Search

Brian Jemes Phones & Addresses

  • 1258 Crumarine Loop, Moscow, ID 83843 (208) 883-9642
  • 1055 Lyon Rd, Moscow, ID 83843 (208) 883-7863
  • 1060 Lyon Rd, Moscow, ID 83843 (208) 882-8031
  • 311 Sheridan Ave, Palo Alto, CA 94306 (650) 473-1643

Work

Company: Opelin May 1999 to Sep 2006 Position: Network architect

Education

Degree: Bachelors, Bachelor of Science School / High School: Stanford University Sep 1985 to Jun 1989 Specialities: Computer Science

Skills

Network Architecture • Network Administration • Network Security • Routing • Networking • Firewalls • Strategy • Testing • It Operations • Leadership • Network Design • Cisco Ios • Switches • Network Engineering • Unix • Cloud Computing • Data Center • Cisco Technologies • Perl • Wireless • Tcp/Ip • Distributed Systems • Routing Protocols • Cissp • Dns • Vpn • Virtualization • Information Security • Virtual Private Network • Internet Protocol Suite • Wireless Technologies • Domain Name System

Ranks

Certificate: Aws Advanced Networking - Specialty

Industries

Computer Networking

Resumes

Resumes

Brian Jemes Photo 1

Network Manager Information Technology Services

View page
Location:
1258 Crumarine Loop, Moscow, ID 83843
Industry:
Computer Networking
Work:
Opelin May 1999 - Sep 2006
Network Architect

University of Idaho May 1999 - Sep 2006
Network Manager Information Technology Services

Opelin Jan 1989 - Apr 1999
Network Engineer

Opelin Jun 1988 - Sep 1988
Student Intern
Education:
Stanford University Sep 1985 - Jun 1989
Bachelors, Bachelor of Science, Computer Science
Skills:
Network Architecture
Network Administration
Network Security
Routing
Networking
Firewalls
Strategy
Testing
It Operations
Leadership
Network Design
Cisco Ios
Switches
Network Engineering
Unix
Cloud Computing
Data Center
Cisco Technologies
Perl
Wireless
Tcp/Ip
Distributed Systems
Routing Protocols
Cissp
Dns
Vpn
Virtualization
Information Security
Virtual Private Network
Internet Protocol Suite
Wireless Technologies
Domain Name System
Certifications:
Aws Advanced Networking - Specialty
Aws Solutions Architect - Associate

Publications

Us Patents

Stateful Packet Forwarding In A Firewall Cluster

View page
US Patent:
7107609, Sep 12, 2006
Filed:
Jul 20, 2001
Appl. No.:
09/908602
Inventors:
Lebin Cheng - Fremont CA, US
Samuel D. Horowitz - Belmont CA, US
Brian L. Jemes - Moscow ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 7/04
G06F 9/00
US Classification:
726 3, 726 11, 726 12, 726 13
Abstract:
A method is disclosed for processing data using multiple interconnected firewall devices. A connection is initiated between an internal host and an external network, through a home firewall device. A separate, receiving firewall device may then receive a data packet for the internal host as part of a flow. The receiving device attempts to determine the home device for the packet. The receiving device sends a multicast to all other firewall devices in the firewall cluster. The multicast includes the data packet and information about the receiving device. The home device receives the multicast and responds, indicating that it is the home device. The home device extracts the data packet from the multicast and forwards it to the internal host. The receiving device stores the response information along with other forwarding information that is used to automatically forward to the home device subsequent data packets for the flow.

System And Method For Implementing A Bubble Policy To Achieve Host And Network Security

View page
US Patent:
7376965, May 20, 2008
Filed:
May 14, 2001
Appl. No.:
09/861986
Inventors:
Brian Jemes - Moscow ID, US
John Melvin Brawn - San Jose CA, US
Leif Buch-Pedersen - St. Martin d'Uriage, FR
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/177
G06F 15/173
US Classification:
726 3, 709220, 709221, 709222, 709223, 709224, 709225
Abstract:
A method of creating a structured access list template, which includes dividing an access list template into a plurality of sections, creating an inbound local rule group for the bubble, creating an outbound local rule group for the bubble, creating an inbound remote rule group for the bubble, and creating an outbound remote rule group for the bubble. A method of creating an access list for each of the plurality of bubble boundary devices, which includes creating an address table that includes a plurality of addresses corresponding to devices in a bubble partition, creating a protocol table that includes a list of network services and whether each of the network services are granted or denied access to the bubble partition, creating an access list template using the address table and the protocol table, generating an access list from the access list template, and providing the access list to one of the plurality of bubble boundary devices.

Method Of Creating An Address And A Discontiguous Mask For A Network Security Policy Area

View page
US Patent:
7400591, Jul 15, 2008
Filed:
Jun 1, 2005
Appl. No.:
11/142643
Inventors:
John Melvin Brawn - San Jose CA, US
Brian Jemes - Palo Alto CA, US
Stephen F. Froelich - Corvallis OR, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/177
US Classification:
370254, 370392, 370400, 370476, 709222, 709226, 709245, 711217
Abstract:
A method of creating a discontiguous address plan for an enterprise is provided which includes determining a hierarchy of routing optimization for an enterprise, determining a number of route advertisement aggregation points at each level of the hierarchy, determining a number of network security policy areas for the enterprise, and determining a number of addresses for each of the network security policy areas. The number of addresses is rounded up to a power of the address scheme base number to produce a plurality of rounded addresses. The method further includes allocating an address range for each of the plurality of rounded addresses so that a starting address of the address range begins on a power of the base number and determining a size of the plurality of address ranges. The size of the plurality of address ranges is rounded up to a power of the base number to produce the size of a repeating policy pattern. The method further includes assigning an instance of the repeating policy pattern to each of the route advertisement aggregation points at each hierarchy, and determining an address and a mask for each of the network security policy areas in the repeating policy pattern.

System And Method For Implementing A Private Virtual Backbone On A Common Network Infrastructure

View page
US Patent:
7703124, Apr 20, 2010
Filed:
Mar 31, 2005
Appl. No.:
11/094989
Inventors:
Brian L. Jemes - Moscow ID, US
John M. Brawn - San Jose CA, US
Farid Filsoof - Bournemouth, GB
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/00
US Classification:
726 1, 726 2, 726 3, 709225
Abstract:
A network security system is provided comprising a plurality of network bubbles wherein each bubble includes bubble members configured to transmit and receive data. Bubbles have network security policies that may be enforced by a plurality of network control point devices. The system further includes a private virtual backbone configured to interconnect the plurality of network control points connected to known bubbles. The privacy of the private virtual backbone is maintained by an inter-bubble device and/or set of two network control points. The inter-bubble device and set of control points enforce the network security policies of any connected bubble and relay data packets between address spaces. The private virtual backbone may operate in private address space. The system also includes an instance-specific virtual backbone that interconnects only bubble partitions from the same network bubble, thus simplifying the enforcement of a network security policy.

Enforcing Network Security Policies With Packet Labels

View page
US Patent:
8578441, Nov 5, 2013
Filed:
Jul 22, 2004
Appl. No.:
10/896676
Inventors:
Vincent Giles - Grenoble, FR
Brian Jemes - Moscow ID, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 29/06
US Classification:
726 1, 726 23
Abstract:
A secured network is disclosed configured to carry data, comprising a plurality of network bubbles and a plurality of network control points, wherein each network bubble comprises one or more bubble partitions and each bubble partition comprises at least one networked device configured to transmit and receive data, and all of the network devices corresponding to at least one of the plurality of network bubbles have a common network security policy. At least one network control point, such as a router, is provided with a marker module arranged to mark outgoing packets with a label corresponding to the network bubble from which the packets originate that can be used to enforce the network security policy of the at least one network bubble.

System And Method For Implementing Network Security Policies On A Common Network Infrastructure

View page
US Patent:
7263719, Aug 28, 2007
Filed:
Nov 29, 2000
Appl. No.:
09/726072
Inventors:
Brian Jemes - Palo Alto CA, US
John Melvin Brawn - San Jose CA, US
Joseph Garcia - Mountain View CA, US
Michael Milligan - Palo Alto CA, US
John M. Pape - Fort Collins CO, US
Jeff Hansell - Fremont CA, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
G06F 15/16
US Classification:
726 12, 726 3, 726 11, 726 14, 726 15, 709220
Abstract:
A secure network is provided which includes a plurality of network bubbles having a plurality of bubble partitions. Each bubble partition has at least one network device configured to transmit and receive data. All the network devices that belong to or correspond to a particular network bubble have the same network security policy. The secure network also includes a plurality of network control points, which has one or more network control point devices having at least one interface. Each bubble partition is connected to at least one network control point. The network control point is used to provide a connection between at least two network devices. Each network control point device is configured to enforce the network security policy of all the network bubbles that are connected to it. During the transmission of data from one network device to another network device, one or more network control points are traversed.

System And Method For Implementing A Virtual Backbone On A Common Network Infrastructure

View page
US Patent:
20010037384, Nov 1, 2001
Filed:
Feb 27, 2001
Appl. No.:
09/795778
Inventors:
Brian Jemes - Moscow ID, US
John Pape - Fort Collins CO, US
Joseph Garcia - Mountain View CA, US
Michael Milligan - Fort Collins CO, US
International Classification:
G06F015/173
US Classification:
709/223000, 709/238000
Abstract:
A secure network system is provided which includes a plurality of networks where each network has at least one network device configured to transmit and receive data and has a network security policy. The secure network further includes a plurality of network control points where each network control point has at least one network control point device. Each of the plurality of network control points is connected to at least one of the plurality of networks. All network control point devices are configured to enforce the network security policy for the network to which it is connected. The secure network further includes a virtual backbone configured to connect the plurality of network control points to one another. The virtual backbone does not enforce any network security policy with respect to data being transmitted across the virtual backbone, except for source address integrity at the point the networks connect to a NCP.

System And Method Of Aggregating Discontiguous Address Ranges Into Addresses And Masks Using A Plurality Of Repeating Address Blocks

View page
US Patent:
20020038380, Mar 28, 2002
Filed:
May 14, 2001
Appl. No.:
09/855862
Inventors:
John Brawn - San Jose CA, US
Brian Jemes - Palo Alto CA, US
Stephen Froelich - Corvallis OR, US
International Classification:
G06F015/16
G06F015/173
US Classification:
709/238000, 713/201000, 709/245000
Abstract:
A method of creating a discontiguous address plan for an enterprise is provided which includes determining a hierarchy of routing optimization for an enterprise, determining a number of route advertisement aggregation points at each level of the hierarchy, determining a number of network security policy areas for the enterprise, and determining a number of addresses for each of the network security policy areas. The number of addresses is rounded up to a power of the address scheme base number to produce a plurality of rounded addresses. The method further includes allocating an address range for each of the plurality of rounded addresses so that a starting address of the address range begins on a power of the base number and determining a size of the plurality of address ranges. The size of the plurality of address ranges is rounded up to a power of the base number to produce the size of a repeating policy pattern. The method further includes assigning an instance of the repeating policy pattern to each of the route advertisement aggregation points at each hierarchy, and determining an address and a mask for each of the network security policy areas in the repeating policy pattern.
Brian L Jemes from Moscow, ID, age ~57 Get Report