Category Archives: Networking

Netool.io Pro2- A Good Thing Just Got Better

Netool.io Pro2 at Wirednot HQ

Today’s network tool market really isn’t all that big. We love our support tools, sure- but if they don’t bring consistent value, they won’t stick around. Back in 2017, I think it was, the small Nevada company brought the original Netool to market. I wrote about the introduction of the Pro model back in 2020. Now, three years later, we see the company and the product have stood the test of time.

For those totally unfamiliar, all versions of Netool.io are meant to be highly pocketable (or carried in the available belt holster) so those in the field working with Ethernet switches always have it with them. The tool talks via Wi-Fi (or now Bluetooth) to an application on your phone or tablet, and you connect a patch cable between the Ethernet port on the tester and a network switch. Then what? Let’s see some visuals.

There’s a lot more to show, but hopefully you get a general sense of what the little unit offers. Beyond pretty decent characterization of the local environment, there is a switch configuration side as well. Complete feature list stolen from the Netool.io web pages:

Netool.io Pro2 Features

The USB-C charging port is handy in today’s world, as is the ability to connect a flash drive for .pcap storage during packet capture. CPU and memory are bulked up over the last version, and run time exceeds a typical busy work day.

I have been playing with the Pro2 in my home lab environment which at current is Meraki and Ubiquiti on the wired side (the Netool is not a wireless tool, remember). It’s peppy, easy to pull information and performance feedback from, and I am a fan of the new Netool.io Cloud service. In my opinion, NetAlly absolutely aced this way of storing and sharing test results with their Link-Live service, and it’s nice to see another network field tool provider follow suit.

My current on-hand cloud-managed switches don’t lend themselves to benefit from the config capabilities of the Pro2, but other environments I do manage could absolutely benefit and I look forward to trying out the possibilities again, having kicked tires a bit on the earlier Pro version. One example of configuration capabilities is here.

It really is an impressive, super portable tool that pretty much any network field technician would benefit from. On my wish list for refinements would be a single app for all models of the tool. Right now there is an app per model- no one’s biggest problem but feels a bit odd. Also, Power over Ethernet has become such a pervasive part of networking that I would hope to eventually see some basic PoE verification in the Netool.io mix.

Learn more about Netool,io Pro2 here.

Are Wi-Fi Networks in General THAT Bad?

Let me start by apologizing for a long absence here. It would seem it was my turn for life for a while. People and animals I love got sick and passed on, and those inevitable changes to each of our existences came knocking on my own door. I also had some demons that poke me at night sometimes to exercise.

But a couple of recent vendor and VAR interactions brought me back here.

Really? You Don’t NEED us?
I’ve been operating in the collective big overall networking universe for at least a quarter of a century now, so I get the rhythm of the music. Everyone has a part, and I begrudge few individuals for playing theirs (except maybe the vendor exec that has the gall to try to explain how sucking my bank account dry with complicated licensing schemes suddenly equals value or perhaps innovation). Still I’m occasionally surprised when I’m presented with some new solution, dashboard, or service that I was doing fine without yesterday and today, but if I don’t get on board my tomorrow will certainly be disappointing for my end users.

THEM: We have it to offer, so you MUST need it. It solves all kinds of problems.
ME: I’m not sure what we’re doing differently, but we don’t seem to have the problems you mention.
THEM: Bah. Everyone has those problems. Lots of them. In mass quantities. The freakin’ sky is falling!
ME: I’m gonna get some coffee now. Good talk, thanks.
THEM: You are pretty lucky then. Everyone else has problems that they need our stuff to find.

I’m guessing I’m not the only one who has been part of that kind of conversation.

Let’s unpack that a bit.
I always find the messaging that “lots of networks are just fraught with endless problems that you need help with” to be a little confounding. Why? I ask myself that, and I think I can answer it- beyond the “I’ve been doing this a while and have arguably seen it all” effect. I offer these:

We are on what generation of Wi-Fi now? Sixth? Sixth extra special? Shouldn’t the general kinks be worked out by now? With the Wi-Fi Alliance chest-thumping about all their certification programs and the IEEE putting out wireless “standards”, everything should generally just click, no?

No. I’m being sarcastic of course. This many DECADES after the original 802.11 miracle, we’re still dealing with driver issues. And that fuzzy, ill-defined gap between enterprise and consumer end devices, and the denial by groups like the Wi-Fi Alliance that this is a serious problem. After all, there is middleware kinda solutions that make it all right, no? Again, no. Not without paying through the nose in upfront and ongoing costs. Pffft.

