<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=text/html;charset=utf-8 http-equiv=Content-Type>
<META name=GENERATOR content="MSHTML 11.00.9600.18500"></HEAD>
<BODY id=MailContainerBody
style="PADDING-TOP: 15px; PADDING-LEFT: 10px; PADDING-RIGHT: 10px" leftMargin=0
topMargin=0 CanvasTabStop="true" name="Compose message area">
<DIV><FONT face=Calibri>gracias pedro, muy oportuno y valioso tu
aporte.</FONT></DIV>
<DIV style="FONT: 10pt Tahoma">
<DIV><BR></DIV>
<DIV style="BACKGROUND: #f5f5f5">
<DIV style="font-color: black"><B>From:</B> <A title=pcontrerax@gmail.com
href="mailto:pcontrerax@gmail.com">Pcontreras</A> </DIV>
<DIV><B>Sent:</B> Thursday, November 10, 2016 11:25 AM</DIV>
<DIV><B>To:</B> <A
title="mailto:lacnog@lacnic.net
CTRL + clic para seguir el vínculo"
href="mailto:lacnog@lacnic.net">Latin America and Caribbean Region Network
Operators Group</A> </DIV>
<DIV><B>Subject:</B> Re: [lacnog] Consulta sobre cisco</DIV></DIV></DIV>
<DIV><BR></DIV>
<DIV dir=ltr>
<DIV>El método consultado no es factible salvo que se le adicione módulos
switch al router</DIV>
<DIV><BR></DIV><A
title="http://www.cisco.com/c/en/us/support/docs/switches/catalyst-2950-series-switches/24042-158.html
CTRL + clic para seguir el vínculo"
href="http://www.cisco.com/c/en/us/support/docs/switches/catalyst-2950-series-switches/24042-158.html">http://www.cisco.com/c/en/us/support/docs/switches/catalyst-2950-series-switches/24042-158.html</A>
<DIV><BR></DIV>
<DIV><BR></DIV>
<DIV>SL2.</DIV></DIV>
<DIV class=gmail_extra><BR>
<DIV class=gmail_quote>2016-11-09 17:08 GMT-03:00 Manuel José Linares Alvaro
<SPAN dir=ltr><<A href="mailto:cheche@udg.co.cu"
target=_blank>cheche@udg.co.cu</A>></SPAN>:<BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Hola,<BR>Alguien
sabe como configurar un router cisco (tal vez un 2900 o 2800) con dos
interfaces de red<BR>ethernet redundantes? algo parecido a lo que llamamos en
linux interfaces bond?<BR>Saludos,<BR>Manuel
Linares.<BR><BR>------------------------------<WBR>--------------------<BR>From:
"Robert Guerra" <<A href="mailto:rguerra@privaterra.org"
target=_blank>rguerra@privaterra.org</A>><BR>Sent: Monday, November 7, 2016
2:31 PM<BR>To: "Latin America and Caribbean Region Network Operators Group"
<<A href="mailto:lacnog@lacnic.net"
target=_blank>lacnog@lacnic.net</A>><BR>Cc: "GT IPv6 LAC / LAC IPv6 TF"
<<A href="mailto:lactf@lacnic.net"
target=_blank>lactf@lacnic.net</A>><BR>Subject: [lacnog] IGF 2016 / Se
busca contactos sobre el despliegue de IPv6<BR><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">Estimados
colegas,<BR><BR><BR>Estoy organizando una session sobre IPv6 en el Foro de
Governance que<BR>tendrá lugar en Mexico al mes que viene.<BR><BR>Me
encantaría incluir la participación de personas responsable
del<BR>despliegue de IPv6 de Latin America. A continuación os incluyo
detalles<BR>de la session.<BR><BR>Si teneis alguna pregunta, envíame una
nota.<BR><BR>saludos<BR><BR>Roberto<BR><BR><BR><BR>--<BR>Robert
Guerra<BR>Twitter: <A href="http://twitter.com/netfreedom" rel=noreferrer
target=_blank>twitter.com/netfreedom</A><BR>Email: <A
href="mailto:rguerra@privaterra.org"
target=_blank>rguerra@privaterra.org</A><BR>PGP Keys : <A
href="https://keybase.io/rguerra" rel=noreferrer
target=_blank>https://keybase.io/rguerra</A><BR><BR>Details of the
workshop<BR>——————————————————————————<BR><BR>IGF 2016 Workshop #6 : Can Law
enforcement catch bad actors online<BR>anymore<BR><BR><A
href="https://www.intgovforum.org/cms/igf2016/index.php/proposal/view_public/6"
rel=noreferrer
target=_blank>https://www.intgovforum.org/cm<WBR>s/igf2016/index.php/proposal/<WBR>view_public/6</A><BR><BR>Description
of workshop:<BR><BR>The exhaustion of the IPv4 address supply has been
predicted since the<BR>end of the 1980s. However, the large scale adoption
of mobile devices<BR>and their associated IPv4 addressing needs accelerated
the exhaustion<BR>timetable, and placed increased pressure on network
operators to<BR>conserve IPv4 addresses<BR><BR>This pressure has resulted in
a marked increase in the use of<BR>technologies, such as Network Address
Translation (NAT), that allow<BR>pools of addresses to be shared across
multiple endpoints. These<BR>mechanisms enable the reuse of the limited pool
of available IPv4<BR>addresses, resulting in the number of connected
endpoints vastly<BR>outnumbering the number of addresses in use in the
public internet.<BR><BR>This has three important implications for Internet
technology<BR>developers, and those who depend on certain behaviors of the
technology.<BR><BR>Application designers need to consider the fact that an
IP address does<BR>not necessarily identify an endpoint.<BR><BR>Law
enforcement and forensic functions need to consider that an IP<BR>address
alone may not be sufficient to correlate Internet activity<BR>observations
with an endpoint; and even an IP address associated<BR>timestamp generally
may not suffice.<BR><BR>Data retention mechanisms and policies that record
or reference an IP<BR>address need to refactor their actions and
requirements to consider that<BR>in increasingly large parts of the
Internet, an IP address is merely a<BR>temporary identifier. Potentially
large volumes of ancillary data are<BR>required to match an IP address to an
endpoint.<BR><BR>Description of the plan to facilitate discussion amongst
speakers,<BR>audience members and remote participants:<BR><BR>The workshop
will be organized as a facilitated dialogue. Led by the<BR>moderator,
subject experts will debate and discuss the key questions and<BR>issues.
Subject experts will give opening comments, after which the<BR>moderator
will turn to those attending the session and invited experts<BR>in the
audience to engage in facilitated dialogue.<BR><BR>In addition to the
background documents and papers that will be prepared<BR>ahead of the IGF,
additional articles of interest, commissioned blogs,<BR>reference materials
and social media conversations will be published and<BR>distributed ahead of
the workshop.<BR><BR>Speakers:<BR><BR>The experts listed below have accepted
the invitation to participate in<BR>the session. They are drawn from the Law
Enforcement, Government,<BR>Academia, Civil Society, The Technical Community
and Private sector<BR>stakeholder groups. A facilitated dialogue will be
organized so that<BR>these experts can bring their knowledge and perspective
to discuss and<BR>debate the challenges brought by IPv4 exhaustion and the
challenges and<BR>opportunities presented by IPv6 adoption.<BR><BR>(1)
Jeffrey R. Bedser is the founder and CEO of iThreat Cyber Group<BR><A
href="http://www.ithreat.com" rel=noreferrer
target=_blank>www.ithreat.com</A>. Mr. Bedser has led ICG on its journey
from an internet<BR>investigative firm to a technology driven threat
Intelligence Company.<BR>ICG was formed in 1997 as Internet Crimes Group.
Mr. Bedser has been a<BR>facilitator, panelist and speaker for organizations
such as POLCYB, ASIS<BR>International, Infragard, HTCIA, The Conference
Board, ICANN and the FBI<BR>Training Academy at Quantico. Mr. Bedser has
received media coverage on<BR>multiple occasions discussing topics
surrounding cyber-crime and cyber<BR>security.<BR><BR>For the session, Jeff
will help present an overview of the current<BR>challenges being faced by
cyber investigators as IPv4 addresses are<BR>exhausted and the transition to
a wider deployment of IPv6 takes place.<BR><BR><BR>(2) John Curran is
considered an Internet and telecommunications<BR>industry expert. Curran was
one of the founding members and is the<BR>current President and Chief
Executive Officer of the American Registry<BR>for Internet Numbers (ARIN), a
Regional Internet Registry (RIR). He is<BR>also a Principal Associate at
Isotropic, LLC., a cybersecurity and<BR>telecommunications service provider.
