|
Now you can get technical
After you have a firm set of requirements, focus on design.
This determines how you\'re going to satisfy requirements with
least cost. The design should fully describe what components
and configurations are necessary to satisfy the requirements.
Through the design process, produce a design specification that
highlights the chosen design elements and provides a diagram
indicating the placement of access points within the facility.
For smaller networks, you may only spend a day or so designing
the solution.
|
|
|
|
|
|
After you have a firm set of requirements, focus on design.
This determines how you\'re going to satisfy requirements with
least cost. The design should fully describe what components and
configurations are necessary to satisfy the requirements.
Through the design process, produce a design specification that
highlights the chosen design elements and provides a diagram
indicating the placement of access points within the facility.
For smaller networks, you may only spend a day or so designing
the solution. In larger implementations, it may take weeks or
months to fully define enough technical detail before moving
forward with the acquisition of hardware and installation
services. These larger projects will likely benefit from
simulation, prototyping, or pilot testing as part of the design
to ensure you\'ve made the right choices and the requirements
are fully realizable.
Keys in the Clear
In a typical SSL
installation, the server maintains credentials so that clients
can authenticate the server. In addition to presenting a
certificate at connection time, the server also maintains a
private key, which is necessary for establishing that the server
presenting a certificate is actually presenting its own
certificate. Cryptographic-acceleration cards will generally
store the key in hardware, making it unavailable to the actual
computer. |
|