{"id":16811,"date":"2022-04-18T15:43:58","date_gmt":"2022-04-18T15:43:58","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=16811"},"modified":"2022-05-16T15:09:49","modified_gmt":"2022-05-16T15:09:49","slug":"towards-more-secure-interconnection-and-peering%ef%bf%bc","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/","title":{"rendered":"Towards More Secure Interconnection and Peering"},"content":{"rendered":"\n<p>The LACNIC 37 <a href=\"https:\/\/www.lacnic.net\/6101\/67\/evento\/\">Interconnection<\/a> tutorial will analyze the foundations, business relationships and technical aspects of traffic exchange, peering and CDNs.<\/p>\n\n\n\n<p>The training will be conducted by six qualified instructors -Erika Vega, Guillermo Cicileo, Massimo Candela, Silvia Ch\u00e1vez, Santiago Aggio and Nicol\u00e1s Antoniello- and will consist of a half-day of theory and a half-day of practice. The latter includes an online laboratory for simulations and tests.<\/p>\n\n\n\n<p>Erika Vega emphasized that participants will be able to learn how to use tools to interconnect in a secure way. &#8220;After this training, we believe they will begin to generate and receive traffic through a more secure network, which is the objective, in addition to understanding other considerations such as the optimization of interconnections and possible cost reductions,&#8221; commented Vega.<\/p>\n\n\n\n<p>The instructor pointed out that a key element for this training is to make the audience aware of the traffic they receive from other networks. &#8220;We have to visualize how to secure traffic when peering,&#8221; she added.<\/p>\n\n\n\n<p>She also commented that this is achieved using digital signatures and certificates as well as RPKI. Therefore, reliable information is delivered to another network to prove the sender has the right to use those resources.<\/p>\n\n\n\n<p>&#8220;It is an interesting tutorial for all network operators and entities that operate networks,&#8221; Vega said.<\/p>\n\n\n\n<p>During the practical part of the tutorial, participants will be able to visualize security aspects of traffic flow, interconnection with other operators, BGP publication of IPv4 and IPv6 resources, and whether they face any type of attack in their infrastructure, including what they could do in the event of such attacks.<\/p>\n\n\n\n<p>Learn more about the activity and register to participate <a href=\"https:\/\/www.lacnic.net\/6119\/67\/evento\/agenda\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The LACNIC 37 Interconnection tutorial will analyze the foundations, business relationships and technical aspects of traffic exchange, peering and CDNs. The training will be conducted by six qualified instructors -Erika Vega, Guillermo Cicileo, Massimo Candela, Silvia Ch\u00e1vez, Santiago Aggio and Nicol\u00e1s Antoniello- and will consist of a half-day of theory and a half-day of practice. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[501],"tags":[1283],"archivo":[1087,1345],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-16811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-events","archivo-april-2022-edition","archivo-editions"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Towards More Secure Interconnection and Peering<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering\ufffc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Towards More Secure Interconnection and Peering\" \/>\n<meta property=\"og:description\" content=\"The LACNIC 37 Interconnection tutorial will analyze the foundations, business relationships and technical aspects of traffic exchange, peering and CDNs. The training will be conducted by six qualified instructors -Erika Vega, Guillermo Cicileo, Massimo Candela, Silvia Ch\u00e1vez, Santiago Aggio and Nicol\u00e1s Antoniello- and will consist of a half-day of theory and a half-day of practice. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering\ufffc\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-18T15:43:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-16T15:09:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"LACNIC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/\"},\"author\":{\"name\":\"LACNIC\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\"},\"headline\":\"Towards More Secure Interconnection and Peering\",\"datePublished\":\"2022-04-18T15:43:58+00:00\",\"dateModified\":\"2022-05-16T15:09:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/\"},\"wordCount\":281,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg\",\"keywords\":[\"Events\"],\"articleSection\":[\"Events\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/\",\"name\":\"LACNIC Blog | Towards More Secure Interconnection and Peering\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg\",\"datePublished\":\"2022-04-18T15:43:58+00:00\",\"dateModified\":\"2022-05-16T15:09:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Towards More Secure Interconnection and Peering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9\",\"name\":\"LACNIC\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Towards More Secure Interconnection and Peering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering\ufffc\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Towards More Secure Interconnection and Peering","og_description":"The LACNIC 37 Interconnection tutorial will analyze the foundations, business relationships and technical aspects of traffic exchange, peering and CDNs. The training will be conducted by six qualified instructors -Erika Vega, Guillermo Cicileo, Massimo Candela, Silvia Ch\u00e1vez, Santiago Aggio and Nicol\u00e1s Antoniello- and will consist of a half-day of theory and a half-day of practice. [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering\ufffc\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2022-04-18T15:43:58+00:00","article_modified_time":"2022-05-16T15:09:49+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg","type":"image\/jpeg"}],"author":"LACNIC","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/"},"author":{"name":"LACNIC","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9"},"headline":"Towards More Secure Interconnection and Peering","datePublished":"2022-04-18T15:43:58+00:00","dateModified":"2022-05-16T15:09:49+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/"},"wordCount":281,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg","keywords":["Events"],"articleSection":["Events"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/","url":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/","name":"LACNIC Blog | Towards More Secure Interconnection and Peering","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg","datePublished":"2022-04-18T15:43:58+00:00","dateModified":"2022-05-16T15:09:49+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/towards-more-secure-interconnection-and-peering%ef%bf%bc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Towards More Secure Interconnection and Peering"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/30da2f68d9b9f0123d5192afb790dea9","name":"LACNIC","url":"https:\/\/blog.lacnic.net\/en\/author\/staffadmin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/04\/lacnic37interconexion.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":16805,"post_title":"Hacia una interconexi\u00f3n y peering m\u00e1s seguros","slug":"hacia-una-interconexion-y-peering-mas-seguros%ef%bf%bc","href":"https:\/\/blog.lacnic.net\/hacia-una-interconexion-y-peering-mas-seguros%ef%bf%bc\/"},{"locale":"pt_BR","id":16813,"post_title":"Para uma interconex\u00e3o e peering mais seguros","slug":"%ef%bf%bcpara-uma-interconexao-e-peering-mais-seguros%ef%bf%bc","href":"https:\/\/blog.lacnic.net\/pt-br\/%ef%bf%bcpara-uma-interconexao-e-peering-mais-seguros%ef%bf%bc\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/16811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=16811"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/16811\/revisions"}],"predecessor-version":[{"id":16816,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/16811\/revisions\/16816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/16807"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=16811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=16811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=16811"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=16811"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=16811"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=16811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}