[lacnog] Consulta sobre cisco

Arian Trujillo Díaz atrujillo10 en gmail.com
Mie Nov 9 18:17:36 BRST 2016


Si se llama Etherchannel, pero gestiona el protocolo LACP u 802.3ad


El 09/11/2016 a las 15:14, Alejandro Acosta escribió:
> no.., esto no sería lo que estas buscando.
>
> Tu respuesta en el mundo de Cisco es etherchannel ..., nunca lo ví en 
> routers pero si en LAN Switches. No se si exista alguna solución más 
> moderna y que yo me haya quedado en la prehistoria :-|
>
>
> Saludos,
>
> Ale,
>
>
>
> El 9/11/16 a las 2:11 p.m., Alejandro Acosta escribió:
>> HSRP? VRRP?
>>
>>
>> El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro escribió:
>>> Hola,
>>> Alguien sabe como configurar un router cisco (tal vez un 2900 o 
>>> 2800) con dos interfaces de red
>>> ethernet redundantes? algo parecido a lo que llamamos en linux 
>>> interfaces bond?
>>> Saludos,
>>> Manuel Linares.
>>>
>>> --------------------------------------------------
>>> From: "Robert Guerra" <rguerra en privaterra.org>
>>> Sent: Monday, November 7, 2016 2:31 PM
>>> To: "Latin America and Caribbean Region Network Operators Group" 
>>> <lacnog en lacnic.net>
>>> Cc: "GT IPv6 LAC / LAC IPv6 TF" <lactf en lacnic.net>
>>> Subject: [lacnog] IGF 2016 / Se busca contactos sobre el despliegue 
>>> de IPv6
>>>
>>>> Estimados colegas,
>>>>
>>>>
>>>> Estoy organizando una session sobre IPv6 en el Foro de Governance que
>>>> tendrá lugar en Mexico al mes que viene.
>>>>
>>>> Me encantaría incluir la participación de personas responsable del
>>>> despliegue de IPv6 de Latin America. A continuación os incluyo 
>>>> detalles
>>>> de la session.
>>>>
>>>> Si teneis alguna pregunta, envíame una nota.
>>>>
>>>> saludos
>>>>
>>>> Roberto
>>>>
>>>>
>>>>
>>>> -- 
>>>> Robert Guerra
>>>> Twitter: twitter.com/netfreedom
>>>> Email: rguerra en privaterra.org
>>>> PGP Keys : https://keybase.io/rguerra
>>>>
>>>> Details of the workshop
>>>> ——————————————————————————
>>>>
>>>> IGF 2016 Workshop #6 : Can Law enforcement catch bad actors online
>>>> anymore
>>>>
>>>> https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6 
>>>>
>>>>
>>>> Description of workshop:
>>>>
>>>> The exhaustion of the IPv4 address supply has been predicted since the
>>>> end of the 1980s. However, the large scale adoption of mobile devices
>>>> and their associated IPv4 addressing needs accelerated the exhaustion
>>>> timetable, and placed increased pressure on network operators to
>>>> conserve IPv4 addresses
>>>>
>>>> This pressure has resulted in a marked increase in the use of
>>>> technologies, such as Network Address Translation (NAT), that allow
>>>> pools of addresses to be shared across multiple endpoints. These
>>>> mechanisms enable the reuse of the limited pool of available IPv4
>>>> addresses, resulting in the number of connected endpoints vastly
>>>> outnumbering the number of addresses in use in the public internet.
>>>>
>>>> This has three important implications for Internet technology
>>>> developers, and those who depend on certain behaviors of the 
>>>> technology.
>>>>
>>>> Application designers need to consider the fact that an IP address 
>>>> does
>>>> not necessarily identify an endpoint.
>>>>
>>>> Law enforcement and forensic functions need to consider that an IP
>>>> address alone may not be sufficient to correlate Internet activity
>>>> observations with an endpoint; and even an IP address associated
>>>> timestamp generally may not suffice.
>>>>
>>>> Data retention mechanisms and policies that record or reference an IP
>>>> address need to refactor their actions and requirements to consider 
>>>> that
>>>> in increasingly large parts of the Internet, an IP address is merely a
>>>> temporary identifier. Potentially large volumes of ancillary data are
>>>> required to match an IP address to an endpoint.
>>>>
>>>> Description of the plan to facilitate discussion amongst speakers,
>>>> audience members and remote participants:
>>>>
>>>> The workshop will be organized as a facilitated dialogue. Led by the
>>>> moderator, subject experts will debate and discuss the key 
>>>> questions and
>>>> issues. Subject experts will give opening comments, after which the
>>>> moderator will turn to those attending the session and invited experts
>>>> in the audience to engage in facilitated dialogue.
>>>>
>>>> In addition to the background documents and papers that will be 
>>>> prepared
>>>> ahead of the IGF, additional articles of interest, commissioned blogs,
>>>> reference materials and social media conversations will be 
>>>> published and
>>>> distributed ahead of the workshop.
>>>>
>>>> Speakers:
>>>>
>>>> The experts listed below have accepted the invitation to 
>>>> participate in
>>>> the session. They are drawn from the Law Enforcement, Government,
>>>> Academia, Civil Society, The Technical Community and Private sector
>>>> stakeholder groups. A facilitated dialogue will be organized so that
>>>> these experts can bring their knowledge and perspective to discuss and
>>>> debate the challenges brought by IPv4 exhaustion and the challenges 
>>>> and
>>>> opportunities presented by IPv6 adoption.
>>>>
>>>> (1) Jeffrey R. Bedser is the founder and CEO of iThreat Cyber Group
>>>> www.ithreat.com. Mr. Bedser has led ICG on its journey from an 
>>>> internet
>>>> investigative firm to a technology driven threat Intelligence Company.
>>>> ICG was formed in 1997 as Internet Crimes Group. Mr. Bedser has been a
>>>> facilitator, panelist and speaker for organizations such as POLCYB, 
>>>> ASIS
>>>> International, Infragard, HTCIA, The Conference Board, ICANN and 
>>>> the FBI
>>>> Training Academy at Quantico. Mr. Bedser has received media 
>>>> coverage on
>>>> multiple occasions discussing topics surrounding cyber-crime and cyber
>>>> security.
>>>>
>>>> For the session, Jeff will help present an overview of the current
>>>> challenges being faced by cyber investigators as IPv4 addresses are
>>>> exhausted and the transition to a wider deployment of IPv6 takes 
>>>> place.
>>>>
>>>>
>>>> (2) John Curran is considered an Internet and telecommunications
>>>> industry expert. Curran was one of the founding members and is the
>>>> current President and Chief Executive Officer of the American Registry
>>>> for Internet Numbers (ARIN), a Regional Internet Registry (RIR). He is
>>>> also a Principal Associate at Isotropic, LLC., a cybersecurity and
>>>> telecommunications service provider. Curran actively participates 
>>>> in the
>>>> activities of the Internet Engineering Task Force (IETF) and has 
>>>> served
>>>> as co-chairman of the Operations and Network Management Area and 
>>>> member
>>>> of IPng (IPv6) Directorate.
>>>>
>>>> For the session, John will bring the North American Regional Internet
>>>> Registry perspective to the conversation.
>>>>
>>>> (3) Laura DeNardis is an American author and a globally recognized
>>>> scholar of Internet governance and technical infrastructure. She is a
>>>> tenured Professor and Associate Dean in the School of Communication at
>>>> American University. She is a Senior Fellow of the Centre for
>>>> International Governance Innovation (CIGI) and serves as the 
>>>> Director of
>>>> Research for the Global Commission on Internet Governance. With a
>>>> background in Information engineering and a doctorate in Science and
>>>> Technology Studies (STS), her research studies the social and 
>>>> political
>>>> implications of Internet technical architecture and governance.
>>>>
>>>> She is an appointed member of the U.S. Department of State Advisory
>>>> Committee on International Communications and Information Policy
>>>> (ACICIP). She has more than two decades of experience as an expert
>>>> consultant in Internet Governance to Fortune 500 companies, 
>>>> foundations,
>>>> and government agencies.
>>>>
>>>> For the session, Laura will bring an academic and research perspective
>>>> to the conversation
>>>>
>>>> (4) Robert Flaim has been a Supervisory Special Agent (SSA) for the
>>>> Federal Bureau of Investigation for over seventeen (17) years.
>>>> Currently, SSA Flaim is assigned to the Executive Staff Unit of the
>>>> Operational Technology Division in Quantico, Virginia. Since 2004, Mr.
>>>> Flaim has worked on Internet Governance efforts with the Internet
>>>> Corporation of Assigned Names and Numbers (ICANN) and Regional 
>>>> Internet
>>>> Registries, i.e., ARIN, RIPE NCC, the Internet Engineering Task Force
>>>> and other Internet Governance organizations, to foster Internet 
>>>> policies
>>>> and practices that ensure effective international law enforcement
>>>> investigations. Prior to his current position, Mr. Flaim worked at the
>>>> FBI Washington Field Office on cyber and counterterrorism
>>>> investigations.
>>>>
>>>> Bobby will bring a US and international law enforcement perspective to
>>>> the conversation and dialogue. As well, Robert will bring a unique
>>>> first-hand familiarity of urgent cyber investigations to to 
>>>> discussion.
>>>>
>>>> (4) Athina Fragkouli is the Legal Counsel at the RIPE Network
>>>> Coordination Centre (NCC), where she is responsible for all legal
>>>> aspects of the organisation. She defines the RIPE NCC legal framework,
>>>> provides advice, and gives legal support for all RIPE NCC activities.
>>>> Athina works with a variety of Internet stakeholders such as network
>>>> operators, governments, and Law Enforcement Agencies (LEA). She also
>>>> represents the RIPE NCC in a variety of fora such as technical 
>>>> meetings
>>>> and EU-organised events.
>>>>
>>>> Athina - Will bring a European Regional Internet Registry 
>>>> perspective to
>>>> the panel. As well she will bring a rights based, european and privacy
>>>> perspective to the conversation.
>>>>
>>>> (5) Merike Kaeo is a recognized global expert in information security
>>>> and author of “Designing Network Security.” Prior to joining
>>>> Farsight Security, Merike served as Chief Information Security Officer
>>>> for Internet Identity (IID), where she was responsible for maintaining
>>>> IID’s vision and ensuring the company’s sensitive information and
>>>> technologies are protected. Prior to joining IID, Merike founded 
>>>> Double
>>>> Shot Security, which provided strategic and operational guidance to
>>>> secure Fortune 100 companies. She led the first security initiative 
>>>> for
>>>> Cisco in the mid-1990s. Merike is on ICANN’s Security and Stability
>>>> Advisory Council (SSAC) and the FCC’s Communications Security,
>>>> Reliability and Interoperability Council (CSRIC). She earned a MSEE 
>>>> from
>>>> George Washington University and a BSEE from Rutgers University.
>>>>
>>>>
>>>> (6) Dick Leaning has over 28 years’ experience in Law Enforcement,
>>>> leading teams of investigators in the Metropolitan Police Service
>>>> (London), UK National Crime Squad (NCS) and the Serious Organised 
>>>> Crime
>>>> Agency (SOCA) and from 2009 within SOCA’s Cyber Crime Department. Dick
>>>> has been the UK representative at the G8 High-Tech Crime subgroup of
>>>> senior experts and Interpol’s European High-Tech Crime Working Group
>>>> with responsibility for enhancing the abilities of law enforcement.
>>>> Based in The Hague since September 2011, Dick joined the United 
>>>> Kingdom
>>>> Liaison Bureau (UKLB) desk as a Europol Cyber Liaison officer, and has
>>>> recently taken on the role of Seconded National Expert attached to the
>>>> European Cybercrime Center (EC3) at Europol. In his current role, Dick
>>>> has responsibility for Internet Community Engagement through which he
>>>> hopes to achieve significant dialogue with the Internet’s
>>>> multi-stakeholders and Law Enforcement, to work in partnership to
>>>> prevent, disrupt and prosecute cyber criminals.
>>>>
>>>> Richard will bring a Internet Registry, Law Enforcement and
>>>> International Cyber Investigation perspective to the conversation and
>>>> dialogue.
>>>>
>>>>
>>>> (7) Ben Butler has been with Go Daddy since 2001. In 2002, He 
>>>> formed the
>>>> Go Daddy Abuse Department, and served as Director of Network Abuse for
>>>> over 10 years. In this role, Ben helped create and enforce company and
>>>> public policies dealing with every form of potential abuse that 
>>>> happens
>>>> online, including spam, phishing, identity theft, copyright
>>>> infringements, cyberbullying, child exploitation issues, and rogue
>>>> internet pharmacies. He recently took on a new role as Director of the
>>>> Digital Crimes Unit. Ben comes from a strong technical background
>>>> including several years as a network and email administrator, and has
>>>> experience in customer service, business management, and marketing.
>>>>
>>>> Ben will bring a registrar perspective to the conversation and 
>>>> dialogue.
>>>>
>>>>
>>>> Description of the proposer's plans for remote participation
>>>>
>>>> The workshop will be organized as a facilitated dialogue. Led by the
>>>> moderator, subject experts will debate and discuss the key 
>>>> questions and
>>>> issues. Subject experts will give opening comments, after which the
>>>> moderator will turn to those attending the session and invited experts
>>>> in the audience to engage in facilitated dialogue.
>>>>
>>>> Background paper (attached)
>>>>
>>>
>>>
>>>
>>>> _______________________________________________
>>>> LACNOG mailing list
>>>> LACNOG en lacnic.net
>>>> https://mail.lacnic.net/mailman/listinfo/lacnog
>>>> Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog
>>>>
>>>
>>> *  *  *  *  *
>>> Universidad de Granma
>>> http://www.udg.co.cu
>>>
>>> Participe en el VI Congreso Cubano de Desarrollo Local,
>>> Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
>>> 30 de marzo de 2017.
>>> _______________________________________________
>>> LACNOG mailing list
>>> LACNOG en lacnic.net
>>> https://mail.lacnic.net/mailman/listinfo/lacnog
>>> Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog
>>
>
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net
> https://mail.lacnic.net/mailman/listinfo/lacnog
> Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog




Más información sobre la lista de distribución LACNOG