{"id":1259,"date":"2022-12-15T20:26:27","date_gmt":"2022-12-15T20:26:27","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1259"},"modified":"2022-12-15T20:26:27","modified_gmt":"2022-12-15T20:26:27","slug":"%ec%a7%91%ec%97%90%ec%84%9c-%eb%ac%b4%ec%84%a0-%eb%9d%bc%ec%9a%b0%ed%84%b0%eb%a5%bc-%ec%84%a4%ec%b9%98%ed%95%a0-%eb%95%8c-%ec%95%8c%ec%95%84%ec%95%bc-%ed%95%a0-%ec%82%ac%ed%95%ad","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ea%b8%b0%ec%88%a0\/%ec%a7%91%ec%97%90%ec%84%9c-%eb%ac%b4%ec%84%a0-%eb%9d%bc%ec%9a%b0%ed%84%b0%eb%a5%bc-%ec%84%a4%ec%b9%98%ed%95%a0-%eb%95%8c-%ec%95%8c%ec%95%84%ec%95%bc-%ed%95%a0-%ec%82%ac%ed%95%ad\/","title":{"rendered":"\ud648 \ubb34\uc120 \ub77c\uc6b0\ud130(Wi-Fi) \uc124\uce58 \uc2dc \uc54c\uc544\uc57c \ud560 \uc0ac\ud56d"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">One commonality that stands out when discussing Cisco network routers and switches: is the renowned Internetwork Operating System (IOS). This powerful \u201cengine\u201d is what powers all of these devices, ensuring their successful operation. This article will primarily center on iOS and analyze how to manipulate it. Before that occurs, though, I\u2019d like you to be aware of the two distinct approaches used when operating with iOS: either through a Command Line Interface (CLI) or Graphical User Interface (GUI).<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\uba85\ub839\uc904 \uc778\ud130\ud398\uc774\uc2a4(CLI)\ub294 IOS \uc7a5\uce58\ub97c \uad6c\uc131\ud558\ub294 \uc815\uad50\ud55c \ubc29\ubc95\uc785\ub2c8\ub2e4. CLI\ub97c \ud65c\uc6a9\ud558\uc5ec \uc6d0\ud558\ub294 \ub3d9\uc791\uc744 \ubc1c\uc0dd\uc2dc\ud0a4\ub294 \uc815\ud655\ud55c \uba85\ub839\uc744 \uc785\ub825\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \ub530\ub77c\uc11c \ub77c\uc6b0\ud130\ub098 \uc2a4\uc704\uce58\uc5d0 \ub300\ud55c \uc644\uc804\ud55c \uc81c\uc5b4\uc640 \uc811\uadfc\uc774 \uac00\ub2a5\ud569\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">GUI(\uadf8\ub798\ud53d \uc0ac\uc6a9\uc790 \uc778\ud130\ud398\uc774\uc2a4)\ub294 \uc774\ub7ec\ud55c \uc7a5\uce58\ub97c \uad00\ub9ac\ud558\uae30 \uc704\ud55c \ud6e8\uc52c \ub354 \uc0ac\uc6a9\uc790 \uce5c\ud654\uc801\uc778 \uc811\uadfc \ubc29\uc2dd\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \uc885\uc885 \ud648 \ubb34\uc120 \ub77c\uc6b0\ud130(\uc640\uc774\ud30c\uc774)\uc640 \uac19\uc740 \uc18c\uaddc\ubaa8 \ub124\ud2b8\uc6cc\ud06c \uc7a5\uce58\ub97c \uc124\uc815\ud560 \ub54c \uc774\ub97c \uc0ac\uc6a9\ud569\ub2c8\ub2e4. \uc774 \uc139\uc158\uc5d0\uc11c\ub294 \uc0ac\uc6a9\uc790\uac00 \ud6a8\uc728\uc801\uc778 \uc791\ub3d9\uc744 \uc704\ud574 \uba85\ub839\uc904 \uc778\ud130\ud398\uc774\uc2a4\ub97c \ud1b5\ud574 Cisco IOS(\ubc84\uc804 15.2 \ub610\ub294 12.4)\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\uc744 \ud0d0\uad6c\ud560 \uac83\uc785\ub2c8\ub2e4.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"introduction-to-the-cli\"><b>CLI \uc18c\uac1c<\/b><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"basic-router-configurations\"><b>\uae30\ubcf8 \ub77c\uc6b0\ud130 \uad6c\uc131<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">Now it\u2019s time to dive into the exciting bits of this article and begin with a Cisco Router setup. Moreover, we will util<\/span>\ub124\ud2b8\uc6cc\ud06c \uc2dc\ubbac\ub808\uc774\ud130\ub97c \uc0ac\uc6a9\ud558\uc5ec \ub124\ud2b8\uc6cc\ud06c \ud658\uacbd\uc744 \uad6c\ucd95\ud569\ub2c8\ub2e4<span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To ensure that our Cisco Router is up and running, here are some critical settings we\u2019ll configure:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>\ud638\uc2a4\ud2b8 \uc774\ub984:<\/b><span style=\"font-weight: 400;\"> \uc7a5\uce58\uc758 \uc774\ub984.<\/span><\/li>\n\n\n\n<li><b>\ube44\ubc00\ubc88\ud638:<\/b><span style=\"font-weight: 400;\"> \uc548\uc804\ud558\uac8c \uc554\ud638\ud654\ub418\uac70\ub098 \uacf5\uac1c\ub41c \ube44\uc554\ud638\ud654 \ud615\uc2dd\uc73c\ub85c \ud1b5\uc2e0\ub429\ub2c8\ub2e4.<\/span><\/li>\n\n\n\n<li><b>IP \uc8fc\uc18c:<\/b><span style=\"font-weight: 400;\"> \uc778\ud130\ud398\uc774\uc2a4 \ub0b4\uc5d0\uc11c.<\/span><\/li>\n<\/ul>\n\n\n\n<p><b>\uc6d0\uaca9 \uc561\uc138\uc2a4:<\/b><span style=\"font-weight: 400;\"> \uc548\uc804\ud55c \ud154\ub137 \ub610\ub294 SSH \uc5f0\uacb0\uc744 \ud1b5\ud574 \ub124\ud2b8\uc6cc\ud06c \uc7a5\uce58\ub97c \uc27d\uac8c \uad00\ub9ac\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"a-user-access-levels-in-cisco-ios\"><b>a) Cisco IOS\uc758 \uc0ac\uc6a9\uc790 \uc811\uadfc \uc218\uc900<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\ubcf4\uc548\uc0c1\uc758 \uc774\uc720\ub85c \uac01 \uc0ac\uc6a9\uc790\uc5d0\uac8c \uc81c\uacf5\ub418\ub294 \ud65c\ub3d9\uc774 \ub2e4\ub978 \uc138 \uac00\uc9c0 \uc811\uadfc \uc218\uc900\uc744 \uac1c\ubc1c\ud588\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">ping \ub610\ub294 traceroute\uc640 \uac19\uc740 \uba85\ub839\uc744 \uc2e4\ud589\ud558\uc5ec \uc778\ud130\ub137 \uc5f0\uacb0\uc744 \ud655\uc778\ud558\uc2ed\uc2dc\uc624. (&gt;)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Get an inside look into what\u2019s actually happening with the device. (#)<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\ubcc0\uacbd \uc0ac\ud56d\uc744 \uc801\uc6a9\ud558\ub824\uba74. (config)#<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">\ub77c\uc6b0\ud130, \uc2a4\uc704\uce58 \ub610\ub294 \ubc29\ud654\ubcbd\uacfc \uac19\uc740 Cisco \uc7a5\uce58\uc5d0 \uc5f0\uacb0\ud558\uba74 \uc0ac\uc6a9\uc790 <\/span><b>\uc2e4\ud589 \ubaa8\ub4dc<\/b><span style=\"font-weight: 400;\"> (&gt;) \u2013 the primary access level. With this user exec access level, you can only perform basic commands such as ping and traceroute.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To access a greater set of commands and privileges, it\u2019s essential to enter the following command: Router&gt;enable. This will allow you to ascend the ladder and upgrade your level of control.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\ub450 \ubc88\uc9f8 \uc811\uadfc \uc218\uc900\uc5d0 \ub3c4\ub2ec\ud588\uc2b5\ub2c8\ub2e4: <\/span><b>\ud2b9\uad8c \ubaa8\ub4dc<\/b><span style=\"font-weight: 400;\"> \u2013 R1#. Here you can observe every action taken with the equipment (through various show commands), yet you cannot make any changes.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\ub77c\uc6b0\ud130&gt;\ud65c\uc131\ud654<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\ub77c\uc6b0\ud130#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">To create alterations to the device, we would have to advance our access level up an additional notch \u2013 reaching a commanding level known as <\/span><b>\uae00\ub85c\ubc8c \uad6c\uc131 \ubaa8\ub4dc<\/b><span style=\"font-weight: 400;\">. \uc774 \uace0\uadc0\ud55c \uc0c1\ud0dc\ub294 \uc774\uc804\ubcf4\ub2e4 \ub354 \ud070 \uae30\ub2a5\uacfc \ud2b9\uad8c\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\ub77c\uc6b0\ud130#\uad6c\uc131 \ud130\ubbf8\ub110<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\ub77c\uc6b0\ud130(\uad6c\uc131)#<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">By accessing the Cisco device\u2019s global configuration mode, you can make any desired alterations with complete control \u2013 akin to having Windows Administrator or root user access on Linux.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To ensure you\u2019re prepared for any challenge, here are a few commands that I highly suggest familiarizing yourself with: If you want to save time and typing effort while still ensuring accuracy, we\u2019ve got the perfect solution for composing longer commands.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">When you type \u201cR1#show run\u201d and hit the TAB key, it will autocomplete your command. Furthermore, if you enter a question mark (?), any subsequent commands will be displayed on-screen.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/R1-image-1.jpg\" alt=\"R1 \uc774\ubbf8\uc9c0\" class=\"wp-image-1260\" width=\"841\" height=\"434\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"b-selecting-a-device-name-hostname\"><b>b) \uc7a5\uce58 \uc774\ub984 \uc120\ud0dd (\ud638\uc2a4\ud2b8 \uc774\ub984)<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\ub77c\uc6b0\ud130\ub098 \uc2a4\uc704\uce58\uc758 \uc774\ub984\uc744 \ubcc0\uacbd\ud558\ub824\uba74 \uc774 \uba85\ub839\uc744 \uc785\ub825\ud558\uae30\ub9cc \ud558\uba74 \ub429\ub2c8\ub2e4: (\ub2e4\uc74c \uc774\ubbf8\uc9c0\uc5d0\uc11c \ubcfc \uc218 \uc788\uc2b5\ub2c8\ub2e4)<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\ub77c\uc6b0\ud130(\uad6c\uc131)#\ud638\uc2a4\ud2b8 \uc774\ub984 \ub77c\uc6b0\ud130_\uc774\ub984<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>\ub77c\uc6b0\ud130_\uc774\ub984(\uad6c\uc131)#<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"c-securing-access-to-the-router\"><b>c) \ub77c\uc6b0\ud130\uc5d0 \ub300\ud55c \uc811\uadfc \ubcf4\uc548<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">To protect your Router against unauthorized access, let\u2019s look into how we can set up a password in privilege mode (#). Follow this straightforward process to complete the task:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Securing-access-to-the-router-2-1.jpg\" alt=\"\ub77c\uc6b0\ud130 \uc774\ubbf8\uc9c0\uc5d0 \ub300\ud55c \uc811\uadfc \ubcf4\uc548\" class=\"wp-image-1261\" width=\"838\" height=\"254\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>\ub77c\uc6b0\ud130(\uad6c\uc131)#\ud638\uc2a4\ud2b8 \uc774\ub984 R1<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(config)#enable password cisco \ub610\ub294<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#\ud65c\uc131\ud654 \ube44\ubc00 cisco123<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">\uc774 \uba85\ub839\uc744 \uc0ac\uc6a9\ud558\uba74 \uc7a5\uce58\uc5d0 \uc811\uadfc\ud558\ub824\ub294 \uc0ac\ub78c\uc5d0\uac8c \uc7a0\uc7ac\uc801 \uacb0\uacfc\ub97c \uacbd\uace0\ud558\ub294 \uacbd\uace0 \ubc30\ub108\ub97c \uc124\uc815\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#\ubc30\ub108 motd \"\ubb34\ub2e8 \uc811\uadfc \uae08\uc9c0\"<\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">If your query is regarding the distinctions between an \u201cenable password\u201d, and a \u201csecret enable,\u201d you\u2019ve come to the right place. Here\u2019s what sets them apart:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Unauthorized-access-3-1.jpg\" alt=\"\ubb34\ub2e8 \uc811\uadfc \uc774\ubbf8\uc9c0\" class=\"wp-image-1262\" width=\"841\" height=\"453\"\/><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">\ud558\ub098\uc758 \uad6c\uc131(#enable secret)\uc740 \uc554\ud638\ud654\ub418\uace0 \ub2e4\ub978 \ud558\ub098(#enable password)\ub294 \uc554\ud638\ud654\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Let\u2019s begin by configuring the Router for network access (reachability) using the following topology:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Router-for-network-access-1.jpg\" alt=\"\ub124\ud2b8\uc6cc\ud06c \uc811\uadfc\uc744 \uc704\ud55c \ub77c\uc6b0\ud130 \uc774\ubbf8\uc9c0\" class=\"wp-image-1263\" width=\"841\" height=\"421\"\/><\/figure>\n\n\n<h3 class=\"wp-block-heading\" id=\"d-configuring-an-ip-address-on-the-router\"><b>d) \ub77c\uc6b0\ud130\uc5d0 IP \uc8fc\uc18c \uad6c\uc131<\/b><\/h3>\n\n\n<p><span style=\"font-weight: 400;\">\ub77c\uc6b0\ud130\ub294 \uc77c\ubc18\uc801\uc73c\ub85c \ub450 \uac1c \ub610\ub294 \uc138 \uac1c\uc758 \ud3ec\ud2b8\ub97c \ud1b5\ud574 \uc5ec\ub7ec \ub124\ud2b8\uc6cc\ud06c\ub97c \uc6d0\ud65c\ud558\uac8c \uc5f0\uacb0\ud560 \uc218 \uc788\ub294 \uadc0\uc911\ud55c \ub3c4\uad6c\uc785\ub2c8\ub2e4. \ud3ec\ud2b8\ub294 \ucf00\uc774\ube14\uc744 \uc5f0\uacb0\ud560 \uc218 \uc788\ub294 \ubb3c\ub9ac\uc801 \uacf5\uac04\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \uadf8\uc5d0 \ud574\ub2f9\ud558\ub294 \ub17c\ub9ac\uc801 \uce21\uba74\uc740 \uc778\ud130\ud398\uc774\uc2a4\ub85c \uc2dd\ubcc4\ud569\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\uc694\uc57d\ud558\uc790\uba74:&nbsp;<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\ud3ec\ud2b8 = \ubb3c\ub9ac\uc801<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\uc778\ud130\ud398\uc774\uc2a4 = \ub17c\ub9ac\uc801 <\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">\uc608\ub97c \ub4e4\uc5b4, \uc778\ud130\ud398\uc774\uc2a4\uc5d0 IP(\ub17c\ub9ac\uc801) \uc8fc\uc18c\ub97c \uad6c\uc131\ud558\uace0 \ucf00\uc774\ube14\uc744 \ud1b5\ud574 \ubb3c\ub9ac\uc801\uc73c\ub85c \ud3ec\ud2b8\uc5d0 \uc5f0\uacb0\ud560 \uac83\uc785\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c \ub0b4\uc5d0\uc11c \ud1b5\uc2e0\uc774 \uc774\ub8e8\uc5b4\uc9c0\ub824\uba74 \uc774\ub7ec\ud55c \uc778\ud130\ud398\uc774\uc2a4\uc5d0 IP \uc8fc\uc18c\uac00 \ud544\uc694\ud558\uba70 \ud65c\uc131\ud654\ub418\uc5b4\uc57c \ud569\ub2c8\ub2e4, \uc989 \ucf1c\uc838\uc57c \ud569\ub2c8\ub2e4. \uadf8\ub9bc\uc5d0\uc11c \ubcfc \uc218 \uc788\ub4ef\uc774 \ub124\ud2b8\uc6cc\ud06c \uc778\ud130\ud398\uc774\uc2a4\uc5d0 IP \uc8fc\uc18c\ub97c \uc27d\uac8c \uad6c\uc131\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/IP-address-of-the-router-4-1.jpg\" alt=\"\ub77c\uc6b0\ud130\uc758 IP \uc8fc\uc18c \uc774\ubbf8\uc9c0\" class=\"wp-image-1264\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#\uc778\ud130\ud398\uc774\uc2a4 FastEthernet0\/0<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(\uad6c\uc131-\uc778\ud130\ud398\uc774\uc2a4)#ip \uc8fc\uc18c 192.168.1.1 255.255.255.0<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131-if)#\ube44\ud65c\uc131\ud654 \uc5c6\uc74c<\/code><\/pre>\n\n\n<h3 class=\"wp-block-heading\" id=\"f-configuring-remote-access-on-a-router-telnet-ssh\"><b>f) \ub77c\uc6b0\ud130\uc5d0\uc11c \uc6d0\uaca9 \uc561\uc138\uc2a4 \uad6c\uc131 (\ud154\ub137, SSH)<\/b><\/h3>\n\n<h2 class=\"wp-block-heading\" id=\"telnet\"><b>\ud154\ub137<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c \uc560\ud50c\ub9ac\ucf00\uc774\uc158\uc740 \ub124\ud2b8\uc6cc\ud06c, \uc7a5\uce58(\uc608: \ub77c\uc6b0\ud130 \ubc0f \uc2a4\uc704\uce58) \ub610\ub294 \uc11c\ubc84\uc5d0 \ub300\ud55c \uc548\uc804\ud55c \uc6d0\uaca9 \uc5f0\uacb0\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4. \uc774\ub97c \ud1b5\ud574 \uc5b4\ub514\uc11c\ub4e0\uc9c0 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uc811\uadfc\uc774 \uac00\ub2a5\ud569\ub2c8\ub2e4.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/TELNET-5-1.jpg\" alt=\"TELNET 5 1\" class=\"wp-image-1265\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#\ub77c\uc778 vty 0 14<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(\uad6c\uc131-\ub77c\uc778)#\ube44\ubc00\ubc88\ud638 \uc2dc\uc2a4\ucf54<\/b><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code><b>R1(config-line)#\ub85c\uadf8\uc778<\/b><\/code><\/pre>\n\n\n\n<p><span style=\"font-weight: 400;\">To get started, we\u2019ll need to enter our virtual lines (a total of 15), set the password (\u201cCisco\u201d), and then initiate the Telnet process #login.<\/span><\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ssh\"><b>SSH<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">To safely connect to a local area network or Internet device remotely, SSH is the ideal protocol. To configure this on Cisco machines, it\u2019s necessary to take certain steps:<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">\uac1c\uc778 \ub85c\uadf8\uc778\uacfc \ube44\ubc00\ubc88\ud638 \uc124\uc815.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\ub3c4\uba54\uc778 \uc774\ub984 \uc124\uc815&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\ucd5c\ub300 \uc548\uc804\uc131\uc744 \ubcf4\uc7a5\ud558\uae30 \uc704\ud574 \uacf5\uac1c \ubc0f \uac1c\uc778 \ud0a4 \uc870\ud569\uc744 \uc0dd\uc131\ud558\ub294 \uac83\uc774 \ud544\uc218\uc801\uc785\ub2c8\ub2e4.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">\uac00\uc0c1 \ub77c\uc778(vty) \ud504\ub85c\uc138\uc2a4\ub97c \ud65c\uc131\ud654\ud558\ub824\uba74 \uba85\ub839 #login local\uc744 \uc0ac\uc6a9\ud558\uc2ed\uc2dc\uc624.<\/span><\/li>\n<\/ol>\n\n\n\n<p><span style=\"font-weight: 400;\">\uc544\ub798 \uadf8\ub9bc\uc5d0\uc11c Cisco \ub77c\uc6b0\ud130\uc5d0\uc11c SSH \uad6c\uc131\uc744 \uc608\ub85c \ubcfc \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/SSH-image-6-1.jpg\" alt=\"SSH \uc774\ubbf8\uc9c0 \" class=\"wp-image-1267\"\/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#\uc0ac\uc6a9\uc790 \uc774\ub984 admin \uad8c\ud55c 15 \ube44\ubc00\ubc88\ud638 admincisco321<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#ip \ub3c4\uba54\uc778 \uc774\ub984 my.home.lab<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#\uc554\ud638 \ud0a4 \uc0dd\uc131 rsa \ubaa8\ub4c8\ub7ec\uc2a4 1024<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)#ip ssh \ubc84\uc804 2<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131)\ub77c\uc778 vty 0 15<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131-\ub77c\uc778)#\ub85c\uceec \ub85c\uadf8\uc778<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>R1(\uad6c\uc131-\ub77c\uc778)#\uc804\uc1a1 \uc785\ub825 ssh \ud154\ub137<\/code><\/pre>\n\n\n<h2 class=\"wp-block-heading\" id=\"to-sum-up\"><b>\uc694\uc57d\ud558\uc790\uba74<\/b><\/h2>\n\n\n<p><span style=\"font-weight: 400;\">\ub77c\uc6b0\ud130\ub294 \ud544\uc218\uc801\uc785\ub2c8\ub2e4<\/span> device in any computer network because it interconnects multiple networks together. It has different networking protocols enabled (like RIP and OSPF) that assist him with the interconnection process. It also offers many different configurations for security purposes (like passwords on Virtual lines). In this article, we\u2019ve learned how to set up an IP address on the Router, as well as for remote access (Telnet &amp; SSH). We\u2019ve also learned about some of the most important configurations <span style=\"font-weight: 400;\">\ub124\ud2b8\uc6cc\ud06c \uad00\ub9ac\uc790\ub294 \uc54c\uc544\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>One commonality that stands out when discussing Cisco network routers and switches: is the renowned Internetwork Operating System (IOS). This powerful \u201cengine\u201d is what powers all of these devices, ensuring\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ea%b8%b0%ec%88%a0\/%ec%a7%91%ec%97%90%ec%84%9c-%eb%ac%b4%ec%84%a0-%eb%9d%bc%ec%9a%b0%ed%84%b0%eb%a5%bc-%ec%84%a4%ec%b9%98%ed%95%a0-%eb%95%8c-%ec%95%8c%ec%95%84%ec%95%bc-%ed%95%a0-%ec%82%ac%ed%95%ad\/\"><span class=\"screen-reader-text\">\ud648 \ubb34\uc120 \ub77c\uc6b0\ud130(Wi-Fi) \uc124\uce58 \uc2dc \uc54c\uc544\uc57c \ud560 \uc0ac\ud56d<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":1278,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\uc9d1\uc5d0\uc11c-\ubb34\uc120-\ub77c\uc6b0\ud130\ub97c-\uc124\uce58\ud560-\ub54c-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\uc9d1\uc5d0\uc11c-\ubb34\uc120-\ub77c\uc6b0\ud130\ub97c-\uc124\uce58\ud560-\ub54c-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T20:26:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\",\"name\":\"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"datePublished\":\"2022-12-15T20:26:27+00:00\",\"description\":\"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Wifi router\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What you should know when installing Home Wireless Routers (Wi-Fi)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ud648 \ubb34\uc120 \ub77c\uc6b0\ud130(Wi-Fi) \uc62c\ubc14\ub974\uac8c \uc124\uce58\ud558\uae30 | securitybriefing.net","description":"\uac00\uc815\uc6a9 \ubb34\uc120 \ub77c\uc6b0\ud130\uc758 \ub2e4\uc591\ud55c \uae30\ub2a5\uacfc \ud2b9\uc9d5\uc5d0 \ub300\ud574 \ubc30\uc6b0\uace0 \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\ud638\ub97c \ud1b5\ud574 \uae30\uae30\uc640 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\uc9d1\uc5d0\uc11c-\ubb34\uc120-\ub77c\uc6b0\ud130\ub97c-\uc124\uce58\ud560-\ub54c-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/","og_locale":"ko_KR","og_type":"article","og_title":"Install Home Wireless Routers (Wi-Fi) properly | securitybriefing.net","og_description":"Learn about the different features and functions of a home wireless router and how to protect your devices and data with endpoint protection","og_url":"https:\/\/securitybriefing.net\/ko\/\uae30\uc220\/\uc9d1\uc5d0\uc11c-\ubb34\uc120-\ub77c\uc6b0\ud130\ub97c-\uc124\uce58\ud560-\ub54c-\uc54c\uc544\uc57c-\ud560-\uc0ac\ud56d\/","og_site_name":"Security Briefing","article_published_time":"2022-12-15T20:26:27+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"6\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"What you should know when installing Home Wireless Routers (Wi-Fi)","datePublished":"2022-12-15T20:26:27+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","articleSection":["Tech"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","url":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/","name":"\ud648 \ubb34\uc120 \ub77c\uc6b0\ud130(Wi-Fi) \uc62c\ubc14\ub974\uac8c \uc124\uce58\ud558\uae30 | securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","datePublished":"2022-12-15T20:26:27+00:00","description":"\uac00\uc815\uc6a9 \ubb34\uc120 \ub77c\uc6b0\ud130\uc758 \ub2e4\uc591\ud55c \uae30\ub2a5\uacfc \ud2b9\uc9d5\uc5d0 \ub300\ud574 \ubc30\uc6b0\uace0 \uc5d4\ub4dc\ud3ec\uc778\ud2b8 \ubcf4\ud638\ub97c \ud1b5\ud574 \uae30\uae30\uc640 \ub370\uc774\ud130\ub97c \ubcf4\ud638\ud558\ub294 \ubc29\ubc95\uc744 \uc54c\uc544\ubcf4\uc138\uc694.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/wifi-router-1-scaled-1.jpg","width":2560,"height":1707,"caption":"Wifi router"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/what-you-should-know-when-installing-home-wireless-routers-wi-fi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What you should know when installing Home Wireless Routers (Wi-Fi)"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=1259"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/1259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/1278"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=1259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=1259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=1259"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}