Lines Matching +full:ipmi +full:- +full:smic
3 ipmitool \- utility for controlling IPMI\-enabled devices
6 ipmitool [ <options> ] <command> [ <sub-commands and sub-options> ]
8 <options> := [ <general-options> | <conditional-opts> ]
13 <general-options> := [ -h | -V | -v | -I <interface> | -H <address> |
14 -d <N> | -p <port> | -c | -U <username> |
15 -L <privlvl> | -l <lun> | -m <local_address> |
16 -N <sec> | -R <count> | <password-option> |
17 <oem-option> | <bridge-options> ]
19 <conditional-opts> := [ <lan-options> | <lanplus-options> |
20 <command-options> ]
24 <bridge-options> := -t <target_address> [ -b <channel> |
25 [ -T <address> | -B <channel> ] ]
28 Options used with -I lan:
30 <lan-options> := [ -A <authtype> ]
33 Options used with -I lanplus:
35 <lanplus-options> := [ -C <ciphersuite> | <key-option> ]
40 <key-option> := [ -k <key> | -K | -y <hex_key> | -Y ]
42 <password-option> := [ -f <password_file> | -a | -P <password> | -E ]
44 <oem-option> := [ -o <oemtype> | -g | -s ]
47 Options used with specific command <command-options>:
49 <options-sdr> := [ -S <sdr_cache_file> ]
51 <options-sel> := [ -O <sel_oem> ]
53 <options-sol> := [ -e <sol_escape_char> ]
59 or a remote system, using IPMI v1.5 and IPMI v2.0. These functions include
63 IPMI management of a local system interface requires a compatible IPMI
67 Management of a remote station requires the IPMI\-over\-LAN interface to be
73 \fB\-a\fR
76 \fB\-A\fR <\fIauthtype\fP>
80 \fB\-b\fR <\fIchannel\fP>
83 \fB\-B\fR <\fIchannel\fP>
86 \fB\-b\fR <\fIchannel\fP>
89 \fB\-B\fR <\fIchannel\fP>
92 \fB\-c\fR
96 \fB\-C\fR <\fIciphersuite\fP>
98 to use for IPMIv2.0 \fIlanplus\fP connections. See table 22\-19 in the
99 IPMIv2.0 specification. The default is 3 which specifies RAKP\-HMAC\-SHA1
100 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128 encryption algorithms.
102 \fB\-d \fIN\fP\fR
104 /dev/ipmi/N or /dev/ipmidev/N) device to use for in-band
106 multi-node, multi-BMC system through the ipmi device
109 \fB\-e\fR <\fIsol_escape_char\fP>
113 \fB\-E\fR
117 \fB\-f\fR <\fIpassword_file\fP>
122 \fB\-g\fR
123 Deprecated. Use: -o intelplus
125 \fB\-h\fR
128 \fB\-H\fR <\fIaddress\fP>
132 \fB\-I\fR <\fIinterface\fP>
133 Selects IPMI interface to use. Supported interfaces that are
136 \fB\-k\fR <\fIkey\fP>
140 \fB\-K\fR
143 \fB\-l\fR <\fIlun\fP>
146 \fB\-L\fR <\fIprivlvl\fP>
150 combined with \fI-t target address\fP.
152 \fB\-m\fR <\fIlocal_address\fP>
154 or is auto discovered on PICMG platforms when -m is not specified.
