# tcpdump "port 2345" -i br0 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on br0, link-type EN10MB (Ethernet), capture size 262144 bytes 16:09:26.591790 IP 10.0.42.1.46212 > 10.0.42.20.2345: Flags [S], seq 3255497704, win 29200, options [mss 1460,sackOK,TS val 39448992 ecr 0,nop,wscale 7], length 0 16:09:27.612434 IP 10.0.42.1.46212 > 10.0.42.20.2345: Flags [S], seq 3255497704, win 29200, options [mss 1460,sackOK,TS val 39449248 ecr 0,nop,wscale 7], length 0 16:09:29.628449 IP 10.0.42.1.46212 > 10.0.42.20.2345: Flags [S], seq 3255497704, win 29200, options [mss 1460,sackOK,TS val 39449752 ecr 0,nop,wscale 7], length 0 16:09:33.884443 IP 10.0.42.1.46212 > 10.0.42.20.2345: Flags [S], seq 3255497704, win 29200, options [mss 1460,sackOK,TS val 39450816 ecr 0,nop,wscale 7], length 0