1ipmitool(1) ipmitool(1)
2
3
4
6 ipmitool - utility for controlling IPMI-enabled devices
7
9 ipmitool [-c|-h|-d N|-v|-V] -I open <command>
10
11 ipmitool [-c|-h|-v|-V] -I lan -H <hostname>
12 [-p <port>]
13 [-U <username>]
14 [-A <authtype>]
15 [-L <privlvl>]
16 [-a|-E|-P|-f <password>]
17 [-o <oemtype>]
18 [-O <sel oem>]
19 [-e <esc_char>]
20 <command>
21
22 ipmitool [-c|-h|-v|-V] -I lanplus -H <hostname>
23 [-p <port>]
24 [-U <username>]
25 [-L <privlvl>]
26 [-a|-E|-P|-f <password>]
27 [-o <oemtype>]
28 [-O <sel oem>]
29 [-C <ciphersuite>]
30 [-K|-k <kg_key>]
31 [-y <hex_kg_key>]
32 [-e <esc_char>]
33 <command>
34
36 This program lets you manage Intelligent Platform Management Interface
37 (IPMI) functions of either the local system, via a kernel device
38 driver, or a remote system, using IPMI V1.5 and IPMI v2.0. These func‐
39 tions include printing FRU information, LAN configuration, sensor read‐
40 ings, and remote chassis power control.
41
42 IPMI management of a local system interface requires a compatible IPMI
43 kernel driver to be installed and configured. On Linux this driver is
44 called OpenIPMI and it is included in standard distributions. On
45 Solaris this driver is called BMC and is inclued in Solaris 10. Man‐
46 agement of a remote station requires the IPMI-over-LAN interface to be
47 enabled and configured. Depending on the particular requirements of
48 each system it may be possible to enable the LAN interface using ipmi‐
49 tool over the system interface.
50
52 -a Prompt for the remote server password.
53
54 -A <authtype>
55 Specify an authentication type to use during IPMIv1.5 lan ses‐
56 sion activation. Supported types are NONE, PASSWORD, MD2, MD5,
57 or OEM.
58
59 -c Present output in CSV (comma separated variable) format. This
60 is not available with all commands.
61
62 -e <sol_escape_char>
63 Use supplied character for SOL session escape character. The
64 default is to use ~ but this can conflict with ssh sessions.
65
66 -k <key>
67 Use supplied Kg key for IPMIv2 authentication. The default is
68 not to use any Kg key.
69
70 -y <hex key>
71 Use supplied Kg key for IPMIv2 authentication. The key is
72 expected in hexadecimal format and can be used to specify keys
73 with non-printable characters. E.g. '-k PASSWORD' and '-y
74 50415353574F5244' are equivalent. The default is not to use any
75 Kg key.
76
77 -C <ciphersuite>
78 The remote server authentication, integrity, and encryption
79 algorithms to use for IPMIv2 lanplus connections. See table
80 22-19 in the IPMIv2 specification. The default is 3 which spec‐
81 ifies RAKP-HMAC-SHA1 authentication, HMAC-SHA1-96 integrity, and
82 AES-CBC-128 encryption algorightms.
83
84 -E The remote server password is specified by the environment vari‐
85 able IPMI_PASSWORD.
86
87 -f <password_file>
88 Specifies a file containing the remote server password. If this
89 option is absent, or if password_file is empty, the password
90 will default to NULL.
91
92 -h Get basic usage help from the command line.
93
94 -H <address>
95 Remote server address, can be IP address or hostname. This
96 option is required for lan and lanplus interfaces.
97
98 -I <interface>
99 Selects IPMI interface to use. Supported interfaces that are
100 compiled in are visible in the usage help output.
101
102 -L <privlvl>
103 Force session privilege level. Can be CALLBACK, USER, OPERATOR,
104 ADMINISTRATOR. Default is ADMINISTRATOR.
105
106 -m <local_address>
107 Set the local IPMB address. The default is 0x20 and there
108 should be no need to change it for normal operation.
109
110 -o <oemtype>
111 Select OEM type to support. This usually involves minor hacks
112 in place in the code to work around quirks in various BMCs from
113 various manufacturers. Use -o list to see a list of current
114 supported OEM types.
115
116 -O <sel oem>
117 Open selected file and read OEM SEL event descriptions to be
118 used during SEL listings. See examples in contrib dir for file
119 format.
120
121 -p <port>
122 Remote server UDP port to connect to. Default is 623.
123
124 -P <password>
125 Remote server password is specified on the command line. If
126 supported it will be obscured in the process list. Note! Speci‐
127 fying the password as a command line option is not recommended.
128
129 -S <sdr_cache_file>
130 Use local file for remote SDR cache. Using a local SDR cache
131 can drastically increase performance for commands that require
132 knowledge of the entire SDR to perform their function. Local
133 SDR cache from a remote system can be created with the sdr dump
134 command.
135
136 -t <target_address>
137 Bridge IPMI requests to the remote target address.
138
139 -U <username>
140 Remote server username, default is NULL user.
141
142 -d N Use device number N to specify the /dev/ipmiN (or /dev/ipmi/N or
143 /dev/ipmidev/N) device to use for in-band BMC communication.
144 Used to target a specific BMC on a multi-node, multi-BMC system
145 through the ipmi device driver interface. Default is 0.
146
147 -v Increase verbose output level. This option may be specified
148 multiple times to increase the level of debug output. If given
149 three times you will get hexdumps of all incoming and outgoing
150 packets.
151
152 -V Display version information.
153
154
155 If no password method is specified then ipmitool will prompt the user
156 for a password. If no password is entered at the prompt, the remote
157 server password will default to NULL.
158
160 There are several security issues be be considered before enabling the
161 IPMI LAN interface. A remote station has the ability to control a sys‐
162 tem's power state as well as being able to gather certain platform
163 information. To reduce vulnerability it is strongly advised that the
164 IPMI LAN interface only be enabled in 'trusted' environments where sys‐
165 tem security is not an issue or where there is a dedicated secure 'man‐
166 agement network'.
167
168 Further it is strongly advised that you should not enable IPMI for
169 remote access without setting a password, and that that password should
170 not be the same as any other password on that system.
171
172 When an IPMI password is changed on a remote machine with the IPMIv1.5
173 lan interface the new password is sent across the network as clear
174 text. This could be observed and then used to attack the remote sys‐
175 tem. It is thus recommended that IPMI password management only be done
176 over IPMIv2.0 lanplus interface or the system interface on the local
177 station.
178
179 For IPMI v1.5, the maximum password length is 16 characters. Passwords
180 longer than 16 characters will be truncated.
181
182 For IPMI v2.0, the maximum password length is 20 characters; longer
183 passwords are truncated.
184
186 help This can be used to get command-line help on ipmitool com‐
187 mands. It may also be placed at the end of commands to get
188 option usage help.
189
190 ipmitool help
191 Commands:
192 raw Send a RAW IPMI request and print response
193 i2c Send an I2C Master Write-Read command and
194 print response
195 spd Print SPD info from remote I2C device
196 lan Configure LAN Channels
197 chassis Get chassis status and set power state
198 power Shortcut to chassis power commands
199 event Send events to MC
200 mc Management Controller status and global
201 enables
202 sdr Print Sensor Data Repository entries and
203 readings
204 sensor Print detailed sensor information
205 fru Print built-in FRU and scan for FRU loca‐
206 tors
207 sel Print System Event Log (SEL)
208 pef Configure Platform Event Filtering (PEF)
209 sol Configure and connect IPMIv2.0
210 Serial-over-LAN
211 tsol Configure and connect Tyan IPMIv1.5
212 Serial-over-LAN
213 isol Configure and connect Intel IPMIv1.5
214 Serial-over-LAN
215 user Configure Management Controller users
216 channel Configure Management Controller channels
217 session Print session information
218 sunoem Manage Sun OEM Extensions
219 kontronoem Manage Kontron OEM Extensions
220 picmg Run a PICMG/ATA extended command
221 firewall Configure Firmware Firewall
222 shell Launch interactive IPMI shell
223 exec Run list of commands from file
224 set Set runtime variable for shell and exec
225 echo Used to echo lines to stdout in scripts
226 ekanalyzer run FRU-Ekeying analyzer using FRU files
227
228 ipmitool chassis help
229 Chassis Commands: status, power, identify, policy,
230 restart_cause, poh, bootdev, bootparam, selftest
231
232 ipmitool chassis power help
233 chassis power Commands: status, on, off, cycle, reset, diag,
234 soft
235
236 bmc|mc
237
238 reset <warm|cold>
239
240 Instructs the BMC to perform a warm or cold reset.
241
242 guid
243
244 Display the Management Controller Globally Unique IDenti‐
245 fier.
246
247 info
248
249 Displays information about the BMC hardware, including
250 device revision, firmware revision, IPMI version sup‐
251 ported, manufacturer ID, and information on additional
252 device support.
253
254 watchdog
255
256 These commands allow a user to view and change the cur‐
257 rent state of the watchdog timer.
258
259 get
260
261 Show current Watchdog Timer settings and countdown
262 state.
263
264 reset
265
266 Reset the Watchdog Timer to its most recent state
267 and restart the countdown timer.
268
269 off
270
271 Turn off a currently running Watchdog countdown
272 timer.
273
274 selftest
275
276 Check on the basic health of the BMC by executing the Get
277 Self Test results command and report the results.
278
279 getenables
280
281 Displays a list of the currently enabled options for the
282 BMC.
283
284 setenables <option>=[on|off]
285
286 Enables or disables the given option. This command is
287 only supported over the system interface according to the
288 IPMI specification. Currently supported values for
289 option include:
290
291 recv_msg_intr
292
293 Receive Message Queue Interrupt
294
295 event_msg_intr
296
297 Event Message Buffer Full Interrupt
298
299 event_msg
300
301 Event Message Buffer
302
303 system_event_log
304
305 System Event Logging
306
307 oem0
308
309 OEM-Defined option #0
310
311 oem1
312
313 OEM-Defined option #1
314
315 oem2
316
317 OEM-Defined option #2
318
319 channel
320
321 authcap <channel number> <max priv>
322
323 Displays information about the authentication capabili‐
324 ties of the selected channel at the specified privilege
325 level.
326
327 Possible privilege levels are:
328 1 Callback level
329 2 User level
330 3 Operator level
331 4 Administrator level
332 5 OEM Proprietary level
333
334 info [channel number]
335
336 Displays information about the selected channel. If
337 no channel is given it will display information about the
338 currently used channel.
339
340 > ipmitool channel info
341 Channel 0xf info:
342 Channel Medium Type : System Interface
343 Channel Protocol Type : KCS
344 Session Support : session-less
345 Active Session Count : 0
346 Protocol Vendor ID : 7154
347
348 getaccess <channel number> [<userid>]
349
350 Configure the given userid as the default on the given
351 channel number. When the given channel is subsequently
352 used, the user is identified implicitly by the given
353 userid.
354
355 setaccess <channel number> <userid> [<callin=on|off>]
356 [<ipmi=on|off>] [<link=on|off>] [<privilege=level>]
357
358 Configure user access information on the given channel
359 for the given userid.
360
361 getciphers <ipmi|sol> [<channel>]
362
363 Displays the list of cipher suites supported for the
364 given application (ipmi or sol) on the given channel.
365
366 chassis
367
368 status
369
370 Displays information regarding the high-level status of
371 the system chassis and main power subsystem.
372
373 poh
374
375 This command will return the Power-On Hours counter.
376
377 identify <interval>
378
379 Control the front panel identify light. Default inter‐
380 val is 15 seconds. Use 0 to turn off. Use "force" to
381 turn on indefinitely.
382
383 restart_cause
384
385 Query the chassis for the cause of the last system
386 restart.
387
388 selftest
389
390 Check on the basic health of the BMC by executing the Get
391 Self Test results command and report the results.
392
393 policy
394
395 Set the chassis power policy in the event power fail‐
396 ure.
397
398 list
399
400 Return supported policies.
401
402 always-on
403
404 Turn on when power is restored.
405
406 previous
407
408 Returned to previous state when power is
409 restored.
410
411 always-off
412
413 Stay off after power is restored.
414
415 power
416
417 Performs a chassis control command to view and change
418 the power state.
419
420 status
421
422 Show current chassis power status.
423
424 on
425
426 Power up chassis.
427
428 off
429
430 Power down chassis into soft off (S4/S5 state).
431 WARNING: This command does not initiate a clean
432 shutdown of the operating system prior to powering
433 down the system.
434
435 cycle
436
437 Provides a power off interval of at least 1 sec‐
438 ond. No action should occur if chassis power is
439 in S4/S5 state, but it is recommended to check
440 power state first and only issue a power cycle
441 command if the system power is on or in lower
442 sleep state than S4/S5.
443
444 reset
445
446 This command will perform a hard reset.
447
448 diag
449
450 Pulse a diagnostic interrupt (NMI) directly to the
451 processor(s).
452
453 soft
454
455 Initiate a soft-shutdown of OS via ACPI. This can
456 be done in a number of ways, commonly by simulat‐
457 ing an overtemperture or by simulating a power
458 button press. It is necessary for there to be
459 Operating System support for ACPI and some sort of
460 daemon watching for events for this soft power to
461 work.
462
463 bootdev <device> [<clear-cmos=yes|no>] [<options=help,...>]
464
465 Request the system to boot from an alternate boot device
466 on next reboot. The clear-cmos option, if supplied, will
467 instruct the BIOS to clear its CMOS on the next reboot.
468 Various options may be used to modify the boot device
469 settings. Run "bootdev none options=help" for a list of
470 available boot device modifiers/options.
471
472
473 Currently supported values for <device> are:
474
475 none
476
477 Do not change boot device
478
479 pxe
480
481 Force PXE boot
482
483 disk
484
485 Force boot from BIOS default boot device
486
487 safe
488
489 Force boot from BIOS default boot device, request
490 Safe Mode
491
492 diag
493
494 Force boot from diagnostic partition
495
496 cdrom
497
498 Force boot from CD/DVD
499
500 bios
501
502 Force boot into BIOS setup
503
504 floppy
505
506 Force boot from Floppy/primary removable media
507
508 bootparam
509
510 Get or set various system boot option parameters.
511
512 get <param #>
513
514 Get boot parameter. Currently supported values for
515 <param #> are:
516
517 0 - Set In Progress
518
519 1 - Service Partition Selector
520
521 2 - Service Partition Scan
522
523 3 - BMC Boot Flag Valid Bit Clearing
524
525 4 - Boot Info Acknowledge
526
527 5 - Boot Flags
528
529 6 - Boot Initiator Info
530
531 7 - Boot Initiator Mailbox
532
533
534 set <option> [value ...]
535
536 Set boot parameter.
537
538
539 Currently supported values for <option> are:
540
541 force_pxe
542
543 Force PXE boot
544
545 force_disk
546
547 Force boot from default hard-drive
548
549 force_safe
550
551 Force boot from default hard-drive, request
552 Safe Mode
553
554 force_diag
555
556 Force boot from diagnostic partition
557
558 force_cdrom
559
560 Force boot from CD/DVD
561
562 force_bios
563
564 Force boot into BIOS setup
565
566
567 ekanalyzer <command> <xx=filename1> <xx=filename2> [<rc=filename3>] ...
568
569 NOTE : This command can support a maximum of 8 files per command
570 line
571
572 filename1 : binary file that stores FRU data of a Carrier or an
573 AMC module
574
575 filename2 : binary file that stores FRU data of an AMC module.
576 These binary files can be generated from command:
577 ipmitool fru read <id> <filename>
578
579 filename3 : configuration file used for configuring On-Carrier
580 Device ID
581 or OEM GUID. This file is optional.
582
583 xx : indicates the type of the file. It can take the following
584 value:
585
586 oc : On-Carrier device
587
588 a1 : AMC slot A1
589
590 a2 : AMC slot A2
591
592 a3 : AMC slot A3
593
594 a4 : AMC slot A4
595
596 b1 : AMC slot B1
597
598 b2 : AMC slot B2
599
600 b3 : AMC slot B3
601
602 b4 : AMC slot B4
603
604 sm : Shelf Manager
605
606
607 The available commands for ekanalyzer are:
608
609
610 print [<carrier | power | all>]
611
612 carrier (default) <oc=filename1> <oc=filename2> ...
613
614 Display point to point physical connectivity
615 between carriers and AMC modules.
616 Example:
617 > ipmitool ekanalyzer print carrier oc=fru
618 oc=carrierfru
619 From Carrier file: fru
620 Number of AMC bays supported by Carrier: 2
621 AMC slot B1 topology:
622 Port 0 =====> On Carrier Device ID 0,
623 Port 16
624 Port 1 =====> On Carrier Device ID 0,
625 Port 12
626 Port 2 =====> AMC slot B2, Port 2
627 AMC slot B2 topology:
628 Port 0 =====> On Carrier Device ID 0,
629 Port 3
630 Port 2 =====> AMC slot B1, Port 2
631 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
632 From Carrier file: carrierfru
633 On Carrier Device ID 0 topology:
634 Port 0 =====> AMC slot B1, Port 4
635 Port 1 =====> AMC slot B1, Port 5
636 Port 2 =====> AMC slot B2, Port 6
637 Port 3 =====> AMC slot B2, Port 7
638 AMC slot B1 topology:
639 Port 0 =====> AMC slot B2, Port 0
640 AMC slot B1 topology:
641 Port 1 =====> AMC slot B2, Port 1
642 Number of AMC bays supported by Carrier: 2
643
644
645 power <xx=filename1> <xx=filename2> ...
646
647 Display power supply informations between carrier
648 and AMC modules.
649
650 all <xx=filename> <xx=filename> ...
651
652 Display both physical connectivity and power sup‐
653 ply of each carrier and AMC modules.
654
655
656 frushow <xx=filename>
657 Convert a binary FRU file into human readable text for‐
658 mat. Use -v option to get more display information.
659
660
661 summary [<match | unmatch | all>]
662
663 match (default) <xx=filename> <xx=filename> ...
664 Display only matched results of Ekeying match
665 between an On-Carrier device and an AMC module or
666 between 2 AMC modules. Example:
667 > ipmitool ekanalyzer summary match oc=fru
668 b1=amcB1 a2=amcA2
669 On-Carrier Device vs AMC slot B1
670 AMC slot B1 port 0 ==> On-Carrier Device 0 port
671 16
672 Matching Result
673 - From On-Carrier Device ID 0
674 -Channel ID 11 || Lane 0: enable
675 -Link Type: AMC.2 Ethernet
676 -Link Type extension: 1000BASE-BX (SerDES
677 Gigabit) Ethernet link
678 -Link Group ID: 0 || Link Asym. Match: exact
679 match
680 - To AMC slot B1
681 -Channel ID 0 || Lane 0: enable
682 -Link Type: AMC.2 Ethernet
683 -Link Type extension: 1000BASE-BX (SerDES
684 Gigabit) Ethernet link
685 -Link Group ID: 0 || Link Asym. Match: exact
686 match
687 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
688 AMC slot B1 port 1 ==> On-Carrier Device 0 port
689 12
690 Matching Result
691 - From On-Carrier Device ID 0
692 -Channel ID 6 || Lane 0: enable
693 -Link Type: AMC.2 Ethernet
694 -Link Type extension: 1000BASE-BX (SerDES
695 Gigabit) Ethernet link
696 -Link Group ID: 0 || Link Asym. Match: exact
697 match
698 - To AMC slot B1
699 -Channel ID 1 || Lane 0: enable
700 -Link Type: AMC.2 Ethernet
701 -Link Type extension: 1000BASE-BX (SerDES
702 Gigabit) Ethernet link
703 -Link Group ID: 0 || Link Asym. Match: exact
704 match
705 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
706 On-Carrier Device vs AMC slot A2
707 AMC slot A2 port 0 ==> On-Carrier Device 0 port
708 3
709 Matching Result
710 - From On-Carrier Device ID 0
711 -Channel ID 9 || Lane 0: enable
712 -Link Type: AMC.2 Ethernet
713 -Link Type extension: 1000BASE-BX (SerDES
714 Gigabit) Ethernet link
715 -Link Group ID: 0 || Link Asym. Match: exact
716 match
717 - To AMC slot A2
718 -Channel ID 0 || Lane 0: enable
719 -Link Type: AMC.2 Ethernet
720 -Link Type extension: 1000BASE-BX (SerDES
721 Gigabit) Ethernet link
722 -Link Group ID: 0 || Link Asym. Match: exact
723 match
724 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
725 AMC slot B1 vs AMC slot A2
726 AMC slot A2 port 2 ==> AMC slot B1 port 2
727 Matching Result
728 - From AMC slot B1
729 -Channel ID 2 || Lane 0: enable
730 -Link Type: AMC.3 Storage
731 -Link Type extension: Serial Attached SCSI
732 (SAS/SATA)
733 -Link Group ID: 0 || Link Asym. Match: FC or
734 SAS interface {exact match}
735 - To AMC slot A2
736 -Channel ID 2 || Lane 0: enable
737 -Link Type: AMC.3 Storage
738 -Link Type extension: Serial Attached SCSI
739 (SAS/SATA)
740 -Link Group ID: 0 || Link Asym. Match: FC or
741 SAS interface {exact match}
742 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
743
744 unmatch <xx=filename> <xx=filename> ...
745
746 Display the unmatched results of Ekeying match
747 between an On-Carrier device and an AMC module or
748 between 2 AMC modules
749
750 all <xx=filename> <xx=filename> ...
751
752 Display both matched result and unmatched results
753 of Ekeying match between two cards or two modules.
754
755 event
756
757 <predefined event number N>
758
759 Send a pre-defined test event to the System Event Log.
760 The following events are included as a means to test the
761 functionality of the System Event Log component of the
762 BMC (an entry will be added each time the event N command
763 is executed).
764
765 Currently supported values for N are:
766 1 Temperature: Upper Critical: Going High
767 2 Voltage Threshold: Lower Critical: Going Low
768 3 Memory: Correctable ECC
769
770 NOTE: These pre-defined events will likely not produce
771 "accurate" SEL records for a particular system because
772 they will not be correctly tied to a valid sensor number,
773 but they are sufficient to verify correct operation of
774 the SEL.
775
776
777 file <filename>
778
779 Event log records specified in <filename> will be added
780 to the System Event Log.
781
782 The format of each line in the file is as follows:
783
784 <{EvM Revision} {Sensor Type} {Sensor Num} {Event
785 Dir/Type} {Event Data 0} {Event Data 1} {Event Data 2}>[#
786 COMMENT]
787
788 e.g.: 0x4 0x2 0x60 0x1 0x52 0x0 0x0 # Voltage threshold:
789 Lower Critical: Going Low
790
791 EvM Revision - The "Event Message Revision" is 0x04 for
792 messages that comply with the IPMI 2.0 Specification and
793 0x03 for messages that comply with the IPMI 1.0 Specifi‐
794 cation.
795
796 Sensor Type - Indicates the Event Type or Class.
797
798 Sensor Num - Represents the 'sensor' within the manage‐
799 ment controller that generated the Event Message.
800
801 Event Dir/Type - This field is encoded with the event
802 direction as the high bit (bit 7) and the event type as
803 the low 7 bits. Event direction is 0 for an assertion
804 event and 1 for a deassertion event.
805
806 See the IPMI 2.0 specification for further details on the
807 definitions for each field.
808
809
810 <sensorid> <list>
811
812 Get a list of all the possible Sensor States and pre-
813 defined Sensor State Shortcuts available for a particular
814 sensor. sensorid is the character string representation
815 of the sensor and must be enclosed in double quotes if it
816 includes white space. Several different commands includ‐
817 ing ipmitool sensor list may be used to obtain a list
818 that includes the sensorid strings representing the sen‐
819 sors on a given system.
820
821 > ipmitool -I open event "PS 2T Fan Fault" list
822 Finding sensor PS 2T Fan Fault... ok
823 Sensor States:
824 State Deasserted
825 State Asserted
826 Sensor State Shortcuts:
827 present absent
828 assert deassert
829 limit nolimit
830 fail nofail
831 yes no
832 on off
833 up down
834
835
836 <sensorid> <sensor state> [<direction>]
837
838 Generate a custom event based on existing sensor informa‐
839 tion. The optional event direction can be either assert
840 (the default) or deassert.
841
842
843 > ipmitool event "PS 2T Fan Fault" "State Asserted"
844 Finding sensor PS 2T Fan Fault... ok
845 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault |
846 State Asserted
847
848 > ipmitool event "PS 2T Fan Fault" "State Deasserted"
849 Finding sensor PS 2T Fan Fault... ok
850 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault |
851 State Desserted
852
853 exec <filename>
854
855 Execute ipmitool commands from filename. Each line is a com‐
856 plete command. The syntax of the commands are defined by the
857 COMMANDS section in this manpage. Each line may have an
858 optional comment at the end of the line, delimited with a `#'
859 symbol.
860
861 e.g., a command file with two lines:
862
863 sdr list # get a list of sdr records
864 sel list # get a list of sel records
865
866 fru
867
868 print
869
870 Read all Field Replaceable Unit (FRU) inventory data
871 and extract such information as serial number, part num‐
872 ber, asset tags, and short strings describing the chas‐
873 sis, board, or product.
874
875 read <fru id> <fru file>
876
877 fru id is the digit ID of the FRU (see output of 'fru
878 print'). fru file is the absolute pathname of a file in
879 which to dump the binary FRU data pertaining to the spec‐
880 ified FRU entity.
881
882 write <fru id> <fru file>
883
884 fru id is the digit ID of the FRU (see output of 'fru
885 print'). fru file is the absolute pathname of a file
886 from which to pull the binary FRU data before uploading
887 it to the specified FRU.
888
889 upgEkey <fru id> <fru file>
890
891 Update a multirecord FRU location. fru id is the digit
892 ID of the FRU (see output of 'fru print'). fru file is
893 the absolute pathname of a file from which to pull the
894 binary FRU data to upload into the specified multirecord
895 FRU entity.
896
897
898 edit <fru id>
899
900 This command provides interactive editing of some sup‐
901 ported records, namely PICMG Carrier Activation Record.
902 fru id is the digit ID of the FRU (see output of 'fru
903 print'); default is 0.
904
905
906 edit <fru id> field <section> <index> <string>
907
908 This command may be used to set a field string to a new
909 value. It replaces the FRU data found at index in the
910 specified section with the supplied string.
911
912
913 fru id is the digit ID of the FRU (see output of 'fru
914 print').
915
916
917 <section> is a string which refers to FRU Inventory
918 Information
919 Storage Areas and may be refer to:
920
921 c FRU Inventory Chassis Info Area
922
923 b FRU Inventory Board Info Area
924
925 p FRU Inventory Product Info Area
926
927
928 <index> specifies the field number. Field numbering
929 starts on the first 'english text' field type. For
930 instance in the <board> info area field '0' is <Board
931 Manufacturer> and field '2' is <Board Serial Number>; see
932 IPMI Platform Management FRU Information Storage Defini‐
933 tion v1.0 R1.1 for field locations.
934
935
936 <string> must be the same length as the string being
937 replaced and must be 8-bit ASCII (0xCx).
938
939
940
941 edit <fru id> oem iana <record> <format> [<args>]
942
943 This command edits the data found in the multirecord
944 area. Support for OEM specific records is limited.
945
946 firewall
947
948 This command supports the Firmware Firewall capability. It may
949 be used to add or remove security-based restrictions on certain
950 commands/command sub-functions or to list the current firmware
951 firewall restrictions set on any commands. For each firmware
952 firewall command listed below, parameters may be included to
953 cause the command to be executed with increasing granularity on
954 a specific LUN, for a specific NetFn, for a specific IPMI Com‐
955 mand, and finally for a specific command's sub-function (see Ap‐
956 pendix H in the IPMI 2.0 Specification for a listing of any sub-
957 function numbers that may be associated with a particular com‐
958 mand).
959
960 Parameter syntax and dependencies are as follows:
961
962 [<channel H>] [<lun L> [ <netfn N> [<command C [<subfn S>]]]]
963
964 Note that if "netfn <N>" is specified, then "lun <L>" must also
965 be specified; if "command <C>" is specified, then "netfn <N>"
966 (and therefore "lun <L>") must also be specified, and so forth.
967
968 "channel <H>" is an optional and standalone parameter. If not
969 specified, the requested operation will be performed on the cur‐
970 rent channel. Note that command support may vary from channel
971 to channel.
972
973 Firmware firewall commands:
974
975 info [<Parms as described above>]
976
977 List firmware firewall information for the specified LUN,
978 NetFn, and Command (if supplied) on the current or speci‐
979 fied channel. Listed information includes the support,
980 configurable, and enabled bits for the specified command
981 or commands.
982
983 Some usage examples:
984
985 info [<channel H>] [<lun L>]
986
987 This command will list firmware firewall informa‐
988 tion for all NetFns for the specified LUN on
989 either the current or the specified channel.
990
991 info [<channel H>] [<lun L> [ <netfn N> ]
992
993 This command will print out all command informa‐
994 tion for a single LUN/NetFn pair.
995
996 info [<channel H>] [<lun L> [ <netfn N> [<command C] ]]
997
998 This prints out detailed, human-readable informa‐
999 tion showing the support, configurable, and
1000 enabled bits for the specified command on the
1001 specified LUN/NetFn pair. Information will be
1002 printed about each of the command subfunctions.
1003
1004 info [<channel H>] [<lun L> [ <netfn N> [<command C
1005 [<subfn S>]]]]
1006
1007 Print out information for a specific sub-function.
1008
1009 enable [<Parms as described above>]
1010
1011 This command is used to enable commands for a given
1012 NetFn/LUN combination on the specified channel.
1013
1014 disable [<Parms as described above>] [force]
1015
1016 This command is used to disable commands for a given
1017 NetFn/LUN combination on the specified channel. Great
1018 care should be taken if using the "force" option so as
1019 not to disable the "Set Command Enables" command.
1020
1021 reset [<Parms as described above>]
1022
1023 This command may be used to reset the firmware firewall
1024 back to a state where all commands and command sub-func‐
1025 tions are enabled.
1026
1027
1028
1029 i2c <i2caddr> <read bytes> [<write data>]
1030
1031 This command may be used to execute raw I2C commands with the
1032 Master Write-Read IPMI command.
1033
1034
1035 isol
1036
1037 info
1038
1039 Retrieve information about the Intel IPMI v1.5
1040 Serial-Over-LAN configuration.
1041
1042 set <parameter> <value>
1043
1044 Configure parameters for Intel IPMI v1.5 Serial-over-LAN.
1045
1046 Valid parameters and values are:
1047
1048 enabled
1049 true, false.
1050
1051 privilege-level
1052 user, operator, admin, oem.
1053
1054 bit-rate
1055 9.6, 19.2, 38.4, 57.6, 115.2.
1056
1057 activate
1058
1059 Causes ipmitool to enter Intel IPMI v1.5 Serial Over LAN
1060 mode. An RMCP+ connection is made to the BMC, the termi‐
1061 nal is set to raw mode, and user input is sent to the
1062 serial console on the remote server. On exit, the the SOL
1063 payload mode is deactivated and the terminal is reset to
1064 its original settings.
1065
1066 Special escape sequences are provided to control the SOL
1067 session:
1068
1069 ~. Terminate connection
1070
1071 ~^Z Suspend ipmitool
1072
1073 ~^X Suspend ipmitool, but don't restore tty
1074 on restart
1075
1076 ~B Send break
1077
1078 ~~ Send the escape character by typing it
1079 twice
1080
1081 ~? Print the supported escape sequences
1082
1083 Note that escapes are only recognized immediately after
1084 newline.
1085
1086
1087 kontronoem
1088
1089 OEM commands specific to Kontron devices.
1090
1091 setsn
1092
1093 Set FRU serial number.
1094
1095 setmfgdate
1096
1097 Set FRU manufacturing date.
1098
1099 nextboot <boot device>
1100
1101 Select the next boot order on the Kontron CP6012.
1102
1103 lan
1104
1105 These commands will allow you to configure IPMI LAN channels
1106 with network information so they can be used with the ipmitool
1107 lan and lanplus interfaces. NOTE: To determine on which channel
1108 the LAN interface is located, issue the `channel info number'
1109 command until you come across a valid 802.3 LAN channel. For
1110 example:
1111
1112 > ipmitool -I open channel info 1
1113 Channel 0x1 info:
1114 Channel Medium Type : 802.3 LAN
1115 Channel Protocol Type : IPMB-1.0
1116 Session Support : session-based
1117 Active Session Count : 8
1118 Protocol Vendor ID : 7154
1119
1120
1121 print [<channel>]
1122
1123 Print the current configuration for the given chan‐
1124 nel. The default will print information on the first
1125 found LAN channel.
1126
1127 set <channel number> <command> <parameter>
1128
1129 Set the given command and parameter on the specified
1130 channel. Valid command/parameter options are:
1131
1132 ipaddr <x.x.x.x>
1133
1134 Set the IP address for this channel.
1135
1136 netmask <x.x.x.x>
1137
1138 Set the netmask for this channel.
1139
1140 macaddr <xx:xx:xx:xx:xx:xx>
1141
1142 Set the MAC address for this channel.
1143
1144 defgw ipaddr <x.x.x.x>
1145
1146 Set the default gateway IP address.
1147
1148 defgw macaddr <xx:xx:xx:xx:xx:xx>
1149
1150 Set the default gateway MAC address.
1151
1152 bakgw ipaddr <x.x.x.x>
1153
1154 Set the backup gateway IP address.
1155
1156 bakgw macaddr <xx:xx:xx:xx:xx:xx>
1157
1158 Set the backup gateway MAC address.
1159
1160 password <pass>
1161
1162 Set the null user password.
1163
1164 snmp <community string>
1165
1166 Set the SNMP community string.
1167
1168 user
1169
1170 Enable user access mode for userid 1 (issue the
1171 `user' command to display information about
1172 userids for a given channel).
1173
1174 access <on|off>
1175
1176 Set LAN channel access mode.
1177
1178 alert <on|off>
1179
1180 Enable or disable PEF alerting for this channel.
1181
1182 ipsrc <source>
1183
1184 Set the IP address source:
1185 none unspecified
1186 static manually configured static IP address
1187 dhcp address obtained by BMC running DHCP
1188 bios address loaded by BIOS or system software
1189
1190 arp respond <on|off>
1191
1192 Set BMC generated ARP responses.
1193
1194 arp generate <on|off>
1195
1196 Set BMC generated gratuitous ARPs.
1197
1198 arp interval <seconds>
1199
1200 Set BMC generated gratuitous ARP interval.
1201
1202 vlan id <off|id>
1203
1204 Disable VLAN operation or enable VLAN and set the
1205 ID.
1206 ID: value of the virtual lan identifier between 1
1207 and 4094 inclusive.
1208
1209 vlan priority <priority>
1210
1211 Set the priority associated with VLAN frames.
1212 ID: priority of the virtual lan frames between 0
1213 and 7 inclusive.
1214
1215 auth <level,...> <type,...>
1216
1217 Set the valid authtypes for a given auth
1218 level.
1219 Levels: callback, user, operator, admin
1220 Types: none, md2, md5, password, oem
1221
1222 cipher_privs <privlist>
1223
1224 Correlates cipher suite numbers with the maximum
1225 privilege level that is allowed to use it. In
1226 this way, cipher suites can restricted to users
1227 with a given privilege level, so that, for exam‐
1228 ple, administrators are required to use a stronger
1229 cipher suite than normal users.
1230
1231 The format of privlist is as follows. Each char‐
1232 acter represents a privilege level and the charac‐
1233 ter position identifies the cipher suite number.
1234 For example, the first character represents cipher
1235 suite 1 (cipher suite 0 is reserved), the second
1236 represents cipher suite 2, and so on. privlist
1237 must be 15 characters in length.
1238
1239 Characters used in privlist and their associated
1240 privilege levels are:
1241
1242 X Cipher Suite Unused
1243 c CALLBACK
1244 u USER
1245 o OPERATOR
1246 a ADMIN
1247 O OEM
1248
1249 So, to set the maximum privilege for cipher suite
1250 1 to USER and suite 2 to ADMIN, issue the follow‐
1251 ing command:
1252
1253 > ipmitool -I interface lan set channel
1254 cipher_privs uaXXXXXXXXXXXXX
1255
1256
1257 alert print [<channel>] [<alert destination>]
1258
1259 Print alert information for the specified channel and
1260 destination. The default will print all alerts for all
1261 alert destinations on the first found LAN channel.
1262
1263
1264 alert set <channel number> <alert destination> <command> <param‐
1265 eter>
1266
1267 Set an alert on the given LAN channel and destination.
1268 Alert Destinations are listed via the 'lan alert print'
1269 command. Valid command/parameter options are:
1270
1271 ipaddr <x.x.x.x>
1272
1273 Set alert IP address.
1274
1275 macaddr <xx:xx:xx:xx:xx:xx>
1276
1277 Set alert MAC address.
1278
1279 gateway <default | backup>
1280
1281 Set the channel gateway to use for alerts.
1282
1283 ack <on | off>
1284
1285 Set Alert Acknowledge on or off.
1286
1287 type <pet | oem1 | oem2>
1288
1289 Set the destination type as PET or OEM.
1290
1291 time <seconds>
1292
1293 Set ack timeout or unack retry interval.
1294
1295 retry <number>
1296
1297 Set the number of alert retries.
1298
1299 stats get [<channel number>]
1300
1301 Retrieve information about the IP connections on the
1302 specified channel. The default will retrieve statistics
1303 on the first found LAN channel.
1304
1305 stats clear [<channel number>]
1306
1307 Clear all IP/UDP/RMCP Statistics to 0 on the specified
1308 channel. The default will clear statistics on the first
1309 found LAN channel.
1310
1311 pef
1312
1313 info
1314
1315 This command will query the BMC and print information
1316 about the PEF supported features.
1317
1318 status
1319
1320 This command prints the current PEF status (the last SEL
1321 entry processed by the BMC, etc).
1322
1323 policy
1324
1325 This command lists the PEF policy table entries. Each
1326 policy entry describes an alert destination. A policy
1327 set is a collection of table entries. PEF alert actions
1328 reference policy sets.
1329
1330 list
1331
1332 This command lists the PEF table entries. Each PEF entry
1333 relates a sensor event to an action. When PEF is active,
1334 each platform event causes the BMC to scan this table for
1335 entries matching the event, and possible actions to be
1336 taken. Actions are performed in priority order (higher
1337 criticality first).
1338
1339 picmg <properties>
1340
1341 Run a PICMG/ATA extended command. Get PICMG properties may be
1342 used to obtain and print Extension major version information,
1343 PICMG identifier, FRU Device ID and Max FRU Device ID.
1344
1345 addrinfo
1346
1347 Get address information. This command may return infor‐
1348 mation on the Hardware address, IPMB-0 Address, FRU ID,
1349 Site/Entity ID, and Site/Entity Type.
1350
1351 frucontrol <fru id> <options>
1352
1353 Set various control options:
1354
1355 0x00 - Cold Reset
1356
1357 0x01 - Warm Reset
1358
1359 0x02 - Graceful Reboot
1360
1361 0x03 - Issue Diagnostic Interrupt
1362
1363 0x04 - Quiesce [AMC only]
1364
1365 0x05-0xFF - Cold Reset
1366
1367 activate <fru id>
1368
1369 Activate the specified FRU.
1370
1371 deactivate <fru id>
1372
1373 Deactivate the specified FRU.
1374
1375 policy get <fru id>
1376
1377 Get FRU activation policy.
1378
1379 policy set <fru id> <lockmask> <lock>
1380
1381 Set FRU activation policy. lockmask is 1 or 0 to indi‐
1382 cate action on the deactivation or activation locked bit
1383 respectively. lock is 1 or 0 to set/clear locked bit.
1384
1385 portstate set|getall|getgranted|getdenied <parameters>
1386
1387 Get or set various port states. See usage for parameter
1388 details.
1389
1390
1391 power <chassis power command>
1392
1393 Shortcut to the chassis power commands. See the chassis power
1394 commands for usage information.
1395
1396
1397 raw <netfn> <cmd> [<data>]
1398
1399 This will allow you to execute raw IPMI commands. For example
1400 to query the POH counter with a raw command:
1401
1402 > ipmitool -v raw 0x0 0xf
1403 RAW REQ (netfn=0x0 cmd=0xf data_len=0)
1404 RAW RSP (5 bytes)
1405 3c 72 0c 00 00
1406
1407 sdr
1408
1409 get <id> ... [<id>]
1410
1411 Prints information for sensor data records specified by
1412 sensor id.
1413
1414 info
1415
1416 This command will query the BMC for Sensor Data Record
1417 (SDR) Repository information.
1418
1419 type [<sensor type>]
1420
1421 This command will display all records from the SDR Repos‐
1422 itory of a specific type. Run with type list (or simply
1423 with no type) to see the list of available types. For
1424 example to query for all Temperature sensors:
1425
1426 > ipmitool sdr type Temperature
1427 Baseboard Temp | 30h | ok | 7.1 | 28 degrees C
1428 FntPnl Amb Temp | 32h | ok | 12.1 | 24 degrees C
1429 Processor1 Temp | 98h | ok | 3.1 | 57 degrees C
1430 Processor2 Temp | 99h | ok | 3.2 | 53 degrees C
1431
1432
1433 list | elist [<all|full|compact|event|mcloc|fru|generic>]
1434
1435 This command will read the Sensor Data Records (SDR) and
1436 extract sensor information of a given type, then query
1437 each sensor and print its name, reading, and status. If
1438 invoked as elist then it will also print sensor number,
1439 entity id and instance, and asserted discrete states.
1440
1441 The default output will only display full and compact
1442 sensor types, to see all sensors use the all type with
1443 this command.
1444
1445 Valid types are:
1446
1447 all
1448
1449 All SDR records (Sensor and Locator)
1450
1451 full
1452
1453 Full Sensor Record
1454
1455 compact
1456
1457 Compact Sensor Record
1458
1459 event
1460
1461 Event-Only Sensor Record
1462
1463 mcloc
1464
1465 Management Controller Locator Record
1466
1467 fru
1468
1469 FRU Locator Record
1470
1471 generic
1472
1473 Generic SDR records
1474
1475 entity <id>[.<instance>]
1476
1477 Displays all sensors associated with an entity. Get a
1478 list of valid entity ids on the target system by issuing
1479 the sdr elist command. A list of all entity ids can be
1480 found in the IPMI specifications.
1481
1482 dump <file>
1483
1484 Dumps raw SDR data to a file. This data file can then be
1485 used as a local SDR cache of the remote managed system
1486 with the -S <file> option on the ipmitool command line.
1487 This can greatly improve performance over system inter‐
1488 face or remote LAN.
1489
1490 fill sensors
1491
1492 Create the SDR Repository for the current configuration.
1493 Will perform a 'Clear SDR Repository' command so be care‐
1494 ful.
1495
1496 fill file <filename>
1497
1498 Fill the SDR Repository using records stored in a binary
1499 data file. Will perform a 'Clear SDR Repository' command
1500 so be careful.
1501
1502 sel
1503
1504 NOTE: System Event Log (SEL) entry-times are displayed as
1505 `Pre-Init Time-stamp' if the SEL clock needs to be set. Ensure
1506 that the SEL clock is accurate by invoking the sel time get and
1507 sel time set <time string> commands.
1508
1509 info
1510
1511 This command will query the BMC for information about the
1512 System Event Log (SEL) and its contents.
1513
1514 clear
1515
1516 This command will clear the contents of the SEL. It can‐
1517 not be undone so be careful.
1518
1519 list | elist
1520
1521 When this command is invoked without arguments, the
1522 entire contents of the System Event Log are displayed.
1523 If invoked as elist (extended list) it will also use the
1524 Sensor Data Record entries to display the sensor ID for
1525 the sensor that caused each event. Note this can take a
1526 long time over the system interface.
1527
1528
1529 <count> | first <count>
1530
1531 Displays the first count (least-recent) entries in
1532 the SEL. If count is zero, all entries are dis‐
1533 played.
1534
1535 last <count>
1536
1537 Displays the last count (most-recent) entries in
1538 the SEL. If count is zero, all entries are dis‐
1539 played.
1540
1541 delete <SEL Record ID> ... <SEL Record ID>
1542
1543 Delete one or more SEL event records.
1544
1545 add <filename ID>
1546
1547 Read event entries from a file and add them to the SEL.
1548 New SEL entries area added onto the SEL after the last
1549 record in the SEL. Record added is of type 2 and is
1550 automatically timestamped.
1551
1552 get <SEL Record ID>
1553
1554 Print information on the specified SEL Record entry.
1555
1556 save <file>
1557
1558 Save SEL records to a text file that can be fed back into
1559 the event file ipmitool command. This can be useful for
1560 testing Event generation by building an appropriate Plat‐
1561 form Event Message file based on existing events. Please
1562 see the available help for the 'event file ...' command
1563 for a description of the format of this file.
1564
1565 writeraw <file>
1566
1567 Save SEL records to a file in raw, binary format. This
1568 file can be fed back to the sel readraw ipmitool command
1569 for viewing.
1570
1571 readraw <file>
1572
1573 Read and display SEL records from a binary file. Such a
1574 file can be created using the sel writeraw ipmitool com‐
1575 mand.
1576
1577 time
1578
1579 get
1580 Displays the SEL clock's current time.
1581
1582 set <time string>
1583
1584 Sets the SEL clock. Future SEL entries will use
1585 the time set by this command. <time string> is of
1586 the form "MM/DD/YYYY HH:MM:SS". Note that hours
1587 are in 24-hour form. It is recommended that the
1588 SEL be cleared before setting the time.
1589
1590 sensor
1591
1592 list
1593
1594 Lists sensors and thresholds in a wide table format.
1595
1596 get <id> ... [<id>]
1597
1598 Prints information for sensors specified by name.
1599
1600 thresh <id> <threshold> <setting>
1601
1602 This allows you to set a particular sensor threshold
1603 value. The sensor is specified by name.
1604
1605 Valid thresholds are:
1606 unr Upper Non-Recoverable
1607 ucr Upper Critical
1608 unc Upper Non-Critical
1609 lnc Lower Non-Critical
1610 lcr Lower Critical
1611 lnr Lower Non-Recoverable
1612
1613 thresh <id> lower <lnr> <lcr> <lnc>
1614
1615 This allows you to set all lower thresholds for a sensor
1616 at the same time. The sensor is specified by name and
1617 the thresholds are listed in order of Lower Non-Recover‐
1618 able, Lower Critical, and Lower Non-Critical.
1619
1620 thresh <id> upper <unc> <ucr> <unr>
1621
1622 This allows you to set all upper thresholds for a sensor
1623 at the same time. The sensor is specified by name and
1624 the thresholds are listed in order of Upper Non-Critical,
1625 Upper Critical, and Upper Non-Recoverable.
1626
1627 session
1628
1629 info <active|all|id 0xnnnnnnnn|handle 0xnn>
1630
1631 Get information about the specified session(s). You may
1632 identify sessions by their id, by their handle number, by
1633 their active status, or by using the keyword `all' to
1634 specify all sessions.
1635
1636 shell
1637 This command will launch an interactive shell which you can use
1638 to send multiple ipmitool commands to a BMC and see the
1639 responses. This can be useful instead of running the full ipmi‐
1640 tool command each time. Some commands will make use of a Sensor
1641 Data Record cache and you will see marked improvement in speed
1642 if these commands are able to reuse the same cache in a shell
1643 session. LAN sessions will send a periodic keepalive command to
1644 keep the IPMI session from timing out.
1645
1646 sol
1647
1648 info [<channel number>]
1649
1650 Retrieve information about the Serial-Over-LAN configura‐
1651 tion on the specified channel. If no channel is given,
1652 it will display SOL configuration data for the currently
1653 used channel.
1654
1655 payload <enable | disable | status> <channel number> <userid>
1656
1657 Enable, disable or show status of SOL payload for the
1658 user on the specified channel.
1659
1660 set <parameter> <value> [<channel>]
1661
1662 Configure parameters for Serial Over Lan. If no channel
1663 is given, it will display SOL configuration data for the
1664 currently used channel. Configuration parameter updates
1665 are automatically guarded with the updates to the
1666 set-in-progress parameter.
1667
1668 Valid parameters and values are:
1669
1670 set-in-progress
1671 set-complete set-in-progress commit-write
1672
1673 enabled
1674 true false
1675
1676 force-encryption
1677 true false
1678
1679 force-authentication
1680 true false
1681
1682 privilege-level
1683 user operator admin oem
1684
1685 character-accumulate-level
1686 Decimal number given in 5 milliseconds increments
1687
1688 character-send-threshold
1689 Decimal number
1690
1691 retry-count
1692 Decimal number. 0 indicates no retries after
1693 packet is transmitted.
1694
1695 retry-interval
1696 Decimal number in 10 millisend increments. 0
1697 indicates that retries should be sent back to
1698 back.
1699
1700 non-volatile-bit-rate
1701 serial, 19.2, 38.4, 57.6, 115.2. Setting this
1702 value to serial indicates that the BMC should use
1703 the setting used by the IPMI over serial channel.
1704
1705 volatile-bit-rate
1706 serial, 19.2, 38.4, 57.6, 115.2. Setting this
1707 value to serial indiates that the BMC should use
1708 the setting used by the IPMI over serial channel.
1709
1710 activate [usesolkeepalive | nokeepalive]
1711
1712 Causes ipmitool to enter Serial Over LAN mode, and is
1713 only available when using the lanplus interface. An
1714 RMCP+ connection is made to the BMC, the terminal is set
1715 to raw mode, and user input is sent to the serial console
1716 on the remote server. On exit,the the SOL payload mode
1717 is deactivated and the terminal is reset to its original
1718 settings.
1719
1720 Special escape sequences are provided to control the SOL
1721 session:
1722
1723 ~. Terminate connection
1724
1725 ~^Z Suspend ipmitool
1726
1727 ~^X Suspend ipmitool, but don't restore tty on
1728 restart
1729
1730 ~B Send break
1731
1732 ~~ Send the escape character by typing it twice
1733
1734 ~? Print the supported escape sequences
1735
1736 Note that escapes are only recognized immediately after
1737 newline.
1738
1739 deactivate
1740
1741 Deactivates Serial Over LAN mode on the BMC. Exiting
1742 Serial Over LAN mode should automatically cause this com‐
1743 mand to be sent to the BMC, but in the case of an unin‐
1744 tentional exit from SOL mode, this command may be neces‐
1745 sary to reset the state of the BMC.
1746
1747 spd <i2cbus> <i2caddr> [<channel>] [<axread>]
1748
1749 This command may be used to read SPD (Serial Presence Detect)
1750 data using the I2C Master Write-Read IPMI command.
1751
1752
1753 sunoem
1754
1755 led
1756
1757 These commands provide a way to get and set the status of
1758 LEDs on a Sun Microsystems server. Use 'sdr list
1759 generic' to get a list of devices that are controllable
1760 LEDs. The ledtype parameter is optional and not neces‐
1761 sary to provide on the command line unless it is required
1762 by hardware.
1763
1764 get <sensorid> [<ledtype>]
1765
1766 Get status of a particular LED described by a
1767 Generic Device Locator record in the SDR. A sen‐
1768 sorid of all will get the status of all available
1769 LEDS.
1770
1771 set <sensorid> <ledmode> [<ledtype>]
1772
1773 Set status of a particular LED described by a
1774 Generic Device Locator record in the SDR. A sen‐
1775 sorid of all will set the status of all available
1776 LEDS to the specified ledmode and ledtype.
1777
1778 LED Mode is required for set operations:
1779 OFF Off
1780 ON Steady On
1781 STANDBY 100ms on 2900ms off blink rate
1782 SLOW 1HZ blink rate
1783 FAST 4HZ blink rate
1784
1785 LED Type is optional:
1786 OK2RM Ok to Remove
1787 SERVICE Service Required
1788 ACT Activity
1789 LOCATE Locate
1790
1791
1792 fan speed <0-100>
1793
1794 Set system fan speed (PWM duty cycle).
1795
1796 sshkey
1797
1798 set <userid> <keyfile>
1799
1800 This command will allow you to specify an
1801 SSH key to use for a particular user on the
1802 Service Processor. This key will be used
1803 for CLI logins to the SP and not for IPMI
1804 sessions. View available users and their
1805 userids with the 'user list' command.
1806
1807 del <userid>
1808
1809 This command will delete the SSH key for a
1810 specified userid.
1811
1812
1813 tsol
1814
1815 This command allows Serial-over-LAN sessions to be established
1816 with Tyan IPMIv1.5 SMDC such as the M3289 or M3290. The default
1817 command run with no arguments will establish default SOL session
1818 back to local IP address. Optional arguments may be supplied in
1819 any order.
1820
1821
1822 <ipaddr>
1823
1824 Send receiver IP address to SMDC which it will use to
1825 send serial traffic to. By default this detects the
1826 local IP address and establishes two-way session. Format
1827 of ipaddr is XX.XX.XX.XX
1828
1829
1830 port=NUM
1831
1832 Configure UDP port to receive serial traffic on. By
1833 default this is 6230.
1834
1835
1836 ro|rw
1837
1838 Confiure SOL session as read-only or read-write. Ses‐
1839 sions are read-write by default.
1840
1841
1842
1843 user
1844
1845 summary
1846
1847 Displays a summary of userid information, including maxi‐
1848 mum number of userids, the number of enabled users, and
1849 the number of fixed names defined.
1850
1851 list
1852
1853 Displays a list of user information for all defined
1854 userids.
1855
1856 set
1857
1858 name <userid> <username>
1859
1860 Sets the username associated with the given
1861 userid.
1862
1863 password <userid> [<password>]
1864
1865 Sets the password for the given userid. If no
1866 password is given, the password is cleared (set to
1867 the NULL password). Be careful when removing
1868 passwords from administrator-level accounts.
1869
1870 disable <userid>
1871
1872 Disables access to the BMC by the given userid.
1873
1874 enable <userid>
1875
1876 Enables access to the BMC by the given userid.
1877
1878 priv <userid> <privilege level> [<channel number>]
1879
1880 Set user privilege level on the specified channel. If
1881 the channel is not specified, the current channel will be
1882 used.
1883
1884 test <userid> <16|20> [<password>]
1885
1886 Determine whether a password has been stored as 16 or 20
1887 bytes.
1888
1889
1891 The ipmitool open interface utilizes the OpenIPMI kernel device driver.
1892 This driver is present in all modern 2.4 and all 2.6 kernels and it
1893 should be present in recent Linux distribution kernels. There are also
1894 IPMI driver kernel patches for different kernel versions available from
1895 the OpenIPMI homepage.
1896
1897 The required kernel modules is different for 2.4 and 2.6 kernels. The
1898 following kernel modules must be loaded on a 2.4-based kernel in order
1899 for ipmitool to work:
1900
1901 ipmi_msghandler
1902 Incoming and outgoing message handler for IPMI interfaces.
1903
1904 ipmi_kcs_drv
1905 An IPMI Keyboard Controler Style (KCS) interface driver for the
1906 message handler.
1907
1908 ipmi_devintf
1909 Linux character device interface for the message handler.
1910
1911 The following kernel modules must be loaded on a 2.6-based kernel in
1912 order for ipmitool to work:
1913
1914 ipmi_msghandler
1915 Incoming and outgoing message handler for IPMI interfaces.
1916
1917 ipmi_si
1918 An IPMI system interface driver for the message handler. This
1919 module supports various IPMI system interfaces such as KCS, BT,
1920 SMIC, and even SMBus in 2.6 kernels.
1921
1922 ipmi_devintf
1923 Linux character device interface for the message handler.
1924
1925 Once the required modules are loaded there will be a dynamic character
1926 device entry that must exist at /dev/ipmi0. For systems that use devfs
1927 or udev this will appear at /dev/ipmi/0.
1928
1929 To create the device node first determine what dynamic major number it
1930 was assigned by the kernel by looking in /proc/devices and checking for
1931 the ipmidev entry. Usually if this is the first dynamic device it will
1932 be major number 254 and the minor number for the first system interface
1933 is 0 so you would create the device entry with:
1934
1935 mknod /dev/ipmi0 c 254 0
1936
1937 ipmitool includes some sample initialization scripts that can perform
1938 this task automatically at start-up.
1939
1940 In order to have ipmitool use the OpenIPMI device interface you can
1941 specifiy it on the command line:
1942
1943 ipmitool -I open <command>
1944
1946 The ipmitool bmc interface utilizes the bmc device driver as provided
1947 by Solaris 10 and higher. In order to force ipmitool to make use of
1948 this interface you can specify it on the command line:
1949
1950 ipmitool -I bmc <command>
1951
1952 The following files are associated with the bmc driver:
1953
1954
1955 /platform/i86pc/kernel/drv/bmc
1956 32-bit ELF kernel module for the bmc driver.
1957
1958 /platform/i86pc/kernel/drv/amd64/bmc
1959 64-bit ELF kernel module for the bmc driver.
1960
1961 /dev/bmc
1962 Character device node used to communicate with the bmc driver.
1963
1965 The ipmitool lipmi interface uses the Solaris 9 IPMI kernel device
1966 driver. It has been superceeded by the bmc interface on Solaris 10.
1967 You can tell ipmitool to use this interface by specifying it on the
1968 command line.
1969
1970 ipmitool -I lipmi <expression>
1971
1973 The ipmitool lan interface communicates with the BMC over an Ethernet
1974 LAN connection using UDP under IPv4. UDP datagrams are formatted to
1975 contain IPMI request/response messages with a IPMI session headers and
1976 RMCP headers.
1977
1978 IPMI-over-LAN uses version 1 of the Remote Management Control Protocol
1979 (RMCP) to support pre-OS and OS-absent management. RMCP is a
1980 request-response protocol delivered using UDP datagrams to port 623.
1981
1982 The LAN interface is an authenticatiod multi-session connection; mes‐
1983 sages delivered to the BMC can (and should) be authenticated with a
1984 challenge/response protocol with either straight password/key or MD5
1985 message-digest algorithm. ipmitool will attempt to connect with admin‐
1986 istrator privilege level as this is required to perform chassis power
1987 functions.
1988
1989 You can tell ipmitool to use the lan interface with the -I lan option:
1990
1991
1992 ipmitool -I lan -H <hostname> [-U <username>] [-P <password>] <command>
1993
1994 A hostname must be given on the command line in order to use the lan
1995 interface with ipmitool. The password field is optional; if you do not
1996 provide a password on the command line, ipmitool will attempt to con‐
1997 nect without authentication. If you specify a password it will use MD5
1998 authentication if supported by the BMC and straight password/key other‐
1999 wise, unless overridden with a command line option.
2000
2002 Like the lan interface, the lanplus interface communicates with the BMC
2003 over an Ethernet LAN connection using UDP under IPv4. The difference
2004 is that the lanplus interface uses the RMCP+ protocol as described in
2005 the IPMI v2.0 specification. RMCP+ allows for improved authentication
2006 and data integrity checks, as well as encryption and the ability to
2007 carry multiple types of payloads. Generic Serial Over LAN support
2008 requires RMCP+, so the ipmitool sol activate command requires the use
2009 of the lanplus interface.
2010
2011 RMCP+ session establishment uses a symmetric challenge-response proto‐
2012 col called RAKP (Remote Authenticated Key-Exchange Protocol) which
2013 allows the negotiation of many options. ipmitool does not yet allow
2014 the user to specify the value of every option, defaulting to the most
2015 obvious settings marked as required in the v2.0 specification. Authen‐
2016 tication and integrity HMACS are produced with SHA1, and encryption is
2017 performed with AES-CBC-128. Role-level logins are not yet supported.
2018
2019 ipmitool must be linked with the OpenSSL library in order to perform
2020 the encryption functions and support the lanplus interface. If the
2021 required packages are not found it will not be compiled in and sup‐
2022 ported.
2023
2024 You can tell ipmitool to use the lanplus interface with the -I lanplus
2025 option:
2026
2027
2028 ipmitool -I lanplus -H <hostname> [-U <username>] [-P <password>] <com‐
2029 mand>
2030
2031 A hostname must be given on the command line in order to use the lan
2032 interface with ipmitool. With the exception of the -A and -C options
2033 the rest of the command line options are identical to those available
2034 for the lan interface.
2035
2036 The -C option allows you specify the authentication, integrity, and
2037 encryption algorithms to use for for lanplus session based on the
2038 cipher suite ID found in the IPMIv2.0 specification in table 22-19.
2039 The default cipher suite is 3 which specifies RAKP-HMAC-SHA1 authenti‐
2040 cation, HMAC-SHA1-96 integrity, and AES-CBC-128 encryption algorightms.
2041
2042
2044 The ipmitool free interface utilizes the FreeIPMI libfreeipmi drivers.
2045
2046 You can tell ipmitool to use the FreeIPMI interface with the -I option:
2047
2048 ipmitool -I free <command>
2049
2050
2051
2053 The ipmitool imb interface supports the Intel IMB (Intel Inter-module
2054 Bus) Interface through the /dev/imb device.
2055
2056 You can tell ipmitool to use the IMB interface with the -I option:
2057
2058 ipmitool -I imb <command>
2059
2060
2062 Example 1: Listing remote sensors
2063
2064 > ipmitool -I lan -H 1.2.3.4 -f passfile sdr list
2065 Baseboard 1.25V | 1.24 Volts | ok
2066 Baseboard 2.5V | 2.49 Volts | ok
2067 Baseboard 3.3V | 3.32 Volts | ok
2068
2069 Example 2: Displaying status of a remote sensor
2070
2071 > ipmitool -I lan -H 1.2.3.4 -f passfile sensor get "Baseboard
2072 1.25V"
2073 Locating sensor record...
2074 Sensor ID : Baseboard 1.25V (0x10)
2075 Sensor Type (Analog) : Voltage
2076 Sensor Reading : 1.245 (+/- 0.039) Volts
2077 Status : ok
2078 Lower Non-Recoverable : na
2079 Lower Critical : 1.078
2080 Lower Non-Critical : 1.107
2081 Upper Non-Critical : 1.382
2082 Upper Critical : 1.431
2083 Upper Non-Recoverable : na
2084
2085 Example 3: Displaying the power status of a remote chassis
2086
2087 > ipmitool -I lan -H 1.2.3.4 -f passfile chassis power status
2088 Chassis Power is on
2089
2090 Example 4: Controlling the power on a remote chassis
2091
2092 > ipmitool -I lan -H 1.2.3.4 -f passfile chassis power on
2093 Chassis Power Control: Up/On
2094
2096 Duncan Laurie <duncan@iceblink.org>
2097
2099 IPMItool Homepage
2100 http://ipmitool.sourceforge.net
2101
2102 Intelligent Platform Management Interface Specification
2103 http://www.intel.com/design/servers/ipmi
2104
2105 OpenIPMI Homepage
2106 http://openipmi.sourceforge.net
2107
2108 FreeIPMI Homepage
2109 http://www.gnu.org/software/freeipmi/
2110
2111
2112
2113Duncan Laurie ipmitool(1)