Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Network Troubleshooting Podcasts

show episodes
 
The Network Plus PrepCast is your comprehensive audio training series for mastering the CompTIA Network Plus certification. Designed for learners on the go, this prepcast transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
  continue reading
 
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
  continue reading
 
Artwork
 
This is The Internet Report, a podcast uncovering what’s working and what’s breaking on the Internet—and why. Tune in to hear ThousandEyes’ Internet experts dig into some of the most interesting outage events from the past couple weeks, discussing what went awry—was it the Internet, or an application issue? Plus, learn about the latest trends in ISP outages, cloud network outages, collaboration network outages, and more.
  continue reading
 
Artwork

1
Everyday Tech

MPB Think Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Everyday Tech is MPB Think Radio's weekly program about consumer technology. Email the show at: [email protected]. Each episode explores the latest news talk, issues, and products in consumer technology, and they troubleshoot problems posed by the show's callers. MPB Think Radio Network Station Guide: WMAE-FM 89.5 Tupelo WMAV-FM 90.3 Oxford WMAB-FM 89.9 Starkville WMAO-FM 90.9 Greenwood WMAW-FM 88.1 Meridian WMPN-FM 91.3 Jackson WMAU-FM 88.9 Natchez/McComb WMAH-FM 90.3 Biloxi/Gulfpo ...
  continue reading
 
Loading …
show series
 
To wrap up the series, this episode reviews the full troubleshooting methodology—from identifying the problem to documenting the fix. We walk through common scenarios, showing how the steps apply in real life and what tools are best suited for each phase. You’ll revisit techniques for isolating symptoms, confirming theories, and verifying solutions…
  continue reading
 
Electron is a framework for building cross-platform desktop applications using web technologies like JavaScript, HTML, and CSS. It allows developers to package web apps with a native-like experience by bundling them with a Chromium browser and Node.js runtime. Electron is widely used for apps like VS Code, Discord, and Slack because it enables a si…
  continue reading
 
Host(s): Abram Nanney and Sabir Abdul-Haqq (www.yourebs.biz) Guest(s): Dr. Nikisha Ware Topic: Earlier this year, the FCC started the process of regulating both who can text or call you and what is allowed in a permitted text or call. This was done in an effort to combat the barrage of spam messages we all receive routinely, however, is it possible…
  continue reading
 
Modal is a serverless compute platform that’s specifically focused on AI workloads. The company’s goal is to enable AI teams to quickly spin up GPU-enabled containers, and rapidly iterate and autoscale. It was founded by Erik Bernhardsson who was previously at Spotify for 7 years where he built the music recommendation system and the popular Luigi …
  continue reading
 
Thinking about adding Ubiquiti to your MSP stack? Hear my firsthand experience deploying their latest network and security hardware, plus insights from an industry pro managing thousands of devices. We cut through the marketing hype, evaluating features, pitfalls, and integration strategies. Hear the honest pros and cons comparing Ubiquiti with Syn…
  continue reading
 
Artificial Intelligence is reshaping the MSP landscape, and no one knows it better than Gregg Lalle of Synthreo. Tune in as Gregg breaks down how MSPs can move beyond automation to build intelligent AI agents that help clients grow their businesses and improve operational efficiency. Synthreo isn't just another AI tool. Gregg explains how their no-…
  continue reading
 
RxJS is an open-source library for composing asynchronous and event-based programs. It provides powerful operators for transforming, filtering, combining, and managing streams of data, from user input and web requests to real-time updates. Ben Lesh is the creator of RxJS. He joins Josh Goldberg to talk about his path into engineering and the RxJS l…
  continue reading
 
Host(s): Abram Nanney and Sabir Abdul-Haqq (www.yourebs.biz) Topic: On October 14th of this year – 2025, Microsoft will officially cease offering support for their soon-to-be Legacy operating system Windows 10. This means that they will no longer update the OS which will put devices running Windows 10 at risk for hacks and threat actors. We’ve disc…
  continue reading
 
Visual thinkers, this one's for you! On this episode, Wim Kerkhoff walks us through the evolution of project management in the MSP world—starting with sticky notes and ending with an intuitive, web-based Kanban board purpose-built for real IT teams. We talk about integration headaches, boosting technician engagement, and why color-coding and swim l…
  continue reading
 
What does it take to go from a one-man IT shop to a thriving 10-person business rooted in trust and professionalism? In this episode, I talk with Jason Thomas about his journey, the value of honest communication, and the tight-knit Chicago IT community that supports one another. You’ll hear how empathy, transparency, and taking time to recharge out…
  continue reading
 
JigsawStack is a startup that develops a suite of custom small models for tasks such as scraping, forecasting, vOCR, and translation. The platform is designed to support collaborative knowledge work, especially in research-heavy or strategy-driven environments. Yoeven Khemlani is the Founder of JigsawStack and he joins the podcast with Gregor Vand …
  continue reading
 
Uncle Marv hosts SonicWall’s finest—Lisa Compton and Julian Agapitos—for a packed roundtable all about the latest in firewall tech, MSP best practices, and business flexibility. We cover the move from Gen 6.5 to Gen 7 (and 8!), the new $99 TZ80 firewall, and how SonicWall’s cyber insurance and warranty options stack up. The conversation brings out …
  continue reading
 
What if you could move from a client call to an executive proposal in five minutes? In this eye-opening episode, Nicolas Fry explains how TurboDocx leverages AI, cryptography, and creative automation to streamline every step of the MSP sales process. Learn how you can stand toe-to-toe with the big IT firms, all while saving money and time. Plus, di…
  continue reading
 
Railway is a software company that provides a popular platform for deploying and managing applications in the cloud. It automates tasks such as infrastructure provisioning, scaling, and deployment and is particularly known for having a developer-friendly interface. Jake Cooper is the Founder and CEO at Railway. He joins the show to talk about the c…
  continue reading
 
Host(s): Abram Nanney and Sabir Abdul-Haqq (www.yourebs.biz) Topic: Welcome back! Since our return to broadcast last week we’ve been getting a lot of email questions and comments from listeners. We’ll try to get to all of those today and also take your phone call questions! THEN, if we have more time we’ll talk about some tips you can use to help s…
  continue reading
 
Discover how security can actually win you new clients! In this can’t-miss episode, Anup Ghosh of ThreatMate reveals exactly how automated pen testing and attack simulations not only close deals but also create ongoing revenue for MSPs. Learn the difference between a basic scan and a “real” pen test, what MSPs must do to stay ahead in compliance, a…
  continue reading
 
Not every issue fits into neat categories. In this episode, we address edge-case problems like Bring Your Own Device (BYOD) compatibility, expired licenses on security appliances, and odd client behaviors that defy conventional logic. You’ll learn how mobile OS updates, unsupported encryption protocols, or insufficient license capacity can cause my…
  continue reading
 
This episode revisits advanced troubleshooting at the hardware and optical layer. We cover transceiver problems, dirty fiber connectors, power mismatches, and switch backplane limitations. You'll learn how to read interface stats for clues, test suspect links, and isolate faults in a complex network environment. We also explain how hardware limits—…
  continue reading
 
DNS and NTP are often invisible—until they fail. This episode shows how to diagnose and fix issues with domain name resolution and time synchronization, both of which affect authentication, connectivity, and performance. You’ll learn how to use nslookup, dig, and ntpq to troubleshoot problems and interpret server behavior. We also cover how expired…
  continue reading
 
Some network issues are subtle, involving advanced concepts like asymmetric routing, multicast flooding, and access control list (ACL) errors. This episode explains how asymmetric routing—where traffic returns on a different path than it arrived—can confuse firewalls and lead to dropped packets. We discuss how to diagnose and design around this beh…
  continue reading
 
Poor network segmentation can lead to serious Layer 2 and Layer 3 problems. In this episode, we explain how excessive collision domains on legacy hubs or poorly configured switches can slow performance and cause retransmissions. We also dive into broadcast storms—where unchecked broadcast traffic floods the network—and routing loops, which occur wh…
  continue reading
 
Routing issues can silently break connectivity—even if everything looks fine at Layer 2. In this episode, we diagnose common routing problems, including missing default routes, misconfigured static routes, and incorrectly advertised subnets. You'll learn how to use ping, traceroute, and routing tables to spot when traffic is being dropped or misrou…
  continue reading
 
Sometimes network issues stem from the basics: incorrect VLAN assignment, disabled interfaces, or outdated configurations. This episode walks through foundational network checks that resolve a surprising number of connectivity issues. You'll learn how to verify trunk ports, check interface status, review MAC address tables, and ensure endpoints are…
  continue reading
 
Even if the signal is strong, configuration mistakes can block connectivity. This episode addresses common wireless configuration errors such as mismatched SSIDs, incorrect security settings, or outdated drivers on client devices. You’ll learn how WPA2 vs. WPA3 affects compatibility, how authentication failures are logged, and what to check when cl…
  continue reading
 
Signal problems are among the most common wireless complaints—and many stem from poor antenna planning. This episode examines how antenna placement, orientation, and environment affect signal propagation. You'll learn the difference between omnidirectional and directional antennas and how line-of-sight, reflection, and absorption affect coverage. W…
  continue reading
 
Wireless technology is incredibly convenient—but also limited by physical and environmental factors. In this episode, we explore the inherent constraints of wireless communication, such as reduced throughput compared to wired networks, signal degradation over distance, and interference from walls, other devices, or even weather. You’ll learn how to…
  continue reading
 
Every device platform—whether Cisco, Juniper, or another—has its own diagnostic approach. In this episode, we explore common troubleshooting techniques across routers and switches, focusing on interface states, routing tables, and platform-specific commands. You’ll learn how to interpret “up/down” messages, diagnose err-disabled ports, and use comm…
  continue reading
 
Some of the most essential network management tools are also the most overlooked. This episode covers infrastructure tools such as TFTP servers for file transfers, terminal emulators like PuTTY and SecureCRT for CLI access, and core diagnostic commands including ping, traceroute, ipconfig, and netstat. You’ll learn how these tools assist with confi…
  continue reading
 
Network visibility starts with knowing what’s on your network. In this episode, we explain network discovery techniques using tools like ping sweeps, SNMP queries, and Nmap scans to identify devices, operating systems, and open services. You’ll learn how to distinguish active vs. passive discovery methods, the importance of using up-to-date invento…
  continue reading
 
To truly understand what’s happening on the network, you need to inspect the packets themselves. This episode introduces tools like Wireshark, tcpdump, and protocol analyzers that allow you to capture and analyze live traffic. You’ll learn how to filter by IP, port, or protocol, and how to identify patterns like retransmissions, failed handshakes, …
  continue reading
 
Wireless networks introduce a layer of complexity that often demands specialized tools for visibility. In this episode, we cover wireless troubleshooting utilities including site survey tools, spectrum analyzers, and signal heatmaps. These help you diagnose issues like dead zones, co-channel interference, and excessive client density. We also explo…
  continue reading
 
Fiber requires a different class of diagnostic tools due to its precision and sensitivity. In this episode, we cover devices like OTDRs (Optical Time Domain Reflectometers), power meters, and visual fault locators. You’ll learn how these tools detect breaks, signal loss, and connector issues with pinpoint accuracy. OTDRs, for example, send pulses o…
  continue reading
 
Troubleshooting starts with the right tools. In this episode, we walk through the essential cable testing and installation tools you’ll use on the job. These include crimpers for RJ-45 connectors, punchdown tools for keystone jacks and patch panels, and continuity testers for verifying wire maps. You’ll also learn how cable locators and tone genera…
  continue reading
 
Link-level problems are easy to overlook but frequently cause intermittent issues. This episode explores duplex mismatches—where one device is set to full duplex and the other to half—leading to collisions, retransmissions, and degraded performance. We explain how to spot and correct these mismatches using port configuration and interface statistic…
  continue reading
 
Even a well-designed network can experience hardware or cabling faults over time. This episode breaks down common problems such as broken connectors, bent pins, cable kinks, and worn insulation. We explain how these physical issues translate into dropped packets, CRC errors, and link flapping. Recognizing these symptoms early helps prevent widespre…
  continue reading
 
Cable problems can often look like application issues, but they require a different kind of troubleshooting. In this episode, we review cable specifications like length limits, signal loss, impedance, and interference resistance. You'll learn how to recognize mismatches between cable category and intended use, such as trying to run 10 Gbps over Cat…
  continue reading
 
