freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] Nuvoton WPCM450 SOL not working


From: Al Chu
Subject: Re: [Freeipmi-users] Nuvoton WPCM450 SOL not working
Date: Wed, 04 Nov 2009 17:18:19 -0800

Hi Kimitoshi,

I went ahead and made a workaround option.  PLMK if it works for you.

http://ftp.gluster.com/pub/freeipmi/qa-release/freeipmi-0.7.15.beta1.tar.gz

the workaround is "solstatus" so you can do:

ipmiconsole -h host -u user -p password -W solstatus

to try it out.

Al

On Wed, 2009-11-04 at 13:59 -0800, Al Chu wrote:
> Hi Takahashi,
> 
> Thanks for the debug output.  It seems that this motherboard does not
> like the "Get Activation Status" command..
> 
> FreeIPMI does implement SOL differently that ipmitool.  Before
> activating SOL, FreeIPMI makes sure that SOL is not in use (or if
> appropriate flags/options are set, to kill a previous SOL session).
> Ipmitool goes ahead and activiates, assuming deactivation on the command
> line from the user if necessary.
> 
> I will e-mail somebody at Supermicro that I know, and see if he can
> reproduce and maybe get a fix for the long term.
> 
> In the short term, here is a test tar.gz that removes the "Get SOL
> Activation Status" stage of the SOL protocol.  Could you perhaps check
> it out and see if ipmiconsole works?  If so, I can implement an
> appropriate workaround for this situation.
> 
> http://*ftp.gluster.com/pub/freeipmi/qa-release/freeipmi-0.7.15.beta0.tar.gz
> 
> Al
> 
> On Thu, 2009-11-05 at 02:01 +0900, Kimitoshi Takahashi wrote:
> > Hi list,
> > 
> > I have Supermicro's new M/B X8SIL-F.
> > The BMC is Nuvoton WPCM450 and I have a problem with that.
> > I would appreciate if anyone can help me.
> > 
> > The ipmipower seems OK.
> > 
> > # ipmipower -h 192.168.20.199 -u ADMIN -P -s
> > Password: 
> > 192.168.20.199: on
> > 
> > But the sol seems not working,
> > 
> > # ipmiconsole  -h 192.168.20.199 -u ADMIN -P 
> > Password: 
> > [error received]: BMC Error
> > 
> > I use the latest version of freeipmi.
> > address@hidden:~$ /usr/ccmp/sbin/ipmipower --version
> > ipmipower - 0.7.14
> > 
> > ipmitool's sol seems working,
> > 
> > $ ipmitool -I lanplus -H 192.168.20.199 -U ADMIN -P ADMIN sol activate
> > [SOL Session operational.  Use ~? for help]
> > 
> > Debian GNU/Linux 5.0 lenny64 ttyS2
> > 
> > lenny64 login: ~. [terminated ipmitool]
> > 
> > 
> > This debug output may be related.
> > (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 457): 
> > hostname=192.168.20.199; protocol_state=0x7: completion code check failed; 
> > p = 13; comp_code = CC
> > 
> > 
> > Here is the full debug output.
> > $ /usr/ccmp/sbin/ipmiconsole  -h 192.168.20.199 -u ADMIN -P --debug
> > Password: 
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 1.5 Get Channel Authentication Capabilities Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI Session Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [               0h] = authentication_type[ 8b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [               9h] = ipmi_msg_len[ 8b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               6h] = net_fn[ 6b]
> > 192.168.20.199: [              C8h] = checksum1[ 8b]
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               5h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              38h] = cmd[ 8b]
> > 192.168.20.199: [               Eh] = channel_number[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 3b]
> > 192.168.20.199: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
> > 192.168.20.199: [               4h] = maximum_privilege_level[ 4b]
> > 192.168.20.199: [               0h] = reserved2[ 4b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: --------------
> > 192.168.20.199: [              A1h] = checksum2[ 8b]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 1.5 Get Channel Authentication Capabilities Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI Session Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [               0h] = authentication_type[ 8b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [              10h] = ipmi_msg_len[ 8b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               7h] = net_fn[ 6b]
> > 192.168.20.199: [              63h] = checksum1[ 8b]
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               5h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              38h] = cmd[ 8b]
> > 192.168.20.199: [               0h] = comp_code[ 8b]
> > 192.168.20.199: [               1h] = channel_number[ 8b]
> > 192.168.20.199: [               1h] = authentication_type.none[ 1b]
> > 192.168.20.199: [               1h] = authentication_type.md2[ 1b]
> > 192.168.20.199: [               1h] = authentication_type.md5[ 1b]
> > 192.168.20.199: [               0h] = authentication_type.reserved1[ 1b]
> > 192.168.20.199: [               1h] = 
> > authentication_type.straight_password_key[ 1b]
> > 192.168.20.199: [               0h] = authentication_type.oem_prop[ 1b]
> > 192.168.20.199: [               0h] = authentication_type.reserved2[ 1b]
> > 192.168.20.199: [               1h] = 
> > authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
> > 192.168.20.199: [               0h] = 
> > authentication_status.anonymous_login[ 1b]
> > 192.168.20.199: [               0h] = authentication_status.null_username[ 
> > 1b]
> > 192.168.20.199: [               1h] = 
> > authentication_status.non_null_username[ 1b]
> > 192.168.20.199: [               0h] = 
> > authentication_status.user_level_authentication[ 1b]
> > 192.168.20.199: [               0h] = 
> > authentication_status.per_message_authentication[ 1b]
> > 192.168.20.199: [               0h] = authentication_status.k_g[ 1b]
> > 192.168.20.199: [               0h] = authentication_status.reserved[ 2b]
> > 192.168.20.199: [               1h] = 
> > channel_supports_ipmi_v1.5_connections[ 1b]
> > 192.168.20.199: [               1h] = 
> > channel_supports_ipmi_v2.0_connections[ 1b]
> > 192.168.20.199: [               0h] = reserved[ 6b]
> > 192.168.20.199: [            5345h] = oem_id[24b]
> > 192.168.20.199: [               0h] = oem_auxiliary_data[ 8b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: --------------
> > 192.168.20.199: [              5Dh] = checksum2[ 8b]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Open Session Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [              10h] = payload_type[ 6b]
> > 192.168.20.199: [               0h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               0h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[32B]
> > 192.168.20.199: [ 1Eh 00h 00h 00h 84h 08h 84h BBh ]
> > 192.168.20.199: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
> > 192.168.20.199: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
> > 192.168.20.199: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              1Eh] = message_tag[ 8b]
> > 192.168.20.199: [               0h] = requested_maximum_privilege_level[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = reserved2[16b]
> > 192.168.20.199: [        BB840884h] = remote_console_session_id[32b]
> > 192.168.20.199: [               0h] = authentication_payload.payload_type[ 
> > 8b]
> > 192.168.20.199: [               0h] = reserved3[16b]
> > 192.168.20.199: [               8h] = 
> > authentication_payload.payload_length[ 8b]
> > 192.168.20.199: [               1h] = 
> > authentication_payload.authentication_algorithm[ 6b]
> > 192.168.20.199: [               0h] = reserved4[ 2b]
> > 192.168.20.199: [               0h] = reserved5[24b]
> > 192.168.20.199: [               1h] = integrity_payload.payload_type[ 8b]
> > 192.168.20.199: [               0h] = reserved6[16b]
> > 192.168.20.199: [               8h] = integrity_payload.payload_length[ 8b]
> > 192.168.20.199: [               1h] = 
> > integrity_payload.integrity_algorithm[ 6b]
> > 192.168.20.199: [               0h] = reserved7[ 2b]
> > 192.168.20.199: [               0h] = reserved8[24b]
> > 192.168.20.199: [               2h] = confidentiality_payload.payload_type[ 
> > 8b]
> > 192.168.20.199: [               0h] = reserved9[16b]
> > 192.168.20.199: [               8h] = 
> > confidentiality_payload.payload_length[ 8b]
> > 192.168.20.199: [               1h] = 
> > confidentiality_payload.confidentiality_algorithm[ 6b]
> > 192.168.20.199: [               0h] = reserved10[ 2b]
> > 192.168.20.199: [               0h] = reserved11[24b]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Open Session Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [              11h] = payload_type[ 6b]
> > 192.168.20.199: [               0h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               0h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [              24h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[36B]
> > 192.168.20.199: [ 1Eh 00h 04h 00h 84h 08h 84h BBh ]
> > 192.168.20.199: [ 60h 00h 00h 00h 00h 00h 00h 08h ]
> > 192.168.20.199: [ 01h 00h 00h 00h 01h 00h 00h 08h ]
> > 192.168.20.199: [ 01h 00h 00h 00h 02h 00h 00h 08h ]
> > 192.168.20.199: [ 01h 00h 00h 00h ]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              1Eh] = message_tag[ 8b]
> > 192.168.20.199: [               0h] = rmcpplus_status_code[ 8b]
> > 192.168.20.199: [               4h] = maximum_privilege_level[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = reserved2[ 8b]
> > 192.168.20.199: [        BB840884h] = remote_console_session_id[32b]
> > 192.168.20.199: [              60h] = managed_system_session_id[32b]
> > 192.168.20.199: [               0h] = authentication_payload.payload_type[ 
> > 8b]
> > 192.168.20.199: [               0h] = reserved3[16b]
> > 192.168.20.199: [               8h] = 
> > authentication_payload.payload_length[ 8b]
> > 192.168.20.199: [               1h] = 
> > authentication_payload.authentication_algorithm[ 6b]
> > 192.168.20.199: [               0h] = reserved4[ 2b]
> > 192.168.20.199: [               0h] = reserved5[24b]
> > 192.168.20.199: [               1h] = integrity_payload.payload_type[ 8b]
> > 192.168.20.199: [               0h] = reserved6[16b]
> > 192.168.20.199: [               8h] = integrity_payload.payload_length[ 8b]
> > 192.168.20.199: [               1h] = 
> > integrity_payload.integrity_algorithm[ 6b]
> > 192.168.20.199: [               0h] = reserved7[ 2b]
> > 192.168.20.199: [               0h] = reserved8[24b]
> > 192.168.20.199: [               2h] = confidentiality_payload.payload_type[ 
> > 8b]
> > 192.168.20.199: [               0h] = reserved9[16b]
> > 192.168.20.199: [               8h] = 
> > confidentiality_payload.payload_length[ 8b]
> > 192.168.20.199: [               1h] = 
> > confidentiality_payload.confidentiality_algorithm[ 6b]
> > 192.168.20.199: [               0h] = reserved10[ 2b]
> > 192.168.20.199: [               0h] = reserved11[24b]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 RAKP Message 1 Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [              12h] = payload_type[ 6b]
> > 192.168.20.199: [               0h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               0h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [              21h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[33B]
> > 192.168.20.199: [ 1Fh 00h 00h 00h 60h 00h 00h 00h ]
> > 192.168.20.199: [ 7Ch 26h 2Ch D3h 04h 28h 33h 24h ]
> > 192.168.20.199: [ CBh 37h 7Ah C3h B0h 50h 6Eh AFh ]
> > 192.168.20.199: [ 14h 00h 00h 05h 41h 44h 4Dh 49h ]
> > 192.168.20.199: [ 4Eh ]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              1Fh] = message_tag[ 8b]
> > 192.168.20.199: [               0h] = reserved1[24b]
> > 192.168.20.199: [              60h] = managed_system_session_id[32b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
> > 192.168.20.199: [ 7Ch 26h 2Ch D3h 04h 28h 33h 24h ]
> > 192.168.20.199: [ CBh 37h 7Ah C3h B0h 50h 6Eh AFh ]
> > 192.168.20.199: [               4h] = requested_maximum_privilege_level[ 4b]
> > 192.168.20.199: [               1h] = name_only_lookup[ 1b]
> > 192.168.20.199: [               0h] = reserved2[ 3b]
> > 192.168.20.199: [               0h] = reserved3[16b]
> > 192.168.20.199: [               5h] = user_name_length[ 8b]
> > 192.168.20.199: [      4E494D4441h] = user_name[40b]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 RAKP Message 2 Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [              13h] = payload_type[ 6b]
> > 192.168.20.199: [               0h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               0h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [              3Ch] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[60B]
> > 192.168.20.199: [ 1Fh 00h 00h 00h 84h 08h 84h BBh ]
> > 192.168.20.199: [ AFh 6Eh 50h B0h C3h 7Ah 37h CBh ]
> > 192.168.20.199: [ 24h 33h 28h 04h D3h 2Ch 26h 7Ch ]
> > 192.168.20.199: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
> > 192.168.20.199: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
> > 192.168.20.199: [ 16h 3Ch C1h 1Ah 5Dh CCh C7h 95h ]
> > 192.168.20.199: [ 03h DBh 66h B4h DFh 3Bh 6Bh 9Ah ]
> > 192.168.20.199: [ 74h FAh 80h 9Ch ]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              1Fh] = message_tag[ 8b]
> > 192.168.20.199: [               0h] = rmcpplus_status_code[ 8b]
> > 192.168.20.199: [               0h] = reserved1[16b]
> > 192.168.20.199: [        BB840884h] = remote_console_session_id[32b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
> > 192.168.20.199: [ AFh 6Eh 50h B0h C3h 7Ah 37h CBh ]
> > 192.168.20.199: [ 24h 33h 28h 04h D3h 2Ch 26h 7Ch ]
> > 192.168.20.199: [  BYTE ARRAY ... ] = managed_system_guid[16B]
> > 192.168.20.199: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
> > 192.168.20.199: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
> > 192.168.20.199: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> > 192.168.20.199: [ 16h 3Ch C1h 1Ah 5Dh CCh C7h 95h ]
> > 192.168.20.199: [ 03h DBh 66h B4h DFh 3Bh 6Bh 9Ah ]
> > 192.168.20.199: [ 74h FAh 80h 9Ch ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 RAKP Message 3 Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [              14h] = payload_type[ 6b]
> > 192.168.20.199: [               0h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               0h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [              1Ch] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[28B]
> > 192.168.20.199: [ 20h 00h 00h 00h 60h 00h 00h 00h ]
> > 192.168.20.199: [ E9h 8Ch 8Ah B8h A1h 94h 9Ah 10h ]
> > 192.168.20.199: [ 2Ch 62h 79h C8h B4h 0Ch 67h 11h ]
> > 192.168.20.199: [ C4h 2Dh 87h 73h ]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              20h] = message_tag[ 8b]
> > 192.168.20.199: [               0h] = rmcpplus_status_code[ 8b]
> > 192.168.20.199: [               0h] = reserved1[16b]
> > 192.168.20.199: [              60h] = managed_system_session_id[32b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> > 192.168.20.199: [ E9h 8Ch 8Ah B8h A1h 94h 9Ah 10h ]
> > 192.168.20.199: [ 2Ch 62h 79h C8h B4h 0Ch 67h 11h ]
> > 192.168.20.199: [ C4h 2Dh 87h 73h ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 RAKP Message 4 Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [              15h] = payload_type[ 6b]
> > 192.168.20.199: [               0h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               0h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [               0h] = session_id[32b]
> > 192.168.20.199: [               0h] = session_sequence_number[32b]
> > 192.168.20.199: [              14h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[20B]
> > 192.168.20.199: [ 20h 00h 00h 00h 84h 08h 84h BBh ]
> > 192.168.20.199: [ 4Ah 0Dh D8h B4h 96h C6h 33h B5h ]
> > 192.168.20.199: [ B7h 38h FFh 30h ]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              20h] = message_tag[ 8b]
> > 192.168.20.199: [               0h] = rmcpplus_status_code[ 8b]
> > 192.168.20.199: [               0h] = reserved1[16b]
> > 192.168.20.199: [        BB840884h] = remote_console_session_id[32b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = integrity_check_value[12B]
> > 192.168.20.199: [ 4Ah 0Dh D8h B4h 96h C6h 33h B5h ]
> > 192.168.20.199: [ B7h 38h FFh 30h ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Set Session Privilege Level Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [              60h] = session_id[32b]
> > 192.168.20.199: [               1h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ 11h 44h 81h CFh 95h 28h 40h 86h ]
> > 192.168.20.199: [ E7h DAh 46h 03h F1h 7Eh 99h A7h ]
> > 192.168.20.199: [2C043B1481C81820h] = payload_data[64b]
> > 192.168.20.199: [ 707060504030201h] = confidentiality_trailer[64b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               6h] = net_fn[ 6b]
> > 192.168.20.199: [              C8h] = checksum1[ 8b]
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               5h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              3Bh] = cmd[ 8b]
> > 192.168.20.199: [               4h] = privilege_level[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [              2Ch] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ A5h EFh CFh 41h 11h 87h 3Ch 9Dh ]
> > 192.168.20.199: [ 9Ah 12h C6h 3Eh ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Set Session Privilege Level Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [        BB840884h] = session_id[32b]
> > 192.168.20.199: [               1h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ 03h 01h 05h 07h 07h 05h 09h 0Bh ]
> > 192.168.20.199: [ 0Bh 09h 0Dh 0Fh 0Fh 0Dh 11h 13h ]
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[ 9B]
> > 192.168.20.199: [ 81h 1Ch 63h 20h 14h 3Bh 00h 04h ]
> > 192.168.20.199: [ 8Dh ]
> > 192.168.20.199: [   6060504030201h] = confidentiality_trailer[56b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               7h] = net_fn[ 6b]
> > 192.168.20.199: [              63h] = checksum1[ 8b]
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               5h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              3Bh] = cmd[ 8b]
> > 192.168.20.199: [               0h] = comp_code[ 8b]
> > 192.168.20.199: [               4h] = privilege_level[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [              8Dh] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ C8h 3Fh 15h 92h B7h 5Ah 71h 44h ]
> > 192.168.20.199: [ 8Dh 4Ah 04h B4h ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Get Channel Payload Support Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [              60h] = session_id[32b]
> > 192.168.20.199: [               2h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ E2h EBh 12h 36h F7h 73h 9Ah FCh ]
> > 192.168.20.199: [ 50h 58h 8Fh B2h AAh F4h 37h EEh ]
> > 192.168.20.199: [ B0E4E1881C81820h] = payload_data[64b]
> > 192.168.20.199: [ 707060504030201h] = confidentiality_trailer[64b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               6h] = net_fn[ 6b]
> > 192.168.20.199: [              C8h] = checksum1[ 8b]
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               6h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              4Eh] = cmd[ 8b]
> > 192.168.20.199: [               Eh] = channel_number[ 4b]
> > 192.168.20.199: [               0h] = reserved[ 4b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [               Bh] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ FAh 8Eh 82h 10h EEh 61h E8h CBh ]
> > 192.168.20.199: [ A8h 82h 8Ah 1Ch ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Get Channel Payload Support Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [        BB840884h] = session_id[32b]
> > 192.168.20.199: [               2h] = session_sequence_number[32b]
> > 192.168.20.199: [              30h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ 03h 01h 05h 07h 07h 05h 09h 0Bh ]
> > 192.168.20.199: [ 0Bh 09h 0Dh 0Fh 0Fh 0Dh 11h 13h ]
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[16B]
> > 192.168.20.199: [ 81h 1Ch 63h 20h 18h 4Eh 00h 03h ]
> > 192.168.20.199: [ 00h 00h FCh 00h 00h 00h 00h 7Bh ]
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
> > 192.168.20.199: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
> > 192.168.20.199: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               7h] = net_fn[ 6b]
> > 192.168.20.199: [              63h] = checksum1[ 8b]
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               6h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              4Eh] = cmd[ 8b]
> > 192.168.20.199: [               0h] = comp_code[ 8b]
> > 192.168.20.199: [               1h] = standard_payload_type_0_supported[ 1b]
> > 192.168.20.199: [               1h] = standard_payload_type_1_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_2_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_3_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_4_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_5_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_6_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_7_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_8_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_9_supported[ 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_10_supported[ 
> > 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_11_supported[ 
> > 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_12_supported[ 
> > 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_13_supported[ 
> > 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_14_supported[ 
> > 1b]
> > 192.168.20.199: [               0h] = standard_payload_type_15_supported[ 
> > 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_0_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_1_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_2_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_3_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_4_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_5_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_6_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_7_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_8_supported[ 1b]
> > 192.168.20.199: [               0h] = session_setup_payload_9_supported[ 1b]
> > 192.168.20.199: [               1h] = session_setup_payload_10_supported[ 
> > 1b]
> > 192.168.20.199: [               1h] = session_setup_payload_11_supported[ 
> > 1b]
> > 192.168.20.199: [               1h] = session_setup_payload_12_supported[ 
> > 1b]
> > 192.168.20.199: [               1h] = session_setup_payload_13_supported[ 
> > 1b]
> > 192.168.20.199: [               1h] = session_setup_payload_14_supported[ 
> > 1b]
> > 192.168.20.199: [               1h] = session_setup_payload_15_supported[ 
> > 1b]
> > 192.168.20.199: [               0h] = payload_type_20h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_21h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_22h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_23h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_24h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_25h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_26h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_27h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_28h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_29h_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_2Ah_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_2Bh_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_2Ch_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_2Dh_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_2Eh_supported[ 1b]
> > 192.168.20.199: [               0h] = payload_type_2Fh_supported[ 1b]
> > 192.168.20.199: [               0h] = reserved[16b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [              7Bh] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ 8Dh FDh 8Fh E5h 26h 14h E0h 9Ah ]
> > 192.168.20.199: [ 3Bh 0Dh 3Bh E0h ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Get Payload Activation Status Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [              60h] = session_id[32b]
> > 192.168.20.199: [               3h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ 1Bh 69h F9h 7Eh F0h 7Ah D5h 71h ]
> > 192.168.20.199: [ 3Fh 2Ch 29h 91h 5Ch A5h DBh 56h ]
> > 192.168.20.199: [18014A1C81C81820h] = payload_data[64b]
> > 192.168.20.199: [ 707060504030201h] = confidentiality_trailer[64b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               6h] = net_fn[ 6b]
> > 192.168.20.199: [              C8h] = checksum1[ 8b]
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               7h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              4Ah] = cmd[ 8b]
> > 192.168.20.199: [               1h] = payload_type[ 8b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [              18h] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ 0Dh D5h E2h F6h 28h 79h 68h D8h ]
> > 192.168.20.199: [ 2Dh 27h ECh 35h ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Get Payload Activation Status Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [        BB840884h] = session_id[32b]
> > 192.168.20.199: [               3h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ 03h 01h 05h 07h 07h 05h 09h 0Bh ]
> > 192.168.20.199: [ 0Bh 09h 0Dh 0Fh 0Fh 0Dh 11h 13h ]
> > 192.168.20.199: [AECC4A1C20631C81h] = payload_data[64b]
> > 192.168.20.199: [ 707060504030201h] = confidentiality_trailer[64b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               7h] = net_fn[ 6b]
> > 192.168.20.199: [              63h] = checksum1[ 8b]
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               7h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              4Ah] = cmd[ 8b]
> > 192.168.20.199: [              CCh] = comp_code[ 8b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [              AEh] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ 80h D8h F3h FCh 75h 78h 4Ch 88h ]
> > 192.168.20.199: [ 69h D2h 4Fh DBh ]
> > (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 457): 
> > hostname=192.168.20.199; protocol_state=0x7: completion code check failed; 
> > p = 13; comp_code = CC
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Close Session Request
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [              60h] = session_id[32b]
> > 192.168.20.199: [               4h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ 7Ah 85h 84h 60h B8h 90h 49h 39h ]
> > 192.168.20.199: [ F1h FCh 05h DEh AEh DFh E4h A1h ]
> > 192.168.20.199: [  BYTE ARRAY ... ] = payload_data[11B]
> > 192.168.20.199: [ 20h 18h C8h 81h 20h 3Ch 60h 00h ]
> > 192.168.20.199: [ 00h 00h C3h ]
> > 192.168.20.199: [       404030201h] = confidentiality_trailer[40b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               6h] = net_fn[ 6b]
> > 192.168.20.199: [              C8h] = checksum1[ 8b]
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               8h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              3Ch] = cmd[ 8b]
> > 192.168.20.199: [               0h] = chassis_control[ 4b]
> > 192.168.20.199: [               6h] = reserved[ 4b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [               0h] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ F8h FAh 87h 68h 8Fh 0Eh A7h 6Eh ]
> > 192.168.20.199: [ EBh 16h CAh 82h ]
> > 192.168.20.199: =====================================================
> > 192.168.20.199: IPMI 2.0 Close Session Response
> > 192.168.20.199: =====================================================
> > 192.168.20.199: RMCP Header:
> > 192.168.20.199: ------------
> > 192.168.20.199: [               6h] = version[ 8b]
> > 192.168.20.199: [               0h] = reserved[ 8b]
> > 192.168.20.199: [              FFh] = sequence_number[ 8b]
> > 192.168.20.199: [               7h] = message_class.class[ 5b]
> > 192.168.20.199: [               0h] = message_class.reserved[ 2b]
> > 192.168.20.199: [               0h] = message_class.ack[ 1b]
> > 192.168.20.199: IPMI RMCPPLUS Session Header:
> > 192.168.20.199: -----------------------------
> > 192.168.20.199: [               6h] = authentication_type[ 4b]
> > 192.168.20.199: [               0h] = reserved1[ 4b]
> > 192.168.20.199: [               0h] = payload_type[ 6b]
> > 192.168.20.199: [               1h] = payload_type.authenticated[ 1b]
> > 192.168.20.199: [               1h] = payload_type.encrypted[ 1b]
> > 192.168.20.199: [        BB840884h] = session_id[32b]
> > 192.168.20.199: [               4h] = session_sequence_number[32b]
> > 192.168.20.199: [              20h] = ipmi_payload_len[16b]
> > 192.168.20.199: IPMI RMCPPLUS Payload:
> > 192.168.20.199: ----------------------
> > 192.168.20.199: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> > 192.168.20.199: [ 03h 01h 05h 07h 07h 05h 09h 0Bh ]
> > 192.168.20.199: [ 0Bh 09h 0Dh 0Fh 0Fh 0Dh 11h 13h ]
> > 192.168.20.199: [84003C2020631C81h] = payload_data[64b]
> > 192.168.20.199: [ 707060504030201h] = confidentiality_trailer[64b]
> > 192.168.20.199: IPMI Message Header:
> > 192.168.20.199: --------------------
> > 192.168.20.199: [              81h] = rq_addr[ 8b]
> > 192.168.20.199: [               0h] = rq_lun[ 2b]
> > 192.168.20.199: [               7h] = net_fn[ 6b]
> > 192.168.20.199: [              63h] = checksum1[ 8b]
> > 192.168.20.199: [              20h] = rs_addr[ 8b]
> > 192.168.20.199: [               0h] = rs_lun[ 2b]
> > 192.168.20.199: [               8h] = rq_seq[ 6b]
> > 192.168.20.199: IPMI Command Data:
> > 192.168.20.199: ------------------
> > 192.168.20.199: [              3Ch] = cmd[ 8b]
> > 192.168.20.199: [               0h] = comp_code[ 8b]
> > 192.168.20.199: IPMI Trailer:
> > 192.168.20.199: -------------
> > 192.168.20.199: [              84h] = checksum2[ 8b]
> > 192.168.20.199: IPMI RMCPPLUS Session Trailer:
> > 192.168.20.199: ------------------------------
> > 192.168.20.199: [            FFFFh] = integrity_pad[16b]
> > 192.168.20.199: [               2h] = pad_length[ 8b]
> > 192.168.20.199: [               7h] = next_header[ 8b]
> > 192.168.20.199: [  BYTE ARRAY ... ] = authentication_code[12B]
> > 192.168.20.199: [ 6Fh B5h 64h 38h E7h 4Eh 7Bh 4Fh ]
> > 192.168.20.199: [ ABh 8Bh D3h 12h ]
> > [error received]: BMC Error
> > 
> > 
> > 
> > Best regards,
> > Kimitoshi Takahashi
> > 
> > 
> > _______________________________________________
> > Freeipmi-users mailing list
> > address@hidden
> > http://**lists.gnu.org/mailman/listinfo/freeipmi-users
> > 
-- 
Albert Chu
address@hidden
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory





reply via email to

[Prev in Thread] Current Thread [Next in Thread]