Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\roam\intra-controller\dot1x\roam_intra_wpa2dot1x_wlan.pcapng
Messages: 17
[00001] Frame 1 — 🔐 Authentication (0x000b)
⏱️ 2017-01-18T15:42:53.944914Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00002] Frame 2 — ✅ ACK (0x001d)
⏱️ 2017-01-18T15:42:53.944922Z
📱 iPhone Client ➜ 📱 iPhone Client
[00003] Frame 3 — 🔐 Authentication (0x000b)
⏱️ 2017-01-18T15:42:53.966493Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00004] Frame 4 — 🔄 Reassociation Request (0x0002)
⏱️ 2017-01-18T15:42:53.966843Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00005] Frame 6 — ✅ Reassociation Response (0x0003)
⏱️ 2017-01-18T15:42:53.968498Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00006] Frame 7 — 📦 QoS Data (0x0028)
⏱️ 2017-01-18T15:42:53.972246Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00007] Frame 8 — 📋 Action (0x000d)
⏱️ 2017-01-18T15:42:53.984756Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00008] Frame 10 — 📋 Action (0x000d)
⏱️ 2017-01-18T15:42:53.986472Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00009] Frame 11 — 📦 QoS Data (0x0028)
⏱️ 2017-01-18T15:42:53.986559Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00010] Frame 13 — ✅ Block Ack Req (0x0018)
⏱️ 2017-01-18T15:42:53.9868Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00011] Frame 14 — ✅ Block Ack (0x0019)
⏱️ 2017-01-18T15:42:53.986841Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00012] Frame 16 — 📡 Beacon frame (0x0008)
⏱️ 2017-01-18T15:42:54.018659Z
📡 Cisco AP 1 ➜ 📢 Broadcast
[00013] Frame 52 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:54.305269Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00014] Frame 53 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:54.306044Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00015] Frame 55 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:54.306806Z
📡 Cisco AP 1 ➜ 📱 iPhone Client
[00016] Frame 56 — 🔐 EAPOL Key
⏱️ 2017-01-18T15:42:54.307761Z
📱 iPhone Client ➜ 📡 Cisco AP 1
[00017] Frame 60 — 💤 Null function (No data) (0x0024)
⏱️ 2017-01-18T15:42:54.513739Z
📱 iPhone Client ➜ 📡 Cisco AP 1