Dear Sophia[Iwill],

To activate SOL payloads you need to do 

# SOL payload activate
ipmitool raw 06 0x4c 01 01 02 00 00 00

Where the third byte refers to the channel number.

Best regards
Tom
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: 13 July 2006 07:32
To: ipmitool-devel@lists.sourceforge.net
Subject: Ipmitool-devel Digest, Vol 2, Issue 7

Send Ipmitool-devel mailing list submissions to
        ipmitool-devel@lists.sourceforge.net

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
or, via email, send a message with subject or body 'help' to
        [EMAIL PROTECTED]

You can reach the person managing the list at
        [EMAIL PROTECTED]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Ipmitool-devel digest..."


Today's Topics:

   1. Re: SOL activate (Sophia[IWill])


----------------------------------------------------------------------

Message: 1
Date: Thu, 13 Jul 2006 14:27:09 +0800
From: "Sophia[IWill]" <[EMAIL PROTECTED]>
Subject: Re: [Ipmitool-devel] SOL activate
To: "Duncan Laurie" <[EMAIL PROTECTED]>
Cc: ipmitool-devel@lists.sourceforge.net, "Narayan,     Nilesh"
        <[EMAIL PROTECTED]>, "Kosaraju, Sridhar"
        <[EMAIL PROTECTED]>,    Jack_Hsu <[EMAIL PROTECTED]>,
"Hung,
        Checa" <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"

Hi Duncan, Nilesh,

    After added "-o intelplus", RMCP+ can work now.
But I still have a problem to activate SOL.
Here are what I executed, Could you help me to find out the possible
failed reason?

**********************************************************

[EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H
192.168.0.10 -A MD5 -U admin -P admin sol set enabled true
IPMI LAN host 192.168.0.10 port 623

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x04

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
>> sending packet (23 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
 c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
<< IPMI Response Session Header
<<   Authtype                : NONE
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 38
<<   Compl Code : 0x00
>> SENDING AN OPEN SESSION REQUEST

>> sending packet (48 bytes)
 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
<< Received data (52 bytes)
 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08
 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
 00 00 00 00
<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : admin
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x0f8fd6b6
<<  Negotiated authenticatin algorithm : none
<<  Negotiated integrity algorithm     : none
<<  Negotiated encryption algorithm    : none

>> Console generated random number (16 bytes)
 a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81
>> SENDING A RAKP 1 MESSAGE

>> sending packet (49 bytes)
 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6
 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69
 6e
<< Received data (56 bytes)
 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43
 ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0x711bb14caf8ca043cac167f7bb889a08
<<  BMC GUID                      : 0x00000000000000000000000000000000
<<  Key exchange auth code         : none

bmc_rand (16 bytes)
 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08
Generated K1 (20 bytes)
 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
 01 01 01 01
Generated K2 (20 bytes)
 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
 02 02 02 02
>> SENDING A RAKP 3 MESSAGE

>> sending packet (24 bytes)
 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 b6 d6 8f 0f
<< Received data (24 bytes)
 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code        : none

IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3b
>>    data    : 0x04

BUILDING A v2 COMMAND
>> sending packet (24 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00
 20 18 c8 81 04 3b 04 3c
<< Received data (25 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
 81 1c 63 20 04 3b 00 04 9d
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000001
<<   IPMI Msg/Payload Length : 9
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 01
<<   Rs Lun     : 0
<<   Command    : 3b
<<   Compl Code : 0x00
set_session_privlvl (1 bytes)
 04
Set Session Privilege Level to ADMINISTRATOR


>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x00 0x01

BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00
 20 30 b0 81 08 21 0e 00 01 47
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
 81 34 4b 20 08 21 00 b7
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000002
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 02
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0x00

>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x01 0x01

BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00
 20 30 b0 81 0c 21 0e 01 01 42
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
 81 34 4b 20 0c 21 00 b3
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000003
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 03
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0x00

>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x00 0x02

BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00
 20 30 b0 81 10 21 0e 00 02 3e
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
 81 34 4b 20 10 21 cc e3
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000004
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 04
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0xcc
Error setting SOL parameter 'set-in-progress': Invalid data field in
request

>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x00 0x00

BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00
 20 30 b0 81 14 21 0e 00 00 3c
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00
 81 34 4b 20 14 21 00 ab
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000005
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 05
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0x00

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3c
>>    data    : 0xb6 0xd6 0x8f 0x0f

BUILDING A v2 COMMAND
>> sending packet (27 bytes)
 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00
 20 18 c8 81 18 3c b6 d6 8f 0f 01
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00
 81 1c 63 20 18 3c 00 8c
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000006
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 06
<<   Rs Lun     : 0
<<   Command    : 3c
<<   Compl Code : 0x00
Closed Session 0f8fd6b6

[EMAIL PROTECTED] ~]#

**********************************************************

[EMAIL PROTECTED] ~]# ipmitool -v -v -v  -C0 -I lanplus  -H 192.168.0.10
-A MD5 -L OPERATOR -U admin -P admin sol activate
IPMI LAN host 192.168.0.10 port 623

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x38
>>    data    : 0x8e 0x03

BUILDING A v1.5 COMMAND
>> IPMI Request Session Header
>>   Authtype   : NONE
>>   Sequence   : 0x00000000
>>   Session ID : 0x00000000
>> IPMI Request Message Header
>>   Rs Addr    : 20
>>   NetFn      : 06
>>   Rs LUN     : 0
>>   Rq Addr    : 81
>>   Rq Seq     : 00
>>   Rq Lun     : 0
>>   Command    : 38
>> sending packet (23 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
 c8 81 00 38 8e 03 b6
<< Received data (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
<< IPMI Response Session Header
<<   Authtype                : NONE
<<   Payload type            : IPMI (0)
<<   Session ID              : 0x00000000
<<   Sequence                : 0x00000000
<<   IPMI Msg/Payload Length : 16
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 00
<<   Rs Lun     : 0
<<   Command    : 38
<<   Compl Code : 0x00
>> SENDING AN OPEN SESSION REQUEST

>> sending packet (48 bytes)
 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
<< Received data (52 bytes)
 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08
 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
 00 00 00 00
<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : operator
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x0d02a7fa
<<  Negotiated authenticatin algorithm : none
<<  Negotiated integrity algorithm     : none
<<  Negotiated encryption algorithm    : none

>> Console generated random number (16 bytes)
 cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c
>> SENDING A RAKP 1 MESSAGE

>> sending packet (49 bytes)
 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7
 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69
 6e
<< Received data (56 bytes)
 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1
 fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0xb0739038011104b1fcaf0525f6aed42d
<<  BMC GUID                      : 0x00000000000000000000000000000000
<<  Key exchange auth code         : none

bmc_rand (16 bytes)
 b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d
Generated K1 (20 bytes)
 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
 01 01 01 01
Generated K2 (20 bytes)
 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
 02 02 02 02
>> SENDING A RAKP 3 MESSAGE

>> sending packet (24 bytes)
 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 fa a7 02 0d
<< Received data (24 bytes)
 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
 00 00 00 00 a4 a3 a2 a0
<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code        : none

IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3b
>>    data    : 0x03

BUILDING A v2 COMMAND
>> sending packet (24 bytes)
 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00
 20 18 c8 81 04 3b 03 3d
<< Received data (25 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
 81 1c 63 20 04 3b 00 03 9e
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000001
<<   IPMI Msg/Payload Length : 9
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 01
<<   Rs Lun     : 0
<<   Command    : 3b
<<   Compl Code : 0x00
set_session_privlvl (1 bytes)
 03
Set Session Privilege Level to OPERATOR


>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x48
>>    data    : 0x01 0x01 0xc6 0x00 0x00 0x00

BUILDING A v2 COMMAND
>> sending packet (29 bytes)
 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00
 20 18 c8 81 08 48 01 01 c6 00 00 00 67
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
 81 1c 63 20 08 48 cc c4
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000002
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 02
<<   Rs Lun     : 0
<<   Command    : 48
<<   Compl Code : 0xcc
Error activating SOL payload: Invalid data field in request

>> Sending IPMI command payload
>>    netfn   : 0x06
>>    command : 0x3c
>>    data    : 0xfa 0xa7 0x02 0x0d

BUILDING A v2 COMMAND
>> sending packet (27 bytes)
 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00
 20 18 c8 81 0c 3c fa a7 02 0d 87
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
 81 1c 63 20 0c 3c 00 98
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000003
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 07
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 03
<<   Rs Lun     : 0
<<   Command    : 3c
<<   Compl Code : 0x00
Closed Session 0d02a7fa

[EMAIL PROTECTED] ~]#

**********************************************************



Thank You & Best Regards,
Sophia


  ----- Original Message ----- 
  From: Duncan Laurie 
  To: Sophia[IWill] 
  Cc: ipmitool-devel@lists.sourceforge.net 
  Sent: Tuesday, July 11, 2006 2:40 AM
  Subject: Re: [Ipmitool-devel] RMCP+ session


  On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote:
    Hi sir,

    We are using Intel ESB2 BMC firmware on out platform.
    But we meet some problems when using IPMITool with lanplus.
    Could you help me to find out the possible failed reason when I
exectuted the following command :
    ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin
raw 0x6 0x01


  Can you try with "-o intelplus" option on the command line and see if
it behaves better?

  Thanks,
  -duncan

-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach
ments/20060713/cdb98a24/attachment.html 

------------------------------


------------------------------------------------------------------------
-
Using Tomcat but need to do more? Need to support web services,
security?
Get stuff done quickly with pre-integrated technology to make your job
easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache
Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642


------------------------------

_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel


End of Ipmitool-devel Digest, Vol 2, Issue 7
********************************************


-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to