
The Everything Feed - All Packet Pushers Pods
1,774 episodes — Page 6 of 36
NB547: New Cisco Router Targets AI DCI; Salesforce Launches ServiceNow Competitor
Take a Network Break! We start with listener follow-up on security browsers, and then dive into a deep pool of Juniper vulnerabilities to pick two critical ones affecting Juniper Space. We also get an update from SonicWall that the breach of its cloud storage service affected all users of the service. Cisco announces a new... Read more »
TNO045: IP and Optical Integration: Automation Across Layers
LightRiver has software and service products focused on the automation, optimization, and simplification of multi-layer, multi-vendor, and multi-generation networking. Today we have a team from LightRiver lead by Jim Brinksma to help explain how LightRiver is advancing automation in optical and bridging the gap between the IP and optical layers. They discuss the challenges, obstacles... Read more »
HN800: Root Cause Analysis for the Entire Stack (Sponsored)
Today’s show is one of those “We’re living in the future” episodes, where we talk about using AI to perform root cause analysis of a performance issue. But not root cause analysis for just the networking part of the stack. The full stack. Why? Because it’s not good enough to say “it’s not the network”.... Read more »
IPB185: When IPv6 VPN and DNS Don’t Cooperate
Sometimes weirdness occurs within DNS if you’re on an IPv4 network and you connect to a dual-stack or v6-only VPN. Maybe the browser doesn’t connect, but you can still send pings, or vice versa. Is the OS getting confused about which stack and which order of interfaces to request services? Is the weird behavior being... Read more »
N4N040: Mock Interview for a Network Administration Job
The job interview is an inescapable part of a career journey. Today on N Is For Networking, we conduct a mock interview with a candidate who’s applying for a junior network administration role. The goal is to give Toni Mrowetz, our candidate, feedback. At the same time, we hope this helps anyone listening who might... Read more »
D2DO284: AI, MCP, and the Identities that Tie Them All Together
AI is developing at an incredible pace. With that development comes questions. For instance, how do you connect your resources to agents? How do agents connect with each other? And how do you keep it all secure? Our guest Christian Posta is here to guide us through AI, MCP, and the concept of workload identities.... Read more »
PP081: News Roundup – BRICKstorm Backdoor Targets Network Appliances, GitHub Unveils Supply Chain Defense Plans
From a massive SIM farm takedown to dealing with supply chain attacks targeting npm, our news roundup provides context and commentary on a fresh crop of security news. We discuss exploits against Cisco firewalls and switches, a SonicWall firmware update to remove a rootkit targeting its SMA 100, and GitHub’s plans to harden npm packages.... Read more »
HW062: Designing Access Points For the Enterprise
When vendors design and build enterprise Wi-Fi access points, they must balance performance and cost. With the help of guest Rosalie Bibona, Product Management Director for Wireless Hardware at Extreme Networks, we get a peek into the technical decisions that go into creating enterprise Wi-Fi access points. We talk about how every choice, from radio... Read more »
NB546: Meta Mulls GPU Startup Purchase; Indirect Prompt Injection Exacerbates AI Risks
Take a Network Break! We start with a two-part listener follow-up and sound alarms about a serious flaw in Termix and tens of thousands of still-vulnerable Cisco security devices. Alkira debuts an MCP server and AI copilot for its multi-cloud networking platform; Cato Networks releases a Chrome-based browser extension to help secure contractor and personal... Read more »
Tech Bytes: Building a UEC-Supported AI Data Center Fabric With Nokia (Sponsored)
The network plays a key role in AI model and inference training. On today’s Tech Bytes podcast, sponsored by Nokia, we talk about why you need a high-performance network for AI training workloads, essential technologies such as RoCE v2 and others that make Ethernet suitable for scale-out networking, the role of the Ultra Ethernet Consortium... Read more »
TNO044: Inside a Global Enterprise Data Center Network Migration (Sponsored)
Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »
HN799: Multi-Homing IPv6 to Your Home Lab
If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »
LIU001: Growing Pains
