Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ipmi-chassis-config --username=admin --password=password --hostname=192.168.1.22 --driver-type=LAN_2_0 --section=Chassis_Boot_Flags --checkout
- #
- # Section Chassis_Boot_Flags Comments
- #
- # The following configuration options are for configuring chassis boot behavior.
- # Please note that some fields may apply to all future boots while some may only
- # apply to the next system boot.
- #
- # "Boot_Flags_Persistent" determines if flags apply to the next boot only or all
- # future boots.
- #
- # "Boot_Device" allows the user to configure which device the BIOS should boot
- # off of. Most users may wish to select NO-OVERRIDE to select the configuration
- # currently determined by the BIOS. Note that the configuration value BIOS-SETUP
- # refers to booting *into* the BIOS Setup, not from it. FLOPPY may refer to any
- # type of removeable media. "Device_Instance_Selector" may be be used to select
- # a specific device instance for booting.
- #
- Section Chassis_Boot_Flags
- api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
- api/ipmi-chassis-cmds-api.c: 1140: _ipmi_cmd_get_system_boot_options_common: error 'session timeout' (14)
- api/ipmi-chassis-cmds-api.c: 1284: ipmi_cmd_get_system_boot_options_boot_flags: error 'session timeout' (14)
- api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
- [root@puppet2 freeipmi-1.1.6]# ipmi-chassis-config --username=admin --password=creative --hostname=192.168.1.22 --driver-type=LAN_2_0 --section=Chassis_Boot_Flags --checkout --debug
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 1.5 Get Channel Authentication Capabilities Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI Session Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 0h] = authentication_type[ 8b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 9h] = ipmi_msg_len[ 8b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 6h] = net_fn[ 6b]
- 192.168.1.22: [ C8h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 23h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 38h] = cmd[ 8b]
- 192.168.1.22: [ Eh] = channel_number[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 3b]
- 192.168.1.22: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
- 192.168.1.22: [ 4h] = maximum_privilege_level[ 4b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: --------------
- 192.168.1.22: [ 29h] = checksum2[ 8b]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 1.5 Get Channel Authentication Capabilities Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI Session Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 0h] = authentication_type[ 8b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 10h] = ipmi_msg_len[ 8b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 7h] = net_fn[ 6b]
- 192.168.1.22: [ 63h] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 23h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 38h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 2h] = channel_number[ 8b]
- 192.168.1.22: [ 0h] = authentication_type.none[ 1b]
- 192.168.1.22: [ 0h] = authentication_type.md2[ 1b]
- 192.168.1.22: [ 0h] = authentication_type.md5[ 1b]
- 192.168.1.22: [ 0h] = authentication_type.reserved1[ 1b]
- 192.168.1.22: [ 0h] = authentication_type.straight_password_key[ 1b]
- 192.168.1.22: [ 0h] = authentication_type.oem_prop[ 1b]
- 192.168.1.22: [ 0h] = authentication_type.reserved2[ 1b]
- 192.168.1.22: [ 1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
- 192.168.1.22: [ 0h] = authentication_status.anonymous_login[ 1b]
- 192.168.1.22: [ 0h] = authentication_status.null_username[ 1b]
- 192.168.1.22: [ 1h] = authentication_status.non_null_username[ 1b]
- 192.168.1.22: [ 0h] = authentication_status.user_level_authentication[ 1b]
- 192.168.1.22: [ 1h] = authentication_status.per_message_authentication[ 1b]
- 192.168.1.22: [ 0h] = authentication_status.k_g[ 1b]
- 192.168.1.22: [ 0h] = authentication_status.reserved[ 2b]
- 192.168.1.22: [ 0h] = channel_supports_ipmi_v1.5_connections[ 1b]
- 192.168.1.22: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b]
- 192.168.1.22: [ 0h] = reserved[ 6b]
- 192.168.1.22: [ 0h] = oem_id[24b]
- 192.168.1.22: [ 0h] = oem_auxiliary_data[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: --------------
- 192.168.1.22: [ 84h] = checksum2[ 8b]
- api/ipmi-lan-session-common.c: 2821: ipmi_lan_2_0_cmd_wrapper: error 'field not found' (7)
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Open Session Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 10h] = payload_type[ 6b]
- 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[32B]
- 192.168.1.22: [ 24h 00h 00h 00h 0Eh 88h AEh 3Ch ]
- 192.168.1.22: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
- 192.168.1.22: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
- 192.168.1.22: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 24h] = message_tag[ 8b]
- 192.168.1.22: [ 0h] = requested_maximum_privilege_level[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = reserved2[16b]
- 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
- 192.168.1.22: [ 0h] = authentication_payload.payload_type[ 8b]
- 192.168.1.22: [ 0h] = reserved3[16b]
- 192.168.1.22: [ 8h] = authentication_payload.payload_length[ 8b]
- 192.168.1.22: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
- 192.168.1.22: [ 0h] = reserved4[ 2b]
- 192.168.1.22: [ 0h] = reserved5[24b]
- 192.168.1.22: [ 1h] = integrity_payload.payload_type[ 8b]
- 192.168.1.22: [ 0h] = reserved6[16b]
- 192.168.1.22: [ 8h] = integrity_payload.payload_length[ 8b]
- 192.168.1.22: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
- 192.168.1.22: [ 0h] = reserved7[ 2b]
- 192.168.1.22: [ 0h] = reserved8[24b]
- 192.168.1.22: [ 2h] = confidentiality_payload.payload_type[ 8b]
- 192.168.1.22: [ 0h] = reserved9[16b]
- 192.168.1.22: [ 8h] = confidentiality_payload.payload_length[ 8b]
- 192.168.1.22: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
- 192.168.1.22: [ 0h] = reserved10[ 2b]
- 192.168.1.22: [ 0h] = reserved11[24b]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Open Session Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 11h] = payload_type[ 6b]
- 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 24h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[36B]
- 192.168.1.22: [ 24h 00h 04h 00h 0Eh 88h AEh 3Ch ]
- 192.168.1.22: [ BCh 9Ah 8Eh 00h 00h 00h 00h 08h ]
- 192.168.1.22: [ 01h 00h 00h 00h 01h 00h 00h 08h ]
- 192.168.1.22: [ 01h 00h 00h 00h 02h 00h 00h 08h ]
- 192.168.1.22: [ 01h 00h 00h 00h ]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 24h] = message_tag[ 8b]
- 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
- 192.168.1.22: [ 4h] = maximum_privilege_level[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = reserved2[ 8b]
- 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
- 192.168.1.22: [ 8E9ABCh] = managed_system_session_id[32b]
- 192.168.1.22: [ 0h] = authentication_payload.payload_type[ 8b]
- 192.168.1.22: [ 0h] = reserved3[16b]
- 192.168.1.22: [ 8h] = authentication_payload.payload_length[ 8b]
- 192.168.1.22: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
- 192.168.1.22: [ 0h] = reserved4[ 2b]
- 192.168.1.22: [ 0h] = reserved5[24b]
- 192.168.1.22: [ 1h] = integrity_payload.payload_type[ 8b]
- 192.168.1.22: [ 0h] = reserved6[16b]
- 192.168.1.22: [ 8h] = integrity_payload.payload_length[ 8b]
- 192.168.1.22: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
- 192.168.1.22: [ 0h] = reserved7[ 2b]
- 192.168.1.22: [ 0h] = reserved8[24b]
- 192.168.1.22: [ 2h] = confidentiality_payload.payload_type[ 8b]
- 192.168.1.22: [ 0h] = reserved9[16b]
- 192.168.1.22: [ 8h] = confidentiality_payload.payload_length[ 8b]
- 192.168.1.22: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
- 192.168.1.22: [ 0h] = reserved10[ 2b]
- 192.168.1.22: [ 0h] = reserved11[24b]
- api/ipmi-lan-session-common.c: 2821: ipmi_lan_2_0_cmd_wrapper: error 'field not found' (7)
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 RAKP Message 1 Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 12h] = payload_type[ 6b]
- 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 21h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[33B]
- 192.168.1.22: [ 25h 00h 00h 00h BCh 9Ah 8Eh 00h ]
- 192.168.1.22: [ 6Bh 83h 6Dh 82h A6h 99h 2Ah 16h ]
- 192.168.1.22: [ A7h 84h E9h 72h BEh 0Bh 77h A3h ]
- 192.168.1.22: [ 14h 00h 00h 05h 61h 64h 6Dh 69h ]
- 192.168.1.22: [ 6Eh ]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 25h] = message_tag[ 8b]
- 192.168.1.22: [ 0h] = reserved1[24b]
- 192.168.1.22: [ 8E9ABCh] = managed_system_session_id[32b]
- 192.168.1.22: [ BYTE ARRAY ... ] = remote_console_random_number[16B]
- 192.168.1.22: [ 6Bh 83h 6Dh 82h A6h 99h 2Ah 16h ]
- 192.168.1.22: [ A7h 84h E9h 72h BEh 0Bh 77h A3h ]
- 192.168.1.22: [ 4h] = requested_maximum_privilege_level[ 4b]
- 192.168.1.22: [ 1h] = name_only_lookup[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 3b]
- 192.168.1.22: [ 0h] = reserved3[16b]
- 192.168.1.22: [ 5h] = user_name_length[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = user_name[ 5B]
- 192.168.1.22: [ 61h 64h 6Dh 69h 6Eh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 RAKP Message 2 Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 13h] = payload_type[ 6b]
- 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 3Ch] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[60B]
- 192.168.1.22: [ 25h 00h 00h 00h 0Eh 88h AEh 3Ch ]
- 192.168.1.22: [ A2h A9h BDh C2h 10h DBh B4h 65h ]
- 192.168.1.22: [ 7Bh 60h FCh 7Ch 2Dh F3h 0Ah A2h ]
- 192.168.1.22: [ 34h 33h 30h 30h 32h 37h 32h 55h ]
- 192.168.1.22: [ 58h 36h 34h 32h 30h 31h 55h 32h ]
- 192.168.1.22: [ 24h 7Eh FEh 51h F9h 19h 30h B7h ]
- 192.168.1.22: [ ACh D9h E6h 1Ah 40h 5Dh B9h 1Bh ]
- 192.168.1.22: [ 6Bh D2h 51h 4Bh ]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 25h] = message_tag[ 8b]
- 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
- 192.168.1.22: [ 0h] = reserved1[16b]
- 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
- 192.168.1.22: [ BYTE ARRAY ... ] = managed_system_random_number[16B]
- 192.168.1.22: [ A2h A9h BDh C2h 10h DBh B4h 65h ]
- 192.168.1.22: [ 7Bh 60h FCh 7Ch 2Dh F3h 0Ah A2h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = managed_system_guid[16B]
- 192.168.1.22: [ 34h 33h 30h 30h 32h 37h 32h 55h ]
- 192.168.1.22: [ 58h 36h 34h 32h 30h 31h 55h 32h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
- 192.168.1.22: [ 24h 7Eh FEh 51h F9h 19h 30h B7h ]
- 192.168.1.22: [ ACh D9h E6h 1Ah 40h 5Dh B9h 1Bh ]
- 192.168.1.22: [ 6Bh D2h 51h 4Bh ]
- api/ipmi-lan-session-common.c: 2821: ipmi_lan_2_0_cmd_wrapper: error 'field not found' (7)
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 RAKP Message 3 Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 14h] = payload_type[ 6b]
- 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 1Ch] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[28B]
- 192.168.1.22: [ 26h 00h 00h 00h BCh 9Ah 8Eh 00h ]
- 192.168.1.22: [ A2h 69h CCh B6h 45h EEh 07h 85h ]
- 192.168.1.22: [ 7Eh 06h 4Fh E9h 20h 11h 25h 4Ch ]
- 192.168.1.22: [ 2Ah 02h 58h CFh ]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 26h] = message_tag[ 8b]
- 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
- 192.168.1.22: [ 0h] = reserved1[16b]
- 192.168.1.22: [ 8E9ABCh] = managed_system_session_id[32b]
- 192.168.1.22: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
- 192.168.1.22: [ A2h 69h CCh B6h 45h EEh 07h 85h ]
- 192.168.1.22: [ 7Eh 06h 4Fh E9h 20h 11h 25h 4Ch ]
- 192.168.1.22: [ 2Ah 02h 58h CFh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 RAKP Message 4 Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 15h] = payload_type[ 6b]
- 192.168.1.22: [ 0h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 0h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 0h] = session_id[32b]
- 192.168.1.22: [ 0h] = session_sequence_number[32b]
- 192.168.1.22: [ 14h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[20B]
- 192.168.1.22: [ 26h 00h 00h 00h 0Eh 88h AEh 3Ch ]
- 192.168.1.22: [ 7Ch EEh 17h C4h CBh CDh 0Bh B9h ]
- 192.168.1.22: [ CCh A0h 86h 86h ]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 26h] = message_tag[ 8b]
- 192.168.1.22: [ 0h] = rmcpplus_status_code[ 8b]
- 192.168.1.22: [ 0h] = reserved1[16b]
- 192.168.1.22: [ 3CAE880Eh] = remote_console_session_id[32b]
- 192.168.1.22: [ BYTE ARRAY ... ] = integrity_check_value[12B]
- 192.168.1.22: [ 7Ch EEh 17h C4h CBh CDh 0Bh B9h ]
- 192.168.1.22: [ CCh A0h 86h 86h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Set Session Privilege Level Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 1h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 45h ECh 67h 57h 32h E9h 74h E8h ]
