freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Freeipmi-users] ipmiconsole BMC Implementation with x38ml


From: ktaka
Subject: [Freeipmi-users] ipmiconsole BMC Implementation with x38ml
Date: Sun, 21 Sep 2008 03:32:55 +0900
User-agent: Thunderbird 2.0.0.9 (X11/20071031)

Hello,

I have been trying to use freeipmi with intel x38ml, without success.

Here are the closest I think I've got:

x60:/home/ktaka# ipmipower -W  authcap -u admin -P  -h 192.168.20.116 -s
Password:
192.168.20.116: on

This seems ok. I can power on/off the server with this authcap hack.
However, I can not use sol.

x60:/home/ktaka# ipmiconsole -W authcap -u admin -P  -h 192.168.20.116
Password:
ipmiconsole_submit_block: BMC Implementation

x60:/home/ktaka# ipmiconsole -V
ipmiconsole 0.6.7

Attached is the debug output for the latter.

Could somebody help me out to use ipmiconsole ?

Best regards,
Kimitoshi Takahshi



192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               9h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              17h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved1[ 3b]
192.168.20.116: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              59h] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [              10h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              17h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = channel_number[ 8b]
192.168.20.116: [               0h] = authentication_type.none[ 1b]
192.168.20.116: [               0h] = authentication_type.md2[ 1b]
192.168.20.116: [               1h] = authentication_type.md5[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved1[ 1b]
192.168.20.116: [               1h] = 
authentication_type.straight_password_key[ 1b]
192.168.20.116: [               0h] = authentication_type.oem_prop[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved2[ 1b]
192.168.20.116: [               1h] = 
authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
192.168.20.116: [               1h] = authentication_status.anonymous_login[ 1b]
192.168.20.116: [               0h] = authentication_status.null_username[ 1b]
192.168.20.116: [               0h] = authentication_status.non_null_username[ 
1b]
192.168.20.116: [               0h] = 
authentication_status.user_level_authentication[ 1b]
192.168.20.116: [               0h] = 
authentication_status.per_message_authentication[ 1b]
192.168.20.116: [               0h] = authentication_status.k_g[ 1b]
192.168.20.116: [               0h] = authentication_status.reserved[ 2b]
192.168.20.116: [               1h] = channel_supports_ipmi_v1.5_connections[ 
1b]
192.168.20.116: [               1h] = channel_supports_ipmi_v2.0_connections[ 
1b]
192.168.20.116: [               0h] = reserved[ 6b]
192.168.20.116: [             400h] = oem_id[24b]
192.168.20.116: [               4h] = oem_auxiliary_data[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              ABh] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              10h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[32B]
192.168.20.116: [ CCh 00h 00h 00h BCh 94h D7h 7Fh ]
192.168.20.116: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              CCh] = message_tag[ 8b]
192.168.20.116: [               0h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[16b]
192.168.20.116: [        7FD794BCh] = remote_console_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [               0h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [               0h] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              11h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              24h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[36B]
192.168.20.116: [ CCh 00h 04h 00h BCh 94h D7h 7Fh ]
192.168.20.116: [ F3h 9Ch 5Bh 7Fh 00h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 02h 00h 00h 08h ]
192.168.20.116: [ 01h FFh 02h 07h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              CCh] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[ 8b]
192.168.20.116: [        7FD794BCh] = remote_console_session_id[32b]
192.168.20.116: [        7F5B9CF3h] = managed_system_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [           80000h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [           80000h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [           702FFh] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 1 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              12h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              21h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[33B]
192.168.20.116: [ CDh 00h 00h 00h F3h 9Ch 5Bh 7Fh ]
192.168.20.116: [ C2h EAh 7Ch CEh 28h 9Bh 37h B8h ]
192.168.20.116: [ D6h E4h F0h D9h 9Ah DEh 5Fh E7h ]
192.168.20.116: [ 14h 00h 00h 05h 61h 64h 6Dh 69h ]
192.168.20.116: [ 6Eh ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              CDh] = message_tag[ 8b]
192.168.20.116: [               0h] = reserved1[24b]
192.168.20.116: [        7F5B9CF3h] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
192.168.20.116: [ C2h EAh 7Ch CEh 28h 9Bh 37h B8h ]
192.168.20.116: [ D6h E4h F0h D9h 9Ah DEh 5Fh E7h ]
192.168.20.116: [               4h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               1h] = name_only_lookup[ 1b]
192.168.20.116: [               0h] = reserved2[ 3b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               5h] = user_name_length[ 8b]
192.168.20.116: [      6E696D6461h] = user_name[40b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 2 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              13h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              3Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[60B]
192.168.20.116: [ CDh 00h 00h 00h BCh 94h D7h 7Fh ]
192.168.20.116: [ CCh 7Ch 65h E2h AEh FFh DBh 12h ]
192.168.20.116: [ 61h 5Dh 62h 98h FDh 4Ah 37h 84h ]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [ F7h 4Ah B8h 92h 4Ch 9Ch 3Bh AAh ]
192.168.20.116: [ 9Ah 5Ch FBh 9Eh 18h 2Ah F1h 84h ]
192.168.20.116: [ B9h CDh 9Fh 07h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              CDh] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        7FD794BCh] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
192.168.20.116: [ CCh 7Ch 65h E2h AEh FFh DBh 12h ]
192.168.20.116: [ 61h 5Dh 62h 98h FDh 4Ah 37h 84h ]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_guid[16B]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ F7h 4Ah B8h 92h 4Ch 9Ch 3Bh AAh ]
192.168.20.116: [ 9Ah 5Ch FBh 9Eh 18h 2Ah F1h 84h ]
192.168.20.116: [ B9h CDh 9Fh 07h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 3 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              14h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              1Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[28B]
192.168.20.116: [ CEh 00h 00h 00h F3h 9Ch 5Bh 7Fh ]
192.168.20.116: [ 58h FAh 2Dh 1Fh B3h 2Dh 6Bh CAh ]
192.168.20.116: [ 74h 54h A1h F9h 3Fh D8h 28h 8Eh ]
192.168.20.116: [ 55h 79h 01h E8h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              CEh] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        7F5B9CF3h] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ 58h FAh 2Dh 1Fh B3h 2Dh 6Bh CAh ]
192.168.20.116: [ 74h 54h A1h F9h 3Fh D8h 28h 8Eh ]
192.168.20.116: [ 55h 79h 01h E8h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 4 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              15h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              14h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
192.168.20.116: [ CEh 00h 00h 00h BCh 94h D7h 7Fh ]
192.168.20.116: [ B6h A6h 22h EDh 6Bh 55h 32h 19h ]
192.168.20.116: [ E1h D0h 4Ch 86h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              CEh] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        7FD794BCh] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = integrity_check_value[12B]
192.168.20.116: [ B6h A6h 22h EDh 6Bh 55h 32h 19h ]
192.168.20.116: [ E1h D0h 4Ch 86h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7F5B9CF3h] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ EEh 89h CDh 38h 73h FEh 3Ch 7Ah ]
192.168.20.116: [ 35h D4h 66h 16h E6h 5Eh C9h 99h ]
192.168.20.116: [E4043B5C81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              17h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              E4h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 70h FFh 0Bh 32h CCh B8h 5Ch F2h ]
192.168.20.116: [ E2h 40h 7Bh 97h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7FD794BCh] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ E5h E6h 54h BCh 55h CFh A7h E2h ]
192.168.20.116: [ 35h 53h 57h 85h 00h A9h 78h CCh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h 5Ch 3Bh 00h 04h ]
192.168.20.116: [ 45h ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              17h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              45h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 3Ah 3Dh 5Fh 55h 53h C6h F8h A9h ]
192.168.20.116: [ 00h 92h 17h 1Bh ]
(ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
failed; p = 9; session_sequence_number = 0; highest_received_sequence_number = 0
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7F5B9CF3h] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ DEh 32h D0h 32h 9Dh 2Eh 56h 40h ]
192.168.20.116: [ 5Fh 28h C0h 36h 60h 0Dh 32h 70h ]
192.168.20.116: [E4043B5C81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              17h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              E4h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ C0h B6h 5Eh 89h 8Ah 0Dh 08h 05h ]
192.168.20.116: [ 37h 4Bh 28h E8h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7FD794BCh] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 25h DEh AEh D3h DDh 89h E6h 3Eh ]
192.168.20.116: [ E6h 48h D6h E4h 92h 0Eh 68h 78h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h 5Ch 3Bh 00h 04h ]
192.168.20.116: [ 45h ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              17h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              45h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 8Fh 76h 1Bh CAh DEh 8Eh FCh 57h ]
192.168.20.116: [ 3Ah F4h 3Eh 0Bh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7F5B9CF3h] = session_id[32b]
192.168.20.116: [               3h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ D8h 6Dh A9h 9Ah CEh A1h 0Bh 69h ]
192.168.20.116: [ C9h 50h 53h E9h 7Fh 9Dh 42h 35h ]
192.168.20.116: [C30E4E6081C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              18h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              C3h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 90h F3h 1Dh FDh 5Dh 9Bh 03h D1h ]
192.168.20.116: [ 7Fh 48h D6h 6Ch ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7FD794BCh] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              30h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ F4h BCh 34h 49h 8Ch DCh 2Bh C1h ]
192.168.20.116: [ 2Fh 82h 46h 30h 2Bh BFh FCh 50h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[16B]
192.168.20.116: [ 81h 1Ch 63h 20h 60h 4Eh 00h 03h ]
192.168.20.116: [ 00h 00h 00h 00h 00h 00h 00h 2Fh ]
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
192.168.20.116: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              18h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = standard_payload_type_0_supported[ 1b]
192.168.20.116: [               1h] = standard_payload_type_1_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_2_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_3_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_4_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_5_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_6_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_7_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_8_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_9_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_10_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_11_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_12_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_13_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_14_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_15_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_0_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_1_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_2_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_3_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_4_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_5_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_6_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_7_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_8_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_9_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_10_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_11_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_12_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_13_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_14_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_15_supported[ 1b]
192.168.20.116: [               0h] = payload_type_20h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_21h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_22h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_23h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_24h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_25h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_26h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_27h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_28h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_29h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ah_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Bh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ch_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Dh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Eh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Fh_supported[ 1b]
192.168.20.116: [               0h] = reserved[16b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              2Fh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 1Bh 4Bh 53h 30h 84h 6Fh 56h 88h ]
192.168.20.116: [ ADh E9h 8Ah 8Eh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7F5B9CF3h] = session_id[32b]
192.168.20.116: [               4h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 0Ah 6Bh 09h 6Eh 69h D1h 78h 53h ]
192.168.20.116: [ 2Eh 20h 90h ABh E9h E6h 58h ABh ]
192.168.20.116: [D0014A6481C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              19h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              D0h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 53h A6h 1Ch B6h C5h 2Ch DEh 0Bh ]
192.168.20.116: [ DBh 4Bh 67h EAh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7FD794BCh] = session_id[32b]
192.168.20.116: [               3h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 9Dh ABh 24h 7Ah 34h 0Ah B9h 1Bh ]
192.168.20.116: [ 52h 8Fh FFh E5h 9Dh 67h 5Dh 92h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 81h 1Ch 63h 20h 64h 4Ah 00h 10h ]
192.168.20.116: [ 00h 00h 22h ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              19h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = instance_capacity[ 4b]
192.168.20.116: [               1h] = reserved[ 4b]
192.168.20.116: [               0h] = instance_1[ 1b]
192.168.20.116: [               0h] = instance_2[ 1b]
192.168.20.116: [               0h] = instance_3[ 1b]
192.168.20.116: [               0h] = instance_4[ 1b]
192.168.20.116: [               0h] = instance_5[ 1b]
192.168.20.116: [               0h] = instance_6[ 1b]
192.168.20.116: [               0h] = instance_7[ 1b]
192.168.20.116: [               0h] = instance_8[ 1b]
192.168.20.116: [               0h] = instance_9[ 1b]
192.168.20.116: [               0h] = instance_10[ 1b]
192.168.20.116: [               0h] = instance_11[ 1b]
192.168.20.116: [               0h] = instance_12[ 1b]
192.168.20.116: [               0h] = instance_13[ 1b]
192.168.20.116: [               0h] = instance_14[ 1b]
192.168.20.116: [               0h] = instance_15[ 1b]
192.168.20.116: [               0h] = instance_16[ 1b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              22h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 09h 30h 2Ch BBh 34h C2h 73h 9Fh ]
192.168.20.116: [ CCh 7Dh 10h 87h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7F5B9CF3h] = session_id[32b]
192.168.20.116: [               5h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 72h 93h EAh 9Dh 87h 6Ch 63h 7Bh ]
192.168.20.116: [ 5Bh CFh 1Ch 41h BFh A6h ACh 75h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h 68h 48h 01h 01h ]
192.168.20.116: [ C2h 00h 00h 00h 0Bh ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Ah] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = reserved3[ 1b]
192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved4[ 1b]
192.168.20.116: [               1h] = authentication_activation[ 1b]
192.168.20.116: [               1h] = encryption_activation[ 1b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [               Bh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ DEh 6Bh 7Fh 6Eh 2Dh B6h D5h 97h ]
192.168.20.116: [ ACh B5h 67h 3Fh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7FD794BCh] = session_id[32b]
192.168.20.116: [               4h] = session_sequence_number[32b]
192.168.20.116: [              30h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 23h 91h DBh AFh 6Dh 07h 71h 9Dh ]
192.168.20.116: [ 89h B7h CDh B5h 76h C9h 05h 13h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
192.168.20.116: [ 81h 1Ch 63h 20h 68h 48h 00h 00h ]
192.168.20.116: [ 00h 00h 00h 00h 04h 00h 04h 02h ]
192.168.20.116: [ 6Fh FFh FFh B9h ]
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[12B]
192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
192.168.20.116: [ 09h 0Ah 0Bh 0Bh ]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Ah] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved1[31b]
192.168.20.116: [             400h] = inbound_payload_size[16b]
192.168.20.116: [             400h] = outbound_payload_size[16b]
192.168.20.116: [            6F02h] = payload_udp_port_number[16b]
192.168.20.116: [            FFFFh] = payload_vlan_number[16b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              B9h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 39h 9Eh CFh 49h D1h 13h DCh 1Eh ]
192.168.20.116: [ B8h 04h D0h 13h ]
(ipmiconsole_processing.c, _check_payload_sizes_legitimate, 2080): 
hostname=192.168.20.116; protocol_state=0x8: payload sizes invalid: 
max_inbound_payload_size=1024 max_outbound_payload_size=1024
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Deactivate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7F5B9CF3h] = session_id[32b]
192.168.20.116: [               6h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 9Ah 91h B4h CBh 85h 6Ch 4Bh 4Dh ]
192.168.20.116: [ 18h 71h 26h CAh 56h EAh 62h BCh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h 6Ch 49h 01h 01h ]
192.168.20.116: [ 00h 00h 00h 00h C8h ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              49h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = payload_auxiliary_data[32b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              C8h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 74h ECh B9h 31h 4Bh AFh 19h C7h ]
192.168.20.116: [ F3h F4h A5h 8Dh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Deactivate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7FD794BCh] = session_id[32b]
192.168.20.116: [               5h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 74h 29h 8Eh A9h 33h 47h C4h 86h ]
192.168.20.116: [ D6h C3h 6Bh 74h 2Ah C8h 06h 4Dh ]
192.168.20.116: [2B00496C20631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              49h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              2Bh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 4Fh 0Bh F5h 26h 1Ch ECh 9Bh 05h ]
192.168.20.116: [ FCh A7h 45h E6h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Close Session Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7F5B9CF3h] = session_id[32b]
192.168.20.116: [               7h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 9Ah EDh 5Fh EEh D9h 01h ADh BCh ]
192.168.20.116: [ A5h 5Dh 07h 6Dh 89h 75h A5h 52h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 20h 18h C8h 81h 70h 3Ch F3h 9Ch ]
192.168.20.116: [ 5Bh 7Fh 6Ah ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Ch] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Ch] = cmd[ 8b]
192.168.20.116: [               3h] = chassis_control[ 4b]
192.168.20.116: [               Fh] = reserved[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              9Ch] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 2Fh 1Dh ADh D3h 69h 08h 32h DFh ]
192.168.20.116: [ 5Ch 54h D7h 41h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Close Session Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        7FD794BCh] = session_id[32b]
192.168.20.116: [               6h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 59h E1h FDh C7h E8h 6Eh 64h 72h ]
192.168.20.116: [ 25h 31h 27h 9Ch FAh 2Ch AFh 6Fh ]
192.168.20.116: [34003C7020631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Ch] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Ch] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              34h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 82h E0h 7Ah 86h 17h CEh 84h 36h ]
192.168.20.116: [ E9h 6Fh F6h ABh ]
ipmiconsole_submit_block: BMC Implementation

reply via email to

[Prev in Thread] Current Thread [Next in Thread]