KR_Net_OSI_Routing - somaz94/DevOps-Engineer GitHub Wiki

๋„คํŠธ์›Œํฌ OSI 7๊ณ„์ธต & ๋ผ์šฐํŒ… (Q6-Q12)

OSI 7๊ณ„์ธต & ๋ผ์šฐํŒ… (6~12๋ฒˆ)


Q6. OSI 7๊ณ„์ธต๊ณผ TCP/IP 4๊ณ„์ธต์˜ ์บก์Аํ™” ๊ณผ์ •์„ ์„ค๋ช…ํ•˜์„ธ์š”.

๋ฐ์ดํ„ฐ ์†ก์‹  ์‹œ ์บก์Аํ™” (Encapsulation):

Application Layer (L7):  "Hello" 
                         โ†“
Presentation Layer (L6): [Encoding] "Hello"
                         โ†“
Session Layer (L5):      [Session ID] + Data
                         โ†“
Transport Layer (L4):    [TCP Header (Port)] + Segment
                         โ†“
Network Layer (L3):      [IP Header (Src/Dst IP)] + Packet
                         โ†“
Data Link Layer (L2):    [Ethernet Header + MAC] + Frame + [FCS]
                         โ†“
Physical Layer (L1):     Bits (์ „๊ธฐ ์‹ ํ˜ธ)

๊ฐ ๊ณ„์ธต๋ณ„ PDU (Protocol Data Unit):

  • L7-L5 (Application/Presentation/Session): Data
  • L4 (Transport): Segment (TCP) / Datagram (UDP)
  • L3 (Network): Packet
  • L2 (Data Link): Frame
  • L1 (Physical): Bits

TCP/IP 4๊ณ„์ธต ๋งคํ•‘:

OSI 7๊ณ„์ธต                  TCP/IP 4๊ณ„์ธต
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€
Application (7)    โ”
Presentation (6)   โ”œโ”€โ”€โ†’  Application Layer
Session (5)        โ”˜
                   
Transport (4)      โ”€โ”€โ”€โ†’  Transport Layer (TCP/UDP)
                   
Network (3)        โ”€โ”€โ”€โ†’  Internet Layer (IP, ICMP, ARP)
                   
Data Link (2)      โ”
Physical (1)       โ”˜โ”€โ”€โ†’  Network Interface Layer

์‹ค์ œ HTTP ์š”์ฒญ ์˜ˆ์‹œ:

1. Application: HTTP GET /index.html
2. Transport: TCP Header (Src Port: 54321, Dst Port: 80, SEQ, ACK)
3. Network: IP Header (Src: 192.168.1.10, Dst: 93.184.216.34)
4. Data Link: Ethernet Header (Src MAC: aa:bb:cc:dd:ee:ff, Dst MAC: Gateway MAC)
5. Physical: ์ „๊ธฐ ์‹ ํ˜ธ๋กœ ์ „์†ก

๋””์บก์Аํ™” (Decapsulation):

  • ์ˆ˜์‹  ์ธก์€ ์—ญ์ˆœ์œผ๋กœ ๊ฐ ๊ณ„์ธต์˜ ํ—ค๋”๋ฅผ ์ œ๊ฑฐํ•˜๋ฉฐ ๋ฐ์ดํ„ฐ ์ถ”์ถœ

Q7. TCP 3-Way Handshake์™€ 4-Way Handshake์˜ ๋™์ž‘ ์›๋ฆฌ์™€ ์ƒํƒœ ๋ณ€ํ™”๋Š”?

TCP 3-Way Handshake (์—ฐ๊ฒฐ ์ˆ˜๋ฆฝ):

Client (CLOSED)                         Server (LISTEN)
    |                                       |
    |--------- SYN (SEQ=100) -------------->| (SYN_SENT)
    |                                       | (SYN_RECEIVED)
    |<-- SYN-ACK (SEQ=200, ACK=101) --------|
    | (ESTABLISHED)                         |
    |--------- ACK (ACK=201) -------------->| (ESTABLISHED)
    |                                       |
    |========= Data Transfer ===============|

์ƒํƒœ ๋ณ€ํ™”:

  • Client: CLOSED โ†’ SYN_SENT โ†’ ESTABLISHED
  • Server: LISTEN โ†’ SYN_RECEIVED โ†’ ESTABLISHED