Curran actively participates in the<BR>activities of the Internet
Engineering Task Force (IETF) and has served<BR>as co-chairman of the
Operations and Network Management Area and member<BR>of IPng (IPv6)
Directorate.<BR><BR>For the session, John will bring the North American
Regional Internet<BR>Registry perspective to the conversation.<BR><BR>(3)
Laura DeNardis is an American author and a globally recognized<BR>scholar of
Internet governance and technical infrastructure. She is a<BR>tenured
Professor and Associate Dean in the School of Communication at<BR>American
University. She is a Senior Fellow of the Centre for<BR>International
Governance Innovation (CIGI) and serves as the Director of<BR>Research for
the Global Commission on Internet Governance. With a<BR>background in
Information engineering and a doctorate in Science and<BR>Technology Studies
(STS), her research studies the social and political<BR>implications of
Internet technical architecture and governance.<BR><BR>She is an appointed
member of the U.S. Department of State Advisory<BR>Committee on
International Communications and Information Policy<BR>(ACICIP). She has
more than two decades of experience as an expert<BR>consultant in Internet
Governance to Fortune 500 companies, foundations,<BR>and government
agencies.<BR><BR>For the session, Laura will bring an academic and research
perspective<BR>to the conversation<BR><BR>(4) Robert Flaim has been a
Supervisory Special Agent (SSA) for the<BR>Federal Bureau of Investigation
for over seventeen (17) years.<BR>Currently, SSA Flaim is assigned to the
Executive Staff Unit of the<BR>Operational Technology Division in Quantico,
Virginia. Since 2004, Mr.<BR>Flaim has worked on Internet Governance efforts
with the Internet<BR>Corporation of Assigned Names and Numbers (ICANN) and
Regional Internet<BR>Registries, i.e., ARIN, RIPE NCC, the Internet
Engineering Task Force<BR>and other Internet Governance organizations, to
foster Internet policies<BR>and practices that ensure effective
international law enforcement<BR>investigations. Prior to his current
position, Mr. Flaim worked at the<BR>FBI Washington Field Office on cyber
and counterterrorism<BR>investigations.<BR><BR>Bobby will bring a US and
international law enforcement perspective to<BR>the conversation and
dialogue. As well, Robert will bring a unique<BR>first-hand familiarity of
urgent cyber investigations to to discussion.<BR><BR>(4) Athina Fragkouli is
the Legal Counsel at the RIPE Network<BR>Coordination Centre (NCC), where
she is responsible for all legal<BR>aspects of the organisation. She defines
the RIPE NCC legal framework,<BR>provides advice, and gives legal support
for all RIPE NCC activities.<BR>Athina works with a variety of Internet
stakeholders such as network<BR>operators, governments, and Law Enforcement
Agencies (LEA). She also<BR>represents the RIPE NCC in a variety of fora
such as technical meetings<BR>and EU-organised events.<BR><BR>Athina - Will
bring a European Regional Internet Registry perspective to<BR>the panel. As
well she will bring a rights based, european and privacy<BR>perspective to
the conversation.<BR><BR>(5) Merike Kaeo is a recognized global expert in
information security<BR>and author of “Designing Network Security.” Prior to
joining<BR>Farsight Security, Merike served as Chief Information Security
Officer<BR>for Internet Identity (IID), where she was responsible for
maintaining<BR>IID’s vision and ensuring the company’s sensitive information
and<BR>technologies are protected. Prior to joining IID, Merike founded
Double<BR>Shot Security, which provided strategic and operational guidance
to<BR>secure Fortune 100 companies. She led the first security initiative
for<BR>Cisco in the mid-1990s. Merike is on ICANN’s Security and
Stability<BR>Advisory Council (SSAC) and the FCC’s Communications
Security,<BR>Reliability and Interoperability Council (CSRIC). She earned a
MSEE from<BR>George Washington University and a BSEE from Rutgers
University.<BR><BR><BR>(6) Dick Leaning has over 28 years’ experience in Law
Enforcement,<BR>leading teams of investigators in the Metropolitan Police
Service<BR>(London), UK National Crime Squad (NCS) and the Serious Organised
Crime<BR>Agency (SOCA) and from 2009 within SOCA’s Cyber Crime Department.
Dick<BR>has been the UK representative at the G8 High-Tech Crime subgroup
of<BR>senior experts and Interpol’s European High-Tech Crime Working
Group<BR>with responsibility for enhancing the abilities of law
enforcement.<BR>Based in The Hague since September 2011, Dick joined the
United Kingdom<BR>Liaison Bureau (UKLB) desk as a Europol Cyber Liaison
officer, and has<BR>recently taken on the role of Seconded National Expert
attached to the<BR>European Cybercrime Center (EC3) at Europol. In his
current role, Dick<BR>has responsibility for Internet Community Engagement
through which he<BR>hopes to achieve significant dialogue with the
Internet’s<BR>multi-stakeholders and Law Enforcement, to work in partnership
to<BR>prevent, disrupt and prosecute cyber criminals.<BR><BR>Richard will
bring a Internet Registry, Law Enforcement and<BR>International Cyber
Investigation perspective to the conversation
and<BR>dialogue.<BR><BR><BR>(7) Ben Butler has been with Go Daddy since
2001. In 2002, He formed the<BR>Go Daddy Abuse Department, and served as
Director of Network Abuse for<BR>over 10 years. In this role, Ben helped
create and enforce company and<BR>public policies dealing with every form of
potential abuse that happens<BR>online, including spam, phishing, identity
theft, copyright<BR>infringements, cyberbullying, child exploitation issues,
and rogue<BR>internet pharmacies. He recently took on a new role as Director
of the<BR>Digital Crimes Unit. Ben comes from a strong technical
background<BR>including several years as a network and email administrator,
and has<BR>experience in customer service, business management, and
marketing.<BR><BR>Ben will bring a registrar perspective to the conversation
and dialogue.<BR><BR><BR>Description of the proposer's plans for remote
participation<BR><BR>The workshop will be organized as a facilitated
dialogue. Led by the<BR>moderator, subject experts will debate and discuss
the key questions and<BR>issues. Subject experts will give opening comments,
after which the<BR>moderator will turn to those attending the session and
invited experts<BR>in the audience to engage in facilitated
dialogue.<BR><BR>Background paper (attached)<BR><BR></BLOCKQUOTE><BR><BR><BR>
<BLOCKQUOTE class=gmail_quote
style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR><BR></BLOCKQUOTE><BR>*
* * * *<BR>Universidad de Granma<BR><A
href="http://www.udg.co.cu" rel=noreferrer
target=_blank>http://www.udg.co.cu</A><BR><BR>Participe en el VI Congreso
Cubano de Desarrollo Local,<BR>Hotel Sierra Maestra, Bayamo, Granma, Cuba, del
28 al<BR>30 de marzo de
2017.<BR>______________________________<WBR>_________________<BR>LACNOG
mailing list<BR><A href="mailto:LACNOG@lacnic.net"
target=_blank>LACNOG@lacnic.net</A><BR><A
href="https://mail.lacnic.net/mailman/listinfo/lacnog" rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/listinfo/lacnog</A><BR>Cancelar
suscripcion: <A href="https://mail.lacnic.net/mailman/options/lacnog"
rel=noreferrer
target=_blank>https://mail.lacnic.net/mailma<WBR>n/options/lacnog</A><BR></BLOCKQUOTE></DIV><BR></DIV>
<P>
<HR>
<P></P>_______________________________________________<BR>LACNOG mailing
list<BR>LACNOG@lacnic.net<BR>https://mail.lacnic.net/mailman/listinfo/lacnog<BR>Cancelar
suscripcion: https://mail.lacnic.net/mailman/options/lacnog<BR></BODY></HTML>