[lacnog] Consulta sobre cisco
Rogerio Mariano
rsouza.rjo en gmail.com
Jue Nov 10 01:10:00 BRST 2016
Hola, Si lo que quiere es un load-balance (equal o unequal) con apoyo a IPv6, correcto? Si la analogía es una interfaz bond seria un EtherChannel o un multilink / Link Aggregation (100Mbps hasta 100Gbps, POS, SONET, SRP, otros). Ahora para una redundancia entre routers, usted puede utilizar VRRP, HSRP o FHRP con el soporte IPv6 (GLBP) http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-sy/fhp-15-sy-book/GLBP-IPv6.html También tiene otros mecanismos como LAG (Etherchannel, LACP o PAgP), Multichassis-LAG, ECMP con protocolos L3 (OSPF y IS-IS) o con BGP (DMZ-Bandwidth-link), todos con apoyo a IPv6 Saludos, Rogerio Mariano
---Sent from Boxer | http://getboxer.com
Hola,
Alguien sabe como configurar un router cisco (tal vez un 2900 o 2800) con
dos interfaces de red
ethernet redundantes? algo parecido a lo que llamamos en linux interfaces
bond?
Saludos,
Manuel Linares.
--------------------------------------------------
From: "Robert Guerra" <rguerra en privaterra.org>
Sent: Monday, November 7, 2016 2:31 PM
To: "Latin America and Caribbean Region Network Operators Group"
<lacnog en lacnic.net>
Cc: "GT IPv6 LAC / LAC IPv6 TF" <lactf en lacnic.net>
Subject: [lacnog] IGF 2016 / Se busca contactos sobre el despliegue de IPv6
> Estimados colegas,
>
>
> Estoy organizando una session sobre IPv6 en el Foro de Governance que
> tendrá lugar en Mexico al mes que viene.
>
> Me encantaría incluir la participación de personas responsable del
> despliegue de IPv6 de Latin America. A continuación os incluyo detalles
> de la session.
>
> Si teneis alguna pregunta, envíame una nota.
>
> saludos
>
> Roberto
>
>
>
> --
> Robert Guerra
> Twitter: twitter.com/netfreedom
> Email: rguerra en privaterra.org
> PGP Keys : https://keybase.io/rguerra
>
> Details of the workshop
> ——————————————————————————
>
> IGF 2016 Workshop #6 : Can Law enforcement catch bad actors online
> anymore
>
> https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6
>
> Description of workshop:
>
> The exhaustion of the IPv4 address supply has been predicted since the
> end of the 1980s. However, the large scale adoption of mobile devices
> and their associated IPv4 addressing needs accelerated the exhaustion
> timetable, and placed increased pressure on network operators to
> conserve IPv4 addresses
>
> This pressure has resulted in a marked increase in the use of
> technologies, such as Network Address Translation (NAT), that allow
> pools of addresses to be shared across multiple endpoints. These
> mechanisms enable the reuse of the limited pool of available IPv4
> addresses, resulting in the number of connected endpoints vastly
> outnumbering the number of addresses in use in the public internet.
>
> This has three important implications for Internet technology
> developers, and those who depend on certain behaviors of the technology.
>
> Application designers need to consider the fact that an IP address does
> not necessarily identify an endpoint.
>
> Law enforcement and forensic functions need to consider that an IP
> address alone may not be sufficient to correlate Internet activity
> observations with an endpoint; and even an IP address associated
> timestamp generally may not suffice.
>
> Data retention mechanisms and policies that record or reference an IP
> address need to refactor their actions and requirements to consider that
> in increasingly large parts of the Internet, an IP address is merely a
> temporary identifier. Potentially large volumes of ancillary data are
> required to match an IP address to an endpoint.
>
> Description of the plan to facilitate discussion amongst speakers,
> audience members and remote participants:
>
> The workshop will be organized as a facilitated dialogue. Led by the
> moderator, subject experts will debate and discuss the key questions and
> issues. Subject experts will give opening comments, after which the
> moderator will turn to those attending the session and invited experts
> in the audience to engage in facilitated dialogue.
