1ipmitool(1) ipmitool(1)
2
3
4
6 ipmitool - utility for controlling IPMI-enabled devices
7
9 ipmitool [-c|-h|-v|-V] -I open <command>
10
11 ipmitool [-c|-h|-v|-V] -I lan -H <hostname>
12 [-p <port>]
13 [-U <username>]
14 [-A <authtype>]
15 [-L <privlvl>]
16 [-a|-E|-P|-f <password>]
17 [-o <oemtype>]
18 [-O <sel oem>]
19 [-e <esc_char>]
20 <command>
21
22 ipmitool [-c|-h|-v|-V] -I lanplus -H <hostname>
23 [-p <port>]
24 [-U <username>]
25 [-L <privlvl>]
26 [-a|-E|-P|-f <password>]
27 [-o <oemtype>]
28 [-O <sel oem>]
29 [-C <ciphersuite>]
30 [-k <kg_key>]
31 [-e <esc_char>]
32 <command>
33
35 This program lets you manage Intelligent Platform Management Interface
36 (IPMI) functions of either the local system, via a kernel device
37 driver, or a remote system, using IPMI V1.5 and IPMI v2.0. These func‐
38 tions include printing FRU information, LAN configuration, sensor read‐
39 ings, and remote chassis power control.
40
41 IPMI management of a local system interface requires a compatible IPMI
42 kernel driver to be installed and configured. On Linux this driver is
43 called OpenIPMI and it is included in standard distributions. On
44 Solaris this driver is called BMC and is inclued in Solaris 10. Man‐
45 agement of a remote station requires the IPMI-over-LAN interface to be
46 enabled and configured. Depending on the particular requirements of
47 each system it may be possible to enable the LAN interface using ipmi‐
48 tool over the system interface.
49
51 -a Prompt for the remote server password.
52
53 -A <authtype>
54 Specify an authentication type to use during IPMIv1.5 lan ses‐
55 sion activation. Supported types are NONE, PASSWORD, MD2, MD5,
56 or OEM.
57
58 -c Present output in CSV (comma separated variable) format. This
59 is not available with all commands.
60
61 -e <sol_escape_char>
62 Use supplied character for SOL session escape character. The
63 default is to use ~ but this can conflict with ssh sessions.
64
65 -k <key>
66 Use supplied Kg key for IPMIv2 authentication. The default is
67 not to use any Kg key.
68
69 -C <ciphersuite>
70 The remote server authentication, integrity, and encryption
71 algorithms to use for IPMIv2 lanplus connections. See table
72 22-19 in the IPMIv2 specification. The default is 3 which spec‐
73 ifies RAKP-HMAC-SHA1 authentication, HMAC-SHA1-96 integrity, and
74 AES-CBC-128 encryption algorightms.
75
76 -E The remote server password is specified by the environment vari‐
77 able IPMI_PASSWORD.
78
79 -f <password_file>
80 Specifies a file containing the remote server password. If this
81 option is absent, or if password_file is empty, the password
82 will default to NULL.
83
84 -h Get basic usage help from the command line.
85
86 -H <address>
87 Remote server address, can be IP address or hostname. This
88 option is required for lan and lanplus interfaces.
89
90 -I <interface>
91 Selects IPMI interface to use. Supported interfaces that are
92 compiled in are visible in the usage help output.
93
94 -L <privlvl>
95 Force session privilege level. Can be CALLBACK, USER, OPERATOR,
96 ADMINISTRATOR. Default is ADMINISTRATOR.
97
98 -m <local_address>
99 Set the local IPMB address. The default is 0x20 and there
100 should be no need to change it for normal operation.
101
102 -o <oemtype>
103 Select OEM type to support. This usually involves minor hacks
104 in place in the code to work around quirks in various BMCs from
105 various manufacturers. Use -o list to see a list of current
106 supported OEM types.
107
108 -O <sel oem>
109 Open selected file and read OEM SEL event descriptions to be
110 used during SEL listings. See examples in contrib dir for file
111 format.
112
113 -p <port>
114 Remote server UDP port to connect to. Default is 623.
115
116 -P <password>
117 Remote server password is specified on the command line. If
118 supported it will be obscured in the process list. Note! Speci‐
119 fying the password as a command line option is not recommended.
120
121 -S <sdr_cache_file>
122 Use local file for remote SDR cache. Using a local SDR cache
123 can drastically increase performance for commands that require
124 knowledge of the entire SDR to perform their function. Local
125 SDR cache from a remote system can be created with the sdr dump
126 command.
127
128 -t <target_address>
129 Bridge IPMI requests to the remote target address.
130
131 -U <username>
132 Remote server username, default is NULL user.
133
134 -v Increase verbose output level. This option may be specified
135 multiple times to increase the level of debug output. If given
136 three times you will get hexdumps of all incoming and outgoing
137 packets.
138
139 -V Display version information.
140
141
142 If no password method is specified then ipmitool will prompt the user
143 for a password. If no password is entered at the prompt, the remote
144 server password will default to NULL.
