Lines Matching +full:suspend +full:- +full:to +full:- +full:disk

3 ipmitool \- utility for controlling IPMI\-enabled devices
6 ipmitool [ <options> ] <command> [ <sub-commands and sub-options> ]
8 <options> := [ <general-options> | <conditional-opts> ]
13 <general-options> := [ -h | -V | -v | -I <interface> | -H <address> |
14 -d <N> | -p <port> | -c | -U <username> |
15 -L <privlvl> | -l <lun> | -m <local_address> |
16 -N <sec> | -R <count> | <password-option> |
17 <oem-option> | <bridge-options> ]
19 <conditional-opts> := [ <lan-options> | <lanplus-options> |
20 <command-options> ]
24 <bridge-options> := -t <target_address> [ -b <channel> |
25 [ -T <address> | -B <channel> ] ]
28 Options used with -I lan:
30 <lan-options> := [ -A <authtype> ]
33 Options used with -I lanplus:
35 <lanplus-options> := [ -C <ciphersuite> | <key-option> ]
40 <key-option> := [ -k <key> | -K | -y <hex_key> | -Y ]
42 <password-option> := [ -f <password_file> | -a | -P <password> | -E ]
44 <oem-option> := [ -o <oemtype> | -g | -s ]
47 Options used with specific command <command-options>:
49 <options-sdr> := [ -S <sdr_cache_file> ]
51 <options-sel> := [ -O <sel_oem> ]
53 <options-sol> := [ -e <sol_escape_char> ]
64 kernel driver to be installed and configured. On Linux this driver is
67 Management of a remote station requires the IPMI\-over\-LAN interface to be
69 system it may be possible to enable the LAN interface using ipmitool over
73 \fB\-a\fR
76 \fB\-A\fR <\fIauthtype\fP>
77 Specify an authentication type to use during IPMIv1.5 \fIlan\fP
80 \fB\-b\fR <\fIchannel\fP>
83 \fB\-B\fR <\fIchannel\fP>
86 \fB\-b\fR <\fIchannel\fP>
89 \fB\-B\fR <\fIchannel\fP>
92 \fB\-c\fR
96 \fB\-C\fR <\fIciphersuite\fP>
98 to use for IPMIv2.0 \fIlanplus\fP connections. See table 22\-19 in the
99 IPMIv2.0 specification. The default is 3 which specifies RAKP\-HMAC\-SHA1
100 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128 encryption algorithms.
102 \fB\-d \fIN\fP\fR
103 Use device number N to specify the /dev/ipmiN (or
104 /dev/ipmi/N or /dev/ipmidev/N) device to use for in-band
105 BMC communication. Used to target a specific BMC on a
106 multi-node, multi-BMC system through the ipmi device
109 \fB\-e\fR <\fIsol_escape_char\fP>
111 is to use \fI~\fP but this can conflict with ssh sessions.
113 \fB\-E\fR
117 \fB\-f\fR <\fIpassword_file\fP>
120 will default to NULL.
122 \fB\-g\fR
123 Deprecated. Use: -o intelplus
125 \fB\-h\fR
128 \fB\-H\fR <\fIaddress\fP>
132 \fB\-I\fR <\fIinterface\fP>
133 Selects IPMI interface to use. Supported interfaces that are
136 \fB\-k\fR <\fIkey\fP>
137 Use supplied Kg key for IPMIv2.0 authentication. The default is not to
140 \fB\-K\fR
143 \fB\-l\fR <\fIlun\fP>
146 \fB\-L\fR <\fIprivlvl\fP>
149 This value is ignored and always set to ADMINISTRATOR when
150 combined with \fI-t target address\fP.
152 \fB\-m\fR <\fIlocal_address\fP>
153 Set the local IPMB address. The local address defaults to 0x20
154 or is auto discovered on PICMG platforms when -m is not specified.
155 There should be no need to change the local address for normal operation.
157 \fB\-N\fR <\fIsec\fP>
163 \fB\-o\fR <\fIoemtype\fP>
164 Select OEM type to support. This usually involves minor hacks
165 in place in the code to work around quirks in various BMCs from
166 various manufacturers. Use \fI\-o list\fP to see a list of
169 \fB\-O\fR <\fIsel oem\fP>
170 Open selected file and read OEM SEL event descriptions to be used
173 \fB\-p\fR <\fIport\fP>
174 Remote server UDP port to connect to. Default is 623.
176 \fB\-P\fR <\fIpassword\fP>
182 \fB\-R\fR <\fIcount\fP>
187 \fB\-s\fR
188 Deprecated. Use: -o supermicro
190 \fB\-S\fR <\fIsdr_cache_file\fP>
193 knowledge of the entire SDR to perform their function. Local
197 \fB\-t\fR <\fItarget_address\fP>
198 Bridge IPMI requests to the remote target address. Default is 32.
199 The \fI-L privlvl\fP option is always ignored and value set to ADMINISTRATOR.
201 \fB\-T\fR <\fIaddress\fP>
204 \fB\-T\fR <\fItransmit_address\fP>
207 \fB\-U\fR <\fIusername\fP>
210 \fB\-v\fR
212 multiple times to increase the level of debug output. If given
220 \fB\-V\fR
223 \fB\-y\fR <\fIhex key\fP>
225 hexadecimal format and can be used to specify keys with non-printable
226 characters. E.g. '-k PASSWORD' and '-y 50415353574F5244' are
228 The default is not to use any Kg key.
230 \fB\-Y\fR
233 \fB\-z\fR <\fIsize\fP>
239 the remote server password will default to NULL.
242 IPMI LAN interface. A remote station has the ability to control a system's power
243 state as well as being able to gather certain platform information. To reduce
254 as clear text. This could be observed and then used to attack the remote
267 This can be used to get command\-line help on ipmitool
279 echo Used to echo lines to stdout in scripts
280 ekanalyzer run FRU-Ekeying analyzer using FRU files
281 event Send events to MC
284 fru Print built\-in FRU and scan for FRU locators
288 i2c Send an I2C Master Write-Read command and print response
290 isol Configure and connect Intel IPMIv1.5 Serial\-over\-LAN
296 power Shortcut to chassis power commands
304 sol Configure and connect IPMIv2.0 Serial\-over\-LAN
307 tsol Configure and connect Tyan IPMIv1.5 Serial\-over\-LAN
349 Session Support : session\-less
382 Status information related to power, buttons, cooling, drives and faults.
424 0 - Off
426 force - To turn on indefinitely
432 What to do when power is restored.
441 \fIalways-on\fP
449 \fIalways-off\fP
482 \fIdisk\fP
484 Force boot from default Hard-drive.
490 Force boot from default Hard-drive, request Safe Mode.
530 Force boot from default Hard-drive
536 Force boot from default Hard-drive, request Safe Mode
570 This command is used to discover supported capabilities in DCMI.
601 \fIaction\fP <\fBNo Action | Hard Power Off & Log Event to SEL | Log Event to SEL\fR>
604 …are taken as "No Action", "Hard Power Off system and log events to SEL", or "Log event to SEL only…
676 …wo ranges, system-relative or device-relative. For example, a system with four processors could u…
684 …wo ranges, system-relative or device-relative. For example, a system with four processors could u…
728 Set DHCP Server contact retry interval, in seconds. The recommended default timeout is sixty-four …
744 The delloem commands provide information on Dell-specific features.
769 Allows you to set the LCD mode and user-defined string.
784 Allows you to set the LCD display mode to any of the preceding parameters.
796 Allows you to set the unit for the system ambient temperature mode.
806 Allows you to set the error display.
821 Allows you to set the vKVM status to active or inactive. When it is active and session is in progre…
828 …vKVM display active or inactive and Front Panel access mode (viewandmodify, view-only or disabled).
925 Allows you to set the power cap in watt, BTU/hr or percentage.
955 For echoing lines to stdout in scripts.
974 \fIfilename3\fP : configuration file used for configuring On-Carrier Device ID
982 \fIoc\fP : On-Carrier device
1025 Display point to point physical connectivity between carriers and AMC modules.
1037 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1066 Convert a binary FRU file into human readable text format. Use -v option to get
1077 Display only matched results of Ekeying match between an On-Carrier device
1080 On-Carrier Device vs AMC slot B1
1081 AMC slot B1 port 0 ==> On-Carrier Device 0 port 16
1083 - From On-Carrier Device ID 0
1084 -Channel ID 11 || Lane 0: enable
1085 -Link Type: AMC.2 Ethernet
1086 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1087 -Link Group ID: 0 || Link Asym. Match: exact match
1088 - To AMC slot B1
1089 -Channel ID 0 || Lane 0: enable
1090 -Link Type: AMC.2 Ethernet
1091 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1092 -Link Group ID: 0 || Link Asym. Match: exact match
1093 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1094 AMC slot B1 port 1 ==> On-Carrier Device 0 port 12
1096 - From On-Carrier Device ID 0
1097 -Channel ID 6 || Lane 0: enable
1098 -Link Type: AMC.2 Ethernet
1099 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1100 -Link Group ID: 0 || Link Asym. Match: exact match
1101 - To AMC slot B1
1102 -Channel ID 1 || Lane 0: enable
1103 -Link Type: AMC.2 Ethernet
1104 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1105 -Link Group ID: 0 || Link Asym. Match: exact match
1106 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1107 On-Carrier Device vs AMC slot A2
1108 AMC slot A2 port 0 ==> On-Carrier Device 0 port 3
1110 - From On-Carrier Device ID 0
1111 -Channel ID 9 || Lane 0: enable
1112 -Link Type: AMC.2 Ethernet
1113 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1114 -Link Group ID: 0 || Link Asym. Match: exact match
1115 - To AMC slot A2
1116 -Channel ID 0 || Lane 0: enable
1117 -Link Type: AMC.2 Ethernet
1118 -Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
1119 -Link Group ID: 0 || Link Asym. Match: exact match
1120 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1124 - From AMC slot B1
1125 -Channel ID 2 || Lane 0: enable
1126 -Link Type: AMC.3 Storage
1127 -Link Type extension: Serial Attached SCSI (SAS/SATA)
1128 -Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
1129 - To AMC slot A2
1130 -Channel ID 2 || Lane 0: enable
1131 -Link Type: AMC.3 Storage
1132 -Link Type extension: Serial Attached SCSI (SAS/SATA)
1133 -Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
1134 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
1139 Display the unmatched results of Ekeying match between an On-Carrier device
1156 Send a pre\-defined test event to the System Event Log. The following
1157 events are included as a means to test the functionality of the
1170 \fBNOTE\fR: These pre\-defined events will likely not produce
1172 not be correctly tied to a valid sensor number, but they are
1173 sufficient to verify correct operation of the SEL.
1179 Event log records specified in <\fBfilename\fP> will be added to
1190 \fIEvM Revision\fP -
1194 \fISensor Type\fP -
1197 \fISensor Num\fP -
1201 \fIEvent Dir/Type\fP -
1213 Get a list of all the possible Sensor States and pre-defined Sensor State
1217 \fIipmitool sensor list\fP may be used to obtain a list that includes
1221 > ipmitool \-I open event "PS 2T Fan Fault" list
1261 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Asserted
1269 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Desserted
1294 This command supports the Firmware Firewall capability. It may be used to
1295 add or remove security-based restrictions on certain commands/command
1296 sub-functions or to list the current firmware firewall restrictions set on
1298 may be included to cause the command to be executed with increasing
1300 Command, and finally for a specific command's sub-function (see Appendix H in the
1301 IPMI 2.0 Specification for a listing of any sub-function numbers that may
1314 command support may vary from channel to channel.
1344 This prints out detailed, human-readable information showing the support, configurable,
1351 Print out information for a specific sub-function.
1357 This command is used to enable commands for a given NetFn/LUN combination on
1363 This command is used to disable commands for a given NetFn/LUN combination on
1365 option so as not to disable the "Set Command Enables" command.
1370 This command may be used to reset the firmware firewall back to a state
1371 where all commands and command sub-functions are enabled.
1388 \fBfru file\fR is the absolute pathname of a file in which to dump the
1389 binary FRU data pertaining to the specified FRU entity.
1395 \fBfru file\fR is the absolute pathname of a file from which to pull
1396 the binary FRU data before uploading it to the specified FRU.
1403 \fBfru file\fR is the absolute pathname of a file from which to pull the
1404 binary FRU data to upload into the specified multirecord FRU entity.
1418 This command may be used to set a field string to a new value. It replaces
1428 <\fBsection\fR> is a string which refers to FRU Inventory Information
1429 Storage Areas and may be refer to:
1447 <\fBstring\fR> must be the same length as the string being replaced and must be 8-bit ASCII (0xCx).
1490 Ask IPMC to rollback to previous version.
1511 Read to file eeprom specify by Generic Device Locators.
1560 component 0 - BOOT
1562 component 1 - RTK
1586 Get the specified component properties. Valid component \fBid\fR: 0-7.
1589 0 - General properties
1591 1 - Current firmware version
1593 2 - Description string
1595 3 - Rollback firmware version
1597 4 - Deferred firmware version
1603 Abort the on-going firmware upgrade.
1632 This command may be used to execute raw I2C commands with the Master
1633 Write\-Read IPMI command.
1669 Retrieve information about the Intel IPMI v1.5 Serial\-Over\-LAN
1675 Configure parameters for Intel IPMI v1.5 Serial\-over\-LAN.
1684 \fIprivilege\-level\fP
1687 \fIbit\-rate\fP
1694 Causes ipmitool to enter Intel IPMI v1.5 Serial Over LAN mode. An RMCP+
1695 connection is made to the BMC, the terminal is set to raw mode, and user
1696 input is sent to the serial console on the remote server. On exit,
1697 the SOL payload mode is deactivated and the terminal is reset to its
1701 Special escape sequences are provided to control the SOL session:
1706 \fI~^Z\fP Suspend ipmitool
1708 \fI~^X\fP Suspend ipmitool, but don't restore tty on restart
1724 OEM commands specific to Kontron devices.
1745 These commands will allow you to configure IPMI LAN channels
1747 \fIlan\fP and \fIlanplus\fP interfaces. \fINOTE\fR: To
1753 > ipmitool \-I open channel info 1
1758 Channel Protocol Type : IPMB\-1.0
1759 Session Support : session\-based
1826 command to display information about userids for a given channel).
1893 level that is allowed to use it. In this way, cipher suites can restricted
1895 administrators are required to use a stronger cipher suite than
1919 So, to set the maximum privilege for cipher suite 0 to USER and suite 1 to
1922 > ipmitool \-I \fIinterface\fR lan set \fIchannel\fR cipher_privs uaXXXXXXXXXXXXX
1931 <\fBthresh_num\fR> If non-zero, this value determines the number of sequential bad passwords
1932 that will be allowed to be entered for the identified user before the user is automatically
1940 reset to zero.