- 192.168.1.22: [ 98h 69h B4h 2Ah C0h 99h D0h BBh ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[ 8B]
- 192.168.1.22: [ 20h 18h C8h 81h 90h 3Bh 04h B0h ]
- 192.168.1.22: [ 707060504030201h] = confidentiality_trailer[64b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 6h] = net_fn[ 6b]
- 192.168.1.22: [ C8h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 24h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 3Bh] = cmd[ 8b]
- 192.168.1.22: [ 4h] = privilege_level[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ B0h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 03h A2h C7h FCh D2h C8h 24h 31h ]
- 192.168.1.22: [ 5Eh 53h 23h 6Eh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Set Session Privilege Level Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 1h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ BBh B7h CAh 33h 2Ah DCh 00h 5Fh ]
- 192.168.1.22: [ 4Ah 21h E6h BFh 47h 63h FDh DDh ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[ 9B]
- 192.168.1.22: [ 81h 1Ch 63h 20h 90h 3Bh 00h 04h ]
- 192.168.1.22: [ 11h ]
- 192.168.1.22: [ 6060504030201h] = confidentiality_trailer[56b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 7h] = net_fn[ 6b]
- 192.168.1.22: [ 63h] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 24h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 3Bh] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 4h] = privilege_level[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 11h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 42h C7h B8h 4Fh D6h C4h 4Ah 67h ]
- 192.168.1.22: [ 2Ah C2h F5h 46h ]
- #
- # Section Chassis_Boot_Flags Comments
- #
- # The following configuration options are for configuring chassis boot behavior.
- # Please note that some fields may apply to all future boots while some may only
- # apply to the next system boot.
- #
- # "Boot_Flags_Persistent" determines if flags apply to the next boot only or all
- # future boots.
- #
- # "Boot_Device" allows the user to configure which device the BIOS should boot
- # off of. Most users may wish to select NO-OVERRIDE to select the configuration
- # currently determined by the BIOS. Note that the configuration value BIOS-SETUP
- # refers to booting *into* the BIOS Setup, not from it. FLOPPY may refer to any
- # type of removeable media. "Device_Instance_Selector" may be be used to select
- # a specific device instance for booting.
- #
- Section Chassis_Boot_Flags
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 2h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ D2h 21h 8Eh 0Ah 42h EFh AAh 39h ]
- 192.168.1.22: [ 19h B4h 64h 1Ah FFh 18h 40h 04h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h 94h 09h 05h 00h ]
- 192.168.1.22: [ 00h DDh ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 25h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ DDh] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 7Ch 25h E0h A5h 9Bh E5h 46h 30h ]
- 192.168.1.22: [ 2Ah B9h E2h 49h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 2h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ BCh AEh 3Ch 85h DAh 00h 4Dh 4Ch ]
- 192.168.1.22: [ 2Bh 6Ah 65h 6Bh 32h 79h D4h 8Ch ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h 94h 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 3Dh ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 25h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 3Dh ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ EDh 74h AFh 68h 76h 69h D0h D6h ]
- 192.168.1.22: [ 88h 51h F4h 93h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 3h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 6Fh 8Ch BCh 5Bh 26h 0Dh 3Fh 7Eh ]
- 192.168.1.22: [ A2h 75h 02h 62h 69h 77h B5h 17h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h 98h 09h 05h 00h ]
- 192.168.1.22: [ 00h D9h ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 26h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ D9h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 94h 35h 64h 74h B9h D0h 3Fh B7h ]
- 192.168.1.22: [ 7Fh C9h ECh 4Dh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 3h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ C6h 69h 2Bh 56h E1h BEh F7h 40h ]
