Lines Matching +full:disable +full:- +full:key +full:- +full:power
3 ipmitool \- utility for controlling IPMI\-enabled devices
6 ipmitool [ <options> ] <command> [ <sub-commands and sub-options> ]
8 <options> := [ <general-options> | <conditional-opts> ]
13 <general-options> := [ -h | -V | -v | -I <interface> | -H <address> |
14 -d <N> | -p <port> | -c | -U <username> |
15 -L <privlvl> | -l <lun> | -m <local_address> |
16 -N <sec> | -R <count> | <password-option> |
17 <oem-option> | <bridge-options> ]
19 <conditional-opts> := [ <lan-options> | <lanplus-options> |
20 <command-options> ]
24 <bridge-options> := -t <target_address> [ -b <channel> |
25 [ -T <address> | -B <channel> ] ]
28 Options used with -I lan:
30 <lan-options> := [ -A <authtype> ]
33 Options used with -I lanplus:
35 <lanplus-options> := [ -C <ciphersuite> | <key-option> ]
40 <key-option> := [ -k <key> | -K | -y <hex_key> | -Y ]
42 <password-option> := [ -f <password_file> | -a | -P <password> | -E ]
44 <oem-option> := [ -o <oemtype> | -g | -s ]
47 Options used with specific command <command-options>:
49 <options-sdr> := [ -S <sdr_cache_file> ]
51 <options-sel> := [ -O <sel_oem> ]
53 <options-sol> := [ -e <sol_escape_char> ]
61 chassis power control.
67 Management of a remote station requires the IPMI\-over\-LAN interface to be
73 \fB\-a\fR
76 \fB\-A\fR <\fIauthtype\fP>
80 \fB\-b\fR <\fIchannel\fP>
83 \fB\-B\fR <\fIchannel\fP>
86 \fB\-b\fR <\fIchannel\fP>
89 \fB\-B\fR <\fIchannel\fP>
92 \fB\-c\fR
96 \fB\-C\fR <\fIciphersuite\fP>
98 to use for IPMIv2.0 \fIlanplus\fP connections. See table 22\-19 in the
99 IPMIv2.0 specification. The default is 3 which specifies RAKP\-HMAC\-SHA1
100 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128 encryption algorithms.
102 \fB\-d \fIN\fP\fR
104 /dev/ipmi/N or /dev/ipmidev/N) device to use for in-band
106 multi-node, multi-BMC system through the ipmi device
109 \fB\-e\fR <\fIsol_escape_char\fP>
113 \fB\-E\fR
117 \fB\-f\fR <\fIpassword_file\fP>
122 \fB\-g\fR
123 Deprecated. Use: -o intelplus
125 \fB\-h\fR
128 \fB\-H\fR <\fIaddress\fP>
132 \fB\-I\fR <\fIinterface\fP>
136 \fB\-k\fR <\fIkey\fP>
137 Use supplied Kg key for IPMIv2.0 authentication. The default is not to
138 use any Kg key.
140 \fB\-K\fR
141 Read Kg key from IPMI_KGKEY environment variable.
143 \fB\-l\fR <\fIlun\fP>
146 \fB\-L\fR <\fIprivlvl\fP>
150 combined with \fI-t target address\fP.
152 \fB\-m\fR <\fIlocal_address\fP>
154 or is auto discovered on PICMG platforms when -m is not specified.
157 \fB\-N\fR <\fIsec\fP>
163 \fB\-o\fR <\fIoemtype\fP>
166 various manufacturers. Use \fI\-o list\fP to see a list of
169 \fB\-O\fR <\fIsel oem\fP>
173 \fB\-p\fR <\fIport\fP>
176 \fB\-P\fR <\fIpassword\fP>
182 \fB\-R\fR <\fIcount\fP>
187 \fB\-s\fR
188 Deprecated. Use: -o supermicro
190 \fB\-S\fR <\fIsdr_cache_file\fP>
197 \fB\-t\fR <\fItarget_address\fP>
199 The \fI-L privlvl\fP option is always ignored and value set to ADMINISTRATOR.
201 \fB\-T\fR <\fIaddress\fP>
204 \fB\-T\fR <\fItransmit_address\fP>
207 \fB\-U\fR <\fIusername\fP>
210 \fB\-v\fR
220 \fB\-V\fR
223 \fB\-y\fR <\fIhex key\fP>
224 Use supplied Kg key for IPMIv2.0 authentication. The key is expected in
225 hexadecimal format and can be used to specify keys with non-printable
226 characters. E.g. '-k PASSWORD' and '-y 50415353574F5244' are
228 The default is not to use any Kg key.
230 \fB\-Y\fR
231 Prompt for the Kg key for IPMIv2.0 authentication.
233 \fB\-z\fR <\fIsize\fP>
242 IPMI LAN interface. A remote station has the ability to control a system's power
267 This can be used to get command\-line help on ipmitool
276 chassis Get chassis status and set power state
280 ekanalyzer run FRU-Ekeying analyzer using FRU files
284 fru Print built\-in FRU and scan for FRU locators
288 i2c Send an I2C Master Write-Read command and print response
290 isol Configure and connect Intel IPMIv1.5 Serial\-over\-LAN
296 power Shortcut to chassis power commands
304 sol Configure and connect IPMIv2.0 Serial\-over\-LAN
307 tsol Configure and connect Tyan IPMIv1.5 Serial\-over\-LAN
349 Session Support : session\-less
382 Status information related to power, buttons, cooling, drives and faults.
386 \fIpower\fP
424 0 - Off
426 force - To turn on indefinitely
432 What to do when power is restored.
441 \fIalways-on\fP
449 \fIalways-off\fP
463 Get power on hours.
484 Force boot from default Hard-drive.
490 Force boot from default Hard-drive, request Safe Mode.
530 Force boot from default Hard-drive
536 Force boot from default Hard-drive, request Safe Mode
573 \fIpower\fP <\fBcommand\fR>
576 Platform power limit command options are:
583 Get power related readings from the system.
588 Get the configured power limits.
593 Set a power limit option.
601 \fIaction\fP <\fBNo Action | Hard Power Off & Log Event to SEL | Log Event to SEL\fR>
604 Exception Actions are taken as "No Action", "Hard Power Off system and log events to SEL", or "Log …
609 Power Limit Requested in Watts.
626 Activate the set power limit.
631 Deactivate the set power limit.
676 …of an entity. Entity Instance can be in one of two ranges, system-relative or device-relative. F…
684 …of an entity. Entity Instance can be in one of two ranges, system-relative or device-relative. F…
728 Set DHCP Server contact retry interval, in seconds. The recommended default timeout is sixty-four …
744 The delloem commands provide information on Dell-specific features.
769 Allows you to set the LCD mode and user-defined string.
828 …vKVM display active or inactive and Front Panel access mode (viewandmodify, view-only or disabled).
883 Displays power tracking statistics.
890 Reset cumulative power reading.
897 Reset peak power reading.
904 Displays the power consumption in watt or btuphr.
911 Displays the power consumption history in watt or btuphr.
918 Displays the power cap in watt or btuphr.
925 Allows you to set the power cap in watt, BTU/hr or percentage.
931 Enables set power cap.
938 Disables set power cap.
974 \fIfilename3\fP : configuration file used for configuring On-Carrier Device ID
982 \fIoc\fP : On-Carrier device
1019 \fIprint\fP [<\fBcarrier\fR | \fBpower\fR | \fBall\fR>]
1037 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1051 \fIpower\fP <\fBxx=filename1\fR> <\fBxx=filename2\fR> \fB...\fr
1054 Display power supply informations between carrier and AMC modules.
1059 Display both physical connectivity and power supply of each carrier and AMC
1066 Convert a binary FRU file into human readable text format. Use -v option to get
1077 Display only matched results of Ekeying match between an On-Carrier device
1080 On-Carrier Device vs AMC slot B1
1081 AMC slot B1 port 0 ==> On-Carrier Device 0 port 16
1083 - From On-Carrier Device ID 0
1084 -Channel ID 11 || Lane 0: enable
1085 -Link Type: AMC.2 Ethernet
1086 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1087 -Link Group ID: 0 || Link Asym. Match: exact match
1088 - To AMC slot B1
1089 -Channel ID 0 || Lane 0: enable
1090 -Link Type: AMC.2 Ethernet
1091 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1092 -Link Group ID: 0 || Link Asym. Match: exact match
1093 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1094 AMC slot B1 port 1 ==> On-Carrier Device 0 port 12
1096 - From On-Carrier Device ID 0
1097 -Channel ID 6 || Lane 0: enable
1098 -Link Type: AMC.2 Ethernet
1099 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1100 -Link Group ID: 0 || Link Asym. Match: exact match
1101 - To AMC slot B1
1102 -Channel ID 1 || Lane 0: enable
1103 -Link Type: AMC.2 Ethernet
1104 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1105 -Link Group ID: 0 || Link Asym. Match: exact match
1106 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1107 On-Carrier Device vs AMC slot A2
1108 AMC slot A2 port 0 ==> On-Carrier Device 0 port 3
1110 - From On-Carrier Device ID 0
1111 -Channel ID 9 || Lane 0: enable
1112 -Link Type: AMC.2 Ethernet
1113 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1114 -Link Group ID: 0 || Link Asym. Match: exact match
1115 - To AMC slot A2
1116 -Channel ID 0 || Lane 0: enable
1117 -Link Type: AMC.2 Ethernet
1118 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1119 -Link Group ID: 0 || Link Asym. Match: exact match
1120 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1124 - From AMC slot B1
1125 -Channel ID 2 || Lane 0: enable
1126 -Link Type: AMC.3 Storage
1127 -Link Type extension: Serial Attached SCSI (SAS/SATA)
1128 -Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
1129 - To AMC slot A2
1130 -Channel ID 2 || Lane 0: enable
1131 -Link Type: AMC.3 Storage
1132 -Link Type extension: Serial Attached SCSI (SAS/SATA)
1133 -Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
1134 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1139 Display the unmatched results of Ekeying match between an On-Carrier device
1156 Send a pre\-defined test event to the System Event Log. The following
1170 \fBNOTE\fR: These pre\-defined events will likely not produce
1190 \fIEvM Revision\fP -
1194 \fISensor Type\fP -
1197 \fISensor Num\fP -
1201 \fIEvent Dir/Type\fP -
1213 Get a list of all the possible Sensor States and pre-defined Sensor State
1221 > ipmitool \-I open event "PS 2T Fan Fault" list
1261 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Asserted
1269 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Desserted
1295 add or remove security-based restrictions on certain commands/command
1296 sub-functions or to list the current firmware firewall restrictions set on
1300 Command, and finally for a specific command's sub-function (see Appendix H in the
1301 IPMI 2.0 Specification for a listing of any sub-function numbers that may
1344 This prints out detailed, human-readable information showing the support, configurable,
1351 Print out information for a specific sub-function.
1360 \fIdisable\fP [<\fBParms as described above\fR>] [\fBforce\fR]
1363 This command is used to disable commands for a given NetFn/LUN combination on
1365 option so as not to disable the "Set Command Enables" command.
1371 where all commands and command sub-functions are enabled.
1447 <\fBstring\fR> must be the same length as the string being replaced and must be 8-bit ASCII (0xCx).
1560 component 0 - BOOT
1562 component 1 - RTK
1586 Get the specified component properties. Valid component \fBid\fR: 0-7.
1589 0 - General properties
1591 1 - Current firmware version
1593 2 - Description string
1595 3 - Rollback firmware version
1597 4 - Deferred firmware version
1603 Abort the on-going firmware upgrade.
1633 Write\-Read IPMI command.
1669 Retrieve information about the Intel IPMI v1.5 Serial\-Over\-LAN
1675 Configure parameters for Intel IPMI v1.5 Serial\-over\-LAN.
1684 \fIprivilege\-level\fP
1687 \fIbit\-rate\fP
1753 > ipmitool \-I open channel info 1
1758 Channel Protocol Type : IPMB\-1.0
1759 Session Support : session\-based
1836 Enable or disable PEF alerting for this channel.
1869 Disable VLAN operation or enable VLAN and set the ID.
1922 > ipmitool \-I \fIinterface\fR lan set \fIchannel\fR cipher_privs uaXXXXXXXXXXXXX
1931 <\fBthresh_num\fR> If non-zero, this value determines the number of sequential bad passwords
1935 <\fB1|0\fR> 1 = generate a Session Audit sensor "Invalid password disable" event message.
2097 OEM\-Defined option #0
2102 OEM\-Defined option #1
2107 OEM\-Defined option #2
2141 Displays information regarding the high\-level
2142 status of the system chassis and main power
2148 This command will return the Power\-On Hours counter.
2170 Set the chassis power policy in the event power failure.
2178 \fIalways\-on\fP
2181 Turn on when power is restored.
2186 Returned to previous state when power is restored.
2188 \fIalways\-off\fP
2191 Stay off after power is restored.
2194 \fIpower\fP
2198 change the power state.
2204 Show current chassis power status.
2209 Power up chassis.
2214 Power down chassis into soft off (S4/S5 state).
2221 Provides a power off interval of at least 1 second. No action
2222 should occur if chassis power is in S4/S5 state, but it is
2223 recommended to check power state first and only issue a power
2224 cycle command if the system power is on or in lower sleep
2240 Initiate a soft\-shutdown of OS via ACPI. This can be done in a
2242 simulating a power button press. It is necessary for there to
2244 watching for events for this soft power to work.
2247 \fIbootdev\fP <\fBdevice\fR> [<\fIclear\-cmos\fP=\fByes\fR|\fBno\fR>] [<\fIoptions\fP=\fBhelp,...\f…
2251 The \fIclear\-cmos\fP option, if supplied, will instruct the BIOS to
2312 \fI0\fP - Set In Progress
2314 \fI1\fP - Service Partition Selector
2316 \fI2\fP - Service Partition Scan
2318 \fI3\fP - BMC Boot Flag Valid Bit Clearing
2320 \fI4\fP - Boot Info Acknowledge
2322 \fI5\fP - Boot Flags
2324 \fI6\fP - Boot Initiator Info
2326 \fI7\fP - Boot Initiator Mailbox
2349 Force boot from default hard-drive
2354 Force boot from default hard-drive, request Safe Mode
2374 …Valid Bit Clearing and are as follows: Any option can be prefixed with "no-" to invert the sense…
2379 Clear valid bit on reset/power cycle caused by PEF
2390 Clear valid bit on reset/power cycle caused by watchdog timeout
2395 Clear valid bit on push button reset / soft-reset
2397 \fIpower\fP
2400 Clear valid bit on power up via power push button or wake event
2450 address, IPMB-0 Address, FRU ID, Site/Entity ID, and Site/Entity Type.
2458 \fI0x00\fP - Cold Reset
2461 \fI0x01\fP - Warm Reset
2464 \fI0x02\fP - Graceful Reboot
2467 \fI0x03\fP - Issue Diagnostic Interrupt
2470 \fI0x04\fP - Quiesce [AMC only]
2473 \fI0x05-0xFF\fP - Cold Reset
2504 \fIpower\fP <\fBchassis power command\fR>
2507 Shortcut to the \fIchassis power\fP commands.
2508 See the \fIchassis power\fP commands for usage information.
2517 > ipmitool \-v raw 0x0 0xf
2591 Event\-Only Sensor Record
2621 a local SDR cache of the remote managed system with the \fI\-S <file>\fP
2641 NOTE: System Event Log (SEL) entry\-times are displayed as
2642 `Pre\-Init Time\-stamp' if the SEL clock needs to be set.
2675 Displays the first \fIcount\fR (least\-recent) entries in the SEL.
2681 Displays the last \fIcount\fR (most\-recent) entries in the SEL.
2733 form "MM/DD/YYYY HH:MM:SS". Note that hours are in 24\-hour
2761 \fIunr\fP Upper Non\-Recoverable
2765 \fIunc\fP Upper Non\-Critical
2767 \fIlnc\fP Lower Non\-Critical
2771 \fIlnr\fP Lower Non\-Recoverable
2778 Lower Non\-Recoverable, Lower Critical, and Lower Non\-Critical.
2784 Upper Non\-Critical, Upper Critical, and Upper Non\-Recoverable.
2883 Retrieve information about the Serial\-Over\-LAN configuration on
2887 \fIpayload\fP <\fIenable\fP | \fIdisable\fP | \fIstatus\fP> <\fBchannel number\fR> <\fBuserid\fR>
2890 Enable, disable or show status of SOL payload for the user on the specified channel.
2898 with the updates to the set\-in\-progress parameter.
2904 \fIset\-in\-progress\fP
2905 set\-complete set\-in\-progress commit\-write
2910 \fIforce\-encryption\fP
2913 \fIforce\-authentication\fP
2916 \fIprivilege\-level\fP
2919 \fIcharacter\-accumulate\-level\fP
2922 \fIcharacter\-send\-threshold\fP
2925 \fIretry\-count\fP
2928 \fIretry\-interval\fP
2932 \fInon\-volatile\-bit\-rate\fP
2937 \fIvolatile\-bit\-rate\fP
2994 I2C Master Write\-Read IPMI command.
3064 q - Quiet. Displays output only at the start and end of the process.
3082 This command will allow you to specify an SSH key to use for a particular
3083 user on the Service Processor. This key will be used for CLI logins to
3089 This command will delete the SSH key for a specified userid.
3154 This command allows Serial-over-LAN sessions to be established with Tyan
3165 two-way session. Format of ipaddr is XX.XX.XX.XX
3177 Confiure SOL session as read-only or read-write. Sessions are read-write
3210 removing passwords from administrator\-level accounts.
3213 \fIdisable\fP <\fBuserid\fR>
3245 a 2.4\-based kernel in order for ipmitool to work:
3257 a 2.6\-based kernel in order for ipmitool to work:
3286 can perform this task automatically at start\-up.
3291 ipmitool \fB\-I\fR \fIopen\fP <\fIcommand\fP>
3297 ipmitool \fB\-I\fR \fIbmc\fP <\fIcommand\fP>
3303 32\-bit \fBELF\fR kernel module for the bmc driver.
3306 64\-bit \fBELF\fR kernel module for the bmc driver.
3315 ipmitool \fB\-I\fR \fIlipmi\fP <\fIexpression\fP>
3322 IPMI\-over\-LAN uses version 1 of the Remote Management Control
3323 Protocol (RMCP) to support pre\-OS and OS\-absent management.
3324 RMCP is a request\-response protocol delivered using UDP
3327 The LAN interface is an authentication multi\-session connection;
3330 password/key or MD5 message\-digest algorithm. ipmitool will
3332 is required to perform chassis power functions.
3335 \fB\-I\fR \fIlan\fP option:
3338 ipmitool \fB\-I\fR \fIlan\fP \fB\-H\fR <\fIhostname\fP>
3339 [\fB\-U\fR <\fIusername\fP>] [\fB\-P\fR <\fIpassword\fP>] <\fIcommand\fP>
3346 and straight password/key otherwise, unless overridden with a
3359 RMCP+ session establishment uses a symmetric challenge\-response
3360 protocol called RAKP (\fBRemote Authenticated Key\-Exchange Protocol\fR)
3365 SHA1, and encryption is performed with AES\-CBC\-128. Role\-level logins
3374 \fB\-I\fR \fIlanplus\fP option:
3377 ipmitool \fB\-I\fR \fIlanplus\fP
3378 \fB\-H\fR <\fIhostname\fP>
3379 [\fB\-U\fR <\fIusername\fP>]
3380 [\fB\-P\fR <\fIpassword\fP>]
3384 lan interface with ipmitool. With the exception of the \fB\-A\fR and
3385 \fB\-C\fR options the rest of the command line options are identical to
3388 The \fB\-C\fR option allows you specify the authentication, integrity,
3391 22\-19. The default cipher suite is \fI3\fP which specifies
3392 RAKP\-HMAC\-SHA1 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128
3400 You can tell ipmitool to use the FreeIPMI interface with the -I option:
3402 ipmitool \fB\-I\fR \fIfree\fP <\fIcommand\fP>
3408 Inter-module Bus) Interface through the /dev/imb device.
3410 You can tell ipmitool to use the IMB interface with the -I option:
3412 ipmitool \fB\-I\fR \fIimb\fP <\fIcommand\fP>
3418 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sdr list
3428 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sensor get "Baseboard 1.25V"
3436 Sensor Reading : 1.245 (+/\- 0.039) Volts
3440 Lower Non\-Recoverable : na
3444 Lower Non\-Critical : 1.107
3446 Upper Non\-Critical : 1.382
3450 Upper Non\-Recoverable : na
3452 \fIExample 3\fP: Displaying the power status of a remote chassis
3454 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power status
3456 Chassis Power is on
3458 \fIExample 4\fP: Controlling the power on a remote chassis
3460 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power on
3462 Chassis Power Control: Up/On