Message Trace

Source: Wireshark

Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\roam\inter-controller\layer-3\psk-open\roam_interL3_wpa2psk_wired.pcapng

Messages: 15

[00001] Frame 1 — 🔍 Probe Request (0x0004)

⏱️ 2017-01-28T14:29:14.949776Z
⚫ Null MAC ➜ 📡 Cisco AP 1
Loading packet tree...

[00002] Frame 2 — 🔄 Reassociation Request (0x0002)

⏱️ 2017-01-28T14:29:16.1787Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00003] Frame 3 — ✅ Reassociation Response (0x0003)

⏱️ 2017-01-28T14:29:16.180081Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00004] Frame 4 — 🔒 DTLS Application Data (23)

⏱️ 2017-01-28T14:29:16.180422Z
📡 AP wired A ➜ 📡 AP wired B
Loading packet tree...

[00005] Frame 5 — 🔒 DTLS Application Data (23)

⏱️ 2017-01-28T14:29:16.181677Z
📡 AP wired B ➜ 📡 AP wired A
Loading packet tree...

[00006] Frame 6 — 🔐 EAPOL Key

⏱️ 2017-01-28T14:29:16.182335Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00007] Frame 7 — 🔐 EAPOL Key

⏱️ 2017-01-28T14:29:16.184204Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00008] Frame 8 — 🔐 EAPOL Key

⏱️ 2017-01-28T14:29:16.184574Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00009] Frame 9 — 🔐 EAPOL Key

⏱️ 2017-01-28T14:29:16.188407Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00010] Frame 14 — 📦 Data (0x0020)

⏱️ 2017-01-28T14:29:16.191833Z
📡 Cisco AP 1 ➜ 📡 IPv4 Multicast
Loading packet tree...

[00011] Frame 15 — 📦 Data (0x0020)

⏱️ 2017-01-28T14:29:16.191877Z
📡 Cisco AP 1 ➜ 🌐 IPv6 All Nodes
Loading packet tree...

[00012] Frame 18 — 📡 ICMP Echo Request

⏱️ 2017-01-28T14:29:17.817653Z
🖥 WLC E ➜ 🖥 WLC F
Loading packet tree...

[00013] Frame 19 — 📦 Data (0x0020)

⏱️ 2017-01-28T14:29:17.817714Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
Loading packet tree...

[00014] Frame 20 — 📦 Data (0x0020)

⏱️ 2017-01-28T14:29:17.849122Z
📱 iPhone Client ➜ 📡 Cisco AP 1
Loading packet tree...

[00015] Frame 21 — ✅ ICMP Echo Reply

⏱️ 2017-01-28T14:29:17.849153Z
🖥 WLC F ➜ 🖥 WLC E
Loading packet tree...