[lacnog] Consulta sobre cisco

Arian Trujillo Díaz atrujillo10 en gmail.com
Mie Nov 9 18:19:25 BRST 2016


Funciona igual, lo mismo entre dispositivos, que hacia servidores con bond


El 09/11/2016 a las 15:17, Jose Mario Alvarado Nunez escribió:
> Pero HSRP y VRRP no funcionan como redundante en un mismo router como 
> esos, solo para dos routers. O me equivoco? nunca lo he intentando.
>
> 2016-11-09 14:11 GMT-06:00 Alejandro Acosta 
> <alejandroacostaalamo en gmail.com <mailto:alejandroacostaalamo en gmail.com>>:
>
>     HSRP? VRRP?
>
>
>     El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro escribió:
>
>         Hola,
>         Alguien sabe como configurar un router cisco (tal vez un 2900
>         o 2800) con dos interfaces de red
>         ethernet redundantes? algo parecido a lo que llamamos en linux
>         interfaces bond?
>         Saludos,
>         Manuel Linares.
>
>         --------------------------------------------------
>         From: "Robert Guerra" <rguerra en privaterra.org
>         <mailto:rguerra en privaterra.org>>
>         Sent: Monday, November 7, 2016 2:31 PM
>         To: "Latin America and Caribbean Region Network Operators
>         Group" <lacnog en lacnic.net <mailto:lacnog en lacnic.net>>
>         Cc: "GT IPv6 LAC / LAC IPv6 TF" <lactf en lacnic.net
>         <mailto:lactf en lacnic.net>>
>         Subject: [lacnog] IGF 2016 / Se busca contactos sobre el
>         despliegue de IPv6
>
>             Estimados colegas,
>
>
>             Estoy organizando una session sobre IPv6 en el Foro de
>             Governance que
>             tendrá lugar en Mexico al mes que viene.
>
>             Me encantaría incluir la participación de personas
>             responsable del
>             despliegue de IPv6 de Latin America. A continuación os
>             incluyo detalles
>             de la session.
>
>             Si teneis alguna pregunta, envíame una nota.
>
>             saludos
>
>             Roberto
>
>
>
>             -- 
>             Robert Guerra
>             Twitter: twitter.com/netfreedom
>             <http://twitter.com/netfreedom>
>             Email: rguerra en privaterra.org <mailto:rguerra en privaterra.org>
>             PGP Keys : https://keybase.io/rguerra
>
>             Details of the workshop
>             ——————————————————————————
>
>             IGF 2016 Workshop #6 : Can Law enforcement catch bad
>             actors online
>             anymore
>
>             https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6
>             <https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6>
>
>             Description of workshop:
>
>             The exhaustion of the IPv4 address supply has been
>             predicted since the
>             end of the 1980s. However, the large scale adoption of
>             mobile devices
>             and their associated IPv4 addressing needs accelerated the
>             exhaustion
>             timetable, and placed increased pressure on network
>             operators to
>             conserve IPv4 addresses
>
>             This pressure has resulted in a marked increase in the use of
>             technologies, such as Network Address Translation (NAT),
>             that allow
>             pools of addresses to be shared across multiple endpoints.
>             These
>             mechanisms enable the reuse of the limited pool of
>             available IPv4
>             addresses, resulting in the number of connected endpoints
>             vastly
>             outnumbering the number of addresses in use in the public
>             internet.
>
>             This has three important implications for Internet technology
>             developers, and those who depend on certain behaviors of
>             the technology.
>
>             Application designers need to consider the fact that an IP
>             address does
>             not necessarily identify an endpoint.
>
>             Law enforcement and forensic functions need to consider
>             that an IP
>             address alone may not be sufficient to correlate Internet
>             activity
>             observations with an endpoint; and even an IP address
>             associated
>             timestamp generally may not suffice.
>
>             Data retention mechanisms and policies that record or
>             reference an IP
>             address need to refactor their actions and requirements to
>             consider that
>             in increasingly large parts of the Internet, an IP address
>             is merely a
>             temporary identifier. Potentially large volumes of
>             ancillary data are
>             required to match an IP address to an endpoint.
>
>             Description of the plan to facilitate discussion amongst
>             speakers,
>             audience members and remote participants:
>
>             The workshop will be organized as a facilitated dialogue.
>             Led by the
>             moderator, subject experts will debate and discuss the key
>             questions and
>             issues. Subject experts will give opening comments, after
>             which the
>             moderator will turn to those attending the session and
>             invited experts
>             in the audience to engage in facilitated dialogue.
>
>             In addition to the background documents and papers that
>             will be prepared
>             ahead of the IGF, additional articles of interest,
>             commissioned blogs,
>             reference materials and social media conversations will be
>             published and
>             distributed ahead of the workshop.
>
>             Speakers:
>
>             The experts listed below have accepted the invitation to
>             participate in
>             the session. They are drawn from the Law Enforcement,
>             Government,
>             Academia, Civil Society, The Technical Community and
>             Private sector
>             stakeholder groups. A facilitated dialogue will be
>             organized so that
>             these experts can bring their knowledge and perspective to
>             discuss and
>             debate the challenges brought by IPv4 exhaustion and the
>             challenges and
>             opportunities presented by IPv6 adoption.
>
>             (1) Jeffrey R. Bedser is the founder and CEO of iThreat
>             Cyber Group
>             www.ithreat.com <http://www.ithreat.com>. Mr. Bedser has
>             led ICG on its journey from an internet
>             investigative firm to a technology driven threat
>             Intelligence Company.
>             ICG was formed in 1997 as Internet Crimes Group. Mr.
>             Bedser has been a
>             facilitator, panelist and speaker for organizations such
>             as POLCYB, ASIS
>             International, Infragard, HTCIA, The Conference Board,
>             ICANN and the FBI
>             Training Academy at Quantico. Mr. Bedser has received
>             media coverage on
>             multiple occasions discussing topics surrounding
>             cyber-crime and cyber
>             security.
>
>             For the session, Jeff will help present an overview of the
>             current
>             challenges being faced by cyber investigators as IPv4
>             addresses are
>             exhausted and the transition to a wider deployment of IPv6
>             takes place.
>
>
>             (2) John Curran is considered an Internet and
>             telecommunications
>             industry expert. Curran was one of the founding members
>             and is the
>             current President and Chief Executive Officer of the
>             American Registry
>             for Internet Numbers (ARIN), a Regional Internet Registry
>             (RIR). He is
>             also a Principal Associate at Isotropic, LLC., a
>             cybersecurity and
>             telecommunications service provider. Curran actively
>             participates in the
>             activities of the Internet Engineering Task Force (IETF)
>             and has served
>             as co-chairman of the Operations and Network Management
>             Area and member
>             of IPng (IPv6) Directorate.
>
>             For the session, John will bring the North American
>             Regional Internet
>             Registry perspective to the conversation.
>
>             (3) Laura DeNardis is an American author and a globally
>             recognized
>             scholar of Internet governance and technical
>             infrastructure. She is a
>             tenured Professor and Associate Dean in the School of
>             Communication at
>             American University. She is a Senior Fellow of the Centre for
>             International Governance Innovation (CIGI) and serves as
>             the Director of
>             Research for the Global Commission on Internet Governance.
>             With a
>             background in Information engineering and a doctorate in
>             Science and
>             Technology Studies (STS), her research studies the social
>             and political
>             implications of Internet technical architecture and
>             governance.
>
>             She is an appointed member of the U.S. Department of State
>             Advisory
>             Committee on International Communications and Information
>             Policy
>             (ACICIP). She has more than two decades of experience as
>             an expert
>             consultant in Internet Governance to Fortune 500
>             companies, foundations,
>             and government agencies.
>
>             For the session, Laura will bring an academic and research
>             perspective
>             to the conversation
>
>             (4) Robert Flaim has been a Supervisory Special Agent
>             (SSA) for the
>             Federal Bureau of Investigation for over seventeen (17) years.
>             Currently, SSA Flaim is assigned to the Executive Staff
>             Unit of the
>             Operational Technology Division in Quantico, Virginia.
>             Since 2004, Mr.
>             Flaim has worked on Internet Governance efforts with the
>             Internet
>             Corporation of Assigned Names and Numbers (ICANN) and
>             Regional Internet
>             Registries, i.e., ARIN, RIPE NCC, the Internet Engineering
>             Task Force
>             and other Internet Governance organizations, to foster
>             Internet policies
>             and practices that ensure effective international law
>             enforcement
>             investigations. Prior to his current position, Mr. Flaim
>             worked at the
>             FBI Washington Field Office on cyber and counterterrorism
>             investigations.
>
>             Bobby will bring a US and international law enforcement
>             perspective to
>             the conversation and dialogue. As well, Robert will bring
>             a unique
>             first-hand familiarity of urgent cyber investigations to
>             to discussion.
>
>             (4) Athina Fragkouli is the Legal Counsel at the RIPE Network
>             Coordination Centre (NCC), where she is responsible for
>             all legal
>             aspects of the organisation. She defines the RIPE NCC
>             legal framework,
>             provides advice, and gives legal support for all RIPE NCC
>             activities.
>             Athina works with a variety of Internet stakeholders such
>             as network
>             operators, governments, and Law Enforcement Agencies
>             (LEA). She also
>             represents the RIPE NCC in a variety of fora such as
>             technical meetings
>             and EU-organised events.
>
>             Athina - Will bring a European Regional Internet Registry
>             perspective to
>             the panel. As well she will bring a rights based, european
>             and privacy
>             perspective to the conversation.
>
>             (5) Merike Kaeo is a recognized global expert in
>             information security
