freeipmi-users
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Freeipmi-users] ipmiconsole BMC Implementation with x38ml


From: Kimitoshi Takahashi
Subject: Re: [Freeipmi-users] ipmiconsole BMC Implementation with x38ml
Date: Wed, 24 Sep 2008 20:38:54 +0900
User-agent: Thunderbird 2.0.0.16 (Windows/20080708)

Hi Al,

Here it is.

address@hidden:~# /usr/ccmp/sbin/ipmiconsole -W authcap,solpayloadsize -u rt -p 
rt -h 192.168.20.116 --debug 2>/tmp/debug

never returns to the shell.

sh-3.1$ egrep -v "^192.16" /tmp/debug_069b0_wo_solport
(ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
failed; p = 9; session_sequence_number = 0; highest_received_sequence_number = 0
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2957): hostname=192.168.20.116; protocol_state=0x8: trying new port: 6F02
(ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
failed; p = 9; session_sequence_number = 0; highest_received_sequence_number = 0

Attached is the --debug output.

> Hey Kimitoshi,
> 
> Could you try 0.6.9.beta0 w/o the solport workaround too?
> 
> Thanks,
> Al
> 

-- 
Best regards,
Kimitoshi Takahashi
192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               9h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved1[ 3b]
192.168.20.116: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              49h] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [              10h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = channel_number[ 8b]
192.168.20.116: [               1h] = authentication_type.none[ 1b]
192.168.20.116: [               0h] = authentication_type.md2[ 1b]
192.168.20.116: [               1h] = authentication_type.md5[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved1[ 1b]
192.168.20.116: [               1h] = 
authentication_type.straight_password_key[ 1b]
192.168.20.116: [               0h] = authentication_type.oem_prop[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved2[ 1b]
192.168.20.116: [               1h] = 
authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
192.168.20.116: [               1h] = authentication_status.anonymous_login[ 1b]
192.168.20.116: [               0h] = authentication_status.null_username[ 1b]
192.168.20.116: [               0h] = authentication_status.non_null_username[ 
1b]
192.168.20.116: [               0h] = 
authentication_status.user_level_authentication[ 1b]
192.168.20.116: [               0h] = 
authentication_status.per_message_authentication[ 1b]
192.168.20.116: [               0h] = authentication_status.k_g[ 1b]
192.168.20.116: [               0h] = authentication_status.reserved[ 2b]
192.168.20.116: [               1h] = channel_supports_ipmi_v1.5_connections[ 
1b]
192.168.20.116: [               1h] = channel_supports_ipmi_v2.0_connections[ 
1b]
192.168.20.116: [               0h] = reserved[ 6b]
192.168.20.116: [               0h] = oem_id[24b]
192.168.20.116: [               0h] = oem_auxiliary_data[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              A2h] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              10h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[32B]
192.168.20.116: [ 20h 00h 00h 00h A5h 00h CAh 3Bh ]
192.168.20.116: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              20h] = message_tag[ 8b]
192.168.20.116: [               0h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[16b]
192.168.20.116: [        3BCA00A5h] = remote_console_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [               0h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [               0h] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              11h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              24h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[36B]
192.168.20.116: [ 20h 00h 04h 00h A5h 00h CAh 3Bh ]
192.168.20.116: [ 5Ch CDh F9h 96h 00h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 02h 00h 00h 08h ]
192.168.20.116: [ 01h FFh 02h 07h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              20h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[ 8b]
192.168.20.116: [        3BCA00A5h] = remote_console_session_id[32b]
192.168.20.116: [        96F9CD5Ch] = managed_system_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [           80000h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [           80000h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [           702FFh] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 1 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              12h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              1Eh] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[30B]
192.168.20.116: [ 21h 00h 00h 00h 5Ch CDh F9h 96h ]
192.168.20.116: [ 9Eh 8Ch 1Fh 11h D8h 45h B5h 1Fh ]
192.168.20.116: [ 36h ADh 70h CBh 15h C0h 31h D7h ]
192.168.20.116: [ 14h 00h 00h 02h 72h 74h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              21h] = message_tag[ 8b]
192.168.20.116: [               0h] = reserved1[24b]
192.168.20.116: [        96F9CD5Ch] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
192.168.20.116: [ 9Eh 8Ch 1Fh 11h D8h 45h B5h 1Fh ]
192.168.20.116: [ 36h ADh 70h CBh 15h C0h 31h D7h ]
192.168.20.116: [               4h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               1h] = name_only_lookup[ 1b]
