1bmc-config.conf(5)              System Commands             bmc-config.conf(5)
2
3
4

NAME

6       bmc-config - BMC configuration file format and details
7

DESCRIPTION

9       Before  many  IPMI  tools can be used over a network, a machine's Base‐
10       board Management Controller (BMC) must be configured. The configuration
11       of  a  BMC  can  be quite daunting for those who do not know much about
12       IPMI. This manpage hopes to provide enough information on BMC  configu‐
13       ration  so that you can configure the BMC for your system.  When appro‐
14       priate, typical BMC configurations will be suggested.
15
16       The following is an example BMC configuration file partially  generated
17       from  the  bmc-config(1)  command. This example configuration should be
18       sufficient for most users  after  the  appropriate  local  IP  and  MAC
19       addresses are input.  Following this example, separate sections of this
20       manpage will discuss the different sections of  the  BMC  configuration
21       file  in more detail with explanations of how the BMC can be configured
22       for different environments.
23
24       Note that many options may or may not be available on  your  particular
25       machine.  For  example, Serial-Over-Lan (SOL) is available only on IPMI
26       2.0 machines. Therefore, if you are looking to configure  an  IPMI  1.5
27       machine,  many  of  the  SOL  or  IPMI  2.0  related options will be be
28       unavailable to you. The number of configurable users may also vary  for
29       your particular machine.
30
31       The  below  configuration file and most of this manpage assume the user
32       is interested in configuring a BMC for use with IPMI over LAN.  Various
33       configuration  options from bmc-config(1) have been left out or skipped
34       because it is considered unnecessary.  Future versions of this  manpage
35       will try to include more information.
36
37            Section User1
38             ## Give username
39             ## Username NULL
40             ## Give password or leave it blank to clear password
41             Password mypassword
42             ## Possible values: Yes/No or blank to not set
43             Enable_User Yes
44             ## Possible values: Yes/No
45             Lan_Enable_Ipmi_Msgs Yes
46             ## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
47             Lan_Privilege_Limit Administrator
48               ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if not specified
49               ## Lan_Session_Limit
50             ## Possible values: Yes/No
51             SOL_Payload_Access Yes
52            EndSection
53            Section User2
54             ## Give username
55             Username user2
56             ## Give password or leave it blank to clear password
57             Password userpass
58             ## Possible values: Yes/No or blank to not set
59             Enable_User No
60             ## Possible values: Yes/No
61             Lan_Enable_Ipmi_Msgs No
62             ## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
63             Lan_Privilege_Limit No_Access
64               ## Possible values: 0-17, 0 is unlimited; May be reset to 0 if not specified
65               ## Lan_Session_Limit
66               ## Possible values: Yes/No
67               SOL_Payload_Access No
68            EndSection
69            Section Lan_Channel
70             ## Possible values: Disabled/Pre_Boot_Only/Always_Available/Shared
71             Volatile_Access_Mode Always_Available
72             ## Possible values: Yes/No
73             Volatile_Enable_User_Level_Auth Yes
74             ## Possible values: Yes/No
75             Volatile_Enable_Per_Message_Auth Yes
76             ## Possible values: Yes/No
77             Volatile_Enable_Pef_Alerting No
78             ## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
79             Volatile_Channel_Privilege_Limit Administrator
80             ## Possible values: Disabled/Pre_Boot_Only/Always_Available/Shared
81             Non_Volatile_Access_Mode Always_Available
82             ## Possible values: Yes/No
83             Non_Volatile_Enable_User_Level_Auth Yes
84             ## Possible values: Yes/No
85             Non_Volatile_Enable_Per_Message_Auth Yes
86             ## Possible values: Yes/No
87             Non_Volatile_Enable_Pef_Alerting No
88             ## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary/No_Access
89             Non_Volatile_Channel_Privilege_Limit Administrator
90            EndSection
91            Section Lan_Conf
92             ## Possible values: Unspecified/Static/Use_DHCP/Use_BIOS/Use_Others
93             Ip_Address_Source Static
94             ## Give valid IP Address
95             Ip_Address 192.168.1.100
96             ## Give valid MAC Address
97             Mac_Address 00:0E:0E:FF:AA:12
98             ## Give valid Subnet mask
99             Subnet_Mask 255.255.255.0
100             ## Give valid IP Address
101             Default_Gateway_Ip_Address 192.168.1.1
102             ## Give valid MAC Address
103             Default_Gateway_Mac_Address 00:0E:0E:FF:AA:18
104             ## Give valid IP Address
105             Backup_Gateway_Ip_Address 192.168.1.2
106             ## Give valid MAC Address
107             Backup_Gateway_Mac_Address 00:0E:0E:FF:AA:15
108            EndSection
109            Section Lan_Conf_Auth
110             ## Possible values: Yes/No
111             Callback_Enable_Auth_Type_None No
112             ## Possible values: Yes/No
113             Callback_Enable_Auth_Type_Md2 No
114             ## Possible values: Yes/No
115             Callback_Enable_Auth_Type_Md5 No
116             ## Possible values: Yes/No
117             Callback_Enable_Auth_Type_Straight_Password No
