Hi Tom, Duncan, Nilesh, I followed your instruction to add a command "raw 06 0x4c 01 01 02 00 00 00" and had a successful return. But I still could not activate SOL successfully, and the command sequence stopped at "Sending IPMI command payload". Then I checked the detail of that part and found some strange data below :
>> Sending IPMI command payload >> netfn : 0x0c >> command : 0x21 >> data : 0x0e 0x00 0x02 =====================> It may be 0x01 0x00 0x02 BUILDING A v2 COMMAND >> sending packet (26 bytes) 06 00 ff 07 06 00 c3 b4 a3 05 06 00 00 00 0a 00 20 30 b0 81 10 21 0e 00 02 3e << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00 81 34 4b 20 10 21 cc e3 << IPMI Response Session Header << Authtype : Unknown (0x6) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000004 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 0d << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 04 << Rs Lun : 0 << Command : 21 << Compl Code : 0xcc Error setting SOL parameter 'set-in-progress': Invalid data field in request [EMAIL PROTECTED] ~]# ----- Original Message ----- From: <[EMAIL PROTECTED]> To: <ipmitool-devel@lists.sourceforge.net> Sent: Thursday, July 13, 2006 7:39 PM Subject: Ipmitool-devel Digest, Vol 2, Issue 8 > Send Ipmitool-devel mailing list submissions to > ipmitool-devel@lists.sourceforge.net > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > or, via email, send a message with subject or body 'help' to > [EMAIL PROTECTED] > > You can reach the person managing the list at > [EMAIL PROTECTED] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Ipmitool-devel digest..." > > > Today's Topics: > > 1. Re: Ipmitool-devel Digest, Vol 2, Issue 7 (Nabarro, Tom A) > 2. Re: SOL activate (Sophia[IWill]) (Nabarro, Tom A) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Thu, 13 Jul 2006 12:27:48 +0100 > From: "Nabarro, Tom A" <[EMAIL PROTECTED]> > Subject: Re: [Ipmitool-devel] Ipmitool-devel Digest, Vol 2, Issue 7 > To: <ipmitool-devel@lists.sourceforge.net> > Message-ID: > <[EMAIL PROTECTED]> > Content-Type: text/plain; charset="US-ASCII" > > Dear Sophia[Iwill], > > To activate SOL payloads you need to do > > # SOL payload activate > ipmitool raw 06 0x4c 01 01 02 00 00 00 > > Where the third byte refers to the channel number. > > Best regards > Tom > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > [EMAIL PROTECTED] > Sent: 13 July 2006 07:32 > To: ipmitool-devel@lists.sourceforge.net > Subject: Ipmitool-devel Digest, Vol 2, Issue 7 > > Send Ipmitool-devel mailing list submissions to > ipmitool-devel@lists.sourceforge.net > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > or, via email, send a message with subject or body 'help' to > [EMAIL PROTECTED] > > You can reach the person managing the list at > [EMAIL PROTECTED] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Ipmitool-devel digest..." > > > Today's Topics: > > 1. Re: SOL activate (Sophia[IWill]) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Thu, 13 Jul 2006 14:27:09 +0800 > From: "Sophia[IWill]" <[EMAIL PROTECTED]> > Subject: Re: [Ipmitool-devel] SOL activate > To: "Duncan Laurie" <[EMAIL PROTECTED]> > Cc: ipmitool-devel@lists.sourceforge.net, "Narayan, Nilesh" > <[EMAIL PROTECTED]>, "Kosaraju, Sridhar" > <[EMAIL PROTECTED]>, Jack_Hsu <[EMAIL PROTECTED]>, > "Hung, > Checa" <[EMAIL PROTECTED]> > Message-ID: <[EMAIL PROTECTED]> > Content-Type: text/plain; charset="iso-8859-1" > > Hi Duncan, Nilesh, > > After added "-o intelplus", RMCP+ can work now. > But I still have a problem to activate SOL. > Here are what I executed, Could you help me to find out the possible > failed reason? > > ********************************************************** > > [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H > 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true > IPMI LAN host 192.168.0.10 port 623 > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x38 > >> data : 0x8e 0x04 > > BUILDING A v1.5 COMMAND > >> IPMI Request Session Header > >> Authtype : NONE > >> Sequence : 0x00000000 > >> Session ID : 0x00000000 > >> IPMI Request Message Header > >> Rs Addr : 20 > >> NetFn : 06 > >> Rs LUN : 0 > >> Rq Addr : 81 > >> Rq Seq : 00 > >> Rq Lun : 0 > >> Command : 38 > >> sending packet (23 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 > c8 81 00 38 8e 04 b5 > << Received data (30 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c > 63 20 00 38 00 01 95 05 03 00 00 00 00 0a > << IPMI Response Session Header > << Authtype : NONE > << Payload type : IPMI (0) > << Session ID : 0x00000000 > << Sequence : 0x00000000 > << IPMI Msg/Payload Length : 16 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 00 > << Rs Lun : 0 > << Command : 38 > << Compl Code : 0x00 > >> SENDING AN OPEN SESSION REQUEST > > >> sending packet (48 bytes) > 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 > 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 > 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 > << Received data (52 bytes) > 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 > 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08 > 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 > 00 00 00 00 > <<OPEN SESSION RESPONSE > << Message tag : 0x00 > << RMCP+ status : no errors > << Maximum privilege level : admin > << Console Session ID : 0xa0a2a3a4 > << BMC Session ID : 0x0f8fd6b6 > << Negotiated authenticatin algorithm : none > << Negotiated integrity algorithm : none > << Negotiated encryption algorithm : none > > >> Console generated random number (16 bytes) > a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81 > >> SENDING A RAKP 1 MESSAGE > > >> sending packet (49 bytes) > 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 > 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6 > 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69 > 6e > << Received data (56 bytes) > 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 > 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43 > ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > <<RAKP 2 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << BMC random number : 0x711bb14caf8ca043cac167f7bb889a08 > << BMC GUID : 0x00000000000000000000000000000000 > << Key exchange auth code : none > > bmc_rand (16 bytes) > 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08 > Generated K1 (20 bytes) > 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 > 01 01 01 01 > Generated K2 (20 bytes) > 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 > 02 02 02 02 > >> SENDING A RAKP 3 MESSAGE > > >> sending packet (24 bytes) > 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 b6 d6 8f 0f > << Received data (24 bytes) > 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 a4 a3 a2 a0 > <<RAKP 4 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << Key exchange auth code : none > > IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY > > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3b > >> data : 0x04 > > BUILDING A v2 COMMAND > >> sending packet (24 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00 > 20 18 c8 81 04 3b 04 3c > << Received data (25 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 > 81 1c 63 20 04 3b 00 04 9d > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000001 > << IPMI Msg/Payload Length : 9 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 01 > << Rs Lun : 0 > << Command : 3b > << Compl Code : 0x00 > set_session_privlvl (1 bytes) > 04 > Set Session Privilege Level to ADMINISTRATOR > > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x00 0x01 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00 > 20 30 b0 81 08 21 0e 00 01 47 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 > 81 34 4b 20 08 21 00 b7 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000002 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 02 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0x00 > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x01 0x01 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00 > 20 30 b0 81 0c 21 0e 01 01 42 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 > 81 34 4b 20 0c 21 00 b3 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000003 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 03 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0x00 > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x00 0x02 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00 > 20 30 b0 81 10 21 0e 00 02 3e > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00 > 81 34 4b 20 10 21 cc e3 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000004 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 04 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0xcc > Error setting SOL parameter 'set-in-progress': Invalid data field in > request > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x00 0x00 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00 > 20 30 b0 81 14 21 0e 00 00 3c > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00 > 81 34 4b 20 14 21 00 ab > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000005 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 05 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0x00 > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3c > >> data : 0xb6 0xd6 0x8f 0x0f > > BUILDING A v2 COMMAND > >> sending packet (27 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00 > 20 18 c8 81 18 3c b6 d6 8f 0f 01 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00 > 81 1c 63 20 18 3c 00 8c > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000006 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 06 > << Rs Lun : 0 > << Command : 3c > << Compl Code : 0x00 > Closed Session 0f8fd6b6 > > [EMAIL PROTECTED] ~]# > > ********************************************************** > > [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.10 > -A MD5 -L OPERATOR -U admin -P admin sol activate > IPMI LAN host 192.168.0.10 port 623 > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x38 > >> data : 0x8e 0x03 > > BUILDING A v1.5 COMMAND > >> IPMI Request Session Header > >> Authtype : NONE > >> Sequence : 0x00000000 > >> Session ID : 0x00000000 > >> IPMI Request Message Header > >> Rs Addr : 20 > >> NetFn : 06 > >> Rs LUN : 0 > >> Rq Addr : 81 > >> Rq Seq : 00 > >> Rq Lun : 0 > >> Command : 38 > >> sending packet (23 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 > c8 81 00 38 8e 03 b6 > << Received data (30 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c > 63 20 00 38 00 01 95 05 03 00 00 00 00 0a > << IPMI Response Session Header > << Authtype : NONE > << Payload type : IPMI (0) > << Session ID : 0x00000000 > << Sequence : 0x00000000 > << IPMI Msg/Payload Length : 16 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 00 > << Rs Lun : 0 > << Command : 38 > << Compl Code : 0x00 > >> SENDING AN OPEN SESSION REQUEST > > >> sending packet (48 bytes) > 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 > 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 > 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 > << Received data (52 bytes) > 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 > 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08 > 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 > 00 00 00 00 > <<OPEN SESSION RESPONSE > << Message tag : 0x00 > << RMCP+ status : no errors > << Maximum privilege level : operator > << Console Session ID : 0xa0a2a3a4 > << BMC Session ID : 0x0d02a7fa > << Negotiated authenticatin algorithm : none > << Negotiated integrity algorithm : none > << Negotiated encryption algorithm : none > > >> Console generated random number (16 bytes) > cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c > >> SENDING A RAKP 1 MESSAGE > > >> sending packet (49 bytes) > 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 > 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7 > 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69 > 6e > << Received data (56 bytes) > 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 > 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1 > fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > <<RAKP 2 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << BMC random number : 0xb0739038011104b1fcaf0525f6aed42d > << BMC GUID : 0x00000000000000000000000000000000 > << Key exchange auth code : none > > bmc_rand (16 bytes) > b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d > Generated K1 (20 bytes) > 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 > 01 01 01 01 > Generated K2 (20 bytes) > 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 > 02 02 02 02 > >> SENDING A RAKP 3 MESSAGE > > >> sending packet (24 bytes) > 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 fa a7 02 0d > << Received data (24 bytes) > 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 a4 a3 a2 a0 > <<RAKP 4 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << Key exchange auth code : none > > IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY > > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3b > >> data : 0x03 > > BUILDING A v2 COMMAND > >> sending packet (24 bytes) > 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00 > 20 18 c8 81 04 3b 03 3d > << Received data (25 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 > 81 1c 63 20 04 3b 00 03 9e > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000001 > << IPMI Msg/Payload Length : 9 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 01 > << Rs Lun : 0 > << Command : 3b > << Compl Code : 0x00 > set_session_privlvl (1 bytes) > 03 > Set Session Privilege Level to OPERATOR > > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x48 > >> data : 0x01 0x01 0xc6 0x00 0x00 0x00 > > BUILDING A v2 COMMAND > >> sending packet (29 bytes) > 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00 > 20 18 c8 81 08 48 01 01 c6 00 00 00 67 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 > 81 1c 63 20 08 48 cc c4 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000002 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 02 > << Rs Lun : 0 > << Command : 48 > << Compl Code : 0xcc > Error activating SOL payload: Invalid data field in request > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3c > >> data : 0xfa 0xa7 0x02 0x0d > > BUILDING A v2 COMMAND > >> sending packet (27 bytes) > 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00 > 20 18 c8 81 0c 3c fa a7 02 0d 87 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 > 81 1c 63 20 0c 3c 00 98 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000003 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 03 > << Rs Lun : 0 > << Command : 3c > << Compl Code : 0x00 > Closed Session 0d02a7fa > > [EMAIL PROTECTED] ~]# > > ********************************************************** > > > > Thank You & Best Regards, > Sophia > > > ----- Original Message ----- > From: Duncan Laurie > To: Sophia[IWill] > Cc: ipmitool-devel@lists.sourceforge.net > Sent: Tuesday, July 11, 2006 2:40 AM > Subject: Re: [Ipmitool-devel] RMCP+ session > > > On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote: > Hi sir, > > We are using Intel ESB2 BMC firmware on out platform. > But we meet some problems when using IPMITool with lanplus. > Could you help me to find out the possible failed reason when I > exectuted the following command : > ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin > raw 0x6 0x01 > > > Can you try with "-o intelplus" option on the command line and see if > it behaves better? > > Thanks, > -duncan > > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: > http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach > ments/20060713/cdb98a24/attachment.html > > ------------------------------ > > > ------------------------------------------------------------------------ > - > Using Tomcat but need to do more? Need to support web services, > security? > Get stuff done quickly with pre-integrated technology to make your job > easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache > Geronimo > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 > > > ------------------------------ > > _______________________________________________ > Ipmitool-devel mailing list > Ipmitool-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > > > End of Ipmitool-devel Digest, Vol 2, Issue 7 > ******************************************** > > > > ------------------------------ > > Message: 2 > Date: Thu, 13 Jul 2006 12:35:54 +0100 > From: "Nabarro, Tom A" <[EMAIL PROTECTED]> > Subject: Re: [Ipmitool-devel] SOL activate (Sophia[IWill]) > To: <ipmitool-devel@lists.sourceforge.net> > Message-ID: > <[EMAIL PROTECTED]> > Content-Type: text/plain; charset="US-ASCII" > > Dear Sophia[Iwill], > > To activate SOL payloads you need to do > > # SOL payload activate > ipmitool raw 06 0x4c 01 01 02 00 00 00 > > Where the third byte refers to the channel number. > > Best regards > Tom > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of > [EMAIL PROTECTED] > Sent: 13 July 2006 07:32 > To: ipmitool-devel@lists.sourceforge.net > Subject: Ipmitool-devel Digest, Vol 2, Issue 7 > > Send Ipmitool-devel mailing list submissions to > ipmitool-devel@lists.sourceforge.net > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > or, via email, send a message with subject or body 'help' to > [EMAIL PROTECTED] > > You can reach the person managing the list at > [EMAIL PROTECTED] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Ipmitool-devel digest..." > > > Today's Topics: > > 1. Re: SOL activate (Sophia[IWill]) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Thu, 13 Jul 2006 14:27:09 +0800 > From: "Sophia[IWill]" <[EMAIL PROTECTED]> > Subject: Re: [Ipmitool-devel] SOL activate > To: "Duncan Laurie" <[EMAIL PROTECTED]> > Cc: ipmitool-devel@lists.sourceforge.net, "Narayan, Nilesh" > <[EMAIL PROTECTED]>, "Kosaraju, Sridhar" > <[EMAIL PROTECTED]>, Jack_Hsu <[EMAIL PROTECTED]>, > "Hung, > Checa" <[EMAIL PROTECTED]> > Message-ID: <[EMAIL PROTECTED]> > Content-Type: text/plain; charset="iso-8859-1" > > Hi Duncan, Nilesh, > > After added "-o intelplus", RMCP+ can work now. > But I still have a problem to activate SOL. > Here are what I executed, Could you help me to find out the possible > failed reason? > > ********************************************************** > > [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H > 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true > IPMI LAN host 192.168.0.10 port 623 > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x38 > >> data : 0x8e 0x04 > > BUILDING A v1.5 COMMAND > >> IPMI Request Session Header > >> Authtype : NONE > >> Sequence : 0x00000000 > >> Session ID : 0x00000000 > >> IPMI Request Message Header > >> Rs Addr : 20 > >> NetFn : 06 > >> Rs LUN : 0 > >> Rq Addr : 81 > >> Rq Seq : 00 > >> Rq Lun : 0 > >> Command : 38 > >> sending packet (23 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 > c8 81 00 38 8e 04 b5 > << Received data (30 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c > 63 20 00 38 00 01 95 05 03 00 00 00 00 0a > << IPMI Response Session Header > << Authtype : NONE > << Payload type : IPMI (0) > << Session ID : 0x00000000 > << Sequence : 0x00000000 > << IPMI Msg/Payload Length : 16 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 00 > << Rs Lun : 0 > << Command : 38 > << Compl Code : 0x00 > >> SENDING AN OPEN SESSION REQUEST > > >> sending packet (48 bytes) > 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 > 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 > 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 > << Received data (52 bytes) > 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 > 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08 > 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 > 00 00 00 00 > <<OPEN SESSION RESPONSE > << Message tag : 0x00 > << RMCP+ status : no errors > << Maximum privilege level : admin > << Console Session ID : 0xa0a2a3a4 > << BMC Session ID : 0x0f8fd6b6 > << Negotiated authenticatin algorithm : none > << Negotiated integrity algorithm : none > << Negotiated encryption algorithm : none > > >> Console generated random number (16 bytes) > a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81 > >> SENDING A RAKP 1 MESSAGE > > >> sending packet (49 bytes) > 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 > 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6 > 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69 > 6e > << Received data (56 bytes) > 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 > 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43 > ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > <<RAKP 2 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << BMC random number : 0x711bb14caf8ca043cac167f7bb889a08 > << BMC GUID : 0x00000000000000000000000000000000 > << Key exchange auth code : none > > bmc_rand (16 bytes) > 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08 > Generated K1 (20 bytes) > 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 > 01 01 01 01 > Generated K2 (20 bytes) > 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 > 02 02 02 02 > >> SENDING A RAKP 3 MESSAGE > > >> sending packet (24 bytes) > 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 b6 d6 8f 0f > << Received data (24 bytes) > 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 a4 a3 a2 a0 > <<RAKP 4 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << Key exchange auth code : none > > IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY > > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3b > >> data : 0x04 > > BUILDING A v2 COMMAND > >> sending packet (24 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00 > 20 18 c8 81 04 3b 04 3c > << Received data (25 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 > 81 1c 63 20 04 3b 00 04 9d > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000001 > << IPMI Msg/Payload Length : 9 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 01 > << Rs Lun : 0 > << Command : 3b > << Compl Code : 0x00 > set_session_privlvl (1 bytes) > 04 > Set Session Privilege Level to ADMINISTRATOR > > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x00 0x01 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00 > 20 30 b0 81 08 21 0e 00 01 47 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 > 81 34 4b 20 08 21 00 b7 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000002 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 02 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0x00 > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x01 0x01 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00 > 20 30 b0 81 0c 21 0e 01 01 42 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 > 81 34 4b 20 0c 21 00 b3 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000003 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 03 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0x00 > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x00 0x02 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00 > 20 30 b0 81 10 21 0e 00 02 3e > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00 > 81 34 4b 20 10 21 cc e3 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000004 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 04 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0xcc > Error setting SOL parameter 'set-in-progress': Invalid data field in > request > > >> Sending IPMI command payload > >> netfn : 0x0c > >> command : 0x21 > >> data : 0x0e 0x00 0x00 > > BUILDING A v2 COMMAND > >> sending packet (26 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00 > 20 30 b0 81 14 21 0e 00 00 3c > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00 > 81 34 4b 20 14 21 00 ab > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000005 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 0d > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 05 > << Rs Lun : 0 > << Command : 21 > << Compl Code : 0x00 > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3c > >> data : 0xb6 0xd6 0x8f 0x0f > > BUILDING A v2 COMMAND > >> sending packet (27 bytes) > 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00 > 20 18 c8 81 18 3c b6 d6 8f 0f 01 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00 > 81 1c 63 20 18 3c 00 8c > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000006 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 06 > << Rs Lun : 0 > << Command : 3c > << Compl Code : 0x00 > Closed Session 0f8fd6b6 > > [EMAIL PROTECTED] ~]# > > ********************************************************** > > [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.10 > -A MD5 -L OPERATOR -U admin -P admin sol activate > IPMI LAN host 192.168.0.10 port 623 > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x38 > >> data : 0x8e 0x03 > > BUILDING A v1.5 COMMAND > >> IPMI Request Session Header > >> Authtype : NONE > >> Sequence : 0x00000000 > >> Session ID : 0x00000000 > >> IPMI Request Message Header > >> Rs Addr : 20 > >> NetFn : 06 > >> Rs LUN : 0 > >> Rq Addr : 81 > >> Rq Seq : 00 > >> Rq Lun : 0 > >> Command : 38 > >> sending packet (23 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 > c8 81 00 38 8e 03 b6 > << Received data (30 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c > 63 20 00 38 00 01 95 05 03 00 00 00 00 0a > << IPMI Response Session Header > << Authtype : NONE > << Payload type : IPMI (0) > << Session ID : 0x00000000 > << Sequence : 0x00000000 > << IPMI Msg/Payload Length : 16 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 00 > << Rs Lun : 0 > << Command : 38 > << Compl Code : 0x00 > >> SENDING AN OPEN SESSION REQUEST > > >> sending packet (48 bytes) > 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 > 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 > 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 > << Received data (52 bytes) > 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 > 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08 > 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 > 00 00 00 00 > <<OPEN SESSION RESPONSE > << Message tag : 0x00 > << RMCP+ status : no errors > << Maximum privilege level : operator > << Console Session ID : 0xa0a2a3a4 > << BMC Session ID : 0x0d02a7fa > << Negotiated authenticatin algorithm : none > << Negotiated integrity algorithm : none > << Negotiated encryption algorithm : none > > >> Console generated random number (16 bytes) > cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c > >> SENDING A RAKP 1 MESSAGE > > >> sending packet (49 bytes) > 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 > 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7 > 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69 > 6e > << Received data (56 bytes) > 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 > 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1 > fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 > <<RAKP 2 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << BMC random number : 0xb0739038011104b1fcaf0525f6aed42d > << BMC GUID : 0x00000000000000000000000000000000 > << Key exchange auth code : none > > bmc_rand (16 bytes) > b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d > Generated K1 (20 bytes) > 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 > 01 01 01 01 > Generated K2 (20 bytes) > 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 > 02 02 02 02 > >> SENDING A RAKP 3 MESSAGE > > >> sending packet (24 bytes) > 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 fa a7 02 0d > << Received data (24 bytes) > 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 > 00 00 00 00 a4 a3 a2 a0 > <<RAKP 4 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << Key exchange auth code : none > > IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY > > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3b > >> data : 0x03 > > BUILDING A v2 COMMAND > >> sending packet (24 bytes) > 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00 > 20 18 c8 81 04 3b 03 3d > << Received data (25 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00 > 81 1c 63 20 04 3b 00 03 9e > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000001 > << IPMI Msg/Payload Length : 9 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 01 > << Rs Lun : 0 > << Command : 3b > << Compl Code : 0x00 > set_session_privlvl (1 bytes) > 03 > Set Session Privilege Level to OPERATOR > > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x48 > >> data : 0x01 0x01 0xc6 0x00 0x00 0x00 > > BUILDING A v2 COMMAND > >> sending packet (29 bytes) > 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00 > 20 18 c8 81 08 48 01 01 c6 00 00 00 67 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 > 81 1c 63 20 08 48 cc c4 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000002 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 02 > << Rs Lun : 0 > << Command : 48 > << Compl Code : 0xcc > Error activating SOL payload: Invalid data field in request > > >> Sending IPMI command payload > >> netfn : 0x06 > >> command : 0x3c > >> data : 0xfa 0xa7 0x02 0x0d > > BUILDING A v2 COMMAND > >> sending packet (27 bytes) > 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00 > 20 18 c8 81 0c 3c fa a7 02 0d 87 > << Received data (24 bytes) > 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00 > 81 1c 63 20 0c 3c 00 98 > << IPMI Response Session Header > << Authtype : Unknown (0x6) > << Payload type : IPMI (0) > << Session ID : 0xa0a2a3a4 > << Sequence : 0x00000003 > << IPMI Msg/Payload Length : 8 > << IPMI Response Message Header > << Rq Addr : 81 > << NetFn : 07 > << Rq LUN : 0 > << Rs Addr : 20 > << Rq Seq : 03 > << Rs Lun : 0 > << Command : 3c > << Compl Code : 0x00 > Closed Session 0d02a7fa > > [EMAIL PROTECTED] ~]# > > ********************************************************** > > > > Thank You & Best Regards, > Sophia > > > ----- Original Message ----- > From: Duncan Laurie > To: Sophia[IWill] > Cc: ipmitool-devel@lists.sourceforge.net > Sent: Tuesday, July 11, 2006 2:40 AM > Subject: Re: [Ipmitool-devel] RMCP+ session > > > On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote: > Hi sir, > > We are using Intel ESB2 BMC firmware on out platform. > But we meet some problems when using IPMITool with lanplus. > Could you help me to find out the possible failed reason when I > exectuted the following command : > ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin > raw 0x6 0x01 > > > Can you try with "-o intelplus" option on the command line and see if > it behaves better? > > Thanks, > -duncan > > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: > http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach > ments/20060713/cdb98a24/attachment.html > > ------------------------------ > > > ------------------------------------------------------------------------ > - > Using Tomcat but need to do more? Need to support web services, > security? > Get stuff done quickly with pre-integrated technology to make your job > easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache > Geronimo > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 > > > ------------------------------ > > _______________________________________________ > Ipmitool-devel mailing list > Ipmitool-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > > > End of Ipmitool-devel Digest, Vol 2, Issue 7 > ******************************************** > > > > ------------------------------ > > > ------------------------------------------------------------------------- > Using Tomcat but need to do more? Need to support web services, security? > Get stuff done quickly with pre-integrated technology to make your job easier > Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo > http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 > > > ------------------------------ > > _______________________________________________ > Ipmitool-devel mailing list > Ipmitool-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/ipmitool-devel > > > End of Ipmitool-devel Digest, Vol 2, Issue 8 > ******************************************** > ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel