Try : ipmitool -I lanplus -H 192.168.10.11 -U yourUserName -a sol activate
Jacek Zapala a écrit : > Hello, > > Is it possible to use SOL on DELL 2950? > > ipmitool from debian stable package 1.8.8-3 > > ipmitool works with lan interface and shows: > > $ ipmitool -I lan -H 192.168.10.11 -P pass sol info > Authentication type NONE not supported > Info: SOL parameter 'Payload Channel (7)' not supported - defaulting to > 0x0e > Set in progress : set-complete > Enabled : true > Force Encryption : true > Force Authentication : false > Privilege Level : ADMINISTRATOR > Character Accumulate Level (ms) : 50 > Character Send Threshold : 220 > Retry Count : 7 > Retry Interval (ms) : 1000 > Volatile Bit Rate (kbps) : 57.6 > Non-Volatile Bit Rate (kbps) : 57.6 > Payload Channel : 14 (0x0e) > Payload Port : 623 > > $ ipmitool -I lan -H 192.168.10.11 -P pass sol activate > Error: This command is only available over the lanplus interface > > but over the lanplus interface I get: > $ ipmitool -I lanplus -H 192.168.10.11 -P pass sol activate > Error: Received an Unexpected Open Session Response > Error: Received an Unexpected RAKP 2 message > Error: Unable to establish IPMI v2 / RMCP+ session > Error: No response activating SOL payload > > > More debug: > $ ipmitool -I lanplus -H 192.168.10.11 -P pass -vv sol activate > IPMI LAN host 192.168.10.11 port 623 > >>> Sending IPMI command payload >>> netfn : 0x06 >>> command : 0x38 >>> data : 0x8e 0x04 > >>> sending packet (23 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 > c8 81 00 38 8e 04 b5 > << Received data (30 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c > 63 20 00 38 00 01 86 06 03 00 00 00 00 18 >>> SENDING AN OPEN SESSION REQUEST > >>> sending packet (48 bytes) > 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 > 00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00 > 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 > << Received data (30 bytes) > 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c > 63 20 00 38 00 01 86 06 03 00 00 00 00 18 > IPMI Request Match NOT FOUND > << Received data (52 bytes) > 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 > 00 00 04 00 a4 a3 a2 a0 00 4d 00 02 00 00 00 08 > 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 > 01 00 00 00 > <<OPEN SESSION RESPONSE > << Message tag : 0x00 > << RMCP+ status : no errors > << Maximum privilege level : admin > << Console Session ID : 0xa0a2a3a4 > << BMC Session ID : 0x02004d00 > << Negotiated authenticatin algorithm : hmac_sha1 > << Negotiated integrity algorithm : hmac_sha1_96 > << Negotiated encryption algorithm : aes_cbc_128 > >>> Console generated random number (16 bytes) > 3b 89 c3 4b 6f bb c9 96 17 d1 75 60 83 a8 c4 5a >>> SENDING A RAKP 1 MESSAGE > >>> sending packet (44 bytes) > 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 1c 00 > 00 00 00 00 00 4d 00 02 3b 89 c3 4b 6f bb c9 96 > 17 d1 75 60 83 a8 c4 5a 14 00 00 00 > << Received data (52 bytes) > 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 > 00 00 04 00 a4 a3 a2 a0 01 4e 00 02 00 00 00 08 > 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 > 01 00 00 00 > Error: Received an Unexpected Open Session Response > << Received data (76 bytes) > 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00 > 00 00 00 00 a4 a3 a2 a0 c7 84 62 ed 5a 17 f5 81 > ec a9 87 4a 07 c4 a2 00 44 45 4c 4c 32 00 10 37 > 80 42 b1 c0 4f 34 33 4a da b7 5f c0 3a f5 f2 2c > bb 1f 4c 6b f6 e6 7a ce 45 d5 28 c2 > <<RAKP 2 MESSAGE > << Message tag : 0x00 > << RMCP+ status : no errors > << Console Session ID : 0xa0a2a3a4 > << BMC random number : 0xc78462ed5a17f581eca9874a07c4a200 > << BMC GUID : 0x44454c4c320010378042b1c04f34334a > << Key exchange auth code [sha1] : > 0xdab75fc03af5f22cbb1f4c6bf6e67ace45d528c2 > > session integrity key input (34 bytes) > 3b 89 c3 4b 6f bb c9 96 17 d1 75 60 83 a8 c4 5a > c7 84 62 ed 5a 17 f5 81 ec a9 87 4a 07 c4 a2 00 > 14 00 > Generated session integrity key (20 bytes) > 7e d0 4b 1d 7c b0 1c e7 dc 04 3e 0e 75 d2 ed 9f > 27 48 32 f5 > Generated K1 (20 bytes) > fd b9 55 50 97 8d 5f 04 d5 cb 50 3b ca 88 78 4d > d1 8c bf 3b > Generated K2 (20 bytes) > 29 1a 46 42 cc 99 99 58 19 49 c6 45 da d8 00 38 > 0f 5c 5c be >>> SENDING A RAKP 3 MESSAGE > >>> sending packet (44 bytes) > 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 1c 00 > 00 00 00 00 00 4d 00 02 19 4c c9 54 6e 6c 5e af > 9b 66 98 b5 31 44 43 83 75 b7 26 91 > << Received data (76 bytes) > 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00 > 00 00 00 00 a4 a3 a2 a0 6d 2a 08 93 00 bd 9b 27 > 92 4f 2d f0 ed aa 88 4c 44 45 4c 4c 32 00 10 37 > 80 42 b1 c0 4f 34 33 4a 5d 9d 3c d1 e8 eb 98 3b > 86 31 c7 c2 d2 2d 07 98 8c 7e 48 48 > Error: Received an Unexpected RAKP 2 message > << Received data (24 bytes) > 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 > 00 0f 00 00 a4 a3 a2 a0 > <<RAKP 4 MESSAGE > << Message tag : 0x00 > << RMCP+ status : invalid integrity check value > << Console Session ID : 0xa0a2a3a4 > << Key exchange auth code [sha1] : 0x002a089300bd9b27924f2df0 > > RAKP 4 message indicates an error : invalid integrity check value > Error: Unable to establish IPMI v2 / RMCP+ session > Error: No response activating SOL payload > > > Regards, > Jacek > > > ------------------------------------------------------------------------- > This SF.net email is sponsored by: Splunk Inc. > Still grepping through log files to find problems? Stop. > Now Search log events and configuration files using AJAX and a browser. > Download your FREE copy of Splunk now >> http://get.splunk.com/ ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel