• Skip to main content
  • Skip to header right navigation
  • Skip to site footer

Roger Perkin

Network Automation Architect

  • Network Automation
    • Network Automation Courses
    • What is NetDevOps?
    • Workflow Orchestration
    • Ansible Automation Platform
    • Ansible Workshop
    • What is Network Automation?
    • Network Automation Tools
    • ContainerLab
    • Ansible Training
      • What is Ansible?
      • Ansible Tutorial for Beginners
      • Ansible Network Automation
      • Ansible Inventory Example
    • Python Network Automation
      • Nornir
      • Python Network Automation Course
      • Python for Network Engineers
      • Python VENV / Virtual Environment Tutorial
      • Python Tutorial for Beginners
      • pyATS
    • Network Source of Truth
      • NetBox
      • Infrahub
    • NetDevops
    • DevOps Tutorial
      • Git Training
      • Terraform Training
      • Linux Training
      • Kubernetes Training
      • Devops Training Course
      • Azure Devops Training
    • Terraform
    • GIT
      • Git Commands
      • What is GitHub?
    • Docker Training
    • Confluence
    • Microsoft Azure
  • Cisco
    • ISE
    • SD WAN Training
    • Password Recovery
    • Software-Upgrade-Guides
    • BGP
    • Data Center
    • WIRELESS
  • CCIE
  • Blog
  • About
    • My Red Special Guitar
  • Contact
roger perkin ccie cisco consultant header image

Network Security

Network security is the process of taking preventative measures using hardware and software to protect networking infrastructure from unauthorised access. This creates a secure platform for enterprise networks to operate on. Typical systems used are Firewalls and Cisco ISE

How to upgrade Cisco ISE 2.4 to 2.6

If you are running any version of Cisco ISE there is always going to be a time when you need to upgrade. Cisco Identity Services Engine Upgrade There are five basic steps to performing your upgrade 1. …

Cisco Stealthwatch Installation and Setup

In this post I am going to be walking through the installation and setup of Cisco Stealthwatch. I will be doing this with virtual machines on VMWare. I will be installing the StealthWatch Management …

Cisco Identity Services Engine (ISE) Tutorial

The first question I am going to answer is in this Cisco ISE Tutorial is:“What is Cisco ISE and what does Cisco ISE do?” What is Cisco ISE used for? Cisco Identity Services Engine (ISE) is …

Unicast Reverse Path Forwarding – Strict Mode

Unicast Reverse Path Forwarding (Unicast RPF) in Strict Mode is a network security tool designed for use at the edge of a service-provider network. Strict Mode vs Loose Mode Strict mode verifies that …

Zone Based Firewall Configuration Example

A new feature to the V4 blueprint for the CCIE R&S exam is Zone Based Firewall. According to the blueprint you need to Implement Zone Based Firewall. First stop would be the Documentation. Direct …

Block P2P traffic on Cisco router

This short blog post shows you how to block peer to peer traffic on a cisco router. This example is based on a Cisco 1801 ADSL router but will work equally well on any device running the correct …

Let’s get started

Take a look at my premium courses on Ansible, Nornir & Git or buy them all with the Network Automation Bundle!

Network Automation Courses

Navigation

Python VENV Tutorial
Python for Network Engineers

Network Automation
Network Automation Courses
Network Discovery Tools
Network Automation Conferences
Ansible Training
What is Ansible?
Devops Tutorial
Network Source of Truth
DevOps Glossary
Network Monitoring Software

Contact

Contact

Get in touch with me here

[email protected]

  • Twitter
  • LinkedIn
  • YouTube
Buy me a coffeeBuy me a coffee

Copyright © 2025 · Roger Perkin · All Rights Reserved · Privacy Policy – Terms