Networking Questions?
We've Got Answers.
From cabling mysteries to Wi-Fi dead zones, firewall rules to CCTV storage โ find expert answers and troubleshooting tips you won't get from a chatbot.
๐ Structured Cabling๐ถ Wi-Fi & Wireless๐ก๏ธ Network Security & Firewall๐ Switches & Routing๐ท CCTV & Surveillance๐๏ธ Access Control & Biometrics๐พ Servers & Storage๐ Audio Visual & PA Systems๐ง General IT Support & Managed Services๐ง Troubleshooting Tips โ Quick Reference
๐
Structured Cabling
What is the difference between Cat6 and Cat6a cabling?+
Cat6 supports frequencies up to 250 MHz and can handle 10 Gbps up to 55 meters. Cat6a (augmented) supports 500 MHz and maintains 10 Gbps up to 100 meters. Cat6a also has better alien crosstalk protection due to tighter twisting and often individual foil shielding. For new office installations where future-proofing is important, we recommend Cat6a. For smaller runs under 50 meters, Cat6 is cost-effective and sufficient for most current applications.
How often should structured cabling be tested and certified?+
Cabling should be tested upon installation (Fluke DSX certification) and then every 3-5 years as part of preventive maintenance. After any major network upgrade, power surge event, or physical changes to the cable pathway (like new construction nearby), re-testing is recommended. For mission-critical environments like data centers, annual testing is best practice. Test results should be archived for troubleshooting future issues.
My network is slow. Could it be a cabling issue?+
Yes, cabling is often the hidden culprit behind intermittent network slowness. Common cabling-related issues include: poor terminations causing packet loss, kinked or crushed cables reducing signal quality, cables run too close to power lines (EMI interference), or using CCA (Copper Clad Aluminum) instead of solid copper cabling. A Fluke certification test can identify exactly which runs are failing spec.
What's the maximum distance for a single Ethernet cable run?+
The TIA/EIA-568 standard specifies a maximum of 90 meters for the permanent link (the cable in walls/ceiling) plus up to 10 meters total for patch cords at both ends, totaling 100 meters. Exceeding this distance can cause signal degradation, packet loss, and link negotiation at lower speeds. For longer distances, fiber optic cabling or Ethernet extenders are required.
๐ถ
Wi-Fi & Wireless
Why does my Wi-Fi disconnect in certain areas of the office?+
This is almost always a coverage dead zone caused by insufficient access point density or poor AP placement. Common causes: walls with metal studs, concrete pillars, elevator shafts, and large filing cabinets blocking signals. The solution is a professional Wi-Fi heatmap survey that models signal propagation through your actual building materials, identifying exactly how many APs you need and where to place them before purchasing equipment.
How many devices can connect to a single access point?+
Consumer-grade APs typically support 30-50 concurrent devices before performance degrades noticeably. Enterprise APs (Cisco, Aruba, Arista, Ruckus) support 100-250+ concurrent devices with proper configuration. However, the real limitation is airtime โ if many devices are actively streaming video or transferring files, the AP's available bandwidth is shared. For high-density areas like conference rooms or cafeterias, we recommend one AP per 30-50 active users.
What is a Wi-Fi heatmap survey and why do I need one?+
A Wi-Fi heatmap survey uses professional RF simulation software to model signal propagation through your actual building โ accounting for wall materials, ceiling heights, furniture, and interference sources. It tells you exactly how many access points are needed and where to place them before purchasing equipment. Without a heatmap, you're guessing โ which leads to dead zones, too many APs causing interference, or too few APs causing poor coverage. It's the single most important pre-deployment step for enterprise Wi-Fi.
What's the difference between 2.4 GHz and 5 GHz Wi-Fi?+
2.4 GHz travels farther and penetrates walls better, but has only 3 non-overlapping channels and suffers from heavy interference (microwaves, Bluetooth, neighboring Wi-Fi). 5 GHz has more channels (23-25 non-overlapping), less interference, and higher throughput, but shorter range. Modern Wi-Fi 6/6E adds 6 GHz for even more capacity. Best practice: enable both bands and let devices choose intelligently (band steering).
๐ก๏ธ
Network Security & Firewall
What's the difference between a firewall and a UTM/NGFW?+
A traditional firewall filters traffic by IP address and port number. A Next-Generation Firewall (NGFW) or Unified Threat Management (UTM) adds application awareness, intrusion prevention (IPS), antivirus, web filtering, and threat intelligence feeds. For business networks, an NGFW is essential โ it blocks threats that a basic firewall cannot see, like malicious downloads hidden in web traffic or command-and-control communication from malware already inside your network.
