And then:
# tcpdump -nSe -i vmbr0 host 10.10.10.103
19:05:42.491957 46:2c:c5:c4:27:53 > 5a:ab:95:29:4a:7a, ethertype IPv4 (0x0800), length 74: 10.10.10.106.42036 > 10.10.10.103.443: Flags [S], seq 3043812723, win 65535, options [mss 1460,nop,wscale 6,sackOK,TS val 494310551 ecr 0], length 0...