Alexander Dupuy wrote:
> I wrote:
> 
>> The solution is to disable the IPMI-over-serial-port support on the BMC
>> (the problem is that the login prompt from Linux - or any other output
>> to the serial port - is interpreted as IPMI commands, for which an error
>> is generated, which generates more output from Linux, ad infinitum).
> 
> 
> David Sparks asked:
> 
>> Does anyone know how to do this with plain IPMI (preferably ipmitool)?
>>   
> 
> 
> On a 2950, I see that the ipmitool channel command might be able to do
> this, although it's not entirely clear:
> 
> 
> # ipmitool channel help
> Channel Commands: authcap   <channel number> <max privilege>
>                   getaccess <channel number> [user id]
>                   setaccess <channel number> <user id> [callin=on|off]
> [ipmi=on|off] [link=on|off] [privilege=level]
>                   info      [channel number]
>                   getciphers <ipmi | sol> [channel]
> 
> Possible privilege levels are:
>    1   Callback level
>    2   User level
>    3   Operator level
>    4   Administrator level
>    5   OEM Proprietary level
>   15   No access
> # ipmitool channel info 2
> Channel 0x2 info:
>   Channel Medium Type   : Serial/Modem
>   Channel Protocol Type : IPMB-1.0
>   Session Support       : single-session
>   Active Session Count  : 0
>   Protocol Vendor ID    : 7154
> # ipmitool channel getaccess 2 2
> Maximum User IDs     : 10                     
> Enabled User IDs     : 1
> 
> User ID              : 2
> User Name            : root
> Fixed Name           : No
> Access Available     : call-in / callback
> Link Authentication  : enabled
> IPMI Messaging       : enabled
> Privilege Level      : ADMINISTRATOR
> # ipmitool channel setaccess 2 2 callin=off link=off ipmi=off privilege=15
> # ipmitool channel getaccess 2 2
> Maximum User IDs     : 10
> Enabled User IDs     : 1
> 
> User ID              : 2
> User Name            : root
> Fixed Name           : No
> Access Available     : callback
> Link Authentication  : disabled
> IPMI Messaging       : disabled
> Privilege Level      : NO ACCESS

I set the above parameters to disabled and NO ACCESS as per your email but
that didn't fix the bogus logins.


> I suspect that you will have more luck using the (better, IMHO) ipmiutil
> toolset, specifically the tmconfig (a.k.a ipmiutil serial) command:
> 
> # ipmiutil serial -d  # or tmconfig -d

These commands didn't work either.


Please, can anyone from Dell comment on how to shut this off?  Is there even a
BIOS option to disable this (other than "reset to defaults")?

Thanks!

ds

_______________________________________________
Linux-PowerEdge mailing list
[email protected]
https://lists.us.dell.com/mailman/listinfo/linux-poweredge
Please read the FAQ at http://lists.us.dell.com/faq

Reply via email to