145
147 There are several security issues be be considered before enabling the
148 IPMI LAN interface. A remote station has the ability to control a sys‐
149 tem's power state as well as being able to gather certain platform
150 information. To reduce vulnerability it is strongly advised that the
151 IPMI LAN interface only be enabled in 'trusted' environments where sys‐
152 tem security is not an issue or where there is a dedicated secure 'man‐
153 agement network'.
154
155 Further it is strongly advised that you should not enable IPMI for
156 remote access without setting a password, and that that password should
157 not be the same as any other password on that system.
158
159 When an IPMI password is changed on a remote machine with the IPMIv1.5
160 lan interface the new password is sent across the network as clear
161 text. This could be observed and then used to attack the remote sys‐
162 tem. It is thus recommended that IPMI password management only be done
163 over IPMIv2.0 lanplus interface or the system interface on the local
164 station.
165
166 For IPMI v1.5, the maximum password length is 16 characters. Passwords
167 longer than 16 characters will be truncated.
168
169 For IPMI v2.0, the maximum password length is 20 characters; longer
170 passwords are truncated.
171
173 help This can be used to get command-line help on ipmitool com‐
174 mands. It may also be placed at the end of commands to get
175 option usage help.
176
177 ipmitool help
178 Commands:
179 raw Send a RAW IPMI request and print response
180 lan Configure LAN Channels
181 chassis Get chassis status and set power state
182 event Send events to MC
183 mc Management Controller status and global
184 enables
185 sdr Print Sensor Data Repository entries and
186 readings
187 sensor Print detailed sensor information
188 fru Print built-in FRU and scan for FRU loca‐
189 tors
190 sel Print System Event Log (SEL)
191 pef Configure Platform Event Filtering (PEF)
192 sol Configure and connect IPMIv2.0
193 Serial-over-LAN
194 tsol Configure and connect Tyan IPMIv1.5
195 Serial-over-LAN
196 isol Configure Intel IPMIv1.5 Serial-over-LAN
197 user Configure Management Controller users
198 channel Configure Management Controller channels
199 session Print session information
200 sunoem Manage Sun OEM Extensions
201 exec Run list of commands from file
202 set Set runtime variable for shell and exec
203
204 ipmitool chassis help
205 Chassis Commands: status, power, identify, policy,
206 restart_cause, poh, bootdev
207
208 ipmitool chassis power help
209 chassis power Commands: status, on, off, cycle, reset, diag,
210 soft
211
212 bmc|mc
213
214 reset <warm|cold>
215
216 Instructs the BMC to perform a warm or cold reset.
217
218 guid
219
220 Display the Management Controller Globally Unique IDenti‐
221 fier.
222
223 info
224
225 Displays information about the BMC hardware, including
226 device revision, firmware revision, IPMI version sup‐
227 ported, manufacturer ID, and information on additional
228 device support.
229
230 getenables
231
232 Displays a list of the currently enabled options for the
233 BMC.
234
235 setenables <option>=[on|off]
236
237 Enables or disables the given option. This command is
238 only supported over the system interface according to the
239 IPMI specification. Currently supported values for
240 option include:
241
242 recv_msg_intr
243
244 Receive Message Queue Interrupt
245
246 event_msg_intr
247
248 Event Message Buffer Full Interrupt
249
250 event_msg
251
252 Event Message Buffer
253
254 system_event_log
255
256 System Event Logging
257
258 oem0
259
260 OEM-Defined option #0
261
262 oem1
263
264 OEM-Defined option #1
265
266 oem2
267
268 OEM-Defined option #2
269
270 channel
271
272 authcap <channel number> <max priv>
273
274 Displays information about the authentication capabili‐
275 ties of the selected channel at the specified privilege
276 level.
277
278 Possible privilege levels are:
279 1 Callback level
280 2 User level
281 3 Operator level
282 4 Administrator level
283 5 OEM Proprietary level
284
285 info [channel number]
286
287 Displays information about the selected channel. If
288 no channel is given it will display information about the
289 currently used channel:
290
291 > ipmitool channel info
292 Channel 0xf info:
293 Channel Medium Type : System Interface
294 Channel Protocol Type : KCS
295 Session Support : session-less
296 Active Session Count : 0
297 Protocol Vendor ID : 7154
298
299 getaccess <channel number> [<userid>]
300
301 Configure the given userid as the default on the given
302 channel number. When the given channel is subsequently
303 used, the user is identified implicitly by the given
304 userid.
305
306 setaccess <channel number> <userid> [<callin=on|off>]
307 [<ipmi=on|off>] [<link=on|off>] [<privilege=level>]
308
309 Configure user access information on the given channel
310 for the given userid.
311
312 getciphers <ipmi|sol> [<channel>]
313
314 Displays the list of cipher suites supported for the
315 given application (ipmi or sol) on the given channel.
316
317 chassis
318
319 status
320
321 Displays information regarding the high-level status of
322 the system chassis and main power subsystem.
323
324 poh
325
326 This command will return the Power-On Hours counter.
327
328 identify <interval>
329
330 Control the front panel identify light. Default is 15.
331 Use 0 to turn off.
332
333 restart_cause
334
335 Query the chassis for the cause of the last system
336 restart.
337
338 policy
339
340 Set the chassis power policy in the event power fail‐
341 ure.
342
343 list
344
345 Return supported policies.
346
347 always-on
348
349 Turn on when power is restored.
350
351 previous
352
353 Returned to previous state when power is
354 restored.
355
356 always-off
357
358 Stay off after power is restored.
359
360 power
361
362 Performs a chassis control command to view and change
363 the power state.
364
365 status
366
367 Show current chassis power status.
368
369 on
370
371 Power up chassis.
372
373 off
374
375 Power down chassis into soft off (S4/S5 state).
376 WARNING: This command does not initiate a clean
377 shutdown of the operating system prior to powering
378 down the system.
379
380 cycle
381
382 Provides a power off interval of at least 1 sec‐
383 ond. No action should occur if chassis power is
384 in S4/S5 state, but it is recommended to check
385 power state first and only issue a power cycle
386 command if the system power is on or in lower
387 sleep state than S4/S5.
388
389 reset
390
391 This command will perform a hard reset.
392
393 diag
394
395 Pulse a diagnostic interrupt (NMI) directly to the
396 processor(s).
397
398 soft
399
400 Initiate a soft-shutdown of OS via ACPI. This can
401 be done in a number of ways, commonly by simulat‐
402 ing an overtemperture or by simulating a power
403 button press. It is necessary for there to be
404 Operating System support for ACPI and some sort of
405 daemon watching for events for this soft power to
406 work.
407
408 bootdev <device> [<clear-cmos=yes|no>]
409
410 Request the system to boot from an alternate boot device
411 on next reboot. The clear-cmos option, if supplied, will
412 instruct the BIOS to clear its CMOS on the next reboot.
413
414 Currently supported values for <device> are:
415
416 none
417
418 Do not change boot device
419
420 pxe
421
422 Force PXE boot
423
424 disk
425
426 Force boot from BIOS default boot device
427
428 safe
429
430 Force boot from BIOS default boot device, request
431 Safe Mode
432
433 diag
434
435 Force boot from diagnostic partition
436
437 cdrom
438
439 Force boot from CD/DVD
440
441 bios
442
443 Force boot into BIOS setup
444
445 event
446
447 <predefined event number>
448
449 Send a pre-defined event to the System Event Log. The
450 following events are included as a means to test the
451 functionality of the System Event Log component of the
452 BMC (an entry will be added each time the event n command
453 is executed).
454
455 Currently supported values for n are:
456 1 Temperature: Upper Critical: Going High
457 2 Voltage Threshold: Lower Critical: Going Low
458 3 Memory: Correctable ECC Error Detected
459
460 NOTE: These pre-defined events will likely not produce
461 "accurate" SEL records for a particular system because
462 they will not be correctly tied to a valid sensor number,
463 but they are sufficient to verify correct operation of
464 the SEL.
465
466
467 file <filename>
468
469 Event log records specified in filename will be added to
470 the System Event Log.
471
472 The format of each line in the file is as follows:
473
474 <{EvM Revision} {Sensor Type} {Sensor Num} {Event
475 Dir/Type} {Event Data 0} {Event Data 1} {Event Data 2}>[#
476 COMMENT]
477
478 Note: The Event Dir/Type field is encoded with the event
479 direction as the high bit (bit 7) and the event type as
480 the low 7 bits.
481
482 e.g.:
483 0x4 0x2 0x60 0x1 0x52 0x0 0x0 # Voltage threshold: Lower
484 Critical: Going Low
485
486
487 <sensorid> <state> [<eventdir>]
488
489 Generate a custom event based on existing sensor informa‐
490 tion. The optional event direction can be either assert
491 or deassert and defaults to assert. To get a list of
492 possible states for a sensor supply a state of list on
493 the command line. Each sensor may be different but some
494 states will have pre-defined shortcuts. For example:
495
496 > ipmitool -I open event p0.t_core
497 Finding sensor p0.t_core... ok
498 Sensor States:
499 lnr : Lower Non-Recoverable
500 lcr : Lower Critical
501 lnc : Lower Non-Critical
502 unc : Upper Non-Critical
503 ucr : Upper Critical
504 unr : Upper Non-Recoverable
505
506 > ipmitool -I open event ps0.prsnt
507 Finding sensor ps0.prsnt... ok
508 Sensor States:
509 Device Absent
510 Device Present
511 State State Shortcuts:
512 present absent
513 assert deassert
514 limit nolimit
515 fail nofail
516 yes no
517 on off
518 up down
519
520
521 exec <filename>
522
523 Execute ipmitool commands from filename. Each line is a com‐
524 plete command. The syntax of the commands are defined by the
525 COMMANDS section in this manpage. Each line may have an
526 optional comment at the end of the line, delimited with a `#'
527 symbol.
528
529 e.g., a command file with two lines:
530
531 sdr list # get a list of sdr records
532 sel list # get a list of sel records
533
534 fru
535
536 print
537
538 This command will read all Field Replaceable Unit (FRU)
539 inventory data and extract such information as serial
540 number, part number, asset tags, and short strings
541 describing the chassis, board, or product.
542
543 i2c <i2caddr> <read bytes> [<write data>]
544
545 This will allow you to execute raw I2C commands with the Master
546 Write-Read IPMI command.
547
548
549 isol
550
551 setup <baud rate>
552
553 Setup baud rate for Intel IPMI v1.5 Serial-over-LAN.
554
555 lan
556
557 These commands will allow you to configure IPMI LAN channels
558 with network information so they can be used with the ipmitool
559 lan and lanplus interfaces. NOTE: To determine on which channel
560 the LAN interface is located, issue the `channel info number'
561 command until you come across a valid 802.3 LAN channel. For
562 example:
563
564 > ipmitool -I open channel info 1
565 Channel 0x1 info:
566 Channel Medium Type : 802.3 LAN
567 Channel Protocol Type : IPMB-1.0
568 Session Support : session-based
569 Active Session Count : 8
570 Protocol Vendor ID : 7154
571
572
573 print <channel>
574
575 Print the current configuration for the given chan‐
576 nel.
577
578 set <channel> <parameter>
579
580 Set the given parameter on the given channel. Valid
581 parameters are:
582
583 ipaddr <x.x.x.x>
584
585 Set the IP address for this channel.
586
587 netmask <x.x.x.x>
588
589 Set the netmask for this channel.
590
591 macaddr <xx:xx:xx:xx:xx:xx>
592
593 Set the MAC address for this channel.
594
595 defgw ipaddr <x.x.x.x>
596
597 Set the default gateway IP address.
598
599 defgw macaddr <xx:xx:xx:xx:xx:xx>
600
601 Set the default gateway MAC address.
602
603 bakgw ipaddr <x.x.x.x>
604
605 Set the backup gateway IP address.
606
607 bakgw macaddr <xx:xx:xx:xx:xx:xx>
608
609 Set the backup gateway MAC address.
610
611 password <pass>
612
613 Set the null user password.
614
615 snmp <community string>
616
617 Set the SNMP community string.
618
619 user
620
621 Enable user access mode for userid 1 (issue the
622 `user' command to display information about
623 userids for a given channel).
624
625 access <on|off>
626
627 Set LAN channel access mode.
628
629 ipsrc <source>
630
631 Set the IP address source:
632 none unspecified
633 static manually configured static IP address
634 dhcp address obtained by BMC running DHCP
635 bios address loaded by BIOS or system software
636
637 arp respond <on|off>
638
639 Set BMC generated ARP responses.
640
641 arp generate <on|off>
642
643 Set BMC generated gratuitous ARPs.
644
645 arp interval <seconds>
646
647 Set BMC generated gratuitous ARP interval.
648
649 vlan id <off|id>
650
651 Disable VLAN operation or enable VLAN and set the
652 ID.
653 ID: value of the virtual lan identifier between 1
654 and 4094 inclusive.
655
656 vlan priority <priority>
657
658 Set the priority associated with VLAN frames.
659 ID: priority of the virtual lan frames between 0
660 and 7 inclusive.
661
662 auth <level,...> <type,...>
663
664 Set the valid authtypes for a given auth
665 level.
666 Levels: callback, user, operator, admin
667 Types: none, md2, md5, password, oem
668
669 cipher_privs <privlist>
670
671 Correlates cipher suite numbers with the maximum
672 privilege level that is allowed to use it. In
673 this way, cipher suites can restricted to users
674 with a given privilege level, so that, for exam‐
675 ple, administrators are required to use a stronger
676 cipher suite than normal users.
677
678 The format of privlist is as follows. Each char‐
679 acter represents a privilege level and the charac‐
680 ter position identifies the cipher suite number.
681 For example, the first character represents cipher
682 suite 1 (cipher suite 0 is reserved), the second
683 represents cipher suite 2, and so on. privlist
684 must be 15 characters in length.
685
686 Characters used in privlist and their associated
687 privilege levels are:
688
689 X Cipher Suite Unused
690 c CALLBACK
691 u USER
692 o OPERATOR
693 a ADMIN
694 O OEM
695
696 So, to set the maximum privilege for cipher suite
697 1 to USER and suite 2 to ADMIN, issue the follow‐
698 ing command:
699
700 > ipmitool -I interface lan set channel
701 cipher_privs uaXXXXXXXXXXXXX
702
703
704 pef
705
706 info
707
708 This command will query the BMC and print information
709 about the PEF supported features.
710
711 status
712
713 This command prints the current PEF status (the last SEL
714 entry processed by the BMC, etc).
715
716 policy
717
718 This command lists the PEF policy table entries. Each
719 policy entry describes an alert destination. A policy
720 set is a collection of table entries. PEF alert actions
721 reference policy sets.
722
723 list
724
725 This command lists the PEF table entries. Each PEF entry
726 relates a sensor event to an action. When PEF is active,
727 each platform event causes the BMC to scan this table for
728 entries matching the event, and possible actions to be
729 taken. Actions are performed in priority order (higher
730 criticality first).
731
732 raw <netfn> <cmd> [<data>]
733
734 This will allow you to execute raw IPMI commands. For example
735 to query the POH counter with a raw command:
736
737 > ipmitool -v raw 0x0 0xf
738 RAW REQ (netfn=0x0 cmd=0xf data_len=0)
739 RAW RSP (5 bytes)
740 3c 72 0c 00 00
741
742 sdr
743
744 get <id> ... [<id>]
745
746 Prints information for sensor data records specified by
747 sensor id.
748
749 info
750
751 This command will query the BMC for SDR information.
752
753 type <sensor type>
754
755 This command will display all records from the SDR of a
756 specific type. Run with type list to see the list of
757 available types. For example to query for all Tempera‐
758 ture sensors:
759
760 > ipmitool sdr type Temperature
761 Baseboard Temp | 30h | ok | 7.1 | 28 degrees C
762 FntPnl Amb Temp | 32h | ok | 12.1 | 24 degrees C
763 Processor1 Temp | 98h | ok | 3.1 | 57 degrees C
764 Processor2 Temp | 99h | ok | 3.2 | 53 degrees C
765
766
767 list | elist [<all|full|compact|event|mcloc|fru|generic>]
768
769 This command will read the Sensor Data Records (SDR) and
770 extract sensor information of a given type, then query
771 each sensor and print its name, reading, and status. If
772 invoked as elist then it will also print sensor number,
773 entity id and instance, and asserted discrete states.
774
775 The default output will only display full and compact
776 sensor types, to see all sensors use the all type with
777 this command.
778
779 Valid types are:
780
781 all
782
783 All SDR records (Sensor and Locator)
784
785 full
786
787 Full Sensor Record
788
789 compact
790
791 Compact Sensor Record
792
793 event
794
795 Event-Only Sensor Record
796
797 mcloc
798
799 Management Controller Locator Record
800
801 fru
802
803 FRU Locator Record
804
805 generic
806
807 Generic SDR records
808
809 entity <id>[.<instance>]
810
811 Displays all sensors associated with an entity. Get a
812 list of valid entity ids on the target system by issuing
813 the sdr elist command. A list of all entity ids can be
814 found in the IPMI specifications.
815
816 dump <file>
817
818 Dumps raw SDR data to a file. This data file can then be
819 used as a local SDR cache of the remote managed system
820 with the -S <file> option on the ipmitool command line.
821 This can greatly improve performance over system inter‐
822 face or remote LAN.
823
824 sel
825
826 NOTE: SEL entry-times are displayed as `Pre-Init Time-stamp' if
827 the SEL clock needs to be set. Ensure that the SEL clock is
828 accurate by invoking the sel time get and sel time set <time
829 string> commands.
830
831 info
832
833 This command will query the BMC for information about the
834 System Event Log (SEL) and its contents.
835
836 clear
837
838 This command will clear the contents of the SEL. It
839 cannot be undone so be careful.
840
841 list | elist
842
843 When this command is invoked without arguments, the
844 entire contents of the System Event Log are displayed.
845 If invoked as elist it will also use the Sensor Data
846 Record entries to display the sensor ID for the sensor
847 that caused each event. Note this can take a long time
848 over the system interface.
849
850
851 <count>|first <count>
852
853 Displays the first count (least-recent) entries in
854 the SEL. If count is zero, all entries are dis‐
855 played.
856
857 last <count>
858
859 Displays the last count (most-recent) entries in
860 the SEL. If count is zero, all entries are dis‐
861 played.
862
863 delete <number>
864
865 Delete a single event.
866
867 save <file>
868
869 Save SEL records to text file that can be fed back into
870 the event file ipmitool command. This can be useful for
871 testing Event generation by building an appropriate Plat‐
872 form Event Message file based on existing events. Please
873 see the help for that command to view the format of this
874 file.
875
876 writeraw <file>
877
878 Save SEL records to a file in raw, binary format. This
879 file can be fed back to the sel readraw ipmitool command
880 for viewing.
881
882 readraw <file>
883
884 Read and display SEL records from a binary file. Such a
885 file can be created using the sel writeraw ipmitool com‐
886 mand.
887
888 time
889
890 get
891 Displays the SEL clock's current time.
892
893 set <time string>
894
895 Sets the SEL clock. Future SEL entries will use
896 the time set by this command. <time string> is of
897 the form "MM/DD/YYYY HH:MM:SS". Note that hours
898 are in 24-hour form. It is recommended that the
899 SEL be cleared before setting the time.
900
901 sensor
902
903 list
904
905 Lists sensors and thresholds in a wide table format.
906
907 get <id> ... [<id>]
908
909 Prints information for sensors specified by name.
910
911 thresh <id> <threshold> <setting>
912
913 This allows you to set a particular sensor threshold
914 value. The sensor is specified by name.
915
916 Valid thresholds are:
917 unr Upper Non-Recoverable
918 ucr Upper Critical
919 unc Upper Non-Critical
920 lnc Lower Non-Critical
921 lcr Lower Critical
922 lnr Lower Non-Recoverable
923
924 thresh <id> lower <lnr> <lcr> <lnc>
925
926 This allows you to set all lower thresholds for a sensor
927 at the same time. The sensor is specified by name and
928 the thresholds are listed in order of Lower Non-Recover‐
929 able, Lower Critical, and Lower Non-Critical.
930
931 thresh <id> upper <unc> <ucr> <unr>
932
933 This allows you to set all upper thresholds for a sensor
934 at the same time. The sensor is specified by name and
935 the thresholds are listed in order of Upper Non-Critical,
936 Upper Critical, and Upper Non-Recoverable.
937
938
939 session
940
941 info <active|all|id 0xnnnnnnnn|handle 0xnn>
942
943 Get information about the specified session(s). You may
944 identify sessions by their id, by their handle number, by
945 their active status, or by using the keyword `all' to
946 specify all sessions.
947
948 shell
949 This command will launch an interactive shell which you can use
950 to send multiple ipmitool commands to a BMC and see the
951 responses. This can be useful instead of running the full ipmi‐
952 tool command each time. Some commands will make use of a Sensor
953 Data Record cache and you will see marked improvement in speed
954 if these commands are able to reuse the same cache in a shell
955 session. LAN sessions will send a periodic keepalive command to
956 keep the IPMI session from timing out.
957
958 sol
959
960 info [<channel number>]
961
962 Retrieve information about the Serial-Over-LAN configura‐
963 tion on the specified channel. If no channel is given,
964 it will display SOL configuration data for the currently
965 used channel.
966
967 set <parameter> <value> [<channel>]
968
969 Configure parameters for Serial Over Lan. If no channel
970 is given, it will display SOL configuration data for the
971 currently used channel. Configuration parameter updates
972 are automatically guarded with the updates to the
973 set-in-progress parameter.
974
975 Valid parameters and values are:
976
977 set-in-progress
978 set-complete set-in-progress commit-write
979
980 enabled
981 true false
982
983 force-encryption
984 true false
985
986 force-authentication
987 true false
988
989 privilege-level
990 user operator admin oem
991
992 character-accumulate-level
993 Decimal number given in 5 milliseconds increments
994
995 character-send-threshold
996 Decimal number
997
998 retry-count
999 Decimal number. 0 indicates no retries after
1000 packet is transmitted.
1001
1002 retry-interval
1003 Decimal number in 10 millisend increments. 0
1004 indicates that retries should be sent back to
1005 back.
1006
1007 non-volatile-bit-rate
1008 serial, 19.2, 38.4, 57.6, 115.2. Setting this
1009 value to serial indicates that the BMC should use
1010 the setting used by the IPMI over serial channel.
1011
1012 volatile-bit-rate
1013 serial, 19.2, 38.4, 57.6, 115.2. Setting this
1014 value to serial indiates that the BMC should use
1015 the setting used by the IPMI over serial channel.
1016
1017 activate
1018
1019 Causes ipmitool to enter Serial Over LAN mode, and is
1020 only available when using the lanplus interface. An
1021 RMCP+ connection is made to the BMC, the terminal is set
1022 to raw mode, and user input is sent to the serial console
1023 on the remote server. On exit,the the SOL payload mode
1024 is deactivated and the terminal is reset to its original
1025 settings.
1026
1027 Special escape sequences are provided to control the SOL
1028 session:
1029
1030 ~. Terminate connection
1031
1032 ~^Z Suspend ipmitool
1033
1034 ~B Send break
1035
1036 ~~ Send the escape character by typing it twice
1037
1038 ~? Print the supported escape sequences
1039
1040 deactivate
1041
1042 Deactivates Serial Over LAN mode on the BMC. Exiting
1043 Serial Over LAN mode should automatically cause this com‐
1044 mand to be sent to the BMC, but in the case of an unin‐
1045 tentional exit from SOL mode, this command may be neces‐
1046 sary to reset the state of the BMC.
1047
1048 sunoem
1049
1050 led
1051
1052 These commands provide a way to get and set the status of
1053 LEDs on a Sun Microsystems server. Use 'sdr list
1054 generic' to get a list of devices that are controllable
1055 LEDs. The ledtype parameter is optional and not neces‐
1056 sary to provide on the command line unless it is required
1057 by hardware.
1058
1059 get <sensorid> [<ledtype>]
1060
1061 Get status of a particular LED described by a
1062 Generic Device Locator record in the SDR. A sen‐
1063 sorid of all will get the status of all available
1064 LEDS.
1065
1066 set <sensorid> <ledmode> [<ledtype>]
1067
1068 Set status of a particular LED described by a
1069 Generic Device Locator record in the SDR. A sen‐
1070 sorid of all will set the status of all available
1071 LEDS to the specified ledmode and ledtype.
1072
1073 LED Mode is required for set operations:
1074 OFF Off
1075 ON Steady On
1076 STANDBY 100ms on 2900ms off blink rate
1077 SLOW 1HZ blink rate
1078 FAST 4HZ blink rate
1079
1080 LED Type is optional:
1081 OK2RM Ok to Remove
1082 SERVICE Service Required
1083 ACT Activity
1084 LOCATE Locate
1085
1086
1087 sshkey
1088
1089 set <userid> <keyfile>
1090
1091 This command will allow you to specify an SSH key
1092 to use for a particular user on the Service Pro‐
1093 cessor. This key will be used for CLI logins to
1094 the SP and not for IPMI sessions. View available
1095 users and their userids with the 'user list' com‐
1096 mand.
1097
1098 del <userid>
1099
1100 This command will delete the SSH key for a speci‐
1101 fied userid.
1102
1103
1104
1105 tsol
1106
1107 This command allows Serial-over-LAN sessions to be established
1108 with Tyan IPMIv1.5 SMDC such as the M3289 or M3290. The default
1109 command run with no arguments will establish default SOL session
1110 back to local IP address. Optional arguments may be supplied in
1111 any order.
1112
1113
1114 <ipaddr>
1115
1116 Send receiver IP address to SMDC which it will use to
1117 send serial traffic to. By default this detects the
1118 local IP address and establishes two-way session.
1119
1120
1121 port=NUM
1122
1123 Configure UDP port to receive serial traffic on. By
1124 default this is 6230.
1125
1126
1127 ro|rw
1128
1129 Confiure SOL session as read-only or read-write. Ses‐
1130 sions are read-write by default.
1131
1132
1133
1134 user
1135
1136 summary
1137
1138 Displays a summary of userid information, including maxi‐
1139 mum number of userids, the number of enabled users, and
1140 the number of fixed names defined.
1141
1142 list
1143
1144 Displays a list of user information for all defined
1145 userids.
1146
1147 set
1148
1149 name <userid> <username>
1150
1151 Sets the username associated with the given
1152 userid.
1153
1154 password <userid> [<password>]
1155
1156 Sets the password for the given userid. If no
1157 password is given, the password is cleared (set to
1158 the NULL password). Be careful when removing
1159 passwords from administrator-level accounts.
1160
1161 disable <userid>
1162
1163 Disables access to the BMC by the given userid.
1164
1165 enable <userid>
1166
1167 Enables access to the BMC by the given userid.
1168
1169 test <userid> <16|20> [<password>]
1170
1171 Determine whether a password has been stored as 16 or 20
1172 bytes.
1173
1174
1176 The ipmitool open interface utilizes the OpenIPMI kernel device driver.
1177 This driver is present in all modern 2.4 and all 2.6 kernels and it
1178 should be present in recent Linux distribution kernels. There are also
1179 IPMI driver kernel patches for different kernel versions available from
1180 the OpenIPMI homepage.
1181
1182 The required kernel modules is different for 2.4 and 2.6 kernels. The
1183 following kernel modules must be loaded on a 2.4-based kernel in order
1184 for ipmitool to work:
1185
1186 ipmi_msghandler
1187 Incoming and outgoing message handler for IPMI interfaces.
1188
1189 ipmi_kcs_drv
1190 An IPMI Keyboard Controler Style (KCS) interface driver for the
1191 message handler.
1192
1193 ipmi_devintf
1194 Linux character device interface for the message handler.
1195
1196 The following kernel modules must be loaded on a 2.6-based kernel in
1197 order for ipmitool to work:
1198
1199 ipmi_msghandler
1200 Incoming and outgoing message handler for IPMI interfaces.
1201
1202 ipmi_si
1203 An IPMI system interface driver for the message handler. This
1204 module supports various IPMI system interfaces such as KCS, BT,
1205 SMIC, and even SMBus in 2.6 kernels.
1206
1207 ipmi_devintf
1208 Linux character device interface for the message handler.
1209
1210 Once the required modules are loaded there will be a dynamic character
1211 device entry that must exist at /dev/ipmi0. For systems that use devfs
1212 or udev this will appear at /dev/ipmi/0.
1213
1214 To create the device node first determine what dynamic major number it
1215 was assigned by the kernel by looking in /proc/devices and checking for
1216 the ipmidev entry. Usually if this is the first dynamic device it will
1217 be major number 254 and the minor number for the first system interface
1218 is 0 so you would create the device entry with:
1219
1220 mknod /dev/ipmi0 c 254 0
1221
1222 ipmitool includes some sample initialization scripts that can perform
1223 this task automatically at start-up.
1224
1225 In order to have ipmitool use the OpenIPMI device interface you can
1226 specifiy it on the command line:
1227
1228 ipmitool -I open <command>
1229
1231 The ipmitool bmc interface utilizes the bmc device driver as provided
1232 by Solaris 10 and higher. In order to force ipmitool to make use of
1233 this interface you can specify it on the command line:
1234
1235 ipmitool -I bmc <command>
1236
1237 The following files are associated with the bmc driver:
1238
1239
1240 /platform/i86pc/kernel/drv/bmc
1241 32-bit ELF kernel module for the bmc driver.
1242
1243 /platform/i86pc/kernel/drv/amd64/bmc
1244 64-bit ELF kernel module for the bmc driver.
1245
1246 /dev/bmc
1247 Character device node used to communicate with the bmc driver.
1248
1250 The ipmitool lipmi interface uses the Solaris 9 IPMI kernel device
1251 driver. It has been superceeded by the bmc interface on Solaris 10.
1252 You can tell ipmitool to use this interface by specifying it on the
1253 command line.
1254
1255 ipmitool -I lipmi <expression>
1256
1258 The ipmitool lan interface communicates with the BMC over an Ethernet
1259 LAN connection using UDP under IPv4. UDP datagrams are formatted to
1260 contain IPMI request/response messages with a IPMI session headers and
1261 RMCP headers.
1262
1263 IPMI-over-LAN uses version 1 of the Remote Management Control Protocol
1264 (RMCP) to support pre-OS and OS-absent management. RMCP is a
1265 request-response protocol delivered using UDP datagrams to port 623.
1266
1267 The LAN interface is an authenticatiod multi-session connection; mes‐
1268 sages delivered to the BMC can (and should) be authenticated with a
1269 challenge/response protocol with either straight password/key or MD5
1270 message-digest algorithm. ipmitool will attempt to connect with admin‐
1271 istrator privilege level as this is required to perform chassis power
1272 functions.
1273
1274 You can tell ipmitool to use the lan interface with the -I lan option:
1275
1276
1277 ipmitool -I lan -H <hostname> [-U <username>] [-P <password>] <command>
1278
1279 A hostname must be given on the command line in order to use the lan
1280 interface with ipmitool. The password field is optional; if you do not
1281 provide a password on the command line, ipmitool will attempt to con‐
1282 nect without authentication. If you specify a password it will use MD5
1283 authentication if supported by the BMC and straight password/key other‐
1284 wise, unless overridden with a command line option.
1285
1287 Like the lan interface, the lanplus interface communicates with the BMC
1288 over an Ethernet LAN connection using UDP under IPv4. The difference
1289 is that the lanplus interface uses the RMCP+ protocol as described in
1290 the IMPI v2.0 specification. RMCP+ allows for improved authentication
1291 and data integrity checks, as well as encryption and the ability to
1292 carry multiple types of payloads. Generic Serial Over LAN support
1293 requires RMCP+, so the ipmitool sol activate command requires the use
1294 of the lanplus interface.
1295
1296 RMCP+ session establishment uses a symmetric challenge-response proto‐
1297 col called RAKP (Remote Authenticated Key-Exchange Protocol) which
1298 allows the negotiation of many options. ipmitool does not yet allow
1299 the user to specify the value of every option, defaulting to the most
1300 obvious settings marked as required in the v2.0 specification. Authen‐
1301 tication and integrity HMACS are produced with SHA1, and encryption is
1302 performed with AES-CBC-128. Role-level logins are not yet supported.
1303
1304 ipmitool must be linked with the OpenSSL library in order to perform
1305 the encryption functions and support the lanplus interface. If the
1306 required packages are not found it will not be compiled in and sup‐
1307 ported.
1308
1309 You can tell ipmitool to use the lanplus interface with the -I lanplus
1310 option:
1311
1312
1313 ipmitool -I lanplus -H <hostname> [-U <username>] [-P <password>] <com‐
1314 mand>
1315
1316 A hostname must be given on the command line in order to use the lan
1317 interface with ipmitool. With the exception of the -A and -C options
1318 the rest of the command line options are identical to those available
1319 for the lan interface.
1320
1321 The -C option allows you specify the authentication, integrity, and
1322 encryption algorithms to use for for lanplus session based on the
1323 cipher suite ID found in the IPMIv2.0 specification in table 22-19.
1324 The default cipher suite is 3 which specifies RAKP-HMAC-SHA1 authenti‐
1325 cation, HMAC-SHA1-96 integrity, and AES-CBC-128 encryption algorightms.
1326
1328 Example 1: Listing remote sensors
1329
1330 > ipmitool -I lan -H 1.2.3.4 -f passfile sdr list
1331 Baseboard 1.25V | 1.24 Volts | ok
1332 Baseboard 2.5V | 2.49 Volts | ok
1333 Baseboard 3.3V | 3.32 Volts | ok
1334
1335 Example 2: Displaying status of a remote sensor
1336
1337 > ipmitool -I lan -H 1.2.3.4 -f passfile sensor get "Baseboard
1338 1.25V"
1339 Locating sensor record...
1340 Sensor ID : Baseboard 1.25V (0x10)
1341 Sensor Type (Analog) : Voltage
1342 Sensor Reading : 1.245 (+/- 0.039) Volts
1343 Status : ok
1344 Lower Non-Recoverable : na
1345 Lower Critical : 1.078
1346 Lower Non-Critical : 1.107
1347 Upper Non-Critical : 1.382
1348 Upper Critical : 1.431
1349 Upper Non-Recoverable : na
1350
1351 Example 3: Displaying the power status of a remote chassis
1352
1353 > ipmitool -I lan -H 1.2.3.4 -f passfile chassis power status
1354 Chassis Power is on
1355
1356 Example 4: Controlling the power on a remote chassis
1357
1358 > ipmitool -I lan -H 1.2.3.4 -f passfile chassis power on
1359 Chassis Power Control: Up/On
1360
1362 Duncan Laurie <duncan@iceblink.org>
1363
1365 IPMItool Homepage
1366 http://ipmitool.sourceforge.net
1367
1368 Intelligent Platform Management Interface Specification
1369 http://www.intel.com/design/servers/ipmi
1370
1371 OpenIPMI Homepage
1372 http://openipmi.sourceforge.net
1373
1374
1375
1376
1377Duncan Laurie ipmitool(1)