Module 2- Assignment 2.2 - Learning about Untangle
docx
keyboard_arrow_up
School
Northern Virginia Community College *
*We aren’t endorsed by this school
Course
266
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by JusticeAntelope23233
This project serves the purpose of enhancing the network security for a relatively mid-
sized business and how it is managed. The goals were to use Untangle’s software solutions to ensure that the NG firewall is secured and to implement a policy for BYOD.
It was set up in three stages which included configuring how traffic was allocated, setting
up the firewall for NG and establishing a policy for BYOD. The software is known for its user-
friendly interface and the capabilities it has for network management. Beginning with the first screenshot, we see how the traffic allocation configuration works within the Untangle application. The weight of “50” is assigned to the interface named “External” and describes how it is required to handle all the internet traffic that came in. This suggests a case where only one or many WAN interfaces can have identical bandwidth. This feature is needed to balance network load and increase the performance of the network. In screenshot two it illustrates how NG firewall is a cost-effective and scalable type of solution. One of its features is the dashboard, which has a view of the current health of the network along with activity. This way, real-time monitoring is made possible and shows features of how the software’s ability to support business while maintaining a secure network space. Lastly, the third screenshot emphasizes the policies for BYOD. Since businesses are becoming more dependent on smartphones, it is also crucial to provide secure access to these business applications. There are countless studies to suggest that there is a huge need for a way to integrate personal devices in the business networks without risking a security attack.
There were many challenges that came up during the project such as attempting to get a
precise allocation of traffic weights to align with the bandwidth that was available. To get this, it required countless tests to make sure everything was calculated properly. Adding the NG Firewall made sure that there were few disruptions to how things were performing daily while the BYOD policy needed to balance being secure and usable. Ultimately, allocating the traffic was eventually successful and resulted in heightened network performance. The firewall was modified to be very secure while still promoting a user-
friendly experience for users. The policy included secure protocols so that employees could be flexible over the network without compromising the integrity of the network.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help