This is the output of tcpdump -i internal
listening on internal, link-type EN10MB (Ethernet), capture size 262144 bytes
19:47:06.160352 IP 192.168.1.221.55338 > dns.google.domain: Flags [S], seq 1476596982, win 64240, options [mss 1460,sackOK,TS val 1932557156 ecr 0,nop,wscale 7], length 0
19:47:08.630749 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1012, seq 1, length 64
19:47:09.644628 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1012, seq 2, length 64
19:47:10.412388 IP 192.168.1.221.55338 > dns.google.domain: Flags [S], seq 1476596982, win 64240, options [mss 1460,sackOK,TS val 1932561408 ecr 0,nop,wscale 7], length 0
19:47:10.668484 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1012, seq 3, length 64
19:47:11.692481 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1012, seq 4, length 64
19:47:12.716955 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1012, seq 5, length 64
19:47:13.372143 IP 192.168.1.221.39474 > dns.google.domain: 64632+ AAAA? api.snapcraft.io. (34)
19:47:13.740569 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1012, seq 6, length 64
19:47:16.770325 IP 192.168.1.221.46169 > dns.google.domain: 10712+ A? api.snapcraft.io. (34)
19:47:18.621793 IP 192.168.1.221.47061 > dns.google.domain: 64632+ AAAA? api.snapcraft.io. (34)
19:47:21.773896 IP 192.168.1.221.44700 > dns.google.domain: Flags [S], seq 2243332184, win 64240, options [mss 1460,sackOK,TS val 1798209497 ecr 0,nop,wscale 7,tfo cookiereq,nop,nop], length 0
19:47:22.796646 IP 192.168.1.221.44700 > dns.google.domain: Flags [S], seq 2243332184, win 64240, options [mss 1460,sackOK,TS val 1798210520 ecr 0,nop,wscale 7], length 0
19:47:23.871802 IP 192.168.1.221.47061 > dns.google.domain: 64632+ AAAA? api.snapcraft.io. (34)
19:47:24.812820 IP 192.168.1.221.44700 > dns.google.domain: Flags [S], seq 2243332184, win 64240, options [mss 1460,sackOK,TS val 1798212536 ecr 0,nop,wscale 7], length 0
19:47:28.844471 IP 192.168.1.221.44700 > dns.google.domain: Flags [S], seq 2243332184, win 64240, options [mss 1460,sackOK,TS val 1798216568 ecr 0,nop,wscale 7], length 0
19:47:28.896361 IP 192.168.1.1 > 192.168.1.221: ICMP echo request, id 1091, seq 1, length 64
19:47:29.868343 ARP, Request who-has 192.168.1.1 tell 192.168.1.221, length 28
19:47:29.868548 ARP, Reply 192.168.1.1 is-at 00:16:3e:db:26:43 (oui Unknown), length 28
19:47:29.900489 IP 192.168.1.1 > 192.168.1.221: ICMP echo request, id 1091, seq 2, length 64
19:47:30.924894 IP 192.168.1.1 > 192.168.1.221: ICMP echo request, id 1091, seq 3, length 64
19:47:31.871972 IP 192.168.1.221.51561 > dns.google.domain: 10712+ A? api.snapcraft.io. (34)
19:47:31.948437 IP 192.168.1.1 > 192.168.1.221: ICMP echo request, id 1091, seq 4, length 64
19:47:32.972489 IP 192.168.1.1 > 192.168.1.221: ICMP echo request, id 1091, seq 5, length 64
19:47:33.964337 ARP, Request who-has 192.168.1.221 tell 192.168.1.1, length 28
19:47:33.964531 ARP, Reply 192.168.1.221 is-at 00:16:3e:7e:a1:af (oui Unknown), length 28
19:47:37.121989 IP 192.168.1.221.44702 > dns.google.domain: Flags [S], seq 4040712644, win 64240, options [mss 1460,sackOK,TS val 1798224845 ecr 0,nop,wscale 7,tfo cookiereq,nop,nop], length 0
19:47:38.124410 IP 192.168.1.221.44702 > dns.google.domain: Flags [S], seq 4040712644, win 64240, options [mss 1460,sackOK,TS val 1798225848 ecr 0,nop,wscale 7], length 0
19:47:40.140762 IP 192.168.1.221.44702 > dns.google.domain: Flags [S], seq 4040712644, win 64240, options [mss 1460,sackOK,TS val 1798227864 ecr 0,nop,wscale 7], length 0
and this is the output of tcpdump -i eth0
from client when i try to ping server
12:49:46.700534 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1023, seq 3, length 64
12:49:47.724486 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1023, seq 4, length 64
12:49:48.748511 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1023, seq 5, length 64
12:49:49.772921 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1023, seq 6, length 64
12:49:50.796508 IP 192.168.1.221 > 192.168.1.1: ICMP echo request, id 1023, seq 7, length 64