Starting any new endeavor is hard. That’s particularly true for a career in tech. And that’s the reason Alexis Bertholf and Kevin Nanns are launching the Life In Uptime podcast. In each episode they’ll sit down with engineers, leaders, and builders in tech to uncover the stories behind their careers to help you see how... Read more »
TCG059: From Source of Truth to Knowledge Graph – Rethinking Network Data
Network automation has a data problem. Traditional tools may hit limitations when managing complex infrastructure relationships. We explore how OpsMill’s InfraHub uses graph databases and temporal versioning to create what our guest calls “the knowledge graph of infrastructure” – enabling true version control at the database level while maintaining the flexibility to model anything from... Read more »
NAN102: Practical Applications for AI in Network Automation
As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joining us today is Ryan Booth; he’s built a career around network automation, giving him a unique perspective on how network engineering, operations, software development, and AI intersect. We explore the practical... Read more »
PP080: The State of OT Risks in 2025 (and What to Do About Them)
What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... Read more »
HS113: Bad Tech Romance: Five Signs You’re In an Abusive IT Relationship
Sure, some days you hate your job. But how do you know when an IT position has gone from being run-of-the-mill annoying to truly toxic? And what do you do about it? Johna Johnson and John Burke are joined by Sandy Miller, a pseudonym for a CIO at a major global company who talks about... Read more »
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls
There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federal... Read more »
HN798: Fortinet Offers a SOC Every Org Can Grow Into (Sponsored)
On today’s Heavy Networking: the Security Operations Center, or SOC. When I think of a SOC, I picture a miniature version of NASA’s mission control: lots of computers, lots of people, some big boards with lines and arrows and telemetry scrolling across the screens. I also think of SOCs as requiring a lot of gear,... Read more »
TNO043: Under the Manhole Cover: The Architecture of an Internet Exchange
In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, steel,... Read more »
IPB184: IPv6 Basics: Dual-Stack
We’re diving into another IPv6 Basics today with the topic of dual-stack, which means running the IPv4 and IPv6 protocol stacks simultaneously. We get many questions about the implications of running dual-stack, and in this episode we’ll provide answers. We start by getting a little finicky about the definition of dual-stack, and then talk about... Read more »
N4N039: Configuring an IPsec Tunnel
We dive back into the world of IPsec with an episode dedicated to configuring IPsec tunnels. After discussing a listener comment regarding transport mode in IPsec tunnels, Ethan Banks and Holly Metlitzky work through topics such as multi-vendor IPsec configuration, licensing, and the details of configuration and routing. Bonus material: MTU size and NAT-T. Episode... Read more »
D2DO283: Lessons Learned When a Startup Doesn’t Take Wing
Today we talk to Elad Ben-Israel about his former startup Wing Cloud, and the language that was built along with it, Winglang. We discuss why Eland started Wing Cloud, lessons learned about founding a start up, and what the future holds for the Winglang language. Ad Spot: Faddom Faddom helps you discover and map your... Read more »
NAN101: Scaling Intel’s Data Centers with Network Automation (Sponsored)
Transforming over 5,000 network devices across 56 data centers is no small feat. Doing that with a very small team is even more impressive. On today’s episode, sponsored by Network To Code, we talk to Greg Botts from Intel, who with his team accomplished just that. They started with YAML files and DNS records and... Read more »
HW061: Cisco’s Ultra-Reliable Wireless Backhaul
As automation of machinery in industrial environments grows, there is a need for reliable wireless technologies to connect and control mobile assets. Mobile assets cannot tolerate dropped connections or network latency, which could jeopardize safety among other problems. Cisco’s Ultra-Reliable Wireless Backhaul is one such product that promises to deliver reliable wireless in industrial environments. ... Read more »
PP079: Rethinking the Architecture of Microsegmentation
Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a working... Read more »
NB544: NVIDIA Buys $5 Billion of Intel Stock; Netskope Rides SASE IPO to an $8.8 Billion Valuation
It’s big-money deals and ever-more AI on this week’s Network Break. We start with a red alert from NVIDIA, which has rolled out a software upgrade to patch multiple bugs in its Triton Inference Server, one of which is a dangerous remote code execution vulnerability. On the news front, NVIDIA pledges a $5 billion investment... Read more »
TNO042: Building a Network Digital Twin for Automation and AI (Sponsored)
The digital twin is an evolving technology in the networking space. On today’s sponsored episode of Total Network Operations, we dig into details and definitions of the digital twin, how it ties into network automation and autonomy, and the power of abstraction layers. We’ll also talk about how the concepts in today’s show might influence... Read more »
HN797: What To Do When The Business Asks for “AI”
When someone from the executive suite starts an AI initiative, what does that mean to you, the network engineer? The executive suite probably doesn’t know what their AI idea might mean for infrastructure. They might only have a vague idea of what they’re even trying to accomplish with an AI initiative. Regardless, that initiative puts... Read more »
LIU000: Announcing Life In Uptime, a New Podcast to Get You Started on Your IT Journey
Life In Uptime is a brand-new podcast that explores the real journeys of the people who build and run enterprise IT. Each episode dives into the personal and professional paths that got each guest to where they are today—because the road to a career in technology isn’t one-size-fits-all. This show is for anyone wondering how... Read more »
TCG058: Creating the Internet Layer That Should Have Been With Avery Pennarun
In this deep dive episode, we explore the evolution of networking with Avery Pennarun, Co-Founder and CEO of Tailscale. Avery shares his extensive journey through VPN technologies, from writing his first mesh VPN protocol in 1997 called “Tunnel Vision” to building Tailscale, a zero-trust networking solution. We discuss how Tailscale reimagines the OSI stack by... Read more »
NAN100: A Retrospective On 100 Episodes of Network Automation Nerds
Network Automation Nerds has reached a special milestone: episode 100! Eric Chou looks back on 5 years of conversations with network automation pioneers, practitioners, and visionaries. Drew Conry-Murray from the Packet Pushers joins Eric, along with online guest Ioannis Theodoridis, to find out why Eric started the podcast, his goals for all these conversations, a... Read more »
IPB183: Measuring IPv6 and IPv6 Statistics
Today we talk about measuring IPv6 and IPv6 statistics. We talk about why it’s useful to measure IPv6, how to track v6 deployment initiatives, and tools to help with your measurements. Episode Links: Google IPv6 – Google IPv6 Global Statistics Dashboard IPv6 Enabled – Hexabuild Episode Transcript: This episode was transcribed by AI and lightly... Read more »
PP078: Using Free Tools for Detection Engineering
You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management. Matt has over 15 years... Read more »
HS112: Standardizing NaaS Service Definitions
Network-as-a-Service (NaaS) promises enterprises the ability to set up and configure connectivity and network security with a couple of clicks. But for NaaS to truly transform enterprise networking, one thing has been missing: standards. Enter Mplify (formerly the Metro Ethernet Forum), a non-profit focused on standardizing NaaS service definitions. Mplify’s CTO, Pascal Menezes, joins Johna... Read more »
N4N038: Well Actually 02 – OSPF Multi-Area and LSA Types
We got some interesting listener feedback from our series on OSPF, so today’s N Is for Networking is another “Well actually” episode where we dig into that feedback. In particular, we’ll cover a defense of OSPF multi-area deployments, and dig into OSPF LSA types. Episode Links: OSPF Basics – N Is For Networking Episode 38... Read more »
NB543: Splunk, ServiceNow Announce AI Agents; Data Center Spending Runs Amok
Take a Network Break! We start with a listener correction on Cisco’s history of wireless certifications, then dig into a couple of red alerts on Microsoft Defender and a backdoor in Outlook. On the news front, Cisco announces new AI agents and SoC packages for Splunk; F5 spends $180 million to buy an AI security... Read more »
TNO041: From Ansible to AI: Jeremy Schulman on the Evolution of Network Automation
Jeremy Schulman has been working at network automation for much of his professional life. On today’s Total Network Operations, host Scott Robohn talks with Jeremy about his ongoing quest to get the network engineering bottleneck out of production. They discuss the early days of network automation when engineers tried to adopt tools from the compute... Read more »
HN796: The Why and How of Making Your Infrastructure Quantum-Safe (Sponsored)
Your production IT operations are almost certainly using cryptography libraries that are not quantum-safe, and the time to begin planning a cryptography overhaul is now. But this is likely to be a daunting project because it touches everything: clients, servers, apps, network devices, middleboxes, and so on. Daunting, but doable. We talk with Richu Channakeshava, Principal... Read more »
D2DO282: Simplifying Complex Kubernetes Deployments With kro
Kubernetes is flexible and customizable, but it can also be notoriously complex and difficult to deploy to. On today’s Day Two DevOps we learn about kro (Kube Resource Operator), an open-source tool that helps simplify complex application deployments. Our guest is Islam Mahgoub, a Solutions Architect at AWS focused on building kro. We talk about... Read more »
HW060: CNAE – A New Wired Networking Certification From the CWNP
The CWNP offers vendor-neutral certifications for wireless networking professionals. This summer, the organization rolled out a wired certification, the Certified Network Administrator and Engineer (CNAE). This cert is aimed at wired and wireless network engineers to ensure they have a solid grounding in switching, routing, cabling, and wired protocols. The CWNP says the cert isn’t... Read more »
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and Microsoft making... Read more »
NB542: Hollow Core Fiber Outshines Glass; Broadcom Bags Big AI Bucks
Take a Network Break! We shine a red light on an AnyShare Service Agent API vulnerability and an active exploit against FreePBX. SASE vendor Cato Networks makes first-ever acquisition with purchase of AI security startup AIM, Microsoft researchers tout hollow core fiber tests that out-perform glass core fiber optics, and Wi-Fi 7 helps drive up... Read more »
HN795: Adventures In Latency
Monitoring and troubleshooting latency can be tricky. If it’s in the network, was it the IP stack? A NIC? A switch buffer? A middlebox somewhere on the WAN? If it’s the application, can you, the network engineer, bring receipts to the app team? And what if you need to build and operate a network that’s... Read more »
TCG057: Following the Progress of the Model Context Protocol (MCP) With John Capobianco
John Capobianco is back! Just months after our first Model Context Protocol (MCP) discussion, John returns to showcase how this “USB-C of software” has transformed from experimental technology to an enterprise-ready solutions. We explore the game-changing OAuth 2.1 security updates, witness live demonstrations of packet analysis through natural language with Gemini CLI, and discover how... Read more »
NAN099: Bridging the Gap Between Innovative Tech and Everyday Users
New technologies, tools, and innovations help move IT forward, but it can be hard for users to keep up. Network Automation Nerds welcomes guest William Collins, a dynamic force in the world of technology. As a passionate tech evangelist, he helps to bridge the gap between emerging technologies such as AI and everyday users with... Read more »
D2DO281: Faddom: Providing a Unified Source of Truth for Security and IT Operations (Sponsored)
Faddom is re-envisioning what application dependency mapping and infrastructure inventory can be in the era of cloud and hybrid IT. Join us today on this sponsored episode as we speak with Faddom’s Itamar Rotem, CPO and Ofer Regev, CTO, about how Faddom’s discovery process can help to improve migrations for any size organization and help... Read more »
PP076: RF Risks and How to See Unseen Threats
Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read more »
HS111: When Someone Makes Your Cloud Service Go Poof!
The modern enterprise is built on cloud, with most organizations using SaaS for their “horizontal” work horse layers, such as communications, conferencing, HR, and payroll. That makes the enterprise entirely dependent on the good-faith execution and good-will delivery of the cloud providers. Those providers have a huge economic incentive to reliably deliver software – but... Read more »
NB541: Cisco Gets Serious About Wi-Fi Certs; Is AI Infrastructure Ebullience Ebbing?
Take a Network Break! We start with follow-ups regarding the 7-year-old Cisco bug, risks of AI agents, and Anthropic forcing you to opt out or have your chats saved for five years. Then we highlight a serious vulnerability (which is being exploited in the wild) in Citrix NetScaler ADC and Netscaler Gateway systems. On the... Read more »