<html>
<head>
<meta content="text/html; charset=windows-1252"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<p>Funciona igual, lo mismo entre dispositivos, que hacia servidores
con bond<br>
</p>
<br>
<div class="moz-cite-prefix">El 09/11/2016 a las 15:17, Jose Mario
Alvarado Nunez escribió:<br>
</div>
<blockquote
cite="mid:CAMX1XdsjTKCVhdk_v3F7nh2L5NmqQWwZggfdf1Cu5TDshxP5rw@mail.gmail.com"
type="cite">
<div dir="ltr">Pero HSRP y VRRP no funcionan como redundante en un
mismo router como esos, solo para dos routers. O me equivoco?
nunca lo he intentando.</div>
<div class="gmail_extra"><br>
<div class="gmail_quote">2016-11-09 14:11 GMT-06:00 Alejandro
Acosta <span dir="ltr"><<a moz-do-not-send="true"
href="mailto:alejandroacostaalamo@gmail.com"
target="_blank">alejandroacostaalamo@gmail.com</a>></span>:<br>
<blockquote class="gmail_quote" style="margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">HSRP?
VRRP?<br>
<br>
<br>
El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro
escribió:
<div class="HOEnZb">
<div class="h5"><br>
<blockquote class="gmail_quote" style="margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
Hola,<br>
Alguien sabe como configurar un router cisco (tal vez
un 2900 o 2800) con dos interfaces de red<br>
ethernet redundantes? algo parecido a lo que llamamos
en linux interfaces bond?<br>
Saludos,<br>
Manuel Linares.<br>
<br>
------------------------------<wbr>--------------------<br>
From: "Robert Guerra" <<a moz-do-not-send="true"
href="mailto:rguerra@privaterra.org" target="_blank">rguerra@privaterra.org</a>><br>
Sent: Monday, November 7, 2016 2:31 PM<br>
To: "Latin America and Caribbean Region Network
Operators Group" <<a moz-do-not-send="true"
href="mailto:lacnog@lacnic.net" target="_blank">lacnog@lacnic.net</a>><br>
Cc: "GT IPv6 LAC / LAC IPv6 TF" <<a
moz-do-not-send="true"
href="mailto:lactf@lacnic.net" target="_blank">lactf@lacnic.net</a>><br>
Subject: [lacnog] IGF 2016 / Se busca contactos sobre
el despliegue de IPv6<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
Estimados colegas,<br>
<br>
<br>
Estoy organizando una session sobre IPv6 en el Foro
de Governance que<br>
tendrá lugar en Mexico al mes que viene.<br>
<br>
Me encantaría incluir la participación de personas
responsable del<br>
despliegue de IPv6 de Latin America. A continuación
os incluyo detalles<br>
de la session.<br>
<br>
Si teneis alguna pregunta, envíame una nota.<br>
<br>
saludos<br>
<br>
Roberto<br>
<br>
<br>
<br>
-- <br>
Robert Guerra<br>
Twitter: <a moz-do-not-send="true"
href="http://twitter.com/netfreedom"
rel="noreferrer" target="_blank">twitter.com/netfreedom</a><br>
Email: <a moz-do-not-send="true"
href="mailto:rguerra@privaterra.org"
target="_blank">rguerra@privaterra.org</a><br>
PGP Keys : <a moz-do-not-send="true"
href="https://keybase.io/rguerra" rel="noreferrer"
target="_blank">https://keybase.io/rguerra</a><br>
<br>
Details of the workshop<br>
——————————————————————————<br>
<br>
IGF 2016 Workshop #6 : Can Law enforcement catch bad
actors online<br>
anymore<br>
<br>
<a moz-do-not-send="true"
href="https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6"
rel="noreferrer" target="_blank">https://www.intgovforum.org/cm<wbr>s/igf2016/index.php/proposal/<wbr>view_public/6</a><br>
<br>
Description of workshop:<br>
<br>
The exhaustion of the IPv4 address supply has been
predicted since the<br>
end of the 1980s. However, the large scale adoption
of mobile devices<br>
and their associated IPv4 addressing needs
accelerated the exhaustion<br>
timetable, and placed increased pressure on network
operators to<br>
conserve IPv4 addresses<br>
<br>
This pressure has resulted in a marked increase in
the use of<br>
technologies, such as Network Address Translation
(NAT), that allow<br>
pools of addresses to be shared across multiple
endpoints. These<br>
mechanisms enable the reuse of the limited pool of
available IPv4<br>
addresses, resulting in the number of connected
endpoints vastly<br>
outnumbering the number of addresses in use in the
public internet.<br>
<br>
This has three important implications for Internet
technology<br>
developers, and those who depend on certain
behaviors of the technology.<br>
<br>
Application designers need to consider the fact that
an IP address does<br>
not necessarily identify an endpoint.<br>
<br>
Law enforcement and forensic functions need to
consider that an IP<br>
address alone may not be sufficient to correlate
Internet activity<br>
observations with an endpoint; and even an IP
address associated<br>
timestamp generally may not suffice.<br>
<br>
Data retention mechanisms and policies that record
or reference an IP<br>
address need to refactor their actions and
requirements to consider that<br>
in increasingly large parts of the Internet, an IP
address is merely a<br>
temporary identifier. Potentially large volumes of
ancillary data are<br>
required to match an IP address to an endpoint.<br>
<br>
Description of the plan to facilitate discussion
amongst speakers,<br>
audience members and remote participants:<br>
<br>
The workshop will be organized as a facilitated
dialogue. Led by the<br>
moderator, subject experts will debate and discuss
the key questions and<br>
issues. Subject experts will give opening comments,
after which the<br>
moderator will turn to those attending the session
and invited experts<br>
in the audience to engage in facilitated dialogue.<br>
<br>
In addition to the background documents and papers
that will be prepared<br>
ahead of the IGF, additional articles of interest,
commissioned blogs,<br>
reference materials and social media conversations
will be published and<br>
distributed ahead of the workshop.<br>
<br>
Speakers:<br>
<br>
The experts listed below have accepted the
invitation to participate in<br>
the session. They are drawn from the Law
Enforcement, Government,<br>
Academia, Civil Society, The Technical Community and
Private sector<br>
stakeholder groups. A facilitated dialogue will be
organized so that<br>
these experts can bring their knowledge and
perspective to discuss and<br>
debate the challenges brought by IPv4 exhaustion and
the challenges and<br>
opportunities presented by IPv6 adoption.<br>
<br>
(1) Jeffrey R. Bedser is the founder and CEO of
iThreat Cyber Group<br>
<a moz-do-not-send="true"
href="http://www.ithreat.com" rel="noreferrer"
target="_blank">www.ithreat.com</a>. Mr. Bedser
has led ICG on its journey from an internet<br>
investigative firm to a technology driven threat
Intelligence Company.<br>
ICG was formed in 1997 as Internet Crimes Group. Mr.
Bedser has been a<br>
facilitator, panelist and speaker for organizations
such as POLCYB, ASIS<br>
International, Infragard, HTCIA, The Conference
Board, ICANN and the FBI<br>
Training Academy at Quantico. Mr. Bedser has
received media coverage on<br>
multiple occasions discussing topics surrounding
cyber-crime and cyber<br>
security.<br>
<br>
For the session, Jeff will help present an overview
of the current<br>
challenges being faced by cyber investigators as
IPv4 addresses are<br>
exhausted and the transition to a wider deployment
of IPv6 takes place.<br>
<br>
<br>
(2) John Curran is considered an Internet and
telecommunications<br>
industry expert. Curran was one of the founding
members and is the<br>
current President and Chief Executive Officer of the
American Registry<br>
for Internet Numbers (ARIN), a Regional Internet
Registry (RIR). He is<br>
also a Principal Associate at Isotropic, LLC., a
cybersecurity and<br>
telecommunications service provider. Curran actively
participates in the<br>
activities of the Internet Engineering Task Force
(IETF) and has served<br>
as co-chairman of the Operations and Network