157 \fB\-N\fR <\fIsec\fP>
163 \fB\-o\fR <\fIoemtype\fP>
166 various manufacturers. Use \fI\-o list\fP to see a list of
169 \fB\-O\fR <\fIsel oem\fP>
173 \fB\-p\fR <\fIport\fP>
176 \fB\-P\fR <\fIpassword\fP>
182 \fB\-R\fR <\fIcount\fP>
187 \fB\-s\fR
188 Deprecated. Use: -o supermicro
190 \fB\-S\fR <\fIsdr_cache_file\fP>
197 \fB\-t\fR <\fItarget_address\fP>
198 Bridge IPMI requests to the remote target address. Default is 32.
199 The \fI-L privlvl\fP option is always ignored and value set to ADMINISTRATOR.
201 \fB\-T\fR <\fIaddress\fP>
204 \fB\-T\fR <\fItransmit_address\fP>
207 \fB\-U\fR <\fIusername\fP>
210 \fB\-v\fR
220 \fB\-V\fR
223 \fB\-y\fR <\fIhex key\fP>
225 hexadecimal format and can be used to specify keys with non-printable
226 characters. E.g. '-k PASSWORD' and '-y 50415353574F5244' are
230 \fB\-Y\fR
233 \fB\-z\fR <\fIsize\fP>
242 IPMI LAN interface. A remote station has the ability to control a system's power
244 vulnerability it is strongly advised that the IPMI LAN interface only be
248 Further it is strongly advised that you should not enable IPMI for
252 When an IPMI password is changed on a remote machine with the IPMIv1.5
255 system. It is thus recommended that IPMI password management only be done
259 For IPMI v1.5, the maximum password length is 16 characters.
262 For IPMI v2.0, the maximum password length is 20 characters;
267 This can be used to get command\-line help on ipmitool
280 ekanalyzer run FRU-Ekeying analyzer using FRU files
284 fru Print built\-in FRU and scan for FRU locators
288 i2c Send an I2C Master Write-Read command and print response
290 isol Configure and connect Intel IPMIv1.5 Serial\-over\-LAN
297 raw Send a RAW IPMI request and print response
303 shell Launch interactive IPMI shell
304 sol Configure and connect IPMIv2.0 Serial\-over\-LAN
307 tsol Configure and connect Tyan IPMIv1.5 Serial\-over\-LAN
349 Session Support : session\-less
364 [<\fIipmi\fP=\fBon\fR|\fBoff\fR>] [<\fIlink\fP=\fBon\fR|\fBoff\fR>] [<\fIprivilege\fP=\fBlevel\fR>]
369 \fIgetciphers\fP <\fIipmi\fP|\fIsol\fP> [<\fBchannel\fR>]
373 application (ipmi or sol) on the given channel.
424 0 - Off
426 force - To turn on indefinitely
441 \fIalways-on\fP
449 \fIalways-off\fP
484 Force boot from default Hard-drive.
490 Force boot from default Hard-drive, request Safe Mode.
530 Force boot from default Hard-drive
536 Force boot from default Hard-drive, request Safe Mode
676 …of an entity. Entity Instance can be in one of two ranges, system-relative or device-relative. F…
684 …of an entity. Entity Instance can be in one of two ranges, system-relative or device-relative. F…
728 Set DHCP Server contact retry interval, in seconds. The recommended default timeout is sixty-four …
744 The delloem commands provide information on Dell-specific features.
769 Allows you to set the LCD mode and user-defined string.
828 …vKVM display active or inactive and Front Panel access mode (viewandmodify, view-only or disabled).
974 \fIfilename3\fP : configuration file used for configuring On-Carrier Device ID
982 \fIoc\fP : On-Carrier device
1037 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1066 Convert a binary FRU file into human readable text format. Use -v option to get
1077 Display only matched results of Ekeying match between an On-Carrier device
1080 On-Carrier Device vs AMC slot B1
1081 AMC slot B1 port 0 ==> On-Carrier Device 0 port 16
1083 - From On-Carrier Device ID 0
1084 -Channel ID 11 || Lane 0: enable
1085 -Link Type: AMC.2 Ethernet
1086 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1087 -Link Group ID: 0 || Link Asym. Match: exact match
1088 - To AMC slot B1
1089 -Channel ID 0 || Lane 0: enable
1090 -Link Type: AMC.2 Ethernet
1091 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1092 -Link Group ID: 0 || Link Asym. Match: exact match
1093 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1094 AMC slot B1 port 1 ==> On-Carrier Device 0 port 12
1096 - From On-Carrier Device ID 0
1097 -Channel ID 6 || Lane 0: enable
1098 -Link Type: AMC.2 Ethernet
