First upgrade to ipmitool-1.8.9, which has significant SOL changes/fixes. Andy
-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jacek Zapala Sent: Thursday, October 04, 2007 7:49 AM To: ipmitool-devel@lists.sourceforge.net Subject: [Ipmitool-devel] SOL on DELL 2950 Hello, Is it possible to use SOL on DELL 2950? ipmitool from debian stable package 1.8.8-3 ipmitool works with lan interface and shows: $ ipmitool -I lan -H 192.168.10.11 -P pass sol info Authentication type NONE not supported Info: SOL parameter 'Payload Channel (7)' not supported - defaulting to 0x0e Set in progress : set-complete Enabled : true Force Encryption : true Force Authentication : false Privilege Level : ADMINISTRATOR Character Accumulate Level (ms) : 50 Character Send Threshold : 220 Retry Count : 7 Retry Interval (ms) : 1000 Volatile Bit Rate (kbps) : 57.6 Non-Volatile Bit Rate (kbps) : 57.6 Payload Channel : 14 (0x0e) Payload Port : 623 $ ipmitool -I lan -H 192.168.10.11 -P pass sol activate Error: This command is only available over the lanplus interface but over the lanplus interface I get: $ ipmitool -I lanplus -H 192.168.10.11 -P pass sol activate Error: Received an Unexpected Open Session Response Error: Received an Unexpected RAKP 2 message Error: Unable to establish IPMI v2 / RMCP+ session Error: No response activating SOL payload More debug: $ ipmitool -I lanplus -H 192.168.10.11 -P pass -vv sol activate IPMI LAN host 192.168.10.11 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 04 b5 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 86 06 03 00 00 00 00 18 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48 bytes) 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 86 06 03 00 00 00 00 18 IPMI Request Match NOT FOUND << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 04 00 a4 a3 a2 a0 00 4d 00 02 00 00 00 08 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : admin << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x02004d00 << Negotiated authenticatin algorithm : hmac_sha1 << Negotiated integrity algorithm : hmac_sha1_96 << Negotiated encryption algorithm : aes_cbc_128 >> Console generated random number (16 bytes) 3b 89 c3 4b 6f bb c9 96 17 d1 75 60 83 a8 c4 5a >> SENDING A RAKP 1 MESSAGE >> sending packet (44 bytes) 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 1c 00 00 00 00 00 00 4d 00 02 3b 89 c3 4b 6f bb c9 96 17 d1 75 60 83 a8 c4 5a 14 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 04 00 a4 a3 a2 a0 01 4e 00 02 00 00 00 08 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 Error: Received an Unexpected Open Session Response << Received data (76 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00 00 00 00 00 a4 a3 a2 a0 c7 84 62 ed 5a 17 f5 81 ec a9 87 4a 07 c4 a2 00 44 45 4c 4c 32 00 10 37 80 42 b1 c0 4f 34 33 4a da b7 5f c0 3a f5 f2 2c bb 1f 4c 6b f6 e6 7a ce 45 d5 28 c2 <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0xc78462ed5a17f581eca9874a07c4a200 << BMC GUID : 0x44454c4c320010378042b1c04f34334a << Key exchange auth code [sha1] : 0xdab75fc03af5f22cbb1f4c6bf6e67ace45d528c2 session integrity key input (34 bytes) 3b 89 c3 4b 6f bb c9 96 17 d1 75 60 83 a8 c4 5a c7 84 62 ed 5a 17 f5 81 ec a9 87 4a 07 c4 a2 00 14 00 Generated session integrity key (20 bytes) 7e d0 4b 1d 7c b0 1c e7 dc 04 3e 0e 75 d2 ed 9f 27 48 32 f5 Generated K1 (20 bytes) fd b9 55 50 97 8d 5f 04 d5 cb 50 3b ca 88 78 4d d1 8c bf 3b Generated K2 (20 bytes) 29 1a 46 42 cc 99 99 58 19 49 c6 45 da d8 00 38 0f 5c 5c be >> SENDING A RAKP 3 MESSAGE >> sending packet (44 bytes) 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 1c 00 00 00 00 00 00 4d 00 02 19 4c c9 54 6e 6c 5e af 9b 66 98 b5 31 44 43 83 75 b7 26 91 << Received data (76 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00 00 00 00 00 a4 a3 a2 a0 6d 2a 08 93 00 bd 9b 27 92 4f 2d f0 ed aa 88 4c 44 45 4c 4c 32 00 10 37 80 42 b1 c0 4f 34 33 4a 5d 9d 3c d1 e8 eb 98 3b 86 31 c7 c2 d2 2d 07 98 8c 7e 48 48 Error: Received an Unexpected RAKP 2 message << Received data (24 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 00 0f 00 00 a4 a3 a2 a0 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : invalid integrity check value << Console Session ID : 0xa0a2a3a4 << Key exchange auth code [sha1] : 0x002a089300bd9b27924f2df0 RAKP 4 message indicates an error : invalid integrity check value Error: Unable to establish IPMI v2 / RMCP+ session Error: No response activating SOL payload Regards, Jacek ------------------------------------------------------------------------ - This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel