ipmitool.1 88 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745
  1. .TH "ipmitool" "1" "" "Duncan Laurie" ""
  2. .SH "NAME"
  3. ipmitool \- utility for controlling IPMI\-enabled devices
  4. .SH "SYNOPSIS"
  5. ipmitool [ <options> ] <command> [ <sub-commands and sub-options> ]
  6. <options> := [ <general-options> | <conditional-opts> ]
  7. .br
  8. Any recognized option is accepted. Conditional options may be ignored or it's usage postponed until shell or exec processes relevant command.
  9. .br
  10. <general\-options> := [ \-h | \-V | \-v | \-I <interface> | \-H <address> |
  11. \-d <N> | \-p <port> | \-c | \-U <username> |
  12. \-L <privlvl> | \-l <lun> | \-m <local_address> |
  13. \-N <sec> | \-R <count> | <password\-option> |
  14. <oem-option> | <bridge-options> ]
  15. <conditional\-opts> := [ <lan\-options> | <lanplus\-options> |
  16. <command\-options> ]
  17. .br
  18. Bridging:
  19. .br
  20. <bridge\-options> := \-t <target_address> [ \-b <channel> |
  21. [ \-T <address> | \-B <channel> ] ]
  22. .br
  23. Options used with \-I lan:
  24. .br
  25. <lan\-options> := [ \-A <authtype> ]
  26. .br
  27. Options used with \-I lanplus:
  28. .br
  29. <lanplus\-options> := [ \-C <ciphersuite> | <key\-option> ]
  30. .br
  31. Option groups setting same value:
  32. .br
  33. <key\-option> := [ \-k <key> | \-K | \-y <hex_key> | \-Y ]
  34. .br
  35. <password\-option> := [ \-f <password_file> | \-a | \-P <password> | \-E ]
  36. .br
  37. <oem\-option> := [ \-o <oemtype> | \-g | \-s ]
  38. .br
  39. Options used with specific command <command-options>:
  40. .br
  41. <options\-sdr> := [ \-S <sdr_cache_file> ]
  42. .br
  43. <options\-sel> := [ \-O <sel_oem> ]
  44. .br
  45. <options\-sol> := [ \-e <sol_escape_char> ]
  46. .SH "DESCRIPTION"
  47. This program lets you manage Intelligent Platform Management Interface
  48. (IPMI) functions of either the local system, via a kernel device driver,
  49. or a remote system, using IPMI v1.5 and IPMI v2.0. These functions include
  50. printing FRU information, LAN configuration, sensor readings, and remote
  51. chassis power control.
  52. IPMI management of a local system interface requires a compatible IPMI
  53. kernel driver to be installed and configured. On Linux this driver is
  54. called \fIOpenIPMI\fP and it is included in standard distributions.
  55. On Solaris this driver is called \fIBMC\fP and is included in Solaris 10.
  56. Management of a remote station requires the IPMI\-over\-LAN interface to be
  57. enabled and configured. Depending on the particular requirements of each
  58. system it may be possible to enable the LAN interface using ipmitool over
  59. the system interface.
  60. .SH "OPTIONS"
  61. .TP
  62. \fB\-a\fR
  63. Prompt for the remote server password.
  64. .TP
  65. \fB\-A\fR <\fIauthtype\fP>
  66. Specify an authentication type to use during IPMIv1.5 \fIlan\fP
  67. session activation. Supported types are NONE, PASSWORD, MD2, MD5, or OEM.
  68. .TP
  69. \fB\-b\fR <\fIchannel\fP>
  70. Set destination channel for bridged request.
  71. .TP
  72. \fB\-B\fR <\fIchannel\fP>
  73. Set transit channel for bridged request (dual bridge).
  74. .TP
  75. \fB\-b\fR <\fIchannel\fP>
  76. Set destination channel for bridged request.
  77. .TP
  78. \fB\-B\fR <\fIchannel\fP>
  79. Set transit channel for bridged request. (dual bridge)
  80. .TP
  81. \fB\-c\fR
  82. Present output in CSV (comma separated variable) format.
  83. This is not available with all commands.
  84. .TP
  85. \fB\-C\fR <\fIciphersuite\fP>
  86. The remote server authentication, integrity, and encryption algorithms
  87. to use for IPMIv2.0 \fIlanplus\fP connections. See table 22\-19 in the
  88. IPMIv2.0 specification. The default is 3 which specifies RAKP\-HMAC\-SHA1
  89. authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128 encryption algorithms.
  90. .TP
  91. \fB\-d \fIN\fP\fR
  92. Use device number N to specify the /dev/ipmiN (or
  93. /dev/ipmi/N or /dev/ipmidev/N) device to use for in-band
  94. BMC communication. Used to target a specific BMC on a
  95. multi-node, multi-BMC system through the ipmi device
  96. driver interface. Default is 0.
  97. .TP
  98. \fB\-e\fR <\fIsol_escape_char\fP>
  99. Use supplied character for SOL session escape character. The default
  100. is to use \fI~\fP but this can conflict with ssh sessions.
  101. .TP
  102. \fB\-E\fR
  103. The remote server password is specified by the environment
  104. variable \fIIPMI_PASSWORD\fP or \fIIPMITOOL_PASSWORD\fP. The \fIIPMITOOL_PASSWORD\fP takes precedence.
  105. .TP
  106. \fB\-f\fR <\fIpassword_file\fP>
  107. Specifies a file containing the remote server password. If this
  108. option is absent, or if password_file is empty, the password
  109. will default to NULL.
  110. .TP
  111. \fB\-g\fR
  112. Deprecated. Use: \-o intelplus
  113. .TP
  114. \fB\-h\fR
  115. Get basic usage help from the command line.
  116. .TP
  117. \fB\-H\fR <\fIaddress\fP>
  118. Remote server address, can be IP address or hostname. This
  119. option is required for \fIlan\fP and \fIlanplus\fP interfaces.
  120. .TP
  121. \fB\-I\fR <\fIinterface\fP>
  122. Selects IPMI interface to use. Supported interfaces that are
  123. compiled in are visible in the usage help output.
  124. .TP
  125. \fB\-k\fR <\fIkey\fP>
  126. Use supplied Kg key for IPMIv2.0 authentication. The default is not to
  127. use any Kg key.
  128. .TP
  129. \fB\-K\fR
  130. Read Kg key from IPMI_KGKEY environment variable.
  131. .TP
  132. \fB\-l\fR <\fIlun\fP>
  133. Set destination lun for raw commands.
  134. .TP
  135. \fB\-L\fR <\fIprivlvl\fP>
  136. Force session privilege level. Can be CALLBACK, USER,
  137. OPERATOR, ADMINISTRATOR. Default is ADMINISTRATOR.
  138. This value is ignored and always set to ADMINISTRATOR when
  139. combined with \fI-t target address\fP.
  140. .TP
  141. \fB\-m\fR <\fIlocal_address\fP>
  142. Set the local IPMB address. The local address defaults to 0x20
  143. or is auto discovered on PICMG platforms when \-m is not specified.
  144. There should be no need to change the local address for normal operation.
  145. .TP
  146. \fB\-N\fR <\fIsec\fP>
  147. Specify nr. of seconds between retransmissions of lan/lanplus messages.
  148. Defaults are 2 seconds for lan and 1 second for lanplus interfaces.
  149. Command \fIraw\fP uses fixed value of 15 seconds.
  150. Command \fIsol\fP uses fixed value of 1 second.
  151. .TP
  152. \fB\-o\fR <\fIoemtype\fP>
  153. Select OEM type to support. This usually involves minor hacks
  154. in place in the code to work around quirks in various BMCs from
  155. various manufacturers. Use \fI\-o list\fP to see a list of
  156. current supported OEM types.
  157. .TP
  158. \fB\-O\fR <\fIsel oem\fP>
  159. Open selected file and read OEM SEL event descriptions to be used
  160. during SEL listings. See examples in contrib dir for file format.
  161. .TP
  162. \fB\-p\fR <\fIport\fP>
  163. Remote server UDP port to connect to. Default is 623.
  164. .TP
  165. \fB\-P\fR <\fIpassword\fP>
  166. Remote server password is specified on the command line.
  167. If supported it will be obscured in the process list.
  168. \fBNote!\fR Specifying the password as a command line
  169. option is not recommended.
  170. .TP
  171. \fB\-R\fR <\fIcount\fP>
  172. Set the number of retries for lan/lanplus interface (default=4).
  173. Command \fIraw\fP uses fixed value of one try (no retries).
  174. Command \fIhpm\fP uses fixed value of 10 retries.
  175. .TP
  176. \fB\-s\fR
  177. Deprecated. Use: \-o supermicro
  178. .TP
  179. \fB\-S\fR <\fIsdr_cache_file\fP>
  180. Use local file for remote SDR cache. Using a local SDR cache
  181. can drastically increase performance for commands that require
  182. knowledge of the entire SDR to perform their function. Local
  183. SDR cache from a remote system can be created with the
  184. \fIsdr dump\fP command.
  185. .TP
  186. \fB\-t\fR <\fItarget_address\fP>
  187. Bridge IPMI requests to the remote target address. Default is 32.
  188. The \fI-L privlvl\fP option is always ignored and value set to ADMINISTRATOR.
  189. .TP
  190. \fB\-T\fR <\fIaddress\fP>
  191. Set transit address for bridge request (dual bridge).
  192. .TP
  193. \fB\-T\fR <\fItransmit_address\fP>
  194. Set transit address for bridge request. (dual bridge)
  195. .TP
  196. \fB\-U\fR <\fIusername\fP>
  197. Remote server username, default is NULL user.
  198. .TP
  199. \fB\-v\fR
  200. Increase verbose output level. This option may be specified
  201. multiple times to increase the level of debug output. If given
  202. three times you will get hexdumps of all incoming and
  203. outgoing packets. Using it five times provides details
  204. on request and expected reply procesing. The \fIhpm\fP commands
  205. \fItargetcap\fP \fIcompprop\fP \fIabort\fP \fIupgstatus\fP
  206. \fIrollback\fP \fIrollbackstatus\fP \fIselftestresult\fP increases
  207. the verbosity level
  208. .TP
  209. \fB\-V\fR
  210. Display version information.
  211. .TP
  212. \fB\-y\fR <\fIhex key\fP>
  213. Use supplied Kg key for IPMIv2.0 authentication. The key is expected in
  214. hexadecimal format and can be used to specify keys with non-printable
  215. characters. E.g. '\-k PASSWORD' and '\-y 50415353574F5244' are
  216. equivalent.
  217. The default is not to use any Kg key.
  218. .TP
  219. \fB\-Y\fR
  220. Prompt for the Kg key for IPMIv2.0 authentication.
  221. .TP
  222. \fB\-z\fR <\fIsize\fP>
  223. Change Size of Communication Channel. (OEM)
  224. .LP
  225. If no password method is specified then ipmitool will prompt the
  226. user for a password. If no password is entered at the prompt,
  227. the remote server password will default to NULL.
  228. .SH "SECURITY"
  229. There are several security issues be be considered before enabling the
  230. IPMI LAN interface. A remote station has the ability to control a system's power
  231. state as well as being able to gather certain platform information. To reduce
  232. vulnerability it is strongly advised that the IPMI LAN interface only be
  233. enabled in 'trusted' environments where system security is not an issue or
  234. where there is a dedicated secure 'management network'.
  235. Further it is strongly advised that you should not enable IPMI for
  236. remote access without setting a password, and that that password should
  237. not be the same as any other password on that system.
  238. When an IPMI password is changed on a remote machine with the IPMIv1.5
  239. \fIlan\fP interface the new password is sent across the network
  240. as clear text. This could be observed and then used to attack the remote
  241. system. It is thus recommended that IPMI password management only be done
  242. over IPMIv2.0 \fIlanplus\fP interface or the system interface on the
  243. local station.
  244. For IPMI v1.5, the maximum password length is 16 characters.
  245. Passwords longer than 16 characters will be truncated.
  246. For IPMI v2.0, the maximum password length is 20 characters;
  247. longer passwords are truncated.
  248. .SH "COMMANDS"
  249. .TP
  250. \fIhelp\fP
  251. This can be used to get command\-line help on ipmitool
  252. commands. It may also be placed at the end of commands
  253. to get option usage help.
  254. ipmitool help
  255. .br
  256. Commands:
  257. bmc Deprecated. Use mc
  258. channel Configure Management Controller channels
  259. chassis Get chassis status and set power state
  260. dcmi Data Center Management Interface
  261. delloem Manage Dell OEM Extensions.
  262. echo Used to echo lines to stdout in scripts
  263. ekanalyzer run FRU-Ekeying analyzer using FRU files
  264. event Send events to MC
  265. exec Run list of commands from file
  266. firewall Configure Firmware Firewall
  267. fru Print built\-in FRU and scan for FRU locators
  268. fwum Update IPMC using Kontron OEM Firmware Update Manager
  269. gendev Read/Write Device associated with Generic Device locators sdr
  270. hpm Update HPM components using PICMG HPM.1 file
  271. i2c Send an I2C Master Write-Read command and print response
  272. ime Upgrade/Query Intel ME firmware
  273. isol Configure and connect Intel IPMIv1.5 Serial\-over\-LAN
  274. kontronoem Manage Kontron OEM Extensions
  275. lan Configure LAN Channels
  276. mc Management Controller status and global enables
  277. nm Node Manager
  278. pef Configure Platform Event Filtering (PEF)
  279. picmg Run a PICMG/ATA extended command
  280. power Shortcut to chassis power commands
  281. raw Send a RAW IPMI request and print response
  282. sdr Print Sensor Data Repository entries and readings
  283. sel Print System Event Log (SEL)
  284. sensor Print detailed sensor information
  285. session Print session information
  286. set Set runtime variable for shell and exec
  287. shell Launch interactive IPMI shell
  288. sol Configure and connect IPMIv2.0 Serial\-over\-LAN
  289. spd Print SPD info from remote I2C device
  290. sunoem Manage Sun OEM Extensions
  291. tsol Configure and connect Tyan IPMIv1.5 Serial\-over\-LAN
  292. user Configure Management Controller users
  293. .TP
  294. \fIchannel\fP
  295. .RS
  296. .TP
  297. \fIauthcap\fP <\fBchannel number\fR> <\fBmax priv\fR>
  298. Displays information about the authentication capabilities of
  299. the selected channel at the specified privilege level.
  300. .RS
  301. .TP
  302. Possible privilege levels are:
  303. .br
  304. \fI1\fP Callback level
  305. .br
  306. \fI2\fP User level
  307. .br
  308. \fI3\fP Operator level
  309. .br
  310. \fI4\fP Administrator level
  311. .br
  312. \fI5\fP OEM Proprietary level
  313. .br
  314. \fI15\fP No access
  315. .RE
  316. .TP
  317. \fIinfo\fP [\fBchannel number\fR]
  318. Displays information about the selected channel. If no channel
  319. is given it will display information about the currently used channel.
  320. .RS
  321. .PP
  322. > ipmitool channel info
  323. .br
  324. Channel 0xf info:
  325. .br
  326. Channel Medium Type : System Interface
  327. .br
  328. Channel Protocol Type : KCS
  329. .br
  330. Session Support : session\-less
  331. .br
  332. Active Session Count : 0
  333. .br
  334. Protocol Vendor ID : 7154
  335. .RE
  336. .TP
  337. \fIgetaccess\fP <\fBchannel number\fR> [<\fBuserid\fR>]
  338. .RS
  339. Configure the given userid as the default on the given channel number.
  340. When the given channel is subsequently used, the user is identified
  341. implicitly by the given userid.
  342. .TP
  343. \fIsetaccess\fP <\fBchannel number\fR> <\fBuserid\fR> [<\fIcallin\fP=\fBon\fR|\fBoff\fR>]
  344. [<\fIipmi\fP=\fBon\fR|\fBoff\fR>] [<\fIlink\fP=\fBon\fR|\fBoff\fR>] [<\fIprivilege\fP=\fBlevel\fR>]
  345. .br
  346. Configure user access information on the given channel for the given userid.
  347. .TP
  348. \fIgetciphers\fP <\fIipmi\fP|\fIsol\fP> [<\fBchannel\fR>]
  349. .br
  350. Displays the list of cipher suites supported for the given
  351. application (ipmi or sol) on the given channel.