- 192.168.1.22: [ BAh 2Eh 37h 30h 78h 7Bh A2h E3h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h 98h 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 39h ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 26h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 39h ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 5Dh 34h E1h 63h B1h 56h 64h 19h ]
- 192.168.1.22: [ C3h B9h 15h 35h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 4h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ F7h 0Fh 8Ah 20h 13h F1h E8h 05h ]
- 192.168.1.22: [ A6h C9h 2Ah B3h 6Fh 7Eh C9h 5Fh ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h 9Ch 09h 05h 00h ]
- 192.168.1.22: [ 00h D5h ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 27h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ D5h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 57h 91h 5Dh 02h 48h C4h 2Bh 06h ]
- 192.168.1.22: [ CAh 4Ch 24h 2Fh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 4h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ D2h 56h 06h 04h 7Bh 28h 4Ch 3Fh ]
- 192.168.1.22: [ 4Eh 31h 09h A1h 92h AEh DFh 9Ah ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h 9Ch 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 35h ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 27h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 35h ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ A0h 67h 7Eh 3Ah 99h 64h 79h 01h ]
- 192.168.1.22: [ C4h 1Dh 62h B5h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 5h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 83h 8Bh FFh F2h 18h EDh 02h C0h ]
- 192.168.1.22: [ B4h 69h FAh 3Fh 89h 27h 5Ch 78h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h A0h 09h 05h 00h ]
- 192.168.1.22: [ 00h D1h ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 28h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ D1h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 2Ch A7h 2Bh F6h 5Eh 70h BDh 16h ]
- 192.168.1.22: [ A3h A6h 2Ch 7Ch ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 5h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ B2h A0h 77h C8h 28h 60h DEh 7Ah ]
- 192.168.1.22: [ 3Eh AFh 4Eh 37h 9Ch 30h 58h 80h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h A0h 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 31h ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 28h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 31h ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 62h BEh 40h 25h F0h DEh A4h 3Fh ]
- 192.168.1.22: [ 55h 3Dh 88h 17h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 6h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 78h D7h C0h 3Eh 28h 4Ch 11h 70h ]
- 192.168.1.22: [ B7h 11h D0h D0h F7h 6Eh 49h 57h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h A4h 09h 05h 00h ]
- 192.168.1.22: [ 00h CDh ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 29h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ CDh] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 5Eh E4h A8h 78h 34h 07h 12h ADh ]
- 192.168.1.22: [ 98h EEh C8h 5Dh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 6h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 51h 68h BDh 35h 03h D7h 6Eh 02h ]
- 192.168.1.22: [ E9h 2Fh 56h DFh 52h B4h 03h 5Eh ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h A4h 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 2Dh ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 29h] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 2Dh ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 7Fh BCh A9h 0Eh FDh 09h B2h D1h ]
- 192.168.1.22: [ 84h E1h 17h 71h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 7h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ E9h F4h 4Ch 54h 53h 0Eh 7Ch 44h ]
- 192.168.1.22: [ A1h 52h B7h 17h 5Eh 69h 64h B7h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h A8h 09h 05h 00h ]
- 192.168.1.22: [ 00h C9h ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 2Ah] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ C9h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ C1h A8h 01h 70h A8h CEh F1h BBh ]
- 192.168.1.22: [ 95h FDh 35h 7Ah ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 7h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ D3h C8h 06h 3Ah 2Dh BDh AFh 6Fh ]
- 192.168.1.22: [ B5h 28h 6Bh C1h 63h 16h 6Ch 82h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h A8h 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 29h ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 2Ah] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 29h ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 02h D8h 0Ch 2Ch 65h BCh 24h A9h ]
- 192.168.1.22: [ DEh ABh 7Bh 31h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 8h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 84h 11h C8h 68h 54h 1Ch A9h 28h ]
- 192.168.1.22: [ E4h 20h 79h 82h 5Ch B9h 65h 34h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h ACh 09h 05h 00h ]
- 192.168.1.22: [ 00h C5h ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 2Bh] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ C5h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 41h C6h 9Dh 71h 79h 3Fh 44h 0Ch ]
- 192.168.1.22: [ 8Eh 4Ah 1Ah FDh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 8h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 88h F7h 7Fh 4Ch B8h 83h 2Ah E8h ]
- 192.168.1.22: [ F7h B7h 0Fh 04h 02h 3Dh 59h 14h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h ACh 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 25h ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 2Bh] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 25h ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ FAh F4h B4h 1Eh C8h 86h F8h A5h ]
- 192.168.1.22: [ E2h 57h 77h 7Dh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ 9h] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ 52h 25h 9Bh 3Ch 9Eh B6h 4Bh 9Bh ]
- 192.168.1.22: [ 5Ch 3Bh FBh 0Bh FCh 9Fh 52h 9Bh ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h B0h 09h 05h 00h ]
- 192.168.1.22: [ 00h C1h ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 2Ch] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ C1h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ F2h 3Ah B4h 3Ch 8Ch D5h CCh DBh ]
- 192.168.1.22: [ 80h D6h 2Ch 97h ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Response
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 3CAE880Eh] = session_id[32b]
- 192.168.1.22: [ 9h] = session_sequence_number[32b]
- 192.168.1.22: [ 30h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ D9h 94h 3Dh 22h E1h F3h 57h 0Bh ]
- 192.168.1.22: [ 13h 60h BEh 16h 83h E7h D2h 79h ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[27B]
- 192.168.1.22: [ 81h 04h 7Bh 20h B0h 09h 00h 01h ]
- 192.168.1.22: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 21h ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 1h] = net_fn[ 6b]
- 192.168.1.22: [ 7Bh] = checksum1[ 8b]
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 2Ch] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 0h] = comp_code[ 8b]
- 192.168.1.22: [ 1h] = parameter_version[ 4b]
- 192.168.1.22: [ 0h] = reserved[ 4b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = parameter_valid[ 1b]
- 192.168.1.22: [ 0h] = reserved1[ 5b]
- 192.168.1.22: [ 0h] = bios_boot_type[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_persistent[ 1b]
- 192.168.1.22: [ 0h] = boot_flags_valid[ 1b]
- 192.168.1.22: [ 0h] = lock_out_reset_button[ 1b]
- 192.168.1.22: [ 0h] = screen_blank[ 1b]
- 192.168.1.22: [ 0h] = boot_device[ 4b]
- 192.168.1.22: [ 0h] = lock_keyboard[ 1b]
- 192.168.1.22: [ 0h] = cmos_clear[ 1b]
- 192.168.1.22: [ 0h] = console_redirection[ 2b]
- 192.168.1.22: [ 0h] = lock_out_sleep_button[ 1b]
- 192.168.1.22: [ 0h] = user_password_bypass[ 1b]
- 192.168.1.22: [ 0h] = force_progress_event_traps[ 1b]
- 192.168.1.22: [ 0h] = firmware_bios_verbosity[ 2b]
- 192.168.1.22: [ 0h] = lock_out_via_power_button[ 1b]
- 192.168.1.22: [ 0h] = bios_mux_control_override[ 3b]
- 192.168.1.22: [ 0h] = bios_shared_mode_override[ 1b]
- 192.168.1.22: [ 0h] = reserved2[ 4b]
- 192.168.1.22: [ 0h] = device_instance_selector[ 5b]
- 192.168.1.22: [ 0h] = reserved3[ 3b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ 0h] = checksum2[ 8b]
- 192.168.1.22: Payload Unexpected Data:
- 192.168.1.22: ------------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = unexpected_data[12B]
- 192.168.1.22: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
- 192.168.1.22: [ 00h 00h 00h 21h ]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 3Dh E1h 23h AEh FFh FAh 8Ah 8Ch ]
- 192.168.1.22: [ F0h 69h 96h BBh ]
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Get System Boot Options Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ Ah] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ DCh CFh FAh 7Eh D1h 4Fh 7Dh 10h ]
- 192.168.1.22: [ C9h FDh B0h CFh C8h 33h F4h 4Dh ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[10B]
- 192.168.1.22: [ 20h 00h E0h 81h B4h 09h 05h 00h ]
- 192.168.1.22: [ 00h BDh ]
- 192.168.1.22: [ 50504030201h] = confidentiality_trailer[48b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 0h] = net_fn[ 6b]
- 192.168.1.22: [ E0h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 2Dh] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 9h] = cmd[ 8b]
- 192.168.1.22: [ 5h] = parameter_selector[ 7b]
- 192.168.1.22: [ 0h] = reserved[ 1b]
- 192.168.1.22: [ 0h] = set_selector[ 8b]
- 192.168.1.22: [ 0h] = block_selector[ 8b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ BDh] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ C5h CEh FAh FEh 1Bh 28h 22h BEh ]
- 192.168.1.22: [ AAh 98h 8Bh B4h ]
- api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
- api/ipmi-chassis-cmds-api.c: 1140: _ipmi_cmd_get_system_boot_options_common: error 'session timeout' (14)
- api/ipmi-chassis-cmds-api.c: 1284: ipmi_cmd_get_system_boot_options_boot_flags: error 'session timeout' (14)
- ipmi_cmd_get_system_boot_options_boot_flags: session timeout
- 192.168.1.22: =====================================================
- 192.168.1.22: IPMI 2.0 Close Session Request
- 192.168.1.22: =====================================================
- 192.168.1.22: RMCP Header:
- 192.168.1.22: ------------
- 192.168.1.22: [ 6h] = version[ 8b]
- 192.168.1.22: [ 0h] = reserved[ 8b]
- 192.168.1.22: [ FFh] = sequence_number[ 8b]
- 192.168.1.22: [ 7h] = message_class.class[ 5b]
- 192.168.1.22: [ 0h] = message_class.reserved[ 2b]
- 192.168.1.22: [ 0h] = message_class.ack[ 1b]
- 192.168.1.22: IPMI RMCPPLUS Session Header:
- 192.168.1.22: -----------------------------
- 192.168.1.22: [ 6h] = authentication_type[ 4b]
- 192.168.1.22: [ 0h] = reserved1[ 4b]
- 192.168.1.22: [ 0h] = payload_type[ 6b]
- 192.168.1.22: [ 1h] = payload_type.authenticated[ 1b]
- 192.168.1.22: [ 1h] = payload_type.encrypted[ 1b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: [ Bh] = session_sequence_number[32b]
- 192.168.1.22: [ 20h] = ipmi_payload_len[16b]
- 192.168.1.22: IPMI RMCPPLUS Payload:
- 192.168.1.22: ----------------------
- 192.168.1.22: [ BYTE ARRAY ... ] = confidentiality_header[16B]
- 192.168.1.22: [ DFh A0h ADh 57h A1h EAh 23h D9h ]
- 192.168.1.22: [ 3Ah 80h E5h FEh 3Eh 04h 1Bh EDh ]
- 192.168.1.22: [ BYTE ARRAY ... ] = payload_data[11B]
- 192.168.1.22: [ 20h 18h C8h 81h B8h 3Ch BCh 9Ah ]
- 192.168.1.22: [ 8Eh 00h A7h ]
- 192.168.1.22: [ 404030201h] = confidentiality_trailer[40b]
- 192.168.1.22: IPMI Message Header:
- 192.168.1.22: --------------------
- 192.168.1.22: [ 20h] = rs_addr[ 8b]
- 192.168.1.22: [ 0h] = rs_lun[ 2b]
- 192.168.1.22: [ 6h] = net_fn[ 6b]
- 192.168.1.22: [ C8h] = checksum1[ 8b]
- 192.168.1.22: [ 81h] = rq_addr[ 8b]
- 192.168.1.22: [ 0h] = rq_lun[ 2b]
- 192.168.1.22: [ 2Eh] = rq_seq[ 6b]
- 192.168.1.22: IPMI Command Data:
- 192.168.1.22: ------------------
- 192.168.1.22: [ 3Ch] = cmd[ 8b]
- 192.168.1.22: [ 8E9ABCh] = session_id[32b]
- 192.168.1.22: IPMI Trailer:
- 192.168.1.22: -------------
- 192.168.1.22: [ A7h] = checksum2[ 8b]
- 192.168.1.22: IPMI RMCPPLUS Session Trailer:
- 192.168.1.22: ------------------------------
- 192.168.1.22: [ FFFFh] = integrity_pad[16b]
- 192.168.1.22: [ 2h] = pad_length[ 8b]
- 192.168.1.22: [ 7h] = next_header[ 8b]
- 192.168.1.22: [ BYTE ARRAY ... ] = authentication_code[12B]
- 192.168.1.22: [ 2Ah 46h D1h 58h 76h F5h 2Fh 4Ah ]
- 192.168.1.22: [ 27h 17h 4Bh 2Ch ]
- api/ipmi-lan-session-common.c: 2867: ipmi_lan_2_0_cmd_wrapper: error 'session timeout' (14)
- [root@puppet2 freeipmi-1.1.6]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement