|
Hi sir,
We are using Intel ESB2 BMC firmware on out
platform.
But we meet some problems when using IPMITool
with lanplus.
Could you help me to find out the
possible failed reason when I exectuted the following command
:
ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin raw 0x6
0x01
Here is the return :
RAW REQ (netfn=0x6 cmd=0x1
data_len=0)
IPMI LAN host 192.168.0.11 port 623 >> Sending IPMI command
payload
>> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND
>> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 04 b5 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 95 05 03 00 00 00 00 0a << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48
bytes)
06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 00 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 00 00 a4 a3 a2 a0 f3 86 36 0d 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : Unknown (0x00) << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0d3686f3 << Negotiated authenticatin algorithm : none << Negotiated integrity algorithm : none << Negotiated encryption algorithm : none >> Console generated random number (16
bytes)
be c2 e5 3f 14 20 16 29 61 c4 f2 1c 40 66 02 60 >> SENDING A RAKP 1 MESSAGE >> sending packet (49
bytes)
06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 00 00 00 00 f3 86 36 0d be c2 e5 3f 14 20 16 29 61 c4 f2 1c 40 66 02 60 14 00 00 05 61 64 6d 69 6e << Received data (56 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 00 00 00 00 a4 a3 a2 a0 31 a2 b2 77 b0 4b 74 f3 43 52 bf de 2e a1 32 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0x31a2b277b04b74f34352bfde2ea13286 << BMC GUID : 0x00000000000000000000000000000000 << Key exchange auth code : none bmc_rand (16 bytes)
31 a2 b2 77 b0 4b 74 f3 43 52 bf de 2e a1 32 86 Generated K1 (20 bytes) 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 Generated K2 (20 bytes) 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 >> SENDING A RAKP 3 MESSAGE >> sending packet (24
bytes)
06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 00 00 00 00 f3 86 36 0d << Received data (24 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 00 00 00 00 a4 a3 a2 a0 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code : none IPMIv2 / RMCP+ SESSION OPENED
SUCCESSFULLY
>> Sending IPMI command payload >> netfn : 0x06 >> command : 0x01 >> data : BUILDING A v2 COMMAND
>> sending packet (23 bytes) 06 00 ff 07 06 00 f3 86 36 0d 03 00 00 00 07 00 20 18 c8 81 00 01 7e << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 08 00 81 1c 63 20 00 01 c1 1e << IPMI Response Session Header << Authtype : Unknown (0x06) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 01 << Compl Code : 0xc1 Unable to send RAW command (netfn=0x6 cmd=0x1 rsp=0xc1): Invalid command >> Sending IPMI command payload
>> netfn : 0x06 >> command : 0x3c >> data : 0xf3 0x86 0x36 0x0d BUILDING A v2 COMMAND
>> sending packet (27 bytes) 06 00 ff 07 06 00 f3 86 36 0d 04 00 00 00 0b 00 20 18 c8 81 00 3c f3 86 36 0d 87 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 81 1c 63 20 00 3c c1 e3 << IPMI Response Session Header << Authtype : Unknown (0x06) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 3c << Compl Code : 0xc1 Close Session command failed: Invalid command Best regards,
IWILL Corporation Software Engineer Jack Hsu 886-2-2290-0091 ext 306 |
------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________ Ipmitool-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