How do I know if my firewall is actually protecting me?+
A firewall sitting in the rack doesn't mean it's configured correctly. Signs of inadequate firewall protection: no regular security policy reviews, default passwords still in use, no logging/monitoring enabled, all traffic allowed between internal VLANs, or no IPS/AV subscription active. A professional firewall audit includes rule base review, penetration testing of exposed services, and verification that security subscriptions are active and updating.
What is a site-to-site VPN and when do I need one?+
A site-to-site VPN creates an encrypted tunnel between two locations (e.g., head office and branch office) over the internet. All traffic between sites travels inside this tunnel โ invisible to anyone outside. You need one if you have multiple office locations that need to share internal resources (file servers, ERP, databases) securely. It's standard on all multi-site deployments and should be configured with automatic failover to a secondary link.
My internet is working but I can't access internal servers. What's wrong?+
This is often a firewall rule, VLAN routing, or DNS issue. Troubleshooting steps: 1) Can you ping the server IP address? If not, check firewall rules between your VLAN and the server VLAN. 2) If ping works but you can't access by name, check DNS resolution. 3) Verify the server's default gateway and subnet mask are correct. 4) Check if the server's local firewall (Windows Firewall) is blocking the port. In a Layerix-managed environment, our monitoring would catch this before you notice.
๐
Switches & Routing
What's the difference between a managed and unmanaged switch?+
An unmanaged switch is plug-and-play with no configuration โ it simply connects devices. A managed switch allows VLAN configuration, QoS (traffic prioritization), port mirroring for monitoring, link aggregation, and SNMP monitoring. For any business with more than 10 users, managed switches are essential for network segmentation, security, and troubleshooting. They cost more upfront but prevent countless hours of downtime.
What is a VLAN and why should I use them?+
A VLAN (Virtual LAN) logically separates network traffic even on the same physical switch hardware. Example: your finance department's computers and server on VLAN 10, guest Wi-Fi on VLAN 20, and CCTV cameras on VLAN 30. Devices on different VLANs cannot communicate unless explicitly allowed by firewall rules. This is a fundamental security practice โ it limits the damage if one device is compromised and prevents unauthorized access between departments.
Our network has random slowdowns. How do we find the cause?+
Start with NetFlow/sFlow analysis on your core switch to identify top talkers by bandwidth. Common causes: backup jobs running during business hours, Windows updates saturating the WAN link, a failing switch port causing packet loss and retransmissions, or a broadcast storm from a misconfigured device. A properly configured network packet broker can capture traffic for deep inspection. We also check switch CPU utilization and error counters on every port.
What is PoE and how much power do I need?+
Power over Ethernet (PoE) delivers power and data over a single Ethernet cable to devices like access points, IP cameras, and VoIP phones. PoE (802.3af) provides up to 15.4W, PoE+ (802.3at) provides up to 30W, and PoE++ (802.3bt) provides up to 60W or 100W. Always calculate your total PoE budget โ a 24-port switch might have a 370W power budget, which is enough for 24 PoE+ devices drawing ~15W each. Exceeding the budget causes random device reboots.
๐ท
CCTV & Surveillance
IP cameras vs analog cameras โ which is better?+
IP cameras are superior in almost every way for new installations: higher resolution (4K, 8MP vs 1080p), Power over Ethernet (single cable for power and video), remote viewing without a separate DVR, better motion detection and analytics, and easier scalability. Analog (HD-over-Coax) is only recommended when replacing existing analog cameras on existing cabling to save on rewiring costs. All new Layerix deployments use IP cameras.
How much storage do I need for my CCTV system?+
Storage calculation depends on: number of cameras, resolution, frame rate, compression (H.265 saves 50% vs H.264), and retention period required. Example: a 4MP camera at 15fps with H.265 compression uses about 40-50GB per day of continuous recording. 30 days retention for 16 cameras = ~24TB usable storage (plus RAID overhead). We recommend motion-triggered recording to extend retention on the same storage.
My CCTV footage is choppy or missing. What's causing this?+
Common causes: 1) Network congestion โ the switch uplink is saturated. 2) NVR storage is full and overwriting oldest footage incorrectly. 3) PoE budget exceeded causing cameras to reboot. 4) Incorrect GOP/keyframe settings causing playback gaps. 5) NVR hardware underspecified for the camera count and resolution. A properly specced NVR should have dedicated surveillance-class hard drives (WD Purple or Seagate SkyHawk).
Can I view my cameras remotely on my phone?+
Yes, all modern IP camera systems support remote viewing via mobile app. However, the method matters for security. Avoid port forwarding (opening a port on your firewall) โ it's a major security risk. Instead, use the manufacturer's P2P cloud service (Hik-Connect, Uniview EZCloud) or set up a VPN into your network first, then access the cameras. Layerix configures remote access securely as part of every CCTV deployment.
๐๏ธ
Access Control & Biometrics
Fingerprint vs face recognition โ which is more reliable?+
Modern face recognition (with IR anti-spoofing) is now more reliable than fingerprint for most environments. Fingerprints can fail with wet, dirty, or dry hands โ common in manufacturing or after hand sanitizer. Face recognition works at a distance without contact. For high-security areas, we recommend multi-factor: face + PIN, or fingerprint + card. All biometric data should be stored encrypted on the device, not in a cloud database.
What happens to access control if power fails?+
This is a critical design consideration. Electric strikes and magnetic locks have different fail-safe/fail-secure behaviors. Fail-safe (power to lock) โ unlocks when power fails (required for fire egress doors). Fail-secure (power to unlock) โ remains locked when power fails (used for secure storerooms). All access control systems should have battery backup for the controller and network switch. Fire alarm integration must release maglocks on all egress doors regardless of access control state.
Can I integrate access control with my attendance system?+
Yes โ this is standard practice. The same biometric terminal that grants door access also records the entry/exit event with timestamp, which can be exported to payroll software. This provides tamper-proof attendance records (employee must physically be at the door to clock in/out). Integration is usually via API, scheduled CSV export, or direct database connection. Layerix configures this as part of the deployment.
๐พ
Servers & Storage
Physical server vs virtual machines โ which should I choose?+
For 95% of small-to-medium businesses, virtualization is the right answer. A single physical server running a hypervisor (VMware ESXi, Proxmox) can host 5-20 virtual machines, each running different applications. Benefits: hardware cost savings, easy backup/restore of entire VMs, high availability (if one physical server fails, VMs restart on another), and simpler disaster recovery. Dedicated physical servers are only needed for very high IOPS databases or specialized hardware requirements.
What's the difference between NAS and SAN storage?+
NAS (Network Attached Storage) provides file-level storage over Ethernet using SMB/NFS protocols โ think shared network drives. SAN (Storage Area Network) provides block-level storage over Fibre Channel or iSCSI โ the server sees it as a local hard drive. NAS is simpler and cheaper; SAN provides lower latency and higher IOPS for databases and virtualization. For a 5-server virtual environment, a good NAS (like Synology or QNAP with SSD cache) is sufficient. For 20+ VMs with heavy databases, consider a SAN.
How do I know if my server needs more RAM or faster storage?+
Check Performance Monitor / Task Manager. If memory usage is consistently above 80% and the system is swapping to disk (high page file usage), add RAM. If CPU is fine and RAM is fine but applications feel slow, check disk queue length โ a value consistently above 2 indicates storage is the bottleneck. Moving from HDD to SSD reduces latency from ~5-10ms to <0.1ms. For virtual environments, storage is the most common bottleneck, not CPU.
What's the 3-2-1 backup rule?+
3 copies of your data, on 2 different media types, with 1 copy off-site. Example: Production data on server (copy 1), local backup on NAS (copy 2, different device), cloud backup or tape stored off-site (copy 3). This protects against hardware failure, ransomware (offline copy), and site disaster. Test your backups regularly โ an untested backup is not a backup. Layerix configures automated backup verification as standard.
๐
Audio Visual & PA Systems
Why is there a buzzing sound in my PA speakers?+
The most common cause is a ground loop โ when audio equipment is connected to different electrical circuits with different ground potentials. Solutions: 1) Use balanced audio connections (XLR cables) instead of unbalanced (RCA). 2) Install a ground loop isolator on the audio line. 3) Ensure all audio equipment is on the same electrical circuit. 4) Check for dimmer switches or fluorescent lights on the same circuit โ they inject noise into the power line.
IP-based PA vs analog 100V line โ which is better?+
IP-based PA (Dante, AES67) offers individual zone control, remote management, and easier scalability โ you can add zones by adding network drops, not running new speaker cable. Audio quality is generally better with less signal degradation. Analog 100V line is simpler and cheaper for small, single-zone installations. For multi-building campuses or buildings with frequent reconfiguration, IP-based is the modern standard.
My conference room microphone picks up echoes. How do I fix it?+
Echo is caused by the far-end audio being picked up by your microphone and sent back. Solutions: 1) Enable Acoustic Echo Cancellation (AEC) on your DSP or conferencing codec. 2) Position speakers away from microphones (speakers at front of room, mics on table). 3) Reduce speaker volume. 4) Use ceiling microphones with beamforming technology that reject sound from speaker direction. Professional AV design includes acoustic treatment and proper speaker/mic placement to eliminate echo at the source.
๐ง
General IT Support & Managed Services
What's the difference between Break Fix and Managed Services?+
Break Fix: You call when something is broken. We respond, fix it, and bill for time and materials. Reactive and unpredictable. Managed Services: Fixed monthly fee covering proactive monitoring, preventive maintenance, patch management, and incident response within SLA. We find and fix issues before you notice them. For businesses where IT downtime costs money, Managed Services is almost always more cost-effective and less stressful.
What should I do if I suspect a ransomware attack?+
Immediately disconnect the affected computer from the network (unplug Ethernet, disable Wi-Fi) โ do not shut it down, as memory forensics may be lost. Disconnect backup drives. Contact your IT provider or security team immediately. Do not pay the ransom โ there is no guarantee of data recovery, and paying funds criminal operations. If you have proper offline backups (3-2-1 rule), recovery is a matter of restoring from clean backups after wiping the infected systems.
How often should we replace our IT equipment?+
General guidelines: Servers: 5-7 years (or when out of warranty/support). Network switches: 7-10 years (or when speed requirements exceed capability). Firewalls: 5 years (security subscriptions and hardware support). Access points: 5-7 years (Wi-Fi standards evolve). Desktop/laptops: 3-5 years. Cabling: 15-20 years (Cat6/6a will be viable for decades). Proactive replacement prevents unexpected failures and ensures security updates are available.
We're a small business. Do we need enterprise-grade equipment?+
Not necessarily enterprise-grade, but business-grade is non-negotiable. Consumer routers from the electronics store lack VLAN support, proper firewall features, and remote management โ and they fail more often. Business-grade equipment (Cisco Business, Ubiquiti UniFi, TP-Link Omada) provides the essential features at a modest premium over consumer gear. The cost difference is minimal compared to a single day of downtime. Layerix helps select the right tier for your size and budget.
What certifications should I look for in a network integrator?+
For networking: JNCIE (Juniper), CCIE (Cisco) are the gold standards. For cabling: BICSI certification and Fluke testing capability. For security: CISSP, CEH. For wireless: CWNP certifications. Our founder holds JNCIE-SP #2410, JNCIE-ENT #658, and JNCIE-DC #85 โ among the highest networking certifications globally. This expertise ensures your network is designed and deployed correctly the first time.
๐ง
Troubleshooting Tips โ Quick Reference
Network troubleshooting: The 5-step checklist before calling support.+
1) Check physical connections โ is the Ethernet cable plugged in? Are switch lights blinking? 2) Restart the affected device (and only that device). 3) Check if the issue affects one user or everyone โ helps isolate the problem. 4) Run 'ipconfig /all' (Windows) or 'ifconfig' (Mac/Linux) โ do you have a valid IP address (not 169.254.x.x)? 5) Ping your default gateway, then ping 8.8.8.8 โ this tells you if the problem is local or internet. Having this information ready saves time when you do call support.
Why does 'ipconfig' show 169.254.x.x?+
This is an APIPA (Automatic Private IP Addressing) address. It means your computer couldn't reach a DHCP server to get a proper IP address. Common causes: Ethernet cable unplugged, switch port down, DHCP server (usually your router/firewall) is offline or out of available addresses, or a VLAN misconfiguration. Check physical connectivity first, then verify the DHCP service is running on your router/firewall.
My internet is working but some websites won't load.+
This is often a DNS issue. Try: 1) Flush your DNS cache: 'ipconfig /flushdns' (Windows). 2) Temporarily change your DNS server to 8.8.8.8 (Google) or 1.1.1.1 (Cloudflare) in network settings. If this fixes it, your ISP's DNS or local DNS server has a problem. Also check if a firewall web filter is accidentally blocking the site category.
How do I trace where a network cable goes?+
Without proper labeling (which we always provide), use a tone generator and probe (toner). Plug the tone generator into the wall jack, then use the inductive probe at the patch panel to find which port beeps. This is the fastest way to trace unlabeled cables. For fiber, use a visual fault locator (red laser) that shines through the fiber core. Never pull cables without tracing โ you might disconnect someone else's active connection.
When should I factory reset network equipment?+
Almost never โ factory reset erases all configuration and should be a last resort. It's like formatting your computer to fix a single application crash. Before resetting, ensure you have a backup of the configuration (for managed devices). Exceptions: you've forgotten the admin password and have no other recovery method, or you're repurposing the device for a completely new role. Always try a simple reboot first โ it resolves most transient issues.
โ
Still have a question?
Our networking experts are available 12x6 to help with any IT question โ no obligation, just honest advice.
Ask an Expert โResponse within 4 business hours ยท Free initial consultation