Hi sir,
 
We are using Intel ESB2 BMC firmware on out platform.
But we meet some problems when using IPMITool with lanplus.
Could you help me to find out the possible failed reason when I exectuted the following command :
ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin raw 0x6 0x01
 
Here is the return :
RAW REQ (netfn=0x6 cmd=0x1 data_len=0)
IPMI LAN host 192.168.0.11 port 623
 
>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04
 
BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
>> sending packet (23 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
 c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
<< IPMI Response Session Header
<<   Authtype                : NONE
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 38
<<   Compl Code : 0x00
>> SENDING AN OPEN SESSION REQUEST
 
>> sending packet (48 bytes)
 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
 00 00 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
<< Received data (52 bytes)
 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
 00 00 00 00 a4 a3 a2 a0 f3 86 36 0d 00 00 00 08
 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
 00 00 00 00
<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : Unknown (0x00)
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x0d3686f3
<<  Negotiated authenticatin algorithm : none
<<  Negotiated integrity algorithm     : none
<<  Negotiated encryption algorithm    : none
 
>> Console generated random number (16 bytes)
 be c2 e5 3f 14 20 16 29 61 c4 f2 1c 40 66 02 60
>> SENDING A RAKP 1 MESSAGE
 
>> sending packet (49 bytes)
 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
 00 00 00 00 f3 86 36 0d be c2 e5 3f 14 20 16 29
 61 c4 f2 1c 40 66 02 60 14 00 00 05 61 64 6d 69
 6e
<< Received data (56 bytes)
 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
 00 00 00 00 a4 a3 a2 a0 31 a2 b2 77 b0 4b 74 f3
 43 52 bf de 2e a1 32 86 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0x31a2b277b04b74f34352bfde2ea13286
<<  BMC GUID                      : 0x00000000000000000000000000000000
<<  Key exchange auth code         : none
 
bmc_rand (16 bytes)
 31 a2 b2 77 b0 4b 74 f3 43 52 bf de 2e a1 32 86
Generated K1 (20 bytes)
 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
 01 01 01 01
Generated K2 (20 bytes)
 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
 02 02 02 02
>> SENDING A RAKP 3 MESSAGE
 
>> sending packet (24 bytes)
 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 f3 86 36 0d
<< Received data (24 bytes)
 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code        : none
 
IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
 

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x01
>>    data    :
 
BUILDING A v2 COMMAND
>> sending packet (23 bytes)
 06 00 ff 07 06 00 f3 86 36 0d 03 00 00 00 07 00
 20 18 c8 81 00 01 7e
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 08 00
 81 1c 63 20 00 01 c1 1e
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x06)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000001
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 01
<<   Compl Code : 0xc1
Unable to send RAW command (netfn=0x6 cmd=0x1 rsp=0xc1): Invalid command
 
>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3c
>>    data    : 0xf3 0x86 0x36 0x0d
 
BUILDING A v2 COMMAND
>> sending packet (27 bytes)
 06 00 ff 07 06 00 f3 86 36 0d 04 00 00 00 0b 00
 20 18 c8 81 00 3c f3 86 36 0d 87
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
 81 1c 63 20 00 3c c1 e3
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x06)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000002
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 3c
<<   Compl Code : 0xc1
Close Session command failed: Invalid command
 
 
Best regards,
 
IWILL Corporation
Software Engineer
Jack Hsu
886-2-2290-0091 ext 306
-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Ipmitool-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to