Dear Sophia[Iwill], To activate SOL payloads you need to do
# SOL payload activate ipmitool raw 06 0x4c 01 01 02 00 00 00 Where the third byte refers to the channel number. Best regards Tom -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: 13 July 2006 07:32 To: ipmitool-devel@lists.sourceforge.net Subject: Ipmitool-devel Digest, Vol 2, Issue 7 Send Ipmitool-devel mailing list submissions to ipmitool-devel@lists.sourceforge.net To subscribe or unsubscribe via the World Wide Web, visit https://lists.sourceforge.net/lists/listinfo/ipmitool-devel or, via email, send a message with subject or body 'help' to [EMAIL PROTECTED] You can reach the person managing the list at [EMAIL PROTECTED] When replying, please edit your Subject line so it is more specific than "Re: Contents of Ipmitool-devel digest..." Today's Topics: 1. Re: SOL activate (Sophia[IWill]) ---------------------------------------------------------------------- Message: 1 Date: Thu, 13 Jul 2006 14:27:09 +0800 From: "Sophia[IWill]" <[EMAIL PROTECTED]> Subject: Re: [Ipmitool-devel] SOL activate To: "Duncan Laurie" <[EMAIL PROTECTED]> Cc: ipmitool-devel@lists.sourceforge.net, "Narayan, Nilesh" <[EMAIL PROTECTED]>, "Kosaraju, Sridhar" <[EMAIL PROTECTED]>, Jack_Hsu <[EMAIL PROTECTED]>, "Hung, Checa" <[EMAIL PROTECTED]> Message-ID: <[EMAIL PROTECTED]> Content-Type: text/plain; charset="iso-8859-1" Hi Duncan, Nilesh, After added "-o intelplus", RMCP+ can work now. But I still have a problem to activate SOL. Here are what I executed, Could you help me to find out the possible failed reason? ********************************************************** [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true IPMI LAN host 192.168.0.10 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 04 b5 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 95 05 03 00 00 00 00 0a << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48 bytes) 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : admin << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0f8fd6b6 << Negotiated authenticatin algorithm : none << Negotiated integrity algorithm : none << Negotiated encryption algorithm : none >> Console generated random number (16 bytes) a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81 >> SENDING A RAKP 1 MESSAGE >> sending packet (49 bytes) 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69 6e << Received data (56 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0x711bb14caf8ca043cac167f7bb889a08 << BMC GUID : 0x00000000000000000000000000000000 << Key exchange auth code : none bmc_rand (16 bytes) 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08 Generated K1 (20 bytes) 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 Generated K2 (20 bytes) 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 >> SENDING A RAKP 3 MESSAGE >> sending packet (24 bytes) 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 00 00 00 00 b6 d6 8f 0f << Received data (24 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 00 00 00 00 a4 a3 a2 a0 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code : none IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x04 BUILDING A v2 COMMAND >> sending packet (24 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00 20 18 c8 81 04 3b 04 3c << Received data (25 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 81 1c 63 20 04 3b 00 04 9d << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 9 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 3b << Compl Code : 0x00 set_session_privlvl (1 bytes) 04 Set Session Privilege Level to ADMINISTRATOR >> Sending IPMI command payload >> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x00 0x01 BUILDING A v2 COMMAND >> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00 20 30 b0 81 08 21 0e 00 01 47 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 81 34 4b 20 08 21 00 b7 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 21 << Compl Code : 0x00 >> Sending IPMI command payload >> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x01 0x01 BUILDING A v2 COMMAND >> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00 20 30 b0 81 0c 21 0e 01 01 42 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 81 34 4b 20 0c 21 00 b3 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000003 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 03 << Rs Lun : 0 << Command : 21 << Compl Code : 0x00 >> Sending IPMI command payload >> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x00 0x02 BUILDING A v2 COMMAND >> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00 20 30 b0 81 10 21 0e 00 02 3e << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00 81 34 4b 20 10 21 cc e3 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000004 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 04 << Rs Lun : 0 << Command : 21 << Compl Code : 0xcc Error setting SOL parameter 'set-in-progress': Invalid data field in request >> Sending IPMI command payload >> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x00 0x00 BUILDING A v2 COMMAND >> sending packet (26 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00 20 30 b0 81 14 21 0e 00 00 3c << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00 81 34 4b 20 14 21 00 ab << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000005 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 05 << Rs Lun : 0 << Command : 21 << Compl Code : 0x00 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3c >> data : 0xb6 0xd6 0x8f 0x0f BUILDING A v2 COMMAND >> sending packet (27 bytes) 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00 20 18 c8 81 18 3c b6 d6 8f 0f 01 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00 81 1c 63 20 18 3c 00 8c << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000006 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 06 << Rs Lun : 0 << Command : 3c << Compl Code : 0x00 Closed Session 0f8fd6b6 [EMAIL PROTECTED] ~]# ********************************************************** [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.10 -A MD5 -L OPERATOR -U admin -P admin sol activate IPMI LAN host 192.168.0.10 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x03 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 03 b6 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 95 05 03 00 00 00 00 0a << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48 bytes) 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : operator << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0d02a7fa << Negotiated authenticatin algorithm : none << Negotiated integrity algorithm : none << Negotiated encryption algorithm : none >> Console generated random number (16 bytes) cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c >> SENDING A RAKP 1 MESSAGE >> sending packet (49 bytes) 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69 6e << Received data (56 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0xb0739038011104b1fcaf0525f6aed42d << BMC GUID : 0x00000000000000000000000000000000 << Key exchange auth code : none bmc_rand (16 bytes) b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d Generated K1 (20 bytes) 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 Generated K2 (20 bytes) 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 >> SENDING A RAKP 3 MESSAGE >> sending packet (24 bytes) 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 00 00 00 00 fa a7 02 0d << Received data (24 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 00 00 00 00 a4 a3 a2 a0 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code : none IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x03 BUILDING A v2 COMMAND >> sending packet (24 bytes) 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00 20 18 c8 81 04 3b 03 3d << Received data (25 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 81 1c 63 20 04 3b 00 03 9e << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 9 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 01 << Rs Lun : 0 << Command : 3b << Compl Code : 0x00 set_session_privlvl (1 bytes) 03 Set Session Privilege Level to OPERATOR >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x48 >> data : 0x01 0x01 0xc6 0x00 0x00 0x00 BUILDING A v2 COMMAND >> sending packet (29 bytes) 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00 20 18 c8 81 08 48 01 01 c6 00 00 00 67 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 81 1c 63 20 08 48 cc c4 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 02 << Rs Lun : 0 << Command : 48 << Compl Code : 0xcc Error activating SOL payload: Invalid data field in request >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3c >> data : 0xfa 0xa7 0x02 0x0d BUILDING A v2 COMMAND >> sending packet (27 bytes) 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00 20 18 c8 81 0c 3c fa a7 02 0d 87 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 81 1c 63 20 0c 3c 00 98 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000003 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 03 << Rs Lun : 0 << Command : 3c << Compl Code : 0x00 Closed Session 0d02a7fa [EMAIL PROTECTED] ~]# ********************************************************** Thank You & Best Regards, Sophia ----- Original Message ----- From: Duncan Laurie To: Sophia[IWill] Cc: ipmitool-devel@lists.sourceforge.net Sent: Tuesday, July 11, 2006 2:40 AM Subject: Re: [Ipmitool-devel] RMCP+ session On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote: Hi sir, We are using Intel ESB2 BMC firmware on out platform. But we meet some problems when using IPMITool with lanplus. Could you help me to find out the possible failed reason when I exectuted the following command : ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin raw 0x6 0x01 Can you try with "-o intelplus" option on the command line and see if it behaves better? Thanks, -duncan -------------- next part -------------- An HTML attachment was scrubbed... URL: http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach ments/20060713/cdb98a24/attachment.html ------------------------------ ------------------------------------------------------------------------ - Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 ------------------------------ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel End of Ipmitool-devel Digest, Vol 2, Issue 7 ******************************************** ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel