HP Comware 5 Debug Manual Vol 2

// The TCP connection state changed to Established.
%Aug 4 02:09:23:686 2006 Sysname SHELL/4/LOGIN: VTY login from 2::3
debugging tcp ipv6 md5
Use debugging tcp ipv6 md5 to enable IPv6 TCP MD5 authentication debugging.
Use undo debugging tcp ipv6 md5 to disable IPv6 TCP MD5 authentication debugging.
Syntax
debugging tcp ipv6 md5
undo debugging tcp ipv6 md5
Default
IPv6 TCP MD5 authentication debugging is disabled.
Views
User view
Default command level
1: Monitor level
Examples
# Enable IPv6 TCP MD5 authentication debugging. Output similar to the following example is generated
when a TCP connection is initiated through MD5 authentication on an IPv6 network:
<Sysname> terminal debugging
<Sysname> debugging tcp ipv6 md5
<Sysname>
*Jun 22 14:31:31:558 2009 Sysname IPV6TCP/7/TCP6 MD5:
IP6TCP6 header: 0066000000000000000000000000000100660000000000000000000000000002
000000470000000600B3083D0C0265777A9CDD8ED018200000000000,
TCP6 data: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF001304,
MD5 info: 30313233
*Jun 22 14:31:31:558 2009 Sysname IPV6TCP/7/TCP6 MD5:
TCP6 MD5 option is added to packet, total option length is 32, MD5 digest is f73e
55f03ec0c1492cc0bc09dc107d3f
*Jun 22 14:31:31:558 2009 Sysname IPV6TCP/7/TCP6 PACKET:
1245681091: Output: task = ROUT(63), socketid = 3, state = Established,
src = 66::1->179, dst = 66::2->2109,
seq = 201483639, ack = 2057100686, datalen = 19, optlen = 32, flag = ACK PSH,
window = 8192
// MD5 encryption was performed on TCP packets on the IPv6 network, and the MD5 option was
added to the packets.
*Jun 22 14:31:31:615 2009 Sysname IPV6TCP/7/TCP6 PACKET:
1245681091: Input: task = ROUT(63), socketid = 3, state = Established,
src = 66::2->2109, dst = 66::1->179,
seq = 2057100686, ack = 201483658, optlen = 32, flag = ACK,
window = 8192
*Jun 22 14:31:31:615 2009 Sysname IPV6TCP/7/TCP6 MD5:
IP6TCP6 header: 0066000000000000000000000000000200660000000000000000000000000001
193