118             ## Possible values: Yes/No
119             Callback_Enable_Auth_Type_Oem_Proprietary No
120             ## Possible values: Yes/No
121             User_Enable_Auth_Type_None No
122             ## Possible values: Yes/No
123             User_Enable_Auth_Type_Md2 Yes
124             ## Possible values: Yes/No
125             User_Enable_Auth_Type_Md5 Yes
126             ## Possible values: Yes/No
127             User_Enable_Auth_Type_Straight_Password No
128             ## Possible values: Yes/No
129             User_Enable_Auth_Type_Oem_Proprietary No
130             ## Possible values: Yes/No
131             Operator_Enable_Auth_Type_None No
132             ## Possible values: Yes/No
133             Operator_Enable_Auth_Type_Md2 Yes
134             ## Possible values: Yes/No
135             Operator_Enable_Auth_Type_Md5 Yes
136             ## Possible values: Yes/No
137             Operator_Enable_Auth_Type_Straight_Password No
138             ## Possible values: Yes/No
139             Operator_Enable_Auth_Type_Oem_Proprietary No
140             ## Possible values: Yes/No
141             Admin_Enable_Auth_Type_None No
142             ## Possible values: Yes/No
143             Admin_Enable_Auth_Type_Md2 Yes
144             ## Possible values: Yes/No
145             Admin_Enable_Auth_Type_Md5 Yes
146             ## Possible values: Yes/No
147             Admin_Enable_Auth_Type_Straight_Password No
148             ## Possible values: Yes/No
149             Admin_Enable_Auth_Type_Oem_Proprietary No
150             ## Possible values: Yes/No
151             Oem_Enable_Auth_Type_None No
152             ## Possible values: Yes/No
153             Oem_Enable_Auth_Type_Md2 No
154             ## Possible values: Yes/No
155             Oem_Enable_Auth_Type_Md5 No
156             ## Possible values: Yes/No
157             Oem_Enable_Auth_Type_Straight_Password No
158             ## Possible values: Yes/No
159             Oem_Enable_Auth_Type_Oem_Proprietary No
160            EndSection
161            Section Lan_Conf_Security_Keys
162               ## Give string or blank to clear. Max 20 chars
163               K_G
164            EndSection
165            Section Lan_Conf_Misc
166             ## Possible values: Yes/No
167             Enable_Gratuitous_Arps Yes
168             ## Possible values: Yes/No
169             Enable_Arp_Response No
170             ## Give valid number. Intervals are 500 ms.
171             Gratuitous_Arp_Interval 4
172            EndSection
173            Section Rmcpplus_Conf_Privilege
174             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
175             Maximum_Privilege_Cipher_Suite_Id_0 Unused
176             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
177             Maximum_Privilege_Cipher_Suite_Id_1 Unused
178             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
179             Maximum_Privilege_Cipher_Suite_Id_2 Unused
180             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
181             Maximum_Privilege_Cipher_Suite_Id_3 Administrator
182             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
183             Maximum_Privilege_Cipher_Suite_Id_4 Administrator
184             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
185             Maximum_Privilege_Cipher_Suite_Id_5 Administrator
186             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
187             Maximum_Privilege_Cipher_Suite_Id_6 Unused
188             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
189             Maximum_Privilege_Cipher_Suite_Id_7 Unused
190             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
191             Maximum_Privilege_Cipher_Suite_Id_8 Administrator
192             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
193             Maximum_Privilege_Cipher_Suite_Id_9 Administrator
194             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
195             Maximum_Privilege_Cipher_Suite_Id_10 Administrator
196             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
197             Maximum_Privilege_Cipher_Suite_Id_11 Unused
198             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
199             Maximum_Privilege_Cipher_Suite_Id_12 Administrator
200             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
201             Maximum_Privilege_Cipher_Suite_Id_13 Administrator
202             ## Possible values: Unused/User/Operator/Administrator/OEM_Proprietary
203             Maximum_Privilege_Cipher_Suite_Id_14 Administrator
204            EndSection
205            Section SOL_Conf
206             ## Possible values: Yes/No
207             Enable_SOL Yes
208             ## Possible values: Callback/User/Operator/Administrator/OEM_Proprietary
209             SOL_Privilege_Level Administrator
210             ## Possible values: Yes/No
211             Force_SOL_Payload_Authentication Yes
212             ## Possible values: Yes/No
213             Force_SOL_Payload_Encryption Yes
214             ## Give a valid integer. Each unit is 5ms
215             Character_Accumulate_Interval 50
216             ## Give a valid number
217             Character_Send_Threshold 100
218             ## Give a valid integer
219             SOL_Retry_Count 5
220             ## Give a valid integer. Interval unit is 10ms
221             SOL_Retry_Interval 50
222             ## Possible values: Serial/9600/19200/38400/57600/115200
223             Non_Volatile_Bit_Rate 115200
224             ## Possible values: Serial/9600/19200/38400/57600/115200
225             Volatile_Bit_Rate 115200
226            EndSection
227            Section Misc
228             ## Possible Values: Off_State_AC_Apply/Restore_State_AC_Apply/On_State_AC_Apply
229             Power_Restore_Policy Restore_State_Ac_Apply
230            EndSection
231
232

Section User1, User2, ...

234       The  User  sections of the BMC configuration file are for username con‐
235       figuration for IPMI over LAN communication. The number of users  avail‐
236       able  to  be configured on your system will vary by manufacturer.  With
237       the exception of the Username for User1, all sections are identical.
238
239       The username(s) you wish to configure the BMC  with  are  defined  with
240       Username.  The first username under Section User1 is typically the NULL
241       username and cannot be modified. The password for the username  can  be
242       specified  with  Password.  It can be left empty to define a NULL pass‐
243       word. Each user  you  wish  to  enable  must  be  enabled  through  the
244       Enable_User  configuration option. It is recommended that all usernames
245       have non-NULL passwords or be disabled for security reasons.
246
247       Lan_Enable_Ipmi_Msgs is used to enable or disable IPMI over LAN  access
248       for  the user. This should be set to "Yes" to allow IPMI over LAN tools
249       to work.
250
251       Lan_Privilege_Limit specifies the maximum  privilege  level  limit  the
252       user  is  allowed.  Different  IPMI  commands  have different privilege
253       restrictions. For example, determining the power status  of  a  machine
254       only  requires  the  "User"  privilege  level.  However,  power cycling
255       requires the "Operator" privilege. Typically, you will want  to  assign
256       atleast  one user with a privilege limit of "Administrator" so that all
257       system functions are available to atleast one user via IPMI over LAN.
258
259       Lan_Session_Limit specifies the number of  simultaneous  IPMI  sessions
260       allowed  for the user. Most users will wish to set this to "0" to allow
261       unlimited simultaneous IPMI sessions. This field is considered optional
262       by  IPMI standards, and may result in errors when attempting to config‐
263       ure it to a non-zero value. If errors to occur, setting the value  back
264       to 0 should resolve problems.
265
266       SOL_Payload_Access specifies if a particular user is allowed to connect
267       with Serial-Over-LAN (SOL). This should be set to "Yes" to  allow  this
268       username to use SOL.
269
270       The  example  configuration  above  disables  "User2"  but  enables the
271       default "NULL" (i.e. anonymous) user. Many IPMI tools (both open-source
272       and  vendor)  do  not allow the user to input a username and assume the
273       NULL username by default. If the tools  you  are  interested  in  using
274       allow  usernames  to  be  input, then it is recommended that one of the
275       non-NULL usernames be enabled and the NULL username disabled for  secu‐
276       rity  reasons. It is recommeneded that you disable the NULL username in
277       section User1, so that users are required to  specify  a  username  for
278       IPMI over LAN communication.
279
280       Some  motherboards  may  require  a  Username to be configured prior to
281       other fields being read/written. If this is the case, those fields will
282       be set to <username-not-set-yet>.
283
284

Section Lan_Channel

286       The  Lan_Channel section configures a variety of IPMI over LAN configu‐
287       ration parameters. Both Volatile and Non_Volatile configurations can be
288       set.  Volatile  configurations  are immediately configured onto the BMC
289       and will have immediate effect on the system.  Non_Volatile  configura‐
290       tions  are  only available after the next system reset. Generally, both
291       the Volatile and Non_Volatile should be configured identically.
292
293       The Access_Mode parameter configures the availability of IPMI over  LAN
294       on  the  system.  Typically this should be set to "Always_Available" to
295       enable IPMI over LAN.
296
297       The Privilege_Limit sets the maximum privilege any user of  the  system
298       can have when performing IPMI over LAN. This should be set to the maxi‐
299       mum privilege level configured to a username. Typically, this should be
300       set to "Administrator".
301
302       Typically  User_Level_Auth  and Per_Message_Auth should be set to "Yes"
303       for additional security. Disabling User_Level_Auth allows "User" privi‐
304       leged  IPMI  commands  to be executed without authentication. Disabling
305       Per_Message_Auth allows  fewer  individual  IPMI  messages  to  require
306       authentication.
307
308

Section Lan_Conf

310       Those  familiar with setting up networks should find most of the fields
311       in this section self explanatory. The example BMC  configuration  above
312       illustrates   the   setup   of   a   static   IP   address.  The  field
313       IP_Address_Source is configured with "Static". The IP  address,  subnet
314       mask,  and gateway IP addresses of the machine are respecitvely config‐
315       ured with the IP_Address, Subnet_Mask, Default_Gateway_Ip_Address,  and
316       Backup_Gateway_Ip_Address  fields. The respective MAC addresses for the
317       IP  addresses   are   configured   under   Mac_Address,   Default_Gate‐
318       way_Mac_Address, and Backup_Gateway_Mac_Address.
319
320       It is not required to setup the BMC IP_Address to be the same P_Address
321       used by your operating system for that network interface.  However,  if
322       you  choose  to use a different address, an alternate ARP configuration
323       may need to be setup.
324
325       To instead setup your BMC  network  information  via  DHCP,  the  field
326       IP_Address_Source should be configured with "Use_DHCP".
327
328       It  is  recommended  that static IP addresses be configured for address
329       resolution reasons. See Lan_Conf_Misc below for a more detailed  expla‐
330       nation.
331
332

Section Lan_Conf_Auth

334       This  section  determines  what types of password authentication mecha‐
335       nisms are allowed for users at different  privilege  levels  under  the
336       IPMI  1.5  protocol. The currently supported authentication methods for
337       IPMI 1.5 are None (no  username/password  required),  Straight_Password
338       (passwords  are sent in the clear), MD2 (passwords are MD2 hashed), and
339       MD5 (passwords are MD5 hashed).  Different usernames at different priv‐
340       ilege  levels  may  be allowed to authenticate differently through this
341       configuration. For example, a username with "User"  privileges  may  be
342       allowed  to  authenticate with a straight password, but a username with
343       "Administrator" privileges may be allowed only authenticate with MD5.
344
345       The above example configuration supports MD2 and MD5 authentication for
346       all users at the "User", "Operator", and "Administrator" privilege lev‐
347       els. All authentication mechanisms have been disabled  for  the  "Call‐
348       back" privilege level.
349
350       Generally  speaking,  you do not want to allow any user to authenticate
351       with None or Straight_Password for security reasons.  MD2 and  MD5  are
352       digital  signature  algorithms that can minimally encrypt passwords. If
353       you have chosen to support the NULL username (enabled User1)  and  NULL
354       passwords  (NULL  password for User1), you will have to enable the None
355       authentication fields above to allow users to connect via None.
356
357

Section Lan_Conf_Security_Keys

359       This section supports configuration of the IPMI 2.0 (including  Serial-
360       over-LAN)  K_g  key.  If  your  machine does not support IPMI 2.0, this
361       field will not be configurable.
362
363       The key is used for two-key authentication in IPMI 2.0. In most  tools,
364       when  doing  IPMI  2.0,  the K_g can be optionally specified. It is not
365       required for IPMI 2.0 operation.
366
367       In the above example, we have elected to leave this field blank so  the
368       K_g key is not used.
369
370

Section Lan_Conf_Misc

372       This  section  lists miscellaneous IPMI over LAN configuration options.
373       These are optional IPMI configuration options that are not  implemented
374       on all BMCs.
375
376       Normally,  a client cannot resolve the ethernet MAC address without the
377       remote operating system running. However, IPMI over LAN would not  work
378       when  a machine is powered off or if the IP address used by the operat‐
379       ing system for that network interface differs from the BMC IP  Address.
380       One  way  to  work  around this is through gratuitous ARPs.  Gratuitous
381       ARPs are ARP packets generated by the BMC and sent out to advertise the
382       BMC's IP and MAC address.  Other machines on the network can store this
383       information in their local ARP cache for later IP/hostname  resolution.
384       This  would allow IPMI over LAN to work when the remote machine is pow‐
385       ered off. The Enable_Gratuitous_Arps option allows  you  to  enable  or
386       disable  this feature. The Gratuitous_Arp_Interval option allows you to
387       configure the frequency at which gratuitous ARPs are sent onto the net‐
388       work.
389
390       Instead  of  gratuitous  ARPs  some  BMCs  are  able  to respond to ARP
391       requests, even when powered off.  If  offerred,  this  feature  can  be
392       enabled through the Enable_Arp_Response option.
393
394       Generally speaking, turning on gratuitous ARPs is acceptable.  However,
395       it will increase traffic on your network.  If you are using IPMI  on  a
396       large  cluster, the gratuitous ARPs may easily flood your network. They
397       should be tuned to occur less frequently or disabled. If disabled,  the
398       remote  machine's MAC address should be permanently stored in the local
399       ARP cache through arp(8).
400
401       See bmc-watchdog(8) for a method which allows  gratuitous  ARPs  to  be
402       disabled  when  the  operating  system is running, but enabled when the
403       system is down.
404
405

Section Rmcpplus_Conf_Privilege

407       This section supports configuration of the IPMI 2.0 (including  Serial-
408       over-LAN)  cipher suite IDs. If your machine does not support IPMI 2.0,
409       the fields will not be configurable.
410
411       Each cipher suite ID describes a combination of an authentication algo‐
412       rithm, integrity algorithm, and encryption algorithm for IPMI 2.0.  The
413       authentication algorithm is used for user authentication with the  BMC.
414       The integrity algorithm is used for generating signatures on IPMI pack‐
415       ets. The confidentiality algorithm is used  for  encrypting  data.  The
416       configuration  in  this  section enables certain cipher suite IDs to be
417       enabled or disabled, and the maximum privilege  level  a  username  can
418       authenticate with.
419
420       The following table shows the cipher suite ID to algorithms mapping:
421
422       0 - Authentication Algorithm = None; Integrity Algorithm = None; Confi‐
423       dentiality Algorithm = None
424
425       1 - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm  =  None;
426       Confidentiality Algorithm = None
427
428       2  -  Authentication Algorithm = HMAC-SHA1; Integrity Algorithm = HMAC-
429       SHA1-96; Confidentiality Algorithm = None
430
431       3 - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm  =  HMAC-
432       SHA1-96; Confidentiality Algorithm = AES-CBC-128
433
434       4  -  Authentication Algorithm = HMAC-SHA1; Integrity Algorithm = HMAC-
435       SHA1-96; Confidentiality Algorithm = xRC4-128
436
437       5 - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm  =  HMAC-
438       SHA1-96; Confidentiality Algorithm = xRC4-40
439
440       6  -  Authentication  Algorithm = HMAC-MD5; Integrity Algorithm = None;
441       Confidentiality Algorithm = None
442
443       7 - Authentication Algorithm = HMAC-MD5; Integrity  Algorithm  =  HMAC-
444       MD5-128; Confidentiality Algorithm = None
445
446       8  -  Authentication  Algorithm = HMAC-MD5; Integrity Algorithm = HMAC-
447       MD5-128; Confidentiality Algorithm = AES-CBC-128
448
449       9 - Authentication Algorithm = HMAC-MD5; Integrity  Algorithm  =  HMAC-
450       MD5-128; Confidentiality Algorithm = xRC4-128
451
452       10  -  Authentication Algorithm = HMAC-MD5; Integrity Algorithm = HMAC-
453       MD5-128; Confidentiality Algorithm = xRC4-40
454
455       11  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
456       MD5-128; Confidentiality Algorithm = None
457
458       12  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
459       MD5-128; Confidentiality Algorithm = AES-CBC-128
460
461       13  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
462       MD5-128; Confidentiality Algorithm = xRC4-128
463
464       14  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
465       MD5-128; Confidentiality Algorithm = xRC4-40
466
467       Generally speaking, HMAC-SHA1 based algorithms are stronger than  HMAC-
468       MD5,  which  are  better than MD5-128 algorithms. AES-CBC-128 confiden‐
469       tiality algorithms are stronger than  xRC4-128  algorithms,  which  are
470       better  than  xRC4-40  algorithms. Cipher suite ID 3 is therefore typi‐
471       cally considered the most secure. Some users may  wish  to  set  cipher
472       suite  ID 3 to a privilege level and disable all remaining cipher suite
473       IDs.
474
475       The above example configuration has decided  to  allow  any  user  with
476       "Administrator"  privileges  use any Cipher Suite algorithm suite which
477       requires an authentication, integrity, and  confidentiality  algorithm.
478       Typically,  the maximum privilege level configured to a username should
479       be set for atleast one cipher suite ID. Typically, this is the  "Admin‐
480       istrator" privilege.
481
482       A  number of cipher suite IDs are optionally implemented, so the avail‐
483       able cipher suite IDs available your system may vary.
484
485

Section SOL_Conf

487       This section is for setting up Serial-Over-Lan (SOL) and will  only  be
488       available  for configuration on those machines. SOL can be enabled with
489       the Enable_SOL field. The minimum privilege level required for connect‐
490       ing  with  SOL is specified by SOL_Privilege_Level.  This should be set
491       to the maximum privilege level configured to a username  that  has  SOL
492       enabled.  Typically, this is the "Administrator" privilege. Authentica‐
493       tion  and  Encryption  can  be  forced  or   not   using   the   fields
494       Force_SOL_Payload_Authentication    and    Force_SOL_Payload_Encryption
495       respectively. It is recommended that these be set on.  However,  forced
496       authentication and/or encryption support depend on the cipher suite IDs
497       supported.
498
499       The    Character_Accumulate_Interval,    Character_Send_Threshold     ,
500       SOL_Retry_Count  and  ,  SOL_Retry_Interval options are used to set SOL
501       character output speeds. Character_Accumulate_Interval  determines  how
502       often serial data should be regularly sent and Character_Send_Threshold
503       indicates the character count that if passed, will force serial data to
504       be  sent.  SOL_Retry_Count  indicates  how  many  times packets must be
505       retransmitted if acknowledgements are not received.  SOL_Retry_Interval
506       indicates the timeout interval. Generally, the manufacturer recommended
507       numbers will be sufficient. However, you may wish  to  experiment  with
508       these values for faster SOL throughput.
509
510       The  Non_Volatile_Bit_Rate and Volatile_Bit_Rate determine the baudrate
511       the BMC should use. This should match the baudrate set in the BIOS  and
512       operating  system,  such  as  agetty(8).   Generally speaking, both the
513       Volatile and Non_Volatile options should be set identically.
514
515       In addition to enabling SOL in this section, individual users most also
516       be  capable  of  connecting  with  SOL.  See the section Section User1,
517       User2, ...  above for details.
518
519

Section Misc

521       The Power_Restore_Policy determines the behavior of the machine when AC
522       power  returns  after  a  power loss. The behavior can be set to always
523       power on the  machine  ("On_State_AC_Apply"),  power  off  the  machine
524       ("Off_State_AC_Apply"),  or  return the power to the state that existed
525       before the power loss ("Restore_State_AC_Apply").
526

REPORTING BUGS

528       Report bugs to <freeipmi-users@gnu.org> or <freeipmi-devel@gnu.org>.
529

SEE ALSO

531       freeipmi(7), bmc-config(8), bmc-watchdog(8), agetty(8)
532
533       http://www.gnu.org/software/freeipmi/
534
535
536
537bmc-config 1.2.1                  2017-03-22                bmc-config.conf(5)
Impressum