  352. .RE
  353. .RE
  354. .TP
  355. \fIchassis\fP
  356. .RS
  357. .TP
  358. \fIstatus\fP
  359. Status information related to power, buttons, cooling, drives and faults.
  360. .RS
  361. .RE
  362. .TP
  363. \fIpower\fP
  364. .RS
  365. .TP
  366. \fIstatus\fP
  367. .RS
  368. .RE
  369. .TP
  370. \fIon\fP
  371. .RS
  372. .RE
  373. .TP
  374. \fIoff\fP
  375. .RS
  376. .RE
  377. .TP
  378. \fIcycle\fP
  379. .RS
  380. .RE
  381. .TP
  382. \fIreset\fP
  383. .RS
  384. .RE
  385. .TP
  386. \fIdiag\fP
  387. .RS
  388. .RE
  389. .TP
  390. \fIsoft\fP
  391. .RS
  392. .RE
  393. .RE
  394. .TP
  395. \fIidentify\fP [<seconds>|force]
  396. Identify interval.
  397. .br
  398. Default is 15 seconds.
  399. .br
  400. 0 - Off
  401. .br
  402. force - To turn on indefinitely
  403. .RS
  404. .RE
  405. .TP
  406. \fIpolicy\fP
  407. What to do when power is restored.
  408. .RS
  409. .TP
  410. \fIlist\fP
  411. Show available options.
  412. .RS
  413. .RE
  414. .TP
  415. \fIalways-on\fP
  416. .RS
  417. .RE
  418. .TP
  419. \fIprevious\fP
  420. .RS
  421. .RE
  422. .TP
  423. \fIalways-off\fP
  424. .RS
  425. .RE
  426. .RE
  427. .TP
  428. \fIrestart_cause\fP
  429. Last restart cause.
  430. .RS
  431. .RE
  432. .TP
  433. \fIpoh\fP
  434. Get power on hours.
  435. .RS
  436. .RE
  437. .TP
  438. \fIbootdev\fP
  439. .RS
  440. .TP
  441. \fInone\fP
  442. Do not change boot device order.
  443. .RS
  444. .RE
  445. .TP
  446. \fIpxe\fP
  447. Force PXE boot.
  448. .RS
  449. .RE
  450. .TP
  451. \fIdisk\fP
  452. Force boot from default Hard-drive.
  453. .RS
  454. .RE
  455. .TP
  456. \fIsafe\fP
  457. Force boot from default Hard-drive, request Safe Mode.
  458. .RS
  459. .RE
  460. .TP
  461. \fIdiag\fP
  462. Force boot from Diagnostic Partition.
  463. .RS
  464. .RE
  465. .TP
  466. \fIcdrom\fP
  467. Force boot from CD/DVD.
  468. .RS
  469. .RE
  470. .TP
  471. \fIbios\fP
  472. Force boot into BIOS Setup.
  473. .RS
  474. .RE
  475. .TP
  476. \fIfloppy\fP
  477. Force boot from Floppy/primary removable media.
  478. .RS
  479. .RE
  480. .RE
  481. .TP
  482. \fIbootparam\fP
  483. .RS
  484. .TP
  485. \fIforce_pxe\fP
  486. Force PXE boot
  487. .RS
  488. .RE
  489. .TP
  490. \fIforce_disk\fP
  491. Force boot from default Hard-drive
  492. .RS
  493. .RE
  494. .TP
  495. \fIforce_safe\fP
  496. Force boot from default Hard-drive, request Safe Mode
  497. .RS
  498. .RE
  499. .TP
  500. \fIforce_diag\fP
  501. Force boot from Diagnostic Partition
  502. .RS
  503. .RE
  504. .TP
  505. \fIforce_cdrom\fP
  506. Force boot from CD/DVD
  507. .RS
  508. .RE
  509. .TP
  510. \fIforce_bios\fP
  511. Force boot into BIOS Setup
  512. .RS
  513. .RE
  514. .RE
  515. .TP
  516. \fIselftest\fP
  517. .RS
  518. .RE
  519. .RE
  520. .TP
  521. \fIdcmi\fP
  522. .RS
  523. .TP
  524. \fIdiscover\fP
  525. .br
  526. This command is used to discover supported capabilities in DCMI.
  527. .TP
  528. \fIpower\fP <\fBcommand\fR>
  529. .br
  530. Platform power limit command options are:
  531. .RS
  532. .TP
  533. \fIreading\fP
  534. .br
  535. Get power related readings from the system.
  536. .TP
  537. \fIget_limit\fP
  538. .br
  539. Get the configured power limits.
  540. .TP
  541. \fIset_limit\fP <\fBparameter\fR> <\fBvalue\fR>
  542. .br
  543. Set a power limit option.
  544. .br
  545. .RS
  546. .TP
  547. Possible parameters/values are:
  548. .TP
  549. \fIaction\fP <\fBNo Action | Hard Power Off & Log Event to SEL | Log Event to SEL\fR>
  550. .br
  551. Exception Actions are taken as "No Action", "Hard Power Off system and log events to SEL", or "Log event to SEL only".
  552. .TP
  553. \fIlimit\fP <\fBnumber in Watts\fR>
  554. .br
  555. Power Limit Requested in Watts.
  556. .TP
  557. \fIcorrection\fP <\fBnumber in milliseconds\fR>
  558. .br
  559. Correction Time Limit in milliseconds.
  560. .TP
  561. \fIsample\fP <\fBnumber in seconds\fR>
  562. .br
  563. Statistics Sampling period in seconds.
  564. .RE
  565. .TP
  566. \fIactivate\fP
  567. .br
  568. Activate the set power limit.
  569. .TP
  570. \fIdeactivate\fP
  571. .br
  572. Deactivate the set power limit.
  573. .RE
  574. .TP
  575. \fIsensors\fP
  576. .br
  577. Prints the available DCMI sensors.
  578. .TP
  579. \fIasset_tag\fP
  580. .br
  581. Prints the platforms asset tag.
  582. .TP
  583. \fIset_asset_tag\fP <\fBstring\fR>
  584. .br
  585. Sets the platforms asset tag
  586. .TP
  587. \fIget_mc_id_string\fP
  588. .br
  589. Get management controller identifier string.
  590. .TP
  591. \fIset_mc_id_string\fP <\fBstring\fR>
  592. .br
  593. Set management controller identifier string. The maximum length is 64 bytes including a null terminator.
  594. .TP
  595. \fIthermalpolicy\fP [<\fBget\fR | \fBset\fR>]
  596. .br
  597. Thermal Limit policy get/set.
  598. .br
  599. .RS
  600. .TP
  601. The commands are:
  602. .TP
  603. \fIGet\fP <\fBentityID\fR> <\fBinstanceID\fR>
  604. .br
  605. Get Thermal Limit values.
  606. \fBentityID\fR is the physical entity that a sensor or device is associated with.
  607. \fBinstanceID\fR is a particular instance of an entity. Entity Instance can be in one of two ranges, system-relative or device-relative. For example, a system with four processors could use an Entity Instance value of "0" to identify the first processor.
  608. .TP
  609. \fISet\fP <\fBentityID\fR> <\fBinstanceID\fR>
  610. .br
  611. Set Thermal Limit values.
  612. \fBentityID\fR is the physical entity that a sensor or device is associated with.
  613. \fBinstanceID\fR is a particular instance of an entity. Entity Instance can be in one of two ranges, system-relative or device-relative. For example, a system with four processors could use an Entity Instance value of "0" to identify the first processor.
  614. .RE
  615. .TP
  616. \fIget_temp_reading\fP
  617. .br
  618. Get Temperature Sensor Readings.
  619. .TP
  620. \fIget_conf_param\fP
  621. .br
  622. Get DCMI Configuration Parameters.
  623. .TP
  624. \fIset_conf_param\fP <\fBparameters\fR>
  625. .br
  626. Set DCMI Configuration Parameters.
  627. .RS
  628. .TP
  629. The Configuration Parameters are:
  630. .TP
  631. \fIactivate_dhcp\fP
  632. .br
  633. Activate/restart DHCP
  634. .TP
  635. \fIdhcp_config\fP
  636. .br
  637. Discover DHCP Configuration.
  638. .TP
  639. \fIinit\fP
  640. .br
  641. Set DHCP Initial timeout interval, in seconds. The recommended default is four seconds.
  642. .TP
  643. \fItimeout\fP
  644. .br
  645. Set DHCP Server contact timeout interval, in seconds. The recommended default timeout is two minutes.
  646. .TP
  647. \fIretry\fP
  648. .br
  649. Set DHCP Server contact retry interval, in seconds. The recommended default timeout is sixty-four seconds.
  650. .RE
  651. .TP
  652. \fIoob_discover\fP
  653. .br
  654. Ping/Pong Message for DCMI Discovery.
  655. .RE
  656. .RE
  657. .RE
  658. .TP
  659. \fIdelloem\fP
  660. .RS
  661. .br
  662. The delloem commands provide information on Dell-specific features.
  663. .TP
  664. \fIsetled {b:d.f} {state..}\fP
  665. .RS
  666. .br
  667. Sets the drive backplane LEDs for a device.
  668. .br
  669. {b:d.f} = PCI Address of device (eg. 06:00.0)
  670. .br
  671. {state} = one or more of the following:
  672. .RS
  673. \fIonline | present | hotspare | identify | rebuilding | fault | predict | critical | failed\fP
  674. .br
  675. .RE
  676. .RE
  677. .TP
  678. \fIlcd\fP
  679. .RS
  680. .br
  681. \fIset {mode}\fP|\fI{lcdqualifier}\fP|\fI{errordisplay}\fP
  682. .RS
  683. .br
  684. Allows you to set the LCD mode and user-defined string.
  685. .RE
  686. .TP
  687. \fIlcd set mode\fP
  688. .RS
  689. .br
  690. \fI{none}\fP|\fI{modelname}\fP|\fI{ipv4address}\fP|\fI{macaddress}\fP|
  691. .br
  692. \fI{systemname}\fP|\fI{servicetag}\fP|\fI{ipv6address}\fP|
  693. .br
  694. \fI{ambienttemp}\fP|\fI{systemwatt}\fP|\fI{assettag}\fP|
  695. .br
  696. \fI{userdefined}<text>\fP
  697. .br
  698. Allows you to set the LCD display mode to any of the preceding parameters.
  699. .RE
  700. .TP
  701. \fIlcd set lcdqualifier\fP
  702. .RS
  703. .br
  704. \fI{watt}\fP|\fI{btuphr}\fP|
  705. .br
  706. \fI{celsius}\fP|\fI{fahrenheit}\fP
  707. .br
  708. Allows you to set the unit for the system ambient temperature mode.
  709. .RE
  710. .TP
  711. \fIlcd set errordisplay\fP
  712. .RS
  713. .br
  714. \fI{sel}\fP|\fI{simple}\fP
  715. .br
  716. Allows you to set the error display.
  717. .RE
  718. .TP
  719. \fIlcd info\fP
  720. .RS
  721. .br
  722. Displays the LCD screen information.
  723. .RE
  724. .TP
  725. \fIlcd set vkvm\fP
  726. .RS
  727. \fI{active}\fP|\fI{inactive}\fP
  728. .br
  729. Allows you to set the vKVM status to active or inactive. When it is active and session is in progress, a message appears on LCD.
  730. .RE
  731. .TP
  732. \fIlcd status\fP
  733. .RS
  734. .br
  735. Displays the LCD status for vKVM display active or inactive and Front Panel access mode (viewandmodify, view-only or disabled).
  736. .RE
  737. .RE
  738. .TP
  739. \fImac\fP
  740. .RS
  741. .br
  742. Displays the information about the system NICs.
  743. .TP
  744. \fImac list\fP
  745. .br
  746. Displays the NIC MAC address and status of all NICs. It also displays the DRAC/iDRAC MAC address.
  747. .TP
  748. \fImac get\fP
  749. .RS
  750. \fI<NIC number>\fP
  751. .br
  752. Displays the selected NICs MAC address and status.
  753. .RE
  754. .RE
  755. .TP
  756. \fIlan\fP
  757. .RS
  758. .br
  759. Displays the information of Lan.
  760. .TP
  761. \fIlan set\fP
  762. .RS
  763. \fI<Mode>\fP
  764. .br
  765. Sets the NIC selection mode (dedicated, shared with lom1, shared with lom2,shared with lom3,shared with lom4,shared with failover lom1,shared with failover lom2,shared with failover lom3,shared with failover lom4,shared with Failover all loms, shared with Failover None).
  766. .RE
  767. .TP
  768. \fIlan get\fP
  769. .br
  770. Returns the current NIC selection mode (dedicated, shared with lom1, shared with lom2, shared with lom3, shared with lom4,shared with failover lom1, shared with failover lom2,shared with failover lom3,shared with failover lom4,shared with Failover all loms,shared with Failover None).
  771. .TP
  772. \fIlan get active\fP
  773. .br
  774. Returns the current active NIC (dedicated, LOM1, LOM2, LOM3 or LOM4).
  775. .RE
  776. .TP
  777. \fIpowermonitor\fP
  778. .RS
  779. .br
  780. Displays power tracking statistics.
  781. .TP
  782. \fIpowermonitor clear cumulativepower\fP
  783. .RS
  784. .br
  785. Reset cumulative power reading.
  786. .RE
  787. .TP
  788. \fIpowermonitor clear peakpower\fP
  789. .RS
  790. .br
  791. Reset peak power reading.
  792. .RE
  793. .TP
  794. \fIpowermonitor powerconsumption\fP
  795. .RS
  796. \fI<watt>\fP|\fI<btuphr>\fP
  797. .br
  798. Displays the power consumption in watt or btuphr.
  799. .RE
  800. .TP
  801. \fIpowermonitor powerconsumptionhistory\fP
  802. .RS
  803. \fI<watt>\fP|\fI<btuphr>\fP
  804. .br
  805. Displays the power consumption history in watt or btuphr.
  806. .RE
  807. .TP
  808. \fIpowermonitor getpowerbudget\fP
  809. .RS
  810. \fI<watt>\fP|\fI<btuphr>\fP
  811. .br
  812. Displays the power cap in watt or btuphr.
  813. .RE
  814. .TP
  815. \fIpowermonitor setpowerbudget\fP
  816. .RS
  817. \fI<val>\fP\fI<watt\fP|\fIbtuphr\fP|\fIpercent>\fP
  818. .br
  819. Allows you to set the power cap in watt, BTU/hr or percentage.
  820. .RE
  821. .TP
  822. \fIpowermonitor enablepowercap\fP
  823. .RS
  824. .br
  825. Enables set power cap.
  826. .RE
  827. .TP
  828. \fIpowermonitor disablepowercap\fP
  829. .RS
  830. .br
  831. Disables set power cap.
  832. .RE
  833. .RE
  834. .RE
  835. .RS
  836. .TP
  837. \fIvFlash info Card\fP
  838. .RS
  839. .br
  840. Shows Extended SD Card information.
  841. .RE
  842. .RE
  843. .TP
  844. \fIecho\fP
  845. For echoing lines to stdout in scripts.
  846. .RS
  847. .RE
  848. .TP
  849. \fIekanalyzer\fP <\fBcommand\fR> <\fBxx=filename1\fR> <\fBxx=filename2\fR> [<\fBrc=filename3\fR>] \fB...\fR
  850. .RS
  851. .TP
  852. .br
  853. \fINOTE\fP : This command can support a maximum of 8 files per command line
  854. .TP
  855. .br
  856. \fIfilename1\fP : binary file that stores FRU data of a Carrier or an AMC module
  857. .TP
  858. .br
  859. \fIfilename2\fP : binary file that stores FRU data of an AMC module.
  860. These binary files can be generated from command:
  861. \fIipmitool fru read <id> <filename>\fP
  862. .TP
  863. .br
  864. \fIfilename3\fP : configuration file used for configuring On-Carrier Device ID
  865. or OEM GUID. This file is optional.
  866. .TP
  867. .br
  868. \fIxx\fP : indicates the type of the file. It can take the following value:
  869. .RS
  870. .TP
  871. .br
  872. \fIoc\fP : On-Carrier device
  873. .TP
  874. .br
  875. \fIa1\fP : AMC slot A1
  876. .TP
  877. .br
  878. \fIa2\fP : AMC slot A2
  879. .TP
  880. .br
  881. \fIa3\fP : AMC slot A3
  882. .TP
  883. .br
  884. \fIa4\fP : AMC slot A4
  885. .TP
  886. .br
  887. \fIb1\fP : AMC slot B1
  888. .TP
  889. .br
  890. \fIb2\fP : AMC slot B2
  891. .TP
  892. .br
  893. \fIb3\fP : AMC slot B3
  894. .TP
  895. .br
  896. \fIb4\fP : AMC slot B4
  897. .TP
  898. .br
  899. \fIsm\fP : Shelf Manager
  900. .RE
  901. .TP
  902. .br
  903. The available commands for ekanalyzer are:
  904. .RE
  905. .RS
  906. .TP
  907. \fIprint\fP [<\fBcarrier\fR | \fBpower\fR | \fBall\fR>]
  908. .RS
  909. .TP
  910. \fIcarrier\fP (default) <\fBoc=filename1\fR> <\fBoc=filename2\fR> \fB...\fR
  911. .br
  912. Display point to point physical connectivity between carriers and AMC modules.
  913. Example:
  914. > ipmitool ekanalyzer print carrier oc=fru oc=carrierfru
  915. From Carrier file: fru
  916. Number of AMC bays supported by Carrier: 2
  917. AMC slot B1 topology:
  918. Port 0 =====> On Carrier Device ID 0, Port 16
  919. Port 1 =====> On Carrier Device ID 0, Port 12
  920. Port 2 =====> AMC slot B2, Port 2
  921. AMC slot B2 topology:
  922. Port 0 =====> On Carrier Device ID 0, Port 3
  923. Port 2 =====> AMC slot B1, Port 2
  924. *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
  925. From Carrier file: carrierfru
  926. On Carrier Device ID 0 topology:
  927. Port 0 =====> AMC slot B1, Port 4
  928. Port 1 =====> AMC slot B1, Port 5
  929. Port 2 =====> AMC slot B2, Port 6
  930. Port 3 =====> AMC slot B2, Port 7
  931. AMC slot B1 topology:
  932. Port 0 =====> AMC slot B2, Port 0
  933. AMC slot B1 topology:
  934. Port 1 =====> AMC slot B2, Port 1
  935. Number of AMC bays supported by Carrier: 2
  936. .TP
  937. \fIpower\fP <\fBxx=filename1\fR> <\fBxx=filename2\fR> \fB...\fr
  938. .br
  939. Display power supply information between carrier and AMC modules.
  940. .TP
  941. \fIall\fP <\fBxx=filename\fR> <\fBxx=filename\fR> \fB...\fr
  942. .br
  943. Display both physical connectivity and power supply of each carrier and AMC
  944. modules.
  945. .RE
  946. .TP
  947. \fIfrushow\fP <\fBxx=filename\fR>
  948. .br
  949. Convert a binary FRU file into human readable text format. Use \-v option to get
  950. more display information.
  951. .RE
  952. .RS
  953. .TP
  954. \fIsummary\fP [<\fBmatch\fR | \fBunmatch\fR | \fBall\fR>]
  955. .RS
  956. .TP
  957. \fImatch\fP (default) <\fBxx=filename\fR> <\fBxx=filename\fR> \fB...\fR
  958. .br
  959. Display only matched results of Ekeying match between an On-Carrier device
  960. and an AMC module or between 2 AMC modules. Example:
  961. > ipmitool ekanalyzer summary match oc=fru b1=amcB1 a2=amcA2
  962. On-Carrier Device vs AMC slot B1
  963. AMC slot B1 port 0 ==> On-Carrier Device 0 port 16
  964. Matching Result
  965. - From On-Carrier Device ID 0
  966. \-Channel ID 11 || Lane 0: enable
  967. \-Link Type: AMC.2 Ethernet
  968. \-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
  969. \-Link Group ID: 0 || Link Asym. Match: exact match
  970. - To AMC slot B1
  971. \-Channel ID 0 || Lane 0: enable
  972. \-Link Type: AMC.2 Ethernet
  973. \-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
  974. \-Link Group ID: 0 || Link Asym. Match: exact match
  975. *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
  976. AMC slot B1 port 1 ==> On-Carrier Device 0 port 12
  977. Matching Result
  978. - From On-Carrier Device ID 0
  979. \-Channel ID 6 || Lane 0: enable
  980. \-Link Type: AMC.2 Ethernet
  981. \-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
  982. \-Link Group ID: 0 || Link Asym. Match: exact match
  983. - To AMC slot B1
  984. \-Channel ID 1 || Lane 0: enable
  985. \-Link Type: AMC.2 Ethernet
  986. \-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
  987. \-Link Group ID: 0 || Link Asym. Match: exact match
  988. *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
  989. On-Carrier Device vs AMC slot A2
  990. AMC slot A2 port 0 ==> On-Carrier Device 0 port 3
  991. Matching Result
  992. - From On-Carrier Device ID 0
  993. \-Channel ID 9 || Lane 0: enable
  994. \-Link Type: AMC.2 Ethernet
  995. \-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
  996. \-Link Group ID: 0 || Link Asym. Match: exact match
  997. - To AMC slot A2
  998. \-Channel ID 0 || Lane 0: enable
  999. \-Link Type: AMC.2 Ethernet
  1000. \-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
  1001. \-Link Group ID: 0 || Link Asym. Match: exact match
  1002. *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
  1003. AMC slot B1 vs AMC slot A2
  1004. AMC slot A2 port 2 ==> AMC slot B1 port 2
  1005. Matching Result
  1006. - From AMC slot B1
  1007. \-Channel ID 2 || Lane 0: enable
  1008. \-Link Type: AMC.3 Storage
  1009. \-Link Type extension: Serial Attached SCSI (SAS/SATA)
  1010. \-Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
  1011. - To AMC slot A2
  1012. \-Channel ID 2 || Lane 0: enable
  1013. \-Link Type: AMC.3 Storage
  1014. \-Link Type extension: Serial Attached SCSI (SAS/SATA)
  1015. \-Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact match}
  1016. *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
  1017. .TP
  1018. \fIunmatch\fP <\fBxx=filename\fR> <\fBxx=filename\fR> \fB...\fr
  1019. .br
  1020. Display the unmatched results of Ekeying match between an On-Carrier device
  1021. and an AMC module or between 2 AMC modules
  1022. .TP
  1023. \fIall\fP <\fBxx=filename\fR> <\fBxx=filename\fR> \fB...\fr
  1024. .br
  1025. Display both matched result and unmatched results of Ekeying match between two
  1026. cards or two modules.
  1027. .RE
  1028. .RE
  1029. .TP
  1030. \fIevent\fP
  1031. .RS
  1032. .TP
  1033. <\fBpredefined event number\fR \fIN\fR>
  1034. .br
  1035. Send a pre\-defined test event to the System Event Log. The following
  1036. events are included as a means to test the functionality of the
  1037. System Event Log component of the BMC (an entry will be added each
  1038. time the event \fIN\fP command is executed).
  1039. Currently supported values for \fIN\fR are:
  1040. .br
  1041. \fI1\fP Temperature: Upper Critical: Going High
  1042. .br
  1043. \fI2\fP Voltage Threshold: Lower Critical: Going Low
  1044. .br
  1045. \fI3\fP Memory: Correctable ECC
  1046. .br
  1047. \fBNOTE\fR: These pre\-defined events will likely not produce
  1048. "accurate" SEL records for a particular system because they will
  1049. not be correctly tied to a valid sensor number, but they are
  1050. sufficient to verify correct operation of the SEL.
  1051. .TP
  1052. \fIfile\fP <\fBfilename\fR>
  1053. .br
  1054. Event log records specified in <\fBfilename\fP> will be added to
  1055. the System Event Log.
  1056. The format of each line in the file is as follows:
  1057. <{\fIEvM Revision\fP} {\fISensor Type\fP} {\fISensor Num\fP} {\fIEvent Dir/Type\fP} {\fIEvent Data 0\fP} {\fIEvent Data 1\fP} {\fIEvent Data 2\fP}>[\fI# COMMENT\fP]
  1058. e.g.:
  1059. 0x4 0x2 0x60 0x1 0x52 0x0 0x0 # Voltage threshold: Lower Critical: Going Low
  1060. .br
  1061. \fIEvM Revision\fP -
  1062. The "Event Message Revision" is 0x04 for messages that comply with the IPMI 2.0
  1063. Specification and 0x03 for messages that comply with the IPMI 1.0 Specification.
  1064. \fISensor Type\fP -
  1065. Indicates the Event Type or Class.
  1066. \fISensor Num\fP -
  1067. Represents the 'sensor' within the management controller that generated
  1068. the Event Message.
  1069. \fIEvent Dir/Type\fP -
  1070. This field is encoded with the event direction as the high bit
  1071. (bit 7) and the event type as the low 7 bits. Event direction is
  1072. 0 for an assertion event and 1 for a deassertion event.
  1073. See the IPMI 2.0 specification for further details on the definitions for
  1074. each field.
  1075. .TP
  1076. <\fBsensorid\fR> <\fBlist\fR>
  1077. .br
  1078. Get a list of all the possible Sensor States and pre-defined Sensor State
  1079. Shortcuts available for a particular sensor. \fBsensorid\fR is the character
  1080. string representation of the sensor and must be enclosed in double quotes
  1081. if it includes white space. Several different commands including
  1082. \fIipmitool sensor list\fP may be used to obtain a list that includes
  1083. the \fBsensorid\fR strings representing the sensors on a given system.
  1084. .RS
  1085. .PP
  1086. > ipmitool \-I open event "PS 2T Fan Fault" list
  1087. .br
  1088. Finding sensor PS 2T Fan Fault... ok
  1089. .br
  1090. Sensor States:
  1091. .br
  1092. State Deasserted
  1093. .br
  1094. State Asserted
  1095. .br
  1096. Sensor State Shortcuts:
  1097. .br
  1098. present absent
  1099. .br
  1100. assert deassert
  1101. .br
  1102. limit nolimit
  1103. .br
  1104. fail nofail
  1105. .br
  1106. yes no
  1107. .br
  1108. on off
  1109. .br
  1110. up down
  1111. .RE
  1112. .TP
  1113. <\fBsensorid\fR> <\fBsensor state\fR> [<\fBdirection\fR>]
  1114. Generate a custom event based on existing sensor information.
  1115. The optional event \fBdirection can be either \fIassert\fP
  1116. (the default) or \fIdeassert\fP.
  1117. .RS
  1118. .PP
  1119. > ipmitool event "PS 2T Fan Fault" "State Asserted"
  1120. .br
  1121. Finding sensor PS 2T Fan Fault... ok
  1122. .br
  1123. 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Asserted
  1124. .RE
  1125. .RS
  1126. .PP
  1127. > ipmitool event "PS 2T Fan Fault" "State Deasserted"
  1128. .br
  1129. Finding sensor PS 2T Fan Fault... ok
  1130. .br
  1131. 0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Desserted
  1132. .RE
  1133. .RS
  1134. .PP
  1135. .RE
  1136. .RE
  1137. .TP
  1138. \fIexec\fP <\fBfilename\fR>
  1139. .RS
  1140. Execute ipmitool commands from \fIfilename\fR. Each line is a
  1141. complete command. The syntax of the commands are defined by the
  1142. COMMANDS section in this manpage. Each line may have an optional
  1143. comment at the end of the line, delimited with a `#' symbol.
  1144. e.g., a command file with two lines:
  1145. sdr list # get a list of sdr records
  1146. .br
  1147. sel list # get a list of sel records
  1148. .RE
  1149. .TP
  1150. \fIfirewall\fP
  1151. .br
  1152. This command supports the Firmware Firewall capability. It may be used to
  1153. add or remove security-based restrictions on certain commands/command
  1154. sub-functions or to list the current firmware firewall restrictions set on
  1155. any commands. For each firmware firewall command listed below, parameters
  1156. may be included to cause the command to be executed with increasing
  1157. granularity on a specific LUN, for a specific NetFn, for a specific IPMI
  1158. Command, and finally for a specific command's sub-function (see Appendix H in the
  1159. IPMI 2.0 Specification for a listing of any sub-function numbers that may
  1160. be associated with a particular command).
  1161. Parameter syntax and dependencies are as follows:
  1162. [<\fIchannel\fP \fBH\fR>] [<\fIlun\fP \fBL\fR> [ <\fInetfn\fP \fBN\fR> [<\fIcommand\fP \fBC\fR [<\fIsubfn\fP \fBS\fR>]]]]
  1163. Note that if "netfn <\fBN\fR>" is specified, then "lun <\fBL\fR>" must also be
  1164. specified; if "command <\fBC\fR>" is specified, then "netfn <\fBN\fR>" (and
  1165. therefore "lun <\fBL\fR>") must also be specified, and so forth.
  1166. "channel <\fBH\fR>" is an optional and standalone parameter. If not specified,
  1167. the requested operation will be performed on the current channel. Note that
  1168. command support may vary from channel to channel.
  1169. Firmware firewall commands:
  1170. .RS
  1171. .TP
  1172. \fIinfo\fP [<\fBParms as described above\fR>]
  1173. .br
  1174. List firmware firewall information for the specified LUN, NetFn, and
  1175. Command (if supplied) on the current or specified channel. Listed
  1176. information includes the support, configurable, and enabled bits for
  1177. the specified command or commands.
  1178. Some usage examples:
  1179. .RS
  1180. .TP
  1181. \fIinfo\fP [<\fBchannel H\fR>] [<\fBlun L\fR>]
  1182. .br
  1183. This command will list firmware firewall information for all NetFns for the
  1184. specified LUN on either the current or the specified channel.
  1185. .TP
  1186. \fIinfo\fP [<\fBchannel H\fR>] [<\fBlun L\fR> [ <\fBnetfn N\fR> ]
  1187. .br
  1188. This command will print out all command information for a single LUN/NetFn pair.
  1189. .TP
  1190. \fIinfo\fP [<\fBchannel H\fR>] [<\fBlun L\fR> [ <\fBnetfn N\fR> [<\fBcommand C\fR] ]]
  1191. .br
  1192. This prints out detailed, human-readable information showing the support, configurable,
  1193. and enabled bits for the specified command on the specified LUN/NetFn pair. Information
  1194. will be printed about each of the command subfunctions.
  1195. .TP
  1196. \fIinfo\fP [<\fBchannel H\fR>] [<\fBlun L\fR> [ <\fBnetfn N\fR> [<\fBcommand C\fR [<\fBsubfn S\fR>]]]]
  1197. .br
  1198. Print out information for a specific sub-function.
  1199. .RE
  1200. .TP
  1201. \fIenable\fP [<\fBParms as described above\fR>]
  1202. .br
  1203. This command is used to enable commands for a given NetFn/LUN combination on
  1204. the specified channel.
  1205. .TP
  1206. \fIdisable\fP [<\fBParms as described above\fR>] [\fBforce\fR]
  1207. .br
  1208. This command is used to disable commands for a given NetFn/LUN combination on
  1209. the specified channel. Great care should be taken if using the "force"
  1210. option so as not to disable the "Set Command Enables" command.
  1211. .TP
  1212. \fIreset\fP [<\fBParms as described above\fR>]
  1213. .br
  1214. This command may be used to reset the firmware firewall back to a state
  1215. where all commands and command sub-functions are enabled.
  1216. .RE
  1217. .TP
  1218. \fIfru\fP
  1219. .RS
  1220. .TP
  1221. \fIprint\fP
  1222. .br
  1223. Read all Field Replaceable Unit (FRU) inventory data and extract
  1224. such information as serial number, part number, asset tags, and
  1225. short strings describing the chassis, board, or product.
  1226. .TP
  1227. \fIread\fP <\fBfru id\fR> <\fBfru file\fR>
  1228. .br
  1229. \fBfru id\fR is the digit ID of the FRU (see output of 'fru print').
  1230. \fBfru file\fR is the absolute pathname of a file in which to dump the
  1231. binary FRU data pertaining to the specified FRU entity.
  1232. .TP
  1233. \fIwrite\fP <\fBfru id\fR> <\fBfru file\fR>
  1234. .br
  1235. \fBfru id\fR is the digit ID of the FRU (see output of 'fru print').
  1236. \fBfru file\fR is the absolute pathname of a file from which to pull
  1237. the binary FRU data before uploading it to the specified FRU.
  1238. .TP
  1239. \fIupgEkey\fP <\fBfru id\fR> <\fBfru file\fR>
  1240. .br
  1241. Update a multirecord FRU location.
  1242. \fBfru id\fR is the digit ID of the FRU (see output of 'fru print').
  1243. \fBfru file\fR is the absolute pathname of a file from which to pull the
  1244. binary FRU data to upload into the specified multirecord FRU entity.
  1245. .TP
  1246. \fIedit\fP <\fBfru id\fR>
  1247. .br
  1248. This command provides interactive editing of some supported records, namely
  1249. PICMG Carrier Activation Record. \fBfru id\fR is the digit ID of the FRU
  1250. (see output of 'fru print'); default is 0.
  1251. .TP
  1252. \fIedit\fP <\fBfru id\fR> \fBfield\fR <\fBsection\fR> <\fBindex\fR> <\fBstring\fR>
  1253. .br
  1254. This command may be used to set a field string to a new value. It replaces
  1255. the FRU data found at \fBindex\fR in the specified \fBsection\fR with the
  1256. supplied \fBstring\fR.
  1257. .RS
  1258. .TP
  1259. \fBfru id\fR is the digit ID of the FRU (see output of 'fru print').
  1260. .br
  1261. .TP
  1262. <\fBsection\fR> is a string which refers to FRU Inventory Information
  1263. Storage Areas and may be refer to:
  1264. .RS
  1265. .TP
  1266. \fIc\fP FRU Inventory Chassis Info Area
  1267. .br
  1268. .TP
  1269. \fIb\fP FRU Inventory Board Info Area
  1270. .br
  1271. .TP
  1272. \fIp\fP FRU Inventory Product Info Area
  1273. .br
  1274. .RE
  1275. .TP
  1276. <\fBindex\fR> specifies the field number. Field numbering starts on the first 'english text' field type. For instance in the <\fBboard\fR> info area field '0' is <\fBBoard Manufacturer\fR> and field '2' is <\fBBoard Serial Number\fR>; see IPMI Platform Management FRU Information Storage Definition v1.0 R1.1 for field locations.
  1277. .br
  1278. .TP
  1279. <\fBstring\fR> must be the same length as the string being replaced and must be 8-bit ASCII (0xCx).
  1280. .br
  1281. .RE
  1282. .TP
  1283. \fIedit\fP <\fBfru id\fR> \fBoem\fR \fBiana\fR <\fBrecord\fR> <\fBformat\fR> [<\fBargs\fR>]
  1284. .br
  1285. This command edits the data found in the multirecord area. Support for
  1286. OEM specific records is limited.
  1287. .RE
  1288. .TP
  1289. \fIfwum\fP
  1290. .RS
  1291. Update IPMC using Kontron OEM Firmware Update Manager.
  1292. .TP
  1293. \fIinfo\fR
  1294. .br
  1295. Show information about current firmware.
  1296. .TP
  1297. \fIstatus\fR
  1298. .br
  1299. Show status of each firmware bank present in the hardware.
  1300. .TP
  1301. \fIdownload\fP <\fBfilename\fR>
  1302. .br
  1303. Download specified firmware.
  1304. .TP
  1305. \fIupgrade\fP [\fBfilename\fR]
  1306. .br
  1307. Install firmware upgrade. If the filename is specified, the file is downloaded
  1308. first, otherwise the last firmware downloaded is used.
  1309. .TP
  1310. \fIrollback\fP
  1311. .br
  1312. Ask IPMC to rollback to previous version.
  1313. .TP
  1314. \fItracelog\fP
  1315. .br
  1316. Show firmware upgrade log.
  1317. .RE
  1318. .TP
  1319. \fIgendev\fP
  1320. .RS
  1321. .TP
  1322. \fIlist\fP
  1323. List All Generic Device Locators.
  1324. .RS
  1325. .RE
  1326. .TP
  1327. \fIread\fP <\fBsdr name\fR> <\fBfile\fR>
  1328. Read to file eeprom specify by Generic Device Locators.
  1329. .RS
  1330. .RE
  1331. .TP
  1332. \fIwrite\fP <\fBsdr name\fR> <\fBfile\fR>
  1333. Write from file eeprom specify by Generic Device Locators
  1334. .RS
  1335. .RE
  1336. .RE
  1337. .TP
  1338. \fIhpm\fP
  1339. .RS
  1340. PICMG HPM.1 Upgrade Agent
  1341. .TP
  1342. \fIcheck\fR
  1343. .br
  1344. Check the target information.
  1345. .TP
  1346. \fIcheck\fP <\fBfilename\fR>
  1347. .br
  1348. Display both the existing target version and image version on the screen.
  1349. .TP
  1350. \fIdownload\fP <\fBfilename\fR>
  1351. .br
  1352. Download specified firmware.
  1353. .TP
  1354. \fIupgrade\fP <\fBfilename\fR> [\fBall\fR] [\fBcomponent <x>\fR] [\fBactivate\fR]
  1355. .br
  1356. Upgrade the firmware using a valid HPM.1 image file. If no option is specified,
  1357. the firmware versions are checked first and the firmware is upgraded only if they
  1358. are different.
  1359. .RS
  1360. .TP
  1361. \fIall\fR
  1362. .br
  1363. Upgrade all components even if the firmware versions are the same
  1364. (use this only after using "check" command).
  1365. .TP
  1366. \fIcomponent\fP <\fBx\fR>
  1367. .br
  1368. Upgrade only given component from the given file.
  1369. .br
  1370. component 0 - BOOT
  1371. .br
  1372. component 1 - RTK
  1373. .TP
  1374. \fIactivate\fR
  1375. .br
  1376. Activate new firmware right away.
  1377. .RE
  1378. .TP
  1379. \fIactivate\fR
  1380. .br
  1381. Activate the newly uploaded firmware.
  1382. .TP
  1383. \fItargetcap\fR
  1384. .br
  1385. Get the target upgrade capabilities.
  1386. .TP
  1387. \fIcompprop\fP <\fBid\fR> <\fBselect\fR>
  1388. .br
  1389. Get the specified component properties. Valid component \fBid\fR: 0-7.
  1390. \fBSelect\fR can be one of following:
  1391. .br
  1392. 0 - General properties
  1393. .br
  1394. 1 - Current firmware version
  1395. .br
  1396. 2 - Description string
  1397. .br
  1398. 3 - Rollback firmware version
  1399. .br
  1400. 4 - Deferred firmware version
  1401. .TP
  1402. \fIabort\fR
  1403. .br
  1404. Abort the on-going firmware upgrade.
  1405. .TP
  1406. \fIupgstatus\fR
  1407. .br
  1408. Show status of the last long duration command.
  1409. .TP
  1410. \fIrollback\fR
  1411. .br
  1412. Perform manual rollback on the IPM Controller firmware.
  1413. .TP
  1414. \fIrollbackstatus\fR
  1415. .br
  1416. Show the rollback status.
  1417. .TP
  1418. \fIselftestresult\fR
  1419. .br
  1420. Query the self test results.
  1421. .RE
  1422. .TP
  1423. \fIi2c\fP <\fBi2caddr\fR> <\fBread bytes\fR> [<\fBwrite data\fR>]
  1424. .br
  1425. This command may be used to execute raw I2C commands with the Master
  1426. Write\-Read IPMI command.
  1427. .RE
  1428. .TP
  1429. \fIime\fP
  1430. .RS
  1431. .TP
  1432. \fIhelp\fP
  1433. .br
  1434. Print usage information
  1435. .TP
  1436. \fIinfo\fP
  1437. Displays information about the Manageability Engine (ME)
  1438. .TP
  1439. \fIupdate\fP <\fBfile\fR>
  1440. .br
  1441. Upgrade the ME firmware with the specified image file
  1442. .br
  1443. \fBWARNING\fR You MUST use a supported image provided by your board vendor
  1444. .br
  1445. .TP
  1446. \fIrollback\fP
  1447. Perform manual rollback of the ME firmware
  1448. .RE
  1449. .RE
  1450. .TP
  1451. \fIisol\fP
  1452. .RS
  1453. .TP
  1454. \fIinfo\fP
  1455. .br
  1456. Retrieve information about the Intel IPMI v1.5 Serial\-Over\-LAN
  1457. configuration.
  1458. .TP
  1459. \fIset\fP <\fBparameter\fR> <\fBvalue\fR>
  1460. .br
  1461. Configure parameters for Intel IPMI v1.5 Serial\-over\-LAN.
  1462. .RS
  1463. .TP
  1464. Valid parameters and values are:
  1465. .br
  1466. .TP
  1467. \fIenabled\fP
  1468. true, false.
  1469. .TP
  1470. \fIprivilege\-level\fP
  1471. user, operator, admin, oem.
  1472. .TP
  1473. \fIbit\-rate\fP
  1474. 9.6, 19.2, 38.4, 57.6, 115.2.
  1475. .RE
  1476. .TP
  1477. \fIactivate\fP
  1478. .br
  1479. Causes ipmitool to enter Intel IPMI v1.5 Serial Over LAN mode. An RMCP+
  1480. connection is made to the BMC, the terminal is set to raw mode, and user
  1481. input is sent to the serial console on the remote server. On exit,
  1482. the SOL payload mode is deactivated and the terminal is reset to its
  1483. original settings.
  1484. .RS
  1485. Special escape sequences are provided to control the SOL session:
  1486. .RS
  1487. .TP
  1488. \fI~.\fP Terminate connection
  1489. .TP
  1490. \fI~^Z\fP Suspend ipmitool
  1491. .TP
  1492. \fI~^X\fP Suspend ipmitool, but don't restore tty on restart
  1493. .TP
  1494. \fI~B\fP Send break
  1495. .TP
  1496. \fI~~\fP Send the escape character by typing it twice
  1497. .TP
  1498. \fI~?\fP Print the supported escape sequences
  1499. .RE
  1500. Note that escapes are only recognized immediately after newline.
  1501. .RE
  1502. .RE
  1503. .TP
  1504. \fIkontronoem\fP
  1505. .RS
  1506. OEM commands specific to Kontron devices.
  1507. .TP
  1508. \fIsetsn\fP
  1509. .br
  1510. Set FRU serial number.
  1511. .TP
  1512. \fIsetmfgdate\fP
  1513. .br
  1514. Set FRU manufacturing date.
  1515. .TP
  1516. \fInextboot\fP <\fBboot device\fR>
  1517. .br
  1518. Select the next boot order on the Kontron CP6012.
  1519. .RE
  1520. .TP
  1521. \fIlan\fP
  1522. .RS
  1523. These commands will allow you to configure IPMI LAN channels
  1524. with network information so they can be used with the ipmitool
  1525. \fIlan\fP and \fIlanplus\fP interfaces. \fINOTE\fR: To
  1526. determine on which channel the LAN interface is located, issue
  1527. the `channel info \fInumber\fR' command until you come across
  1528. a valid 802.3 LAN channel. For example:
  1529. .br
  1530. > ipmitool \-I open channel info 1
  1531. .br
  1532. Channel 0x1 info:
  1533. .br
  1534. Channel Medium Type : 802.3 LAN
  1535. Channel Protocol Type : IPMB\-1.0
  1536. Session Support : session\-based
  1537. Active Session Count : 8
  1538. Protocol Vendor ID : 7154
  1539. .TP
  1540. \fIprint\fP [<\fBchannel\fR>]
  1541. .br
  1542. Print the current configuration for the given channel.
  1543. The default will print information on the first found LAN channel.
  1544. .TP
  1545. \fIset\fP <\fBchannel number\fR> <\fBcommand\fR> <\fBparameter\fR>
  1546. .br
  1547. Set the given command and parameter on the specified channel. Valid
  1548. command/parameter options are:
  1549. .RS
  1550. .TP
  1551. \fIipaddr\fP <\fBx.x.x.x\fR>
  1552. .br
  1553. Set the IP address for this channel.
  1554. .TP
  1555. \fInetmask\fP <\fBx.x.x.x\fR>
  1556. .br
  1557. Set the netmask for this channel.
  1558. .TP
  1559. \fImacaddr\fP <\fBxx:xx:xx:xx:xx:xx\fR>
  1560. .br
  1561. Set the MAC address for this channel.
  1562. .TP
  1563. \fIdefgw ipaddr\fP <\fBx.x.x.x\fR>
  1564. .br
  1565. Set the default gateway IP address.
  1566. .TP
  1567. \fIdefgw macaddr\fP <\fBxx:xx:xx:xx:xx:xx\fR>
  1568. .br
  1569. Set the default gateway MAC address.
  1570. .TP
  1571. \fIbakgw ipaddr\fP <\fBx.x.x.x\fR>
  1572. .br
  1573. Set the backup gateway IP address.
  1574. .TP
  1575. \fIbakgw macaddr\fP <\fBxx:xx:xx:xx:xx:xx\fR>
  1576. .br
  1577. Set the backup gateway MAC address.
  1578. .TP
  1579. \fIpassword\fP <\fBpass\fR>
  1580. .br
  1581. Set the null user password.
  1582. .TP
  1583. \fIsnmp\fP <\fBcommunity string\fR>
  1584. .br
  1585. Set the SNMP community string.
  1586. .TP
  1587. \fIuser\fP
  1588. .br
  1589. Enable user access mode for userid 1 (issue the `user'
  1590. command to display information about userids for a given channel).
  1591. .TP
  1592. \fIaccess\fP <\fBon|off\fR>
  1593. .br
  1594. Set LAN channel access mode.
  1595. .TP
  1596. \fIalert\fP <\fBon|off\fR>
  1597. .br
  1598. Enable or disable PEF alerting for this channel.
  1599. .TP
  1600. \fIipsrc\fP <\fBsource\fR>
  1601. .br
  1602. Set the IP address source:
  1603. .br
  1604. \fInone\fP unspecified
  1605. .br
  1606. \fIstatic\fP manually configured static IP address
  1607. .br
  1608. \fIdhcp\fP address obtained by BMC running DHCP
  1609. .br
  1610. \fIbios\fP address loaded by BIOS or system software
  1611. .TP
  1612. \fIarp respond\fP <\fBon\fR|\fBoff\fR>
  1613. .br
  1614. Set BMC generated ARP responses.
  1615. .TP
  1616. \fIarp generate\fP <\fBon\fR|\fBoff\fR>
  1617. .br
  1618. Set BMC generated gratuitous ARPs.
  1619. .TP
  1620. \fIarp interval\fP <\fBseconds\fR>
  1621. .br
  1622. Set BMC generated gratuitous ARP interval.
  1623. .TP
  1624. \fIvlan id\fP <\fBoff\fR|\fBid\fR>
  1625. .br
  1626. Disable VLAN operation or enable VLAN and set the ID.
  1627. .br
  1628. ID: value of the virtual lan identifier between 1 and 4094 inclusive.
  1629. .TP
  1630. \fIvlan priority\fP <\fBpriority\fR>
  1631. .br
  1632. Set the priority associated with VLAN frames.
  1633. .br
  1634. ID: priority of the virtual lan frames between 0 and 7 inclusive.
  1635. .TP
  1636. \fIauth\fP <\fBlevel\fR,\fB...\fR> <\fBtype\fR,\fB...\fR>
  1637. .br
  1638. Set the valid authtypes for a given auth level.
  1639. .br
  1640. Levels: callback, user, operator, admin
  1641. .br
  1642. Types: none, md2, md5, password, oem
  1643. .TP
  1644. \fIcipher_privs\fP <\fBprivlist\fR>
  1645. .br
  1646. Correlates cipher suite numbers with the maximum privilege
  1647. level that is allowed to use it. In this way, cipher suites can restricted
  1648. to users with a given privilege level, so that, for example,
  1649. administrators are required to use a stronger cipher suite than
  1650. normal users.
  1651. The format of \fIprivlist\fR is as follows. Each character represents
  1652. a privilege level and the character position identifies the cipher
  1653. suite number. For example, the first character represents cipher
  1654. suite 0, the second represents cipher suite 1, and so on.
  1655. \fIprivlist\fR must be 15 characters in length.
  1656. Characters used in \fIprivlist\fR and their associated privilege levels are:
  1657. \fIX\fP Cipher Suite Unused
  1658. .br
  1659. \fIc\fP CALLBACK
  1660. .br
  1661. \fIu\fP USER
  1662. .br
  1663. \fIo\fP OPERATOR
  1664. .br
  1665. \fIa\fP ADMIN
  1666. .br
  1667. \fIO\fP OEM
  1668. .br
  1669. So, to set the maximum privilege for cipher suite 0 to USER and suite 1 to
  1670. ADMIN, issue the following command:
  1671. > ipmitool \-I \fIinterface\fR lan set \fIchannel\fR cipher_privs uaXXXXXXXXXXXXX
  1672. .TP
  1673. \fIbad_pass_thresh\fP <\fBthresh_num\fR> <\fB1|0\fR> <\fBreset_interval\fR> <\fBlockout_interval\fR>
  1674. .br
  1675. Sets the Bad Password Threshold.
  1676. <\fBthresh_num\fR> If non-zero, this value determines the number of sequential bad passwords
  1677. that will be allowed to be entered for the identified user before the user is automatically
  1678. disabled from access on the channel.
  1679. <\fB1|0\fR> 1 = generate a Session Audit sensor "Invalid password disable" event message.
  1680. 0 = do not generate an event message when the user is disabled.
  1681. <\fBreset_interval\fR> Attempt Count Reset Interval. The interval, in tens of seconds, for
  1682. which the accumulated count of bad password attempts is retained before being automatically
  1683. reset to zero.
  1684. <\fBlockout_interval\fR> User Lockout Interval. The interval, in tens of seconds, that the user
  1685. will remain disabled after being disabled because the Bad Password Threshold number was reached.
  1686. .RE
  1687. .TP
  1688. \fIalert\fP \fIprint\fP [<\fBchannel\fR>] [<\fBalert destination\fR>]
  1689. .br
  1690. Print alert information for the specified channel and destination.
  1691. The default will print all alerts for all alert destinations on the
  1692. first found LAN channel.
  1693. .TP
  1694. \fIalert\fP \fIset\fP <\fBchannel number\fR> <\fBalert destination\fR> <\fBcommand\fR> <\fBparameter\fR>
  1695. .br
  1696. Set an alert on the given LAN channel and destination. Alert Destinations are
  1697. listed via the '\fIlan alert print\fP' command. Valid command/parameter options are:
  1698. .RS
  1699. .TP
  1700. \fIipaddr\fP <\fBx.x.x.x\fR>
  1701. .br
  1702. Set alert IP address.
  1703. .TP
  1704. \fImacaddr\fP <\fBxx:xx:xx:xx:xx:xx\fR>
  1705. .br
  1706. Set alert MAC address.
  1707. .TP
  1708. \fIgateway\fP <\fBdefault | backup\fR>
  1709. .br
  1710. Set the channel gateway to use for alerts.
  1711. .TP
  1712. \fIack\fP <\fBon | off\fR>
  1713. .br
  1714. Set Alert Acknowledge on or off.
  1715. .TP
  1716. \fItype\fP <\fBpet | oem1 | oem2\fR>
  1717. .br
  1718. Set the destination type as PET or OEM.
  1719. .TP
  1720. \fItime\fP <\fBseconds\fR>
  1721. .br
  1722. Set ack timeout or unack retry interval.
  1723. .TP
  1724. \fIretry\fP <\fBnumber\fR>
  1725. .br
  1726. Set the number of alert retries.
  1727. .RE
  1728. .TP
  1729. \fIstats\fP \fIget\fP [<\fBchannel number\fR>]
  1730. .br
  1731. Retrieve information about the IP connections on the specified channel.
  1732. The default will retrieve statistics on the first found LAN channel.
  1733. .TP
  1734. \fIstats\fP \fIclear\fP [<\fBchannel number\fR>]
  1735. .br
  1736. Clear all IP/UDP/RMCP Statistics to 0 on the specified channel.
  1737. The default will clear statistics on the first found LAN channel.
  1738. .RE
  1739. .TP
  1740. \fImc | bmc\fP
  1741. .RS
  1742. .TP
  1743. \fIreset\fP <\fBwarm\fR|\fBcold\fR>
  1744. .br
  1745. Instructs the BMC to perform a warm or cold reset.
  1746. .TP
  1747. \fIguid\fP
  1748. Display the Management Controller Globally Unique IDentifier.
  1749. .TP
  1750. \fIinfo\fP
  1751. .br
  1752. Displays information about the BMC hardware, including device
  1753. revision, firmware revision, IPMI version supported, manufacturer ID,
  1754. and information on additional device support.
  1755. .TP
  1756. \fIwatchdog\fP
  1757. .br
  1758. These commands allow a user to view and change the current
  1759. state of the watchdog timer.
  1760. .RS
  1761. .TP
  1762. \fIget\fP
  1763. .br
  1764. Show current Watchdog Timer settings and countdown state.
  1765. .TP
  1766. \fIreset\fP
  1767. .br
  1768. Reset the Watchdog Timer to its most recent state and restart the
  1769. countdown timer.
  1770. .TP
  1771. \fIoff\fP
  1772. .br
  1773. Turn off a currently running Watchdog countdown timer.
  1774. .RE
  1775. .TP
  1776. \fIselftest\fP
  1777. .br
  1778. Check on the basic health of the BMC by executing the Get Self Test
  1779. results command and report the results.
  1780. .TP
  1781. \fIgetenables\fP
  1782. .br
  1783. Displays a list of the currently enabled options for the BMC.
  1784. .br
  1785. .TP
  1786. \fIsetenables\fP <\fBoption\fR>=[\fIon\fP|\fIoff\fP]
  1787. .br
  1788. Enables or disables the given \fIoption\fR. This command is
  1789. only supported over the system interface according to the IPMI
  1790. specification. Currently supported values for \fIoption\fR include:
  1791. .RS
  1792. .TP
  1793. \fIrecv_msg_intr\fP
  1794. .br
  1795. Receive Message Queue Interrupt
  1796. .TP
  1797. \fIevent_msg_intr\fP
  1798. .br
  1799. Event Message Buffer Full Interrupt
  1800. .TP
  1801. \fIevent_msg\fP
  1802. .br
  1803. Event Message Buffer
  1804. .TP
  1805. \fIsystem_event_log\fP
  1806. .br
  1807. System Event Logging
  1808. .TP
  1809. \fIoem0\fP
  1810. .br
  1811. OEM\-Defined option #0
  1812. .TP
  1813. \fIoem1\fP
  1814. .br
  1815. OEM\-Defined option #1
  1816. .TP
  1817. \fIoem2\fP
  1818. .br
  1819. OEM\-Defined option #2
  1820. .RE
  1821. .TP
  1822. \fIgetsysinfo\fP <\fBargument\fP>
  1823. Retrieves system info from bmc for given argument.
  1824. .br
  1825. See \fIsetsysinfo\fP for argument definitions
  1826. .TP
  1827. \fIsetsysinfo\fP <\fBargument\fP> <\fBstring\fP>
  1828. Stores system info string to bmc for given argument
  1829. .RS
  1830. .TP
  1831. Possible arguments are:
  1832. .RS
  1833. .TP
  1834. \fIprimary_os_name\fP Primary Operating System Name
  1835. .TP
  1836. \fIos_name\fP Operating System Name
  1837. .TP
  1838. \fIsystem_name\fP System Name of Server
  1839. .TP
  1840. \fIdelloem_os_version\fP Running version of operating system
  1841. .TP
  1842. \fIdelloem_URL\fP URL of BMC Webserver
  1843. .RE
  1844. .RE
  1845. .TP
  1846. \fIchassis\fP
  1847. .RS
  1848. .TP
  1849. \fIstatus\fP
  1850. .br
  1851. Displays information regarding the high\-level
  1852. status of the system chassis and main power
  1853. subsystem.
  1854. .TP
  1855. \fIpoh\fP
  1856. .br
  1857. This command will return the Power\-On Hours counter.
  1858. .TP
  1859. \fIidentify\fP <\fBinterval\fR>
  1860. Control the front panel identify light. Default interval
  1861. is 15 seconds. Use 0 to turn off. Use "force" to turn on
  1862. indefinitely.
  1863. .TP
  1864. \fIrestart_cause\fP
  1865. .br
  1866. Query the chassis for the cause of the last system restart.
  1867. .TP
  1868. \fIselftest\fP
  1869. .br
  1870. Check on the basic health of the BMC by executing the Get Self Test
  1871. results command and report the results.
  1872. .TP
  1873. \fIpolicy\fP
  1874. .br
  1875. Set the chassis power policy in the event power failure.
  1876. .RS
  1877. .TP
  1878. \fIlist\fP
  1879. .br
  1880. Return supported policies.
  1881. .TP
  1882. \fIalways\-on\fP
  1883. .br
  1884. Turn on when power is restored.
  1885. .TP
  1886. \fIprevious\fP
  1887. .br
  1888. Returned to previous state when power is restored.
  1889. .TP
  1890. \fIalways\-off\fP
  1891. .br
  1892. Stay off after power is restored.
  1893. .RE
  1894. .TP
  1895. \fIpower\fP
  1896. .br
  1897. Performs a chassis control command to view and
  1898. change the power state.
  1899. .RS
  1900. .TP
  1901. \fIstatus\fP
  1902. .br
  1903. Show current chassis power status.
  1904. .TP
  1905. \fIon\fP
  1906. .br
  1907. Power up chassis.
  1908. .TP
  1909. \fIoff\fP
  1910. .br
  1911. Power down chassis into soft off (S4/S5 state).
  1912. \fBWARNING\fR: This command does not initiate a clean
  1913. shutdown of the operating system prior to powering down the system.
  1914. .TP
  1915. \fIcycle\fP
  1916. .br
  1917. Provides a power off interval of at least 1 second. No action
  1918. should occur if chassis power is in S4/S5 state, but it is
  1919. recommended to check power state first and only issue a power
  1920. cycle command if the system power is on or in lower sleep
  1921. state than S4/S5.
  1922. .TP
  1923. \fIreset\fP
  1924. .br
  1925. This command will perform a hard reset.
  1926. .TP
  1927. \fIdiag\fP
  1928. .br
  1929. Pulse a diagnostic interrupt (NMI) directly to the processor(s).
  1930. .TP
  1931. \fIsoft\fP
  1932. .br
  1933. Initiate a soft\-shutdown of OS via ACPI. This can be done in a
  1934. number of ways, commonly by simulating an overtemperture or by
  1935. simulating a power button press. It is necessary for there to
  1936. be Operating System support for ACPI and some sort of daemon
  1937. watching for events for this soft power to work.
  1938. .RE
  1939. .TP
  1940. \fIbootdev\fP <\fBdevice\fR> [<\fIclear\-cmos\fP=\fByes\fR|\fBno\fR>] [<\fIoptions\fP=\fBhelp,...\fR>]
  1941. .br
  1942. Request the system to boot from an alternate boot device on next reboot.
  1943. The \fIclear\-cmos\fP option, if supplied, will instruct the BIOS to
  1944. clear its CMOS on the next reboot. Various options may be used to modify
  1945. the boot device settings. Run \fI"bootdev none options=help"\fP for a list of
  1946. available boot device modifiers/options.
  1947. .RS
  1948. .TP
  1949. Currently supported values for <device> are:
  1950. .TP
  1951. \fInone\fP
  1952. .br
  1953. Do not change boot device
  1954. .TP
  1955. \fIpxe\fP
  1956. .br
  1957. Force PXE boot
  1958. .TP
  1959. \fIdisk\fP
  1960. .br
  1961. Force boot from BIOS default boot device
  1962. .TP
  1963. \fIsafe\fP
  1964. .br
  1965. Force boot from BIOS default boot device, request Safe Mode
  1966. .TP
  1967. \fIdiag\fP
  1968. .br
  1969. Force boot from diagnostic partition
  1970. .TP
  1971. \fIcdrom\fP
  1972. .br
  1973. Force boot from CD/DVD
  1974. .TP
  1975. \fIbios\fP
  1976. .br
  1977. Force boot into BIOS setup
  1978. .TP
  1979. \fIfloppy\fP
  1980. .br
  1981. Force boot from Floppy/primary removable media
  1982. .RE
  1983. .TP
  1984. \fIbootparam\fP
  1985. .br
  1986. Get or set various system boot option parameters.
  1987. .RS
  1988. .TP
  1989. \fIget\fP <\fBparam #\fR>
  1990. .br
  1991. Get boot parameter. Currently supported values for <\fBparam #\fR> are:
  1992. \fI0\fP - Set In Progress
  1993. \fI1\fP - Service Partition Selector
  1994. \fI2\fP - Service Partition Scan
  1995. \fI3\fP - BMC Boot Flag Valid Bit Clearing
  1996. \fI4\fP - Boot Info Acknowledge
  1997. \fI5\fP - Boot Flags
  1998. \fI6\fP - Boot Initiator Info
  1999. \fI7\fP - Boot Initiator Mailbox
  2000. .br
  2001. .TP
  2002. \fIset\fP <\fBdevice\fR> [<\fIoptions\fP=\fBhelp,...\fR>]
  2003. .br
  2004. Set boot device parameter used for next boot. Various options may be used
  2005. to change when the the next boot device is cleared.
  2006. Run \fI"options=help"\fP for a list of available bootparam set device options.
  2007. .RS
  2008. .TP
  2009. Currently supported bootparam \fBdevice\fR settings are:
  2010. .TP
  2011. \fIforce_pxe\fP
  2012. .br
  2013. Force PXE boot
  2014. .TP
  2015. \fIforce_disk\fP
  2016. .br
  2017. Force boot from default hard-drive
  2018. .TP
  2019. \fIforce_safe\fP
  2020. .br
  2021. Force boot from default hard-drive, request Safe Mode
  2022. .TP
  2023. \fIforce_diag\fP
  2024. .br
  2025. Force boot from diagnostic partition
  2026. .TP
  2027. \fIforce_cdrom\fP
  2028. .br
  2029. Force boot from CD/DVD
  2030. .TP
  2031. \fIforce_bios\fP
  2032. .br
  2033. Force boot into BIOS setup
  2034. .RE
  2035. .RS
  2036. .TP
  2037. Currently supported bootparam \fBoptions\fR settings are associated with BMC Boot Valid Bit Clearing and are as follows: Any option can be prefixed with "no-" to invert the sense of the operation.
  2038. .TP
  2039. \fIPEF\fP
  2040. .br
  2041. Clear valid bit on reset/power cycle caused by PEF
  2042. .TP
  2043. \fItimeout\fP
  2044. .br
  2045. Automatically clear boot flag valid bit if Chassis Control command is
  2046. not received within 60 seconds.
  2047. .TP
  2048. \fIwatchdog\fP
  2049. .br
  2050. Clear valid bit on reset/power cycle caused by watchdog timeout
  2051. .TP
  2052. \fIreset\fP
  2053. .br
  2054. Clear valid bit on push button reset / soft-reset
  2055. .TP
  2056. \fIpower\fP
  2057. .br
  2058. Clear valid bit on power up via power push button or wake event
  2059. .RE
  2060. .RE
  2061. .RE
  2062. .RE
  2063. .TP
  2064. \fInm\fP
  2065. .RS
  2066. .TP
  2067. \fIalert\fP
  2068. .RS
  2069. .TP
  2070. \fIclear dest\fP <\fBdest\fR>
  2071. .br
  2072. Clear the Node Manager Alert lan destination.
  2073. .RE
  2074. .RS
  2075. .TP
  2076. \fIget\fP
  2077. .br
  2078. Get the Node Manager Alert settings.
  2079. .RE
  2080. .RS
  2081. .TP
  2082. \fIset chan\fP <\fBchan\fR> \fIdest\fP <\fBdest\fR> \fIstring\fP <\fBstring\fR>
  2083. .br
  2084. Set the Node Manager alert channel, lan destination, and alert string number.
  2085. .RE
  2086. .TP
  2087. \fIcapability\fP
  2088. .br
  2089. Obtain the Node Manager power control capabilities and ranges.
  2090. .TP
  2091. \fIcontrol\fP
  2092. .RS
  2093. .TP
  2094. \fIenable\fP|\fIdisable \fP
  2095. .RS
  2096. .TP
  2097. \fIglobal\fP
  2098. .br
  2099. Enable/disable all policies for all domains.
  2100. .TP
  2101. \fIper_domain\fP <platform|CPU|Memory>
  2102. .br
  2103. Enable/disable all policies of the specified domain.
  2104. .TP
  2105. \fIper_policy\fP <0-7>
  2106. .br
  2107. Enable/disable the policy for the specified domain/policy combination.
  2108. .RE
  2109. .RE
  2110. .TP
  2111. \fIdiscover\fP
  2112. .br
  2113. Discover Node Manager presence as well as the Node Manager version, revision, and patch number.
  2114. .TP
  2115. \fIpolicy\fP
  2116. .RS
  2117. .TP
  2118. \fIadd\fP
  2119. .RS
  2120. .TP
  2121. \fIpower\fP <watts> \fIpolicy_id\fP <0-7> [\fIcorrection\fP auto|soft|hard] \fItrig_lim\fP <seconds> \fIstats\fP <seconds> [\fIdomain\fP <platform|CPU|Memory>] \fIenable\fP|\fIdisable\fP
  2122. .br
  2123. Add a new power policy, or overwrite an existing policy.
  2124. The \fIcorrection\fP parameter is the agressiveness of frequency limiting, default is auto.
  2125. The \fItrig_lim\fP is the correction time limit and must be at least 6000 and not greater than 65535.
  2126. The \fIstats\fP setting is the averaging period in seconds and ranges from 1-65535.
  2127. If domain is not supplied a default of platform is used.
  2128. .TP
  2129. \fIinlet\fP <temp> \fIpolicy_id\fP <0-7> [\fIcorrection\fP auto|soft|hard] \fItrig_lim\fP <seconds> \fIstats\fP <seconds> [\fIdomain\fP <platform|CPU|Memory>] \fIenable\fP|\fIdisable\fP
  2130. .br
  2131. Add a new inlet temp policy, or overwrite an existing policy.
  2132. The \fIcorrection\fP parameter is the agressiveness of frequency limiting, default is auto.
  2133. The \fItrig_lim\fP is the correction time limit and must be at least 6000 and not greater than 65535.
  2134. The \fIstats\fP setting is the averaging period in seconds and ranges from 1-65535.
  2135. If domain is not supplied a default of platform is used.
  2136. .RE
  2137. .TP
  2138. \fIget\fP \fIpolicy_id\fP <0-7>
  2139. .br
  2140. Get a previously stored policy.
  2141. .TP
  2142. \fIlimiting\fP
  2143. .br
  2144. Report policy number if any policy is limiting power.
  2145. .TP
  2146. \fIremove\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2147. .br
  2148. Remove a policy. If domain is not supplied a default of platform is used.
  2149. .RE
  2150. .TP
  2151. \fIpower\fP \fImin\fP <minimum> \fImax\fP <maximum> [\fIdomain\fP <platform|CPU|Memory>]
  2152. .br
  2153. Configure Node Manager power minimum and maximum power draw limits.
  2154. The \fImin\fP and \fImax\fP values must be in the range of 0-65535.
  2155. If domain is not supplied a default of platform is used.
  2156. .RE
  2157. .RS
  2158. .TP
  2159. \fIreset\fP
  2160. .RS
  2161. .TP
  2162. \fIcomm\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2163. .br
  2164. Reset Node Manager communication statistics.
  2165. If domain is not supplied a default of platform is used.
  2166. .TP
  2167. \fIglobal\fI
  2168. .br
  2169. Reset Node Manager global statistics.
  2170. .TP
  2171. \fImemory\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2172. .br
  2173. Reset Node Manager memory throttling statistics.
  2174. If domain is not supplied a default of platform is used.
  2175. .TP
  2176. \fIper_policy\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2177. .br
  2178. Reset Node Manager per policy statistics.
  2179. If domain is not supplied a default of platform is used.
  2180. .TP
  2181. \fIrequests\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2182. .br
  2183. Reset Node Manager unhandled requests statistics.
  2184. If domain is not supplied a default of platform is used.
  2185. .TP
  2186. \fIresponse\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2187. .br
  2188. Reset Node Manager response time statistics.
  2189. If domain is not supplied a default of platform is used.
  2190. .TP
  2191. \fIthrottling\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2192. .br
  2193. Reset Node Manager throttling statistics.
  2194. If domain is not supplied a default of platform is used.
  2195. .RE
  2196. .TP
  2197. \fIstatistics\fP
  2198. .RS
  2199. .TP
  2200. \fIcomm_fail\fP
  2201. .br
  2202. Report Node Manager communication failure statistics.
  2203. .TP
  2204. \fIcpu_throttling\fP
  2205. .br
  2206. Report Node Manager cpu throttling statistics.
  2207. .TP
  2208. \fImem_throttling\fP
  2209. .br
  2210. Report Node Manager memory throttling statistics.
  2211. .TP
  2212. \fIpolicy_power\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2213. .br
  2214. Report Node Manager per policy power statistics (policy must be a power limit type policy).
  2215. If domain is not supplied a default of platform is used.
  2216. .TP
  2217. \fIpolicy_temps\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2218. .br
  2219. Report Node Manager per policy temp statistics (policy must be an inlet temp limit policy).
  2220. If domain is not supplied a default of platform is used.
  2221. .TP
  2222. \fIpolicy_throt\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2223. .br
  2224. Report Node Manager per policy throttling statistics.
  2225. If domain is not supplied a default of platform is used.
  2226. .TP
  2227. \fIrequests\fP
  2228. .br
  2229. Report Node Manager unhandled requests statistics.
  2230. .TP
  2231. \fIresponse\fP
  2232. .br
  2233. Report Node Manager response time statistics.
  2234. .RE
  2235. .TP
  2236. \fIsuspend\fP
  2237. .RS
  2238. .TP
  2239. \fIget\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2240. .br
  2241. Get Node Manager policy suspend periods.
  2242. If domain is not supplied a default of platform is used.
  2243. .TP
  2244. \fIset\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>] <start> <stop> <repeat>
  2245. .br
  2246. Set Node Manager policy suspend periods.
  2247. If domain is not supplied a default of platform is used.
  2248. The <start> and <stop> values must be in the range of 0-239, which is the number of minutes past midnight divided by 6.
  2249. The <repeat> value is the daily recurrence pattern. Bit 0 is repeat every Monday, bit 1 is repeat every Tuesday, on through bit 6 for Sunday.
  2250. .RE
  2251. .TP
  2252. \fIthreshold\fP
  2253. .RS
  2254. .TP
  2255. \fIget\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>]
  2256. .br
  2257. Get Node Manager policy Alert Threshold settings.
  2258. If domain is not supplied a default of platform is used.
  2259. .TP
  2260. \fIset\fP \fIpolicy_id\fP <0-7> [\fIdomain\fP <platform|CPU|Memory>] \fIthresh_array\fP
  2261. .br
  2262. Set Node Manager policy Alert Threshold values.
  2263. If domain is not supplied a default of platform is used.
  2264. The \fIthresh_array\fP is 1, 2, or 3 integers that set three alert threshold settings. The setting type is a power or temperature value which must match the type of policy.
  2265. .RE
  2266. .RE
  2267. .TP
  2268. \fIpef\fP
  2269. .RS
  2270. .TP
  2271. \fIinfo\fP
  2272. .br
  2273. This command will query the BMC and print information about the PEF
  2274. supported features.
  2275. .TP
  2276. \fIstatus\fP
  2277. .br
  2278. This command prints the current PEF status (the last SEL entry
  2279. processed by the BMC, etc).
  2280. .TP
  2281. \fIpolicy\fP
  2282. .br
  2283. This command lists the PEF policy table entries. Each policy
  2284. entry describes an alert destination. A policy set is a
  2285. collection of table entries. PEF alert actions reference policy sets.
  2286. .TP
  2287. \fIlist\fP
  2288. .br
  2289. This command lists the PEF table entries. Each PEF entry
  2290. relates a sensor event to an action. When PEF is active,
  2291. each platform event causes the BMC to scan this table for
  2292. entries matching the event, and possible actions to be taken.
  2293. Actions are performed in priority order (higher criticality first).
  2294. .RE
  2295. .TP
  2296. \fIpicmg\fP <\fBproperties\fR>
  2297. .RS
  2298. Run a PICMG/ATA extended command. Get PICMG properties may be used to
  2299. obtain and print Extension major version information, PICMG identifier,
  2300. FRU Device ID and Max FRU Device ID.
  2301. .TP
  2302. \fIaddrinfo\fP
  2303. .br
  2304. Get address information. This command may return information on the Hardware
  2305. address, IPMB-0 Address, FRU ID, Site/Entity ID, and Site/Entity Type.
  2306. .TP
  2307. \fIfrucontrol\fP <\fBfru id\fR> <\fBoptions\fR>
  2308. .br
  2309. Set various control options:
  2310. .RS
  2311. .TP
  2312. \fI0x00\fP - Cold Reset
  2313. .br
  2314. .TP
  2315. \fI0x01\fP - Warm Reset
  2316. .br
  2317. .TP
  2318. \fI0x02\fP - Graceful Reboot
  2319. .br
  2320. .TP
  2321. \fI0x03\fP - Issue Diagnostic Interrupt
  2322. .br
  2323. .TP
  2324. \fI0x04\fP - Quiesce [AMC only]
  2325. .br
  2326. .TP
  2327. \fI0x05-0xFF\fP - Cold Reset
  2328. .br
  2329. .RE
  2330. .TP
  2331. \fIactivate\fP <\fBfru id\fR>
  2332. .br
  2333. Activate the specified FRU.
  2334. .TP
  2335. \fIdeactivate\fP <\fBfru id\fR>
  2336. .br
  2337. Deactivate the specified FRU.
  2338. .TP
  2339. \fIpolicy\fP \fIget\fP <\fBfru id\fR>
  2340. .br
  2341. Get FRU activation policy.
  2342. .TP
  2343. \fIpolicy\fP \fIset\fP <\fBfru id\fR> <\fBlockmask\fR> <\fBlock\fR>
  2344. .br
  2345. Set FRU activation policy. \fBlockmask\fR is 1 or 0 to indicate action
  2346. on the deactivation or activation locked bit respectively. \fBlock\fR is
  2347. 1 or 0 to set/clear locked bit.
  2348. .TP
  2349. \fIportstate\fP \fBset\fR|\fBgetall\fR|\fBgetgranted\fR|\fBgetdenied\fR <\fBparameters\fR>
  2350. .br
  2351. Get or set various port states. See usage for parameter details.
  2352. .RE
  2353. .TP
  2354. \fIpower\fP <\fBchassis power command\fR>
  2355. .br
  2356. Shortcut to the \fIchassis power\fP commands.
  2357. See the \fIchassis power\fP commands for usage information.
  2358. .RE
  2359. .TP
  2360. \fIraw\fP <\fBnetfn\fR> <\fBcmd\fR> [<\fBdata\fR>]
  2361. .br
  2362. This will allow you to execute raw IPMI commands. For
  2363. example to query the POH counter with a raw command:
  2364. > ipmitool \-v raw 0x0 0xf
  2365. .br
  2366. RAW REQ (netfn=0x0 cmd=0xf data_len=0)
  2367. .br
  2368. RAW RSP (5 bytes)
  2369. .br
  2370. 3c 72 0c 00 00
  2371. \fBNote\fR that the OpenIPMI driver provided by the Linux kernel will reject the Get Message, Send Message and Read Event Message Buffer commands because it handles the message sequencing internally.
  2372. .RE
  2373. .TP
  2374. \fIsdr\fP
  2375. .RS
  2376. .TP
  2377. \fIget\fP <\fBid\fR> ... [<\fBid\fR>]
  2378. .br
  2379. Prints information for sensor data records specified by sensor id.
  2380. .TP
  2381. \fIinfo\fP
  2382. .br
  2383. This command will query the BMC for Sensor Data Record (SDR) Repository information.
  2384. .TP
  2385. \fItype\fP [<\fBsensor type\fP>]
  2386. This command will display all records from the SDR Repository of a specific type.
  2387. Run with type \fIlist\fP (or simply with no type) to see the list of available types.
  2388. For example to query for all Temperature sensors:
  2389. > ipmitool sdr type Temperature
  2390. .br
  2391. Baseboard Temp | 30h | ok | 7.1 | 28 degrees C
  2392. .br
  2393. FntPnl Amb Temp | 32h | ok | 12.1 | 24 degrees C
  2394. .br
  2395. Processor1 Temp | 98h | ok | 3.1 | 57 degrees C
  2396. .br
  2397. Processor2 Temp | 99h | ok | 3.2 | 53 degrees C
  2398. .TP
  2399. \fIlist\fP | \fIelist\fP [<\fBall\fR|\fBfull\fR|\fBcompact\fR|\fBevent\fR|\fBmcloc\fR|\fBfru\fR|\fBgeneric\fR>]
  2400. .br
  2401. This command will read the Sensor Data Records (SDR) and extract sensor
  2402. information of a given type, then query each sensor and print its name,
  2403. reading, and status. If invoked as \fIelist\fP then it will also print
  2404. sensor number, entity id and instance, and asserted discrete states.
  2405. The default output will only display \fIfull\fP and \fIcompact\fP sensor
  2406. types, to see all sensors use the \fIall\fP type with this command.
  2407. .RS
  2408. .TP
  2409. Valid types are:
  2410. .RS
  2411. .TP
  2412. \fIall\fP
  2413. .br
  2414. All SDR records (Sensor and Locator)
  2415. .TP
  2416. \fIfull\fP
  2417. .br
  2418. Full Sensor Record
  2419. .TP
  2420. \fIcompact\fP
  2421. .br
  2422. Compact Sensor Record
  2423. .TP
  2424. \fIevent\fP
  2425. .br
  2426. Event\-Only Sensor Record
  2427. .TP
  2428. \fImcloc\fP
  2429. .br
  2430. Management Controller Locator Record
  2431. .TP
  2432. \fIfru\fP
  2433. .br
  2434. FRU Locator Record
  2435. .TP
  2436. \fIgeneric\fP
  2437. .br
  2438. Generic SDR records
  2439. .RE
  2440. .RE
  2441. .TP
  2442. \fIentity\fP <\fBid\fR>[.<\fBinstance\fR>]
  2443. .br
  2444. Displays all sensors associated with an entity. Get a list of
  2445. valid entity ids on the target system by issuing the \fIsdr elist\fP command.
  2446. A list of all entity ids can be found in the IPMI specifications.
  2447. .TP
  2448. \fIdump\fP <\fBfile\fR>
  2449. .br
  2450. Dumps raw SDR data to a file. This data file can then be used as
  2451. a local SDR cache of the remote managed system with the \fI\-S <file>\fP
  2452. option on the ipmitool command line. This can greatly improve performance
  2453. over system interface or remote LAN.
  2454. .TP
  2455. \fIfill\fP \fIsensors\fP
  2456. .br
  2457. Create the SDR Repository for the current configuration. Will perform
  2458. a 'Clear SDR Repository' command so be careful.
  2459. .TP
  2460. \fIfill\fP \fIfile\fP <\fBfilename\fR>
  2461. .br
  2462. Fill the SDR Repository using records stored in a binary data file. Will perform
  2463. a 'Clear SDR Repository' command so be careful.
  2464. .RE
  2465. .TP
  2466. \fIsel\fP
  2467. .br
  2468. NOTE: System Event Log (SEL) entry\-times are displayed as
  2469. `Pre\-Init Time\-stamp' if the SEL clock needs to be set.
  2470. Ensure that the SEL clock is accurate by invoking the
  2471. \fIsel time get\fP and
  2472. \fIsel time set <time string>\fP commands.
  2473. .RS
  2474. .TP
  2475. \fIinfo\fP
  2476. .br
  2477. This command will query the BMC for information
  2478. about the System Event Log (SEL) and its contents.
  2479. .TP
  2480. \fIclear\fP
  2481. .br
  2482. This command will clear the contents of the SEL.
  2483. It cannot be undone so be careful.
  2484. .TP
  2485. \fIlist\fP | \fIelist\fP
  2486. .br
  2487. When this command is invoked without arguments, the entire
  2488. contents of the System Event Log are displayed. If invoked as
  2489. \fIelist\fP (extended list) it will also use the Sensor Data
  2490. Record entries to display the sensor ID for the sensor that caused
  2491. each event. \fBNote\fR this can take a long time over the
  2492. system interface.
  2493. .RS
  2494. .TP
  2495. <\fBcount\fR> | \fIfirst\fP <\fBcount\fR>
  2496. .br
  2497. Displays the first \fIcount\fR (least\-recent) entries in the SEL.
  2498. If \fIcount\fR is zero, all entries are displayed.
  2499. .TP
  2500. \fIlast\fP <\fBcount\fR>
  2501. .br
  2502. Displays the last \fIcount\fR (most\-recent) entries in the SEL.
  2503. If \fIcount\fR is zero, all entries are displayed.
  2504. .RE
  2505. .TP
  2506. \fIdelete\fP <\fBSEL Record ID\fR> ... <\fBSEL Record ID\fR>
  2507. .br
  2508. Delete one or more SEL event records.
  2509. .TP
  2510. \fIadd\fP <\fBfilename ID\fR>
  2511. .br
  2512. Read event entries from a file and add them to the SEL. New SEL
  2513. entries area added onto the SEL after the last record in the SEL.
  2514. Record added is of type 2 and is automatically timestamped.
  2515. .TP
  2516. \fIget\fP <\fBSEL Record ID\fR>
  2517. .br
  2518. Print information on the specified SEL Record entry.
  2519. .TP
  2520. \fIsave\fP <\fBfile\fR>
  2521. Save SEL records to a text file that can be fed back into the
  2522. \fIevent file\fP ipmitool command. This can be useful for
  2523. testing Event generation by building an appropriate Platform
  2524. Event Message file based on existing events. Please see the
  2525. available help for the 'event file ...' command for a description of
  2526. the format of this file.
  2527. .TP
  2528. \fIwriteraw\fP <\fBfile\fR>
  2529. Save SEL records to a file in raw, binary format. This file can
  2530. be fed back to the \fIsel readraw\fP ipmitool command for viewing.
  2531. .TP
  2532. \fIreadraw\fP <\fBfile\fR>
  2533. Read and display SEL records from a binary file. Such a file can
  2534. be created using the \fIsel writeraw\fP ipmitool command.
  2535. .TP
  2536. \fItime\fP
  2537. .RS
  2538. .TP
  2539. \fIget\fP
  2540. .br
  2541. Displays the SEL clock's current time.
  2542. .TP
  2543. \fIset\fP <\fBtime string\fR>
  2544. .br
  2545. Sets the SEL clock. Future SEL entries will use the time
  2546. set by this command. <\fBtime string\fR> is of the
  2547. form "MM/DD/YYYY HH:MM:SS". Note that hours are in 24\-hour
  2548. form. It is recommended that the SEL be cleared before
  2549. setting the time.
  2550. .RE
  2551. .RE
  2552. .TP
  2553. \fIsensor\fP
  2554. .RS
  2555. .TP
  2556. \fIlist\fP
  2557. .br
  2558. Lists sensors and thresholds in a wide table format.
  2559. .TP
  2560. \fIget\fP <\fBid\fR> ... [<\fBid\fR>]
  2561. .br
  2562. Prints information for sensors specified by name.
  2563. .TP
  2564. \fIthresh\fP <\fBid\fR> <\fBthreshold\fR> <\fBsetting\fR>
  2565. .br
  2566. This allows you to set a particular sensor threshold
  2567. value. The sensor is specified by name.
  2568. .RS
  2569. .TP
  2570. Valid \fIthresholds\fP are:
  2571. .br
  2572. \fIunr\fP Upper Non\-Recoverable
  2573. .br
  2574. \fIucr\fP Upper Critical
  2575. .br
  2576. \fIunc\fP Upper Non\-Critical
  2577. .br
  2578. \fIlnc\fP Lower Non\-Critical
  2579. .br
  2580. \fIlcr\fP Lower Critical
  2581. .br
  2582. \fIlnr\fP Lower Non\-Recoverable
  2583. .RE
  2584. .TP
  2585. \fIthresh\fP <\fBid\fR> \fIlower\fP <\fBlnr\fR> <\fBlcr\fR> <\fBlnc\fR>
  2586. This allows you to set all lower thresholds for a sensor at the same time.
  2587. The sensor is specified by name and the thresholds are listed in order of
  2588. Lower Non\-Recoverable, Lower Critical, and Lower Non\-Critical.
  2589. .TP
  2590. \fIthresh\fP <\fBid\fR> \fIupper\fP <\fBunc\fR> <\fBucr\fR> <\fBunr\fR>
  2591. This allows you to set all upper thresholds for a sensor at the same time.
  2592. The sensor is specified by name and the thresholds are listed in order of
  2593. Upper Non\-Critical, Upper Critical, and Upper Non\-Recoverable.
  2594. .RE
  2595. .TP
  2596. \fIsession\fP
  2597. .RS
  2598. .TP
  2599. \fIinfo\fP <\fBactive\fR|\fBall\fR|\fBid 0xnnnnnnnn\fR|\fBhandle 0xnn\fR>
  2600. .br
  2601. Get information about the specified session(s). You may identify
  2602. sessions by their id, by their handle number, by their active status,
  2603. or by using the keyword `all' to specify all sessions.
  2604. .RE
  2605. .TP
  2606. \fIset\fP
  2607. .RS
  2608. .TP
  2609. \fIhostname\fP <\fBhost\fR>
  2610. Session hostname.
  2611. .RS
  2612. .RE
  2613. .TP
  2614. \fIusername\fP <\fBuser\fR>
  2615. Session username.
  2616. .RS
  2617. .RE
  2618. .TP
  2619. \fIpassword\fP <\fBpass\fR>
  2620. Session password.
  2621. .RS
  2622. .RE
  2623. .TP
  2624. \fIprivlvl\fP <\fBlevel\fR>
  2625. Session privilege level force.
  2626. .RS
  2627. .RE
  2628. .TP
  2629. \fIauthtype\fP <\fBtype\fR>
  2630. Authentication type force.
  2631. .RS
  2632. .RE
  2633. .TP
  2634. \fIlocaladdr\fP <\fBaddr\fR>
  2635. Local IPMB address.
  2636. .RS
  2637. .RE
  2638. .TP
  2639. \fItargetaddr\fP <\fBaddr\fR>
  2640. Remote target IPMB address.
  2641. .RS
  2642. .RE
  2643. .TP
  2644. \fIport\fP <\fBport\fR>
  2645. Remote RMCP port.
  2646. .RS
  2647. .RE
  2648. .TP
  2649. \fIcsv\fP [\fBlevel\fR]
  2650. Enable output in comma separated format.
  2651. Affects following commands:
  2652. \fIuser\fP, \fIchannel\fP, \fIisol\fP, \fIsunoem\fP,
  2653. \fIsol\fP, \fIsensor\fP, \fIsdr\fP, \fIsel\fP, \fIsession\fP.
  2654. .RS
  2655. .RE
  2656. .TP
  2657. \fIverbose\fP [\fBverbose\fR]
  2658. Verbosity level.
  2659. .RS
  2660. .RE
  2661. .RE
  2662. .TP
  2663. \fIshell\fP
  2664. .RS
  2665. This command will launch an interactive shell which you can use
  2666. to send multiple ipmitool commands to a BMC and see the responses.
  2667. This can be useful instead of running the full ipmitool command each
  2668. time. Some commands will make use of a Sensor Data Record cache
  2669. and you will see marked improvement in speed if these commands
  2670. are able to reuse the same cache in a shell session. LAN sessions
  2671. will send a periodic keepalive command to keep the IPMI session
  2672. from timing out.
  2673. .RE
  2674. .TP
  2675. \fIsol\fP
  2676. .RS
  2677. .TP
  2678. \fIinfo\fP [<\fBchannel number\fR>]
  2679. .br
  2680. Retrieve information about the Serial\-Over\-LAN configuration on
  2681. the specified channel. If no channel is given, it will display
  2682. SOL configuration data for the currently used channel.
  2683. .TP
  2684. \fIpayload\fP <\fIenable\fP | \fIdisable\fP | \fIstatus\fP> <\fBchannel number\fR> <\fBuserid\fR>
  2685. .br
  2686. Enable, disable or show status of SOL payload for the user on the specified channel.
  2687. .TP
  2688. \fIset\fP <\fBparameter\fR> <\fBvalue\fR> [<\fBchannel\fR>]
  2689. .br
  2690. Configure parameters for Serial Over Lan. If no channel is given,
  2691. it will display SOL configuration data for the currently used
  2692. channel. Configuration parameter updates are automatically guarded
  2693. with the updates to the set\-in\-progress parameter.
  2694. .RS
  2695. .TP
  2696. Valid parameters and values are:
  2697. .br
  2698. .TP
  2699. \fIset\-in\-progress\fP
  2700. set\-complete set\-in\-progress commit\-write
  2701. .TP
  2702. \fIenabled\fP
  2703. true false
  2704. .TP
  2705. \fIforce\-encryption\fP
  2706. true false
  2707. .TP
  2708. \fIforce\-authentication\fP
  2709. true false
  2710. .TP
  2711. \fIprivilege\-level\fP
  2712. user operator admin oem
  2713. .TP
  2714. \fIcharacter\-accumulate\-level\fP
  2715. Decimal number given in 5 milliseconds increments
  2716. .TP
  2717. \fIcharacter\-send\-threshold\fP
  2718. Decimal number
  2719. .TP
  2720. \fIretry\-count\fP
  2721. Decimal number. 0 indicates no retries after packet is transmitted.
  2722. .TP
  2723. \fIretry\-interval\fP
  2724. Decimal number in 10 millisecond increments. 0 indicates
  2725. that retries should be sent back to back.
  2726. .TP
  2727. \fInon\-volatile\-bit\-rate\fP
  2728. serial, 19.2, 38.4, 57.6, 115.2. Setting this value to
  2729. serial indicates that the BMC should use the setting used
  2730. by the IPMI over serial channel.
  2731. .TP
  2732. \fIvolatile\-bit\-rate\fP
  2733. serial, 19.2, 38.4, 57.6, 115.2. Setting this value to
  2734. serial indicates that the BMC should use the setting used
  2735. by the IPMI over serial channel.
  2736. .RE
  2737. .TP
  2738. \fIactivate\fP [\fIusesolkeepalive\fP | \fInokeepalive\fP] [\fIinstance=<number>\fP]
  2739. .br
  2740. Causes ipmitool to enter Serial Over LAN
  2741. mode, and is only available when using the lanplus
  2742. interface. An RMCP+ connection is made to the BMC,
  2743. the terminal is set to raw mode, and user input is
  2744. sent to the serial console on the remote server.
  2745. On exit, the the SOL payload mode is deactivated and
  2746. the terminal is reset to its original settings.
  2747. If the instance is given, it will activate using the given instance
  2748. number. The default is 1.
  2749. .RS
  2750. Special escape sequences are provided to control the SOL session:
  2751. .RS
  2752. .TP
  2753. \fI~.\fP Terminate connection
  2754. .TP
  2755. \fI~^Z\fP Suspend ipmitool
  2756. .TP
  2757. \fI~^X\fP Suspend ipmitool, but don't restore tty on restart
  2758. .TP
  2759. \fI~B\fP Send break
  2760. .TP
  2761. \fI~~\fP Send the escape character by typing it twice
  2762. .TP
  2763. \fI~?\fP Print the supported escape sequences
  2764. .RE
  2765. Note that escapes are only recognized immediately after newline.
  2766. .RE
  2767. .TP
  2768. \fIdeactivate\fP [\fIinstance=<number>\fP]
  2769. .br
  2770. Deactivates Serial Over LAN mode on the BMC.
  2771. Exiting Serial Over LAN mode should automatically cause
  2772. this command to be sent to the BMC, but in the case of an
  2773. unintentional exit from SOL mode, this command may be
  2774. necessary to reset the state of the BMC.
  2775. If the instance is given, it will deactivate the given instance
  2776. number. The default is 1.
  2777. .RE
  2778. .TP
  2779. \fIspd\fP <\fBi2cbus\fR> <\fBi2caddr\fR> [<\fBchannel\fR>] [<\fmaxread\fR>]
  2780. .br
  2781. This command may be used to read SPD (Serial Presence Detect) data using the
  2782. I2C Master Write\-Read IPMI command.
  2783. .TP
  2784. \fIsunoem\fP
  2785. .RS
  2786. .TP
  2787. \fIcli\fP [<\fBcommand string\fR> ...]
  2788. .br
  2789. Execute the service processor command line interface commands.
  2790. Without any command string, an interactive session is started
  2791. in the service processor command line environment. If a
  2792. command string is specified, the command string is executed
  2793. on the service processor and the connection is closed.
  2794. .TP
  2795. \fIled\fP
  2796. .RS
  2797. These commands provide a way to get and set the status of LEDs
  2798. on a Sun Microsystems server. Use 'sdr list generic' to get a
  2799. list of devices that are controllable LEDs. The \fIledtype\fP
  2800. parameter is optional and not necessary to provide on the command
  2801. line unless it is required by hardware.
  2802. .TP
  2803. \fIget\fP <\fBsensorid\fR> [<\fBledtype\fR>]
  2804. Get status of a particular LED described by a Generic Device Locator
  2805. record in the SDR. A sensorid of \fIall\fP will get the status
  2806. of all available LEDS.
  2807. .TP
  2808. \fIset\fP <\fBsensorid\fR> <\fBledmode\fR> [<\fBledtype\fR>]
  2809. Set status of a particular LED described by a Generic Device Locator
  2810. record in the SDR. A sensorid of \fIall\fP will set the status
  2811. of all available LEDS to the specified \fIledmode\fP and \fIledtype\fP.
  2812. .TP
  2813. LED Mode is required for set operations:
  2814. .br
  2815. \fIOFF\fP Off
  2816. .br
  2817. \fION\fP Steady On
  2818. .br
  2819. \fISTANDBY\fP 100ms on 2900ms off blink rate
  2820. .br
  2821. \fISLOW\fP 1HZ blink rate
  2822. .br
  2823. \fIFAST\fP 4HZ blink rate
  2824. .TP
  2825. LED Type is optional:
  2826. .br
  2827. \fIOK2RM\fP Ok to Remove
  2828. .br
  2829. \fISERVICE\fP Service Required
  2830. .br
  2831. \fIACT\fP Activity
  2832. .br
  2833. \fILOCATE\fP Locate
  2834. .RE
  2835. .TP
  2836. \fInacname\fP <\fBipmi name\fR>
  2837. .br
  2838. Return the full NAC name of a target identified by ipmi name.
  2839. .TP
  2840. \fIping\fP <\fBcount\fR> [<\fBq\fR>]
  2841. .br
  2842. Send and receive count packets. Each packet is 64 bytes.
  2843. q - Quiet. Displays output only at the start and end of the process.
  2844. .TP
  2845. \fIgetval\fP <\fBproperty name\fR>
  2846. .br
  2847. Returns value of specified ILOM property.
  2848. .TP
  2849. \fIsetval\fP <\fBproperty name\fR> <\fBproperty value\fR> [<\fBtimeout\fR>]
  2850. .br
  2851. Sets value of ILOM property. If timeout is not specified, the
  2852. default value is 5 seconds. NOTE: setval must be executed locally on host!
  2853. .TP
  2854. \fIsshkey\fP
  2855. .RS
  2856. .TP
  2857. \fIset\fP <\fBuserid\fR> <\fBkeyfile\fR>
  2858. This command will allow you to specify an SSH key to use for a particular
  2859. user on the Service Processor. This key will be used for CLI logins to
  2860. the SP and not for IPMI sessions. View available users and their userids
  2861. with the 'user list' command.
  2862. .TP
  2863. \fIdel\fP <\fBuserid\fR>
  2864. This command will delete the SSH key for a specified userid.
  2865. .RE
  2866. .TP
  2867. \fIversion\fP
  2868. .br
  2869. Display the version of ILOM firmware.
  2870. .TP
  2871. \fIgetfile\fP <\fBfile identifier\fR> <\fBdestination file name\fR>
  2872. .br
  2873. This command will return various files from service processor and store them
  2874. in specified destination file. Note that some files may not be present or
  2875. be supported by your SP.
  2876. .br
  2877. .RS
  2878. File identifiers:
  2879. .RS
  2880. .br
  2881. \fISSH_PUBKEYS\fP
  2882. .br
  2883. \fIDIAG_PASSED\fP
  2884. .br
  2885. \fIDIAG_FAILED\fP
  2886. .br
  2887. \fIDIAG_END_TIME\fP
  2888. .br
  2889. \fIDIAG_INVENTORY\fP
  2890. .br
  2891. \fIDIAG_TEST_LOG\fP
  2892. .br
  2893. \fIDIAG_START_TIME\fP
  2894. .br
  2895. \fIDIAG_UEFI_LOG\fP
  2896. .br
  2897. \fIDIAG_TEST_LOG\fP
  2898. .br
  2899. \fIDIAG_LAST_LOG\fP
  2900. .br
  2901. \fIDIAG_LAST_CMD\fP
  2902. .RE
  2903. .RE
  2904. .TP
  2905. \fIgetbehavior\fP <\fBfeature identifier\fR>
  2906. .br
  2907. This command will test if various ILOM features are enabled.
  2908. .br
  2909. .RS
  2910. Feature identifiers:
  2911. .RS
  2912. .br
  2913. \fISUPPORTS_SIGNED_PACKAGES\fP
  2914. .br
  2915. \fIREQUIRES_SIGNED_PACKAGES\fP
  2916. .RE
  2917. .RE
  2918. .RE
  2919. .TP
  2920. \fItsol\fP
  2921. .RS
  2922. This command allows Serial-over-LAN sessions to be established with Tyan
  2923. IPMIv1.5 SMDC such as the M3289 or M3290. The default command run with
  2924. no arguments will establish default SOL session back to local IP address.
  2925. Optional arguments may be supplied in any order.
  2926. .TP
  2927. \fI<ipaddr>\fP
  2928. .br
  2929. Send receiver IP address to SMDC which it will use to send serial
  2930. traffic to. By default this detects the local IP address and establishes
  2931. two-way session. Format of ipaddr is XX.XX.XX.XX
  2932. .TP
  2933. \fIport=NUM\fP
  2934. .br
  2935. Configure UDP port to receive serial traffic on. By default this is 6230.
  2936. .TP
  2937. \fIro|rw\fP
  2938. .br
  2939. Confiure SOL session as read-only or read-write. Sessions are read-write
  2940. by default.
  2941. .RE
  2942. .TP
  2943. \fIuser\fP
  2944. .RS
  2945. .TP
  2946. \fIsummary\fP
  2947. .br
  2948. Displays a summary of userid information, including maximum number of userids,
  2949. the number of enabled users, and the number of fixed names defined.
  2950. .TP
  2951. \fIlist\fP
  2952. .br
  2953. Displays a list of user information for all defined userids.
  2954. .TP
  2955. \fIset\fP
  2956. .RS
  2957. .TP
  2958. \fIname\fP <\fBuserid\fR> <\fBusername\fR>
  2959. .br
  2960. Sets the username associated with the given userid.
  2961. .TP
  2962. \fIpassword\fP <\fBuserid\fR> [<\fBpassword\fR>]
  2963. .br
  2964. Sets the password for the given userid. If no password is given,
  2965. the password is cleared (set to the NULL password). Be careful when
  2966. removing passwords from administrator\-level accounts.
  2967. .RE
  2968. .TP
  2969. \fIdisable\fP <\fBuserid\fR>
  2970. .br
  2971. Disables access to the BMC by the given userid.
  2972. .TP
  2973. \fIenable\fP <\fBuserid\fR>
  2974. .br
  2975. Enables access to the BMC by the given userid.
  2976. .TP
  2977. \fIpriv\fP <\fBuserid\fR> <\fBprivilege level\fR> [<\fBchannel number\fR>]
  2978. .br
  2979. Set user privilege level on the specified channel. If the channel is not
  2980. specified, the current channel will be used.
  2981. .TP
  2982. \fItest\fP <\fBuserid\fR> <\fB16\fR|\fB20\fR> [<\fBpassword\fR>]
  2983. .br
  2984. Determine whether a password has been stored as 16 or 20 bytes.
  2985. .RE
  2986. .SH "OPEN INTERFACE"
  2987. The ipmitool \fIopen\fP interface utilizes the OpenIPMI
  2988. kernel device driver. This driver is present in all modern
  2989. 2.4 and all 2.6 kernels and it should be present in recent
  2990. Linux distribution kernels. There are also IPMI driver
  2991. kernel patches for different kernel versions available from
  2992. the OpenIPMI homepage.
  2993. The required kernel modules is different for 2.4 and 2.6
  2994. kernels. The following kernel modules must be loaded on
  2995. a 2.4\-based kernel in order for ipmitool to work:
  2996. .TP
  2997. .B ipmi_msghandler
  2998. Incoming and outgoing message handler for IPMI interfaces.
  2999. .TP
  3000. .B ipmi_kcs_drv
  3001. An IPMI Keyboard Controller Style (KCS) interface driver for the message handler.
  3002. .TP
  3003. .B ipmi_devintf
  3004. Linux character device interface for the message handler.
  3005. .LP
  3006. The following kernel modules must be loaded on
  3007. a 2.6\-based kernel in order for ipmitool to work:
  3008. .TP
  3009. .B ipmi_msghandler
  3010. Incoming and outgoing message handler for IPMI interfaces.
  3011. .TP
  3012. .B ipmi_si
  3013. An IPMI system interface driver for the message handler.
  3014. This module supports various IPMI system interfaces such
  3015. as KCS, BT, SMIC, and even SMBus in 2.6 kernels.
  3016. .TP
  3017. .B ipmi_devintf
  3018. Linux character device interface for the message handler.
  3019. .LP
  3020. Once the required modules are loaded there will be a dynamic
  3021. character device entry that must exist at \fB/dev/ipmi0\fR.
  3022. For systems that use devfs or udev this will appear at
  3023. \fB/dev/ipmi/0\fR.
  3024. To create the device node first determine what dynamic major
  3025. number it was assigned by the kernel by looking in
  3026. \fB/proc/devices\fR and checking for the \fIipmidev\fP
  3027. entry. Usually if this is the first dynamic device it will
  3028. be major number \fB254\fR and the minor number for the first
  3029. system interface is \fB0\fR so you would create the device
  3030. entry with:
  3031. .I mknod /dev/ipmi0 c 254 0
  3032. ipmitool includes some sample initialization scripts that
  3033. can perform this task automatically at start\-up.
  3034. In order to have ipmitool use the OpenIPMI device interface
  3035. you can specify it on the command line:
  3036. .PP
  3037. ipmitool \fB\-I\fR \fIopen\fP <\fIcommand\fP>
  3038. .SH "BMC INTERFACE"
  3039. The ipmitool bmc interface utilizes the \fIbmc\fP device driver as
  3040. provided by Solaris 10 and higher. In order to force ipmitool to make
  3041. use of this interface you can specify it on the command line:
  3042. .PP
  3043. ipmitool \fB\-I\fR \fIbmc\fP <\fIcommand\fP>
  3044. The following files are associated with the bmc driver:
  3045. .TP
  3046. .B /platform/i86pc/kernel/drv/bmc
  3047. 32\-bit \fBELF\fR kernel module for the bmc driver.
  3048. .TP
  3049. .B /platform/i86pc/kernel/drv/amd64/bmc
  3050. 64\-bit \fBELF\fR kernel module for the bmc driver.
  3051. .TP
  3052. .B /dev/bmc
  3053. Character device node used to communicate with the bmc driver.
  3054. .SH "LIPMI INTERFACE"
  3055. The ipmitool \fIlipmi\fP interface uses the Solaris 9 IPMI kernel device driver.
  3056. It has been superceeded by the \fIbmc\fP interface on Solaris 10. You can tell
  3057. ipmitool to use this interface by specifying it on the command line.
  3058. ipmitool \fB\-I\fR \fIlipmi\fP <\fIexpression\fP>
  3059. .SH "LAN INTERFACE"
  3060. The ipmitool \fIlan\fP interface communicates with the BMC
  3061. over an Ethernet LAN connection using UDP under IPv4. UDP
  3062. datagrams are formatted to contain IPMI request/response
  3063. messages with a IPMI session headers and RMCP headers.
  3064. IPMI\-over\-LAN uses version 1 of the Remote Management Control
  3065. Protocol (RMCP) to support pre\-OS and OS\-absent management.
  3066. RMCP is a request\-response protocol delivered using UDP
  3067. datagrams to port 623.
  3068. The LAN interface is an authentication multi\-session connection;
  3069. messages delivered to the BMC can (and should) be authenticated
  3070. with a challenge/response protocol with either straight
  3071. password/key or MD5 message\-digest algorithm. ipmitool will
  3072. attempt to connect with administrator privilege level as this
  3073. is required to perform chassis power functions.
  3074. You can tell ipmitool to use the lan interface with the
  3075. \fB\-I\fR \fIlan\fP option:
  3076. .PP
  3077. ipmitool \fB\-I\fR \fIlan\fP \fB\-H\fR <\fIhostname\fP>
  3078. [\fB\-U\fR <\fIusername\fP>] [\fB\-P\fR <\fIpassword\fP>] <\fIcommand\fP>
  3079. A hostname must be given on the command line in order to use the
  3080. lan interface with ipmitool. The password field is optional;
  3081. if you do not provide a password on the command line, ipmitool
  3082. will attempt to connect without authentication. If you specify a
  3083. password it will use MD5 authentication if supported by the BMC
  3084. and straight password/key otherwise, unless overridden with a
  3085. command line option.
  3086. .SH "LANPLUS INTERFACE"
  3087. Like the \fIlan\fP interface, the \fIlanplus\fP interface
  3088. communicates with the BMC over an Ethernet LAN connection using
  3089. UDP under IPv4. The difference is that the \fIlanplus\fP
  3090. interface uses the RMCP+ protocol as described in the IPMI v2.0
  3091. specification. RMCP+ allows for improved authentication and data
  3092. integrity checks, as well as encryption and the ability to carry
  3093. multiple types of payloads. Generic Serial Over LAN support
  3094. requires RMCP+, so the ipmitool \fIsol activate\fP command
  3095. requires the use of the \fIlanplus\fP interface.
  3096. RMCP+ session establishment uses a symmetric challenge\-response
  3097. protocol called RAKP (\fBRemote Authenticated Key\-Exchange Protocol\fR)
  3098. which allows the negotiation of many options. ipmitool does not
  3099. yet allow the user to specify the value of every option, defaulting
  3100. to the most obvious settings marked as required in the v2.0
  3101. specification. Authentication and integrity HMACS are produced with
  3102. SHA1, and encryption is performed with AES\-CBC\-128. Role\-level logins
  3103. are not yet supported.
  3104. ipmitool must be linked with the \fIOpenSSL\fP library in order to
  3105. perform the encryption functions and support the \fIlanplus\fP
  3106. interface. If the required packages are not found it will not be
  3107. compiled in and supported.
  3108. You can tell ipmitool to use the lanplus interface with the
  3109. \fB\-I\fR \fIlanplus\fP option:
  3110. .PP
  3111. ipmitool \fB\-I\fR \fIlanplus\fP
  3112. \fB\-H\fR <\fIhostname\fP>
  3113. [\fB\-U\fR <\fIusername\fP>]
  3114. [\fB\-P\fR <\fIpassword\fP>]
  3115. <\fIcommand\fP>
  3116. A hostname must be given on the command line in order to use the
  3117. lan interface with ipmitool. With the exception of the \fB\-A\fR and
  3118. \fB\-C\fR options the rest of the command line options are identical to
  3119. those available for the \fIlan\fP interface.
  3120. The \fB\-C\fR option allows you specify the authentication, integrity,
  3121. and encryption algorithms to use for for \fIlanplus\fP session based
  3122. on the cipher suite ID found in the IPMIv2.0 specification in table
  3123. 22\-19. The default cipher suite is \fI3\fP which specifies
  3124. RAKP\-HMAC\-SHA1 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128
  3125. encryption algorightms.
  3126. .SH "FREE INTERFACE"
  3127. .LP
  3128. The ipmitool \fIfree\fP interface utilizes the FreeIPMI libfreeipmi
  3129. drivers.
  3130. .LP
  3131. You can tell ipmitool to use the FreeIPMI interface with the \-I option:
  3132. .PP
  3133. ipmitool \fB\-I\fR \fIfree\fP <\fIcommand\fP>
  3134. .SH "IMB INTERFACE"
  3135. .LP
  3136. The ipmitool \fIimb\fP interface supports the Intel IMB (Intel
  3137. Inter-module Bus) Interface through the /dev/imb device.
  3138. .LP
  3139. You can tell ipmitool to use the IMB interface with the \-I option:
  3140. .PP
  3141. ipmitool \fB\-I\fR \fIimb\fP <\fIcommand\fP>
  3142. .SH "EXAMPLES"
  3143. .TP
  3144. \fIExample 1\fP: Listing remote sensors
  3145. > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sdr list
  3146. .br
  3147. Baseboard 1.25V | 1.24 Volts | ok
  3148. .br
  3149. Baseboard 2.5V | 2.49 Volts | ok
  3150. .br
  3151. Baseboard 3.3V | 3.32 Volts | ok
  3152. .TP
  3153. \fIExample 2\fP: Displaying status of a remote sensor
  3154. > ipmitool \-I lan \-H 1.2.3.4 \-f passfile sensor get "Baseboard 1.25V"
  3155. .br
  3156. Locating sensor record...
  3157. .br
  3158. Sensor ID : Baseboard 1.25V (0x10)
  3159. .br
  3160. Sensor Type (Analog) : Voltage
  3161. .br
  3162. Sensor Reading : 1.245 (+/\- 0.039) Volts
  3163. .br
  3164. Status : ok
  3165. .br
  3166. Lower Non\-Recoverable : na
  3167. .br
  3168. Lower Critical : 1.078
  3169. .br
  3170. Lower Non\-Critical : 1.107
  3171. .br
  3172. Upper Non\-Critical : 1.382
  3173. .br
  3174. Upper Critical : 1.431
  3175. .br
  3176. Upper Non\-Recoverable : na
  3177. .TP
  3178. \fIExample 3\fP: Displaying the power status of a remote chassis
  3179. > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power status
  3180. .br
  3181. Chassis Power is on
  3182. .TP
  3183. \fIExample 4\fP: Controlling the power on a remote chassis
  3184. > ipmitool \-I lan \-H 1.2.3.4 \-f passfile chassis power on
  3185. .br
  3186. Chassis Power Control: Up/On
  3187. .SH "AUTHOR"
  3188. Duncan Laurie <duncan@iceblink.org>
  3189. .SH "SEE ALSO"
  3190. .TP
  3191. IPMItool Homepage
  3192. http://ipmitool.sourceforge.net
  3193. .TP
  3194. Intelligent Platform Management Interface Specification
  3195. http://www.intel.com/design/servers/ipmi
  3196. .TP
  3197. OpenIPMI Homepage
  3198. http://openipmi.sourceforge.net
  3199. .TP
  3200. FreeIPMI Homepage
  3201. http://www.gnu.org/software/freeipmi/