Advertisement
Guest User

Untitled

a guest
Jul 29th, 2012
187
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 89.01 KB | None | 0 0
  1. ipmi-chassis-config --username=admin --password=password --hostname=192.168.1.22 --debug --section=Chassis_Boot_Flags --checkout --driver-type=LAN_2_0
  2.  
  3. 192.168.1.22: =====================================================
  4. 192.168.1.22: IPMI 1.5 Get Channel Authentication Capabilities Request
  5. 192.168.1.22: =====================================================
  6. 192.168.1.22: RMCP Header:
  7. 192.168.1.22: ------------
  8. 192.168.1.22: [ 6h] = version[ 8b]
  9. 192.168.1.22: [ 0h] = reserved[ 8b]
  10. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  11. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  12. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  13. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  14. 192.168.1.22: IPMI Session Header:
  15. 192.168.1.22: --------------------
  16. 192.168.1.22: [ 0h] = authentication_type[ 8b]
  17. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  18. 192.168.1.22: [ 0h] = session_id[32b]
  19. 192.168.1.22: [ 9h] = ipmi_msg_len[ 8b]
  20. 192.168.1.22: IPMI Message Header:
  21. 192.168.1.22: --------------------
  22. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  23. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  24. 192.168.1.22: [ 6h] = net_fn[ 6b]
  25. 192.168.1.22: [ C8h] = checksum1[ 8b]
  26. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  27. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  28. 192.168.1.22: [ 2Fh] = rq_seq[ 6b]
  29. 192.168.1.22: IPMI Command Data:
  30. 192.168.1.22: ------------------
  31. 192.168.1.22: [ 38h] = cmd[ 8b]
  32. 192.168.1.22: [ Eh] = channel_number[ 4b]
  33. 192.168.1.22: [ 0h] = reserved1[ 3b]
  34. 192.168.1.22: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
  35. 192.168.1.22: [ 4h] = maximum_privilege_level[ 4b]
  36. 192.168.1.22: [ 0h] = reserved2[ 4b]
  37. 192.168.1.22: IPMI Trailer:
  38. 192.168.1.22: --------------
  39. 192.168.1.22: [ F9h] = checksum2[ 8b]
  40. 192.168.1.22: =====================================================
  41. 192.168.1.22: IPMI 1.5 Get Channel Authentication Capabilities Response
  42. 192.168.1.22: =====================================================
  43. 192.168.1.22: RMCP Header:
  44. 192.168.1.22: ------------
  45. 192.168.1.22: [ 6h] = version[ 8b]
  46. 192.168.1.22: [ 0h] = reserved[ 8b]
  47. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  48. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  49. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  50. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  51. 192.168.1.22: IPMI Session Header:
  52. 192.168.1.22: --------------------
  53. 192.168.1.22: [ 0h] = authentication_type[ 8b]
  54. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  55. 192.168.1.22: [ 0h] = session_id[32b]
  56. 192.168.1.22: [ 10h] = ipmi_msg_len[ 8b]
  57. 192.168.1.22: IPMI Message Header:
  58. 192.168.1.22: --------------------
  59. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  60. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  61. 192.168.1.22: [ 7h] = net_fn[ 6b]
  62. 192.168.1.22: [ 63h] = checksum1[ 8b]
  63. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  64. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  65. 192.168.1.22: [ 2Fh] = rq_seq[ 6b]
  66. 192.168.1.22: IPMI Command Data:
  67. 192.168.1.22: ------------------
  68. 192.168.1.22: [ 38h] = cmd[ 8b]
  69. 192.168.1.22: [ 0h] = comp_code[ 8b]
  70. 192.168.1.22: [ 2h] = channel_number[ 8b]
  71. 192.168.1.22: [ 0h] = authentication_type.none[ 1b]
  72. 192.168.1.22: [ 0h] = authentication_type.md2[ 1b]
  73. 192.168.1.22: [ 0h] = authentication_type.md5[ 1b]
  74. 192.168.1.22: [ 0h] = authentication_type.reserved1[ 1b]
  75. 192.168.1.22: [ 0h] = authentication_type.straight_password_key[ 1b]
  76. 192.168.1.22: [ 0h] = authentication_type.oem_prop[ 1b]
  77. 192.168.1.22: [ 0h] = authentication_type.reserved2[ 1b]
  78. 192.168.1.22: [ 1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
  79. 192.168.1.22: [ 0h] = authentication_status.anonymous_login[ 1b]
  80. 192.168.1.22: [ 0h] = authentication_status.null_username[ 1b]
  81. 192.168.1.22: [ 1h] = authentication_status.non_null_username[ 1b]
  82. 192.168.1.22: [ 0h] = authentication_status.user_level_authentication[ 1b]
  83. 192.168.1.22: [ 1h] = authentication_status.per_message_authentication[ 1b]
  84. 192.168.1.22: [ 0h] = authentication_status.k_g[ 1b]
  85. 192.168.1.22: [ 0h] = authentication_status.reserved[ 2b]
  86. 192.168.1.22: [ 0h] = channel_supports_ipmi_v1.5_connections[ 1b]
  87. 192.168.1.22: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b]
  88. 192.168.1.22: [ 0h] = reserved[ 6b]
  89. 192.168.1.22: [ 0h] = oem_id[24b]
  90. 192.168.1.22: [ 0h] = oem_auxiliary_data[ 8b]
  91. 192.168.1.22: IPMI Trailer:
  92. 192.168.1.22: --------------
  93. 192.168.1.22: [ 54h] = checksum2[ 8b]
  94. 192.168.1.22: =====================================================
  95. 192.168.1.22: IPMI 2.0 Open Session Request
  96. 192.168.1.22: =====================================================
  97. 192.168.1.22: RMCP Header:
  98. 192.168.1.22: ------------
  99. 192.168.1.22: [ 6h] = version[ 8b]
  100. 192.168.1.22: [ 0h] = reserved[ 8b]
  101. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  102. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  103. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  104. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  105. 192.168.1.22: IPMI RMCPPLUS Session Header:
  106. 192.168.1.22: -----------------------------
  107. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  108. 192.168.1.22: [ 0h] = reserved1[ 4b]
  109. 192.168.1.22: [ 10h] = payload_type[ 6b]
  110. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  111. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  112. 192.168.1.22: [ 0h] = session_id[32b]
  113. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  114. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  115. 192.168.1.22: IPMI RMCPPLUS Payload:
  116. 192.168.1.22: ----------------------
  117. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[32B]
  118. 192.168.1.22: [ 03h 00h 00h 00h 28h 3Eh 4Ah 90h ]
  119. 192.168.1.22: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
  120. 192.168.1.22: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
  121. 192.168.1.22: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
  122. 192.168.1.22: IPMI Command Data:
  123. 192.168.1.22: ------------------
  124. 192.168.1.22: [ 3h] = message_tag[ 8b]
  125. 192.168.1.22: [ 0h] = requested_maximum_privilege_level[ 4b]
  126. 192.168.1.22: [ 0h] = reserved1[ 4b]
  127. 192.168.1.22: [ 0h] = reserved2[16b]
  128. 192.168.1.22: [ 904A3E28h] = remote_console_session_id[32b]
  129. 192.168.1.22: [ 0h] = authentication_payload.payload_type[ 8b]
  130. 192.168.1.22: [ 0h] = reserved3[16b]
  131. 192.168.1.22: [ 8h] = authentication_payload.payload_length[ 8b]
  132. 192.168.1.22: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  133. 192.168.1.22: [ 0h] = reserved4[ 2b]
  134. 192.168.1.22: [ 0h] = reserved5[24b]
  135. 192.168.1.22: [ 1h] = integrity_payload.payload_type[ 8b]
  136. 192.168.1.22: [ 0h] = reserved6[16b]
  137. 192.168.1.22: [ 8h] = integrity_payload.payload_length[ 8b]
  138. 192.168.1.22: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  139. 192.168.1.22: [ 0h] = reserved7[ 2b]
  140. 192.168.1.22: [ 0h] = reserved8[24b]
  141. 192.168.1.22: [ 2h] = confidentiality_payload.payload_type[ 8b]
  142. 192.168.1.22: [ 0h] = reserved9[16b]
  143. 192.168.1.22: [ 8h] = confidentiality_payload.payload_length[ 8b]
  144. 192.168.1.22: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  145. 192.168.1.22: [ 0h] = reserved10[ 2b]
  146. 192.168.1.22: [ 0h] = reserved11[24b]
  147. 192.168.1.22: =====================================================
  148. 192.168.1.22: IPMI 2.0 Open Session Response
  149. 192.168.1.22: =====================================================
  150. 192.168.1.22: RMCP Header:
  151. 192.168.1.22: ------------
  152. 192.168.1.22: [ 6h] = version[ 8b]
  153. 192.168.1.22: [ 0h] = reserved[ 8b]
  154. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  155. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  156. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  157. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  158. 192.168.1.22: IPMI RMCPPLUS Session Header:
  159. 192.168.1.22: -----------------------------
  160. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  161. 192.168.1.22: [ 0h] = reserved1[ 4b]
  162. 192.168.1.22: [ 11h] = payload_type[ 6b]
  163. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  164. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  165. 192.168.1.22: [ 0h] = session_id[32b]
  166. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  167. 192.168.1.22: [ 24h] = ipmi_payload_len[16b]
  168. 192.168.1.22: IPMI RMCPPLUS Payload:
  169. 192.168.1.22: ----------------------
  170. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[36B]
  171. 192.168.1.22: [ 03h 00h 04h 00h 28h 3Eh 4Ah 90h ]
  172. 192.168.1.22: [ 54h 35h 86h 00h 00h 00h 00h 08h ]
  173. 192.168.1.22: [ 01h 00h 00h 00h 01h 00h 00h 08h ]
  174. 192.168.1.22: [ 01h 00h 00h 00h 02h 00h 00h 08h ]
  175. 192.168.1.22: [ 01h 00h 00h 00h ]
  176. 192.168.1.22: IPMI Command Data:
  177. 192.168.1.22: ------------------
  178. 192.168.1.22: [ 3h] = message_tag[ 8b]
  179. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  180. 192.168.1.22: [ 4h] = maximum_privilege_level[ 4b]
  181. 192.168.1.22: [ 0h] = reserved1[ 4b]
  182. 192.168.1.22: [ 0h] = reserved2[ 8b]
  183. 192.168.1.22: [ 904A3E28h] = remote_console_session_id[32b]
  184. 192.168.1.22: [ 863554h] = managed_system_session_id[32b]
  185. 192.168.1.22: [ 0h] = authentication_payload.payload_type[ 8b]
  186. 192.168.1.22: [ 0h] = reserved3[16b]
  187. 192.168.1.22: [ 8h] = authentication_payload.payload_length[ 8b]
  188. 192.168.1.22: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  189. 192.168.1.22: [ 0h] = reserved4[ 2b]
  190. 192.168.1.22: [ 0h] = reserved5[24b]
  191. 192.168.1.22: [ 1h] = integrity_payload.payload_type[ 8b]
  192. 192.168.1.22: [ 0h] = reserved6[16b]
  193. 192.168.1.22: [ 8h] = integrity_payload.payload_length[ 8b]
  194. 192.168.1.22: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  195. 192.168.1.22: [ 0h] = reserved7[ 2b]
  196. 192.168.1.22: [ 0h] = reserved8[24b]
  197. 192.168.1.22: [ 2h] = confidentiality_payload.payload_type[ 8b]
  198. 192.168.1.22: [ 0h] = reserved9[16b]
  199. 192.168.1.22: [ 8h] = confidentiality_payload.payload_length[ 8b]
  200. 192.168.1.22: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  201. 192.168.1.22: [ 0h] = reserved10[ 2b]
  202. 192.168.1.22: [ 0h] = reserved11[24b]
  203. 192.168.1.22: =====================================================
  204. 192.168.1.22: IPMI 2.0 RAKP Message 1 Request
  205. 192.168.1.22: =====================================================
  206. 192.168.1.22: RMCP Header:
  207. 192.168.1.22: ------------
  208. 192.168.1.22: [ 6h] = version[ 8b]
  209. 192.168.1.22: [ 0h] = reserved[ 8b]
  210. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  211. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  212. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  213. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  214. 192.168.1.22: IPMI RMCPPLUS Session Header:
  215. 192.168.1.22: -----------------------------
  216. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  217. 192.168.1.22: [ 0h] = reserved1[ 4b]
  218. 192.168.1.22: [ 12h] = payload_type[ 6b]
  219. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  220. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  221. 192.168.1.22: [ 0h] = session_id[32b]
  222. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  223. 192.168.1.22: [ 21h] = ipmi_payload_len[16b]
  224. 192.168.1.22: IPMI RMCPPLUS Payload:
  225. 192.168.1.22: ----------------------
  226. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[33B]
  227. 192.168.1.22: [ 04h 00h 00h 00h 54h 35h 86h 00h ]
  228. 192.168.1.22: [ D9h F5h B8h ABh 9Eh E8h ADh FCh ]
  229. 192.168.1.22: [ CBh 32h B4h 12h BBh 5Ah DFh FEh ]
  230. 192.168.1.22: [ 14h 00h 00h 05h 61h 64h 6Dh 69h ]
  231. 192.168.1.22: [ 6Eh ]
  232. 192.168.1.22: IPMI Command Data:
  233. 192.168.1.22: ------------------
  234. 192.168.1.22: [ 4h] = message_tag[ 8b]
  235. 192.168.1.22: [ 0h] = reserved1[24b]
  236. 192.168.1.22: [ 863554h] = managed_system_session_id[32b]
  237. 192.168.1.22: [ BYTE ARRAY ... ] = remote_console_random_number[16B]
  238. 192.168.1.22: [ D9h F5h B8h ABh 9Eh E8h ADh FCh ]
  239. 192.168.1.22: [ CBh 32h B4h 12h BBh 5Ah DFh FEh ]
  240. 192.168.1.22: [ 4h] = requested_maximum_privilege_level[ 4b]
  241. 192.168.1.22: [ 1h] = name_only_lookup[ 1b]
  242. 192.168.1.22: [ 0h] = reserved2[ 3b]
  243. 192.168.1.22: [ 0h] = reserved3[16b]
  244. 192.168.1.22: [ 5h] = user_name_length[ 8b]
  245. 192.168.1.22: [ BYTE ARRAY ... ] = user_name[ 5B]
  246. 192.168.1.22: [ 61h 64h 6Dh 69h 6Eh ]
  247. 192.168.1.22: =====================================================
  248. 192.168.1.22: IPMI 2.0 RAKP Message 2 Response
  249. 192.168.1.22: =====================================================
  250. 192.168.1.22: RMCP Header:
  251. 192.168.1.22: ------------
  252. 192.168.1.22: [ 6h] = version[ 8b]
  253. 192.168.1.22: [ 0h] = reserved[ 8b]
  254. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  255. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  256. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  257. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  258. 192.168.1.22: IPMI RMCPPLUS Session Header:
  259. 192.168.1.22: -----------------------------
  260. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  261. 192.168.1.22: [ 0h] = reserved1[ 4b]
  262. 192.168.1.22: [ 13h] = payload_type[ 6b]
  263. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  264. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  265. 192.168.1.22: [ 0h] = session_id[32b]
  266. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  267. 192.168.1.22: [ 3Ch] = ipmi_payload_len[16b]
  268. 192.168.1.22: IPMI RMCPPLUS Payload:
  269. 192.168.1.22: ----------------------
  270. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[60B]
  271. 192.168.1.22: [ 04h 00h 00h 00h 28h 3Eh 4Ah 90h ]
  272. 192.168.1.22: [ 4Dh 2Ch 3Ah 0Fh CEh 66h 00h 31h ]
  273. 192.168.1.22: [ 4Ah 39h A1h 2Ah 2Eh 47h 53h 3Ch ]
  274. 192.168.1.22: [ 34h 33h 30h 30h 32h 37h 32h 55h ]
  275. 192.168.1.22: [ 58h 36h 34h 32h 30h 31h 55h 32h ]
  276. 192.168.1.22: [ D6h 4Ch 6Ch A1h 48h DDh D4h 58h ]
  277. 192.168.1.22: [ 4Fh C5h 19h 9Ah 8Ah 93h 68h BFh ]
  278. 192.168.1.22: [ CAh 84h DFh F7h ]
  279. 192.168.1.22: IPMI Command Data:
  280. 192.168.1.22: ------------------
  281. 192.168.1.22: [ 4h] = message_tag[ 8b]
  282. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  283. 192.168.1.22: [ 0h] = reserved1[16b]
  284. 192.168.1.22: [ 904A3E28h] = remote_console_session_id[32b]
  285. 192.168.1.22: [ BYTE ARRAY ... ] = managed_system_random_number[16B]
  286. 192.168.1.22: [ 4Dh 2Ch 3Ah 0Fh CEh 66h 00h 31h ]
  287. 192.168.1.22: [ 4Ah 39h A1h 2Ah 2Eh 47h 53h 3Ch ]
  288. 192.168.1.22: [ BYTE ARRAY ... ] = managed_system_guid[16B]
  289. 192.168.1.22: [ 34h 33h 30h 30h 32h 37h 32h 55h ]
  290. 192.168.1.22: [ 58h 36h 34h 32h 30h 31h 55h 32h ]
  291. 192.168.1.22: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  292. 192.168.1.22: [ D6h 4Ch 6Ch A1h 48h DDh D4h 58h ]
  293. 192.168.1.22: [ 4Fh C5h 19h 9Ah 8Ah 93h 68h BFh ]
  294. 192.168.1.22: [ CAh 84h DFh F7h ]
  295. 192.168.1.22: =====================================================
  296. 192.168.1.22: IPMI 2.0 RAKP Message 3 Request
  297. 192.168.1.22: =====================================================
  298. 192.168.1.22: RMCP Header:
  299. 192.168.1.22: ------------
  300. 192.168.1.22: [ 6h] = version[ 8b]
  301. 192.168.1.22: [ 0h] = reserved[ 8b]
  302. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  303. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  304. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  305. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  306. 192.168.1.22: IPMI RMCPPLUS Session Header:
  307. 192.168.1.22: -----------------------------
  308. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  309. 192.168.1.22: [ 0h] = reserved1[ 4b]
  310. 192.168.1.22: [ 14h] = payload_type[ 6b]
  311. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  312. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  313. 192.168.1.22: [ 0h] = session_id[32b]
  314. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  315. 192.168.1.22: [ 1Ch] = ipmi_payload_len[16b]
  316. 192.168.1.22: IPMI RMCPPLUS Payload:
  317. 192.168.1.22: ----------------------
  318. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[28B]
  319. 192.168.1.22: [ 05h 00h 00h 00h 54h 35h 86h 00h ]
  320. 192.168.1.22: [ F5h F6h 0Bh 66h 75h 8Ah 50h FDh ]
  321. 192.168.1.22: [ 60h ADh BEh 6Ah 82h CEh 96h 8Bh ]
  322. 192.168.1.22: [ 13h 21h 0Dh E5h ]
  323. 192.168.1.22: IPMI Command Data:
  324. 192.168.1.22: ------------------
  325. 192.168.1.22: [ 5h] = message_tag[ 8b]
  326. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  327. 192.168.1.22: [ 0h] = reserved1[16b]
  328. 192.168.1.22: [ 863554h] = managed_system_session_id[32b]
  329. 192.168.1.22: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  330. 192.168.1.22: [ F5h F6h 0Bh 66h 75h 8Ah 50h FDh ]
  331. 192.168.1.22: [ 60h ADh BEh 6Ah 82h CEh 96h 8Bh ]
  332. 192.168.1.22: [ 13h 21h 0Dh E5h ]
  333. 192.168.1.22: =====================================================
  334. 192.168.1.22: IPMI 2.0 RAKP Message 4 Response
  335. 192.168.1.22: =====================================================
  336. 192.168.1.22: RMCP Header:
  337. 192.168.1.22: ------------
  338. 192.168.1.22: [ 6h] = version[ 8b]
  339. 192.168.1.22: [ 0h] = reserved[ 8b]
  340. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  341. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  342. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  343. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  344. 192.168.1.22: IPMI RMCPPLUS Session Header:
  345. 192.168.1.22: -----------------------------
  346. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  347. 192.168.1.22: [ 0h] = reserved1[ 4b]
  348. 192.168.1.22: [ 15h] = payload_type[ 6b]
  349. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  350. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  351. 192.168.1.22: [ 0h] = session_id[32b]
  352. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  353. 192.168.1.22: [ 14h] = ipmi_payload_len[16b]
  354. 192.168.1.22: IPMI RMCPPLUS Payload:
  355. 192.168.1.22: ----------------------
  356. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[20B]
  357. 192.168.1.22: [ 05h 00h 00h 00h 28h 3Eh 4Ah 90h ]
  358. 192.168.1.22: [ 6Ch E8h 4Ch 38h 1Eh C9h E1h 9Eh ]
  359. 192.168.1.22: [ 03h B7h BBh 2Dh ]
  360. 192.168.1.22: IPMI Command Data:
  361. 192.168.1.22: ------------------
  362. 192.168.1.22: [ 5h] = message_tag[ 8b]
  363. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  364. 192.168.1.22: [ 0h] = reserved1[16b]
  365. 192.168.1.22: [ 904A3E28h] = remote_console_session_id[32b]
  366. 192.168.1.22: [ BYTE ARRAY ... ] = integrity_check_value[12B]
  367. 192.168.1.22: [ 6Ch E8h 4Ch 38h 1Eh C9h E1h 9Eh ]
  368. 192.168.1.22: [ 03h B7h BBh 2Dh ]
  369. 192.168.1.22: =====================================================
  370. 192.168.1.22: IPMI 2.0 Set Session Privilege Level Request
  371. 192.168.1.22: =====================================================
  372. 192.168.1.22: RMCP Header:
  373. 192.168.1.22: ------------
  374. 192.168.1.22: [ 6h] = version[ 8b]
  375. 192.168.1.22: [ 0h] = reserved[ 8b]
  376. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  377. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  378. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  379. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  380. 192.168.1.22: IPMI RMCPPLUS Session Header:
  381. 192.168.1.22: -----------------------------
  382. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  383. 192.168.1.22: [ 0h] = reserved1[ 4b]
  384. 192.168.1.22: [ 0h] = payload_type[ 6b]
  385. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  386. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  387. 192.168.1.22: [ 863554h] = session_id[32b]
  388. 192.168.1.22: [ 1h] = session_sequence_number[32b]
  389. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  390. 192.168.1.22: IPMI RMCPPLUS Payload:
  391. 192.168.1.22: ----------------------
  392. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  393. 192.168.1.22: [ 8Ah 23h 5Ah 89h E1h 8Dh B2h 68h ]
  394. 192.168.1.22: [ CBh A5h CFh B1h F6h DFh B2h 9Ch ]
  395. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[ 8B]
  396. 192.168.1.22: [ 20h 18h C8h 81h C0h 3Bh 04h 80h ]
  397. 192.168.1.22: [ 707060504030201h] = confidentiality_trailer[64b]
  398. 192.168.1.22: IPMI Message Header:
  399. 192.168.1.22: --------------------
  400. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  401. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  402. 192.168.1.22: [ 6h] = net_fn[ 6b]
  403. 192.168.1.22: [ C8h] = checksum1[ 8b]
  404. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  405. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  406. 192.168.1.22: [ 30h] = rq_seq[ 6b]
  407. 192.168.1.22: IPMI Command Data:
  408. 192.168.1.22: ------------------
  409. 192.168.1.22: [ 3Bh] = cmd[ 8b]
  410. 192.168.1.22: [ 4h] = privilege_level[ 4b]
  411. 192.168.1.22: [ 0h] = reserved1[ 4b]
  412. 192.168.1.22: IPMI Trailer:
  413. 192.168.1.22: -------------
  414. 192.168.1.22: [ 80h] = checksum2[ 8b]
  415. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  416. 192.168.1.22: ------------------------------
  417. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  418. 192.168.1.22: [ 2h] = pad_length[ 8b]
  419. 192.168.1.22: [ 7h] = next_header[ 8b]
  420. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  421. 192.168.1.22: [ DFh 66h 51h 7Fh B1h DAh 9Fh CFh ]
  422. 192.168.1.22: [ 7Eh F6h FFh F8h ]
  423. 192.168.1.22: =====================================================
  424. 192.168.1.22: IPMI 2.0 Set Session Privilege Level Response
  425. 192.168.1.22: =====================================================
  426. 192.168.1.22: RMCP Header:
  427. 192.168.1.22: ------------
  428. 192.168.1.22: [ 6h] = version[ 8b]
  429. 192.168.1.22: [ 0h] = reserved[ 8b]
  430. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  431. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  432. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  433. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  434. 192.168.1.22: IPMI RMCPPLUS Session Header:
  435. 192.168.1.22: -----------------------------
  436. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  437. 192.168.1.22: [ 0h] = reserved1[ 4b]
  438. 192.168.1.22: [ 0h] = payload_type[ 6b]
  439. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  440. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  441. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  442. 192.168.1.22: [ 1h] = session_sequence_number[32b]
  443. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  444. 192.168.1.22: IPMI RMCPPLUS Payload:
  445. 192.168.1.22: ----------------------
  446. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  447. 192.168.1.22: [ 76h BEh 41h 10h 3Ch D3h 3Ah 21h ]
  448. 192.168.1.22: [ 7Dh AFh 38h D9h 54h 29h CBh 28h ]
  449. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[ 9B]
  450. 192.168.1.22: [ 81h 1Ch 63h 20h C0h 3Bh 00h 04h ]
  451. 192.168.1.22: [ E1h ]
  452. 192.168.1.22: [ 6060504030201h] = confidentiality_trailer[56b]
  453. 192.168.1.22: IPMI Message Header:
  454. 192.168.1.22: --------------------
  455. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  456. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  457. 192.168.1.22: [ 7h] = net_fn[ 6b]
  458. 192.168.1.22: [ 63h] = checksum1[ 8b]
  459. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  460. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  461. 192.168.1.22: [ 30h] = rq_seq[ 6b]
  462. 192.168.1.22: IPMI Command Data:
  463. 192.168.1.22: ------------------
  464. 192.168.1.22: [ 3Bh] = cmd[ 8b]
  465. 192.168.1.22: [ 0h] = comp_code[ 8b]
  466. 192.168.1.22: [ 4h] = privilege_level[ 4b]
  467. 192.168.1.22: [ 0h] = reserved1[ 4b]
  468. 192.168.1.22: IPMI Trailer:
  469. 192.168.1.22: -------------
  470. 192.168.1.22: [ E1h] = checksum2[ 8b]
  471. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  472. 192.168.1.22: ------------------------------
  473. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  474. 192.168.1.22: [ 2h] = pad_length[ 8b]
  475. 192.168.1.22: [ 7h] = next_header[ 8b]
  476. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  477. 192.168.1.22: [ 0Ch E2h D7h 68h 45h F2h CCh 56h ]
  478. 192.168.1.22: [ 99h 0Ch 76h 5Bh ]
  479. #
  480. # Section Chassis_Boot_Flags Comments
  481. #
  482. # The following configuration options are for configuring chassis boot behavior.
  483. # Please note that some fields may apply to all future boots while some may only
  484. # apply to the next system boot.
  485. #
  486. # "Boot_Flags_Persistent" determines if flags apply to the next boot only or all
  487. # future boots.
  488. #
  489. # "Boot_Device" allows the user to configure which device the BIOS should boot
  490. # off of. Most users may wish to select NO-OVERRIDE to select the configuration
  491. # currently determined by the BIOS. Note that the configuration value BIOS-SETUP
  492. # refers to booting *into* the BIOS Setup, not from it. FLOPPY may refer to any
  493. # type of removeable media. "Device_Instance_Selector" may be be used to select
  494. # a specific device instance for booting.
  495. #
  496. Section Chassis_Boot_Flags
  497. 192.168.1.22: =====================================================
  498. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  499. 192.168.1.22: =====================================================
  500. 192.168.1.22: RMCP Header:
  501. 192.168.1.22: ------------
  502. 192.168.1.22: [ 6h] = version[ 8b]
  503. 192.168.1.22: [ 0h] = reserved[ 8b]
  504. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  505. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  506. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  507. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  508. 192.168.1.22: IPMI RMCPPLUS Session Header:
  509. 192.168.1.22: -----------------------------
  510. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  511. 192.168.1.22: [ 0h] = reserved1[ 4b]
  512. 192.168.1.22: [ 0h] = payload_type[ 6b]
  513. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  514. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  515. 192.168.1.22: [ 863554h] = session_id[32b]
  516. 192.168.1.22: [ 2h] = session_sequence_number[32b]
  517. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  518. 192.168.1.22: IPMI RMCPPLUS Payload:
  519. 192.168.1.22: ----------------------
  520. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  521. 192.168.1.22: [ DFh 21h 45h 96h F2h 44h C5h DCh ]
  522. 192.168.1.22: [ 70h B8h 45h 1Fh 79h 85h 81h D1h ]
  523. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  524. 192.168.1.22: [ 20h 00h E0h 81h C4h 09h 05h 00h ]
  525. 192.168.1.22: [ 00h ADh ]
  526. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  527. 192.168.1.22: IPMI Message Header:
  528. 192.168.1.22: --------------------
  529. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  530. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  531. 192.168.1.22: [ 0h] = net_fn[ 6b]
  532. 192.168.1.22: [ E0h] = checksum1[ 8b]
  533. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  534. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  535. 192.168.1.22: [ 31h] = rq_seq[ 6b]
  536. 192.168.1.22: IPMI Command Data:
  537. 192.168.1.22: ------------------
  538. 192.168.1.22: [ 9h] = cmd[ 8b]
  539. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  540. 192.168.1.22: [ 0h] = reserved[ 1b]
  541. 192.168.1.22: [ 0h] = set_selector[ 8b]
  542. 192.168.1.22: [ 0h] = block_selector[ 8b]
  543. 192.168.1.22: IPMI Trailer:
  544. 192.168.1.22: -------------
  545. 192.168.1.22: [ ADh] = checksum2[ 8b]
  546. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  547. 192.168.1.22: ------------------------------
  548. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  549. 192.168.1.22: [ 2h] = pad_length[ 8b]
  550. 192.168.1.22: [ 7h] = next_header[ 8b]
  551. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  552. 192.168.1.22: [ 0Ah ACh 42h 0Dh 79h 76h 75h 1Bh ]
  553. 192.168.1.22: [ 88h 69h C1h 8Bh ]
  554. 192.168.1.22: =====================================================
  555. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  556. 192.168.1.22: =====================================================
  557. 192.168.1.22: RMCP Header:
  558. 192.168.1.22: ------------
  559. 192.168.1.22: [ 6h] = version[ 8b]
  560. 192.168.1.22: [ 0h] = reserved[ 8b]
  561. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  562. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  563. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  564. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  565. 192.168.1.22: IPMI RMCPPLUS Session Header:
  566. 192.168.1.22: -----------------------------
  567. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  568. 192.168.1.22: [ 0h] = reserved1[ 4b]
  569. 192.168.1.22: [ 0h] = payload_type[ 6b]
  570. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  571. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  572. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  573. 192.168.1.22: [ 2h] = session_sequence_number[32b]
  574. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  575. 192.168.1.22: IPMI RMCPPLUS Payload:
  576. 192.168.1.22: ----------------------
  577. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  578. 192.168.1.22: [ 67h 99h B5h 54h C2h F6h B0h 65h ]
  579. 192.168.1.22: [ 4Dh DDh 09h ECh 19h B3h B2h 0Fh ]
  580. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  581. 192.168.1.22: [ 81h 04h 7Bh 20h C4h 09h 00h 01h ]
  582. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  583. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  584. 192.168.1.22: [ 00h 00h 0Dh ]
  585. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  586. 192.168.1.22: IPMI Message Header:
  587. 192.168.1.22: --------------------
  588. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  589. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  590. 192.168.1.22: [ 1h] = net_fn[ 6b]
  591. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  592. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  593. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  594. 192.168.1.22: [ 31h] = rq_seq[ 6b]
  595. 192.168.1.22: IPMI Command Data:
  596. 192.168.1.22: ------------------
  597. 192.168.1.22: [ 9h] = cmd[ 8b]
  598. 192.168.1.22: [ 0h] = comp_code[ 8b]
  599. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  600. 192.168.1.22: [ 0h] = reserved[ 4b]
  601. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  602. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  603. 192.168.1.22: [ 0h] = reserved1[ 5b]
  604. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  605. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  606. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  607. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  608. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  609. 192.168.1.22: [ 0h] = boot_device[ 4b]
  610. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  611. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  612. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  613. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  614. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  615. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  616. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  617. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  618. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  619. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  620. 192.168.1.22: [ 0h] = reserved2[ 4b]
  621. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  622. 192.168.1.22: [ 0h] = reserved3[ 3b]
  623. 192.168.1.22: IPMI Trailer:
  624. 192.168.1.22: -------------
  625. 192.168.1.22: [ 0h] = checksum2[ 8b]
  626. 192.168.1.22: Payload Unexpected Data:
  627. 192.168.1.22: ------------------------
  628. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  629. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  630. 192.168.1.22: [ 00h 00h 00h 0Dh ]
  631. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  632. 192.168.1.22: ------------------------------
  633. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  634. 192.168.1.22: [ 2h] = pad_length[ 8b]
  635. 192.168.1.22: [ 7h] = next_header[ 8b]
  636. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  637. 192.168.1.22: [ 92h 24h BDh 77h 4Bh 3Bh 49h 50h ]
  638. 192.168.1.22: [ 52h AFh 0Ah 5Dh ]
  639. 192.168.1.22: =====================================================
  640. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  641. 192.168.1.22: =====================================================
  642. 192.168.1.22: RMCP Header:
  643. 192.168.1.22: ------------
  644. 192.168.1.22: [ 6h] = version[ 8b]
  645. 192.168.1.22: [ 0h] = reserved[ 8b]
  646. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  647. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  648. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  649. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  650. 192.168.1.22: IPMI RMCPPLUS Session Header:
  651. 192.168.1.22: -----------------------------
  652. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  653. 192.168.1.22: [ 0h] = reserved1[ 4b]
  654. 192.168.1.22: [ 0h] = payload_type[ 6b]
  655. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  656. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  657. 192.168.1.22: [ 863554h] = session_id[32b]
  658. 192.168.1.22: [ 3h] = session_sequence_number[32b]
  659. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  660. 192.168.1.22: IPMI RMCPPLUS Payload:
  661. 192.168.1.22: ----------------------
  662. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  663. 192.168.1.22: [ DBh 1Eh C1h 90h 0Ah 71h ECh 12h ]
  664. 192.168.1.22: [ BFh B9h E6h 6Eh 2Ch 23h 86h 25h ]
  665. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  666. 192.168.1.22: [ 20h 00h E0h 81h C8h 09h 05h 00h ]
  667. 192.168.1.22: [ 00h A9h ]
  668. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  669. 192.168.1.22: IPMI Message Header:
  670. 192.168.1.22: --------------------
  671. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  672. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  673. 192.168.1.22: [ 0h] = net_fn[ 6b]
  674. 192.168.1.22: [ E0h] = checksum1[ 8b]
  675. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  676. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  677. 192.168.1.22: [ 32h] = rq_seq[ 6b]
  678. 192.168.1.22: IPMI Command Data:
  679. 192.168.1.22: ------------------
  680. 192.168.1.22: [ 9h] = cmd[ 8b]
  681. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  682. 192.168.1.22: [ 0h] = reserved[ 1b]
  683. 192.168.1.22: [ 0h] = set_selector[ 8b]
  684. 192.168.1.22: [ 0h] = block_selector[ 8b]
  685. 192.168.1.22: IPMI Trailer:
  686. 192.168.1.22: -------------
  687. 192.168.1.22: [ A9h] = checksum2[ 8b]
  688. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  689. 192.168.1.22: ------------------------------
  690. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  691. 192.168.1.22: [ 2h] = pad_length[ 8b]
  692. 192.168.1.22: [ 7h] = next_header[ 8b]
  693. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  694. 192.168.1.22: [ FEh FBh 51h DFh CCh E8h C3h C5h ]
  695. 192.168.1.22: [ 97h 0Fh 24h E5h ]
  696. 192.168.1.22: =====================================================
  697. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  698. 192.168.1.22: =====================================================
  699. 192.168.1.22: RMCP Header:
  700. 192.168.1.22: ------------
  701. 192.168.1.22: [ 6h] = version[ 8b]
  702. 192.168.1.22: [ 0h] = reserved[ 8b]
  703. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  704. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  705. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  706. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  707. 192.168.1.22: IPMI RMCPPLUS Session Header:
  708. 192.168.1.22: -----------------------------
  709. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  710. 192.168.1.22: [ 0h] = reserved1[ 4b]
  711. 192.168.1.22: [ 0h] = payload_type[ 6b]
  712. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  713. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  714. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  715. 192.168.1.22: [ 3h] = session_sequence_number[32b]
  716. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  717. 192.168.1.22: IPMI RMCPPLUS Payload:
  718. 192.168.1.22: ----------------------
  719. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  720. 192.168.1.22: [ D4h 62h D5h FBh CAh 6Bh 69h 9Dh ]
  721. 192.168.1.22: [ 7Bh 85h ABh 74h FFh 1Ah 48h EEh ]
  722. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  723. 192.168.1.22: [ 81h 04h 7Bh 20h C8h 09h 00h 01h ]
  724. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  725. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  726. 192.168.1.22: [ 00h 00h 09h ]
  727. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  728. 192.168.1.22: IPMI Message Header:
  729. 192.168.1.22: --------------------
  730. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  731. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  732. 192.168.1.22: [ 1h] = net_fn[ 6b]
  733. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  734. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  735. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  736. 192.168.1.22: [ 32h] = rq_seq[ 6b]
  737. 192.168.1.22: IPMI Command Data:
  738. 192.168.1.22: ------------------
  739. 192.168.1.22: [ 9h] = cmd[ 8b]
  740. 192.168.1.22: [ 0h] = comp_code[ 8b]
  741. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  742. 192.168.1.22: [ 0h] = reserved[ 4b]
  743. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  744. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  745. 192.168.1.22: [ 0h] = reserved1[ 5b]
  746. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  747. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  748. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  749. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  750. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  751. 192.168.1.22: [ 0h] = boot_device[ 4b]
  752. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  753. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  754. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  755. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  756. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  757. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  758. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  759. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  760. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  761. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  762. 192.168.1.22: [ 0h] = reserved2[ 4b]
  763. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  764. 192.168.1.22: [ 0h] = reserved3[ 3b]
  765. 192.168.1.22: IPMI Trailer:
  766. 192.168.1.22: -------------
  767. 192.168.1.22: [ 0h] = checksum2[ 8b]
  768. 192.168.1.22: Payload Unexpected Data:
  769. 192.168.1.22: ------------------------
  770. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  771. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  772. 192.168.1.22: [ 00h 00h 00h 09h ]
  773. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  774. 192.168.1.22: ------------------------------
  775. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  776. 192.168.1.22: [ 2h] = pad_length[ 8b]
  777. 192.168.1.22: [ 7h] = next_header[ 8b]
  778. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  779. 192.168.1.22: [ BDh 2Ch 9Dh F2h 85h 2Ch D7h E7h ]
  780. 192.168.1.22: [ 12h 17h 77h 73h ]
  781. 192.168.1.22: =====================================================
  782. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  783. 192.168.1.22: =====================================================
  784. 192.168.1.22: RMCP Header:
  785. 192.168.1.22: ------------
  786. 192.168.1.22: [ 6h] = version[ 8b]
  787. 192.168.1.22: [ 0h] = reserved[ 8b]
  788. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  789. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  790. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  791. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  792. 192.168.1.22: IPMI RMCPPLUS Session Header:
  793. 192.168.1.22: -----------------------------
  794. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  795. 192.168.1.22: [ 0h] = reserved1[ 4b]
  796. 192.168.1.22: [ 0h] = payload_type[ 6b]
  797. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  798. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  799. 192.168.1.22: [ 863554h] = session_id[32b]
  800. 192.168.1.22: [ 4h] = session_sequence_number[32b]
  801. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  802. 192.168.1.22: IPMI RMCPPLUS Payload:
  803. 192.168.1.22: ----------------------
  804. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  805. 192.168.1.22: [ C8h A9h A3h 49h 84h 1Fh D0h 66h ]
  806. 192.168.1.22: [ 47h E2h 87h 79h A0h 55h C3h 7Fh ]
  807. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  808. 192.168.1.22: [ 20h 00h E0h 81h CCh 09h 05h 00h ]
  809. 192.168.1.22: [ 00h A5h ]
  810. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  811. 192.168.1.22: IPMI Message Header:
  812. 192.168.1.22: --------------------
  813. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  814. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  815. 192.168.1.22: [ 0h] = net_fn[ 6b]
  816. 192.168.1.22: [ E0h] = checksum1[ 8b]
  817. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  818. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  819. 192.168.1.22: [ 33h] = rq_seq[ 6b]
  820. 192.168.1.22: IPMI Command Data:
  821. 192.168.1.22: ------------------
  822. 192.168.1.22: [ 9h] = cmd[ 8b]
  823. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  824. 192.168.1.22: [ 0h] = reserved[ 1b]
  825. 192.168.1.22: [ 0h] = set_selector[ 8b]
  826. 192.168.1.22: [ 0h] = block_selector[ 8b]
  827. 192.168.1.22: IPMI Trailer:
  828. 192.168.1.22: -------------
  829. 192.168.1.22: [ A5h] = checksum2[ 8b]
  830. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  831. 192.168.1.22: ------------------------------
  832. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  833. 192.168.1.22: [ 2h] = pad_length[ 8b]
  834. 192.168.1.22: [ 7h] = next_header[ 8b]
  835. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  836. 192.168.1.22: [ 55h 04h C5h BCh 89h 50h 57h 5Eh ]
  837. 192.168.1.22: [ 0Bh F4h A1h 4Ah ]
  838. 192.168.1.22: =====================================================
  839. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  840. 192.168.1.22: =====================================================
  841. 192.168.1.22: RMCP Header:
  842. 192.168.1.22: ------------
  843. 192.168.1.22: [ 6h] = version[ 8b]
  844. 192.168.1.22: [ 0h] = reserved[ 8b]
  845. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  846. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  847. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  848. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  849. 192.168.1.22: IPMI RMCPPLUS Session Header:
  850. 192.168.1.22: -----------------------------
  851. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  852. 192.168.1.22: [ 0h] = reserved1[ 4b]
  853. 192.168.1.22: [ 0h] = payload_type[ 6b]
  854. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  855. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  856. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  857. 192.168.1.22: [ 4h] = session_sequence_number[32b]
  858. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  859. 192.168.1.22: IPMI RMCPPLUS Payload:
  860. 192.168.1.22: ----------------------
  861. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  862. 192.168.1.22: [ 0Eh 19h F3h 90h 3Ah 2Ch 43h 71h ]
  863. 192.168.1.22: [ ACh 5Fh 5Ch 0Fh E4h 47h 2Ah 6Dh ]
  864. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  865. 192.168.1.22: [ 81h 04h 7Bh 20h CCh 09h 00h 01h ]
  866. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  867. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  868. 192.168.1.22: [ 00h 00h 05h ]
  869. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  870. 192.168.1.22: IPMI Message Header:
  871. 192.168.1.22: --------------------
  872. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  873. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  874. 192.168.1.22: [ 1h] = net_fn[ 6b]
  875. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  876. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  877. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  878. 192.168.1.22: [ 33h] = rq_seq[ 6b]
  879. 192.168.1.22: IPMI Command Data:
  880. 192.168.1.22: ------------------
  881. 192.168.1.22: [ 9h] = cmd[ 8b]
  882. 192.168.1.22: [ 0h] = comp_code[ 8b]
  883. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  884. 192.168.1.22: [ 0h] = reserved[ 4b]
  885. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  886. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  887. 192.168.1.22: [ 0h] = reserved1[ 5b]
  888. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  889. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  890. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  891. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  892. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  893. 192.168.1.22: [ 0h] = boot_device[ 4b]
  894. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  895. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  896. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  897. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  898. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  899. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  900. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  901. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  902. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  903. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  904. 192.168.1.22: [ 0h] = reserved2[ 4b]
  905. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  906. 192.168.1.22: [ 0h] = reserved3[ 3b]
  907. 192.168.1.22: IPMI Trailer:
  908. 192.168.1.22: -------------
  909. 192.168.1.22: [ 0h] = checksum2[ 8b]
  910. 192.168.1.22: Payload Unexpected Data:
  911. 192.168.1.22: ------------------------
  912. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  913. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  914. 192.168.1.22: [ 00h 00h 00h 05h ]
  915. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  916. 192.168.1.22: ------------------------------
  917. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  918. 192.168.1.22: [ 2h] = pad_length[ 8b]
  919. 192.168.1.22: [ 7h] = next_header[ 8b]
  920. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  921. 192.168.1.22: [ 98h 4Bh E1h 0Ah 31h 96h 68h 2Eh ]
  922. 192.168.1.22: [ 13h C2h 93h 6Fh ]
  923. 192.168.1.22: =====================================================
  924. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  925. 192.168.1.22: =====================================================
  926. 192.168.1.22: RMCP Header:
  927. 192.168.1.22: ------------
  928. 192.168.1.22: [ 6h] = version[ 8b]
  929. 192.168.1.22: [ 0h] = reserved[ 8b]
  930. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  931. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  932. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  933. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  934. 192.168.1.22: IPMI RMCPPLUS Session Header:
  935. 192.168.1.22: -----------------------------
  936. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  937. 192.168.1.22: [ 0h] = reserved1[ 4b]
  938. 192.168.1.22: [ 0h] = payload_type[ 6b]
  939. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  940. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  941. 192.168.1.22: [ 863554h] = session_id[32b]
  942. 192.168.1.22: [ 5h] = session_sequence_number[32b]
  943. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  944. 192.168.1.22: IPMI RMCPPLUS Payload:
  945. 192.168.1.22: ----------------------
  946. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  947. 192.168.1.22: [ 63h 99h 5Ah D7h D2h 92h 2Eh CBh ]
  948. 192.168.1.22: [ 09h 53h E3h 86h 2Ah 95h 27h CBh ]
  949. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  950. 192.168.1.22: [ 20h 00h E0h 81h D0h 09h 05h 00h ]
  951. 192.168.1.22: [ 00h A1h ]
  952. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  953. 192.168.1.22: IPMI Message Header:
  954. 192.168.1.22: --------------------
  955. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  956. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  957. 192.168.1.22: [ 0h] = net_fn[ 6b]
  958. 192.168.1.22: [ E0h] = checksum1[ 8b]
  959. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  960. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  961. 192.168.1.22: [ 34h] = rq_seq[ 6b]
  962. 192.168.1.22: IPMI Command Data:
  963. 192.168.1.22: ------------------
  964. 192.168.1.22: [ 9h] = cmd[ 8b]
  965. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  966. 192.168.1.22: [ 0h] = reserved[ 1b]
  967. 192.168.1.22: [ 0h] = set_selector[ 8b]
  968. 192.168.1.22: [ 0h] = block_selector[ 8b]
  969. 192.168.1.22: IPMI Trailer:
  970. 192.168.1.22: -------------
  971. 192.168.1.22: [ A1h] = checksum2[ 8b]
  972. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  973. 192.168.1.22: ------------------------------
  974. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  975. 192.168.1.22: [ 2h] = pad_length[ 8b]
  976. 192.168.1.22: [ 7h] = next_header[ 8b]
  977. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  978. 192.168.1.22: [ 4Fh 03h DDh EFh C0h EDh EBh E7h ]
  979. 192.168.1.22: [ 62h BCh 35h 1Eh ]
  980. 192.168.1.22: =====================================================
  981. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  982. 192.168.1.22: =====================================================
  983. 192.168.1.22: RMCP Header:
  984. 192.168.1.22: ------------
  985. 192.168.1.22: [ 6h] = version[ 8b]
  986. 192.168.1.22: [ 0h] = reserved[ 8b]
  987. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  988. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  989. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  990. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  991. 192.168.1.22: IPMI RMCPPLUS Session Header:
  992. 192.168.1.22: -----------------------------
  993. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  994. 192.168.1.22: [ 0h] = reserved1[ 4b]
  995. 192.168.1.22: [ 0h] = payload_type[ 6b]
  996. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  997. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  998. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  999. 192.168.1.22: [ 5h] = session_sequence_number[32b]
  1000. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1001. 192.168.1.22: IPMI RMCPPLUS Payload:
  1002. 192.168.1.22: ----------------------
  1003. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1004. 192.168.1.22: [ 3Eh AEh A5h DFh 85h E3h ECh ECh ]
  1005. 192.168.1.22: [ DFh DCh 06h EEh ACh 00h CAh 88h ]
  1006. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1007. 192.168.1.22: [ 81h 04h 7Bh 20h D0h 09h 00h 01h ]
  1008. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1009. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1010. 192.168.1.22: [ 00h 00h 01h ]
  1011. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1012. 192.168.1.22: IPMI Message Header:
  1013. 192.168.1.22: --------------------
  1014. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1015. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1016. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1017. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1018. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1019. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1020. 192.168.1.22: [ 34h] = rq_seq[ 6b]
  1021. 192.168.1.22: IPMI Command Data:
  1022. 192.168.1.22: ------------------
  1023. 192.168.1.22: [ 9h] = cmd[ 8b]
  1024. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1025. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1026. 192.168.1.22: [ 0h] = reserved[ 4b]
  1027. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1028. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1029. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1030. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1031. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1032. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1033. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1034. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1035. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1036. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1037. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1038. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1039. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1040. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1041. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1042. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1043. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1044. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1045. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1046. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1047. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1048. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1049. 192.168.1.22: IPMI Trailer:
  1050. 192.168.1.22: -------------
  1051. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1052. 192.168.1.22: Payload Unexpected Data:
  1053. 192.168.1.22: ------------------------
  1054. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1055. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1056. 192.168.1.22: [ 00h 00h 00h 01h ]
  1057. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1058. 192.168.1.22: ------------------------------
  1059. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1060. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1061. 192.168.1.22: [ 7h] = next_header[ 8b]
  1062. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1063. 192.168.1.22: [ 34h 59h E0h 4Ah 6Fh 44h ADh 29h ]
  1064. 192.168.1.22: [ 8Eh F5h DEh 5Fh ]
  1065. 192.168.1.22: =====================================================
  1066. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1067. 192.168.1.22: =====================================================
  1068. 192.168.1.22: RMCP Header:
  1069. 192.168.1.22: ------------
  1070. 192.168.1.22: [ 6h] = version[ 8b]
  1071. 192.168.1.22: [ 0h] = reserved[ 8b]
  1072. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1073. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1074. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1075. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1076. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1077. 192.168.1.22: -----------------------------
  1078. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1079. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1080. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1081. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1082. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1083. 192.168.1.22: [ 863554h] = session_id[32b]
  1084. 192.168.1.22: [ 6h] = session_sequence_number[32b]
  1085. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1086. 192.168.1.22: IPMI RMCPPLUS Payload:
  1087. 192.168.1.22: ----------------------
  1088. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1089. 192.168.1.22: [ AEh 7Ah D4h E8h 7Fh A4h E6h 98h ]
  1090. 192.168.1.22: [ 3Eh 5Eh 7Dh 36h 92h 9Fh 5Bh D8h ]
  1091. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1092. 192.168.1.22: [ 20h 00h E0h 81h D4h 09h 05h 00h ]
  1093. 192.168.1.22: [ 00h 9Dh ]
  1094. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1095. 192.168.1.22: IPMI Message Header:
  1096. 192.168.1.22: --------------------
  1097. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1098. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1099. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1100. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1101. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1102. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1103. 192.168.1.22: [ 35h] = rq_seq[ 6b]
  1104. 192.168.1.22: IPMI Command Data:
  1105. 192.168.1.22: ------------------
  1106. 192.168.1.22: [ 9h] = cmd[ 8b]
  1107. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1108. 192.168.1.22: [ 0h] = reserved[ 1b]
  1109. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1110. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1111. 192.168.1.22: IPMI Trailer:
  1112. 192.168.1.22: -------------
  1113. 192.168.1.22: [ 9Dh] = checksum2[ 8b]
  1114. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1115. 192.168.1.22: ------------------------------
  1116. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1117. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1118. 192.168.1.22: [ 7h] = next_header[ 8b]
  1119. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1120. 192.168.1.22: [ FDh 39h C4h 85h 10h F5h A6h 84h ]
  1121. 192.168.1.22: [ 2Eh 29h FCh B4h ]
  1122. 192.168.1.22: =====================================================
  1123. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1124. 192.168.1.22: =====================================================
  1125. 192.168.1.22: RMCP Header:
  1126. 192.168.1.22: ------------
  1127. 192.168.1.22: [ 6h] = version[ 8b]
  1128. 192.168.1.22: [ 0h] = reserved[ 8b]
  1129. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1130. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1131. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1132. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1133. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1134. 192.168.1.22: -----------------------------
  1135. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1136. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1137. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1138. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1139. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1140. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  1141. 192.168.1.22: [ 6h] = session_sequence_number[32b]
  1142. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1143. 192.168.1.22: IPMI RMCPPLUS Payload:
  1144. 192.168.1.22: ----------------------
  1145. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1146. 192.168.1.22: [ 89h 99h FEh 1Ch A5h 60h 65h A5h ]
  1147. 192.168.1.22: [ D5h 1Fh 07h F7h 9Bh 65h 77h F9h ]
  1148. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1149. 192.168.1.22: [ 81h 04h 7Bh 20h D4h 09h 00h 01h ]
  1150. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1151. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1152. 192.168.1.22: [ 00h 00h FDh ]
  1153. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1154. 192.168.1.22: IPMI Message Header:
  1155. 192.168.1.22: --------------------
  1156. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1157. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1158. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1159. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1160. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1161. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1162. 192.168.1.22: [ 35h] = rq_seq[ 6b]
  1163. 192.168.1.22: IPMI Command Data:
  1164. 192.168.1.22: ------------------
  1165. 192.168.1.22: [ 9h] = cmd[ 8b]
  1166. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1167. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1168. 192.168.1.22: [ 0h] = reserved[ 4b]
  1169. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1170. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1171. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1172. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1173. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1174. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1175. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1176. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1177. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1178. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1179. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1180. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1181. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1182. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1183. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1184. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1185. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1186. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1187. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1188. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1189. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1190. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1191. 192.168.1.22: IPMI Trailer:
  1192. 192.168.1.22: -------------
  1193. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1194. 192.168.1.22: Payload Unexpected Data:
  1195. 192.168.1.22: ------------------------
  1196. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1197. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1198. 192.168.1.22: [ 00h 00h 00h FDh ]
  1199. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1200. 192.168.1.22: ------------------------------
  1201. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1202. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1203. 192.168.1.22: [ 7h] = next_header[ 8b]
  1204. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1205. 192.168.1.22: [ F1h 41h B3h 4Dh 22h 6Bh AFh E2h ]
  1206. 192.168.1.22: [ F8h 79h 5Ah 0Ch ]
  1207. 192.168.1.22: =====================================================
  1208. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1209. 192.168.1.22: =====================================================
  1210. 192.168.1.22: RMCP Header:
  1211. 192.168.1.22: ------------
  1212. 192.168.1.22: [ 6h] = version[ 8b]
  1213. 192.168.1.22: [ 0h] = reserved[ 8b]
  1214. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1215. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1216. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1217. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1218. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1219. 192.168.1.22: -----------------------------
  1220. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1221. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1222. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1223. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1224. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1225. 192.168.1.22: [ 863554h] = session_id[32b]
  1226. 192.168.1.22: [ 7h] = session_sequence_number[32b]
  1227. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1228. 192.168.1.22: IPMI RMCPPLUS Payload:
  1229. 192.168.1.22: ----------------------
  1230. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1231. 192.168.1.22: [ AAh 5Dh BFh 0Ch E3h 53h FAh 3Fh ]
  1232. 192.168.1.22: [ DDh 54h DAh 98h 36h D1h 5Ch F0h ]
  1233. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1234. 192.168.1.22: [ 20h 00h E0h 81h D8h 09h 05h 00h ]
  1235. 192.168.1.22: [ 00h 99h ]
  1236. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1237. 192.168.1.22: IPMI Message Header:
  1238. 192.168.1.22: --------------------
  1239. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1240. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1241. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1242. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1243. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1244. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1245. 192.168.1.22: [ 36h] = rq_seq[ 6b]
  1246. 192.168.1.22: IPMI Command Data:
  1247. 192.168.1.22: ------------------
  1248. 192.168.1.22: [ 9h] = cmd[ 8b]
  1249. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1250. 192.168.1.22: [ 0h] = reserved[ 1b]
  1251. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1252. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1253. 192.168.1.22: IPMI Trailer:
  1254. 192.168.1.22: -------------
  1255. 192.168.1.22: [ 99h] = checksum2[ 8b]
  1256. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1257. 192.168.1.22: ------------------------------
  1258. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1259. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1260. 192.168.1.22: [ 7h] = next_header[ 8b]
  1261. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1262. 192.168.1.22: [ 27h 34h 4Bh 36h 71h E6h ECh 35h ]
  1263. 192.168.1.22: [ 8Dh 0Bh 4Bh F1h ]
  1264. 192.168.1.22: =====================================================
  1265. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1266. 192.168.1.22: =====================================================
  1267. 192.168.1.22: RMCP Header:
  1268. 192.168.1.22: ------------
  1269. 192.168.1.22: [ 6h] = version[ 8b]
  1270. 192.168.1.22: [ 0h] = reserved[ 8b]
  1271. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1272. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1273. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1274. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1275. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1276. 192.168.1.22: -----------------------------
  1277. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1278. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1279. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1280. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1281. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1282. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  1283. 192.168.1.22: [ 7h] = session_sequence_number[32b]
  1284. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1285. 192.168.1.22: IPMI RMCPPLUS Payload:
  1286. 192.168.1.22: ----------------------
  1287. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1288. 192.168.1.22: [ 3Ah FBh 5Fh 06h ABh 0Fh E9h 28h ]
  1289. 192.168.1.22: [ E1h A1h 0Ah 38h ACh FFh AFh 9Ah ]
  1290. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1291. 192.168.1.22: [ 81h 04h 7Bh 20h D8h 09h 00h 01h ]
  1292. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1293. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1294. 192.168.1.22: [ 00h 00h F9h ]
  1295. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1296. 192.168.1.22: IPMI Message Header:
  1297. 192.168.1.22: --------------------
  1298. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1299. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1300. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1301. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1302. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1303. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1304. 192.168.1.22: [ 36h] = rq_seq[ 6b]
  1305. 192.168.1.22: IPMI Command Data:
  1306. 192.168.1.22: ------------------
  1307. 192.168.1.22: [ 9h] = cmd[ 8b]
  1308. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1309. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1310. 192.168.1.22: [ 0h] = reserved[ 4b]
  1311. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1312. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1313. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1314. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1315. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1316. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1317. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1318. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1319. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1320. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1321. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1322. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1323. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1324. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1325. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1326. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1327. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1328. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1329. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1330. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1331. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1332. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1333. 192.168.1.22: IPMI Trailer:
  1334. 192.168.1.22: -------------
  1335. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1336. 192.168.1.22: Payload Unexpected Data:
  1337. 192.168.1.22: ------------------------
  1338. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1339. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1340. 192.168.1.22: [ 00h 00h 00h F9h ]
  1341. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1342. 192.168.1.22: ------------------------------
  1343. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1344. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1345. 192.168.1.22: [ 7h] = next_header[ 8b]
  1346. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1347. 192.168.1.22: [ 51h 9Ah 80h 65h A4h 18h 21h 74h ]
  1348. 192.168.1.22: [ 5Ch 89h 2Ah 77h ]
  1349. 192.168.1.22: =====================================================
  1350. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1351. 192.168.1.22: =====================================================
  1352. 192.168.1.22: RMCP Header:
  1353. 192.168.1.22: ------------
  1354. 192.168.1.22: [ 6h] = version[ 8b]
  1355. 192.168.1.22: [ 0h] = reserved[ 8b]
  1356. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1357. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1358. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1359. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1360. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1361. 192.168.1.22: -----------------------------
  1362. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1363. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1364. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1365. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1366. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1367. 192.168.1.22: [ 863554h] = session_id[32b]
  1368. 192.168.1.22: [ 8h] = session_sequence_number[32b]
  1369. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1370. 192.168.1.22: IPMI RMCPPLUS Payload:
  1371. 192.168.1.22: ----------------------
  1372. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1373. 192.168.1.22: [ F5h 2Ah 9Ah D8h AAh 34h 8Ch 66h ]
  1374. 192.168.1.22: [ 3Dh B6h 0Bh 55h 97h B3h 4Dh 3Eh ]
  1375. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1376. 192.168.1.22: [ 20h 00h E0h 81h DCh 09h 05h 00h ]
  1377. 192.168.1.22: [ 00h 95h ]
  1378. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1379. 192.168.1.22: IPMI Message Header:
  1380. 192.168.1.22: --------------------
  1381. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1382. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1383. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1384. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1385. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1386. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1387. 192.168.1.22: [ 37h] = rq_seq[ 6b]
  1388. 192.168.1.22: IPMI Command Data:
  1389. 192.168.1.22: ------------------
  1390. 192.168.1.22: [ 9h] = cmd[ 8b]
  1391. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1392. 192.168.1.22: [ 0h] = reserved[ 1b]
  1393. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1394. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1395. 192.168.1.22: IPMI Trailer:
  1396. 192.168.1.22: -------------
  1397. 192.168.1.22: [ 95h] = checksum2[ 8b]
  1398. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1399. 192.168.1.22: ------------------------------
  1400. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1401. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1402. 192.168.1.22: [ 7h] = next_header[ 8b]
  1403. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1404. 192.168.1.22: [ 60h 37h 24h 52h 05h 43h 4Fh AAh ]
  1405. 192.168.1.22: [ 4Ch 61h DFh ADh ]
  1406. 192.168.1.22: =====================================================
  1407. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1408. 192.168.1.22: =====================================================
  1409. 192.168.1.22: RMCP Header:
  1410. 192.168.1.22: ------------
  1411. 192.168.1.22: [ 6h] = version[ 8b]
  1412. 192.168.1.22: [ 0h] = reserved[ 8b]
  1413. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1414. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1415. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1416. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1417. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1418. 192.168.1.22: -----------------------------
  1419. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1420. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1421. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1422. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1423. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1424. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  1425. 192.168.1.22: [ 8h] = session_sequence_number[32b]
  1426. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1427. 192.168.1.22: IPMI RMCPPLUS Payload:
  1428. 192.168.1.22: ----------------------
  1429. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1430. 192.168.1.22: [ 13h 7Bh 55h B3h 38h E9h 14h ABh ]
  1431. 192.168.1.22: [ 27h 5Eh 9Dh CFh 85h 6Ah B9h F9h ]
  1432. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1433. 192.168.1.22: [ 81h 04h 7Bh 20h DCh 09h 00h 01h ]
  1434. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1435. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1436. 192.168.1.22: [ 00h 00h F5h ]
  1437. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1438. 192.168.1.22: IPMI Message Header:
  1439. 192.168.1.22: --------------------
  1440. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1441. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1442. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1443. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1444. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1445. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1446. 192.168.1.22: [ 37h] = rq_seq[ 6b]
  1447. 192.168.1.22: IPMI Command Data:
  1448. 192.168.1.22: ------------------
  1449. 192.168.1.22: [ 9h] = cmd[ 8b]
  1450. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1451. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1452. 192.168.1.22: [ 0h] = reserved[ 4b]
  1453. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1454. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1455. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1456. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1457. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1458. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1459. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1460. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1461. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1462. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1463. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1464. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1465. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1466. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1467. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1468. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1469. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1470. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1471. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1472. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1473. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1474. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1475. 192.168.1.22: IPMI Trailer:
  1476. 192.168.1.22: -------------
  1477. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1478. 192.168.1.22: Payload Unexpected Data:
  1479. 192.168.1.22: ------------------------
  1480. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1481. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1482. 192.168.1.22: [ 00h 00h 00h F5h ]
  1483. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1484. 192.168.1.22: ------------------------------
  1485. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1486. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1487. 192.168.1.22: [ 7h] = next_header[ 8b]
  1488. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1489. 192.168.1.22: [ 7Ch EBh ABh 41h FDh EFh 8Bh 3Dh ]
  1490. 192.168.1.22: [ 37h 47h FAh 05h ]
  1491. 192.168.1.22: =====================================================
  1492. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1493. 192.168.1.22: =====================================================
  1494. 192.168.1.22: RMCP Header:
  1495. 192.168.1.22: ------------
  1496. 192.168.1.22: [ 6h] = version[ 8b]
  1497. 192.168.1.22: [ 0h] = reserved[ 8b]
