This is a tcpdump on the host (UCS5,s2) while I did a showmount from the client (192.169.10.50) onto it.
===============
20:17:37.099912 IP s2.botree.eu.ssh > 192.168.10.50.36468: Flags [P.], seq 2797746309:2797746497, ack 1003952726, win 501, options [nop,nop,TS val 3564488795 ecr 1860229806], length 188
20:17:37.100128 IP 192.168.10.50.36468 > s2.botree.eu.ssh: Flags [.], ack 188, win 4010, options [nop,nop,TS val 1860230124 ecr 3564488795], length 0
20:17:38.846809 IP 192.168.10.50.50804 > s2.botree.eu.sunrpc: Flags , seq 48392799, win 64240, options [mss 1460,sackOK,TS val 1860231870 ecr 0,nop,wscale 7], length 0
20:17:38.846860 IP s2.botree.eu.sunrpc > 192.168.10.50.50804: Flags [S.], seq 1309431153, ack 48392800, win 65160, options [mss 1460,sackOK,TS val 3564490542 ecr 1860231870,nop,wscale 7], length 0
20:17:38.847076 IP 192.168.10.50.50804 > s2.botree.eu.sunrpc: Flags [.], ack 1, win 502, options [nop,nop,TS val 1860231871 ecr 3564490542], length 0
20:17:38.847227 IP 192.168.10.50.50804 > s2.botree.eu.sunrpc: Flags [P.], seq 1:97, ack 1, win 502, options [nop,nop,TS val 1860231871 ecr 3564490542], length 96
20:17:38.847237 IP s2.botree.eu.sunrpc > 192.168.10.50.50804: Flags [.], ack 97, win 509, options [nop,nop,TS val 3564490542 ecr 1860231871], length 0
20:17:38.847388 IP s2.botree.eu.sunrpc > 192.168.10.50.50804: Flags [P.], seq 1:57, ack 97, win 509, options [nop,nop,TS val 3564490542 ecr 1860231871], length 56
20:17:38.847481 IP 192.168.10.50.50804 > s2.botree.eu.sunrpc: Flags [.], ack 57, win 502, options [nop,nop,TS val 1860231871 ecr 3564490542], length 0
20:17:38.847509 IP 192.168.10.50.50804 > s2.botree.eu.sunrpc: Flags [F.], seq 97, ack 57, win 502, options [nop,nop,TS val 1860231871 ecr 3564490542], length 0
20:17:38.847524 IP s2.botree.eu.sunrpc > 192.168.10.50.50804: Flags [F.], seq 57, ack 98, win 509, options [nop,nop,TS val 3564490542 ecr 1860231871], length 0
20:17:38.847580 IP 192.168.10.50.50804 > s2.botree.eu.sunrpc: Flags [.], ack 58, win 502, options [nop,nop,TS val 1860231871 ecr 3564490542], length 0
20:17:38.847595 IP 192.168.10.50.55486 > s2.botree.eu.32767: Flags , seq 879585070, win 64240, options [mss 1460,sackOK,TS val 1860231871 ecr 0,nop,wscale 7], length 0
20:17:38.847616 IP s2.botree.eu.32767 > 192.168.10.50.55486: Flags [S.], seq 3068447615, ack 879585071, win 65160, options [mss 1460,sackOK,TS val 3564490543 ecr 1860231871,nop,wscale 7], length 0
20:17:38.847725 IP 192.168.10.50.55486 > s2.botree.eu.32767: Flags [.], ack 1, win 502, options [nop,nop,TS val 1860231871 ecr 3564490543], length 0
20:17:38.847800 IP 192.168.10.50.55486 > s2.botree.eu.32767: Flags [P.], seq 1:77, ack 1, win 502, options [nop,nop,TS val 1860231871 ecr 3564490543], length 76
20:17:38.847808 IP s2.botree.eu.32767 > 192.168.10.50.55486: Flags [.], ack 77, win 509, options [nop,nop,TS val 3564490543 ecr 1860231871], length 0
20:17:38.847936 IP s2.botree.eu.32767 > 192.168.10.50.55486: Flags [P.], seq 1:33, ack 77, win 509, options [nop,nop,TS val 3564490543 ecr 1860231871], length 32
20:17:38.847999 IP 192.168.10.50.55486 > s2.botree.eu.32767: Flags [.], ack 33, win 502, options [nop,nop,TS val 1860231872 ecr 3564490543], length 0
20:17:38.848023 IP 192.168.10.50.55486 > s2.botree.eu.32767: Flags [F.], seq 77, ack 33, win 502, options [nop,nop,TS val 1860231872 ecr 3564490543], length 0
20:17:38.848042 IP s2.botree.eu.32767 > 192.168.10.50.55486: Flags [F.], seq 33, ack 78, win 509, options [nop,nop,TS val 3564490543 ecr 1860231872], length 0
20:17:38.848090 IP 192.168.10.50.55486 > s2.botree.eu.32767: Flags [.], ack 34, win 502, options [nop,nop,TS val 1860231872 ecr 3564490543], length 0
20:17:42.182798 ARP, Request who-has 192.168.10.51 tell s2.botree.eu, length 28