Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Packet Pushers Team Podcasts
The Packet Pushers Podcast Network includes a lot of smart listeners. Sometimes, they want to try podcasting. This is where those new podcast ideas hatch! Have a listen to the voice of the IT community.
…
continue reading

1
TNO044: Inside a Global Enterprise Data Center Network Migration (Sponsored)
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Today we get an inside look at a major data center migration that Nokia is undertaking. Nokia is our sponsor for today’s episode. The company is moving legacy sets of data center networking equipment to its own Event Driven Automation (EDA) solution. We go behind the scenes of Nokia’s own IT department, which is supporting... Read more »…
…
continue reading

1
HN799: Multi-Homing IPv6 to Your Home Lab
47:28
47:28
Play later
Play later
Lists
Like
Liked
47:28If you’ve got an Autonomous System Number (ASN) and an IPv6 block, you too can multi-home IPv6 to your home lab! Sounds easy, right? Well, maybe…but today we’re going to discuss why you’d want to and how you can do that with guest Anton Lönnerbro. Anton is a solutions architect at a managed service provider... Read more »…
…
continue reading
Starting any new endeavor is hard. That’s particularly true for a career in tech. And that’s the reason Alexis Bertholf and Kevin Nanns are launching the Life In Uptime podcast. In each episode they’ll sit down with engineers, leaders, and builders in tech to uncover the stories behind their careers to help you see how... Read more »…
…
continue reading

1
TCG059: From Source of Truth to Knowledge Graph – Rethinking Network Data
46:30
46:30
Play later
Play later
Lists
Like
Liked
46:30Network automation has a data problem. Traditional tools may hit limitations when managing complex infrastructure relationships. We explore how OpsMill’s InfraHub uses graph databases and temporal versioning to create what our guest calls “the knowledge graph of infrastructure” – enabling true version control at the database level while maintaining…
…
continue reading

1
NAN102: Practical Applications for AI in Network Automation
1:00:01
1:00:01
Play later
Play later
Lists
Like
Liked
1:00:01As AI becomes more integrated into the IT landscape, developers, engineers, and operators are looking for practical ways to use these new tools. Joining us today is Ryan Booth; he’s built a career around network automation, giving him a unique perspective on how network engineering, operations, software development, and AI intersect. We explore the…
…
continue reading

1
PP080: The State of OT Risks in 2025 (and What to Do About Them)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32What does the risk environment for Operational Technology (OT) look like in 2025? JJ and Drew review four recent reports on the state of OT security from Dragos, Fortinet, and others. We discuss ransomware impacts, ongoing risks of RDP traffic, directly exposed OT devices, and overall attack trends and the tools and processes that organizations... …
…
continue reading

1
HS113: Bad Tech Romance: Five Signs You’re In an Abusive IT Relationship
40:50
40:50
Play later
Play later
Lists
Like
Liked
40:50Sure, some days you hate your job. But how do you know when an IT position has gone from being run-of-the-mill annoying to truly toxic? And what do you do about it? Johna Johnson and John Burke are joined by Sandy Miller, a pseudonym for a CIO at a major global company who talks about... Read more »By Packet Pushers
…
continue reading

1
NB545: CISA Orders Immediate Patch of Cisco Vulnerabilities; Firewall Upgrade Blocks Emergency Calls
22:30
22:30
Play later
Play later
Lists
Like
Liked
22:30There’s an abundance of vulnerabilities in this week’s Network Break. We start with a red alert on a cluster of Cisco vulnerabilities in its firewall and threat defense products. On the news front, the vulnerability spotlight stays on Cisco as the US Cybersecurity and Infrastructure Security Agency (CISA) issues an emergency directive to all federa…
…
continue reading

1
HN798: Fortinet Offers a SOC Every Org Can Grow Into (Sponsored)
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00On today’s Heavy Networking: the Security Operations Center, or SOC. When I think of a SOC, I picture a miniature version of NASA’s mission control: lots of computers, lots of people, some big boards with lines and arrows and telemetry scrolling across the screens. I also think of SOCs as requiring a lot of gear,... Read more »…
…
continue reading

1
TNO043: Under the Manhole Cover: The Architecture of an Internet Exchange
1:11:02
1:11:02
Play later
Play later
Lists
Like
Liked
1:11:02In an IT world full of abstraction, overlays, and virtualization, it’s important to remember the physical infrastructure that supports all those things. So let’s get inside Mass IX, the Massachusetts Internet Exchange, to get a holistic view of the logical architecture and protocol mechanics of peering and Internet exchanges, as well as the iron, s…
…
continue reading
We’re diving into another IPv6 Basics today with the topic of dual-stack, which means running the IPv4 and IPv6 protocol stacks simultaneously. We get many questions about the implications of running dual-stack, and in this episode we’ll provide answers. We start by getting a little finicky about the definition of dual-stack, and then talk about...…
…
continue reading

1
N4N039: Configuring an IPsec Tunnel
1:01:20
1:01:20
Play later
Play later
Lists
Like
Liked
1:01:20We dive back into the world of IPsec with an episode dedicated to configuring IPsec tunnels. After discussing a listener comment regarding transport mode in IPsec tunnels, Ethan Banks and Holly Metlitzky work through topics such as multi-vendor IPsec configuration, licensing, and the details of configuration and routing. Bonus material: MTU size an…
…
continue reading

1
D2DO283: Lessons Learned When a Startup Doesn’t Take Wing
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10Today we talk to Elad Ben-Israel about his former startup Wing Cloud, and the language that was built along with it, Winglang. We discuss why Eland started Wing Cloud, lessons learned about founding a start up, and what the future holds for the Winglang language. Ad Spot: Faddom Faddom helps you discover and map your... Read more »…
…
continue reading

1
NAN101: Scaling Intel’s Data Centers with Network Automation (Sponsored)
52:21
52:21
Play later
Play later
Lists
Like
Liked
52:21Transforming over 5,000 network devices across 56 data centers is no small feat. Doing that with a very small team is even more impressive. On today’s episode, sponsored by Network To Code, we talk to Greg Botts from Intel, who with his team accomplished just that. They started with YAML files and DNS records and... Read more »…
…
continue reading

1
HW061: Cisco’s Ultra-Reliable Wireless Backhaul
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36As automation of machinery in industrial environments grows, there is a need for reliable wireless technologies to connect and control mobile assets. Mobile assets cannot tolerate dropped connections or network latency, which could jeopardize safety among other problems. Cisco’s Ultra-Reliable Wireless Backhaul is one such product that promises to …
…
continue reading

1
PP079: Rethinking the Architecture of Microsegmentation
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41Microsegmentation is a complex topic. We did an overview episode earlier this year, and we invited listeners to reach out to keep the microsegmentation conversation going. Today’s guest did just that. Philip Griffiths is Head of Strategic Sales at Netfoundry. However, this isn’t a sponsored show about NetFoundry. Philip is also involved in a workin…
…
continue reading

1
NB544: NVIDIA Buys $5 Billion of Intel Stock; Netskope Rides SASE IPO to an $8.8 Billion Valuation
26:32
26:32
Play later
Play later
Lists
Like
Liked
26:32It’s big-money deals and ever-more AI on this week’s Network Break. We start with a red alert from NVIDIA, which has rolled out a software upgrade to patch multiple bugs in its Triton Inference Server, one of which is a dangerous remote code execution vulnerability. On the news front, NVIDIA pledges a $5 billion investment... Read more »…
…
continue reading

1
TNO042: Building a Network Digital Twin for Automation and AI (Sponsored)
1:01:17
1:01:17
Play later
Play later
Lists
Like
Liked
1:01:17The digital twin is an evolving technology in the networking space. On today’s sponsored episode of Total Network Operations, we dig into details and definitions of the digital twin, how it ties into network automation and autonomy, and the power of abstraction layers. We’ll also talk about how the concepts in today’s show might influence... Read m…
…
continue reading

1
HN797: What To Do When The Business Asks for “AI”
1:07:25
1:07:25
Play later
Play later
Lists
Like
Liked
1:07:25When someone from the executive suite starts an AI initiative, what does that mean to you, the network engineer? The executive suite probably doesn’t know what their AI idea might mean for infrastructure. They might only have a vague idea of what they’re even trying to accomplish with an AI initiative. Regardless, that initiative puts... Read more …
…
continue reading

