Hi Tom, Duncan, Nilesh,
I followed your instruction to add a command "raw 06 0x4c 01 01 02 00 00
00" and had a successful return.
But I still could not activate SOL successfully, and the command sequence
stopped at "Sending IPMI command payload".
Then I checked the detail of that part and found some strange data below :
>> Sending IPMI command payload
>> netfn : 0x0c
>> command : 0x21
>> data : 0x0e 0x00 0x02 =====================> It may be 0x01 0x00
0x02
BUILDING A v2 COMMAND
>> sending packet (26 bytes)
06 00 ff 07 06 00 c3 b4 a3 05 06 00 00 00 0a 00
20 30 b0 81 10 21 0e 00 02 3e
<< Received data (24 bytes)
06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
81 34 4b 20 10 21 cc e3
<< IPMI Response Session Header
<< Authtype : Unknown (0x6)
<< Payload type : IPMI (0)
<< Session ID : 0xa0a2a3a4
<< Sequence : 0x00000004
<< IPMI Msg/Payload Length : 8
<< IPMI Response Message Header
<< Rq Addr : 81
<< NetFn : 0d
<< Rq LUN : 0
<< Rs Addr : 20
<< Rq Seq : 04
<< Rs Lun : 0
<< Command : 21
<< Compl Code : 0xcc
Error setting SOL parameter 'set-in-progress': Invalid data field in request
[EMAIL PROTECTED] ~]#
----- Original Message -----
From: <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Thursday, July 13, 2006 7:39 PM
Subject: Ipmitool-devel Digest, Vol 2, Issue 8
> Send Ipmitool-devel mailing list submissions to
> [email protected]
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
> or, via email, send a message with subject or body 'help' to
> [EMAIL PROTECTED]
>
> You can reach the person managing the list at
> [EMAIL PROTECTED]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Ipmitool-devel digest..."
>
>
> Today's Topics:
>
> 1. Re: Ipmitool-devel Digest, Vol 2, Issue 7 (Nabarro, Tom A)
> 2. Re: SOL activate (Sophia[IWill]) (Nabarro, Tom A)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 13 Jul 2006 12:27:48 +0100
> From: "Nabarro, Tom A" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] Ipmitool-devel Digest, Vol 2, Issue 7
> To: <[email protected]>
> Message-ID:
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="US-ASCII"
>
> Dear Sophia[Iwill],
>
> To activate SOL payloads you need to do
>
> # SOL payload activate
> ipmitool raw 06 0x4c 01 01 02 00 00 00
>
> Where the third byte refers to the channel number.
>
> Best regards
> Tom
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> Sent: 13 July 2006 07:32
> To: [email protected]
> Subject: Ipmitool-devel Digest, Vol 2, Issue 7
>
> Send Ipmitool-devel mailing list submissions to
> [email protected]
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
> or, via email, send a message with subject or body 'help' to
> [EMAIL PROTECTED]
>
> You can reach the person managing the list at
> [EMAIL PROTECTED]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Ipmitool-devel digest..."
>
>
> Today's Topics:
>
> 1. Re: SOL activate (Sophia[IWill])
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 13 Jul 2006 14:27:09 +0800
> From: "Sophia[IWill]" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] SOL activate
> To: "Duncan Laurie" <[EMAIL PROTECTED]>
> Cc: [email protected], "Narayan, Nilesh"
> <[EMAIL PROTECTED]>, "Kosaraju, Sridhar"
> <[EMAIL PROTECTED]>, Jack_Hsu <[EMAIL PROTECTED]>,
> "Hung,
> Checa" <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="iso-8859-1"
>
> Hi Duncan, Nilesh,
>
> After added "-o intelplus", RMCP+ can work now.
> But I still have a problem to activate SOL.
> Here are what I executed, Could you help me to find out the possible
> failed reason?
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H
> 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x38
> >> data : 0x8e 0x04
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >> Authtype : NONE
> >> Sequence : 0x00000000
> >> Session ID : 0x00000000
> >> IPMI Request Message Header
> >> Rs Addr : 20
> >> NetFn : 06
> >> Rs LUN : 0
> >> Rq Addr : 81
> >> Rq Seq : 00
> >> Rq Lun : 0
> >> Command : 38
> >> sending packet (23 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
> c8 81 00 38 8e 04 b5
> << Received data (30 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
> 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> << Authtype : NONE
> << Payload type : IPMI (0)
> << Session ID : 0x00000000
> << Sequence : 0x00000000
> << IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 00
> << Rs Lun : 0
> << Command : 38
> << Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
> 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
> 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
> 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
> 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
> 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08
> 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
> 00 00 00 00
> <<OPEN SESSION RESPONSE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Maximum privilege level : admin
> << Console Session ID : 0xa0a2a3a4
> << BMC Session ID : 0x0f8fd6b6
> << Negotiated authenticatin algorithm : none
> << Negotiated integrity algorithm : none
> << Negotiated encryption algorithm : none
>
> >> Console generated random number (16 bytes)
> a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
> 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
> 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6
> 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69
> 6e
> << Received data (56 bytes)
> 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
> 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43
> ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << BMC random number : 0x711bb14caf8ca043cac167f7bb889a08
> << BMC GUID : 0x00000000000000000000000000000000
> << Key exchange auth code : none
>
> bmc_rand (16 bytes)
> 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08
> Generated K1 (20 bytes)
> 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
> 01 01 01 01
> Generated K2 (20 bytes)
> 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
> 02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
> 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 b6 d6 8f 0f
> << Received data (24 bytes)
> 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << Key exchange auth code : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3b
> >> data : 0x04
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00
> 20 18 c8 81 04 3b 04 3c
> << Received data (25 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
> 81 1c 63 20 04 3b 00 04 9d
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000001
> << IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 01
> << Rs Lun : 0
> << Command : 3b
> << Compl Code : 0x00
> set_session_privlvl (1 bytes)
> 04
> Set Session Privilege Level to ADMINISTRATOR
>
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x00 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00
> 20 30 b0 81 08 21 0e 00 01 47
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
> 81 34 4b 20 08 21 00 b7
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000002
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 02
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0x00
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x01 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00
> 20 30 b0 81 0c 21 0e 01 01 42
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
> 81 34 4b 20 0c 21 00 b3
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000003
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 03
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0x00
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x00 0x02
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00
> 20 30 b0 81 10 21 0e 00 02 3e
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
> 81 34 4b 20 10 21 cc e3
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000004
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 04
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0xcc
> Error setting SOL parameter 'set-in-progress': Invalid data field in
> request
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00
> 20 30 b0 81 14 21 0e 00 00 3c
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00
> 81 34 4b 20 14 21 00 ab
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000005
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 05
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0x00
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3c
> >> data : 0xb6 0xd6 0x8f 0x0f
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00
> 20 18 c8 81 18 3c b6 d6 8f 0f 01
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00
> 81 1c 63 20 18 3c 00 8c
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000006
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 06
> << Rs Lun : 0
> << Command : 3c
> << Compl Code : 0x00
> Closed Session 0f8fd6b6
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.10
> -A MD5 -L OPERATOR -U admin -P admin sol activate
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x38
> >> data : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >> Authtype : NONE
> >> Sequence : 0x00000000
> >> Session ID : 0x00000000
> >> IPMI Request Message Header
> >> Rs Addr : 20
> >> NetFn : 06
> >> Rs LUN : 0
> >> Rq Addr : 81
> >> Rq Seq : 00
> >> Rq Lun : 0
> >> Command : 38
> >> sending packet (23 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
> c8 81 00 38 8e 03 b6
> << Received data (30 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
> 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> << Authtype : NONE
> << Payload type : IPMI (0)
> << Session ID : 0x00000000
> << Sequence : 0x00000000
> << IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 00
> << Rs Lun : 0
> << Command : 38
> << Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
> 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
> 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
> 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
> 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
> 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08
> 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
> 00 00 00 00
> <<OPEN SESSION RESPONSE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Maximum privilege level : operator
> << Console Session ID : 0xa0a2a3a4
> << BMC Session ID : 0x0d02a7fa
> << Negotiated authenticatin algorithm : none
> << Negotiated integrity algorithm : none
> << Negotiated encryption algorithm : none
>
> >> Console generated random number (16 bytes)
> cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
> 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
> 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7
> 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69
> 6e
> << Received data (56 bytes)
> 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
> 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1
> fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << BMC random number : 0xb0739038011104b1fcaf0525f6aed42d
> << BMC GUID : 0x00000000000000000000000000000000
> << Key exchange auth code : none
>
> bmc_rand (16 bytes)
> b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d
> Generated K1 (20 bytes)
> 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
> 01 01 01 01
> Generated K2 (20 bytes)
> 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
> 02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
> 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 fa a7 02 0d
> << Received data (24 bytes)
> 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << Key exchange auth code : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3b
> >> data : 0x03
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
> 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00
> 20 18 c8 81 04 3b 03 3d
> << Received data (25 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
> 81 1c 63 20 04 3b 00 03 9e
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000001
> << IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 01
> << Rs Lun : 0
> << Command : 3b
> << Compl Code : 0x00
> set_session_privlvl (1 bytes)
> 03
> Set Session Privilege Level to OPERATOR
>
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x48
> >> data : 0x01 0x01 0xc6 0x00 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (29 bytes)
> 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00
> 20 18 c8 81 08 48 01 01 c6 00 00 00 67
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
> 81 1c 63 20 08 48 cc c4
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000002
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 02
> << Rs Lun : 0
> << Command : 48
> << Compl Code : 0xcc
> Error activating SOL payload: Invalid data field in request
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3c
> >> data : 0xfa 0xa7 0x02 0x0d
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
> 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00
> 20 18 c8 81 0c 3c fa a7 02 0d 87
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
> 81 1c 63 20 0c 3c 00 98
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000003
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 03
> << Rs Lun : 0
> << Command : 3c
> << Compl Code : 0x00
> Closed Session 0d02a7fa
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
>
>
> Thank You & Best Regards,
> Sophia
>
>
> ----- Original Message -----
> From: Duncan Laurie
> To: Sophia[IWill]
> Cc: [email protected]
> Sent: Tuesday, July 11, 2006 2:40 AM
> Subject: Re: [Ipmitool-devel] RMCP+ session
>
>
> On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote:
> Hi sir,
>
> We are using Intel ESB2 BMC firmware on out platform.
> But we meet some problems when using IPMITool with lanplus.
> Could you help me to find out the possible failed reason when I
> exectuted the following command :
> ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin
> raw 0x6 0x01
>
>
> Can you try with "-o intelplus" option on the command line and see if
> it behaves better?
>
> Thanks,
> -duncan
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach
> ments/20060713/cdb98a24/attachment.html
>
> ------------------------------
>
>
> ------------------------------------------------------------------------
> -
> Using Tomcat but need to do more? Need to support web services,
> security?
> Get stuff done quickly with pre-integrated technology to make your job
> easier
> Download IBM WebSphere Application Server v.1.0.1 based on Apache
> Geronimo
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
>
>
> ------------------------------
>
> _______________________________________________
> Ipmitool-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
>
>
> End of Ipmitool-devel Digest, Vol 2, Issue 7
> ********************************************
>
>
>
> ------------------------------
>
> Message: 2
> Date: Thu, 13 Jul 2006 12:35:54 +0100
> From: "Nabarro, Tom A" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] SOL activate (Sophia[IWill])
> To: <[email protected]>
> Message-ID:
> <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="US-ASCII"
>
> Dear Sophia[Iwill],
>
> To activate SOL payloads you need to do
>
> # SOL payload activate
> ipmitool raw 06 0x4c 01 01 02 00 00 00
>
> Where the third byte refers to the channel number.
>
> Best regards
> Tom
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> Sent: 13 July 2006 07:32
> To: [email protected]
> Subject: Ipmitool-devel Digest, Vol 2, Issue 7
>
> Send Ipmitool-devel mailing list submissions to
> [email protected]
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
> or, via email, send a message with subject or body 'help' to
> [EMAIL PROTECTED]
>
> You can reach the person managing the list at
> [EMAIL PROTECTED]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Ipmitool-devel digest..."
>
>
> Today's Topics:
>
> 1. Re: SOL activate (Sophia[IWill])
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 13 Jul 2006 14:27:09 +0800
> From: "Sophia[IWill]" <[EMAIL PROTECTED]>
> Subject: Re: [Ipmitool-devel] SOL activate
> To: "Duncan Laurie" <[EMAIL PROTECTED]>
> Cc: [email protected], "Narayan, Nilesh"
> <[EMAIL PROTECTED]>, "Kosaraju, Sridhar"
> <[EMAIL PROTECTED]>, Jack_Hsu <[EMAIL PROTECTED]>,
> "Hung,
> Checa" <[EMAIL PROTECTED]>
> Message-ID: <[EMAIL PROTECTED]>
> Content-Type: text/plain; charset="iso-8859-1"
>
> Hi Duncan, Nilesh,
>
> After added "-o intelplus", RMCP+ can work now.
> But I still have a problem to activate SOL.
> Here are what I executed, Could you help me to find out the possible
> failed reason?
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -o intelplus -H
> 192.168.0.10 -A MD5 -U admin -P admin sol set enabled true
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x38
> >> data : 0x8e 0x04
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >> Authtype : NONE
> >> Sequence : 0x00000000
> >> Session ID : 0x00000000
> >> IPMI Request Message Header
> >> Rs Addr : 20
> >> NetFn : 06
> >> Rs LUN : 0
> >> Rq Addr : 81
> >> Rq Seq : 00
> >> Rq Lun : 0
> >> Command : 38
> >> sending packet (23 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
> c8 81 00 38 8e 04 b5
> << Received data (30 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
> 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> << Authtype : NONE
> << Payload type : IPMI (0)
> << Session ID : 0x00000000
> << Sequence : 0x00000000
> << IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 00
> << Rs Lun : 0
> << Command : 38
> << Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
> 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
> 00 04 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
> 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
> 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
> 00 00 04 00 a4 a3 a2 a0 b6 d6 8f 0f 00 00 00 08
> 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
> 00 00 00 00
> <<OPEN SESSION RESPONSE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Maximum privilege level : admin
> << Console Session ID : 0xa0a2a3a4
> << BMC Session ID : 0x0f8fd6b6
> << Negotiated authenticatin algorithm : none
> << Negotiated integrity algorithm : none
> << Negotiated encryption algorithm : none
>
> >> Console generated random number (16 bytes)
> a4 df e6 fe 67 9c b4 b6 74 4c b7 0b 38 4b 55 81
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
> 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
> 00 00 00 00 b6 d6 8f 0f a4 df e6 fe 67 9c b4 b6
> 74 4c b7 0b 38 4b 55 81 14 00 00 05 61 64 6d 69
> 6e
> << Received data (56 bytes)
> 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
> 00 00 00 00 a4 a3 a2 a0 71 1b b1 4c af 8c a0 43
> ca c1 67 f7 bb 88 9a 08 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << BMC random number : 0x711bb14caf8ca043cac167f7bb889a08
> << BMC GUID : 0x00000000000000000000000000000000
> << Key exchange auth code : none
>
> bmc_rand (16 bytes)
> 71 1b b1 4c af 8c a0 43 ca c1 67 f7 bb 88 9a 08
> Generated K1 (20 bytes)
> 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
> 01 01 01 01
> Generated K2 (20 bytes)
> 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
> 02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
> 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 b6 d6 8f 0f
> << Received data (24 bytes)
> 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << Key exchange auth code : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3b
> >> data : 0x04
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 03 00 00 00 08 00
> 20 18 c8 81 04 3b 04 3c
> << Received data (25 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
> 81 1c 63 20 04 3b 00 04 9d
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000001
> << IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 01
> << Rs Lun : 0
> << Command : 3b
> << Compl Code : 0x00
> set_session_privlvl (1 bytes)
> 04
> Set Session Privilege Level to ADMINISTRATOR
>
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x00 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 04 00 00 00 0a 00
> 20 30 b0 81 08 21 0e 00 01 47
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
> 81 34 4b 20 08 21 00 b7
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000002
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 02
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0x00
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x01 0x01
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 05 00 00 00 0a 00
> 20 30 b0 81 0c 21 0e 01 01 42
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