Management Area and member<br>
of IPng (IPv6) Directorate.<br>
<br>
For the session, John will bring the North American
Regional Internet<br>
Registry perspective to the conversation.<br>
<br>
(3) Laura DeNardis is an American author and a
globally recognized<br>
scholar of Internet governance and technical
infrastructure. She is a<br>
tenured Professor and Associate Dean in the School
of Communication at<br>
American University. She is a Senior Fellow of the
Centre for<br>
International Governance Innovation (CIGI) and
serves as the Director of<br>
Research for the Global Commission on Internet
Governance. With a<br>
background in Information engineering and a
doctorate in Science and<br>
Technology Studies (STS), her research studies the
social and political<br>
implications of Internet technical architecture and
governance.<br>
<br>
She is an appointed member of the U.S. Department of
State Advisory<br>
Committee on International Communications and
Information Policy<br>
(ACICIP). She has more than two decades of
experience as an expert<br>
consultant in Internet Governance to Fortune 500
companies, foundations,<br>
and government agencies.<br>
<br>
For the session, Laura will bring an academic and
research perspective<br>
to the conversation<br>
<br>
(4) Robert Flaim has been a Supervisory Special
Agent (SSA) for the<br>
Federal Bureau of Investigation for over seventeen
(17) years.<br>
Currently, SSA Flaim is assigned to the Executive
Staff Unit of the<br>
Operational Technology Division in Quantico,
Virginia. Since 2004, Mr.<br>
Flaim has worked on Internet Governance efforts with
the Internet<br>
Corporation of Assigned Names and Numbers (ICANN)
and Regional Internet<br>
Registries, i.e., ARIN, RIPE NCC, the Internet
Engineering Task Force<br>
and other Internet Governance organizations, to
foster Internet policies<br>
and practices that ensure effective international
law enforcement<br>
investigations. Prior to his current position, Mr.
Flaim worked at the<br>
FBI Washington Field Office on cyber and
counterterrorism<br>
investigations.<br>
<br>
Bobby will bring a US and international law
enforcement perspective to<br>
the conversation and dialogue. As well, Robert will
bring a unique<br>
first-hand familiarity of urgent cyber
investigations to to discussion.<br>
<br>
(4) Athina Fragkouli is the Legal Counsel at the
RIPE Network<br>
Coordination Centre (NCC), where she is responsible
for all legal<br>
aspects of the organisation. She defines the RIPE
NCC legal framework,<br>
provides advice, and gives legal support for all
RIPE NCC activities.<br>
Athina works with a variety of Internet stakeholders
such as network<br>
operators, governments, and Law Enforcement Agencies
(LEA). She also<br>
represents the RIPE NCC in a variety of fora such as
technical meetings<br>
and EU-organised events.<br>
<br>
Athina - Will bring a European Regional Internet
Registry perspective to<br>
the panel. As well she will bring a rights based,
european and privacy<br>
perspective to the conversation.<br>
<br>
(5) Merike Kaeo is a recognized global expert in
information security<br>
and author of “Designing Network Security.” Prior to
joining<br>
Farsight Security, Merike served as Chief
Information Security Officer<br>
for Internet Identity (IID), where she was
responsible for maintaining<br>
IID’s vision and ensuring the company’s sensitive
information and<br>
technologies are protected. Prior to joining IID,
Merike founded Double<br>
Shot Security, which provided strategic and
operational guidance to<br>
secure Fortune 100 companies. She led the first
security initiative for<br>
Cisco in the mid-1990s. Merike is on ICANN’s
Security and Stability<br>
Advisory Council (SSAC) and the FCC’s Communications
Security,<br>
Reliability and Interoperability Council (CSRIC).
She earned a MSEE from<br>
George Washington University and a BSEE from Rutgers
University.<br>
<br>
<br>
(6) Dick Leaning has over 28 years’ experience in
Law Enforcement,<br>
leading teams of investigators in the Metropolitan
Police Service<br>
(London), UK National Crime Squad (NCS) and the
Serious Organised Crime<br>
Agency (SOCA) and from 2009 within SOCA’s Cyber
Crime Department. Dick<br>
has been the UK representative at the G8 High-Tech
Crime subgroup of<br>
senior experts and Interpol’s European High-Tech
Crime Working Group<br>
with responsibility for enhancing the abilities of
law enforcement.<br>
Based in The Hague since September 2011, Dick joined
the United Kingdom<br>
Liaison Bureau (UKLB) desk as a Europol Cyber
Liaison officer, and has<br>
recently taken on the role of Seconded National
Expert attached to the<br>
European Cybercrime Center (EC3) at Europol. In his
current role, Dick<br>
has responsibility for Internet Community Engagement
through which he<br>
hopes to achieve significant dialogue with the
Internet’s<br>
multi-stakeholders and Law Enforcement, to work in
partnership to<br>
prevent, disrupt and prosecute cyber criminals.<br>
<br>
Richard will bring a Internet Registry, Law
Enforcement and<br>
International Cyber Investigation perspective to the
conversation and<br>
dialogue.<br>
<br>
<br>
(7) Ben Butler has been with Go Daddy since 2001. In
2002, He formed the<br>
Go Daddy Abuse Department, and served as Director of
Network Abuse for<br>
over 10 years. In this role, Ben helped create and
enforce company and<br>
public policies dealing with every form of potential
abuse that happens<br>
online, including spam, phishing, identity theft,
copyright<br>
infringements, cyberbullying, child exploitation
issues, and rogue<br>
internet pharmacies. He recently took on a new role
as Director of the<br>
Digital Crimes Unit. Ben comes from a strong
technical background<br>
including several years as a network and email
administrator, and has<br>
experience in customer service, business management,
and marketing.<br>
<br>
Ben will bring a registrar perspective to the
conversation and dialogue.<br>
<br>
<br>
Description of the proposer's plans for remote
participation<br>
<br>
The workshop will be organized as a facilitated
dialogue. Led by the<br>
moderator, subject experts will debate and discuss
the key questions and<br>
issues. Subject experts will give opening comments,
after which the<br>
moderator will turn to those attending the session
and invited experts<br>
in the audience to engage in facilitated dialogue.<br>
<br>
Background paper (attached)<br>
<br>
</blockquote>
<br>
<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
______________________________<wbr>_________________<br>
LACNOG mailing list<br>
<a moz-do-not-send="true"
href="mailto:LACNOG@lacnic.net" target="_blank">LACNOG@lacnic.net</a><br>
<a moz-do-not-send="true"
href="https://mail.lacnic.net/mailman/listinfo/lacnog"
rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/listinfo/lacnog</a><br>
Cancelar suscripcion: <a moz-do-not-send="true"
href="https://mail.lacnic.net/mailman/options/lacnog"
rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/options/lacnog</a><br>
<br>
</blockquote>
<br>
* * * * *<br>
Universidad de Granma<br>
<a moz-do-not-send="true" href="http://www.udg.co.cu"
rel="noreferrer" target="_blank">http://www.udg.co.cu</a><br>
<br>
Participe en el VI Congreso Cubano de Desarrollo
Local,<br>
Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al<br>
30 de marzo de 2017.<br>
______________________________<wbr>_________________<br>
LACNOG mailing list<br>
<a moz-do-not-send="true"
href="mailto:LACNOG@lacnic.net" target="_blank">LACNOG@lacnic.net</a><br>
<a moz-do-not-send="true"
href="https://mail.lacnic.net/mailman/listinfo/lacnog"
rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/listinfo/lacnog</a><br>
Cancelar suscripcion: <a moz-do-not-send="true"
href="https://mail.lacnic.net/mailman/options/lacnog"
rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/options/lacnog</a><br>
</blockquote>
<br>
______________________________<wbr>_________________<br>
LACNOG mailing list<br>
<a moz-do-not-send="true"
href="mailto:LACNOG@lacnic.net" target="_blank">LACNOG@lacnic.net</a><br>
<a moz-do-not-send="true"
href="https://mail.lacnic.net/mailman/listinfo/lacnog"
rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/listinfo/lacnog</a><br>
Cancelar suscripcion: <a moz-do-not-send="true"
href="https://mail.lacnic.net/mailman/options/lacnog"
rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/options/lacnog</a><br>
</div>
</div>
</blockquote>
</div>
<br>
</div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
LACNOG mailing list
<a class="moz-txt-link-abbreviated" href="mailto:LACNOG@lacnic.net">LACNOG@lacnic.net</a>
<a class="moz-txt-link-freetext" href="https://mail.lacnic.net/mailman/listinfo/lacnog">https://mail.lacnic.net/mailman/listinfo/lacnog</a>
Cancelar suscripcion: <a class="moz-txt-link-freetext" href="https://mail.lacnic.net/mailman/options/lacnog">https://mail.lacnic.net/mailman/options/lacnog</a>
</pre>
</blockquote>
<br>
</body>
</html>