No. Time Source Destination Protocol Length Info 12607 3.499244 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 12607: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.029435000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.029435000 seconds [Time delta from previous captured frame: 0.000151000 seconds] [Time delta from previous displayed frame: 0.000000000 seconds] [Time since reference or first frame: 3.499244000 seconds] Frame Number: 12607 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60459, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60459 Destination Port: 4840 Source or Destination Port: 60459 Source or Destination Port: 4840 [Stream index: 15] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 2920114108 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 2007977925 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 12613 3.500797 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 12613: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.030988000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.030988000 seconds [Time delta from previous captured frame: 0.000059000 seconds] [Time delta from previous displayed frame: 0.001553000 seconds] [Time since reference or first frame: 3.500797000 seconds] Frame Number: 12613 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60459, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60459 Source or Destination Port: 4840 Source or Destination Port: 60459 [Stream index: 15] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 2007977925 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 2920114165 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xa12f [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 12615 3.501013 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 12615: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.031204000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.031204000 seconds [Time delta from previous captured frame: 0.000066000 seconds] [Time delta from previous displayed frame: 0.000216000 seconds] [Time since reference or first frame: 3.501013000 seconds] Frame Number: 12615 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60459, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60459 Destination Port: 4840 Source or Destination Port: 60459 Source or Destination Port: 4840 [Stream index: 15] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 2920114165 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 2007977953 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 12623 3.502339 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 12623: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.032530000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.032530000 seconds [Time delta from previous captured frame: 0.000449000 seconds] [Time delta from previous displayed frame: 0.001326000 seconds] [Time since reference or first frame: 3.502339000 seconds] Frame Number: 12623 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60459, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60459 Source or Destination Port: 4840 Source or Destination Port: 60459 [Stream index: 15] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 2007977953 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 2920114297 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x75ac [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3560 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 12624 3.502572 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 12624: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.032763000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.032763000 seconds [Time delta from previous captured frame: 0.000233000 seconds] [Time delta from previous displayed frame: 0.000233000 seconds] [Time since reference or first frame: 3.502572000 seconds] Frame Number: 12624 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60459, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60459 Destination Port: 4840 Source or Destination Port: 60459 Source or Destination Port: 4840 [Stream index: 15] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 2920114297 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 2007978088 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3560 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 12678 3.509351 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 12678: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.039542000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.039542000 seconds [Time delta from previous captured frame: 0.000063000 seconds] [Time delta from previous displayed frame: 0.006779000 seconds] [Time since reference or first frame: 3.509351000 seconds] Frame Number: 12678 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60459, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60459 Source or Destination Port: 4840 Source or Destination Port: 60459 [Stream index: 15] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 2008011668 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 2920114391 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x6655 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #12637(1460), #12638(1460), #12641(1460), #12642(1460), #12644(1460), #12645(1460), #12647(1460), #12648(1460), #12650(1460), #12654(1460), #12657(1460), #12658(1460), #12659(1460), #12660(1460), ] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3560 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 12685 3.509801 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 12685: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.039992000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.039992000 seconds [Time delta from previous captured frame: 0.000137000 seconds] [Time delta from previous displayed frame: 0.000450000 seconds] [Time since reference or first frame: 3.509801000 seconds] Frame Number: 12685 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60459, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60459 Destination Port: 4840 Source or Destination Port: 60459 Source or Destination Port: 4840 [Stream index: 15] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 2920114391 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 2008012211 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3560 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 12720 3.517880 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 12720: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.048071000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.048071000 seconds [Time delta from previous captured frame: 0.000084000 seconds] [Time delta from previous displayed frame: 0.008079000 seconds] [Time since reference or first frame: 3.517880000 seconds] Frame Number: 12720 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60460, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60460 Destination Port: 4840 Source or Destination Port: 60460 Source or Destination Port: 4840 [Stream index: 16] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1508397051 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 3824944635 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 12724 3.519012 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 12724: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.049203000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.049203000 seconds [Time delta from previous captured frame: 0.000558000 seconds] [Time delta from previous displayed frame: 0.001132000 seconds] [Time since reference or first frame: 3.519012000 seconds] Frame Number: 12724 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60460, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60460 Source or Destination Port: 4840 Source or Destination Port: 60460 [Stream index: 16] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 3824944635 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1508397108 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xaa91 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 12725 3.519226 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 12725: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.049417000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.049417000 seconds [Time delta from previous captured frame: 0.000214000 seconds] [Time delta from previous displayed frame: 0.000214000 seconds] [Time since reference or first frame: 3.519226000 seconds] Frame Number: 12725 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60460, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60460 Destination Port: 4840 Source or Destination Port: 60460 Source or Destination Port: 4840 [Stream index: 16] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1508397108 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 3824944663 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 12730 3.520776 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 12730: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.050967000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.050967000 seconds [Time delta from previous captured frame: 0.000633000 seconds] [Time delta from previous displayed frame: 0.001550000 seconds] [Time since reference or first frame: 3.520776000 seconds] Frame Number: 12730 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60460, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60460 Source or Destination Port: 4840 Source or Destination Port: 60460 [Stream index: 16] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 3824944663 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1508397240 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xf1a7 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3561 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 12731 3.521012 10.1.21.102 10.3.95.2 OpcUa 455 UA Secure Conversation Message: CreateSessionRequest Frame 12731: 455 bytes on wire (3640 bits), 455 bytes captured (3640 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.051203000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.051203000 seconds [Time delta from previous captured frame: 0.000236000 seconds] [Time delta from previous displayed frame: 0.000236000 seconds] [Time since reference or first frame: 3.521012000 seconds] Frame Number: 12731 Frame Length: 455 bytes (3640 bits) Capture Length: 455 bytes (3640 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60460, Dst Port: 4840, Seq: 190, Ack: 164, Len: 401 Source Port: 60460 Destination Port: 4840 Source or Destination Port: 60460 Source or Destination Port: 4840 [Stream index: 16] [TCP Segment Len: 401] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1508397240 [Next Sequence Number: 591 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 3824944798 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x8a17 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (401 bytes) [PDU Size: 401] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 401 SecureChannelId: 3561 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 12761 3.529588 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 12761: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.059779000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.059779000 seconds [Time delta from previous captured frame: 0.000146000 seconds] [Time delta from previous displayed frame: 0.008576000 seconds] [Time since reference or first frame: 3.529588000 seconds] Frame Number: 12761 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60460, Seq: 164, Ack: 591, Len: 1342 Source Port: 4840 Destination Port: 60460 Source or Destination Port: 4840 Source or Destination Port: 60460 [Stream index: 16] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 3824944798 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 591 (relative ack number) Acknowledgment number (raw): 1508397641 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x674f [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3561 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 12768 3.530319 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 12768: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.060510000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.060510000 seconds [Time delta from previous captured frame: 0.000133000 seconds] [Time delta from previous displayed frame: 0.000731000 seconds] [Time since reference or first frame: 3.530319000 seconds] Frame Number: 12768 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60460, Dst Port: 4840, Seq: 591, Ack: 1506, Len: 79 Source Port: 60460 Destination Port: 4840 Source or Destination Port: 60460 Source or Destination Port: 4840 [Stream index: 16] [TCP Segment Len: 79] Sequence Number: 591 (relative sequence number) Sequence Number (raw): 1508397641 [Next Sequence Number: 670 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 3824946140 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3561 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 12789 3.537030 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 12789: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.067221000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.067221000 seconds [Time delta from previous captured frame: 0.000573000 seconds] [Time delta from previous displayed frame: 0.006711000 seconds] [Time since reference or first frame: 3.537030000 seconds] Frame Number: 12789 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60460, Seq: 1506, Ack: 670, Len: 52 Source Port: 4840 Destination Port: 60460 Source or Destination Port: 4840 Source or Destination Port: 60460 [Stream index: 16] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 3824946140 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 670 (relative ack number) Acknowledgment number (raw): 1508397720 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x1e7d [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3561 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 12790 3.537398 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 12790: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:10:56.067589000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804256.067589000 seconds [Time delta from previous captured frame: 0.000368000 seconds] [Time delta from previous displayed frame: 0.000368000 seconds] [Time since reference or first frame: 3.537398000 seconds] Frame Number: 12790 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60460, Dst Port: 4840, Seq: 670, Ack: 1558, Len: 57 Source Port: 60460 Destination Port: 4840 Source or Destination Port: 60460 Source or Destination Port: 4840 [Stream index: 16] [TCP Segment Len: 57] Sequence Number: 670 (relative sequence number) Sequence Number (raw): 1508397720 [Next Sequence Number: 727 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 3824946192 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3561 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 49279 13.549294 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 49279: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.079485000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.079485000 seconds [Time delta from previous captured frame: 0.000174000 seconds] [Time delta from previous displayed frame: 10.011896000 seconds] [Time since reference or first frame: 13.549294000 seconds] Frame Number: 49279 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60479, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60479 Destination Port: 4840 Source or Destination Port: 60479 Source or Destination Port: 4840 [Stream index: 49] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 105201181 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 4001231416 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 49281 13.550329 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 49281: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.080520000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.080520000 seconds [Time delta from previous captured frame: 0.000157000 seconds] [Time delta from previous displayed frame: 0.001035000 seconds] [Time since reference or first frame: 13.550329000 seconds] Frame Number: 49281 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60479, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60479 Source or Destination Port: 4840 Source or Destination Port: 60479 [Stream index: 49] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 4001231416 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 105201238 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x5941 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 49283 13.550606 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 49283: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.080797000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.080797000 seconds [Time delta from previous captured frame: 0.000205000 seconds] [Time delta from previous displayed frame: 0.000277000 seconds] [Time since reference or first frame: 13.550606000 seconds] Frame Number: 49283 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60479, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60479 Destination Port: 4840 Source or Destination Port: 60479 Source or Destination Port: 4840 [Stream index: 49] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 105201238 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 4001231444 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 49291 13.552000 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 49291: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.082191000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.082191000 seconds [Time delta from previous captured frame: 0.000598000 seconds] [Time delta from previous displayed frame: 0.001394000 seconds] [Time since reference or first frame: 13.552000000 seconds] Frame Number: 49291 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60479, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60479 Source or Destination Port: 4840 Source or Destination Port: 60479 [Stream index: 49] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 4001231444 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 105201370 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x4190 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3563 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 49292 13.552315 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 49292: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.082506000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.082506000 seconds [Time delta from previous captured frame: 0.000315000 seconds] [Time delta from previous displayed frame: 0.000315000 seconds] [Time since reference or first frame: 13.552315000 seconds] Frame Number: 49292 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60479, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60479 Destination Port: 4840 Source or Destination Port: 60479 Source or Destination Port: 4840 [Stream index: 49] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 105201370 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 4001231579 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3563 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 49348 13.558696 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 49348: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.088887000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.088887000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.006381000 seconds] [Time since reference or first frame: 13.558696000 seconds] Frame Number: 49348 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60479, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60479 Source or Destination Port: 4840 Source or Destination Port: 60479 [Stream index: 49] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 4001265159 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 105201464 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x1e67 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #49306(1460), #49308(1460), #49310(1460), #49311(1460), #49313(1460), #49314(1460), #49316(1460), #49317(1460), #49323(1460), #49324(1460), #49327(1460), #49328(1460), #49330(1460), #49331(1460), ] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3563 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 49356 13.559260 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 49356: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.089451000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.089451000 seconds [Time delta from previous captured frame: 0.000042000 seconds] [Time delta from previous displayed frame: 0.000564000 seconds] [Time since reference or first frame: 13.559260000 seconds] Frame Number: 49356 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60479, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60479 Destination Port: 4840 Source or Destination Port: 60479 Source or Destination Port: 4840 [Stream index: 49] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 105201464 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 4001265702 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3563 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 49386 13.566583 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 49386: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.096774000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.096774000 seconds [Time delta from previous captured frame: 0.000156000 seconds] [Time delta from previous displayed frame: 0.007323000 seconds] [Time since reference or first frame: 13.566583000 seconds] Frame Number: 49386 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60480, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60480 Destination Port: 4840 Source or Destination Port: 60480 Source or Destination Port: 4840 [Stream index: 50] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1347344639 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 2617816164 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 49393 13.567459 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 49393: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.097650000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.097650000 seconds [Time delta from previous captured frame: 0.000205000 seconds] [Time delta from previous displayed frame: 0.000876000 seconds] [Time since reference or first frame: 13.567459000 seconds] Frame Number: 49393 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60480, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60480 Source or Destination Port: 4840 Source or Destination Port: 60480 [Stream index: 50] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 2617816164 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1347344696 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xc49d [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 49395 13.567646 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 49395: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.097837000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.097837000 seconds [Time delta from previous captured frame: 0.000119000 seconds] [Time delta from previous displayed frame: 0.000187000 seconds] [Time since reference or first frame: 13.567646000 seconds] Frame Number: 49395 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60480, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60480 Destination Port: 4840 Source or Destination Port: 60480 Source or Destination Port: 4840 [Stream index: 50] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1347344696 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 2617816192 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 49397 13.569100 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 49397: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.099291000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.099291000 seconds [Time delta from previous captured frame: 0.001339000 seconds] [Time delta from previous displayed frame: 0.001454000 seconds] [Time since reference or first frame: 13.569100000 seconds] Frame Number: 49397 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60480, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60480 Source or Destination Port: 4840 Source or Destination Port: 60480 [Stream index: 50] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 2617816192 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1347344828 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x94b6 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3564 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 49402 13.569386 10.1.21.102 10.3.95.2 OpcUa 455 UA Secure Conversation Message: CreateSessionRequest Frame 49402: 455 bytes on wire (3640 bits), 455 bytes captured (3640 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.099577000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.099577000 seconds [Time delta from previous captured frame: 0.000145000 seconds] [Time delta from previous displayed frame: 0.000286000 seconds] [Time since reference or first frame: 13.569386000 seconds] Frame Number: 49402 Frame Length: 455 bytes (3640 bits) Capture Length: 455 bytes (3640 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60480, Dst Port: 4840, Seq: 190, Ack: 164, Len: 401 Source Port: 60480 Destination Port: 4840 Source or Destination Port: 60480 Source or Destination Port: 4840 [Stream index: 50] [TCP Segment Len: 401] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1347344828 [Next Sequence Number: 591 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 2617816327 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x8a17 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (401 bytes) [PDU Size: 401] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 401 SecureChannelId: 3564 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 49427 13.576630 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 49427: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.106821000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.106821000 seconds [Time delta from previous captured frame: 0.001098000 seconds] [Time delta from previous displayed frame: 0.007244000 seconds] [Time since reference or first frame: 13.576630000 seconds] Frame Number: 49427 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60480, Seq: 164, Ack: 591, Len: 1342 Source Port: 4840 Destination Port: 60480 Source or Destination Port: 4840 Source or Destination Port: 60480 [Stream index: 50] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 2617816327 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 591 (relative ack number) Acknowledgment number (raw): 1347345229 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x5376 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3564 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 49433 13.577316 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 49433: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.107507000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.107507000 seconds [Time delta from previous captured frame: 0.000119000 seconds] [Time delta from previous displayed frame: 0.000686000 seconds] [Time since reference or first frame: 13.577316000 seconds] Frame Number: 49433 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60480, Dst Port: 4840, Seq: 591, Ack: 1506, Len: 79 Source Port: 60480 Destination Port: 4840 Source or Destination Port: 60480 Source or Destination Port: 4840 [Stream index: 50] [TCP Segment Len: 79] Sequence Number: 591 (relative sequence number) Sequence Number (raw): 1347345229 [Next Sequence Number: 670 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 2617817669 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3564 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 49456 13.583339 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 49456: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.113530000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.113530000 seconds [Time delta from previous captured frame: 0.000064000 seconds] [Time delta from previous displayed frame: 0.006023000 seconds] [Time since reference or first frame: 13.583339000 seconds] Frame Number: 49456 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60480, Seq: 1506, Ack: 670, Len: 52 Source Port: 4840 Destination Port: 60480 Source or Destination Port: 4840 Source or Destination Port: 60480 [Stream index: 50] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 2617817669 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 670 (relative ack number) Acknowledgment number (raw): 1347345308 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x4876 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3564 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 49458 13.583619 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 49458: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:06.113810000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804266.113810000 seconds [Time delta from previous captured frame: 0.000152000 seconds] [Time delta from previous displayed frame: 0.000280000 seconds] [Time since reference or first frame: 13.583619000 seconds] Frame Number: 49458 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60480, Dst Port: 4840, Seq: 670, Ack: 1558, Len: 57 Source Port: 60480 Destination Port: 4840 Source or Destination Port: 60480 Source or Destination Port: 4840 [Stream index: 50] [TCP Segment Len: 57] Sequence Number: 670 (relative sequence number) Sequence Number (raw): 1347345308 [Next Sequence Number: 727 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 2617817721 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3564 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 84955 23.593136 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 84955: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.123327000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.123327000 seconds [Time delta from previous captured frame: 0.000142000 seconds] [Time delta from previous displayed frame: 10.009517000 seconds] [Time since reference or first frame: 23.593136000 seconds] Frame Number: 84955 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60493, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60493 Destination Port: 4840 Source or Destination Port: 60493 Source or Destination Port: 4840 [Stream index: 64] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 3081255817 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 3100453061 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 84957 23.594222 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 84957: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.124413000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.124413000 seconds [Time delta from previous captured frame: 0.001017000 seconds] [Time delta from previous displayed frame: 0.001086000 seconds] [Time since reference or first frame: 23.594222000 seconds] Frame Number: 84957 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60493, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60493 Source or Destination Port: 4840 Source or Destination Port: 60493 [Stream index: 64] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 3100453061 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 3081255874 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xa987 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 84958 23.594447 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 84958: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.124638000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.124638000 seconds [Time delta from previous captured frame: 0.000225000 seconds] [Time delta from previous displayed frame: 0.000225000 seconds] [Time since reference or first frame: 23.594447000 seconds] Frame Number: 84958 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60493, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60493 Destination Port: 4840 Source or Destination Port: 60493 Source or Destination Port: 4840 [Stream index: 64] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 3081255874 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 3100453089 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 84964 23.595898 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 84964: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.126089000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.126089000 seconds [Time delta from previous captured frame: 0.001061000 seconds] [Time delta from previous displayed frame: 0.001451000 seconds] [Time since reference or first frame: 23.595898000 seconds] Frame Number: 84964 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60493, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60493 Source or Destination Port: 4840 Source or Destination Port: 60493 [Stream index: 64] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 3100453089 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 3081256006 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x9009 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3566 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 84966 23.596134 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 84966: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.126325000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.126325000 seconds [Time delta from previous captured frame: 0.000148000 seconds] [Time delta from previous displayed frame: 0.000236000 seconds] [Time since reference or first frame: 23.596134000 seconds] Frame Number: 84966 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60493, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60493 Destination Port: 4840 Source or Destination Port: 60493 Source or Destination Port: 4840 [Stream index: 64] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 3081256006 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 3100453224 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3566 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 85026 23.602572 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 85026: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.132763000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.132763000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.006438000 seconds] [Time since reference or first frame: 23.602572000 seconds] Frame Number: 85026 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60493, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60493 Source or Destination Port: 4840 Source or Destination Port: 60493 [Stream index: 64] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 3100486804 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 3081256100 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x6ead [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #84979(1460), #84980(1460), #84982(1460), #84984(1460), #84986(1460), #84988(1460), #84994(1460), #84995(1460), #84998(1460), #85000(1460), #85002(1460), #85004(1460), #85006(1460), #85007(1460), ] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3566 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 85029 23.603038 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 85029: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.133229000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.133229000 seconds [Time delta from previous captured frame: 0.000306000 seconds] [Time delta from previous displayed frame: 0.000466000 seconds] [Time since reference or first frame: 23.603038000 seconds] Frame Number: 85029 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60493, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60493 Destination Port: 4840 Source or Destination Port: 60493 Source or Destination Port: 4840 [Stream index: 64] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 3081256100 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 3100487347 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3566 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 85061 23.609970 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 85061: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.140161000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.140161000 seconds [Time delta from previous captured frame: 0.000128000 seconds] [Time delta from previous displayed frame: 0.006932000 seconds] [Time since reference or first frame: 23.609970000 seconds] Frame Number: 85061 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60494, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60494 Destination Port: 4840 Source or Destination Port: 60494 Source or Destination Port: 4840 [Stream index: 65] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1966030623 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 1239890165 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 85067 23.610975 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 85067: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.141166000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.141166000 seconds [Time delta from previous captured frame: 0.000144000 seconds] [Time delta from previous displayed frame: 0.001005000 seconds] [Time since reference or first frame: 23.610975000 seconds] Frame Number: 85067 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60494, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60494 Source or Destination Port: 4840 Source or Destination Port: 60494 [Stream index: 65] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1239890165 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1966030680 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x0720 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 85068 23.611173 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 85068: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.141364000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.141364000 seconds [Time delta from previous captured frame: 0.000198000 seconds] [Time delta from previous displayed frame: 0.000198000 seconds] [Time since reference or first frame: 23.611173000 seconds] Frame Number: 85068 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60494, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60494 Destination Port: 4840 Source or Destination Port: 60494 Source or Destination Port: 4840 [Stream index: 65] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1966030680 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 1239890193 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 85075 23.612584 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 85075: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.142775000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.142775000 seconds [Time delta from previous captured frame: 0.000040000 seconds] [Time delta from previous displayed frame: 0.001411000 seconds] [Time