2003:13 - Karlstads universitet
2003:13 - Karlstads universitet
2003:13 - Karlstads universitet
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Innehållsförteckning<br />
1 Inledning.............................................................................................................................6<br />
2 Datasäkerhet allmänt ........................................................................................................6<br />
2.1 Kryptering ..................................................................................................................6<br />
2.1.1 Symmetrisk kryptering<br />
2.1.2 Asymmetrisk kryptering<br />
2.2 Integritet .....................................................................................................................6<br />
2.3 Autentisering..............................................................................................................6<br />
2.3.1 Digitala signaturer<br />
2.4 Tillgänglighet .............................................................................................................6<br />
2.5 Utbildade användare ..................................................................................................6<br />
3 VPN – översikt ...................................................................................................................6<br />
3.1 Vad är ett VPN? .........................................................................................................6<br />
3.2 De olika delarna i ett VPN .........................................................................................6<br />
3.2.1 Tunnling<br />
3.2.2 Autentisering<br />
3.2.3 Kryptering<br />
3.2.4 Behörighetskontroll<br />
3.3 VPN-protokoll............................................................................................................6<br />
3.3.1 PPTP<br />
3.3.2 L2TP<br />
3.3.3 IPsec<br />
3.4 Behörighetskontroll....................................................................................................6<br />
3.5 Prestandamätning.......................................................................................................6<br />
4 Konfigurationsexempel .....................................................................................................6<br />
4.1 Konfigurering av koncentrator och klient..................................................................6<br />
4.2 Konfiguration 1: Shared secret ..................................................................................6<br />
4.2.1 Inställningar i koncentratorn<br />
4.2.2 Inställningar i klienten<br />
4.3 Konfiguration 2: Certifikat.........................................................................................6<br />
4.3.1 Installation av certifikat<br />
4.3.2 Konfigurering av koncentrator<br />
4.3.3 Konfiguration av klient<br />
vii