1975 Set the channel gateway to use for alerts.
2007 Clear all IP/UDP/RMCP Statistics to 0 on the specified channel.
2017 Instructs the BMC to perform a warm or cold reset.
2033 These commands allow a user to view and change the current
2045 Reset the Watchdog Timer to its most recent state and restart the
2070 only supported over the system interface according to the IPMI
2097 OEM\-Defined option #0
2102 OEM\-Defined option #1
2107 OEM\-Defined option #2
2117 Stores system info string to bmc for given argument
2141 Displays information regarding the high\-level
2148 This command will return the Power\-On Hours counter.
2153 is 15 seconds. Use 0 to turn off. Use "force" to turn on
2178 \fIalways\-on\fP
2186 Returned to previous state when power is restored.
2188 \fIalways\-off\fP
2197 Performs a chassis control command to view and
2216 shutdown of the operating system prior to powering down the system.
2223 recommended to check power state first and only issue a power
2235 Pulse a diagnostic interrupt (NMI) directly to the processor(s).
2240 Initiate a soft\-shutdown of OS via ACPI. This can be done in a
2242 simulating a power button press. It is necessary for there to
2244 watching for events for this soft power to work.
2247 \fIbootdev\fP <\fBdevice\fR> [<\fIclear\-cmos\fP=\fByes\fR|\fBno\fR>] [<\fIoptions\fP=\fBhelp,...\f…
2250 Request the system to boot from an alternate boot device on next reboot.
2251 The \fIclear\-cmos\fP option, if supplied, will instruct the BIOS to
2252 clear its CMOS on the next reboot. Various options may be used to modify
2270 \fIdisk\fP
2312 \fI0\fP - Set In Progress
2314 \fI1\fP - Service Partition Selector
2316 \fI2\fP - Service Partition Scan
2318 \fI3\fP - BMC Boot Flag Valid Bit Clearing
2320 \fI4\fP - Boot Info Acknowledge
2322 \fI5\fP - Boot Flags
2324 \fI6\fP - Boot Initiator Info
2326 \fI7\fP - Boot Initiator Mailbox
2349 Force boot from default hard-drive
2354 Force boot from default hard-drive, request Safe Mode
2374 …lid Bit Clearing and are as follows: Any option can be prefixed with "no-" to invert the sense o…
2395 Clear valid bit on push button reset / soft-reset
2433 relates a sensor event to an action. When PEF is active,
2434 each platform event causes the BMC to scan this table for
2435 entries matching the event, and possible actions to be taken.
2442 Run a PICMG/ATA extended command. Get PICMG properties may be used to
2450 address, IPMB-0 Address, FRU ID, Site/Entity ID, and Site/Entity Type.
2458 \fI0x00\fP - Cold Reset
2461 \fI0x01\fP - Warm Reset
2464 \fI0x02\fP - Graceful Reboot
2467 \fI0x03\fP - Issue Diagnostic Interrupt
2470 \fI0x04\fP - Quiesce [AMC only]
2473 \fI0x05-0xFF\fP - Cold Reset
2495 Set FRU activation policy. \fBlockmask\fR is 1 or 0 to indicate action
2497 1 or 0 to set/clear locked bit.
2507 Shortcut to the \fIchassis power\fP commands.
2514 This will allow you to execute raw IPMI commands. For
2515 example to query the POH counter with a raw command:
2517 > ipmitool \-v raw 0x0 0xf
2544 Run with type \fIlist\fP (or simply with no type) to see the list of available types.
2545 For example to query for all Temperature sensors:
2567 types, to see all sensors use the \fIall\fP type with this command.
2591 Event\-Only Sensor Record
2620 Dumps raw SDR data to a file. This data file can then be used as
2621 a local SDR cache of the remote managed system with the \fI\-S <file>\fP
2641 NOTE: System Event Log (SEL) entry\-times are displayed as
2642 `Pre\-Init Time\-stamp' if the SEL clock needs to be set.
2666 Record entries to display the sensor ID for the sensor that caused
2675 Displays the first \fIcount\fR (least\-recent) entries in the SEL.
2681 Displays the last \fIcount\fR (most\-recent) entries in the SEL.
2693 Read event entries from a file and add them to the SEL. New SEL
2704 Save SEL records to a text file that can be fed back into the
2713 Save SEL records to a file in raw, binary format. This file can
2714 be fed back to the \fIsel readraw\fP ipmitool command for viewing.
2733 form "MM/DD/YYYY HH:MM:SS". Note that hours are in 24\-hour
2755 This allows you to set a particular sensor threshold
2761 \fIunr\fP Upper Non\-Recoverable
2765 \fIunc\fP Upper Non\-Critical
2767 \fIlnc\fP Lower Non\-Critical
2771 \fIlnr\fP Lower Non\-Recoverable
2776 This allows you to set all lower thresholds for a sensor at the same time.
2778 Lower Non\-Recoverable, Lower Critical, and Lower Non\-Critical.
2782 This allows you to set all upper thresholds for a sensor at the same time.
2784 Upper Non\-Critical, Upper Critical, and Upper Non\-Recoverable.
2795 or by using the keyword `all' to specify all sessions.
2868 to send multiple ipmitool commands to a BMC and see the responses.
2872 are able to reuse the same cache in a shell session. LAN sessions
2873 will send a periodic keepalive command to keep the IPMI session
2883 Retrieve information about the Serial\-Over\-LAN configuration on
2898 with the updates to the set\-in\-progress parameter.
2904 \fIset\-in\-progress\fP
2905 set\-complete set\-in\-progress commit\-write
2910 \fIforce\-encryption\fP
2913 \fIforce\-authentication\fP
2916 \fIprivilege\-level\fP
2919 \fIcharacter\-accumulate\-level\fP
2922 \fIcharacter\-send\-threshold\fP
2925 \fIretry\-count\fP
2928 \fIretry\-interval\fP
2930 that retries should be sent back to back.
2932 \fInon\-volatile\-bit\-rate\fP
2933 serial, 19.2, 38.4, 57.6, 115.2. Setting this value to
2937 \fIvolatile\-bit\-rate\fP
2938 serial, 19.2, 38.4, 57.6, 115.2. Setting this value to
2946 Causes ipmitool to enter Serial Over LAN
2948 interface. An RMCP+ connection is made to the BMC,
2949 the terminal is set to raw mode, and user input is
2950 sent to the serial console on the remote server.
2952 the terminal is reset to its original settings.
2958 Special escape sequences are provided to control the SOL session:
2963 \fI~^Z\fP Suspend ipmitool
2965 \fI~^X\fP Suspend ipmitool, but don't restore tty on restart
2982 this command to be sent to the BMC, but in the case of an
2984 necessary to reset the state of the BMC.
2993 This command may be used to read SPD (Serial Presence Detect) data using the
2994 I2C Master Write\-Read IPMI command.
3012 These commands provide a way to get and set the status of LEDs
3013 on a Sun Microsystems server. Use 'sdr list generic' to get a
3015 parameter is optional and not necessary to provide on the command
3028 of all available LEDS to the specified \fIledmode\fP and \fIledtype\fP.
3044 \fIOK2RM\fP Ok to Remove
3064 q - Quiet. Displays output only at the start and end of the process.
3082 This command will allow you to specify an SSH key to use for a particular
3083 user on the Service Processor. This key will be used for CLI logins to
3154 This command allows Serial-over-LAN sessions to be established with Tyan
3156 no arguments will establish default SOL session back to local IP address.
3163 Send receiver IP address to SMDC which it will use to send serial
3164 traffic to. By default this detects the local IP address and establishes
3165 two-way session. Format of ipaddr is XX.XX.XX.XX
3171 Configure UDP port to receive serial traffic on. By default this is 6230.
3177 Confiure SOL session as read-only or read-write. Sessions are read-write
3209 the password is cleared (set to the NULL password). Be careful when
3210 removing passwords from administrator\-level accounts.
3216 Disables access to the BMC by the given userid.
3221 Enables access to the BMC by the given userid.
3245 a 2.4\-based kernel in order for ipmitool to work:
3257 a 2.6\-based kernel in order for ipmitool to work:
3286 can perform this task automatically at start\-up.
3288 In order to have ipmitool use the OpenIPMI device interface
3291 ipmitool \fB\-I\fR \fIopen\fP <\fIcommand\fP>
3294 provided by Solaris 10 and higher. In order to force ipmitool to make
3297 ipmitool \fB\-I\fR \fIbmc\fP <\fIcommand\fP>
3303 32\-bit \fBELF\fR kernel module for the bmc driver.
3306 64\-bit \fBELF\fR kernel module for the bmc driver.
3309 Character device node used to communicate with the bmc driver.
3313 ipmitool to use this interface by specifying it on the command line.
3315 ipmitool \fB\-I\fR \fIlipmi\fP <\fIexpression\fP>
3319 datagrams are formatted to contain IPMI request/response
3322 IPMI\-over\-LAN uses version 1 of the Remote Management Control
3323 Protocol (RMCP) to support pre\-OS and OS\-absent management.
3324 RMCP is a request\-response protocol delivered using UDP
3325 datagrams to port 623.
3327 The LAN interface is an authentication multi\-session connection;
3328 messages delivered to the BMC can (and should) be authenticated
3330 password/key or MD5 message\-digest algorithm. ipmitool will
3331 attempt to connect with administrator privilege level as this
3332 is required to perform chassis power functions.
3334 You can tell ipmitool to use the lan interface with the
3335 \fB\-I\fR \fIlan\fP option:
3338 ipmitool \fB\-I\fR \fIlan\fP \fB\-H\fR <\fIhostname\fP>
3339 [\fB\-U\fR <\fIusername\fP>] [\fB\-P\fR <\fIpassword\fP>] <\fIcommand\fP>
3341 A hostname must be given on the command line in order to use the
3344 will attempt to connect without authentication. If you specify a
3354 integrity checks, as well as encryption and the ability to carry
3359 RMCP+ session establishment uses a symmetric challenge\-response
3360 protocol called RAKP (\fBRemote Authenticated Key\-Exchange Protocol\fR)
3362 yet allow the user to specify the value of every option, defaulting
3365 SHA1, and encryption is performed with AES\-CBC\-128. Role\-level logins
3368 ipmitool must be linked with the \fIOpenSSL\fP library in order to
3373 You can tell ipmitool to use the lanplus interface with the
3374 \fB\-I\fR \fIlanplus\fP option:
3377 ipmitool \fB\-I\fR \fIlanplus\fP
3378 \fB\-H\fR <\fIhostname\fP>
3379 [\fB\-U\fR <\fIusername\fP>]
3380 [\fB\-P\fR <\fIpassword\fP>]
3383 A hostname must be given on the command line in order to use the
3384 lan interface with ipmitool. With the exception of the \fB\-A\fR and
3385 \fB\-C\fR options the rest of the command line options are identical to
3388 The \fB\-C\fR option allows you specify the authentication, integrity,
3389 and encryption algorithms to use for for \fIlanplus\fP session based
3391 22\-19. The default cipher suite is \fI3\fP which specifies
3392 RAKP\-HMAC\-SHA1 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128
3400 You can tell ipmitool to use the FreeIPMI interface with the -I option:
3402 ipmitool \fB\-I\fR \fIfree\fP <\fIcommand\fP>
3408 Inter-module Bus) Interface through the /dev/imb device.
3410 You can tell ipmitool to use the IMB interface with the -I option:
3412 ipmitool \fB\-I\fR \fIimb\fP <\fIcommand\fP>
3418 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sdr list
3428 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sensor get "Baseboard 1.25V"
3436 Sensor Reading : 1.245 (+/\- 0.039) Volts
3440 Lower Non\-Recoverable : na
3444 Lower Non\-Critical : 1.107
3446 Upper Non\-Critical : 1.382
3450 Upper Non\-Recoverable : na
3454 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power status
3460 > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power on