| 
        
        
          |  
  |  
          |         |  
          |  |  
          | 
              
              
                |  |  
 
  
  
   | Now you can get technical After you have a firm set of requirements, focus on design.
    This determines how you're going to satisfy requirements
    with least cost. The design should fully describe what
    components and configurations are necessary to satisfy
    the requirements.
 
 Through the design process, produce
    a design specification that highlights the chosen design
    elements and provides a diagram indicating the placement
    of access points within the facility. For smaller
    networks, you may only spend a day or so designing the
    solution. In larger implementations, it may take weeks
    or months to fully define enough technical detail before
    moving forward with the acquisition of hardware and
    installation services. These larger projects will likely
    benefit from simulation, prototyping, or pilot testing
    as part of the design to ensure you've made the right
    choices and the requirements are fully
    realizable.
 
 Keys in the Clear
 In a typical SSL installation, the server maintains
    credentials so that clients can authenticate the server.
    In addition to presenting a certificate at connection
    time, the server also maintains a private key, which is
    necessary for establishing that the server presenting a
    certificate is actually presenting its own certificate.
    Cryptographic-acceleration cards will generally store
    the key in hardware, making it unavailable to the actual
    computer.
 |  |  |  |  |  |