  1498. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1499. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1500. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1501. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1502. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1503. 192.168.1.22: -----------------------------
  1504. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1505. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1506. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1507. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1508. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1509. 192.168.1.22: [ 863554h] = session_id[32b]
  1510. 192.168.1.22: [ 9h] = session_sequence_number[32b]
  1511. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1512. 192.168.1.22: IPMI RMCPPLUS Payload:
  1513. 192.168.1.22: ----------------------
  1514. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1515. 192.168.1.22: [ 0Ch E6h B1h 0Ah EBh 34h 88h A4h ]
  1516. 192.168.1.22: [ 3Ch F9h F5h EBh CFh 2Ch AEh 54h ]
  1517. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1518. 192.168.1.22: [ 20h 00h E0h 81h E0h 09h 05h 00h ]
  1519. 192.168.1.22: [ 00h 91h ]
  1520. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1521. 192.168.1.22: IPMI Message Header:
  1522. 192.168.1.22: --------------------
  1523. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1524. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1525. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1526. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1527. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1528. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1529. 192.168.1.22: [ 38h] = rq_seq[ 6b]
  1530. 192.168.1.22: IPMI Command Data:
  1531. 192.168.1.22: ------------------
  1532. 192.168.1.22: [ 9h] = cmd[ 8b]
  1533. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1534. 192.168.1.22: [ 0h] = reserved[ 1b]
  1535. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1536. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1537. 192.168.1.22: IPMI Trailer:
  1538. 192.168.1.22: -------------
  1539. 192.168.1.22: [ 91h] = checksum2[ 8b]
  1540. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1541. 192.168.1.22: ------------------------------
  1542. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1543. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1544. 192.168.1.22: [ 7h] = next_header[ 8b]
  1545. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1546. 192.168.1.22: [ 4Ch 0Bh F7h 5Fh 51h 19h 5Ch 5Bh ]
  1547. 192.168.1.22: [ 7Ah EFh 0Dh 46h ]
  1548. 192.168.1.22: =====================================================
  1549. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1550. 192.168.1.22: =====================================================
  1551. 192.168.1.22: RMCP Header:
  1552. 192.168.1.22: ------------
  1553. 192.168.1.22: [ 6h] = version[ 8b]
  1554. 192.168.1.22: [ 0h] = reserved[ 8b]
  1555. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1556. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1557. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1558. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1559. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1560. 192.168.1.22: -----------------------------
  1561. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1562. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1563. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1564. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1565. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1566. 192.168.1.22: [ 904A3E28h] = session_id[32b]
  1567. 192.168.1.22: [ 9h] = session_sequence_number[32b]
  1568. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1569. 192.168.1.22: IPMI RMCPPLUS Payload:
  1570. 192.168.1.22: ----------------------
  1571. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1572. 192.168.1.22: [ 33h D0h 92h FAh 76h A5h 89h B9h ]
  1573. 192.168.1.22: [ A2h 99h E1h 23h 3Fh 04h 7Dh 69h ]
  1574. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1575. 192.168.1.22: [ 81h 04h 7Bh 20h E0h 09h 00h 01h ]
  1576. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1577. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1578. 192.168.1.22: [ 00h 00h F1h ]
  1579. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1580. 192.168.1.22: IPMI Message Header:
  1581. 192.168.1.22: --------------------
  1582. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1583. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1584. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1585. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1586. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1587. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1588. 192.168.1.22: [ 38h] = rq_seq[ 6b]
  1589. 192.168.1.22: IPMI Command Data:
  1590. 192.168.1.22: ------------------
  1591. 192.168.1.22: [ 9h] = cmd[ 8b]
  1592. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1593. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1594. 192.168.1.22: [ 0h] = reserved[ 4b]
  1595. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1596. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1597. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1598. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1599. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1600. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1601. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1602. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1603. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1604. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1605. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1606. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1607. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1608. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1609. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1610. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1611. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1612. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1613. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1614. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1615. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1616. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1617. 192.168.1.22: IPMI Trailer:
  1618. 192.168.1.22: -------------
  1619. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1620. 192.168.1.22: Payload Unexpected Data:
  1621. 192.168.1.22: ------------------------
  1622. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1623. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1624. 192.168.1.22: [ 00h 00h 00h F1h ]
  1625. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1626. 192.168.1.22: ------------------------------
  1627. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1628. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1629. 192.168.1.22: [ 7h] = next_header[ 8b]
  1630. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1631. 192.168.1.22: [ 03h D7h D8h 9Ch C8h 87h 7Ch BDh ]
  1632. 192.168.1.22: [ 45h AEh C6h FFh ]
  1633. 192.168.1.22: =====================================================
  1634. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1635. 192.168.1.22: =====================================================
  1636. 192.168.1.22: RMCP Header:
  1637. 192.168.1.22: ------------
  1638. 192.168.1.22: [ 6h] = version[ 8b]
  1639. 192.168.1.22: [ 0h] = reserved[ 8b]
  1640. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1641. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1642. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1643. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1644. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1645. 192.168.1.22: -----------------------------
  1646. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1647. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1648. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1649. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1650. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1651. 192.168.1.22: [ 863554h] = session_id[32b]
  1652. 192.168.1.22: [ Ah] = session_sequence_number[32b]
  1653. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1654. 192.168.1.22: IPMI RMCPPLUS Payload:
  1655. 192.168.1.22: ----------------------
  1656. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1657. 192.168.1.22: [ EBh 7Ch 13h 65h 85h 03h EAh F5h ]
  1658. 192.168.1.22: [ C6h 54h 4Ah 29h CFh 15h 51h 54h ]
  1659. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1660. 192.168.1.22: [ 20h 00h E0h 81h E4h 09h 05h 00h ]
  1661. 192.168.1.22: [ 00h 8Dh ]
  1662. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1663. 192.168.1.22: IPMI Message Header:
  1664. 192.168.1.22: --------------------
  1665. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1666. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1667. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1668. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1669. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1670. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1671. 192.168.1.22: [ 39h] = rq_seq[ 6b]
  1672. 192.168.1.22: IPMI Command Data:
  1673. 192.168.1.22: ------------------
  1674. 192.168.1.22: [ 9h] = cmd[ 8b]
  1675. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1676. 192.168.1.22: [ 0h] = reserved[ 1b]
  1677. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1678. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1679. 192.168.1.22: IPMI Trailer:
  1680. 192.168.1.22: -------------
  1681. 192.168.1.22: [ 8Dh] = checksum2[ 8b]
  1682. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1683. 192.168.1.22: ------------------------------
  1684. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1685. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1686. 192.168.1.22: [ 7h] = next_header[ 8b]
  1687. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1688. 192.168.1.22: [ F6h 42h DCh 95h 22h 5Dh 74h C0h ]
  1689. 192.168.1.22: [ 6Fh 5Fh F0h 5Ah ]
  1690. ipmi_cmd_get_system_boot_options_boot_flags: session timeout
  1691. 192.168.1.22: =====================================================
  1692. 192.168.1.22: IPMI 2.0 Close Session Request
  1693. 192.168.1.22: =====================================================
  1694. 192.168.1.22: RMCP Header:
  1695. 192.168.1.22: ------------
  1696. 192.168.1.22: [ 6h] = version[ 8b]
  1697. 192.168.1.22: [ 0h] = reserved[ 8b]
  1698. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1699. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1700. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1701. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1702. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1703. 192.168.1.22: -----------------------------
  1704. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1705. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1706. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1707. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1708. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1709. 192.168.1.22: [ 863554h] = session_id[32b]
  1710. 192.168.1.22: [ Bh] = session_sequence_number[32b]
  1711. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1712. 192.168.1.22: IPMI RMCPPLUS Payload:
  1713. 192.168.1.22: ----------------------
  1714. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1715. 192.168.1.22: [ 64h DAh D2h A8h F0h 64h 9Ah AAh ]
  1716. 192.168.1.22: [ 94h D6h 0Dh 00h E2h 5Fh 36h 53h ]
  1717. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[11B]
  1718. 192.168.1.22: [ 20h 18h C8h 81h E8h 3Ch 54h 35h ]
  1719. 192.168.1.22: [ 86h 00h 4Ch ]
  1720. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1721. 192.168.1.22: IPMI Message Header:
  1722. 192.168.1.22: --------------------
  1723. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1724. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1725. 192.168.1.22: [ 6h] = net_fn[ 6b]
  1726. 192.168.1.22: [ C8h] = checksum1[ 8b]
  1727. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1728. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1729. 192.168.1.22: [ 3Ah] = rq_seq[ 6b]
  1730. 192.168.1.22: IPMI Command Data:
  1731. 192.168.1.22: ------------------
  1732. 192.168.1.22: [ 3Ch] = cmd[ 8b]
  1733. 192.168.1.22: [ 863554h] = session_id[32b]
  1734. 192.168.1.22: IPMI Trailer:
  1735. 192.168.1.22: -------------
  1736. 192.168.1.22: [ 4Ch] = checksum2[ 8b]
  1737. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1738. 192.168.1.22: ------------------------------
  1739. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1740. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1741. 192.168.1.22: [ 7h] = next_header[ 8b]
  1742. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1743. 192.168.1.22: [ 4Dh EFh 14h 7Bh 1Ah 84h 09h 1Ah ]
  1744. 192.168.1.22: [ 1Ch 17h 39h EFh ]
  1745. [root@puppet2 ~]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement