Try :
ipmitool -I lanplus -H 192.168.10.11 -U yourUserName -a  sol activate

Jacek Zapala a écrit :
> Hello,
> 
> Is it possible to use SOL on DELL 2950?
> 
> ipmitool from debian stable package 1.8.8-3
> 
> ipmitool works with lan interface and shows:
> 
> $ ipmitool -I lan -H 192.168.10.11 -P pass sol info
> Authentication type NONE not supported
> Info: SOL parameter 'Payload Channel (7)' not supported - defaulting to
> 0x0e
> Set in progress                 : set-complete
> Enabled                         : true
> Force Encryption                : true
> Force Authentication            : false
> Privilege Level                 : ADMINISTRATOR
> Character Accumulate Level (ms) : 50
> Character Send Threshold        : 220
> Retry Count                     : 7
> Retry Interval (ms)             : 1000
> Volatile Bit Rate (kbps)        : 57.6
> Non-Volatile Bit Rate (kbps)    : 57.6
> Payload Channel                 : 14 (0x0e)
> Payload Port                    : 623
> 
> $ ipmitool -I lan -H 192.168.10.11 -P pass sol activate
> Error: This command is only available over the lanplus interface
> 
> but over the lanplus interface I get:
> $ ipmitool -I lanplus -H 192.168.10.11 -P pass sol activate
> Error: Received an Unexpected Open Session Response
> Error: Received an Unexpected RAKP 2 message
> Error: Unable to establish IPMI v2 / RMCP+ session
> Error: No response activating SOL payload
> 
> 
> More debug:
> $ ipmitool -I lanplus -H 192.168.10.11 -P pass -vv sol activate
> IPMI LAN host 192.168.10.11 port 623
> 
>>> Sending IPMI command payload
>>>    netfn   : 0x06
>>>    command : 0x38
>>>    data    : 0x8e 0x04
> 
>>> sending packet (23 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
>  c8 81 00 38 8e 04 b5
> << Received data (30 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
>  63 20 00 38 00 01 86 06 03 00 00 00 00 18
>>> SENDING AN OPEN SESSION REQUEST
> 
>>> sending packet (48 bytes)
>  06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
>  00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00
>  01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00
> << Received data (30 bytes)
>  06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c
>  63 20 00 38 00 01 86 06 03 00 00 00 00 18
> IPMI Request Match NOT FOUND
> << Received data (52 bytes)
>  06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
>  00 00 04 00 a4 a3 a2 a0 00 4d 00 02 00 00 00 08
>  01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08
>  01 00 00 00
> <<OPEN SESSION RESPONSE
> <<  Message tag                        : 0x00
> <<  RMCP+ status                       : no errors
> <<  Maximum privilege level            : admin
> <<  Console Session ID                 : 0xa0a2a3a4
> <<  BMC Session ID                     : 0x02004d00
> <<  Negotiated authenticatin algorithm : hmac_sha1
> <<  Negotiated integrity algorithm     : hmac_sha1_96
> <<  Negotiated encryption algorithm    : aes_cbc_128
> 
>>> Console generated random number (16 bytes)
>  3b 89 c3 4b 6f bb c9 96 17 d1 75 60 83 a8 c4 5a
>>> SENDING A RAKP 1 MESSAGE
> 
>>> sending packet (44 bytes)
>  06 00 ff 07 06 12 00 00 00 00 00 00 00 00 1c 00
>  00 00 00 00 00 4d 00 02 3b 89 c3 4b 6f bb c9 96
>  17 d1 75 60 83 a8 c4 5a 14 00 00 00
> << Received data (52 bytes)
>  06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
>  00 00 04 00 a4 a3 a2 a0 01 4e 00 02 00 00 00 08
>  01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08
>  01 00 00 00
> Error: Received an Unexpected Open Session Response
> << Received data (76 bytes)
>  06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00
>  00 00 00 00 a4 a3 a2 a0 c7 84 62 ed 5a 17 f5 81
>  ec a9 87 4a 07 c4 a2 00 44 45 4c 4c 32 00 10 37
>  80 42 b1 c0 4f 34 33 4a da b7 5f c0 3a f5 f2 2c
>  bb 1f 4c 6b f6 e6 7a ce 45 d5 28 c2
> <<RAKP 2 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : no errors
> <<  Console Session ID            : 0xa0a2a3a4
> <<  BMC random number             : 0xc78462ed5a17f581eca9874a07c4a200
> <<  BMC GUID                      : 0x44454c4c320010378042b1c04f34334a
> <<  Key exchange auth code [sha1] :
> 0xdab75fc03af5f22cbb1f4c6bf6e67ace45d528c2
> 
> session integrity key input (34 bytes)
>  3b 89 c3 4b 6f bb c9 96 17 d1 75 60 83 a8 c4 5a
>  c7 84 62 ed 5a 17 f5 81 ec a9 87 4a 07 c4 a2 00
>  14 00
> Generated session integrity key (20 bytes)
>  7e d0 4b 1d 7c b0 1c e7 dc 04 3e 0e 75 d2 ed 9f
>  27 48 32 f5
> Generated K1 (20 bytes)
>  fd b9 55 50 97 8d 5f 04 d5 cb 50 3b ca 88 78 4d
>  d1 8c bf 3b
> Generated K2 (20 bytes)
>  29 1a 46 42 cc 99 99 58 19 49 c6 45 da d8 00 38
>  0f 5c 5c be
>>> SENDING A RAKP 3 MESSAGE
> 
>>> sending packet (44 bytes)
>  06 00 ff 07 06 14 00 00 00 00 00 00 00 00 1c 00
>  00 00 00 00 00 4d 00 02 19 4c c9 54 6e 6c 5e af
>  9b 66 98 b5 31 44 43 83 75 b7 26 91
> << Received data (76 bytes)
>  06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00
>  00 00 00 00 a4 a3 a2 a0 6d 2a 08 93 00 bd 9b 27
>  92 4f 2d f0 ed aa 88 4c 44 45 4c 4c 32 00 10 37
>  80 42 b1 c0 4f 34 33 4a 5d 9d 3c d1 e8 eb 98 3b
>  86 31 c7 c2 d2 2d 07 98 8c 7e 48 48
> Error: Received an Unexpected RAKP 2 message
> << Received data (24 bytes)
>  06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00
>  00 0f 00 00 a4 a3 a2 a0
> <<RAKP 4 MESSAGE
> <<  Message tag                   : 0x00
> <<  RMCP+ status                  : invalid integrity check value
> <<  Console Session ID            : 0xa0a2a3a4
> <<  Key exchange auth code [sha1] : 0x002a089300bd9b27924f2df0
> 
> RAKP 4 message indicates an error : invalid integrity check value
> Error: Unable to establish IPMI v2 / RMCP+ session
> Error: No response activating SOL payload
> 
> 
> Regards,
>       Jacek
> 
> 
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems?  Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to