Message Trace

Source: Wireshark

Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\ipsec_macsec_pcap\direct_encap\ah_direct_tunnel.pcapng

Messages: 6

[00001] Frame 1 — 🔐 IKE_SA_INIT

⏱️ 2020-04-19T23:36:30.475818Z
🖥 R2 ➜ 🖥 R4
Loading packet tree...

[00002] Frame 2 — 🔐 IKE_SA_INIT

⏱️ 2020-04-19T23:36:30.484789Z
🖥 R4 ➜ 🖥 R2
Loading packet tree...

[00003] Frame 3 — 🔐 IKE_AUTH

⏱️ 2020-04-19T23:36:30.491393Z
🖥 R2 ➜ 🖥 R4
Loading packet tree...

[00004] Frame 4 — 🔐 IKE_AUTH

⏱️ 2020-04-19T23:36:30.49726Z
🖥 R4 ➜ 🖥 R2
Loading packet tree...

[00005] Frame 5 — 🛡 AH SPI 0x45e9e033

⏱️ 2020-04-19T23:36:32.481072Z
🖥 R1 ➜ 👥 R5 (GETVPN GM)
Loading packet tree...

[00006] Frame 6 — 🛡 AH SPI 0xc2befa1d

⏱️ 2020-04-19T23:36:32.506871Z
👥 R5 (GETVPN GM) ➜ 🖥 R1
Loading packet tree...