1099 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1100 -Link Group ID: 0 || Link Asym. Match: exact match
1101 - To AMC slot B1
1102 -Channel ID 1 || Lane 0: enable
1103 -Link Type: AMC.2 Ethernet
1104 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1105 -Link Group ID: 0 || Link Asym. Match: exact match
1106 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1107 On-Carrier Device vs AMC slot A2
1108 AMC slot A2 port 0 ==> On-Carrier Device 0 port 3
1110 - From On-Carrier Device ID 0
1111 -Channel ID 9 || Lane 0: enable
1112 -Link Type: AMC.2 Ethernet
1113 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1114 -Link Group ID: 0 || Link Asym. Match: exact match
1115 - To AMC slot A2
1116 -Channel ID 0 || Lane 0: enable
1117 -Link Type: AMC.2 Ethernet
1118 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1119 -Link Group ID: 0 || Link Asym. Match: exact match
1120 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1124 - From AMC slot B1
1125 -Channel ID 2 || Lane 0: enable
1126 -Link Type: AMC.3 Storage
1127 -Link Type extension: Serial Attached SCSI (SAS/SATA)
1128 -Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
1129 - To AMC slot A2
1130 -Channel ID 2 || Lane 0: enable
1131 -Link Type: AMC.3 Storage
1132 -Link Type extension: Serial Attached SCSI (SAS/SATA)
1133 -Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
1134 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1139 Display the unmatched results of Ekeying match between an On-Carrier device
1156 Send a pre\-defined test event to the System Event Log. The following
1170 \fBNOTE\fR: These pre\-defined events will likely not produce
1190 \fIEvM Revision\fP -
1191 The "Event Message Revision" is 0x04 for messages that comply with the IPMI 2.0
1192 Specification and 0x03 for messages that comply with the IPMI 1.0 Specification.
1194 \fISensor Type\fP -
1197 \fISensor Num\fP -
1201 \fIEvent Dir/Type\fP -
1206 See the IPMI 2.0 specification for further details on the definitions for
1213 Get a list of all the possible Sensor States and pre-defined Sensor State
1221 > ipmitool \-I open event "PS 2T Fan Fault" list
1261 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Asserted
1269 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Desserted
1295 add or remove security-based restrictions on certain commands/command
1296 sub-functions or to list the current firmware firewall restrictions set on
1299 granularity on a specific LUN, for a specific NetFn, for a specific IPMI
1300 Command, and finally for a specific command's sub-function (see Appendix H in the
1301 IPMI 2.0 Specification for a listing of any sub-function numbers that may
1344 This prints out detailed, human-readable information showing the support, configurable,
1351 Print out information for a specific sub-function.
1371 where all commands and command sub-functions are enabled.
1443 …BBoard Manufacturer\fR> and field '2' is <\fBBoard Serial Number\fR>; see IPMI Platform Management…
1447 <\fBstring\fR> must be the same length as the string being replaced and must be 8-bit ASCII (0xCx).
1560 component 0 - BOOT
1562 component 1 - RTK
1586 Get the specified component properties. Valid component \fBid\fR: 0-7.
1589 0 - General properties
1591 1 - Current firmware version
1593 2 - Description string
1595 3 - Rollback firmware version
1597 4 - Deferred firmware version
1603 Abort the on-going firmware upgrade.
1633 Write\-Read IPMI command.
1669 Retrieve information about the Intel IPMI v1.5 Serial\-Over\-LAN
1675 Configure parameters for Intel IPMI v1.5 Serial\-over\-LAN.
1684 \fIprivilege\-level\fP
1687 \fIbit\-rate\fP
1694 Causes ipmitool to enter Intel IPMI v1.5 Serial Over LAN mode. An RMCP+
1745 These commands will allow you to configure IPMI LAN channels
1753 > ipmitool \-I open channel info 1
1758 Channel Protocol Type : IPMB\-1.0
1759 Session Support : session\-based
1922 > ipmitool \-I \fIinterface\fR lan set \fIchannel\fR cipher_privs uaXXXXXXXXXXXXX
1931 <\fBthresh_num\fR> If non-zero, this value determines the number of sequential bad passwords
