tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
01:38:42.903124 IP 192.168.137.1.49849 > node2.8090: Flags [S], seq 2621825734, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
01:38:42.903154 IP node2.8090 > 192.168.137.1.49849: Flags [S.], seq 679337202, ack 2621825735, win 14600, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
01:38:42.903985 IP 192.168.137.1.49849 > node2.8090: Flags [.], ack 679337203, win 16425, length 0
01:38:42.904355 IP 192.168.137.1.49849 > node2.8090: Flags [P.], seq 2621825735:2621825818, ack 679337203, win 16425, length 83
01:38:42.904388 IP node2.8090 > 192.168.137.1.49849: Flags [.], ack 2621825818, win 115, length 0
01:38:42.904578 IP node2.8090 > 192.168.137.1.49849: Flags [P.], seq 679337203:679337775, ack 2621825818, win 115, length 572
01:38:42.943969 IP 192.168.137.1.49849 > node2.8090: Flags [F.], seq 2621825818, ack 679337775, win 16282, length 0
01:38:42.944164 IP node2.8090 > 192.168.137.1.49849: Flags [F.], seq 679337775, ack 2621825819, win 115, length 0
01:38:42.944430 IP 192.168.137.1.49849 > node2.8090: Flags [.], ack 679337776, win 16282, length 0