 |

Now you can get
technical After you have a firm
set of requirements, focus on design. This determines how you're
going to satisfy requirements with least cost. The design should
fully describe what components and configurations are necessary to
satisfy the requirements.
Through the
design process, produce a design specification that highlights the
chosen design elements and provides a diagram indicating the
placement of access points within the facility. For smaller
networks, you may only spend a day or so designing the solution. In
larger implementations, it may take weeks or months to fully define
enough technical detail before moving forward with the acquisition
of hardware and installation services. These larger projects will
likely benefit from simulation, prototyping, or pilot testing as
part of the design to ensure you've made the right choices and the
requirements are fully realizable.
Keys in the
Clear In a typical SSL installation, the server maintains
credentials so that clients can authenticate the server. In addition
to presenting a certificate at connection time, the server also
maintains a private key, which is necessary for establishing that
the server presenting a certificate is actually presenting its own
certificate. Cryptographic-acceleration cards will generally store
the key in hardware, making it unavailable to the actual
computer. | |
 |