[lacnog] Consulta sobre cisco

Manuel José Linares Alvaro cheche en udg.co.cu
Jue Nov 10 14:42:39 BRST 2016


gracias pedro, muy oportuno y valioso tu aporte.


From: Pcontreras 
Sent: Thursday, November 10, 2016 11:25 AM
To: Latin America and Caribbean Region Network Operators Group 
Subject: Re: [lacnog] Consulta sobre cisco


El método consultado no es factible salvo que se le adicione módulos  switch al router


http://www.cisco.com/c/en/us/support/docs/switches/catalyst-2950-series-switches/24042-158.html  




SL2.


2016-11-09 17:08 GMT-03:00 Manuel José Linares Alvaro <cheche en udg.co.cu>:

  Hola,
  Alguien sabe como configurar un router cisco (tal vez un 2900 o 2800) con dos interfaces de red
  ethernet redundantes? algo parecido a lo que llamamos en linux interfaces bond?
  Saludos,
  Manuel Linares.

  --------------------------------------------------
  From: "Robert Guerra" <rguerra en privaterra.org>
  Sent: Monday, November 7, 2016 2:31 PM
  To: "Latin America and Caribbean Region Network Operators Group" <lacnog en lacnic.net>
  Cc: "GT IPv6 LAC / LAC IPv6 TF" <lactf en lacnic.net>
  Subject: [lacnog] IGF 2016 / Se busca contactos sobre el despliegue de IPv6


    Estimados colegas,


    Estoy organizando una session sobre IPv6 en el Foro de Governance que
    tendrá lugar en Mexico al mes que viene.

    Me encantaría incluir la participación de personas responsable del
    despliegue de IPv6 de Latin America. A continuación os incluyo detalles
    de la session.

    Si teneis alguna pregunta, envíame una nota.

    saludos

    Roberto



    --
    Robert Guerra
    Twitter: twitter.com/netfreedom
    Email: rguerra en privaterra.org
    PGP Keys : https://keybase.io/rguerra

    Details of the workshop
    ——————————————————————————

    IGF 2016 Workshop #6 : Can Law enforcement catch bad actors online
    anymore

    https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6

    Description of workshop:

    The exhaustion of the IPv4 address supply has been predicted since the
    end of the 1980s. However, the large scale adoption of mobile devices
    and their associated IPv4 addressing needs accelerated the exhaustion
    timetable, and placed increased pressure on network operators to
    conserve IPv4 addresses

    This pressure has resulted in a marked increase in the use of
    technologies, such as Network Address Translation (NAT), that allow
    pools of addresses to be shared across multiple endpoints. These
    mechanisms enable the reuse of the limited pool of available IPv4
    addresses, resulting in the number of connected endpoints vastly
    outnumbering the number of addresses in use in the public internet.

    This has three important implications for Internet technology
    developers, and those who depend on certain behaviors of the technology.

    Application designers need to consider the fact that an IP address does
    not necessarily identify an endpoint.

    Law enforcement and forensic functions need to consider that an IP
    address alone may not be sufficient to correlate Internet activity
    observations with an endpoint; and even an IP address associated
    timestamp generally may not suffice.

    Data retention mechanisms and policies that record or reference an IP
    address need to refactor their actions and requirements to consider that
    in increasingly large parts of the Internet, an IP address is merely a
    temporary identifier. Potentially large volumes of ancillary data are
    required to match an IP address to an endpoint.

    Description of the plan to facilitate discussion amongst speakers,
    audience members and remote participants:

    The workshop will be organized as a facilitated dialogue. Led by the
    moderator, subject experts will debate and discuss the key questions and
    issues. Subject experts will give opening comments, after which the
    moderator will turn to those attending the session and invited experts
    in the audience to engage in facilitated dialogue.

    In addition to the background documents and papers that will be prepared
    ahead of the IGF, additional articles of interest, commissioned blogs,
    reference materials and social media conversations will be published and
    distributed ahead of the workshop.

