<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=text/html;charset=utf-8 http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 11.00.9600.18500"></HEAD>
<BODY id=MailContainerBody
style="PADDING-TOP: 15px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px" leftMargin=0
topMargin=0 CanvasTabStop="true" name="Compose message area">
<DIV><FONT face=Calibri>Exacto tomás, te explico:</FONT></DIV>
<DIV><FONT face=Calibri>Las interfaces del router de conexión a redes
externas, no tiene sentido que las haga redundantes, pues solo tengo un par de
fibras desde el proveedor hasta el centro de datos, por lo tanto, no hay
redundancia que valga.</FONT></DIV>
<DIV><FONT face=Calibri></FONT> </DIV>
<DIV><FONT face=Calibri>Sin embargo, en el núcleo del centro de datos tengo dos
swtichs redundantes, donde se conectan los servidores de la nube, menos el
router que se conecta a un solo switch, de los dos que tengo, pero el router, un
cisco2911, tiene una interface de red sin uso, por eso fue que se me ocurrió,
hacer algo parecido a lo que dibujaste abajo, pues no implica la compra de nada,
y solo daría más estabilidad a las conexiones físicas.</FONT></DIV>
<DIV><FONT face=Calibri></FONT> </DIV>
<DIV><FONT face=Calibri>La parte mala, es que no puedo jugar mucho con ese
router, pues cualquier cambio implica tiempo sin servicio a los usuarios, por
ello, tengo que ir al seguro cuando haga cualquier cambio.</FONT></DIV>
<DIV><FONT face=Calibri></FONT> </DIV>
<DIV><FONT face=Calibri>Aye Carlos martinez hiso una buena propuesta, pero
tiene la limitante del tiempo de cambio en caso de que falle una interfaz, es de
hasta 30 segundos, pero es lo mas posible que veo.</FONT></DIV>
<DIV><FONT face=Calibri></FONT> </DIV>
<DIV><FONT face=Calibri>Saludos,</FONT></DIV>
<DIV><FONT face=Calibri>M.</FONT></DIV>
<DIV style="FONT: 10pt Tahoma">
<DIV><FONT size=3 face=Calibri></FONT><BR></DIV>
<DIV style="BACKGROUND: #f5f5f5">
<DIV style="font-color: black"><B>From:</B> <A title=tomas.lynch@gmail.com
href="mailto:tomas.lynch@gmail.com">Tomas Lynch</A> </DIV>
<DIV><B>Sent:</B> Thursday, November 10, 2016 1:44 PM</DIV>
<DIV><B>To:</B> <A title=lacnog@lacnic.net href="mailto:lacnog@lacnic.net">Latin
America and Caribbean Region Network Operators Group</A> </DIV>
<DIV><B>Subject:</B> Re: [lacnog] Consulta sobre cisco</DIV></DIV></DIV>
<DIV><BR></DIV>
<DIV dir=ltr>
<DIV>
<DIV>
<DIV>Me perdí en la cadena de correos. Manuel, tienes alguna topología que
puedas compartir.<BR><BR></DIV>Tengo entendido que es algo como
esto:<BR><BR></DIV>
<DIV><SPAN
style="FONT-FAMILY: monospace,monospace">
-- Switch1 -- ??<BR></SPAN></DIV><SPAN
style="FONT-FAMILY: monospace,monospace">Router --|<BR></SPAN></DIV><SPAN
style="FONT-FAMILY: monospace,monospace">
-- Switch2 -- ??<BR></SPAN>
<DIV><BR></DIV>
<DIV>¿Qué hay detrás de los switches? Los protocolos a utilizar dependerán de
esto ya que cualquiera de las respuestas que han dado son válidas sin saber la
topología completa.<BR><BR></DIV>
<DIV>Estoy escribiendo sin haber leído el thread completo. Si ya has enviado la
topología me llamo al silencio y les recuerdo que el 15 cierra la postulación de
candidatos al comité de programa. ;)<BR><BR></DIV>
<DIV>Tomás Lynch<BR>\<BR></DIV>
<DIV><BR></DIV></DIV>
<DIV class=gmail_extra><BR>
<DIV class=gmail_quote>On Thu, Nov 10, 2016 at 12:55 PM, Jose Luis Gaspoz <SPAN
dir=ltr><<A href="mailto:gaspozj@is.com.ar"
target=_blank>gaspozj@is.com.ar</A>></SPAN> wrote:<BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">
<DIV dir=ltr bgcolor="#ffffff" text="#000000">
<DIV dir=ltr>
<DIV style="FONT-SIZE: 12pt; FONT-FAMILY: 'Calibri'; COLOR: #000000">
<DIV>Hola a todos:</DIV>
<DIV> </DIV>
<DIV>Si mal no entendí la premisa, no puede hacer etherchannel porque cada
interfaz del router acomete a Switches distintos.</DIV>
<DIV> </DIV>
<DIV>Te queda las siguientes opciones:</DIV>
<DIV>- HRSP si es que el router soporta las 2 instancias del HRSP en 2
interfaces del mismo router </DIV>
<DIV>- un bridge entre las 2 Interfaces y tener una interfaz pasiva </DIV>
<DIV> </DIV>
<DIV>Saludos</DIV><SPAN>
<DIV> </DIV>
<DIV style="FONT-SIZE: 12pt; FONT-FAMILY: 'Calibri'; COLOR: #000000">Ing. Jose
Luis Gaspoz<BR>Internet Services S.A.<BR>Tel: 0342-4565118<BR>Cel:
342-5008523</DIV></SPAN>
<DIV
style='FONT-SIZE: small; TEXT-DECORATION: none; FONT-FAMILY: "Calibri"; FONT-WEIGHT: normal; COLOR: #000000; FONT-STYLE: normal; DISPLAY: inline'>
<DIV style="FONT: 10pt tahoma">
<DIV> </DIV>
<DIV style="BACKGROUND: #f5f5f5">
<DIV><B>From:</B> <A title=gtpeace@nic.cr href="mailto:gtpeace@nic.cr"
target=_blank>Glenn Peace</A> </DIV>
<DIV><B>Sent:</B> Thursday, November 10, 2016 2:08 PM</DIV>
<DIV><B>To:</B> <A title=lacnog@lacnic.net href="mailto:lacnog@lacnic.net"
target=_blank>lacnog@lacnic.net</A> </DIV><SPAN>
<DIV><B>Subject:</B> Re: [lacnog] Consulta sobre
cisco</DIV></SPAN></DIV></DIV>
<DIV> </DIV></DIV>
<DIV
style='FONT-SIZE: small; TEXT-DECORATION: none; FONT-FAMILY: "Calibri"; FONT-WEIGHT: normal; COLOR: #000000; FONT-STYLE: normal; DISPLAY: inline'>
<P><FONT face=Helvetica>Hola a todos,</FONT></P>
<DIV>
<DIV class=h5>
<P><FONT face=Helvetica>El siguiente documento, explica la configuración de
etherchannels en routers Cisco, así como las plataformas y primeras versiones
de software que que soportan la función.</FONT></P>
<P><FONT face=Helvetica><A
href="http://www.cisco.com/c/dam/en/us/products/collateral/routers/3800-series-integrated-services-routers-isr/prod_white_paper0900aecd806f698a.pdf"
target=_blank>http://www.cisco.com/c/dam/en/<WBR>us/products/collateral/<WBR>routers/3800-series-<WBR>integrated-services-routers-<WBR>isr/prod_white_<WBR>paper0900aecd806f698a.pdf</A></FONT></P>
<P><FONT face=Helvetica>Según el documento, los routers de la serie 2800
soportan la función en los puertos propios así como utilizando algunos módulos
de expansión. Los routers de la serie 2600 no se mencionan en el
documento.</FONT></P>
<P><FONT face=Helvetica>Si entiendo correctamente el escenario, en mi opinión
esta sería la mejor opción.</FONT></P>
<P><FONT face=Helvetica>Saludos,</FONT></P><BR>On 11/10/16 16:43, <A
class=m_6439932823160286898moz-txt-link-abbreviated
href="mailto:lacnog-request@lacnic.net"
target=_blank>lacnog-request@lacnic.net</A> wrote:<BR></DIV></DIV>
<BLOCKQUOTE type="cite"><PRE><DIV><DIV class=h5>Envíe los mensajes para la lista LACNOG a
<A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:lacnog@lacnic.net" target=_blank>lacnog@lacnic.net</A>
Para subscribirse o anular su subscripción a través de la WEB
<A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/listinfo/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/listinfo/lacnog</A>
O por correo electrónico, enviando un mensaje con el texto "help" en
el asunto (subject) o en el cuerpo a:
<A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:lacnog-request@lacnic.net" target=_blank>lacnog-request@lacnic.net</A>
Puede contactar con el responsable de la lista escribiendo a:
<A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:lacnog-owner@lacnic.net" target=_blank>lacnog-owner@lacnic.net</A>
Si responde a algún contenido de este mensaje, por favor, edite la
linea del asunto (subject) para que el texto sea mas especifico que:
"Re: Contents of LACNOG digest...". Además, por favor, incluya en la
respuesta sólo aquellas partes del mensaje a las que está
respondiendo.
Asuntos del día:
1. Re: Consulta sobre cisco (Manuel José Linares Alvaro)
------------------------------<WBR>------------------------------<WBR></DIV></DIV>----------
Message: 1
Date: Thu, 10 Nov 2016 11:42:39 -0500
From: Manuel José Linares Alvaro <A class=m_6439932823160286898moz-txt-link-rfc2396E href="mailto:cheche@udg.co.cu" target=_blank>mailto:cheche@udg.co.cu</A>
To: "Latin America and Caribbean Region Network Operators Group"
<A class=m_6439932823160286898moz-txt-link-rfc2396E href="mailto:lacnog@lacnic.net" target=_blank>mailto:lacnog@lacnic.net</A>
Subject: Re: [lacnog] Consulta sobre cisco
Message-ID: <A class=m_6439932823160286898moz-txt-link-rfc2396E href="mailto:5A9AA06974224B8391E6A5255248355B@udg.co.cu" target=_blank>mailto:<WBR>5A9AA06974224B8391E6A525524835<WBR>5B@udg.co.cu</A><SPAN>
Content-Type: text/plain; charset="utf-8"
gracias pedro, muy oportuno y valioso tu aporte.
From: Pcontreras
Sent: Thursday, November 10, 2016 11:25 AM
To: Latin America and Caribbean Region Network Operators Group
Subject: Re: [lacnog] Consulta sobre cisco
El método consultado no es factible salvo que se le adicione módulos switch al router
<A class=m_6439932823160286898moz-txt-link-freetext href="http://www.cisco.com/c/en/us/support/docs/switches/catalyst-2950-series-switches/24042-158.html" target=_blank>http://www.cisco.com/c/en/us/<WBR>support/docs/switches/<WBR>catalyst-2950-series-switches/<WBR>24042-158.html</A></SPAN>
SL2.
2016-11-09 17:08 GMT-03:00 Manuel José Linares Alvaro <A class=m_6439932823160286898moz-txt-link-rfc2396E href="mailto:cheche@udg.co.cu" target=_blank>mailto:cheche@udg.co.cu</A>:
Hola,
Alguien sabe como configurar un router cisco (tal vez un 2900 o 2800) con dos interfaces de red
ethernet redundantes? algo parecido a lo que llamamos en linux interfaces bond?
Saludos,
Manuel Linares.
------------------------------<WBR>--------------------
From: "Robert Guerra" <A class=m_6439932823160286898moz-txt-link-rfc2396E href="mailto:rguerra@privaterra.org" target=_blank>mailto:rguerra@privaterra.org</A>
Sent: Monday, November 7, 2016 2:31 PM
To: "Latin America and Caribbean Region Network Operators Group" <A class=m_6439932823160286898moz-txt-link-rfc2396E href="mailto:lacnog@lacnic.net" target=_blank>mailto:lacnog@lacnic.net</A>
Cc: "GT IPv6 LAC / LAC IPv6 TF" <A class=m_6439932823160286898moz-txt-link-rfc2396E href="mailto:lactf@lacnic.net" target=_blank>mailto:lactf@lacnic.net</A><DIV><DIV class=h5>
Subject: [lacnog] IGF 2016 / Se busca contactos sobre el despliegue de IPv6
Estimados colegas,
Estoy organizando una session sobre IPv6 en el Foro de Governance que
tendrá lugar en Mexico al mes que viene.
Me encantaría incluir la participación de personas responsable del
despliegue de IPv6 de Latin America. A continuación os incluyo detalles
de la session.
Si teneis alguna pregunta, envíame una nota.
saludos
Roberto
--
Robert Guerra
Twitter: <A href="http://twitter.com/netfreedom" target=_blank>twitter.com/netfreedom</A>
Email: <A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:rguerra@privaterra.org" target=_blank>rguerra@privaterra.org</A>
PGP Keys : <A class=m_6439932823160286898moz-txt-link-freetext href="https://keybase.io/rguerra" target=_blank>https://keybase.io/rguerra</A>
Details of the workshop
??????????????????????????
IGF 2016 Workshop #6 : Can Law enforcement catch bad actors online
anymore
<A class=m_6439932823160286898moz-txt-link-freetext href="https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6" target=_blank>https://www.intgovforum.org/<WBR>cms/igf2016/index.php/<WBR>proposal/view_public/6</A>
Description of workshop:
The exhaustion of the IPv4 address supply has been predicted since the
end of the 1980s. However, the large scale adoption of mobile devices
and their associated IPv4 addressing needs accelerated the exhaustion
timetable, and placed increased pressure on network operators to
conserve IPv4 addresses
This pressure has resulted in a marked increase in the use of
technologies, such as Network Address Translation (NAT), that allow
pools of addresses to be shared across multiple endpoints. These
mechanisms enable the reuse of the limited pool of available IPv4
addresses, resulting in the number of connected endpoints vastly
outnumbering the number of addresses in use in the public internet.
This has three important implications for Internet technology
developers, and those who depend on certain behaviors of the technology.
Application designers need to consider the fact that an IP address does
not necessarily identify an endpoint.
Law enforcement and forensic functions need to consider that an IP
address alone may not be sufficient to correlate Internet activity
observations with an endpoint; and even an IP address associated
timestamp generally may not suffice.
Data retention mechanisms and policies that record or reference an IP
address need to refactor their actions and requirements to consider that
in increasingly large parts of the Internet, an IP address is merely a
temporary identifier. Potentially large volumes of ancillary data are
required to match an IP address to an endpoint.
Description of the plan to facilitate discussion amongst speakers,
audience members and remote participants:
The workshop will be organized as a facilitated dialogue. Led by the
moderator, subject experts will debate and discuss the key questions and
issues. Subject experts will give opening comments, after which the
moderator will turn to those attending the session and invited experts
in the audience to engage in facilitated dialogue.
In addition to the background documents and papers that will be prepared
ahead of the IGF, additional articles of interest, commissioned blogs,
reference materials and social media conversations will be published and
distributed ahead of the workshop.
Speakers:
The experts listed below have accepted the invitation to participate in
the session. They are drawn from the Law Enforcement, Government,
Academia, Civil Society, The Technical Community and Private sector
stakeholder groups. A facilitated dialogue will be organized so that
these experts can bring their knowledge and perspective to discuss and
debate the challenges brought by IPv4 exhaustion and the challenges and
opportunities presented by IPv6 adoption.
(1) Jeffrey R. Bedser is the founder and CEO of iThreat Cyber Group
<A class=m_6439932823160286898moz-txt-link-abbreviated href="http://www.ithreat.com" target=_blank>www.ithreat.com</A>. Mr. Bedser has led ICG on its journey from an internet
investigative firm to a technology driven threat Intelligence Company.
ICG was formed in 1997 as Internet Crimes Group. Mr. Bedser has been a
facilitator, panelist and speaker for organizations such as POLCYB, ASIS
International, Infragard, HTCIA, The Conference Board, ICANN and the FBI
Training Academy at Quantico. Mr. Bedser has received media coverage on
multiple occasions discussing topics surrounding cyber-crime and cyber
security.
For the session, Jeff will help present an overview of the current
challenges being faced by cyber investigators as IPv4 addresses are
exhausted and the transition to a wider deployment of IPv6 takes place.
(2) John Curran is considered an Internet and telecommunications
industry expert. Curran was one of the founding members and is the
current President and Chief Executive Officer of the American Registry
for Internet Numbers (ARIN), a Regional Internet Registry (RIR). He is
also a Principal Associate at Isotropic, LLC., a cybersecurity and
telecommunications service provider. Curran actively participates in the
activities of the Internet Engineering Task Force (IETF) and has served
as co-chairman of the Operations and Network Management Area and member
of IPng (IPv6) Directorate.
For the session, John will bring the North American Regional Internet
Registry perspective to the conversation.
(3) Laura DeNardis is an American author and a globally recognized
scholar of Internet governance and technical infrastructure. She is a
tenured Professor and Associate Dean in the School of Communication at
American University. She is a Senior Fellow of the Centre for
International Governance Innovation (CIGI) and serves as the Director of
Research for the Global Commission on Internet Governance. With a
background in Information engineering and a doctorate in Science and
Technology Studies (STS), her research studies the social and political
implications of Internet technical architecture and governance.
She is an appointed member of the U.S. Department of State Advisory
Committee on International Communications and Information Policy
(ACICIP). She has more than two decades of experience as an expert
consultant in Internet Governance to Fortune 500 companies, foundations,
and government agencies.
For the session, Laura will bring an academic and research perspective
to the conversation
(4) Robert Flaim has been a Supervisory Special Agent (SSA) for the
Federal Bureau of Investigation for over seventeen (17) years.
Currently, SSA Flaim is assigned to the Executive Staff Unit of the
Operational Technology Division in Quantico, Virginia. Since 2004, Mr.
Flaim has worked on Internet Governance efforts with the Internet
Corporation of Assigned Names and Numbers (ICANN) and Regional Internet
Registries, i.e., ARIN, RIPE NCC, the Internet Engineering Task Force
and other Internet Governance organizations, to foster Internet policies
and practices that ensure effective international law enforcement
investigations. Prior to his current position, Mr. Flaim worked at the
FBI Washington Field Office on cyber and counterterrorism
investigations.
Bobby will bring a US and international law enforcement perspective to
the conversation and dialogue. As well, Robert will bring a unique
first-hand familiarity of urgent cyber investigations to to discussion.
(4) Athina Fragkouli is the Legal Counsel at the RIPE Network
Coordination Centre (NCC), where she is responsible for all legal
aspects of the organisation. She defines the RIPE NCC legal framework,
provides advice, and gives legal support for all RIPE NCC activities.
Athina works with a variety of Internet stakeholders such as network
operators, governments, and Law Enforcement Agencies (LEA). She also
represents the RIPE NCC in a variety of fora such as technical meetings
and EU-organised events.
Athina - Will bring a European Regional Internet Registry perspective to
the panel. As well she will bring a rights based, european and privacy
perspective to the conversation.
(5) Merike Kaeo is a recognized global expert in information security
and author of ?Designing Network Security.? Prior to joining
Farsight Security, Merike served as Chief Information Security Officer
for Internet Identity (IID), where she was responsible for maintaining
IID?s vision and ensuring the company?s sensitive information and
technologies are protected. Prior to joining IID, Merike founded Double
Shot Security, which provided strategic and operational guidance to
secure Fortune 100 companies. She led the first security initiative for
Cisco in the mid-1990s. Merike is on ICANN?s Security and Stability
Advisory Council (SSAC) and the FCC?s Communications Security,
Reliability and Interoperability Council (CSRIC). She earned a MSEE from
George Washington University and a BSEE from Rutgers University.
(6) Dick Leaning has over 28 years? experience in Law Enforcement,
leading teams of investigators in the Metropolitan Police Service
(London), UK National Crime Squad (NCS) and the Serious Organised Crime
Agency (SOCA) and from 2009 within SOCA?s Cyber Crime Department. Dick
has been the UK representative at the G8 High-Tech Crime subgroup of
senior experts and Interpol?s European High-Tech Crime Working Group
with responsibility for enhancing the abilities of law enforcement.
Based in The Hague since September 2011, Dick joined the United Kingdom
Liaison Bureau (UKLB) desk as a Europol Cyber Liaison officer, and has
recently taken on the role of Seconded National Expert attached to the
European Cybercrime Center (EC3) at Europol. In his current role, Dick
has responsibility for Internet Community Engagement through which he
hopes to achieve significant dialogue with the Internet?s
multi-stakeholders and Law Enforcement, to work in partnership to
prevent, disrupt and prosecute cyber criminals.
Richard will bring a Internet Registry, Law Enforcement and
International Cyber Investigation perspective to the conversation and
dialogue.
(7) Ben Butler has been with Go Daddy since 2001. In 2002, He formed the
Go Daddy Abuse Department, and served as Director of Network Abuse for
over 10 years. In this role, Ben helped create and enforce company and
public policies dealing with every form of potential abuse that happens
online, including spam, phishing, identity theft, copyright
infringements, cyberbullying, child exploitation issues, and rogue
internet pharmacies. He recently took on a new role as Director of the
Digital Crimes Unit. Ben comes from a strong technical background
including several years as a network and email administrator, and has
experience in customer service, business management, and marketing.
Ben will bring a registrar perspective to the conversation and dialogue.
Description of the proposer's plans for remote participation
The workshop will be organized as a facilitated dialogue. Led by the
moderator, subject experts will debate and discuss the key questions and
issues. Subject experts will give opening comments, after which the
moderator will turn to those attending the session and invited experts
in the audience to engage in facilitated dialogue.
Background paper (attached)
______________________________<WBR>_________________
LACNOG mailing list
<A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:LACNOG@lacnic.net" target=_blank>LACNOG@lacnic.net</A>
<A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/listinfo/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/listinfo/lacnog</A>
Cancelar suscripcion: <A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/options/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/options/lacnog</A>
* * * * *
Universidad de Granma
<A class=m_6439932823160286898moz-txt-link-freetext href="http://www.udg.co.cu" target=_blank>http://www.udg.co.cu</A>
Participe en el VI Congreso Cubano de Desarrollo Local,
Hotel Sierra Maestra, Bayamo, Granma, Cuba, del 28 al
30 de marzo de 2017.
______________________________<WBR>_________________
LACNOG mailing list
<A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:LACNOG@lacnic.net" target=_blank>LACNOG@lacnic.net</A>
<A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/listinfo/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/listinfo/lacnog</A>
Cancelar suscripcion: <A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/options/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/options/lacnog</A>
------------------------------<WBR>------------------------------<WBR>--------------------
______________________________<WBR>_________________
LACNOG mailing list
<A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:LACNOG@lacnic.net" target=_blank>LACNOG@lacnic.net</A>
<A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/listinfo/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/listinfo/lacnog</A>
Cancelar suscripcion: <A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/options/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/options/lacnog</A>
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <A class=m_6439932823160286898moz-txt-link-rfc2396E href="https://mail.lacnic.net/pipermail/lacnog/attachments/20161110/d48fec52/attachment.html" target=_blank><https://mail.lacnic.net/<WBR>pipermail/lacnog/attachments/<WBR>20161110/d48fec52/attachment.<WBR>html></A>
------------------------------
Subject: Pié de página del digest
______________________________<WBR>_________________
LACNOG mailing list
<A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:LACNOG@lacnic.net" target=_blank>LACNOG@lacnic.net</A>
<A class=m_6439932823160286898moz-txt-link-freetext href="https://mail.lacnic.net/mailman/listinfo/lacnog" target=_blank>https://mail.lacnic.net/<WBR>mailman/listinfo/lacnog</A>
Cancelar suscripcion: <A class=m_6439932823160286898moz-txt-link-abbreviated href="mailto:lacnog-unsubscribe@lacnic.net" target=_blank>lacnog-unsubscribe@lacnic.net</A>
------------------------------
Fin de Resumen de LACNOG, Vol 107, Envío 42
******************************<WBR>*************
</DIV></DIV></PRE></BLOCKQUOTE><BR>
<P></P>
<HR>
<SPAN>______________________________<WBR>_________________<BR>LACNOG mailing
list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog"
target=_blank>https://mail.lacnic.net/<WBR>mailman/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
target=_blank>https://mail.lacnic.net/<WBR>mailman/options/lacnog</A><BR></SPAN>
<P></P>
<HR>
<SPAN><A></A>
<P align=left color="#000000">Se certificó que el correo no contiene
virus.<BR>Comprobada por AVG - <A href="http://www.avg.com"
target=_blank>www.avg.com</A><BR>Versión: 2016.0.7859 / Base de datos de
virus: 4664/13382 - Fecha de la versión: 10/11/2016</P></SPAN>
<P></P>
<P></P></DIV></DIV></DIV></DIV><BR>______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net">LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/<WBR>mailman/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/<WBR>mailman/options/lacnog</A><BR><BR></BLOCKQUOTE></DIV><BR></DIV>
<P>
<HR>
<P></P>_______________________________________________<BR>LACNOG mailing
list<BR>LACNOG@lacnic.net<BR>https://mail.lacnic.net/mailman/listinfo/lacnog<BR>Cancelar
suscripcion: https://mail.lacnic.net/mailman/options/lacnog<BR></BODY></HTML>