Hi, thank you. Please see the reply to Dameon above as well. Below is the output of my connection. First is the telnet attempt and the second is the output from another putty session on the same gateway so that I could capture the traffic when I attempted the telnet connection. Also added a traceroute, third.
[Expert@Firewall6:0]# telnet 10.10.10.20 18264
Trying 10.10.10.20...
Connected to 10.10.10.20.
Escape character is '^]'.
[Expert@Firewall6:0]# fw monitor -e "accept port(18264) and host(10.10.10.20) ;"
monitor: getting filter (from command line)
monitor: compiling
monitorfilter:
Compiled OK.
monitor: loading
monitor: monitoring (control-C to stop)
[vs_0][fw_0] s0p4:o[60]: 10.10.10.101 -> 10.10.10.20 (TCP) len=60 id=29859
TCP: 45230 -> 18264 .S.... seq=856b7df8 ack=00000000
[vs_0][fw_0] s0p4:O[60]: 10.10.10.101 -> 10.10.10.20 (TCP) len=60 id=29859
TCP: 45230 -> 18264 .S.... seq=856b7df8 ack=00000000
[vs_0][fw_0] s0p4:i[60]: 10.10.10.20 -> 10.10.10.101 (TCP) len=60 id=0
TCP: 18264 -> 45230 .S..A. seq=e7a98a7c ack=856b7df9
[vs_0][fw_0] s0p4:I[60]: 10.10.10.20 -> 10.10.10.101 (TCP) len=60 id=0
TCP: 18264 -> 45230 .S..A. seq=e7a98a7c ack=856b7df9
[vs_0][fw_0] s0p4:o[52]: 10.10.10.101 -> 10.10.10.20 (TCP) len=52 id=29860
TCP: 45230 -> 18264 ....A. seq=856b7df9 ack=e7a98a7d
[vs_0][fw_0] s0p4:O[52]: 10.10.10.101 -> 10.10.10.20 (TCP) len=52 id=29860
TCP: 45230 -> 18264 ....A. seq=856b7df9 ack=e7a98a7d
[Expert@Firewall6:0]# traceroute 10.10.10.20
traceroute to 10.10.10.20 (10.10.10.20), 30 hops max, 40 byte packets
1 mgmt101.domainname.com (10.10.10.20) 0.735 ms 0.697 ms 0.698 ms
[Expert@Firewall6:0]#