Thursday, December 18, 2025

LinkRunner AT 4000 versus Network Switch Cable Test (Carlo Zakarian)

 

I used to think the network switch was a master detective, capable of solving all my cable mysteries with a single, glowing link light, and remote management cable tests.  We’ve all seen these features on managed switches, select a port, perform a cable test, and watch for the results to be displayed as either pass, fail, split pair, and the length of the cable.

It wasn't until the feature-packed LinkRunner AT 4000 entered the scene that I realized the switch cable test was actually the network equivalent of a Magic 8-Ball, answering every complex problem with a confident “Yes, cable pass!” and not knowing why it passed.

Most technicians assume that if the switch reports “Cable Pass” the cable is having a great day. But if you want to know if that cable is suffering from a hidden split pair or just a minor existential crisis, you call in the Linkrunner AT 4000.

The LinkRunner AT 4000 is a handheld advanced network cable tester, it’s the stern, white-gloved proctor administering the final exam, it has a follow-up list of diagnostic questions, starting with “Did you remember to terminate correctly on both ends of the cable?”  The LRAT 4000 conveniently draws out the pin-to-pin wire mapping on the LCD screen, it can precisely measure cable fault via TDR, indicating cable problems such as split pairs, shorts, opens, mis-wired, and crossovers.  It also can test for port speeds, PoE, network and connectivity issues, and perform a full network map of your environment.  

Follow along with me and watch as I show you the difference between what a basic switch cable test reports versus a LinkRunner AT 4000 advanced precision cable tester.





Carlo Zakarian is a network engineer with over 15yrs experience in the networking implementation, design, and diagnostics field specializing in LAN, WAN, and Wireless.  Owner of NetFocus Technologies, an IT Managed consulting firm based in Chicago, specializes in setting up, configuring, diagnosing software, hardware, and network infrastructure.

 He can be reached via his website at https://www.NetFocusTech.com





Wednesday, December 17, 2025

Packet Sleuthing on the Edge: How tcpdump Saved My DHCP Sanity


When a DHCP issue strikes, it tends to do so with the subtlety of a brick through a window. Devices suddenly stop obtaining addresses, clients complain that “the network is broken,” and the logs seem to be playing hide-and-seek. This situation was a bit different; one client could not get an ip address from wifi, but worked fine on the wired side.  same vlan, same dhcp server.  and yes his wifi works fine everywhere else. Since the router was the dhcp server, I turned to one of the most under-appreciated diagnostic tools hiding inside a Ubiquiti EdgeRouter: tcpdump. While the GUI has plenty of useful stats, nothing beats raw packet visibility when you need to know exactly what’s happening on the wire.

tcpdump is widely used and been documented thoroughly https://www.tcpdump.org/manpages/tcpdump.1.html  

Capturing packets directly on the EdgeRouter has a huge advantage—you’re collecting data at the precise point where traffic passes. No guessing. No relying on secondhand logs. With tcpdump, I could instantly see whether DHCP DISCOVER, OFFER, REQUEST, and ACK packets were actually being exchanged. In my case, that clarity helped me spot that the DISCOVERs were arriving, but the OFFERS weren’t making it back out. Without that level of detail, I would’ve been stuck blaming ghosts or rebooting things out of desperation.

It was a simple process; i simply ssh'd into the router and typed the following command to capture 5MB of dhcp packets and write them to capture_dhcp.cap.

sudo tcpdump -i switch0 -n -vvv port 67 or 68 -C 5 -W 1 -w capture_dhcp_2.pcap

Another perk is how easy it is to filter traffic with tcpdump. Instead of drowning in a sea of packets, I could lock in on port 67/68 traffic or even narrow the view to a single MAC or interface. It’s like having an X-ray machine for your network, where you can zoom right into the failing process without being distracted by everything else. And since captures can be saved and opened in Wireshark later, you get the best of both worlds: lightweight on-device capture with full-blown desktop analysis afterward.

Finally, running tcpdump on an EdgeRouter is fast, simple, and—most importantly—accurate. When troubleshooting something finicky like DHCP, assumptions are the enemy. tcpdump removes the guesswork and replaces it with hard evidence you can act on. In my case, it cut hours of trial-and-error down to minutes and pointed directly at the misconfigured relay causing all the chaos. If you’re working with Ubiquiti gear and not using tcpdump yet, trust me—your future self will thank you.

Tuesday, December 16, 2025

from the net: 20 Daily Linux Commands System Administrators Use in Production


 As a Linux SysAdmin working in a production environment, your daily routine is all about keeping systems stable, secure, and performing at their best. From troubleshooting issues to monitoring resources and ensuring uptime, you wear many hats, and time is always of the essence.

While Linux offers thousands of commands, not all of them are part of your day-to-day toolbox. However, there’s a core set of powerful, reliable commands that you’ll find yourself using every single day, often multiple times.

In this article, I’ll walk you through the 20 most essential Linux commands every system administrator should master. These aren’t just commands, they’re your go-to tools for monitoring performance, managing logs, controlling services, debugging problems, and much more.

CLICK THE IMAGE FOR THE FULL ARTICLE



I have some ideas for some cool challenges and giveaways in the new year which will only be available to email subscribers.



Monday, December 15, 2025

Forgettable Things


After spending decades in the HDD industry, I came to believe that even the slightest loss of stored data was so catastrophic as to justify a hurried team meeting and a frantic search - using the latest high-tech tools - for the root cause. I never hesitated to buy extra storage for my own personal data so that I could always have a backup. Computer memory stores data as a string of 1’s and 0’s, typically represented by either tiny, magnetized regions on a surface, or as electrical charges on floating gate transistors.   Storage integrity is affected by things like temperature, humidity, and mechanical shock. The physics is straightforward, but the possibilities for failure are many.


Of late, I have begun to ponder memory loss of a different kind. It seems that if you sometimes enter a room only to forget why you went there, it is normal. If you misplace your car keys and find them on the bathroom counter, that too is normal. If, however, you find your keys in the freezer, you may need to summon a different team with a separate set of tools to figure out what is going on. The human brain has around 86 billion neurons, each with thousands of connections. A process known as synaptic plasticity alters the strength of these connections, forming the basis for learning and memory. Unlike with digital devices, storage is analog and influenced by emotion, context, and experience.


With all those neurons and connections buzzing away, you would think we could remember pretty much everything, but the design wasn’t meant for that. According to a 2009 report by the Global Information Industry Center at UC San Diego, we are exposed to 34 Gigabytes (nearly 12 hours’ worth) of information on a daily basis. Cognitive psychologist George Miller, in a 1956 paper on memory capacity, suggested that we can only keep 7 things (plus or minus 2) in mind at a time. While researchers are still debating the number, most suggest that it is probably smaller rather than larger. Our brains are mindbogglingly miraculous in function, but they are also selective.


This system of economy looks to filter information as much as possible, store the minimum, and make sure to get maximum benefit from that information. There are occasions, however, where we are surprised and frustrated by the things we miss. I still remember the number for the old dial telephone in the house I grew up in, yet I often forget the name of the person I was just introduced to in an important meeting.


According to memory scientist Charan Ranganath of U.C. Davis, trying to cram more into your head is not the best answer. One suggestion is what he calls “chunking” or grouping items to reduce the overall number. Like the way I apparently stored my first phone number under “home,” or most of us remember the alphabet or our Social Security number, chunking can improve efficiency.


You can find more about Dr. Ranganath’s handy acronym for chunking all these steps, known as “MEDIC”, here.  He also offers additional tips for any of us who may feel frustrated with our forgetfulness. Meaning is an important part of securing a spot in our limited storage space - if a memory is vivid or meaningful, that improves the odds of recall. Addressing the CEO of an important customer by the wrong name in a meeting not only sucks the oxygen out of the room but it also creates a vivid memory unlikely to be forgotten.


At the age of 12, my granddaughter memorized Teddy Roosevelt’s “Strength and Decency” for a regional speech meet. It was distinct from other things she was studying in that it was over 1200 words long and she knew she would be delivering it in front of a 3-judge panel in a packed room. Preparation involved lots of trial and error, first reciting a section and then checking for accuracy. Even though this was an unusually large “chunk,” she nailed it.


Importance and context are also key elements of memory, which brings me back to the disconcerting case of that CEO (which I would like to forget). After all, even though humans aren’t built to remember everything, I thought we were built to survive.


Sunday, December 14, 2025

Boost Your Packet Analysis with the CellStream Wireshark Profiles Repository


For network engineers, security analysts, and IT troubleshooters, Wireshark is an indispensable tool for inspecting packet-level traffic and diagnosing complex issues. But despite its power, setting up Wireshark just the way you need it — with the right filters, color rules, columns, and display preferences — can take a lot of time. That’s where the CellStream Wireshark Profiles Repository comes in: a centralized collection of ready-to-import Wireshark configuration profiles that streamline setup and make pinpoint analysis faster and easier. 
CellStream, Inc.

One of the biggest advantages of using pre-built Wireshark profiles is time savings. Instead of manually crafting display filters and custom views for each protocol or troubleshooting task, you can simply download and import a profile tuned for a specific purpose — whether that’s DNS analysis, Wi-Fi troubleshooting, IPv6 focus, VoIP flows, or TCP performance insights. These profiles come with optimized configurations that reflect real-world use cases, helping you spend less time configuring the tool and more time diagnosing issues. 
CellStream, Inc.

In addition to speeding up your workflow, the repository helps users learn best practices. By exploring profiles created by experienced network professionals, you can see how seasoned analysts structure filters, choose color rules, and organize columns for maximum clarity. This makes the repository not only a practical resource but also a learning platform — especially for those new to Wireshark or looking to develop deeper packet analysis skills. Furthermore, having a variety of profiles lets you quickly switch between different analysis contexts without losing your custom settings. 
CellStream, Inc.

Finally, the CellStream repository fosters community collaboration and sharing. While the collection is curated to avoid unsafe uploads, contributors can submit improved or new profiles to expand the library for everyone’s benefit. This collaborative aspect turns a typically solitary configuration task into a shared resource, empowering the wider Wireshark community with tools that reflect a broad range of networking needs and real-world scenarios.

click on the image and go check it out




Popular post