<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=text/html;charset=utf-8 http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 11.00.9600.18500"></HEAD>
<BODY id=MailContainerBody
style="PADDING-TOP: 15px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px" leftMargin=0
topMargin=0 CanvasTabStop="true" name="Compose message area">
<DIV><FONT face=Calibri>carlos, ese router solo tiene atrás servidores de la
nube.</FONT></DIV>
<DIV><FONT face=Calibri>mi idea fue aprovechar la interface que tiene sin uso y
conectarla a otro switch. válido comentar que no me puedo poner a inventar mucho
con ese router, está en servicio y cualquier cambio implica fallos y tiempo de
desconexión ...</FONT></DIV>
<DIV style="FONT: 10pt Tahoma">
<DIV><BR></DIV>
<DIV style="BACKGROUND: #f5f5f5">
<DIV style="font-color: black"><B>From:</B> <A title=carlosm3011@gmail.com
href="mailto:carlosm3011@gmail.com">Carlos M. Martinez</A> </DIV>
<DIV><B>Sent:</B> Wednesday, November 9, 2016 3:29 PM</DIV>
<DIV><B>To:</B> <A title=lacnog@lacnic.net href="mailto:lacnog@lacnic.net">Latin
America and Caribbean Region Network Operators Group</A> </DIV>
<DIV><B>Subject:</B> Re: [lacnog] Consulta sobre cisco</DIV></DIV></DIV>
<DIV><BR></DIV>
<DIV style="FONT-FAMILY: sans-serif">
<DIV style="WHITE-SPACE: pre-wrap">
<DIV>Lo que dice Ariel tiene mucho sentido si lo que está atrás de ese router
son otros routers, o algo que hable IGPs. </DIV>
<DIV></DIV>
<DIV>Si son servers o hosts nomas, ahi no sería tan útil. Si bien uno puede
correr quagga o bird en ellos, en general es demasiada complejidad para
configuraciones usualmente muy simples. </DIV>
<DIV></DIV>
<DIV>Creo que lo que quieres lograr lo podrías lograr usando bridging, las
interfaces BVI por ejemplo. </DIV>
<DIV></DIV>
<DIV>Mira este documento: </DIV>
<DIV></DIV>
<DIV><A style="COLOR: #3983c4"
href="http://www.cisco.com/c/en/us/support/docs/lan-switching/integrated-routing-bridging-irb/17054-741-10.html">http://www.cisco.com/c/en/us/support/docs/lan-switching/integrated-routing-bridging-irb/17054-741-10.html</A>
</DIV>
<DIV></DIV>
<DIV>s2 </DIV>
<DIV></DIV>
<DIV>Carlos </DIV>
<DIV></DIV>
<DIV>On 9 Nov 2016, at 17:19, Ariel Weher wrote: </DIV>
<DIV></DIV></DIV>
<BLOCKQUOTE
style="COLOR: #777; PADDING-LEFT: 5px; MARGIN: 0px 0px 5px; BORDER-LEFT: #777 2px solid">
<DIV id=CA1700B8-EA4D-4B52-98A4-226C8EFFF3AD>
<DIV dir=ltr>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Hola
Manuel.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Quizás la
solución más fácil es que aproveches las ventajas del ECMP (equal cost multi
path), esto se hace de form automática cuando tienes dos rutas con la misma
métrica, la misma distancia administrativa y la misma red de destino.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Si corres un
IGP, esto puede llegar a hacerse sin intervención tuya al ver caminos
perfectamente iguales al mismo destino. Sino, vas a tener que poner algunas
rutas estáticas (con tracking e ip sla) para que se vuelvan nulas al no
responder el otro lado.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Claro está,
esto no sirve para interfaces bridgeadas, solo ruteadas.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace">Cualquier
cosa me contactas por unicast y te paso algunos ejemplos.</DIV>
<DIV class=gmail_default style="FONT-FAMILY: monospace,monospace"><BR></DIV>
<DIV class=gmail_default
style="FONT-FAMILY: monospace,monospace">Saludos!</DIV></DIV>
<DIV class=gmail_extra><BR>
<DIV class=gmail_quote>On Wed, Nov 9, 2016 at 5:14 PM, Alejandro Acosta <SPAN
dir=ltr><<A href="mailto:alejandroacostaalamo@gmail.com"
target=_blank>alejandroacostaalamo@gmail.com</A>></SPAN> wrote:<BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">no..,
esto no sería lo que estas buscando.<BR><BR>Tu respuesta en el mundo de
Cisco es etherchannel ..., nunca lo ví en routers pero si en LAN Switches.
No se si exista alguna solución más moderna y que yo me haya quedado en la
prehistoria :-|<BR><BR><BR>Saludos,<BR><BR>Ale,<BR><BR><BR><BR>El 9/11/16 a
las 2:11 p.m., Alejandro Acosta escribió:
<DIV class=HOEnZb>
<DIV class=h5><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">HSRP?
VRRP?<BR><BR><BR>El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro
escribió:<BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Hola,<BR>Alguien
sabe como configurar un router cisco (tal vez un 2900 o 2800) con dos
interfaces de red<BR>ethernet redundantes? algo parecido a lo que
llamamos en linux interfaces bond?<BR>Saludos,<BR>Manuel
Linares.<BR><BR>------------------------------<WBR>--------------------<BR>From:
"Robert Guerra" <<A href="mailto:rguerra@privaterra.org"
target=_blank>rguerra@privaterra.org</A>><BR>Sent: Monday, November
7, 2016 2:31 PM<BR>To: "Latin America and Caribbean Region Network
Operators Group" <<A href="mailto:lacnog@lacnic.net"
target=_blank>lacnog@lacnic.net</A>><BR>Cc: "GT IPv6 LAC / LAC IPv6
TF" <<A href="mailto:lactf@lacnic.net"
target=_blank>lactf@lacnic.net</A>><BR>Subject: [lacnog] IGF 2016 /
Se busca contactos sobre el despliegue de IPv6<BR><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Estimados
colegas,<BR><BR><BR>Estoy organizando una session sobre IPv6 en el
Foro de Governance que<BR>tendrá lugar en Mexico al mes que
viene.<BR><BR>Me encantaría incluir la participación de personas
responsable del<BR>despliegue de IPv6 de Latin America. A continuación
os incluyo detalles<BR>de la session.<BR><BR>Si teneis alguna
pregunta, envíame una
nota.<BR><BR>saludos<BR><BR>Roberto<BR><BR><BR><BR>-- <BR>Robert
Guerra<BR>Twitter: <A href="http://twitter.com/netfreedom"
rel=noreferrer target=_blank>twitter.com/netfreedom</A><BR>Email: <A
href="mailto:rguerra@privaterra.org"
target=_blank>rguerra@privaterra.org</A><BR>PGP Keys : <A
href="https://keybase.io/rguerra" rel=noreferrer
target=_blank>https://keybase.io/rguerra</A><BR><BR>Details of the
workshop<BR>——————————————————————————<BR><BR>IGF 2016 Workshop #6 :
Can Law enforcement catch bad actors online<BR>anymore<BR><BR><A
href="https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6"
rel=noreferrer
target=_blank>https://www.intgovforum.org/cm<WBR>s/igf2016/index.php/proposal/<WBR>view_public/6</A>
<BR><BR>Description of workshop:<BR><BR>The exhaustion of the IPv4
address supply has been predicted since the<BR>end of the 1980s.
However, the large scale adoption of mobile devices<BR>and their
associated IPv4 addressing needs accelerated the
exhaustion<BR>timetable, and placed increased pressure on network
operators to<BR>conserve IPv4 addresses<BR><BR>This pressure has
resulted in a marked increase in the use of<BR>technologies, such as
Network Address Translation (NAT), that allow<BR>pools of addresses to
be shared across multiple endpoints. These<BR>mechanisms enable the
reuse of the limited pool of available IPv4<BR>addresses, resulting in
the number of connected endpoints vastly<BR>outnumbering the number of
addresses in use in the public internet.<BR><BR>This has three
important implications for Internet technology<BR>developers, and
those who depend on certain behaviors of the
technology.<BR><BR>Application designers need to consider the fact
that an IP address does<BR>not necessarily identify an
endpoint.<BR><BR>Law enforcement and forensic functions need to
consider that an IP<BR>address alone may not be sufficient to
correlate Internet activity<BR>observations with an endpoint; and even
an IP address associated<BR>timestamp generally may not
suffice.<BR><BR>Data retention mechanisms and policies that record or
reference an IP<BR>address need to refactor their actions and
requirements to consider that<BR>in increasingly large parts of the
Internet, an IP address is merely a<BR>temporary identifier.
Potentially large volumes of ancillary data are<BR>required to match
an IP address to an endpoint.<BR><BR>Description of the plan to
facilitate discussion amongst speakers,<BR>audience members and remote
participants:<BR><BR>The workshop will be organized as a facilitated
dialogue. Led by the<BR>moderator, subject experts will debate and
discuss the key questions and<BR>issues. Subject experts will give
opening comments, after which the<BR>moderator will turn to those
attending the session and invited experts<BR>in the audience to engage
in facilitated dialogue.<BR><BR>In addition to the background
documents and papers that will be prepared<BR>ahead of the IGF,
additional articles of interest, commissioned blogs,<BR>reference
materials and social media conversations will be published
and<BR>distributed ahead of the workshop.<BR><BR>Speakers:<BR><BR>The
experts listed below have accepted the invitation to participate
in<BR>the session. They are drawn from the Law Enforcement,
Government,<BR>Academia, Civil Society, The Technical Community and
Private sector<BR>stakeholder groups. A facilitated dialogue will be
organized so that<BR>these experts can bring their knowledge and
perspective to discuss and<BR>debate the challenges brought by IPv4
exhaustion and the challenges and<BR>opportunities presented by IPv6
adoption.<BR><BR>(1) Jeffrey R. Bedser is the founder and CEO of
iThreat Cyber Group<BR><A href="http://www.ithreat.com" rel=noreferrer
target=_blank>www.ithreat.com</A>. Mr. Bedser has led ICG on its
journey from an internet<BR>investigative firm to a technology driven
threat Intelligence Company.<BR>ICG was formed in 1997 as Internet
Crimes Group. Mr. Bedser has been a<BR>facilitator, panelist and
speaker for organizations such as POLCYB, ASIS<BR>International,
Infragard, HTCIA, The Conference Board, ICANN and the FBI<BR>Training
Academy at Quantico. Mr. Bedser has received media coverage
on<BR>multiple occasions discussing topics surrounding cyber-crime and
cyber<BR>security.<BR><BR>For the session, Jeff will help present an
overview of the current<BR>challenges being faced by cyber
investigators as IPv4 addresses are<BR>exhausted and the transition to
a wider deployment of IPv6 takes place.<BR><BR><BR>(2) John Curran is
considered an Internet and telecommunications<BR>industry expert.
Curran was one of the founding members and is the<BR>current President
and Chief Executive Officer of the American Registry<BR>for Internet
Numbers (ARIN), a Regional Internet Registry (RIR). He is<BR>also a
Principal Associate at Isotropic, LLC., a cybersecurity
and<BR>telecommunications service provider. Curran actively
participates in the<BR>activities of the Internet Engineering Task
Force (IETF) and has served<BR>as co-chairman of the Operations and
Network Management Area and member<BR>of IPng (IPv6)
Directorate.<BR><BR>For the session, John will bring the North
American Regional Internet<BR>Registry perspective to the
conversation.<BR><BR>(3) Laura DeNardis is an American author and a
globally recognized<BR>scholar of Internet governance and technical
infrastructure. She is a<BR>tenured Professor and Associate Dean in
the School of Communication at<BR>American University. She is a Senior
Fellow of the Centre for<BR>International Governance Innovation (CIGI)
and serves as the Director of<BR>Research for the Global Commission on
Internet Governance. With a<BR>background in Information engineering
and a doctorate in Science and<BR>Technology Studies (STS), her
research studies the social and political<BR>implications of Internet
technical architecture and governance.<BR><BR>She is an appointed
member of the U.S. Department of State Advisory<BR>Committee on
International Communications and Information Policy<BR>(ACICIP). She
has more than two decades of experience as an expert<BR>consultant in
Internet Governance to Fortune 500 companies, foundations,<BR>and
government agencies.<BR><BR>For the session, Laura will bring an
academic and research perspective<BR>to the conversation<BR><BR>(4)
Robert Flaim has been a Supervisory Special Agent (SSA) for
the<BR>Federal Bureau of Investigation for over seventeen (17)
years.<BR>Currently, SSA Flaim is assigned to the Executive Staff Unit
of the<BR>Operational Technology Division in Quantico, Virginia. Since
2004, Mr.<BR>Flaim has worked on Internet Governance efforts with the
Internet<BR>Corporation of Assigned Names and Numbers (ICANN) and
Regional Internet<BR>Registries, i.e., ARIN, RIPE NCC, the Internet
Engineering Task Force<BR>and other Internet Governance organizations,
to foster Internet policies<BR>and practices that ensure effective
international law enforcement<BR>investigations. Prior to his current
position, Mr. Flaim worked at the<BR>FBI Washington Field Office on
cyber and counterterrorism<BR>investigations.<BR><BR>Bobby will bring
a US and international law enforcement perspective to<BR>the
conversation and dialogue. As well, Robert will bring a
unique<BR>first-hand familiarity of urgent cyber investigations to to
discussion.<BR><BR>(4) Athina Fragkouli is the Legal Counsel at the
RIPE Network<BR>Coordination Centre (NCC), where she is responsible
for all legal<BR>aspects of the organisation. She defines the RIPE NCC
legal framework,<BR>provides advice, and gives legal support for all
RIPE NCC activities.<BR>Athina works with a variety of Internet
stakeholders such as network<BR>operators, governments, and Law
Enforcement Agencies (LEA). She also<BR>represents the RIPE NCC in a
variety of fora such as technical meetings<BR>and EU-organised
events.<BR><BR>Athina - Will bring a European Regional Internet
Registry perspective to<BR>the panel. As well she will bring a rights
based, european and privacy<BR>perspective to the
conversation.<BR><BR>(5) Merike Kaeo is a recognized global expert in
information security<BR>and author of “Designing Network Security.”
Prior to joining<BR>Farsight Security, Merike served as Chief
Information Security Officer<BR>for Internet Identity (IID), where she
was responsible for maintaining<BR>IID’s vision and ensuring the
company’s sensitive information and<BR>technologies are protected.
Prior to joining IID, Merike founded Double<BR>Shot Security, which
provided strategic and operational guidance to<BR>secure Fortune 100
companies. She led the first security initiative for<BR>Cisco in the
mid-1990s. Merike is on ICANN’s Security and Stability<BR>Advisory
Council (SSAC) and the FCC’s Communications Security,<BR>Reliability
and Interoperability Council (CSRIC). She earned a MSEE from<BR>George
Washington University and a BSEE from Rutgers
University.<BR><BR><BR>(6) Dick Leaning has over 28 years’ experience
in Law Enforcement,<BR>leading teams of investigators in the
Metropolitan Police Service<BR>(London), UK National Crime Squad (NCS)
and the Serious Organised Crime<BR>Agency (SOCA) and from 2009 within
SOCA’s Cyber Crime Department. Dick<BR>has been the UK representative
at the G8 High-Tech Crime subgroup of<BR>senior experts and Interpol’s
European High-Tech Crime Working Group<BR>with responsibility for
enhancing the abilities of law enforcement.<BR>Based in The Hague
since September 2011, Dick joined the United Kingdom<BR>Liaison Bureau
(UKLB) desk as a Europol Cyber Liaison officer, and has<BR>recently
taken on the role of Seconded National Expert attached to
the<BR>European Cybercrime Center (EC3) at Europol. In his current
role, Dick<BR>has responsibility for Internet Community Engagement
through which he<BR>hopes to achieve significant dialogue with the
Internet’s<BR>multi-stakeholders and Law Enforcement, to work in
partnership to<BR>prevent, disrupt and prosecute cyber
criminals.<BR><BR>Richard will bring a Internet Registry, Law
Enforcement and<BR>International Cyber Investigation perspective to
the conversation and<BR>dialogue.<BR><BR><BR>(7) Ben Butler has been
with Go Daddy since 2001. In 2002, He formed the<BR>Go Daddy Abuse
Department, and served as Director of Network Abuse for<BR>over 10
years. In this role, Ben helped create and enforce company
and<BR>public policies dealing with every form of potential abuse that
happens<BR>online, including spam, phishing, identity theft,
copyright<BR>infringements, cyberbullying, child exploitation issues,
and rogue<BR>internet pharmacies. He recently took on a new role as
Director of the<BR>Digital Crimes Unit. Ben comes from a strong
technical background<BR>including several years as a network and email
administrator, and has<BR>experience in customer service, business
management, and marketing.<BR><BR>Ben will bring a registrar
perspective to the conversation and dialogue.<BR><BR><BR>Description
of the proposer's plans for remote participation<BR><BR>The workshop
will be organized as a facilitated dialogue. Led by the<BR>moderator,
subject experts will debate and discuss the key questions
and<BR>issues. Subject experts will give opening comments, after which
the<BR>moderator will turn to those attending the session and invited
experts<BR>in the audience to engage in facilitated
dialogue.<BR><BR>Background paper
(attached)<BR><BR></BLOCKQUOTE><BR><BR><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR><BR></BLOCKQUOTE><BR>*
* * * *<BR>Universidad de Granma<BR><A
href="http://www.udg.co.cu" rel=noreferrer
target=_blank>http://www.udg.co.cu</A><BR><BR>Participe en el VI
Congreso Cubano de Desarrollo Local,<BR>Hotel Sierra Maestra, Bayamo,
Granma, Cuba, del 28 al<BR>30 de marzo de
2017.<BR>______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR></BLOCKQUOTE><BR></BLOCKQUOTE><BR>______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR></DIV></DIV></BLOCKQUOTE></DIV><BR></DIV></DIV></BLOCKQUOTE>
<DIV style="WHITE-SPACE: pre-wrap">
<DIV></DIV>
<BLOCKQUOTE
style="COLOR: #777; PADDING-LEFT: 5px; MARGIN: 0px 0px 5px; BORDER-LEFT: #777 2px solid">
<DIV>_______________________________________________ </DIV>
<DIV>LACNOG mailing list </DIV>
<DIV>LACNOG@lacnic.net </DIV>
<DIV><A style="COLOR: #777"
href="https://mail.lacnic.net/mailman/listinfo/lacnog">https://mail.lacnic.net/mailman/listinfo/lacnog</A>
</DIV>
<DIV>Cancelar suscripcion: <A style="COLOR: #777"
href="https://mail.lacnic.net/mailman/options/lacnog">https://mail.lacnic.net/mailman/options/lacnog</A>
</DIV></BLOCKQUOTE></DIV></DIV>
<P>
<HR>
<P></P>_______________________________________________<BR>LACNOG mailing
list<BR>LACNOG@lacnic.net<BR>https://mail.lacnic.net/mailman/listinfo/lacnog<BR>Cancelar
suscripcion: https://mail.lacnic.net/mailman/options/lacnog<BR></BODY></HTML>