>
> In addition to the background documents and papers that will be prepared
> ahead of the IGF, additional articles of interest, commissioned blogs,
> reference materials and social media conversations will be published and
> distributed ahead of the workshop.
>
> Speakers:
>
> The experts listed below have accepted the invitation to participate in
> the session. They are drawn from the Law Enforcement, Government,
> Academia, Civil Society, The Technical Community and Private sector
> stakeholder groups. A facilitated dialogue will be organized so that
> these experts can bring their knowledge and perspective to discuss and
> debate the challenges brought by IPv4 exhaustion and the challenges and
> opportunities presented by IPv6 adoption.
>
> (1) Jeffrey R. Bedser is the founder and CEO of iThreat Cyber Group
> www.ithreat.com. Mr. Bedser has led ICG on its journey from an internet
> investigative firm to a technology driven threat Intelligence Company.
> ICG was formed in 1997 as Internet Crimes Group. Mr. Bedser has been a
> facilitator, panelist and speaker for organizations such as POLCYB, ASIS
> International, Infragard, HTCIA, The Conference Board, ICANN and the FBI
> Training Academy at Quantico. Mr. Bedser has received media coverage on
> multiple occasions discussing topics surrounding cyber-crime and cyber
> security.
>
> For the session, Jeff will help present an overview of the current
> challenges being faced by cyber investigators as IPv4 addresses are
> exhausted and the transition to a wider deployment of IPv6 takes place.
>
>
> (2) John Curran is considered an Internet and telecommunications
> industry expert. Curran was one of the founding members and is the
> current President and Chief Executive Officer of the American Registry
> for Internet Numbers (ARIN), a Regional Internet Registry (RIR). He is
> also a Principal Associate at Isotropic, LLC., a cybersecurity and
> telecommunications service provider. Curran actively participates in the
> activities of the Internet Engineering Task Force (IETF) and has served
> as co-chairman of the Operations and Network Management Area and member
> of IPng (IPv6) Directorate.
>
> For the session, John will bring the North American Regional Internet
> Registry perspective to the conversation.
>
> (3) Laura DeNardis is an American author and a globally recognized
> scholar of Internet governance and technical infrastructure. She is a
> tenured Professor and Associate Dean in the School of Communication at
> American University. She is a Senior Fellow of the Centre for
> International Governance Innovation (CIGI) and serves as the Director of
> Research for the Global Commission on Internet Governance. With a
> background in Information engineering and a doctorate in Science and
> Technology Studies (STS), her research studies the social and political
> implications of Internet technical architecture and governance.
>
> She is an appointed member of the U.S. Department of State Advisory
> Committee on International Communications and Information Policy
> (ACICIP). She has more than two decades of experience as an expert
> consultant in Internet Governance to Fortune 500 companies, foundations,
> and government agencies.
>
> For the session, Laura will bring an academic and research perspective
> to the conversation
>
> (4) Robert Flaim has been a Supervisory Special Agent (SSA) for the
> Federal Bureau of Investigation for over seventeen (17) years.
> Currently, SSA Flaim is assigned to the Executive Staff Unit of the
> Operational Technology Division in Quantico, Virginia. Since 2004, Mr.
> Flaim has worked on Internet Governance efforts with the Internet
> Corporation of Assigned Names and Numbers (ICANN) and Regional Internet
> Registries, i.e., ARIN, RIPE NCC, the Internet Engineering Task Force
> and other Internet Governance organizations, to foster Internet policies
> and practices that ensure effective international law enforcement
> investigations. Prior to his current position, Mr. Flaim worked at the
> FBI Washington Field Office on cyber and counterterrorism
> investigations.
>
> Bobby will bring a US and international law enforcement perspective to
> the conversation and dialogue. As well, Robert will bring a unique
> first-hand familiarity of urgent cyber investigations to to discussion.
>
> (4) Athina Fragkouli is the Legal Counsel at the RIPE Network
> Coordination Centre (NCC), where she is responsible for all legal
> aspects of the organisation. She defines the RIPE NCC legal framework,
> provides advice, and gives legal support for all RIPE NCC activities.
> Athina works with a variety of Internet stakeholders such as network
> operators, governments, and Law Enforcement Agencies (LEA). She also
> represents the RIPE NCC in a variety of fora such as technical meetings
> and EU-organised events.
>
> Athina - Will bring a European Regional Internet Registry perspective to
> the panel. As well she will bring a rights based, european and privacy
> perspective to the conversation.
>
> (5) Merike Kaeo is a recognized global expert in information security
> and author of “Designing Network Security.” Prior to joining
> Farsight Security, Merike served as Chief Information Security Officer
> for Internet Identity (IID), where she was responsible for maintaining
> IID’s vision and ensuring the company’s sensitive information and
> technologies are protected. Prior to joining IID, Merike founded Double
> Shot Security, which provided strategic and operational guidance to
> secure Fortune 100 companies. She led the first security initiative for
> Cisco in the mid-1990s. Merike is on ICANN’s Security and Stability
> Advisory Council (SSAC) and the FCC’s Communications Security,
> Reliability and Interoperability Council (CSRIC). She earned a MSEE from
> George Washington University and a BSEE from Rutgers University.
>
>
> (6) Dick Leaning has over 28 years’ experience in Law Enforcement,
> leading teams of investigators in the Metropolitan Police Service
> (London), UK National Crime Squad (NCS) and the Serious Organised Crime
> Agency (SOCA) and from 2009 within SOCA’s Cyber Crime Department. Dick
> has been the UK representative at the G8 High-Tech Crime subgroup of
> senior experts and Interpol’s European High-Tech Crime Working Group
> with responsibility for enhancing the abilities of law enforcement.
> Based in The Hague since September 2011, Dick joined the United Kingdom
> Liaison Bureau (UKLB) desk as a Europol Cyber Liaison officer, and has
> recently taken on the role of Seconded National Expert attached to the
> European Cybercrime Center (EC3) at Europol. In his current role, Dick
> has responsibility for Internet Community Engagement through which he
> hopes to achieve significant dialogue with the Internet’s
> multi-stakeholders and Law Enforcement, to work in partnership to
> prevent, disrupt and prosecute cyber criminals.
>
> Richard will bring a Internet Registry, Law Enforcement and
> International Cyber Investigation perspective to the conversation and
> dialogue.
>
>
> (7) Ben Butler has been with Go Daddy since 2001. In 2002, He formed the
> Go Daddy Abuse Department, and served as Director of Network Abuse for
> over 10 years. In this role, Ben helped create and enforce company and
> public policies dealing with every form of potential abuse that happens
> online, including spam, phishing, identity theft, copyright
> infringements, cyberbullying, child exploitation issues, and rogue
> internet pharmacies. He recently took on a new role as Director of the
> Digital Crimes Unit. Ben comes from a strong technical background
> including several years as a network and email administrator, and has
> experience in customer service, business management, and marketing.
>
> Ben will bring a registrar perspective to the conversation and dialogue.
>
>
> Description of the proposer's plans for remote participation
>
> The workshop will be organized as a facilitated dialogue. Led by the
> moderator, subject experts will debate and discuss the key questions and
> issues. Subject experts will give opening comments, after which the
> moderator will turn to those attending the session and invited experts
> in the audience to engage in facilitated dialogue.
>
> Background paper (attached)
>
> _______________________________________________
> LACNOG mailing list
> LACNOG en lacnic.net
> https://mail.lacnic.net/mailman/listinfo/lacnog
> Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog
>
* * * * *
Universidad de Granma
http://www.udg.co.cu
Participe en el VI Congreso Cubano de Desarrollo Local,
Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
30 de marzo de 2017.
_______________________________________________
LACNOG mailing list
LACNOG en lacnic.net
https://mail.lacnic.net/mailman/listinfo/lacnog
Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/lacnog/attachments/20161110/e6566d27/attachment.html>
Más información sobre la lista de distribución LACNOG