Christopher, You need to first test the IPMI LAN connection directly to make sure that you can connect so that you know how to enter the config parameters in openhpi. You can use ipmitool, ipmiutil, or freeipmi to test the IPMI LAN connection.
There are two issues that I can see from your configuration: - You don't have a default gateway configured, so any nodes not on the 172.16 subnet will not be able to access it. - I doubt that the system's IPMI LAN is configured to support the default user with auth_type NONE, but the data you show doesn't cover the user & channel configuration. Most Intel motherboards have restrictions on auth type NONE making it difficult to configure it that way, for security reasons. Andy -----Original Message----- From: Christopher Bloxham [mailto:[email protected]] Sent: Tuesday, September 11, 2012 6:40 AM To: [email protected] Subject: [Openhpi-devel] openhpidirect with intel server failure Hi All, We are attempting to get OpenHPI working with some new Intel Servers S2600JF which have the RMM4 plugin BMC, configuring OpenHPI with libipmidirect with the details from ipmitool we get the following in the /var/log/messages Sep 11 03:04:35 emeafae00 openhpid: openhpid: plugin.c:580: A handler #1 on the libipmidirect plugin could not be opened. Sep 11 03:04:35 emeafae00 openhpid: openhpid: conf.c:588: Couldn't load handler for plugin libipmidirect. Below is my openhpi config for this system and the output from ipmitool Can you suggest a debug strategy to get more information on this problem? Or point me at my mistake int he config file :) Thanks in advance. ## Section for ipmidirect plugin using RMCP: handler libipmidirect { entity_root = "{SYSTEM_CHASSIS,0}" name = "lan" # RMCP addr = "172.16.0.101" # Host name or IP address port = "623" # RMCP port auth_type = "NONE" # none, md2, md5 or straight auth_level = "admin" # operator or admin username = "NONE" password = "NONE" IpmiConnectionTimeout = "5000" AtcaConnectionTimeout = "1000" # MaxOutstanding = "1" # Allow parallel processing of # # ipmi commands; change with care # logflags = "" # logging off # # logflags = "file stdout" # # infos goes to logfile and stdout # # the logfile are log00.log, log01.log ... # logfile = "log" # # if #logfile_max reached replace the oldest one # logfile_max = "10" } ipmitool shows the following configuration ipmitool lan print 1 Set in Progress : Set Complete Auth Type Support : NONE MD5 PASSWORD Auth Type Enable : Callback : NONE MD5 PASSWORD : User : NONE MD5 PASSWORD : Operator : NONE MD5 PASSWORD : Admin : NONE MD5 PASSWORD : OEM : IP Address Source : Static Address IP Address : 172.16.0.101 Subnet Mask : 255.255.0.0 MAC Address : 00:1e:67:39:b2:8a SNMP Community String : public IP Header : TTL=0x00 Flags=0x00 Precedence=0x00 TOS=0x00 BMC ARP Control : ARP Responses Enabled, Gratuitous ARP Disabled Gratituous ARP Intrvl : 0.0 seconds Default Gateway IP : 0.0.0.0 Default Gateway MAC : 00:00:00:00:00:00 Backup Gateway IP : 0.0.0.0 Backup Gateway MAC : 00:00:00:00:00:00 802.1q VLAN ID : Disabled 802.1q VLAN Priority : 0 RMCP+ Cipher Suites : 1,2,3,4,6,7,8,9,11,12,13,15,16,17,18,0 Cipher Suite Priv Max : caaaXXaaaXXaaXX : X=Cipher Suite Unused : c=CALLBACK : u=USER : o=OPERATOR : a=ADMIN : O=OEM Regards, Chris Chris Bloxham Xyratex (www.xyratex.com) ______________________________________________________________________ For additional information including the registered office and the treatment of Xyratex confidential information please visit www.xyratex.com ______________________________________________________________________ ------------------------------------------------------------------------ ------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Openhpi-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/openhpi-devel ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Openhpi-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/openhpi-devel
