Author Archives: Paul Stewart, CCIE 26009 (Security)

About Paul Stewart, CCIE 26009 (Security)

Paul is a Network and Security Engineer, Trainer and Blogger who enjoys understanding how things really work. With over 15 years of experience in the technology industry, Paul has helped many organizations build, maintain and secure their networks and systems.

New Podcast for the Podcatcher – The Network Collective

I am giving a great big shout out to a new community podcast. The Network Collective is only five session in, AND it is a great podcast. I’m looking forward to catching many future episodes. Episode 1 – Top 10 Ways … Continue reading

Posted in Uncategorized | Leave a comment

Security as an Enabler?

I have often wondered why the “security as an enabler” model is as unique as unicorns in the wild. I think the logic works in a vacuum and it would be great if it held true. However when humans and … Continue reading

Posted in Security, Technology | Tagged , | Leave a comment

The First Question in Cybersecurity

Cybersecurity professionals know that security cannot be a bolt on process or technology. Likewise, I also believe that that the thought of including the security team rarely goes far enough. To be effective, security should be ingrained and it should be pervasive. With a … Continue reading

Posted in Security, Technology | Tagged , | Leave a comment

Defining Cybersecurity

Cybersecurity, as defined by Merriam-Webster, is “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack.” — The true importance of cybersecurity can only be understood if our dependence on “computer systems” is understood. … Continue reading

Posted in Security, Technology | Tagged , | Leave a comment

Better Security Conversations – Thoughts for a Series

As many PacketU readers know, I have held the role as a vendor SE for a couple of years. In this role, a primary function is to correctly position our products into customer environments. What I’ve come to realize is that many … Continue reading

Posted in Security, Technology | Tagged , | 2 Comments

Non-Interactive SSH use case with Python

Sometimes the best way to learn to do something useful with a scripting language is with a starting point and a real world use case. While I don’t consider myself a Python expert, I can usually figure out how to … Continue reading

Posted in Uncategorized | 3 Comments

SSH is a BAD API

Okay, so its not meant to be an API. I get that. I’ve been watching a rather good video about executing interactive commands with Parimiko and two thoughts came to my mind. Very powerful/flexible way to do tasks across many … Continue reading

Posted in Uncategorized | Comments Off on SSH is a BAD API

VRF Series Article 5 – Stateful Inter-Vrf connectivity

This is the fifth and final article in a series that focused on Segmenting Layer 3 Networks with VRFs. In the third article, we discussed creating a shared services VRF and using it within the otherwise segmented network. In that … Continue reading

Posted in Uncategorized | Tagged , | 2 Comments

VRF Series Article 4 – VRF-lite in a DMVPN Network

As we’ve progressed through the Segmenting Layer 3 Networks with VRFs series, we have continued to build out a network that looks more like what we would see within an enterprise environment. This post takes it one step further and … Continue reading

Posted in Uncategorized | Tagged , | 1 Comment

VRF Series Article 3 – Creating a Shared Services VRF

For those following the VRF Series, we currently have a topology built that consists of a segmented Layer 3 first hop network and remotely networked by carrying the isolation from the BrWan router to Main. This article covers, shared services, … Continue reading

Posted in Uncategorized | Tagged , | 2 Comments

VRF Series Article 2 – Extending L3 Segmentation with VRF-lite

In the last article, we took an initial look at L3 segmentation with VRFs. In that case, we created a basic first hop configuration that had isolated pci and data segments. In reality, most networks are far larger and more … Continue reading

Posted in Uncategorized | Tagged , | 2 Comments

VRF Series Article 1 – Basic L3 Segmentation with VRFs

Network engineers are well aware of the Layer 2 isolation properties of VLANs. Their use is so pervasive that they are second nature to most. This article is the first in a series that outlines specifically how VRFs can be … Continue reading

Posted in Uncategorized | Tagged , | 2 Comments