Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\diag_pcap\service\service_tcp_finger.pcapng
Messages: 9
[00001] Frame 1 — 👆 TCP Finger
⏱️ 2020-08-14T11:52:37.504295Z
📍 R1 (IP SLA Source) ➜ 📍 R2 (IP SLA Responder)
[00002] Frame 2 — 🔗 TCP (SYN, ACK)
⏱️ 2020-08-14T11:52:37.504498Z
📍 R2 (IP SLA Responder) ➜ 📍 R1 (IP SLA Source)
[00003] Frame 3 — 👆 TCP Finger
⏱️ 2020-08-14T11:52:37.505051Z
📍 R1 (IP SLA Source) ➜ 📍 R2 (IP SLA Responder)
[00004] Frame 4 — 👆 TCP Finger
⏱️ 2020-08-14T11:52:37.505179Z
📍 R1 (IP SLA Source) ➜ 📍 R2 (IP SLA Responder)
[00005] Frame 5 — 🔗 TCP (PSH, ACK)
⏱️ 2020-08-14T11:52:37.587458Z
📍 R2 (IP SLA Responder) ➜ 📍 R1 (IP SLA Source)
[00006] Frame 6 — 🔗 TCP (FIN, PSH, ACK)
⏱️ 2020-08-14T11:52:37.695545Z
📍 R2 (IP SLA Responder) ➜ 📍 R1 (IP SLA Source)
[00007] Frame 7 — 👆 TCP Finger
⏱️ 2020-08-14T11:52:37.69649Z
📍 R1 (IP SLA Source) ➜ 📍 R2 (IP SLA Responder)
[00008] Frame 8 — 👆 TCP Finger
⏱️ 2020-08-14T11:52:37.697633Z
📍 R1 (IP SLA Source) ➜ 📍 R2 (IP SLA Responder)
[00009] Frame 9 — 🔗 TCP (ACK)
⏱️ 2020-08-14T11:52:37.700957Z
📍 R2 (IP SLA Responder) ➜ 📍 R1 (IP SLA Source)