Design the following items to match the operation.
1.2.1 Determine the system configuration
1.2.2 Design the operation in an IPv6 environment
1.2.3 Design the port numbers
1.2.4 Estimate disk space requirements
1.2.5 Consider which communication method to use
1.2.6 Consider what configuration information to collect
1.2.7 Consider the authentication method to use
1.2.8 Add the required users