freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] ipmiconsole BMC Implementation with x38ml


From: Kimitoshi Takahashi
Subject: Re: [Freeipmi-users] ipmiconsole BMC Implementation with x38ml
Date: Wed, 24 Sep 2008 17:11:09 +0900
User-agent: Thunderbird 2.0.0.16 (Windows/20080708)

Hi Al,

Thaks for the reply.
Here are the results:

(A) 0.6.7 with authcap,solpayloadsize,solport

address@hidden:~# ipmiconsole -W authcap,solpayloadsize,solport -u rt -p rt -h 
192.168.20.116 --debug 2>/tmp/debug

(Never returns to the shell)

sh-3.1$ tail -f /tmp/debug |egrep -v "^192.168.20.116"
(ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
hostname=192.168.20.116; protocol_state=0x8: completion cod
e check failed; p = 15; comp_code = 80
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2910): hostname=192.168.20.116; protocol_state=0x
8: activate payload race
(ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
hostname=192.168.20.116; protocol_state=0x8: completion cod
e check failed; p = 15; comp_code = 80

(B) 0.6.9.beta0 with authcap,solpayloadsize,solport

address@hidden:~# ldd  /usr/ccmp/sbin/ipmiconsole |grep ipmi
        libipmiconsole.so.2 => /usr/ccmp//lib/libipmiconsole.so.2 (0xb7f40000)
        libfreeipmi.so.6 => /usr/ccmp//lib/libfreeipmi.so.6 (0xb7dab000)
address@hidden:~# /usr/ccmp/sbin/ipmiconsole -V
ipmiconsole 0.6.9.beta0

address@hidden:~# /usr/ccmp/sbin/ipmiconsole -W authcap,solpayloadsize,solport 
-u rt -p rt -h 192.168.20.116 --debug 2>/tmp/debug

(Never returns to the shell)

sh-3.1$ tail -f /tmp/debug |egrep -v "^192.168.20.116"
tail: /tmp/debug: file truncated
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2957): hostname=192.168.20.116; protocol_state=0x8: trying new port: 6F02
(ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
failed; p = 9; session_sequence_number = 0; highest_received_sequence_number = 0
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2957): hostname=192.168.20.116; protocol_state=0x8: trying new port: 6F02

I also atached snips of --debug output for 0.6.7.


> 
> A) Could you also throw in the "solport" workaround.  The motherboard is
> asking ipmiconsole to try connecting to another port.  On atleast one
> other motherboard, we found out that the new port was a lie.  So the
> "solport" workaround will tell ipmiconsole to ignore that new port and
> connect to the default one.
> 
> B) No motherboard I've ever seen has used the "connect to another port"
> option in IPMI.  So this path in the ipmiconsole code has never been
> tested, and there may be bugs.  In fact, I think I may have found a bug.
> Could you also give this tar.gz a try?
> 
> http://ftp.zresearch.com/pub/freeipmi/qa-
> release/freeipmi-0.6.9.beta0.tar.gz
> 
> If both the old and new tar.gz fail, could you send me the --debug of
> both?

-- 
Best regards,
Kimitoshi Takahashi


192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               9h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              25h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved1[ 3b]
192.168.20.116: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              21h] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [              10h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              25h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = channel_number[ 8b]
192.168.20.116: [               1h] = authentication_type.none[ 1b]
192.168.20.116: [               0h] = authentication_type.md2[ 1b]
192.168.20.116: [               1h] = authentication_type.md5[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved1[ 1b]
192.168.20.116: [               1h] = 
authentication_type.straight_password_key[ 1b]
192.168.20.116: [               0h] = authentication_type.oem_prop[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved2[ 1b]
192.168.20.116: [               1h] = 
authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
192.168.20.116: [               1h] = authentication_status.anonymous_login[ 1b]
192.168.20.116: [               0h] = authentication_status.null_username[ 1b]
192.168.20.116: [               0h] = authentication_status.non_null_username[ 
1b]
192.168.20.116: [               0h] = 
authentication_status.user_level_authentication[ 1b]
192.168.20.116: [               0h] = 
authentication_status.per_message_authentication[ 1b]
192.168.20.116: [               0h] = authentication_status.k_g[ 1b]
192.168.20.116: [               0h] = authentication_status.reserved[ 2b]
192.168.20.116: [               1h] = channel_supports_ipmi_v1.5_connections[ 
1b]
192.168.20.116: [               1h] = channel_supports_ipmi_v2.0_connections[ 
1b]
192.168.20.116: [               0h] = reserved[ 6b]
192.168.20.116: [               0h] = oem_id[24b]
192.168.20.116: [               0h] = oem_auxiliary_data[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              7Ah] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              10h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[32B]
192.168.20.116: [ 73h 00h 00h 00h CAh 4Eh D9h 6Bh ]
192.168.20.116: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              73h] = message_tag[ 8b]
192.168.20.116: [               0h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[16b]
192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [               0h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [               0h] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              11h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              24h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[36B]
192.168.20.116: [ 73h 00h 04h 00h CAh 4Eh D9h 6Bh ]
192.168.20.116: [ B0h D7h ABh 77h 00h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 02h 00h 00h 08h ]
192.168.20.116: [ 01h FFh 02h 07h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              73h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[ 8b]
192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
192.168.20.116: [        77ABD7B0h] = managed_system_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [           80000h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [           80000h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [           702FFh] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 1 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              12h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              1Eh] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[30B]
192.168.20.116: [ 74h 00h 00h 00h B0h D7h ABh 77h ]
192.168.20.116: [ BFh B1h 82h BCh EDh A0h 91h 97h ]
192.168.20.116: [ 4Ch F1h F0h ADh 9Fh E0h 42h 49h ]
192.168.20.116: [ 14h 00h 00h 02h 72h 74h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              74h] = message_tag[ 8b]
192.168.20.116: [               0h] = reserved1[24b]
192.168.20.116: [        77ABD7B0h] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
192.168.20.116: [ BFh B1h 82h BCh EDh A0h 91h 97h ]
192.168.20.116: [ 4Ch F1h F0h ADh 9Fh E0h 42h 49h ]
192.168.20.116: [               4h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               1h] = name_only_lookup[ 1b]
192.168.20.116: [               0h] = reserved2[ 3b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               2h] = user_name_length[ 8b]
192.168.20.116: [            7472h] = user_name[16b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 2 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              13h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              3Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[60B]
192.168.20.116: [ 74h 00h 00h 00h CAh 4Eh D9h 6Bh ]
192.168.20.116: [ 75h D3h 0Dh A1h 3Ah 97h 72h C7h ]
192.168.20.116: [ A0h 5Ch A8h A3h A1h 31h 72h 2Bh ]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [ B1h F4h 84h 20h 37h 55h 18h 9Dh ]
192.168.20.116: [ 77h 60h 7Fh D3h 79h 7Ch AEh B5h ]
192.168.20.116: [ 7Bh F7h 35h 38h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              74h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
192.168.20.116: [ 75h D3h 0Dh A1h 3Ah 97h 72h C7h ]
192.168.20.116: [ A0h 5Ch A8h A3h A1h 31h 72h 2Bh ]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_guid[16B]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ B1h F4h 84h 20h 37h 55h 18h 9Dh ]
192.168.20.116: [ 77h 60h 7Fh D3h 79h 7Ch AEh B5h ]
192.168.20.116: [ 7Bh F7h 35h 38h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 3 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              14h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              1Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[28B]
192.168.20.116: [ 75h 00h 00h 00h B0h D7h ABh 77h ]
192.168.20.116: [ FAh BEh 3Fh FDh 30h 5Ah AEh 96h ]
192.168.20.116: [ 00h DBh 12h CCh 4Fh 17h 2Eh ADh ]
192.168.20.116: [ CFh C3h 02h FBh ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              75h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        77ABD7B0h] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ FAh BEh 3Fh FDh 30h 5Ah AEh 96h ]
192.168.20.116: [ 00h DBh 12h CCh 4Fh 17h 2Eh ADh ]
192.168.20.116: [ CFh C3h 02h FBh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 4 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              15h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              14h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
192.168.20.116: [ 75h 00h 00h 00h CAh 4Eh D9h 6Bh ]
192.168.20.116: [ 54h 7Eh F6h 29h 24h 69h 98h 3Bh ]
192.168.20.116: [ 8Ah 0Fh 84h 19h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              75h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = integrity_check_value[12B]
192.168.20.116: [ 54h 7Eh F6h 29h 24h 69h 98h 3Bh ]
192.168.20.116: [ 8Ah 0Fh 84h 19h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 5Ah 03h BCh 99h 91h 60h 7Ah FAh ]
192.168.20.116: [ BEh 05h 2Ah 35h 56h 00h 4Eh 7Ch ]
192.168.20.116: [AC043B9481C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              25h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              ACh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ C7h 36h 4Dh 22h 36h 3Fh 2Eh 43h ]
192.168.20.116: [ 28h DAh DDh 4Eh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ B1h 4Bh 35h D2h 47h 6Ch FCh 70h ]
192.168.20.116: [ DBh AAh F7h 04h 8Ah 9Ah B5h FFh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h 94h 3Bh 00h 04h ]
192.168.20.116: [ 0Dh ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              25h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [               Dh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ C0h DBh 07h 9Bh 9Fh C8h 4Bh 03h ]
192.168.20.116: [ 59h B2h 1Eh 5Dh ]
(ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
failed; p = 9; session_sequence_number = 0; highest_received_sequence_number = 0
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 54h DEh C8h F2h C8h B6h 31h 85h ]
192.168.20.116: [ 0Ah 87h 0Ah 85h 2Ah 89h 2Ch 2Ch ]
192.168.20.116: [AC043B9481C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              25h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              ACh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 57h 4Eh 7Ah C2h E8h 73h E5h 36h ]
192.168.20.116: [ FBh DBh B9h CBh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 6Dh C2h A0h A7h 59h 12h 6Fh F9h ]
192.168.20.116: [ 6Eh 17h 9Dh 10h 48h 0Fh 3Bh FAh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h 94h 3Bh 00h 04h ]
192.168.20.116: [ 0Dh ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              25h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [               Dh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ CCh 33h 73h 0Dh 9Eh 4Fh 9Ah 26h ]
192.168.20.116: [ 56h EBh 9Bh 36h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               3h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 01h 49h 73h C7h 65h 7Ah BFh 02h ]
192.168.20.116: [ 49h 51h 37h B9h B3h 94h 74h 67h ]
192.168.20.116: [8B0E4E9881C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              26h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              8Bh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ E9h DDh 29h 31h 4Eh E8h 4Dh 84h ]
192.168.20.116: [ D2h C0h F8h F4h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              30h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 5Ah 70h CCh A1h DCh C9h 12h B8h ]
192.168.20.116: [ 73h 09h BCh FDh A3h 71h FDh 10h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[16B]
192.168.20.116: [ 81h 1Ch 63h 20h 98h 4Eh 00h 03h ]
192.168.20.116: [ 00h 00h 00h 00h 00h 00h 00h F7h ]
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
192.168.20.116: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              26h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = standard_payload_type_0_supported[ 1b]
192.168.20.116: [               1h] = standard_payload_type_1_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_2_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_3_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_4_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_5_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_6_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_7_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_8_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_9_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_10_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_11_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_12_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_13_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_14_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_15_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_0_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_1_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_2_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_3_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_4_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_5_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_6_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_7_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_8_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_9_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_10_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_11_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_12_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_13_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_14_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_15_supported[ 1b]
192.168.20.116: [               0h] = payload_type_20h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_21h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_22h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_23h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_24h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_25h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_26h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_27h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_28h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_29h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ah_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Bh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ch_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Dh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Eh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Fh_supported[ 1b]
192.168.20.116: [               0h] = reserved[16b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              F7h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 74h D8h 09h 7Eh 73h 1Eh CCh FBh ]
192.168.20.116: [ B3h B6h ABh FDh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               4h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 52h BAh 9Fh B5h 1Dh 15h BEh FAh ]
192.168.20.116: [ D7h 88h 20h 6Ch D5h 40h ABh 6Ah ]
192.168.20.116: [98014A9C81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              27h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              98h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 31h 14h E8h 63h 93h 01h F1h 57h ]
192.168.20.116: [ 30h 63h 20h 75h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               3h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 34h 9Dh B8h 8Dh B0h 27h 87h 1Eh ]
192.168.20.116: [ 3Eh 24h 2Eh 86h 33h 6Ah 80h 8Dh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 81h 1Ch 63h 20h 9Ch 4Ah 00h 10h ]
192.168.20.116: [ 01h 00h E9h ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              27h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = instance_capacity[ 4b]
192.168.20.116: [               1h] = reserved[ 4b]
192.168.20.116: [               1h] = instance_1[ 1b]
192.168.20.116: [               0h] = instance_2[ 1b]
192.168.20.116: [               0h] = instance_3[ 1b]
192.168.20.116: [               0h] = instance_4[ 1b]
192.168.20.116: [               0h] = instance_5[ 1b]
192.168.20.116: [               0h] = instance_6[ 1b]
192.168.20.116: [               0h] = instance_7[ 1b]
192.168.20.116: [               0h] = instance_8[ 1b]
192.168.20.116: [               0h] = instance_9[ 1b]
192.168.20.116: [               0h] = instance_10[ 1b]
192.168.20.116: [               0h] = instance_11[ 1b]
192.168.20.116: [               0h] = instance_12[ 1b]
192.168.20.116: [               0h] = instance_13[ 1b]
192.168.20.116: [               0h] = instance_14[ 1b]
192.168.20.116: [               0h] = instance_15[ 1b]
192.168.20.116: [               0h] = instance_16[ 1b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              E9h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ FEh DBh ADh 71h E5h 4Ah 9Fh A7h ]
192.168.20.116: [ A2h 57h 73h 2Ah ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               5h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 00h 94h CFh 9Fh 08h E9h 0Fh A8h ]
192.168.20.116: [ CCh CDh B2h 4Ch 8Dh 02h 87h 5Bh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h A0h 48h 01h 01h ]
192.168.20.116: [ C2h 00h 00h 00h D3h ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              28h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = reserved3[ 1b]
192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved4[ 1b]
192.168.20.116: [               1h] = authentication_activation[ 1b]
192.168.20.116: [               1h] = encryption_activation[ 1b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              D3h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 4Ch F4h 2Ch 55h F3h 21h 7Bh 19h ]
192.168.20.116: [ D1h D1h E2h 62h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               4h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ DAh 4Dh 2Fh B7h 16h 41h 6Fh 89h ]
192.168.20.116: [ 4Ah 2Bh 87h EDh 9Dh 84h FDh D1h ]
192.168.20.116: [788048A020631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              28h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [              80h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              78h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 35h F8h 04h C2h 08h 1Eh 58h F5h ]
192.168.20.116: [ 12h 3Bh 44h 3Bh ]
(ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p = 
15; comp_code = 80
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               6h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 91h 40h 7Dh 10h CBh 28h 74h E4h ]
192.168.20.116: [ 7Ch 53h 9Bh 02h 4Fh 1Dh 8Ah 36h ]
192.168.20.116: [90014AA481C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              29h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              90h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 9Bh AAh 62h 63h D4h D7h CCh 4Fh ]
192.168.20.116: [ FCh 7Ah B6h F8h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               5h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 21h B5h 5Eh D1h DCh E5h F0h 1Ah ]
192.168.20.116: [ 09h 1Eh A1h 3Ch 88h 21h CAh 63h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 81h 1Ch 63h 20h A4h 4Ah 00h 10h ]
192.168.20.116: [ 01h 00h E1h ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              29h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = instance_capacity[ 4b]
192.168.20.116: [               1h] = reserved[ 4b]
192.168.20.116: [               1h] = instance_1[ 1b]
192.168.20.116: [               0h] = instance_2[ 1b]
192.168.20.116: [               0h] = instance_3[ 1b]
192.168.20.116: [               0h] = instance_4[ 1b]
192.168.20.116: [               0h] = instance_5[ 1b]
192.168.20.116: [               0h] = instance_6[ 1b]
192.168.20.116: [               0h] = instance_7[ 1b]
192.168.20.116: [               0h] = instance_8[ 1b]
192.168.20.116: [               0h] = instance_9[ 1b]
192.168.20.116: [               0h] = instance_10[ 1b]
192.168.20.116: [               0h] = instance_11[ 1b]
192.168.20.116: [               0h] = instance_12[ 1b]
192.168.20.116: [               0h] = instance_13[ 1b]
192.168.20.116: [               0h] = instance_14[ 1b]
192.168.20.116: [               0h] = instance_15[ 1b]
192.168.20.116: [               0h] = instance_16[ 1b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              E1h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ D8h A6h CEh 37h 09h 47h A6h DEh ]
192.168.20.116: [ 97h 92h D6h AEh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               7h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ FCh 58h F3h 8Bh AFh 97h A1h EEh ]
192.168.20.116: [ CAh 1Dh CAh 7Eh ACh E9h 15h 92h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h A8h 48h 01h 01h ]
192.168.20.116: [ C2h 00h 00h 00h CBh ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              2Ah] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = reserved3[ 1b]
192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved4[ 1b]
192.168.20.116: [               1h] = authentication_activation[ 1b]
192.168.20.116: [               1h] = encryption_activation[ 1b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              CBh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ A2h 57h 49h A6h 49h 15h FEh 17h ]
192.168.20.116: [ 15h 31h 24h B1h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               6h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 6Eh F9h 1Ah 84h 3Ah 89h 0Eh 84h ]
192.168.20.116: [ B4h 95h 71h 51h 19h 6Eh 22h 3Ah ]
192.168.20.116: [708048A820631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              2Ah] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [              80h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              70h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 21h 0Ah 0Dh 1Dh BAh 06h BCh 18h ]
192.168.20.116: [ C6h 1Eh 9Eh E2h ]
(ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p = 
15; comp_code = 80
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               8h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 74h D4h FDh E6h 3Dh EFh 31h CFh ]
192.168.20.116: [ 60h 4Eh 9Ah 2Fh 3Dh E1h A3h F4h ]
192.168.20.116: [88014AAC81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              2Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              88h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 20h 61h 1Fh B2h 28h 38h DFh 6Eh ]
192.168.20.116: [ 2Dh 2Fh C9h 46h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               7h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 24h 81h 0Ch 00h 66h FCh 1Bh 70h ]
192.168.20.116: [ 1Ah BCh ACh A3h DDh 76h 06h 4Ch ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 81h 1Ch 63h 20h ACh 4Ah 00h 10h ]
192.168.20.116: [ 01h 00h D9h ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              2Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = instance_capacity[ 4b]
192.168.20.116: [               1h] = reserved[ 4b]
192.168.20.116: [               1h] = instance_1[ 1b]
192.168.20.116: [               0h] = instance_2[ 1b]
192.168.20.116: [               0h] = instance_3[ 1b]
192.168.20.116: [               0h] = instance_4[ 1b]
192.168.20.116: [               0h] = instance_5[ 1b]
192.168.20.116: [               0h] = instance_6[ 1b]
192.168.20.116: [               0h] = instance_7[ 1b]
192.168.20.116: [               0h] = instance_8[ 1b]
192.168.20.116: [               0h] = instance_9[ 1b]
192.168.20.116: [               0h] = instance_10[ 1b]
192.168.20.116: [               0h] = instance_11[ 1b]
192.168.20.116: [               0h] = instance_12[ 1b]
192.168.20.116: [               0h] = instance_13[ 1b]
192.168.20.116: [               0h] = instance_14[ 1b]
192.168.20.116: [               0h] = instance_15[ 1b]
192.168.20.116: [               0h] = instance_16[ 1b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              D9h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ D6h DEh 6Ch 7Dh 8Eh 39h 84h C7h ]
192.168.20.116: [ 58h D6h 05h F0h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               9h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ A9h A8h 7Ah 6Ah 93h 1Bh 71h D1h ]
192.168.20.116: [ EEh 63h ABh 6Ah FDh 0Fh 79h 50h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h B0h 48h 01h 01h ]
192.168.20.116: [ C2h 00h 00h 00h C3h ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              2Ch] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = reserved3[ 1b]
192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved4[ 1b]
192.168.20.116: [               1h] = authentication_activation[ 1b]
192.168.20.116: [               1h] = encryption_activation[ 1b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              C3h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ FDh B6h 2Bh 92h 5Ch CEh 96h B9h ]
192.168.20.116: [ ADh 69h 05h 5Eh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               8h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 6Fh 20h D0h A9h A9h DEh 2Dh 5Dh ]
192.168.20.116: [ 73h 9Eh AFh 8Ch 0Dh D1h C7h 31h ]
192.168.20.116: [688048B020631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              2Ch] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [              80h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              68h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 94h 69h C8h 62h A4h A1h 4Ah 92h ]
192.168.20.116: [ 18h BFh 1Bh 78h ]
(ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p = 
15; comp_code = 80
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               Ah] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ F1h 59h A0h AEh 41h 16h 5Bh F6h ]
192.168.20.116: [ C1h 83h 6Dh C1h BFh 91h C9h 43h ]
192.168.20.116: [80014AB481C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              2Dh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              80h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 90h EBh C1h 67h 47h 76h 6Eh EBh ]
192.168.20.116: [ F9h 2Dh AAh A0h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               9h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 52h D3h 31h B9h CFh 4Ch 29h E9h ]
192.168.20.116: [ 08h D5h 8Ch E6h 4Ch 92h 32h BBh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 81h 1Ch 63h 20h B4h 4Ah 00h 10h ]
192.168.20.116: [ 01h 00h D1h ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              2Dh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = instance_capacity[ 4b]
192.168.20.116: [               1h] = reserved[ 4b]
192.168.20.116: [               1h] = instance_1[ 1b]
192.168.20.116: [               0h] = instance_2[ 1b]
192.168.20.116: [               0h] = instance_3[ 1b]
192.168.20.116: [               0h] = instance_4[ 1b]
192.168.20.116: [               0h] = instance_5[ 1b]
192.168.20.116: [               0h] = instance_6[ 1b]
192.168.20.116: [               0h] = instance_7[ 1b]
192.168.20.116: [               0h] = instance_8[ 1b]
192.168.20.116: [               0h] = instance_9[ 1b]
192.168.20.116: [               0h] = instance_10[ 1b]
192.168.20.116: [               0h] = instance_11[ 1b]
192.168.20.116: [               0h] = instance_12[ 1b]
192.168.20.116: [               0h] = instance_13[ 1b]
192.168.20.116: [               0h] = instance_14[ 1b]
192.168.20.116: [               0h] = instance_15[ 1b]
192.168.20.116: [               0h] = instance_16[ 1b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              D1h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 58h 93h 97h 90h 94h 7Eh 00h 8Fh ]
192.168.20.116: [ DDh B5h 2Fh D8h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               Bh] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 26h 02h D0h 76h 19h A0h ACh BEh ]
192.168.20.116: [ C9h C6h D3h B4h 90h 92h 2Fh 1Bh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h B8h 48h 01h 01h ]
192.168.20.116: [ C2h 00h 00h 00h BBh ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              2Eh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = reserved3[ 1b]
192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved4[ 1b]
192.168.20.116: [               1h] = authentication_activation[ 1b]
192.168.20.116: [               1h] = encryption_activation[ 1b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              BBh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ F4h 45h 2Bh 13h 11h BBh 48h BFh ]
192.168.20.116: [ 2Dh D2h 5Dh B0h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               Ah] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ B2h 02h 65h 5Bh E1h 92h B9h 54h ]
192.168.20.116: [ 31h 68h E1h 3Eh 39h A8h 6Fh 8Ch ]
192.168.20.116: [608048B820631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              2Eh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [              80h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              60h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ EDh C4h A6h 0Fh 46h 38h C3h 84h ]
192.168.20.116: [ BFh 55h 0Fh 9Ah ]
(ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p = 
15; comp_code = 80
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               Ch] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 89h 70h 70h AEh 0Eh 9Fh 8Ah DCh ]
192.168.20.116: [ A3h 78h 86h D1h 8Ah 9Bh 6Ah 40h ]
192.168.20.116: [78014ABC81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              2Fh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              78h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ A8h 95h AFh D3h 35h 70h 90h CEh ]
192.168.20.116: [ 8Dh C2h 18h 92h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               Bh] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 7Bh A0h 45h 4Ah EDh 6Eh 33h F5h ]
192.168.20.116: [ 43h C0h DBh 8Fh 52h 0Dh 4Bh 05h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 81h 1Ch 63h 20h BCh 4Ah 00h 10h ]
192.168.20.116: [ 01h 00h C9h ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              2Fh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = instance_capacity[ 4b]
192.168.20.116: [               1h] = reserved[ 4b]
192.168.20.116: [               1h] = instance_1[ 1b]
192.168.20.116: [               0h] = instance_2[ 1b]
192.168.20.116: [               0h] = instance_3[ 1b]
192.168.20.116: [               0h] = instance_4[ 1b]
192.168.20.116: [               0h] = instance_5[ 1b]
192.168.20.116: [               0h] = instance_6[ 1b]
192.168.20.116: [               0h] = instance_7[ 1b]
192.168.20.116: [               0h] = instance_8[ 1b]
192.168.20.116: [               0h] = instance_9[ 1b]
192.168.20.116: [               0h] = instance_10[ 1b]
192.168.20.116: [               0h] = instance_11[ 1b]
192.168.20.116: [               0h] = instance_12[ 1b]
192.168.20.116: [               0h] = instance_13[ 1b]
192.168.20.116: [               0h] = instance_14[ 1b]
192.168.20.116: [               0h] = instance_15[ 1b]
192.168.20.116: [               0h] = instance_16[ 1b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              C9h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 51h 2Eh 17h CFh F9h 1Eh 28h 90h ]
192.168.20.116: [ 53h C5h 52h 3Eh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               Dh] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ BBh 4Eh 3Bh 46h 1Dh C2h 51h CEh ]
192.168.20.116: [ 9Dh 88h 40h B3h DAh 2Fh 07h 6Dh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h C0h 48h 01h 01h ]
192.168.20.116: [ C2h 00h 00h 00h B3h ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              30h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = reserved3[ 1b]
192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved4[ 1b]
192.168.20.116: [               1h] = authentication_activation[ 1b]
192.168.20.116: [               1h] = encryption_activation[ 1b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              B3h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 21h 89h E0h 86h 43h 0Ch 8Ch DFh ]
192.168.20.116: [ 8Bh 98h 36h 1Dh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        6BD94ECAh] = session_id[32b]
192.168.20.116: [               Ch] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 10h B0h 60h F1h 42h 19h 45h 73h ]
192.168.20.116: [ 81h 26h B1h BBh CEh 20h 47h 49h ]
192.168.20.116: [588048C020631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              30h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [              80h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              58h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 12h 18h 7Ah F8h 84h E4h 92h A3h ]
192.168.20.116: [ 65h 7Eh BCh BAh ]
(ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p = 
15; comp_code = 80
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        77ABD7B0h] = session_id[32b]
192.168.20.116: [               Eh] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ C4h 7Ah 89h 3Bh 8Ch 08h E1h 4Fh ]
192.168.20.116: [ 90h 8Dh 02h E5h 5Bh 1Ah 1Eh D5h ]
192.168.20.116: [70014AC481C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              31h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              70h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 31h 63h 02h CBh 65h D4h 8Bh 40h ]
192.168.20.116: [ A9h 25h 96h E0h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------

reply via email to

[Prev in Thread] Current Thread [Next in Thread]