Message Trace

Source: Wireshark

Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\nat_pcap\nat64_pat_icmp.pcapng

Messages: 8

[00001] Frame 1 — 📡 ICMPv6 Echo Request

⏱️ 2020-09-12T12:09:17.005783Z
🏠 Client-1.🏠 inside.🏢 local ➜ 🌐 Server-NAT64.🌐 outside.🌍 remote
Loading packet tree...

[00002] Frame 2 — 📡 ICMP Echo Request

⏱️ 2020-09-12T12:09:17.006021Z
🔄 NAT-PAT.🔄 translated.🏢 local ➜ 🌐 Server.🌐 outside.🌍 remote
Loading packet tree...

[00003] Frame 3 — ✅ ICMP Echo Reply

⏱️ 2020-09-12T12:09:17.006192Z
🌐 Server.🌐 outside.🌍 remote ➜ 🔄 NAT-PAT.🔄 translated.🏢 local
Loading packet tree...

[00004] Frame 4 — ✅ ICMPv6 Echo Reply

⏱️ 2020-09-12T12:09:17.00624Z
🌐 Server-NAT64.🌐 outside.🌍 remote ➜ 🏠 Client-1.🏠 inside.🏢 local
Loading packet tree...

[00005] Frame 5 — 📡 ICMPv6 Echo Request

⏱️ 2020-09-12T12:09:18.175747Z
🏠 Client-2.🏠 inside.🏢 local ➜ 🌐 Server-NAT64.🌐 outside.🌍 remote
Loading packet tree...

[00006] Frame 6 — 📡 ICMP Echo Request

⏱️ 2020-09-12T12:09:18.175925Z
🔄 NAT-PAT.🔄 translated.🏢 local ➜ 🌐 Server.🌐 outside.🌍 remote
Loading packet tree...

[00007] Frame 7 — ✅ ICMP Echo Reply

⏱️ 2020-09-12T12:09:18.176114Z
🌐 Server.🌐 outside.🌍 remote ➜ 🔄 NAT-PAT.🔄 translated.🏢 local
Loading packet tree...

[00008] Frame 8 — ✅ ICMPv6 Echo Reply

⏱️ 2020-09-12T12:09:18.17615Z
🌐 Server-NAT64.🌐 outside.🌍 remote ➜ 🏠 Client-2.🏠 inside.🏢 local
Loading packet tree...