Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\roam\intra-controller\dot1x\roam_intra_wpa2dot1x_wired.pcapng
Messages: 14
[00001] Frame 1 — 🔍 Probe Request (0x0004)
⏱️ 2017-01-18T15:42:52.546806Z
⚫ Null MAC ➜ 📡 Cisco AP 2
[00002] Frame 2 — 🔒 DTLS Application Data (23)
⏱️ 2017-01-18T15:42:52.650188Z
📡 AP wired B ➜ 📡 AP wired A
[00003] Frame 4 — 🔒 DTLS Application Data (23)
⏱️ 2017-01-18T15:42:52.650876Z
📡 AP wired A ➜ 📡 AP wired B
[00004] Frame 7 — 🔄 Reassociation Request (0x0002)
⏱️ 2017-01-18T15:42:52.720591Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00005] Frame 8 — ✅ Reassociation Response (0x0003)
⏱️ 2017-01-18T15:42:52.721788Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00006] Frame 9 — 🔒 DTLS Application Data (23)
⏱️ 2017-01-18T15:42:52.722376Z
📡 AP wired A ➜ 📡 AP wired C
[00007] Frame 11 — 📦 Data (0x0020)
⏱️ 2017-01-18T15:42:52.722833Z
📡 Cisco AP 2 ➜ 📡 Cisco AP 2
[00008] Frame 12 — 🔒 DTLS Application Data (23)
⏱️ 2017-01-18T15:42:52.723236Z
📡 AP wired C ➜ 📡 AP wired A
[00009] Frame 17 — 📦 Data (0x0020)
⏱️ 2017-01-18T15:42:52.72433Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00010] Frame 19 — 📦 Data (0x0020)
⏱️ 2017-01-18T15:42:52.740453Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00011] Frame 58 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:53.058476Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00012] Frame 59 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:53.059775Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00013] Frame 60 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:53.060132Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00014] Frame 61 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:53.061382Z
📱 iPhone Client ➜ 📡 Cisco AP 1