    Speakers:

    The experts listed below have accepted the invitation to participate in
    the session. They are drawn from the Law Enforcement, Government,
    Academia, Civil Society, The Technical Community and Private sector
    stakeholder groups. A facilitated dialogue will be organized so that
    these experts can bring their knowledge and perspective to discuss and
    debate the challenges brought by IPv4 exhaustion and the challenges and
    opportunities presented by IPv6 adoption.

    (1) Jeffrey R. Bedser is the founder and CEO of iThreat Cyber Group
    www.ithreat.com. Mr. Bedser has led ICG on its journey from an internet
    investigative firm to a technology driven threat Intelligence Company.
    ICG was formed in 1997 as Internet Crimes Group. Mr. Bedser has been a
    facilitator, panelist and speaker for organizations such as POLCYB, ASIS
    International, Infragard, HTCIA, The Conference Board, ICANN and the FBI
    Training Academy at Quantico. Mr. Bedser has received media coverage on
    multiple occasions discussing topics surrounding cyber-crime and cyber
    security.

    For the session, Jeff will help present an overview of the current
    challenges being faced by cyber investigators as IPv4 addresses are
    exhausted and the transition to a wider deployment of IPv6 takes place.


    (2) John Curran is considered an Internet and telecommunications
    industry expert. Curran was one of the founding members and is the
    current President and Chief Executive Officer of the American Registry
    for Internet Numbers (ARIN), a Regional Internet Registry (RIR). He is
    also a Principal Associate at Isotropic, LLC., a cybersecurity and
    telecommunications service provider. Curran actively participates in the
    activities of the Internet Engineering Task Force (IETF) and has served
    as co-chairman of the Operations and Network Management Area and member
    of IPng (IPv6) Directorate.

    For the session, John will bring the North American Regional Internet
    Registry perspective to the conversation.

    (3) Laura DeNardis is an American author and a globally recognized
    scholar of Internet governance and technical infrastructure. She is a
    tenured Professor and Associate Dean in the School of Communication at
    American University. She is a Senior Fellow of the Centre for
    International Governance Innovation (CIGI) and serves as the Director of
    Research for the Global Commission on Internet Governance. With a
    background in Information engineering and a doctorate in Science and
    Technology Studies (STS), her research studies the social and political
    implications of Internet technical architecture and governance.

    She is an appointed member of the U.S. Department of State Advisory
    Committee on International Communications and Information Policy
    (ACICIP). She has more than two decades of experience as an expert
    consultant in Internet Governance to Fortune 500 companies, foundations,
    and government agencies.

    For the session, Laura will bring an academic and research perspective
    to the conversation

    (4) Robert Flaim has been a Supervisory Special Agent (SSA) for the
    Federal Bureau of Investigation for over seventeen (17) years.
    Currently, SSA Flaim is assigned to the Executive Staff Unit of the
    Operational Technology Division in Quantico, Virginia. Since 2004, Mr.
    Flaim has worked on Internet Governance efforts with the Internet
    Corporation of Assigned Names and Numbers (ICANN) and Regional Internet
    Registries, i.e., ARIN, RIPE NCC, the Internet Engineering Task Force
    and other Internet Governance organizations, to foster Internet policies
    and practices that ensure effective international law enforcement
    investigations. Prior to his current position, Mr. Flaim worked at the
    FBI Washington Field Office on cyber and counterterrorism
    investigations.

    Bobby will bring a US and international law enforcement perspective to
    the conversation and dialogue. As well, Robert will bring a unique
    first-hand familiarity of urgent cyber investigations to to discussion.

    (4) Athina Fragkouli is the Legal Counsel at the RIPE Network
    Coordination Centre (NCC), where she is responsible for all legal
    aspects of the organisation. She defines the RIPE NCC legal framework,
    provides advice, and gives legal support for all RIPE NCC activities.
    Athina works with a variety of Internet stakeholders such as network
    operators, governments, and Law Enforcement Agencies (LEA). She also
    represents the RIPE NCC in a variety of fora such as technical meetings
    and EU-organised events.

    Athina - Will bring a European Regional Internet Registry perspective to
    the panel. As well she will bring a rights based, european and privacy
    perspective to the conversation.

    (5) Merike Kaeo is a recognized global expert in information security
    and author of “Designing Network Security.” Prior to joining
    Farsight Security, Merike served as Chief Information Security Officer
    for Internet Identity (IID), where she was responsible for maintaining
    IID’s vision and ensuring the company’s sensitive information and
    technologies are protected. Prior to joining IID, Merike founded Double
    Shot Security, which provided strategic and operational guidance to
    secure Fortune 100 companies. She led the first security initiative for
    Cisco in the mid-1990s. Merike is on ICANN’s Security and Stability
    Advisory Council (SSAC) and the FCC’s Communications Security,
    Reliability and Interoperability Council (CSRIC). She earned a MSEE from
    George Washington University and a BSEE from Rutgers University.


    (6) Dick Leaning has over 28 years’ experience in Law Enforcement,
    leading teams of investigators in the Metropolitan Police Service
    (London), UK National Crime Squad (NCS) and the Serious Organised Crime
    Agency (SOCA) and from 2009 within SOCA’s Cyber Crime Department. Dick
    has been the UK representative at the G8 High-Tech Crime subgroup of
    senior experts and Interpol’s European High-Tech Crime Working Group
    with responsibility for enhancing the abilities of law enforcement.
    Based in The Hague since September 2011, Dick joined the United Kingdom
    Liaison Bureau (UKLB) desk as a Europol Cyber Liaison officer, and has
    recently taken on the role of Seconded National Expert attached to the
    European Cybercrime Center (EC3) at Europol. In his current role, Dick
    has responsibility for Internet Community Engagement through which he
    hopes to achieve significant dialogue with the Internet’s
    multi-stakeholders and Law Enforcement, to work in partnership to
    prevent, disrupt and prosecute cyber criminals.

    Richard will bring a Internet Registry, Law Enforcement and
    International Cyber Investigation perspective to the conversation and
    dialogue.


    (7) Ben Butler has been with Go Daddy since 2001. In 2002, He formed the
    Go Daddy Abuse Department, and served as Director of Network Abuse for
    over 10 years. In this role, Ben helped create and enforce company and
    public policies dealing with every form of potential abuse that happens
    online, including spam, phishing, identity theft, copyright
    infringements, cyberbullying, child exploitation issues, and rogue
    internet pharmacies. He recently took on a new role as Director of the
    Digital Crimes Unit. Ben comes from a strong technical background
    including several years as a network and email administrator, and has
    experience in customer service, business management, and marketing.

    Ben will bring a registrar perspective to the conversation and dialogue.


    Description of the proposer's plans for remote participation

    The workshop will be organized as a facilitated dialogue. Led by the
    moderator, subject experts will debate and discuss the key questions and
    issues. Subject experts will give opening comments, after which the
    moderator will turn to those attending the session and invited experts
    in the audience to engage in facilitated dialogue.

    Background paper (attached)






    _______________________________________________
    LACNOG mailing list
    LACNOG en lacnic.net
    https://mail.lacnic.net/mailman/listinfo/lacnog
    Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog



  *  *  *  *  *
  Universidad de Granma
  http://www.udg.co.cu

  Participe en el VI Congreso Cubano de Desarrollo Local,
  Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
  30 de marzo de 2017.
  _______________________________________________
  LACNOG mailing list
  LACNOG en lacnic.net
  https://mail.lacnic.net/mailman/listinfo/lacnog
  Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog





--------------------------------------------------------------------------------


_______________________________________________
LACNOG mailing list
LACNOG en lacnic.net
https://mail.lacnic.net/mailman/listinfo/lacnog
Cancelar suscripcion: https://mail.lacnic.net/mailman/options/lacnog
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <https://mail.lacnic.net/pipermail/lacnog/attachments/20161110/d48fec52/attachment.html>


Más información sobre la lista de distribución LACNOG