HP Comware 5 Debug Manual Vol 1

option SIP_SERVER_D (21), len 9
bbb.com
// The DHCPv6 server sent a Reply message to the client, confirming that prefix assigned to the client is
2001:410::/48.
debugging ipv6 dhcp snooping
Use debugging ipv6 dhcp snooping to enable DHCPv6 snooping debugging.
Use undo debugging ipv6 dhcp snooping to disable DHCPv6 snooping debugging.
Syntax
debugging ipv6 dhcp snooping { all | error | event | packet }
undo debugging ipv6 dhcp snooping { all | error | event | packet }
Default
DHCPv6 snooping debugging is disabled.
Views
User view
Default command level
1: Monitor level
Parameters
all: Specifies all DHCPv6 snooping debugging.
error: Specifies DHCPv6 snooping error debugging.
event: Specifies DHCPv6 snooping event debugging.
packet: Specifies DHCPv6 snooping packet debugging.
Examples
# Enable DHCPv6 snooping packet debugging on a DHCPv6 snooping device. When the device
receives a DHCPv6 reply packet, output similar to the following example is generated:
<Sysname> terminal debugging
<Sysname> debugging ipv6 dhcp snooping packet
*Aug 19 16:53:46:212 2009 Sysname DHCPSP6/7/PACKET:
DHCPv6 snooping preprocessed a packet.
// DHCPv6 snooping pre-processed the packet.
*Aug 19 16:53:46:223 2009 Sysname DHCPSP6/7/PACKET:
DHCPv6 snooping started to process packets.
// DHCPv6 snooping started to process packets.
*Aug 19 16:53:46:233 2009 Sysname DHCPSP6/7/PACKET:
Received a DHCPv6 REPLY packet.
// The DHCPv6 reply packet was received.
*Aug 19 16:53:46:244 2009 Sysname DHCPSP6/7/PACKET:
DHCPv6 snooping started to transmit packets.
// DHCPv6 snooping started to forward packets.
*Aug 19 16:53:46:254 2009 Sysname DHCPSP6/7/PACKET:
377