{"id":75907,"date":"2018-03-12T09:00:34","date_gmt":"2018-03-12T09:00:34","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2018\/03\/rough-guide-ietf-101-internet-infrastructure-resilience\/"},"modified":"2025-11-27T16:59:24","modified_gmt":"2025-11-27T16:59:24","slug":"rough-guide-ietf-101-internet-infrastructure-resilience","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/rough-guide-ietf-101-internet-infrastructure-resilience\/","title":{"rendered":"Guide de r\u00e9f\u00e9rence de l\u2019IETF 101 : R\u00e9silience de l&rsquo;infrastructure Internet"},"content":{"rendered":"<p>Dans cet article qui fait partie de notre guide de r\u00e9f\u00e9rence (<a href=\"https:\/\/www.internetsociety.org\/events\/ietf\/ietf-101\/\">Internet Society Rough Guide to IETF 101)<\/a>, je vais me concentrer sur cette partie du travail\u00a0de\u00a0<a href=\"https:\/\/www.ietf.org\">IETF<\/a>\u00a0qui contribue \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 et la r\u00e9silience de l&rsquo;infrastructure Internet.<\/p>\n<p><span class=\"button\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/rough-guide-ietf-101-internet-infrastructure-resilience\/\">Savoir plus (en anglais)<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans cet article qui fait partie de notre guide de r\u00e9f\u00e9rence (Internet Society Rough Guide to IETF 101), je vais me concentrer sur cette partie du travail\u00a0de\u00a0IETF\u00a0qui contribue \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 et la r\u00e9silience de l&rsquo;infrastructure Internet. Savoir plus (en anglais) &nbsp; &nbsp;<\/p>\n","protected":false},"author":28,"featured_media":50818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[178,6187,185,189,2589,151,4314,169,2545,4909,4775,183,146],"tags":[6215,6056,3376,6250,6254,6283],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4046],"class_list":["post-75907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite","category-comment-fonctionne-internet","category-confiance","category-evenements","category-garantir-bgp","category-ietf-fr-2","category-ai-fr","category-les-normes-internet-ouvertes","category-manrs-fr","category-renforcer-internet","category-securite-fr","category-technologie","category-deploy360-fr","tag-evenements","tag-ietf-meetings-fr","tag-ietf-fr","tag-les-normes-pour-la-securisation-du-routage-mutuellement-agreees-manrs","tag-protocole-bgp-border-gateway-protocol","tag-securite-du-routage","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-300x104.jpg",300,104,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-768x266.jpg",768,266,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",976,338,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-250x87.jpg",250,87,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338-600x338.jpg",600,338,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",300,104,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",400,139,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2013\/10\/routing-976-338.jpg",600,208,false]},"uagb_author_info":{"display_name":"Andrei Robachevsky","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/robachevsky\/"},"uagb_comment_info":0,"uagb_excerpt":"Dans cet article qui fait partie de notre guide de r\u00e9f\u00e9rence (Internet Society Rough Guide to IETF 101), je vais me concentrer sur cette partie du travail\u00a0de\u00a0IETF\u00a0qui contribue \u00e0 am\u00e9liorer la s\u00e9curit\u00e9 et la r\u00e9silience de l&rsquo;infrastructure Internet. Savoir plus (en anglais) &nbsp; &nbsp;","authors":[{"term_id":4046,"user_id":28,"is_guest":0,"slug":"robachevsky","display_name":"Andrei Robachevsky","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/10\/Andrei-Robachevsky_2_resized-e1642680748321.jpg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/10\/Andrei-Robachevsky_2_resized-e1642680748321.jpg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=75907"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/75907\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/50818"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=75907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=75907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=75907"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=75907"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=75907"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=75907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}