Test
root@azsmposapp:~# sudo tcpdump -ni any port 4200
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
17:05:31.688342 ens192 In IP 10.209.33.48.52934 > 172.21.14.205.4200: Flags [S], seq 1207595787, win 65535, options [mss 1380,nop,wscale 6,nop,nop,TS val 4288998983 ecr 0,sackOK,eol], length 0
17:05:31.688373 ens192 Out IP 172.21.14.205.4200 > 10.209.33.48.52934: Flags [S.], seq 3019001108, ack 1207595788, win 65160, options [mss 1460,sackOK,TS val 2768021519 ecr 4288998983,nop,wscale 7], length 0
17:05:31.707975 ens192 In IP 10.209.33.48.52934 > 172.21.14.205.4200: Flags [.], ack 1, win 2052, options [nop,nop,TS val 4288999003 ecr 2768021519], length 0
17:05:47.611063 ens192 In IP 10.209.33.48.52934 > 172.21.14.205.4200: Flags [F.], seq 1, ack 1, win 2052, options [nop,nop,TS val 4289014905 ecr 2768021519], length 0
17:05:47.611221 ens192 Out IP 172.21.14.205.4200 > 10.209.33.48.52934: Flags [F.], seq 1, ack 2, win 510, options [nop,nop,TS val 2768037442 ecr 4289014905], length 0
17:05:47.631253 ens192 In IP 10.209.33.48.52934 > 172.21.14.205.4200: Flags [.], ack 2, win 2052, options [nop,nop,TS val 4289014926 ecr 2768037442], length 0
^]^C
6 packets captured
7 packets received by filter
0 packets dropped by kernel
root@azsmposapp:~# sudo tcpdump -ni any port 4202
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
17:06:15.990349 ens192 In IP 10.209.33.48.53377 > 172.21.14.205.4202: Flags [S], seq 422777784, win 65535, options [mss 1380,nop,wscale 6,nop,nop,TS val 2517738886 ecr 0,sackOK,eol], length 0
17:06:15.990390 ens192 Out IP 172.21.14.205.4202 > 10.209.33.48.53377: Flags [S.], seq 2445888727, ack 422777785, win 65160, options [mss 1460,sackOK,TS val 2768065821 ecr 2517738886,nop,wscale 7], length 0
17:06:16.013314 ens192 In IP 10.209.33.48.53377 > 172.21.14.205.4202: Flags [.], ack 1, win 2052, options [nop,nop,TS val 2517738922 ecr 2768065821], length 0
17:06:31.242807 ens192 In IP 10.209.33.48.53377 > 172.21.14.205.4202: Flags [F.], seq 1, ack 1, win 2052, options [nop,nop,TS val 2517754154 ecr 2768065821], length 0
17:06:31.243023 ens192 Out IP 172.21.14.205.4202 > 10.209.33.48.53377: Flags [F.], seq 1, ack 2, win 510, options [nop,nop,TS val 2768081074 ecr 2517754154], length 0
17:06:31.262647 ens192 In IP 10.209.33.48.53377 > 172.21.14.205.4202: Flags [.], ack 2, win 2052, options [nop,nop,TS val 2517754175 ecr 2768081074], length 0
^]^C
6 packets captured
8 packets received by filter
0 packets dropped by kernel
root@azsmposapp:~#