{"id":1239,"date":"2022-11-25T20:28:32","date_gmt":"2022-11-25T20:28:32","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1239"},"modified":"2022-11-25T20:28:32","modified_gmt":"2022-11-25T20:28:32","slug":"%eb%84%a4%ed%8a%b8%ec%9b%8c%ed%81%ac%eb%8a%94-%ec%96%b4%eb%96%bb%ea%b2%8c-%ec%9e%91%eb%8f%99%ed%95%98%eb%82%98%ec%9a%94","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%84%a4%ed%8a%b8%ec%9b%8c%ed%81%ac\/%eb%84%a4%ed%8a%b8%ec%9b%8c%ed%81%ac%eb%8a%94-%ec%96%b4%eb%96%bb%ea%b2%8c-%ec%9e%91%eb%8f%99%ed%95%98%eb%82%98%ec%9a%94\/","title":{"rendered":"\uae30\ubcf8 \ub124\ud2b8\uc6cc\ud0b9: \ub124\ud2b8\uc6cc\ud06c\uc758 \uc791\ub3d9 \ubc29\uc2dd"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c\ub294 \uc11c\ub85c \uc5f0\uacb0\ub41c \uc7a5\uce58\ub4e4\uc774 \uc815\ubcf4\ub97c \uad50\ud658\ud558\uc5ec \uc62c\ubc14\ub974\uac8c \uc791\ub3d9\ud558\ub3c4\ub85d \ud558\ub294 \uc2dc\uc2a4\ud15c\uc785\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ub178\ud2b8\ubd81, \uc11c\ubc84, \uc2a4\ub9c8\ud2b8\ud3f0 \ub4f1\uc774 \ud3ec\ud568\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc7a5\uce58\ub4e4\uc740 \ub77c\uc6b0\ud130\uc640 \uc2a4\uc704\uce58\ub77c\ub294 \ud2b9\uc218 \ub124\ud2b8\uc6cc\ud06c\ub97c \ud1b5\ud574 \uc11c\ub85c \ud1b5\uc2e0\ud569\ub2c8\ub2e4. \uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ub41c \uc7a5\uce58\uc758 \uc218\uac00 \uacc4\uc18d \uc99d\uac00\ud568\uc5d0 \ub530\ub77c \uc774\ub4e4\uc774 \uc11c\ub85c \uc5b4\ub5bb\uac8c \ud1b5\uc2e0\ud558\ub294\uc9c0 \uc774\ud574\ud558\ub294 \uac83\uc774 \uc911\uc694\ud569\ub2c8\ub2e4. \uc774 \uae30\uc0ac\uc5d0\uc11c\ub294 \ub2e4\uc591\ud55c \ub124\ud2b8\uc6cc\ud06c \uad6c\uc131 \uc694\uc18c\uc640 \uc774\ub4e4\uc774 \uc5b4\ub5bb\uac8c \ud611\ub825\ud558\uc5ec \uc6b0\ub9ac\uac00 \uc6f9\uc744 \ud0d0\uc0c9\ud558\uace0 \uc774\uba54\uc77c\uc744 \ubcf4\ub0b4\ub294 \ub4f1\uc758 \uc791\uc5c5\uc744 \uac00\ub2a5\ud558\uac8c \ud558\ub294\uc9c0 \uc0b4\ud3b4\ubcf4\uaca0\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c\uc5d0\ub294 \ub2e4\uc591\ud55c \uc720\ud615\uc774 \uc788\uc73c\uba70, \uac01 \uc720\ud615\ub9c8\ub2e4 \uc801\uc6a9 \ubc94\uc704\uac00 \ub2e4\ub985\ub2c8\ub2e4. \uba3c\uc800 \ub2e4\uc591\ud55c \uc720\ud615\uc758 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ub300\ud574 \uc0b4\ud3b4\ubcf4\uaca0\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<h2><b>\ub124\ud2b8\uc6cc\ud06c \uc720\ud615:<\/b><\/h2>\n<h3><b>LAN - \ub85c\uceec \uc601\uc5ed \ub124\ud2b8\uc6cc\ud06c<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">LAN \ub610\ub294 \ub85c\uceec \uc601\uc5ed \ub124\ud2b8\uc6cc\ud06c\ub294 \ub354 \uc791\uc740 \ub124\ud2b8\uc6cc\ud06c \uc720\ud615\uc73c\ub85c, \uc870\uc9c1\uc774\ub098 \uac00\uc815\uc73c\ub85c \uc81c\ud55c\ub429\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, \ud648 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc5f0\uacb0\ub41c \ub514\ubc14\uc774\uc2a4\uc758 \uc218\ub294 \ub2e4\ub978 \ub124\ud2b8\uc6cc\ud06c \uc720\ud615\uc5d0 \ube44\ud574 \uc81c\ud55c\ub429\ub2c8\ub2e4. \ud559\uad50 \ub124\ud2b8\uc6cc\ud06c\ub294 \ud648 \ub124\ud2b8\uc6cc\ud06c\ubcf4\ub2e4 \uaddc\ubaa8\uac00 \ud06c\uc9c0\ub9cc \ub3d9\uc77c\ud55c \ubb3c\ub9ac\uc801 \uacf5\uac04 \ub0b4\uc5d0\uc11c \ub9ce\uc740 \uc7a5\uce58\ub97c \uc0c1\ud638 \uc5f0\uacb0\ud558\uae30 \ub54c\ubb38\uc5d0 \uc5ec\uc804\ud788 LAN\uc73c\ub85c \uac04\uc8fc\ub429\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ucef4\ud4e8\ud130, \uc11c\ubc84 \ub4f1\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>MAN - \uc218\ub3c4\uad8c \ub124\ud2b8\uc6cc\ud06c<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">MAN\uc740 \ub3c4\uc2dc \uc804\uccb4\ub97c \ucee4\ubc84\ud558\ub294 \ud655\uc7a5\ub41c \ub124\ud2b8\uc6cc\ud06c\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ud55c \ub3c4\uc2dc \ub0b4\uc758 \uc5ec\ub7ec \ub124\ud2b8\uc6cc\ud06c\ub97c \uacb0\ud569\ud558\uace0 \uc5f0\uacb0\ud558\uba74 MAN \ub610\ub294 \ub300\ub3c4\uc2dc \uc9c0\uc5ed \ub124\ud2b8\uc6cc\ud06c\ub97c \ud615\uc131\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \uc720\ud615\uc758 \ub124\ud2b8\uc6cc\ud06c\ub294 \ubcf4\ub2e4 \ud3ec\uad04\uc801\uc774\uba70 \ub3c4\uc2dc \uc804\uccb4\ub97c \ucee4\ubc84\ud569\ub2c8\ub2e4. \ud3c9\uade0 \uc778\ud130\ub137 \uc5f0\uacb0\ubcf4\ub2e4 \uc0c1\ub300\uc801\uc73c\ub85c \ube60\ub978 \ub370\uc774\ud130 \uc18d\ub3c4\ub97c \uc81c\uacf5\ud558\ub294 \ub124\ud2b8\uc6cc\ud06c \uc720\ud615\uc744 \uba54\ud2b8\ub85c\ud3f4\ub9ac\ud0c4 \uc9c0\uc5ed \ub124\ud2b8\uc6cc\ud06c \ub610\ub294 MAN\uc774\ub77c\uace0 \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>WAN - \uad11\uc5ed \ub124\ud2b8\uc6cc\ud06c<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">WAN(\uad11\uc5ed \ub124\ud2b8\uc6cc\ud06c)\uc740 LAN(\uadfc\uac70\ub9ac \ud1b5\uc2e0\ub9dd)\uacfc \uac19\uc740 \uc18c\uaddc\ubaa8 \ub124\ud2b8\uc6cc\ud06c\ub97c \uc5f0\uacb0\ud558\ub294 \ub300\uaddc\ubaa8 \ucef4\ud4e8\ud130 \ub124\ud2b8\uc6cc\ud06c\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">WAN\uc740 \uc0ac\ub78c\ub4e4\uc774 \ub113\uc740 \uc9c0\uc5ed\uc5d0\uc11c \uc778\ud130\ub137\uc744 \uc0ac\uc6a9\ud558\uac70\ub098 \uc11c\ub85c \uc27d\uac8c \ud1b5\uc2e0\ud560 \uc218 \uc788\ub3c4\ub85d \uc5ec\ub7ec \ub3c4\uc2dc \ub610\ub294 \uad6d\uac00\ub97c \uc11c\ub85c \uc5f0\uacb0\ud558\ub294 \ub124\ud2b8\uc6cc\ud06c\uc785\ub2c8\ub2e4. \ud55c \uc870\uc9c1\uc758 \uc5ec\ub7ec LAN\uc774 \uc0c1\ud638 \uc5f0\uacb0\ub418\uba74 WAN\uc744 \ud615\uc131\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>WWAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uae30\ubcf8\uc801\uc73c\ub85c \uc778\ud130\ub137\uc740 \uc804 \uc138\uacc4 \uc601\uc5ed \ub124\ud2b8\uc6cc\ud06c(WWAN)\uc785\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>WLAN - \ubb34\uc120 LAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ubb34\uc120 LAN \ub610\ub294 \uc904\uc5ec\uc11c Wi-Fi\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \uac00\uc815\uc6a9 \ub77c\uc6b0\ud130\uc5d0 \uc758\ud574 \uc0dd\uc131\ub418\ub294 \ub124\ud2b8\uc6cc\ud06c\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\ubb34\uc120\ub79c\uc740 \uc2a4\ub9c8\ud2b8\ud3f0, \ud0dc\ube14\ub9bf, \ub178\ud2b8\ubd81 \ub610\ub294 \uae30\ud0c0 \ub514\ubc14\uc774\uc2a4\uc5d0\uc11c \ubb34\uc120\uc73c\ub85c \uc5f0\uacb0\ud560 \uc218 \uc788\ub294 LAN\uc758 \ud55c \uc720\ud615\uc785\ub2c8\ub2e4. \ucf00\uc774\ube14\uc774\ub098 \uae30\ud0c0 \ubb3c\ub9ac\uc801 \ub9e4\uccb4 \ub300\uc2e0 \uc804\ud30c\ub97c \uc0ac\uc6a9\ud558\uc5ec \ub370\uc774\ud130\ub97c \uc804\uc1a1\ud558\ub294 \ubb34\uc120 \ud658\uacbd\uc740 \uc18d\ub3c4, \ubcf4\uc548, \ucee4\ubc84\ub9ac\uc9c0 \uce21\uba74\uc5d0\uc11c \uc720\uc120 \ucf00\uc774\ube14 \uae30\ubc18 \ub124\ud2b8\uc6cc\ud06c\uc640\ub294 \ub2e4\ub978 \ud2b9\uc131\uc744 \uac00\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ubb34\uc120 \uc5f0\uacb0\uc758 \uac00\uc7a5 \ud070 \uc7a5\uc810 \uc911 \ud558\ub098\ub294 \ub9e4\uc6b0 \uc720\uc5f0\ud558\ub2e4\ub294 \uc810\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc704\uc5d0\uc11c \uc5b8\uae09\ud55c \ub124\ud2b8\uc6cc\ud06c \uc720\ud615 \uc678\uc5d0\ub3c4 \uaddc\ubaa8\ub098 \ubaa9\uc801\uc5d0 \ub530\ub77c \ub2e4\uc591\ud55c \ub124\ud2b8\uc6cc\ud06c\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SAN- \uc800\uc7a5 \uc601\uc5ed \ub124\ud2b8\uc6cc\ud06c.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EPN - \uc5d4\ud130\ud504\ub77c\uc774\uc988 \ud504\ub77c\uc774\ube57 \ub124\ud2b8\uc6cc\ud06c.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPN - \uac00\uc0c1 \uc0ac\uc124 \ub124\ud2b8\uc6cc\ud06c.<\/span><\/li>\n<\/ul>\n<h2><b>\ub124\ud2b8\uc6cc\ud06c\ub294 \ub450 \uac00\uc9c0 \ubc29\uc2dd\uc73c\ub85c \ud45c\ud604\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \ub124\ud2b8\uc6cc\ud06c\uc0c1\uc758 \ub514\ubc14\uc774\uc2a4\uac00 \uc5f0\uacb0\ub418\ub294 \ubc29\uc2dd\uc744 \ub098\ud0c0\ub0b4\ub294 '\ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0'\ub85c \ud45c\ud604\ub429\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0\uc5d0\ub294 \ub17c\ub9ac\uc801 \ud1a0\ud3f4\ub85c\uc9c0\uc640 \ubb3c\ub9ac\uc801 \ud1a0\ud3f4\ub85c\uc9c0\uc758 \ub450 \uac00\uc9c0 \uc8fc\uc694 \uc720\ud615\uc774 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ub17c\ub9ac \ud1a0\ud3f4\ub85c\uc9c0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ub17c\ub9ac\uc801 \ud1a0\ud3f4\ub85c\uc9c0\ub294 IP \uc8fc\uc18c, \uc7a5\uce58 \uac04 \uc5f0\uacb0, \uc0ac\uc6a9 \uc911\uc778 \ub77c\uc6b0\ud305 \ud504\ub85c\ud1a0\ucf5c\uacfc \uac19\uc740 \ub124\ud2b8\uc6cc\ud06c\uc758 \ub17c\ub9ac\uc801 \uce21\uba74\uc744 \ubcf4\uc5ec\uc90d\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ubb3c\ub9ac\uc801 \ud1a0\ud3f4\ub85c\uc9c0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c\uc758 \ubb3c\ub9ac\uc801 \ud1a0\ud3f4\ub85c\uc9c0\ub294 \ub124\ud2b8\uc6cc\ud06c\uac00 \ubb3c\ub9ac\uc801\uc73c\ub85c \ubc30\uc5f4\ub41c \ubc29\uc2dd\uc785\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \uc7a5\uce58\uac00 \ubc30\uce58\ub418\ub294 \uc704\uce58, \uc0ac\uc6a9\ub418\ub294 \ucf00\uc774\ube14 \uc720\ud615, \ud544\uc694\ud55c \ud3ec\ud2b8 \uc218, \uc11c\ubc84\uac00 \uc5f0\uacb0\ub420 \ud3ec\ud2b8\/\uc2a4\uc704\uce58 \ub4f1\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4. \ubb3c\ub9ac\uc801 \ud1a0\ud3f4\ub85c\uc9c0\ub294 \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc7a5\ube44\uc758 \uc704\uce58\uc640 \uc6a9\ub3c4\ub97c \ubcf4\uc5ec\uc8fc\ub294 \ub2e4\uc774\uc5b4\uadf8\ub7a8\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uadf8\ub7ec\ub098 \ub514\ubc14\uc774\uc2a4\uc758 \ubaa9\uc801\uc5d0 \ub530\ub77c \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0\uac00 \ub2ec\ub77c\uc9d1\ub2c8\ub2e4.<\/span><\/p>\n<h2><b>\ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc5d0\uc11c \ub514\ubc14\uc774\uc2a4\ub97c \ud45c\ud604\ud558\ub294 \ubc29\ubc95\uc5d0\ub294 \uc5ec\ub7ec \uac00\uc9c0\uac00 \uc788\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub2e4\uc591\ud55c \ubaa9\uc801\uc5d0 \ub530\ub77c \ub514\ubc14\uc774\uc2a4\ub97c \uadf8\ub8f9\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ubcc4 \ubaa8\uc591 \ud1a0\ud3f4\ub85c\uc9c0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">LAN\uc5d0 \uac00\uc7a5 \ub9ce\uc774 \uc0ac\uc6a9\ub418\ub294 \ud1a0\ud3f4\ub85c\uc9c0\ub294 \uc2a4\ud0c0 \ud1a0\ud3f4\ub85c\uc9c0\uc785\ub2c8\ub2e4. \uc2a4\ud0c0 \ud1a0\ud3f4\ub85c\uc9c0\ub294 \uc18c\uaddc\ubaa8 \uae30\uc5c5\uc5d0\uc11c \uc0ac\uc6a9\ud558\ub294 \ub124\ud2b8\uc6cc\ud06c\uc640 \uac19\uc740 \uc18c\uaddc\ubaa8 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uac00\uc7a5 \uc801\ud569\ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc608\ub97c \ub4e4\uc5b4 \ub124\ud2b8\uc6cc\ud06c \uc5f0\uacb0\uc774\ub098 \uc778\ud130\ub137 \uc561\uc138\uc2a4\ub9cc \ud544\uc694\ud55c \uacbd\uc6b0 \ubcc4 \ubaa8\uc591\uc758 \ud1a0\ud3f4\ub85c\uc9c0\ub85c \ub514\ubc14\uc774\uc2a4\ub97c \uadf8\ub8f9\ud654\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \ub124\ud2b8\uc6cc\ud06c\uc758 \ubaa8\ub4e0 \uba38\uc2e0\uc740 \uc911\uc559 \ud5c8\ube0c\uc5d0 \uc5f0\uacb0\ub429\ub2c8\ub2e4. \ub178\ub4dc\uc5d0 \uc7a5\uc560\uac00 \ubc1c\uc0dd\ud558\ub354\ub77c\ub3c4 \uc720\uc9c0 \uad00\ub9ac \ubc0f \ub4f1\uae09 \uc9c0\uc815\uc774 \ub9e4\uc6b0 \uc27d\uae30 \ub54c\ubb38\uc5d0 \uc804\uccb4 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \ud574\ub97c \ub07c\uce58\uac70\ub098 \uc190\uc0c1\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uadf8\ub7ec\ub098 \uc774 \uc2dc\ub098\ub9ac\uc624\uc758 \ubb38\uc81c\uc810\uc740 \ucef4\ud4e8\ud130 \ub124\ud2b8\uc6cc\ud0b9\uc5d0 \ud544\uc218\uc801\uc778 \uc774\uc911\ud654\uac00 \uc5c6\ub2e4\ub294 \uac83\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1240\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg\" alt=\"\ubcc4 \ubaa8\uc591\uc758 \ud1a0\ud3f4\ub85c\uc9c0\" width=\"620\" height=\"310\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg 620w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology-300x150.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<h3><b>\uba54\uc2dc \ud1a0\ud3f4\ub85c\uc9c0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uba54\uc2dc \ud1a0\ud3f4\ub85c\uc9c0\ub294 \uc778\ud130\ub137 \uc11c\ube44\uc2a4 \uc81c\uacf5\uc5c5\uccb4(ISP)\uc640 \uac19\uc774 \uc548\uc815\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uac00\uc7a5 \uc801\ud569\ud569\ub2c8\ub2e4. \uc774 \uc124\uacc4\uc5d0\uc11c\ub294 \ubaa8\ub4e0 \uac83\uc774 \ubc31\uc5c5\ub429\ub2c8\ub2e4. \ub530\ub77c\uc11c \ucf00\uc774\ube14\uc774\ub098 \uc2a4\uc704\uce58\uc5d0 \ubb38\uc81c\uac00 \ubc1c\uc0dd\ud574\ub3c4 \uc778\ud130\ub137\uc5d0 \uc811\uc18d\ud560 \uc218 \uc788\ub294 \ub2e4\ub978 \ubc29\ubc95\uc774\ub098 \uc5f0\uacb0\ud558\ub824\ub294 \ub2e4\ub978 \uc7a5\uc18c\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uc644\uc804\ud55c \uc774\uc911\ud654\ub294 \ub354 \ub9ce\uc740 \uc7a5\uce58\uc640 \ub354 \uae34 \ucf00\uc774\ube14\uc774 \ud544\uc694\ud558\ubbc0\ub85c \ube44\uc6a9\uc774 \ub354 \ub9ce\uc774 \ub4e0\ub2e4\ub294 \uac83\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uc804\uccb4 \uba54\uc2dc \ud1a0\ud3f4\ub85c\uc9c0\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \uc2a4\ud0c0\ud615 \ud1a0\ud3f4\ub85c\uc9c0\ubcf4\ub2e4 \uad6c\ud604\ud558\ub294 \ub370 \ub354 \ub9ce\uc740 \ube44\uc6a9\uc774 \ub4ed\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uba54\uc2dc \ud1a0\ud3f4\ub85c\uc9c0\uc758 \uba87 \uac00\uc9c0 \uc608\ub85c\ub294 Google Wi-Fi, Google Home \ub610\ub294 \uad70\uc0ac \uc7a5\ube44\uc758 \ub124\ud2b8\uc6cc\ud06c\uac00 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1241\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/mesh-topology.jpg\" alt=\"\uba54\uc2dc \ud1a0\ud3f4\ub85c\uc9c0\" width=\"620\" height=\"310\" \/><\/p>\n<h3><b>\ubd80\ubd84 \uba54\uc2dc \ud1a0\ud3f4\ub85c\uc9c0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ubd80\ubd84 \uba54\uc2dc \ud1a0\ud3f4\ub85c\uc9c0\ub294 \uc77c\ubd80 \uc2a4\uc704\uce58\uc640 \ub124\ud2b8\uc6cc\ud06c\uc758 \uc77c\ubd80\uc5d0\ub9cc \uc911\ubcf5\uc131\uc744 \uc81c\uacf5\ud558\ub294 \ubcf4\ub2e4 \uacbd\uc81c\uc801\uc778 \ub124\ud2b8\uc6cc\ud06c \ud1a0\ud3f4\ub85c\uc9c0\uc785\ub2c8\ub2e4. \ub2e4\ub978 \uc2a4\uc704\uce58\uc5d0\ub294 \ub300\uccb4 \uacbd\ub85c\uac00 \uc5c6\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ud5c8\ube0c \ubc0f \uc2a4\ud3ec\ud06c \ud1a0\ud3f4\ub85c\uc9c0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ud5c8\ube0c \uc564 \uc2a4\ud3ec\ud06c \ud1a0\ud3f4\ub85c\uc9c0\ub294 WAN(\uc778\ud130\ub137) \uc124\uacc4\uc5d0\uc11c \uc790\uc8fc \uc0ac\uc6a9\ub429\ub2c8\ub2e4. \uc774 \ud1a0\ud3f4\ub85c\uc9c0\uc758 \uc138 \ub77c\uc6b0\ud130\ub294 \uae30\ubcf8\uc801\uc73c\ub85c \uc11c\ub85c\ub97c \uc54c\uc9c0 \ubabb\ud569\ub2c8\ub2e4. \ub370\uc774\ud130\uac00 \ubaa9\uc801\uc9c0\uc5d0 \ub3c4\ucc29\ud558\ub824\uba74 R1\uacfc R3 \ubaa8\ub450 \ud2b8\ub798\ud53d\uc744 \uc62c\ubc14\ub974\uac8c \ub9ac\ub514\ub809\uc158\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uace0 \uc788\ub294 R2\ub85c \ud2b8\ub798\ud53d\uc744 \ubcf4\ub0b4\uc57c \ud569\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4 R1\uc774 R3\uc73c\ub85c \ud2b8\ub798\ud53d\uc744 \ubcf4\ub0b4\ub824\uba74 \ud5c8\ube0c(R2)\ub97c \ud1b5\ud574 \ud2b8\ub798\ud53d\uc744 \ubcf4\ub0b4\uc57c \ud569\ub2c8\ub2e4. \uadf8\ub7ec\uba74 \ud5c8\ube0c\ub294 \ud574\ub2f9 \ud2b8\ub798\ud53d\uc744 \ucc98\ub9ac\ud558\uace0 \ub9ac\ub514\ub809\uc158\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h2><b>\ub124\ud2b8\uc6cc\ud06c \uad6c\uc131 \uc694\uc18c<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c\ub97c \uad6c\uc131\ud558\ub294 \uc694\uc18c\ub294 \ub2e4\uc74c\uacfc \uac19\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<h3><b>\ucd5c\uc885 \uc7a5\uce58<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ud558\uae30 \uc704\ud574 \uc0ac\uc6a9\ud558\ub294 \ubaa8\ub4e0 \ubb3c\ub9ac\uc801 \uc7a5\uce58\ub97c \uc5d4\ub4dc \ub514\ubc14\uc774\uc2a4\ub77c\uace0 \ud569\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 PC, \ub178\ud2b8\ubd81, \uc2a4\ub9c8\ud2b8\ud3f0, \uc11c\ubc84 \ub4f1\uc774 \ud3ec\ud568\ub429\ub2c8\ub2e4. \uc5f0\uacb0\uc740 \uc804\uae30, \ube5b\uc758 \ucda9\uaca9 \ub610\ub294 \uc804\ud30c \ub4f1 \uc5ec\ub7ec \ucc44\ub110\uc744 \ud1b5\ud574 \uc774\ub8e8\uc5b4\uc9c8 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc2a4\ub9c8\ud2b8\ud3f0, \ub178\ud2b8\ubd81, PC\uc5d0\uc11c \ubb34\uc120\uc73c\ub85c \uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub178\ud2b8\ubd81\uc774\ub098 PC\ub97c \uc0ac\uc6a9\ud558\ub294 \uacbd\uc6b0 \ub124\ud2b8\uc6cc\ud06c \ucf00\uc774\ube14(UTP)\uc744 \uc0ac\uc6a9\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uc2a4\uc704\uce58<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc2a4\uc704\uce58\ub294 \ub124\ud2b8\uc6cc\ud06c(LAN) \ub0b4\uc5d0\uc11c \ucef4\ud4e8\ud130 \ubc0f \ud504\ub9b0\ud130\uc640 \uac19\uc740 \uc5ec\ub7ec \ucd5c\uc885 \uc7a5\uce58\ub97c \uc0c1\ud638 \uc5f0\uacb0\ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc774 \uc7a5\uce58\ub294 \ud3ec\ud2b8\ub2f9 1 ~ 10Gbps\uc758 \uc18d\ub3c4\ub85c \ub9ce\uc740 \ud3ec\ud2b8\ub97c \ucc98\ub9ac\ud560 \uc218 \uc788\uc5b4 \uc778\uae30\uac00 \ub192\uc2b5\ub2c8\ub2e4. \uc774 \uc2a4\uc704\uce58\ub294 MAC \uc8fc\uc18c\ub97c \uc0ac\uc6a9\ud558\uc5ec \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc5f0\uacb0\ub41c \ucd5c\uc885 \uc7a5\uce58\ub97c \uc2dd\ubcc4\ud569\ub2c8\ub2e4. \ub530\ub77c\uc11c \uc5b4\ub5a4 \uc7a5\uce58\uac00 \ub124\ud2b8\uc6cc\ud06c\uc5d0 \uc5f0\uacb0\ub418\uc5b4 \uc788\ub294\uc9c0 \uc27d\uac8c \ucd94\uc801\ud560 \uc218 \uc788\uc73c\uba70 \uc778\uc99d\ub41c \uc7a5\uce58\ub9cc \ub370\uc774\ud130\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ub77c\uc6b0\ud130<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ub77c\uc6b0\ud130\ub294 \uc5ec\ub7ec \uac1c\uc758 \uc791\uc740 \ub124\ud2b8\uc6cc\ud06c(LAN)\ub97c \uc5f0\uacb0\ud558\uc5ec \ud558\ub098\uc758 \ud070 \ub124\ud2b8\uc6cc\ud06c(WAN-\uad11\uc5ed \ub124\ud2b8\uc6cc\ud06c)\ub97c \ud615\uc131\ud569\ub2c8\ub2e4. \ub77c\uc6b0\ud130\ub294 \ubaa8\ub4e0 \ub124\ud2b8\uc6cc\ud06c \uc18c\uc2a4\uc5d0\uc11c \ub300\uc0c1 \ub124\ud2b8\uc6cc\ud06c\ub85c \ud328\ud0b7 \uc804\uc1a1\uc744 \ucc98\ub9ac\ud558\uc5ec \uc6b0\ub9ac\ub97c \uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ud558\ub294 \uc7a5\uce58\uc785\ub2c8\ub2e4. \ub77c\uc6b0\ud130\ub294 IP \uc8fc\uc18c\ub97c \uc0ac\uc6a9\ud558\uc5ec \ub370\uc774\ud130\ub97c \uc1a1\uc218\uc2e0\ud558\ub294 \uc7a5\uce58\ub97c \uc2dd\ubcc4\ud569\ub2c8\ub2e4. \ub77c\uc6b0\ud130\ub294 \uc77c\ubc18\uc801\uc73c\ub85c 2~5\uac1c\uc758 \ud3ec\ud2b8\ub97c \uac00\uc9c0\uace0 \uc788\ub294 \ubc18\uba74, \uc2a4\uc704\uce58\ub294 \uadf8\ubcf4\ub2e4 \ub354 \ub9ce\uc740 \ud3ec\ud2b8\ub97c \uac00\uc9c8 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub610\ud55c \ub450 \uc7a5\uce58 \ubaa8\ub450 \ubaa8\ub378\uc5d0 \ub530\ub77c 100Mbps~10Gbps\uc758 \ube44\uc2b7\ud55c \uc18d\ub3c4\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\ubc29\ud654\ubcbd<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ubc29\ud654\ubcbd\uc744 \ud1b5\ud574 \uac00\uc0c1 \uce68\uc785 \uac00\ub2a5\uc131\uc744 \ucc28\ub2e8\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uc804\uc1a1 \ub9e4\uccb4<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc804\uc1a1 \ub9e4\uccb4\ub294 \uc815\ubcf4\ub97c \uc804\uc1a1\ud558\ub294 \uc218\ub2e8\uc73c\ub85c, \uc608\ub97c \ub4e4\uc5b4 \ucf00\uc774\ube14 \ub610\ub294 \ubb34\uc120\uc73c\ub85c \uc815\ubcf4\ub97c \uc804\uc1a1\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h2><b>\ucef4\ud4e8\ud130\ub294 \uc778\ud130\ub137\uc744 \ud1b5\ud574 \uc5b4\ub5bb\uac8c \ud1b5\uc2e0\ud558\ub098\uc694?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\ud2b8\ub798\ud53d\uc774 Facebook \ubc0f Google\uacfc \uac19\uc740 \uc0ac\uc774\ud2b8\uc640 \ud1b5\uc2e0\ud558\ub824\uba74 \uace0\uc720 \uc2dd\ubcc4\uc790\uac00 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4. \uc774\ub97c IP \ub610\ub294 \uc778\ud130\ub137 \ud504\ub85c\ud1a0\ucf5c\uc774\ub77c\uace0 \ud569\ub2c8\ub2e4. IP \ub610\ub294 \uc778\ud130\ub137 \ud504\ub85c\ud1a0\ucf5c\uc740 \ub124\ud2b8\uc6cc\ud06c \ub610\ub294 \uc778\ud130\ub137\uc5d0\uc11c \ub514\ubc14\uc774\uc2a4\ub97c \uc2dd\ubcc4\ud558\ub294 \ubc29\ubc95\uc785\ub2c8\ub2e4. \uc774 \ubc88\ud638\ub294 \uace0\uc720\ud574\uc57c \ud569\ub2c8\ub2e4. \ub3d9\uc77c\ud55c \ub124\ud2b8\uc6cc\ud06c\ub098 \uc778\ud130\ub137\uc5d0 \ub450 \uac1c\uc758 \ub3d9\uc77c\ud55c IP \uc8fc\uc18c\uac00 \uc788\uc73c\uba74 \ucda9\ub3cc\uc774 \ubc1c\uc0dd\ud558\uace0 \uc5f0\uacb0\uc774 \uc81c\ub300\ub85c \uc791\ub3d9\ud558\uc9c0 \uc54a\uc73c\ubbc0\ub85c \uc0ac\uc6a9\ud560 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uc778\ud130\ub137\uc758 \uc131\uc7a5<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\ucd5c\uadfc \uba87 \ub144 \ub3d9\uc548 \uc804 \uc138\uacc4\uc801\uc73c\ub85c \uc5f0\uacb0\ub41c \ub514\ubc14\uc774\uc2a4\uc758 \uc218\uac00 \ud3ed\ubc1c\uc801\uc73c\ub85c \uc99d\uac00\ud588\uc2b5\ub2c8\ub2e4. 2020\ub144\uc5d0 \uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ub41c \ub514\ubc14\uc774\uc2a4\uc758 \uc218\uac00 \uc57d 500\uc5b5 \uac1c\uc5d0 \ub2ec\ud55c\ub2e4\ub294 \uc0ac\uc2e4\uc744 \uc54c\uace0 \uacc4\uc168\ub098\uc694? \uadf8\ub9ac\uace0 \uc774 500\uc5b5 \uac1c\uc758 \ub514\ubc14\uc774\uc2a4 \uc911 \uc810\uc810 \ub354 \ub9ce\uc740 \uc218\uac00 \uc0ac\ubb3c \uc778\ud130\ub137(IoT)\uc758 \uc77c\ubd80\uc785\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\uc0ac\ubb3c \uc778\ud130\ub137(IoT)\uc740 \uc11c\ub85c \ub370\uc774\ud130\ub97c \uc218\uc9d1\ud558\uace0 \uc778\ud130\ub137\uc744 \uc0ac\uc6a9\ud558\uc5ec \ud1b5\uc2e0\ud560 \uc218 \uc788\ub294 \uc7a5\uce58\ub97c \ub9d0\ud569\ub2c8\ub2e4. \uc77c\ubc18\uc801\uc778 IoT \ub514\ubc14\uc774\uc2a4\uc758 \uc608\ub85c\ub294 \uc13c\uc11c, \uc2a4\ub9c8\ud2b8 \ud648 \ub514\ubc14\uc774\uc2a4, \uacb0\uc81c \ub2e8\ub9d0\uae30, \uc2a4\ub9c8\ud2b8 \uc6e8\uc5b4\ub7ec\ube14 \ub4f1\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc7a5\uce58\uc5d0\ub3c4 IP \uc8fc\uc18c\uac00 \uc788\uc5b4\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IP \uc8fc\uc18c\ub294 \ub450 \uac00\uc9c0 \uc885\ub958\uac00 \uc788\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<h2><b>\uacf5\uc6a9 IP VS \uc0ac\uc124 IP<\/b><\/h2>\n<h3><b>\uacf5\uc6a9 IP \uc8fc\uc18c<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uc774\ub984\uc5d0\uc11c \uc54c \uc218 \uc788\ub4ef\uc774 \uacf5\uc778 IP \uc8fc\uc18c\ub294 \uc778\ud130\ub137\uc744 \ud1b5\ud55c \ud1b5\uc2e0\uc5d0 \uc0ac\uc6a9\ub429\ub2c8\ub2e4. NIC(\ub124\ud2b8\uc6cc\ud06c \uc815\ubcf4 \uc13c\ud130) \ubc0f IANA\uc640 \uac19\uc740 \uc870\uc9c1\uc740 \uacf5\uc778 IP \uc8fc\uc18c\ub97c \ub4f1\ub85d\ud55c \ub2e4\uc74c \uc778\ud130\ub137 \uc11c\ube44\uc2a4 \uc81c\uacf5\uc5c5\uccb4(ISP) \ub610\ub294 \uae30\ud0c0 \uadf8\ub8f9\uc5d0 \ud560\ub2f9\ud569\ub2c8\ub2e4.<\/span><\/p>\n<h3><b>\uac1c\uc778 IP \uc8fc\uc18c<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\uac1c\uc778 IP \uc8fc\uc18c\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \ud648 \ub124\ud2b8\uc6cc\ud06c\ub098 \ud559\uad50 \ub124\ud2b8\uc6cc\ud06c\uc640 \uac19\uc740 LAN(\ub85c\uceec \uc601\uc5ed \ub124\ud2b8\uc6cc\ud06c)\uc5d0\uc11c \uc0ac\uc6a9\ub429\ub2c8\ub2e4. \ub530\ub77c\uc11c \uac1c\uc778 IP \uc8fc\uc18c\ub294 \uc778\ud130\ub137\uc5d0\uc11c \ucc3e\uc744 \uc218 \uc5c6\uc2b5\ub2c8\ub2e4. \ucef4\ud4e8\ud130\uac00 \uc778\ud130\ub137\uc744 \ud1b5\ud574 \uc11c\ub85c \ud1b5\uc2e0\ud560 \uc218 \uc788\ub3c4\ub85d \ud558\uae30 \uc704\ud574 NAT(\ub124\ud2b8\uc6cc\ud06c \uc8fc\uc18c \ubcc0\ud658)\ub77c\ub294 \ud504\ub85c\ud1a0\ucf5c\uc774 \uc124\uacc4\ub418\uc5c8\ub294\ub370, \uc774 \ud504\ub85c\ud1a0\ucf5c\uc740 \uac1c\uc778 IP \uc8fc\uc18c\ub97c \uacf5\uc6a9 IP\ub85c \ubcc0\ud658\ud569\ub2c8\ub2e4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NAT\ub294 \uacf5\uaca9\uc790\uac00 \uc0ac\uc124 IP \uc8fc\uc18c\uc5d0 \uc561\uc138\uc2a4\ud558\uae30 \uc5b4\ub835\uac8c \ub9cc\ub4e4\uc5b4 \ub124\ud2b8\uc6cc\ud06c\uc758 \ubcf4\uc548\uc744 \ud5a5\uc0c1\uc2dc\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<h2><b>\uc694\uc57d\ud558\uc790\uba74<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">\uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ub418\ub294 \ub514\ubc14\uc774\uc2a4\uc758 \uc218\uac00 \uacc4\uc18d \uc99d\uac00\ud568\uc5d0 \ub530\ub77c \ub514\ubc14\uc774\uc2a4\uac00 \uc11c\ub85c \ud1b5\uc2e0\ud558\ub294 \ubc29\uc2dd\uc744 \uc774\ud574\ud574\uc57c \ud569\ub2c8\ub2e4. \uc774 \uae00\uc5d0\uc11c\ub294 \ub2e4\uc591\ud55c \ub124\ud2b8\uc6cc\ud06c \uad6c\uc131 \uc694\uc18c\uc640 \uc774\ub4e4\uc774 \uc5b4\ub5bb\uac8c \ud568\uaed8 \uc791\ub3d9\ud558\uc5ec \uc6f9 \ube0c\ub77c\uc6b0\uc9d5, \uc774\uba54\uc77c \uc804\uc1a1 \ub4f1\uc744 \uac00\ub2a5\ud558\uac8c \ud558\ub294\uc9c0 \uc0b4\ud3b4\ubd05\ub2c8\ub2e4. \ub610\ud55c IP \uc8fc\uc18c\uac00 \ub514\ubc14\uc774\uc2a4\ub97c \uc2dd\ubcc4\ud558\ub294 \ub370 \uc5b4\ub5a4 \uc5ed\ud560\uc744 \ud558\ub294\uc9c0, \uc0ac\uc124 IP\uac00 \ub85c\uceec \uc601\uc5ed \ub124\ud2b8\uc6cc\ud06c\uc5d0\uc11c \uc0ac\uc6a9\ub418\ub294 \uc774\uc720\ub3c4 \uc0b4\ud3b4\ubd24\uc2b5\ub2c8\ub2e4. \uc810\uc810 \ub354 \uc0c1\ud638 \uc5f0\uacb0\ub418\ub294 \uc138\uc0c1\uc73c\ub85c \ub098\uc544\uac08\uc218\ub85d \uc774\ub7ec\ud55c \uae30\uc220\uc758 \uc791\ub3d9 \ubc29\uc2dd\uc744 \uc774\ud574\ud558\ub294 \uac83\uc774 \ub354\uc6b1 \uc911\uc694\ud574\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>\ub124\ud2b8\uc6cc\ud06c\ub294 \uc62c\ubc14\ub974\uac8c \uc791\ub3d9\ud558\uae30 \uc704\ud574 \uc11c\ub85c \uc815\ubcf4\ub97c \uad50\ud658\ud558\ub294 \uc0c1\ud638 \uc5f0\uacb0\ub41c \uc7a5\uce58\ub4e4\uc758 \uc2dc\uc2a4\ud15c\uc785\ub2c8\ub2e4. \uc5ec\uae30\uc5d0\ub294 \ub178\ud2b8\ubd81, \uc11c\ubc84, \uc2a4\ub9c8\ud2b8\ud3f0 \ub4f1\uc774 \ud3ec\ud568\ub420 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc7a5\uce58\ub294 \uac01\uac01 \ub2e4\uc74c\uacfc \uac19\uc774 \ud1b5\uc2e0\ud569\ub2c8\ub2e4. <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%84%a4%ed%8a%b8%ec%9b%8c%ed%81%ac\/%eb%84%a4%ed%8a%b8%ec%9b%8c%ed%81%ac%eb%8a%94-%ec%96%b4%eb%96%bb%ea%b2%8c-%ec%9e%91%eb%8f%99%ed%95%98%eb%82%98%ec%9a%94\/\"><span class=\"screen-reader-text\">\uae30\ubcf8 \ub124\ud2b8\uc6cc\ud0b9: \ub124\ud2b8\uc6cc\ud06c\uc758 \uc791\ub3d9 \ubc29\uc2dd<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":1,"featured_media":1245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do Internet and Networks Work | Security Briefing<\/title>\n<meta name=\"description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ub124\ud2b8\uc6cc\ud06c\/\ub124\ud2b8\uc6cc\ud06c\ub294-\uc5b4\ub5bb\uac8c-\uc791\ub3d9\ud558\ub098\uc694\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do Internet and Networks Work | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ub124\ud2b8\uc6cc\ud06c\/\ub124\ud2b8\uc6cc\ud06c\ub294-\uc5b4\ub5bb\uac8c-\uc791\ub3d9\ud558\ub098\uc694\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T20:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Basic Networking: How do Networks Work\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"wordCount\":1596,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"url\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"name\":\"How do Internet and Networks Work | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"description\":\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"width\":2560,\"height\":2065,\"caption\":\"Basic Networking image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic Networking: How do Networks Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\uc778\ud130\ub137\uacfc \ub124\ud2b8\uc6cc\ud06c\uc758 \uc791\ub3d9 \uc6d0\ub9ac | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\uc778\ud130\ub137\uc774 \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0 \uc774\ud574\ud558\uc2dc\ub098\uc694? \uc774 \ub3c4\uc6c0\ub9d0\uc5d0\uc11c\ub294 \ub124\ud2b8\uc6cc\ud06c, \ub77c\uc6b0\ud130, \uc2a4\uc704\uce58 \ub4f1\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc0b4\ud3b4\ubd05\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ub124\ud2b8\uc6cc\ud06c\/\ub124\ud2b8\uc6cc\ud06c\ub294-\uc5b4\ub5bb\uac8c-\uc791\ub3d9\ud558\ub098\uc694\/","og_locale":"ko_KR","og_type":"article","og_title":"How do Internet and Networks Work | Security Briefing","og_description":"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.","og_url":"https:\/\/securitybriefing.net\/ko\/\ub124\ud2b8\uc6cc\ud06c\/\ub124\ud2b8\uc6cc\ud06c\ub294-\uc5b4\ub5bb\uac8c-\uc791\ub3d9\ud558\ub098\uc694\/","og_site_name":"Security Briefing","article_published_time":"2022-11-25T20:28:32+00:00","og_image":[{"width":2560,"height":2065,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"security","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"8\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Basic Networking: How do Networks Work","datePublished":"2022-11-25T20:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"wordCount":1596,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","articleSection":["Networks"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","url":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","name":"\uc778\ud130\ub137\uacfc \ub124\ud2b8\uc6cc\ud06c\uc758 \uc791\ub3d9 \uc6d0\ub9ac | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","datePublished":"2022-11-25T20:28:32+00:00","description":"\uc778\ud130\ub137\uc774 \uc5b4\ub5bb\uac8c \uc791\ub3d9\ud558\ub294\uc9c0 \uc774\ud574\ud558\uc2dc\ub098\uc694? \uc774 \ub3c4\uc6c0\ub9d0\uc5d0\uc11c\ub294 \ub124\ud2b8\uc6cc\ud06c, \ub77c\uc6b0\ud130, \uc2a4\uc704\uce58 \ub4f1\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc0b4\ud3b4\ubd05\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","width":2560,"height":2065,"caption":"Basic Networking image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Basic Networking: How do Networks Work"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\ubcf4\uc548","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin\uc740 \uc815\ubd80 \uae30\uc220\uc758 \uc120\uc784 \uc2a4\ud0dc\ud504 \uc791\uac00\uc785\ub2c8\ub2e4. \uc774\uc804\uc5d0\ub294 PYMNTS\uc640 \ubca0\uc774 \uc2a4\ud14c\uc774\ud2b8 \ubc30\ub108\uc5d0 \uae00\uc744 \uc37c\uc73c\uba70 \uce74\ub124\uae30 \uba5c\ub860\uc5d0\uc11c \ubb38\uc608\ucc3d\uc791 \ud559\uc0ac \ud559\uc704\ub97c \ubc1b\uc558\uc2b5\ub2c8\ub2e4. \ud604\uc7ac \ubcf4\uc2a4\ud134 \uc678\uacfd\uc5d0 \uac70\uc8fc\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ko\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}