> 81 34 4b 20 0c 21 00 b3
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000003
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 03
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0x00
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x00 0x02
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 06 00 00 00 0a 00
> 20 30 b0 81 10 21 0e 00 02 3e
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 04 00 00 00 08 00
> 81 34 4b 20 10 21 cc e3
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000004
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 04
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0xcc
> Error setting SOL parameter 'set-in-progress': Invalid data field in
> request
>
> >> Sending IPMI command payload
> >> netfn : 0x0c
> >> command : 0x21
> >> data : 0x0e 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (26 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 07 00 00 00 0a 00
> 20 30 b0 81 14 21 0e 00 00 3c
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 05 00 00 00 08 00
> 81 34 4b 20 14 21 00 ab
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000005
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 0d
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 05
> << Rs Lun : 0
> << Command : 21
> << Compl Code : 0x00
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3c
> >> data : 0xb6 0xd6 0x8f 0x0f
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
> 06 00 ff 07 06 00 b6 d6 8f 0f 08 00 00 00 0b 00
> 20 18 c8 81 18 3c b6 d6 8f 0f 01
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 06 00 00 00 08 00
> 81 1c 63 20 18 3c 00 8c
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000006
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 06
> << Rs Lun : 0
> << Command : 3c
> << Compl Code : 0x00
> Closed Session 0f8fd6b6
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
> [EMAIL PROTECTED] ~]# ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.10
> -A MD5 -L OPERATOR -U admin -P admin sol activate
> IPMI LAN host 192.168.0.10 port 623
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x38
> >> data : 0x8e 0x03
>
> BUILDING A v1.5 COMMAND
> >> IPMI Request Session Header
> >> Authtype : NONE
> >> Sequence : 0x00000000
> >> Session ID : 0x00000000
> >> IPMI Request Message Header
> >> Rs Addr : 20
> >> NetFn : 06
> >> Rs LUN : 0
> >> Rq Addr : 81
> >> Rq Seq : 00
> >> Rq Lun : 0
> >> Command : 38
> >> sending packet (23 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
> c8 81 00 38 8e 03 b6
> << Received data (30 bytes)
> 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
> 63 20 00 38 00 01 95 05 03 00 00 00 00 0a
> << IPMI Response Session Header
> << Authtype : NONE
> << Payload type : IPMI (0)
> << Session ID : 0x00000000
> << Sequence : 0x00000000
> << IPMI Msg/Payload Length : 16
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 00
> << Rs Lun : 0
> << Command : 38
> << Compl Code : 0x00
> >> SENDING AN OPEN SESSION REQUEST
>
> >> sending packet (48 bytes)
> 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
> 00 03 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00
> 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00
> << Received data (52 bytes)
> 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
> 00 00 03 00 a4 a3 a2 a0 fa a7 02 0d 00 00 00 08
> 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08
> 00 00 00 00
> <<OPEN SESSION RESPONSE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Maximum privilege level : operator
> << Console Session ID : 0xa0a2a3a4
> << BMC Session ID : 0x0d02a7fa
> << Negotiated authenticatin algorithm : none
> << Negotiated integrity algorithm : none
> << Negotiated encryption algorithm : none
>
> >> Console generated random number (16 bytes)
> cc 89 73 77 f1 a7 4d f7 2a f3 f9 82 97 15 0b 8c
> >> SENDING A RAKP 1 MESSAGE
>
> >> sending packet (49 bytes)
> 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
> 00 00 00 00 fa a7 02 0d cc 89 73 77 f1 a7 4d f7
> 2a f3 f9 82 97 15 0b 8c 13 00 00 05 61 64 6d 69
> 6e
> << Received data (56 bytes)
> 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00
> 00 00 00 00 a4 a3 a2 a0 b0 73 90 38 01 11 04 b1
> fc af 05 25 f6 ae d4 2d 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00
> <<RAKP 2 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << BMC random number : 0xb0739038011104b1fcaf0525f6aed42d
> << BMC GUID : 0x00000000000000000000000000000000
> << Key exchange auth code : none
>
> bmc_rand (16 bytes)
> b0 73 90 38 01 11 04 b1 fc af 05 25 f6 ae d4 2d
> Generated K1 (20 bytes)
> 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01
> 01 01 01 01
> Generated K2 (20 bytes)
> 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02
> 02 02 02 02
> >> SENDING A RAKP 3 MESSAGE
>
> >> sending packet (24 bytes)
> 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 fa a7 02 0d
> << Received data (24 bytes)
> 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
> 00 00 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> << Message tag : 0x00
> << RMCP+ status : no errors
> << Console Session ID : 0xa0a2a3a4
> << Key exchange auth code : none
>
> IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY
>
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3b
> >> data : 0x03
>
> BUILDING A v2 COMMAND
> >> sending packet (24 bytes)
> 06 00 ff 07 06 00 fa a7 02 0d 03 00 00 00 08 00
> 20 18 c8 81 04 3b 03 3d
> << Received data (25 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 09 00
> 81 1c 63 20 04 3b 00 03 9e
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000001
> << IPMI Msg/Payload Length : 9
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 01
> << Rs Lun : 0
> << Command : 3b
> << Compl Code : 0x00
> set_session_privlvl (1 bytes)
> 03
> Set Session Privilege Level to OPERATOR
>
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x48
> >> data : 0x01 0x01 0xc6 0x00 0x00 0x00
>
> BUILDING A v2 COMMAND
> >> sending packet (29 bytes)
> 06 00 ff 07 06 00 fa a7 02 0d 04 00 00 00 0d 00
> 20 18 c8 81 08 48 01 01 c6 00 00 00 67
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00
> 81 1c 63 20 08 48 cc c4
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000002
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 02
> << Rs Lun : 0
> << Command : 48
> << Compl Code : 0xcc
> Error activating SOL payload: Invalid data field in request
>
> >> Sending IPMI command payload
> >> netfn : 0x06
> >> command : 0x3c
> >> data : 0xfa 0xa7 0x02 0x0d
>
> BUILDING A v2 COMMAND
> >> sending packet (27 bytes)
> 06 00 ff 07 06 00 fa a7 02 0d 05 00 00 00 0b 00
> 20 18 c8 81 0c 3c fa a7 02 0d 87
> << Received data (24 bytes)
> 06 00 ff 07 06 00 a4 a3 a2 a0 03 00 00 00 08 00
> 81 1c 63 20 0c 3c 00 98
> << IPMI Response Session Header
> << Authtype : Unknown (0x6)
> << Payload type : IPMI (0)
> << Session ID : 0xa0a2a3a4
> << Sequence : 0x00000003
> << IPMI Msg/Payload Length : 8
> << IPMI Response Message Header
> << Rq Addr : 81
> << NetFn : 07
> << Rq LUN : 0
> << Rs Addr : 20
> << Rq Seq : 03
> << Rs Lun : 0
> << Command : 3c
> << Compl Code : 0x00
> Closed Session 0d02a7fa
>
> [EMAIL PROTECTED] ~]#
>
> **********************************************************
>
>
>
> Thank You & Best Regards,
> Sophia
>
>
> ----- Original Message -----
> From: Duncan Laurie
> To: Sophia[IWill]
> Cc: [email protected]
> Sent: Tuesday, July 11, 2006 2:40 AM
> Subject: Re: [Ipmitool-devel] RMCP+ session
>
>
> On 7/9/06, Sophia[IWill] <[EMAIL PROTECTED]> wrote:
> Hi sir,
>
> We are using Intel ESB2 BMC firmware on out platform.
> But we meet some problems when using IPMITool with lanplus.
> Could you help me to find out the possible failed reason when I
> exectuted the following command :
> ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin
> raw 0x6 0x01
>
>
> Can you try with "-o intelplus" option on the command line and see if
> it behaves better?
>
> Thanks,
> -duncan
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> http://sourceforge.net/mailarchive/forum.php?forum=ipmitool-devel/attach
> ments/20060713/cdb98a24/attachment.html
>
> ------------------------------
>
>
> ------------------------------------------------------------------------
> -
> Using Tomcat but need to do more? Need to support web services,
> security?
> Get stuff done quickly with pre-integrated technology to make your job
> easier
> Download IBM WebSphere Application Server v.1.0.1 based on Apache
> Geronimo
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
>
>
> ------------------------------
>
> _______________________________________________
> Ipmitool-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
>
>
> End of Ipmitool-devel Digest, Vol 2, Issue 7
> ********************************************
>
>
>
> ------------------------------
>
>
> -------------------------------------------------------------------------
> Using Tomcat but need to do more? Need to support web services, security?
> Get stuff done quickly with pre-integrated technology to make your job
easier
> Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
>
>
> ------------------------------
>
> _______________________________________________
> Ipmitool-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/ipmitool-devel
>
>
> End of Ipmitool-devel Digest, Vol 2, Issue 8
> ********************************************
>
-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Ipmitool-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel