[lacnog] Consulta sobre cisco
Arian Trujillo Díaz
atrujillo10 en gmail.com
Mie Nov 9 18:22:13 BRST 2016
Manuel, sigue la explicación de Ariel Weher que tiene mucha mas
experiencia que yo. :)
El 09/11/2016 a las 15:19, Ariel Weher escribió:
> Hola Manuel.
>
> Quizás la solución más fácil es que aproveches las ventajas del ECMP
> (equal cost multi path), esto se hace de form automática cuando tienes
> dos rutas con la misma métrica, la misma distancia administrativa y la
> misma red de destino.
>
> Si corres un IGP, esto puede llegar a hacerse sin intervención tuya al
> ver caminos perfectamente iguales al mismo destino. Sino, vas a tener
> que poner algunas rutas estáticas (con tracking e ip sla) para que se
> vuelvan nulas al no responder el otro lado.
>
> Claro está, esto no sirve para interfaces bridgeadas, solo ruteadas.
>
> Cualquier cosa me contactas por unicast y te paso algunos ejemplos.
>
> Saludos!
>
> On Wed, Nov 9, 2016 at 5:14 PM, Alejandro Acosta
> <alejandroacostaalamo en gmail.com
> <mailto:alejandroacostaalamo en gmail.com>> wrote:
>
> no.., esto no sería lo que estas buscando.
>
> Tu respuesta en el mundo de Cisco es etherchannel ..., nunca lo ví
> en routers pero si en LAN Switches. No se si exista alguna
> solución más moderna y que yo me haya quedado en la prehistoria :-|
>
>
> Saludos,
>
> Ale,
>
>
>
> El 9/11/16 a las 2:11 p.m., Alejandro Acosta escribió:
>
> HSRP? VRRP?
>
>
> El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro escribió:
>
> Hola,
> Alguien sabe como configurar un router cisco (tal vez un
> 2900 o 2800) con dos interfaces de red
> ethernet redundantes? algo parecido a lo que llamamos en
> linux interfaces bond?
> Saludos,
> Manuel Linares.
>
> --------------------------------------------------
> From: "Robert Guerra" <rguerra en privaterra.org
> <mailto:rguerra en privaterra.org>>
> Sent: Monday, November 7, 2016 2:31 PM
> To: "Latin America and Caribbean Region Network Operators
> Group" <lacnog en lacnic.net <mailto:lacnog en lacnic.net>>
> Cc: "GT IPv6 LAC / LAC IPv6 TF" <lactf en lacnic.net
> <mailto:lactf en lacnic.net>>
> Subject: [lacnog] IGF 2016 / Se busca contactos sobre el
> despliegue de IPv6
>
> Estimados colegas,
>
>
> Estoy organizando una session sobre IPv6 en el Foro de
> Governance que
> tendrá lugar en Mexico al mes que viene.
>
> Me encantaría incluir la participación de personas
> responsable del
> despliegue de IPv6 de Latin America. A continuación os
> incluyo detalles
> de la session.
>
> Si teneis alguna pregunta, envíame una nota.
>
> saludos
>
> Roberto
>
>
>
> --
> Robert Guerra
> Twitter: twitter.com/netfreedom
> <http://twitter.com/netfreedom>
> Email: rguerra en privaterra.org
> <mailto:rguerra en privaterra.org>
> PGP Keys : https://keybase.io/rguerra
>
> Details of the workshop
> ——————————————————————————
>
> IGF 2016 Workshop #6 : Can Law enforcement catch bad
> actors online
> anymore
>
> https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6
> <https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6>
>
>
> Description of workshop:
>
> The exhaustion of the IPv4 address supply has been
> predicted since the
> end of the 1980s. However, the large scale adoption of
> mobile devices
> and their associated IPv4 addressing needs accelerated
> the exhaustion
> timetable, and placed increased pressure on network
> operators to
> conserve IPv4 addresses
>
> This pressure has resulted in a marked increase in the
> use of
> technologies, such as Network Address Translation
> (NAT), that allow
> pools of addresses to be shared across multiple
> endpoints. These
> mechanisms enable the reuse of the limited pool of
> available IPv4
> addresses, resulting in the number of connected
> endpoints vastly
> outnumbering the number of addresses in use in the
> public internet.
>
> This has three important implications for Internet
> technology
> developers, and those who depend on certain behaviors
> of the technology.
>
> Application designers need to consider the fact that
> an IP address does
> not necessarily identify an endpoint.
>
> Law enforcement and forensic functions need to
> consider that an IP
> address alone may not be sufficient to correlate
> Internet activity
> observations with an endpoint; and even an IP address
> associated
> timestamp generally may not suffice.
>
> Data retention mechanisms and policies that record or
> reference an IP
> address need to refactor their actions and
> requirements to consider that
> in increasingly large parts of the Internet, an IP
> address is merely a
> temporary identifier. Potentially large volumes of
> ancillary data are
> required to match an IP address to an endpoint.
