Hi Tom, Duncan, Nilesh,

    I followed your instruction to add a command "raw 06 0x4c 01 01 02 00 00
00" and had a successful return.
But I still could not activate SOL successfully, and the command sequence
stopped at "Sending IPMI command payload".
Then I checked the detail of that part and found some strange data below :

>> Sending IPMI command payload
>>    netfn   : 0x0c
>>    command : 0x21
>>    data    : 0x0e 0x00 0x02  =====================> It may be  0x01 0x00
0x02

BUILDING A v2 COMMAND
>> sending packet (26 bytes)
 06 00 ff 07 06 00 c3 b4 a3 05 06 00 00 00 0a 00
 20 30 b0 81 10 21 0e 00 02 3e
<< Received data (24 bytes)
 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
 81 34 4b 20 10 21 cc e3
<< IPMI Response Session Header
<<   Authtype                : Unknown (0x6)
<<   Payload type            : IPMI (0)
<<   Session ID              : 0xa0a2a3a4
<<   Sequence                : 0x00000004
<<   IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<<   Rq Addr    : 81
<<   NetFn      : 0d
<<   Rq LUN     : 0
<<   Rs Addr    : 20
<<   Rq Seq     : 04
<<   Rs Lun     : 0
<<   Command    : 21
<<   Compl Code : 0xcc
Error setting SOL parameter 'set-in-progress': Invalid data field in request

[EMAIL PROTECTED] ~]#

----- Original Message -----
From: <[EMAIL PROTECTED]>
To: <ipmitool-devel@lists.sourceforge.net>
Sent: Thursday, July 13, 2006 7:39 PM
Subject: Ipmitool-devel Digest, Vol 2, Issue 8


> Send Ipmitool-devel mailing list submissions to
> ipmitool-devel@lists.sourceforge.net
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
> or, via email, send a message with subject or body 'help' to
> [EMAIL PROTECTED]
>
> You can reach the person managing the list at
> [EMAIL PROTECTED]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Ipmitool-devel digest..."
>
>
> Today's Topics:
>
>    1. Re: Ipmitool-devel Digest, Vol 2, Issue 7 (Nabarro, Tom A)
>    2. Re: SOL activate (Sophia[IWill]) (Nabarro, Tom A)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 13 Jul 2006 12:27:48 +0100
> From: "Nabarro, Tom A" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] Ipmitool-devel Digest, Vol 2, Issue 7
> To: <ipmitool-devel@lists.sourceforge.net>
> Message-ID:
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="US-ASCII"
>
> Dear Sophia[Iwill],
>
> To activate SOL payloads you need to do
>
> # SOL payload activate
> ipmitool raw 06 0x4c 01 01 02 00 00 00
>
> Where the third byte refers to the channel number.
>
> Best regards
> Tom
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> Sent: 13 July 2006 07:32
> To: ipmitool-devel@lists.sourceforge.net
> Subject: Ipmitool-devel Digest, Vol 2, Issue 7
>
> Send Ipmitool-devel mailing list submissions to
> ipmitool-devel@lists.sourceforge.net
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
> or, via email, send a message with subject or body 'help' to
> [EMAIL PROTECTED]
>
> You can reach the person managing the list at
> [EMAIL PROTECTED]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Ipmitool-devel digest..."
>
>
> Today's Topics:
>
>    1. Re: SOL activate (Sophia[IWill])
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 13 Jul 2006 14:27:09 +0800
> From: "Sophia[IWill]" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] SOL activate
> To: "Duncan Laurie" <[EMAIL PROTECTED]>
> Cc: ipmitool-devel@lists.sourceforge.net, "Narayan, Nilesh"
> <[EMAIL PROTECTED]>, "Kosaraju, Sridhar"
> <[EMAIL PROTECTED]>, Jack_Hsu <[EMAIL PROTECTED]>,
> "Hung,
> Checa" <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="iso-8859-1"
>
> Hi Duncan, Nilesh,
>
>     After added "-o intelplus", RMCP+ can work now.
> But I still have a problem to activate SOL.
> Here are what I executed, Could you help me to find out the possible
> failed reason?
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H
> 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x38
> >>    data    : 0x8e 0x04
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >>   Authtype   : NONE
> >>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
> >> IPMI Request Message Header
> >>   Rs Addr    : 20
> >>   NetFn      : 06
> >>   Rs LUN     : 0
> >>   Rq Addr    : 81
> >>   Rq Seq     : 00
> >>   Rq Lun     : 0
> >>   Command    : 38
> >> sending packet (23 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
>  c8 81 00 38 8e 04 b5
> << Received data (30 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
>  63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> <<   Authtype                : NONE
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0x00000000
> <<   Sequence                : 0x00000000
> <<   IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 00
> <<   Rs Lun     : 0
> <<   Command    : 38
> <<   Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
>  06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
>  00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
>  01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
>  06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
>  00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08
>  00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
>  00 00 00 00
> <<OPEN SESSION RESPONSE
> <<  Message tag                        : 0x00
> <<  RMCP+ status                       : no errors
> <<  Maximum privilege level            : admin
> <<  Console Session ID                 : 0xa0a2a3a4
> <<  BMC Session ID                     : 0x0f8fd6b6
> <<  Negotiated authenticatin algorithm : none
> <<  Negotiated integrity algorithm     : none
> <<  Negotiated encryption algorithm    : none
>
> >> Console generated random number (16 bytes)
>  a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
>  06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
>  00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6
>  74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69
>  6e
> << Received data (56 bytes)
>  06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
>  00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43
>  ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00
>  00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  BMC random number             : 0x711bb14caf8ca043cac167f7bb889a08
> <<  BMC GUID                      : 0x00000000000000000000000000000000
> <<  Key exchange auth code         : none
>
> bmc_rand (16 bytes)
>  71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08
> Generated K1 (20 bytes)
>  01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
>  01 01 01 01
> Generated K2 (20 bytes)
>  02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
>  02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
>  06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 b6 d6 8f 0f
> << Received data (24 bytes)
>  06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  Key exchange auth code        : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3b
> >>    data    : 0x04
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00
>  20 18 c8 81 04 3b 04 3c
> << Received data (25 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
>  81 1c 63 20 04 3b 00 04 9d
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000001
> <<   IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 01
> <<   Rs Lun     : 0
> <<   Command    : 3b
> <<   Compl Code : 0x00
> set_session_privlvl (1 bytes)
>  04
> Set Session Privilege Level to ADMINISTRATOR
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x00 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00
>  20 30 b0 81 08 21 0e 00 01 47
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
>  81 34 4b 20 08 21 00 b7
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000002
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 02
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0x00
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x01 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00
>  20 30 b0 81 0c 21 0e 01 01 42
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
>  81 34 4b 20 0c 21 00 b3
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000003
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 03
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0x00
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x00 0x02
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00
>  20 30 b0 81 10 21 0e 00 02 3e
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
>  81 34 4b 20 10 21 cc e3
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000004
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 04
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0xcc
> Error setting SOL parameter 'set-in-progress': Invalid data field in
> request
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00
>  20 30 b0 81 14 21 0e 00 00 3c
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00
>  81 34 4b 20 14 21 00 ab
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000005
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 05
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0x00
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3c
> >>    data    : 0xb6 0xd6 0x8f 0x0f
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00
>  20 18 c8 81 18 3c b6 d6 8f 0f 01
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00
>  81 1c 63 20 18 3c 00 8c
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000006
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 06
> <<   Rs Lun     : 0
> <<   Command    : 3c
> <<   Compl Code : 0x00
> Closed Session 0f8fd6b6
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v  -C0 -I lanplus  -H 192.168.0.10
> -A MD5 -L OPERATOR -U admin -P admin sol activate
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x38
> >>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >>   Authtype   : NONE
> >>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
> >> IPMI Request Message Header
> >>   Rs Addr    : 20
> >>   NetFn      : 06
> >>   Rs LUN     : 0
> >>   Rq Addr    : 81
> >>   Rq Seq     : 00
> >>   Rq Lun     : 0
> >>   Command    : 38
> >> sending packet (23 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
>  c8 81 00 38 8e 03 b6
> << Received data (30 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
>  63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> <<   Authtype                : NONE
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0x00000000
> <<   Sequence                : 0x00000000
> <<   IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 00
> <<   Rs Lun     : 0
> <<   Command    : 38
> <<   Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
>  06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
>  00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
>  01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
>  06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
>  00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08
>  00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
>  00 00 00 00
> <<OPEN SESSION RESPONSE
> <<  Message tag                        : 0x00
> <<  RMCP+ status                       : no errors
> <<  Maximum privilege level            : operator
> <<  Console Session ID                 : 0xa0a2a3a4
> <<  BMC Session ID                     : 0x0d02a7fa
> <<  Negotiated authenticatin algorithm : none
> <<  Negotiated integrity algorithm     : none
> <<  Negotiated encryption algorithm    : none
>
> >> Console generated random number (16 bytes)
>  cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
>  06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
>  00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7
>  2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69
>  6e
> << Received data (56 bytes)
>  06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
>  00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1
>  fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00
>  00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  BMC random number             : 0xb0739038011104b1fcaf0525f6aed42d
> <<  BMC GUID                      : 0x00000000000000000000000000000000
> <<  Key exchange auth code         : none
>
> bmc_rand (16 bytes)
>  b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d
> Generated K1 (20 bytes)
>  01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
>  01 01 01 01
> Generated K2 (20 bytes)
>  02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
>  02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
>  06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 fa a7 02 0d
> << Received data (24 bytes)
>  06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  Key exchange auth code        : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3b
> >>    data    : 0x03
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
>  06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00
>  20 18 c8 81 04 3b 03 3d
> << Received data (25 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
>  81 1c 63 20 04 3b 00 03 9e
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000001
> <<   IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 01
> <<   Rs Lun     : 0
> <<   Command    : 3b
> <<   Compl Code : 0x00
> set_session_privlvl (1 bytes)
>  03
> Set Session Privilege Level to OPERATOR
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x48
> >>    data    : 0x01 0x01 0xc6 0x00 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (29 bytes)
>  06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00
>  20 18 c8 81 08 48 01 01 c6 00 00 00 67
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
>  81 1c 63 20 08 48 cc c4
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000002
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 02
> <<   Rs Lun     : 0
> <<   Command    : 48
> <<   Compl Code : 0xcc
> Error activating SOL payload: Invalid data field in request
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3c
> >>    data    : 0xfa 0xa7 0x02 0x0d
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
>  06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00
>  20 18 c8 81 0c 3c fa a7 02 0d 87
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
>  81 1c 63 20 0c 3c 00 98
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000003
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 03
> <<   Rs Lun     : 0
> <<   Command    : 3c
> <<   Compl Code : 0x00
> Closed Session 0d02a7fa
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
>
>
> Thank You & Best Regards,
> Sophia
>
>
>   ----- Original Message -----
>   From: Duncan Laurie
>   To: Sophia[IWill]
>   Cc: ipmitool-devel@lists.sourceforge.net
>   Sent: Tuesday, July 11, 2006 2:40 AM
>   Subject: Re: [Ipmitool-devel] RMCP+ session
>
>
>   On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote:
>     Hi sir,
>
>     We are using Intel ESB2 BMC firmware on out platform.
>     But we meet some problems when using IPMITool with lanplus.
>     Could you help me to find out the possible failed reason when I
> exectuted the following command :
>     ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin
> raw 0x6 0x01
>
>
>   Can you try with "-o intelplus" option on the command line and see if
> it behaves better?
>
>   Thanks,
>   -duncan
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach
> ments/20060713/cdb98a24/attachment.html
>
> ------------------------------
>
>
> ------------------------------------------------------------------------
> -
> Using Tomcat but need to do more? Need to support web services,
> security?
> Get stuff done quickly with pre-integrated technology to make your job
> easier
> Download IBM WebSphere Application Server v.1.0.1 based on Apache
> Geronimo
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
>
>
> ------------------------------
>
> _______________________________________________
> Ipmitool-devel mailing list
> Ipmitool-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
>
>
> End of Ipmitool-devel Digest, Vol 2, Issue 7
> ********************************************
>
>
>
> ------------------------------
>
> Message: 2
> Date: Thu, 13 Jul 2006 12:35:54 +0100
> From: "Nabarro, Tom A" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] SOL activate (Sophia[IWill])
> To: <ipmitool-devel@lists.sourceforge.net>
> Message-ID:
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="US-ASCII"
>
> Dear Sophia[Iwill],
>
> To activate SOL payloads you need to do
>
> # SOL payload activate
> ipmitool raw 06 0x4c 01 01 02 00 00 00
>
> Where the third byte refers to the channel number.
>
> Best regards
> Tom
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> Sent: 13 July 2006 07:32
> To: ipmitool-devel@lists.sourceforge.net
> Subject: Ipmitool-devel Digest, Vol 2, Issue 7
>
> Send Ipmitool-devel mailing list submissions to
> ipmitool-devel@lists.sourceforge.net
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
> or, via email, send a message with subject or body 'help' to
> [EMAIL PROTECTED]
>
> You can reach the person managing the list at
> [EMAIL PROTECTED]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Ipmitool-devel digest..."
>
>
> Today's Topics:
>
>    1. Re: SOL activate (Sophia[IWill])
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 13 Jul 2006 14:27:09 +0800
> From: "Sophia[IWill]" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] SOL activate
> To: "Duncan Laurie" <[EMAIL PROTECTED]>
> Cc: ipmitool-devel@lists.sourceforge.net, "Narayan, Nilesh"
> <[EMAIL PROTECTED]>, "Kosaraju, Sridhar"
> <[EMAIL PROTECTED]>, Jack_Hsu <[EMAIL PROTECTED]>,
> "Hung,
> Checa" <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="iso-8859-1"
>
> Hi Duncan, Nilesh,
>
>     After added "-o intelplus", RMCP+ can work now.
> But I still have a problem to activate SOL.
> Here are what I executed, Could you help me to find out the possible
> failed reason?
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H
> 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x38
> >>    data    : 0x8e 0x04
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >>   Authtype   : NONE
> >>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
> >> IPMI Request Message Header
> >>   Rs Addr    : 20
> >>   NetFn      : 06
> >>   Rs LUN     : 0
> >>   Rq Addr    : 81
> >>   Rq Seq     : 00
> >>   Rq Lun     : 0
> >>   Command    : 38
> >> sending packet (23 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
>  c8 81 00 38 8e 04 b5
> << Received data (30 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
>  63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> <<   Authtype                : NONE
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0x00000000
> <<   Sequence                : 0x00000000
> <<   IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 00
> <<   Rs Lun     : 0
> <<   Command    : 38
> <<   Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
>  06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
>  00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
>  01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
>  06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
>  00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08
>  00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
>  00 00 00 00
> <<OPEN SESSION RESPONSE
> <<  Message tag                        : 0x00
> <<  RMCP+ status                       : no errors
> <<  Maximum privilege level            : admin
> <<  Console Session ID                 : 0xa0a2a3a4
> <<  BMC Session ID                     : 0x0f8fd6b6
> <<  Negotiated authenticatin algorithm : none
> <<  Negotiated integrity algorithm     : none
> <<  Negotiated encryption algorithm    : none
>
> >> Console generated random number (16 bytes)
>  a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
>  06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
>  00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6
>  74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69
>  6e
> << Received data (56 bytes)
>  06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
>  00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43
>  ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00
>  00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  BMC random number             : 0x711bb14caf8ca043cac167f7bb889a08
> <<  BMC GUID                      : 0x00000000000000000000000000000000
> <<  Key exchange auth code         : none
>
> bmc_rand (16 bytes)
>  71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08
> Generated K1 (20 bytes)
>  01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
>  01 01 01 01
> Generated K2 (20 bytes)
>  02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
>  02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
>  06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 b6 d6 8f 0f
> << Received data (24 bytes)
>  06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  Key exchange auth code        : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3b
> >>    data    : 0x04
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00
>  20 18 c8 81 04 3b 04 3c
> << Received data (25 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
>  81 1c 63 20 04 3b 00 04 9d
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000001
> <<   IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 01
> <<   Rs Lun     : 0
> <<   Command    : 3b
> <<   Compl Code : 0x00
> set_session_privlvl (1 bytes)
>  04
> Set Session Privilege Level to ADMINISTRATOR
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x00 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00
>  20 30 b0 81 08 21 0e 00 01 47
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
>  81 34 4b 20 08 21 00 b7
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000002
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 02
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0x00
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x01 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00
>  20 30 b0 81 0c 21 0e 01 01 42
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
>  81 34 4b 20 0c 21 00 b3
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000003
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 03
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0x00
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x00 0x02
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00
>  20 30 b0 81 10 21 0e 00 02 3e
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
>  81 34 4b 20 10 21 cc e3
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000004
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 04
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0xcc
> Error setting SOL parameter 'set-in-progress': Invalid data field in
> request
>
> >> Sending IPMI command payload
> >>    netfn   : 0x0c
> >>    command : 0x21
> >>    data    : 0x0e 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00
>  20 30 b0 81 14 21 0e 00 00 3c
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00
>  81 34 4b 20 14 21 00 ab
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000005
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 0d
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 05
> <<   Rs Lun     : 0
> <<   Command    : 21
> <<   Compl Code : 0x00
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3c
> >>    data    : 0xb6 0xd6 0x8f 0x0f
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
>  06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00
>  20 18 c8 81 18 3c b6 d6 8f 0f 01
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00
>  81 1c 63 20 18 3c 00 8c
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000006
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 06
> <<   Rs Lun     : 0
> <<   Command    : 3c
> <<   Compl Code : 0x00
> Closed Session 0f8fd6b6
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v  -C0 -I lanplus  -H 192.168.0.10
> -A MD5 -L OPERATOR -U admin -P admin sol activate
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x38
> >>    data    : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >>   Authtype   : NONE
> >>   Sequence   : 0x00000000
> >>   Session ID : 0x00000000
> >> IPMI Request Message Header
> >>   Rs Addr    : 20
> >>   NetFn      : 06
> >>   Rs LUN     : 0
> >>   Rq Addr    : 81
> >>   Rq Seq     : 00
> >>   Rq Lun     : 0
> >>   Command    : 38
> >> sending packet (23 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
>  c8 81 00 38 8e 03 b6
> << Received data (30 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
>  63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> <<   Authtype                : NONE
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0x00000000
> <<   Sequence                : 0x00000000
> <<   IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 00
> <<   Rs Lun     : 0
> <<   Command    : 38
> <<   Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
>  06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
>  00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
>  01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
>  06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
>  00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08
>  00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
>  00 00 00 00
> <<OPEN SESSION RESPONSE
> <<  Message tag                        : 0x00
> <<  RMCP+ status                       : no errors
> <<  Maximum privilege level            : operator
> <<  Console Session ID                 : 0xa0a2a3a4
> <<  BMC Session ID                     : 0x0d02a7fa
> <<  Negotiated authenticatin algorithm : none
> <<  Negotiated integrity algorithm     : none
> <<  Negotiated encryption algorithm    : none
>
> >> Console generated random number (16 bytes)
>  cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
>  06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
>  00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7
>  2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69
>  6e
> << Received data (56 bytes)
>  06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
>  00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1
>  fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00
>  00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  BMC random number             : 0xb0739038011104b1fcaf0525f6aed42d
> <<  BMC GUID                      : 0x00000000000000000000000000000000
> <<  Key exchange auth code         : none
>
> bmc_rand (16 bytes)
>  b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d
> Generated K1 (20 bytes)
>  01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
>  01 01 01 01
> Generated K2 (20 bytes)
>  02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
>  02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
>  06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 fa a7 02 0d
> << Received data (24 bytes)
>  06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
>  00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  Key exchange auth code        : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3b
> >>    data    : 0x03
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
>  06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00
>  20 18 c8 81 04 3b 03 3d
> << Received data (25 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
>  81 1c 63 20 04 3b 00 03 9e
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000001
> <<   IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 01
> <<   Rs Lun     : 0
> <<   Command    : 3b
> <<   Compl Code : 0x00
> set_session_privlvl (1 bytes)
>  03
> Set Session Privilege Level to OPERATOR
>
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x48
> >>    data    : 0x01 0x01 0xc6 0x00 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (29 bytes)
>  06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00
>  20 18 c8 81 08 48 01 01 c6 00 00 00 67
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
>  81 1c 63 20 08 48 cc c4
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000002
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 02
> <<   Rs Lun     : 0
> <<   Command    : 48
> <<   Compl Code : 0xcc
> Error activating SOL payload: Invalid data field in request
>
> >> Sending IPMI command payload
> >>    netfn   : 0x06
> >>    command : 0x3c
> >>    data    : 0xfa 0xa7 0x02 0x0d
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
>  06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00
>  20 18 c8 81 0c 3c fa a7 02 0d 87
> << Received data (24 bytes)
>  06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
>  81 1c 63 20 0c 3c 00 98
> << IPMI Response Session Header
> <<   Authtype                : Unknown (0x6)
> <<   Payload type            : IPMI (0)
> <<   Session ID              : 0xa0a2a3a4
> <<   Sequence                : 0x00000003
> <<   IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> <<   Rq Addr    : 81
> <<   NetFn      : 07
> <<   Rq LUN     : 0
> <<   Rs Addr    : 20
> <<   Rq Seq     : 03
> <<   Rs Lun     : 0
> <<   Command    : 3c
> <<   Compl Code : 0x00
> Closed Session 0d02a7fa
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
>
>
> Thank You & Best Regards,
> Sophia
>
>
>   ----- Original Message -----
>   From: Duncan Laurie
>   To: Sophia[IWill]
>   Cc: ipmitool-devel@lists.sourceforge.net
>   Sent: Tuesday, July 11, 2006 2:40 AM
>   Subject: Re: [Ipmitool-devel] RMCP+ session
>
>
>   On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote:
>     Hi sir,
>
>     We are using Intel ESB2 BMC firmware on out platform.
>     But we meet some problems when using IPMITool with lanplus.
>     Could you help me to find out the possible failed reason when I
> exectuted the following command :
>     ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin
> raw 0x6 0x01
>
>
>   Can you try with "-o intelplus" option on the command line and see if
> it behaves better?
>
>   Thanks,
>   -duncan
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach
> ments/20060713/cdb98a24/attachment.html
>
> ------------------------------
>
>
> ------------------------------------------------------------------------
> -
> Using Tomcat but need to do more? Need to support web services,
> security?
> Get stuff done quickly with pre-integrated technology to make your job
> easier
> Download IBM WebSphere Application Server v.1.0.1 based on Apache
> Geronimo
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
>
>
> ------------------------------
>
> _______________________________________________
> Ipmitool-devel mailing list
> Ipmitool-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
>
>
> End of Ipmitool-devel Digest, Vol 2, Issue 7
> ********************************************
>
>
>
> ------------------------------
>
>
> -------------------------------------------------------------------------
> Using Tomcat but need to do more? Need to support web services, security?
> Get stuff done quickly with pre-integrated technology to make your job
easier
> Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
>
>
> ------------------------------
>
> _______________________________________________
> Ipmitool-devel mailing list
> Ipmitool-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
>
>
> End of Ipmitool-devel Digest, Vol 2, Issue 8
> ********************************************
>




-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to