahun 5DSKP Bahasa Inggeris (SJK) Tahun 5
DSKP Bahasa Inggeris (SJK) Tahun 5
 
Fun writing activities.pptx
Fun writing activities.pptxFun writing activities.pptx
Fun writing activities.pptx
 
Using words you know
Using words you knowUsing words you know
Using words you know
 
King of Kites
King of KitesKing of Kites
King of Kites
 
PVP Formula
PVP FormulaPVP Formula
PVP Formula
 
Jerayawara sip+ dan_sisc+_jpn_perlis[1]
Jerayawara sip+ dan_sisc+_jpn_perlis[1]Jerayawara sip+ dan_sisc+_jpn_perlis[1]
Jerayawara sip+ dan_sisc+_jpn_perlis[1]
 
One fine face
One fine faceOne fine face
One fine face
 
Vocabulary Enrichment
Vocabulary EnrichmentVocabulary Enrichment
Vocabulary Enrichment
 
Item analysis for new format 2016
Item analysis for new format 2016Item analysis for new format 2016
Item analysis for new format 2016
 

Similar to Secure network

Ubuntu For Intranet Services
Ubuntu For Intranet ServicesUbuntu For Intranet Services
Ubuntu For Intranet Services
Dominique Cimafranca
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
cclay3
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
Muhammad Moinur Rahman
 
DHCP concept
DHCP conceptDHCP concept
DHCP concept
Shopnomoy Prantor
 
linux
linuxlinux
maXbox Arduino Tutorial
maXbox Arduino TutorialmaXbox Arduino Tutorial
maXbox Arduino Tutorial
Max Kleiner
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Serverswebhostingguy
 
Lamp technology
Lamp technologyLamp technology
Lamp technology2tharan21
 
lamp technology
lamp technologylamp technology
lamp technologyDeepa
 
Deepa ppt about lamp technology
Deepa ppt about lamp technologyDeepa ppt about lamp technology
Deepa ppt about lamp technologyDeepa
 
Rhel4
Rhel4Rhel4
Survey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication typesSurvey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication types
ManjuShanmugam1593
 
DevOPS training - Day 1/2
DevOPS training - Day 1/2DevOPS training - Day 1/2
DevOPS training - Day 1/2
Vincent Mercier
 
RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)
Sumant Garg
 
Dhcp Configuration File
Dhcp Configuration FileDhcp Configuration File
Dhcp Configuration File
Shubhamg Gupta
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
Deepak Singh
 
Nadhiya lamp
Nadhiya lampNadhiya lamp
Nadhiya lampNadhi ya
 
Maxbox starter18
Maxbox starter18Maxbox starter18
Maxbox starter18
Max Kleiner
 
maXbox_Arduino_Pascal_Magazine
maXbox_Arduino_Pascal_MagazinemaXbox_Arduino_Pascal_Magazine
maXbox_Arduino_Pascal_Magazine
Max Kleiner
 

Similar to Secure network (20)

Ubuntu For Intranet Services
Ubuntu For Intranet ServicesUbuntu For Intranet Services
Ubuntu For Intranet Services
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
 
DHCP concept
DHCP conceptDHCP concept
DHCP concept
 
linux
linuxlinux
linux
 
maXbox Arduino Tutorial
maXbox Arduino TutorialmaXbox Arduino Tutorial
maXbox Arduino Tutorial
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Servers
 
Lamp technology
Lamp technologyLamp technology
Lamp technology
 
lamp technology
lamp technologylamp technology
lamp technology
 
Deepa ppt about lamp technology
Deepa ppt about lamp technologyDeepa ppt about lamp technology
Deepa ppt about lamp technology
 
Rhel4
Rhel4Rhel4
Rhel4
 
Survey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication typesSurvey on Client Tools, Server and Communication types
Survey on Client Tools, Server and Communication types
 
DevOPS training - Day 1/2
DevOPS training - Day 1/2DevOPS training - Day 1/2
DevOPS training - Day 1/2
 
RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)
 
Dhcp Configuration File
Dhcp Configuration FileDhcp Configuration File
Dhcp Configuration File
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
Dce rpc
Dce rpcDce rpc
Dce rpc
 
Nadhiya lamp
Nadhiya lampNadhiya lamp
Nadhiya lamp
 
Maxbox starter18
Maxbox starter18Maxbox starter18
Maxbox starter18
 
maXbox_Arduino_Pascal_Magazine
maXbox_Arduino_Pascal_MagazinemaXbox_Arduino_Pascal_Magazine
maXbox_Arduino_Pascal_Magazine
 

Secure network

  • 1. A Seminar Report ON Secure Network
  • 2. INTRODUCTION Project “SECURE NETWORK” provides configuration for LAN in an institution or in an organization through LINUX Shell Scripting. The DHCP server provides automatic IP Addresses when the user connects to the internet PROXY server is used to block and allow specific websites
  • 3. OBJECTIVE To automate the whole process of internet configuration Whole process is secured and user friendlyand this is done with the help of dialog boxes. Logs for daily monitoring of web sites accessed by users are maintained Manage user feature is done by Mac Address binding.
  • 4. Linux Officially introduced only in 1991 by its famed creator Linux Torvalds Linux is a kernel. Open Source: source code of the software is made freely available
  • 5. Why Linux is better than other operating system Security Scalability Not Single Source Software Rate of Advancement Support Reliability Cost 
  • 6. Linux Server and Network Security Threats Server can be used as a base from which attacks on other systems can be launched. E-mail server could be used as a by spammers. DoS(Denial of Service) attacks which renders servers Credit card numbers or account numbers and passwords can be targets
  • 7.  SHELL SCRIPTING Shell Script is series of command written in plain text file.
  • 8. Why to Write Shell Script ? Shell script can take input from user, file and output them on screen. Useful to create our own commands. Save lots of time. To automate some task of day today life. System Administration part can be also automated
  • 9. DHCP Server in a Network
  • 10. DHCP Service Profile Package: dhcp Daemon: /usr/sbin/dhcpd Script: /etc/init.d/dhcpd Ports: 67 & 68 Configuration file: /etc/dhcpd.conf
  • 11. Assignment Conditions IP addresses can be reserved for clients based on MAC addresses and host names For security, the lease of IP addresses can be restricted to clients with known MAC addresses
  • 12. IP Address Assignment In most cases, the IP address is automatically renewed when a clients logs into a network The IP address assigned is taken from a pool of IP addresses defined as the scope of IP addresses available for assignment A user can manually release and renew an IP address by typing the commands "ipconfig /release", followed by "ipconfig /renew" in the command prompt
  • 13. Proxy Service Profile Package: squid Daemon: /usr/sbin/squid Script: /etc/init.d/squid Ports: 3128 Configuration file: /etc/squid/squid.conf
  • 14. Proxy Server To provide indirect Internet access. Firewall Machine. Allow to see who is accessing.
  • 15. GATEWAY A network point that acts as an entrance to another network Also a proxy server and a firewall server Work on all seven OSI layers Implement in Hardware & Software