>
> Description of the plan to facilitate discussion
> amongst speakers,
> audience members and remote participants:
>
> The workshop will be organized as a facilitated
> dialogue. Led by the
> moderator, subject experts will debate and discuss the
> key questions and
> issues. Subject experts will give opening comments,
> after which the
> moderator will turn to those attending the session and
> invited experts
> in the audience to engage in facilitated dialogue.
>
> In addition to the background documents and papers
> that will be prepared
> ahead of the IGF, additional articles of interest,
> commissioned blogs,
> reference materials and social media conversations
> will be published and
> distributed ahead of the workshop.
>
> Speakers:
>
> The experts listed below have accepted the invitation
> to participate in
> the session. They are drawn from the Law Enforcement,
> Government,
> Academia, Civil Society, The Technical Community and
> Private sector
> stakeholder groups. A facilitated dialogue will be
> organized so that
> these experts can bring their knowledge and
> perspective to discuss and
> debate the challenges brought by IPv4 exhaustion and
> the challenges and
> opportunities presented by IPv6 adoption.
>
> (1) Jeffrey R. Bedser is the founder and CEO of
> iThreat Cyber Group
> www.ithreat.com <http://www.ithreat.com>. Mr. Bedser
> has led ICG on its journey from an internet
> investigative firm to a technology driven threat
> Intelligence Company.
> ICG was formed in 1997 as Internet Crimes Group. Mr.
> Bedser has been a
> facilitator, panelist and speaker for organizations
> such as POLCYB, ASIS
> International, Infragard, HTCIA, The Conference Board,
> ICANN and the FBI
> Training Academy at Quantico. Mr. Bedser has received
> media coverage on
> multiple occasions discussing topics surrounding
> cyber-crime and cyber
> security.
>
> For the session, Jeff will help present an overview of
> the current
> challenges being faced by cyber investigators as IPv4
> addresses are
> exhausted and the transition to a wider deployment of
> IPv6 takes place.
>
>
> (2) John Curran is considered an Internet and
> telecommunications
> industry expert. Curran was one of the founding
> members and is the
> current President and Chief Executive Officer of the
> American Registry
> for Internet Numbers (ARIN), a Regional Internet
> Registry (RIR). He is
> also a Principal Associate at Isotropic, LLC., a
> cybersecurity and
> telecommunications service provider. Curran actively
> participates in the
> activities of the Internet Engineering Task Force
> (IETF) and has served
> as co-chairman of the Operations and Network
> Management Area and member
> of IPng (IPv6) Directorate.
>
> For the session, John will bring the North American
> Regional Internet
> Registry perspective to the conversation.
>
> (3) Laura DeNardis is an American author and a
> globally recognized
> scholar of Internet governance and technical
> infrastructure. She is a
> tenured Professor and Associate Dean in the School of
> Communication at
> American University. She is a Senior Fellow of the
> Centre for
> International Governance Innovation (CIGI) and serves
> as the Director of
> Research for the Global Commission on Internet
> Governance. With a
> background in Information engineering and a doctorate
> in Science and
> Technology Studies (STS), her research studies the
> social and political
> implications of Internet technical architecture and
> governance.
>
> She is an appointed member of the U.S. Department of
> State Advisory
> Committee on International Communications and
> Information Policy
> (ACICIP). She has more than two decades of experience
> as an expert
> consultant in Internet Governance to Fortune 500
> companies, foundations,
> and government agencies.
>
> For the session, Laura will bring an academic and
> research perspective
> to the conversation
>
> (4) Robert Flaim has been a Supervisory Special Agent
> (SSA) for the
> Federal Bureau of Investigation for over seventeen
> (17) years.
> Currently, SSA Flaim is assigned to the Executive
> Staff Unit of the
> Operational Technology Division in Quantico, Virginia.
> Since 2004, Mr.
> Flaim has worked on Internet Governance efforts with
> the Internet
> Corporation of Assigned Names and Numbers (ICANN) and
> Regional Internet
> Registries, i.e., ARIN, RIPE NCC, the Internet
> Engineering Task Force
> and other Internet Governance organizations, to foster
> Internet policies
> and practices that ensure effective international law
> enforcement
> investigations. Prior to his current position, Mr.
> Flaim worked at the
> FBI Washington Field Office on cyber and counterterrorism
> investigations.
>
> Bobby will bring a US and international law
> enforcement perspective to
> the conversation and dialogue. As well, Robert will
> bring a unique
> first-hand familiarity of urgent cyber investigations
> to to discussion.
>
> (4) Athina Fragkouli is the Legal Counsel at the RIPE
> Network
> Coordination Centre (NCC), where she is responsible
> for all legal
> aspects of the organisation. She defines the RIPE NCC
> legal framework,
> provides advice, and gives legal support for all RIPE
> NCC activities.
> Athina works with a variety of Internet stakeholders
> such as network
> operators, governments, and Law Enforcement Agencies
> (LEA). She also
> represents the RIPE NCC in a variety of fora such as
> technical meetings
> and EU-organised events.
>
> Athina - Will bring a European Regional Internet
> Registry perspective to
> the panel. As well she will bring a rights based,
> european and privacy
> perspective to the conversation.
>
> (5) Merike Kaeo is a recognized global expert in
> information security
> and author of “Designing Network Security.” Prior to
> joining
> Farsight Security, Merike served as Chief Information
> Security Officer
> for Internet Identity (IID), where she was responsible
> for maintaining
> IID’s vision and ensuring the company’s sensitive
> information and
> technologies are protected. Prior to joining IID,
> Merike founded Double
> Shot Security, which provided strategic and
> operational guidance to
> secure Fortune 100 companies. She led the first
> security initiative for
> Cisco in the mid-1990s. Merike is on ICANN’s Security
> and Stability
> Advisory Council (SSAC) and the FCC’s Communications
> Security,
> Reliability and Interoperability Council (CSRIC). She
> earned a MSEE from
> George Washington University and a BSEE from Rutgers
> University.
>
>
> (6) Dick Leaning has over 28 years’ experience in Law
> Enforcement,
> leading teams of investigators in the Metropolitan
> Police Service
> (London), UK National Crime Squad (NCS) and the
> Serious Organised Crime
> Agency (SOCA) and from 2009 within SOCA’s Cyber Crime
> Department. Dick
> has been the UK representative at the G8 High-Tech
> Crime subgroup of
> senior experts and Interpol’s European High-Tech Crime
> Working Group
> with responsibility for enhancing the abilities of law
> enforcement.
> Based in The Hague since September 2011, Dick joined
> the United Kingdom
> Liaison Bureau (UKLB) desk as a Europol Cyber Liaison
> officer, and has
> recently taken on the role of Seconded National Expert
> attached to the
> European Cybercrime Center (EC3) at Europol. In his
> current role, Dick
> has responsibility for Internet Community Engagement
> through which he
> hopes to achieve significant dialogue with the Internet’s
> multi-stakeholders and Law Enforcement, to work in
> partnership to
> prevent, disrupt and prosecute cyber criminals.
>
> Richard will bring a Internet Registry, Law
> Enforcement and
> International Cyber Investigation perspective to the
> conversation and
> dialogue.
>
>
> (7) Ben Butler has been with Go Daddy since 2001. In
> 2002, He formed the
> Go Daddy Abuse Department, and served as Director of
> Network Abuse for
> over 10 years. In this role, Ben helped create and
> enforce company and
> public policies dealing with every form of potential
> abuse that happens
> online, including spam, phishing, identity theft,
> copyright
> infringements, cyberbullying, child exploitation
> issues, and rogue
> internet pharmacies. He recently took on a new role as
> Director of the
> Digital Crimes Unit. Ben comes from a strong technical
> background
> including several years as a network and email
> administrator, and has
> experience in customer service, business management,
> and marketing.
>
> Ben will bring a registrar perspective to the
> conversation and dialogue.
>
>
> Description of the proposer's plans for remote
> participation
>
> The workshop will be organized as a facilitated
> dialogue. Led by the
> moderator, subject experts will debate and discuss the
> key questions and
> issues. Subject experts will give opening comments,
> after which the
> moderator will turn to those attending the session and
> invited experts
> in the audience to engage in facilitated dialogue.
>
> Background paper (attached)
>
>
>
>
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
> https://mail.lacnic.net/mailman/listinfo/lacnog
> <https://mail.lacnic.net/mailman/listinfo/lacnog>
> Cancelar suscripcion:
> https://mail.lacnic.net/mailman/options/lacnog
> <https://mail.lacnic.net/mailman/options/lacnog>
>
>
> * * * * *
> Universidad de Granma
> http://www.udg.co.cu
>
> Participe en el VI Congreso Cubano de Desarrollo Local,
> Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
> 30 de marzo de 2017.
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
> https://mail.lacnic.net/mailman/listinfo/lacnog
> <https://mail.lacnic.net/mailman/listinfo/lacnog>
> Cancelar suscripcion:
> https://mail.lacnic.net/mailman/options/lacnog
> <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net <mailto:LACNOG en lacnic.net>
> https://mail.lacnic.net/mailman/listinfo/lacnog
> <https://mail.lacnic.net/mailman/listinfo/lacnog>
> Cancelar suscripcion:
> https://mail.lacnic.net/mailman/options/lacnog
> <https://mail.lacnic.net/mailman/options/lacnog>
>
>
>
>
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net
> https://mail.lacnic.net/mailman/listinfo/lacnog
> Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/lacnog/attachments/20161109/d185b76c/attachment.html>
Más información sobre la lista de distribución LACNOG