tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth2, link-type EN10MB (Ethernet), capture size 262144 bytes 15:25:07.585524 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:07.585620 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:08.594594 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:08.594749 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:09.987484 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:09.987554 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:10.608419 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:10.608563 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:13.187475 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:13.187515 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:14.610798 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:14.610974 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:18.987440 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:18.987446 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242 109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 1 0], length 0 15:25:22.623852 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 10], length 0 15:25:22.623996 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 10], length 0 15:25:30.787177 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 10], length 0 15:25:30.787181 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 10], length 0 15:25:46.786765 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 10], length 0 15:25:46.786857 IP 10.14.112.6.19009 > 10.11.111.230.61937: Flags [S.], seq 2242109651, ack 2406768555, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 10], length 0 ^C 20 packets captured 22 packets received by filter 0 packets dropped by kernel