KR_Net_DNS_Security - somaz94/DevOps-Engineer GitHub Wiki
ì 첎 DNS íŽì 곌ì :
1. Client: "www.example.comì IP 죌ìë?"
â
2. Local DNS Cache íìž (/etc/hosts, ëžëŒì°ì ìºì)
â (ìºì 믞ì€)
3. Recursive DNS ìë² (ISP DNS, 8.8.8.8)
â
4. Root DNS ìë² â ".com TLD DNS ìë² ìì¹ë 192.5.6.30"
â
5. TLD DNS ìë² â "example.comì ê¶í DNSë ns1.example.com"
â
6. Authoritative DNS â "www.example.comì 93.184.216.34"
â
7. ìëµ ìºì± (TTL ëì ì íš)
â
8. Client: TCP ì°ê²° (93.184.216.34:80)
Recursive Query (ì¬ê· ì§ì):
Client â Recursive DNS: "www.example.com 죌ì ìë €ì€"
Recursive DNS: "ìììŽ, ëŽê° ë€ ì°Ÿìì ìµì¢
ëµì ì€ê²"
Recursive DNS â Root
Recursive DNS â TLD
Recursive DNS â Authoritative
Recursive DNS â Client: "93.184.216.34ìŒ!"
- íŽëŒìŽìžížë í ë²ë§ ìì²
- Recursive DNSê° ëªšë ìì ìí
- ISP DNS, Public DNS (8.8.8.8, 1.1.1.1)ê° ìŽ ë°©ì ì¬ì©
Iterative Query (ë°ë³µ ì§ì):
Client â Root DNS: "www.example.com 죌ìë?"
Root DNS â Client: "ëªšë¥Žê² ê³ , .com TLDë 192.5.6.30ì 묌ìŽëŽ"
Client â TLD DNS: "www.example.com 죌ìë?"
TLD DNS â Client: "ëªšë¥Žê² ê³ , ns1.example.com(203.0.113.1)ì 묌ìŽëŽ"
Client â Authoritative DNS: "www.example.com 죌ìë?"
Authoritative DNS â Client: "93.184.216.34ìŒ!"
- íŽëŒìŽìžížê° ì¬ë¬ ë² ìì²
- ê° DNS ìë²ë ì°žì¡° ì ë³Žë§ ì ê³µ
- Recursive DNS ìë²ê° Root/TLD ì¡°í ì ì¬ì©
ì€ë¬Žìì:
End User â Recursive DNS: Recursive Query
Recursive DNS â Root/TLD/Authoritative: Iterative Query
DNS Cache Poisoning (Kaminsky Attack):
ì ì íëŠ:
Client â Recursive DNS: "bank.comì?"
Recursive DNS â Authoritative DNS
Authoritative DNS â Recursive DNS: "1.2.3.4"
공격 íëŠ:
Attacker: Recursive DNSì ëë 쿌늬 ë°ì¡ (xyz123.bank.com)
Attacker: ìì¡°ë ìëµ ì ì¡ (bank.com â Attacker IP)
Recursive DNS: ìì¡° ìëµ ëšŒì ëì°© â ìºì ì€ìŒ
â 몚ë ì¬ì©ìê° ê³µê²©ì ì¬ìŽížë¡ ì ë (íŒì±)
공격 조걎:
- DNS Query ID ë§ì¶°ìŒ íš (16-bit, 65536 ê°ì§)
- Source Port ë§ì¶°ìŒ íš (ëë€íë¡ ë°©ìŽ)
- TTL ë§ë£ ì 공격 ì±ê³µ íì
ë°©ìŽ ë°©ë²:
1. Source Port Randomization:
Ʞ졎: ê³ ì í¬íž 53
ê°ì : ëë€ í¬íž (10000~65535)
â ììž¡ ëìŽë ìŠê° (16-bit * 16-bit = 2^32)
2. DNSSEC (DNS Security Extensions):
DNSSEC ëì ì늬:
Zone Signing:
example.com Zone
ââ RRSIG (Resource Record Signature)
ââ DNSKEY (Public Key)
ââ DS (Delegation Signer) â ìì TLDì ë±ë¡
ê²ìŠ ê³Œì :
1. Client: "www.example.com A ë ìœë + RRSIG ìì²"
2. Authoritative DNS: A ë ìœë + RRSIG ë°í
3. Client: DNSKEYë¡ RRSIG ê²ìŠ
4. DNSKEYê° ì 뢰í ì ìëì§ DS ë ìœëë¡ íìž
5. ì 뢰 첎ìž: Root â TLD â example.com
DNSSEC ë ìœë íì :
- RRSIG: ëì§íž ìëª (Zoneì Private Keyë¡ ìëª )
- DNSKEY: ê³µê°í€
- DS (Delegation Signer): íì Zoneì DNSKEY íŽì (ìì Zoneì ì ì¥)
- NSEC/NSEC3: 졎ì¬íì§ ìë ëë©ìž ìŠëª (NXDOMAIN ê²ìŠ)
DNSSEC íê³:
- ìíží X, 묎결ì±ë§ ë³Žì¥ (DoH/DoTë¡ ìíží)
- ë°°í¬ ë³µì¡ë ëì
- Zone Walking ê°ë¥ (NSEC3ë¡ ìí)
3. DNS over HTTPS (DoH) / DNS over TLS (DoT):
DoH: HTTPS (443) í¬ížë¡ DNS 쿌늬 ìíží
DoT: TLS (853) í¬ížë¡ DNS 쿌늬 ìíží
â ISPì DNS ì€ëí ë°©ì§
DNS Round Robin:
DNS Query: www.example.com
Response:
www.example.com 300 IN A 1.2.3.4
www.example.com 300 IN A 1.2.3.5
www.example.com 300 IN A 1.2.3.6
â íŽëŒìŽìžížë 첫 ë²ì§ž IP ì í (ììë ë¡í
ìŽì
)
ì¥ì :
- 구í ê°ëš
- ì¶ê° ë¹ì© ìì
ëšì :
- Health Check ìì (ì¥ì ìë²ë ë°í)
- íŽëŒìŽìžíž ìºì±ìŒë¡ ë¶ê· ë± ë¶ì°
- TTL ëì ížëíœ ë³ê²œ ë¶ê°
Weighted Round Robin (AWS Route 53):
www.example.com A 1.2.3.4 Weight=70
www.example.com A 1.2.3.5 Weight=30
â 70:30 ë¹ìšë¡ ížëíœ ë¶ì°
â Blue-Green ë°°í¬, Canary ë°°í¬ ê°ë¥
GeoDNS (Geo-Location Routing):
Query from Korea:
www.example.com â Seoul Region (ap-northeast-2)
Query from USA:
www.example.com â Virginia Region (us-east-1)
Query from Europe:
www.example.com â Ireland Region (eu-west-1)
ëì ì늬:
1. DNS ìë²ê° íŽëŒìŽìžíž IPì GeoIP Database ì¡°í
2. êµê°/ëë¥ ì 볎 ì¶ì¶
3. ê°ì¥ ê°ê¹ìŽ ëŠ¬ì ì IP ë°í
4. ë ìŽíŽì ê°ì + ê·ì ì€ì (GDPR)
Latency-Based Routing (AWS Route 53):
ì€ì ë€ížìí¬ ë ìŽíŽì ìž¡ì
â ê°ì¥ ë®ì ë ìŽíŽì ìëí¬ìžíž ë°í
us-east-1: 150ms
ap-northeast-2: 50ms
â Seoul IP ë°í (GeoDNSë³Žë€ ì í)
Failover Routing:
Primary: Health Check OK â Primary IP ë°í
Primary: Health Check Failed â Secondary IP ë°í
Health Check:
- HTTP/HTTPS Endpoint ìí íìž (200 OK)
- TCP ì°ê²° íìž
- String Matching (ìëµ ë³žë¬ž ê²ìŠ)
- CloudWatch Alarm ì°ë
Multi-Value Answer:
Health Checkê° íµê³Œí IPë§ ìµë 8ê° ë°í
www.example.com A 1.2.3.4 (Healthy)
www.example.com A 1.2.3.5 (Healthy)
www.example.com A 1.2.3.6 (Unhealthy) â ì ìž
â íŽëŒìŽìžížê° ì¬ìë ì ë€ë¥ž IP ì í
ì€ë¬Ž ì€ì ìì (Route 53):
1. GeoDNS: ëë¥ë³ 늬ì ë¶ëЬ
2. Latency-Based: 늬ì ëŽ ìµì AZ ì í
3. Weighted: Blue-Green ë°°í¬ (90:10 â 50:50 â 0:100)
4. Failover: DR(Disaster Recovery) ì¬ìŽíž ìë ì í
Nginx Reverse Proxy ìµì í:
1. Connection Pooling (Upstream Keepalive):
upstream backend {
server backend1.example.com:8080;
server backend2.example.com:8080;
keepalive 32; # ìµë 32ê° ì°ê²° ì ì§
keepalive_requests 100; # ì°ê²°ë¹ 100ê° ìì² ì²ëЬ
keepalive_timeout 60s; # 60ìŽ ì íŽ ì ì¢
ë£
}
server {
location / {
proxy_pass http://backend;
proxy_http_version 1.1; # HTTP/1.1 íì
proxy_set_header Connection ""; # Connection í€ë ì ê±°
}
}â TCP Handshake ì€ë²í€ë ì ê±° (3-Way Handshake ìëµ)
2. HTTP/2 to HTTP/1.1 Conversion:
server {
listen 443 ssl http2; # íŽëŒìŽìžížë HTTP/2
location / {
proxy_pass http://backend; # ë°±ìëë HTTP/1.1
proxy_http_version 1.1;
}
}â íŽëŒìŽìžíž Multiplexing ìŽì + ë°±ìë ížíì±
3. Gzip Compression:
gzip on;
gzip_vary on;
gzip_min_length 1024; # 1KB ìŽìë§ ìì¶
gzip_comp_level 6; # ìì¶ ë 벚 (1~9, ëììë¡ CPU ì¬ì©)
gzip_types text/plain text/css application/json application/javascript;
gzip_proxied any; # íë¡ì ìëµë ìì¶â ëìí 70~80% ì ê° (í ì€íž êž°ë° ìœí ìž )
4. Caching ì ëµ:
Static Content Caching:
proxy_cache_path /var/cache/nginx
levels=1:2
keys_zone=static_cache:10m
max_size=1g
inactive=60m;
server {
location ~* \.(jpg|jpeg|png|gif|css|js)$ {
proxy_cache static_cache;
proxy_cache_valid 200 1h;
proxy_cache_valid 404 1m;
proxy_cache_key $scheme$proxy_host$request_uri;
add_header X-Cache-Status $upstream_cache_status;
}
}Cache Bypass:
location / {
proxy_cache static_cache;
proxy_cache_bypass $http_pragma $http_authorization;
proxy_no_cache $cookie_nocache;
# êŽëЬìë ìºì ì°í
if ($http_user_agent ~* "AdminBot") {
set $bypass 1;
}
proxy_cache_bypass $bypass;
}Microcaching (Dynamic Content):
location / {
proxy_cache dynamic_cache;
proxy_cache_valid 200 1s; # 1ìŽë§ ìºì±
proxy_cache_lock on; # ëì ìì² ì íëë§ upstream ì ë¬
proxy_cache_lock_timeout 5s;
proxy_cache_use_stale updating; # ê°±ì ì€ìë stale ìºì ì ê³µ
}â Thundering Herd ë°©ì§ (ëì ìì² í죌)
5. Load Balancing ê³ êž êž°ë²:
Least Connections:
upstream backend {
least_conn; # ì°ê²° ì ê°ì¥ ì ì ìë² ì í
server backend1.example.com;
server backend2.example.com;
}IP Hash (Session Affinity):
upstream backend {
ip_hash; # íŽëŒìŽìžíž IP êž°ë° íŽì±
server backend1.example.com;
server backend2.example.com;
}Health Check (Nginx Plus):
upstream backend {
server backend1.example.com;
server backend2.example.com;
health_check interval=5s fails=3 passes=2;
# 5ìŽë§ë€ 첎í¬, 3ë² ì€íš ì ì ìž, 2ë² ì±ê³µ ì 복구
}6. Rate Limiting:
limit_req_zone $binary_remote_addr zone=api_limit:10m rate=10r/s;
location /api/ {
limit_req zone=api_limit burst=20 nodelay;
# ìŽë¹ 10 ìì², burst 20ê¹ì§ íì©
error_page 429 /rate_limit.html;
}7. SSL Termination:
server {
listen 443 ssl http2;
ssl_session_cache shared:SSL:10m;
ssl_session_timeout 10m;
ssl_stapling on;
ssl_stapling_verify on;
location / {
proxy_pass http://backend; # ë°±ìëë HTTP
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Real-IP $remote_addr;
}
}â SSL ì€íë¡ë©ìŒë¡ ë°±ìë CPU ë¶í ê°ì
Istio Traffic Management:
1. Virtual Service (ëŒì°í ê·ì¹):
apiVersion: networking.istio.io/v1beta1
kind: VirtualService
metadata:
name: reviews
spec:
hosts:
- reviews
http:
- match:
- headers:
end-user:
exact: jason
route:
- destination:
host: reviews
subset: v2 # jason ì¬ì©ìë v2ë¡
- route:
- destination:
host: reviews
subset: v1
weight: 90 # 90% â v1
- destination:
host: reviews
subset: v2
weight: 10 # 10% â v2 (Canary)2. Destination Rule (ìëžì ì ì):
apiVersion: networking.istio.io/v1beta1
kind: DestinationRule
metadata:
name: reviews
spec:
host: reviews
trafficPolicy:
connectionPool:
tcp:
maxConnections: 100
http:
http1MaxPendingRequests: 50
http2MaxRequests: 100
maxRequestsPerConnection: 2
loadBalancer:
consistentHash:
httpCookie:
name: user
ttl: 0s # Session Affinity
subsets:
- name: v1
labels:
version: v1
- name: v2
labels:
version: v23. Circuit Breaker íšíŽ:
ëì ì늬:
Closed (ì ì) â Open (ì¥ì ê°ì§) â Half-Open (복구 ìë) â Closed
Closed:
ìì² ì ì ì²ëЬ
ì€ë¥ìš 몚ëí°ë§
Open:
ìŠì ì€íš ìëµ (Fail Fast)
ì
ì€ížëŠŒ ížì¶ ì°šëš
íìììê¹ì§ ëêž°
Half-Open:
ìŒë¶ ìì²ë§ íì©
ì±ê³µ ì Closedë¡ ì í
ì€íš ì ë€ì Open
Istio Circuit Breaker ì€ì :
apiVersion: networking.istio.io/v1beta1
kind: DestinationRule
metadata:
name: reviews-cb
spec:
host: reviews
trafficPolicy:
connectionPool:
tcp:
maxConnections: 100
http:
http1MaxPendingRequests: 1
http2MaxRequests: 100
maxRequestsPerConnection: 1
outlierDetection: # Circuit Breaker
consecutiveErrors: 5 # 5ë² ì°ì ì€íš ì
interval: 30s # 30ìŽ ê°ê²©ìŒë¡ 첎í¬
baseEjectionTime: 30s # 30ìŽ ëì ì ìž
maxEjectionPercent: 50 # ìµë 50% Podë§ ì ìž
minHealthPercent: 25 # ìµì 25% Podë ì ì§4. Retry & Timeout:
apiVersion: networking.istio.io/v1beta1
kind: VirtualService
metadata:
name: ratings
spec:
hosts:
- ratings
http:
- route:
- destination:
host: ratings
timeout: 5s # ì 첎 íììì
retries:
attempts: 3 # ìµë 3ë² ì¬ìë
perTryTimeout: 2s # ìëë¹ 2ìŽ
retryOn: 5xx,reset,connect-failure,refused-stream5. Fault Injection (칎ì€ì€ ìì§ëìŽë§):
apiVersion: networking.istio.io/v1beta1
kind: VirtualService
metadata:
name: ratings
spec:
hosts:
- ratings
http:
- fault:
delay:
percentage:
value: 0.1 # 10% ìì²ì
fixedDelay: 5s # 5ìŽ ì§ì° 죌ì
abort:
percentage:
value: 0.1 # 10% ìì²ì
httpStatus: 500 # 500 ì€ë¥ 죌ì
route:
- destination:
host: ratings6. mTLS (ìíž TLS ìžìŠ):
apiVersion: security.istio.io/v1beta1
kind: PeerAuthentication
metadata:
name: default
spec:
mtls:
mode: STRICT # 몚ë íµì mTLS ê°ì ì±ë¥ 몚ëí°ë§:
Istio Metrics (Prometheus):
- istio_requests_total: ìì² ì
- istio_request_duration_milliseconds: ë ìŽíŽì
- istio_request_bytes: ìì² í¬êž°
- istio_response_bytes: ìëµ í¬êž°
Kiali Dashboard:
- ìë¹ì€ í íŽë¡ì§ ìê°í
- ížëíœ íëŠ ì¶ì
- Circuit Breaker ìí 몚ëí°ë§
IPsec VPN (Site-to-Site):
OSI ê³ìžµ:
IPsecì OSI 3ê³ìžµ(ë€ížìí¬ ê³ìžµ)ìì ìë
â IP íší· ë 벚ìì ìíží
â ìì ê³ìžµ(TCP/UDP ë±) 몚ë íë¡í ìœ í¬ëª
íê² ì§ì
ìí€í ì²:
On-Premise DC â IPsec Tunnel â AWS VPC
âââââââââââââ âââââââââââââ
â Router âââââââââââ VGW/TGW â
â (ASA) â IPsec â (AWS) â
âââââââââââââ âââââââââââââ
| |
Private Subnet Private Subnet
ì€ì (AWS Site-to-Site VPN):
1. Customer Gateway (CGW): On-Premise ê³µìž IP
2. Virtual Private Gateway (VGW) ëë Transit Gateway
3. VPN Connection ìì±:
- IKEv2 (Internet Key Exchange)
- AES-256-GCM ìíží
- SHA-256 íŽì±
- DH Group 14 ìŽì
4. BGP ëŒì°í
(ëì ) ëë Static ëŒì°í
5. Tunnel ìŽì€í (HA)
IPsec ëì ë°©ì:
Transport Mode (ì ì¡ ëªšë):
[IP Header | IPsec Header | Encrypted Payload]
â IP í€ëë í묞, íìŽë¡ëë§ ìíží
â Host-to-Host íµì ì ì¬ì©
Tunnel Mode (í°ë 몚ë):
[New IP Header | IPsec Header | Encrypted [Original IP Header | Payload]]
â ì볞 IP íší· ì 첎륌 ìíží í ìë¡ìŽ IP í€ëë¡ ìº¡ìí
â Site-to-Site VPNì ì¬ì© (ê°ì¥ ìŒë°ì )
ì¥ì :
- ë€ížìí¬ ë 벚 í¬ëª ì±: 몚ë íë¡í ìœ ì§ì (TCP, UDP, ICMP, GRE ë±)
- ê³ ì±ë¥: íëìšìŽ ê°ì ì§ì (ASA, Fortinet ë±)
- Site-to-Site ì°ê²° ìµì : ë ë€ížìí¬ë¥Œ íëì²ëŒ ì°ê²°
- ëŒì°í íµí©: BGPë¡ ëì ëŒì°í ê°ë¥
ëšì :
- ì€ì ë³µì¡ë ëì: Phase 1/2 íì, ìíží ì€ìíž ë§€ì¹ íì
- NAT Traversal 묞ì : NAT í겜ìì ESP íší· ì²ëЬ ìŽë €ì (NAT-Të¡ íŽê²°)
- íŽëŒìŽìžíž ìíížìšìŽ íì: ì격 ì¬ì©ìì© IPsec íŽëŒìŽìžíž ì€ì¹ íì
- ë°©í벜 ì¹íì ìŽì§ ìì: UDP 500, 4500 í¬íž ë° ESP(Protocol 50) íì© íì
SSL/TLS VPN (Remote Access):
OSI ê³ìžµ:
SSL/TLSë OSI 5~6ê³ìžµ(ìžì
ê³ìžµ ~ íí ê³ìžµ)ìì ìë
â ì í늬ìŒìŽì
ë°ìŽí°ë¥Œ ìíží
â TCP êž°ë° (443 í¬íž ì¬ì©)
â HTTP, RDP, SSH ë± í¹ì ì í늬ìŒìŽì
í°ëë§
ìí€í ì²:
Remote User (Laptop) â SSL VPN â Corporate Network
âââââââââââ âââââââââââââ
â Browser âââââHTTPSâââââââââ SSL VPN â
â(443 Port)â â Gateway â
âââââââââââ âââââââââââââ
|
Internal Apps
SSL VPN ëì ë°©ì:
1. íŽëŒìŽìžížê° HTTPS(443)ë¡ SSL VPN Gateway ì ì
2. TLS Handshake (ìžìŠì ê²ìŠ, ìžì
í€ êµí)
3. ë ê°ì§ 몚ë:
Portal Mode (Web-Based):
- ì¹ ëžëŒì°ì ë§ìŒë¡ ì ì
- HTML5/JavaScriptë¡ ì í늬ìŒìŽì
ë ëë§
- RDP, SSH ì¹ íŽëŒìŽìžíž ì ê³µ
- ì íì êž°ë¥ (íìŒ ì ì¡, í¹ì ì±ë§)
Tunnel Mode (Full VPN):
- 겜ë íŽëŒìŽìžíž ì€ì¹ (OpenVPN, Pulse Secure)
- ê°ì ë€ížìí¬ ìŽëí° ìì± (tun0)
- 몚ë ížëíœ í°ëë§ ëë Split Tunnel
- IPsec곌 ì ì¬í 겜í
ì€ì (OpenVPN):
1. CA ìžìŠì ìì±
2. ìë² ìžìŠì ë°êž
3. íŽëŒìŽìžíž ìžìŠì ë°êž
4. OpenVPN ìë² ì€ì :
proto tcp # TCP ì¬ì© (ë°©í벜 ì¹íì )
port 443 # HTTPS í¬íž (443)
dev tun # í°ë ìží°íìŽì€
cipher AES-256-CBC
auth SHA256
comp-lzo # ìì¶
5. íŽëŒìŽìžíž íë¡íìŒ ë°°í¬ (.ovpn)
ì¥ì :
- ì¹ êž°ë° ì ê·Œ: ëžëŒì°ì ë§ìŒë¡ ê°ë¥ (Portal Mode)
- NAT/Firewall ì¹íì : HTTPS(443) í¬ížë¡ ê±°ì 몚ë ë°©í벜 íµê³Œ
- ìžë°í ì ê·Œ ì ìŽ: URL êž°ë°, ì í늬ìŒìŽì ë³ ê¶í ë¶ì¬
- ì€ì ê°ëš: ì¬ì©ì 겜í ì°ì, íŽëŠ ëª ë²ìŒë¡ ì°ê²°
- Zero Trust íµí©: Identity-Aware Proxyì ì°ë ì©ìŽ
ëšì :
- ì í늬ìŒìŽì ë 벚 ì í: Portal Modeë ìŒë¶ íë¡í ìœë§ ì§ì (UDP ì í)
- ì±ë¥ ì€ë²í€ë: TLS Handshake + TCP 캡ìí (TCP over TCP 묞ì )
- Tunnel Mode íê³: IPsecë³Žë€ ì²ëЬë ë®ì (ìíížìšìŽ ìíží)
ê³ìžµë³ ì°šìŽ ììœ:
OSI ê³ìžµ êŽì :
IPsec (Layer 3 - Network):
âââââââââââââââââââââââââââââââââââ
â Application (7) â
â Presentation (6) â
â Session (5) â
â Transport (4) - TCP/UDP â â 몚ë ìížíëš
â Network (3) - IP [IPsec ìë] â â IP íší· ìíží
â Data Link (2) â
â Physical (1) â
âââââââââââââââââââââââââââââââââââ
SSL/TLS (Layer 5-6 - Session/Presentation):
âââââââââââââââââââââââââââââââââââ
â Application (7) - HTTPS â â ì í늬ìŒìŽì
ë°ìŽí° ìíží
â Presentation (6) [TLS ìë] â â SSL/TLS ìíží
â Session (5) [TLS ìë] â â ìžì
êŽëЬ
â Transport (4) - TCP â â TCPë í묞 (í€ëë§)
â Network (3) - IP â â IPë í묞
â Data Link (2) â
â Physical (1) â
âââââââââââââââââââââââââââââââââââ
ì€ë¬Ž ì í êž°ì€:
| ì구ì¬í | IPsec VPN | SSL/TLS VPN |
|---|---|---|
| Site-to-Site ì°ê²° | â ìµì | â ë¹ê¶ì¥ |
| ì격 ì¬ì©ì (BYOD) | â ë³µì¡ | â ìµì |
| 몚ë íë¡í ìœ ì§ì | â ì§ì | |
| NAT/Firewall íµê³Œ | â ì¬ì (443) | |
| ì±ë¥ (Throughput) | â ëì | |
| ì€ì ë³µì¡ë | â ë®ì | |
| ì ê·Œ ì ìŽ ìžë°ë | â ì± ë 벚 | |
| ë¹ì© | â ìíížìšìŽ |
íìŽëžëЬë ì ê·Œ:
IPsec VPN: ë³žì¬ â AWS (Site-to-Site)
SSL VPN: ì¬í귌묎ì â AWS (Remote Access)
AWS Client VPN (Managed SSL VPN):
- OpenVPN êž°ë°
- Active Directory íµí©
- ìë ì€ìŒìŒë§
- CloudWatch 몚ëí°ë§
AWS Direct Connect + VPN:
Primary: Direct Connect (ì ì©ì , ìíží X)
Secondary: IPsec VPN over Internet (ë°±ì
, ìíží O)
â ê³ ì±ë¥ + ê³ ê°ì©ì± + 볎ì
ð¡ ì©ìŽ ì€ëª :
- DNS ë° ë³Žì êŽë š ì§ë¬žë€(Q13-Q18)ìì ì¬ì©ë ì©ìŽë€(DNS Recursive/Iterative Query, DNSSEC, GeoDNS, Reverse Proxy Caching, Circuit Breaker, IPsec/SSL VPN ë±)ì ëí
- ììží ì€ëª ì 묞ì ìëšì 죌ì ì©ìŽ íµí© ì 늬 > DNS, íë¡ì & ë¡ëë°žë°ì±, 볎ì & ìíží ì¹ì ì ì°žê³ íìžì.