25.09.2013 Views

2003:13 - Karlstads universitet

2003:13 - Karlstads universitet

2003:13 - Karlstads universitet

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Innehållsförteckning<br />

1 Inledning.............................................................................................................................6<br />

2 Datasäkerhet allmänt ........................................................................................................6<br />

2.1 Kryptering ..................................................................................................................6<br />

2.1.1 Symmetrisk kryptering<br />

2.1.2 Asymmetrisk kryptering<br />

2.2 Integritet .....................................................................................................................6<br />

2.3 Autentisering..............................................................................................................6<br />

2.3.1 Digitala signaturer<br />

2.4 Tillgänglighet .............................................................................................................6<br />

2.5 Utbildade användare ..................................................................................................6<br />

3 VPN – översikt ...................................................................................................................6<br />

3.1 Vad är ett VPN? .........................................................................................................6<br />

3.2 De olika delarna i ett VPN .........................................................................................6<br />

3.2.1 Tunnling<br />

3.2.2 Autentisering<br />

3.2.3 Kryptering<br />

3.2.4 Behörighetskontroll<br />

3.3 VPN-protokoll............................................................................................................6<br />

3.3.1 PPTP<br />

3.3.2 L2TP<br />

3.3.3 IPsec<br />

3.4 Behörighetskontroll....................................................................................................6<br />

3.5 Prestandamätning.......................................................................................................6<br />

4 Konfigurationsexempel .....................................................................................................6<br />

4.1 Konfigurering av koncentrator och klient..................................................................6<br />

4.2 Konfiguration 1: Shared secret ..................................................................................6<br />

4.2.1 Inställningar i koncentratorn<br />

4.2.2 Inställningar i klienten<br />

4.3 Konfiguration 2: Certifikat.........................................................................................6<br />

4.3.1 Installation av certifikat<br />

4.3.2 Konfigurering av koncentrator<br />

4.3.3 Konfiguration av klient<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!