Once you’ve confirmed the cause of a network issue, it's time to solve it. This episode covers the final stages of the troubleshooting methodology: establishing a plan of action, implementing the solution, verifying functionality, and documenting everything. You’ll learn how to evaluate risk before making changes, how to plan rollback strategies, a…
  continue reading
 
The foundation of effective troubleshooting is a structured approach. In this episode, we introduce the CompTIA troubleshooting methodology, focusing on the first few steps: identifying the problem, establishing a theory of probable cause, and testing that theory. You'll learn how to ask the right questions, collect information from logs and users,…
  continue reading
 
In this final domain, we turn our focus to troubleshooting—a skill that ties together everything you’ve learned so far. This episode introduces Domain 5 and outlines the key areas it covers, including troubleshooting methodology, cable testing, routing diagnostics, wireless issues, and performance analysis. Unlike previous domains that focused on s…
  continue reading
 
Security tools can’t catch every threat—but informed users often can. This episode looks at the balance between technical detection methods and user-driven prevention. We start by examining detection tools like antivirus, IDS/IPS, SIEM platforms, and anomaly-based monitoring. You’ll learn how these systems generate alerts, how tuning reduces false …
  continue reading
 
While cyber defenses are critical, physical security is just as important. In this episode, we explain how physical access controls protect infrastructure from unauthorized tampering, theft, or sabotage. You’ll learn about badge systems, biometrics, mantraps, camera placement, and hardware locks. These controls help restrict access to wiring closet…
  continue reading
 
Wireless networks require layered security controls to keep unauthorized users out and ensure a clean client experience. In this episode, we cover advanced wireless protections including MAC filtering, client isolation, and captive portals. MAC filtering adds a basic layer of access control by allowing or denying clients based on their hardware add…
  continue reading
 
Firewalls and access control lists are the gatekeepers of your network, and understanding how to configure them correctly is essential. This episode explains how to structure firewall rules and ACLs (Access Control Lists) using principles like implicit deny, least privilege, and rule order. You'll learn how rules are evaluated top-down and why a mi…
  continue reading
 
Securing the network starts with securing its devices. In this episode, we focus on hardening best practices for routers, switches, and firewalls. This includes disabling unused interfaces, enforcing strong password policies, and limiting access with ACLs and administrative timeouts. We also explore remote access security—ensuring SSH replaces Teln…
  continue reading
 
Advanced network protection mechanisms focus on securing internal traffic and device behavior. This episode introduces three such features: Dynamic ARP Inspection (DAI), DHCP Snooping, and Control Plane Policing (CoPP). DAI helps detect and block ARP spoofing attempts by validating ARP packets against known trusted entries. This is especially impor…
  continue reading
 
Hardening your network means reducing its attack surface and securing its services. In this episode, we look at three high-priority hardening practices: securing SNMP, managing router advertisements, and implementing port security. You’ll learn how to disable or reconfigure SNMPv1/v2 in favor of SNMPv3, ensuring encrypted and authenticated device m…
  continue reading
 
Security doesn’t stop at the firewall—physical access and social manipulation play a major role in network compromise. In this episode, we explore phishing in its many forms, including spear phishing, whaling, and smishing (SMS-based phishing). You’ll learn how attackers use psychological manipulation and trust to trick users into revealing credent…
  continue reading
 
Some of the most dangerous network threats don’t rely on malware—they rely on deception. In this episode, we explore IP spoofing, a method where attackers forge source IP addresses to disguise their origin or impersonate trusted devices. You’ll learn how spoofed packets can bypass access controls, flood systems, or launch man-in-the-middle and ampl…
  continue reading
 
Malicious software remains one of the most common and destructive threats to networks and users alike. In this episode, we examine different types of malware, focusing on ransomware, spyware, and trojans—each with unique goals and attack vectors. You’ll learn how ransomware encrypts data and demands payment, often targeting entire organizations wit…
  continue reading
 
When devices pretend to be something they’re not, serious security problems can follow. This episode focuses on spoofing attacks—specifically ARP spoofing and MAC address spoofing—that allow attackers to intercept or redirect traffic within a local network. You’ll learn how ARP spoofing poisons the ARP table of nearby devices to reroute traffic thr…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play