Á¦Ç°¼Ò°³ > SECUTITY
       
¹æÈ­º®À̶õ ¿ÜºÎ »ç¿ëÀÚ(WAN) µéÀÌ ³»ºÎ ³×Æ®¿÷(LAN)¿¡ Á¢±ÙÇÏÁö ¸øÇϵµ·Ï ÇÏ´Â ÀÏÁ¾ÀÇ ³»ºÎ ³×Æ®¿÷ ¹æ¾îµµ±¸ ÀÔ´Ï´Ù.
±×·¯³ª ´Ù¸¥ ¼ÒÇÁÆ®¿þ¾îÀûÀÎ ÇÁ·Î±×·¥µµ±¸¿Í´Â ´Þ¸® ¹æÈ­º®À̶óÇÔÀº µ¶¸³µÈ ½Ã½ºÅÛÀ̳ª Àü¿ë Çϵå¿þ¾îµîÀ» ¶æÇÕ´Ï´Ù.
¹æÈ­º®ÀÇ Àǹ̴ ÀÛ°Ô´Â ¿¬°á¿äû¿¡ ´ëÇؼ­ ½ÂÀÎµÈ È£½ºÆ®¿¡ ÇÑÇÏ¿© ó¸®ÇÏ´Â °£´ÜÇÑ ÀÎÁõ¿¡¼­ºÎÅÍ ÆÐŶÇÊÅ͸µ ¹× ºÐ¼®
±×¸®°í ÇÁ·ÎÅäÄݳ»ÀÇ Æ¯Á¤°ø°Ý¼­¸í(attack signature)À» ¸·´Â ±â¼úÀ̸ç, ¶ÇÇÑ »ç¿ëÀÚ¿¬°áÀÇ ÀÎÁõ°ú ¾Ïȣȭ ´Ü°è±îÁö
´Ù¾çÇÏ°Ô ¹ßÀüÇØ¿Ô½À´Ï´Ù.
ÆÐŶÇÊÅ͸µ
°¡Àå ±âÃÊÀûÀÎ ¹æÈ­º®Àº ¶ó¿ìÅÍ¿¡¼­ ÇàÇÏ¿©Áö´Â ÆÖŶÇÊÅ͸µÀ̶ó ÇÒ ¼ö ÀÖ½À´Ï´Ù. ¹ß½ÅÁö IP / protocol / prot¹øÈ£ / ÆÖŶ µîÀ» ¼±º°ÀûÀ¸·Î ÀÎÁõÇÏ¿© Á¢¼Ó¿äû¿¡ ´ëÇÏ¿© ÆÇ´ÜÇϴ°ÍÀ» ÀǹÌÇÕ´Ï´Ù. ´õ¿íÀÌ ¿ä»çÀÌ Çâ»óµÈ ¶ó¿ìÅ͵éÀº ½ºÇªÇÎ °ú DoS°ø°Ý¿¡ ´ëÇÏ¿© ±îÁö ¸·À»¼ö ÀÖ°Ô ¹ßÀüÇÏ¿´À¸¸ç scanningÁ¶Â÷ ºÒ°¡Çϵµ·Ï ¹ßÀüµÈ °Íµµ ÀÖ½À´Ï´Ù.
¾îÇø®ÄÉÀ̼Ç-ÇÁ·Ï½Ã ¹æÈ­º®
ÀÌ·±ÇÑ ¹æ¹ýÀº ¾îÇø®ÄÉÀÌ¼Ç °ÔÀÌÆ®¿þÀ̸¦ ÅëÇÑ ¹æ¹ýÀÔ´Ï´Ù.
Packet Filtering
IP Address ȤÀº Port Number¿Í °°ÀÌ ³×Æ®¿÷»ç¿ë½Ã ÇʼöÀûÀ¸·Î ¼ö¹ÝµÇ´Â Packet Á¤º¸(HeaderÁ¤º¸)¸¦ Network Layer¿¡¼­ °Ë»çÇÏ¿© Security Decisions¿¡ ¹Ý¿µÇÏ´Â ¹æ½ÄÀ¸·Î ÁÖ·Î Router¿Í °°Àº ³×Æ®¿÷Àåºñ¿¡¼­ ±¸ÇöÇÏ´Â ±âÃÊÀûÀÎ º¸¾È¹æ½Ä. Static/Dynamic Packet FilteringÀ¸·Î ±¸ºÐµÊ.
Appication Gateway
ÆÐŶÀ» ÀÌ¿ëÇÏ´Â ¸ðµç ¾îÇø®ÄÉÀ̼ǿ¡ ´ëÇÑ °Ë»ç¸¦ ¼öÇàÇÏ¿© ±× °á°ú¸¦ ÆÐŶÀÇ Â÷´Ü¿©ºÎ¸¦ °áÁ¤ÇÏ´Â ÇÁ·Î¼¼½º¿¡ ¹Ý¿µÇÏ´Â ¹æ½Ä. À̴ Ŭ¶óÀ̾ðÆ®-¼­¹ö ¸ðµ¨¿¡¼­ÀÇ ¿¬°áÀ» Á¦ÇÑÇϴµ¥, ÀÌ´Â Application Gateway¹æ½ÄÀÇ Ä§ÀÔÂ÷´Ü½Ã½ºÅÛÀ» ¼³Ä¡ ½Ã, Ŭ¶óÀ̾ðÆ®¿¡¼­ ħÀÔÂ÷´Ü½Ã½ºÅÛÀ¸·ÎÀÇ Á¢¼Ó(Á¢¼ÓÇÏ°íÀÚ ÇÏ´Â ´ë»ó¼­¹ö¿¡ ´ëÇÑ ¡°Proxy¡± ¿ªÇÒ)°ú ħÀÔÂ÷´Ü½Ã½ºÅÛ¿¡¼­ ½ÇÁ¦ ´ë»ó¼­¹ö¿¡ ´ëÇÑ Á¢¼ÓÀÇ 2´Ü°è·Î ¿¬°áµÇ±â ¶§¹®ÀÌ´Ù.
Statful Inspection
¸ðµç ¾îÇø®ÄÉÀÌ¼Ç ·¹À̾î·ÎºÎÅÍ Security Decisions¿¡ ÇÊ¿äÇÑ »óÅ°ü·ÃÁ¤º¸¸¦ ÃßÃâ, À̸¦ µ¿Àû»óÅÂÅ×À̺í (Dynamic State Tables)·Î »ý¼º, ÀÌÈÄÀÇ Á¢¼Ó½Ãµµ¿¡ ´ëÇÑ Security Decisions¿¡ ÂüÁ¶ÇÏ´Â ¹æ½ÄÀ¸·Î µ¿ÀÛÇϸç, Packet FilteringÀÇ ³·Àº º¸¾È¼º, Application GatewayÀÇ ¿¬°áÁ¦ÇÑ, È®À强 Á¦ÇÑ µîÀÇ Á¦¾àÁ¡À» ¸ðµÎ ±Øº¹ÇÑ °¡Àå Áøº¸µÈ ¹æ½Ä
Deep Packet Inspection
Åë»ó Stateful Inspection¹æ½ÄÀÇ ¹æÈ­º® ±â¹Ý¿¡¼­ ¹æÈ­º®À» Åë°úÇÏ´Â ÆÐŶ¿¡ ´ëÇØ ¼¼¹ÐÇÑ °Ë»ç¸¦ ¼öÇàÇÏ¿© ¾ÇÀÇÀûÀÎ ÇàÀ§¸¦ ½ÃµµÇÏ´Â °ÍÀ» »çÀü¿¡ Â÷´ÜÇÏ´Â ¸ÅÄ¿´ÏÁòÀ» °¡Áö¸ç, ÆÐŶÀ» °Ë»çÇÏ´Â ¹æ½ÄÀº ´ÙÀ½°ú °°Àº °ÍµéÀÌ ÀÖ´Ù.
- Signature Inspection : ¾Ë·ÁÁø °ø°Ý¿¡ ´ëÇÑ ÆÐÅÏÀ» °¡Áö°í ŽÁö
- Behavior-based system : Á¤»óÀûÀÎ Æ®·¡ÇÈ°ú ºñÁ¤»óÀûÀÎ Æ®·¡ÇÈÀ» ÆÇ´ÜÇÏ´Â ¸ÅÄ¿´ÏÁòÀ» °¡Áö°í ŽÁö
ASG UTM Appliance Specifications
¸ðµ¨¸í ASG 110 ASG 120 ASG 220
Users 10 Unrestricted Unrestricted
Firewall Throughput
(Mbps)
4200M 1.2G 3.0G
VPN Throughput
(Mbps)
200 265 400
Concurrent
Connections
550,000 700,000 1,500,000
Policies Unrestricted Unrestricted Unrestricted
Memory 1G 2G 4G
10/100
Ethernet Ports
4 - 1
10/100/10000
Ethernet Ports
4 8 10
Security Precessor Unit (SPU) - YES YES
Form Factor 1U Rackmount 1U Rackmount 1U Rackmount
¸ðµ¨¸í ASG 320 ASG 420 ASG 525
Users 10 Unrestricted Unrestricted
Firewall
Throughput (Mbps)
100M 100M 280M
VPN Throughput
(Mbps)
30 30 150
Concurrent
Connections
60,000 60,000 400,000
Policies Unrestricted Unrestricted Unrestricted
Memory 256 256 512
10/100
Ethernet ports
3 3 8
10/100/10000
Ethernet ports
- - -
Security Precessor Unit (SPU) - - -
Form Factor - - 1U Rackmount