So what is the expensive new dashboard, or managed services, exactly delivering? Is it telling me I got driver issues on a given client? Newsflash- I can tell that without the dashboard when a client stops working right after an OS update.

Shouldn’t proper WLAN design mitigate a lot of what the magic dashboard is supposedly figuring out? Price out Ekahau or iBwave (both fantastic tools) and the training and ongoing licensing for both. They are not inexpensive. Yet, somehow, you can design your networks perfectly using high end tools, and STILL need “help” with all the inevitable Wi-Fi issues you are going to have. Smells funny…

Speaking of expensive… Have you looked at the pricing on the latest access points? We have reached INSANITY in this area, when indoor Wi-Fi access points list prices EACH top $3K. For an access point. Without the mandatory licensing that The Industry now gets fat on. And for that lofty expenditure, you still need all the professional services and pricey dashboards because that increased pricing solves… nothing? Same problems are still with us, evidently.

You suck, Lee. You’re a real freakin’ downer, man. Perhaps. A lot of gloomy shit has been happening for me lately, but that aside- something is wrong here. Either I’m doing networking wrong, because I don’t have all the problems that I’m supposed to, OR those problems are the bogey man maybe created by The Industry to have more to sell us. We just can’t collectively be this far down the Wi-Fi timeline and be that bad off, can we? If we are, then everyone from the IEEE to the Alliance to vendors have screwed up. And if we AREN’T that bad off, then we’re being bilked for solutions that we really shouldn’t need.

Is there a point here? Whether I’m articulating it clearly or not, something isn’t quite right in Denmark, or in Silly Valley. Or is it just me?


I Friggin LOVE You, NetAlly LANBERT

His name was LANBERT and he came from the west
To show which cables sucks and which are best
With a push of a button it’s doing it’s stuff
Hopefully for mGig the existing wire is enough…
Oh looky there, this one passes just fine
That LANBERT just saved us money and time

–Ode to LANBERT, by Wendall Pissmont Jr

There’s a new Bert in town… forget about Reynolds*, Bacharach*, and that whiny neurotic muppet from Sesame Street. Them cats is yesterday. NetAlly has recently introduced LANBERT (at Mobility Field Day 6), and if you are in the business of network wiring then you should pay attention.

This was easily one of the more thought provoking sessions of MFD6, says I. Let’s set the stage: you have an installed cable base, and are migrating access points to Wi-Fi 6 and 6E, and at long last we hopefully will see the massive throughputs that WLAN industry marketers have been telling us we should expect for years… like to the point where the old reliable 1 Gig uplink may not cut it. Do you need to replace that cable to get mGig performance?

LANBERT to the rescue! There should be no mystery when it comes to cabling performance capabilities. Many of us grew up knowing the value of cable certification testing, and now the free LANBERT app adds a much needed evolution to the notion.

Working with NetAlly’s Etherscope nXG and and LinkRunner 10G portable analyzers, LANBERT “generates and measures the transmission of line rate Ethernet frames over your network cabling infrastructure, qualifying its ability to support 1G/10G on fiber and 100M/1G/2.5G/5G/10G on copper links.” You are proving what an installed UTP or fiber run can really do despite what a certification report might say, without needing a standalone certification tester.

Test that existing cable for mGig before the new AP goes in, and don’t assume that “old” runs can’t support the new speeds.

I’ve long beaten the drum that the physical layer is critical to good networking. I’ve always viewed each part of a structured wiring system as it’s own component, worthy of note when it comes time for labeling, troubleshooting, and yes- performance testing. I’ve seen old cable work surprisingly well, and new cable disappoint for a number of reasons. There is simply no reason to guess how UTP and fiber will perform FOR REAL, with LANBERT. It’s the shizzle, baby!

View this fascinating Field Day presentation here.

*Yes, I know these dudes are actually named Burt and not Bert. Shut up.

Interfering Personal Hotspots- Beyond Simply a Technical Issue

After 20-some odd years in the Wi-Fi business, I can safely say that I both love and hate personal wireless hotspots. Before I get into all that, let’s go back in time. If you want some zesty background, here are a few easy, compelling reads written by me from the way back machine:

If you don’t want to review the above links, here’s the poor man’s executive summary:

FCC: Don’t use de-auth frames- that equals jamming (depending on which one of our own definitions you stumble across). Selling jammers is illegal. We let Wi-Fi vendors sell illegal jammers because they provide tools that do de-auth. But that is illegal. You can’t sell jammers except when you can sell jammers. Confused? Shut up, or maybe we’ll fine your ass for our lack of clarity. Our annual fund-raiser is coming up- how’d you like to “donate” several thousand dollars?

Hotspot Makers: We use only the highest power and some really cocked up channel selection algorithms to ensure your device delivers the absolute finest in RF interference to the Wi-Fi environment you are sitting in the middle of.

Wi-Fi Alliance: BUY MORE WI-FI GEAR! FAT CHANNELS! GO TEAM! CRANK UP THAT POWER! WORK IT, YOU SWEET THANG! WE ARE AWESOME, JUST ASK US! IGNORE ALL THE STUFF WE SHOULD HAVE BEEN DOING FOR THE LAST 20 YEARS.

Network Customers, WLAN Admins: WTF?

It all makes perfect sense if you don’t think about it.

The Technical Frustrations

Anyone else in the biz knows that hotspots can be annoying, or they can be WLAN-killers. It all depends on the day, the device, the location, and the density of the WLAN where those hotspots are fired up. You can only play so many frequency-stomping games with spectrum, then physics shows through and Wi-Fi sucks for everyone until the contention is eliminated. This is the technical side of hotspot frustration.

And nobody of title has done a shittin’ thing to improve the situation- not the FCC, not the WI-Fi Alliance whose members make all of the devices that step on each other, not anybody. Everyone is in it for themselves… (Soapbox moment brought to you by the good folks at Shamwowsers & McKracken, LLC).

Ah well.

The Cultural Component to the Whole Mess

Cell phones and Mi-Fi devices have come soooo far since WLAN administrators first played whack-a-mole with hotspot-induced network issues. Data plans have also evolved, to the point where many of us are walking around with dual-band, unlimited data hotspots in our pockets ready to put into service at the slightest notion.

Let’s turn to rocker Ted Nugent for his take on the situation, as written about in his mega-hit “Free For All”:

Well looky here, you sweet young thing: the magic’s in my hands
When in doubt, I’ll whip it out. I got me a hotspot- dual-band
It’s a free for all

Or something like that… It ABSOLUTELY IS a free for all. That’s the culture right now. If I can’t get on the business network because I don’t know how to configure meself for 802.1X, I’m gonna WHIP IT OUT, Nugent-style, and get myself off to the Internet. The business Wi-Fi can suck it, and how dare you expect me to open a trouble ticket to get help with your 802.1X noise? THE MAGIC IS IN MY HANDS. Any collateral damage is NOT MY PROBLEM.

So what if your stupid police cars can’t transfer dashcam video because of interference? Why do I give two figs if your expensive Wi-Fi locks and clocks are acting up because of my RF pride and joy? Spare me the lecture on how your wireless VoIP handsets are getting walked on… Maybe YOU shouldn’t be using Wi-Fi-equipped medical devices. IT’S A FREE FOR ALL, DID YOU NOT GET THAT MEMO FROM TED NUGENT?

Hate ’em, Love ’em

Yeah, hotspots are a big fat PITA. They really do create problems. Some are dual-band, high power beasts that insist on obliterating your WLAN, while others seem to have a little more common sense and lower power built in, but in dense WLAN environments it still gets ugly.

But I’m here to confess that I too hear their siren song.

I get WHY people fire up their hotspots. At hotels, at camp, while troubleshooting systems that have potential ISP issues and so on. My phone’s hotspot gets it’s share of exercise, and I can’t imagine not having it available in a number of situations. But as a WLAN professional, I have the knowledge and (usually) the discipline to not hose up someone else’s WLAN with my hotspot when I’m at their place of business. Most people- not so much.

We’re way past the opportunity for THE INDUSTRY PLAYERS to responsibly to educate end users on why hotspots shouldn’t just be whipped out Ted Nugent-style. So we’re stuck with the problem.

Suck it up, Buttercup

What really sucks about all of this is that WLAN components are only getting ever more expensive. The tools that are used to design and support WLANs are only getting more expensive. Collectively, the security stakes in almost all WLAN environments are only getting higher. We can pump endless dollars and man-hours into delivering really good Wi-Fi, yet hotspots can lay waste to parts of our infrastructures, and there isn’t much anyone can do except to ask the offender to put them away, if we can pinpoint them and get them to listen to our appeal that they think of their fellow man…

Strange times, says I.

Introducing Netool.io Pro

Let’s get right to the cliche, as it’s unavoidable: good things sometimes come in small packages. Netool.io proved that a few years back when they introduced the original version of their feature-packed pocket-sized network analysis and support platform, and now with their Pro version I guess we can say BETTER things also come in small packages.

The Original

Netool.io is a small US-based company, and I have been following them since Day 1. They are responsive to customer requests, quick on the support response, and quite active in their development. The visual on the original white version, then the no-slip grip black, for reference:

netool

The quick value proposition for those not familiar: using Android or iOS apps, you connect to Netool.io via it’s built-in Wi-Fi, then rapidly demystify a slew of network goings on ranging from the config parameters of the Ethernet port you are connected to, overall information on the connected switch, key network performance indicators and more. The original feature set is detailed here.

Now, the Pro Model

With their initial offering, Netool.io proved that a legitimate piece of network support gear could fit in your pocket with room for your phone left over. Now, the company takes it up a significant notch with Netool.io Pro. The visual:

Note- the USB drive is NOT included, but I’m showing it connected as I was doing packet capture on my Netool.io Pro. That is one of the many features that came from the Standard version, and it worked very well in my test environment as part of the new platform. So what was added in Pro? The official feature overview is here, but the short version is configuration and automation interactions with network switches on an impressive level. From IF/THEN templates that can be imported and exported to other Netool.io devices (for supported switches) to log gathering and views to other configuration automation capabilities, the little Pro version looks to make it’s mark in an industry that is thirsty for labor saving (and error reducing) automation. It’s impressive to see this sort of capability in the Netool.io on top of everything else it can do, and the company has managed to make the UI fairly intuitive throughout- even for the more complicated operations.

There is a lot here to take in, but this video will help you to understand all that has been added in the pro edition:https://www.youtube.com/watch?v=jkGhYP_qWL0

Here are the current supported switches, with more to be added as updates hit:

One wonderful thing about Netool.io: you buy high-function, fairly priced products, get a slew of features and capabilities (including Netool.cloud remote share if you choose to use it) without the headache and nickle-dime licence-heavy mentality of other toolmakers.

If you are in the business of network support at all, Netool.io should be of interest to you. And if your duties include switch configurations and automation is on your radar, the Pro version is definitely worth looking at.

Other screen grabs:

 

 

Some Advice for Ubiquiti Forum Posters

Having just migrated Wirednot HQ to Ubiquiti (LAN, WLAN, CCTV, and a P-P link), I find myself in the Ubiquiti forums more than I have been in the past. The community discussions are the main means of support on this ever-evolving (and expanding) product set, and you’ll find both fellow Ubiquiti customers and company employees engaged in discussions. It’s an interesting framework, and like any discussion forum where lots of people participate, you get good advice, odd advice, and exposure to a lot of different personalities (we’ll come back to this point).

I have noticed a few trends that I want to call out for the benefit of both those in the Ubiquiti forums, but also for anyone dealing with general networking issues that may benefit from some basic network troubleshooting advice.

  • The Physical Layer matters- bigtime. I notice a lot of “my network performance isn’t what I expect- something has to be wrong with my Ubiquiti gear” kind of laments in the forum. And the discussions that follow often NEVER get into the physical layer. Chances are, many of the same folks that use UniFi gear are also buying offshore-sourced (which is polite-talk for cheap) cable products, or terminating it themselves without having a certification tester to prove wiring and performance are up to snuff. So be it, remember that the physical layer is where troubleshooting should start. Do SOMETHING to verify your cable is not the problem, if nothing else than swapping out to another cable to see if the problem follows. And when you engage in the forums looking for help, tell us how you’ve verified the cabling is OK as part of your troubleshooting so far.
  • Network switches have stories to tell, but you have to listen. Just like we can’t assume that cabling is good when trouble hits, we also can’t assume that network connections between devices are behaving as they should. Check for speed and duplex status for the ports in the path of your trouble– like so:
    ubntspeedduplex
    and check for RX and TX errors (receive and transmit) that could indicate bad cable, bad jack, bad NIC, or misbehaving SFP module:
    ubnterrors
    If you find errors, I suggest you clear the counters and then watch to see if the errors continue to increment. If they do, you have at least part of your problem figured out.
  • What Access Point is your client device connecting to? I see plenty of “my Wi-Fi is slow” postings, and many of these are in environments where multiple access points are in use. Not only do you need to know what the output power of the access points are and what channels are in use so interference is minimized, you also need to know what access point your “slow” client is connecting to, and how good that connection is. Client devices do not always connect to the nearest or strongest AP, or to the radio (5 GHz or 2.4 GHz) you might assume they should.
    ubntclient
    There are other views that will tell you more, but “slowness” may be normal, based on the connection properties in play. Often the “fix” is to update the client device drivers or firmware.
  • Speedtest to the Internet isn’t the end-all. Understand what is actually being tested. To state the obvious, your Internet speedtest results can’t exceed your ISP connection capacity. If you have a 25 Mbps down/5 Mbps up connection, you won’t see any more than those numbers on Internet speedtests. And… if other devices are using the Internet while you are speedtesting, your results will be less because you are sharing “the pipe”.
    When you run the Internet speedtest, you are exercising one discreet path- the connectivity between your specific device and the server out on the Internet. If it feels slow and you are on WIRELESS, you need to verify that your wireless connection is healthy as described above.
    If speedtest feels slow and you are on WIRED, check the specific port behavior for your connected device, also as described above. If speedtesting from multiple devices feels slow, try to move as close to the edge router as you can and retest. If it suddenly perks up, you may have to “divide and conquer” to find what part of the network is slow versus what is behaving normally.
    Also know that some Internet speedtest sites can be fairly erratic, based on a number of factors. Try a couple of different ones, and never come to conclusions based on a single test.
  • Consider learning iPerf, possibly getting an internal testing device. Just like Internet speedtests can be fairly ambiguous, there are tools that can be pretty damn accurate in characterizing exactly how a network is behaving between Point A and Point B. Consider iPerf as an excellent freebie, or something like WLAN Pi that can be built for well under $100 (WLAN Pi also gives a slew more functionality than just throughput testing). However you get there, it’s empowering to be able to test between different points on the local network as you try to isolate perceived problems. This is where you make sure that switch to switch connections are actually delivering Gigabit, for example.

There are more basics to talk about (like being on the right FW versions), but these are a good start. I encourage using these tips every time BEFORE you reach out for help, as they will lead to better resolution faster, and you will also become more self-sufficient in solving your own problems (or in helping others to overcome as you better your basic troubleshooting skills.)

Now… back to the personalities thing I mentioned up front in this blog. For whatever reason, any forum you join from restoring classic campers to Ram pickup trucks to networking, you’ll find people that simply want to help, and others that see the world through blinders, and it’s their way or no way. That being said… don’t be GodComplex5.

A Little PCAP Reader for iOS+ Meraki Remote Capture = Handy

I had been pecking away at a problem at a remote site, where phantom ringing was driving staff nuts on their Ring Central VoIP phones. I’ll spare you all the nasty things I want to say about the frailty of Ring Central phones and try to stay on topic… These devices are clients on a Meraki network, which means that you can capture their packets remotely, while doing analysis locally.

image0

It’s a nice feature, as it really helps you to exercise a common network troubleshooting task that traditionally requires you to be within the network environment to carry out. I had left the office, and my Wireshark-equipped workstation behind for the day, but found myself with free time, my iPad, and the phantom ringing problem on my mind.

Hmmm. I wonder if there are any PCAP-related apps for iOS? I doubt it, but what the hell… Let’s take a look and see if there is anything I can break down those remote capture files with… If I had my PC with Wireshark on it I wouldn’t need this… But all I have is my iPad… Let’s see.. 

Whoa- what’s this?

It’s an app for iOS called Telluric, and it reads (to a certain extent) packet capture files. It doesn’t do 802.11 radio header stuff. It doesn’t actually CAPTURE packets. You can’t really do display filtering or fancy stuff like Wireshark can. But it does do a decent job when no other tools are available, provided you have access to remote packet capture and local download (or can have someone send you a pcap file).

Sure, it’s a niche app of limited value. But it helped me find the source of my problem when I had no other real options:

image1

It’s time for a firewall rule. Sorry, Mr. Vicious.

(I do know that there are online resources for dumping and analyzing packet capture files. Don’t ruin the mood.)

 

 

Another Example of How Important Wire is to Wireless

A house built on a shaky foundation cannot endure. And a WLAN built on a shaky wiring foundation likewise cannot endure, I tellya. My friends, is your foundation shaky? Is it? CHECK YOUR FOUNDATION NOW. (I happen to sell foundation-strengthening herbal supplements on the side, if you need that sort of thing…)

I’ve long been a proponent of recognizing installed UTP as a vital component in the networking ecosystem. Too many people take Layer 1 for granted, and forgivable sins of of our 10 Mbps and Fast Ethernet pasts won’t fly in a Gig world. Toolmakers like Fluke Networks sell cable certification testers that take the guesswork out of whether a given cable run can be relied on to perform as expected. Don’t use one of these testers at time of cable installation, and you are only assuming you have a good station cable.

I just had an interesting situation come up that I helped a very skilled field tech with. He was working in several different small buildings, each serviced by a Cisco Catalyst Switch and a handful of 3802 802.11ac access points. The switches and cable had been in place for years, and the APs for many months, all with no issues whatsoever.

Then, we changed out the old 3560X switches for shiny new 3650s (curse you Cisco for your bizarre fascination with part numbers so close together), and suddenly some APs weren’t working any more. Between us, we checked all switch settings, POST reports, CDP tables, logs, etc- everything you can dream up on the switch. We put the APs that weren’t working back on the old switches, and they came right up. Hmmm… thoughts turned to PoE/code bugs, but then I went a-Googlin’ before consulting TAC.

I found this document that put me on the path to righteousness. Though we weren’t having “PoE Imax Errors”, a couple of nuggets jumped out at me about our new switches.

PoE Imax

Holy guacamole- We got us a situation! But wait… THERE’S MORE!

PoE Imax2

Shazam! Which, of course, translates in Esperanto to “maybe your cable is actually kind of iffy, and all the CDP stuff that happens at the milliwatt level before PoE gets delivered worked OK with your old switch but not with the new one that has the enhanced PoE controller”.

If you don’t know that the newer switch does PoE differently, you might wrongly assume that your cabling is “good” because the APs worked on it when those APs used the old switches connected to that wiring. By now, you can probably guess where I’m headed…

Our tech tested the cabling on the new-switch-problem APs and in each case found that they needed help to work with the new switch. He re-terminated and tested each, with the APs then coming up with no issues. I have no doubt that this cable was certified 10-12 years ago, but in that time a lot can happen to either end of those cables depending on the environments where they are used.

Live and learn!

 

 

Open Mesh Brings Major Disruption to SMB Space, Goes Full-Stack

Another router coming to the SMB market generally isn’t that exciting, but this one is different for a number of reasons.

OM1

For one thing, it comes from Open Mesh. Those ports are part of the G200, which is the first router ever released by Open Mesh. It has a list price of $249 dollars, and it also brings the Open Mesh product line into the proverbial “full stack” domain.

OM2

Now customers can use access points, switches, and the G200 all from Open Mesh, and all cloud-managed in the excellent CloudTrax dashboard with no license costs.

Yes, you heard me right… I said “with no license costs”. If you are not familiar with Open Mesh, the operational paradigm is easy- you buy your components (routers, switches, and access points), you register them in the CloudTrax dashboard, and off you go with configuration and operation. CloudTrax is a pretty decent network management system in and of itself, and it is the only way you manage Open Mesh components. It’s simple, it’s feature rich, and given what Open Mesh hardware costs, the entire paradigm is an absolute steal compared to pricing and complexity of enterprise solutions that masquerade as SMB-friendly.

The G200 is a significant milestone to not only the Open Mesh product line, but also to the SMB market in that it seriously drops upfront costs and TCO while providing what may be the easiest to use interface among any of it’s competitors.

But what do you get for under $250 for features with the G200? A lot, actually. From a resource perspective, Open Mesh promises gigabit throughput compliments of a quad-core processor and dedicated crypto engine. The G200 has two passive PoE ports for Open Mesh APs to connect directly, and also has an SFP port for fiber uplink to an Open Mesh switch or 3rd party vendor switch. All the typical “router stuff” is onboard, from VLAN support, DHCP server and firewall to decent traffic classification, QoS, NAT functionality, user VPN, and even usage statistics. Not bad for an initial edge-router at this price point, that won’t hit you up in 12 months for a fat license fee to keep using it. Mine has been reliable as I could ask for in the couple of weeks that I’ve been testing it. One gripe- no site-to-site VPN, although that is coming.

g200

I can’t stress how important price is for the SMB space, and I know some of my own customers are dealing with sticker shock that comes from other cloud-managed solutions that charge big and small environments the same way when it comes to licensing (or worse, they penalize the small networks for not having volume purchasing leading to better pricing). If Open Mesh continues to evolve their edge functionality and hardware offerings, this vendor could deliver a sales smack-down to the bigger players who have become license-happy to the point of ridiculousness over the last few years.

A New Access Point and Switch, Too!

I’m a huge fan of the Open Mesh A60 dual-band indoor/outdoor 802.11ac access point. It has been the top-dog of the Open Mesh access point line for several months, with a list price of $225 (again, no licensing and free CloudTrax support). Now, as part of the same product announcement that features the G200 router, Open Mesh is also bringing out it’s new A62 access point. It’s still dual-band and indoor/outdoor, but this Wave 2 AP also sports two 5 GHz radios, support for up to an estimated 150 streaming clients, and the same $225 price tag as the A60.

The latest S24 switch also breaks new ground for Open Mesh with 10 Gbps SFP+ uplink ports and a higher PoE power budget than it’s predecessor.

Let’s Do Some Math

Open Mesh has over 100,000 network customers around the world. When I think of one of my own small sites that’s up for renewal with another cloud vendor, I’m looking at trying to explain to my customer why a 3-year renewal license on old AP costs almost as much as purchasing the latest license-free AP from Open Mesh, and why a 3-year renewal license on an older security appliance costs almost twice the price of a new Open Mesh G200 router that would never need another license. These are real dollars for small businesses, and you pay the big price for the other guys whether you ever use actual support or not.

It’s time for a shake-up at this end of the market, and I think Open Mesh is the vendor to do it.

___

Related posts:

A Little Quiet Please- The Jabra Evolve 75

Jabra 75 EvolveFew things are more annoying when you’re troubleshooting in a noisy environment while trying to work with technical support or a coworker over the phone and you can’t hear them (or they can’t hear you). There’s usually enough stress in play to begin with, and having to repeat yourself and say “what? I just can’t hear you…” over the exhaust fans of network equipment in packed racks only makes it worse. Enter the Jabra Evolve 75.

Quiet Down!

Marketed as “the best wireless headset for concentration in the open office”, the Evolve 75 from Jabra is impressive for a number of reasons.

I don’t work in an open office environment so I can’t validate Jabra’s claim in that regard, but I can tell you that the Evolve 75 impresses in the noisy data center and telecommunications closets frequented by network technicians and administrators. I recently took an evaluation unit for a spin, and the timing was perfect for a real-world test under extremely loud background noise conditions. Not only could I hear the support engineer on the other end perfectly, but he also said my audio was clear despite the Evolve 75 mic being  inches away from blowing server fans. It’s hard to ask for more than that, but there is more to talk about.

Classy

Jabra has always made fairly elegant Bluetooth headsets for cellphones, in my experience. This was my first outing with a professional grade Jabra product, and it blew the doors off of other headsets I’ve tried to use in similarly noisy situations. The Evolve 75 is fairly light, but substantive. It feels good on my big head, and the mic raises and lowers smoothly, and in both positions is unobtrusive. The overall look and feel whether it’s on your head or in it’s beefy charging cradle is one of quality.

Functional

I’m finding that the Evolve 75 has really, really good battery life for my usage patterns- but I also do not wear it as long as a call-center person or the like might. The ANC (Active Noise Cancellation) functionality works like a dream, and these may be the absolute quietest phones I’ve ever used. I manipulated the volume buttons and mute functions on WebEx, Skype, and simple phone call without having to fumble around, and it doesn’t take long to feel at a disadvantage when you take a call without the benefit of this headset.

I also made use of the unit’s ability to pair with two Bluetooth devices at once, which proves handy more often than you might think. When paired simultaneously to my computer and my smartphone, the new-found mobility and seamless transitioning between the two was just a joy to experience. I’m not one to gush, but I kinda fell in love the Evolve 75 and don’t mind saying so.

Nice Bonuses

I’m not sure that I qualify as an audiophile after all the beating my ears took working around loud fighter jets in my Air Force days, but I do enjoy music and the occasional podcast. Jabra makes both activities more enjoyable with the sound quality, volume, and purity that the Evolve 75 delivers. It also comes with a really nice travel case.

The only downside I see with the Evolve 75 is that it’s one of those really, really nice tools  that you miss greatly when you don’t have it.