Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\roam\inter-controller\layer-2\psk-open\roam_interL2_wpa2psk_wired.pcapng
Messages: 11
[00001] Frame 1 — 🔍 Probe Request (0x0004)
⏱️ 2017-02-25T15:20:58.523692Z
⚫ Null MAC ➜ 📱 Client C
[00002] Frame 3 — 🔒 DTLS Application Data (23)
⏱️ 2017-02-25T15:20:58.772222Z
📡 AP wired G ➜ 📡 AP wired I
[00003] Frame 4 — 🔒 DTLS Application Data (23)
⏱️ 2017-02-25T15:20:58.772797Z
📡 AP wired I ➜ 📡 AP wired G
[00004] Frame 5 — 🔄 Reassociation Request (0x0002)
⏱️ 2017-02-25T15:20:59.409177Z
📱 iPhone Client ➜ 📱 Client C
[00005] Frame 6 — ✅ Reassociation Response (0x0003)
⏱️ 2017-02-25T15:20:59.410576Z
📱 Client C ➜ 📱 iPhone Client
[00006] Frame 9 — 🔐 EAPOL Key
⏱️ 2017-02-25T15:20:59.41418Z
📱 Client C ➜ 📱 iPhone Client
[00007] Frame 10 — 📋 Action (0x000d)
⏱️ 2017-02-25T15:20:59.421613Z
📱 iPhone Client ➜ 📱 Client C
[00008] Frame 11 — 📋 Action (0x000d)
⏱️ 2017-02-25T15:20:59.42215Z
📱 Client C ➜ 📱 iPhone Client
[00009] Frame 12 — 🔐 EAPOL Key
⏱️ 2017-02-25T15:20:59.422524Z
📱 iPhone Client ➜ 📱 Client C
[00010] Frame 13 — 🔐 EAPOL Key
⏱️ 2017-02-25T15:20:59.422926Z
📱 Client C ➜ 📱 iPhone Client
[00011] Frame 14 — 🔐 EAPOL Key
⏱️ 2017-02-25T15:20:59.427246Z
📱 iPhone Client ➜ 📱 Client C