1bmc-config.conf(5)              System Commands             bmc-config.conf(5)
2
3
4

NAME

6       bmc-config - BMC configuration file format and details
7

DESCRIPTION

9       Before  many  IPMI  tools can be used over a network, a machine's Base‐
10       board Management Controller (BMC) must be configured. The configuration
11       of  a  BMC  can  be quite daunting for those who do not know much about
12       IPMI. This manpage hopes to provide enough information on BMC  configu‐
13       ration  so that you can configure the BMC for your system.  When appro‐
14       priate, typical BMC configurations will be suggested.
15
16       The following is an example BMC configuration file partially  generated
17       from  the  bmc-config(1)  command. This example configuration should be
18       sufficient for most users  after  the  appropriate  local  IP  and  MAC
19       addresses are input.  Following this example, separate sections of this
20       manpage will discuss the different sections of  the  BMC  configuration
21       file  in more detail with explanations of how the BMC can be configured
22       for different environments.
23
24       Note that many options may or may not be available on  your  particular
25       machine.  For  example, Serial-Over-Lan (SOL) is available only on IPMI
26       2.0 machines. Therefore, if you are looking to configure  an  IPMI  1.5
27       machine,  many  of  the  SOL  or  IPMI  2.0  related options will be be
28       unavailable to you. The number of configurable users may also vary  for
29       your particular machine.
30
31       The  below  configuration file and most of this manpage assume the user
32       is interested in configuring a BMC for use with IPMI over LAN.  Various
33       configuration  options from bmc-config(1) have been left out or skipped
34       because it is considered unnecessary.  Future versions of this  manpage
35       will try to include more information.
36
37            Section User1
38             ## Give username
39             ## Username NULL
40             ## Give password or leave it blank to clear password
41             Password mypassword
42             ## Possible values: Yes/No or blank to not set
43             Enable_User Yes
44             ## Possible values: Yes/No
45             Lan_Enable_Ipmi_Msgs Yes
46             ## Possible values: Callback/User/Operator/Administrator/OEM_Pro‐
47       prietary/No_Access
48             Lan_Privilege_Limit Administrator
49               ## Possible values: 0-17, 0 is unlimited; May be reset to 0  if
50       not specified
51               ## Lan_Session_Limit
52             ## Possible values: Yes/No
53             SOL_Payload_Access Yes
54            EndSection
55            Section User2
56             ## Give username
57             Username user2
58             ## Give password or leave it blank to clear password
59             Password userpass
60             ## Possible values: Yes/No or blank to not set
61             Enable_User No
62             ## Give password for IPMI 2.0 or blank to clear. MAX 20 chars.
63             Lan_Enable_Ipmi_Msgs No
64             ## Possible values: Callback/User/Operator/Administrator/OEM_Pro‐
65       prietary/No_Access
66             Lan_Privilege_Limit No_Access
67               ## Possible values: 0-17, 0 is unlimited; May be reset to 0  if
68       not specified
69               ## Lan_Session_Limit
70               ## Possible values: Yes/No
71               SOL_Payload_Access No
72            EndSection
73            Section Lan_Channel
74             ##    Possible    values:    Disabled/Pre_Boot_Only/Always_Avail‐
75       able/Shared
76             Volatile_Access_Mode Always_Available
77             ## Possible values: Yes/No
78             Volatile_Enable_User_Level_Auth Yes
79             ## Possible values: Yes/No
80             Volatile_Enable_Per_Message_Auth Yes
81             ## Possible values: Yes/No
82             Volatile_Enable_Pef_Alerting No
83             ## Possible values: Callback/User/Operator/Administrator/OEM_Pro‐
84       prietary/No_Access
85             Volatile_Channel_Privilege_Limit Administrator
86             ##    Possible    values:    Disabled/Pre_Boot_Only/Always_Avail‐
87       able/Shared
88             Non_Volatile_Access_Mode Always_Available
89             ## Possible values: Yes/No
90             Non_Volatile_Enable_User_Level_Auth Yes
91             ## Possible values: Yes/No
92             Non_Volatile_Enable_Per_Message_Auth Yes
93             ## Possible values: Yes/No
94             Non_Volatile_Enable_Pef_Alerting No
95             ## Possible values: Callback/User/Operator/Administrator/OEM_Pro‐
96       prietary/No_Access
97             Non_Volatile_Channel_Privilege_Limit Administrator
98            EndSection
99            Section Lan_Conf
100             ## Possible values: Unspecified/Static/Use_DHCP/Use_BIOS/Use_Oth‐
101       ers
102             Ip_Address_Source Static
103             ## Give valid IP Address
104             Ip_Address 192.168.1.100
105             ## Give valid MAC Address
106             Mac_Address 00:0E:0E:FF:AA:12
107             ## Give valid Subnet mask
108             Subnet_Mask 255.255.255.0
109             ## Give valid IP Address
110             Default_Gateway_Ip_Address 192.168.1.1
111             ## Give valid MAC Address
112             Default_Gateway_Mac_Address 00:0E:0E:FF:AA:18
113             ## Give valid IP Address
114             Backup_Gateway_Ip_Address 192.168.1.2
115             ## Give valid MAC Address
116             Backup_Gateway_Mac_Address 00:0E:0E:FF:AA:15
117            EndSection
118            Section Lan_Conf_Auth
119             ## Possible values: Yes/No
120             Callback_Enable_Auth_Type_None No
121             ## Possible values: Yes/No
122             Callback_Enable_Auth_Type_Md2 No
123             ## Possible values: Yes/No
124             Callback_Enable_Auth_Type_Md5 No
125             ## Possible values: Yes/No
126             Callback_Enable_Auth_Type_Straight_Password No
127             ## Possible values: Yes/No
128             Callback_Enable_Auth_Type_Oem_Proprietary No
129             ## Possible values: Yes/No
130             User_Enable_Auth_Type_None No
131             ## Possible values: Yes/No
132             User_Enable_Auth_Type_Md2 Yes
133             ## Possible values: Yes/No
134             User_Enable_Auth_Type_Md5 Yes
135             ## Possible values: Yes/No
136             User_Enable_Auth_Type_Straight_Password No
137             ## Possible values: Yes/No
138             User_Enable_Auth_Type_Oem_Proprietary No
139             ## Possible values: Yes/No
140             Operator_Enable_Auth_Type_None No
141             ## Possible values: Yes/No
142             Operator_Enable_Auth_Type_Md2 Yes
143             ## Possible values: Yes/No
144             Operator_Enable_Auth_Type_Md5 Yes
145             ## Possible values: Yes/No
146             Operator_Enable_Auth_Type_Straight_Password No
147             ## Possible values: Yes/No
148             Operator_Enable_Auth_Type_Oem_Proprietary No
149             ## Possible values: Yes/No
150             Admin_Enable_Auth_Type_None No
151             ## Possible values: Yes/No
152             Admin_Enable_Auth_Type_Md2 Yes
153             ## Possible values: Yes/No
154             Admin_Enable_Auth_Type_Md5 Yes
155             ## Possible values: Yes/No
156             Admin_Enable_Auth_Type_Straight_Password No
157             ## Possible values: Yes/No
158             Admin_Enable_Auth_Type_Oem_Proprietary No
159             ## Possible values: Yes/No
160             Oem_Enable_Auth_Type_None No
161             ## Possible values: Yes/No
162             Oem_Enable_Auth_Type_Md2 No
163             ## Possible values: Yes/No
164             Oem_Enable_Auth_Type_Md5 No
165             ## Possible values: Yes/No
166             Oem_Enable_Auth_Type_Straight_Password No
167             ## Possible values: Yes/No
168             Oem_Enable_Auth_Type_Oem_Proprietary No
169            EndSection
170            Section Lan_Conf_Security_Keys
171               ## Give string or blank to clear. Max 20 chars
172               K_G
173            EndSection
174            Section Lan_Conf_Misc
175             ## Possible values: Yes/No
176             Enable_Gratuitous_Arps Yes
177             ## Possible values: Yes/No
178             Enable_Arp_Response No
179             ## Give valid number. Intervals are 500 ms.
180             Gratuitous_Arp_Interval 4
181            EndSection
182            Section Rmcpplus_Conf_Privilege
183             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
184       prietary
185             Maximum_Privilege_Cipher_Suite_Id_0 Unused
186             ##  Possible  values: Unused/User/Operator/Administrator/OEM_Pro‐
187       prietary
188             Maximum_Privilege_Cipher_Suite_Id_1 Unused
189             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
190       prietary
191             Maximum_Privilege_Cipher_Suite_Id_2 Unused
192             ##  Possible  values: Unused/User/Operator/Administrator/OEM_Pro‐
193       prietary
194             Maximum_Privilege_Cipher_Suite_Id_3 Administrator
195             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
196       prietary
197             Maximum_Privilege_Cipher_Suite_Id_4 Administrator
198             ##  Possible  values: Unused/User/Operator/Administrator/OEM_Pro‐
199       prietary
200             Maximum_Privilege_Cipher_Suite_Id_5 Administrator
201             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
202       prietary
203             Maximum_Privilege_Cipher_Suite_Id_6 Unused
204             ##  Possible  values: Unused/User/Operator/Administrator/OEM_Pro‐
205       prietary
206             Maximum_Privilege_Cipher_Suite_Id_7 Unused
207             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
208       prietary
209             Maximum_Privilege_Cipher_Suite_Id_8 Administrator
210             ##  Possible  values: Unused/User/Operator/Administrator/OEM_Pro‐
211       prietary
212             Maximum_Privilege_Cipher_Suite_Id_9 Administrator
213             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
214       prietary
215             Maximum_Privilege_Cipher_Suite_Id_10 Administrator
216             ##  Possible  values: Unused/User/Operator/Administrator/OEM_Pro‐
217       prietary
218             Maximum_Privilege_Cipher_Suite_Id_11 Unused
219             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
220       prietary
221             Maximum_Privilege_Cipher_Suite_Id_12 Administrator
222             ##  Possible  values: Unused/User/Operator/Administrator/OEM_Pro‐
223       prietary
224             Maximum_Privilege_Cipher_Suite_Id_13 Administrator
225             ## Possible  values:  Unused/User/Operator/Administrator/OEM_Pro‐
226       prietary
227             Maximum_Privilege_Cipher_Suite_Id_14 Administrator
228            EndSection
229            Section SOL_Conf
230             ## Possible values: Yes/No
231             Enable_SOL Yes
232             ## Possible values: Callback/User/Operator/Administrator/OEM_Pro‐
233       prietary
234             SOL_Privilege_Level Administrator
235             ## Possible values: Yes/No
236             Force_SOL_Payload_Authentication Yes
237             ## Possible values: Yes/No
238             Force_SOL_Payload_Encryption Yes
239             ## Give a valid integer. Each unit is 5ms
240             Character_Accumulate_Interval 50
241             ## Give a valid number
242             Character_Send_Threshold 100
243             ## Give a valid integer
244             SOL_Retry_Count 5
245             ## Give a valid integer. Interval unit is 10ms
246             SOL_Retry_Interval 50
247             ## Possible values: Serial/9600/19200/38400/57600/115200
248             Non_Volatile_Bit_Rate 115200
249             ## Possible values: Serial/9600/19200/38400/57600/115200
250             Volatile_Bit_Rate 115200
251            EndSection
252            Section Misc
253             ##                        Possible                        Values:
254       Off_State_AC_Apply/Restore_State_AC_Apply/On_State_AC_Apply
255             Power_Restore_Policy Restore_State_Ac_Apply
256            EndSection
257
258

Section User1, User2, ...

260       The  User  sections of the BMC configuration file are for username con‐
261       figuration for IPMI over LAN communication. The number of users  avail‐
262       able  to  be configured on your system will vary by manufacturer.  With
263       the exception of the Username for User1, all sections are identical.
264
265       The username(s) you wish to configure the BMC  with  are  defined  with
266       Username.  The first username under Section User1 is typically the NULL
267       username and cannot be modified. The password for the username  can  be
268       specified  with  Password.  It can be left empty to define a NULL pass‐
269       word. Each user  you  wish  to  enable  must  be  enabled  through  the
270       Enable_User  configuration option. It is recommended that all usernames
271       have non-NULL passwords or be disabled for security reasons.
272
273       Lan_Enable_Ipmi_Msgs is used to enable or disable IPMI over LAN  access
274       for  the user. This should be set to "Yes" to allow IPMI over LAN tools
275       to work.
276
277       Lan_Privilege_Limit specifies the maximum  privilege  level  limit  the
278       user  is  allowed.  Different  IPMI  commands  have different privilege
279       restrictions. For example, determining the power status  of  a  machine
280       only  requires  the  "User"  privilege  level.  However,  power cycling
281       requires the "Operator" privilege. Typically, you will want  to  assign
282       atleast  one user with a privilege limit of "Administrator" so that all
283       system functions are available to atleast one user via IPMI over LAN.
284
285       Lan_Session_Limit specifies the number of  simultaneous  IPMI  sessions
286       allowed  for the user. Most users will wish to set this to "0" to allow
287       unlimited simultaneous IPMI sessions. This field is considered optional
288       by  IPMI standards, and may result in errors when attempting to config‐
289       ure it to a non-zero value. If errors to occur, setting the value  back
290       to 0 should resolve problems.
291
292       SOL_Payload_Access specifies if a particular user is allowed to connect
293       with Serial-Over-LAN (SOL). This should be set to "Yes" to  allow  this
294       username to use SOL.
295
296       The  example  configuration  above  disables  "User2"  but  enables the
297       default "NULL" (i.e. anonymous) user. Many IPMI tools (both open-source
298       and  vendor)  do  not allow the user to input a username and assume the
299       NULL username by default. If the tools  you  are  interested  in  using
300       allow  usernames  to  be  input, then it is recommended that one of the
301       non-NULL usernames be enabled and the NULL username disabled for  secu‐
302       rity  reasons. It is recommeneded that you disable the NULL username in
303       section User1, so that users are required to  specify  a  username  for
304       IPMI over LAN communication.
305
306       Some  motherboards  may  require  a  Username to be configured prior to
307       other fields being read/written. If this is the case, those fields will
308       be set to <username-not-set-yet>.
309
310

Section Lan_Channel

312       The  Lan_Channel section configures a variety of IPMI over LAN configu‐
313       ration parameters. Both Volatile and Non_Volatile configurations can be
314       set.  Volatile  configurations  are immediately configured onto the BMC
315       and will have immediate effect on the system.  Non_Volatile  configura‐
316       tions  are  only available after the next system reset. Generally, both
317       the Volatile and Non_Volatile should be configured identically.
318
319       The Access_Mode parameter configures the availability of IPMI over  LAN
320       on  the  system.  Typically this should be set to "Always_Available" to
321       enable IPMI over LAN.
322
323       The Privilege_Limit sets the maximum privilege any user of  the  system
324       can have when performing IPMI over LAN. This should be set to the maxi‐
325       mum privilege level configured to a username. Typically, this should be
326       set to "Administrator".
327
328       Typically  User_Level_Auth  and Per_Message_Auth should be set to "Yes"
329       for additional security. Disabling User_Level_Auth allows "User" privi‐
330       leged  IPMI  commands  to be executed without authentication. Disabling
331       Per_Message_Auth allows  fewer  individual  IPMI  messages  to  require
332       authentication.
333
334

