|
Hi Duncan, Nilesh,
After added "-o
intelplus", RMCP+ can work now.
But I still have a problem to
activate SOL.
Here are what I executed, Could you help me
to find out the possible failed reason?
**********************************************************
[EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o
intelplus -H 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true
IPMI LAN host 192.168.0.10 port 623 >> Sending IPMI command
payload
>> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND
>> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 04 b5 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 95 05 03 00 00 00 00 0a << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48 bytes)
06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : admin << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0f8fd6b6 << Negotiated authenticatin algorithm : none << Negotiated integrity algorithm : none << Negotiated encryption algorithm : none >> Console generated random number (16
bytes)
a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81 >> SENDING A RAKP 1 MESSAGE >> sending packet (49 bytes)
06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69 6e << Received data (56 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0x711bb14caf8ca043cac167f7bb889a08 << BMC GUID : 0x00000000000000000000000000000000 << Key exchange auth code : none bmc_rand (16 bytes)
71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08 Generated K1 (20 bytes) 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 Generated K2 (20 bytes) 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 >> SENDING A RAKP 3 MESSAGE >> sending packet (24 bytes)
06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 00 00 00 00 b6 d6 8f 0f << Received data (24 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 00 00 00 00 a4 a3 a2 a0 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code : none IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x04 BUILDING A v2 COMMAND
>> sending packet (24 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00 20 18 c8 81 04 3b 04 3c << Received data (25 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 81 1c 63 20 04 3b 00 04 9d << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 9 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 3b << Compl Code : 0x00 set_session_privlvl (1 bytes) 04 Set Session Privilege Level to ADMINISTRATOR >> Sending IPMI command payload >> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x00 0x01 BUILDING A v2 COMMAND
>> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00 20 30 b0 81 08 21 0e 00 01 47 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 81 34 4b 20 08 21 00 b7 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 21 << Compl Code : 0x00 >> Sending IPMI command
payload
>> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x01 0x01 BUILDING A v2 COMMAND
>> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00 20 30 b0 81 0c 21 0e 01 01 42 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 81 34 4b 20 0c 21 00 b3 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000003 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 03 << Rs Lun : 0 << Command : 21 << Compl Code : 0x00 >> Sending IPMI command
payload
>> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x00 0x02 BUILDING A v2 COMMAND
>> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00 20 30 b0 81 10 21 0e 00 02 3e << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00 81 34 4b 20 10 21 cc e3 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000004 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 04 << Rs Lun : 0 << Command : 21 << Compl Code : 0xcc Error setting SOL parameter 'set-in-progress': Invalid data field in request >> Sending IPMI command
payload
>> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x00 0x00 BUILDING A v2 COMMAND
>> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00 20 30 b0 81 14 21 0e 00 00 3c << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00 81 34 4b 20 14 21 00 ab << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000005 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 05 << Rs Lun : 0 << Command : 21 << Compl Code : 0x00 >> Sending IPMI command
payload
>> netfn : 0x06 >> command : 0x3c >> data : 0xb6 0xd6 0x8f 0x0f BUILDING A v2 COMMAND
>> sending packet (27 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00 20 18 c8 81 18 3c b6 d6 8f 0f 01 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00 81 1c 63 20 18 3c 00 8c << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000006 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 06 << Rs Lun : 0 << Command : 3c << Compl Code : 0x00 Closed Session 0f8fd6b6 [EMAIL PROTECTED] ~]#
********************************************************** [EMAIL PROTECTED] ~]# ipmitool -v -v -v
-C0 -I lanplus -H 192.168.0.10 -A MD5 -L OPERATOR -U admin -P admin sol
activate
IPMI LAN host 192.168.0.10 port 623 >> Sending IPMI command
payload
>> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x03 BUILDING A v1.5 COMMAND
>> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 03 b6 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 95 05 03 00 00 00 00 0a << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48
bytes)
06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : operator << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0d02a7fa << Negotiated authenticatin algorithm : none << Negotiated integrity algorithm : none << Negotiated encryption algorithm : none >> Console generated random number (16
bytes)
cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c >> SENDING A RAKP 1 MESSAGE >> sending packet (49
bytes)
06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69 6e << Received data (56 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0xb0739038011104b1fcaf0525f6aed42d << BMC GUID : 0x00000000000000000000000000000000 << Key exchange auth code : none bmc_rand (16 bytes)
b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d Generated K1 (20 bytes) 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 Generated K2 (20 bytes) 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 >> SENDING A RAKP 3 MESSAGE >> sending packet (24
bytes)
06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 00 00 00 00 fa a7 02 0d << Received data (24 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 00 00 00 00 a4 a3 a2 a0 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code : none IPMIv2 / RMCP+ SESSION OPENED
SUCCESSFULLY
>> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x03 BUILDING A v2 COMMAND
>> sending packet (24 bytes) 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00 20 18 c8 81 04 3b 03 3d << Received data (25 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 81 1c 63 20 04 3b 00 03 9e << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 9 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 3b << Compl Code : 0x00 set_session_privlvl (1 bytes) 03 Set Session Privilege Level to OPERATOR >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x48 >> data : 0x01 0x01 0xc6 0x00 0x00 0x00 BUILDING A v2 COMMAND
>> sending packet (29 bytes) 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00 20 18 c8 81 08 48 01 01 c6 00 00 00 67 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 81 1c 63 20 08 48 cc c4 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 48 << Compl Code : 0xcc Error activating SOL payload: Invalid data field in request >> Sending IPMI command
payload
>> netfn : 0x06 >> command : 0x3c >> data : 0xfa 0xa7 0x02 0x0d BUILDING A v2 COMMAND
>> sending packet (27 bytes) 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00 20 18 c8 81 0c 3c fa a7 02 0d 87 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 81 1c 63 20 0c 3c 00 98 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000003 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 03 << Rs Lun : 0 << Command : 3c << Compl Code : 0x00 Closed Session 0d02a7fa [EMAIL PROTECTED]
~]#
**********************************************************
Thank You & Best Regards,
Sophia
|
------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________ Ipmitool-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