2027 revision, firmware revision, IPMI version supported, manufacturer ID,
2070 only supported over the system interface according to the IPMI
2097 OEM\-Defined option #0
2102 OEM\-Defined option #1
2107 OEM\-Defined option #2
2141 Displays information regarding the high\-level
2148 This command will return the Power\-On Hours counter.
2178 \fIalways\-on\fP
2188 \fIalways\-off\fP
2240 Initiate a soft\-shutdown of OS via ACPI. This can be done in a
2247 \fIbootdev\fP <\fBdevice\fR> [<\fIclear\-cmos\fP=\fByes\fR|\fBno\fR>] [<\fIoptions\fP=\fBhelp,...\f…
2251 The \fIclear\-cmos\fP option, if supplied, will instruct the BIOS to
2312 \fI0\fP - Set In Progress
2314 \fI1\fP - Service Partition Selector
2316 \fI2\fP - Service Partition Scan
2318 \fI3\fP - BMC Boot Flag Valid Bit Clearing
2320 \fI4\fP - Boot Info Acknowledge
2322 \fI5\fP - Boot Flags
2324 \fI6\fP - Boot Initiator Info
2326 \fI7\fP - Boot Initiator Mailbox
2349 Force boot from default hard-drive
2354 Force boot from default hard-drive, request Safe Mode
2374 …Valid Bit Clearing and are as follows: Any option can be prefixed with "no-" to invert the sense…
2395 Clear valid bit on push button reset / soft-reset
2450 address, IPMB-0 Address, FRU ID, Site/Entity ID, and Site/Entity Type.
2458 \fI0x00\fP - Cold Reset
2461 \fI0x01\fP - Warm Reset
2464 \fI0x02\fP - Graceful Reboot
2467 \fI0x03\fP - Issue Diagnostic Interrupt
2470 \fI0x04\fP - Quiesce [AMC only]
2473 \fI0x05-0xFF\fP - Cold Reset
2514 This will allow you to execute raw IPMI commands. For
2517 > ipmitool \-v raw 0x0 0xf
2591 Event\-Only Sensor Record
2615 A list of all entity ids can be found in the IPMI specifications.
2621 a local SDR cache of the remote managed system with the \fI\-S <file>\fP
2641 NOTE: System Event Log (SEL) entry\-times are displayed as
2642 `Pre\-Init Time\-stamp' if the SEL clock needs to be set.
2675 Displays the first \fIcount\fR (least\-recent) entries in the SEL.
2681 Displays the last \fIcount\fR (most\-recent) entries in the SEL.
2733 form "MM/DD/YYYY HH:MM:SS". Note that hours are in 24\-hour
2761 \fIunr\fP Upper Non\-Recoverable
2765 \fIunc\fP Upper Non\-Critical
2767 \fIlnc\fP Lower Non\-Critical
2771 \fIlnr\fP Lower Non\-Recoverable
2778 Lower Non\-Recoverable, Lower Critical, and Lower Non\-Critical.
2784 Upper Non\-Critical, Upper Critical, and Upper Non\-Recoverable.
2873 will send a periodic keepalive command to keep the IPMI session
2883 Retrieve information about the Serial\-Over\-LAN configuration on
2898 with the updates to the set\-in\-progress parameter.
2904 \fIset\-in\-progress\fP
2905 set\-complete set\-in\-progress commit\-write
2910 \fIforce\-encryption\fP
2913 \fIforce\-authentication\fP
2916 \fIprivilege\-level\fP
2919 \fIcharacter\-accumulate\-level\fP
2922 \fIcharacter\-send\-threshold\fP
2925 \fIretry\-count\fP
2928 \fIretry\-interval\fP
2932 \fInon\-volatile\-bit\-rate\fP
2935 by the IPMI over serial channel.
2937 \fIvolatile\-bit\-rate\fP
2940 by the IPMI over serial channel.
2994 I2C Master Write\-Read IPMI command.
3054 \fInacname\fP <\fBipmi name\fR>
3057 Return the full NAC name of a target identified by ipmi name.
3064 q - Quiet. Displays output only at the start and end of the process.
3084 the SP and not for IPMI sessions. View available users and their userids
3154 This command allows Serial-over-LAN sessions to be established with Tyan
3165 two-way session. Format of ipaddr is XX.XX.XX.XX
3177 Confiure SOL session as read-only or read-write. Sessions are read-write
3210 removing passwords from administrator\-level accounts.
3239 Linux distribution kernels. There are also IPMI driver
3245 a 2.4\-based kernel in order for ipmitool to work:
3248 Incoming and outgoing message handler for IPMI interfaces.
3251 An IPMI Keyboard Controler Style (KCS) interface driver for the message handler.
3257 a 2.6\-based kernel in order for ipmitool to work:
3260 Incoming and outgoing message handler for IPMI interfaces.
3263 An IPMI system interface driver for the message handler.
3264 This module supports various IPMI system interfaces such
3265 as KCS, BT, SMIC, and even SMBus in 2.6 kernels.
3273 \fB/dev/ipmi/0\fR.
3286 can perform this task automatically at start\-up.
3291 ipmitool \fB\-I\fR \fIopen\fP <\fIcommand\fP>
3297 ipmitool \fB\-I\fR \fIbmc\fP <\fIcommand\fP>
3303 32\-bit \fBELF\fR kernel module for the bmc driver.
3306 64\-bit \fBELF\fR kernel module for the bmc driver.
3311 The ipmitool \fIlipmi\fP interface uses the Solaris 9 IPMI kernel device driver.
3315 ipmitool \fB\-I\fR \fIlipmi\fP <\fIexpression\fP>
3319 datagrams are formatted to contain IPMI request/response
3320 messages with a IPMI session headers and RMCP headers.
3322 IPMI\-over\-LAN uses version 1 of the Remote Management Control
3323 Protocol (RMCP) to support pre\-OS and OS\-absent management.
3324 RMCP is a request\-response protocol delivered using UDP
3327 The LAN interface is an authentication multi\-session connection;
3330 password/key or MD5 message\-digest algorithm. ipmitool will
3335 \fB\-I\fR \fIlan\fP option:
3338 ipmitool \fB\-I\fR \fIlan\fP \fB\-H\fR <\fIhostname\fP>
3339 [\fB\-U\fR <\fIusername\fP>] [\fB\-P\fR <\fIpassword\fP>] <\fIcommand\fP>
3352 interface uses the RMCP+ protocol as described in the IPMI v2.0
3359 RMCP+ session establishment uses a symmetric challenge\-response
3360 protocol called RAKP (\fBRemote Authenticated Key\-Exchange Protocol\fR)
3365 SHA1, and encryption is performed with AES\-CBC\-128. Role\-level logins
3374 \fB\-I\fR \fIlanplus\fP option:
3377 ipmitool \fB\-I\fR \fIlanplus\fP
3378 \fB\-H\fR <\fIhostname\fP>
3379 [\fB\-U\fR <\fIusername\fP>]
3380 [\fB\-P\fR <\fIpassword\fP>]
3384 lan interface with ipmitool. With the exception of the \fB\-A\fR and
3385 \fB\-C\fR options the rest of the command line options are identical to
3388 The \fB\-C\fR option allows you specify the authentication, integrity,
3391 22\-19. The default cipher suite is \fI3\fP which specifies
3392 RAKP\-HMAC\-SHA1 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128
3400 You can tell ipmitool to use the FreeIPMI interface with the -I option:
3402 ipmitool \fB\-I\fR \fIfree\fP <\fIcommand\fP>
3408 Inter-module Bus) Interface through the /dev/imb device.
3410 You can tell ipmitool to use the IMB interface with the -I option:
3412 ipmitool \fB\-I\fR \fIimb\fP <\fIcommand\fP>
3418 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sdr list
3428 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sensor get "Baseboard 1.25V"
3436 Sensor Reading : 1.245 (+/\- 0.039) Volts
3440 Lower Non\-Recoverable : na
3444 Lower Non\-Critical : 1.107
3446 Upper Non\-Critical : 1.382
3450 Upper Non\-Recoverable : na
3454 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power status
3460 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power on
3472 http://www.intel.com/design/servers/ipmi