>             and author of “Designing Network Security.” Prior to joining
>             Farsight Security, Merike served as Chief Information
>             Security Officer
>             for Internet Identity (IID), where she was responsible for
>             maintaining
>             IID’s vision and ensuring the company’s sensitive
>             information and
>             technologies are protected. Prior to joining IID, Merike
>             founded Double
>             Shot Security, which provided strategic and operational
>             guidance to
>             secure Fortune 100 companies. She led the first security
>             initiative for
>             Cisco in the mid-1990s. Merike is on ICANN’s Security and
>             Stability
>             Advisory Council (SSAC) and the FCC’s Communications Security,
>             Reliability and Interoperability Council (CSRIC). She
>             earned a MSEE from
>             George Washington University and a BSEE from Rutgers
>             University.
>
>
>             (6) Dick Leaning has over 28 years’ experience in Law
>             Enforcement,
>             leading teams of investigators in the Metropolitan Police
>             Service
>             (London), UK National Crime Squad (NCS) and the Serious
>             Organised Crime
>             Agency (SOCA) and from 2009 within SOCA’s Cyber Crime
>             Department. Dick
>             has been the UK representative at the G8 High-Tech Crime
>             subgroup of
>             senior experts and Interpol’s European High-Tech Crime
>             Working Group
>             with responsibility for enhancing the abilities of law
>             enforcement.
>             Based in The Hague since September 2011, Dick joined the
>             United Kingdom
>             Liaison Bureau (UKLB) desk as a Europol Cyber Liaison
>             officer, and has
>             recently taken on the role of Seconded National Expert
>             attached to the
>             European Cybercrime Center (EC3) at Europol. In his
>             current role, Dick
>             has responsibility for Internet Community Engagement
>             through which he
>             hopes to achieve significant dialogue with the Internet’s
>             multi-stakeholders and Law Enforcement, to work in
>             partnership to
>             prevent, disrupt and prosecute cyber criminals.
>
>             Richard will bring a Internet Registry, Law Enforcement and
>             International Cyber Investigation perspective to the
>             conversation and
>             dialogue.
>
>
>             (7) Ben Butler has been with Go Daddy since 2001. In 2002,
>             He formed the
>             Go Daddy Abuse Department, and served as Director of
>             Network Abuse for
>             over 10 years. In this role, Ben helped create and enforce
>             company and
>             public policies dealing with every form of potential abuse
>             that happens
>             online, including spam, phishing, identity theft, copyright
>             infringements, cyberbullying, child exploitation issues,
>             and rogue
>             internet pharmacies. He recently took on a new role as
>             Director of the
>             Digital Crimes Unit. Ben comes from a strong technical
>             background
>             including several years as a network and email
>             administrator, and has
>             experience in customer service, business management, and
>             marketing.
>
>             Ben will bring a registrar perspective to the conversation
>             and dialogue.
>
>
>             Description of the proposer's plans for remote participation
>
>             The workshop will be organized as a facilitated dialogue.
>             Led by the
>             moderator, subject experts will debate and discuss the key
>             questions and
>             issues. Subject experts will give opening comments, after
>             which the
>             moderator will turn to those attending the session and
>             invited experts
>             in the audience to engage in facilitated dialogue.
>
>             Background paper (attached)
>
>
>
>
>             _______________________________________________
>             LACNOG mailing list
>             LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
>             https://mail.lacnic.net/mailman/listinfo/lacnog
>             <https://mail.lacnic.net/mailman/listinfo/lacnog>
>             Cancelar suscripcion:
>             https://mail.lacnic.net/mailman/options/lacnog
>             <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>         *  *  *  *  *
>         Universidad de Granma
>         http://www.udg.co.cu
>
>         Participe en el VI Congreso Cubano de Desarrollo Local,
>         Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
>         30 de marzo de 2017.
>         _______________________________________________
>         LACNOG mailing list
>         LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
>         https://mail.lacnic.net/mailman/listinfo/lacnog
>         <https://mail.lacnic.net/mailman/listinfo/lacnog>
>         Cancelar suscripcion:
>         https://mail.lacnic.net/mailman/options/lacnog
>         <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>     _______________________________________________
>     LACNOG mailing list
>     LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
>     https://mail.lacnic.net/mailman/listinfo/lacnog
>     <https://mail.lacnic.net/mailman/listinfo/lacnog>
>     Cancelar suscripcion:
>     https://mail.lacnic.net/mailman/options/lacnog
>     <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>
>
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net
> https://mail.lacnic.net/mailman/listinfo/lacnog
> Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog

------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/lacnog/attachments/20161109/8e1fcf48/attachment.html>


Más información sobre la lista de distribución LACNOG