[lacnog] Consulta sobre cisco

Manuel José Linares Alvaro cheche en udg.co.cu
Mie Nov 9 18:32:37 BRST 2016


carlos, ese router solo tiene atrás servidores de la nube.
mi idea fue aprovechar la interface que tiene sin uso y conectarla a otro switch. válido comentar que no me puedo poner a inventar mucho con ese router, está en servicio y cualquier cambio implica fallos y tiempo de desconexión ...


From: Carlos M. Martinez 
Sent: Wednesday, November 9, 2016 3:29 PM
To: Latin America and Caribbean Region Network Operators Group 
Subject: Re: [lacnog] Consulta sobre cisco


Lo que dice Ariel tiene mucho sentido si lo que está atrás de ese router son otros routers, o algo que hable IGPs. 
Si son servers o hosts nomas, ahi no sería tan útil. Si bien uno puede correr quagga o bird en ellos, en general es demasiada complejidad para configuraciones usualmente muy simples. 
Creo que lo que quieres lograr lo podrías lograr usando bridging, las interfaces BVI por ejemplo. 
Mira este documento: 
http://www.cisco.com/c/en/us/support/docs/lan-switching/integrated-routing-bridging-irb/17054-741-10.html 
s2 
Carlos 
On 9 Nov 2016, at 17:19, Ariel Weher wrote: 
  Hola Manuel.


  Quizás la solución más fácil es que aproveches las ventajas del ECMP (equal cost multi path), esto se hace de form automática cuando tienes dos rutas con la misma métrica, la misma distancia administrativa y la misma red de destino.


  Si corres un IGP, esto puede llegar a hacerse sin intervención tuya al ver caminos perfectamente iguales al mismo destino. Sino, vas a tener que poner algunas rutas estáticas (con tracking e ip sla) para que se vuelvan nulas al no responder el otro lado.


  Claro está, esto no sirve para interfaces bridgeadas, solo ruteadas.


  Cualquier cosa me contactas por unicast y te paso algunos ejemplos.


  Saludos!


  On Wed, Nov 9, 2016 at 5:14 PM, Alejandro Acosta <alejandroacostaalamo en gmail.com> wrote:

    no.., esto no sería lo que estas buscando.

    Tu respuesta en el mundo de Cisco es etherchannel ..., nunca lo ví en routers pero si en LAN Switches. No se si exista alguna solución más moderna y que yo me haya quedado en la prehistoria :-|


    Saludos,

    Ale,



    El 9/11/16 a las 2:11 p.m., Alejandro Acosta escribió: 


      HSRP? VRRP?


      El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro escribió:

        Hola,
        Alguien sabe como configurar un router cisco (tal vez un 2900 o 2800) con dos interfaces de red
        ethernet redundantes? algo parecido a lo que llamamos en linux interfaces bond?
        Saludos,
        Manuel Linares.

        --------------------------------------------------
        From: "Robert Guerra" <rguerra en privaterra.org>
        Sent: Monday, November 7, 2016 2:31 PM
        To: "Latin America and Caribbean Region Network Operators Group" <lacnog en lacnic.net>
        Cc: "GT IPv6 LAC / LAC IPv6 TF" <lactf en lacnic.net>
        Subject: [lacnog] IGF 2016 / Se busca contactos sobre el despliegue de IPv6


          Estimados colegas,


          Estoy organizando una session sobre IPv6 en el Foro de Governance que
          tendrá lugar en Mexico al mes que viene.

          Me encantaría incluir la participación de personas responsable del
          despliegue de IPv6 de Latin America. A continuación os incluyo detalles
          de la session.

          Si teneis alguna pregunta, envíame una nota.

          saludos

          Roberto



          -- 
          Robert Guerra
          Twitter: twitter.com/netfreedom
          Email: rguerra en privaterra.org
          PGP Keys : https://keybase.io/rguerra

          Details of the workshop
          ——————————————————————————

          IGF 2016 Workshop #6 : Can Law enforcement catch bad actors online
          anymore

          https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6 

          Description of workshop:

          The exhaustion of the IPv4 address supply has been predicted since the
          end of the 1980s. However, the large scale adoption of mobile devices
          and their associated IPv4 addressing needs accelerated the exhaustion
          timetable, and placed increased pressure on network operators to
          conserve IPv4 addresses

          This pressure has resulted in a marked increase in the use of
          technologies, such as Network Address Translation (NAT), that allow
          pools of addresses to be shared across multiple endpoints. These
          mechanisms enable the reuse of the limited pool of available IPv4
          addresses, resulting in the number of connected endpoints vastly
          outnumbering the number of addresses in use in the public internet.

          This has three important implications for Internet technology
          developers, and those who depend on certain behaviors of the technology.

          Application designers need to consider the fact that an IP address does
          not necessarily identify an endpoint.

          Law enforcement and forensic functions need to consider that an IP
          address alone may not be sufficient to correlate Internet activity
          observations with an endpoint; and even an IP address associated
          timestamp generally may not suffice.

          Data retention mechanisms and policies that record or reference an IP
          address need to refactor their actions and requirements to consider that
          in increasingly large parts of the Internet, an IP address is merely a
          temporary identifier. Potentially large volumes of ancillary data are
          required to match an IP address to an endpoint.

          Description of the plan to facilitate discussion amongst speakers,
          audience members and remote participants:

          The workshop will be organized as a facilitated dialogue. Led by the
          moderator, subject experts will debate and discuss the key questions and
          issues. Subject experts will give opening comments, after which the
          moderator will turn to those attending the session and invited experts
          in the audience to engage in facilitated dialogue.

          In addition to the background documents and papers that will be prepared
          ahead of the IGF, additional articles of interest, commissioned blogs,
          reference materials and social media conversations will be published and
          distributed ahead of the workshop.

          Speakers:

          The experts listed below have accepted the invitation to participate in
          the session. They are drawn from the Law Enforcement, Government,
          Academia, Civil Society, The Technical Community and Private sector
          stakeholder groups. A facilitated dialogue will be organized so that
          these experts can bring their knowledge and perspective to discuss and
          debate the challenges brought by IPv4 exhaustion and the challenges and
          opportunities presented by IPv6 adoption.

          (1) Jeffrey R. Bedser is the founder and CEO of iThreat Cyber Group
          www.ithreat.com. Mr. Bedser has led ICG on its journey from an internet
          investigative firm to a technology driven threat Intelligence Company.
          ICG was formed in 1997 as Internet Crimes Group. Mr. Bedser has been a
          facilitator, panelist and speaker for organizations such as POLCYB, ASIS
          International, Infragard, HTCIA, The Conference Board, ICANN and the FBI
          Training Academy at Quantico. Mr. Bedser has received media coverage on
          multiple occasions discussing topics surrounding cyber-crime and cyber
          security.

          For the session, Jeff will help present an overview of the current
          challenges being faced by cyber investigators as IPv4 addresses are
          exhausted and the transition to a wider deployment of IPv6 takes place.


          (2) John Curran is considered an Internet and telecommunications
          industry expert. Curran was one of the founding members and is the
          current President and Chief Executive Officer of the American Registry
          for Internet Numbers (ARIN), a Regional Internet Registry (RIR). He is
          also a Principal Associate at Isotropic, LLC., a cybersecurity and
          telecommunications service provider. Curran actively participates in the
          activities of the Internet Engineering Task Force (IETF) and has served
          as co-chairman of the Operations and Network Management Area and member
          of IPng (IPv6) Directorate.

          For the session, John will bring the North American Regional Internet
          Registry perspective to the conversation.

          (3) Laura DeNardis is an American author and a globally recognized
          scholar of Internet governance and technical infrastructure. She is a
          tenured Professor and Associate Dean in the School of Communication at
          American University. She is a Senior Fellow of the Centre for
          International Governance Innovation (CIGI) and serves as the Director of
          Research for the Global Commission on Internet Governance. With a
          background in Information engineering and a doctorate in Science and
          Technology Studies (STS), her research studies the social and political
          implications of Internet technical architecture and governance.

          She is an appointed member of the U.S. Department of State Advisory
          Committee on International Communications and Information Policy
          (ACICIP). She has more than two decades of experience as an expert
          consultant in Internet Governance to Fortune 500 companies, foundations,
          and government agencies.

          For the session, Laura will bring an academic and research perspective
          to the conversation

          (4) Robert Flaim has been a Supervisory Special Agent (SSA) for the
          Federal Bureau of Investigation for over seventeen (17) years.
          Currently, SSA Flaim is assigned to the Executive Staff Unit of the
          Operational Technology Division in Quantico, Virginia. Since 2004, Mr.
          Flaim has worked on Internet Governance efforts with the Internet
          Corporation of Assigned Names and Numbers (ICANN) and Regional Internet
          Registries, i.e., ARIN, RIPE NCC, the Internet Engineering Task Force
          and other Internet Governance organizations, to foster Internet policies
          and practices that ensure effective international law enforcement
          investigations. Prior to his current position, Mr. Flaim worked at the
          FBI Washington Field Office on cyber and counterterrorism
          investigations.

          Bobby will bring a US and international law enforcement perspective to
          the conversation and dialogue. As well, Robert will bring a unique
          first-hand familiarity of urgent cyber investigations to to discussion.

          (4) Athina Fragkouli is the Legal Counsel at the RIPE Network
          Coordination Centre (NCC), where she is responsible for all legal
          aspects of the organisation. She defines the RIPE NCC legal framework,
          provides advice, and gives legal support for all RIPE NCC activities.
          Athina works with a variety of Internet stakeholders such as network
          operators, governments, and Law Enforcement Agencies (LEA). She also
          represents the RIPE NCC in a variety of fora such as technical meetings
          and EU-organised events.

          Athina - Will bring a European Regional Internet Registry perspective to
          the panel. As well she will bring a rights based, european and privacy
          perspective to the conversation.

          (5) Merike Kaeo is a recognized global expert in information security
          and author of “Designing Network Security.” Prior to joining
          Farsight Security, Merike served as Chief Information Security Officer
          for Internet Identity (IID), where she was responsible for maintaining
          IID’s vision and ensuring the company’s sensitive information and
          technologies are protected. Prior to joining IID, Merike founded Double
          Shot Security, which provided strategic and operational guidance to
          secure Fortune 100 companies. She led the first security initiative for
          Cisco in the mid-1990s. Merike is on ICANN’s Security and Stability
          Advisory Council (SSAC) and the FCC’s Communications Security,
          Reliability and Interoperability Council (CSRIC). She earned a MSEE from
          George Washington University and a BSEE from Rutgers University.


          (6) Dick Leaning has over 28 years’ experience in Law Enforcement,
          leading teams of investigators in the Metropolitan Police Service
          (London), UK National Crime Squad (NCS) and the Serious Organised Crime
          Agency (SOCA) and from 2009 within SOCA’s Cyber Crime Department. Dick
          has been the UK representative at the G8 High-Tech Crime subgroup of
          senior experts and Interpol’s European High-Tech Crime Working Group
          with responsibility for enhancing the abilities of law enforcement.
          Based in The Hague since September 2011, Dick joined the United Kingdom
          Liaison Bureau (UKLB) desk as a Europol Cyber Liaison officer, and has
          recently taken on the role of Seconded National Expert attached to the
          European Cybercrime Center (EC3) at Europol. In his current role, Dick
          has responsibility for Internet Community Engagement through which he
          hopes to achieve significant dialogue with the Internet’s
          multi-stakeholders and Law Enforcement, to work in partnership to
          prevent, disrupt and prosecute cyber criminals.

          Richard will bring a Internet Registry, Law Enforcement and
          International Cyber Investigation perspective to the conversation and
          dialogue.


          (7) Ben Butler has been with Go Daddy since 2001. In 2002, He formed the
          Go Daddy Abuse Department, and served as Director of Network Abuse for
          over 10 years. In this role, Ben helped create and enforce company and
          public policies dealing with every form of potential abuse that happens
          online, including spam, phishing, identity theft, copyright
          infringements, cyberbullying, child exploitation issues, and rogue
          internet pharmacies. He recently took on a new role as Director of the
          Digital Crimes Unit. Ben comes from a strong technical background
          including several years as a network and email administrator, and has
          experience in customer service, business management, and marketing.

          Ben will bring a registrar perspective to the conversation and dialogue.


          Description of the proposer's plans for remote participation

          The workshop will be organized as a facilitated dialogue. Led by the
          moderator, subject experts will debate and discuss the key questions and
          issues. Subject experts will give opening comments, after which the
          moderator will turn to those attending the session and invited experts
          in the audience to engage in facilitated dialogue.

          Background paper (attached)






          _______________________________________________
          LACNOG mailing list
          LACNOG en lacnic.net
          https://mail.lacnic.net/mailman/listinfo/lacnog
          Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog



        *  *  *  *  *
        Universidad de Granma
        http://www.udg.co.cu

        Participe en el VI Congreso Cubano de Desarrollo Local,
        Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
        30 de marzo de 2017.
        _______________________________________________
        LACNOG mailing list
        LACNOG en lacnic.net
        https://mail.lacnic.net/mailman/listinfo/lacnog
        Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog




    _______________________________________________
    LACNOG mailing list
    LACNOG en lacnic.net
    https://mail.lacnic.net/mailman/listinfo/lacnog
    Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog



  _______________________________________________ 
  LACNOG mailing list 
  LACNOG en lacnic.net 
  https://mail.lacnic.net/mailman/listinfo/lacnog 
  Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog 


--------------------------------------------------------------------------------


_______________________________________________
LACNOG mailing list
LACNOG en lacnic.net
https://mail.lacnic.net/mailman/listinfo/lacnog
Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/lacnog/attachments/20161109/9855aff4/attachment.html>


Más información sobre la lista de distribución LACNOG