In addition to my previous post, here's what tcpdump captured while pinging google:
HN:
[08:51:31][~]> tcpdump -n -i venet0
tcpdump: WARNING: arptype 65535 not supported by libpcap - falling back to cooked socket
tcpdump: WARNING: venet0: no IPv4 address assigned
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on venet0, link-type LINUX_SLL (Linux cooked), capture size 96 bytes
08:51:48.180973 IP 11.22.33.44 > 64.233.167.99: icmp 64: echo request seq 0
08:51:49.180063 IP 11.22.33.44 > 64.233.167.99: icmp 64: echo request seq 1
08:51:50.179916 IP 11.22.33.44 > 64.233.167.99: icmp 64: echo request seq 2
08:51:51.179758 IP 11.22.33.44 > 64.233.167.99: icmp 64: echo request seq 3
4 packets captured
4 packets received by filter
0 packets dropped by kernel
VE:
[08:50:59][~]> vzctl enter 102
entered into VE 102
-bash-3.00# ping 64.233.167.99
PING 64.233.167.99 (64.233.167.99) 56(84) bytes of data.
--- 64.233.167.99 ping statistics ---
4 packets transmitted, 0 received, 100% packet loss, time 2998ms