here the output from both routers:
x5000r
root@OpenWrt:~# tcpdump -p -n -i phy0-ap0 ether host 18:fe:34:cc:a6:2f
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on phy0-ap0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
13:26:05.737146 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:06.777152 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:28.588515 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
13:26:28.588717 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
13:26:30.206913 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.207030 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.208637 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
13:26:30.214827 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.214913 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
13:26:30.216768 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
13:26:30.218914 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
13:26:30.218999 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
13:26:30.229627 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
13:26:30.229708 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
13:26:30.229851 ARP, Reply 192.168.8.1 is-at 1c:56:8e:2c:62:18, length 28
13:26:30.232407 IP 192.168.8.165.49384 > 192.168.1.1.123: NTPv4, Client, length 48
13:26:30.234276 IP 192.168.1.1.123 > 192.168.8.165.49384: NTPv4, Server, length 48
13:26:30.246283 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [S], seq 6509, win 2144, options [mss 536,nop,nop,sackOK], length 0
13:26:30.247634 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [S.], seq 4084295373, ack 6510, win 64240, options [mss 1460,nop,nop,sackOK], length 0
13:26:30.249908 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [.], ack 1, win 2144, length 0
13:26:30.256214 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [P.], seq 1:24, ack 1, win 2144, length 23
13:26:30.256621 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [.], ack 24, win 64217, length 0
13:26:30.256750 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [P.], seq 1:5, ack 24, win 64217, length 4
13:26:30.269672 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [P.], seq 24:137, ack 5, win 2140, length 113
13:26:30.270125 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [.], ack 137, win 64104, length 0
13:26:30.313490 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [P.], seq 137:139, ack 5, win 2140, length 2
13:26:30.313961 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [.], ack 139, win 64102, length 0
13:26:30.314120 IP 192.168.1.32.1883 > 192.168.8.165.49924: Flags [F.], seq 5, ack 139, win 64102, length 0
13:26:30.315948 IP 192.168.8.165.49924 > 192.168.1.32.1883: Flags [R.], seq 139, ack 6, win 24584, length 0
13:26:35.257134 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:36.297145 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
13:26:37.337150 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
GL-AR300M
root@GL-AR300M:~# tcpdump -p -n -i wlan0 ether host 18:fe:34:cc:a6:2f
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 262144 bytes
14:37:03.846465 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
14:37:03.846570 18:fe:34:cc:a6:2f > ff:ff:ff:ff:ff:ff Null Unnumbered, xid, Flags [Response], length 6: 01 00
14:37:03.850219 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.850391 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.855904 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
14:37:03.865519 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.865691 IP 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 18:fe:34:cc:a6:2f, length 308
14:37:03.869819 IP 192.168.8.1.67 > 192.168.8.165.68: BOOTP/DHCP, Reply, length 300
14:37:03.877179 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
14:37:03.877264 ARP, Request who-has 192.168.8.165 tell 192.168.8.165, length 28
14:37:03.885075 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
14:37:03.885148 ARP, Request who-has 192.168.8.1 tell 192.168.8.165, length 28
14:37:03.885366 ARP, Reply 192.168.8.1 is-at 94:83:c4:33:c3:18, length 28
14:37:03.887623 IP 192.168.8.165.59521 > 192.168.1.1.123: NTPv4, Client, length 48
14:37:03.890290 IP 192.168.1.1.123 > 192.168.8.165.59521: NTPv4, Server, length 48
14:37:03.902989 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [S], seq 6509, win 2144, options [mss 536,nop,nop,sackOK], length 0
14:37:03.904199 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [S.], seq 1228306853, ack 6510, win 64240, options [mss 1460,nop,nop,sackOK], length 0
14:37:03.915650 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [.], ack 1, win 2144, length 0
14:37:03.917353 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [P.], seq 1:24, ack 1, win 2144, length 23
14:37:03.925329 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [P.], seq 24:134, ack 5, win 2140, length 110
14:37:03.973443 IP 192.168.8.165.65103 > 192.168.1.32.1883: Flags [P.], seq 134:136, ack 5, win 2140, length 2
14:37:03.974191 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:04.186130 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 0, length 64
14:37:04.186967 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:04.402963 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:04.854966 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:05.188347 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 1, length 64
14:37:05.719155 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:06.188730 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 2, length 64
14:37:07.189125 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 3, length 64
14:37:07.447127 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0
14:37:08.189508 IP 192.168.8.1 > 192.168.8.165: ICMP echo request, id 11874, seq 4, length 64
14:37:08.904462 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
14:37:09.944472 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
14:37:10.551102 IP 192.168.1.32.1883 > 192.168.8.165.59341: Flags [F.], seq 2913025962, ack 6645, win 64105, length 0
14:37:10.984501 ARP, Request who-has 192.168.8.165 tell 192.168.8.1, length 28
14:37:11.063131 IP 192.168.1.32.1883 > 192.168.8.165.65103: Flags [F.], seq 5, ack 136, win 64105, length 0