Advertisement
Guest User

Untitled

a guest
Jul 30th, 2012
116
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 91.07 KB | None | 0 0
  1. ipmi-chassis-config --username=admin --password=password --hostname=192.168.1.22 --driver-type=LAN_2_0 --section=Chassis_Boot_Flags --checkout
  2.  
  3. #
  4. # Section Chassis_Boot_Flags Comments
  5. #
  6. # The following configuration options are for configuring chassis boot behavior.
  7. # Please note that some fields may apply to all future boots while some may only
  8. # apply to the next system boot.
  9. #
  10. # "Boot_Flags_Persistent" determines if flags apply to the next boot only or all
  11. # future boots.
  12. #
  13. # "Boot_Device" allows the user to configure which device the BIOS should boot
  14. # off of. Most users may wish to select NO-OVERRIDE to select the configuration
  15. # currently determined by the BIOS. Note that the configuration value BIOS-SETUP
  16. # refers to booting *into* the BIOS Setup, not from it. FLOPPY may refer to any
  17. # type of removeable media. "Device_Instance_Selector" may be be used to select
  18. # a specific device instance for booting.
  19. #
  20. Section Chassis_Boot_Flags
  21. api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
  22. api/ipmi-chassis-cmds-api.c: 1140: _ipmi_cmd_get_system_boot_options_common: error 'session timeout' (14)
  23. api/ipmi-chassis-cmds-api.c: 1284: ipmi_cmd_get_system_boot_options_boot_flags: error 'session timeout' (14)
  24. api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
  25. [root@puppet2 freeipmi-1.1.6]# ipmi-chassis-config --username=admin --password=creative --hostname=192.168.1.22 --driver-type=LAN_2_0 --section=Chassis_Boot_Flags --checkout --debug
  26. 192.168.1.22: =====================================================
  27. 192.168.1.22: IPMI 1.5 Get Channel Authentication Capabilities Request
  28. 192.168.1.22: =====================================================
  29. 192.168.1.22: RMCP Header:
  30. 192.168.1.22: ------------
  31. 192.168.1.22: [ 6h] = version[ 8b]
  32. 192.168.1.22: [ 0h] = reserved[ 8b]
  33. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  34. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  35. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  36. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  37. 192.168.1.22: IPMI Session Header:
  38. 192.168.1.22: --------------------
  39. 192.168.1.22: [ 0h] = authentication_type[ 8b]
  40. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  41. 192.168.1.22: [ 0h] = session_id[32b]
  42. 192.168.1.22: [ 9h] = ipmi_msg_len[ 8b]
  43. 192.168.1.22: IPMI Message Header:
  44. 192.168.1.22: --------------------
  45. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  46. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  47. 192.168.1.22: [ 6h] = net_fn[ 6b]
  48. 192.168.1.22: [ C8h] = checksum1[ 8b]
  49. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  50. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  51. 192.168.1.22: [ 23h] = rq_seq[ 6b]
  52. 192.168.1.22: IPMI Command Data:
  53. 192.168.1.22: ------------------
  54. 192.168.1.22: [ 38h] = cmd[ 8b]
  55. 192.168.1.22: [ Eh] = channel_number[ 4b]
  56. 192.168.1.22: [ 0h] = reserved1[ 3b]
  57. 192.168.1.22: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
  58. 192.168.1.22: [ 4h] = maximum_privilege_level[ 4b]
  59. 192.168.1.22: [ 0h] = reserved2[ 4b]
  60. 192.168.1.22: IPMI Trailer:
  61. 192.168.1.22: --------------
  62. 192.168.1.22: [ 29h] = checksum2[ 8b]
  63. 192.168.1.22: =====================================================
  64. 192.168.1.22: IPMI 1.5 Get Channel Authentication Capabilities Response
  65. 192.168.1.22: =====================================================
  66. 192.168.1.22: RMCP Header:
  67. 192.168.1.22: ------------
  68. 192.168.1.22: [ 6h] = version[ 8b]
  69. 192.168.1.22: [ 0h] = reserved[ 8b]
  70. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  71. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  72. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  73. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  74. 192.168.1.22: IPMI Session Header:
  75. 192.168.1.22: --------------------
  76. 192.168.1.22: [ 0h] = authentication_type[ 8b]
  77. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  78. 192.168.1.22: [ 0h] = session_id[32b]
  79. 192.168.1.22: [ 10h] = ipmi_msg_len[ 8b]
  80. 192.168.1.22: IPMI Message Header:
  81. 192.168.1.22: --------------------
  82. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  83. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  84. 192.168.1.22: [ 7h] = net_fn[ 6b]
  85. 192.168.1.22: [ 63h] = checksum1[ 8b]
  86. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  87. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  88. 192.168.1.22: [ 23h] = rq_seq[ 6b]
  89. 192.168.1.22: IPMI Command Data:
  90. 192.168.1.22: ------------------
  91. 192.168.1.22: [ 38h] = cmd[ 8b]
  92. 192.168.1.22: [ 0h] = comp_code[ 8b]
  93. 192.168.1.22: [ 2h] = channel_number[ 8b]
  94. 192.168.1.22: [ 0h] = authentication_type.none[ 1b]
  95. 192.168.1.22: [ 0h] = authentication_type.md2[ 1b]
  96. 192.168.1.22: [ 0h] = authentication_type.md5[ 1b]
  97. 192.168.1.22: [ 0h] = authentication_type.reserved1[ 1b]
  98. 192.168.1.22: [ 0h] = authentication_type.straight_password_key[ 1b]
  99. 192.168.1.22: [ 0h] = authentication_type.oem_prop[ 1b]
  100. 192.168.1.22: [ 0h] = authentication_type.reserved2[ 1b]
  101. 192.168.1.22: [ 1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
  102. 192.168.1.22: [ 0h] = authentication_status.anonymous_login[ 1b]
  103. 192.168.1.22: [ 0h] = authentication_status.null_username[ 1b]
  104. 192.168.1.22: [ 1h] = authentication_status.non_null_username[ 1b]
  105. 192.168.1.22: [ 0h] = authentication_status.user_level_authentication[ 1b]
  106. 192.168.1.22: [ 1h] = authentication_status.per_message_authentication[ 1b]
  107. 192.168.1.22: [ 0h] = authentication_status.k_g[ 1b]
  108. 192.168.1.22: [ 0h] = authentication_status.reserved[ 2b]
  109. 192.168.1.22: [ 0h] = channel_supports_ipmi_v1.5_connections[ 1b]
  110. 192.168.1.22: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b]
  111. 192.168.1.22: [ 0h] = reserved[ 6b]
  112. 192.168.1.22: [ 0h] = oem_id[24b]
  113. 192.168.1.22: [ 0h] = oem_auxiliary_data[ 8b]
  114. 192.168.1.22: IPMI Trailer:
  115. 192.168.1.22: --------------
  116. 192.168.1.22: [ 84h] = checksum2[ 8b]
  117. api/ipmi-lan-session-common.c: 2821: ipmi_lan_2_0_cmd_wrapper: error 'field not found' (7)
  118. 192.168.1.22: =====================================================
  119. 192.168.1.22: IPMI 2.0 Open Session Request
  120. 192.168.1.22: =====================================================
  121. 192.168.1.22: RMCP Header:
  122. 192.168.1.22: ------------
  123. 192.168.1.22: [ 6h] = version[ 8b]
  124. 192.168.1.22: [ 0h] = reserved[ 8b]
  125. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  126. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  127. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  128. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  129. 192.168.1.22: IPMI RMCPPLUS Session Header:
  130. 192.168.1.22: -----------------------------
  131. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  132. 192.168.1.22: [ 0h] = reserved1[ 4b]
  133. 192.168.1.22: [ 10h] = payload_type[ 6b]
  134. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  135. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  136. 192.168.1.22: [ 0h] = session_id[32b]
  137. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  138. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  139. 192.168.1.22: IPMI RMCPPLUS Payload:
  140. 192.168.1.22: ----------------------
  141. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[32B]
  142. 192.168.1.22: [ 24h 00h 00h 00h 0Eh 88h AEh 3Ch ]
  143. 192.168.1.22: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
  144. 192.168.1.22: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
  145. 192.168.1.22: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
  146. 192.168.1.22: IPMI Command Data:
  147. 192.168.1.22: ------------------
  148. 192.168.1.22: [ 24h] = message_tag[ 8b]
  149. 192.168.1.22: [ 0h] = requested_maximum_privilege_level[ 4b]
  150. 192.168.1.22: [ 0h] = reserved1[ 4b]
  151. 192.168.1.22: [ 0h] = reserved2[16b]
  152. 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
  153. 192.168.1.22: [ 0h] = authentication_payload.payload_type[ 8b]
  154. 192.168.1.22: [ 0h] = reserved3[16b]
  155. 192.168.1.22: [ 8h] = authentication_payload.payload_length[ 8b]
  156. 192.168.1.22: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  157. 192.168.1.22: [ 0h] = reserved4[ 2b]
  158. 192.168.1.22: [ 0h] = reserved5[24b]
  159. 192.168.1.22: [ 1h] = integrity_payload.payload_type[ 8b]
  160. 192.168.1.22: [ 0h] = reserved6[16b]
  161. 192.168.1.22: [ 8h] = integrity_payload.payload_length[ 8b]
  162. 192.168.1.22: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  163. 192.168.1.22: [ 0h] = reserved7[ 2b]
  164. 192.168.1.22: [ 0h] = reserved8[24b]
  165. 192.168.1.22: [ 2h] = confidentiality_payload.payload_type[ 8b]
  166. 192.168.1.22: [ 0h] = reserved9[16b]
  167. 192.168.1.22: [ 8h] = confidentiality_payload.payload_length[ 8b]
  168. 192.168.1.22: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  169. 192.168.1.22: [ 0h] = reserved10[ 2b]
  170. 192.168.1.22: [ 0h] = reserved11[24b]
  171. 192.168.1.22: =====================================================
  172. 192.168.1.22: IPMI 2.0 Open Session Response
  173. 192.168.1.22: =====================================================
  174. 192.168.1.22: RMCP Header:
  175. 192.168.1.22: ------------
  176. 192.168.1.22: [ 6h] = version[ 8b]
  177. 192.168.1.22: [ 0h] = reserved[ 8b]
  178. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  179. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  180. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  181. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  182. 192.168.1.22: IPMI RMCPPLUS Session Header:
  183. 192.168.1.22: -----------------------------
  184. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  185. 192.168.1.22: [ 0h] = reserved1[ 4b]
  186. 192.168.1.22: [ 11h] = payload_type[ 6b]
  187. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  188. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  189. 192.168.1.22: [ 0h] = session_id[32b]
  190. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  191. 192.168.1.22: [ 24h] = ipmi_payload_len[16b]
  192. 192.168.1.22: IPMI RMCPPLUS Payload:
  193. 192.168.1.22: ----------------------
  194. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[36B]
  195. 192.168.1.22: [ 24h 00h 04h 00h 0Eh 88h AEh 3Ch ]
  196. 192.168.1.22: [ BCh 9Ah 8Eh 00h 00h 00h 00h 08h ]
  197. 192.168.1.22: [ 01h 00h 00h 00h 01h 00h 00h 08h ]
  198. 192.168.1.22: [ 01h 00h 00h 00h 02h 00h 00h 08h ]
  199. 192.168.1.22: [ 01h 00h 00h 00h ]
  200. 192.168.1.22: IPMI Command Data:
  201. 192.168.1.22: ------------------
  202. 192.168.1.22: [ 24h] = message_tag[ 8b]
  203. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  204. 192.168.1.22: [ 4h] = maximum_privilege_level[ 4b]
  205. 192.168.1.22: [ 0h] = reserved1[ 4b]
  206. 192.168.1.22: [ 0h] = reserved2[ 8b]
  207. 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
  208. 192.168.1.22: [ 8E9ABCh] = managed_system_session_id[32b]
  209. 192.168.1.22: [ 0h] = authentication_payload.payload_type[ 8b]
  210. 192.168.1.22: [ 0h] = reserved3[16b]
  211. 192.168.1.22: [ 8h] = authentication_payload.payload_length[ 8b]
  212. 192.168.1.22: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  213. 192.168.1.22: [ 0h] = reserved4[ 2b]
  214. 192.168.1.22: [ 0h] = reserved5[24b]
  215. 192.168.1.22: [ 1h] = integrity_payload.payload_type[ 8b]
  216. 192.168.1.22: [ 0h] = reserved6[16b]
  217. 192.168.1.22: [ 8h] = integrity_payload.payload_length[ 8b]
  218. 192.168.1.22: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  219. 192.168.1.22: [ 0h] = reserved7[ 2b]
  220. 192.168.1.22: [ 0h] = reserved8[24b]
  221. 192.168.1.22: [ 2h] = confidentiality_payload.payload_type[ 8b]
  222. 192.168.1.22: [ 0h] = reserved9[16b]
  223. 192.168.1.22: [ 8h] = confidentiality_payload.payload_length[ 8b]
  224. 192.168.1.22: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  225. 192.168.1.22: [ 0h] = reserved10[ 2b]
  226. 192.168.1.22: [ 0h] = reserved11[24b]
  227. api/ipmi-lan-session-common.c: 2821: ipmi_lan_2_0_cmd_wrapper: error 'field not found' (7)
  228. 192.168.1.22: =====================================================
  229. 192.168.1.22: IPMI 2.0 RAKP Message 1 Request
  230. 192.168.1.22: =====================================================
  231. 192.168.1.22: RMCP Header:
  232. 192.168.1.22: ------------
  233. 192.168.1.22: [ 6h] = version[ 8b]
  234. 192.168.1.22: [ 0h] = reserved[ 8b]
  235. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  236. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  237. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  238. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  239. 192.168.1.22: IPMI RMCPPLUS Session Header:
  240. 192.168.1.22: -----------------------------
  241. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  242. 192.168.1.22: [ 0h] = reserved1[ 4b]
  243. 192.168.1.22: [ 12h] = payload_type[ 6b]
  244. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  245. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  246. 192.168.1.22: [ 0h] = session_id[32b]
  247. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  248. 192.168.1.22: [ 21h] = ipmi_payload_len[16b]
  249. 192.168.1.22: IPMI RMCPPLUS Payload:
  250. 192.168.1.22: ----------------------
  251. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[33B]
  252. 192.168.1.22: [ 25h 00h 00h 00h BCh 9Ah 8Eh 00h ]
  253. 192.168.1.22: [ 6Bh 83h 6Dh 82h A6h 99h 2Ah 16h ]
  254. 192.168.1.22: [ A7h 84h E9h 72h BEh 0Bh 77h A3h ]
  255. 192.168.1.22: [ 14h 00h 00h 05h 61h 64h 6Dh 69h ]
  256. 192.168.1.22: [ 6Eh ]
  257. 192.168.1.22: IPMI Command Data:
  258. 192.168.1.22: ------------------
  259. 192.168.1.22: [ 25h] = message_tag[ 8b]
  260. 192.168.1.22: [ 0h] = reserved1[24b]
  261. 192.168.1.22: [ 8E9ABCh] = managed_system_session_id[32b]
  262. 192.168.1.22: [ BYTE ARRAY ... ] = remote_console_random_number[16B]
  263. 192.168.1.22: [ 6Bh 83h 6Dh 82h A6h 99h 2Ah 16h ]
  264. 192.168.1.22: [ A7h 84h E9h 72h BEh 0Bh 77h A3h ]
  265. 192.168.1.22: [ 4h] = requested_maximum_privilege_level[ 4b]
  266. 192.168.1.22: [ 1h] = name_only_lookup[ 1b]
  267. 192.168.1.22: [ 0h] = reserved2[ 3b]
  268. 192.168.1.22: [ 0h] = reserved3[16b]
  269. 192.168.1.22: [ 5h] = user_name_length[ 8b]
  270. 192.168.1.22: [ BYTE ARRAY ... ] = user_name[ 5B]
  271. 192.168.1.22: [ 61h 64h 6Dh 69h 6Eh ]
  272. 192.168.1.22: =====================================================
  273. 192.168.1.22: IPMI 2.0 RAKP Message 2 Response
  274. 192.168.1.22: =====================================================
  275. 192.168.1.22: RMCP Header:
  276. 192.168.1.22: ------------
  277. 192.168.1.22: [ 6h] = version[ 8b]
  278. 192.168.1.22: [ 0h] = reserved[ 8b]
  279. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  280. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  281. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  282. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  283. 192.168.1.22: IPMI RMCPPLUS Session Header:
  284. 192.168.1.22: -----------------------------
  285. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  286. 192.168.1.22: [ 0h] = reserved1[ 4b]
  287. 192.168.1.22: [ 13h] = payload_type[ 6b]
  288. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  289. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  290. 192.168.1.22: [ 0h] = session_id[32b]
  291. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  292. 192.168.1.22: [ 3Ch] = ipmi_payload_len[16b]
  293. 192.168.1.22: IPMI RMCPPLUS Payload:
  294. 192.168.1.22: ----------------------
  295. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[60B]
  296. 192.168.1.22: [ 25h 00h 00h 00h 0Eh 88h AEh 3Ch ]
  297. 192.168.1.22: [ A2h A9h BDh C2h 10h DBh B4h 65h ]
  298. 192.168.1.22: [ 7Bh 60h FCh 7Ch 2Dh F3h 0Ah A2h ]
  299. 192.168.1.22: [ 34h 33h 30h 30h 32h 37h 32h 55h ]
  300. 192.168.1.22: [ 58h 36h 34h 32h 30h 31h 55h 32h ]
  301. 192.168.1.22: [ 24h 7Eh FEh 51h F9h 19h 30h B7h ]
  302. 192.168.1.22: [ ACh D9h E6h 1Ah 40h 5Dh B9h 1Bh ]
  303. 192.168.1.22: [ 6Bh D2h 51h 4Bh ]
  304. 192.168.1.22: IPMI Command Data:
  305. 192.168.1.22: ------------------
  306. 192.168.1.22: [ 25h] = message_tag[ 8b]
  307. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  308. 192.168.1.22: [ 0h] = reserved1[16b]
  309. 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
  310. 192.168.1.22: [ BYTE ARRAY ... ] = managed_system_random_number[16B]
  311. 192.168.1.22: [ A2h A9h BDh C2h 10h DBh B4h 65h ]
  312. 192.168.1.22: [ 7Bh 60h FCh 7Ch 2Dh F3h 0Ah A2h ]
  313. 192.168.1.22: [ BYTE ARRAY ... ] = managed_system_guid[16B]
  314. 192.168.1.22: [ 34h 33h 30h 30h 32h 37h 32h 55h ]
  315. 192.168.1.22: [ 58h 36h 34h 32h 30h 31h 55h 32h ]
  316. 192.168.1.22: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  317. 192.168.1.22: [ 24h 7Eh FEh 51h F9h 19h 30h B7h ]
  318. 192.168.1.22: [ ACh D9h E6h 1Ah 40h 5Dh B9h 1Bh ]
  319. 192.168.1.22: [ 6Bh D2h 51h 4Bh ]
  320. api/ipmi-lan-session-common.c: 2821: ipmi_lan_2_0_cmd_wrapper: error 'field not found' (7)
  321. 192.168.1.22: =====================================================
  322. 192.168.1.22: IPMI 2.0 RAKP Message 3 Request
  323. 192.168.1.22: =====================================================
  324. 192.168.1.22: RMCP Header:
  325. 192.168.1.22: ------------
  326. 192.168.1.22: [ 6h] = version[ 8b]
  327. 192.168.1.22: [ 0h] = reserved[ 8b]
  328. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  329. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  330. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  331. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  332. 192.168.1.22: IPMI RMCPPLUS Session Header:
  333. 192.168.1.22: -----------------------------
  334. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  335. 192.168.1.22: [ 0h] = reserved1[ 4b]
  336. 192.168.1.22: [ 14h] = payload_type[ 6b]
  337. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  338. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  339. 192.168.1.22: [ 0h] = session_id[32b]
  340. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  341. 192.168.1.22: [ 1Ch] = ipmi_payload_len[16b]
  342. 192.168.1.22: IPMI RMCPPLUS Payload:
  343. 192.168.1.22: ----------------------
  344. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[28B]
  345. 192.168.1.22: [ 26h 00h 00h 00h BCh 9Ah 8Eh 00h ]
  346. 192.168.1.22: [ A2h 69h CCh B6h 45h EEh 07h 85h ]
  347. 192.168.1.22: [ 7Eh 06h 4Fh E9h 20h 11h 25h 4Ch ]
  348. 192.168.1.22: [ 2Ah 02h 58h CFh ]
  349. 192.168.1.22: IPMI Command Data:
  350. 192.168.1.22: ------------------
  351. 192.168.1.22: [ 26h] = message_tag[ 8b]
  352. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  353. 192.168.1.22: [ 0h] = reserved1[16b]
  354. 192.168.1.22: [ 8E9ABCh] = managed_system_session_id[32b]
  355. 192.168.1.22: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  356. 192.168.1.22: [ A2h 69h CCh B6h 45h EEh 07h 85h ]
  357. 192.168.1.22: [ 7Eh 06h 4Fh E9h 20h 11h 25h 4Ch ]
  358. 192.168.1.22: [ 2Ah 02h 58h CFh ]
  359. 192.168.1.22: =====================================================
  360. 192.168.1.22: IPMI 2.0 RAKP Message 4 Response
  361. 192.168.1.22: =====================================================
  362. 192.168.1.22: RMCP Header:
  363. 192.168.1.22: ------------
  364. 192.168.1.22: [ 6h] = version[ 8b]
  365. 192.168.1.22: [ 0h] = reserved[ 8b]
  366. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  367. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  368. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  369. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  370. 192.168.1.22: IPMI RMCPPLUS Session Header:
  371. 192.168.1.22: -----------------------------
  372. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  373. 192.168.1.22: [ 0h] = reserved1[ 4b]
  374. 192.168.1.22: [ 15h] = payload_type[ 6b]
  375. 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
  376. 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
  377. 192.168.1.22: [ 0h] = session_id[32b]
  378. 192.168.1.22: [ 0h] = session_sequence_number[32b]
  379. 192.168.1.22: [ 14h] = ipmi_payload_len[16b]
  380. 192.168.1.22: IPMI RMCPPLUS Payload:
  381. 192.168.1.22: ----------------------
  382. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[20B]
  383. 192.168.1.22: [ 26h 00h 00h 00h 0Eh 88h AEh 3Ch ]
  384. 192.168.1.22: [ 7Ch EEh 17h C4h CBh CDh 0Bh B9h ]
  385. 192.168.1.22: [ CCh A0h 86h 86h ]
  386. 192.168.1.22: IPMI Command Data:
  387. 192.168.1.22: ------------------
  388. 192.168.1.22: [ 26h] = message_tag[ 8b]
  389. 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
  390. 192.168.1.22: [ 0h] = reserved1[16b]
  391. 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
  392. 192.168.1.22: [ BYTE ARRAY ... ] = integrity_check_value[12B]
  393. 192.168.1.22: [ 7Ch EEh 17h C4h CBh CDh 0Bh B9h ]
  394. 192.168.1.22: [ CCh A0h 86h 86h ]
  395. 192.168.1.22: =====================================================
  396. 192.168.1.22: IPMI 2.0 Set Session Privilege Level Request
  397. 192.168.1.22: =====================================================
  398. 192.168.1.22: RMCP Header:
  399. 192.168.1.22: ------------
  400. 192.168.1.22: [ 6h] = version[ 8b]
  401. 192.168.1.22: [ 0h] = reserved[ 8b]
  402. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  403. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  404. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  405. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  406. 192.168.1.22: IPMI RMCPPLUS Session Header:
  407. 192.168.1.22: -----------------------------
  408. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  409. 192.168.1.22: [ 0h] = reserved1[ 4b]
  410. 192.168.1.22: [ 0h] = payload_type[ 6b]
  411. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  412. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  413. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  414. 192.168.1.22: [ 1h] = session_sequence_number[32b]
  415. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  416. 192.168.1.22: IPMI RMCPPLUS Payload:
  417. 192.168.1.22: ----------------------
  418. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  419. 192.168.1.22: [ 45h ECh 67h 57h 32h E9h 74h E8h ]
  420. 192.168.1.22: [ 98h 69h B4h 2Ah C0h 99h D0h BBh ]
  421. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[ 8B]
  422. 192.168.1.22: [ 20h 18h C8h 81h 90h 3Bh 04h B0h ]
  423. 192.168.1.22: [ 707060504030201h] = confidentiality_trailer[64b]
  424. 192.168.1.22: IPMI Message Header:
  425. 192.168.1.22: --------------------
  426. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  427. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  428. 192.168.1.22: [ 6h] = net_fn[ 6b]
  429. 192.168.1.22: [ C8h] = checksum1[ 8b]
  430. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  431. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  432. 192.168.1.22: [ 24h] = rq_seq[ 6b]
  433. 192.168.1.22: IPMI Command Data:
  434. 192.168.1.22: ------------------
  435. 192.168.1.22: [ 3Bh] = cmd[ 8b]
  436. 192.168.1.22: [ 4h] = privilege_level[ 4b]
  437. 192.168.1.22: [ 0h] = reserved1[ 4b]
  438. 192.168.1.22: IPMI Trailer:
  439. 192.168.1.22: -------------
  440. 192.168.1.22: [ B0h] = checksum2[ 8b]
  441. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  442. 192.168.1.22: ------------------------------
  443. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  444. 192.168.1.22: [ 2h] = pad_length[ 8b]
  445. 192.168.1.22: [ 7h] = next_header[ 8b]
  446. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  447. 192.168.1.22: [ 03h A2h C7h FCh D2h C8h 24h 31h ]
  448. 192.168.1.22: [ 5Eh 53h 23h 6Eh ]
  449. 192.168.1.22: =====================================================
  450. 192.168.1.22: IPMI 2.0 Set Session Privilege Level Response
  451. 192.168.1.22: =====================================================
  452. 192.168.1.22: RMCP Header:
  453. 192.168.1.22: ------------
  454. 192.168.1.22: [ 6h] = version[ 8b]
  455. 192.168.1.22: [ 0h] = reserved[ 8b]
  456. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  457. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  458. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  459. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  460. 192.168.1.22: IPMI RMCPPLUS Session Header:
  461. 192.168.1.22: -----------------------------
  462. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  463. 192.168.1.22: [ 0h] = reserved1[ 4b]
  464. 192.168.1.22: [ 0h] = payload_type[ 6b]
  465. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  466. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  467. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  468. 192.168.1.22: [ 1h] = session_sequence_number[32b]
  469. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  470. 192.168.1.22: IPMI RMCPPLUS Payload:
  471. 192.168.1.22: ----------------------
  472. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  473. 192.168.1.22: [ BBh B7h CAh 33h 2Ah DCh 00h 5Fh ]
  474. 192.168.1.22: [ 4Ah 21h E6h BFh 47h 63h FDh DDh ]
  475. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[ 9B]
  476. 192.168.1.22: [ 81h 1Ch 63h 20h 90h 3Bh 00h 04h ]
  477. 192.168.1.22: [ 11h ]
  478. 192.168.1.22: [ 6060504030201h] = confidentiality_trailer[56b]
  479. 192.168.1.22: IPMI Message Header:
  480. 192.168.1.22: --------------------
  481. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  482. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  483. 192.168.1.22: [ 7h] = net_fn[ 6b]
  484. 192.168.1.22: [ 63h] = checksum1[ 8b]
  485. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  486. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  487. 192.168.1.22: [ 24h] = rq_seq[ 6b]
  488. 192.168.1.22: IPMI Command Data:
  489. 192.168.1.22: ------------------
  490. 192.168.1.22: [ 3Bh] = cmd[ 8b]
  491. 192.168.1.22: [ 0h] = comp_code[ 8b]
  492. 192.168.1.22: [ 4h] = privilege_level[ 4b]
  493. 192.168.1.22: [ 0h] = reserved1[ 4b]
  494. 192.168.1.22: IPMI Trailer:
  495. 192.168.1.22: -------------
  496. 192.168.1.22: [ 11h] = checksum2[ 8b]
  497. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  498. 192.168.1.22: ------------------------------
  499. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  500. 192.168.1.22: [ 2h] = pad_length[ 8b]
  501. 192.168.1.22: [ 7h] = next_header[ 8b]
  502. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  503. 192.168.1.22: [ 42h C7h B8h 4Fh D6h C4h 4Ah 67h ]
  504. 192.168.1.22: [ 2Ah C2h F5h 46h ]
  505. #
  506. # Section Chassis_Boot_Flags Comments
  507. #
  508. # The following configuration options are for configuring chassis boot behavior.
  509. # Please note that some fields may apply to all future boots while some may only
  510. # apply to the next system boot.
  511. #
  512. # "Boot_Flags_Persistent" determines if flags apply to the next boot only or all
  513. # future boots.
  514. #
  515. # "Boot_Device" allows the user to configure which device the BIOS should boot
  516. # off of. Most users may wish to select NO-OVERRIDE to select the configuration
  517. # currently determined by the BIOS. Note that the configuration value BIOS-SETUP
  518. # refers to booting *into* the BIOS Setup, not from it. FLOPPY may refer to any
  519. # type of removeable media. "Device_Instance_Selector" may be be used to select
  520. # a specific device instance for booting.
  521. #
  522. Section Chassis_Boot_Flags
  523. 192.168.1.22: =====================================================
  524. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  525. 192.168.1.22: =====================================================
  526. 192.168.1.22: RMCP Header:
  527. 192.168.1.22: ------------
  528. 192.168.1.22: [ 6h] = version[ 8b]
  529. 192.168.1.22: [ 0h] = reserved[ 8b]
  530. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  531. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  532. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  533. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  534. 192.168.1.22: IPMI RMCPPLUS Session Header:
  535. 192.168.1.22: -----------------------------
  536. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  537. 192.168.1.22: [ 0h] = reserved1[ 4b]
  538. 192.168.1.22: [ 0h] = payload_type[ 6b]
  539. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  540. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  541. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  542. 192.168.1.22: [ 2h] = session_sequence_number[32b]
  543. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  544. 192.168.1.22: IPMI RMCPPLUS Payload:
  545. 192.168.1.22: ----------------------
  546. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  547. 192.168.1.22: [ D2h 21h 8Eh 0Ah 42h EFh AAh 39h ]
  548. 192.168.1.22: [ 19h B4h 64h 1Ah FFh 18h 40h 04h ]
  549. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  550. 192.168.1.22: [ 20h 00h E0h 81h 94h 09h 05h 00h ]
  551. 192.168.1.22: [ 00h DDh ]
  552. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  553. 192.168.1.22: IPMI Message Header:
  554. 192.168.1.22: --------------------
  555. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  556. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  557. 192.168.1.22: [ 0h] = net_fn[ 6b]
  558. 192.168.1.22: [ E0h] = checksum1[ 8b]
  559. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  560. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  561. 192.168.1.22: [ 25h] = rq_seq[ 6b]
  562. 192.168.1.22: IPMI Command Data:
  563. 192.168.1.22: ------------------
  564. 192.168.1.22: [ 9h] = cmd[ 8b]
  565. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  566. 192.168.1.22: [ 0h] = reserved[ 1b]
  567. 192.168.1.22: [ 0h] = set_selector[ 8b]
  568. 192.168.1.22: [ 0h] = block_selector[ 8b]
  569. 192.168.1.22: IPMI Trailer:
  570. 192.168.1.22: -------------
  571. 192.168.1.22: [ DDh] = checksum2[ 8b]
  572. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  573. 192.168.1.22: ------------------------------
  574. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  575. 192.168.1.22: [ 2h] = pad_length[ 8b]
  576. 192.168.1.22: [ 7h] = next_header[ 8b]
  577. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  578. 192.168.1.22: [ 7Ch 25h E0h A5h 9Bh E5h 46h 30h ]
  579. 192.168.1.22: [ 2Ah B9h E2h 49h ]
  580. 192.168.1.22: =====================================================
  581. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  582. 192.168.1.22: =====================================================
  583. 192.168.1.22: RMCP Header:
  584. 192.168.1.22: ------------
  585. 192.168.1.22: [ 6h] = version[ 8b]
  586. 192.168.1.22: [ 0h] = reserved[ 8b]
  587. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  588. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  589. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  590. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  591. 192.168.1.22: IPMI RMCPPLUS Session Header:
  592. 192.168.1.22: -----------------------------
  593. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  594. 192.168.1.22: [ 0h] = reserved1[ 4b]
  595. 192.168.1.22: [ 0h] = payload_type[ 6b]
  596. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  597. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  598. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  599. 192.168.1.22: [ 2h] = session_sequence_number[32b]
  600. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  601. 192.168.1.22: IPMI RMCPPLUS Payload:
  602. 192.168.1.22: ----------------------
  603. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  604. 192.168.1.22: [ BCh AEh 3Ch 85h DAh 00h 4Dh 4Ch ]
  605. 192.168.1.22: [ 2Bh 6Ah 65h 6Bh 32h 79h D4h 8Ch ]
  606. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  607. 192.168.1.22: [ 81h 04h 7Bh 20h 94h 09h 00h 01h ]
  608. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  609. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  610. 192.168.1.22: [ 00h 00h 3Dh ]
  611. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  612. 192.168.1.22: IPMI Message Header:
  613. 192.168.1.22: --------------------
  614. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  615. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  616. 192.168.1.22: [ 1h] = net_fn[ 6b]
  617. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  618. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  619. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  620. 192.168.1.22: [ 25h] = rq_seq[ 6b]
  621. 192.168.1.22: IPMI Command Data:
  622. 192.168.1.22: ------------------
  623. 192.168.1.22: [ 9h] = cmd[ 8b]
  624. 192.168.1.22: [ 0h] = comp_code[ 8b]
  625. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  626. 192.168.1.22: [ 0h] = reserved[ 4b]
  627. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  628. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  629. 192.168.1.22: [ 0h] = reserved1[ 5b]
  630. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  631. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  632. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  633. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  634. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  635. 192.168.1.22: [ 0h] = boot_device[ 4b]
  636. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  637. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  638. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  639. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  640. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  641. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  642. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  643. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  644. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  645. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  646. 192.168.1.22: [ 0h] = reserved2[ 4b]
  647. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  648. 192.168.1.22: [ 0h] = reserved3[ 3b]
  649. 192.168.1.22: IPMI Trailer:
  650. 192.168.1.22: -------------
  651. 192.168.1.22: [ 0h] = checksum2[ 8b]
  652. 192.168.1.22: Payload Unexpected Data:
  653. 192.168.1.22: ------------------------
  654. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  655. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  656. 192.168.1.22: [ 00h 00h 00h 3Dh ]
  657. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  658. 192.168.1.22: ------------------------------
  659. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  660. 192.168.1.22: [ 2h] = pad_length[ 8b]
  661. 192.168.1.22: [ 7h] = next_header[ 8b]
  662. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  663. 192.168.1.22: [ EDh 74h AFh 68h 76h 69h D0h D6h ]
  664. 192.168.1.22: [ 88h 51h F4h 93h ]
  665. 192.168.1.22: =====================================================
  666. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  667. 192.168.1.22: =====================================================
  668. 192.168.1.22: RMCP Header:
  669. 192.168.1.22: ------------
  670. 192.168.1.22: [ 6h] = version[ 8b]
  671. 192.168.1.22: [ 0h] = reserved[ 8b]
  672. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  673. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  674. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  675. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  676. 192.168.1.22: IPMI RMCPPLUS Session Header:
  677. 192.168.1.22: -----------------------------
  678. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  679. 192.168.1.22: [ 0h] = reserved1[ 4b]
  680. 192.168.1.22: [ 0h] = payload_type[ 6b]
  681. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  682. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  683. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  684. 192.168.1.22: [ 3h] = session_sequence_number[32b]
  685. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  686. 192.168.1.22: IPMI RMCPPLUS Payload:
  687. 192.168.1.22: ----------------------
  688. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  689. 192.168.1.22: [ 6Fh 8Ch BCh 5Bh 26h 0Dh 3Fh 7Eh ]
  690. 192.168.1.22: [ A2h 75h 02h 62h 69h 77h B5h 17h ]
  691. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  692. 192.168.1.22: [ 20h 00h E0h 81h 98h 09h 05h 00h ]
  693. 192.168.1.22: [ 00h D9h ]
  694. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  695. 192.168.1.22: IPMI Message Header:
  696. 192.168.1.22: --------------------
  697. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  698. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  699. 192.168.1.22: [ 0h] = net_fn[ 6b]
  700. 192.168.1.22: [ E0h] = checksum1[ 8b]
  701. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  702. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  703. 192.168.1.22: [ 26h] = rq_seq[ 6b]
  704. 192.168.1.22: IPMI Command Data:
  705. 192.168.1.22: ------------------
  706. 192.168.1.22: [ 9h] = cmd[ 8b]
  707. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  708. 192.168.1.22: [ 0h] = reserved[ 1b]
  709. 192.168.1.22: [ 0h] = set_selector[ 8b]
  710. 192.168.1.22: [ 0h] = block_selector[ 8b]
  711. 192.168.1.22: IPMI Trailer:
  712. 192.168.1.22: -------------
  713. 192.168.1.22: [ D9h] = checksum2[ 8b]
  714. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  715. 192.168.1.22: ------------------------------
  716. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  717. 192.168.1.22: [ 2h] = pad_length[ 8b]
  718. 192.168.1.22: [ 7h] = next_header[ 8b]
  719. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  720. 192.168.1.22: [ 94h 35h 64h 74h B9h D0h 3Fh B7h ]
  721. 192.168.1.22: [ 7Fh C9h ECh 4Dh ]
  722. 192.168.1.22: =====================================================
  723. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  724. 192.168.1.22: =====================================================
  725. 192.168.1.22: RMCP Header:
  726. 192.168.1.22: ------------
  727. 192.168.1.22: [ 6h] = version[ 8b]
  728. 192.168.1.22: [ 0h] = reserved[ 8b]
  729. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  730. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  731. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  732. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  733. 192.168.1.22: IPMI RMCPPLUS Session Header:
  734. 192.168.1.22: -----------------------------
  735. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  736. 192.168.1.22: [ 0h] = reserved1[ 4b]
  737. 192.168.1.22: [ 0h] = payload_type[ 6b]
  738. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  739. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  740. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  741. 192.168.1.22: [ 3h] = session_sequence_number[32b]
  742. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  743. 192.168.1.22: IPMI RMCPPLUS Payload:
  744. 192.168.1.22: ----------------------
  745. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  746. 192.168.1.22: [ C6h 69h 2Bh 56h E1h BEh F7h 40h ]
  747. 192.168.1.22: [ BAh 2Eh 37h 30h 78h 7Bh A2h E3h ]
  748. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  749. 192.168.1.22: [ 81h 04h 7Bh 20h 98h 09h 00h 01h ]
  750. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  751. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  752. 192.168.1.22: [ 00h 00h 39h ]
  753. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  754. 192.168.1.22: IPMI Message Header:
  755. 192.168.1.22: --------------------
  756. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  757. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  758. 192.168.1.22: [ 1h] = net_fn[ 6b]
  759. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  760. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  761. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  762. 192.168.1.22: [ 26h] = rq_seq[ 6b]
  763. 192.168.1.22: IPMI Command Data:
  764. 192.168.1.22: ------------------
  765. 192.168.1.22: [ 9h] = cmd[ 8b]
  766. 192.168.1.22: [ 0h] = comp_code[ 8b]
  767. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  768. 192.168.1.22: [ 0h] = reserved[ 4b]
  769. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  770. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  771. 192.168.1.22: [ 0h] = reserved1[ 5b]
  772. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  773. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  774. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  775. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  776. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  777. 192.168.1.22: [ 0h] = boot_device[ 4b]
  778. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  779. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  780. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  781. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  782. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  783. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  784. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  785. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  786. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  787. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  788. 192.168.1.22: [ 0h] = reserved2[ 4b]
  789. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  790. 192.168.1.22: [ 0h] = reserved3[ 3b]
  791. 192.168.1.22: IPMI Trailer:
  792. 192.168.1.22: -------------
  793. 192.168.1.22: [ 0h] = checksum2[ 8b]
  794. 192.168.1.22: Payload Unexpected Data:
  795. 192.168.1.22: ------------------------
  796. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  797. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  798. 192.168.1.22: [ 00h 00h 00h 39h ]
  799. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  800. 192.168.1.22: ------------------------------
  801. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  802. 192.168.1.22: [ 2h] = pad_length[ 8b]
  803. 192.168.1.22: [ 7h] = next_header[ 8b]
  804. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  805. 192.168.1.22: [ 5Dh 34h E1h 63h B1h 56h 64h 19h ]
  806. 192.168.1.22: [ C3h B9h 15h 35h ]
  807. 192.168.1.22: =====================================================
  808. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  809. 192.168.1.22: =====================================================
  810. 192.168.1.22: RMCP Header:
  811. 192.168.1.22: ------------
  812. 192.168.1.22: [ 6h] = version[ 8b]
  813. 192.168.1.22: [ 0h] = reserved[ 8b]
  814. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  815. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  816. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  817. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  818. 192.168.1.22: IPMI RMCPPLUS Session Header:
  819. 192.168.1.22: -----------------------------
  820. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  821. 192.168.1.22: [ 0h] = reserved1[ 4b]
  822. 192.168.1.22: [ 0h] = payload_type[ 6b]
  823. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  824. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  825. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  826. 192.168.1.22: [ 4h] = session_sequence_number[32b]
  827. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  828. 192.168.1.22: IPMI RMCPPLUS Payload:
  829. 192.168.1.22: ----------------------
  830. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  831. 192.168.1.22: [ F7h 0Fh 8Ah 20h 13h F1h E8h 05h ]
  832. 192.168.1.22: [ A6h C9h 2Ah B3h 6Fh 7Eh C9h 5Fh ]
  833. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  834. 192.168.1.22: [ 20h 00h E0h 81h 9Ch 09h 05h 00h ]
  835. 192.168.1.22: [ 00h D5h ]
  836. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  837. 192.168.1.22: IPMI Message Header:
  838. 192.168.1.22: --------------------
  839. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  840. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  841. 192.168.1.22: [ 0h] = net_fn[ 6b]
  842. 192.168.1.22: [ E0h] = checksum1[ 8b]
  843. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  844. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  845. 192.168.1.22: [ 27h] = rq_seq[ 6b]
  846. 192.168.1.22: IPMI Command Data:
  847. 192.168.1.22: ------------------
  848. 192.168.1.22: [ 9h] = cmd[ 8b]
  849. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  850. 192.168.1.22: [ 0h] = reserved[ 1b]
  851. 192.168.1.22: [ 0h] = set_selector[ 8b]
  852. 192.168.1.22: [ 0h] = block_selector[ 8b]
  853. 192.168.1.22: IPMI Trailer:
  854. 192.168.1.22: -------------
  855. 192.168.1.22: [ D5h] = checksum2[ 8b]
  856. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  857. 192.168.1.22: ------------------------------
  858. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  859. 192.168.1.22: [ 2h] = pad_length[ 8b]
  860. 192.168.1.22: [ 7h] = next_header[ 8b]
  861. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  862. 192.168.1.22: [ 57h 91h 5Dh 02h 48h C4h 2Bh 06h ]
  863. 192.168.1.22: [ CAh 4Ch 24h 2Fh ]
  864. 192.168.1.22: =====================================================
  865. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  866. 192.168.1.22: =====================================================
  867. 192.168.1.22: RMCP Header:
  868. 192.168.1.22: ------------
  869. 192.168.1.22: [ 6h] = version[ 8b]
  870. 192.168.1.22: [ 0h] = reserved[ 8b]
  871. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  872. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  873. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  874. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  875. 192.168.1.22: IPMI RMCPPLUS Session Header:
  876. 192.168.1.22: -----------------------------
  877. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  878. 192.168.1.22: [ 0h] = reserved1[ 4b]
  879. 192.168.1.22: [ 0h] = payload_type[ 6b]
  880. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  881. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  882. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  883. 192.168.1.22: [ 4h] = session_sequence_number[32b]
  884. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  885. 192.168.1.22: IPMI RMCPPLUS Payload:
  886. 192.168.1.22: ----------------------
  887. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  888. 192.168.1.22: [ D2h 56h 06h 04h 7Bh 28h 4Ch 3Fh ]
  889. 192.168.1.22: [ 4Eh 31h 09h A1h 92h AEh DFh 9Ah ]
  890. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  891. 192.168.1.22: [ 81h 04h 7Bh 20h 9Ch 09h 00h 01h ]
  892. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  893. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  894. 192.168.1.22: [ 00h 00h 35h ]
  895. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  896. 192.168.1.22: IPMI Message Header:
  897. 192.168.1.22: --------------------
  898. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  899. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  900. 192.168.1.22: [ 1h] = net_fn[ 6b]
  901. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  902. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  903. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  904. 192.168.1.22: [ 27h] = rq_seq[ 6b]
  905. 192.168.1.22: IPMI Command Data:
  906. 192.168.1.22: ------------------
  907. 192.168.1.22: [ 9h] = cmd[ 8b]
  908. 192.168.1.22: [ 0h] = comp_code[ 8b]
  909. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  910. 192.168.1.22: [ 0h] = reserved[ 4b]
  911. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  912. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  913. 192.168.1.22: [ 0h] = reserved1[ 5b]
  914. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  915. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  916. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  917. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  918. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  919. 192.168.1.22: [ 0h] = boot_device[ 4b]
  920. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  921. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  922. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  923. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  924. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  925. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  926. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  927. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  928. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  929. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  930. 192.168.1.22: [ 0h] = reserved2[ 4b]
  931. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  932. 192.168.1.22: [ 0h] = reserved3[ 3b]
  933. 192.168.1.22: IPMI Trailer:
  934. 192.168.1.22: -------------
  935. 192.168.1.22: [ 0h] = checksum2[ 8b]
  936. 192.168.1.22: Payload Unexpected Data:
  937. 192.168.1.22: ------------------------
  938. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  939. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  940. 192.168.1.22: [ 00h 00h 00h 35h ]
  941. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  942. 192.168.1.22: ------------------------------
  943. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  944. 192.168.1.22: [ 2h] = pad_length[ 8b]
  945. 192.168.1.22: [ 7h] = next_header[ 8b]
  946. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  947. 192.168.1.22: [ A0h 67h 7Eh 3Ah 99h 64h 79h 01h ]
  948. 192.168.1.22: [ C4h 1Dh 62h B5h ]
  949. 192.168.1.22: =====================================================
  950. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  951. 192.168.1.22: =====================================================
  952. 192.168.1.22: RMCP Header:
  953. 192.168.1.22: ------------
  954. 192.168.1.22: [ 6h] = version[ 8b]
  955. 192.168.1.22: [ 0h] = reserved[ 8b]
  956. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  957. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  958. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  959. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  960. 192.168.1.22: IPMI RMCPPLUS Session Header:
  961. 192.168.1.22: -----------------------------
  962. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  963. 192.168.1.22: [ 0h] = reserved1[ 4b]
  964. 192.168.1.22: [ 0h] = payload_type[ 6b]
  965. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  966. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  967. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  968. 192.168.1.22: [ 5h] = session_sequence_number[32b]
  969. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  970. 192.168.1.22: IPMI RMCPPLUS Payload:
  971. 192.168.1.22: ----------------------
  972. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  973. 192.168.1.22: [ 83h 8Bh FFh F2h 18h EDh 02h C0h ]
  974. 192.168.1.22: [ B4h 69h FAh 3Fh 89h 27h 5Ch 78h ]
  975. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  976. 192.168.1.22: [ 20h 00h E0h 81h A0h 09h 05h 00h ]
  977. 192.168.1.22: [ 00h D1h ]
  978. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  979. 192.168.1.22: IPMI Message Header:
  980. 192.168.1.22: --------------------
  981. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  982. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  983. 192.168.1.22: [ 0h] = net_fn[ 6b]
  984. 192.168.1.22: [ E0h] = checksum1[ 8b]
  985. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  986. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  987. 192.168.1.22: [ 28h] = rq_seq[ 6b]
  988. 192.168.1.22: IPMI Command Data:
  989. 192.168.1.22: ------------------
  990. 192.168.1.22: [ 9h] = cmd[ 8b]
  991. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  992. 192.168.1.22: [ 0h] = reserved[ 1b]
  993. 192.168.1.22: [ 0h] = set_selector[ 8b]
  994. 192.168.1.22: [ 0h] = block_selector[ 8b]
  995. 192.168.1.22: IPMI Trailer:
  996. 192.168.1.22: -------------
  997. 192.168.1.22: [ D1h] = checksum2[ 8b]
  998. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  999. 192.168.1.22: ------------------------------
  1000. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1001. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1002. 192.168.1.22: [ 7h] = next_header[ 8b]
  1003. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1004. 192.168.1.22: [ 2Ch A7h 2Bh F6h 5Eh 70h BDh 16h ]
  1005. 192.168.1.22: [ A3h A6h 2Ch 7Ch ]
  1006. 192.168.1.22: =====================================================
  1007. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1008. 192.168.1.22: =====================================================
  1009. 192.168.1.22: RMCP Header:
  1010. 192.168.1.22: ------------
  1011. 192.168.1.22: [ 6h] = version[ 8b]
  1012. 192.168.1.22: [ 0h] = reserved[ 8b]
  1013. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1014. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1015. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1016. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1017. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1018. 192.168.1.22: -----------------------------
  1019. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1020. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1021. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1022. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1023. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1024. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  1025. 192.168.1.22: [ 5h] = session_sequence_number[32b]
  1026. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1027. 192.168.1.22: IPMI RMCPPLUS Payload:
  1028. 192.168.1.22: ----------------------
  1029. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1030. 192.168.1.22: [ B2h A0h 77h C8h 28h 60h DEh 7Ah ]
  1031. 192.168.1.22: [ 3Eh AFh 4Eh 37h 9Ch 30h 58h 80h ]
  1032. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1033. 192.168.1.22: [ 81h 04h 7Bh 20h A0h 09h 00h 01h ]
  1034. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1035. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1036. 192.168.1.22: [ 00h 00h 31h ]
  1037. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1038. 192.168.1.22: IPMI Message Header:
  1039. 192.168.1.22: --------------------
  1040. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1041. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1042. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1043. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1044. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1045. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1046. 192.168.1.22: [ 28h] = rq_seq[ 6b]
  1047. 192.168.1.22: IPMI Command Data:
  1048. 192.168.1.22: ------------------
  1049. 192.168.1.22: [ 9h] = cmd[ 8b]
  1050. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1051. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1052. 192.168.1.22: [ 0h] = reserved[ 4b]
  1053. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1054. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1055. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1056. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1057. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1058. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1059. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1060. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1061. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1062. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1063. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1064. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1065. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1066. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1067. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1068. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1069. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1070. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1071. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1072. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1073. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1074. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1075. 192.168.1.22: IPMI Trailer:
  1076. 192.168.1.22: -------------
  1077. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1078. 192.168.1.22: Payload Unexpected Data:
  1079. 192.168.1.22: ------------------------
  1080. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1081. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1082. 192.168.1.22: [ 00h 00h 00h 31h ]
  1083. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1084. 192.168.1.22: ------------------------------
  1085. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1086. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1087. 192.168.1.22: [ 7h] = next_header[ 8b]
  1088. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1089. 192.168.1.22: [ 62h BEh 40h 25h F0h DEh A4h 3Fh ]
  1090. 192.168.1.22: [ 55h 3Dh 88h 17h ]
  1091. 192.168.1.22: =====================================================
  1092. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1093. 192.168.1.22: =====================================================
  1094. 192.168.1.22: RMCP Header:
  1095. 192.168.1.22: ------------
  1096. 192.168.1.22: [ 6h] = version[ 8b]
  1097. 192.168.1.22: [ 0h] = reserved[ 8b]
  1098. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1099. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1100. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1101. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1102. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1103. 192.168.1.22: -----------------------------
  1104. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1105. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1106. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1107. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1108. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1109. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  1110. 192.168.1.22: [ 6h] = session_sequence_number[32b]
  1111. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1112. 192.168.1.22: IPMI RMCPPLUS Payload:
  1113. 192.168.1.22: ----------------------
  1114. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1115. 192.168.1.22: [ 78h D7h C0h 3Eh 28h 4Ch 11h 70h ]
  1116. 192.168.1.22: [ B7h 11h D0h D0h F7h 6Eh 49h 57h ]
  1117. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1118. 192.168.1.22: [ 20h 00h E0h 81h A4h 09h 05h 00h ]
  1119. 192.168.1.22: [ 00h CDh ]
  1120. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1121. 192.168.1.22: IPMI Message Header:
  1122. 192.168.1.22: --------------------
  1123. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1124. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1125. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1126. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1127. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1128. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1129. 192.168.1.22: [ 29h] = rq_seq[ 6b]
  1130. 192.168.1.22: IPMI Command Data:
  1131. 192.168.1.22: ------------------
  1132. 192.168.1.22: [ 9h] = cmd[ 8b]
  1133. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1134. 192.168.1.22: [ 0h] = reserved[ 1b]
  1135. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1136. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1137. 192.168.1.22: IPMI Trailer:
  1138. 192.168.1.22: -------------
  1139. 192.168.1.22: [ CDh] = checksum2[ 8b]
  1140. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1141. 192.168.1.22: ------------------------------
  1142. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1143. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1144. 192.168.1.22: [ 7h] = next_header[ 8b]
  1145. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1146. 192.168.1.22: [ 5Eh E4h A8h 78h 34h 07h 12h ADh ]
  1147. 192.168.1.22: [ 98h EEh C8h 5Dh ]
  1148. 192.168.1.22: =====================================================
  1149. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1150. 192.168.1.22: =====================================================
  1151. 192.168.1.22: RMCP Header:
  1152. 192.168.1.22: ------------
  1153. 192.168.1.22: [ 6h] = version[ 8b]
  1154. 192.168.1.22: [ 0h] = reserved[ 8b]
  1155. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1156. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1157. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1158. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1159. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1160. 192.168.1.22: -----------------------------
  1161. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1162. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1163. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1164. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1165. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1166. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  1167. 192.168.1.22: [ 6h] = session_sequence_number[32b]
  1168. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1169. 192.168.1.22: IPMI RMCPPLUS Payload:
  1170. 192.168.1.22: ----------------------
  1171. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1172. 192.168.1.22: [ 51h 68h BDh 35h 03h D7h 6Eh 02h ]
  1173. 192.168.1.22: [ E9h 2Fh 56h DFh 52h B4h 03h 5Eh ]
  1174. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1175. 192.168.1.22: [ 81h 04h 7Bh 20h A4h 09h 00h 01h ]
  1176. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1177. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1178. 192.168.1.22: [ 00h 00h 2Dh ]
  1179. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1180. 192.168.1.22: IPMI Message Header:
  1181. 192.168.1.22: --------------------
  1182. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1183. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1184. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1185. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1186. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1187. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1188. 192.168.1.22: [ 29h] = rq_seq[ 6b]
  1189. 192.168.1.22: IPMI Command Data:
  1190. 192.168.1.22: ------------------
  1191. 192.168.1.22: [ 9h] = cmd[ 8b]
  1192. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1193. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1194. 192.168.1.22: [ 0h] = reserved[ 4b]
  1195. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1196. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1197. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1198. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1199. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1200. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1201. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1202. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1203. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1204. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1205. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1206. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1207. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1208. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1209. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1210. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1211. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1212. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1213. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1214. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1215. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1216. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1217. 192.168.1.22: IPMI Trailer:
  1218. 192.168.1.22: -------------
  1219. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1220. 192.168.1.22: Payload Unexpected Data:
  1221. 192.168.1.22: ------------------------
  1222. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1223. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1224. 192.168.1.22: [ 00h 00h 00h 2Dh ]
  1225. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1226. 192.168.1.22: ------------------------------
  1227. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1228. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1229. 192.168.1.22: [ 7h] = next_header[ 8b]
  1230. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1231. 192.168.1.22: [ 7Fh BCh A9h 0Eh FDh 09h B2h D1h ]
  1232. 192.168.1.22: [ 84h E1h 17h 71h ]
  1233. 192.168.1.22: =====================================================
  1234. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1235. 192.168.1.22: =====================================================
  1236. 192.168.1.22: RMCP Header:
  1237. 192.168.1.22: ------------
  1238. 192.168.1.22: [ 6h] = version[ 8b]
  1239. 192.168.1.22: [ 0h] = reserved[ 8b]
  1240. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1241. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1242. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1243. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1244. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1245. 192.168.1.22: -----------------------------
  1246. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1247. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1248. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1249. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1250. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1251. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  1252. 192.168.1.22: [ 7h] = session_sequence_number[32b]
  1253. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1254. 192.168.1.22: IPMI RMCPPLUS Payload:
  1255. 192.168.1.22: ----------------------
  1256. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1257. 192.168.1.22: [ E9h F4h 4Ch 54h 53h 0Eh 7Ch 44h ]
  1258. 192.168.1.22: [ A1h 52h B7h 17h 5Eh 69h 64h B7h ]
  1259. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1260. 192.168.1.22: [ 20h 00h E0h 81h A8h 09h 05h 00h ]
  1261. 192.168.1.22: [ 00h C9h ]
  1262. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1263. 192.168.1.22: IPMI Message Header:
  1264. 192.168.1.22: --------------------
  1265. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1266. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1267. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1268. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1269. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1270. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1271. 192.168.1.22: [ 2Ah] = rq_seq[ 6b]
  1272. 192.168.1.22: IPMI Command Data:
  1273. 192.168.1.22: ------------------
  1274. 192.168.1.22: [ 9h] = cmd[ 8b]
  1275. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1276. 192.168.1.22: [ 0h] = reserved[ 1b]
  1277. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1278. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1279. 192.168.1.22: IPMI Trailer:
  1280. 192.168.1.22: -------------
  1281. 192.168.1.22: [ C9h] = checksum2[ 8b]
  1282. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1283. 192.168.1.22: ------------------------------
  1284. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1285. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1286. 192.168.1.22: [ 7h] = next_header[ 8b]
  1287. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1288. 192.168.1.22: [ C1h A8h 01h 70h A8h CEh F1h BBh ]
  1289. 192.168.1.22: [ 95h FDh 35h 7Ah ]
  1290. 192.168.1.22: =====================================================
  1291. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1292. 192.168.1.22: =====================================================
  1293. 192.168.1.22: RMCP Header:
  1294. 192.168.1.22: ------------
  1295. 192.168.1.22: [ 6h] = version[ 8b]
  1296. 192.168.1.22: [ 0h] = reserved[ 8b]
  1297. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1298. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1299. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1300. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1301. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1302. 192.168.1.22: -----------------------------
  1303. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1304. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1305. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1306. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1307. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1308. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  1309. 192.168.1.22: [ 7h] = session_sequence_number[32b]
  1310. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1311. 192.168.1.22: IPMI RMCPPLUS Payload:
  1312. 192.168.1.22: ----------------------
  1313. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1314. 192.168.1.22: [ D3h C8h 06h 3Ah 2Dh BDh AFh 6Fh ]
  1315. 192.168.1.22: [ B5h 28h 6Bh C1h 63h 16h 6Ch 82h ]
  1316. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1317. 192.168.1.22: [ 81h 04h 7Bh 20h A8h 09h 00h 01h ]
  1318. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1319. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1320. 192.168.1.22: [ 00h 00h 29h ]
  1321. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1322. 192.168.1.22: IPMI Message Header:
  1323. 192.168.1.22: --------------------
  1324. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1325. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1326. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1327. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1328. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1329. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1330. 192.168.1.22: [ 2Ah] = rq_seq[ 6b]
  1331. 192.168.1.22: IPMI Command Data:
  1332. 192.168.1.22: ------------------
  1333. 192.168.1.22: [ 9h] = cmd[ 8b]
  1334. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1335. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1336. 192.168.1.22: [ 0h] = reserved[ 4b]
  1337. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1338. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1339. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1340. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1341. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1342. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1343. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1344. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1345. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1346. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1347. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1348. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1349. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1350. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1351. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1352. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1353. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1354. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1355. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1356. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1357. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1358. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1359. 192.168.1.22: IPMI Trailer:
  1360. 192.168.1.22: -------------
  1361. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1362. 192.168.1.22: Payload Unexpected Data:
  1363. 192.168.1.22: ------------------------
  1364. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1365. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1366. 192.168.1.22: [ 00h 00h 00h 29h ]
  1367. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1368. 192.168.1.22: ------------------------------
  1369. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1370. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1371. 192.168.1.22: [ 7h] = next_header[ 8b]
  1372. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1373. 192.168.1.22: [ 02h D8h 0Ch 2Ch 65h BCh 24h A9h ]
  1374. 192.168.1.22: [ DEh ABh 7Bh 31h ]
  1375. 192.168.1.22: =====================================================
  1376. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1377. 192.168.1.22: =====================================================
  1378. 192.168.1.22: RMCP Header:
  1379. 192.168.1.22: ------------
  1380. 192.168.1.22: [ 6h] = version[ 8b]
  1381. 192.168.1.22: [ 0h] = reserved[ 8b]
  1382. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1383. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1384. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1385. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1386. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1387. 192.168.1.22: -----------------------------
  1388. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1389. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1390. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1391. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1392. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1393. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  1394. 192.168.1.22: [ 8h] = session_sequence_number[32b]
  1395. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1396. 192.168.1.22: IPMI RMCPPLUS Payload:
  1397. 192.168.1.22: ----------------------
  1398. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1399. 192.168.1.22: [ 84h 11h C8h 68h 54h 1Ch A9h 28h ]
  1400. 192.168.1.22: [ E4h 20h 79h 82h 5Ch B9h 65h 34h ]
  1401. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1402. 192.168.1.22: [ 20h 00h E0h 81h ACh 09h 05h 00h ]
  1403. 192.168.1.22: [ 00h C5h ]
  1404. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1405. 192.168.1.22: IPMI Message Header:
  1406. 192.168.1.22: --------------------
  1407. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1408. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1409. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1410. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1411. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1412. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1413. 192.168.1.22: [ 2Bh] = rq_seq[ 6b]
  1414. 192.168.1.22: IPMI Command Data:
  1415. 192.168.1.22: ------------------
  1416. 192.168.1.22: [ 9h] = cmd[ 8b]
  1417. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1418. 192.168.1.22: [ 0h] = reserved[ 1b]
  1419. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1420. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1421. 192.168.1.22: IPMI Trailer:
  1422. 192.168.1.22: -------------
  1423. 192.168.1.22: [ C5h] = checksum2[ 8b]
  1424. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1425. 192.168.1.22: ------------------------------
  1426. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1427. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1428. 192.168.1.22: [ 7h] = next_header[ 8b]
  1429. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1430. 192.168.1.22: [ 41h C6h 9Dh 71h 79h 3Fh 44h 0Ch ]
  1431. 192.168.1.22: [ 8Eh 4Ah 1Ah FDh ]
  1432. 192.168.1.22: =====================================================
  1433. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1434. 192.168.1.22: =====================================================
  1435. 192.168.1.22: RMCP Header:
  1436. 192.168.1.22: ------------
  1437. 192.168.1.22: [ 6h] = version[ 8b]
  1438. 192.168.1.22: [ 0h] = reserved[ 8b]
  1439. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1440. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1441. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1442. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1443. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1444. 192.168.1.22: -----------------------------
  1445. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1446. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1447. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1448. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1449. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1450. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  1451. 192.168.1.22: [ 8h] = session_sequence_number[32b]
  1452. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1453. 192.168.1.22: IPMI RMCPPLUS Payload:
  1454. 192.168.1.22: ----------------------
  1455. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1456. 192.168.1.22: [ 88h F7h 7Fh 4Ch B8h 83h 2Ah E8h ]
  1457. 192.168.1.22: [ F7h B7h 0Fh 04h 02h 3Dh 59h 14h ]
  1458. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1459. 192.168.1.22: [ 81h 04h 7Bh 20h ACh 09h 00h 01h ]
  1460. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1461. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1462. 192.168.1.22: [ 00h 00h 25h ]
  1463. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1464. 192.168.1.22: IPMI Message Header:
  1465. 192.168.1.22: --------------------
  1466. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1467. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1468. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1469. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1470. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1471. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1472. 192.168.1.22: [ 2Bh] = rq_seq[ 6b]
  1473. 192.168.1.22: IPMI Command Data:
  1474. 192.168.1.22: ------------------
  1475. 192.168.1.22: [ 9h] = cmd[ 8b]
  1476. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1477. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1478. 192.168.1.22: [ 0h] = reserved[ 4b]
  1479. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1480. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1481. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1482. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1483. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1484. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1485. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1486. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1487. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1488. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1489. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1490. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1491. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1492. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1493. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1494. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1495. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1496. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1497. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1498. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1499. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1500. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1501. 192.168.1.22: IPMI Trailer:
  1502. 192.168.1.22: -------------
  1503. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1504. 192.168.1.22: Payload Unexpected Data:
  1505. 192.168.1.22: ------------------------
  1506. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1507. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1508. 192.168.1.22: [ 00h 00h 00h 25h ]
  1509. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1510. 192.168.1.22: ------------------------------
  1511. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1512. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1513. 192.168.1.22: [ 7h] = next_header[ 8b]
  1514. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1515. 192.168.1.22: [ FAh F4h B4h 1Eh C8h 86h F8h A5h ]
  1516. 192.168.1.22: [ E2h 57h 77h 7Dh ]
  1517. 192.168.1.22: =====================================================
  1518. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1519. 192.168.1.22: =====================================================
  1520. 192.168.1.22: RMCP Header:
  1521. 192.168.1.22: ------------
  1522. 192.168.1.22: [ 6h] = version[ 8b]
  1523. 192.168.1.22: [ 0h] = reserved[ 8b]
  1524. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1525. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1526. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1527. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1528. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1529. 192.168.1.22: -----------------------------
  1530. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1531. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1532. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1533. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1534. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1535. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  1536. 192.168.1.22: [ 9h] = session_sequence_number[32b]
  1537. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1538. 192.168.1.22: IPMI RMCPPLUS Payload:
  1539. 192.168.1.22: ----------------------
  1540. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1541. 192.168.1.22: [ 52h 25h 9Bh 3Ch 9Eh B6h 4Bh 9Bh ]
  1542. 192.168.1.22: [ 5Ch 3Bh FBh 0Bh FCh 9Fh 52h 9Bh ]
  1543. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1544. 192.168.1.22: [ 20h 00h E0h 81h B0h 09h 05h 00h ]
  1545. 192.168.1.22: [ 00h C1h ]
  1546. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1547. 192.168.1.22: IPMI Message Header:
  1548. 192.168.1.22: --------------------
  1549. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1550. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1551. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1552. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1553. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1554. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1555. 192.168.1.22: [ 2Ch] = rq_seq[ 6b]
  1556. 192.168.1.22: IPMI Command Data:
  1557. 192.168.1.22: ------------------
  1558. 192.168.1.22: [ 9h] = cmd[ 8b]
  1559. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1560. 192.168.1.22: [ 0h] = reserved[ 1b]
  1561. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1562. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1563. 192.168.1.22: IPMI Trailer:
  1564. 192.168.1.22: -------------
  1565. 192.168.1.22: [ C1h] = checksum2[ 8b]
  1566. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1567. 192.168.1.22: ------------------------------
  1568. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1569. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1570. 192.168.1.22: [ 7h] = next_header[ 8b]
  1571. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1572. 192.168.1.22: [ F2h 3Ah B4h 3Ch 8Ch D5h CCh DBh ]
  1573. 192.168.1.22: [ 80h D6h 2Ch 97h ]
  1574. 192.168.1.22: =====================================================
  1575. 192.168.1.22: IPMI 2.0 Get System Boot Options Response
  1576. 192.168.1.22: =====================================================
  1577. 192.168.1.22: RMCP Header:
  1578. 192.168.1.22: ------------
  1579. 192.168.1.22: [ 6h] = version[ 8b]
  1580. 192.168.1.22: [ 0h] = reserved[ 8b]
  1581. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1582. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1583. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1584. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1585. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1586. 192.168.1.22: -----------------------------
  1587. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1588. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1589. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1590. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1591. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1592. 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
  1593. 192.168.1.22: [ 9h] = session_sequence_number[32b]
  1594. 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
  1595. 192.168.1.22: IPMI RMCPPLUS Payload:
  1596. 192.168.1.22: ----------------------
  1597. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1598. 192.168.1.22: [ D9h 94h 3Dh 22h E1h F3h 57h 0Bh ]
  1599. 192.168.1.22: [ 13h 60h BEh 16h 83h E7h D2h 79h ]
  1600. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
  1601. 192.168.1.22: [ 81h 04h 7Bh 20h B0h 09h 00h 01h ]
  1602. 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1603. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1604. 192.168.1.22: [ 00h 00h 21h ]
  1605. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1606. 192.168.1.22: IPMI Message Header:
  1607. 192.168.1.22: --------------------
  1608. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1609. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1610. 192.168.1.22: [ 1h] = net_fn[ 6b]
  1611. 192.168.1.22: [ 7Bh] = checksum1[ 8b]
  1612. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1613. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1614. 192.168.1.22: [ 2Ch] = rq_seq[ 6b]
  1615. 192.168.1.22: IPMI Command Data:
  1616. 192.168.1.22: ------------------
  1617. 192.168.1.22: [ 9h] = cmd[ 8b]
  1618. 192.168.1.22: [ 0h] = comp_code[ 8b]
  1619. 192.168.1.22: [ 1h] = parameter_version[ 4b]
  1620. 192.168.1.22: [ 0h] = reserved[ 4b]
  1621. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1622. 192.168.1.22: [ 0h] = parameter_valid[ 1b]
  1623. 192.168.1.22: [ 0h] = reserved1[ 5b]
  1624. 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
  1625. 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
  1626. 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
  1627. 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
  1628. 192.168.1.22: [ 0h] = screen_blank[ 1b]
  1629. 192.168.1.22: [ 0h] = boot_device[ 4b]
  1630. 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
  1631. 192.168.1.22: [ 0h] = cmos_clear[ 1b]
  1632. 192.168.1.22: [ 0h] = console_redirection[ 2b]
  1633. 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
  1634. 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
  1635. 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
  1636. 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
  1637. 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
  1638. 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
  1639. 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
  1640. 192.168.1.22: [ 0h] = reserved2[ 4b]
  1641. 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
  1642. 192.168.1.22: [ 0h] = reserved3[ 3b]
  1643. 192.168.1.22: IPMI Trailer:
  1644. 192.168.1.22: -------------
  1645. 192.168.1.22: [ 0h] = checksum2[ 8b]
  1646. 192.168.1.22: Payload Unexpected Data:
  1647. 192.168.1.22: ------------------------
  1648. 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1649. 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1650. 192.168.1.22: [ 00h 00h 00h 21h ]
  1651. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1652. 192.168.1.22: ------------------------------
  1653. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1654. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1655. 192.168.1.22: [ 7h] = next_header[ 8b]
  1656. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1657. 192.168.1.22: [ 3Dh E1h 23h AEh FFh FAh 8Ah 8Ch ]
  1658. 192.168.1.22: [ F0h 69h 96h BBh ]
  1659. 192.168.1.22: =====================================================
  1660. 192.168.1.22: IPMI 2.0 Get System Boot Options Request
  1661. 192.168.1.22: =====================================================
  1662. 192.168.1.22: RMCP Header:
  1663. 192.168.1.22: ------------
  1664. 192.168.1.22: [ 6h] = version[ 8b]
  1665. 192.168.1.22: [ 0h] = reserved[ 8b]
  1666. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1667. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1668. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1669. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1670. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1671. 192.168.1.22: -----------------------------
  1672. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1673. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1674. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1675. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1676. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1677. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  1678. 192.168.1.22: [ Ah] = session_sequence_number[32b]
  1679. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1680. 192.168.1.22: IPMI RMCPPLUS Payload:
  1681. 192.168.1.22: ----------------------
  1682. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1683. 192.168.1.22: [ DCh CFh FAh 7Eh D1h 4Fh 7Dh 10h ]
  1684. 192.168.1.22: [ C9h FDh B0h CFh C8h 33h F4h 4Dh ]
  1685. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
  1686. 192.168.1.22: [ 20h 00h E0h 81h B4h 09h 05h 00h ]
  1687. 192.168.1.22: [ 00h BDh ]
  1688. 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
  1689. 192.168.1.22: IPMI Message Header:
  1690. 192.168.1.22: --------------------
  1691. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1692. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1693. 192.168.1.22: [ 0h] = net_fn[ 6b]
  1694. 192.168.1.22: [ E0h] = checksum1[ 8b]
  1695. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1696. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1697. 192.168.1.22: [ 2Dh] = rq_seq[ 6b]
  1698. 192.168.1.22: IPMI Command Data:
  1699. 192.168.1.22: ------------------
  1700. 192.168.1.22: [ 9h] = cmd[ 8b]
  1701. 192.168.1.22: [ 5h] = parameter_selector[ 7b]
  1702. 192.168.1.22: [ 0h] = reserved[ 1b]
  1703. 192.168.1.22: [ 0h] = set_selector[ 8b]
  1704. 192.168.1.22: [ 0h] = block_selector[ 8b]
  1705. 192.168.1.22: IPMI Trailer:
  1706. 192.168.1.22: -------------
  1707. 192.168.1.22: [ BDh] = checksum2[ 8b]
  1708. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1709. 192.168.1.22: ------------------------------
  1710. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1711. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1712. 192.168.1.22: [ 7h] = next_header[ 8b]
  1713. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1714. 192.168.1.22: [ C5h CEh FAh FEh 1Bh 28h 22h BEh ]
  1715. 192.168.1.22: [ AAh 98h 8Bh B4h ]
  1716. api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
  1717. api/ipmi-chassis-cmds-api.c: 1140: _ipmi_cmd_get_system_boot_options_common: error 'session timeout' (14)
  1718. api/ipmi-chassis-cmds-api.c: 1284: ipmi_cmd_get_system_boot_options_boot_flags: error 'session timeout' (14)
  1719. ipmi_cmd_get_system_boot_options_boot_flags: session timeout
  1720. 192.168.1.22: =====================================================
  1721. 192.168.1.22: IPMI 2.0 Close Session Request
  1722. 192.168.1.22: =====================================================
  1723. 192.168.1.22: RMCP Header:
  1724. 192.168.1.22: ------------
  1725. 192.168.1.22: [ 6h] = version[ 8b]
  1726. 192.168.1.22: [ 0h] = reserved[ 8b]
  1727. 192.168.1.22: [ FFh] = sequence_number[ 8b]
  1728. 192.168.1.22: [ 7h] = message_class.class[ 5b]
  1729. 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
  1730. 192.168.1.22: [ 0h] = message_class.ack[ 1b]
  1731. 192.168.1.22: IPMI RMCPPLUS Session Header:
  1732. 192.168.1.22: -----------------------------
  1733. 192.168.1.22: [ 6h] = authentication_type[ 4b]
  1734. 192.168.1.22: [ 0h] = reserved1[ 4b]
  1735. 192.168.1.22: [ 0h] = payload_type[ 6b]
  1736. 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
  1737. 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
  1738. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  1739. 192.168.1.22: [ Bh] = session_sequence_number[32b]
  1740. 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
  1741. 192.168.1.22: IPMI RMCPPLUS Payload:
  1742. 192.168.1.22: ----------------------
  1743. 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1744. 192.168.1.22: [ DFh A0h ADh 57h A1h EAh 23h D9h ]
  1745. 192.168.1.22: [ 3Ah 80h E5h FEh 3Eh 04h 1Bh EDh ]
  1746. 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[11B]
  1747. 192.168.1.22: [ 20h 18h C8h 81h B8h 3Ch BCh 9Ah ]
  1748. 192.168.1.22: [ 8Eh 00h A7h ]
  1749. 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
  1750. 192.168.1.22: IPMI Message Header:
  1751. 192.168.1.22: --------------------
  1752. 192.168.1.22: [ 20h] = rs_addr[ 8b]
  1753. 192.168.1.22: [ 0h] = rs_lun[ 2b]
  1754. 192.168.1.22: [ 6h] = net_fn[ 6b]
  1755. 192.168.1.22: [ C8h] = checksum1[ 8b]
  1756. 192.168.1.22: [ 81h] = rq_addr[ 8b]
  1757. 192.168.1.22: [ 0h] = rq_lun[ 2b]
  1758. 192.168.1.22: [ 2Eh] = rq_seq[ 6b]
  1759. 192.168.1.22: IPMI Command Data:
  1760. 192.168.1.22: ------------------
  1761. 192.168.1.22: [ 3Ch] = cmd[ 8b]
  1762. 192.168.1.22: [ 8E9ABCh] = session_id[32b]
  1763. 192.168.1.22: IPMI Trailer:
  1764. 192.168.1.22: -------------
  1765. 192.168.1.22: [ A7h] = checksum2[ 8b]
  1766. 192.168.1.22: IPMI RMCPPLUS Session Trailer:
  1767. 192.168.1.22: ------------------------------
  1768. 192.168.1.22: [ FFFFh] = integrity_pad[16b]
  1769. 192.168.1.22: [ 2h] = pad_length[ 8b]
  1770. 192.168.1.22: [ 7h] = next_header[ 8b]
  1771. 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
  1772. 192.168.1.22: [ 2Ah 46h D1h 58h 76h F5h 2Fh 4Ah ]
  1773. 192.168.1.22: [ 27h 17h 4Bh 2Ch ]
  1774. api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
  1775. [root@puppet2 freeipmi-1.1.6]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement