|
From: Sophia[IWill] <so...@iw...> - 2006-07-10 06:30:29
|
Hi sir, We are using Intel ESB2 BMC firmware on out platform. But we meet some problems when using IPMITool with lanplus. Could you help me to find out the possible failed reason when I = exectuted the following command : ipmitool -v -v -v -C0 -I lanplus -H 192.168.0.11 -U admin -P admin raw = 0x6 0x01 Here is the return : RAW REQ (netfn=3D0x6 cmd=3D0x1 data_len=3D0) IPMI LAN host 192.168.0.11 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 04 b5 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 81 1c 63 20 00 38 00 01 95 05 03 00 00 00 00 0a << IPMI Response Session Header << Authtype : NONE << Payload type : IPMI (0) << Session ID : 0x00000000 << Sequence : 0x00000000 << IPMI Msg/Payload Length : 16 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 38 << Compl Code : 0x00 >> SENDING AN OPEN SESSION REQUEST >> sending packet (48 bytes) 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 00 00 00 a4 a3 a2 a0 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 00 00 a4 a3 a2 a0 f3 86 36 0d 00 00 00 08 00 00 00 00 01 00 00 08 00 00 00 00 02 00 00 08 00 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : Unknown (0x00) << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0d3686f3 << Negotiated authenticatin algorithm : none << Negotiated integrity algorithm : none << Negotiated encryption algorithm : none >> Console generated random number (16 bytes) be c2 e5 3f 14 20 16 29 61 c4 f2 1c 40 66 02 60 >> SENDING A RAKP 1 MESSAGE >> sending packet (49 bytes) 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 00 00 00 00 f3 86 36 0d be c2 e5 3f 14 20 16 29 61 c4 f2 1c 40 66 02 60 14 00 00 05 61 64 6d 69 6e << Received data (56 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 28 00 00 00 00 00 a4 a3 a2 a0 31 a2 b2 77 b0 4b 74 f3 43 52 bf de 2e a1 32 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0x31a2b277b04b74f34352bfde2ea13286 << BMC GUID : 0x00000000000000000000000000000000 << Key exchange auth code : none bmc_rand (16 bytes) 31 a2 b2 77 b0 4b 74 f3 43 52 bf de 2e a1 32 86 Generated K1 (20 bytes) 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 Generated K2 (20 bytes) 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 02 >> SENDING A RAKP 3 MESSAGE >> sending packet (24 bytes) 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 08 00 00 00 00 00 f3 86 36 0d << Received data (24 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 08 00 00 00 00 00 a4 a3 a2 a0 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code : none IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x01 >> data : BUILDING A v2 COMMAND >> sending packet (23 bytes) 06 00 ff 07 06 00 f3 86 36 0d 03 00 00 00 07 00 20 18 c8 81 00 01 7e << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 01 00 00 00 08 00 81 1c 63 20 00 01 c1 1e << IPMI Response Session Header << Authtype : Unknown (0x06) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000001 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 01 << Compl Code : 0xc1 Unable to send RAW command (netfn=3D0x6 cmd=3D0x1 rsp=3D0xc1): Invalid = command >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3c >> data : 0xf3 0x86 0x36 0x0d BUILDING A v2 COMMAND >> sending packet (27 bytes) 06 00 ff 07 06 00 f3 86 36 0d 04 00 00 00 0b 00 20 18 c8 81 00 3c f3 86 36 0d 87 << Received data (24 bytes) 06 00 ff 07 06 00 a4 a3 a2 a0 02 00 00 00 08 00 81 1c 63 20 00 3c c1 e3 << IPMI Response Session Header << Authtype : Unknown (0x06) << Payload type : IPMI (0) << Session ID : 0xa0a2a3a4 << Sequence : 0x00000002 << IPMI Msg/Payload Length : 8 << IPMI Response Message Header << Rq Addr : 81 << NetFn : 07 << Rq LUN : 0 << Rs Addr : 20 << Rq Seq : 00 << Rs Lun : 0 << Command : 3c << Compl Code : 0xc1 Close Session command failed: Invalid command Best regards, IWILL Corporation Software Engineer Jack Hsu 886-2-2290-0091 ext 306 |