Wildpackets Video How-To's

The following free video demonstrations offer a quick primer on various network analysis tasks such as VoIP analysis, network performance monitoring, NetFlow capture, packet and protocol analysis, and application performance monitoring, as well as general network troubleshooting.

Subscribe to our YouTube channel to stay up to date on our latest video releases.

Video How-To's Categories

Application Performance Management 

Network Monitoring 

Wireless Network Analysis 

Network Forensics 

Network Performance Management 

Network Security 

VoIP Monitoring and Analysis 

Virtual Networks 


10 Gigabit Networks 

OmniPeek Network Analyzer 

TimeLine Network Recorder 

WatchPoint Network Monitor 

 Complete list of Video How To's 

WildPackets OmniPeek and 802.11ac

Gone are the days where you can capture wireless packets with USB adapters. A new method for capturing data for analysis is required with 802.11ac. Watch this video clip to see how OmniPeek network analyzer can capture 802.11ac traffic.
Running Time: 2:26

Pulling Packets in Virtual Environments

How do you pull packets from virtual environments? In this video we cover where to find and how to capture real packets in your virtual networks.
Running Time: 17:37

2011 - "The Year of the Hack"

Computer networks are under constant attack, so much so that 2011 was dubbed "the year of the hack" in Bit9's third annual endpoint survey. This video addresses the trends and fears that justify such a label, including the risky behaviors originating from within corporate organizations that are facilitating hacks, and how these behaviors can be identified and monitored using network forensics.
Running Time: 5:42

Change The Way You Think About Application Performance Monitoring for Distributed Applications

This video highlights the use of OmniPeek to analyze and troubleshoot network performance issues in a distributed, multitier environment.
Running Time: 8:32

Customized Network Analysis and Troubleshooting with WildPackets OmniPeek Network Analyzer

This video takes a quick tour through WildPackets top 10 plug-ins.
Running Time: 11:39

802.11n - Demystifying the labyrinth of acronyms and new terminology -- MIMO

Multiple Input, Multiple Output (MIMO) is the most important - and most visible - capability of 802.11n. With 802.11n, multipath is leveraged to send multiple, independent data streams, up to 4, simultaneously, each coming into its own transmit and receiving antenna (one set).
Running Time: 3:47

802.11n - Demystifying the labyrinth of acronyms and new terminology - Channel Bonding

Channel bonding doubles your effective data rate by creating a single 40 MHz channel from two adjacent 20 MHz channels in both the 2.4 or 5 GHz band. Learn how you can interrupt and cause interference with your neighbor's wireless transmissions and why it's best avoided in mixed environments.
Running Time: 5:12

802.11n - Demystifying the labyrinth of acronyms and new terminology - A-MSDU and A-MPDU

Access points determine who can receive aggregated packets. Recognize the differences between A-MSDU and A-MPDU, and if allowed by your access point, which type to choose.
Running Time: 5:09

Demystifying the labyrinth of acronyms and new terminology - Block ACK

Depending on your access point, you may or may not see block acknowledgements (Block ACK or BA), which are available with A-MPDU aggregation. Understand how Block ACK can significantly reduce management overhead and improve MAC efficiency.
Running Time: 1:01

802.11n - Demystifying the labyrinth of acronyms and new terminology - SGI and Beam Forming

Learn what short guard interval (SGI) and beam forming are. See how a change to SGI, if supported by your access point, can improve performance 11%, and why you might want to stay away from beam forming for the time being.
Running Time: 3:48

802.11n - Demystifying the labyrinth of acronyms and new terminology - 3-Stream

Learn the secret of "NxM" which defines each Multiple Input, Multiple Output (MIMO) system. Confidently translate 3x3:2 into transmit antenna and receive antenna pairs and spatial streams and recognize performance limits in commercially available equipment.
Running Time: 11:50

802.11n - Understanding How Each Feature Impacts Performance

IMO, channel bonding, block acknowledgements, aggregation, short guard interval, and beam forming all affect the performance of your wireless network. Discover how a factor of 10 performance improvement over 802.11ag is possible with 802.11n and whether or not you can see this improvement in your environment.
Running Time: 3:52

What Can 802.11n Do For You?

802.11n is a huge step forward in wireless networking, and users are taking advantage of it. If you want to get an idea of what 11n can do for you, check out these examples of how Purdue University and Liberty University are leveraging 11n for campus-wide coverage delivering high-bandwidth content to large numbers of users -- all over a WLAN!
Running Time: 2:51

802.11n -- Deciding What's Important When You Upgrade

802.11n includes many brand new technologies for achieving 10x performance improvements. If you're planning a wireless upgrade, how do you know which features are tried and true in the marketplace, and which are right for you? Check out this video to find out.
Running Time: 5:06

TimeLine 2.0 Network Recorder - Capture and Analyze Network Traffic Fast!

The TimeLine network recorder takes capture and analysis of network and media traffic on highly utilized networks to a whole new level. TimeLine is the fastest, continuous network traffic capture and analysis solution in its class that displays key network and media statistics in real-time with no negative impact on write-to-disk rate.
Running Time: 4:50

Strategies for Adopting a Proactive Network Performance Management Approach

Gain strategies to establish enterprise-wide network visibility to get a better understanding of all performance-influencing factors, end-to-end, as well as the ability to support all constituent audiences. Learn about the right tools for the job like intelligence and automation, sustained monitoring, and collaboration.
Running Time: 11:57

WatchPoint - Network Monitoring and Reporting - Product Tour

Watch this video to take a product tour of WatchPoint, a comprehensive enterprise-wide network monitoring and reporting solution which collects and aggregates data from multiple network resources, making network performance management easy.
Running Time: 9:14

A Confluence of Flows: Keeping Your Head Above Water

NetFlow and sFlow are very common technologies used in network monitoring today. But do you really know how the process works, from initial data generation at the network device to displaying useful information for human consumption? This video takes you through the process of collecting and generating flow-based records in network devices, forwarding the data to flow-based collectors, and storing and analyzing the data for detailed network reporting.
Running Time: 4:02

Wi-Fi Network Analysis: Peeling The Onion

Everyone is looking for the holy grail of integrated wired and Wi-Fi network analysis. But let's face it, the transport media for wired and Wi-Fi are worlds apart, with unique requirements for Wi-Fi analysis that have no place in wired analysis. In this video we step through the 4 critical areas of Wi-Fi analysis, how they interrelate, and why a complete network analysis solution cannot be achieved unless all 4 areas are adequately addressed.
Running Time: 1:55

Planning for Success - Wireless Network Design, Analysis, and Troubleshooting

Wireless network deployments have become highly complex, often encompassing hundreds of buildings, thousand of access points, and tens of thousands of users. This video walks you through the design and verification phases of the wireless network lifecycle, including automated and manual design using wireless site survey software before making any capital expenditures on hardware, and design verification once your hardware choice is made.
Running Time: 6:35

Network Analysis for VoIP and Video: Just One More Call and You're Over the Cliff

This video describes the increased sensitivity that real-time protocols like VoIP and video have to typical network issues like latency, packet loss, and jitter.
Running Time: :57

Using Remote Adapters in Clusters for 24x7 Multichannel Wireless Monitoring

Learn how to use inexpensive lightweight access points as dedicated wireless sensors for WLAN monitoring.
Running Time: 0:56

Capturing Data for VoFi Analysis

Determine which of two approaches Portable or Distributed is right for your Voice over Wi-Fi (VoFi) deployment.
Running Time: 9:08

Anatomy of a VoFi Call: Packet-by-Packet

Analyze a Voice over Wi-Fi call by drilling down to the packet level using the OmniPeek Network Analyzer.
Running Time: 1:53

Using VoIP Metrics to Identify Network Problems Video

Learn the three key issues that affect VoFi QoS - latency, jitter, and packet loss as well as guidelines for identifying potential problems.
Running Time: 6:07

Moving to Network Analysis in a Cloud Environment

Before moving to the cloud, understand your current network infrastructure. Once aware of your performance, you can better understand and validate Cloud vendors claims and continue to meet your business needs.
Running Time: 5:56

DEMO - Analyzing a Voice over Wi-Fi (VoFi) Call

See how packets give insight into what is affecting quality of a VoFi call. First look at overall dashboard view to see whats going on in the network. A mean opinion score of 2.5 lets us know the quality is pretty poor. Looking at call in another way from the flow perspective and digging into the Expert Events we learn why - late packet arrival, retries, out of sequence packets, packet loss, excessive jitter, and more.
Running Time: 9:46

Wireless Roaming and it's Effect on Quality

Need Description
Running Time: 3:59

Determining Where to Monitor in a Distributed Environment

Walk through a distributed environment with a Corporate Campus, NOC, Data Center, Server Farm, Remote Office, and remote users, and identify where to capture data.
Running Time: 11:08

Managing the Network Data Collected in a Distributed Environment

Once your monitoring points are placed, you'll need to manage your data. Learn simple guidelines to ensure you can perform needed forensics searches.
Running Time: 2:56

Selecting Your Network Analysis Options

Network analyzers can capture everything. Optimize your analysis options for your solution and increase overall performance.
Running Time: 2:56

Preventing Future Cyber Attacks

Find out how to prevent future cyber attacks using your established attack fingerprint in OmniPeek. Create filters to monitor your network for hackers and detect password attacks.
Running Time: 6:25

Forensic Search: Finding the Critical Packets

Something's happened in your network, but you don't know exactly what. Find out how to use network forensics to reconstruct critical packets on your network.
Running Time: :58

Key Questions a Cyber Security Solution Must Address

Learn the 5 key questions your solution to a cyber security attack needs to answer.
Running Time: 3:26

Establishing an Attack Fingerprint and Preventing Future Occurrence: MSBlaster Worm

While zero-day attacks cannot be prevented the first time they occur - no one knows their fingerprint yet, learn how attacks can be quickly analyzed to create fingerprints and prevent future occurrences.
Running Time: 9:48

Augmenting your IDS/IPS with Network Data Recorders

Whether formally or informally, your organization has been performing some level of post-incident or forensic analysis in response to security attacks. Learn why you should employ data recorders in line with your Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS).
Running Time: 3:06

Identifying Blind Spots in Virtual Networks

With the entire network infrastructure being virtualized, you may have a blind spot in your network analysis. See how traditional network analysis products and techniques lack visibility into the traffic between virtual applications.
Running Time: 4:18

Root-Cause Analysis Using OmniPeek Network Analyzer

Jay Botelho walks you through a forensics search using packets archived on a remote Omnipliance.
Running Time: 6:49

Detecting a Fingerprinted Attack: MSBlaster Worm - Network Analysis with WildPackets OmniPeek

See how OmniPeek Network Analyzer can detect a malware attack before it spreads throughout your network.
Running Time: 2:08

Establishing a Cyber Attack Fingerprint and Preventing Future Occurrence: Email Breaches

Learn how an email breach such as what happened at Twitter in July 2009 can be identified, filters created, and future occurrences prevented.
Running Time: 9:31

Troubleshoot the End User Experience with Payloads

Learn how to troubleshoot the end user experience with payloads. Find out why payloads are important.
Running Time: 5:14

WLAN QoS - Validating the Bits in the WLAN Headers

In this short video, you’ll learn how to use OmniPeek to determine quality of service classification used in wireless LAN packets.
Running Time: 2:41

Pinpointing Network Bottleneck

Learn about the four most common causes of network slowdowns.
Running Time: 2:03

VoIP Analysis

Watch OmniPeek troubleshoot and improve call quality for VoIP users at remote offices.
Running Time: 2:41

Setting Up Network Monitoring For Virtual Devices

With virtualization not just machines, but also the network infrastructure itself, are being virtualized reducing your visibility into what's really happening on your network. See how you can use OmniPeek to capture virtual traffic on an VMware Workstation and OmniEngine on VMware ESXi.
Running Time: 3:21

Distributed Analysis

Learn when you should use OmniEngine versus OmniPeek for distributed analysis. Video covers key benefits - minimized bandwidth utilization, encryption, support for multiple simultaneous users, and forensic search.
Running Time: 3:44


Conduct either passive capture or active collection of NetFlow packets using the NetFlow Analyzer adapter with your OmniPeek Network Analyzer.
Running Time: 2:55

Baseline and Benchmarking Made Simple

Baselines are a must for key network segments. Learn how with OmniPeek Network Analyzer you can easily set up 3 critical baselines: traffic on your core trunk in the data center; all http and https traffic to and from the Internet; and all traffic to and from the cluster of systems that supports the financial applications.
Running Time: 3:16

Aruba Remote Adapter

Leverage your existing Aruba WLAN infrastructure to not only capture the packets from anywhere in the world without having to be there, but also analyze roaming performance in that area using the Roaming Latency plug-in.
Running Time: 2:19

WildPackets Cisco Remote Adapter

Leverage your existing Cisco Wireless LAN infrastructure to not only capture the packets from anywhere in the world without having to be there, but also analyze roaming performance in that area using the Roaming Latency plug-in in our OmniPeek network analyzer.
Running Time: 4:39

OmniPeek Rogue Detection

See a live demonstration of OmniPeek Network Analyzer as it identifies rogue access points on a wireless network.
Running Time: 2:33

Real-Time Network Analysis

Watch OmniPeek Network Analyzer identify and resolve a wide area network problem in real-time minutes.
Running Time: 2:33

Test & Deployment

See a live demonstration of OmniPeek Network Analyzer used for testing and deploying a new application.
Running Time: 3:44