freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] ipmiconsole BMC Implementation with x38ml


From: Al Chu
Subject: Re: [Freeipmi-users] ipmiconsole BMC Implementation with x38ml
Date: Wed, 24 Sep 2008 03:33:05 -0400

Hey Kimitoshi,

Could you try 0.6.9.beta0 w/o the solport workaround too?

Thanks,
Al

On Wed, 2008-09-24 at 14:03 +0900, Kimitoshi Takahashi wrote:
> Hi Al,
> 
> Thaks for the reply.
> Here are the results:
> 
> (A) 0.6.7 with authcap,solpayloadsize,solport
> 
> address@hidden:~# ipmiconsole -W authcap,solpayloadsize,solport -u rt -p rt 
> -h 192.168.20.116 --debug 2>/tmp/debug
> 
> (Never returns to the shell)
> 
> sh-3.1$ tail -f /tmp/debug |egrep -v "^192.168.20.116"
> (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
> hostname=192.168.20.116; protocol_state=0x8: completion cod
> e check failed; p = 15; comp_code = 80
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2910): hostname=192.168.20.116; protocol_state=0x
> 8: activate payload race
> (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
> hostname=192.168.20.116; protocol_state=0x8: completion cod
> e check failed; p = 15; comp_code = 80
> 
> (B) 0.6.9.beta0 with authcap,solpayloadsize,solport
> 
> address@hidden:~# ldd  /usr/ccmp/sbin/ipmiconsole |grep ipmi
>         libipmiconsole.so.2 => /usr/ccmp//lib/libipmiconsole.so.2 (0xb7f40000)
>         libfreeipmi.so.6 => /usr/ccmp//lib/libfreeipmi.so.6 (0xb7dab000)
> address@hidden:~# /usr/ccmp/sbin/ipmiconsole -V
> ipmiconsole 0.6.9.beta0
> 
> address@hidden:~# /usr/ccmp/sbin/ipmiconsole -W 
> authcap,solpayloadsize,solport -u rt -p rt -h 192.168.20.116 --debug 
> 2>/tmp/debug
> 
> (Never returns to the shell)
> 
> sh-3.1$ tail -f /tmp/debug |egrep -v "^192.168.20.116"
> tail: /tmp/debug: file truncated
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2957): hostname=192.168.20.116; protocol_state=0x8: trying new port: 6F02
> (ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
> hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
> failed; p = 9; session_sequence_number = 0; highest_received_sequence_number 
> = 0
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2957): hostname=192.168.20.116; protocol_state=0x8: trying new port: 6F02
> 
> I also atached snips of --debug for these.
> 
> > 
> > A) Could you also throw in the "solport" workaround.  The motherboard is
> > asking ipmiconsole to try connecting to another port.  On atleast one
> > other motherboard, we found out that the new port was a lie.  So the
> > "solport" workaround will tell ipmiconsole to ignore that new port and
> > connect to the default one.
> > 
> > B) No motherboard I've ever seen has used the "connect to another port"
> > option in IPMI.  So this path in the ipmiconsole code has never been
> > tested, and there may be bugs.  In fact, I think I may have found a bug.
> > Could you also give this tar.gz a try?
> > 
> > http:// ftp.zresearch.com/pub/freeipmi/qa-
> > release/freeipmi-0.6.9.beta0.tar.gz
> > 
> > If both the old and new tar.gz fail, could you send me the --debug of
> > both?
> 
> plain text document attachment (debug_067)
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI Session Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [               0h] = authentication_type[ 8b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               9h] = ipmi_msg_len[ 8b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              25h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              38h] = cmd[ 8b]
> 192.168.20.116: [               Eh] = channel_number[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 3b]
> 192.168.20.116: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
> 192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: --------------
> 192.168.20.116: [              21h] = checksum2[ 8b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI Session Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [               0h] = authentication_type[ 8b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [              10h] = ipmi_msg_len[ 8b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              25h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              38h] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               1h] = channel_number[ 8b]
> 192.168.20.116: [               1h] = authentication_type.none[ 1b]
> 192.168.20.116: [               0h] = authentication_type.md2[ 1b]
> 192.168.20.116: [               1h] = authentication_type.md5[ 1b]
> 192.168.20.116: [               0h] = authentication_type.reserved1[ 1b]
> 192.168.20.116: [               1h] = 
> authentication_type.straight_password_key[ 1b]
> 192.168.20.116: [               0h] = authentication_type.oem_prop[ 1b]
> 192.168.20.116: [               0h] = authentication_type.reserved2[ 1b]
> 192.168.20.116: [               1h] = 
> authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
> 192.168.20.116: [               1h] = authentication_status.anonymous_login[ 
> 1b]
> 192.168.20.116: [               0h] = authentication_status.null_username[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.non_null_username[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.user_level_authentication[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.per_message_authentication[ 1b]
> 192.168.20.116: [               0h] = authentication_status.k_g[ 1b]
> 192.168.20.116: [               0h] = authentication_status.reserved[ 2b]
> 192.168.20.116: [               1h] = channel_supports_ipmi_v1.5_connections[ 
> 1b]
> 192.168.20.116: [               1h] = channel_supports_ipmi_v2.0_connections[ 
> 1b]
> 192.168.20.116: [               0h] = reserved[ 6b]
> 192.168.20.116: [               0h] = oem_id[24b]
> 192.168.20.116: [               0h] = oem_auxiliary_data[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: --------------
> 192.168.20.116: [              7Ah] = checksum2[ 8b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Open Session Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              10h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[32B]
> 192.168.20.116: [ 73h 00h 00h 00h CAh 4Eh D9h 6Bh ]
> 192.168.20.116: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              73h] = message_tag[ 8b]
> 192.168.20.116: [               0h] = requested_maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = reserved2[16b]
> 192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
> 192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               8h] = authentication_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> authentication_payload.authentication_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved4[ 2b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved6[16b]
> 192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
> 192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 
> 6b]
> 192.168.20.116: [               0h] = reserved7[ 2b]
> 192.168.20.116: [               0h] = reserved8[24b]
> 192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 
> 8b]
> 192.168.20.116: [               0h] = reserved9[16b]
> 192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> confidentiality_payload.confidentiality_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved10[ 2b]
> 192.168.20.116: [               0h] = reserved11[24b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Open Session Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              11h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              24h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[36B]
> 192.168.20.116: [ 73h 00h 04h 00h CAh 4Eh D9h 6Bh ]
> 192.168.20.116: [ B0h D7h ABh 77h 00h 00h 00h 08h ]
> 192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 08h ]
> 192.168.20.116: [ 01h 00h 00h 08h 02h 00h 00h 08h ]
> 192.168.20.116: [ 01h FFh 02h 07h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              73h] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 8b]
> 192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
> 192.168.20.116: [        77ABD7B0h] = managed_system_session_id[32b]
> 192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               8h] = authentication_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> authentication_payload.authentication_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved4[ 2b]
> 192.168.20.116: [           80000h] = reserved5[24b]
> 192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved6[16b]
> 192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
> 192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 
> 6b]
> 192.168.20.116: [               0h] = reserved7[ 2b]
> 192.168.20.116: [           80000h] = reserved8[24b]
> 192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 
> 8b]
> 192.168.20.116: [               0h] = reserved9[16b]
> 192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> confidentiality_payload.confidentiality_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved10[ 2b]
> 192.168.20.116: [           702FFh] = reserved11[24b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 1 Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              12h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              1Eh] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[30B]
> 192.168.20.116: [ 74h 00h 00h 00h B0h D7h ABh 77h ]
> 192.168.20.116: [ BFh B1h 82h BCh EDh A0h 91h 97h ]
> 192.168.20.116: [ 4Ch F1h F0h ADh 9Fh E0h 42h 49h ]
> 192.168.20.116: [ 14h 00h 00h 02h 72h 74h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              74h] = message_tag[ 8b]
> 192.168.20.116: [               0h] = reserved1[24b]
> 192.168.20.116: [        77ABD7B0h] = managed_system_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
> 192.168.20.116: [ BFh B1h 82h BCh EDh A0h 91h 97h ]
> 192.168.20.116: [ 4Ch F1h F0h ADh 9Fh E0h 42h 49h ]
> 192.168.20.116: [               4h] = requested_maximum_privilege_level[ 4b]
> 192.168.20.116: [               1h] = name_only_lookup[ 1b]
> 192.168.20.116: [               0h] = reserved2[ 3b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               2h] = user_name_length[ 8b]
> 192.168.20.116: [            7472h] = user_name[16b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 2 Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              13h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              3Ch] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[60B]
> 192.168.20.116: [ 74h 00h 00h 00h CAh 4Eh D9h 6Bh ]
> 192.168.20.116: [ 75h D3h 0Dh A1h 3Ah 97h 72h C7h ]
> 192.168.20.116: [ A0h 5Ch A8h A3h A1h 31h 72h 2Bh ]
> 192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
> 192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
> 192.168.20.116: [ B1h F4h 84h 20h 37h 55h 18h 9Dh ]
> 192.168.20.116: [ 77h 60h 7Fh D3h 79h 7Ch AEh B5h ]
> 192.168.20.116: [ 7Bh F7h 35h 38h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              74h] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
> 192.168.20.116: [ 75h D3h 0Dh A1h 3Ah 97h 72h C7h ]
> 192.168.20.116: [ A0h 5Ch A8h A3h A1h 31h 72h 2Bh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = managed_system_guid[16B]
> 192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
> 192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> 192.168.20.116: [ B1h F4h 84h 20h 37h 55h 18h 9Dh ]
> 192.168.20.116: [ 77h 60h 7Fh D3h 79h 7Ch AEh B5h ]
> 192.168.20.116: [ 7Bh F7h 35h 38h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 3 Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              14h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              1Ch] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[28B]
> 192.168.20.116: [ 75h 00h 00h 00h B0h D7h ABh 77h ]
> 192.168.20.116: [ FAh BEh 3Fh FDh 30h 5Ah AEh 96h ]
> 192.168.20.116: [ 00h DBh 12h CCh 4Fh 17h 2Eh ADh ]
> 192.168.20.116: [ CFh C3h 02h FBh ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              75h] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        77ABD7B0h] = managed_system_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> 192.168.20.116: [ FAh BEh 3Fh FDh 30h 5Ah AEh 96h ]
> 192.168.20.116: [ 00h DBh 12h CCh 4Fh 17h 2Eh ADh ]
> 192.168.20.116: [ CFh C3h 02h FBh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 4 Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              15h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              14h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
> 192.168.20.116: [ 75h 00h 00h 00h CAh 4Eh D9h 6Bh ]
> 192.168.20.116: [ 54h 7Eh F6h 29h 24h 69h 98h 3Bh ]
> 192.168.20.116: [ 8Ah 0Fh 84h 19h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              75h] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        6BD94ECAh] = remote_console_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = integrity_check_value[12B]
> 192.168.20.116: [ 54h 7Eh F6h 29h 24h 69h 98h 3Bh ]
> 192.168.20.116: [ 8Ah 0Fh 84h 19h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               1h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 5Ah 03h BCh 99h 91h 60h 7Ah FAh ]
> 192.168.20.116: [ BEh 05h 2Ah 35h 56h 00h 4Eh 7Ch ]
> 192.168.20.116: [AC043B9481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              25h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              ACh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ C7h 36h 4Dh 22h 36h 3Fh 2Eh 43h ]
> 192.168.20.116: [ 28h DAh DDh 4Eh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ B1h 4Bh 35h D2h 47h 6Ch FCh 70h ]
> 192.168.20.116: [ DBh AAh F7h 04h 8Ah 9Ah B5h FFh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 94h 3Bh 00h 04h ]
> 192.168.20.116: [ 0Dh ]
> 192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              25h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [               Dh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ C0h DBh 07h 9Bh 9Fh C8h 4Bh 03h ]
> 192.168.20.116: [ 59h B2h 1Eh 5Dh ]
> (ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
> hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
> failed; p = 9; session_sequence_number = 0; highest_received_sequence_number 
> = 0
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               2h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 54h DEh C8h F2h C8h B6h 31h 85h ]
> 192.168.20.116: [ 0Ah 87h 0Ah 85h 2Ah 89h 2Ch 2Ch ]
> 192.168.20.116: [AC043B9481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              25h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              ACh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 57h 4Eh 7Ah C2h E8h 73h E5h 36h ]
> 192.168.20.116: [ FBh DBh B9h CBh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               1h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 6Dh C2h A0h A7h 59h 12h 6Fh F9h ]
> 192.168.20.116: [ 6Eh 17h 9Dh 10h 48h 0Fh 3Bh FAh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 94h 3Bh 00h 04h ]
> 192.168.20.116: [ 0Dh ]
> 192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              25h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [               Dh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ CCh 33h 73h 0Dh 9Eh 4Fh 9Ah 26h ]
> 192.168.20.116: [ 56h EBh 9Bh 36h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Channel Payload Support Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               3h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 01h 49h 73h C7h 65h 7Ah BFh 02h ]
> 192.168.20.116: [ 49h 51h 37h B9h B3h 94h 74h 67h ]
> 192.168.20.116: [8B0E4E9881C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              26h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Eh] = cmd[ 8b]
> 192.168.20.116: [               Eh] = channel_number[ 4b]
> 192.168.20.116: [               0h] = reserved[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              8Bh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ E9h DDh 29h 31h 4Eh E8h 4Dh 84h ]
> 192.168.20.116: [ D2h C0h F8h F4h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Channel Payload Support Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               2h] = session_sequence_number[32b]
> 192.168.20.116: [              30h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 5Ah 70h CCh A1h DCh C9h 12h B8h ]
> 192.168.20.116: [ 73h 09h BCh FDh A3h 71h FDh 10h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[16B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 98h 4Eh 00h 03h ]
> 192.168.20.116: [ 00h 00h 00h 00h 00h 00h 00h F7h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
> 192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
> 192.168.20.116: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              26h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Eh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               1h] = standard_payload_type_0_supported[ 1b]
> 192.168.20.116: [               1h] = standard_payload_type_1_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_2_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_3_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_4_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_5_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_6_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_7_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_8_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_9_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_10_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_11_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_12_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_13_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_14_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_15_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_0_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_1_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_2_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_3_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_4_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_5_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_6_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_7_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_8_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_9_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_10_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_11_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_12_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_13_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_14_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_15_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_20h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_21h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_22h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_23h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_24h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_25h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_26h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_27h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_28h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_29h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Ah_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Bh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Ch_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Dh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Eh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Fh_supported[ 1b]
> 192.168.20.116: [               0h] = reserved[16b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              F7h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 74h D8h 09h 7Eh 73h 1Eh CCh FBh ]
> 192.168.20.116: [ B3h B6h ABh FDh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               4h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 52h BAh 9Fh B5h 1Dh 15h BEh FAh ]
> 192.168.20.116: [ D7h 88h 20h 6Ch D5h 40h ABh 6Ah ]
> 192.168.20.116: [98014A9C81C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              27h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              98h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 31h 14h E8h 63h 93h 01h F1h 57h ]
> 192.168.20.116: [ 30h 63h 20h 75h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               3h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 34h 9Dh B8h 8Dh B0h 27h 87h 1Eh ]
> 192.168.20.116: [ 3Eh 24h 2Eh 86h 33h 6Ah 80h 8Dh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 9Ch 4Ah 00h 10h ]
> 192.168.20.116: [ 01h 00h E9h ]
> 192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              27h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               0h] = instance_capacity[ 4b]
> 192.168.20.116: [               1h] = reserved[ 4b]
> 192.168.20.116: [               1h] = instance_1[ 1b]
> 192.168.20.116: [               0h] = instance_2[ 1b]
> 192.168.20.116: [               0h] = instance_3[ 1b]
> 192.168.20.116: [               0h] = instance_4[ 1b]
> 192.168.20.116: [               0h] = instance_5[ 1b]
> 192.168.20.116: [               0h] = instance_6[ 1b]
> 192.168.20.116: [               0h] = instance_7[ 1b]
> 192.168.20.116: [               0h] = instance_8[ 1b]
> 192.168.20.116: [               0h] = instance_9[ 1b]
> 192.168.20.116: [               0h] = instance_10[ 1b]
> 192.168.20.116: [               0h] = instance_11[ 1b]
> 192.168.20.116: [               0h] = instance_12[ 1b]
> 192.168.20.116: [               0h] = instance_13[ 1b]
> 192.168.20.116: [               0h] = instance_14[ 1b]
> 192.168.20.116: [               0h] = instance_15[ 1b]
> 192.168.20.116: [               0h] = instance_16[ 1b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              E9h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ FEh DBh ADh 71h E5h 4Ah 9Fh A7h ]
