
|
 Now you can get technical After you have a
firm set of requirements, focus on design. This determines how you're
going to satisfy requirements with least cost. The design should fully
describe what components and configurations are necessary to satisfy the
requirements.
Through the design process, produce a design
specification that highlights the chosen design elements and provides a
diagram indicating the placement of access points within the facility. For
smaller networks, you may only spend a day or so designing the solution.
In larger implementations, it may take weeks or months to fully define
enough technical detail before moving forward with the acquisition of
hardware and installation services. These larger projects will likely
benefit from simulation, prototyping, or pilot testing as part of the
design to ensure you've made the right choices and the requirements are
fully realizable.
Keys in the Clear In a typical SSL installation, the
server maintains credentials so that clients can authenticate the server.
In addition to presenting a certificate at connection time, the server
also maintains a private key, which is necessary for establishing that the
server presenting a certificate is actually presenting its own
certificate. Cryptographic-acceleration cards will generally store the key
in hardware, making it unavailable to the actual computer. |
|