Section Lan_Conf

336       Those  familiar with setting up networks should find most of the fields
337       in this section self explanatory. The example BMC  configuration  above
338       illustrates   the   setup   of   a   static   IP   address.  The  field
339       IP_Address_Source is configured with "Static". The IP  address,  subnet
340       mask,  and gateway IP addresses of the machine are respecitvely config‐
341       ured with the IP_Address, Subnet_Mask, Default_Gateway_Ip_Address,  and
342       Backup_Gateway_Ip_Address  fields. The respective MAC addresses for the
343       IP  addresses   are   configured   under   Mac_Address,   Default_Gate‐
344       way_Mac_Address, and Backup_Gateway_Mac_Address.
345
346       It is not required to setup the BMC IP_Address to be the same P_Address
347       used by your operating system for that network interface.  However,  if
348       you  choose  to use a different address, an alternate ARP configuration
349       may need to be setup.
350
351       To instead setup your BMC  network  information  via  DHCP,  the  field
352       IP_Address_Source should be configured with "Use_DHCP".
353
354       It  is  recommended  that static IP addresses be configured for address
355       resolution reasons. See Lan_Conf_Misc below for a more detailed  expla‐
356       nation.
357
358

Section Lan_Conf_Auth

360       This  section  determines  what types of password authentication mecha‐
361       nisms are allowed for users at different  privilege  levels  under  the
362       IPMI  1.5  protocol. The currently supported authentication methods for
363       IPMI 1.5 are None (no  username/password  required),  Straight_Password
364       (passwords  are sent in the clear), MD2 (passwords are MD2 hashed), and
365       MD5 (passwords are MD5 hashed).  Different usernames at different priv‐
366       ilege  levels  may  be allowed to authenticate differently through this
367       configuration. For example, a username with "User"  privileges  may  be
368       allowed  to  authenticate with a straight password, but a username with
369       "Administrator" privileges may be allowed only authenticate with MD5.
370
371       The above example configuration supports MD2 and MD5 authentication for
372       all users at the "User", "Operator", and "Administrator" privilege lev‐
373       els. All authentication mechanisms have been disabled  for  the  "Call‐
374       back" privilege level.
375
376       Generally  speaking,  you do not want to allow any user to authenticate
377       with None or Straight_Password for security reasons.  MD2 and  MD5  are
378       digital  signature  algorithms that can minimally encrypt passwords. If
379       you have chosen to support the NULL username (enabled User1)  and  NULL
380       passwords  (NULL  password for User1), you will have to enable the None
381       authentication fields above to allow users to connect via None.
382
383

Section Lan_Conf_Security_Keys

385       This section supports configuration of the IPMI 2.0 (including  Serial-
386       over-LAN)  K_g  key.  If  your  machine does not support IPMI 2.0, this
387       field will not be configurable.
388
389       The key is used for two-key authentication in IPMI 2.0. In most  tools,
390       when  doing  IPMI  2.0,  the K_g can be optionally specified. It is not
391       required for IPMI 2.0 operation.
392
393       In the above example, we have elected to leave this field blank so  the
394       K_g key is not used.
395
396

Section Lan_Conf_Misc

398       This  section  lists miscellaneous IPMI over LAN configuration options.
399       These are optional IPMI configuration options that are not  implemented
400       on all BMCs.
401
402       Normally,  a client cannot resolve the ethernet MAC address without the
403       remote operating system running. However, IPMI over LAN would not  work
404       when  a machine is powered off or if the IP address used by the operat‐
405       ing system for that network interface differs from the BMC IP  Address.
406       One  way  to  work  around this is through gratuitous ARPs.  Gratuitous
407       ARPs are ARP packets generated by the BMC and sent out to advertise the
408       BMC's IP and MAC address.  Other machines on the network can store this
409       information in their local ARP cache for later IP/hostname  resolution.
410       This  would allow IPMI over LAN to work when the remote machine is pow‐
411       ered off. The Enable_Gratuitous_Arps option allows  you  to  enable  or
412       disable  this feature. The Gratuitous_Arp_Interval option allows you to
413       configure the frequency at which gratuitous ARPs are sent onto the net‐
414       work.
415
416       Instead  of  gratuitous  ARPs  some  BMCs  are  able  to respond to ARP
417       requests, even when powered off.  If  offerred,  this  feature  can  be
418       enabled through the Enable_Arp_Response option.
419
420       Generally speaking, turning on gratuitous ARPs is acceptable.  However,
421       it will increase traffic on your network.  If you are using IPMI  on  a
422       large  cluster, the gratuitous ARPs may easily flood your network. They
423       should be tuned to occur less frequently or disabled. If disabled,  the
424       remote  machine's MAC address should be permanently stored in the local
425       ARP cache through arp(8).
426
427       See bmc-watchdog(8) for a method which allows  gratuitous  ARPs  to  be
428       disabled  when  the  operating  system is running, but enabled when the
429       system is down.
430
431

Section Rmcpplus_Conf_Privilege

433       This section supports configuration of the IPMI 2.0 (including  Serial-
434       over-LAN)  cipher suite IDs. If your machine does not support IPMI 2.0,
435       the fields will not be configurable.
436
437       Each cipher suite ID describes a combination of an authentication algo‐
438       rithm, integrity algorithm, and encryption algorithm for IPMI 2.0.  The
439       authentication algorithm is used for user authentication with the  BMC.
440       The integrity algorithm is used for generating signatures on IPMI pack‐
441       ets. The confidentiality algorithm is used  for  encrypting  data.  The
442       configuration  in  this  section enables certain cipher suite IDs to be
443       enabled or disabled, and the maximum privilege  level  a  username  can
444       authenticate with.
445
446       The following table shows the cipher suite ID to algorithms mapping:
447
448       0 - Authentication Algorithm = None; Integrity Algorithm = None; Confi‐
449       dentiality Algorithm = None
450
451       1 - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm  =  None;
452       Confidentiality Algorithm = None
453
454       2  -  Authentication Algorithm = HMAC-SHA1; Integrity Algorithm = HMAC-
455       SHA1-96; Confidentiality Algorithm = None
456
457       3 - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm  =  HMAC-
458       SHA1-96; Confidentiality Algorithm = AES-CBC-128
459
460       4  -  Authentication Algorithm = HMAC-SHA1; Integrity Algorithm = HMAC-
461       SHA1-96; Confidentiality Algorithm = xRC4-128
462
463       5 - Authentication Algorithm = HMAC-SHA1; Integrity Algorithm  =  HMAC-
464       SHA1-96; Confidentiality Algorithm = xRC4-40
465
466       6  -  Authentication  Algorithm = HMAC-MD5; Integrity Algorithm = None;
467       Confidentiality Algorithm = None
468
469       7 - Authentication Algorithm = HMAC-MD5; Integrity  Algorithm  =  HMAC-
470       MD5-128; Confidentiality Algorithm = None
471
472       8  -  Authentication  Algorithm = HMAC-MD5; Integrity Algorithm = HMAC-
473       MD5-128; Confidentiality Algorithm = AES-CBC-128
474
475       9 - Authentication Algorithm = HMAC-MD5; Integrity  Algorithm  =  HMAC-
476       MD5-128; Confidentiality Algorithm = xRC4-128
477
478       10  -  Authentication Algorithm = HMAC-MD5; Integrity Algorithm = HMAC-
479       MD5-128; Confidentiality Algorithm = xRC4-40
480
481       11  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
482       MD5-128; Confidentiality Algorithm = None
483
484       12  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
485       MD5-128; Confidentiality Algorithm = AES-CBC-128
486
487       13  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
488       MD5-128; Confidentiality Algorithm = xRC4-128
489
490       14  -  Authentication  Algorithm  =  HMAC-MD5;  Integrity  Algorithm  =
491       MD5-128; Confidentiality Algorithm = xRC4-40
492
493       Generally speaking, HMAC-SHA1 based algorithms are stronger than  HMAC-
494       MD5,  which  are  better than MD5-128 algorithms. AES-CBC-128 confiden‐
495       tiality algorithms are stronger than  xRC4-128  algorithms,  which  are
496       better  than  xRC4-40  algorithms. Cipher suite ID 3 is therefore typi‐
497       cally considered the most secure. Some users may  wish  to  set  cipher
498       suite  ID 3 to a privilege level and disable all remaining cipher suite
499       IDs.
500
501       The above example configuration has decided  to  allow  any  user  with
502       "Administrator"  privileges  use any Cipher Suite algorithm suite which
503       requires an authentication, integrity, and  confidentiality  algorithm.
504       Typically,  the maximum privilege level configured to a username should
505       be set for atleast one cipher suite ID. Typically, this is the  "Admin‐
506       istrator" privilege.
507
508       A  number of cipher suite IDs are optionally implemented, so the avail‐
509       able cipher suite IDs available your system may vary.
510
511

Section SOL_Conf

513       This section is for setting up Serial-Over-Lan (SOL) and will  only  be
514       available  for configuration on those machines. SOL can be enabled with
515       the Enable_SOL field. The minimum privilege level required for connect‐
516       ing  with  SOL is specified by SOL_Privilege_Level.  This should be set
517       to the maximum privilege level configured to a username  that  has  SOL
518       enabled.  Typically, this is the "Administrator" privilege. Authentica‐
519       tion  and  Encryption  can  be  forced  or   not   using   the   fields
520       Force_SOL_Payload_Authentication    and    Force_SOL_Payload_Encryption
521       respectively. It is recommended that these be set on.  However,  forced
522       authentication and/or encryption support depend on the cipher suite IDs
523       supported.
524
525       The    Character_Accumulate_Interval,    Character_Send_Threshold     ,
526       SOL_Retry_Count  and  ,  SOL_Retry_Interval options are used to set SOL
527       character output speeds. Character_Accumulate_Interval  determines  how
528       often serial data should be regularly sent and Character_Send_Threshold
529       indicates the character count that if passed, will force serial data to
530       be  sent.  SOL_Retry_Count  indicates  how  many  times packets must be
531       retransmitted if acknowledgements are not received.  SOL_Retry_Interval
532       indicates the timeout interval. Generally, the manufacturer recommended
533       numbers will be sufficient. However, you may wish  to  experiment  with
534       these values for faster SOL throughput.
535
536       The  Non_Volatile_Bit_Rate and Volatile_Bit_Rate determine the baudrate
537       the BMC should use. This should match the baudrate set in the BIOS  and
538       operating  system,  such  as  agetty(8).   Generally speaking, both the
539       Volatile and Non_Volatile options should be set identically.
540
541       In addition to enabling SOL in this section, individual users most also
542       be  capable  of  connecting  with  SOL.  See the section Section User1,
543       User2, ...  above for details.
544
545

Section Misc

547       The Power_Restore_Policy determines the behavior of the machine when AC
548       power  returns  after  a  power loss. The behavior can be set to always
549       power on the  machine  ("On_State_AC_Apply"),  power  off  the  machine
550       ("Off_State_AC_Apply"),  or  return the power to the state that existed
551       before the power loss ("Restore_State_AC_Apply").
552

REPORTING BUGS

554       Report bugs to <freeipmi-users@gnu.org> or <freeipmi-devel@gnu.org>.
555

SEE ALSO

557       freeipmi(7), bmc-config(8), bmc-watchdog(8), agetty(8)
558
559       http://www.gnu.org/software/freeipmi/
560
561
562
563bmc-config 0.8.8                  2010-07-21                bmc-config.conf(5)
Impressum