The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation w…
Greg Ferro, Ethan Banks, Drew Conry-Murray, Chris Wahl, Scott Lowe
Listeners of Packet Pushers - Full Podcast Feed that love the show mention: packet pushers, greg and ethan, networking industry, best networking podcast, infrastructure, vendors, bones, tech podcast, data, technology, amazing job, touch, example, date, highly recommended, analysis, commute, resource, believe, deep.
The Packet Pushers - Full Podcast Feed is an incredible podcast that has been keeping listeners informed and engaged for years. With a focus on IT and the networking industry, this podcast provides a wealth of information and helps create a sense of community among its listeners. The hosts are knowledgeable and interactive, making the show engaging and enjoyable.
One of the best aspects of this podcast is the depth of information it provides. Whether you're a networking professional or simply interested in technology, this podcast covers a wide range of topics that will keep you up-to-date with the latest trends and developments in the field. The guests on the show are experts in their respective areas, providing valuable insights and analysis.
Another great aspect of this podcast is its interactive nature. The hosts are appreciative of their fan base and frequently invite them to participate in discussions and ask questions. This creates a sense of community among listeners, allowing them to feel involved and part of something greater.
While there aren't many negative aspects to this podcast, one minor downside could be that some episodes may be too technical for casual listeners. However, for those who are interested in networking or work in the IT industry, this level of detail is highly beneficial.
In conclusion, The Packet Pushers - Full Podcast Feed is an outstanding podcast that delivers valuable information about IT, networking, and the industry as a whole. With knowledgeable hosts and engaging content, it's no wonder that this podcast has garnered such a devoted fan base over the years.

On today's episode Ethan is joined by Mark Prosser, a self-described Network Operator Advocate and Network Automation Dreamer, to embark on a thought exercise about network services. Together they grapple with questions such as: What is a network service, exactly? How is it defined? Is it even possible to define it when considered in the... Read more »

Today our hosts discuss IPv6 Privacy and Temporary Addresses to clarify how address provisioning can potentially work for host operating systems. The discussion covers the difference between permanent and temporary privacy addresses, their uses, and how interface identifiers are assigned to hosts.

We asked for follow ups and you did not disappoint! On today's show we respond to listener comments and corrections on multicast, routing protocols, security, and more. We also have a technical correction for the RFC 1918 Class B private address range. A big thank you to everyone who sent in responses. If you'd like... Read more »

Malware has shifted from phishing expeditions to open source packages, domains, and repositories. Ned and Kyler welcome Jenn Gile, co-founder of Open Source Malware, to discuss how malware is making its way into open source software. Together they break down NPM compromises, AI-driven infiltration, malicious agent skills, and more. Episode Links: Open Source Malware –... Read more »

Threat actors are behaving more like professional organizations in an effort to launch more effective and profitable attacks. We explore this and other themes from the latest Threat Labs report from HPE, our sponsor for today's Packet Protector episode. We also look at how older vulnerabilities are still contributing to today's exploits, why security organizations... Read more »

Speedtest Certified is a network connectivity verification program for properties and venues, allowing them to prove the performance of their Wi-Fi. Alan Blake of Ookla joins the show to break down what the certification actually measures, how assessments are performed, and what it means for network owners as well as Wi Fi professionals. This is... Read more »

Take a Network Break! We commence with a red alert on FastMCP, and then debate whether Anthropic’s Project Glasswing is a marketing stunt or a reasonable response to the growing ability of AI models to find and exploit software vulnerabilities. Iran targets US OT networks, startup Aria Networks unveils Ethernet switches purpose-built for AI factories,... Read more »

How should you shape your IT strategy around the possibility–or is it probability–that the AI economy is a true bubble and will burst soon? John Burke and Johna Johnson revisit the signs indicating that an AI bubble is in full swing and pointing to the potential for collapse in the near term. Doomsaying having been... Read more »

Today we welcome Damien Garros, Co-Founder and CEO of OpsMill, to discuss how network automation is creating the need to redefine roles beyond traditional engineers, including network automation architects, software developers, and operations specialists. We hone in on the concept of mechanics, who focus on implementation, and architects who see the bigger picture. We also... Read more »

On today’s sponsored episode we talk with David Gee, CEO at Curvium, a systems integrator and VAR. David holds thoughtful opinions about network automation and orchestration, how such platforms are to be built, and the impact AI is having on network automation. We dig into how AI fundamentally changes how we interact with systems, and... Read more »

Kevin and Alexis are back with a behind-the-scenes look at the podcast with guest Melina Bertholf, who joined the team a while back to help manage content. (And yes, sharp-eyed readers will notice a family name shared by Alexis and Melina). After interviewing many guests about their tech journeys, our hosts share their own personal... Read more »

Vibe coding: give AI a description of what you want, the model writes the code, you ship it, and then you hope for the best. It works great for side projects, but it can fall apart the moment you point an AI agent at production infrastructure. Today, William and Eyvonne sit down with John Capobianco,... Read more »

Eric Chou is joined by Matt Campbell, a seasoned network engineer whose career has taken him into some of the most demanding and high-stakes environments around. Together they'll explore how Matt’s automation philosophy, lessons learned, and best practices adapt when the margin of error is razor thin. Whether you’re automating basic configs or tackling brownfield... Read more »

The best strategy in the world won't succeed if a team falters operationally. But what is operational excellence, and what does it take to acquire it? Cal Poly faculty member (and former Intel strategist) John Miranda shares his thinking with our Heavy Strategy listeners. He discusses concepts like the theory of constraints, root-cause analysis, and... Read more »

In the cybercrime industry, initial access brokers specialize in break-ins. They pick digital locks and slide open electronic windows, and then sell that access to other threat actors who specialize in ransomware, exfiltration, and other crimes. SocGholish is a widely used tool in the access broker toolkit. Typically disguised as a legitimate software update, SocGholish... Read more »

Take a Network Break! We start with a critical vulnerability in Cisco’s Integrated Management Controller. In the news, Verizon settles patent litigation over IoT antenna technology, Cato Networks lets customers purchase individual services within its SASE offering, and Azure adds private application gateways that don’t require a public IP address. Thousands of F5 Big-IP instances... Read more »

Ethan Banks sits down with Ryan Hamel at the 96th North American Network Operators' Group (NANOG96). Ryan, a network automation developer for the Zayo Group, talks about why boring network design is actually a good thing. He and Ethan explore why simplicity and standardization are key to long-term success. They also emphasize the importance of... Read more »

Today our hosts discuss the essential role of Stateless Address Autoconfiguration (SLAAC) in successfully deploying an IPv6-mostly network. SLAAC is required to assign a unique IPv6 address to the Customer-side Translator (CLAT), which allows devices to operate on IPv6. However, enterprise operators might prefer using DHCPv6 for network tracking and accountability, potentially trapping them in... Read more »

Lenny Giuliano, Sr. Distinguished Systems Engineer at HPE Juniper Networks, joins Holly and Ethan for another round of multicast. Part two helps fill in details not covered in episode 50. They cover how multicast traffic also affects Ethernet frame addressing, and the key differences between IPv4 and IPv6 multicast. They also explain new hybrid multicast... Read more »

Ned and Kyler discuss the state of platform engineering, DevEx, and how AI is affecting choices in those domains with guest Annem Shah. They discuss how AI can help bridge the gap between initial setup and continuous operations by providing feedback and interpreting complex error messages. They also break down how AI can assist in... Read more »

When applying AI to network operations and automation, a strong data foundation is essential. In this sponsored episode, Eric Chou and Scott Robohn are joined by Surya Nimmagadda, Chief Data Scientist; and Joby Rudolph, Senior Distinguished Engineer, both from Selector. They discuss the importance of transparency in their data and how it can instill confidence... Read more »

Keith Parsons is joined by Bradley Wegner, the creator of the Build Your Own AP deep dive at WLPC. Brad discusses his class, which focuses on hands-on hardware experience of constructing an AP. He talks about balancing hardware costs with capabilities, sourcing the components, and the software and firmware involved. He also shares his vision... Read more »

Firewall policies are the heart of network security, but over time they can become a tangled mess. Rules might be outdated, or conflicting, or fail to address new applications, services, and risks. Add in remote locations and public cloud deployments, and you've got a serious headache for security and network teams. On today's sponsored show... Read more »

Take a Network Break! Mozilla is our Red Alert topic, with critical vulnerabilities in Firefox and Thunderbird. On the news front, we cover a string of security announcements from Palo Alto Networks, including a new certificate management service to help organizations keep up with shrinking cert lifetimes. Cisco announces new protections for AI agents and... Read more »

Today on the Tech Bytes podcast we talk network automation. More specifically, we dig into the need for proper data management to support your network automation initiatives. Automation relies on accurate, up-to-date information about your infrastructure, but that information can be scattered across innumerable repositories, systems, and spreadsheets. And it may, or may not, be... Read more »

Scott Robohn and networking expert Russ White dive into the concept of design for operations. That is, they look at how to connect the design of a protocol or solution to how people are actually going to use it. They examine how protocol designers often overlook the teams that must operate them, creating some “inoperable”... Read more »

Palo Alto Networks released a slew of product news at the 2026 RSA conference around AI security, SASE, and a new certificate lifecycle management offering. On today's Heavy Networking, sponsored by Palo Alto Networks, Ethan and Drew dig into these announcements to get details about how they work. They also talk about the risks of... Read more »

Alexis Bertholf and Kevin Nanns sit down for a conversation with Andrei Istrate, Senior Mobile Developer at Toptal. Andrei has taken the “mobile” part of his job literally: he’s built a life around travel and experiences rather than settling in one location. Andrei talks about the travel opportunities that remote work has presented, how he... Read more »

William Collins and Eyvonne Sharp invite Skylar Sands, Senior Automation Engineer at World Wide Technology, to discuss what it means to integrate AI into the daily workflow in a meaningful way. Together they break down the shift in the automation engineer's role now that AI can instantly generate the “toolkit” of Python, Ansible, and Bash,... Read more »

Eric Chou is joined by returning guest, Danny Wade a.k.a. Devnet Dan, to unpack everything you missed from AutoCon 4. AutoCon 4 had a heavy focus on AI's role in network automation and Danny was there in person, has already blogged about his insights, and is here to break down the trends, takeaways, and key... Read more »

On today's sponsored episode, Ned Bellavance and Kyler Middleton welcome guest Marcin Wyszynski, Head of R&D at Spacelift to guide them through the potential future of IaC and how AI is changing the landscape of developer productivity, especially around infrastructure. They discuss two of Spacelift’s products, Spacelift Intent and Spacelift Intelligence. Spacelift Intent is an... Read more »

Spending on SASE, which combines SD-WAN and cloud-delivered security, is forecast to nearly triple over the next few years, according to Dell’Oro Group. Today on Packet Protector we talk with that forecast’s author about what’s driving that spending. We also explore how SASE vendors are differentiating, architectural considerations for SASE deployments, pros and cons of... Read more »

How should you shape your IT strategy around the possibility–or is it probability–that the AI economy is a true bubble and will burst soon? John Burke and Johna Johnson revisit the signs indicating that an AI bubble is in full swing and pointing to the potential for collapse in the near term. Doomsaying having been... Read more »

Take a Network Break! We sound a red alert about a swarm of critical D-Link vulnerabilities. In this week’s news, CISA warns organizations to harden endpoint management systems in the wake of a cyberattack that used the target’s own Microsoft Intune system to wipe thousands of devices, Cisco rolls an NVIDIA ASIC into an N9100... Read more »

Eric Chou, author of the AI Networking Cookbook and host of Network Automation Nerds, joins Ethan and Drew to discuss adding artificial intelligence to your network automation toolbox. The AI Networking Cookbook is aimed at network engineers and provides a systematic approach to learning AI for network automation. Together they break down pros and cons... Read more »

In this sponsored episode, Dylan Hensler, Customer Solutions Specialist with Statseeker, joins Scott for a breakdown of what allows Statseeker to move beyond traditional network monitoring. Together they discuss Statseeker’s ability to help NetOps teams detect issues faster, prove root cause, and operate with confidence by turning raw data into operational intelligence. They also discuss... Read more »

Today's topic is Multiprotocol Label Switching or MPLS, a foundational technology that powers service provider networks and enterprise WANs all over the world. To help us break it down, we've invited James Bensley, a Network Tech Lead who’s spent fifteen years with MPLS. James explains what spurred the creation of MPLS and how it works... Read more »

One of the early design principles of the Internet was end-to-end connectivity: that is, every device on the Internet would be publicly addressable, and every device could share its resources or provide services. That design principle wasn’t achieved with IPv4 for a variety of reasons (including address scarcity, and many network owners not wanting endpoints... Read more »

Building a Network Source of Truth (NSoT) is only step one in an automation effort — turning it into operational automation is where outcomes happen. In this sponsored episode by Network to Code, Eric Fetty, a self-taught network engineer who literally automated his way through his CCIE lab, shares how he's doing exactly that at... Read more »

Kyler and Ned sit down with Liz Fong-Jones, Technical Fellow at Honeycomb, to discuss the impact of AI on open-source contributions. Liz proposes shifting the script from code patch contributions to detailed bug reports. They also break down the distinction between programming and software engineering, and the critical role of OpenTelemetry in ensuring the observability... Read more »

In this sponsored episode, FluidCloud co-founders Sharad Kumar and Harshit Omar sit down with William and Eyvonne to discuss how FluidCloud tackles multi-cloud portability. They detail how FluidCloud acts as a cloning platform that scans an existing cloud or VMware environment, extracts complex infrastructure configurations (including compute and storage, as well as firewall rules and... Read more »

OpenIntent is an open-source, collaborative effort by network operators to develop a standard schema to describe the necessary information needed to deploy network equipment. Keith sits down with Jake Snyder, the developer behind OpenIntent. They discuss why he developed OpenIntent, the building blocks of the schema, and his vision for seamless Wi-Fi design interoperability. AdSpot... Read more »

On today’s news roundup we assess the White House’s new US cyber strategy (bellicose, bombastic, and boiler-plate), discuss a cyberattack attributed to Iran that used Windows to wipe thousands of devices, and dig into a Microsoft update on Entra passkeys. JJ isn’t impressed with new research that bypasses Wi-Fi client isolation, corporate spyware gets a... Read more »

Mav Turner, Chief Product Officer at Kentik, joins John Burke and Drew Conry-Murray for an in-depth conversation on the importance of deep visibility into enterprise networks. As networks grow more complex and stretch from on-prem and WAN to multi-cloud and edge locations, this sponsored discussion explores how good visibility supports everything from daily operations to... Read more »

Take a Network Break! We begin with listener follow-up on Cisco SD-WAN vulnerabilities and a report that Nvidia is investing billions to develop open-source AI models. In our Red Alert section we warn of multiple vulnerabilities in Veeam’s backup software for Windows and a couple of Chrome zero-days. We cover new features in Fortinet’s FortiOS... Read more »

Scott sits down for an in-depth conversation with Kireeti Kompella. Together they explore his impactful career and the evolution of modern networking. Kireeti, a key figure in protocol development, shares his journey from the Kernel Group at Juniper to leading work on fundamental technologies including his contributions to the C-chip patent. AdSpot Sponsor: Meter Meter... Read more »

One of the early promises of public cloud was that, in theory, you could move workloads from Cloud Provider A to Cloud Provider B for any number of reasons: lower costs, new capabilities, better uptime, and so on. In practice, once a workload goes into a public cloud and you build out all the other... Read more »

Kevin and Alexis take a break from their regular interviews to answer your questions! Join them for an unfiltered, wide-ranging discussion including the value of certifications, online learning pros and cons, how networking engineering jobs are changing, how to maintain a healthy work-life balance, and more. AdSpot Sponsor: Statseeker Statseeker gives engineers near real-time performance... Read more »

Wingpy is an open-source tool that aims to make it easier to automate network tasks that use Cisco APIs. Today Eric is joined by returning guest Andreas Baekdahl, the creator of Wingpy. They discuss why Andreas started Wingpy, how it can help streamline your workflows, and how you can start using it right away. They... Read more »

The tech industry is split between two fantasies – that AI writes production software while you get coffee, and that everything AI touches is slop. The reality is messier and more interesting: AI tools are force multipliers for people who already know what good looks like, and an expertise amplifier disguised as an easy button. ... Read more »

FluidCloud calls itself a cloud-cloning platform. In other words, the company can map and copy all the cloud infrastructure settings from one public cloud—including compute, storage, networking, and identity—and port those settings to a different public cloud. On today’s sponsored Day Two DevOps, Ned and Kyler talk with FluidCloud’s co-founders to understand how the platform... Read more »