OmniPeek Primary Use Case

Venkat Lkmula - PeerSpot reviewer
Tech spesialist at INT tech services

We are responsible for OmniPeek for a company and it is used for WiFi packet sniffing and validation.

We have a protocol to validate the 8.2.11.* IP block. When we are associating a client with the WiFi network, it is following this protocol defined by this IP block. If we have an issue with the new client not associating correctly we have to see why it is happening. For example, it could be the authentication mechanism or the AP not able to respond.

There are legacy features in the solution, such as ABG, then later came ACAC. Whether the rules set out are followed or not by an access point or a client this is what we check by using OmniPeek.

OmniPeek is a standalone solution that is installed on test laptops. It's a multi-license solution.

View full review »
Kunwar Preet Singh Sodhi - PeerSpot reviewer
Test lead at Wipro Limited

We are an authorized cache laboratory in India that specializes in testing and certifying WLAN protocol devices for interoperability. We use OmniPeek to conduct testing and pre-certification for global standards, as well as Wireshark, a competitor tool.

We can use OmniPeek to sniff the air packets for devices such as routers. By selecting a particular channel, we can observe what the router is transmitting. OmniPeek provides a wealth of information, including the router's beacon broadcasted over the air. The beacon can provide us with a lot of data, including the network name (SSID), security protocol, encryption standard, power management settings, data rate, and more. We can also detect WPS information elements and throughput information elements. In essence, all of this can be detected by sniffing the beacon.

We can also view probe packets within OmniPeek. We are able to define other channels as well, in addition to being able to observe sniffing on the 2.4 and 5 GHz spectrum. We can also filter out the packets we wish to see or focus solely on the spectrum if desired. Since it is Windows based, it is quite user-friendly and widely used. We use the solution to check for WLAN protocols and obtain information when needed for certain use cases. For instance, a test case where a device has connected and all packets transferred in the course of the year can be seen in OmniPeek. We can also use it for Ethernet and sniff packets when, for example, an enterprise authentication is conducted. All the message exchanges that occur during the enterprise-level authentication can also be sniffed using OmniPeek.

View full review »
SS
Lead Engineer at NXP Semiconductors

Our primary use case is for a wireless access point. We are using it to analyze the timeframes and fix issues. 

View full review »
Buyer's Guide
Application Performance Monitoring (APM) and Observability
April 2024
Find out what your peers are saying about LiveAction, Riverbed, New Relic and others in Application Performance Monitoring (APM) and Observability. Updated: April 2024.
768,740 professionals have used our research since 2012.
KY
Engineer at Lite-On Technology Corp

Our company is an ODM manufacturer for wireless products like routers and WiFi access points. As an RD and QA department, we are sniffing the packet from the air to capture the raw WiFi traffic from the air.

View full review »
Pavani Inturi - PeerSpot reviewer
Senior Software Engineer at Global Edge Software Ltd

I used OmniPeek for an automation project that I was working on. The solution was used to capture wireless packets. OmniPeek was used for sniffing.

View full review »
it_user840945 - PeerSpot reviewer
Senior systems specialist at a tech services company with 201-500 employees

My primary use for this solution is to analyze network problems for clients.

View full review »
Buyer's Guide
Application Performance Monitoring (APM) and Observability
April 2024
Find out what your peers are saying about LiveAction, Riverbed, New Relic and others in Application Performance Monitoring (APM) and Observability. Updated: April 2024.
768,740 professionals have used our research since 2012.