The Enterasys Wireless Management Suite (WMS) is a powerful centralized management platform for the Enterasys Wireless portfolio. As an integrated component of Enterasys Network Management Suite (NMS), NMS Wireless Manager (WM) consolidates configurations across the entire WLAN to provide global management capabilities.
Enterasys WMS simplifies the task of ongoing network-wide management operations by providing IT managers with a comprehensive set of charts, statistics, and reports that have been consolidated into an easy-to-use management dashboard.
Successful WLAN deployments require optimum placement of access points and dedicated sensors in order to ensure maximum performance and availability. In addition, built-in troubleshooting capabilities offer step-by-step instructions on how to detect and address network bottlenecks and failures.
Many business environments must comply with government or industry regulations. The Enterasys WMS facilitates the deployment of any Enterasys Wireless network and ensures that the wireless network is consistent with the business objectives of the enterprise.
Global network view
Enterasys WM graphically represents the entire wireless network in a logical hierarchy that intuitively illustrates the relationship between devices, users, and mobility zones. From this global network view, all of the controllers, associated access points, and mobile users can be managed and monitored. In addition, any device can be expanded to display greater detail in just a few clicks.
Vulnerability assessment with multiple levels of flexibility
Defending the RF environment from the latest threats is a demanding task - one that is very difficult for most enterprise access points to manage alone while simultaneously providing network access to authorized users. The NMS WAS provides two different modes of vulnerability assessment that grant significant flexibility when securing the RF environment.
Sophisticated wireless intrusion prevention
NMS WAS simultaneously scans the 2.4 GHz and 5 GHz bands for the latest wireless threats. Once WAS has identified a threat, sensors use sophisticated RF countermeasures to proactively contain the threat before it can impact the network and without disrupting authorized Wi-Fi communication.
Automatic threat classification
Using unique auto-classification techniques, friendly access points and clients belonging to a neighboring wireless network are identified and allowed to coexist. Devices identified as hostile based on rules defined by the system administrator can be immediately blocked, while triggering alerts via email, SNMP or Syslog. The automatic threat classification services reduce the installation overhead common with multi-vendor overlay solutions and significantly reduces false positives, resulting in a more secure wireless environment.
Spot rogue APs and clients
WAS intrusion prevention and detection capabilities go beyond remotely detecting and/or shutting down unauthorized rogues via RF countermeasures. Precise location tracking pinpoints rogue access points and clients, allowing system administrators to quickly remove them.
Locate mobile resources
WAS has visual location capabilities that make it possible to locate wireless resources belonging to the company - or the people using them. Further, it can illustrate the security status of the network, including vulnerabilities, on a geographical map.
Network visualization for optimal RF coverage
Proper placement of access points and sensors is critical to high performance, specifically on networks running real-time applications such as voice. WAS produces real-time performance analysis reports and visual maps that transpose the RF coverage area over the corporate floor plan. These visual heat maps allow managers to assess signal strength and link speed to identify weak spots that can be easily corrected by repositioning access points.
Forensics and performance analysis
Wireless forensics provides the ability to capture and analyze historical wireless data traffic, quickly drill down into security incidents, and quickly respond to a security breach or wireless vulnerability. The wireless data traffic is automatically classified and filtered to focus on the relevant forensics information in an easy to use format, which can be analyzed via an interactive dashboard to perform trend analysis. In addition to analyzing the wireless data, the NMS WM also provides the ability to monitor the wireless environment and detect any signal strength or RF interference issues that could impact network performance.
Low throughput, RF interference, or intermittent connectivity can plague 802.11-based wireless networks. Built-in knowledge-based troubleshooting offers step-by-step instructions to help identify and address bottlenecks and failures. Easy integration with industry-standard packet visualization and analysis tools facilitates deeper diagnostics when needed.
Intuitive management dashboard
An easy-to-understand management dashboard provides an overview of the entire wireless network's status at a glance. The dashboard is the starting point from which managers can navigate to more detailed security, location, performance, or reporting information.
Detailed charts, reports, and statisticsProduct Highlights
A wide array of charts is available to summarize these events and perform trend analysis. Managers can be immediately alerted to specific events via email, SNMP, or Syslog and can then focus in on the event details in order to troubleshoot the situation.
- Centralize and simplify the definition, management, and enforcement of wireless LAN configuration
- Real-time assessment of coverage and service level with network visualization and live heat maps
- Efficiently address regulatory compliance requirements with built-in reports
- Minimize Total Cost of Ownership (TCO) and IT administrative effort with centralized automation and control
- Sophisticated event and alert mechanisms allow system administrators to proactively manage wireless network RF issues
- Rapid problem diagnosis and resolution with comprehensive troubleshooting capabilities
- Continuous network protection, providing with continuous scanning, threat detection, classification, and prevention
- Integrated security across the wired/wireless networks enables quick diagnosing and resolution of security threats
- Real-time security status at a glance with visual location capabilities on geographical maps
- Industry-leading first call resolution rates and customer satisfaction rates