HP Comware 5 Debug Manual Vol 1

Content filtering debugging commands
debugging content-filter
NOTE:
Support for the command depends on the device model.
Use debugging content-filter to enable debugging for content filtering.
Use undo debugging content-filter to disable debugging for content filtering.
Syntax
debugging content-filter { all | error | event | packet } [ acl acl-number ]
undo debugging content-filter { all | error | event | packet }
Default
Debugging for content filtering is disabled.
Views
User view
Default command level
1: Monitor level
Parameters
all: Specifies all types of content filtering debugging.
error: Specifies error debugging of content filtering.
event: Specifies event debugging of content filtering.
packet: Specifies packet debugging of content filtering.
acl acl-number: Specifies the ACL to be used to filter the debugging information. The acl-number
argument is the ACL number in the range of 2000 to 3999.
Usage guidelines
If you execute the command multiple times and specify different ACLs, the most recent configuration takes
effect.
Examples
The output in the following examples was created under the following conditions:
On the firewall, configure a content filtering policy template policy1, which includes an HTTP
filtering policy and an SMTP filtering policy. In the HTTP filtering policy, URL IP blocking is enabled.
On the firewall, configure an interzone policy named aaa, with the source zone Trust, destination
zone Untrust, and filter action Permit.
# Enable content filtering event debugging. When a host in zone Trust accesses an HTTP server in zone
Untrust through the server's IP address, output similar to the following example is generated:
<sysname> debugging content-filter event
321