Message Trace
Source: Wireshark
Capture: C:\Users\sande\Documents\repos\nick-russo-pcap-flows\wlanpcap\roam\inter-controller\layer-2\psk-open\roam_interL2_wep_wired.pcapng
Messages: 11
[00001] Frame 1 — 🔍 Probe Request (0x0004)
⏱️ 2017-02-25T15:14:56.091643Z
⚫ Null MAC ➜ 📱 Client C
[00002] Frame 2 — 🔒 DTLS Application Data (23)
⏱️ 2017-02-25T15:14:56.787838Z
📡 AP wired G ➜ 📡 AP wired I
[00003] Frame 3 — 🔒 DTLS Application Data (23)
⏱️ 2017-02-25T15:14:56.788225Z
📡 AP wired I ➜ 📡 AP wired G
[00004] Frame 4 — 🔐 Authentication (0x000b)
⏱️ 2017-02-25T15:14:56.845749Z
📱 iPhone Client ➜ 📱 Client C
[00005] Frame 5 — 🔄 Reassociation Request (0x0002)
⏱️ 2017-02-25T15:14:56.846427Z
📱 iPhone Client ➜ 📱 Client C
[00006] Frame 6 — ✅ Reassociation Response (0x0003)
⏱️ 2017-02-25T15:14:56.847626Z
📱 Client C ➜ 📱 iPhone Client
[00007] Frame 11 — 📦 Data (0x0020)
⏱️ 2017-02-25T15:14:56.851607Z
📱 Client C ➜ 📡 IPv4 Multicast
[00008] Frame 12 — 📦 Data (0x0020)
⏱️ 2017-02-25T15:14:56.851641Z
📱 Client C ➜ 🌐 IPv6 All Nodes
[00009] Frame 15 — 📋 Action (0x000d)
⏱️ 2017-02-25T15:14:56.859229Z
📱 iPhone Client ➜ 📱 Client C
[00010] Frame 16 — 📋 Action (0x000d)
⏱️ 2017-02-25T15:14:56.859861Z
📱 Client C ➜ 📱 iPhone Client
[00011] Frame 17 — 🔍 Probe Request (0x0004)
⏱️ 2017-02-25T15:14:57.091634Z
⚫ Null MAC ➜ 📱 Client C