Hi Duncan, Nilesh,
 
    After added "-o intelplus", RMCP+ can work now.
But I still have a problem to activate SOL.
Here are what I executed, Could you help me to find out the possible failed reason?
 
**********************************************************
[EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true
IPMI LAN host 192.168.0.10 port 623
 
>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04
 
BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
>> sending packet (23 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
 c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
<< IPMI Response Session Header
<<   Authtype                : NONE
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 38
<<   Compl Code : 0x00
>> SENDING AN OPEN SESSION REQUEST
 
>> sending packet (48 bytes)
 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
<< Received data (52 bytes)
 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08
 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
 00 00 00 00
<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : admin
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x0f8fd6b6
<<  Negotiated authenticatin algorithm : none
<<  Negotiated integrity algorithm     : none
<<  Negotiated encryption algorithm    : none
 
>> Console generated random number (16 bytes)
 a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81
>> SENDING A RAKP 1 MESSAGE
 
>> sending packet (49 bytes)
 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6
 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69
 6e
<< Received data (56 bytes)
 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43
 ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0x711bb14caf8ca043cac167f7bb889a08
<<  BMC GUID                      : 0x00000000000000000000000000000000
<<  Key exchange auth code         : none
 
bmc_rand (16 bytes)
 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08
Generated K1 (20 bytes)
 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
 01 01 01 01
Generated K2 (20 bytes)
 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
 02 02 02 02
>> SENDING A RAKP 3 MESSAGE
 
>> sending packet (24 bytes)
 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 b6 d6 8f 0f
<< Received data (24 bytes)
 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code        : none
 
IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
 

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3b
>>    data    : 0x04
 
BUILDING A v2 COMMAND
>> sending packet (24 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00
 20 18 c8 81 04 3b 04 3c
<< Received data (25 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
 81 1c 63 20 04 3b 00 04 9d
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000001
<<   IPMI Msg/Payload Length : 9
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 01
<<   Rs Lun     : 0
<<   Command    : 3b
<<   Compl Code : 0x00
set_session_privlvl (1 bytes)
 04
Set Session Privilege Level to ADMINISTRATOR
 

>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x00 0x01
 
BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00
 20 30 b0 81 08 21 0e 00 01 47
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
 81 34 4b 20 08 21 00 b7
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000002
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 02
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0x00
 
>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x01 0x01
 
BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00
 20 30 b0 81 0c 21 0e 01 01 42
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
 81 34 4b 20 0c 21 00 b3
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000003
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 03
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0x00
 
>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x00 0x02
 
BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00
 20 30 b0 81 10 21 0e 00 02 3e
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
 81 34 4b 20 10 21 cc e3
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000004
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 04
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0xcc
Error setting SOL parameter 'set-in-progress': Invalid data field in request
 
>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x00 0x00
 
BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00
 20 30 b0 81 14 21 0e 00 00 3c
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00
 81 34 4b 20 14 21 00 ab
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000005
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 05
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0x00
 
>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3c
>>    data    : 0xb6 0xd6 0x8f 0x0f
 
BUILDING A v2 COMMAND
>> sending packet (27 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00
 20 18 c8 81 18 3c b6 d6 8f 0f 01
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00
 81 1c 63 20 18 3c 00 8c
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000006
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 06
<<   Rs Lun     : 0
<<   Command    : 3c
<<   Compl Code : 0x00
Closed Session 0f8fd6b6
 
[EMAIL PROTECTED] ~]#

**********************************************************
 
[EMAIL PROTECTED] ~]# ipmitool -v -v -v  -C0 -I lanplus  -H 192.168.0.10 -A MD5 -L OPERATOR -U admin -P admin sol activate
IPMI LAN host 192.168.0.10 port 623
 
>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x03
 
BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
>> sending packet (23 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
 c8 81 00 38 8e 03 b6
<< Received data (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
<< IPMI Response Session Header
<<   Authtype                : NONE
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 38
<<   Compl Code : 0x00
>> SENDING AN OPEN SESSION REQUEST
 
>> sending packet (48 bytes)
 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
<< Received data (52 bytes)
 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08
 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
 00 00 00 00
<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : operator
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x0d02a7fa
<<  Negotiated authenticatin algorithm : none
<<  Negotiated integrity algorithm     : none
<<  Negotiated encryption algorithm    : none
 
>> Console generated random number (16 bytes)
 cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c
>> SENDING A RAKP 1 MESSAGE
 
>> sending packet (49 bytes)
 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7
 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69
 6e
<< Received data (56 bytes)
 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1
 fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0xb0739038011104b1fcaf0525f6aed42d
<<  BMC GUID                      : 0x00000000000000000000000000000000
<<  Key exchange auth code         : none
 
bmc_rand (16 bytes)
 b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d
Generated K1 (20 bytes)
 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
 01 01 01 01
Generated K2 (20 bytes)
 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
 02 02 02 02
>> SENDING A RAKP 3 MESSAGE
 
>> sending packet (24 bytes)
 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 fa a7 02 0d
<< Received data (24 bytes)
 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code        : none
 
IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
 

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3b
>>    data    : 0x03
 
BUILDING A v2 COMMAND
>> sending packet (24 bytes)
 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00
 20 18 c8 81 04 3b 03 3d
<< Received data (25 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
 81 1c 63 20 04 3b 00 03 9e
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000001
<<   IPMI Msg/Payload Length : 9
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 01
<<   Rs Lun     : 0
<<   Command    : 3b
<<   Compl Code : 0x00
set_session_privlvl (1 bytes)
 03
Set Session Privilege Level to OPERATOR
 

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x48
>>    data    : 0x01 0x01 0xc6 0x00 0x00 0x00
 
BUILDING A v2 COMMAND
>> sending packet (29 bytes)
 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00
 20 18 c8 81 08 48 01 01 c6 00 00 00 67
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
 81 1c 63 20 08 48 cc c4
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000002
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 02
<<   Rs Lun     : 0
<<   Command    : 48
<<   Compl Code : 0xcc
Error activating SOL payload: Invalid data field in request
 
>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3c
>>    data    : 0xfa 0xa7 0x02 0x0d
 
BUILDING A v2 COMMAND
>> sending packet (27 bytes)
 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00
 20 18 c8 81 0c 3c fa a7 02 0d 87
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
 81 1c 63 20 0c 3c 00 98
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000003
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 03
<<   Rs Lun     : 0
<<   Command    : 3c
<<   Compl Code : 0x00
Closed Session 0d02a7fa
 
[EMAIL PROTECTED] ~]#
**********************************************************
 
 
 
Thank You & Best Regards,
Sophia
 
 
----- Original Message -----
Sent: Tuesday, July 11, 2006 2:40 AM
Subject: Re: [Ipmitool-devel] RMCP+ session

On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote:
Hi sir,
 
We are using Intel ESB2 BMC firmware on out platform.
But we meet some problems when using IPMITool with lanplus.
Could you help me to find out the possible failed reason when I exectuted the following command :
ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin raw 0x6 0x01


Can you try with "-o intelplus" option on the command line and see if it behaves better?

Thanks,
-duncan

-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Ipmitool-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to