Message Trace

Source: Wireshark

Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\ipsec_macsec_pcap\direct_encap\espnull_direct_tunnel.pcapng

Messages: 6

[00001] Frame 1 — 🔐 IKE_SA_INIT

⏱️ 2020-04-19T23:50:56.318687Z
🖥 R2 ➜ 🖥 R4
Loading packet tree...

[00002] Frame 2 — 🔐 IKE_SA_INIT

⏱️ 2020-04-19T23:50:56.330142Z
🖥 R4 ➜ 🖥 R2
Loading packet tree...

[00003] Frame 3 — 🔐 IKE_AUTH

⏱️ 2020-04-19T23:50:56.339343Z
🖥 R2 ➜ 🖥 R4
Loading packet tree...

[00004] Frame 4 — 🔐 IKE_AUTH

⏱️ 2020-04-19T23:50:56.34668Z
🖥 R4 ➜ 🖥 R2
Loading packet tree...

[00005] Frame 5 — 🔒 ESP SPI 0x4c6ba1dc

⏱️ 2020-04-19T23:50:58.318863Z
🖥 R1 ➜ 👥 R5 (GETVPN GM)
Loading packet tree...

[00006] Frame 6 — 🔒 ESP SPI 0x3faa65f8

⏱️ 2020-04-19T23:50:58.320372Z
👥 R5 (GETVPN GM) ➜ 🖥 R1
Loading packet tree...