since reference or first frame: 23.612584000 seconds] Frame Number: 85075 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60494, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60494 Source or Destination Port: 4840 Source or Destination Port: 60494 [Stream index: 65] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 1239890193 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1966030812 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xfc7b [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3567 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 85076 23.612881 10.1.21.102 10.3.95.2 OpcUa 455 UA Secure Conversation Message: CreateSessionRequest Frame 85076: 455 bytes on wire (3640 bits), 455 bytes captured (3640 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.143072000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.143072000 seconds [Time delta from previous captured frame: 0.000297000 seconds] [Time delta from previous displayed frame: 0.000297000 seconds] [Time since reference or first frame: 23.612881000 seconds] Frame Number: 85076 Frame Length: 455 bytes (3640 bits) Capture Length: 455 bytes (3640 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60494, Dst Port: 4840, Seq: 190, Ack: 164, Len: 401 Source Port: 60494 Destination Port: 4840 Source or Destination Port: 60494 Source or Destination Port: 4840 [Stream index: 65] [TCP Segment Len: 401] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1966030812 [Next Sequence Number: 591 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 1239890328 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1025 [Calculated window size: 262400] [Window size scaling factor: 256] Checksum: 0x8a17 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (401 bytes) [PDU Size: 401] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 401 SecureChannelId: 3567 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 85110 23.622173 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 85110: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.152364000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.152364000 seconds [Time delta from previous captured frame: 0.000624000 seconds] [Time delta from previous displayed frame: 0.009292000 seconds] [Time since reference or first frame: 23.622173000 seconds] Frame Number: 85110 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60494, Seq: 164, Ack: 591, Len: 1342 Source Port: 4840 Destination Port: 60494 Source or Destination Port: 4840 Source or Destination Port: 60494 [Stream index: 65] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 1239890328 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 591 (relative ack number) Acknowledgment number (raw): 1966031213 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x017e [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3567 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 85115 23.623028 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 85115: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.153219000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.153219000 seconds [Time delta from previous captured frame: 0.000037000 seconds] [Time delta from previous displayed frame: 0.000855000 seconds] [Time since reference or first frame: 23.623028000 seconds] Frame Number: 85115 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60494, Dst Port: 4840, Seq: 591, Ack: 1506, Len: 79 Source Port: 60494 Destination Port: 4840 Source or Destination Port: 60494 Source or Destination Port: 4840 [Stream index: 65] [TCP Segment Len: 79] Sequence Number: 591 (relative sequence number) Sequence Number (raw): 1966031213 [Next Sequence Number: 670 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 1239891670 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3567 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 85126 23.626468 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 85126: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.156659000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.156659000 seconds [Time delta from previous captured frame: 0.000924000 seconds] [Time delta from previous displayed frame: 0.003440000 seconds] [Time since reference or first frame: 23.626468000 seconds] Frame Number: 85126 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60494, Seq: 1506, Ack: 670, Len: 52 Source Port: 4840 Destination Port: 60494 Source or Destination Port: 4840 Source or Destination Port: 60494 [Stream index: 65] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 1239891670 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 670 (relative ack number) Acknowledgment number (raw): 1966031292 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x7a97 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3567 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 85127 23.626737 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 85127: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:16.156928000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804276.156928000 seconds [Time delta from previous captured frame: 0.000269000 seconds] [Time delta from previous displayed frame: 0.000269000 seconds] [Time since reference or first frame: 23.626737000 seconds] Frame Number: 85127 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60494, Dst Port: 4840, Seq: 670, Ack: 1558, Len: 57 Source Port: 60494 Destination Port: 4840 Source or Destination Port: 60494 Source or Destination Port: 4840 [Stream index: 65] [TCP Segment Len: 57] Sequence Number: 670 (relative sequence number) Sequence Number (raw): 1966031292 [Next Sequence Number: 727 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 1239891722 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3567 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 120262 33.637722 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 120262: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.167913000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.167913000 seconds [Time delta from previous captured frame: 0.000108000 seconds] [Time delta from previous displayed frame: 10.010985000 seconds] [Time since reference or first frame: 33.637722000 seconds] Frame Number: 120262 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60510, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60510 Destination Port: 4840 Source or Destination Port: 60510 Source or Destination Port: 4840 [Stream index: 86] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 2019290680 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 4178850308 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 120266 33.638558 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 120266: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.168749000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.168749000 seconds [Time delta from previous captured frame: 0.000248000 seconds] [Time delta from previous displayed frame: 0.000836000 seconds] [Time since reference or first frame: 33.638558000 seconds] Frame Number: 120266 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60510, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60510 Source or Destination Port: 4840 Source or Destination Port: 60510 [Stream index: 86] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 4178850308 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 2019290737 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xec8d [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 120267 33.638779 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 120267: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.168970000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.168970000 seconds [Time delta from previous captured frame: 0.000221000 seconds] [Time delta from previous displayed frame: 0.000221000 seconds] [Time since reference or first frame: 33.638779000 seconds] Frame Number: 120267 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60510, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60510 Destination Port: 4840 Source or Destination Port: 60510 Source or Destination Port: 4840 [Stream index: 86] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 2019290737 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 4178850336 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 120273 33.640382 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 120273: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.170573000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.170573000 seconds [Time delta from previous captured frame: 0.000314000 seconds] [Time delta from previous displayed frame: 0.001603000 seconds] [Time since reference or first frame: 33.640382000 seconds] Frame Number: 120273 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60510, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60510 Source or Destination Port: 4840 Source or Destination Port: 60510 [Stream index: 86] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 4178850336 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 2019290869 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x9493 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3569 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 120274 33.640620 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 120274: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.170811000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.170811000 seconds [Time delta from previous captured frame: 0.000238000 seconds] [Time delta from previous displayed frame: 0.000238000 seconds] [Time since reference or first frame: 33.640620000 seconds] Frame Number: 120274 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60510, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60510 Destination Port: 4840 Source or Destination Port: 60510 Source or Destination Port: 4840 [Stream index: 86] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 2019290869 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 4178850471 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1025 [Calculated window size: 262400] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3569 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 120337 33.647947 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 120337: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.178138000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.178138000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.007327000 seconds] [Time since reference or first frame: 33.647947000 seconds] Frame Number: 120337 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60510, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60510 Source or Destination Port: 4840 Source or Destination Port: 60510 [Stream index: 86] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 4178884051 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 2019290963 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0xb1b3 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #120290(1460), #120291(1460), #120299(1460), #120300(1460), #120302(1460), #120304(1460), #120307(1460), #120308(1460), #120309(1460), #120310(1460), #120313(1460), #120314(1460), #120316(1460), #] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3569 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 120340 33.648457 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 120340: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.178648000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.178648000 seconds [Time delta from previous captured frame: 0.000164000 seconds] [Time delta from previous displayed frame: 0.000510000 seconds] [Time since reference or first frame: 33.648457000 seconds] Frame Number: 120340 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60510, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60510 Destination Port: 4840 Source or Destination Port: 60510 Source or Destination Port: 4840 [Stream index: 86] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 2019290963 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 4178884594 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3569 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 120386 33.658275 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 120386: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.188466000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.188466000 seconds [Time delta from previous captured frame: 0.000128000 seconds] [Time delta from previous displayed frame: 0.009818000 seconds] [Time since reference or first frame: 33.658275000 seconds] Frame Number: 120386 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60511, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60511 Destination Port: 4840 Source or Destination Port: 60511 Source or Destination Port: 4840 [Stream index: 87] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 3746918300 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 4175811124 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 120392 33.659717 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 120392: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.189908000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.189908000 seconds [Time delta from previous captured frame: 0.000009000 seconds] [Time delta from previous displayed frame: 0.001442000 seconds] [Time since reference or first frame: 33.659717000 seconds] Frame Number: 120392 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60511, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60511 Source or Destination Port: 4840 Source or Destination Port: 60511 [Stream index: 87] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 4175811124 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 3746918357 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x242d [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 120393 33.659920 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 120393: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.190111000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.190111000 seconds [Time delta from previous captured frame: 0.000203000 seconds] [Time delta from previous displayed frame: 0.000203000 seconds] [Time since reference or first frame: 33.659920000 seconds] Frame Number: 120393 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60511, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60511 Destination Port: 4840 Source or Destination Port: 60511 Source or Destination Port: 4840 [Stream index: 87] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 3746918357 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 4175811152 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 120396 33.661357 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 120396: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.191548000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.191548000 seconds [Time delta from previous captured frame: 0.000232000 seconds] [Time delta from previous displayed frame: 0.001437000 seconds] [Time since reference or first frame: 33.661357000 seconds] Frame Number: 120396 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60511, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60511 Source or Destination Port: 4840 Source or Destination Port: 60511 [Stream index: 87] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 4175811152 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 3746918489 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xa28b [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3570 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 120401 33.661658 10.1.21.102 10.3.95.2 OpcUa 455 UA Secure Conversation Message: CreateSessionRequest Frame 120401: 455 bytes on wire (3640 bits), 455 bytes captured (3640 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.191849000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.191849000 seconds [Time delta from previous captured frame: 0.000202000 seconds] [Time delta from previous displayed frame: 0.000301000 seconds] [Time since reference or first frame: 33.661658000 seconds] Frame Number: 120401 Frame Length: 455 bytes (3640 bits) Capture Length: 455 bytes (3640 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60511, Dst Port: 4840, Seq: 190, Ack: 164, Len: 401 Source Port: 60511 Destination Port: 4840 Source or Destination Port: 60511 Source or Destination Port: 4840 [Stream index: 87] [TCP Segment Len: 401] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 3746918489 [Next Sequence Number: 591 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 4175811287 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x8a17 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (401 bytes) [PDU Size: 401] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 401 SecureChannelId: 3570 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 120424 33.669287 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 120424: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.199478000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.199478000 seconds [Time delta from previous captured frame: 0.001152000 seconds] [Time delta from previous displayed frame: 0.007629000 seconds] [Time since reference or first frame: 33.669287000 seconds] Frame Number: 120424 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60511, Seq: 164, Ack: 591, Len: 1342 Source Port: 4840 Destination Port: 60511 Source or Destination Port: 4840 Source or Destination Port: 60511 [Stream index: 87] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 4175811287 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 591 (relative ack number) Acknowledgment number (raw): 3746918890 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x705b [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3570 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 120431 33.670027 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 120431: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.200218000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.200218000 seconds [Time delta from previous captured frame: 0.000101000 seconds] [Time delta from previous displayed frame: 0.000740000 seconds] [Time since reference or first frame: 33.670027000 seconds] Frame Number: 120431 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60511, Dst Port: 4840, Seq: 591, Ack: 1506, Len: 79 Source Port: 60511 Destination Port: 4840 Source or Destination Port: 60511 Source or Destination Port: 4840 [Stream index: 87] [TCP Segment Len: 79] Sequence Number: 591 (relative sequence number) Sequence Number (raw): 3746918890 [Next Sequence Number: 670 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 4175812629 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3570 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 120442 33.673888 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 120442: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.204079000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.204079000 seconds [Time delta from previous captured frame: 0.000161000 seconds] [Time delta from previous displayed frame: 0.003861000 seconds] [Time since reference or first frame: 33.673888000 seconds] Frame Number: 120442 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60511, Seq: 1506, Ack: 670, Len: 52 Source Port: 4840 Destination Port: 60511 Source or Destination Port: 4840 Source or Destination Port: 60511 [Stream index: 87] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 4175812629 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 670 (relative ack number) Acknowledgment number (raw): 3746918969 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0xb7b8 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3570 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 120447 33.674150 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 120447: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:26.204341000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804286.204341000 seconds [Time delta from previous captured frame: 0.000096000 seconds] [Time delta from previous displayed frame: 0.000262000 seconds] [Time since reference or first frame: 33.674150000 seconds] Frame Number: 120447 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60511, Dst Port: 4840, Seq: 670, Ack: 1558, Len: 57 Source Port: 60511 Destination Port: 4840 Source or Destination Port: 60511 Source or Destination Port: 4840 [Stream index: 87] [TCP Segment Len: 57] Sequence Number: 670 (relative sequence number) Sequence Number (raw): 3746918969 [Next Sequence Number: 727 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 4175812681 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3570 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 155617 43.684302 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 155617: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.214493000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.214493000 seconds [Time delta from previous captured frame: 0.000137000 seconds] [Time delta from previous displayed frame: 10.010152000 seconds] [Time since reference or first frame: 43.684302000 seconds] Frame Number: 155617 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60514, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60514 Destination Port: 4840 Source or Destination Port: 60514 Source or Destination Port: 4840 [Stream index: 94] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1008511229 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 103209118 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 155623 43.685370 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 155623: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.215561000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.215561000 seconds [Time delta from previous captured frame: 0.000829000 seconds] [Time delta from previous displayed frame: 0.001068000 seconds] [Time since reference or first frame: 43.685370000 seconds] Frame Number: 155623 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60514, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60514 Source or Destination Port: 4840 Source or Destination Port: 60514 [Stream index: 94] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 103209118 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1008511286 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xba58 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 155624 43.685580 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 155624: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.215771000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.215771000 seconds [Time delta from previous captured frame: 0.000210000 seconds] [Time delta from previous displayed frame: 0.000210000 seconds] [Time since reference or first frame: 43.685580000 seconds] Frame Number: 155624 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60514, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60514 Destination Port: 4840 Source or Destination Port: 60514 Source or Destination Port: 4840 [Stream index: 94] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1008511286 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 103209146 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 155634 43.687296 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 155634: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.217487000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.217487000 seconds [Time delta from previous captured frame: 0.000295000 seconds] [Time delta from previous displayed frame: 0.001716000 seconds] [Time since reference or first frame: 43.687296000 seconds] Frame Number: 155634 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60514, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60514 Source or Destination Port: 4840 Source or Destination Port: 60514 [Stream index: 94] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 103209146 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1008511418 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x87a1 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3572 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 155635 43.687549 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 155635: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.217740000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.217740000 seconds [Time delta from previous captured frame: 0.000253000 seconds] [Time delta from previous displayed frame: 0.000253000 seconds] [Time since reference or first frame: 43.687549000 seconds] Frame Number: 155635 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60514, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60514 Destination Port: 4840 Source or Destination Port: 60514 Source or Destination Port: 4840 [Stream index: 94] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1008511418 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 103209281 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3572 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 155690 43.694098 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 155690: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.224289000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.224289000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.006549000 seconds] [Time since reference or first frame: 43.694098000 seconds] Frame Number: 155690 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60514, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60514 Source or Destination Port: 4840 Source or Destination Port: 60514 [Stream index: 94] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 103242861 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 1008511512 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x7f7e [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #155643(1460), #155648(1460), #155652(1460), #155654(1460), #155656(1460), #155657(1460), #155659(1460), #155660(1460), #155661(1460), #155662(1460), #155665(1460), #155666(1460), #155673(1460), #] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3572 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 155697 43.694565 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 155697: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.224756000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.224756000 seconds [Time delta from previous captured frame: 0.000038000 seconds] [Time delta from previous displayed frame: 0.000467000 seconds] [Time since reference or first frame: 43.694565000 seconds] Frame Number: 155697 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60514, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60514 Destination Port: 4840 Source or Destination Port: 60514 Source or Destination Port: 4840 [Stream index: 94] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 1008511512 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 103243404 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3572 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 155727 43.701230 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 155727: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.231421000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.231421000 seconds [Time delta from previous captured frame: 0.000124000 seconds] [Time delta from previous displayed frame: 0.006665000 seconds] [Time since reference or first frame: 43.701230000 seconds] Frame Number: 155727 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60515, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60515 Destination Port: 4840 Source or Destination Port: 60515 Source or Destination Port: 4840 [Stream index: 95] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 2386107367 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 4246014585 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 155729 43.702287 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 155729: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.232478000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.232478000 seconds [Time delta from previous captured frame: 0.000139000 seconds] [Time delta from previous displayed frame: 0.001057000 seconds] [Time since reference or first frame: 43.702287000 seconds] Frame Number: 155729 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60515, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60515 Source or Destination Port: 4840 Source or Destination Port: 60515 [Stream index: 95] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 4246014585 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 2386107424 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x8c86 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 155731 43.702477 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 155731: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.232668000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.232668000 seconds [Time delta from previous captured frame: 0.000121000 seconds] [Time delta from previous displayed frame: 0.000190000 seconds] [Time since reference or first frame: 43.702477000 seconds] Frame Number: 155731 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60515, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60515 Destination Port: 4840 Source or Destination Port: 60515 Source or Destination Port: 4840 [Stream index: 95] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 2386107424 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 4246014613 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 155739 43.704241 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 155739: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.234432000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.234432000 seconds [Time delta from previous captured frame: 0.000801000 seconds] [Time delta from previous displayed frame: 0.001764000 seconds] [Time since reference or first frame: 43.704241000 seconds] Frame Number: 155739 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60515, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60515 Source or Destination Port: 4840 Source or Destination Port: 60515 [Stream index: 95] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 4246014613 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 2386107556 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x68a9 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3573 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 155740 43.704487 10.1.21.102 10.3.95.2 OpcUa 455 UA Secure Conversation Message: CreateSessionRequest Frame 155740: 455 bytes on wire (3640 bits), 455 bytes captured (3640 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.234678000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.234678000 seconds [Time delta from previous captured frame: 0.000246000 seconds] [Time delta from previous displayed frame: 0.000246000 seconds] [Time since reference or first frame: 43.704487000 seconds] Frame Number: 155740 Frame Length: 455 bytes (3640 bits) Capture Length: 455 bytes (3640 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60515, Dst Port: 4840, Seq: 190, Ack: 164, Len: 401 Source Port: 60515 Destination Port: 4840 Source or Destination Port: 60515 Source or Destination Port: 4840 [Stream index: 95] [TCP Segment Len: 401] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 2386107556 [Next Sequence Number: 591 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 4246014748 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1025 [Calculated window size: 262400] [Window size scaling factor: 256] Checksum: 0x8a17 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (401 bytes) [PDU Size: 401] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 401 SecureChannelId: 3573 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 155769 43.711829 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 155769: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.242020000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.242020000 seconds [Time delta from previous captured frame: 0.000235000 seconds] [Time delta from previous displayed frame: 0.007342000 seconds] [Time since reference or first frame: 43.711829000 seconds] Frame Number: 155769 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60515, Seq: 164, Ack: 591, Len: 1342 Source Port: 4840 Destination Port: 60515 Source or Destination Port: 4840 Source or Destination Port: 60515 [Stream index: 95] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 4246014748 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 591 (relative ack number) Acknowledgment number (raw): 2386107957 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x99d4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3573 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 155770 43.712480 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 155770: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.242671000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.242671000 seconds [Time delta from previous captured frame: 0.000651000 seconds] [Time delta from previous displayed frame: 0.000651000 seconds] [Time since reference or first frame: 43.712480000 seconds] Frame Number: 155770 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60515, Dst Port: 4840, Seq: 591, Ack: 1506, Len: 79 Source Port: 60515 Destination Port: 4840 Source or Destination Port: 60515 Source or Destination Port: 4840 [Stream index: 95] [TCP Segment Len: 79] Sequence Number: 591 (relative sequence number) Sequence Number (raw): 2386107957 [Next Sequence Number: 670 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 4246016090 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3573 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 155785 43.716724 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 155785: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.246915000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.246915000 seconds [Time delta from previous captured frame: 0.001048000 seconds] [Time delta from previous displayed frame: 0.004244000 seconds] [Time since reference or first frame: 43.716724000 seconds] Frame Number: 155785 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60515, Seq: 1506, Ack: 670, Len: 52 Source Port: 4840 Destination Port: 60515 Source or Destination Port: 4840 Source or Destination Port: 60515 [Stream index: 95] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 4246016090 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 670 (relative ack number) Acknowledgment number (raw): 2386108036 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x80c2 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3573 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 155786 43.716950 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 155786: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:36.247141000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804296.247141000 seconds [Time delta from previous captured frame: 0.000226000 seconds] [Time delta from previous displayed frame: 0.000226000 seconds] [Time since reference or first frame: 43.716950000 seconds] Frame Number: 155786 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60515, Dst Port: 4840, Seq: 670, Ack: 1558, Len: 57 Source Port: 60515 Destination Port: 4840 Source or Destination Port: 60515 Source or Destination Port: 4840 [Stream index: 95] [TCP Segment Len: 57] Sequence Number: 670 (relative sequence number) Sequence Number (raw): 2386108036 [Next Sequence Number: 727 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 4246016142 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3573 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 192746 53.728159 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 192746: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.258350000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.258350000 seconds [Time delta from previous captured frame: 0.000090000 seconds] [Time delta from previous displayed frame: 10.011209000 seconds] [Time since reference or first frame: 53.728159000 seconds] Frame Number: 192746 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60523, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60523 Destination Port: 4840 Source or Destination Port: 60523 Source or Destination Port: 4840 [Stream index: 100] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 700155326 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 341833460 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 192747 53.728924 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 192747: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.259115000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.259115000 seconds [Time delta from previous captured frame: 0.000765000 seconds] [Time delta from previous displayed frame: 0.000765000 seconds] [Time since reference or first frame: 53.728924000 seconds] Frame Number: 192747 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60523, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60523 Source or Destination Port: 4840 Source or Destination Port: 60523 [Stream index: 100] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 341833460 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 700155383 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xc360 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 192748 53.729179 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 192748: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.259370000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.259370000 seconds [Time delta from previous captured frame: 0.000255000 seconds] [Time delta from previous displayed frame: 0.000255000 seconds] [Time since reference or first frame: 53.729179000 seconds] Frame Number: 192748 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60523, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60523 Destination Port: 4840 Source or Destination Port: 60523 Source or Destination Port: 4840 [Stream index: 100] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 700155383 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 341833488 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 192758 53.731521 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 192758: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.261712000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.261712000 seconds [Time delta from previous captured frame: 0.000022000 seconds] [Time delta from previous displayed frame: 0.002342000 seconds] [Time since reference or first frame: 53.731521000 seconds] Frame Number: 192758 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60523, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60523 Source or Destination Port: 4840 Source or Destination Port: 60523 [Stream index: 100] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 341833488 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 700155515 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xa04d [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3575 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 192766 53.731909 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 192766: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.262100000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.262100000 seconds [Time delta from previous captured frame: 0.000068000 seconds] [Time delta from previous displayed frame: 0.000388000 seconds] [Time since reference or first frame: 53.731909000 seconds] Frame Number: 192766 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60523, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60523 Destination Port: 4840 Source or Destination Port: 60523 Source or Destination Port: 4840 [Stream index: 100] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 700155515 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 341833623 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1025 [Calculated window size: 262400] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3575 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 192832 53.739322 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 192832: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.269513000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.269513000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.007413000 seconds] [Time since reference or first frame: 53.739322000 seconds] Frame Number: 192832 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60523, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60523 Source or Destination Port: 4840 Source or Destination Port: 60523 [Stream index: 100] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 341867203 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 700155609 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x8886 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #192781(1460), #192782(1460), #192786(1460), #192787(1460), #192789(1460), #192797(1460), #192799(1460), #192800(1460), #192802(1460), #192803(1460), #192804(1460), #192806(1460), #192808(1460), #] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3575 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 192835 53.739852 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 192835: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.270043000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.270043000 seconds [Time delta from previous captured frame: 0.000146000 seconds] [Time delta from previous displayed frame: 0.000530000 seconds] [Time since reference or first frame: 53.739852000 seconds] Frame Number: 192835 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60523, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60523 Destination Port: 4840 Source or Destination Port: 60523 Source or Destination Port: 4840 [Stream index: 100] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 700155609 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 341867746 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3575 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 192882 53.749013 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 192882: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.279204000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.279204000 seconds [Time delta from previous captured frame: 0.000147000 seconds] [Time delta from previous displayed frame: 0.009161000 seconds] [Time since reference or first frame: 53.749013000 seconds] Frame Number: 192882 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60524, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60524 Destination Port: 4840 Source or Destination Port: 60524 Source or Destination Port: 4840 [Stream index: 101] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1820033058 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 994736700 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 192891 53.750489 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 192891: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.280680000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.280680000 seconds [Time delta from previous captured frame: 0.000168000 seconds] [Time delta from previous displayed frame: 0.001476000 seconds] [Time since reference or first frame: 53.750489000 seconds] Frame Number: 192891 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60524, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60524 Source or Destination Port: 4840 Source or Destination Port: 60524 [Stream index: 101] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 994736700 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1820033115 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x9c08 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 192899 53.750773 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 192899: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.280964000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.280964000 seconds [Time delta from previous captured frame: 0.000117000 seconds] [Time delta from previous displayed frame: 0.000284000 seconds] [Time since reference or first frame: 53.750773000 seconds] Frame Number: 192899 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60524, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60524 Destination Port: 4840 Source or Destination Port: 60524 Source or Destination Port: 4840 [Stream index: 101] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1820033115 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 994736728 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 192901 53.752217 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 192901: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.282408000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.282408000 seconds [Time delta from previous captured frame: 0.000265000 seconds] [Time delta from previous displayed frame: 0.001444000 seconds] [Time since reference or first frame: 53.752217000 seconds] Frame Number: 192901 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60524, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60524 Source or Destination Port: 4840 Source or Destination Port: 60524 [Stream index: 101] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 994736728 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1820033247 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x4f4e [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3576 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 192909 53.752467 10.1.21.102 10.3.95.2 OpcUa 456 UA Secure Conversation Message: CreateSessionRequest Frame 192909: 456 bytes on wire (3648 bits), 456 bytes captured (3648 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.282658000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.282658000 seconds [Time delta from previous captured frame: 0.000140000 seconds] [Time delta from previous displayed frame: 0.000250000 seconds] [Time since reference or first frame: 53.752467000 seconds] Frame Number: 192909 Frame Length: 456 bytes (3648 bits) Capture Length: 456 bytes (3648 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60524, Dst Port: 4840, Seq: 190, Ack: 164, Len: 402 Source Port: 60524 Destination Port: 4840 Source or Destination Port: 60524 Source or Destination Port: 4840 [Stream index: 101] [TCP Segment Len: 402] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1820033247 [Next Sequence Number: 592 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 994736863 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1025 [Calculated window size: 262400] [Window size scaling factor: 256] Checksum: 0x8a18 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (402 bytes) [PDU Size: 402] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 402 SecureChannelId: 3576 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 192943 53.760958 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 192943: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.291149000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.291149000 seconds [Time delta from previous captured frame: 0.000024000 seconds] [Time delta from previous displayed frame: 0.008491000 seconds] [Time since reference or first frame: 53.760958000 seconds] Frame Number: 192943 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60524, Seq: 164, Ack: 592, Len: 1342 Source Port: 4840 Destination Port: 60524 Source or Destination Port: 4840 Source or Destination Port: 60524 [Stream index: 101] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 994736863 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 592 (relative ack number) Acknowledgment number (raw): 1820033649 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x49f4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3576 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 192951 53.761854 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 192951: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.292045000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.292045000 seconds [Time delta from previous captured frame: 0.000573000 seconds] [Time delta from previous displayed frame: 0.000896000 seconds] [Time since reference or first frame: 53.761854000 seconds] Frame Number: 192951 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60524, Dst Port: 4840, Seq: 592, Ack: 1506, Len: 79 Source Port: 60524 Destination Port: 4840 Source or Destination Port: 60524 Source or Destination Port: 4840 [Stream index: 101] [TCP Segment Len: 79] Sequence Number: 592 (relative sequence number) Sequence Number (raw): 1820033649 [Next Sequence Number: 671 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 994738205 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3576 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 192968 53.765656 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 192968: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.295847000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.295847000 seconds [Time delta from previous captured frame: 0.001169000 seconds] [Time delta from previous displayed frame: 0.003802000 seconds] [Time since reference or first frame: 53.765656000 seconds] Frame Number: 192968 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60524, Seq: 1506, Ack: 671, Len: 52 Source Port: 4840 Destination Port: 60524 Source or Destination Port: 4840 Source or Destination Port: 60524 [Stream index: 101] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 994738205 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 671 (relative ack number) Acknowledgment number (raw): 1820033728 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x9009 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3576 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 192977 53.767052 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 192977: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:46.297243000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804306.297243000 seconds [Time delta from previous captured frame: 0.000776000 seconds] [Time delta from previous displayed frame: 0.001396000 seconds] [Time since reference or first frame: 53.767052000 seconds] Frame Number: 192977 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60524, Dst Port: 4840, Seq: 671, Ack: 1558, Len: 57 Source Port: 60524 Destination Port: 4840 Source or Destination Port: 60524 Source or Destination Port: 4840 [Stream index: 101] [TCP Segment Len: 57] Sequence Number: 671 (relative sequence number) Sequence Number (raw): 1820033728 [Next Sequence Number: 728 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 994738257 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3576 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205376 63.777834 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 205376: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.308025000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.308025000 seconds [Time delta from previous captured frame: 0.000152000 seconds] [Time delta from previous displayed frame: 10.010782000 seconds] [Time since reference or first frame: 63.777834000 seconds] Frame Number: 205376 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60534, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60534 Destination Port: 4840 Source or Destination Port: 60534 Source or Destination Port: 4840 [Stream index: 106] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 769464877 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 1309042674 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 205377 63.778881 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 205377: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.309072000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.309072000 seconds [Time delta from previous captured frame: 0.001047000 seconds] [Time delta from previous displayed frame: 0.001047000 seconds] [Time since reference or first frame: 63.778881000 seconds] Frame Number: 205377 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60534, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60534 Source or Destination Port: 4840 Source or Destination Port: 60534 [Stream index: 106] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1309042674 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 769464934 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x8020 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 205378 63.779094 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 205378: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.309285000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.309285000 seconds [Time delta from previous captured frame: 0.000213000 seconds] [Time delta from previous displayed frame: 0.000213000 seconds] [Time since reference or first frame: 63.779094000 seconds] Frame Number: 205378 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60534, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60534 Destination Port: 4840 Source or Destination Port: 60534 Source or Destination Port: 4840 [Stream index: 106] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 769464934 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 1309042702 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205379 63.780550 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 205379: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.310741000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.310741000 seconds [Time delta from previous captured frame: 0.001456000 seconds] [Time delta from previous displayed frame: 0.001456000 seconds] [Time since reference or first frame: 63.780550000 seconds] Frame Number: 205379 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60534, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60534 Source or Destination Port: 4840 Source or Destination Port: 60534 [Stream index: 106] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 1309042702 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 769465066 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x97ef [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3578 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205380 63.780811 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 205380: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.311002000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.311002000 seconds [Time delta from previous captured frame: 0.000261000 seconds] [Time delta from previous displayed frame: 0.000261000 seconds] [Time since reference or first frame: 63.780811000 seconds] Frame Number: 205380 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60534, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60534 Destination Port: 4840 Source or Destination Port: 60534 Source or Destination Port: 4840 [Stream index: 106] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 769465066 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 1309042837 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3578 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 205417 63.787896 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 205417: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.318087000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.318087000 seconds [Time delta from previous captured frame: 0.000062000 seconds] [Time delta from previous displayed frame: 0.007085000 seconds] [Time since reference or first frame: 63.787896000 seconds] Frame Number: 205417 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60534, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60534 Source or Destination Port: 4840 Source or Destination Port: 60534 [Stream index: 106] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 1309076417 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 769465160 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x4546 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #205383(1460), #205384(1460), #205386(1460), #205387(1460), #205389(1460), #205390(1460), #205392(1460), #205393(1460), #205395(1460), #205396(1460), #205398(1460), #205399(1460), #205401(1460), #] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3578 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 205421 63.788434 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 205421: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.318625000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.318625000 seconds [Time delta from previous captured frame: 0.000266000 seconds] [Time delta from previous displayed frame: 0.000538000 seconds] [Time since reference or first frame: 63.788434000 seconds] Frame Number: 205421 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60534, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60534 Destination Port: 4840 Source or Destination Port: 60534 Source or Destination Port: 4840 [Stream index: 106] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 769465160 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 1309076960 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3578 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205430 63.795127 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 205430: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.325318000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.325318000 seconds [Time delta from previous captured frame: 0.000119000 seconds] [Time delta from previous displayed frame: 0.006693000 seconds] [Time since reference or first frame: 63.795127000 seconds] Frame Number: 205430 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60535, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60535 Destination Port: 4840 Source or Destination Port: 60535 Source or Destination Port: 4840 [Stream index: 107] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 2168124530 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 4095014153 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 205431 63.796095 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 205431: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.326286000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.326286000 seconds [Time delta from previous captured frame: 0.000968000 seconds] [Time delta from previous displayed frame: 0.000968000 seconds] [Time since reference or first frame: 63.796095000 seconds] Frame Number: 205431 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60535, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60535 Source or Destination Port: 4840 Source or Destination Port: 60535 [Stream index: 107] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 4095014153 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 2168124587 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xdf55 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 205432 63.796301 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 205432: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.326492000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.326492000 seconds [Time delta from previous captured frame: 0.000206000 seconds] [Time delta from previous displayed frame: 0.000206000 seconds] [Time since reference or first frame: 63.796301000 seconds] Frame Number: 205432 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60535, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60535 Destination Port: 4840 Source or Destination Port: 60535 Source or Destination Port: 4840 [Stream index: 107] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 2168124587 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 4095014181 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205433 63.797645 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 205433: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.327836000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.327836000 seconds [Time delta from previous captured frame: 0.001344000 seconds] [Time delta from previous displayed frame: 0.001344000 seconds] [Time since reference or first frame: 63.797645000 seconds] Frame Number: 205433 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60535, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60535 Source or Destination Port: 4840 Source or Destination Port: 60535 [Stream index: 107] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 4095014181 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 2168124719 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x05ff [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3579 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205434 63.797903 10.1.21.102 10.3.95.2 OpcUa 456 UA Secure Conversation Message: CreateSessionRequest Frame 205434: 456 bytes on wire (3648 bits), 456 bytes captured (3648 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.328094000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.328094000 seconds [Time delta from previous captured frame: 0.000258000 seconds] [Time delta from previous displayed frame: 0.000258000 seconds] [Time since reference or first frame: 63.797903000 seconds] Frame Number: 205434 Frame Length: 456 bytes (3648 bits) Capture Length: 456 bytes (3648 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60535, Dst Port: 4840, Seq: 190, Ack: 164, Len: 402 Source Port: 60535 Destination Port: 4840 Source or Destination Port: 60535 Source or Destination Port: 4840 [Stream index: 107] [TCP Segment Len: 402] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 2168124719 [Next Sequence Number: 592 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 4095014316 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1025 [Calculated window size: 262400] [Window size scaling factor: 256] Checksum: 0x8a18 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (402 bytes) [PDU Size: 402] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 402 SecureChannelId: 3579 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 205440 63.806375 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 205440: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.336566000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.336566000 seconds [Time delta from previous captured frame: 0.002188000 seconds] [Time delta from previous displayed frame: 0.008472000 seconds] [Time since reference or first frame: 63.806375000 seconds] Frame Number: 205440 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60535, Seq: 164, Ack: 592, Len: 1342 Source Port: 4840 Destination Port: 60535 Source or Destination Port: 4840 Source or Destination Port: 60535 [Stream index: 107] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 4095014316 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 592 (relative ack number) Acknowledgment number (raw): 2168125121 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x9df9 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3579 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 205441 63.807111 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 205441: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.337302000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.337302000 seconds [Time delta from previous captured frame: 0.000736000 seconds] [Time delta from previous displayed frame: 0.000736000 seconds] [Time since reference or first frame: 63.807111000 seconds] Frame Number: 205441 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60535, Dst Port: 4840, Seq: 592, Ack: 1506, Len: 79 Source Port: 60535 Destination Port: 4840 Source or Destination Port: 60535 Source or Destination Port: 4840 [Stream index: 107] [TCP Segment Len: 79] Sequence Number: 592 (relative sequence number) Sequence Number (raw): 2168125121 [Next Sequence Number: 671 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 4095015658 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3579 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 205442 63.811076 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 205442: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.341267000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.341267000 seconds [Time delta from previous captured frame: 0.003965000 seconds] [Time delta from previous displayed frame: 0.003965000 seconds] [Time since reference or first frame: 63.811076000 seconds] Frame Number: 205442 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60535, Seq: 1506, Ack: 671, Len: 52 Source Port: 4840 Destination Port: 60535 Source or Destination Port: 4840 Source or Destination Port: 60535 [Stream index: 107] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 4095015658 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 671 (relative ack number) Acknowledgment number (raw): 2168125200 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0xf36a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3579 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 205443 63.811315 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 205443: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:11:56.341506000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804316.341506000 seconds [Time delta from previous captured frame: 0.000239000 seconds] [Time delta from previous displayed frame: 0.000239000 seconds] [Time since reference or first frame: 63.811315000 seconds] Frame Number: 205443 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60535, Dst Port: 4840, Seq: 671, Ack: 1558, Len: 57 Source Port: 60535 Destination Port: 4840 Source or Destination Port: 60535 Source or Destination Port: 4840 [Stream index: 107] [TCP Segment Len: 57] Sequence Number: 671 (relative sequence number) Sequence Number (raw): 2168125200 [Next Sequence Number: 728 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 4095015710 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3579 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205989 73.821487 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 205989: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.351678000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.351678000 seconds [Time delta from previous captured frame: 0.000164000 seconds] [Time delta from previous displayed frame: 10.010172000 seconds] [Time since reference or first frame: 73.821487000 seconds] Frame Number: 205989 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60538, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60538 Destination Port: 4840 Source or Destination Port: 60538 Source or Destination Port: 4840 [Stream index: 109] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1577386969 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 165189798 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 205990 73.823123 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 205990: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.353314000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.353314000 seconds [Time delta from previous captured frame: 0.001636000 seconds] [Time delta from previous displayed frame: 0.001636000 seconds] [Time since reference or first frame: 73.823123000 seconds] Frame Number: 205990 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60538, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60538 Source or Destination Port: 4840 Source or Destination Port: 60538 [Stream index: 109] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 165189798 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1577387026 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x79c2 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 205991 73.823367 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 205991: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.353558000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.353558000 seconds [Time delta from previous captured frame: 0.000244000 seconds] [Time delta from previous displayed frame: 0.000244000 seconds] [Time since reference or first frame: 73.823367000 seconds] Frame Number: 205991 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60538, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60538 Destination Port: 4840 Source or Destination Port: 60538 Source or Destination Port: 4840 [Stream index: 109] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1577387026 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 165189826 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205992 73.824933 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 205992: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.355124000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.355124000 seconds [Time delta from previous captured frame: 0.001566000 seconds] [Time delta from previous displayed frame: 0.001566000 seconds] [Time since reference or first frame: 73.824933000 seconds] Frame Number: 205992 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60538, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60538 Source or Destination Port: 4840 Source or Destination Port: 60538 [Stream index: 109] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 165189826 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1577387158 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x5315 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3581 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 205993 73.825189 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 205993: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.355380000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.355380000 seconds [Time delta from previous captured frame: 0.000256000 seconds] [Time delta from previous displayed frame: 0.000256000 seconds] [Time since reference or first frame: 73.825189000 seconds] Frame Number: 205993 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60538, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60538 Destination Port: 4840 Source or Destination Port: 60538 Source or Destination Port: 4840 [Stream index: 109] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1577387158 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 165189961 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3581 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206027 73.832564 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 206027: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.362755000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.362755000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.007375000 seconds] [Time since reference or first frame: 73.832564000 seconds] Frame Number: 206027 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60538, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60538 Source or Destination Port: 4840 Source or Destination Port: 60538 [Stream index: 109] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 165223541 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 1577387252 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0x3ee8 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #205994(1460), #205995(1460), #205997(1460), #205998(1460), #206000(1460), #206001(1460), #206003(1460), #206004(1460), #206005(1460), #206007(1460), #206009(1460), #206010(1460), #206012(1460), #] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3581 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206030 73.833041 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 206030: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.363232000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.363232000 seconds [Time delta from previous captured frame: 0.000426000 seconds] [Time delta from previous displayed frame: 0.000477000 seconds] [Time since reference or first frame: 73.833041000 seconds] Frame Number: 206030 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60538, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60538 Destination Port: 4840 Source or Destination Port: 60538 Source or Destination Port: 4840 [Stream index: 109] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 1577387252 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 165224084 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3581 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206038 73.840893 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 206038: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.371084000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.371084000 seconds [Time delta from previous captured frame: 0.000117000 seconds] [Time delta from previous displayed frame: 0.007852000 seconds] [Time since reference or first frame: 73.840893000 seconds] Frame Number: 206038 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60539, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60539 Destination Port: 4840 Source or Destination Port: 60539 Source or Destination Port: 4840 [Stream index: 110] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1480783552 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 1642097910 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 206039 73.841963 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 206039: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.372154000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.372154000 seconds [Time delta from previous captured frame: 0.001070000 seconds] [Time delta from previous displayed frame: 0.001070000 seconds] [Time since reference or first frame: 73.841963000 seconds] Frame Number: 206039 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60539, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60539 Source or Destination Port: 4840 Source or Destination Port: 60539 [Stream index: 110] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1642097910 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1480783609 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x2044 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 206040 73.842171 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 206040: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.372362000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.372362000 seconds [Time delta from previous captured frame: 0.000208000 seconds] [Time delta from previous displayed frame: 0.000208000 seconds] [Time since reference or first frame: 73.842171000 seconds] Frame Number: 206040 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60539, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60539 Destination Port: 4840 Source or Destination Port: 60539 Source or Destination Port: 4840 [Stream index: 110] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1480783609 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 1642097938 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206041 73.844119 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 206041: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.374310000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.374310000 seconds [Time delta from previous captured frame: 0.001948000 seconds] [Time delta from previous displayed frame: 0.001948000 seconds] [Time since reference or first frame: 73.844119000 seconds] Frame Number: 206041 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60539, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60539 Source or Destination Port: 4840 Source or Destination Port: 60539 [Stream index: 110] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 1642097938 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1480783741 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x6c30 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3582 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206042 73.844349 10.1.21.102 10.3.95.2 OpcUa 456 UA Secure Conversation Message: CreateSessionRequest Frame 206042: 456 bytes on wire (3648 bits), 456 bytes captured (3648 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.374540000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.374540000 seconds [Time delta from previous captured frame: 0.000230000 seconds] [Time delta from previous displayed frame: 0.000230000 seconds] [Time since reference or first frame: 73.844349000 seconds] Frame Number: 206042 Frame Length: 456 bytes (3648 bits) Capture Length: 456 bytes (3648 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60539, Dst Port: 4840, Seq: 190, Ack: 164, Len: 402 Source Port: 60539 Destination Port: 4840 Source or Destination Port: 60539 Source or Destination Port: 4840 [Stream index: 110] [TCP Segment Len: 402] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1480783741 [Next Sequence Number: 592 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 1642098073 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1025 [Calculated window size: 262400] [Window size scaling factor: 256] Checksum: 0x8a18 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (402 bytes) [PDU Size: 402] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 402 SecureChannelId: 3582 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206043 73.852518 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 206043: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.382709000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.382709000 seconds [Time delta from previous captured frame: 0.008169000 seconds] [Time delta from previous displayed frame: 0.008169000 seconds] [Time since reference or first frame: 73.852518000 seconds] Frame Number: 206043 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60539, Seq: 164, Ack: 592, Len: 1342 Source Port: 4840 Destination Port: 60539 Source or Destination Port: 4840 Source or Destination Port: 60539 [Stream index: 110] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 1642098073 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 592 (relative ack number) Acknowledgment number (raw): 1480784143 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0xdf32 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3582 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206044 73.853240 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 206044: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.383431000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.383431000 seconds [Time delta from previous captured frame: 0.000722000 seconds] [Time delta from previous displayed frame: 0.000722000 seconds] [Time since reference or first frame: 73.853240000 seconds] Frame Number: 206044 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60539, Dst Port: 4840, Seq: 592, Ack: 1506, Len: 79 Source Port: 60539 Destination Port: 4840 Source or Destination Port: 60539 Source or Destination Port: 4840 [Stream index: 110] [TCP Segment Len: 79] Sequence Number: 592 (relative sequence number) Sequence Number (raw): 1480784143 [Next Sequence Number: 671 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 1642099415 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3582 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206045 73.858944 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 206045: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.389135000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.389135000 seconds [Time delta from previous captured frame: 0.005704000 seconds] [Time delta from previous displayed frame: 0.005704000 seconds] [Time since reference or first frame: 73.858944000 seconds] Frame Number: 206045 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60539, Seq: 1506, Ack: 671, Len: 52 Source Port: 4840 Destination Port: 60539 Source or Destination Port: 4840 Source or Destination Port: 60539 [Stream index: 110] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 1642099415 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 671 (relative ack number) Acknowledgment number (raw): 1480784222 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x4446 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3582 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206046 73.859230 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 206046: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:06.389421000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804326.389421000 seconds [Time delta from previous captured frame: 0.000286000 seconds] [Time delta from previous displayed frame: 0.000286000 seconds] [Time since reference or first frame: 73.859230000 seconds] Frame Number: 206046 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60539, Dst Port: 4840, Seq: 671, Ack: 1558, Len: 57 Source Port: 60539 Destination Port: 4840 Source or Destination Port: 60539 Source or Destination Port: 4840 [Stream index: 110] [TCP Segment Len: 57] Sequence Number: 671 (relative sequence number) Sequence Number (raw): 1480784222 [Next Sequence Number: 728 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 1642099467 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 1026 [Calculated window size: 262656] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3582 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206868 83.869323 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 206868: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.399514000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.399514000 seconds [Time delta from previous captured frame: 0.000146000 seconds] [Time delta from previous displayed frame: 10.010093000 seconds] [Time since reference or first frame: 83.869323000 seconds] Frame Number: 206868 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60543, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60543 Destination Port: 4840 Source or Destination Port: 60543 Source or Destination Port: 4840 [Stream index: 114] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 4005148768 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 3242207478 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 206869 83.870583 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 206869: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.400774000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.400774000 seconds [Time delta from previous captured frame: 0.001260000 seconds] [Time delta from previous displayed frame: 0.001260000 seconds] [Time since reference or first frame: 83.870583000 seconds] Frame Number: 206869 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60543, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60543 Source or Destination Port: 4840 Source or Destination Port: 60543 [Stream index: 114] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 3242207478 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 4005148825 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xecc8 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 206870 83.870797 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 206870: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.400988000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.400988000 seconds [Time delta from previous captured frame: 0.000214000 seconds] [Time delta from previous displayed frame: 0.000214000 seconds] [Time since reference or first frame: 83.870797000 seconds] Frame Number: 206870 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60543, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60543 Destination Port: 4840 Source or Destination Port: 60543 Source or Destination Port: 4840 [Stream index: 114] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 4005148825 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 3242207506 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206871 83.872250 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 206871: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.402441000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.402441000 seconds [Time delta from previous captured frame: 0.001453000 seconds] [Time delta from previous displayed frame: 0.001453000 seconds] [Time since reference or first frame: 83.872250000 seconds] Frame Number: 206871 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60543, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60543 Source or Destination Port: 4840 Source or Destination Port: 60543 [Stream index: 114] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 3242207506 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 4005148957 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xb2dd [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3584 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206872 83.872510 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 206872: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.402701000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.402701000 seconds [Time delta from previous captured frame: 0.000260000 seconds] [Time delta from previous displayed frame: 0.000260000 seconds] [Time since reference or first frame: 83.872510000 seconds] Frame Number: 206872 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60543, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60543 Destination Port: 4840 Source or Destination Port: 60543 Source or Destination Port: 4840 [Stream index: 114] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 4005148957 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 3242207641 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3584 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206905 83.879158 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 206905: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.409349000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.409349000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.006648000 seconds] [Time since reference or first frame: 83.879158000 seconds] Frame Number: 206905 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60543, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60543 Source or Destination Port: 4840 Source or Destination Port: 60543 [Stream index: 114] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 3242241221 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 4005149051 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0xb1ee [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #206873(1460), #206874(1460), #206876(1460), #206877(1460), #206879(1460), #206880(1460), #206882(1460), #206883(1460), #206884(1460), #206886(1460), #206888(1460), #206889(1460), #206891(1460), #] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3584 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206909 83.879698 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 206909: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.409889000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.409889000 seconds [Time delta from previous captured frame: 0.000449000 seconds] [Time delta from previous displayed frame: 0.000540000 seconds] [Time since reference or first frame: 83.879698000 seconds] Frame Number: 206909 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60543, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60543 Destination Port: 4840 Source or Destination Port: 60543 Source or Destination Port: 4840 [Stream index: 114] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 4005149051 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 3242241764 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3584 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206917 83.886330 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 206917: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.416521000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.416521000 seconds [Time delta from previous captured frame: 0.000120000 seconds] [Time delta from previous displayed frame: 0.006632000 seconds] [Time since reference or first frame: 83.886330000 seconds] Frame Number: 206917 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60544, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60544 Destination Port: 4840 Source or Destination Port: 60544 Source or Destination Port: 4840 [Stream index: 115] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1951041231 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 1858309794 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 206918 83.887598 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 206918: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.417789000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.417789000 seconds [Time delta from previous captured frame: 0.001268000 seconds] [Time delta from previous displayed frame: 0.001268000 seconds] [Time since reference or first frame: 83.887598000 seconds] Frame Number: 206918 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60544, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60544 Source or Destination Port: 4840 Source or Destination Port: 60544 [Stream index: 115] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1858309794 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1951041288 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x4599 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 206919 83.887792 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 206919: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.417983000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.417983000 seconds [Time delta from previous captured frame: 0.000194000 seconds] [Time delta from previous displayed frame: 0.000194000 seconds] [Time since reference or first frame: 83.887792000 seconds] Frame Number: 206919 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60544, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60544 Destination Port: 4840 Source or Destination Port: 60544 Source or Destination Port: 4840 [Stream index: 115] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1951041288 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 1858309822 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206920 83.889645 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 206920: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.419836000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.419836000 seconds [Time delta from previous captured frame: 0.001853000 seconds] [Time delta from previous displayed frame: 0.001853000 seconds] [Time since reference or first frame: 83.889645000 seconds] Frame Number: 206920 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60544, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60544 Source or Destination Port: 4840 Source or Destination Port: 60544 [Stream index: 115] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 1858309822 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1951041420 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x1a88 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3585 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 206921 83.889896 10.1.21.102 10.3.95.2 OpcUa 456 UA Secure Conversation Message: CreateSessionRequest Frame 206921: 456 bytes on wire (3648 bits), 456 bytes captured (3648 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.420087000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.420087000 seconds [Time delta from previous captured frame: 0.000251000 seconds] [Time delta from previous displayed frame: 0.000251000 seconds] [Time since reference or first frame: 83.889896000 seconds] Frame Number: 206921 Frame Length: 456 bytes (3648 bits) Capture Length: 456 bytes (3648 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60544, Dst Port: 4840, Seq: 190, Ack: 164, Len: 402 Source Port: 60544 Destination Port: 4840 Source or Destination Port: 60544 Source or Destination Port: 4840 [Stream index: 115] [TCP Segment Len: 402] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1951041420 [Next Sequence Number: 592 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 1858309957 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x8a18 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (402 bytes) [PDU Size: 402] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 402 SecureChannelId: 3585 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206924 83.898916 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 206924: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.429107000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.429107000 seconds [Time delta from previous captured frame: 0.000497000 seconds] [Time delta from previous displayed frame: 0.009020000 seconds] [Time since reference or first frame: 83.898916000 seconds] Frame Number: 206924 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60544, Seq: 164, Ack: 592, Len: 1342 Source Port: 4840 Destination Port: 60544 Source or Destination Port: 4840 Source or Destination Port: 60544 [Stream index: 115] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 1858309957 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 592 (relative ack number) Acknowledgment number (raw): 1951041822 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x5a66 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3585 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206925 83.899894 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 206925: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.430085000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.430085000 seconds [Time delta from previous captured frame: 0.000978000 seconds] [Time delta from previous displayed frame: 0.000978000 seconds] [Time since reference or first frame: 83.899894000 seconds] Frame Number: 206925 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60544, Dst Port: 4840, Seq: 592, Ack: 1506, Len: 79 Source Port: 60544 Destination Port: 4840 Source or Destination Port: 60544 Source or Destination Port: 4840 [Stream index: 115] [TCP Segment Len: 79] Sequence Number: 592 (relative sequence number) Sequence Number (raw): 1951041822 [Next Sequence Number: 671 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 1858311299 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3585 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206926 83.903224 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 206926: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.433415000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.433415000 seconds [Time delta from previous captured frame: 0.003330000 seconds] [Time delta from previous displayed frame: 0.003330000 seconds] [Time since reference or first frame: 83.903224000 seconds] Frame Number: 206926 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60544, Seq: 1506, Ack: 671, Len: 52 Source Port: 4840 Destination Port: 60544 Source or Destination Port: 4840 Source or Destination Port: 60544 [Stream index: 115] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 1858311299 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 671 (relative ack number) Acknowledgment number (raw): 1951041901 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0x7988 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3585 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 206927 83.903464 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 206927: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:16.433655000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804336.433655000 seconds [Time delta from previous captured frame: 0.000240000 seconds] [Time delta from previous displayed frame: 0.000240000 seconds] [Time since reference or first frame: 83.903464000 seconds] Frame Number: 206927 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60544, Dst Port: 4840, Seq: 671, Ack: 1558, Len: 57 Source Port: 60544 Destination Port: 4840 Source or Destination Port: 60544 Source or Destination Port: 4840 [Stream index: 115] [TCP Segment Len: 57] Sequence Number: 671 (relative sequence number) Sequence Number (raw): 1951041901 [Next Sequence Number: 728 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 1858311351 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3585 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object No. Time Source Destination Protocol Length Info 207750 93.912888 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 207750: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.443079000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.443079000 seconds [Time delta from previous captured frame: 0.000154000 seconds] [Time delta from previous displayed frame: 10.009424000 seconds] [Time since reference or first frame: 93.912888000 seconds] Frame Number: 207750 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60552, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60552 Destination Port: 4840 Source or Destination Port: 60552 Source or Destination Port: 4840 [Stream index: 119] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 2916080250 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 3405059003 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 207751 93.914069 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 207751: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.444260000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.444260000 seconds [Time delta from previous captured frame: 0.001181000 seconds] [Time delta from previous displayed frame: 0.001181000 seconds] [Time since reference or first frame: 93.914069000 seconds] Frame Number: 207751 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60552, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60552 Source or Destination Port: 4840 Source or Destination Port: 60552 [Stream index: 119] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 3405059003 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 2916080307 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x1716 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194240 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 207752 93.914306 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 207752: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.444497000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.444497000 seconds [Time delta from previous captured frame: 0.000237000 seconds] [Time delta from previous displayed frame: 0.000237000 seconds] [Time since reference or first frame: 93.914306000 seconds] Frame Number: 207752 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60552, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60552 Destination Port: 4840 Source or Destination Port: 60552 Source or Destination Port: 4840 [Stream index: 119] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 2916080307 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 3405059031 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 207753 93.916121 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 207753: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.446312000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.446312000 seconds [Time delta from previous captured frame: 0.001815000 seconds] [Time delta from previous displayed frame: 0.001815000 seconds] [Time since reference or first frame: 93.916121000 seconds] Frame Number: 207753 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60552, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60552 Source or Destination Port: 4840 Source or Destination Port: 60552 [Stream index: 119] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 3405059031 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 2916080439 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xecce [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3587 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 207754 93.916368 10.1.21.102 10.3.95.2 OpcUa 148 UA Secure Conversation Message: GetEndpointsRequest Frame 207754: 148 bytes on wire (1184 bits), 148 bytes captured (1184 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.446559000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.446559000 seconds [Time delta from previous captured frame: 0.000247000 seconds] [Time delta from previous displayed frame: 0.000247000 seconds] [Time since reference or first frame: 93.916368000 seconds] Frame Number: 207754 Frame Length: 148 bytes (1184 bits) Capture Length: 148 bytes (1184 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60552, Dst Port: 4840, Seq: 190, Ack: 164, Len: 94 Source Port: 60552 Destination Port: 4840 Source or Destination Port: 60552 Source or Destination Port: 4840 [Stream index: 119] [TCP Segment Len: 94] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 2916080439 [Next Sequence Number: 284 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 3405059166 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x88e4 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (94 bytes) [PDU Size: 94] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 94 SecureChannelId: 3587 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 207790 93.925207 10.3.95.2 10.1.21.102 OpcUa 597 UA Secure Conversation Message: GetEndpointsResponse Frame 207790: 597 bytes on wire (4776 bits), 597 bytes captured (4776 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.455398000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.455398000 seconds [Time delta from previous captured frame: 0.000000000 seconds] [Time delta from previous displayed frame: 0.008839000 seconds] [Time since reference or first frame: 93.925207000 seconds] Frame Number: 207790 Frame Length: 597 bytes (4776 bits) Capture Length: 597 bytes (4776 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60552, Seq: 33744, Ack: 284, Len: 543 Source Port: 4840 Destination Port: 60552 Source or Destination Port: 4840 Source or Destination Port: 60552 [Stream index: 119] [TCP Segment Len: 543] Sequence Number: 33744 (relative sequence number) Sequence Number (raw): 3405092746 [Next Sequence Number: 34287 (relative sequence number)] Acknowledgment Number: 284 (relative ack number) Acknowledgment number (raw): 2916080533 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 255 [Calculated window size: 65280] [Window size scaling factor: 256] Checksum: 0xdc3b [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (543 bytes) [PDU Size: 34123] TCP segment data (543 bytes) [24 Reassembled TCP Segments (34123 bytes): #207756(1460), #207757(1460), #207759(1460), #207760(1460), #207762(1460), #207763(1460), #207765(1460), #207766(1460), #207768(1460), #207769(1460), #207771(1460), #207772(1460), #207773(1460), #] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 34123 SecureChannelId: 3587 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 207792 93.925724 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 207792: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.455915000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.455915000 seconds [Time delta from previous captured frame: 0.000480000 seconds] [Time delta from previous displayed frame: 0.000517000 seconds] [Time since reference or first frame: 93.925724000 seconds] Frame Number: 207792 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60552, Dst Port: 4840, Seq: 284, Ack: 34287, Len: 57 Source Port: 60552 Destination Port: 4840 Source or Destination Port: 60552 Source or Destination Port: 4840 [Stream index: 119] [TCP Segment Len: 57] Sequence Number: 284 (relative sequence number) Sequence Number (raw): 2916080533 [Next Sequence Number: 341 (relative sequence number)] Acknowledgment Number: 34287 (relative ack number) Acknowledgment number (raw): 3405093289 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3587 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 Message : Encodeable Object No. Time Source Destination Protocol Length Info 207800 93.934767 10.1.21.102 10.3.95.2 OpcUa 111 Hello message Frame 207800: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.464958000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.464958000 seconds [Time delta from previous captured frame: 0.000126000 seconds] [Time delta from previous displayed frame: 0.009043000 seconds] [Time since reference or first frame: 93.934767000 seconds] Frame Number: 207800 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60553, Dst Port: 4840, Seq: 1, Ack: 1, Len: 57 Source Port: 60553 Destination Port: 4840 Source or Destination Port: 60553 Source or Destination Port: 4840 [Stream index: 120] [TCP Segment Len: 57] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 1239023589 [Next Sequence Number: 58 (relative sequence number)] Acknowledgment Number: 1 (relative ack number) Acknowledgment number (raw): 3231507111 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: HEL Chunk Type: F Message Size: 57 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 0 EndpointUrl: opc.tcp://cnc8065-1:4840/ No. Time Source Destination Protocol Length Info 207801 93.936020 10.3.95.2 10.1.21.102 OpcUa 82 Acknowledge message Frame 207801: 82 bytes on wire (656 bits), 82 bytes captured (656 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.466211000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.466211000 seconds [Time delta from previous captured frame: 0.001253000 seconds] [Time delta from previous displayed frame: 0.001253000 seconds] [Time since reference or first frame: 93.936020000 seconds] Frame Number: 207801 Frame Length: 82 bytes (656 bits) Capture Length: 82 bytes (656 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60553, Seq: 1, Ack: 58, Len: 28 Source Port: 4840 Destination Port: 60553 Source or Destination Port: 4840 Source or Destination Port: 60553 [Stream index: 120] [TCP Segment Len: 28] Sequence Number: 1 (relative sequence number) Sequence Number (raw): 3231507111 [Next Sequence Number: 29 (relative sequence number)] Acknowledgment Number: 58 (relative ack number) Acknowledgment number (raw): 1239023646 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0x510c [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (28 bytes) [PDU Size: 28] OpcUa Binary Protocol Message Type: ACK Chunk Type: F Message Size: 28 Version: 0 ReceiveBufferSize: 65535 SendBufferSize: 65535 MaxMessageSize: 4194304 MaxChunkCount: 65535 No. Time Source Destination Protocol Length Info 207802 93.936235 10.1.21.102 10.3.95.2 OpcUa 186 OpenSecureChannel message: OpenSecureChannelRequest Frame 207802: 186 bytes on wire (1488 bits), 186 bytes captured (1488 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.466426000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.466426000 seconds [Time delta from previous captured frame: 0.000215000 seconds] [Time delta from previous displayed frame: 0.000215000 seconds] [Time since reference or first frame: 93.936235000 seconds] Frame Number: 207802 Frame Length: 186 bytes (1488 bits) Capture Length: 186 bytes (1488 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60553, Dst Port: 4840, Seq: 58, Ack: 29, Len: 132 Source Port: 60553 Destination Port: 4840 Source or Destination Port: 60553 Source or Destination Port: 4840 [Stream index: 120] [TCP Segment Len: 132] Sequence Number: 58 (relative sequence number) Sequence Number (raw): 1239023646 [Next Sequence Number: 190 (relative sequence number)] Acknowledgment Number: 29 (relative ack number) Acknowledgment number (raw): 3231507139 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x890a [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (132 bytes) [PDU Size: 132] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 132 SecureChannelId: 0 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 207803 93.938253 10.3.95.2 10.1.21.102 OpcUa 189 OpenSecureChannel message: OpenSecureChannelResponse Frame 207803: 189 bytes on wire (1512 bits), 189 bytes captured (1512 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.468444000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.468444000 seconds [Time delta from previous captured frame: 0.002018000 seconds] [Time delta from previous displayed frame: 0.002018000 seconds] [Time since reference or first frame: 93.938253000 seconds] Frame Number: 207803 Frame Length: 189 bytes (1512 bits) Capture Length: 189 bytes (1512 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60553, Seq: 29, Ack: 190, Len: 135 Source Port: 4840 Destination Port: 60553 Source or Destination Port: 4840 Source or Destination Port: 60553 [Stream index: 120] [TCP Segment Len: 135] Sequence Number: 29 (relative sequence number) Sequence Number (raw): 3231507139 [Next Sequence Number: 164 (relative sequence number)] Acknowledgment Number: 190 (relative ack number) Acknowledgment number (raw): 1239023778 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 256 [Calculated window size: 65536] [Window size scaling factor: 256] Checksum: 0xaefd [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (135 bytes) [PDU Size: 135] OpcUa Binary Protocol Message Type: OPN Chunk Type: F Message Size: 135 SecureChannelId: 3588 SecurityPolicyUri: http://opcfoundation.org/UA/SecurityPolicy#None SenderCertificate: [OpcUa Null ByteString] ReceiverCertificateThumbprint: [OpcUa Null ByteString] SequenceNumber: 1 RequestId: 2 Message : Encodeable Object No. Time Source Destination Protocol Length Info 207804 93.938482 10.1.21.102 10.3.95.2 OpcUa 456 UA Secure Conversation Message: CreateSessionRequest Frame 207804: 456 bytes on wire (3648 bits), 456 bytes captured (3648 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.468673000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.468673000 seconds [Time delta from previous captured frame: 0.000229000 seconds] [Time delta from previous displayed frame: 0.000229000 seconds] [Time since reference or first frame: 93.938482000 seconds] Frame Number: 207804 Frame Length: 456 bytes (3648 bits) Capture Length: 456 bytes (3648 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60553, Dst Port: 4840, Seq: 190, Ack: 164, Len: 402 Source Port: 60553 Destination Port: 4840 Source or Destination Port: 60553 Source or Destination Port: 4840 [Stream index: 120] [TCP Segment Len: 402] Sequence Number: 190 (relative sequence number) Sequence Number (raw): 1239023778 [Next Sequence Number: 592 (relative sequence number)] Acknowledgment Number: 164 (relative ack number) Acknowledgment number (raw): 3231507274 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8211 [Calculated window size: 2102016] [Window size scaling factor: 256] Checksum: 0x8a18 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (402 bytes) [PDU Size: 402] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 402 SecureChannelId: 3588 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 207805 93.945814 10.3.95.2 10.1.21.102 OpcUa 1396 UA Secure Conversation Message: CreateSessionResponse Frame 207805: 1396 bytes on wire (11168 bits), 1396 bytes captured (11168 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.476005000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.476005000 seconds [Time delta from previous captured frame: 0.007332000 seconds] [Time delta from previous displayed frame: 0.007332000 seconds] [Time since reference or first frame: 93.945814000 seconds] Frame Number: 207805 Frame Length: 1396 bytes (11168 bits) Capture Length: 1396 bytes (11168 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60553, Seq: 164, Ack: 592, Len: 1342 Source Port: 4840 Destination Port: 60553 Source or Destination Port: 4840 Source or Destination Port: 60553 [Stream index: 120] [TCP Segment Len: 1342] Sequence Number: 164 (relative sequence number) Sequence Number (raw): 3231507274 [Next Sequence Number: 1506 (relative sequence number)] Acknowledgment Number: 592 (relative ack number) Acknowledgment number (raw): 1239024180 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0xaf15 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (1342 bytes) [PDU Size: 1342] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 1342 SecureChannelId: 3588 Security Token Id: 1 Security Sequence Number: 2 Security RequestId: 1 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 207806 93.946511 10.1.21.102 10.3.95.2 OpcUa 133 UA Secure Conversation Message: CloseSessionRequest Frame 207806: 133 bytes on wire (1064 bits), 133 bytes captured (1064 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.476702000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.476702000 seconds [Time delta from previous captured frame: 0.000697000 seconds] [Time delta from previous displayed frame: 0.000697000 seconds] [Time since reference or first frame: 93.946511000 seconds] Frame Number: 207806 Frame Length: 133 bytes (1064 bits) Capture Length: 133 bytes (1064 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60553, Dst Port: 4840, Seq: 592, Ack: 1506, Len: 79 Source Port: 60553 Destination Port: 4840 Source or Destination Port: 60553 Source or Destination Port: 4840 [Stream index: 120] [TCP Segment Len: 79] Sequence Number: 592 (relative sequence number) Sequence Number (raw): 1239024180 [Next Sequence Number: 671 (relative sequence number)] Acknowledgment Number: 1506 (relative ack number) Acknowledgment number (raw): 3231508616 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88d5 [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (79 bytes) [PDU Size: 79] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 79 SecureChannelId: 3588 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 207807 93.949964 10.3.95.2 10.1.21.102 OpcUa 106 UA Secure Conversation Message: CloseSessionResponse Frame 207807: 106 bytes on wire (848 bits), 106 bytes captured (848 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.480155000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.480155000 seconds [Time delta from previous captured frame: 0.003453000 seconds] [Time delta from previous displayed frame: 0.003453000 seconds] [Time since reference or first frame: 93.949964000 seconds] Frame Number: 207807 Frame Length: 106 bytes (848 bits) Capture Length: 106 bytes (848 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: WatchGua_03:17:b8 (00:01:21:03:17:b8), Dst: VMware_bb:6e:38 (00:50:56:bb:6e:38) Internet Protocol Version 4, Src: 10.3.95.2, Dst: 10.1.21.102 Transmission Control Protocol, Src Port: 4840, Dst Port: 60553, Seq: 1506, Ack: 671, Len: 52 Source Port: 4840 Destination Port: 60553 Source or Destination Port: 4840 Source or Destination Port: 60553 [Stream index: 120] [TCP Segment Len: 52] Sequence Number: 1506 (relative sequence number) Sequence Number (raw): 3231508616 [Next Sequence Number: 1558 (relative sequence number)] Acknowledgment Number: 671 (relative ack number) Acknowledgment number (raw): 1239024259 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 254 [Calculated window size: 65024] [Window size scaling factor: 256] Checksum: 0xa50f [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (52 bytes) [PDU Size: 52] OpcUa Binary Protocol Message Type: MSG Chunk Type: F Message Size: 52 SecureChannelId: 3588 Security Token Id: 1 Security Sequence Number: 3 Security RequestId: 3 OpcUa Service : Encodeable Object No. Time Source Destination Protocol Length Info 207808 93.950217 10.1.21.102 10.3.95.2 OpcUa 111 CloseSecureChannel message: CloseSecureChannelRequest Frame 207808: 111 bytes on wire (888 bits), 111 bytes captured (888 bits) on interface \Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}, id 0 Interface id: 0 (\Device\NPF_{0A4AD5F4-202C-4FC9-89C8-3B6B0150C97F}) Encapsulation type: Ethernet (1) Arrival Time: Feb 8, 2021 18:12:26.480408000 W. Europe Standard Time [Time shift for this packet: 0.000000000 seconds] Epoch Time: 1612804346.480408000 seconds [Time delta from previous captured frame: 0.000253000 seconds] [Time delta from previous displayed frame: 0.000253000 seconds] [Time since reference or first frame: 93.950217000 seconds] Frame Number: 207808 Frame Length: 111 bytes (888 bits) Capture Length: 111 bytes (888 bits) [Frame is marked: False] [Frame is ignored: False] [Protocols in frame: eth:ethertype:ip:tcp:opcua] [Coloring Rule Name: TCP] [Coloring Rule String: tcp] Ethernet II, Src: VMware_bb:6e:38 (00:50:56:bb:6e:38), Dst: IETF-VRRP-VRID_33 (00:00:5e:00:01:33) Internet Protocol Version 4, Src: 10.1.21.102, Dst: 10.3.95.2 Transmission Control Protocol, Src Port: 60553, Dst Port: 4840, Seq: 671, Ack: 1558, Len: 57 Source Port: 60553 Destination Port: 4840 Source or Destination Port: 60553 Source or Destination Port: 4840 [Stream index: 120] [TCP Segment Len: 57] Sequence Number: 671 (relative sequence number) Sequence Number (raw): 1239024259 [Next Sequence Number: 728 (relative sequence number)] Acknowledgment Number: 1558 (relative ack number) Acknowledgment number (raw): 3231508668 0101 .... = Header Length: 20 bytes (5) Flags: 0x018 (PSH, ACK) Window: 8212 [Calculated window size: 2102272] [Window size scaling factor: 256] Checksum: 0x88bf [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 [SEQ/ACK analysis] [Timestamps] TCP payload (57 bytes) [PDU Size: 57] OpcUa Binary Protocol Message Type: CLO Chunk Type: F Message Size: 57 SecureChannelId: 3588 Security Token Id: 1 Security Sequence Number: 4 Security RequestId: 4 Message : Encodeable Object