[lacnog] Consulta sobre cisco

Arian Trujillo Díaz atrujillo10 en gmail.com
Mie Nov 9 18:22:13 BRST 2016


Manuel, sigue la explicación de Ariel Weher que tiene mucha mas 
experiencia que yo. :)


El 09/11/2016 a las 15:19, Ariel Weher escribió:
> Hola Manuel.
>
> Quizás la solución más fácil es que aproveches las ventajas del ECMP 
> (equal cost multi path), esto se hace de form automática cuando tienes 
> dos rutas con la misma métrica, la misma distancia administrativa y la 
> misma red de destino.
>
> Si corres un IGP, esto puede llegar a hacerse sin intervención tuya al 
> ver caminos perfectamente iguales al mismo destino. Sino, vas a tener 
> que poner algunas rutas estáticas (con tracking e ip sla) para que se 
> vuelvan nulas al no responder el otro lado.
>
> Claro está, esto no sirve para interfaces bridgeadas, solo ruteadas.
>
> Cualquier cosa me contactas por unicast y te paso algunos ejemplos.
>
> Saludos!
>
> On Wed, Nov 9, 2016 at 5:14 PM, Alejandro Acosta 
> <alejandroacostaalamo en gmail.com 
> <mailto:alejandroacostaalamo en gmail.com>> wrote:
>
>     no.., esto no sería lo que estas buscando.
>
>     Tu respuesta en el mundo de Cisco es etherchannel ..., nunca lo ví
>     en routers pero si en LAN Switches. No se si exista alguna
>     solución más moderna y que yo me haya quedado en la prehistoria :-|
>
>
>     Saludos,
>
>     Ale,
>
>
>
>     El 9/11/16 a las 2:11 p.m., Alejandro Acosta escribió:
>
>         HSRP? VRRP?
>
>
>         El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro escribió:
>
>             Hola,
>             Alguien sabe como configurar un router cisco (tal vez un
>             2900 o 2800) con dos interfaces de red
>             ethernet redundantes? algo parecido a lo que llamamos en
>             linux interfaces bond?
>             Saludos,
>             Manuel Linares.
>
>             --------------------------------------------------
>             From: "Robert Guerra" <rguerra en privaterra.org
>             <mailto:rguerra en privaterra.org>>
>             Sent: Monday, November 7, 2016 2:31 PM
>             To: "Latin America and Caribbean Region Network Operators
>             Group" <lacnog en lacnic.net <mailto:lacnog en lacnic.net>>
>             Cc: "GT IPv6 LAC / LAC IPv6 TF" <lactf en lacnic.net
>             <mailto:lactf en lacnic.net>>
>             Subject: [lacnog] IGF 2016 / Se busca contactos sobre el
>             despliegue de IPv6
>
>                 Estimados colegas,
>
>
>                 Estoy organizando una session sobre IPv6 en el Foro de
>                 Governance que
>                 tendrá lugar en Mexico al mes que viene.
>
>                 Me encantaría incluir la participación de personas
>                 responsable del
>                 despliegue de IPv6 de Latin America. A continuación os
>                 incluyo detalles
>                 de la session.
>
>                 Si teneis alguna pregunta, envíame una nota.
>
>                 saludos
>
>                 Roberto
>
>
>
>                 -- 
>                 Robert Guerra
>                 Twitter: twitter.com/netfreedom
>                 <http://twitter.com/netfreedom>
>                 Email: rguerra en privaterra.org
>                 <mailto:rguerra en privaterra.org>
>                 PGP Keys : https://keybase.io/rguerra
>
>                 Details of the workshop
>                 ——————————————————————————
>
>                 IGF 2016 Workshop #6 : Can Law enforcement catch bad
>                 actors online
>                 anymore
>
>                 https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6
>                 <https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6>
>
>
>                 Description of workshop:
>
>                 The exhaustion of the IPv4 address supply has been
>                 predicted since the
>                 end of the 1980s. However, the large scale adoption of
>                 mobile devices
>                 and their associated IPv4 addressing needs accelerated
>                 the exhaustion
>                 timetable, and placed increased pressure on network
>                 operators to
>                 conserve IPv4 addresses
>
>                 This pressure has resulted in a marked increase in the
>                 use of
>                 technologies, such as Network Address Translation
>                 (NAT), that allow
>                 pools of addresses to be shared across multiple
>                 endpoints. These
>                 mechanisms enable the reuse of the limited pool of
>                 available IPv4
>                 addresses, resulting in the number of connected
>                 endpoints vastly
>                 outnumbering the number of addresses in use in the
>                 public internet.
>
>                 This has three important implications for Internet
>                 technology
>                 developers, and those who depend on certain behaviors
>                 of the technology.
>
>                 Application designers need to consider the fact that
>                 an IP address does
>                 not necessarily identify an endpoint.
>
>                 Law enforcement and forensic functions need to
>                 consider that an IP
>                 address alone may not be sufficient to correlate
>                 Internet activity
>                 observations with an endpoint; and even an IP address
>                 associated
>                 timestamp generally may not suffice.
>
>                 Data retention mechanisms and policies that record or
>                 reference an IP
>                 address need to refactor their actions and
>                 requirements to consider that
>                 in increasingly large parts of the Internet, an IP
>                 address is merely a
>                 temporary identifier. Potentially large volumes of
>                 ancillary data are
>                 required to match an IP address to an endpoint.
>
>                 Description of the plan to facilitate discussion
>                 amongst speakers,
>                 audience members and remote participants:
>
>                 The workshop will be organized as a facilitated
>                 dialogue. Led by the
>                 moderator, subject experts will debate and discuss the
>                 key questions and
>                 issues. Subject experts will give opening comments,
>                 after which the
>                 moderator will turn to those attending the session and
>                 invited experts
>                 in the audience to engage in facilitated dialogue.
>
>                 In addition to the background documents and papers
>                 that will be prepared
>                 ahead of the IGF, additional articles of interest,
>                 commissioned blogs,
>                 reference materials and social media conversations
>                 will be published and
>                 distributed ahead of the workshop.
>
>                 Speakers:
>
>                 The experts listed below have accepted the invitation
>                 to participate in
>                 the session. They are drawn from the Law Enforcement,
>                 Government,
>                 Academia, Civil Society, The Technical Community and
>                 Private sector
>                 stakeholder groups. A facilitated dialogue will be
>                 organized so that
>                 these experts can bring their knowledge and
>                 perspective to discuss and
>                 debate the challenges brought by IPv4 exhaustion and
>                 the challenges and
>                 opportunities presented by IPv6 adoption.
>
>                 (1) Jeffrey R. Bedser is the founder and CEO of
>                 iThreat Cyber Group
>                 www.ithreat.com <http://www.ithreat.com>. Mr. Bedser
>                 has led ICG on its journey from an internet
>                 investigative firm to a technology driven threat
>                 Intelligence Company.
>                 ICG was formed in 1997 as Internet Crimes Group. Mr.
>                 Bedser has been a
>                 facilitator, panelist and speaker for organizations
>                 such as POLCYB, ASIS
>                 International, Infragard, HTCIA, The Conference Board,
>                 ICANN and the FBI
>                 Training Academy at Quantico. Mr. Bedser has received
>                 media coverage on
>                 multiple occasions discussing topics surrounding
>                 cyber-crime and cyber
>                 security.
>
>                 For the session, Jeff will help present an overview of
>                 the current
>                 challenges being faced by cyber investigators as IPv4
>                 addresses are
>                 exhausted and the transition to a wider deployment of
>                 IPv6 takes place.
>
>
>                 (2) John Curran is considered an Internet and
>                 telecommunications
>                 industry expert. Curran was one of the founding
>                 members and is the
>                 current President and Chief Executive Officer of the
>                 American Registry
>                 for Internet Numbers (ARIN), a Regional Internet
>                 Registry (RIR). He is
>                 also a Principal Associate at Isotropic, LLC., a
>                 cybersecurity and
>                 telecommunications service provider. Curran actively
>                 participates in the
>                 activities of the Internet Engineering Task Force
>                 (IETF) and has served
>                 as co-chairman of the Operations and Network
>                 Management Area and member
>                 of IPng (IPv6) Directorate.
>
>                 For the session, John will bring the North American
>                 Regional Internet
>                 Registry perspective to the conversation.
>
>                 (3) Laura DeNardis is an American author and a
>                 globally recognized
>                 scholar of Internet governance and technical
>                 infrastructure. She is a
>                 tenured Professor and Associate Dean in the School of
>                 Communication at
>                 American University. She is a Senior Fellow of the
>                 Centre for
>                 International Governance Innovation (CIGI) and serves
>                 as the Director of
>                 Research for the Global Commission on Internet
>                 Governance. With a
>                 background in Information engineering and a doctorate
>                 in Science and
>                 Technology Studies (STS), her research studies the
>                 social and political
>                 implications of Internet technical architecture and
>                 governance.
>
>                 She is an appointed member of the U.S. Department of
>                 State Advisory
>                 Committee on International Communications and
>                 Information Policy
>                 (ACICIP). She has more than two decades of experience
>                 as an expert
>                 consultant in Internet Governance to Fortune 500
>                 companies, foundations,
>                 and government agencies.
>
>                 For the session, Laura will bring an academic and
>                 research perspective
>                 to the conversation
>
>                 (4) Robert Flaim has been a Supervisory Special Agent
>                 (SSA) for the
>                 Federal Bureau of Investigation for over seventeen
>                 (17) years.
>                 Currently, SSA Flaim is assigned to the Executive
>                 Staff Unit of the
>                 Operational Technology Division in Quantico, Virginia.
>                 Since 2004, Mr.
>                 Flaim has worked on Internet Governance efforts with
>                 the Internet
>                 Corporation of Assigned Names and Numbers (ICANN) and
>                 Regional Internet
>                 Registries, i.e., ARIN, RIPE NCC, the Internet
>                 Engineering Task Force
>                 and other Internet Governance organizations, to foster
>                 Internet policies
>                 and practices that ensure effective international law
>                 enforcement
>                 investigations. Prior to his current position, Mr.
>                 Flaim worked at the
>                 FBI Washington Field Office on cyber and counterterrorism
>                 investigations.
>
>                 Bobby will bring a US and international law
>                 enforcement perspective to
>                 the conversation and dialogue. As well, Robert will
>                 bring a unique
>                 first-hand familiarity of urgent cyber investigations
>                 to to discussion.
>
>                 (4) Athina Fragkouli is the Legal Counsel at the RIPE
>                 Network
>                 Coordination Centre (NCC), where she is responsible
>                 for all legal
>                 aspects of the organisation. She defines the RIPE NCC
>                 legal framework,
>                 provides advice, and gives legal support for all RIPE
>                 NCC activities.
>                 Athina works with a variety of Internet stakeholders
>                 such as network
>                 operators, governments, and Law Enforcement Agencies
>                 (LEA). She also
>                 represents the RIPE NCC in a variety of fora such as
>                 technical meetings
>                 and EU-organised events.
>
>                 Athina - Will bring a European Regional Internet
>                 Registry perspective to
>                 the panel. As well she will bring a rights based,
>                 european and privacy
>                 perspective to the conversation.
>
>                 (5) Merike Kaeo is a recognized global expert in
>                 information security
>                 and author of “Designing Network Security.” Prior to
>                 joining
>                 Farsight Security, Merike served as Chief Information
>                 Security Officer
>                 for Internet Identity (IID), where she was responsible
>                 for maintaining
>                 IID’s vision and ensuring the company’s sensitive
>                 information and
>                 technologies are protected. Prior to joining IID,
>                 Merike founded Double
>                 Shot Security, which provided strategic and
>                 operational guidance to
>                 secure Fortune 100 companies. She led the first
>                 security initiative for
>                 Cisco in the mid-1990s. Merike is on ICANN’s Security
>                 and Stability
>                 Advisory Council (SSAC) and the FCC’s Communications
>                 Security,
>                 Reliability and Interoperability Council (CSRIC). She
>                 earned a MSEE from
>                 George Washington University and a BSEE from Rutgers
>                 University.
>
>
>                 (6) Dick Leaning has over 28 years’ experience in Law
>                 Enforcement,
>                 leading teams of investigators in the Metropolitan
>                 Police Service
>                 (London), UK National Crime Squad (NCS) and the
>                 Serious Organised Crime
>                 Agency (SOCA) and from 2009 within SOCA’s Cyber Crime
>                 Department. Dick
>                 has been the UK representative at the G8 High-Tech
>                 Crime subgroup of
>                 senior experts and Interpol’s European High-Tech Crime
>                 Working Group
>                 with responsibility for enhancing the abilities of law
>                 enforcement.
>                 Based in The Hague since September 2011, Dick joined
>                 the United Kingdom
>                 Liaison Bureau (UKLB) desk as a Europol Cyber Liaison
>                 officer, and has
>                 recently taken on the role of Seconded National Expert
>                 attached to the
>                 European Cybercrime Center (EC3) at Europol. In his
>                 current role, Dick
>                 has responsibility for Internet Community Engagement
>                 through which he
>                 hopes to achieve significant dialogue with the Internet’s
>                 multi-stakeholders and Law Enforcement, to work in
>                 partnership to
>                 prevent, disrupt and prosecute cyber criminals.
>
>                 Richard will bring a Internet Registry, Law
>                 Enforcement and
>                 International Cyber Investigation perspective to the
>                 conversation and
>                 dialogue.
>
>
>                 (7) Ben Butler has been with Go Daddy since 2001. In
>                 2002, He formed the
>                 Go Daddy Abuse Department, and served as Director of
>                 Network Abuse for
>                 over 10 years. In this role, Ben helped create and
>                 enforce company and
>                 public policies dealing with every form of potential
>                 abuse that happens
>                 online, including spam, phishing, identity theft,
>                 copyright
>                 infringements, cyberbullying, child exploitation
>                 issues, and rogue
>                 internet pharmacies. He recently took on a new role as
>                 Director of the
>                 Digital Crimes Unit. Ben comes from a strong technical
>                 background
>                 including several years as a network and email
>                 administrator, and has
>                 experience in customer service, business management,
>                 and marketing.
>
>                 Ben will bring a registrar perspective to the
>                 conversation and dialogue.
>
>
>                 Description of the proposer's plans for remote
>                 participation
>
>                 The workshop will be organized as a facilitated
>                 dialogue. Led by the
>                 moderator, subject experts will debate and discuss the
>                 key questions and
>                 issues. Subject experts will give opening comments,
>                 after which the
>                 moderator will turn to those attending the session and
>                 invited experts
>                 in the audience to engage in facilitated dialogue.
>
>                 Background paper (attached)
>
>
>
>
>                 _______________________________________________
>                 LACNOG mailing list
>                 LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
>                 https://mail.lacnic.net/mailman/listinfo/lacnog
>                 <https://mail.lacnic.net/mailman/listinfo/lacnog>
>                 Cancelar suscripcion:
>                 https://mail.lacnic.net/mailman/options/lacnog
>                 <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>             *  *  *  *  *
>             Universidad de Granma
>             http://www.udg.co.cu
>
>             Participe en el VI Congreso Cubano de Desarrollo Local,
>             Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
>             30 de marzo de 2017.
>             _______________________________________________
>             LACNOG mailing list
>             LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
>             https://mail.lacnic.net/mailman/listinfo/lacnog
>             <https://mail.lacnic.net/mailman/listinfo/lacnog>
>             Cancelar suscripcion:
>             https://mail.lacnic.net/mailman/options/lacnog
>             <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>
>     _______________________________________________
>     LACNOG mailing list
>     LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
>     https://mail.lacnic.net/mailman/listinfo/lacnog
>     <https://mail.lacnic.net/mailman/listinfo/lacnog>
>     Cancelar suscripcion:
>     https://mail.lacnic.net/mailman/options/lacnog
>     <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>
>
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net
> https://mail.lacnic.net/mailman/listinfo/lacnog
> Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog

------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/lacnog/attachments/20161109/d185b76c/attachment.html>


Más información sobre la lista de distribución LACNOG