Tactical Advice

Review: Fluke Networks’ AirMagnet Enterprise Protects WLANs

Tool spots rogue access points and other security threats.
Review: Fluke Networks’ AirMagnet Enterprise Protects WLANs

Most managers of enterprise wireless LANs are familiar with intrusion detection and prevention systems, which monitor unauthorized access, rogue access points and similar threats. Fluke Networks' AirMagnet Enterprise 10 encompasses much more, offering a variety of functions to assure the overall integrity and performance of a WLAN.


Using a management and security tool that's independent of the WLAN system it's monitoring provides several advantages. First, configuration errors may not be seen by the manufacturer's management console, but are easy to spot with a product like AirMagnet Enterprise.


The maximum number of sensors per AirMagnet server

Second, a busy WLAN won't be able to devote the attention necessary to provide comprehensive security. For example, APs primarily operate on the radio channels to which they are assigned, and can only scan off-channel at the expense of performing their core mission — moving data. Because threats like rogue APs can occur on any channel, a separate security system makes sense.

It's also desirable to use a product like AirMagnet Enterprise in multivendor environments and across WLAN system upgrades to provide consistency. And, finally, sensitive applications require full-time monitoring of traffic and spectrum. AirMagnet Enterprise's network of sensors performs this task without compromising WLAN operation.

Why It Works for IT

Like most organizations today, IT departments need to boost their productivity. The degree of automation built into AirMagnet Enterprise is quite remarkable; administrators can see key elements of system status and performance with just a glance.

AirMagnet Enterprise sensors look continuously for security threats, traffic congestion, misconfigurations and spectral issues. We tested the new SmartEdge Sensor Series 4, which features dual 3x3 MIMO Wi-Fi radios that can connect over the air — eliminating the need to run Ethernet cabling in difficult-to-wire situations.

The main console screen provides a convenient summary of security alarms; rogue devices; and performance, compliance and device status. The system also lists individual sensors, each of which can be explored and monitored independently for more detailed analysis. Rogue APs and other security threats are easy to spot, and alerts can be set for a variety of conditions.

Many additional features are worth noting. With the Automated Health Check feature, AirMagnet Enterprise acts as a client to isolate connection issues. Another feature, the Dynamic Threat Update, identifies threat signatures in much the same way that antivirus tools do. And AirWISE Community, a comprehensive online help site, enables even the least experienced troubleshooters to be productive with mini-tutorials and solid, situation-specific advice.


AirMagnet Enterprise delivers a lot of functionality, so it takes some time to explore the capabilities before determining how best to use them. The only real issue is installation — license management is complex and a lot more difficult than it needs to be. Set aside a few hours and don't be shy if you need to call Fluke Networks' technical support.

Sign up for our e-newsletter

About the Author

Craig J. Mathias

Craig J. Mathias is a principal with the wireless and mobile advisory firm Farpoint Group. A well-known technology analyst and consultant, he’s been active in the field for 20 years.


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.