<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=text/html;charset=utf-8 http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 11.00.9600.18500"></HEAD>
<BODY id=MailContainerBody
style="PADDING-TOP: 15px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px" leftMargin=0
topMargin=0 CanvasTabStop="true" name="Compose message area">
<DIV><FONT face=Calibri>ariel.</FONT></DIV>
<DIV><FONT face=Calibri>gracias por responder. esa variante no implicaría el uso
de una dirección IP adicional? ya estoy casi al límite con las IP públicas
disponibles...</FONT><BR></DIV>
<DIV style="FONT: 10pt Tahoma">
<DIV style="BACKGROUND: #f5f5f5">
<DIV style="font-color: black"><B>From:</B> <A title=ariel@weher.net
href="mailto:ariel@weher.net">Ariel Weher</A> </DIV>
<DIV><B>Sent:</B> Wednesday, November 9, 2016 3:19 PM</DIV>
<DIV><B>To:</B> <A
title="mailto:lacnog@lacnic.net
CTRL + clic para seguir el vínculo"
href="mailto:lacnog@lacnic.net">Latin America and Caribbean Region Network
Operators Group</A> </DIV>
<DIV><B>Subject:</B> Re: [lacnog] Consulta sobre cisco</DIV></DIV></DIV>
<DIV><BR></DIV>
<DIV dir=ltr>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Hola
Manuel.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Quizás la
solución más fácil es que aproveches las ventajas del ECMP (equal cost multi
path), esto se hace de form automática cuando tienes dos rutas con la misma
métrica, la misma distancia administrativa y la misma red de destino.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Si corres un
IGP, esto puede llegar a hacerse sin intervención tuya al ver caminos
perfectamente iguales al mismo destino. Sino, vas a tener que poner algunas
rutas estáticas (con tracking e ip sla) para que se vuelvan nulas al no
responder el otro lado.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Claro está,
esto no sirve para interfaces bridgeadas, solo ruteadas.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Cualquier cosa
me contactas por unicast y te paso algunos ejemplos.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default
style="FONT-FAMILY: monospace,monospace">Saludos!</DIV></DIV>
<DIV class=gmail_extra><BR>
<DIV class=gmail_quote>On Wed, Nov 9, 2016 at 5:14 PM, Alejandro Acosta <SPAN
dir=ltr><<A href="mailto:alejandroacostaalamo@gmail.com"
target=_blank>alejandroacostaalamo@gmail.com</A>></SPAN> wrote:<BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">no..,
esto no sería lo que estas buscando.<BR><BR>Tu respuesta en el mundo de Cisco
es etherchannel ..., nunca lo ví en routers pero si en LAN Switches. No se si
exista alguna solución más moderna y que yo me haya quedado en la prehistoria
:-|<BR><BR><BR>Saludos,<BR><BR>Ale,<BR><BR><BR><BR>El 9/11/16 a las 2:11 p.m.,
Alejandro Acosta escribió:
<DIV class=HOEnZb>
<DIV class=h5><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">HSRP?
VRRP?<BR><BR><BR>El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro
escribió:<BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Hola,<BR>Alguien
sabe como configurar un router cisco (tal vez un 2900 o 2800) con dos
interfaces de red<BR>ethernet redundantes? algo parecido a lo que llamamos
en linux interfaces bond?<BR>Saludos,<BR>Manuel
Linares.<BR><BR>------------------------------<WBR>--------------------<BR>From:
"Robert Guerra" <<A href="mailto:rguerra@privaterra.org"
target=_blank>rguerra@privaterra.org</A>><BR>Sent: Monday, November 7,
2016 2:31 PM<BR>To: "Latin America and Caribbean Region Network Operators
Group" <<A href="mailto:lacnog@lacnic.net"
target=_blank>lacnog@lacnic.net</A>><BR>Cc: "GT IPv6 LAC / LAC IPv6 TF"
<<A href="mailto:lactf@lacnic.net"
target=_blank>lactf@lacnic.net</A>><BR>Subject: [lacnog] IGF 2016 / Se
busca contactos sobre el despliegue de IPv6<BR><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Estimados
colegas,<BR><BR><BR>Estoy organizando una session sobre IPv6 en el Foro
de Governance que<BR>tendrá lugar en Mexico al mes que viene.<BR><BR>Me
encantaría incluir la participación de personas responsable
del<BR>despliegue de IPv6 de Latin America. A continuación os incluyo
detalles<BR>de la session.<BR><BR>Si teneis alguna pregunta, envíame una
nota.<BR><BR>saludos<BR><BR>Roberto<BR><BR><BR><BR>-- <BR>Robert
Guerra<BR>Twitter: <A href="http://twitter.com/netfreedom"
rel=noreferrer target=_blank>twitter.com/netfreedom</A><BR>Email: <A
href="mailto:rguerra@privaterra.org"
target=_blank>rguerra@privaterra.org</A><BR>PGP Keys : <A
href="https://keybase.io/rguerra" rel=noreferrer
target=_blank>https://keybase.io/rguerra</A><BR><BR>Details of the
workshop<BR>——————————————————————————<BR><BR>IGF 2016 Workshop #6 : Can
Law enforcement catch bad actors online<BR>anymore<BR><BR><A
href="https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6"
rel=noreferrer
target=_blank>https://www.intgovforum.org/cm<WBR>s/igf2016/index.php/proposal/<WBR>view_public/6</A>
<BR><BR>Description of workshop:<BR><BR>The exhaustion of the IPv4
address supply has been predicted since the<BR>end of the 1980s.
However, the large scale adoption of mobile devices<BR>and their
associated IPv4 addressing needs accelerated the
exhaustion<BR>timetable, and placed increased pressure on network
operators to<BR>conserve IPv4 addresses<BR><BR>This pressure has
resulted in a marked increase in the use of<BR>technologies, such as
Network Address Translation (NAT), that allow<BR>pools of addresses to
be shared across multiple endpoints. These<BR>mechanisms enable the
reuse of the limited pool of available IPv4<BR>addresses, resulting in
the number of connected endpoints vastly<BR>outnumbering the number of
addresses in use in the public internet.<BR><BR>This has three important
implications for Internet technology<BR>developers, and those who depend
on certain behaviors of the technology.<BR><BR>Application designers
need to consider the fact that an IP address does<BR>not necessarily
identify an endpoint.<BR><BR>Law enforcement and forensic functions need
to consider that an IP<BR>address alone may not be sufficient to
correlate Internet activity<BR>observations with an endpoint; and even
an IP address associated<BR>timestamp generally may not
suffice.<BR><BR>Data retention mechanisms and policies that record or
reference an IP<BR>address need to refactor their actions and
requirements to consider that<BR>in increasingly large parts of the
Internet, an IP address is merely a<BR>temporary identifier. Potentially
large volumes of ancillary data are<BR>required to match an IP address
to an endpoint.<BR><BR>Description of the plan to facilitate discussion
amongst speakers,<BR>audience members and remote
participants:<BR><BR>The workshop will be organized as a facilitated
dialogue. Led by the<BR>moderator, subject experts will debate and
discuss the key questions and<BR>issues. Subject experts will give
opening comments, after which the<BR>moderator will turn to those
attending the session and invited experts<BR>in the audience to engage
in facilitated dialogue.<BR><BR>In addition to the background documents
and papers that will be prepared<BR>ahead of the IGF, additional
articles of interest, commissioned blogs,<BR>reference materials and
social media conversations will be published and<BR>distributed ahead of
the workshop.<BR><BR>Speakers:<BR><BR>The experts listed below have
accepted the invitation to participate in<BR>the session. They are drawn
from the Law Enforcement, Government,<BR>Academia, Civil Society, The
Technical Community and Private sector<BR>stakeholder groups. A
facilitated dialogue will be organized so that<BR>these experts can
bring their knowledge and perspective to discuss and<BR>debate the
challenges brought by IPv4 exhaustion and the challenges
and<BR>opportunities presented by IPv6 adoption.<BR><BR>(1) Jeffrey R.
Bedser is the founder and CEO of iThreat Cyber Group<BR><A
href="http://www.ithreat.com" rel=noreferrer
target=_blank>www.ithreat.com</A>. Mr. Bedser has led ICG on its journey
from an internet<BR>investigative firm to a technology driven threat
Intelligence Company.<BR>ICG was formed in 1997 as Internet Crimes
Group. Mr. Bedser has been a<BR>facilitator, panelist and speaker for
organizations such as POLCYB, ASIS<BR>International, Infragard, HTCIA,
The Conference Board, ICANN and the FBI<BR>Training Academy at Quantico.
Mr. Bedser has received media coverage on<BR>multiple occasions
discussing topics surrounding cyber-crime and
cyber<BR>security.<BR><BR>For the session, Jeff will help present an
overview of the current<BR>challenges being faced by cyber investigators
as IPv4 addresses are<BR>exhausted and the transition to a wider
deployment of IPv6 takes place.<BR><BR><BR>(2) John Curran is considered
an Internet and telecommunications<BR>industry expert. Curran was one of
the founding members and is the<BR>current President and Chief Executive
Officer of the American Registry<BR>for Internet Numbers (ARIN), a
Regional Internet Registry (RIR). He is<BR>also a Principal Associate at
Isotropic, LLC., a cybersecurity and<BR>telecommunications service
provider. Curran actively participates in the<BR>activities of the
Internet Engineering Task Force (IETF) and has served<BR>as co-chairman
of the Operations and Network Management Area and member<BR>of IPng
(IPv6) Directorate.<BR><BR>For the session, John will bring the North
American Regional Internet<BR>Registry perspective to the
conversation.<BR><BR>(3) Laura DeNardis is an American author and a
globally recognized<BR>scholar of Internet governance and technical
infrastructure. She is a<BR>tenured Professor and Associate Dean in the
School of Communication at<BR>American University. She is a Senior
Fellow of the Centre for<BR>International Governance Innovation (CIGI)
and serves as the Director of<BR>Research for the Global Commission on
Internet Governance. With a<BR>background in Information engineering and
a doctorate in Science and<BR>Technology Studies (STS), her research
studies the social and political<BR>implications of Internet technical
architecture and governance.<BR><BR>She is an appointed member of the
U.S. Department of State Advisory<BR>Committee on International
Communications and Information Policy<BR>(ACICIP). She has more than two
decades of experience as an expert<BR>consultant in Internet Governance
to Fortune 500 companies, foundations,<BR>and government
agencies.<BR><BR>For the session, Laura will bring an academic and
research perspective<BR>to the conversation<BR><BR>(4) Robert Flaim has
been a Supervisory Special Agent (SSA) for the<BR>Federal Bureau of
Investigation for over seventeen (17) years.<BR>Currently, SSA Flaim is
assigned to the Executive Staff Unit of the<BR>Operational Technology
Division in Quantico, Virginia. Since 2004, Mr.<BR>Flaim has worked on
Internet Governance efforts with the Internet<BR>Corporation of Assigned
Names and Numbers (ICANN) and Regional Internet<BR>Registries, i.e.,
ARIN, RIPE NCC, the Internet Engineering Task Force<BR>and other
Internet Governance organizations, to foster Internet policies<BR>and
practices that ensure effective international law
enforcement<BR>investigations. Prior to his current position, Mr. Flaim
worked at the<BR>FBI Washington Field Office on cyber and
counterterrorism<BR>investigations.<BR><BR>Bobby will bring a US and
international law enforcement perspective to<BR>the conversation and
dialogue. As well, Robert will bring a unique<BR>first-hand familiarity
of urgent cyber investigations to to discussion.<BR><BR>(4) Athina
Fragkouli is the Legal Counsel at the RIPE Network<BR>Coordination
Centre (NCC), where she is responsible for all legal<BR>aspects of the
organisation. She defines the RIPE NCC legal framework,<BR>provides
advice, and gives legal support for all RIPE NCC activities.<BR>Athina
works with a variety of Internet stakeholders such as
network<BR>operators, governments, and Law Enforcement Agencies (LEA).
She also<BR>represents the RIPE NCC in a variety of fora such as
technical meetings<BR>and EU-organised events.<BR><BR>Athina - Will
bring a European Regional Internet Registry perspective to<BR>the panel.
As well she will bring a rights based, european and
privacy<BR>perspective to the conversation.<BR><BR>(5) Merike Kaeo is a
recognized global expert in information security<BR>and author of
“Designing Network Security.” Prior to joining<BR>Farsight Security,
Merike served as Chief Information Security Officer<BR>for Internet
Identity (IID), where she was responsible for maintaining<BR>IID’s
vision and ensuring the company’s sensitive information
and<BR>technologies are protected. Prior to joining IID, Merike founded
Double<BR>Shot Security, which provided strategic and operational
guidance to<BR>secure Fortune 100 companies. She led the first security
initiative for<BR>Cisco in the mid-1990s. Merike is on ICANN’s Security
and Stability<BR>Advisory Council (SSAC) and the FCC’s Communications
Security,<BR>Reliability and Interoperability Council (CSRIC). She
earned a MSEE from<BR>George Washington University and a BSEE from
Rutgers University.<BR><BR><BR>(6) Dick Leaning has over 28 years’
experience in Law Enforcement,<BR>leading teams of investigators in the
Metropolitan Police Service<BR>(London), UK National Crime Squad (NCS)
and the Serious Organised Crime<BR>Agency (SOCA) and from 2009 within
SOCA’s Cyber Crime Department. Dick<BR>has been the UK representative at
the G8 High-Tech Crime subgroup of<BR>senior experts and Interpol’s
European High-Tech Crime Working Group<BR>with responsibility for
enhancing the abilities of law enforcement.<BR>Based in The Hague since
September 2011, Dick joined the United Kingdom<BR>Liaison Bureau (UKLB)
desk as a Europol Cyber Liaison officer, and has<BR>recently taken on
the role of Seconded National Expert attached to the<BR>European
Cybercrime Center (EC3) at Europol. In his current role, Dick<BR>has
responsibility for Internet Community Engagement through which
he<BR>hopes to achieve significant dialogue with the
Internet’s<BR>multi-stakeholders and Law Enforcement, to work in
partnership to<BR>prevent, disrupt and prosecute cyber
criminals.<BR><BR>Richard will bring a Internet Registry, Law
Enforcement and<BR>International Cyber Investigation perspective to the
conversation and<BR>dialogue.<BR><BR><BR>(7) Ben Butler has been with Go
Daddy since 2001. In 2002, He formed the<BR>Go Daddy Abuse Department,
and served as Director of Network Abuse for<BR>over 10 years. In this
role, Ben helped create and enforce company and<BR>public policies
dealing with every form of potential abuse that happens<BR>online,
including spam, phishing, identity theft, copyright<BR>infringements,
cyberbullying, child exploitation issues, and rogue<BR>internet
pharmacies. He recently took on a new role as Director of the<BR>Digital
Crimes Unit. Ben comes from a strong technical background<BR>including
several years as a network and email administrator, and
has<BR>experience in customer service, business management, and
marketing.<BR><BR>Ben will bring a registrar perspective to the
conversation and dialogue.<BR><BR><BR>Description of the proposer's
plans for remote participation<BR><BR>The workshop will be organized as
a facilitated dialogue. Led by the<BR>moderator, subject experts will
debate and discuss the key questions and<BR>issues. Subject experts will
give opening comments, after which the<BR>moderator will turn to those
attending the session and invited experts<BR>in the audience to engage
in facilitated dialogue.<BR><BR>Background paper
(attached)<BR><BR></BLOCKQUOTE><BR><BR><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR><BR></BLOCKQUOTE><BR>*
* * * *<BR>Universidad de Granma<BR><A
href="http://www.udg.co.cu" rel=noreferrer
target=_blank>http://www.udg.co.cu</A><BR><BR>Participe en el VI Congreso
Cubano de Desarrollo Local,<BR>Hotel Sierra Maestra, Bayamo, Granma, Cuba,
del 28 al<BR>30 de marzo de
2017.<BR>______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR></BLOCKQUOTE><BR></BLOCKQUOTE><BR>______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR></DIV></DIV></BLOCKQUOTE></DIV><BR></DIV>
<P>
<HR>
<P></P>_______________________________________________<BR>LACNOG mailing
list<BR>LACNOG@lacnic.net<BR>https://mail.lacnic.net/mailman/listinfo/lacnog<BR>Cancelar
suscripcion: https://mail.lacnic.net/mailman/options/lacnog<BR></BODY></HTML>