TCP 4-Way Handshake (์—ฐ๊ฒฐ ์ข…๋ฃŒ):

Client                                  Server
    |                                       |
    |--------- FIN (SEQ=300) -------------->| (FIN_WAIT_1)
    |                                       | (CLOSE_WAIT)
    |<-------- ACK (ACK=301) ---------------|
    | (FIN_WAIT_2)                          |
    |                                       |
    |<-------- FIN (SEQ=400) ---------------| (LAST_ACK)
    | (TIME_WAIT)                           |
    |--------- ACK (ACK=401) -------------->| (CLOSED)
    |                                       |
    | (2*MSL ๋Œ€๊ธฐ ํ›„ CLOSED)                |

TIME_WAIT ์ƒํƒœ (2MSL):

  • ๋ชฉ์ : ์ง€์—ฐ๋œ ํŒจํ‚ท ์ฒ˜๋ฆฌ, ๋งˆ์ง€๋ง‰ ACK ์žฌ์ „์†ก ๋Œ€๋น„
  • MSL (Maximum Segment Lifetime): ๋ณดํ†ต 30์ดˆ~2๋ถ„
  • ๋ฌธ์ œ: ๋งŽ์€ ์—ฐ๊ฒฐ ์ƒ์„ฑ/์ข…๋ฃŒ ์‹œ ์†Œ์ผ“ ๊ณ ๊ฐˆ
  • ํ•ด๊ฒฐ: SO_REUSEADDR, Connection Pooling

Half-Close:

Client: shutdown(SHUT_WR) โ†’ ์†ก์‹  ์ข…๋ฃŒ, ์ˆ˜์‹  ๊ฐ€๋Šฅ
Server: ๋ฐ์ดํ„ฐ ๊ณ„์† ์ „์†ก ๊ฐ€๋Šฅ
โ†’ ์–‘๋ฐฉํ–ฅ ๋…๋ฆฝ์  ์ข…๋ฃŒ ๊ฐ€๋Šฅ

๋น„์ •์ƒ ์ข…๋ฃŒ (RST):

RST ํ”Œ๋ž˜๊ทธ: ์ฆ‰์‹œ ์—ฐ๊ฒฐ ์ข…๋ฃŒ (4-Way ์—†์Œ)
์‚ฌ์šฉ ๊ฒฝ์šฐ:
- ์กด์žฌํ•˜์ง€ ์•Š๋Š” ํฌํŠธ ์ ‘์†
- ํƒ€์ž„์•„์›ƒ
- ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ฐ•์ œ ์ข…๋ฃŒ

Q8. BGP์˜ ๊ฒฝ๋กœ ์„ ํƒ ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ AS-PATH ์†์„ฑ์„ ์„ค๋ช…ํ•˜์„ธ์š”.

BGP Path Selection Process (13๋‹จ๊ณ„):

1. Weight (Cisco ์ „์šฉ, ๋†’์„์ˆ˜๋ก ์šฐ์„ )
2. Local Preference (AS ๋‚ด๋ถ€, ๋†’์„์ˆ˜๋ก ์šฐ์„ )
3. Locally Originated (์ž์ฒด ์ƒ์„ฑ ๊ฒฝ๋กœ ์šฐ์„ )
4. AS-PATH Length (์งง์„์ˆ˜๋ก ์šฐ์„ )
5. Origin Type (IGP > EGP > Incomplete)
6. MED (Multi-Exit Discriminator, ๋‚ฎ์„์ˆ˜๋ก ์šฐ์„ )
7. eBGP > iBGP
8. IGP Metric (๋‚ฎ์„์ˆ˜๋ก ์šฐ์„ )
9. Oldest Route (๊ฐ€์žฅ ์˜ค๋ž˜๋œ ๊ฒฝ๋กœ)
10. Router ID (๋‚ฎ์„์ˆ˜๋ก ์šฐ์„ )
11. Cluster List Length (์งง์„์ˆ˜๋ก ์šฐ์„ )
12. Neighbor IP (๋‚ฎ์„์ˆ˜๋ก ์šฐ์„ )

AS-PATH ์†์„ฑ:

AS-PATH: 65001 65002 65003
โ†’ ํŒจํ‚ท์ด ๊ฑฐ์ณ์˜จ AS ๋ฒˆํ˜ธ ์ˆœ์„œ

๋ชฉ์ :
1. ๋ฃจํ”„ ๋ฐฉ์ง€ (์ž์‹ ์˜ AS ๋ฒˆํ˜ธ๊ฐ€ ์žˆ์œผ๋ฉด ๊ฑฐ๋ถ€)
2. ๊ฒฝ๋กœ ๊ธธ์ด ๊ณ„์‚ฐ
3. ๋ผ์šฐํŒ… ์ •์ฑ… ์ ์šฉ (ํŠน์ • AS ๊ฒฝ์œ  ๋ฐฉ์ง€)

AS-PATH Prepending (ํŠธ๋ž˜ํ”ฝ ์ œ์–ด):

Normal:     AS-PATH: 65001
Prepended:  AS-PATH: 65001 65001 65001 (์ธ์œ„์ ์œผ๋กœ ๊ธธ๊ฒŒ)
โ†’ ๋‹ค๋ฅธ ๊ฒฝ๋กœ ์„ ํ˜ธํ•˜๋„๋ก ์œ ๋„

BGP Communities:

- NO_EXPORT (65535:65281): ๋‹ค๋ฅธ AS๋กœ ๊ด‘๊ณ  ๊ธˆ์ง€
- NO_ADVERTISE (65535:65282): ๋‹ค๋ฅธ BGP ํ”ผ์–ด์— ๊ด‘๊ณ  ๊ธˆ์ง€
- Custom: ์˜ˆ) 100:10 (๋ฐฑ์—… ๊ฒฝ๋กœ)

์‹ค๋ฌด ์˜ˆ์‹œ (AWS Direct Connect):

AS-PATH Prepending์œผ๋กœ Primary/Secondary ๋งํฌ ์ œ์–ด
Primary:   AS-PATH 64512
Secondary: AS-PATH 64512 64512 64512
โ†’ Primary ์žฅ์•  ์‹œ ์ž๋™ Secondary ์ „ํ™˜

BGP Hijacking ๋ฐฉ์ง€:

  • RPKI (Resource Public Key Infrastructure): AS์™€ IP ๋งคํ•‘ ๊ฒ€์ฆ
  • Route Origin Validation (ROV): ์œ ํšจํ•œ AS๋งŒ prefix ๊ด‘๊ณ  ๊ฐ€๋Šฅ

Q9. OSPF์˜ Area ๊ฐœ๋…๊ณผ LSA ํƒ€์ž…๋ณ„ ์—ญํ• ์€?

OSPF Area ๊ณ„์ธต ๊ตฌ์กฐ:

                    Area 0 (Backbone)
                   [ABR]โ”€โ”€โ”€โ”€โ”€[ABR]
                    /           \
                   /             \
              Area 1           Area 2
           (Regular)         (Stub/NSSA)

Area ํƒ€์ž…:

  • Backbone Area (Area 0): ๋ชจ๋“  Area๊ฐ€ ์—ฐ๊ฒฐ๋˜๋Š” ์ค‘์‹ฌ
  • Regular Area: ๋ชจ๋“  LSA ํƒ€์ž… ํ—ˆ์šฉ
  • Stub Area: Type 4, 5 LSA ์ฐจ๋‹จ (๊ธฐ๋ณธ ๊ฒฝ๋กœ๋กœ ๋Œ€์ฒด)
  • Totally Stub Area: Type 3, 4, 5 LSA ์ฐจ๋‹จ
  • NSSA (Not-So-Stubby Area): Type 5 ๋Œ€์‹  Type 7 ์‚ฌ์šฉ (์žฌ๋ถ„๋ฐฐ ํ—ˆ์šฉ)

LSA (Link State Advertisement) ํƒ€์ž…:

Type 1 (Router LSA):

  • ๊ฐ ๋ผ์šฐํ„ฐ๊ฐ€ ์ž์‹ ์˜ ๋งํฌ ์ƒํƒœ ๊ด‘๊ณ 
  • ๊ฐ™์€ Area ๋‚ด์—๋งŒ ์ „ํŒŒ

Type 2 (Network LSA):

  • DR (Designated Router)์ด ๋ฉ€ํ‹ฐ์•ก์„ธ์Šค ๋„คํŠธ์›Œํฌ ์ •๋ณด ๊ด‘๊ณ 
  • Ethernet, Frame Relay ๋“ฑ

Type 3 (Summary LSA):