> 192.168.20.116: [ A2h 57h 73h 2Ah ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               5h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 00h 94h CFh 9Fh 08h E9h 0Fh A8h ]
> 192.168.20.116: [ CCh CDh B2h 4Ch 8Dh 02h 87h 5Bh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
> 192.168.20.116: [ 20h 18h C8h 81h A0h 48h 01h 01h ]
> 192.168.20.116: [ C2h 00h 00h 00h D3h ]
> 192.168.20.116: [           20201h] = confidentiality_trailer[24b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              28h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = reserved1[ 2b]
> 192.168.20.116: [               1h] = payload_instance[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: [               0h] = reserved3[ 1b]
> 192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
> 192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
> 192.168.20.116: [               0h] = test_mode[ 1b]
> 192.168.20.116: [               0h] = reserved4[ 1b]
> 192.168.20.116: [               1h] = authentication_activation[ 1b]
> 192.168.20.116: [               1h] = encryption_activation[ 1b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              D3h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 4Ch F4h 2Ch 55h F3h 21h 7Bh 19h ]
> 192.168.20.116: [ D1h D1h E2h 62h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               4h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ DAh 4Dh 2Fh B7h 16h 41h 6Fh 89h ]
> 192.168.20.116: [ 4Ah 2Bh 87h EDh 9Dh 84h FDh D1h ]
> 192.168.20.116: [788048A020631C81h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              28h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [              80h] = comp_code[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              78h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 35h F8h 04h C2h 08h 1Eh 58h F5h ]
> 192.168.20.116: [ 12h 3Bh 44h 3Bh ]
> (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
> hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p 
> = 15; comp_code = 80
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               6h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 91h 40h 7Dh 10h CBh 28h 74h E4h ]
> 192.168.20.116: [ 7Ch 53h 9Bh 02h 4Fh 1Dh 8Ah 36h ]
> 192.168.20.116: [90014AA481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              29h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              90h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 9Bh AAh 62h 63h D4h D7h CCh 4Fh ]
> 192.168.20.116: [ FCh 7Ah B6h F8h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               5h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 21h B5h 5Eh D1h DCh E5h F0h 1Ah ]
> 192.168.20.116: [ 09h 1Eh A1h 3Ch 88h 21h CAh 63h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
> 192.168.20.116: [ 81h 1Ch 63h 20h A4h 4Ah 00h 10h ]
> 192.168.20.116: [ 01h 00h E1h ]
> 192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              29h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               0h] = instance_capacity[ 4b]
> 192.168.20.116: [               1h] = reserved[ 4b]
> 192.168.20.116: [               1h] = instance_1[ 1b]
> 192.168.20.116: [               0h] = instance_2[ 1b]
> 192.168.20.116: [               0h] = instance_3[ 1b]
> 192.168.20.116: [               0h] = instance_4[ 1b]
> 192.168.20.116: [               0h] = instance_5[ 1b]
> 192.168.20.116: [               0h] = instance_6[ 1b]
> 192.168.20.116: [               0h] = instance_7[ 1b]
> 192.168.20.116: [               0h] = instance_8[ 1b]
> 192.168.20.116: [               0h] = instance_9[ 1b]
> 192.168.20.116: [               0h] = instance_10[ 1b]
> 192.168.20.116: [               0h] = instance_11[ 1b]
> 192.168.20.116: [               0h] = instance_12[ 1b]
> 192.168.20.116: [               0h] = instance_13[ 1b]
> 192.168.20.116: [               0h] = instance_14[ 1b]
> 192.168.20.116: [               0h] = instance_15[ 1b]
> 192.168.20.116: [               0h] = instance_16[ 1b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              E1h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ D8h A6h CEh 37h 09h 47h A6h DEh ]
> 192.168.20.116: [ 97h 92h D6h AEh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               7h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ FCh 58h F3h 8Bh AFh 97h A1h EEh ]
> 192.168.20.116: [ CAh 1Dh CAh 7Eh ACh E9h 15h 92h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
> 192.168.20.116: [ 20h 18h C8h 81h A8h 48h 01h 01h ]
> 192.168.20.116: [ C2h 00h 00h 00h CBh ]
> 192.168.20.116: [           20201h] = confidentiality_trailer[24b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              2Ah] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = reserved1[ 2b]
> 192.168.20.116: [               1h] = payload_instance[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: [               0h] = reserved3[ 1b]
> 192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
> 192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
> 192.168.20.116: [               0h] = test_mode[ 1b]
> 192.168.20.116: [               0h] = reserved4[ 1b]
> 192.168.20.116: [               1h] = authentication_activation[ 1b]
> 192.168.20.116: [               1h] = encryption_activation[ 1b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              CBh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ A2h 57h 49h A6h 49h 15h FEh 17h ]
> 192.168.20.116: [ 15h 31h 24h B1h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               6h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 6Eh F9h 1Ah 84h 3Ah 89h 0Eh 84h ]
> 192.168.20.116: [ B4h 95h 71h 51h 19h 6Eh 22h 3Ah ]
> 192.168.20.116: [708048A820631C81h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              2Ah] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [              80h] = comp_code[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              70h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 21h 0Ah 0Dh 1Dh BAh 06h BCh 18h ]
> 192.168.20.116: [ C6h 1Eh 9Eh E2h ]
> (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
> hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p 
> = 15; comp_code = 80
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               8h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 74h D4h FDh E6h 3Dh EFh 31h CFh ]
> 192.168.20.116: [ 60h 4Eh 9Ah 2Fh 3Dh E1h A3h F4h ]
> 192.168.20.116: [88014AAC81C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              2Bh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              88h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 20h 61h 1Fh B2h 28h 38h DFh 6Eh ]
> 192.168.20.116: [ 2Dh 2Fh C9h 46h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               7h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 24h 81h 0Ch 00h 66h FCh 1Bh 70h ]
> 192.168.20.116: [ 1Ah BCh ACh A3h DDh 76h 06h 4Ch ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
> 192.168.20.116: [ 81h 1Ch 63h 20h ACh 4Ah 00h 10h ]
> 192.168.20.116: [ 01h 00h D9h ]
> 192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              2Bh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               0h] = instance_capacity[ 4b]
> 192.168.20.116: [               1h] = reserved[ 4b]
> 192.168.20.116: [               1h] = instance_1[ 1b]
> 192.168.20.116: [               0h] = instance_2[ 1b]
> 192.168.20.116: [               0h] = instance_3[ 1b]
> 192.168.20.116: [               0h] = instance_4[ 1b]
> 192.168.20.116: [               0h] = instance_5[ 1b]
> 192.168.20.116: [               0h] = instance_6[ 1b]
> 192.168.20.116: [               0h] = instance_7[ 1b]
> 192.168.20.116: [               0h] = instance_8[ 1b]
> 192.168.20.116: [               0h] = instance_9[ 1b]
> 192.168.20.116: [               0h] = instance_10[ 1b]
> 192.168.20.116: [               0h] = instance_11[ 1b]
> 192.168.20.116: [               0h] = instance_12[ 1b]
> 192.168.20.116: [               0h] = instance_13[ 1b]
> 192.168.20.116: [               0h] = instance_14[ 1b]
> 192.168.20.116: [               0h] = instance_15[ 1b]
> 192.168.20.116: [               0h] = instance_16[ 1b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              D9h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ D6h DEh 6Ch 7Dh 8Eh 39h 84h C7h ]
> 192.168.20.116: [ 58h D6h 05h F0h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               9h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ A9h A8h 7Ah 6Ah 93h 1Bh 71h D1h ]
> 192.168.20.116: [ EEh 63h ABh 6Ah FDh 0Fh 79h 50h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
> 192.168.20.116: [ 20h 18h C8h 81h B0h 48h 01h 01h ]
> 192.168.20.116: [ C2h 00h 00h 00h C3h ]
> 192.168.20.116: [           20201h] = confidentiality_trailer[24b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              2Ch] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = reserved1[ 2b]
> 192.168.20.116: [               1h] = payload_instance[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: [               0h] = reserved3[ 1b]
> 192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
> 192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
> 192.168.20.116: [               0h] = test_mode[ 1b]
> 192.168.20.116: [               0h] = reserved4[ 1b]
> 192.168.20.116: [               1h] = authentication_activation[ 1b]
> 192.168.20.116: [               1h] = encryption_activation[ 1b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              C3h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ FDh B6h 2Bh 92h 5Ch CEh 96h B9h ]
> 192.168.20.116: [ ADh 69h 05h 5Eh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               8h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 6Fh 20h D0h A9h A9h DEh 2Dh 5Dh ]
> 192.168.20.116: [ 73h 9Eh AFh 8Ch 0Dh D1h C7h 31h ]
> 192.168.20.116: [688048B020631C81h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              2Ch] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [              80h] = comp_code[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              68h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 94h 69h C8h 62h A4h A1h 4Ah 92h ]
> 192.168.20.116: [ 18h BFh 1Bh 78h ]
> (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
> hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p 
> = 15; comp_code = 80
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               Ah] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ F1h 59h A0h AEh 41h 16h 5Bh F6h ]
> 192.168.20.116: [ C1h 83h 6Dh C1h BFh 91h C9h 43h ]
> 192.168.20.116: [80014AB481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              2Dh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              80h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 90h EBh C1h 67h 47h 76h 6Eh EBh ]
> 192.168.20.116: [ F9h 2Dh AAh A0h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               9h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 52h D3h 31h B9h CFh 4Ch 29h E9h ]
> 192.168.20.116: [ 08h D5h 8Ch E6h 4Ch 92h 32h BBh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
> 192.168.20.116: [ 81h 1Ch 63h 20h B4h 4Ah 00h 10h ]
> 192.168.20.116: [ 01h 00h D1h ]
> 192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              2Dh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               0h] = instance_capacity[ 4b]
> 192.168.20.116: [               1h] = reserved[ 4b]
> 192.168.20.116: [               1h] = instance_1[ 1b]
> 192.168.20.116: [               0h] = instance_2[ 1b]
> 192.168.20.116: [               0h] = instance_3[ 1b]
> 192.168.20.116: [               0h] = instance_4[ 1b]
> 192.168.20.116: [               0h] = instance_5[ 1b]
> 192.168.20.116: [               0h] = instance_6[ 1b]
> 192.168.20.116: [               0h] = instance_7[ 1b]
> 192.168.20.116: [               0h] = instance_8[ 1b]
> 192.168.20.116: [               0h] = instance_9[ 1b]
> 192.168.20.116: [               0h] = instance_10[ 1b]
> 192.168.20.116: [               0h] = instance_11[ 1b]
> 192.168.20.116: [               0h] = instance_12[ 1b]
> 192.168.20.116: [               0h] = instance_13[ 1b]
> 192.168.20.116: [               0h] = instance_14[ 1b]
> 192.168.20.116: [               0h] = instance_15[ 1b]
> 192.168.20.116: [               0h] = instance_16[ 1b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              D1h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 58h 93h 97h 90h 94h 7Eh 00h 8Fh ]
> 192.168.20.116: [ DDh B5h 2Fh D8h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               Bh] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 26h 02h D0h 76h 19h A0h ACh BEh ]
> 192.168.20.116: [ C9h C6h D3h B4h 90h 92h 2Fh 1Bh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
> 192.168.20.116: [ 20h 18h C8h 81h B8h 48h 01h 01h ]
> 192.168.20.116: [ C2h 00h 00h 00h BBh ]
> 192.168.20.116: [           20201h] = confidentiality_trailer[24b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              2Eh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = reserved1[ 2b]
> 192.168.20.116: [               1h] = payload_instance[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: [               0h] = reserved3[ 1b]
> 192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
> 192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
> 192.168.20.116: [               0h] = test_mode[ 1b]
> 192.168.20.116: [               0h] = reserved4[ 1b]
> 192.168.20.116: [               1h] = authentication_activation[ 1b]
> 192.168.20.116: [               1h] = encryption_activation[ 1b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              BBh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ F4h 45h 2Bh 13h 11h BBh 48h BFh ]
> 192.168.20.116: [ 2Dh D2h 5Dh B0h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               Ah] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ B2h 02h 65h 5Bh E1h 92h B9h 54h ]
> 192.168.20.116: [ 31h 68h E1h 3Eh 39h A8h 6Fh 8Ch ]
> 192.168.20.116: [608048B820631C81h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              2Eh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [              80h] = comp_code[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              60h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ EDh C4h A6h 0Fh 46h 38h C3h 84h ]
> 192.168.20.116: [ BFh 55h 0Fh 9Ah ]
> (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
> hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p 
> = 15; comp_code = 80
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               Ch] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 89h 70h 70h AEh 0Eh 9Fh 8Ah DCh ]
> 192.168.20.116: [ A3h 78h 86h D1h 8Ah 9Bh 6Ah 40h ]
> 192.168.20.116: [78014ABC81C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              2Fh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              78h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ A8h 95h AFh D3h 35h 70h 90h CEh ]
> 192.168.20.116: [ 8Dh C2h 18h 92h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               Bh] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 7Bh A0h 45h 4Ah EDh 6Eh 33h F5h ]
> 192.168.20.116: [ 43h C0h DBh 8Fh 52h 0Dh 4Bh 05h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
> 192.168.20.116: [ 81h 1Ch 63h 20h BCh 4Ah 00h 10h ]
> 192.168.20.116: [ 01h 00h C9h ]
> 192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              2Fh] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               0h] = instance_capacity[ 4b]
> 192.168.20.116: [               1h] = reserved[ 4b]
> 192.168.20.116: [               1h] = instance_1[ 1b]
> 192.168.20.116: [               0h] = instance_2[ 1b]
> 192.168.20.116: [               0h] = instance_3[ 1b]
> 192.168.20.116: [               0h] = instance_4[ 1b]
> 192.168.20.116: [               0h] = instance_5[ 1b]
> 192.168.20.116: [               0h] = instance_6[ 1b]
> 192.168.20.116: [               0h] = instance_7[ 1b]
> 192.168.20.116: [               0h] = instance_8[ 1b]
> 192.168.20.116: [               0h] = instance_9[ 1b]
> 192.168.20.116: [               0h] = instance_10[ 1b]
> 192.168.20.116: [               0h] = instance_11[ 1b]
> 192.168.20.116: [               0h] = instance_12[ 1b]
> 192.168.20.116: [               0h] = instance_13[ 1b]
> 192.168.20.116: [               0h] = instance_14[ 1b]
> 192.168.20.116: [               0h] = instance_15[ 1b]
> 192.168.20.116: [               0h] = instance_16[ 1b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              C9h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 51h 2Eh 17h CFh F9h 1Eh 28h 90h ]
> 192.168.20.116: [ 53h C5h 52h 3Eh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               Dh] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ BBh 4Eh 3Bh 46h 1Dh C2h 51h CEh ]
> 192.168.20.116: [ 9Dh 88h 40h B3h DAh 2Fh 07h 6Dh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
> 192.168.20.116: [ 20h 18h C8h 81h C0h 48h 01h 01h ]
> 192.168.20.116: [ C2h 00h 00h 00h B3h ]
> 192.168.20.116: [           20201h] = confidentiality_trailer[24b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              30h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = reserved1[ 2b]
> 192.168.20.116: [               1h] = payload_instance[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: [               0h] = reserved3[ 1b]
> 192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
> 192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
> 192.168.20.116: [               0h] = test_mode[ 1b]
> 192.168.20.116: [               0h] = reserved4[ 1b]
> 192.168.20.116: [               1h] = authentication_activation[ 1b]
> 192.168.20.116: [               1h] = encryption_activation[ 1b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              B3h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 21h 89h E0h 86h 43h 0Ch 8Ch DFh ]
> 192.168.20.116: [ 8Bh 98h 36h 1Dh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        6BD94ECAh] = session_id[32b]
> 192.168.20.116: [               Ch] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 10h B0h 60h F1h 42h 19h 45h 73h ]
> 192.168.20.116: [ 81h 26h B1h BBh CEh 20h 47h 49h ]
> 192.168.20.116: [588048C020631C81h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              30h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [              80h] = comp_code[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              58h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 12h 18h 7Ah F8h 84h E4h 92h A3h ]
> 192.168.20.116: [ 65h 7Eh BCh BAh ]
> (ipmiconsole_checks.c, ipmiconsole_check_completion_code, 455): 
> hostname=192.168.20.116; protocol_state=0x8: completion code check failed; p 
> = 15; comp_code = 80
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2910): hostname=192.168.20.116; protocol_state=0x8: activate payload race
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        77ABD7B0h] = session_id[32b]
> 192.168.20.116: [               Eh] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ C4h 7Ah 89h 3Bh 8Ch 08h E1h 4Fh ]
> 192.168.20.116: [ 90h 8Dh 02h E5h 5Bh 1Ah 1Eh D5h ]
> 192.168.20.116: [70014AC481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              31h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              70h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 31h 63h 02h CBh 65h D4h 8Bh 40h ]
> 192.168.20.116: [ A9h 25h 96h E0h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> plain text document attachment (debug_069b0)
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI Session Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [               0h] = authentication_type[ 8b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               9h] = ipmi_msg_len[ 8b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               4h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              38h] = cmd[ 8b]
> 192.168.20.116: [               Eh] = channel_number[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 3b]
> 192.168.20.116: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
> 192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: --------------
> 192.168.20.116: [              A5h] = checksum2[ 8b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI Session Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [               0h] = authentication_type[ 8b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [              10h] = ipmi_msg_len[ 8b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               4h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              38h] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               1h] = channel_number[ 8b]
> 192.168.20.116: [               1h] = authentication_type.none[ 1b]
> 192.168.20.116: [               0h] = authentication_type.md2[ 1b]
> 192.168.20.116: [               1h] = authentication_type.md5[ 1b]
> 192.168.20.116: [               0h] = authentication_type.reserved1[ 1b]
> 192.168.20.116: [               1h] = 
> authentication_type.straight_password_key[ 1b]
> 192.168.20.116: [               0h] = authentication_type.oem_prop[ 1b]
> 192.168.20.116: [               0h] = authentication_type.reserved2[ 1b]
> 192.168.20.116: [               1h] = 
> authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
> 192.168.20.116: [               1h] = authentication_status.anonymous_login[ 
> 1b]
> 192.168.20.116: [               0h] = authentication_status.null_username[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.non_null_username[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.user_level_authentication[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.per_message_authentication[ 1b]
> 192.168.20.116: [               0h] = authentication_status.k_g[ 1b]
> 192.168.20.116: [               0h] = authentication_status.reserved[ 2b]
> 192.168.20.116: [               1h] = channel_supports_ipmi_v1.5_connections[ 
> 1b]
> 192.168.20.116: [               1h] = channel_supports_ipmi_v2.0_connections[ 
> 1b]
> 192.168.20.116: [               0h] = reserved[ 6b]
> 192.168.20.116: [               0h] = oem_id[24b]
> 192.168.20.116: [               0h] = oem_auxiliary_data[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: --------------
> 192.168.20.116: [              FEh] = checksum2[ 8b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Open Session Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              10h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[32B]
> 192.168.20.116: [ FAh 00h 00h 00h 84h 55h 5Dh 8Eh ]
> 192.168.20.116: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FAh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = requested_maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = reserved2[16b]
> 192.168.20.116: [        8E5D5584h] = remote_console_session_id[32b]
> 192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               8h] = authentication_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> authentication_payload.authentication_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved4[ 2b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved6[16b]
> 192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
> 192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 
> 6b]
> 192.168.20.116: [               0h] = reserved7[ 2b]
> 192.168.20.116: [               0h] = reserved8[24b]
> 192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 
> 8b]
> 192.168.20.116: [               0h] = reserved9[16b]
> 192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> confidentiality_payload.confidentiality_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved10[ 2b]
> 192.168.20.116: [               0h] = reserved11[24b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Open Session Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              11h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              24h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[36B]
> 192.168.20.116: [ FAh 00h 04h 00h 84h 55h 5Dh 8Eh ]
> 192.168.20.116: [ C6h 43h C7h EBh 00h 00h 00h 08h ]
> 192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 08h ]
> 192.168.20.116: [ 01h 00h 00h 08h 02h 00h 00h 08h ]
> 192.168.20.116: [ 01h FFh 02h 07h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FAh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 8b]
> 192.168.20.116: [        8E5D5584h] = remote_console_session_id[32b]
> 192.168.20.116: [        EBC743C6h] = managed_system_session_id[32b]
> 192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               8h] = authentication_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> authentication_payload.authentication_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved4[ 2b]
> 192.168.20.116: [           80000h] = reserved5[24b]
> 192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved6[16b]
> 192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
> 192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 
> 6b]
> 192.168.20.116: [               0h] = reserved7[ 2b]
> 192.168.20.116: [           80000h] = reserved8[24b]
> 192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 
> 8b]
> 192.168.20.116: [               0h] = reserved9[16b]
> 192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> confidentiality_payload.confidentiality_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved10[ 2b]
> 192.168.20.116: [           702FFh] = reserved11[24b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 1 Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              12h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              1Eh] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[30B]
> 192.168.20.116: [ FBh 00h 00h 00h C6h 43h C7h EBh ]
> 192.168.20.116: [ 58h 12h 20h DAh 03h EBh 17h 1Bh ]
> 192.168.20.116: [ 56h 5Bh A6h 9Ch 09h BAh 14h C3h ]
> 192.168.20.116: [ 14h 00h 00h 02h 72h 74h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FBh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = reserved1[24b]
> 192.168.20.116: [        EBC743C6h] = managed_system_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
> 192.168.20.116: [ 58h 12h 20h DAh 03h EBh 17h 1Bh ]
> 192.168.20.116: [ 56h 5Bh A6h 9Ch 09h BAh 14h C3h ]
> 192.168.20.116: [               4h] = requested_maximum_privilege_level[ 4b]
> 192.168.20.116: [               1h] = name_only_lookup[ 1b]
> 192.168.20.116: [               0h] = reserved2[ 3b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               2h] = user_name_length[ 8b]
> 192.168.20.116: [            7472h] = user_name[16b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 2 Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              13h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              3Ch] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[60B]
> 192.168.20.116: [ FBh 00h 00h 00h 84h 55h 5Dh 8Eh ]
> 192.168.20.116: [ 76h 1Ah 4Bh 0Dh BBh 24h 3Fh F7h ]
> 192.168.20.116: [ 1Ah C3h 2Ch 85h FBh 8Eh 22h 29h ]
> 192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
> 192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
> 192.168.20.116: [ 06h 1Dh B0h BDh CFh 70h 76h 3Ah ]
> 192.168.20.116: [ E2h 84h 88h 7Eh 1Eh 3Ah F8h E1h ]
> 192.168.20.116: [ 38h E1h A3h C5h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FBh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        8E5D5584h] = remote_console_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
> 192.168.20.116: [ 76h 1Ah 4Bh 0Dh BBh 24h 3Fh F7h ]
> 192.168.20.116: [ 1Ah C3h 2Ch 85h FBh 8Eh 22h 29h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = managed_system_guid[16B]
> 192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
> 192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> 192.168.20.116: [ 06h 1Dh B0h BDh CFh 70h 76h 3Ah ]
> 192.168.20.116: [ E2h 84h 88h 7Eh 1Eh 3Ah F8h E1h ]
> 192.168.20.116: [ 38h E1h A3h C5h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 3 Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              14h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              1Ch] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[28B]
> 192.168.20.116: [ FCh 00h 00h 00h C6h 43h C7h EBh ]
> 192.168.20.116: [ BAh 15h 05h BEh E5h 5Bh 1Bh D0h ]
> 192.168.20.116: [ B9h C8h 9Bh 16h E9h AAh 79h 13h ]
> 192.168.20.116: [ 24h 18h 99h 92h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FCh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        EBC743C6h] = managed_system_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> 192.168.20.116: [ BAh 15h 05h BEh E5h 5Bh 1Bh D0h ]
> 192.168.20.116: [ B9h C8h 9Bh 16h E9h AAh 79h 13h ]
> 192.168.20.116: [ 24h 18h 99h 92h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 4 Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              15h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              14h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
> 192.168.20.116: [ FCh 00h 00h 00h 84h 55h 5Dh 8Eh ]
> 192.168.20.116: [ 5Fh AAh ADh 6Fh 16h 81h 80h 1Ah ]
> 192.168.20.116: [ 3Bh AFh 45h 34h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FCh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        8E5D5584h] = remote_console_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = integrity_check_value[12B]
> 192.168.20.116: [ 5Fh AAh ADh 6Fh 16h 81h 80h 1Ah ]
> 192.168.20.116: [ 3Bh AFh 45h 34h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        EBC743C6h] = session_id[32b]
> 192.168.20.116: [               1h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 48h 11h 29h 62h 8Fh C8h 86h 53h ]
> 192.168.20.116: [ 04h 95h A5h DAh BFh 1Ch 9Ah 5Eh ]
> 192.168.20.116: [30043B1081C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               4h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              30h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ C9h F9h D2h 8Bh 6Dh 66h 20h F0h ]
> 192.168.20.116: [ D7h 90h F4h A6h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        8E5D5584h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 6Eh E3h B4h 9Ah EBh 8Fh ADh 88h ]
> 192.168.20.116: [ A4h E9h CBh 4Fh 82h D0h 16h F8h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 10h 3Bh 00h 04h ]
> 192.168.20.116: [ 91h ]
> 192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               4h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              91h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 16h 76h A8h E3h 85h DAh BEh CEh ]
> 192.168.20.116: [ 30h C8h B9h F4h ]
> (ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
> hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
> failed; p = 9; session_sequence_number = 0; highest_received_sequence_number 
> = 0
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        EBC743C6h] = session_id[32b]
> 192.168.20.116: [               2h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 51h 40h 22h B5h 90h FFh 3Ah F6h ]
> 192.168.20.116: [ 86h 3Eh A7h 20h 26h A8h 8Fh B6h ]
> 192.168.20.116: [30043B1081C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               4h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              30h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 74h 5Fh 6Bh DCh 08h 71h 4Eh E5h ]
> 192.168.20.116: [ F5h BAh 24h 19h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        8E5D5584h] = session_id[32b]
> 192.168.20.116: [               1h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ EBh 61h 06h A6h 85h 45h 9Dh 9Fh ]
> 192.168.20.116: [ 08h C9h 24h 03h 58h 46h 2Ch C6h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 10h 3Bh 00h 04h ]
> 192.168.20.116: [ 91h ]
> 192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               4h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              91h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 96h EBh 33h 7Ah 88h 41h 64h 06h ]
> 192.168.20.116: [ 5Eh A8h 63h 5Eh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Channel Payload Support Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        EBC743C6h] = session_id[32b]
> 192.168.20.116: [               3h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ D9h D1h B7h FCh 3Dh 07h ECh D2h ]
> 192.168.20.116: [ 1Ah 4Ch D2h 92h 87h 33h 91h 51h ]
> 192.168.20.116: [ F0E4E1481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               5h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Eh] = cmd[ 8b]
> 192.168.20.116: [               Eh] = channel_number[ 4b]
> 192.168.20.116: [               0h] = reserved[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [               Fh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ ACh CEh 0Dh 86h 09h 91h B7h DBh ]
> 192.168.20.116: [ 24h 21h 24h E2h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Channel Payload Support Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        8E5D5584h] = session_id[32b]
> 192.168.20.116: [               2h] = session_sequence_number[32b]
> 192.168.20.116: [              30h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 29h E0h 60h 14h 70h 0Eh 9Dh 14h ]
> 192.168.20.116: [ F7h 68h 63h 79h 39h 79h 71h 24h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[16B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 14h 4Eh 00h 03h ]
> 192.168.20.116: [ 00h 00h 00h 00h 00h 00h 00h 7Bh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
> 192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
> 192.168.20.116: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               5h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Eh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               1h] = standard_payload_type_0_supported[ 1b]
> 192.168.20.116: [               1h] = standard_payload_type_1_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_2_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_3_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_4_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_5_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_6_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_7_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_8_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_9_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_10_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_11_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_12_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_13_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_14_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_15_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_0_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_1_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_2_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_3_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_4_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_5_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_6_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_7_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_8_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_9_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_10_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_11_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_12_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_13_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_14_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_15_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_20h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_21h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_22h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_23h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_24h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_25h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_26h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_27h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_28h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_29h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Ah_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Bh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Ch_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Dh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Eh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Fh_supported[ 1b]
> 192.168.20.116: [               0h] = reserved[16b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              7Bh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ EDh E4h 53h A0h E8h 2Dh E0h F7h ]
> 192.168.20.116: [ 19h 88h 5Ah 0Fh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        EBC743C6h] = session_id[32b]
> 192.168.20.116: [               4h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ ABh 08h BDh 34h 65h A1h 28h F9h ]
> 192.168.20.116: [ 2Ah AEh 15h F2h 0Ah 91h 24h EEh ]
> 192.168.20.116: [1C014A1881C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               6h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              1Ch] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ AFh A7h E8h 32h 69h D3h 3Ch 90h ]
> 192.168.20.116: [ E0h 35h CBh B2h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        8E5D5584h] = session_id[32b]
> 192.168.20.116: [               3h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ DAh 77h CAh 60h BCh 67h FFh C4h ]
> 192.168.20.116: [ 31h 24h C7h 89h 6Ah F4h 4Fh 94h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 18h 4Ah 00h 10h ]
> 192.168.20.116: [ 00h 00h 6Eh ]
> 192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               0h] = instance_capacity[ 4b]
> 192.168.20.116: [               1h] = reserved[ 4b]
> 192.168.20.116: [               0h] = instance_1[ 1b]
> 192.168.20.116: [               0h] = instance_2[ 1b]
> 192.168.20.116: [               0h] = instance_3[ 1b]
> 192.168.20.116: [               0h] = instance_4[ 1b]
> 192.168.20.116: [               0h] = instance_5[ 1b]
> 192.168.20.116: [               0h] = instance_6[ 1b]
> 192.168.20.116: [               0h] = instance_7[ 1b]
> 192.168.20.116: [               0h] = instance_8[ 1b]
> 192.168.20.116: [               0h] = instance_9[ 1b]
> 192.168.20.116: [               0h] = instance_10[ 1b]
> 192.168.20.116: [               0h] = instance_11[ 1b]
> 192.168.20.116: [               0h] = instance_12[ 1b]
> 192.168.20.116: [               0h] = instance_13[ 1b]
> 192.168.20.116: [               0h] = instance_14[ 1b]
> 192.168.20.116: [               0h] = instance_15[ 1b]
> 192.168.20.116: [               0h] = instance_16[ 1b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              6Eh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ BFh 29h C7h F6h F5h 3Ah 05h 83h ]
> 192.168.20.116: [ F4h 01h 6Fh 61h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        EBC743C6h] = session_id[32b]
> 192.168.20.116: [               5h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 44h 67h D4h 3Eh 8Bh FEh B7h BAh ]
> 192.168.20.116: [ 63h 2Fh E8h 64h 4Dh 81h 7Bh EAh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
> 192.168.20.116: [ 20h 18h C8h 81h 1Ch 48h 01h 01h ]
> 192.168.20.116: [ C2h 00h 00h 00h 57h ]
> 192.168.20.116: [           20201h] = confidentiality_trailer[24b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = reserved1[ 2b]
> 192.168.20.116: [               1h] = payload_instance[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: [               0h] = reserved3[ 1b]
> 192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
> 192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
> 192.168.20.116: [               0h] = test_mode[ 1b]
> 192.168.20.116: [               0h] = reserved4[ 1b]
> 192.168.20.116: [               1h] = authentication_activation[ 1b]
> 192.168.20.116: [               1h] = encryption_activation[ 1b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              57h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ EDh 5Ch D3h 92h 04h B4h A6h DAh ]
> 192.168.20.116: [ 9Fh 14h 7Fh 7Bh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Activate Payload Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        8E5D5584h] = session_id[32b]
> 192.168.20.116: [               4h] = session_sequence_number[32b]
> 192.168.20.116: [              30h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ D4h B0h A8h 44h BEh 45h 58h B5h ]
> 192.168.20.116: [ AEh BCh 2Eh E7h 35h 9Fh 0Bh 10h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 1Ch 48h 00h 00h ]
> 192.168.20.116: [ 00h 00h 00h 00h 04h 00h 04h 02h ]
> 192.168.20.116: [ 6Fh FFh FFh 05h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[12B]
> 192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
> 192.168.20.116: [ 09h 0Ah 0Bh 0Bh ]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               7h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              48h] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               0h] = test_mode[ 1b]
> 192.168.20.116: [               0h] = reserved1[31b]
> 192.168.20.116: [             400h] = inbound_payload_size[16b]
> 192.168.20.116: [             400h] = outbound_payload_size[16b]
> 192.168.20.116: [            6F02h] = payload_udp_port_number[16b]
> 192.168.20.116: [            FFFFh] = payload_vlan_number[16b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [               5h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 2Bh 47h 3Dh 53h 9Fh D6h 69h 32h ]
> 192.168.20.116: [ EDh 71h 99h DDh ]
> (ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
> 2957): hostname=192.168.20.116; protocol_state=0x8: trying new port: 6F02
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Deactivate Payload Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        EBC743C6h] = session_id[32b]
> 192.168.20.116: [               6h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 0Bh C5h 65h D0h FFh 0Dh E9h D2h ]
> 192.168.20.116: [ 77h A3h 34h 99h A7h 1Dh B5h E1h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
> 192.168.20.116: [ 20h 18h C8h 81h 20h 49h 01h 01h ]
> 192.168.20.116: [ 00h 00h 00h 00h 14h ]
> 192.168.20.116: [           20201h] = confidentiality_trailer[24b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               8h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              49h] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = reserved1[ 2b]
> 192.168.20.116: [               1h] = payload_instance[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: [               0h] = payload_auxiliary_data[32b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              14h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 7Ch 07h 05h 35h 6Ah 39h CFh 70h ]
> 192.168.20.116: [ BCh EDh A1h 8Ch ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Deactivate Payload Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        8E5D5584h] = session_id[32b]
> 192.168.20.116: [               5h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 17h D5h 70h D3h 3Ch 6Fh 98h 6Dh ]
> 192.168.20.116: [ 93h 5Fh F6h FEh 53h 46h 92h 28h ]
> 192.168.20.116: [7700492020631C81h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               8h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              49h] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              77h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 0Dh 7Dh BBh 93h C2h 21h B6h 2Ch ]
> 192.168.20.116: [ 62h 22h B0h 23h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Close Session Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        EBC743C6h] = session_id[32b]
> 192.168.20.116: [               7h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 77h 75h 99h 07h D1h 49h D6h AAh ]
> 192.168.20.116: [ 57h 0Dh 9Fh D5h A8h FAh 48h A8h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
> 192.168.20.116: [ 20h 18h C8h 81h 24h 3Ch C6h 43h ]
> 192.168.20.116: [ C7h EBh 64h ]
> 192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               9h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Ch] = cmd[ 8b]
> 192.168.20.116: [               6h] = chassis_control[ 4b]
> 192.168.20.116: [               Ch] = reserved[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              43h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 8Ah 95h 52h 08h 70h 40h 67h 68h ]
> 192.168.20.116: [ B1h 3Ch 58h E1h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Close Session Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        8E5D5584h] = session_id[32b]
> 192.168.20.116: [               6h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ F6h 3Ah 6Ch B4h 80h C5h 69h 2Eh ]
> 192.168.20.116: [ 81h 97h 15h B6h 36h 20h C6h 4Dh ]
> 192.168.20.116: [80003C2420631C81h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               9h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Ch] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              80h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 6Bh 21h ACh 93h 0Bh B5h 3Ah 52h ]
> 192.168.20.116: [ 04h 01h 2Fh 98h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI Session Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [               0h] = authentication_type[ 8b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               9h] = ipmi_msg_len[ 8b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              21h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              38h] = cmd[ 8b]
> 192.168.20.116: [               Eh] = channel_number[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 3b]
> 192.168.20.116: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
> 192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: --------------
> 192.168.20.116: [              31h] = checksum2[ 8b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI Session Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [               0h] = authentication_type[ 8b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [              10h] = ipmi_msg_len[ 8b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              21h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              38h] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               1h] = channel_number[ 8b]
> 192.168.20.116: [               1h] = authentication_type.none[ 1b]
> 192.168.20.116: [               0h] = authentication_type.md2[ 1b]
> 192.168.20.116: [               1h] = authentication_type.md5[ 1b]
> 192.168.20.116: [               0h] = authentication_type.reserved1[ 1b]
> 192.168.20.116: [               1h] = 
> authentication_type.straight_password_key[ 1b]
> 192.168.20.116: [               0h] = authentication_type.oem_prop[ 1b]
> 192.168.20.116: [               0h] = authentication_type.reserved2[ 1b]
> 192.168.20.116: [               1h] = 
> authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
> 192.168.20.116: [               1h] = authentication_status.anonymous_login[ 
> 1b]
> 192.168.20.116: [               0h] = authentication_status.null_username[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.non_null_username[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.user_level_authentication[ 1b]
> 192.168.20.116: [               0h] = 
> authentication_status.per_message_authentication[ 1b]
> 192.168.20.116: [               0h] = authentication_status.k_g[ 1b]
> 192.168.20.116: [               0h] = authentication_status.reserved[ 2b]
> 192.168.20.116: [               1h] = channel_supports_ipmi_v1.5_connections[ 
> 1b]
> 192.168.20.116: [               1h] = channel_supports_ipmi_v2.0_connections[ 
> 1b]
> 192.168.20.116: [               0h] = reserved[ 6b]
> 192.168.20.116: [             400h] = oem_id[24b]
> 192.168.20.116: [               4h] = oem_auxiliary_data[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: --------------
> 192.168.20.116: [              82h] = checksum2[ 8b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Open Session Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              10h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[32B]
> 192.168.20.116: [ FDh 00h 00h 00h C3h D2h F9h D7h ]
> 192.168.20.116: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FDh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = requested_maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = reserved2[16b]
> 192.168.20.116: [        D7F9D2C3h] = remote_console_session_id[32b]
> 192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               8h] = authentication_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> authentication_payload.authentication_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved4[ 2b]
> 192.168.20.116: [               0h] = reserved5[24b]
> 192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved6[16b]
> 192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
> 192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 
> 6b]
> 192.168.20.116: [               0h] = reserved7[ 2b]
> 192.168.20.116: [               0h] = reserved8[24b]
> 192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 
> 8b]
> 192.168.20.116: [               0h] = reserved9[16b]
> 192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> confidentiality_payload.confidentiality_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved10[ 2b]
> 192.168.20.116: [               0h] = reserved11[24b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Open Session Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              11h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              24h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[36B]
> 192.168.20.116: [ FDh 00h 04h 00h C3h D2h F9h D7h ]
> 192.168.20.116: [ 36h 03h FFh D7h 00h 00h 00h 08h ]
> 192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 08h ]
> 192.168.20.116: [ 01h 00h 00h 08h 02h 00h 00h 08h ]
> 192.168.20.116: [ 01h FFh 02h 07h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FDh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = reserved2[ 8b]
> 192.168.20.116: [        D7F9D2C3h] = remote_console_session_id[32b]
> 192.168.20.116: [        D7FF0336h] = managed_system_session_id[32b]
> 192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               8h] = authentication_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> authentication_payload.authentication_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved4[ 2b]
> 192.168.20.116: [           80000h] = reserved5[24b]
> 192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
> 192.168.20.116: [               0h] = reserved6[16b]
> 192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
> 192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 
> 6b]
> 192.168.20.116: [               0h] = reserved7[ 2b]
> 192.168.20.116: [           80000h] = reserved8[24b]
> 192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 
> 8b]
> 192.168.20.116: [               0h] = reserved9[16b]
> 192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
> 8b]
> 192.168.20.116: [               1h] = 
> confidentiality_payload.confidentiality_algorithm[ 6b]
> 192.168.20.116: [               0h] = reserved10[ 2b]
> 192.168.20.116: [           702FFh] = reserved11[24b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 1 Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              12h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              1Eh] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[30B]
> 192.168.20.116: [ FEh 00h 00h 00h 36h 03h FFh D7h ]
> 192.168.20.116: [ F5h 0Dh 61h FEh 7Ah ECh 04h 87h ]
> 192.168.20.116: [ D7h 53h A7h 2Dh 00h 03h C6h 43h ]
> 192.168.20.116: [ 14h 00h 00h 02h 72h 74h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FEh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = reserved1[24b]
> 192.168.20.116: [        D7FF0336h] = managed_system_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
> 192.168.20.116: [ F5h 0Dh 61h FEh 7Ah ECh 04h 87h ]
> 192.168.20.116: [ D7h 53h A7h 2Dh 00h 03h C6h 43h ]
> 192.168.20.116: [               4h] = requested_maximum_privilege_level[ 4b]
> 192.168.20.116: [               1h] = name_only_lookup[ 1b]
> 192.168.20.116: [               0h] = reserved2[ 3b]
> 192.168.20.116: [               0h] = reserved3[16b]
> 192.168.20.116: [               2h] = user_name_length[ 8b]
> 192.168.20.116: [            7472h] = user_name[16b]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 2 Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              13h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              3Ch] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[60B]
> 192.168.20.116: [ FEh 00h 00h 00h C3h D2h F9h D7h ]
> 192.168.20.116: [ 21h 31h A6h B9h 9Fh 39h 18h 95h ]
> 192.168.20.116: [ 37h 6Ch DBh C9h 94h D1h 04h 00h ]
> 192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
> 192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
> 192.168.20.116: [ 4Dh B3h 06h 69h CEh E6h 8Eh 10h ]
> 192.168.20.116: [ D3h 88h 15h 31h BCh DAh F4h 94h ]
> 192.168.20.116: [ 4Dh 3Eh 1Bh BCh ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FEh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        D7F9D2C3h] = remote_console_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
> 192.168.20.116: [ 21h 31h A6h B9h 9Fh 39h 18h 95h ]
> 192.168.20.116: [ 37h 6Ch DBh C9h 94h D1h 04h 00h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = managed_system_guid[16B]
> 192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
> 192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> 192.168.20.116: [ 4Dh B3h 06h 69h CEh E6h 8Eh 10h ]
> 192.168.20.116: [ D3h 88h 15h 31h BCh DAh F4h 94h ]
> 192.168.20.116: [ 4Dh 3Eh 1Bh BCh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 3 Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              14h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              1Ch] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[28B]
> 192.168.20.116: [ FFh 00h 00h 00h 36h 03h FFh D7h ]
> 192.168.20.116: [ E5h CCh 2Dh 99h F3h B7h A8h 31h ]
> 192.168.20.116: [ BAh 4Fh FFh 38h EEh 95h 1Ch BAh ]
> 192.168.20.116: [ CCh E6h 0Ah B7h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FFh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        D7FF0336h] = managed_system_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
> 192.168.20.116: [ E5h CCh 2Dh 99h F3h B7h A8h 31h ]
> 192.168.20.116: [ BAh 4Fh FFh 38h EEh 95h 1Ch BAh ]
> 192.168.20.116: [ CCh E6h 0Ah B7h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 RAKP Message 4 Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [              15h] = payload_type[ 6b]
> 192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [               0h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              14h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
> 192.168.20.116: [ FFh 00h 00h 00h C3h D2h F9h D7h ]
> 192.168.20.116: [ E9h 5Fh A4h F1h 10h C4h 7Bh EBh ]
> 192.168.20.116: [ 50h ABh 7Ah 55h ]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              FFh] = message_tag[ 8b]
> 192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
> 192.168.20.116: [               0h] = reserved1[16b]
> 192.168.20.116: [        D7F9D2C3h] = remote_console_session_id[32b]
> 192.168.20.116: [  BYTE ARRAY ... ] = integrity_check_value[12B]
> 192.168.20.116: [ E9h 5Fh A4h F1h 10h C4h 7Bh EBh ]
> 192.168.20.116: [ 50h ABh 7Ah 55h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        D7FF0336h] = session_id[32b]
> 192.168.20.116: [               1h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ B2h 0Bh 95h BBh 18h B7h 0Bh 31h ]
> 192.168.20.116: [ 2Fh A2h 1Dh DBh 1Fh A2h ADh CCh ]
> 192.168.20.116: [BC043B8481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              21h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              BCh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 86h 04h 71h 8Ch 59h CDh 2Ch EFh ]
> 192.168.20.116: [ 3Ah 09h 87h 70h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        D7F9D2C3h] = session_id[32b]
> 192.168.20.116: [               0h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 85h 84h C5h EEh B2h 46h 85h C7h ]
> 192.168.20.116: [ FDh BCh E7h C3h 09h DCh FAh 2Ah ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 84h 3Bh 00h 04h ]
> 192.168.20.116: [ 1Dh ]
> 192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              21h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              1Dh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 06h D0h 1Dh F2h EDh 58h F6h 3Eh ]
> 192.168.20.116: [ 6Fh A0h DDh BAh ]
> (ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
> hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
> failed; p = 9; session_sequence_number = 0; highest_received_sequence_number 
> = 0
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        D7FF0336h] = session_id[32b]
> 192.168.20.116: [               2h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 08h 3Ch C6h EFh 09h D9h 65h BCh ]
> 192.168.20.116: [ B5h 06h B4h 77h 8Fh 02h 42h 05h ]
> 192.168.20.116: [BC043B8481C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              21h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              BCh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 36h 71h C6h D4h E6h 39h 67h E7h ]
> 192.168.20.116: [ 8Ah A4h 40h 08h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        D7F9D2C3h] = session_id[32b]
> 192.168.20.116: [               1h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 0Dh A0h E3h ACh D9h FCh 42h 11h ]
> 192.168.20.116: [ 68h 1Dh DAh FCh EFh DEh FCh 74h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 84h 3Bh 00h 04h ]
> 192.168.20.116: [ 1Dh ]
> 192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              21h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              3Bh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               4h] = privilege_level[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              1Dh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ D7h CBh 42h 3Ah 6Fh A7h 57h 3Eh ]
> 192.168.20.116: [ 98h 07h 2Bh 24h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Channel Payload Support Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        D7FF0336h] = session_id[32b]
> 192.168.20.116: [               3h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 44h 33h D4h 84h 02h C7h 4Fh 2Bh ]
> 192.168.20.116: [ 9Bh 0Bh 97h B6h 91h 36h 28h E2h ]
> 192.168.20.116: [9B0E4E8881C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              22h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Eh] = cmd[ 8b]
> 192.168.20.116: [               Eh] = channel_number[ 4b]
> 192.168.20.116: [               0h] = reserved[ 4b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              9Bh] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ F4h 12h 29h 20h E6h 7Ah 69h 5Eh ]
> 192.168.20.116: [ C7h 08h 90h B1h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Channel Payload Support Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        D7F9D2C3h] = session_id[32b]
> 192.168.20.116: [               2h] = session_sequence_number[32b]
> 192.168.20.116: [              30h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ 62h C2h 63h 14h 08h E8h DBh 05h ]
> 192.168.20.116: [ A4h C2h C9h AEh 9Eh C3h D8h ACh ]
> 192.168.20.116: [  BYTE ARRAY ... ] = payload_data[16B]
> 192.168.20.116: [ 81h 1Ch 63h 20h 88h 4Eh 00h 03h ]
> 192.168.20.116: [ 00h 00h 00h 00h 00h 00h 00h 07h ]
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
> 192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
> 192.168.20.116: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [               7h] = net_fn[ 6b]
> 192.168.20.116: [              63h] = checksum1[ 8b]
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [              22h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Eh] = cmd[ 8b]
> 192.168.20.116: [               0h] = comp_code[ 8b]
> 192.168.20.116: [               1h] = standard_payload_type_0_supported[ 1b]
> 192.168.20.116: [               1h] = standard_payload_type_1_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_2_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_3_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_4_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_5_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_6_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_7_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_8_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_9_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_10_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_11_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_12_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_13_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_14_supported[ 1b]
> 192.168.20.116: [               0h] = standard_payload_type_15_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_0_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_1_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_2_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_3_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_4_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_5_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_6_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_7_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_8_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_9_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_10_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_11_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_12_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_13_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_14_supported[ 1b]
> 192.168.20.116: [               0h] = session_setup_payload_15_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_20h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_21h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_22h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_23h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_24h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_25h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_26h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_27h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_28h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_29h_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Ah_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Bh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Ch_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Dh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Eh_supported[ 1b]
> 192.168.20.116: [               0h] = payload_type_2Fh_supported[ 1b]
> 192.168.20.116: [               0h] = reserved[16b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [               7h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [               0h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 79h C0h 5Bh D0h CAh 9Ch B2h 7Fh ]
> 192.168.20.116: [ D8h F2h 92h BAh ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
> 192.168.20.116: [               0h] = reserved[ 8b]
> 192.168.20.116: [              FFh] = sequence_number[ 8b]
> 192.168.20.116: [               7h] = message_class.class[ 5b]
> 192.168.20.116: [               0h] = message_class.reserved[ 2b]
> 192.168.20.116: [               0h] = message_class.ack[ 1b]
> 192.168.20.116: IPMI RMCPPLUS Session Header:
> 192.168.20.116: -----------------------------
> 192.168.20.116: [               6h] = authentication_type[ 4b]
> 192.168.20.116: [               0h] = reserved1[ 4b]
> 192.168.20.116: [               0h] = payload_type[ 6b]
> 192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
> 192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
> 192.168.20.116: [        D7FF0336h] = session_id[32b]
> 192.168.20.116: [               4h] = session_sequence_number[32b]
> 192.168.20.116: [              20h] = ipmi_payload_len[16b]
> 192.168.20.116: IPMI RMCPPLUS Payload:
> 192.168.20.116: ----------------------
> 192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
> 192.168.20.116: [ FDh 7Fh DCh DDh E7h 9Ah 00h FFh ]
> 192.168.20.116: [ 56h 19h E2h F1h 29h 61h 35h AFh ]
> 192.168.20.116: [A8014A8C81C81820h] = payload_data[64b]
> 192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
> 192.168.20.116: IPMI Message Header:
> 192.168.20.116: --------------------
> 192.168.20.116: [              20h] = rs_addr[ 8b]
> 192.168.20.116: [               0h] = rs_lun[ 2b]
> 192.168.20.116: [               6h] = net_fn[ 6b]
> 192.168.20.116: [              C8h] = checksum1[ 8b]
> 192.168.20.116: [              81h] = rq_addr[ 8b]
> 192.168.20.116: [               0h] = rq_lun[ 2b]
> 192.168.20.116: [              23h] = rq_seq[ 6b]
> 192.168.20.116: IPMI Command Data:
> 192.168.20.116: ------------------
> 192.168.20.116: [              4Ah] = cmd[ 8b]
> 192.168.20.116: [               1h] = payload_type[ 8b]
> 192.168.20.116: IPMI Trailer:
> 192.168.20.116: -------------
> 192.168.20.116: [              A8h] = checksum2[ 8b]
> 192.168.20.116: IPMI RMCPPLUS Session Trailer:
> 192.168.20.116: ------------------------------
> 192.168.20.116: [            FFFFh] = integrity_pad[16b]
> 192.168.20.116: [               2h] = pad_length[ 8b]
> 192.168.20.116: [               7h] = next_header[ 8b]
> 192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
> 192.168.20.116: [ 0Eh 13h 50h 78h 83h 5Fh A5h 71h ]
> 192.168.20.116: [ 47h 32h 65h C1h ]
> 192.168.20.116: =====================================================
> 192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
> 192.168.20.116: =====================================================
> 192.168.20.116: RMCP Header:
> 192.168.20.116: ------------
> 192.168.20.116: [               6h] = version[ 8b]
-- 
Albert Chu
address@hidden
Computer Scientist
High Performance Systems Division
Lawrence Livermore National Laboratory





reply via email to

[Prev in Thread] Current Thread [Next in Thread]