<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <p>Manuel, sigue la explicación de Ariel Weher que tiene mucha mas
      experiencia que yo. :)<br>
    </p>
    <br>
    <div class="moz-cite-prefix">El 09/11/2016 a las 15:19, Ariel Weher
      escribió:<br>
    </div>
    <blockquote
cite="mid:CA+=gdqVhoGM96cqy8i5gefXtOE3g9xhg5PF+wD3jJSFN_HGJqQ@mail.gmail.com"
      type="cite">
      <div dir="ltr">
        <div class="gmail_default"
          style="font-family:monospace,monospace">Hola Manuel.</div>
        <div class="gmail_default"
          style="font-family:monospace,monospace"><br>
        </div>
        <div class="gmail_default"
          style="font-family:monospace,monospace">Quizás la solución más
          fácil es que aproveches las ventajas del ECMP (equal cost
          multi path), esto se hace de form automática cuando tienes dos
          rutas con la misma métrica, la misma distancia administrativa
          y la misma red de destino.</div>
        <div class="gmail_default"
          style="font-family:monospace,monospace"><br>
        </div>
        <div class="gmail_default"
          style="font-family:monospace,monospace">Si corres un IGP, esto
          puede llegar a hacerse sin intervención tuya al ver caminos
          perfectamente iguales al mismo destino. Sino, vas a tener que
          poner algunas rutas estáticas (con tracking e ip sla) para que
          se vuelvan nulas al no responder el otro lado.</div>
        <div class="gmail_default"
          style="font-family:monospace,monospace"><br>
        </div>
        <div class="gmail_default"
          style="font-family:monospace,monospace">Claro está, esto no
          sirve para interfaces bridgeadas, solo ruteadas.</div>
        <div class="gmail_default"
          style="font-family:monospace,monospace"><br>
        </div>
        <div class="gmail_default"
          style="font-family:monospace,monospace">Cualquier cosa me
          contactas por unicast y te paso algunos ejemplos.</div>
        <div class="gmail_default"
          style="font-family:monospace,monospace"><br>
        </div>
        <div class="gmail_default"
          style="font-family:monospace,monospace">Saludos!</div>
      </div>
      <div class="gmail_extra"><br>
        <div class="gmail_quote">On Wed, Nov 9, 2016 at 5:14 PM,
          Alejandro Acosta <span dir="ltr"><<a
              moz-do-not-send="true"
              href="mailto:alejandroacostaalamo@gmail.com"
              target="_blank">alejandroacostaalamo@gmail.com</a>></span>
          wrote:<br>
          <blockquote class="gmail_quote" style="margin:0 0 0
            .8ex;border-left:1px #ccc solid;padding-left:1ex">no.., esto
            no sería lo que estas buscando.<br>
            <br>
            Tu respuesta en el mundo de Cisco es etherchannel ..., nunca
            lo ví en routers pero si en LAN Switches. No se si exista
            alguna solución más moderna y que yo me haya quedado en la
            prehistoria :-|<br>
            <br>
            <br>
            Saludos,<br>
            <br>
            Ale,<br>
            <br>
            <br>
            <br>
            El 9/11/16 a las 2:11 p.m., Alejandro Acosta escribió:
            <div class="HOEnZb">
              <div class="h5"><br>
                <blockquote class="gmail_quote" style="margin:0 0 0
                  .8ex;border-left:1px #ccc solid;padding-left:1ex">
                  HSRP? VRRP?<br>
                  <br>
                  <br>
                  El 9/11/16 a las 2:08 p.m., Manuel José Linares Alvaro
                  escribió:<br>
                  <blockquote class="gmail_quote" style="margin:0 0 0
                    .8ex;border-left:1px #ccc solid;padding-left:1ex">
                    Hola,<br>
                    Alguien sabe como configurar un router cisco (tal
                    vez un 2900 o 2800) con dos interfaces de red<br>
                    ethernet redundantes? algo parecido a lo que
                    llamamos en linux interfaces bond?<br>
                    Saludos,<br>
                    Manuel Linares.<br>
                    <br>
                    ------------------------------<wbr>--------------------<br>
                    From: "Robert Guerra" <<a moz-do-not-send="true"
                      href="mailto:rguerra@privaterra.org"
                      target="_blank">rguerra@privaterra.org</a>><br>
                    Sent: Monday, November 7, 2016 2:31 PM<br>
                    To: "Latin America and Caribbean Region Network
                    Operators Group" <<a moz-do-not-send="true"
                      href="mailto:lacnog@lacnic.net" target="_blank">lacnog@lacnic.net</a>><br>
                    Cc: "GT IPv6 LAC / LAC IPv6 TF" <<a
                      moz-do-not-send="true"
                      href="mailto:lactf@lacnic.net" target="_blank">lactf@lacnic.net</a>><br>
                    Subject: [lacnog] IGF 2016 / Se busca contactos
                    sobre el despliegue de IPv6<br>
                    <br>
                    <blockquote class="gmail_quote" style="margin:0 0 0
                      .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      Estimados colegas,<br>
                      <br>
                      <br>
                      Estoy organizando una session sobre IPv6 en el
                      Foro de Governance que<br>
                      tendrá lugar en Mexico al mes que viene.<br>
                      <br>
                      Me encantaría incluir la participación de personas
                      responsable del<br>
                      despliegue de IPv6 de Latin America. A
                      continuación os incluyo detalles<br>
                      de la session.<br>
                      <br>
                      Si teneis alguna pregunta, envíame una nota.<br>
                      <br>
                      saludos<br>
                      <br>
                      Roberto<br>
                      <br>
                      <br>
                      <br>
                      -- <br>
                      Robert Guerra<br>
                      Twitter: <a moz-do-not-send="true"
                        href="http://twitter.com/netfreedom"
                        rel="noreferrer" target="_blank">twitter.com/netfreedom</a><br>
                      Email: <a moz-do-not-send="true"
                        href="mailto:rguerra@privaterra.org"
                        target="_blank">rguerra@privaterra.org</a><br>
                      PGP Keys : <a moz-do-not-send="true"
                        href="https://keybase.io/rguerra"
                        rel="noreferrer" target="_blank">https://keybase.io/rguerra</a><br>
                      <br>
                      Details of the workshop<br>
                      ——————————————————————————<br>
                      <br>
                      IGF 2016 Workshop #6 : Can Law enforcement catch
                      bad actors online<br>
                      anymore<br>
                      <br>
                      <a moz-do-not-send="true"
href="https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6"
                        rel="noreferrer" target="_blank">https://www.intgovforum.org/cm<wbr>s/igf2016/index.php/proposal/<wbr>view_public/6</a>
                      <br>
                      <br>
                      Description of workshop:<br>
                      <br>
                      The exhaustion of the IPv4 address supply has been
                      predicted since the<br>
                      end of the 1980s. However, the large scale
                      adoption of mobile devices<br>
                      and their associated IPv4 addressing needs
                      accelerated the exhaustion<br>
                      timetable, and placed increased pressure on
                      network operators to<br>
                      conserve IPv4 addresses<br>
                      <br>
                      This pressure has resulted in a marked increase in
                      the use of<br>
                      technologies, such as Network Address Translation
                      (NAT), that allow<br>
                      pools of addresses to be shared across multiple
                      endpoints. These<br>
                      mechanisms enable the reuse of the limited pool of
                      available IPv4<br>
                      addresses, resulting in the number of connected
                      endpoints vastly<br>
                      outnumbering the number of addresses in use in the
                      public internet.<br>
                      <br>
                      This has three important implications for Internet
                      technology<br>
                      developers, and those who depend on certain
                      behaviors of the technology.<br>
                      <br>
                      Application designers need to consider the fact
                      that an IP address does<br>
                      not necessarily identify an endpoint.<br>
                      <br>
                      Law enforcement and forensic functions need to
                      consider that an IP<br>
                      address alone may not be sufficient to correlate
                      Internet activity<br>
                      observations with an endpoint; and even an IP
                      address associated<br>
                      timestamp generally may not suffice.<br>
                      <br>
                      Data retention mechanisms and policies that record
                      or reference an IP<br>
                      address need to refactor their actions and
                      requirements to consider that<br>
                      in increasingly large parts of the Internet, an IP
                      address is merely a<br>
                      temporary identifier. Potentially large volumes of
                      ancillary data are<br>
                      required to match an IP address to an endpoint.<br>
                      <br>
                      Description of the plan to facilitate discussion
                      amongst speakers,<br>
                      audience members and remote participants:<br>
                      <br>
                      The workshop will be organized as a facilitated
                      dialogue. Led by the<br>
                      moderator, subject experts will debate and discuss
                      the key questions and<br>
                      issues. Subject experts will give opening
                      comments, after which the<br>
                      moderator will turn to those attending the session
                      and invited experts<br>
                      in the audience to engage in facilitated dialogue.<br>
                      <br>
                      In addition to the background documents and papers
                      that will be prepared<br>
                      ahead of the IGF, additional articles of interest,
                      commissioned blogs,<br>
                      reference materials and social media conversations
                      will be published and<br>
                      distributed ahead of the workshop.<br>
                      <br>
                      Speakers:<br>
                      <br>
                      The experts listed below have accepted the
                      invitation to participate in<br>
                      the session. They are drawn from the Law
                      Enforcement, Government,<br>
                      Academia, Civil Society, The Technical Community
                      and Private sector<br>
                      stakeholder groups. A facilitated dialogue will be
                      organized so that<br>
                      these experts can bring their knowledge and
                      perspective to discuss and<br>
                      debate the challenges brought by IPv4 exhaustion
                      and the challenges and<br>
                      opportunities presented by IPv6 adoption.<br>
                      <br>
                      (1) Jeffrey R. Bedser is the founder and CEO of
                      iThreat Cyber Group<br>
                      <a moz-do-not-send="true"
                        href="http://www.ithreat.com" rel="noreferrer"
                        target="_blank">www.ithreat.com</a>. Mr. Bedser
                      has led ICG on its journey from an internet<br>
                      investigative firm to a technology driven threat
                      Intelligence Company.<br>
                      ICG was formed in 1997 as Internet Crimes Group.
                      Mr. Bedser has been a<br>
                      facilitator, panelist and speaker for
                      organizations such as POLCYB, ASIS<br>
                      International, Infragard, HTCIA, The Conference
                      Board, ICANN and the FBI<br>
                      Training Academy at Quantico. Mr. Bedser has
                      received media coverage on<br>
                      multiple occasions discussing topics surrounding
                      cyber-crime and cyber<br>
                      security.<br>
                      <br>
                      For the session, Jeff will help present an
                      overview of the current<br>
                      challenges being faced by cyber investigators as
                      IPv4 addresses are<br>
                      exhausted and the transition to a wider deployment
                      of IPv6 takes place.<br>
                      <br>
                      <br>
                      (2) John Curran is considered an Internet and
                      telecommunications<br>
                      industry expert. Curran was one of the founding
                      members and is the<br>
                      current President and Chief Executive Officer of
                      the American Registry<br>
                      for Internet Numbers (ARIN), a Regional Internet
                      Registry (RIR). He is<br>
                      also a Principal Associate at Isotropic, LLC., a
                      cybersecurity and<br>
                      telecommunications service provider. Curran
                      actively participates in the<br>
                      activities of the Internet Engineering Task Force
                      (IETF) and has served<br>
                      as co-chairman of the Operations and Network
                      Management Area and member<br>
                      of IPng (IPv6) Directorate.<br>
                      <br>
                      For the session, John will bring the North
                      American Regional Internet<br>
                      Registry perspective to the conversation.<br>
                      <br>
                      (3) Laura DeNardis is an American author and a
                      globally recognized<br>
                      scholar of Internet governance and technical
                      infrastructure. She is a<br>
                      tenured Professor and Associate Dean in the School
                      of Communication at<br>
                      American University. She is a Senior Fellow of the
                      Centre for<br>
                      International Governance Innovation (CIGI) and
                      serves as the Director of<br>
                      Research for the Global Commission on Internet
                      Governance. With a<br>
                      background in Information engineering and a
                      doctorate in Science and<br>
                      Technology Studies (STS), her research studies the
                      social and political<br>
                      implications of Internet technical architecture
                      and governance.<br>
                      <br>
                      She is an appointed member of the U.S. Department
                      of State Advisory<br>
                      Committee on International Communications and
                      Information Policy<br>
                      (ACICIP). She has more than two decades of
                      experience as an expert<br>
                      consultant in Internet Governance to Fortune 500
                      companies, foundations,<br>
                      and government agencies.<br>
                      <br>
                      For the session, Laura will bring an academic and
                      research perspective<br>
                      to the conversation<br>
                      <br>
                      (4) Robert Flaim has been a Supervisory Special
                      Agent (SSA) for the<br>
                      Federal Bureau of Investigation for over seventeen
                      (17) years.<br>
                      Currently, SSA Flaim is assigned to the Executive
                      Staff Unit of the<br>
                      Operational Technology Division in Quantico,
                      Virginia. Since 2004, Mr.<br>
                      Flaim has worked on Internet Governance efforts
                      with the Internet<br>
                      Corporation of Assigned Names and Numbers (ICANN)
                      and Regional Internet<br>
                      Registries, i.e., ARIN, RIPE NCC, the Internet
                      Engineering Task Force<br>
                      and other Internet Governance organizations, to
                      foster Internet policies<br>
                      and practices that ensure effective international
                      law enforcement<br>
                      investigations. Prior to his current position, Mr.
                      Flaim worked at the<br>
                      FBI Washington Field Office on cyber and
                      counterterrorism<br>
                      investigations.<br>
                      <br>
                      Bobby will bring a US and international law
                      enforcement perspective to<br>
                      the conversation and dialogue. As well, Robert
                      will bring a unique<br>
                      first-hand familiarity of urgent cyber
                      investigations to to discussion.<br>
                      <br>
                      (4) Athina Fragkouli is the Legal Counsel at the
                      RIPE Network<br>
                      Coordination Centre (NCC), where she is
                      responsible for all legal<br>
                      aspects of the organisation. She defines the RIPE
                      NCC legal framework,<br>
                      provides advice, and gives legal support for all
                      RIPE NCC activities.<br>
                      Athina works with a variety of Internet
                      stakeholders such as network<br>
                      operators, governments, and Law Enforcement
                      Agencies (LEA). She also<br>
                      represents the RIPE NCC in a variety of fora such
                      as technical meetings<br>
                      and EU-organised events.<br>
                      <br>
                      Athina - Will bring a European Regional Internet
                      Registry perspective to<br>
                      the panel. As well she will bring a rights based,
                      european and privacy<br>
                      perspective to the conversation.<br>
                      <br>
                      (5) Merike Kaeo is a recognized global expert in
                      information security<br>
                      and author of “Designing Network Security.” Prior
                      to joining<br>
                      Farsight Security, Merike served as Chief
                      Information Security Officer<br>
                      for Internet Identity (IID), where she was
                      responsible for maintaining<br>
                      IID’s vision and ensuring the company’s sensitive
                      information and<br>
                      technologies are protected. Prior to joining IID,
                      Merike founded Double<br>
                      Shot Security, which provided strategic and
                      operational guidance to<br>
                      secure Fortune 100 companies. She led the first
                      security initiative for<br>
                      Cisco in the mid-1990s. Merike is on ICANN’s
                      Security and Stability<br>
                      Advisory Council (SSAC) and the FCC’s
                      Communications Security,<br>
                      Reliability and Interoperability Council (CSRIC).
                      She earned a MSEE from<br>
                      George Washington University and a BSEE from
                      Rutgers University.<br>
                      <br>
                      <br>
                      (6) Dick Leaning has over 28 years’ experience in
                      Law Enforcement,<br>
                      leading teams of investigators in the Metropolitan
                      Police Service<br>
                      (London), UK National Crime Squad (NCS) and the
                      Serious Organised Crime<br>
                      Agency (SOCA) and from 2009 within SOCA’s Cyber
                      Crime Department. Dick<br>
                      has been the UK representative at the G8 High-Tech
                      Crime subgroup of<br>
                      senior experts and Interpol’s European High-Tech
                      Crime Working Group<br>
                      with responsibility for enhancing the abilities of
                      law enforcement.<br>
                      Based in The Hague since September 2011, Dick
                      joined the United Kingdom<br>
                      Liaison Bureau (UKLB) desk as a Europol Cyber
                      Liaison officer, and has<br>
                      recently taken on the role of Seconded National
                      Expert attached to the<br>
                      European Cybercrime Center (EC3) at Europol. In
                      his current role, Dick<br>
                      has responsibility for Internet Community
                      Engagement through which he<br>
                      hopes to achieve significant dialogue with the
                      Internet’s<br>
                      multi-stakeholders and Law Enforcement, to work in
                      partnership to<br>
                      prevent, disrupt and prosecute cyber criminals.<br>
                      <br>
                      Richard will bring a Internet Registry, Law
                      Enforcement and<br>
                      International Cyber Investigation perspective to
                      the conversation and<br>
                      dialogue.<br>
                      <br>
                      <br>
                      (7) Ben Butler has been with Go Daddy since 2001.
                      In 2002, He formed the<br>
                      Go Daddy Abuse Department, and served as Director
                      of Network Abuse for<br>
                      over 10 years. In this role, Ben helped create and
                      enforce company and<br>
                      public policies dealing with every form of
                      potential abuse that happens<br>
                      online, including spam, phishing, identity theft,
                      copyright<br>
                      infringements, cyberbullying, child exploitation
                      issues, and rogue<br>
                      internet pharmacies. He recently took on a new
                      role as Director of the<br>
                      Digital Crimes Unit. Ben comes from a strong
                      technical background<br>
                      including several years as a network and email
                      administrator, and has<br>
                      experience in customer service, business
                      management, and marketing.<br>
                      <br>
                      Ben will bring a registrar perspective to the
                      conversation and dialogue.<br>
                      <br>
                      <br>
                      Description of the proposer's plans for remote
                      participation<br>
                      <br>
                      The workshop will be organized as a facilitated
                      dialogue. Led by the<br>
                      moderator, subject experts will debate and discuss
                      the key questions and<br>
                      issues. Subject experts will give opening
                      comments, after which the<br>
                      moderator will turn to those attending the session
                      and invited experts<br>
                      in the audience to engage in facilitated dialogue.<br>
                      <br>
                      Background paper (attached)<br>
                      <br>
                    </blockquote>
                    <br>
                    <br>
                    <br>
                    <blockquote class="gmail_quote" style="margin:0 0 0
                      .8ex;border-left:1px #ccc solid;padding-left:1ex">
                      ______________________________<wbr>_________________<br>
                      LACNOG mailing list<br>
                      <a moz-do-not-send="true"
                        href="mailto:LACNOG@lacnic.net" target="_blank">LACNOG@lacnic.net</a><br>
                      <a moz-do-not-send="true"
                        href="https://mail.lacnic.net/mailman/listinfo/lacnog"
                        rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/listinfo/lacnog</a><br>
                      Cancelar suscripcion: <a moz-do-not-send="true"
                        href="https://mail.lacnic.net/mailman/options/lacnog"
                        rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/options/lacnog</a><br>
                      <br>
                    </blockquote>
                    <br>
                    *  *  *  *  *<br>
                    Universidad de Granma<br>
                    <a moz-do-not-send="true"
                      href="http://www.udg.co.cu" rel="noreferrer"
                      target="_blank">http://www.udg.co.cu</a><br>
                    <br>
                    Participe en el VI Congreso Cubano de Desarrollo
                    Local,<br>
                    Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28
                    al<br>
                    30 de marzo de 2017.<br>
                    ______________________________<wbr>_________________<br>
                    LACNOG mailing list<br>
                    <a moz-do-not-send="true"
                      href="mailto:LACNOG@lacnic.net" target="_blank">LACNOG@lacnic.net</a><br>
                    <a moz-do-not-send="true"
                      href="https://mail.lacnic.net/mailman/listinfo/lacnog"
                      rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/listinfo/lacnog</a><br>
                    Cancelar suscripcion: <a moz-do-not-send="true"
                      href="https://mail.lacnic.net/mailman/options/lacnog"
                      rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/options/lacnog</a><br>
                  </blockquote>
                  <br>
                </blockquote>
                <br>
                ______________________________<wbr>_________________<br>
                LACNOG mailing list<br>
                <a moz-do-not-send="true"
                  href="mailto:LACNOG@lacnic.net" target="_blank">LACNOG@lacnic.net</a><br>
                <a moz-do-not-send="true"
                  href="https://mail.lacnic.net/mailman/listinfo/lacnog"
                  rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/listinfo/lacnog</a><br>
                Cancelar suscripcion: <a moz-do-not-send="true"
                  href="https://mail.lacnic.net/mailman/options/lacnog"
                  rel="noreferrer" target="_blank">https://mail.lacnic.net/mailma<wbr>n/options/lacnog</a><br>
              </div>
            </div>
          </blockquote>
        </div>
        <br>
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
LACNOG mailing list
<a class="moz-txt-link-abbreviated" href="mailto:LACNOG@lacnic.net">LACNOG@lacnic.net</a>
<a class="moz-txt-link-freetext" href="https://mail.lacnic.net/mailman/listinfo/lacnog">https://mail.lacnic.net/mailman/listinfo/lacnog</a>
Cancelar suscripcion: <a class="moz-txt-link-freetext" href="https://mail.lacnic.net/mailman/options/lacnog">https://mail.lacnic.net/mailman/options/lacnog</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>