  • ABR์ด ๋‹ค๋ฅธ Area์˜ ๋„คํŠธ์›Œํฌ ์ •๋ณด๋ฅผ ์š”์•ฝํ•˜์—ฌ ๊ด‘๊ณ 
  • Inter-Area ๋ผ์šฐํŒ…

Type 4 (ASBR Summary LSA):

  • ABR์ด ASBR (AS Boundary Router) ์œ„์น˜ ๊ด‘๊ณ 
  • Type 5 LSA ๋„๋‹ฌ ๊ฒฝ๋กœ

Type 5 (External LSA):

  • ASBR์ด ์™ธ๋ถ€ AS์˜ ๋ผ์šฐํŠธ ๊ด‘๊ณ  (์žฌ๋ถ„๋ฐฐ)
  • ์ „์ฒด OSPF ๋„๋ฉ”์ธ์— ์ „ํŒŒ

Type 7 (NSSA External LSA):

  • NSSA์—์„œ ์‚ฌ์šฉํ•˜๋Š” External LSA
  • ABR์ด Type 5๋กœ ๋ณ€ํ™˜ํ•˜์—ฌ Backbone์œผ๋กœ ์ „ํŒŒ

OSPF ๋™์ž‘ ํ๋ฆ„:

1. Hello ํŒจํ‚ท ๊ตํ™˜ โ†’ Neighbor ๋ฐœ๊ฒฌ
2. DR/BDR ์„ ์ถœ (๋ฉ€ํ‹ฐ์•ก์„ธ์Šค ๋„คํŠธ์›Œํฌ)
3. DBD (Database Description) ๊ตํ™˜ โ†’ LSDB ๋™๊ธฐํ™”
4. LSR/LSU ๊ตํ™˜ โ†’ ๋ˆ„๋ฝ๋œ LSA ์š”์ฒญ/์ „์†ก
5. SPF (Dijkstra) ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์‹คํ–‰ โ†’ ์ตœ๋‹จ ๊ฒฝ๋กœ ๊ณ„์‚ฐ
6. ๋ผ์šฐํŒ… ํ…Œ์ด๋ธ” ์—…๋ฐ์ดํŠธ

Area ์„ค๊ณ„ ๋ชจ๋ฒ” ์‚ฌ๋ก€:

  • Area๋‹น ๋ผ์šฐํ„ฐ 50๊ฐœ ์ดํ•˜ ๊ถŒ์žฅ
  • ABR์€ ์ตœ๋Œ€ 3๊ฐœ Area์—๋งŒ ์—ฐ๊ฒฐ
  • Stub Area๋กœ LSA ์ˆ˜ ๊ฐ์†Œ

Q10. NAT/PAT์˜ ๋™์ž‘ ์›๋ฆฌ์™€ NAT Traversal ๊ธฐ๋ฒ•์€?

NAT (Network Address Translation) ํƒ€์ž…:

Static NAT (1:1):

Private IP      Public IP
192.168.1.10 โ†โ†’ 203.0.113.5 (๊ณ ์ • ๋งคํ•‘)
โ†’ ์„œ๋ฒ„ ์šด์˜ ์‹œ ์‚ฌ์šฉ (์›น์„œ๋ฒ„, ๋ฉ”์ผ์„œ๋ฒ„)

Dynamic NAT (N:M):

Private Pool: 192.168.1.10~192.168.1.20
Public Pool:  203.0.113.5~203.0.113.10
โ†’ ์š”์ฒญ ์‹œ ๋™์  ํ• ๋‹น

PAT (Port Address Translation, NAPT):

Private                    Public
192.168.1.10:54321  โ†โ†’  203.0.113.5:10001
192.168.1.11:54322  โ†โ†’  203.0.113.5:10002
192.168.1.12:54323  โ†โ†’  203.0.113.5:10003
โ†’ ํ•˜๋‚˜์˜ Public IP๋กœ ์ˆ˜์ฒœ ๊ฐœ์˜ ๋‚ด๋ถ€ ํ˜ธ์ŠคํŠธ ์ง€์›

NAT Translation Table:

| Inside Local   | Inside Global  | Outside Global | Outside Local  |
|----------------|----------------|----------------|----------------|
| 192.168.1.10:54321 | 203.0.113.5:10001 | 8.8.8.8:53 | 8.8.8.8:53 |

NAT Traversal ๋ฌธ์ œ:

  • P2P ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ (VoIP, ๊ฒŒ์ž„, ํ™”์ƒํšŒ์˜) ์—ฐ๊ฒฐ ์‹คํŒจ
  • ๋‚ด๋ถ€ โ†’ ์™ธ๋ถ€๋Š” ๊ฐ€๋Šฅํ•˜์ง€๋งŒ ์™ธ๋ถ€ โ†’ ๋‚ด๋ถ€ ์—ฐ๊ฒฐ ๋ถˆ๊ฐ€

NAT Traversal ๊ธฐ๋ฒ•:

1. STUN (Session Traversal Utilities for NAT):

Client โ†’ STUN Server
STUN Server: "๋‹น์‹ ์˜ Public IP๋Š” 203.0.113.5:10001์ž…๋‹ˆ๋‹ค"
โ†’ Symmetric NAT์—์„œ๋Š” ์‹คํŒจ

2. TURN (Traversal Using Relays around NAT):

Client A โ† โ†’ TURN Server โ† โ†’ Client B
โ†’ ๋ชจ๋“  ํŠธ๋ž˜ํ”ฝ์ด ์ค‘๊ณ„ ์„œ๋ฒ„ ๊ฒฝ์œ  (๋Œ€์—ญํญ ์†Œ๋ชจ)

3. ICE (Interactive Connectivity Establishment):

1. STUN์œผ๋กœ Public IP ํš๋“ ์‹œ๋„
2. ์‹คํŒจ ์‹œ TURN์œผ๋กœ Fallback
3. ์—ฌ๋Ÿฌ Candidate ์ค‘ ์ตœ์  ๊ฒฝ๋กœ ์„ ํƒ
โ†’ WebRTC์—์„œ ์‚ฌ์šฉ

4. UPnP (Universal Plug and Play):

์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ๋ผ์šฐํ„ฐ์— ํฌํŠธ ํฌ์›Œ๋”ฉ ์ž๋™ ์„ค์ • ์š”์ฒญ
โ†’ ๋ณด์•ˆ ์œ„ํ—˜ (์•…์„ฑ์ฝ”๋“œ ์•…์šฉ ๊ฐ€๋Šฅ)

5. Port Forwarding (Static):

Router: ์™ธ๋ถ€ 80 โ†’ 192.168.1.10:80
       ์™ธ๋ถ€ 443 โ†’ 192.168.1.10:443
โ†’ ์„œ๋ฒ„ ์šด์˜ ์‹œ ์ˆ˜๋™ ์„ค์ •

NAT ํ•œ๊ณ„:

  • End-to-End ์›์น™ ์œ„๋ฐฐ
  • IPsec ESP ๋ชจ๋“œ ๋ฌธ์ œ (NAT-T๋กœ ํ•ด๊ฒฐ)
  • FTP Active ๋ชจ๋“œ ์‹คํŒจ (ALG๋กœ ํ•ด๊ฒฐ)

Q11. ARP Spoofing ๊ณต๊ฒฉ ์›๋ฆฌ์™€ ๋ฐฉ์–ด ๋ฐฉ๋ฒ•์€?

ARP (Address Resolution Protocol) ๋™์ž‘:

1. Host A: "192.168.1.1์˜ MAC ์ฃผ์†Œ๊ฐ€ ๋ญ์ง€?" (Broadcast)
2. Gateway: "192.168.1.1์€ 00:11:22:33:44:55์ž…๋‹ˆ๋‹ค" (Unicast)
3. Host A: ARP Cache์— ์ €์žฅ

ARP Cache Table:

$ arp -a
192.168.1.1      00:11:22:33:44:55   dynamic
192.168.1.10     aa:bb:cc:dd:ee:ff   dynamic

ARP Spoofing ๊ณต๊ฒฉ (์ค‘๊ฐ„์ž ๊ณต๊ฒฉ):

Normal:
Client โ† โ†’ Gateway โ† โ†’ Internet

Attack:
Client โ† โ†’ Attacker โ† โ†’ Gateway โ† โ†’ Internet
           (ํŠธ๋ž˜ํ”ฝ ๊ฐ€๋กœ์ฑ„๊ธฐ)

๊ณต๊ฒฉ์ž๊ฐ€ ์œ„์กฐ๋œ ARP Reply ์ „์†ก:
"192.168.1.1(Gateway)์˜ MAC์€ [Attacker MAC]์ž…๋‹ˆ๋‹ค"
โ†’ Client์˜ ARP Cache ์˜ค์—ผ
โ†’ ๋ชจ๋“  ํŠธ๋ž˜ํ”ฝ์ด ๊ณต๊ฒฉ์ž๋ฅผ ๊ฒฝ์œ 

๋ฐฉ์–ด ๋ฐฉ๋ฒ•:

1. Static ARP Entry:

# Linux
arp -s 192.168.1.1 00:11:22:33:44:55

# Windows
arp -s 192.168.1.1 00-11-22-33-44-55
  • ์žฅ์ : ARP Spoofing ์™„์ „ ์ฐจ๋‹จ
  • ๋‹จ์ : ์ˆ˜๋™ ๊ด€๋ฆฌ ํ•„์š”, MAC ๋ณ€๊ฒฝ ์‹œ ์—…๋ฐ์ดํŠธ

2. DAI (Dynamic ARP Inspection):

Switch์—์„œ ARP ํŒจํ‚ท ๊ฒ€์ฆ:
- DHCP Snooping Database์™€ ๋น„๊ต
- ์œ ํšจํ•œ ARP๋งŒ ์ „๋‹ฌ
- ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ํฌํŠธ๋Š” ๊ฒ€์ฆ ์ƒ๋žต

3. ARP ๋ชจ๋‹ˆํ„ฐ๋ง ๋„๊ตฌ:

# arpwatch (Linux)
arpwatch -i eth0
โ†’ ARP ๋ณ€๊ฒฝ ๊ฐ์ง€ ์‹œ ์•Œ๋ฆผ

# XArp (Windows)
โ†’ GUI ๊ธฐ๋ฐ˜ ARP ๋ชจ๋‹ˆํ„ฐ๋ง

4. ๋„คํŠธ์›Œํฌ ์„ธ๊ทธ๋ฉ˜ํ…Œ์ด์…˜:

VLAN์œผ๋กœ ๋ธŒ๋กœ๋“œ์บ์ŠคํŠธ ๋„๋ฉ”์ธ ๋ถ„๋ฆฌ
โ†’ ARP Spoofing ์˜ํ–ฅ ๋ฒ”์œ„ ์ถ•์†Œ

5. Port Security (MAC ์ฃผ์†Œ ์ œํ•œ):

switchport port-security maximum 2
switchport port-security violation restrict
switchport port-security mac-address sticky

6. IPsec/VPN:

  • ์•”ํ˜ธํ™”๋กœ ARP Spoofing ๋ฌด๋ ฅํ™”
  • ๊ณต๊ฒฉ์ž๊ฐ€ ํŠธ๋ž˜ํ”ฝ์„ ๊ฐ€๋กœ์ฑ„๋„ ๋ณตํ˜ธํ™” ๋ถˆ๊ฐ€

Q12. Hub & Spoke ๋„คํŠธ์›Œํฌ์™€ Transit Gateway ์•„ํ‚คํ…์ฒ˜ ๋น„๊ต๋Š”?

๊ธฐ์กด Hub & Spoke (VPN):

        โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
        โ”‚  Hub DC โ”‚ (Central VPN Gateway)
        โ””โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”˜
      โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”
      โ”‚      โ”‚      โ”‚
   โ”Œโ”€โ”€โ–ผโ”€โ”€โ”โ”Œโ”€โ”€โ–ผโ”€โ”€โ”โ”Œโ”€โ”€โ–ผโ”€โ”€โ”
   โ”‚Spokeโ”‚โ”‚Spokeโ”‚โ”‚Spokeโ”‚
   โ”‚  1  โ”‚โ”‚  2  โ”‚โ”‚  3  โ”‚
   โ””โ”€โ”€โ”€โ”€โ”€โ”˜โ””โ”€โ”€โ”€โ”€โ”€โ”˜โ””โ”€โ”€โ”€โ”€โ”€โ”˜

์žฅ์ :

  • ์ค‘์•™ ์ง‘์ค‘์‹ ๋ณด์•ˆ ์ •์ฑ…
  • ๊ด€๋ฆฌ ๋‹จ์ˆœํ™”

๋‹จ์ :

  • Hub ์žฅ์•  ์‹œ ์ „์ฒด ํ†ต์‹  ๋ถˆ๊ฐ€ (SPOF)
  • Hub ๋ณ‘๋ชฉ ํ˜„์ƒ
  • Spoke ๊ฐ„ ํ†ต์‹ ์€ Hub ๊ฒฝ์œ  (2๋ฐฐ ํ™‰)

AWS Transit Gateway ์•„ํ‚คํ…์ฒ˜:

         โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
         โ”‚ Transit Gateway โ”‚ (Managed Service)
         โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
      โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
      โ”‚           โ”‚           โ”‚
   โ”Œโ”€โ”€โ–ผโ”€โ”€โ”     โ”Œโ”€โ”€โ–ผโ”€โ”€โ”     โ”Œโ”€โ”€โ–ผโ”€โ”€โ”
   โ”‚ VPC โ”‚     โ”‚ VPC โ”‚     โ”‚ VPC โ”‚
   โ”‚  A  โ”‚     โ”‚  B  โ”‚     โ”‚  C  โ”‚
   โ””โ”€โ”€โ”€โ”€โ”€โ”˜     โ””โ”€โ”€โ”€โ”€โ”€โ”˜     โ””โ”€โ”€โ”€โ”€โ”€โ”˜
      โ”‚           โ”‚           โ”‚
   โ”Œโ”€โ”€โ–ผโ”€โ”€โ”     โ”Œโ”€โ”€โ–ผโ”€โ”€โ”     โ”Œโ”€โ”€โ–ผโ”€โ”€โ”
   โ”‚ DX  โ”‚     โ”‚ VPN โ”‚     โ”‚ VPC โ”‚
   โ””โ”€โ”€โ”€โ”€โ”€โ”˜     โ””โ”€โ”€โ”€โ”€โ”€โ”˜     โ”‚  D  โ”‚
                           โ””โ”€โ”€โ”€โ”€โ”€โ”˜

Transit Gateway ์žฅ์ :

1. ๊ณ ๊ฐ€์šฉ์„ฑ:

  • Multi-AZ ์ž๋™ ๋ฐฐํฌ
  • ๋ฆฌ์ „ ๋‚ด 99.95% SLA

2. ํ™•์žฅ์„ฑ:

  • VPC๋‹น ์ตœ๋Œ€ 5,000๊ฐœ ์—ฐ๊ฒฐ
  • 50 Gbps ์ฒ˜๋ฆฌ๋Ÿ‰

3. ๋ผ์šฐํŒ… ํ…Œ์ด๋ธ” ๋ถ„๋ฆฌ:

Route Table 1 (Production):
  VPC-Prod-A โ†” VPC-Prod-B

Route Table 2 (Development):
  VPC-Dev-A โ†” VPC-Dev-B

โ†’ Isolation between environments

4. Transit Gateway Peering:

Region A TGW โ† โ†’ Region B TGW
โ†’ Cross-Region VPC ํ†ต์‹ 

5. Centralized Egress:

All VPCs โ†’ Transit Gateway โ†’ Egress VPC (NAT Gateway, Firewall)
โ†’ ์ค‘์•™ ์ง‘์ค‘์‹ ์ธํ„ฐ๋„ท ์ถœ๊ตฌ

๋น„์šฉ ๋น„๊ต:

Hub & Spoke (VPN):
- VPN ์—ฐ๊ฒฐ๋‹น $0.05/hour * N๊ฐœ
- ๋ฐ์ดํ„ฐ ์ „์†ก ๋น„์šฉ

Transit Gateway:
- Attachment๋‹น $0.05/hour * N๊ฐœ
- ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ $0.02/GB
โ†’ 10๊ฐœ ์ด์ƒ VPC ์—ฐ๊ฒฐ ์‹œ Transit Gateway๊ฐ€ ๊ฒฝ์ œ์ 

๋งˆ์ด๊ทธ๋ ˆ์ด์…˜ ์ „๋žต:

1. Transit Gateway ์ƒ์„ฑ
2. VPC Attachment ์ถ”๊ฐ€ (๊ธฐ์กด VPN ์œ ์ง€)
3. ๋ผ์šฐํŒ… ํ…Œ์ด๋ธ” ์ ์ง„์  ์ „ํ™˜
4. ๊ฒ€์ฆ ํ›„ ๊ธฐ์กด VPN ์ œ๊ฑฐ

๐Ÿ’ก ์šฉ์–ด ์„ค๋ช…:


์ฐธ๊ณ  ์ž๋ฃŒ

โš ๏ธ **GitHub.com Fallback** โš ๏ธ