192.168.20.116: [               0h] = reserved2[ 3b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               2h] = user_name_length[ 8b]
192.168.20.116: [            7472h] = user_name[16b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 2 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              13h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              3Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[60B]
192.168.20.116: [ 21h 00h 00h 00h A5h 00h CAh 3Bh ]
192.168.20.116: [ 2Dh E1h CFh 03h 97h E3h AEh 50h ]
192.168.20.116: [ F5h 34h 77h 73h C3h C5h 31h 0Eh ]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [ 4Ch 81h 06h D3h 12h 99h C4h 6Bh ]
192.168.20.116: [ E5h DBh 40h 41h 27h 56h 17h 88h ]
192.168.20.116: [ F4h A7h EDh 26h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              21h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        3BCA00A5h] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
192.168.20.116: [ 2Dh E1h CFh 03h 97h E3h AEh 50h ]
192.168.20.116: [ F5h 34h 77h 73h C3h C5h 31h 0Eh ]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_guid[16B]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ 4Ch 81h 06h D3h 12h 99h C4h 6Bh ]
192.168.20.116: [ E5h DBh 40h 41h 27h 56h 17h 88h ]
192.168.20.116: [ F4h A7h EDh 26h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 3 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              14h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              1Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[28B]
192.168.20.116: [ 22h 00h 00h 00h 5Ch CDh F9h 96h ]
192.168.20.116: [ 0Ah 45h E1h EFh DDh 99h F3h 28h ]
192.168.20.116: [ F4h 72h EBh 97h 79h 2Ah 9Ah DBh ]
192.168.20.116: [ 55h 1Bh 9Ah 3Eh ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              22h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        96F9CD5Ch] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ 0Ah 45h E1h EFh DDh 99h F3h 28h ]
192.168.20.116: [ F4h 72h EBh 97h 79h 2Ah 9Ah DBh ]
192.168.20.116: [ 55h 1Bh 9Ah 3Eh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 4 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              15h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              14h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
192.168.20.116: [ 22h 00h 00h 00h A5h 00h CAh 3Bh ]
192.168.20.116: [ 0Dh 19h B0h 16h 86h 7Dh 88h 52h ]
192.168.20.116: [ 91h C1h 0Fh 6Ah ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              22h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        3BCA00A5h] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = integrity_check_value[12B]
192.168.20.116: [ 0Dh 19h B0h 16h 86h 7Dh 88h 52h ]
192.168.20.116: [ 91h C1h 0Fh 6Ah ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        96F9CD5Ch] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ D6h 99h F3h 29h 24h 1Ch 52h 15h ]
192.168.20.116: [ 79h F6h 43h BAh 9Bh 3Dh 18h 15h ]
192.168.20.116: [D4043B6C81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              D4h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 2Dh CFh 63h 08h 68h 65h 3Eh 1Eh ]
192.168.20.116: [ E7h 2Ch 03h 0Bh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        3BCA00A5h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 8Ch FDh 27h ECh 9Eh EFh D2h 51h ]
192.168.20.116: [ CBh F0h 43h C5h 06h 24h 21h 33h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h 6Ch 3Bh 00h 04h ]
192.168.20.116: [ 35h ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              35h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 95h 74h D2h BDh A2h E8h E6h 0Fh ]
192.168.20.116: [ A2h 11h C4h 8Dh ]
(ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
failed; p = 9; session_sequence_number = 0; highest_received_sequence_number = 0
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        96F9CD5Ch] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ B8h 95h A1h C5h 30h 0Bh 91h 73h ]
192.168.20.116: [ 88h C2h 11h ABh 83h AEh C8h A5h ]
192.168.20.116: [D4043B6C81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              D4h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 54h 76h 32h B4h 18h 00h 96h 17h ]
192.168.20.116: [ 3Bh 49h 54h 75h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        3BCA00A5h] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 05h F0h 36h 9Ch D3h E5h ECh C8h ]
192.168.20.116: [ 19h 64h 3Ch DCh 29h 6Dh EAh B5h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h 6Ch 3Bh 00h 04h ]
192.168.20.116: [ 35h ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Bh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              35h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ BEh 76h 00h C9h 03h B8h 43h D2h ]
192.168.20.116: [ 4Dh 34h 44h 90h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        96F9CD5Ch] = session_id[32b]
192.168.20.116: [               3h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ DAh 9Bh 45h D5h 47h C7h 97h 07h ]
192.168.20.116: [ 56h 12h 4Ah 6Eh 5Ch 1Fh 0Dh 4Fh ]
192.168.20.116: [B30E4E7081C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Ch] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              B3h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ C9h D0h B6h 77h 23h C4h 46h 15h ]
192.168.20.116: [ 70h CEh 88h 84h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        3BCA00A5h] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              30h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 6Ah 12h A1h 08h 01h 73h 59h CCh ]
192.168.20.116: [ 63h 9Dh 91h 69h C1h B2h 9Dh C6h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[16B]
192.168.20.116: [ 81h 1Ch 63h 20h 70h 4Eh 00h 03h ]
192.168.20.116: [ 00h 00h 00h 00h 00h 00h 00h 1Fh ]
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
192.168.20.116: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Ch] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = standard_payload_type_0_supported[ 1b]
192.168.20.116: [               1h] = standard_payload_type_1_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_2_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_3_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_4_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_5_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_6_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_7_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_8_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_9_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_10_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_11_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_12_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_13_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_14_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_15_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_0_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_1_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_2_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_3_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_4_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_5_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_6_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_7_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_8_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_9_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_10_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_11_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_12_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_13_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_14_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_15_supported[ 1b]
192.168.20.116: [               0h] = payload_type_20h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_21h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_22h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_23h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_24h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_25h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_26h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_27h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_28h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_29h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ah_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Bh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ch_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Dh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Eh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Fh_supported[ 1b]
192.168.20.116: [               0h] = reserved[16b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              1Fh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 75h 3Eh 99h 05h 5Bh 1Ah 3Ah 9Fh ]
192.168.20.116: [ A3h 61h CFh 76h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        96F9CD5Ch] = session_id[32b]
192.168.20.116: [               4h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ CCh 9Fh ECh 38h 46h 6Dh E8h CEh ]
192.168.20.116: [ 72h A5h 4Fh 37h E5h 00h E5h 4Dh ]
192.168.20.116: [C0014A7481C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Dh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              C0h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ A0h E3h F1h 49h B7h 74h ADh F7h ]
192.168.20.116: [ 3Ah F2h 75h FBh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        3BCA00A5h] = session_id[32b]
192.168.20.116: [               3h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ A3h D3h 62h 76h B8h 4Fh 3Fh D1h ]
192.168.20.116: [ B3h 7Bh ADh DCh E8h 98h 91h 53h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 81h 1Ch 63h 20h 74h 4Ah 00h 10h ]
192.168.20.116: [ 00h 00h 12h ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Dh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = instance_capacity[ 4b]
192.168.20.116: [               1h] = reserved[ 4b]
192.168.20.116: [               0h] = instance_1[ 1b]
192.168.20.116: [               0h] = instance_2[ 1b]
192.168.20.116: [               0h] = instance_3[ 1b]
192.168.20.116: [               0h] = instance_4[ 1b]
192.168.20.116: [               0h] = instance_5[ 1b]
192.168.20.116: [               0h] = instance_6[ 1b]
192.168.20.116: [               0h] = instance_7[ 1b]
192.168.20.116: [               0h] = instance_8[ 1b]
192.168.20.116: [               0h] = instance_9[ 1b]
192.168.20.116: [               0h] = instance_10[ 1b]
192.168.20.116: [               0h] = instance_11[ 1b]
192.168.20.116: [               0h] = instance_12[ 1b]
192.168.20.116: [               0h] = instance_13[ 1b]
192.168.20.116: [               0h] = instance_14[ 1b]
192.168.20.116: [               0h] = instance_15[ 1b]
192.168.20.116: [               0h] = instance_16[ 1b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              12h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 82h 06h 18h D0h C3h 40h 40h 85h ]
192.168.20.116: [ 7Eh 48h E8h 29h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        96F9CD5Ch] = session_id[32b]
192.168.20.116: [               5h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ ADh D8h C6h ADh 78h 63h 81h EFh ]
192.168.20.116: [ D8h 6Bh 07h D4h 81h 33h EAh 85h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h 78h 48h 01h 01h ]
192.168.20.116: [ C2h 00h 00h 00h FBh ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Eh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = reserved3[ 1b]
192.168.20.116: [               1h] = sol_startup_handshake[ 1b]
192.168.20.116: [               0h] = shared_serial_alert_behavior[ 2b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved4[ 1b]
192.168.20.116: [               1h] = authentication_activation[ 1b]
192.168.20.116: [               1h] = encryption_activation[ 1b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              FBh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 6Bh BBh 0Fh 21h AFh 42h 74h 54h ]
192.168.20.116: [ C3h 9Ah D0h F2h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Activate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        3BCA00A5h] = session_id[32b]
192.168.20.116: [               4h] = session_sequence_number[32b]
192.168.20.116: [              30h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ AAh 32h 5Bh ABh A5h B5h 77h 09h ]
192.168.20.116: [ 52h 08h 72h 13h BAh 0Fh D9h 5Dh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
192.168.20.116: [ 81h 1Ch 63h 20h 78h 48h 00h 00h ]
192.168.20.116: [ 00h 00h 00h 00h 04h 00h 04h 02h ]
192.168.20.116: [ 6Fh FFh FFh A9h ]
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[12B]
192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
192.168.20.116: [ 09h 0Ah 0Bh 0Bh ]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Eh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              48h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               0h] = test_mode[ 1b]
192.168.20.116: [               0h] = reserved1[31b]
192.168.20.116: [             400h] = inbound_payload_size[16b]
192.168.20.116: [             400h] = outbound_payload_size[16b]
192.168.20.116: [            6F02h] = payload_udp_port_number[16b]
192.168.20.116: [            FFFFh] = payload_vlan_number[16b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              A9h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ E5h 2Ah 92h 96h BEh 92h 97h DCh ]
192.168.20.116: [ 57h 95h 67h 31h ]
(ipmiconsole_processing.c, _process_protocol_state_activate_payload_sent, 
2957): hostname=192.168.20.116; protocol_state=0x8: trying new port: 6F02
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Deactivate Payload Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        96F9CD5Ch] = session_id[32b]
192.168.20.116: [               6h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ E6h D3h 2Fh 37h E2h 0Ch 3Eh 30h ]
192.168.20.116: [ 39h FAh E2h 4Ch 9Bh 44h 7Eh 7Eh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[13B]
192.168.20.116: [ 20h 18h C8h 81h 7Ch 49h 01h 01h ]
192.168.20.116: [ 00h 00h 00h 00h B8h ]
192.168.20.116: [           20201h] = confidentiality_trailer[24b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              1Fh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              49h] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 6b]
192.168.20.116: [               0h] = reserved1[ 2b]
192.168.20.116: [               1h] = payload_instance[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: [               0h] = payload_auxiliary_data[32b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              B8h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 58h 5Bh 93h 88h A1h 4Fh F9h 2Bh ]
192.168.20.116: [ 70h 40h 7Dh DAh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Deactivate Payload Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        3BCA00A5h] = session_id[32b]
192.168.20.116: [               5h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ E3h 3Bh D4h 9Bh 8Ah 13h 6Dh 3Dh ]
192.168.20.116: [ 8Eh 1Ah 19h 76h B2h AAh C9h 5Ch ]
192.168.20.116: [1B00497C20631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              1Fh] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              49h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              1Bh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ DFh FDh B6h 40h 0Fh 94h 7Ch 0Bh ]
192.168.20.116: [ 24h 3Fh 2Ah 6Fh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Close Session Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        96F9CD5Ch] = session_id[32b]
192.168.20.116: [               7h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ A3h D3h B7h A6h D3h 3Ah 31h A5h ]
192.168.20.116: [ CFh 4Bh DFh 48h BFh C2h FAh CFh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[11B]
192.168.20.116: [ 20h 18h C8h 81h 80h 3Ch 5Ch CDh ]
192.168.20.116: [ F9h 96h 0Bh ]
192.168.20.116: [       404030201h] = confidentiality_trailer[40b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              20h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Ch] = cmd[ 8b]
192.168.20.116: [               Ch] = chassis_control[ 4b]
192.168.20.116: [               5h] = reserved[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              CDh] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 8Ah 8Bh CEh 97h C1h BBh 1Ch A5h ]
192.168.20.116: [ 94h 88h D9h DAh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Close Session Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        3BCA00A5h] = session_id[32b]
192.168.20.116: [               6h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ DCh 25h 07h 82h DAh 7Eh 8Bh 2Ch ]
192.168.20.116: [ 86h FDh 3Fh 41h 0Dh 18h 9Eh F0h ]
192.168.20.116: [24003C8020631C81h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              20h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Ch] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              24h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ DCh 44h 16h 4Ah 01h 89h B0h 8Ch ]
192.168.20.116: [ D1h 51h 9Dh 87h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               9h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              36h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved1[ 3b]
192.168.20.116: [               1h] = get_ipmi_v2.0_extended_data[ 1b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved2[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              DDh] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 1.5 Get Channel Authentication Capabilities Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI Session Header:
192.168.20.116: --------------------
192.168.20.116: [               0h] = authentication_type[ 8b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [              10h] = ipmi_msg_len[ 8b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              36h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              38h] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = channel_number[ 8b]
192.168.20.116: [               1h] = authentication_type.none[ 1b]
192.168.20.116: [               0h] = authentication_type.md2[ 1b]
192.168.20.116: [               1h] = authentication_type.md5[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved1[ 1b]
192.168.20.116: [               1h] = 
authentication_type.straight_password_key[ 1b]
192.168.20.116: [               0h] = authentication_type.oem_prop[ 1b]
192.168.20.116: [               0h] = authentication_type.reserved2[ 1b]
192.168.20.116: [               1h] = 
authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
192.168.20.116: [               1h] = authentication_status.anonymous_login[ 1b]
192.168.20.116: [               0h] = authentication_status.null_username[ 1b]
192.168.20.116: [               0h] = authentication_status.non_null_username[ 
1b]
192.168.20.116: [               0h] = 
authentication_status.user_level_authentication[ 1b]
192.168.20.116: [               0h] = 
authentication_status.per_message_authentication[ 1b]
192.168.20.116: [               0h] = authentication_status.k_g[ 1b]
192.168.20.116: [               0h] = authentication_status.reserved[ 2b]
192.168.20.116: [               1h] = channel_supports_ipmi_v1.5_connections[ 
1b]
192.168.20.116: [               1h] = channel_supports_ipmi_v2.0_connections[ 
1b]
192.168.20.116: [               0h] = reserved[ 6b]
192.168.20.116: [             400h] = oem_id[24b]
192.168.20.116: [               4h] = oem_auxiliary_data[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: --------------
192.168.20.116: [              2Eh] = checksum2[ 8b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              10h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[32B]
192.168.20.116: [ 5Fh 00h 00h 00h 51h 10h 70h FCh ]
192.168.20.116: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              5Fh] = message_tag[ 8b]
192.168.20.116: [               0h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[16b]
192.168.20.116: [        FC701051h] = remote_console_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [               0h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [               0h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [               0h] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Open Session Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              11h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              24h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[36B]
192.168.20.116: [ 5Fh 00h 04h 00h 51h 10h 70h FCh ]
192.168.20.116: [ 72h D6h D3h 2Eh 00h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 01h 00h 00h 08h ]
192.168.20.116: [ 01h 00h 00h 08h 02h 00h 00h 08h ]
192.168.20.116: [ 01h FFh 02h 07h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              5Fh] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               4h] = maximum_privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = reserved2[ 8b]
192.168.20.116: [        FC701051h] = remote_console_session_id[32b]
192.168.20.116: [        2ED3D672h] = managed_system_session_id[32b]
192.168.20.116: [               0h] = authentication_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               8h] = authentication_payload.payload_length[ 8b]
192.168.20.116: [               1h] = 
authentication_payload.authentication_algorithm[ 6b]
192.168.20.116: [               0h] = reserved4[ 2b]
192.168.20.116: [           80000h] = reserved5[24b]
192.168.20.116: [               1h] = integrity_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved6[16b]
192.168.20.116: [               8h] = integrity_payload.payload_length[ 8b]
192.168.20.116: [               1h] = integrity_payload.integrity_algorithm[ 6b]
192.168.20.116: [               0h] = reserved7[ 2b]
192.168.20.116: [           80000h] = reserved8[24b]
192.168.20.116: [               2h] = confidentiality_payload.payload_type[ 8b]
192.168.20.116: [               0h] = reserved9[16b]
192.168.20.116: [               8h] = confidentiality_payload.payload_length[ 
8b]
192.168.20.116: [               1h] = 
confidentiality_payload.confidentiality_algorithm[ 6b]
192.168.20.116: [               0h] = reserved10[ 2b]
192.168.20.116: [           702FFh] = reserved11[24b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 1 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              12h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              1Eh] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[30B]
192.168.20.116: [ 60h 00h 00h 00h 72h D6h D3h 2Eh ]
192.168.20.116: [ D9h 33h 11h 48h 0Eh 94h BDh A9h ]
192.168.20.116: [ 76h CBh AFh 5Dh F0h FCh DCh 19h ]
192.168.20.116: [ 14h 00h 00h 02h 72h 74h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              60h] = message_tag[ 8b]
192.168.20.116: [               0h] = reserved1[24b]
192.168.20.116: [        2ED3D672h] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = remote_console_random_number[16B]
192.168.20.116: [ D9h 33h 11h 48h 0Eh 94h BDh A9h ]
192.168.20.116: [ 76h CBh AFh 5Dh F0h FCh DCh 19h ]
192.168.20.116: [               4h] = requested_maximum_privilege_level[ 4b]
192.168.20.116: [               1h] = name_only_lookup[ 1b]
192.168.20.116: [               0h] = reserved2[ 3b]
192.168.20.116: [               0h] = reserved3[16b]
192.168.20.116: [               2h] = user_name_length[ 8b]
192.168.20.116: [            7472h] = user_name[16b]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 2 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              13h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              3Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[60B]
192.168.20.116: [ 60h 00h 00h 00h 51h 10h 70h FCh ]
192.168.20.116: [ 8Bh DEh 85h F8h 1Bh 13h 13h 35h ]
192.168.20.116: [ 8Ah C5h DFh 53h 22h BCh 78h 29h ]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [ 7Eh 22h 6Ah 4Eh 0Fh 2Dh 95h D7h ]
192.168.20.116: [ 5Ch 49h CCh 1Eh 5Eh FAh 0Fh 70h ]
192.168.20.116: [ 01h 78h 37h 98h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              60h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        FC701051h] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_random_number[16B]
192.168.20.116: [ 8Bh DEh 85h F8h 1Bh 13h 13h 35h ]
192.168.20.116: [ 8Ah C5h DFh 53h 22h BCh 78h 29h ]
192.168.20.116: [  BYTE ARRAY ... ] = managed_system_guid[16B]
192.168.20.116: [ 94h 4Eh 77h 50h DAh 63h 11h DCh ]
192.168.20.116: [ B3h 2Ch 00h 0Bh ABh 01h BFh D5h ]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ 7Eh 22h 6Ah 4Eh 0Fh 2Dh 95h D7h ]
192.168.20.116: [ 5Ch 49h CCh 1Eh 5Eh FAh 0Fh 70h ]
192.168.20.116: [ 01h 78h 37h 98h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 3 Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              14h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              1Ch] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[28B]
192.168.20.116: [ 61h 00h 00h 00h 72h D6h D3h 2Eh ]
192.168.20.116: [ 32h 30h 3Bh 65h 21h 36h 2Ah 86h ]
192.168.20.116: [ B5h 67h 05h 2Dh EEh D8h BBh BDh ]
192.168.20.116: [ BEh FFh FEh 5Eh ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              61h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        2ED3D672h] = managed_system_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
192.168.20.116: [ 32h 30h 3Bh 65h 21h 36h 2Ah 86h ]
192.168.20.116: [ B5h 67h 05h 2Dh EEh D8h BBh BDh ]
192.168.20.116: [ BEh FFh FEh 5Eh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 RAKP Message 4 Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [              15h] = payload_type[ 6b]
192.168.20.116: [               0h] = payload_type.authenticated[ 1b]
192.168.20.116: [               0h] = payload_type.encrypted[ 1b]
192.168.20.116: [               0h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              14h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[20B]
192.168.20.116: [ 61h 00h 00h 00h 51h 10h 70h FCh ]
192.168.20.116: [ 84h 9Bh BFh 5Bh 94h A0h ADh 3Dh ]
192.168.20.116: [ 62h 5Eh 1Bh E0h ]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              61h] = message_tag[ 8b]
192.168.20.116: [               0h] = rmcpplus_status_code[ 8b]
192.168.20.116: [               0h] = reserved1[16b]
192.168.20.116: [        FC701051h] = remote_console_session_id[32b]
192.168.20.116: [  BYTE ARRAY ... ] = integrity_check_value[12B]
192.168.20.116: [ 84h 9Bh BFh 5Bh 94h A0h ADh 3Dh ]
192.168.20.116: [ 62h 5Eh 1Bh E0h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        2ED3D672h] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ B4h 0Fh A2h 36h 32h D2h 22h F4h ]
192.168.20.116: [ 82h 9Eh E9h 22h 7Ch BEh 2Ah 4Dh ]
192.168.20.116: [68043BD881C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              36h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              68h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ A3h E9h FAh C8h B9h BCh D6h FEh ]
192.168.20.116: [ 9Ah 88h 18h B1h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        FC701051h] = session_id[32b]
192.168.20.116: [               0h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 3Eh 52h A8h C9h 7Eh 2Eh C6h BDh ]
192.168.20.116: [ 6Fh D3h D5h 0Eh C3h 29h 80h 4Fh ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h D8h 3Bh 00h 04h ]
192.168.20.116: [ C9h ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              36h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              C9h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 3Fh 14h 27h 82h E4h 55h 94h 75h ]
192.168.20.116: [ F8h 2Dh ACh 18h ]
(ipmiconsole_checks.c, ipmiconsole_check_outbound_sequence_number, 254): 
hostname=192.168.20.116; protocol_state=0x5: session sequence number check 
failed; p = 9; session_sequence_number = 0; highest_received_sequence_number = 0
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        2ED3D672h] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ A3h 7Ah D6h 78h D5h EAh 75h BEh ]
192.168.20.116: [ 9Ch F5h 1Dh DDh 62h 62h F9h 6Eh ]
192.168.20.116: [68043BD881C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              36h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              68h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 61h DBh 71h E9h A8h 4Dh 0Ah FBh ]
192.168.20.116: [ BFh EEh 7Ah 94h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Set Session Privilege Level Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        FC701051h] = session_id[32b]
192.168.20.116: [               1h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 07h 06h 47h 22h 19h 5Ah 57h A3h ]
192.168.20.116: [ 20h 37h F7h 42h F3h 6Fh 6Bh 31h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[ 9B]
192.168.20.116: [ 81h 1Ch 63h 20h D8h 3Bh 00h 04h ]
192.168.20.116: [ C9h ]
192.168.20.116: [   6060504030201h] = confidentiality_trailer[56b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              36h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              3Bh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               4h] = privilege_level[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              C9h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ 4Ch F7h F5h F7h DEh 53h DBh 54h ]
192.168.20.116: [ 87h 40h 78h 42h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        2ED3D672h] = session_id[32b]
192.168.20.116: [               3h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 1Fh 92h 18h AEh 0Eh 4Bh 59h 7Bh ]
192.168.20.116: [ B6h 3Fh 8Ah D0h E3h DDh A6h F9h ]
192.168.20.116: [470E4EDC81C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              37h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               Eh] = channel_number[ 4b]
192.168.20.116: [               0h] = reserved[ 4b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              47h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ E8h 85h EBh CCh 28h EBh 4Eh 3Ch ]
192.168.20.116: [ 2Fh 09h 1Fh 7Ah ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Channel Payload Support Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        FC701051h] = session_id[32b]
192.168.20.116: [               2h] = session_sequence_number[32b]
192.168.20.116: [              30h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ C2h 13h FAh 40h 42h C0h FEh B1h ]
192.168.20.116: [ 94h D3h BFh 57h FCh 40h A6h 03h ]
192.168.20.116: [  BYTE ARRAY ... ] = payload_data[16B]
192.168.20.116: [ 81h 1Ch 63h 20h DCh 4Eh 00h 03h ]
192.168.20.116: [ 00h 00h 00h 00h 00h 00h 00h B3h ]
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_trailer[16B]
192.168.20.116: [ 01h 02h 03h 04h 05h 06h 07h 08h ]
192.168.20.116: [ 09h 0Ah 0Bh 0Ch 0Dh 0Eh 0Fh 0Fh ]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [               7h] = net_fn[ 6b]
192.168.20.116: [              63h] = checksum1[ 8b]
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [              37h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Eh] = cmd[ 8b]
192.168.20.116: [               0h] = comp_code[ 8b]
192.168.20.116: [               1h] = standard_payload_type_0_supported[ 1b]
192.168.20.116: [               1h] = standard_payload_type_1_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_2_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_3_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_4_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_5_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_6_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_7_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_8_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_9_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_10_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_11_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_12_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_13_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_14_supported[ 1b]
192.168.20.116: [               0h] = standard_payload_type_15_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_0_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_1_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_2_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_3_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_4_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_5_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_6_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_7_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_8_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_9_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_10_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_11_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_12_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_13_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_14_supported[ 1b]
192.168.20.116: [               0h] = session_setup_payload_15_supported[ 1b]
192.168.20.116: [               0h] = payload_type_20h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_21h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_22h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_23h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_24h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_25h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_26h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_27h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_28h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_29h_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ah_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Bh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Ch_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Dh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Eh_supported[ 1b]
192.168.20.116: [               0h] = payload_type_2Fh_supported[ 1b]
192.168.20.116: [               0h] = reserved[16b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              B3h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [               0h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ DAh 3Eh BDh 18h 6Bh 63h 08h B3h ]
192.168.20.116: [ E3h B6h 58h 09h ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Request
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]
192.168.20.116: [               0h] = reserved[ 8b]
192.168.20.116: [              FFh] = sequence_number[ 8b]
192.168.20.116: [               7h] = message_class.class[ 5b]
192.168.20.116: [               0h] = message_class.reserved[ 2b]
192.168.20.116: [               0h] = message_class.ack[ 1b]
192.168.20.116: IPMI RMCPPLUS Session Header:
192.168.20.116: -----------------------------
192.168.20.116: [               6h] = authentication_type[ 4b]
192.168.20.116: [               0h] = reserved1[ 4b]
192.168.20.116: [               0h] = payload_type[ 6b]
192.168.20.116: [               1h] = payload_type.authenticated[ 1b]
192.168.20.116: [               1h] = payload_type.encrypted[ 1b]
192.168.20.116: [        2ED3D672h] = session_id[32b]
192.168.20.116: [               4h] = session_sequence_number[32b]
192.168.20.116: [              20h] = ipmi_payload_len[16b]
192.168.20.116: IPMI RMCPPLUS Payload:
192.168.20.116: ----------------------
192.168.20.116: [  BYTE ARRAY ... ] = confidentiality_header[16B]
192.168.20.116: [ 41h 73h 3Fh 7Ch F4h D7h 96h 95h ]
192.168.20.116: [ EBh CAh E1h AEh A3h 3Dh 52h 87h ]
192.168.20.116: [54014AE081C81820h] = payload_data[64b]
192.168.20.116: [ 707060504030201h] = confidentiality_trailer[64b]
192.168.20.116: IPMI Message Header:
192.168.20.116: --------------------
192.168.20.116: [              20h] = rs_addr[ 8b]
192.168.20.116: [               0h] = rs_lun[ 2b]
192.168.20.116: [               6h] = net_fn[ 6b]
192.168.20.116: [              C8h] = checksum1[ 8b]
192.168.20.116: [              81h] = rq_addr[ 8b]
192.168.20.116: [               0h] = rq_lun[ 2b]
192.168.20.116: [              38h] = rq_seq[ 6b]
192.168.20.116: IPMI Command Data:
192.168.20.116: ------------------
192.168.20.116: [              4Ah] = cmd[ 8b]
192.168.20.116: [               1h] = payload_type[ 8b]
192.168.20.116: IPMI Trailer:
192.168.20.116: -------------
192.168.20.116: [              54h] = checksum2[ 8b]
192.168.20.116: IPMI RMCPPLUS Session Trailer:
192.168.20.116: ------------------------------
192.168.20.116: [            FFFFh] = integrity_pad[16b]
192.168.20.116: [               2h] = pad_length[ 8b]
192.168.20.116: [               7h] = next_header[ 8b]
192.168.20.116: [  BYTE ARRAY ... ] = authentication_code[12B]
192.168.20.116: [ FBh F2h 1Ch C3h BCh 58h 96h 3Eh ]
192.168.20.116: [ 2Ah 65h 3Dh ACh ]
192.168.20.116: =====================================================
192.168.20.116: IPMI 2.0 Get Payload Activation Status Response
192.168.20.116: =====================================================
192.168.20.116: RMCP Header:
192.168.20.116: ------------
192.168.20.116: [               6h] = version[ 8b]

reply via email to

[Prev in Thread] Current Thread [Next in Thread]