1
LIU000: Announcing Life In Uptime, a New Podcast to Get You Started on Your IT Journey
19:28
19:28
Play later
Play later
Lists
Like
Liked
19:28Life In Uptime is a brand-new podcast that explores the real journeys of the people who build and run enterprise IT. Each episode dives into the personal and professional paths that got each guest to where they are today—because the road to a career in technology isn’t one-size-fits-all. This show is for anyone wondering how... Read more »…
…
continue reading

1
TCG058: Creating the Internet Layer That Should Have Been With Avery Pennarun
51:49
51:49
Play later
Play later
Lists
Like
Liked
51:49In this deep dive episode, we explore the evolution of networking with Avery Pennarun, Co-Founder and CEO of Tailscale. Avery shares his extensive journey through VPN technologies, from writing his first mesh VPN protocol in 1997 called “Tunnel Vision” to building Tailscale, a zero-trust networking solution. We discuss how Tailscale reimagines the …
…
continue reading

1
NAN100: A Retrospective On 100 Episodes of Network Automation Nerds
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56Network Automation Nerds has reached a special milestone: episode 100! Eric Chou looks back on 5 years of conversations with network automation pioneers, practitioners, and visionaries. Drew Conry-Murray from the Packet Pushers joins Eric, along with online guest Ioannis Theodoridis, to find out why Eric started the podcast, his goals for all these…
…
continue reading

1
IPB183: Measuring IPv6 and IPv6 Statistics
27:21
27:21
Play later
Play later
Lists
Like
Liked
27:21Today we talk about measuring IPv6 and IPv6 statistics. We talk about why it’s useful to measure IPv6, how to track v6 deployment initiatives, and tools to help with your measurements. Episode Links: Google IPv6 – Google IPv6 Global Statistics Dashboard IPv6 Enabled – Hexabuild Episode Transcript: This episode was transcribed by AI and lightly... R…
…
continue reading

1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
continue reading

1
HS112: Standardizing NaaS Service Definitions
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12Network-as-a-Service (NaaS) promises enterprises the ability to set up and configure connectivity and network security with a couple of clicks. But for NaaS to truly transform enterprise networking, one thing has been missing: standards. Enter Mplify (formerly the Metro Ethernet Forum), a non-profit focused on standardizing NaaS service definitions…
…
continue reading

1
N4N038: Well Actually 02 – OSPF Multi-Area and LSA Types
49:57
49:57
Play later
Play later
Lists
Like
Liked
49:57We got some interesting listener feedback from our series on OSPF, so today’s N Is for Networking is another “Well actually” episode where we dig into that feedback. In particular, we’ll cover a defense of OSPF multi-area deployments, and dig into OSPF LSA types. Episode Links: OSPF Basics – N Is For Networking Episode 38... Read more »…
…
continue reading

1
NB543: Splunk, ServiceNow Announce AI Agents; Data Center Spending Runs Amok
29:41
29:41
Play later
Play later
Lists
Like
Liked
29:41Take a Network Break! We start with a listener correction on Cisco’s history of wireless certifications, then dig into a couple of red alerts on Microsoft Defender and a backdoor in Outlook. On the news front, Cisco announces new AI agents and SoC packages for Splunk; F5 spends $180 million to buy an AI security... Read more »…
…
continue reading

1
TNO041: From Ansible to AI: Jeremy Schulman on the Evolution of Network Automation
1:12:38
1:12:38
Play later
Play later
Lists
Like
Liked
1:12:38Jeremy Schulman has been working at network automation for much of his professional life. On today’s Total Network Operations, host Scott Robohn talks with Jeremy about his ongoing quest to get the network engineering bottleneck out of production. They discuss the early days of network automation when engineers tried to adopt tools from the compute…
…
continue reading

1
HN796: The Why and How of Making Your Infrastructure Quantum-Safe (Sponsored)
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Your production IT operations are almost certainly using cryptography libraries that are not quantum-safe, and the time to begin planning a cryptography overhaul is now. But this is likely to be a daunting project because it touches everything: clients, servers, apps, network devices, middleboxes, and so on. Daunting, but doable. We talk with Richu…
…
continue reading

1
D2DO282: Simplifying Complex Kubernetes Deployments With kro
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16Kubernetes is flexible and customizable, but it can also be notoriously complex and difficult to deploy to. On today’s Day Two DevOps we learn about kro (Kube Resource Operator), an open-source tool that helps simplify complex application deployments. Our guest is Islam Mahgoub, a Solutions Architect at AWS focused on building kro. We talk about...…
…
continue reading

1
HW060: CNAE – A New Wired Networking Certification From the CWNP
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13The CWNP offers vendor-neutral certifications for wireless networking professionals. This summer, the organization rolled out a wired certification, the Certified Network Administrator and Engineer (CNAE). This cert is aimed at wired and wireless network engineers to ensure they have a solid grounding in switching, routing, cabling, and wired proto…
…
continue reading

1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
continue reading

1
NB542: Hollow Core Fiber Outshines Glass; Broadcom Bags Big AI Bucks
24:57
24:57
Play later
Play later
Lists
Like
Liked
24:57Take a Network Break! We shine a red light on an AnyShare Service Agent API vulnerability and an active exploit against FreePBX. SASE vendor Cato Networks makes first-ever acquisition with purchase of AI security startup AIM, Microsoft researchers tout hollow core fiber tests that out-perform glass core fiber optics, and Wi-Fi 7 helps drive up... R…
…
continue reading
Monitoring and troubleshooting latency can be tricky. If it’s in the network, was it the IP stack? A NIC? A switch buffer? A middlebox somewhere on the WAN? If it’s the application, can you, the network engineer, bring receipts to the app team? And what if you need to build and operate a network that’s... Read more »…
…
continue reading

1
TCG057: Following the Progress of the Model Context Protocol (MCP) With John Capobianco
57:43
57:43
Play later
Play later
Lists
Like
Liked
57:43John Capobianco is back! Just months after our first Model Context Protocol (MCP) discussion, John returns to showcase how this “USB-C of software” has transformed from experimental technology to an enterprise-ready solutions. We explore the game-changing OAuth 2.1 security updates, witness live demonstrations of packet analysis through natural lan…
…
continue reading

1
NAN099: Bridging the Gap Between Innovative Tech and Everyday Users
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29New technologies, tools, and innovations help move IT forward, but it can be hard for users to keep up. Network Automation Nerds welcomes guest William Collins, a dynamic force in the world of technology. As a passionate tech evangelist, he helps to bridge the gap between emerging technologies such as AI and everyday users with... Read more »…
…
continue reading

1
D2DO281: Faddom: Providing a Unified Source of Truth for Security and IT Operations (Sponsored)
45:13
45:13
Play later
Play later
Lists
Like
Liked
45:13Faddom is re-envisioning what application dependency mapping and infrastructure inventory can be in the era of cloud and hybrid IT. Join us today on this sponsored episode as we speak with Faddom’s Itamar Rotem, CPO and Ofer Regev, CTO, about how Faddom’s discovery process can help to improve migrations for any size organization and help... Read mo…
…
continue reading

1
PP076: RF Risks and How to See Unseen Threats
59:58
59:58
Play later
Play later
Lists
Like
Liked
59:58Our airwaves are alive with radio frequencies (RF). Right now billions of devices around the world are chattering invisibly over Wi-Fi, Bluetooth, Zigbee, and other protocols you might not have heard of. On today’s show we peer into the invisible world to better understand the RF threat environment. Our guest is Brett Walkenhorst, CTO of... Read mo…
…
continue reading

1
HS111: When Someone Makes Your Cloud Service Go Poof!
38:29
38:29
Play later
Play later
Lists
Like
Liked
38:29The modern enterprise is built on cloud, with most organizations using SaaS for their “horizontal” work horse layers, such as communications, conferencing, HR, and payroll. That makes the enterprise entirely dependent on the good-faith execution and good-will delivery of the cloud providers. Those providers have a huge economic incentive to reliabl…
…
continue reading

1
NB541: Cisco Gets Serious About Wi-Fi Certs; Is AI Infrastructure Ebullience Ebbing?
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Take a Network Break! We start with follow-ups regarding the 7-year-old Cisco bug, risks of AI agents, and Anthropic forcing you to opt out or have your chats saved for five years. Then we highlight a serious vulnerability (which is being exploited in the wild) in Citrix NetScaler ADC and Netscaler Gateway systems. On the... Read more »…
…
continue reading

1
HN794: How the Bundle Protocol Enables Interplanetary Networking
1:03:33
1:03:33
Play later
Play later
Lists
Like
Liked
1:03:33How might we get network traffic from Earth to a lunar base? Or Mars? Or to spaceships carrying astronauts or probes exploring space? And how do we get it back? The problem, among other things, is latency. The answer isn’t TCP/IP. The answer is…complicated. On today’s Heavy Networking we explore the challenges of getting packets... Read more »…
…
continue reading

1
TNO040: From ARPANET to the Stars: Vint Cerf on the Past and Future of the Internet
1:14:22
1:14:22
Play later
Play later
Lists
Like
Liked
1:14:22Vint Cerf, widely recognized as one of the fathers of the Internet, is today’s special guest on Total Network Operations. He currently serves as Vice President and Chief Internet Evangelist at Google. His pioneering work began back in the 1960’s when he was involved in the ARPANET project. Alongside Bob Kahn, Vint co-invented the TCP/IP... Read mor…
…
continue reading

1
IPB182: IPv6 Transition Technology Options
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30Transitioning from IPv4 to IPv6, or at least IPv6-mostly, is no easy task. Today’s show provides some education and advice about IPv6 transition mechanisms. We cover options such as NAT64, DNS64, PREF64, and more, as well as use cases. Also, if your technology vendors aren’t offering some of these mechanisms, ask for them – you’re... Read more »…
…
continue reading
It’s time to talk crypto. No, not the Bitcoin kind. Ethan and Holly introduce the basics of IPsec, the protocol that authenticates and encrypts traffic between endpoints. They discuss what it is, how it provides trustworthiness and secrecy to IP traffic, and common use cases. They review the different types of IPsec protocols and modes,... Read mor…
…
continue reading

1
D2DO280: Architect for Your AI Success With F5 and MinIO (Sponsored)
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33In the changing landscape of AI data infrastructure, F5 and MinIO are partnering on a solution that brings together the best of each company. This solution bookends the AI stack—it uses F5 for reliable, secure, and observable data delivery and MinIO’s AIStor for storage of all data types. The goal is to help organizations be... Read more »…
…
continue reading

1
HW059: Pi to Go: Introducing the WLAN Pi Go
21:50
21:50
Play later
Play later
Lists
Like
Liked
21:50The new WLAN Pi Go is small, lightweight Wi-Fi testing tool. It can sniff Wi-Fi frames, measure signals, decode packets, and more. The tool snaps to the back of your phone and connects via a short cable for data and power. The small form factor makes it ready to take it along and test any... Read more »…
…
continue reading

1
NB540: PQE In PAN-OS; FBI Warns 7-Year Old Cisco Bug Under Attack
47:16
47:16
Play later
Play later
Lists
Like
Liked
47:16Take a Network Break! We double-dip on red alerts as the FBI warns that Russian state hackers are targeting a seven-year-old vulnerability on Cisco IOS and IOS-XE devices (a patch has been available for seven years), and a compromised XZ Utils backdoor is still lurking in some Docker images. Palo Alto Networks has added support... Read more »…
…
continue reading

1
Tech Bytes: Palo Alto Networks Advances DNS Security with ADNSR (Sponsored)
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58DNS security is our topic on today’s Tech Bytes podcast, sponsored by Palo Alto Networks. Specifically, Palo Alto Networks is here to talk about its Advanced DNS Resolver, or ADNSR, which provides a security-centric, cloud-delivered DNS resolution service. We talk about how ADNSR works, its features and capabilities, and how it differs from other D…
…
continue reading

1
HN793: A Deep Dive Into High-Performance Switch Memory
1:34:35
1:34:35
Play later
Play later
Lists
Like
Liked
1:34:35Today’s episode is all about high-performance memory in switches. We dig into the differences among TCAM, SRAM, DRAM, and HBM, and all the complex tradeoffs that go into allocating memory resources to networking functions. If you’ve ever had to select a Switching Database Manager template or done similar operations on a switch, this is your... Read…
…
continue reading

1
TNO039: Demystifying AI Adoption for Networkers (Sponsored)
58:49
58:49
Play later
Play later
Lists
Like
Liked
58:49On today’s Total Network Operations we talk through the adoption of AI in network operations with John Capobianco, Head of DevRel at Selector. Selector is the sponsor of today’s episode. John walks us through his career journey as a network engineer, and describes the moment where he realized that AI was going to change how... Read more »…
…
continue reading