[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Freeipmi-users] freeipmi to X4150/X4450
From: |
Shuichi Ihara |
Subject: |
[Freeipmi-users] freeipmi to X4150/X4450 |
Date: |
Fri, 23 May 2008 23:28:52 +0900 |
User-agent: |
Thunderbird 2.0.0.14 (Macintosh/20080421) |
Hi
I'm attempting to use the freeipmi to X4150/X4450 which are Sun's
new Intel server. Those serves have eLOM (no ILOM which is used to
AMD server). I just tried to run ipmipower below, but it didn't work.
The ipmitool works well.
# ipmitool -H 10.173.69.39 -U root -P changeme power status
Chassis Power is on
# ipmipower -h 10.173.69.39 -u root -p changeme -s
10.173.69.39: username invalid
# ipmipower -h 10.173.69.39 -u root -p changeme -W "endianseq" -s
10.173.69.39: username invalid
An attached is dump with "--debug". It would be appreciated if someone could
help for this.
Thanks,
-Ihara
10.173.69.39: =====================================================
10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Request
10.173.69.39: =====================================================
10.173.69.39: RMCP Header:
10.173.69.39: ------------
10.173.69.39: [ 6h] = version[ 8b]
10.173.69.39: [ 0h] = reserved[ 8b]
10.173.69.39: [ FFh] = sequence_number[ 8b]
10.173.69.39: [ 7h] = message_class.class[ 5b]
10.173.69.39: [ 0h] = message_class.reserved[ 2b]
10.173.69.39: [ 0h] = message_class.ack[ 1b]
10.173.69.39: IPMI Session Header:
10.173.69.39: --------------------
10.173.69.39: [ 0h] = authentication_type[ 8b]
10.173.69.39: [ 0h] = session_sequence_number[32b]
10.173.69.39: [ 0h] = session_id[32b]
10.173.69.39: [ 9h] = ipmi_msg_len[ 8b]
10.173.69.39: IPMI Message Header:
10.173.69.39: --------------------
10.173.69.39: [ 20h] = rs_addr[ 8b]
10.173.69.39: [ 0h] = rs_lun[ 2b]
10.173.69.39: [ 6h] = net_fn[ 6b]
10.173.69.39: [ C8h] = checksum1[ 8b]
10.173.69.39: [ 81h] = rq_addr[ 8b]
10.173.69.39: [ 0h] = rq_lun[ 2b]
10.173.69.39: [ 18h] = rq_seq[ 6b]
10.173.69.39: IPMI Command Data:
10.173.69.39: ------------------
10.173.69.39: [ 38h] = cmd[ 8b]
10.173.69.39: [ Eh] = channel_number[ 4b]
10.173.69.39: [ 0h] = reserved1[ 3b]
10.173.69.39: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
10.173.69.39: [ 2h] = maximum_privilege_level[ 4b]
10.173.69.39: [ 0h] = reserved2[ 4b]
10.173.69.39: IPMI Trailer:
10.173.69.39: --------------
10.173.69.39: [ 57h] = checksum2[ 8b]
10.173.69.39: =====================================================
10.173.69.39: IPMI 1.5 Get Channel Authentication Capabilities Response
10.173.69.39: =====================================================
10.173.69.39: RMCP Header:
10.173.69.39: ------------
10.173.69.39: [ 6h] = version[ 8b]
10.173.69.39: [ 0h] = reserved[ 8b]
10.173.69.39: [ FFh] = sequence_number[ 8b]
10.173.69.39: [ 7h] = message_class.class[ 5b]
10.173.69.39: [ 0h] = message_class.reserved[ 2b]
10.173.69.39: [ 0h] = message_class.ack[ 1b]
10.173.69.39: IPMI Session Header:
10.173.69.39: --------------------
10.173.69.39: [ 0h] = authentication_type[ 8b]
10.173.69.39: [ 0h] = session_sequence_number[32b]
10.173.69.39: [ 0h] = session_id[32b]
10.173.69.39: [ 10h] = ipmi_msg_len[ 8b]
10.173.69.39: IPMI Message Header:
10.173.69.39: --------------------
10.173.69.39: [ 81h] = rq_addr[ 8b]
10.173.69.39: [ 0h] = rq_lun[ 2b]
10.173.69.39: [ 7h] = net_fn[ 6b]
10.173.69.39: [ 63h] = checksum1[ 8b]
10.173.69.39: [ 20h] = rs_addr[ 8b]
10.173.69.39: [ 0h] = rs_lun[ 2b]
10.173.69.39: [ 18h] = rq_seq[ 6b]
10.173.69.39: IPMI Command Data:
10.173.69.39: ------------------
10.173.69.39: [ 38h] = cmd[ 8b]
10.173.69.39: [ 0h] = comp_code[ 8b]
10.173.69.39: [ 1h] = channel_number[ 8b]
10.173.69.39: [ 0h] = authentication_type.none[ 1b]
10.173.69.39: [ 1h] = authentication_type.md2[ 1b]
10.173.69.39: [ 1h] = authentication_type.md5[ 1b]
10.173.69.39: [ 0h] = authentication_type.reserved1[ 1b]
10.173.69.39: [ 1h] = authentication_type.straight_password_key[
1b]
10.173.69.39: [ 0h] = authentication_type.oem_prop[ 1b]
10.173.69.39: [ 0h] = authentication_type.reserved2[ 1b]
10.173.69.39: [ 1h] =
authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
10.173.69.39: [ 0h] = authentication_status.anonymous_login[ 1b]
10.173.69.39: [ 1h] = authentication_status.null_username[ 1b]
10.173.69.39: [ 0h] = authentication_status.non_null_username[ 1b]
10.173.69.39: [ 0h] =
authentication_status.user_level_authentication[ 1b]
10.173.69.39: [ 0h] =
authentication_status.per_message_authentication[ 1b]
10.173.69.39: [ 0h] = authentication_status.k_g[ 1b]
10.173.69.39: [ 0h] = authentication_status.reserved[ 2b]
10.173.69.39: [ 1h] = channel_supports_ipmi_v1.5_connections[ 1b]
10.173.69.39: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b]
10.173.69.39: [ 0h] = reserved[ 6b]
10.173.69.39: [ 0h] = oem_id[24b]
10.173.69.39: [ 0h] = oem_auxiliary_data[ 8b]
10.173.69.39: IPMI Trailer:
10.173.69.39: --------------
10.173.69.39: [ ACh] = checksum2[ 8b]
10.173.69.39: username invalid
- [Freeipmi-users] freeipmi to X4150/X4450,
Shuichi Ihara <=
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/23
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/24
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Shuichi Ihara, 2008/05/26
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Al Chu, 2008/05/26
- Re: [Freeipmi-users] freeipmi to X4150/X4450, Shuichi Ihara, 2008/05/27