828-505-7480

Ubiquiti AP powers up & reachable via wifi, but no link on LAN

We’ve seen this happen twice recently with different customers so thought we should post our solution.  We have seen where a Ubiquiti AP (NanoBeam & NanoStation) will power up via the power injector and the unit is reachable via wireless, but there is no link light on the switch or to a laptop plugged directly in.  In both cases the units were mounted up on a roof, so we first replaced the cables from the injector to the switch but nothing changed.  We found we had to either re-terminate the RJ45 ends on the cable going from the injector up to the roof or replace the cable completely before it started working again.  The cable end or cable itself was damaged so that it wouldn’t allow link, but PoE passed through....

HIPAA Privacy Rule

One of the most common requests from our Flat Fee IT customers, who are in the Health Care industry, has been regarding HIPAA. They are faced with the burden of providing proof of compliance. Just one look at one of our Evidence of HIPAA Compliance Reports and you can see the complexity of just one portion of what’s expected. Fortunately, there are tools available and processes to record everything required to prove compliance. A File Scan  gets the ball rolling through automated processes and On-site Survey documents what can’t be detected, but together a series of reports can provide all of the information needed for a HIPAA Audit. What is the privacy rule? According to U.S. Department of Health & Human Services, the HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. The Rule also gives patients rights over their health information, including rights to examine and obtain a copy of their health records, and to request corrections.  ...

Perform a packet capture on an Adtran router

To perform a packet capture directly on an Adtran device do the following: ip access-list extended CAPTURE permit ip any host 1.2.3.4 permit ip host 1.2.3.4 any Where “1.2.3.4” is the IP that you want to watch.  Then run debugging on that ACL: debug ip packet CAPTURE detail See https://supportforums.adtran.com/message/2248#2248 for more...

Barracuda ADC Load Balancer with 2012 Remote Desktop Services

We had a problem with a group of Remote Desktop Servers sitting behind a Barracuda ADC Load Balancer.  The client either couldn’t connect, or they would connect to a different server even when they had a session open already on another server.  There was a group policy change that fixed our problems.  Go to the following path on your RDS GPO. Computer Configuration -> Policies -> Admin Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> RD Connection Broker Change these two settings: Use IP Address Redirection - Disabled Use RD Connection Broker load balancing - Disabled...

Packet capture from a Cisco device and export it to Wireshark

Ran into a situation where I needed to perform a packet capture on the WAN interface of a router that was facing an ISP.  The site was rather remote and so putting a hub in between the router and ISP and capturing the packets via Wireshark was going to be very time consuming.  Here is how to perform a packet capture right on the router and then export the capture to Wireshark for analysis. Create the capture buffer monitor capture buffer holdpackets monitor capture buffer holdpackets size 2048 max-size 1024 Create capture profile.  (This will capture everything on the router, but you can use an access-list to filter this down) monitor capture point ip process-switched capturepackets both Associate the profile with the buffer monitor capture point associate capturepackets holdpackets Start the capture monitor capture point start capturepackets Generate traffic you want to capture and then view the buffer to verify captured packets (optional) show monitor capture buffer all parameters Stop the capture monitor capture point stop capturepackets Export the capture via TFTP for viewing in Wireshark monitor capture buffer holdpackets export tftp://10.1.1.11/capture.pcap Clear the buffer and start the capture over again at step 4 to repeat monitor capture buffer holdpackets clear Here is the Cisco document that goes into further detail:  https://supportforums.cisco.com/docs/DOC-5799...