Guest User

Untitled

a guest
Nov 16th, 2015
123
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. ubuntu@maas:~$ ipmi-chassis-config -D LAN_2_0 -h 192.168.100.4 -u Administrator -p password -v --debug --commit --filename ipmi.cfg
  2. 192.168.100.4: =====================================================
  3. 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Request
  4. 192.168.100.4: =====================================================
  5. 192.168.100.4: RMCP Header:
  6. 192.168.100.4: ------------
  7. 192.168.100.4: [ 6h] = version[ 8b]
  8. 192.168.100.4: [ 0h] = reserved[ 8b]
  9. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  10. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  11. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  12. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  13. 192.168.100.4: IPMI Session Header:
  14. 192.168.100.4: --------------------
  15. 192.168.100.4: [ 0h] = authentication_type[ 8b]
  16. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  17. 192.168.100.4: [ 0h] = session_id[32b]
  18. 192.168.100.4: [ 9h] = ipmi_msg_len[ 8b]
  19. 192.168.100.4: IPMI Message Header:
  20. 192.168.100.4: --------------------
  21. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  22. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  23. 192.168.100.4: [ 6h] = net_fn[ 6b]
  24. 192.168.100.4: [ C8h] = checksum1[ 8b]
  25. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  26. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  27. 192.168.100.4: [ 3h] = rq_seq[ 6b]
  28. 192.168.100.4: IPMI Command Data:
  29. 192.168.100.4: ------------------
  30. 192.168.100.4: [ 38h] = cmd[ 8b]
  31. 192.168.100.4: [ Eh] = channel_number[ 4b]
  32. 192.168.100.4: [ 0h] = reserved1[ 3b]
  33. 192.168.100.4: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
  34. 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b]
  35. 192.168.100.4: [ 0h] = reserved2[ 4b]
  36. 192.168.100.4: IPMI Trailer:
  37. 192.168.100.4: --------------
  38. 192.168.100.4: [ A9h] = checksum2[ 8b]
  39. 192.168.100.4: =====================================================
  40. 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Response
  41. 192.168.100.4: =====================================================
  42. 192.168.100.4: RMCP Header:
  43. 192.168.100.4: ------------
  44. 192.168.100.4: [ 6h] = version[ 8b]
  45. 192.168.100.4: [ 0h] = reserved[ 8b]
  46. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  47. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  48. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  49. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  50. 192.168.100.4: IPMI Session Header:
  51. 192.168.100.4: --------------------
  52. 192.168.100.4: [ 0h] = authentication_type[ 8b]
  53. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  54. 192.168.100.4: [ 0h] = session_id[32b]
  55. 192.168.100.4: [ 10h] = ipmi_msg_len[ 8b]
  56. 192.168.100.4: IPMI Message Header:
  57. 192.168.100.4: --------------------
  58. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  59. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  60. 192.168.100.4: [ 7h] = net_fn[ 6b]
  61. 192.168.100.4: [ 63h] = checksum1[ 8b]
  62. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  63. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  64. 192.168.100.4: [ 3h] = rq_seq[ 6b]
  65. 192.168.100.4: IPMI Command Data:
  66. 192.168.100.4: ------------------
  67. 192.168.100.4: [ 38h] = cmd[ 8b]
  68. 192.168.100.4: [ 0h] = comp_code[ 8b]
  69. 192.168.100.4: [ 2h] = channel_number[ 8b]
  70. 192.168.100.4: [ 0h] = authentication_type.none[ 1b]
  71. 192.168.100.4: [ 0h] = authentication_type.md2[ 1b]
  72. 192.168.100.4: [ 0h] = authentication_type.md5[ 1b]
  73. 192.168.100.4: [ 0h] = authentication_type.reserved1[ 1b]
  74. 192.168.100.4: [ 0h] = authentication_type.straight_password_key[ 1b]
  75. 192.168.100.4: [ 0h] = authentication_type.oem_prop[ 1b]
  76. 192.168.100.4: [ 0h] = authentication_type.reserved2[ 1b]
  77. 192.168.100.4: [ 1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
  78. 192.168.100.4: [ 0h] = authentication_status.anonymous_login[ 1b]
  79. 192.168.100.4: [ 0h] = authentication_status.null_username[ 1b]
  80. 192.168.100.4: [ 1h] = authentication_status.non_null_username[ 1b]
  81. 192.168.100.4: [ 0h] = authentication_status.user_level_authentication[ 1b]
  82. 192.168.100.4: [ 1h] = authentication_status.per_message_authentication[ 1b]
  83. 192.168.100.4: [ 0h] = authentication_status.k_g[ 1b]
  84. 192.168.100.4: [ 0h] = authentication_status.reserved[ 2b]
  85. 192.168.100.4: [ 0h] = channel_supports_ipmi_v1.5_connections[ 1b]
  86. 192.168.100.4: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b]
  87. 192.168.100.4: [ 0h] = reserved[ 6b]
  88. 192.168.100.4: [ 0h] = oem_id[24b]
  89. 192.168.100.4: [ 0h] = oem_auxiliary_data[ 8b]
  90. 192.168.100.4: IPMI Trailer:
  91. 192.168.100.4: --------------
  92. 192.168.100.4: [ 4h] = checksum2[ 8b]
  93. 192.168.100.4: =====================================================
  94. 192.168.100.4: IPMI 2.0 Open Session Request
  95. 192.168.100.4: =====================================================
  96. 192.168.100.4: RMCP Header:
  97. 192.168.100.4: ------------
  98. 192.168.100.4: [ 6h] = version[ 8b]
  99. 192.168.100.4: [ 0h] = reserved[ 8b]
  100. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  101. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  102. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  103. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  104. 192.168.100.4: IPMI RMCPPLUS Session Header:
  105. 192.168.100.4: -----------------------------
  106. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  107. 192.168.100.4: [ 0h] = reserved1[ 4b]
  108. 192.168.100.4: [ 10h] = payload_type[ 6b]
  109. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  110. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  111. 192.168.100.4: [ 0h] = session_id[32b]
  112. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  113. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  114. 192.168.100.4: IPMI RMCPPLUS Payload:
  115. 192.168.100.4: ----------------------
  116. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[32B]
  117. 192.168.100.4: [ 01h 00h 00h 00h 18h ADh 9Bh BBh ]
  118. 192.168.100.4: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
  119. 192.168.100.4: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
  120. 192.168.100.4: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
  121. 192.168.100.4: IPMI Command Data:
  122. 192.168.100.4: ------------------
  123. 192.168.100.4: [ 1h] = message_tag[ 8b]
  124. 192.168.100.4: [ 0h] = requested_maximum_privilege_level[ 4b]
  125. 192.168.100.4: [ 0h] = reserved1[ 4b]
  126. 192.168.100.4: [ 0h] = reserved2[16b]
  127. 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b]
  128. 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b]
  129. 192.168.100.4: [ 0h] = reserved3[16b]
  130. 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b]
  131. 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  132. 192.168.100.4: [ 0h] = reserved4[ 2b]
  133. 192.168.100.4: [ 0h] = reserved5[24b]
  134. 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b]
  135. 192.168.100.4: [ 0h] = reserved6[16b]
  136. 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b]
  137. 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  138. 192.168.100.4: [ 0h] = reserved7[ 2b]
  139. 192.168.100.4: [ 0h] = reserved8[24b]
  140. 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b]
  141. 192.168.100.4: [ 0h] = reserved9[16b]
  142. 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b]
  143. 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  144. 192.168.100.4: [ 0h] = reserved10[ 2b]
  145. 192.168.100.4: [ 0h] = reserved11[24b]
  146. 192.168.100.4: =====================================================
  147. 192.168.100.4: IPMI 2.0 Open Session Response
  148. 192.168.100.4: =====================================================
  149. 192.168.100.4: RMCP Header:
  150. 192.168.100.4: ------------
  151. 192.168.100.4: [ 6h] = version[ 8b]
  152. 192.168.100.4: [ 0h] = reserved[ 8b]
  153. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  154. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  155. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  156. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  157. 192.168.100.4: IPMI RMCPPLUS Session Header:
  158. 192.168.100.4: -----------------------------
  159. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  160. 192.168.100.4: [ 0h] = reserved1[ 4b]
  161. 192.168.100.4: [ 11h] = payload_type[ 6b]
  162. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  163. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  164. 192.168.100.4: [ 0h] = session_id[32b]
  165. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  166. 192.168.100.4: [ 24h] = ipmi_payload_len[16b]
  167. 192.168.100.4: IPMI RMCPPLUS Payload:
  168. 192.168.100.4: ----------------------
  169. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[36B]
  170. 192.168.100.4: [ 01h 00h 04h 00h 18h ADh 9Bh BBh ]
  171. 192.168.100.4: [ 30h CBh 8Fh 00h 00h 00h 00h 08h ]
  172. 192.168.100.4: [ 01h 00h 00h 00h 01h 00h 00h 08h ]
  173. 192.168.100.4: [ 01h 00h 00h 00h 02h 00h 00h 08h ]
  174. 192.168.100.4: [ 01h 00h 00h 00h ]
  175. 192.168.100.4: IPMI Command Data:
  176. 192.168.100.4: ------------------
  177. 192.168.100.4: [ 1h] = message_tag[ 8b]
  178. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  179. 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b]
  180. 192.168.100.4: [ 0h] = reserved1[ 4b]
  181. 192.168.100.4: [ 0h] = reserved2[ 8b]
  182. 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b]
  183. 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b]
  184. 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b]
  185. 192.168.100.4: [ 0h] = reserved3[16b]
  186. 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b]
  187. 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  188. 192.168.100.4: [ 0h] = reserved4[ 2b]
  189. 192.168.100.4: [ 0h] = reserved5[24b]
  190. 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b]
  191. 192.168.100.4: [ 0h] = reserved6[16b]
  192. 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b]
  193. 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  194. 192.168.100.4: [ 0h] = reserved7[ 2b]
  195. 192.168.100.4: [ 0h] = reserved8[24b]
  196. 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b]
  197. 192.168.100.4: [ 0h] = reserved9[16b]
  198. 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b]
  199. 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  200. 192.168.100.4: [ 0h] = reserved10[ 2b]
  201. 192.168.100.4: [ 0h] = reserved11[24b]
  202. 192.168.100.4: =====================================================
  203. 192.168.100.4: IPMI 2.0 RAKP Message 1 Request
  204. 192.168.100.4: =====================================================
  205. 192.168.100.4: RMCP Header:
  206. 192.168.100.4: ------------
  207. 192.168.100.4: [ 6h] = version[ 8b]
  208. 192.168.100.4: [ 0h] = reserved[ 8b]
  209. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  210. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  211. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  212. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  213. 192.168.100.4: IPMI RMCPPLUS Session Header:
  214. 192.168.100.4: -----------------------------
  215. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  216. 192.168.100.4: [ 0h] = reserved1[ 4b]
  217. 192.168.100.4: [ 12h] = payload_type[ 6b]
  218. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  219. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  220. 192.168.100.4: [ 0h] = session_id[32b]
  221. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  222. 192.168.100.4: [ 29h] = ipmi_payload_len[16b]
  223. 192.168.100.4: IPMI RMCPPLUS Payload:
  224. 192.168.100.4: ----------------------
  225. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[41B]
  226. 192.168.100.4: [ 02h 00h 00h 00h 30h CBh 8Fh 00h ]
  227. 192.168.100.4: [ EDh E0h 50h 90h B3h A5h 95h 99h ]
  228. 192.168.100.4: [ 18h 9Dh F8h B7h 92h 2Fh 62h C2h ]
  229. 192.168.100.4: [ 14h 00h 00h 0Dh 41h 64h 6Dh 69h ]
  230. 192.168.100.4: [ 6Eh 69h 73h 74h 72h 61h 74h 6Fh ]
  231. 192.168.100.4: [ 72h ]
  232. 192.168.100.4: IPMI Command Data:
  233. 192.168.100.4: ------------------
  234. 192.168.100.4: [ 2h] = message_tag[ 8b]
  235. 192.168.100.4: [ 0h] = reserved1[24b]
  236. 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b]
  237. 192.168.100.4: [ BYTE ARRAY ... ] = remote_console_random_number[16B]
  238. 192.168.100.4: [ EDh E0h 50h 90h B3h A5h 95h 99h ]
  239. 192.168.100.4: [ 18h 9Dh F8h B7h 92h 2Fh 62h C2h ]
  240. 192.168.100.4: [ 4h] = requested_maximum_privilege_level[ 4b]
  241. 192.168.100.4: [ 1h] = name_only_lookup[ 1b]
  242. 192.168.100.4: [ 0h] = reserved2[ 3b]
  243. 192.168.100.4: [ 0h] = reserved3[16b]
  244. 192.168.100.4: [ Dh] = user_name_length[ 8b]
  245. 192.168.100.4: [ BYTE ARRAY ... ] = user_name[13B]
  246. 192.168.100.4: [ 41h 64h 6Dh 69h 6Eh 69h 73h 74h ]
  247. 192.168.100.4: [ 72h 61h 74h 6Fh 72h ]
  248. 192.168.100.4: =====================================================
  249. 192.168.100.4: IPMI 2.0 RAKP Message 2 Response
  250. 192.168.100.4: =====================================================
  251. 192.168.100.4: RMCP Header:
  252. 192.168.100.4: ------------
  253. 192.168.100.4: [ 6h] = version[ 8b]
  254. 192.168.100.4: [ 0h] = reserved[ 8b]
  255. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  256. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  257. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  258. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  259. 192.168.100.4: IPMI RMCPPLUS Session Header:
  260. 192.168.100.4: -----------------------------
  261. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  262. 192.168.100.4: [ 0h] = reserved1[ 4b]
  263. 192.168.100.4: [ 13h] = payload_type[ 6b]
  264. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  265. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  266. 192.168.100.4: [ 0h] = session_id[32b]
  267. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  268. 192.168.100.4: [ 3Ch] = ipmi_payload_len[16b]
  269. 192.168.100.4: IPMI RMCPPLUS Payload:
  270. 192.168.100.4: ----------------------
  271. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[60B]
  272. 192.168.100.4: [ 02h 00h 00h 00h 18h ADh 9Bh BBh ]
  273. 192.168.100.4: [ 73h 3Ah 01h F5h 3Dh 57h A9h 30h ]
  274. 192.168.100.4: [ D4h 73h 2Ch B0h 88h 0Eh FCh C4h ]
  275. 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ]
  276. 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ]
  277. 192.168.100.4: [ D1h 48h 88h F9h D3h 46h 7Eh C8h ]
  278. 192.168.100.4: [ C8h 66h 37h 5Ch B4h 0Fh C8h 0Fh ]
  279. 192.168.100.4: [ 9Bh F4h 21h DFh ]
  280. 192.168.100.4: IPMI Command Data:
  281. 192.168.100.4: ------------------
  282. 192.168.100.4: [ 2h] = message_tag[ 8b]
  283. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  284. 192.168.100.4: [ 0h] = reserved1[16b]
  285. 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b]
  286. 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_random_number[16B]
  287. 192.168.100.4: [ 73h 3Ah 01h F5h 3Dh 57h A9h 30h ]
  288. 192.168.100.4: [ D4h 73h 2Ch B0h 88h 0Eh FCh C4h ]
  289. 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_guid[16B]
  290. 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ]
  291. 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ]
  292. 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  293. 192.168.100.4: [ D1h 48h 88h F9h D3h 46h 7Eh C8h ]
  294. 192.168.100.4: [ C8h 66h 37h 5Ch B4h 0Fh C8h 0Fh ]
  295. 192.168.100.4: [ 9Bh F4h 21h DFh ]
  296. 192.168.100.4: =====================================================
  297. 192.168.100.4: IPMI 2.0 RAKP Message 3 Request
  298. 192.168.100.4: =====================================================
  299. 192.168.100.4: RMCP Header:
  300. 192.168.100.4: ------------
  301. 192.168.100.4: [ 6h] = version[ 8b]
  302. 192.168.100.4: [ 0h] = reserved[ 8b]
  303. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  304. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  305. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  306. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  307. 192.168.100.4: IPMI RMCPPLUS Session Header:
  308. 192.168.100.4: -----------------------------
  309. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  310. 192.168.100.4: [ 0h] = reserved1[ 4b]
  311. 192.168.100.4: [ 14h] = payload_type[ 6b]
  312. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  313. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  314. 192.168.100.4: [ 0h] = session_id[32b]
  315. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  316. 192.168.100.4: [ 1Ch] = ipmi_payload_len[16b]
  317. 192.168.100.4: IPMI RMCPPLUS Payload:
  318. 192.168.100.4: ----------------------
  319. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[28B]
  320. 192.168.100.4: [ 03h 00h 00h 00h 30h CBh 8Fh 00h ]
  321. 192.168.100.4: [ 74h C2h 56h 6Ah F6h C4h 59h 60h ]
  322. 192.168.100.4: [ 64h 41h F3h 8Fh 2Ch 10h 84h 61h ]
  323. 192.168.100.4: [ 5Ah ECh E0h 1Fh ]
  324. 192.168.100.4: IPMI Command Data:
  325. 192.168.100.4: ------------------
  326. 192.168.100.4: [ 3h] = message_tag[ 8b]
  327. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  328. 192.168.100.4: [ 0h] = reserved1[16b]
  329. 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b]
  330. 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  331. 192.168.100.4: [ 74h C2h 56h 6Ah F6h C4h 59h 60h ]
  332. 192.168.100.4: [ 64h 41h F3h 8Fh 2Ch 10h 84h 61h ]
  333. 192.168.100.4: [ 5Ah ECh E0h 1Fh ]
  334. 192.168.100.4: =====================================================
  335. 192.168.100.4: IPMI 2.0 RAKP Message 4 Response
  336. 192.168.100.4: =====================================================
  337. 192.168.100.4: RMCP Header:
  338. 192.168.100.4: ------------
  339. 192.168.100.4: [ 6h] = version[ 8b]
  340. 192.168.100.4: [ 0h] = reserved[ 8b]
  341. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  342. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  343. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  344. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  345. 192.168.100.4: IPMI RMCPPLUS Session Header:
  346. 192.168.100.4: -----------------------------
  347. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  348. 192.168.100.4: [ 0h] = reserved1[ 4b]
  349. 192.168.100.4: [ 15h] = payload_type[ 6b]
  350. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  351. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  352. 192.168.100.4: [ 0h] = session_id[32b]
  353. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  354. 192.168.100.4: [ 14h] = ipmi_payload_len[16b]
  355. 192.168.100.4: IPMI RMCPPLUS Payload:
  356. 192.168.100.4: ----------------------
  357. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[20B]
  358. 192.168.100.4: [ 03h 00h 00h 00h 18h ADh 9Bh BBh ]
  359. 192.168.100.4: [ FFh BFh 9Fh 30h 5Dh 20h 4Dh A3h ]
  360. 192.168.100.4: [ 02h F0h 7Bh 7Ch ]
  361. 192.168.100.4: IPMI Command Data:
  362. 192.168.100.4: ------------------
  363. 192.168.100.4: [ 3h] = message_tag[ 8b]
  364. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  365. 192.168.100.4: [ 0h] = reserved1[16b]
  366. 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b]
  367. 192.168.100.4: [ BYTE ARRAY ... ] = integrity_check_value[12B]
  368. 192.168.100.4: [ FFh BFh 9Fh 30h 5Dh 20h 4Dh A3h ]
  369. 192.168.100.4: [ 02h F0h 7Bh 7Ch ]
  370. 192.168.100.4: =====================================================
  371. 192.168.100.4: IPMI 2.0 Set Session Privilege Level Request
  372. 192.168.100.4: =====================================================
  373. 192.168.100.4: RMCP Header:
  374. 192.168.100.4: ------------
  375. 192.168.100.4: [ 6h] = version[ 8b]
  376. 192.168.100.4: [ 0h] = reserved[ 8b]
  377. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  378. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  379. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  380. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  381. 192.168.100.4: IPMI RMCPPLUS Session Header:
  382. 192.168.100.4: -----------------------------
  383. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  384. 192.168.100.4: [ 0h] = reserved1[ 4b]
  385. 192.168.100.4: [ 0h] = payload_type[ 6b]
  386. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  387. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  388. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  389. 192.168.100.4: [ 1h] = session_sequence_number[32b]
  390. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  391. 192.168.100.4: IPMI RMCPPLUS Payload:
  392. 192.168.100.4: ----------------------
  393. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  394. 192.168.100.4: [ 98h 7Fh 04h 05h FEh F3h 1Bh F3h ]
  395. 192.168.100.4: [ 4Dh 25h AEh FAh 9Eh C9h 49h AEh ]
  396. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 8B]
  397. 192.168.100.4: [ 20h 18h C8h 81h 10h 3Bh 04h 30h ]
  398. 192.168.100.4: [ 707060504030201h] = confidentiality_trailer[64b]
  399. 192.168.100.4: IPMI Message Header:
  400. 192.168.100.4: --------------------
  401. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  402. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  403. 192.168.100.4: [ 6h] = net_fn[ 6b]
  404. 192.168.100.4: [ C8h] = checksum1[ 8b]
  405. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  406. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  407. 192.168.100.4: [ 4h] = rq_seq[ 6b]
  408. 192.168.100.4: IPMI Command Data:
  409. 192.168.100.4: ------------------
  410. 192.168.100.4: [ 3Bh] = cmd[ 8b]
  411. 192.168.100.4: [ 4h] = privilege_level[ 4b]
  412. 192.168.100.4: [ 0h] = reserved1[ 4b]
  413. 192.168.100.4: IPMI Trailer:
  414. 192.168.100.4: -------------
  415. 192.168.100.4: [ 30h] = checksum2[ 8b]
  416. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  417. 192.168.100.4: ------------------------------
  418. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  419. 192.168.100.4: [ 2h] = pad_length[ 8b]
  420. 192.168.100.4: [ 7h] = next_header[ 8b]
  421. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  422. 192.168.100.4: [ E7h BAh 22h CFh A7h D4h DBh 8Dh ]
  423. 192.168.100.4: [ D7h F8h A0h 1Ch ]
  424. 192.168.100.4: =====================================================
  425. 192.168.100.4: IPMI 2.0 Set Session Privilege Level Response
  426. 192.168.100.4: =====================================================
  427. 192.168.100.4: RMCP Header:
  428. 192.168.100.4: ------------
  429. 192.168.100.4: [ 6h] = version[ 8b]
  430. 192.168.100.4: [ 0h] = reserved[ 8b]
  431. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  432. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  433. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  434. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  435. 192.168.100.4: IPMI RMCPPLUS Session Header:
  436. 192.168.100.4: -----------------------------
  437. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  438. 192.168.100.4: [ 0h] = reserved1[ 4b]
  439. 192.168.100.4: [ 0h] = payload_type[ 6b]
  440. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  441. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  442. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  443. 192.168.100.4: [ 1h] = session_sequence_number[32b]
  444. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  445. 192.168.100.4: IPMI RMCPPLUS Payload:
  446. 192.168.100.4: ----------------------
  447. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  448. 192.168.100.4: [ 1Fh B8h 0Eh F6h 4Fh 8Ah CFh F7h ]
  449. 192.168.100.4: [ 2Fh D2h 07h 32h 9Eh 08h 74h CBh ]
  450. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 9B]
  451. 192.168.100.4: [ 81h 1Ch 63h 20h 10h 3Bh 00h 04h ]
  452. 192.168.100.4: [ 91h ]
  453. 192.168.100.4: [ 6060504030201h] = confidentiality_trailer[56b]
  454. 192.168.100.4: IPMI Message Header:
  455. 192.168.100.4: --------------------
  456. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  457. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  458. 192.168.100.4: [ 7h] = net_fn[ 6b]
  459. 192.168.100.4: [ 63h] = checksum1[ 8b]
  460. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  461. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  462. 192.168.100.4: [ 4h] = rq_seq[ 6b]
  463. 192.168.100.4: IPMI Command Data:
  464. 192.168.100.4: ------------------
  465. 192.168.100.4: [ 3Bh] = cmd[ 8b]
  466. 192.168.100.4: [ 0h] = comp_code[ 8b]
  467. 192.168.100.4: [ 4h] = privilege_level[ 4b]
  468. 192.168.100.4: [ 0h] = reserved1[ 4b]
  469. 192.168.100.4: IPMI Trailer:
  470. 192.168.100.4: -------------
  471. 192.168.100.4: [ 91h] = checksum2[ 8b]
  472. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  473. 192.168.100.4: ------------------------------
  474. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  475. 192.168.100.4: [ 2h] = pad_length[ 8b]
  476. 192.168.100.4: [ 7h] = next_header[ 8b]
  477. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  478. 192.168.100.4: [ 18h 2Ah F0h 07h 7Bh 60h C6h 34h ]
  479. 192.168.100.4: [ 63h 04h 5Ah 15h ]
  480. Entering section `Chassis_Boot_Flags'
  481. Parsed `Chassis_Boot_Flags:Boot_Flags_Persistent=No'
  482. Parsed `Chassis_Boot_Flags:Boot_Device=PXE'
  483. Leaving section `Chassis_Boot_Flags'
  484. 192.168.100.4: =====================================================
  485. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  486. 192.168.100.4: =====================================================
  487. 192.168.100.4: RMCP Header:
  488. 192.168.100.4: ------------
  489. 192.168.100.4: [ 6h] = version[ 8b]
  490. 192.168.100.4: [ 0h] = reserved[ 8b]
  491. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  492. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  493. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  494. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  495. 192.168.100.4: IPMI RMCPPLUS Session Header:
  496. 192.168.100.4: -----------------------------
  497. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  498. 192.168.100.4: [ 0h] = reserved1[ 4b]
  499. 192.168.100.4: [ 0h] = payload_type[ 6b]
  500. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  501. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  502. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  503. 192.168.100.4: [ 2h] = session_sequence_number[32b]
  504. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  505. 192.168.100.4: IPMI RMCPPLUS Payload:
  506. 192.168.100.4: ----------------------
  507. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  508. 192.168.100.4: [ 85h FAh 35h E5h FEh F3h 86h CBh ]
  509. 192.168.100.4: [ 83h D6h 6Dh 81h 92h 10h F0h FEh ]
  510. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  511. 192.168.100.4: [ 20h 00h E0h 81h 14h 09h 05h 00h ]
  512. 192.168.100.4: [ 00h 5Dh ]
  513. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  514. 192.168.100.4: IPMI Message Header:
  515. 192.168.100.4: --------------------
  516. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  517. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  518. 192.168.100.4: [ 0h] = net_fn[ 6b]
  519. 192.168.100.4: [ E0h] = checksum1[ 8b]
  520. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  521. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  522. 192.168.100.4: [ 5h] = rq_seq[ 6b]
  523. 192.168.100.4: IPMI Command Data:
  524. 192.168.100.4: ------------------
  525. 192.168.100.4: [ 9h] = cmd[ 8b]
  526. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  527. 192.168.100.4: [ 0h] = reserved[ 1b]
  528. 192.168.100.4: [ 0h] = set_selector[ 8b]
  529. 192.168.100.4: [ 0h] = block_selector[ 8b]
  530. 192.168.100.4: IPMI Trailer:
  531. 192.168.100.4: -------------
  532. 192.168.100.4: [ 5Dh] = checksum2[ 8b]
  533. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  534. 192.168.100.4: ------------------------------
  535. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  536. 192.168.100.4: [ 2h] = pad_length[ 8b]
  537. 192.168.100.4: [ 7h] = next_header[ 8b]
  538. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  539. 192.168.100.4: [ D0h 3Dh B5h F7h 30h EBh 86h 89h ]
  540. 192.168.100.4: [ 9Fh 8Fh F6h 6Fh ]
  541. 192.168.100.4: =====================================================
  542. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  543. 192.168.100.4: =====================================================
  544. 192.168.100.4: RMCP Header:
  545. 192.168.100.4: ------------
  546. 192.168.100.4: [ 6h] = version[ 8b]
  547. 192.168.100.4: [ 0h] = reserved[ 8b]
  548. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  549. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  550. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  551. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  552. 192.168.100.4: IPMI RMCPPLUS Session Header:
  553. 192.168.100.4: -----------------------------
  554. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  555. 192.168.100.4: [ 0h] = reserved1[ 4b]
  556. 192.168.100.4: [ 0h] = payload_type[ 6b]
  557. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  558. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  559. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  560. 192.168.100.4: [ 2h] = session_sequence_number[32b]
  561. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  562. 192.168.100.4: IPMI RMCPPLUS Payload:
  563. 192.168.100.4: ----------------------
  564. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  565. 192.168.100.4: [ 42h 29h EEh 53h 3Eh 45h 10h 08h ]
  566. 192.168.100.4: [ E5h 11h 92h D3h 87h 27h 13h 9Eh ]
  567. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  568. 192.168.100.4: [ 81h 04h 7Bh 20h 14h 09h 00h 01h ]
  569. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  570. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  571. 192.168.100.4: [ 00h 00h BDh ]
  572. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  573. 192.168.100.4: IPMI Message Header:
  574. 192.168.100.4: --------------------
  575. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  576. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  577. 192.168.100.4: [ 1h] = net_fn[ 6b]
  578. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  579. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  580. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  581. 192.168.100.4: [ 5h] = rq_seq[ 6b]
  582. 192.168.100.4: IPMI Command Data:
  583. 192.168.100.4: ------------------
  584. 192.168.100.4: [ 9h] = cmd[ 8b]
  585. 192.168.100.4: [ 0h] = comp_code[ 8b]
  586. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  587. 192.168.100.4: [ 0h] = reserved[ 4b]
  588. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  589. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  590. 192.168.100.4: [ 0h] = reserved1[ 5b]
  591. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  592. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  593. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  594. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  595. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  596. 192.168.100.4: [ 0h] = boot_device[ 4b]
  597. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  598. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  599. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  600. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  601. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  602. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  603. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  604. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  605. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  606. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  607. 192.168.100.4: [ 0h] = reserved2[ 4b]
  608. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  609. 192.168.100.4: [ 0h] = reserved3[ 3b]
  610. 192.168.100.4: IPMI Trailer:
  611. 192.168.100.4: -------------
  612. 192.168.100.4: [ 0h] = checksum2[ 8b]
  613. 192.168.100.4: Payload Unexpected Data:
  614. 192.168.100.4: ------------------------
  615. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  616. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  617. 192.168.100.4: [ 00h 00h 00h BDh ]
  618. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  619. 192.168.100.4: ------------------------------
  620. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  621. 192.168.100.4: [ 2h] = pad_length[ 8b]
  622. 192.168.100.4: [ 7h] = next_header[ 8b]
  623. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  624. 192.168.100.4: [ FEh 70h 5Dh DFh 5Ah 16h A1h 9Eh ]
  625. 192.168.100.4: [ F2h FFh 59h ECh ]
  626. 192.168.100.4: =====================================================
  627. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  628. 192.168.100.4: =====================================================
  629. 192.168.100.4: RMCP Header:
  630. 192.168.100.4: ------------
  631. 192.168.100.4: [ 6h] = version[ 8b]
  632. 192.168.100.4: [ 0h] = reserved[ 8b]
  633. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  634. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  635. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  636. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  637. 192.168.100.4: IPMI RMCPPLUS Session Header:
  638. 192.168.100.4: -----------------------------
  639. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  640. 192.168.100.4: [ 0h] = reserved1[ 4b]
  641. 192.168.100.4: [ 0h] = payload_type[ 6b]
  642. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  643. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  644. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  645. 192.168.100.4: [ 3h] = session_sequence_number[32b]
  646. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  647. 192.168.100.4: IPMI RMCPPLUS Payload:
  648. 192.168.100.4: ----------------------
  649. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  650. 192.168.100.4: [ 17h 72h 1Dh 02h FAh 45h 04h 47h ]
  651. 192.168.100.4: [ 3Ch 6Eh F5h A2h 6Ch DBh 15h B2h ]
  652. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  653. 192.168.100.4: [ 20h 00h E0h 81h 18h 09h 05h 00h ]
  654. 192.168.100.4: [ 00h 59h ]
  655. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  656. 192.168.100.4: IPMI Message Header:
  657. 192.168.100.4: --------------------
  658. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  659. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  660. 192.168.100.4: [ 0h] = net_fn[ 6b]
  661. 192.168.100.4: [ E0h] = checksum1[ 8b]
  662. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  663. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  664. 192.168.100.4: [ 6h] = rq_seq[ 6b]
  665. 192.168.100.4: IPMI Command Data:
  666. 192.168.100.4: ------------------
  667. 192.168.100.4: [ 9h] = cmd[ 8b]
  668. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  669. 192.168.100.4: [ 0h] = reserved[ 1b]
  670. 192.168.100.4: [ 0h] = set_selector[ 8b]
  671. 192.168.100.4: [ 0h] = block_selector[ 8b]
  672. 192.168.100.4: IPMI Trailer:
  673. 192.168.100.4: -------------
  674. 192.168.100.4: [ 59h] = checksum2[ 8b]
  675. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  676. 192.168.100.4: ------------------------------
  677. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  678. 192.168.100.4: [ 2h] = pad_length[ 8b]
  679. 192.168.100.4: [ 7h] = next_header[ 8b]
  680. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  681. 192.168.100.4: [ E4h 64h 54h 81h 5Fh 7Eh 0Bh 46h ]
  682. 192.168.100.4: [ BEh 00h D5h 05h ]
  683. 192.168.100.4: =====================================================
  684. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  685. 192.168.100.4: =====================================================
  686. 192.168.100.4: RMCP Header:
  687. 192.168.100.4: ------------
  688. 192.168.100.4: [ 6h] = version[ 8b]
  689. 192.168.100.4: [ 0h] = reserved[ 8b]
  690. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  691. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  692. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  693. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  694. 192.168.100.4: IPMI RMCPPLUS Session Header:
  695. 192.168.100.4: -----------------------------
  696. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  697. 192.168.100.4: [ 0h] = reserved1[ 4b]
  698. 192.168.100.4: [ 0h] = payload_type[ 6b]
  699. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  700. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  701. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  702. 192.168.100.4: [ 3h] = session_sequence_number[32b]
  703. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  704. 192.168.100.4: IPMI RMCPPLUS Payload:
  705. 192.168.100.4: ----------------------
  706. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  707. 192.168.100.4: [ D3h 2Dh 83h 63h 67h C4h 26h DCh ]
  708. 192.168.100.4: [ 28h 23h 79h 59h 90h 20h 0Dh 45h ]
  709. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  710. 192.168.100.4: [ 81h 04h 7Bh 20h 18h 09h 00h 01h ]
  711. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  712. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  713. 192.168.100.4: [ 00h 00h B9h ]
  714. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  715. 192.168.100.4: IPMI Message Header:
  716. 192.168.100.4: --------------------
  717. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  718. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  719. 192.168.100.4: [ 1h] = net_fn[ 6b]
  720. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  721. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  722. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  723. 192.168.100.4: [ 6h] = rq_seq[ 6b]
  724. 192.168.100.4: IPMI Command Data:
  725. 192.168.100.4: ------------------
  726. 192.168.100.4: [ 9h] = cmd[ 8b]
  727. 192.168.100.4: [ 0h] = comp_code[ 8b]
  728. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  729. 192.168.100.4: [ 0h] = reserved[ 4b]
  730. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  731. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  732. 192.168.100.4: [ 0h] = reserved1[ 5b]
  733. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  734. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  735. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  736. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  737. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  738. 192.168.100.4: [ 0h] = boot_device[ 4b]
  739. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  740. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  741. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  742. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  743. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  744. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  745. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  746. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  747. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  748. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  749. 192.168.100.4: [ 0h] = reserved2[ 4b]
  750. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  751. 192.168.100.4: [ 0h] = reserved3[ 3b]
  752. 192.168.100.4: IPMI Trailer:
  753. 192.168.100.4: -------------
  754. 192.168.100.4: [ 0h] = checksum2[ 8b]
  755. 192.168.100.4: Payload Unexpected Data:
  756. 192.168.100.4: ------------------------
  757. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  758. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  759. 192.168.100.4: [ 00h 00h 00h B9h ]
  760. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  761. 192.168.100.4: ------------------------------
  762. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  763. 192.168.100.4: [ 2h] = pad_length[ 8b]
  764. 192.168.100.4: [ 7h] = next_header[ 8b]
  765. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  766. 192.168.100.4: [ 88h 6Ch 5Dh 42h C0h C5h C4h B4h ]
  767. 192.168.100.4: [ F1h 0Bh 8Ch 12h ]
  768. 192.168.100.4: =====================================================
  769. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  770. 192.168.100.4: =====================================================
  771. 192.168.100.4: RMCP Header:
  772. 192.168.100.4: ------------
  773. 192.168.100.4: [ 6h] = version[ 8b]
  774. 192.168.100.4: [ 0h] = reserved[ 8b]
  775. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  776. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  777. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  778. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  779. 192.168.100.4: IPMI RMCPPLUS Session Header:
  780. 192.168.100.4: -----------------------------
  781. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  782. 192.168.100.4: [ 0h] = reserved1[ 4b]
  783. 192.168.100.4: [ 0h] = payload_type[ 6b]
  784. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  785. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  786. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  787. 192.168.100.4: [ 4h] = session_sequence_number[32b]
  788. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  789. 192.168.100.4: IPMI RMCPPLUS Payload:
  790. 192.168.100.4: ----------------------
  791. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  792. 192.168.100.4: [ 65h C6h 02h C6h 1Fh C3h 05h D5h ]
  793. 192.168.100.4: [ C8h 67h C0h A3h D2h 28h 0Dh A0h ]
  794. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  795. 192.168.100.4: [ 20h 00h E0h 81h 1Ch 09h 05h 00h ]
  796. 192.168.100.4: [ 00h 55h ]
  797. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  798. 192.168.100.4: IPMI Message Header:
  799. 192.168.100.4: --------------------
  800. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  801. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  802. 192.168.100.4: [ 0h] = net_fn[ 6b]
  803. 192.168.100.4: [ E0h] = checksum1[ 8b]
  804. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  805. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  806. 192.168.100.4: [ 7h] = rq_seq[ 6b]
  807. 192.168.100.4: IPMI Command Data:
  808. 192.168.100.4: ------------------
  809. 192.168.100.4: [ 9h] = cmd[ 8b]
  810. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  811. 192.168.100.4: [ 0h] = reserved[ 1b]
  812. 192.168.100.4: [ 0h] = set_selector[ 8b]
  813. 192.168.100.4: [ 0h] = block_selector[ 8b]
  814. 192.168.100.4: IPMI Trailer:
  815. 192.168.100.4: -------------
  816. 192.168.100.4: [ 55h] = checksum2[ 8b]
  817. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  818. 192.168.100.4: ------------------------------
  819. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  820. 192.168.100.4: [ 2h] = pad_length[ 8b]
  821. 192.168.100.4: [ 7h] = next_header[ 8b]
  822. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  823. 192.168.100.4: [ 59h 67h 50h 08h AEh C3h 58h 0Ch ]
  824. 192.168.100.4: [ CAh A3h CEh 69h ]
  825. 192.168.100.4: =====================================================
  826. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  827. 192.168.100.4: =====================================================
  828. 192.168.100.4: RMCP Header:
  829. 192.168.100.4: ------------
  830. 192.168.100.4: [ 6h] = version[ 8b]
  831. 192.168.100.4: [ 0h] = reserved[ 8b]
  832. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  833. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  834. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  835. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  836. 192.168.100.4: IPMI RMCPPLUS Session Header:
  837. 192.168.100.4: -----------------------------
  838. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  839. 192.168.100.4: [ 0h] = reserved1[ 4b]
  840. 192.168.100.4: [ 0h] = payload_type[ 6b]
  841. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  842. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  843. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  844. 192.168.100.4: [ 4h] = session_sequence_number[32b]
  845. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  846. 192.168.100.4: IPMI RMCPPLUS Payload:
  847. 192.168.100.4: ----------------------
  848. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  849. 192.168.100.4: [ 1Eh 34h 3Ch 42h C2h 95h A3h E0h ]
  850. 192.168.100.4: [ 87h 95h EFh E2h 94h 9Ah 00h 1Fh ]
  851. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  852. 192.168.100.4: [ 81h 04h 7Bh 20h 1Ch 09h 00h 01h ]
  853. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  854. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  855. 192.168.100.4: [ 00h 00h B5h ]
  856. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  857. 192.168.100.4: IPMI Message Header:
  858. 192.168.100.4: --------------------
  859. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  860. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  861. 192.168.100.4: [ 1h] = net_fn[ 6b]
  862. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  863. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  864. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  865. 192.168.100.4: [ 7h] = rq_seq[ 6b]
  866. 192.168.100.4: IPMI Command Data:
  867. 192.168.100.4: ------------------
  868. 192.168.100.4: [ 9h] = cmd[ 8b]
  869. 192.168.100.4: [ 0h] = comp_code[ 8b]
  870. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  871. 192.168.100.4: [ 0h] = reserved[ 4b]
  872. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  873. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  874. 192.168.100.4: [ 0h] = reserved1[ 5b]
  875. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  876. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  877. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  878. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  879. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  880. 192.168.100.4: [ 0h] = boot_device[ 4b]
  881. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  882. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  883. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  884. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  885. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  886. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  887. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  888. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  889. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  890. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  891. 192.168.100.4: [ 0h] = reserved2[ 4b]
  892. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  893. 192.168.100.4: [ 0h] = reserved3[ 3b]
  894. 192.168.100.4: IPMI Trailer:
  895. 192.168.100.4: -------------
  896. 192.168.100.4: [ 0h] = checksum2[ 8b]
  897. 192.168.100.4: Payload Unexpected Data:
  898. 192.168.100.4: ------------------------
  899. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  900. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  901. 192.168.100.4: [ 00h 00h 00h B5h ]
  902. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  903. 192.168.100.4: ------------------------------
  904. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  905. 192.168.100.4: [ 2h] = pad_length[ 8b]
  906. 192.168.100.4: [ 7h] = next_header[ 8b]
  907. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  908. 192.168.100.4: [ C9h B0h EAh 40h 00h 3Ch C5h 5Ah ]
  909. 192.168.100.4: [ C3h FCh F7h 08h ]
  910. 192.168.100.4: =====================================================
  911. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  912. 192.168.100.4: =====================================================
  913. 192.168.100.4: RMCP Header:
  914. 192.168.100.4: ------------
  915. 192.168.100.4: [ 6h] = version[ 8b]
  916. 192.168.100.4: [ 0h] = reserved[ 8b]
  917. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  918. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  919. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  920. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  921. 192.168.100.4: IPMI RMCPPLUS Session Header:
  922. 192.168.100.4: -----------------------------
  923. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  924. 192.168.100.4: [ 0h] = reserved1[ 4b]
  925. 192.168.100.4: [ 0h] = payload_type[ 6b]
  926. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  927. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  928. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  929. 192.168.100.4: [ 5h] = session_sequence_number[32b]
  930. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  931. 192.168.100.4: IPMI RMCPPLUS Payload:
  932. 192.168.100.4: ----------------------
  933. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  934. 192.168.100.4: [ 82h C6h 51h 2Fh D1h 18h 84h 96h ]
  935. 192.168.100.4: [ 66h 1Ah ACh 4Bh 1Ch 80h 6Fh 66h ]
  936. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  937. 192.168.100.4: [ 20h 00h E0h 81h 20h 09h 05h 00h ]
  938. 192.168.100.4: [ 00h 51h ]
  939. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  940. 192.168.100.4: IPMI Message Header:
  941. 192.168.100.4: --------------------
  942. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  943. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  944. 192.168.100.4: [ 0h] = net_fn[ 6b]
  945. 192.168.100.4: [ E0h] = checksum1[ 8b]
  946. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  947. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  948. 192.168.100.4: [ 8h] = rq_seq[ 6b]
  949. 192.168.100.4: IPMI Command Data:
  950. 192.168.100.4: ------------------
  951. 192.168.100.4: [ 9h] = cmd[ 8b]
  952. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  953. 192.168.100.4: [ 0h] = reserved[ 1b]
  954. 192.168.100.4: [ 0h] = set_selector[ 8b]
  955. 192.168.100.4: [ 0h] = block_selector[ 8b]
  956. 192.168.100.4: IPMI Trailer:
  957. 192.168.100.4: -------------
  958. 192.168.100.4: [ 51h] = checksum2[ 8b]
  959. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  960. 192.168.100.4: ------------------------------
  961. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  962. 192.168.100.4: [ 2h] = pad_length[ 8b]
  963. 192.168.100.4: [ 7h] = next_header[ 8b]
  964. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  965. 192.168.100.4: [ 29h DFh DFh F1h 30h 1Ah AFh E1h ]
  966. 192.168.100.4: [ 62h 91h 2Eh 96h ]
  967. 192.168.100.4: =====================================================
  968. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  969. 192.168.100.4: =====================================================
  970. 192.168.100.4: RMCP Header:
  971. 192.168.100.4: ------------
  972. 192.168.100.4: [ 6h] = version[ 8b]
  973. 192.168.100.4: [ 0h] = reserved[ 8b]
  974. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  975. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  976. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  977. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  978. 192.168.100.4: IPMI RMCPPLUS Session Header:
  979. 192.168.100.4: -----------------------------
  980. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  981. 192.168.100.4: [ 0h] = reserved1[ 4b]
  982. 192.168.100.4: [ 0h] = payload_type[ 6b]
  983. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  984. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  985. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  986. 192.168.100.4: [ 5h] = session_sequence_number[32b]
  987. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  988. 192.168.100.4: IPMI RMCPPLUS Payload:
  989. 192.168.100.4: ----------------------
  990. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  991. 192.168.100.4: [ A4h 4Ch 3Fh 21h 66h 4Eh 9Bh ACh ]
  992. 192.168.100.4: [ 95h E9h E2h 97h 54h 6Dh 7Bh 05h ]
  993. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  994. 192.168.100.4: [ 81h 04h 7Bh 20h 20h 09h 00h 01h ]
  995. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  996. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  997. 192.168.100.4: [ 00h 00h B1h ]
  998. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  999. 192.168.100.4: IPMI Message Header:
  1000. 192.168.100.4: --------------------
  1001. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1002. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1003. 192.168.100.4: [ 1h] = net_fn[ 6b]
  1004. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  1005. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1006. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1007. 192.168.100.4: [ 8h] = rq_seq[ 6b]
  1008. 192.168.100.4: IPMI Command Data:
  1009. 192.168.100.4: ------------------
  1010. 192.168.100.4: [ 9h] = cmd[ 8b]
  1011. 192.168.100.4: [ 0h] = comp_code[ 8b]
  1012. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  1013. 192.168.100.4: [ 0h] = reserved[ 4b]
  1014. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1015. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  1016. 192.168.100.4: [ 0h] = reserved1[ 5b]
  1017. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  1018. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  1019. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  1020. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  1021. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  1022. 192.168.100.4: [ 0h] = boot_device[ 4b]
  1023. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  1024. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  1025. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  1026. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  1027. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  1028. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  1029. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  1030. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  1031. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  1032. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  1033. 192.168.100.4: [ 0h] = reserved2[ 4b]
  1034. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  1035. 192.168.100.4: [ 0h] = reserved3[ 3b]
  1036. 192.168.100.4: IPMI Trailer:
  1037. 192.168.100.4: -------------
  1038. 192.168.100.4: [ 0h] = checksum2[ 8b]
  1039. 192.168.100.4: Payload Unexpected Data:
  1040. 192.168.100.4: ------------------------
  1041. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1042. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1043. 192.168.100.4: [ 00h 00h 00h B1h ]
  1044. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1045. 192.168.100.4: ------------------------------
  1046. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1047. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1048. 192.168.100.4: [ 7h] = next_header[ 8b]
  1049. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1050. 192.168.100.4: [ 99h F7h 81h 70h 58h 54h 1Eh 25h ]
  1051. 192.168.100.4: [ 27h F7h 38h 5Eh ]
  1052. 192.168.100.4: =====================================================
  1053. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  1054. 192.168.100.4: =====================================================
  1055. 192.168.100.4: RMCP Header:
  1056. 192.168.100.4: ------------
  1057. 192.168.100.4: [ 6h] = version[ 8b]
  1058. 192.168.100.4: [ 0h] = reserved[ 8b]
  1059. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1060. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1061. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1062. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1063. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1064. 192.168.100.4: -----------------------------
  1065. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1066. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1067. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1068. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1069. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1070. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  1071. 192.168.100.4: [ 6h] = session_sequence_number[32b]
  1072. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  1073. 192.168.100.4: IPMI RMCPPLUS Payload:
  1074. 192.168.100.4: ----------------------
  1075. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1076. 192.168.100.4: [ 48h 1Ah 01h A9h A4h 59h ADh 5Fh ]
  1077. 192.168.100.4: [ CCh 42h C7h 6Eh E4h 50h B1h FFh ]
  1078. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  1079. 192.168.100.4: [ 20h 00h E0h 81h 24h 09h 05h 00h ]
  1080. 192.168.100.4: [ 00h 4Dh ]
  1081. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  1082. 192.168.100.4: IPMI Message Header:
  1083. 192.168.100.4: --------------------
  1084. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1085. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1086. 192.168.100.4: [ 0h] = net_fn[ 6b]
  1087. 192.168.100.4: [ E0h] = checksum1[ 8b]
  1088. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1089. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1090. 192.168.100.4: [ 9h] = rq_seq[ 6b]
  1091. 192.168.100.4: IPMI Command Data:
  1092. 192.168.100.4: ------------------
  1093. 192.168.100.4: [ 9h] = cmd[ 8b]
  1094. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1095. 192.168.100.4: [ 0h] = reserved[ 1b]
  1096. 192.168.100.4: [ 0h] = set_selector[ 8b]
  1097. 192.168.100.4: [ 0h] = block_selector[ 8b]
  1098. 192.168.100.4: IPMI Trailer:
  1099. 192.168.100.4: -------------
  1100. 192.168.100.4: [ 4Dh] = checksum2[ 8b]
  1101. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1102. 192.168.100.4: ------------------------------
  1103. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1104. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1105. 192.168.100.4: [ 7h] = next_header[ 8b]
  1106. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1107. 192.168.100.4: [ 92h A2h DAh A3h DEh 25h FBh 79h ]
  1108. 192.168.100.4: [ 25h 4Fh 8Dh 7Fh ]
  1109. 192.168.100.4: =====================================================
  1110. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  1111. 192.168.100.4: =====================================================
  1112. 192.168.100.4: RMCP Header:
  1113. 192.168.100.4: ------------
  1114. 192.168.100.4: [ 6h] = version[ 8b]
  1115. 192.168.100.4: [ 0h] = reserved[ 8b]
  1116. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1117. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1118. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1119. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1120. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1121. 192.168.100.4: -----------------------------
  1122. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1123. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1124. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1125. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1126. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1127. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  1128. 192.168.100.4: [ 6h] = session_sequence_number[32b]
  1129. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  1130. 192.168.100.4: IPMI RMCPPLUS Payload:
  1131. 192.168.100.4: ----------------------
  1132. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1133. 192.168.100.4: [ 6Eh 0Ch D7h C5h 2Ah 8Eh DCh 79h ]
  1134. 192.168.100.4: [ 8Eh 72h 27h F1h C1h 51h 44h 10h ]
  1135. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  1136. 192.168.100.4: [ 81h 04h 7Bh 20h 24h 09h 00h 01h ]
  1137. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1138. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1139. 192.168.100.4: [ 00h 00h ADh ]
  1140. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  1141. 192.168.100.4: IPMI Message Header:
  1142. 192.168.100.4: --------------------
  1143. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1144. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1145. 192.168.100.4: [ 1h] = net_fn[ 6b]
  1146. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  1147. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1148. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1149. 192.168.100.4: [ 9h] = rq_seq[ 6b]
  1150. 192.168.100.4: IPMI Command Data:
  1151. 192.168.100.4: ------------------
  1152. 192.168.100.4: [ 9h] = cmd[ 8b]
  1153. 192.168.100.4: [ 0h] = comp_code[ 8b]
  1154. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  1155. 192.168.100.4: [ 0h] = reserved[ 4b]
  1156. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1157. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  1158. 192.168.100.4: [ 0h] = reserved1[ 5b]
  1159. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  1160. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  1161. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  1162. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  1163. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  1164. 192.168.100.4: [ 0h] = boot_device[ 4b]
  1165. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  1166. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  1167. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  1168. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  1169. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  1170. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  1171. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  1172. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  1173. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  1174. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  1175. 192.168.100.4: [ 0h] = reserved2[ 4b]
  1176. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  1177. 192.168.100.4: [ 0h] = reserved3[ 3b]
  1178. 192.168.100.4: IPMI Trailer:
  1179. 192.168.100.4: -------------
  1180. 192.168.100.4: [ 0h] = checksum2[ 8b]
  1181. 192.168.100.4: Payload Unexpected Data:
  1182. 192.168.100.4: ------------------------
  1183. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1184. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1185. 192.168.100.4: [ 00h 00h 00h ADh ]
  1186. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1187. 192.168.100.4: ------------------------------
  1188. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1189. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1190. 192.168.100.4: [ 7h] = next_header[ 8b]
  1191. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1192. 192.168.100.4: [ 29h 7Fh D9h 27h 62h FEh 1Bh ACh ]
  1193. 192.168.100.4: [ D0h 42h 25h DAh ]
  1194. 192.168.100.4: =====================================================
  1195. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  1196. 192.168.100.4: =====================================================
  1197. 192.168.100.4: RMCP Header:
  1198. 192.168.100.4: ------------
  1199. 192.168.100.4: [ 6h] = version[ 8b]
  1200. 192.168.100.4: [ 0h] = reserved[ 8b]
  1201. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1202. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1203. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1204. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1205. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1206. 192.168.100.4: -----------------------------
  1207. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1208. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1209. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1210. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1211. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1212. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  1213. 192.168.100.4: [ 7h] = session_sequence_number[32b]
  1214. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  1215. 192.168.100.4: IPMI RMCPPLUS Payload:
  1216. 192.168.100.4: ----------------------
  1217. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1218. 192.168.100.4: [ 15h D1h 82h 45h 22h 73h B8h 77h ]
  1219. 192.168.100.4: [ A1h 96h 4Eh D2h FFh 1Fh 08h 50h ]
  1220. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  1221. 192.168.100.4: [ 20h 00h E0h 81h 28h 09h 05h 00h ]
  1222. 192.168.100.4: [ 00h 49h ]
  1223. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  1224. 192.168.100.4: IPMI Message Header:
  1225. 192.168.100.4: --------------------
  1226. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1227. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1228. 192.168.100.4: [ 0h] = net_fn[ 6b]
  1229. 192.168.100.4: [ E0h] = checksum1[ 8b]
  1230. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1231. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1232. 192.168.100.4: [ Ah] = rq_seq[ 6b]
  1233. 192.168.100.4: IPMI Command Data:
  1234. 192.168.100.4: ------------------
  1235. 192.168.100.4: [ 9h] = cmd[ 8b]
  1236. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1237. 192.168.100.4: [ 0h] = reserved[ 1b]
  1238. 192.168.100.4: [ 0h] = set_selector[ 8b]
  1239. 192.168.100.4: [ 0h] = block_selector[ 8b]
  1240. 192.168.100.4: IPMI Trailer:
  1241. 192.168.100.4: -------------
  1242. 192.168.100.4: [ 49h] = checksum2[ 8b]
  1243. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1244. 192.168.100.4: ------------------------------
  1245. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1246. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1247. 192.168.100.4: [ 7h] = next_header[ 8b]
  1248. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1249. 192.168.100.4: [ 49h 63h 68h 1Ch A2h 2Eh 78h A1h ]
  1250. 192.168.100.4: [ 13h AEh E7h DEh ]
  1251. 192.168.100.4: =====================================================
  1252. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  1253. 192.168.100.4: =====================================================
  1254. 192.168.100.4: RMCP Header:
  1255. 192.168.100.4: ------------
  1256. 192.168.100.4: [ 6h] = version[ 8b]
  1257. 192.168.100.4: [ 0h] = reserved[ 8b]
  1258. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1259. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1260. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1261. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1262. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1263. 192.168.100.4: -----------------------------
  1264. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1265. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1266. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1267. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1268. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1269. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  1270. 192.168.100.4: [ 7h] = session_sequence_number[32b]
  1271. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  1272. 192.168.100.4: IPMI RMCPPLUS Payload:
  1273. 192.168.100.4: ----------------------
  1274. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1275. 192.168.100.4: [ CDh 5Eh A5h 79h 69h 15h DCh 2Bh ]
  1276. 192.168.100.4: [ B2h DEh 76h 1Ah 7Dh 8Ah 30h 34h ]
  1277. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  1278. 192.168.100.4: [ 81h 04h 7Bh 20h 28h 09h 00h 01h ]
  1279. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1280. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1281. 192.168.100.4: [ 00h 00h A9h ]
  1282. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  1283. 192.168.100.4: IPMI Message Header:
  1284. 192.168.100.4: --------------------
  1285. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1286. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1287. 192.168.100.4: [ 1h] = net_fn[ 6b]
  1288. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  1289. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1290. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1291. 192.168.100.4: [ Ah] = rq_seq[ 6b]
  1292. 192.168.100.4: IPMI Command Data:
  1293. 192.168.100.4: ------------------
  1294. 192.168.100.4: [ 9h] = cmd[ 8b]
  1295. 192.168.100.4: [ 0h] = comp_code[ 8b]
  1296. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  1297. 192.168.100.4: [ 0h] = reserved[ 4b]
  1298. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1299. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  1300. 192.168.100.4: [ 0h] = reserved1[ 5b]
  1301. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  1302. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  1303. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  1304. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  1305. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  1306. 192.168.100.4: [ 0h] = boot_device[ 4b]
  1307. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  1308. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  1309. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  1310. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  1311. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  1312. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  1313. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  1314. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  1315. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  1316. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  1317. 192.168.100.4: [ 0h] = reserved2[ 4b]
  1318. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  1319. 192.168.100.4: [ 0h] = reserved3[ 3b]
  1320. 192.168.100.4: IPMI Trailer:
  1321. 192.168.100.4: -------------
  1322. 192.168.100.4: [ 0h] = checksum2[ 8b]
  1323. 192.168.100.4: Payload Unexpected Data:
  1324. 192.168.100.4: ------------------------
  1325. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1326. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1327. 192.168.100.4: [ 00h 00h 00h A9h ]
  1328. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1329. 192.168.100.4: ------------------------------
  1330. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1331. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1332. 192.168.100.4: [ 7h] = next_header[ 8b]
  1333. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1334. 192.168.100.4: [ 97h D3h 35h 12h D3h 4Eh DFh 1Dh ]
  1335. 192.168.100.4: [ 72h 57h 6Ch 48h ]
  1336. 192.168.100.4: =====================================================
  1337. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  1338. 192.168.100.4: =====================================================
  1339. 192.168.100.4: RMCP Header:
  1340. 192.168.100.4: ------------
  1341. 192.168.100.4: [ 6h] = version[ 8b]
  1342. 192.168.100.4: [ 0h] = reserved[ 8b]
  1343. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1344. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1345. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1346. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1347. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1348. 192.168.100.4: -----------------------------
  1349. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1350. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1351. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1352. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1353. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1354. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  1355. 192.168.100.4: [ 8h] = session_sequence_number[32b]
  1356. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  1357. 192.168.100.4: IPMI RMCPPLUS Payload:
  1358. 192.168.100.4: ----------------------
  1359. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1360. 192.168.100.4: [ 68h 2Dh F4h 8Ch DEh FEh A5h E8h ]
  1361. 192.168.100.4: [ EEh E9h 3Ah BEh 34h 8Dh 29h E8h ]
  1362. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  1363. 192.168.100.4: [ 20h 00h E0h 81h 2Ch 09h 05h 00h ]
  1364. 192.168.100.4: [ 00h 45h ]
  1365. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  1366. 192.168.100.4: IPMI Message Header:
  1367. 192.168.100.4: --------------------
  1368. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1369. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1370. 192.168.100.4: [ 0h] = net_fn[ 6b]
  1371. 192.168.100.4: [ E0h] = checksum1[ 8b]
  1372. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1373. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1374. 192.168.100.4: [ Bh] = rq_seq[ 6b]
  1375. 192.168.100.4: IPMI Command Data:
  1376. 192.168.100.4: ------------------
  1377. 192.168.100.4: [ 9h] = cmd[ 8b]
  1378. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1379. 192.168.100.4: [ 0h] = reserved[ 1b]
  1380. 192.168.100.4: [ 0h] = set_selector[ 8b]
  1381. 192.168.100.4: [ 0h] = block_selector[ 8b]
  1382. 192.168.100.4: IPMI Trailer:
  1383. 192.168.100.4: -------------
  1384. 192.168.100.4: [ 45h] = checksum2[ 8b]
  1385. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1386. 192.168.100.4: ------------------------------
  1387. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1388. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1389. 192.168.100.4: [ 7h] = next_header[ 8b]
  1390. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1391. 192.168.100.4: [ 95h 99h 5Dh D0h B1h 0Fh 2Eh 9Bh ]
  1392. 192.168.100.4: [ 1Ah 5Eh D2h 8Fh ]
  1393. 192.168.100.4: =====================================================
  1394. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  1395. 192.168.100.4: =====================================================
  1396. 192.168.100.4: RMCP Header:
  1397. 192.168.100.4: ------------
  1398. 192.168.100.4: [ 6h] = version[ 8b]
  1399. 192.168.100.4: [ 0h] = reserved[ 8b]
  1400. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1401. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1402. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1403. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1404. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1405. 192.168.100.4: -----------------------------
  1406. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1407. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1408. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1409. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1410. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1411. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  1412. 192.168.100.4: [ 8h] = session_sequence_number[32b]
  1413. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  1414. 192.168.100.4: IPMI RMCPPLUS Payload:
  1415. 192.168.100.4: ----------------------
  1416. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1417. 192.168.100.4: [ 7Dh 77h CFh 8Bh 27h C0h C1h BCh ]
  1418. 192.168.100.4: [ B1h E8h 4Ah 9Ch 31h 58h 84h 0Dh ]
  1419. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  1420. 192.168.100.4: [ 81h 04h 7Bh 20h 2Ch 09h 00h 01h ]
  1421. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1422. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1423. 192.168.100.4: [ 00h 00h A5h ]
  1424. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  1425. 192.168.100.4: IPMI Message Header:
  1426. 192.168.100.4: --------------------
  1427. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1428. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1429. 192.168.100.4: [ 1h] = net_fn[ 6b]
  1430. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  1431. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1432. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1433. 192.168.100.4: [ Bh] = rq_seq[ 6b]
  1434. 192.168.100.4: IPMI Command Data:
  1435. 192.168.100.4: ------------------
  1436. 192.168.100.4: [ 9h] = cmd[ 8b]
  1437. 192.168.100.4: [ 0h] = comp_code[ 8b]
  1438. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  1439. 192.168.100.4: [ 0h] = reserved[ 4b]
  1440. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1441. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  1442. 192.168.100.4: [ 0h] = reserved1[ 5b]
  1443. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  1444. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  1445. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  1446. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  1447. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  1448. 192.168.100.4: [ 0h] = boot_device[ 4b]
  1449. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  1450. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  1451. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  1452. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  1453. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  1454. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  1455. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  1456. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  1457. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  1458. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  1459. 192.168.100.4: [ 0h] = reserved2[ 4b]
  1460. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  1461. 192.168.100.4: [ 0h] = reserved3[ 3b]
  1462. 192.168.100.4: IPMI Trailer:
  1463. 192.168.100.4: -------------
  1464. 192.168.100.4: [ 0h] = checksum2[ 8b]
  1465. 192.168.100.4: Payload Unexpected Data:
  1466. 192.168.100.4: ------------------------
  1467. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1468. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1469. 192.168.100.4: [ 00h 00h 00h A5h ]
  1470. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1471. 192.168.100.4: ------------------------------
  1472. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1473. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1474. 192.168.100.4: [ 7h] = next_header[ 8b]
  1475. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1476. 192.168.100.4: [ 99h 0Ah D8h 60h AFh 63h FDh 67h ]
  1477. 192.168.100.4: [ 97h 31h CDh 01h ]
  1478. 192.168.100.4: =====================================================
  1479. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  1480. 192.168.100.4: =====================================================
  1481. 192.168.100.4: RMCP Header:
  1482. 192.168.100.4: ------------
  1483. 192.168.100.4: [ 6h] = version[ 8b]
  1484. 192.168.100.4: [ 0h] = reserved[ 8b]
  1485. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1486. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1487. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1488. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1489. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1490. 192.168.100.4: -----------------------------
  1491. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1492. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1493. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1494. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1495. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1496. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  1497. 192.168.100.4: [ 9h] = session_sequence_number[32b]
  1498. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  1499. 192.168.100.4: IPMI RMCPPLUS Payload:
  1500. 192.168.100.4: ----------------------
  1501. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1502. 192.168.100.4: [ 22h 34h 1Dh A2h D8h ADh C2h 0Ah ]
  1503. 192.168.100.4: [ 66h ACh E4h BBh E5h 6Bh D7h 3Dh ]
  1504. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  1505. 192.168.100.4: [ 20h 00h E0h 81h 30h 09h 05h 00h ]
  1506. 192.168.100.4: [ 00h 41h ]
  1507. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  1508. 192.168.100.4: IPMI Message Header:
  1509. 192.168.100.4: --------------------
  1510. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1511. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1512. 192.168.100.4: [ 0h] = net_fn[ 6b]
  1513. 192.168.100.4: [ E0h] = checksum1[ 8b]
  1514. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1515. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1516. 192.168.100.4: [ Ch] = rq_seq[ 6b]
  1517. 192.168.100.4: IPMI Command Data:
  1518. 192.168.100.4: ------------------
  1519. 192.168.100.4: [ 9h] = cmd[ 8b]
  1520. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1521. 192.168.100.4: [ 0h] = reserved[ 1b]
  1522. 192.168.100.4: [ 0h] = set_selector[ 8b]
  1523. 192.168.100.4: [ 0h] = block_selector[ 8b]
  1524. 192.168.100.4: IPMI Trailer:
  1525. 192.168.100.4: -------------
  1526. 192.168.100.4: [ 41h] = checksum2[ 8b]
  1527. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1528. 192.168.100.4: ------------------------------
  1529. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1530. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1531. 192.168.100.4: [ 7h] = next_header[ 8b]
  1532. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1533. 192.168.100.4: [ AFh C5h 1Bh F1h 37h 52h 7Bh 7Ch ]
  1534. 192.168.100.4: [ 0Eh 7Eh A9h 97h ]
  1535. 192.168.100.4: =====================================================
  1536. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  1537. 192.168.100.4: =====================================================
  1538. 192.168.100.4: RMCP Header:
  1539. 192.168.100.4: ------------
  1540. 192.168.100.4: [ 6h] = version[ 8b]
  1541. 192.168.100.4: [ 0h] = reserved[ 8b]
  1542. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1543. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1544. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1545. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1546. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1547. 192.168.100.4: -----------------------------
  1548. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1549. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1550. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1551. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1552. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1553. 192.168.100.4: [ BB9BAD18h] = session_id[32b]
  1554. 192.168.100.4: [ 9h] = session_sequence_number[32b]
  1555. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  1556. 192.168.100.4: IPMI RMCPPLUS Payload:
  1557. 192.168.100.4: ----------------------
  1558. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1559. 192.168.100.4: [ F9h 63h 78h 64h 68h 9Fh 91h 73h ]
  1560. 192.168.100.4: [ 2Dh 68h A8h 95h B7h C9h E7h 4Ah ]
  1561. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  1562. 192.168.100.4: [ 81h 04h 7Bh 20h 30h 09h 00h 01h ]
  1563. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  1564. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1565. 192.168.100.4: [ 00h 00h A1h ]
  1566. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  1567. 192.168.100.4: IPMI Message Header:
  1568. 192.168.100.4: --------------------
  1569. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1570. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1571. 192.168.100.4: [ 1h] = net_fn[ 6b]
  1572. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  1573. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1574. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1575. 192.168.100.4: [ Ch] = rq_seq[ 6b]
  1576. 192.168.100.4: IPMI Command Data:
  1577. 192.168.100.4: ------------------
  1578. 192.168.100.4: [ 9h] = cmd[ 8b]
  1579. 192.168.100.4: [ 0h] = comp_code[ 8b]
  1580. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  1581. 192.168.100.4: [ 0h] = reserved[ 4b]
  1582. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1583. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  1584. 192.168.100.4: [ 0h] = reserved1[ 5b]
  1585. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  1586. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  1587. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  1588. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  1589. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  1590. 192.168.100.4: [ 0h] = boot_device[ 4b]
  1591. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  1592. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  1593. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  1594. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  1595. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  1596. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  1597. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  1598. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  1599. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  1600. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  1601. 192.168.100.4: [ 0h] = reserved2[ 4b]
  1602. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  1603. 192.168.100.4: [ 0h] = reserved3[ 3b]
  1604. 192.168.100.4: IPMI Trailer:
  1605. 192.168.100.4: -------------
  1606. 192.168.100.4: [ 0h] = checksum2[ 8b]
  1607. 192.168.100.4: Payload Unexpected Data:
  1608. 192.168.100.4: ------------------------
  1609. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  1610. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  1611. 192.168.100.4: [ 00h 00h 00h A1h ]
  1612. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1613. 192.168.100.4: ------------------------------
  1614. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1615. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1616. 192.168.100.4: [ 7h] = next_header[ 8b]
  1617. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1618. 192.168.100.4: [ 15h 45h 5Ah ACh 24h 81h 7Dh 7Bh ]
  1619. 192.168.100.4: [ FAh 06h BEh DDh ]
  1620. 192.168.100.4: =====================================================
  1621. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  1622. 192.168.100.4: =====================================================
  1623. 192.168.100.4: RMCP Header:
  1624. 192.168.100.4: ------------
  1625. 192.168.100.4: [ 6h] = version[ 8b]
  1626. 192.168.100.4: [ 0h] = reserved[ 8b]
  1627. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1628. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1629. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1630. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1631. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1632. 192.168.100.4: -----------------------------
  1633. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1634. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1635. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1636. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1637. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1638. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  1639. 192.168.100.4: [ Ah] = session_sequence_number[32b]
  1640. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  1641. 192.168.100.4: IPMI RMCPPLUS Payload:
  1642. 192.168.100.4: ----------------------
  1643. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1644. 192.168.100.4: [ F1h CEh CDh 84h C9h ABh 1Fh F9h ]
  1645. 192.168.100.4: [ E0h CEh 14h AEh ECh 49h DCh 9Bh ]
  1646. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  1647. 192.168.100.4: [ 20h 00h E0h 81h 34h 09h 05h 00h ]
  1648. 192.168.100.4: [ 00h 3Dh ]
  1649. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  1650. 192.168.100.4: IPMI Message Header:
  1651. 192.168.100.4: --------------------
  1652. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1653. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1654. 192.168.100.4: [ 0h] = net_fn[ 6b]
  1655. 192.168.100.4: [ E0h] = checksum1[ 8b]
  1656. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1657. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1658. 192.168.100.4: [ Dh] = rq_seq[ 6b]
  1659. 192.168.100.4: IPMI Command Data:
  1660. 192.168.100.4: ------------------
  1661. 192.168.100.4: [ 9h] = cmd[ 8b]
  1662. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  1663. 192.168.100.4: [ 0h] = reserved[ 1b]
  1664. 192.168.100.4: [ 0h] = set_selector[ 8b]
  1665. 192.168.100.4: [ 0h] = block_selector[ 8b]
  1666. 192.168.100.4: IPMI Trailer:
  1667. 192.168.100.4: -------------
  1668. 192.168.100.4: [ 3Dh] = checksum2[ 8b]
  1669. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1670. 192.168.100.4: ------------------------------
  1671. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1672. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1673. 192.168.100.4: [ 7h] = next_header[ 8b]
  1674. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1675. 192.168.100.4: [ 3Eh 59h 11h 52h 0Fh C4h BEh 4Ch ]
  1676. 192.168.100.4: [ 56h ACh CAh 77h ]
  1677. ipmi_cmd_get_system_boot_options_boot_flags: session timeout
  1678. 192.168.100.4: =====================================================
  1679. 192.168.100.4: IPMI 2.0 Close Session Request
  1680. 192.168.100.4: =====================================================
  1681. 192.168.100.4: RMCP Header:
  1682. 192.168.100.4: ------------
  1683. 192.168.100.4: [ 6h] = version[ 8b]
  1684. 192.168.100.4: [ 0h] = reserved[ 8b]
  1685. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1686. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1687. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1688. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1689. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1690. 192.168.100.4: -----------------------------
  1691. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1692. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1693. 192.168.100.4: [ 0h] = payload_type[ 6b]
  1694. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  1695. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  1696. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  1697. 192.168.100.4: [ Bh] = session_sequence_number[32b]
  1698. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  1699. 192.168.100.4: IPMI RMCPPLUS Payload:
  1700. 192.168.100.4: ----------------------
  1701. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  1702. 192.168.100.4: [ 07h 63h 09h 09h 61h D8h 12h 74h ]
  1703. 192.168.100.4: [ 23h DEh A9h 49h B0h 4Ch 54h 7Dh ]
  1704. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[11B]
  1705. 192.168.100.4: [ 20h 18h C8h 81h 38h 3Ch 30h CBh ]
  1706. 192.168.100.4: [ 8Fh 00h 81h ]
  1707. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  1708. 192.168.100.4: IPMI Message Header:
  1709. 192.168.100.4: --------------------
  1710. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1711. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1712. 192.168.100.4: [ 6h] = net_fn[ 6b]
  1713. 192.168.100.4: [ C8h] = checksum1[ 8b]
  1714. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1715. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1716. 192.168.100.4: [ Eh] = rq_seq[ 6b]
  1717. 192.168.100.4: IPMI Command Data:
  1718. 192.168.100.4: ------------------
  1719. 192.168.100.4: [ 3Ch] = cmd[ 8b]
  1720. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  1721. 192.168.100.4: IPMI Trailer:
  1722. 192.168.100.4: -------------
  1723. 192.168.100.4: [ 81h] = checksum2[ 8b]
  1724. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  1725. 192.168.100.4: ------------------------------
  1726. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  1727. 192.168.100.4: [ 2h] = pad_length[ 8b]
  1728. 192.168.100.4: [ 7h] = next_header[ 8b]
  1729. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  1730. 192.168.100.4: [ 56h CDh 56h BAh 10h 50h 67h 35h ]
  1731. 192.168.100.4: [ 1Fh 15h D4h 61h ]
  1732. ubuntu@maas:~$ ipmi-chassis-config -D LAN_2_0 -h 192.168.100.4 -u Administrator -p openstack --debug --commit --filename ipmi.cfg
  1733. 192.168.100.4: =====================================================
  1734. 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Request
  1735. 192.168.100.4: =====================================================
  1736. 192.168.100.4: RMCP Header:
  1737. 192.168.100.4: ------------
  1738. 192.168.100.4: [ 6h] = version[ 8b]
  1739. 192.168.100.4: [ 0h] = reserved[ 8b]
  1740. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1741. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1742. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1743. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1744. 192.168.100.4: IPMI Session Header:
  1745. 192.168.100.4: --------------------
  1746. 192.168.100.4: [ 0h] = authentication_type[ 8b]
  1747. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  1748. 192.168.100.4: [ 0h] = session_id[32b]
  1749. 192.168.100.4: [ 9h] = ipmi_msg_len[ 8b]
  1750. 192.168.100.4: IPMI Message Header:
  1751. 192.168.100.4: --------------------
  1752. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1753. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1754. 192.168.100.4: [ 6h] = net_fn[ 6b]
  1755. 192.168.100.4: [ C8h] = checksum1[ 8b]
  1756. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1757. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1758. 192.168.100.4: [ 13h] = rq_seq[ 6b]
  1759. 192.168.100.4: IPMI Command Data:
  1760. 192.168.100.4: ------------------
  1761. 192.168.100.4: [ 38h] = cmd[ 8b]
  1762. 192.168.100.4: [ Eh] = channel_number[ 4b]
  1763. 192.168.100.4: [ 0h] = reserved1[ 3b]
  1764. 192.168.100.4: [ 1h] = get_ipmi_v2.0_extended_data[ 1b]
  1765. 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b]
  1766. 192.168.100.4: [ 0h] = reserved2[ 4b]
  1767. 192.168.100.4: IPMI Trailer:
  1768. 192.168.100.4: --------------
  1769. 192.168.100.4: [ 69h] = checksum2[ 8b]
  1770. 192.168.100.4: =====================================================
  1771. 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Response
  1772. 192.168.100.4: =====================================================
  1773. 192.168.100.4: RMCP Header:
  1774. 192.168.100.4: ------------
  1775. 192.168.100.4: [ 6h] = version[ 8b]
  1776. 192.168.100.4: [ 0h] = reserved[ 8b]
  1777. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1778. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1779. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1780. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1781. 192.168.100.4: IPMI Session Header:
  1782. 192.168.100.4: --------------------
  1783. 192.168.100.4: [ 0h] = authentication_type[ 8b]
  1784. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  1785. 192.168.100.4: [ 0h] = session_id[32b]
  1786. 192.168.100.4: [ 10h] = ipmi_msg_len[ 8b]
  1787. 192.168.100.4: IPMI Message Header:
  1788. 192.168.100.4: --------------------
  1789. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  1790. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  1791. 192.168.100.4: [ 7h] = net_fn[ 6b]
  1792. 192.168.100.4: [ 63h] = checksum1[ 8b]
  1793. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  1794. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  1795. 192.168.100.4: [ 13h] = rq_seq[ 6b]
  1796. 192.168.100.4: IPMI Command Data:
  1797. 192.168.100.4: ------------------
  1798. 192.168.100.4: [ 38h] = cmd[ 8b]
  1799. 192.168.100.4: [ 0h] = comp_code[ 8b]
  1800. 192.168.100.4: [ 2h] = channel_number[ 8b]
  1801. 192.168.100.4: [ 0h] = authentication_type.none[ 1b]
  1802. 192.168.100.4: [ 0h] = authentication_type.md2[ 1b]
  1803. 192.168.100.4: [ 0h] = authentication_type.md5[ 1b]
  1804. 192.168.100.4: [ 0h] = authentication_type.reserved1[ 1b]
  1805. 192.168.100.4: [ 0h] = authentication_type.straight_password_key[ 1b]
  1806. 192.168.100.4: [ 0h] = authentication_type.oem_prop[ 1b]
  1807. 192.168.100.4: [ 0h] = authentication_type.reserved2[ 1b]
  1808. 192.168.100.4: [ 1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b]
  1809. 192.168.100.4: [ 0h] = authentication_status.anonymous_login[ 1b]
  1810. 192.168.100.4: [ 0h] = authentication_status.null_username[ 1b]
  1811. 192.168.100.4: [ 1h] = authentication_status.non_null_username[ 1b]
  1812. 192.168.100.4: [ 0h] = authentication_status.user_level_authentication[ 1b]
  1813. 192.168.100.4: [ 1h] = authentication_status.per_message_authentication[ 1b]
  1814. 192.168.100.4: [ 0h] = authentication_status.k_g[ 1b]
  1815. 192.168.100.4: [ 0h] = authentication_status.reserved[ 2b]
  1816. 192.168.100.4: [ 0h] = channel_supports_ipmi_v1.5_connections[ 1b]
  1817. 192.168.100.4: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b]
  1818. 192.168.100.4: [ 0h] = reserved[ 6b]
  1819. 192.168.100.4: [ 0h] = oem_id[24b]
  1820. 192.168.100.4: [ 0h] = oem_auxiliary_data[ 8b]
  1821. 192.168.100.4: IPMI Trailer:
  1822. 192.168.100.4: --------------
  1823. 192.168.100.4: [ C4h] = checksum2[ 8b]
  1824. 192.168.100.4: =====================================================
  1825. 192.168.100.4: IPMI 2.0 Open Session Request
  1826. 192.168.100.4: =====================================================
  1827. 192.168.100.4: RMCP Header:
  1828. 192.168.100.4: ------------
  1829. 192.168.100.4: [ 6h] = version[ 8b]
  1830. 192.168.100.4: [ 0h] = reserved[ 8b]
  1831. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1832. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1833. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1834. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1835. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1836. 192.168.100.4: -----------------------------
  1837. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1838. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1839. 192.168.100.4: [ 10h] = payload_type[ 6b]
  1840. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  1841. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  1842. 192.168.100.4: [ 0h] = session_id[32b]
  1843. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  1844. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  1845. 192.168.100.4: IPMI RMCPPLUS Payload:
  1846. 192.168.100.4: ----------------------
  1847. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[32B]
  1848. 192.168.100.4: [ 41h 00h 00h 00h 86h 37h 19h 9Dh ]
  1849. 192.168.100.4: [ 00h 00h 00h 08h 01h 00h 00h 00h ]
  1850. 192.168.100.4: [ 01h 00h 00h 08h 01h 00h 00h 00h ]
  1851. 192.168.100.4: [ 02h 00h 00h 08h 01h 00h 00h 00h ]
  1852. 192.168.100.4: IPMI Command Data:
  1853. 192.168.100.4: ------------------
  1854. 192.168.100.4: [ 41h] = message_tag[ 8b]
  1855. 192.168.100.4: [ 0h] = requested_maximum_privilege_level[ 4b]
  1856. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1857. 192.168.100.4: [ 0h] = reserved2[16b]
  1858. 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b]
  1859. 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b]
  1860. 192.168.100.4: [ 0h] = reserved3[16b]
  1861. 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b]
  1862. 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  1863. 192.168.100.4: [ 0h] = reserved4[ 2b]
  1864. 192.168.100.4: [ 0h] = reserved5[24b]
  1865. 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b]
  1866. 192.168.100.4: [ 0h] = reserved6[16b]
  1867. 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b]
  1868. 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  1869. 192.168.100.4: [ 0h] = reserved7[ 2b]
  1870. 192.168.100.4: [ 0h] = reserved8[24b]
  1871. 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b]
  1872. 192.168.100.4: [ 0h] = reserved9[16b]
  1873. 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b]
  1874. 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  1875. 192.168.100.4: [ 0h] = reserved10[ 2b]
  1876. 192.168.100.4: [ 0h] = reserved11[24b]
  1877. 192.168.100.4: =====================================================
  1878. 192.168.100.4: IPMI 2.0 Open Session Response
  1879. 192.168.100.4: =====================================================
  1880. 192.168.100.4: RMCP Header:
  1881. 192.168.100.4: ------------
  1882. 192.168.100.4: [ 6h] = version[ 8b]
  1883. 192.168.100.4: [ 0h] = reserved[ 8b]
  1884. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1885. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1886. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1887. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1888. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1889. 192.168.100.4: -----------------------------
  1890. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1891. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1892. 192.168.100.4: [ 11h] = payload_type[ 6b]
  1893. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  1894. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  1895. 192.168.100.4: [ 0h] = session_id[32b]
  1896. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  1897. 192.168.100.4: [ 24h] = ipmi_payload_len[16b]
  1898. 192.168.100.4: IPMI RMCPPLUS Payload:
  1899. 192.168.100.4: ----------------------
  1900. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[36B]
  1901. 192.168.100.4: [ 41h 00h 04h 00h 86h 37h 19h 9Dh ]
  1902. 192.168.100.4: [ 30h CBh 8Fh 00h 00h 00h 00h 08h ]
  1903. 192.168.100.4: [ 01h 00h 00h 00h 01h 00h 00h 08h ]
  1904. 192.168.100.4: [ 01h 00h 00h 00h 02h 00h 00h 08h ]
  1905. 192.168.100.4: [ 01h 00h 00h 00h ]
  1906. 192.168.100.4: IPMI Command Data:
  1907. 192.168.100.4: ------------------
  1908. 192.168.100.4: [ 41h] = message_tag[ 8b]
  1909. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  1910. 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b]
  1911. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1912. 192.168.100.4: [ 0h] = reserved2[ 8b]
  1913. 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b]
  1914. 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b]
  1915. 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b]
  1916. 192.168.100.4: [ 0h] = reserved3[16b]
  1917. 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b]
  1918. 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b]
  1919. 192.168.100.4: [ 0h] = reserved4[ 2b]
  1920. 192.168.100.4: [ 0h] = reserved5[24b]
  1921. 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b]
  1922. 192.168.100.4: [ 0h] = reserved6[16b]
  1923. 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b]
  1924. 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b]
  1925. 192.168.100.4: [ 0h] = reserved7[ 2b]
  1926. 192.168.100.4: [ 0h] = reserved8[24b]
  1927. 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b]
  1928. 192.168.100.4: [ 0h] = reserved9[16b]
  1929. 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b]
  1930. 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b]
  1931. 192.168.100.4: [ 0h] = reserved10[ 2b]
  1932. 192.168.100.4: [ 0h] = reserved11[24b]
  1933. 192.168.100.4: =====================================================
  1934. 192.168.100.4: IPMI 2.0 RAKP Message 1 Request
  1935. 192.168.100.4: =====================================================
  1936. 192.168.100.4: RMCP Header:
  1937. 192.168.100.4: ------------
  1938. 192.168.100.4: [ 6h] = version[ 8b]
  1939. 192.168.100.4: [ 0h] = reserved[ 8b]
  1940. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1941. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1942. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1943. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1944. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1945. 192.168.100.4: -----------------------------
  1946. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1947. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1948. 192.168.100.4: [ 12h] = payload_type[ 6b]
  1949. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  1950. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  1951. 192.168.100.4: [ 0h] = session_id[32b]
  1952. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  1953. 192.168.100.4: [ 29h] = ipmi_payload_len[16b]
  1954. 192.168.100.4: IPMI RMCPPLUS Payload:
  1955. 192.168.100.4: ----------------------
  1956. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[41B]
  1957. 192.168.100.4: [ 42h 00h 00h 00h 30h CBh 8Fh 00h ]
  1958. 192.168.100.4: [ AFh 2Ah 4Fh 60h 05h A1h D7h 59h ]
  1959. 192.168.100.4: [ E9h 45h 42h 12h 93h 4Ch B0h 9Bh ]
  1960. 192.168.100.4: [ 14h 00h 00h 0Dh 41h 64h 6Dh 69h ]
  1961. 192.168.100.4: [ 6Eh 69h 73h 74h 72h 61h 74h 6Fh ]
  1962. 192.168.100.4: [ 72h ]
  1963. 192.168.100.4: IPMI Command Data:
  1964. 192.168.100.4: ------------------
  1965. 192.168.100.4: [ 42h] = message_tag[ 8b]
  1966. 192.168.100.4: [ 0h] = reserved1[24b]
  1967. 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b]
  1968. 192.168.100.4: [ BYTE ARRAY ... ] = remote_console_random_number[16B]
  1969. 192.168.100.4: [ AFh 2Ah 4Fh 60h 05h A1h D7h 59h ]
  1970. 192.168.100.4: [ E9h 45h 42h 12h 93h 4Ch B0h 9Bh ]
  1971. 192.168.100.4: [ 4h] = requested_maximum_privilege_level[ 4b]
  1972. 192.168.100.4: [ 1h] = name_only_lookup[ 1b]
  1973. 192.168.100.4: [ 0h] = reserved2[ 3b]
  1974. 192.168.100.4: [ 0h] = reserved3[16b]
  1975. 192.168.100.4: [ Dh] = user_name_length[ 8b]
  1976. 192.168.100.4: [ BYTE ARRAY ... ] = user_name[13B]
  1977. 192.168.100.4: [ 41h 64h 6Dh 69h 6Eh 69h 73h 74h ]
  1978. 192.168.100.4: [ 72h 61h 74h 6Fh 72h ]
  1979. 192.168.100.4: =====================================================
  1980. 192.168.100.4: IPMI 2.0 RAKP Message 2 Response
  1981. 192.168.100.4: =====================================================
  1982. 192.168.100.4: RMCP Header:
  1983. 192.168.100.4: ------------
  1984. 192.168.100.4: [ 6h] = version[ 8b]
  1985. 192.168.100.4: [ 0h] = reserved[ 8b]
  1986. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  1987. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  1988. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  1989. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  1990. 192.168.100.4: IPMI RMCPPLUS Session Header:
  1991. 192.168.100.4: -----------------------------
  1992. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  1993. 192.168.100.4: [ 0h] = reserved1[ 4b]
  1994. 192.168.100.4: [ 13h] = payload_type[ 6b]
  1995. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  1996. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  1997. 192.168.100.4: [ 0h] = session_id[32b]
  1998. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  1999. 192.168.100.4: [ 3Ch] = ipmi_payload_len[16b]
  2000. 192.168.100.4: IPMI RMCPPLUS Payload:
  2001. 192.168.100.4: ----------------------
  2002. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[60B]
  2003. 192.168.100.4: [ 42h 00h 00h 00h 86h 37h 19h 9Dh ]
  2004. 192.168.100.4: [ 8Bh 83h A0h 13h 79h CAh 1Bh 14h ]
  2005. 192.168.100.4: [ AEh 6Ch 03h 78h 03h 56h 37h B3h ]
  2006. 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ]
  2007. 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ]
  2008. 192.168.100.4: [ E7h 3Ah BFh 62h B2h C8h 19h 00h ]
  2009. 192.168.100.4: [ 8Ah 75h B0h 8Ch B9h 45h 43h 97h ]
  2010. 192.168.100.4: [ 9Eh 0Eh 7Dh E8h ]
  2011. 192.168.100.4: IPMI Command Data:
  2012. 192.168.100.4: ------------------
  2013. 192.168.100.4: [ 42h] = message_tag[ 8b]
  2014. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  2015. 192.168.100.4: [ 0h] = reserved1[16b]
  2016. 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b]
  2017. 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_random_number[16B]
  2018. 192.168.100.4: [ 8Bh 83h A0h 13h 79h CAh 1Bh 14h ]
  2019. 192.168.100.4: [ AEh 6Ch 03h 78h 03h 56h 37h B3h ]
  2020. 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_guid[16B]
  2021. 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ]
  2022. 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ]
  2023. 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  2024. 192.168.100.4: [ E7h 3Ah BFh 62h B2h C8h 19h 00h ]
  2025. 192.168.100.4: [ 8Ah 75h B0h 8Ch B9h 45h 43h 97h ]
  2026. 192.168.100.4: [ 9Eh 0Eh 7Dh E8h ]
  2027. 192.168.100.4: =====================================================
  2028. 192.168.100.4: IPMI 2.0 RAKP Message 3 Request
  2029. 192.168.100.4: =====================================================
  2030. 192.168.100.4: RMCP Header:
  2031. 192.168.100.4: ------------
  2032. 192.168.100.4: [ 6h] = version[ 8b]
  2033. 192.168.100.4: [ 0h] = reserved[ 8b]
  2034. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2035. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2036. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2037. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2038. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2039. 192.168.100.4: -----------------------------
  2040. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2041. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2042. 192.168.100.4: [ 14h] = payload_type[ 6b]
  2043. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  2044. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  2045. 192.168.100.4: [ 0h] = session_id[32b]
  2046. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  2047. 192.168.100.4: [ 1Ch] = ipmi_payload_len[16b]
  2048. 192.168.100.4: IPMI RMCPPLUS Payload:
  2049. 192.168.100.4: ----------------------
  2050. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[28B]
  2051. 192.168.100.4: [ 43h 00h 00h 00h 30h CBh 8Fh 00h ]
  2052. 192.168.100.4: [ 52h 48h 3Dh E2h 43h 66h 89h 13h ]
  2053. 192.168.100.4: [ 8Dh DAh 6Dh 7Bh 05h A4h 07h 95h ]
  2054. 192.168.100.4: [ 10h 56h C1h C5h ]
  2055. 192.168.100.4: IPMI Command Data:
  2056. 192.168.100.4: ------------------
  2057. 192.168.100.4: [ 43h] = message_tag[ 8b]
  2058. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  2059. 192.168.100.4: [ 0h] = reserved1[16b]
  2060. 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b]
  2061. 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B]
  2062. 192.168.100.4: [ 52h 48h 3Dh E2h 43h 66h 89h 13h ]
  2063. 192.168.100.4: [ 8Dh DAh 6Dh 7Bh 05h A4h 07h 95h ]
  2064. 192.168.100.4: [ 10h 56h C1h C5h ]
  2065. 192.168.100.4: =====================================================
  2066. 192.168.100.4: IPMI 2.0 RAKP Message 4 Response
  2067. 192.168.100.4: =====================================================
  2068. 192.168.100.4: RMCP Header:
  2069. 192.168.100.4: ------------
  2070. 192.168.100.4: [ 6h] = version[ 8b]
  2071. 192.168.100.4: [ 0h] = reserved[ 8b]
  2072. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2073. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2074. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2075. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2076. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2077. 192.168.100.4: -----------------------------
  2078. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2079. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2080. 192.168.100.4: [ 15h] = payload_type[ 6b]
  2081. 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b]
  2082. 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b]
  2083. 192.168.100.4: [ 0h] = session_id[32b]
  2084. 192.168.100.4: [ 0h] = session_sequence_number[32b]
  2085. 192.168.100.4: [ 14h] = ipmi_payload_len[16b]
  2086. 192.168.100.4: IPMI RMCPPLUS Payload:
  2087. 192.168.100.4: ----------------------
  2088. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[20B]
  2089. 192.168.100.4: [ 43h 00h 00h 00h 86h 37h 19h 9Dh ]
  2090. 192.168.100.4: [ FDh E1h 87h DBh C0h 62h DDh EFh ]
  2091. 192.168.100.4: [ 9Dh 8Eh 1Fh B2h ]
  2092. 192.168.100.4: IPMI Command Data:
  2093. 192.168.100.4: ------------------
  2094. 192.168.100.4: [ 43h] = message_tag[ 8b]
  2095. 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b]
  2096. 192.168.100.4: [ 0h] = reserved1[16b]
  2097. 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b]
  2098. 192.168.100.4: [ BYTE ARRAY ... ] = integrity_check_value[12B]
  2099. 192.168.100.4: [ FDh E1h 87h DBh C0h 62h DDh EFh ]
  2100. 192.168.100.4: [ 9Dh 8Eh 1Fh B2h ]
  2101. 192.168.100.4: =====================================================
  2102. 192.168.100.4: IPMI 2.0 Set Session Privilege Level Request
  2103. 192.168.100.4: =====================================================
  2104. 192.168.100.4: RMCP Header:
  2105. 192.168.100.4: ------------
  2106. 192.168.100.4: [ 6h] = version[ 8b]
  2107. 192.168.100.4: [ 0h] = reserved[ 8b]
  2108. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2109. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2110. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2111. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2112. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2113. 192.168.100.4: -----------------------------
  2114. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2115. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2116. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2117. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2118. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2119. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  2120. 192.168.100.4: [ 1h] = session_sequence_number[32b]
  2121. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2122. 192.168.100.4: IPMI RMCPPLUS Payload:
  2123. 192.168.100.4: ----------------------
  2124. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2125. 192.168.100.4: [ 99h 4Fh F4h FAh 6Dh 16h 62h A1h ]
  2126. 192.168.100.4: [ F4h 08h 26h 9Fh 5Fh 75h FAh 65h ]
  2127. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 8B]
  2128. 192.168.100.4: [ 20h 18h C8h 81h 50h 3Bh 04h F0h ]
  2129. 192.168.100.4: [ 707060504030201h] = confidentiality_trailer[64b]
  2130. 192.168.100.4: IPMI Message Header:
  2131. 192.168.100.4: --------------------
  2132. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2133. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2134. 192.168.100.4: [ 6h] = net_fn[ 6b]
  2135. 192.168.100.4: [ C8h] = checksum1[ 8b]
  2136. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2137. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2138. 192.168.100.4: [ 14h] = rq_seq[ 6b]
  2139. 192.168.100.4: IPMI Command Data:
  2140. 192.168.100.4: ------------------
  2141. 192.168.100.4: [ 3Bh] = cmd[ 8b]
  2142. 192.168.100.4: [ 4h] = privilege_level[ 4b]
  2143. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2144. 192.168.100.4: IPMI Trailer:
  2145. 192.168.100.4: -------------
  2146. 192.168.100.4: [ F0h] = checksum2[ 8b]
  2147. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2148. 192.168.100.4: ------------------------------
  2149. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2150. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2151. 192.168.100.4: [ 7h] = next_header[ 8b]
  2152. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2153. 192.168.100.4: [ 5Ah E5h 89h 54h D4h 6Dh 5Dh CFh ]
  2154. 192.168.100.4: [ 96h BFh 26h 5Eh ]
  2155. 192.168.100.4: =====================================================
  2156. 192.168.100.4: IPMI 2.0 Set Session Privilege Level Response
  2157. 192.168.100.4: =====================================================
  2158. 192.168.100.4: RMCP Header:
  2159. 192.168.100.4: ------------
  2160. 192.168.100.4: [ 6h] = version[ 8b]
  2161. 192.168.100.4: [ 0h] = reserved[ 8b]
  2162. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2163. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2164. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2165. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2166. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2167. 192.168.100.4: -----------------------------
  2168. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2169. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2170. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2171. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2172. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2173. 192.168.100.4: [ 9D193786h] = session_id[32b]
  2174. 192.168.100.4: [ 1h] = session_sequence_number[32b]
  2175. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2176. 192.168.100.4: IPMI RMCPPLUS Payload:
  2177. 192.168.100.4: ----------------------
  2178. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2179. 192.168.100.4: [ 36h 33h 63h 81h 76h 64h 4Fh 8Dh ]
  2180. 192.168.100.4: [ 05h B2h 2Dh 8Eh CAh 51h FEh B7h ]
  2181. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 9B]
  2182. 192.168.100.4: [ 81h 1Ch 63h 20h 50h 3Bh 00h 04h ]
  2183. 192.168.100.4: [ 51h ]
  2184. 192.168.100.4: [ 6060504030201h] = confidentiality_trailer[56b]
  2185. 192.168.100.4: IPMI Message Header:
  2186. 192.168.100.4: --------------------
  2187. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2188. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2189. 192.168.100.4: [ 7h] = net_fn[ 6b]
  2190. 192.168.100.4: [ 63h] = checksum1[ 8b]
  2191. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2192. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2193. 192.168.100.4: [ 14h] = rq_seq[ 6b]
  2194. 192.168.100.4: IPMI Command Data:
  2195. 192.168.100.4: ------------------
  2196. 192.168.100.4: [ 3Bh] = cmd[ 8b]
  2197. 192.168.100.4: [ 0h] = comp_code[ 8b]
  2198. 192.168.100.4: [ 4h] = privilege_level[ 4b]
  2199. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2200. 192.168.100.4: IPMI Trailer:
  2201. 192.168.100.4: -------------
  2202. 192.168.100.4: [ 51h] = checksum2[ 8b]
  2203. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2204. 192.168.100.4: ------------------------------
  2205. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2206. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2207. 192.168.100.4: [ 7h] = next_header[ 8b]
  2208. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2209. 192.168.100.4: [ 7Dh 11h 90h 3Dh 56h 85h AAh 01h ]
  2210. 192.168.100.4: [ 92h 85h 82h D0h ]
  2211. Entering section `Chassis_Boot_Flags'
  2212. Parsed `Chassis_Boot_Flags:Boot_Flags_Persistent=No'
  2213. Parsed `Chassis_Boot_Flags:Boot_Device=PXE'
  2214. Leaving section `Chassis_Boot_Flags'
  2215. 192.168.100.4: =====================================================
  2216. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  2217. 192.168.100.4: =====================================================
  2218. 192.168.100.4: RMCP Header:
  2219. 192.168.100.4: ------------
  2220. 192.168.100.4: [ 6h] = version[ 8b]
  2221. 192.168.100.4: [ 0h] = reserved[ 8b]
  2222. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2223. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2224. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2225. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2226. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2227. 192.168.100.4: -----------------------------
  2228. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2229. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2230. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2231. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2232. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2233. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  2234. 192.168.100.4: [ 2h] = session_sequence_number[32b]
  2235. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2236. 192.168.100.4: IPMI RMCPPLUS Payload:
  2237. 192.168.100.4: ----------------------
  2238. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2239. 192.168.100.4: [ C9h DCh 18h 01h 19h 9Ch E3h 51h ]
  2240. 192.168.100.4: [ F6h 99h D9h 05h BAh DBh 7Ah 28h ]
  2241. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  2242. 192.168.100.4: [ 20h 00h E0h 81h 54h 09h 05h 00h ]
  2243. 192.168.100.4: [ 00h 1Dh ]
  2244. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  2245. 192.168.100.4: IPMI Message Header:
  2246. 192.168.100.4: --------------------
  2247. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2248. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2249. 192.168.100.4: [ 0h] = net_fn[ 6b]
  2250. 192.168.100.4: [ E0h] = checksum1[ 8b]
  2251. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2252. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2253. 192.168.100.4: [ 15h] = rq_seq[ 6b]
  2254. 192.168.100.4: IPMI Command Data:
  2255. 192.168.100.4: ------------------
  2256. 192.168.100.4: [ 9h] = cmd[ 8b]
  2257. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2258. 192.168.100.4: [ 0h] = reserved[ 1b]
  2259. 192.168.100.4: [ 0h] = set_selector[ 8b]
  2260. 192.168.100.4: [ 0h] = block_selector[ 8b]
  2261. 192.168.100.4: IPMI Trailer:
  2262. 192.168.100.4: -------------
  2263. 192.168.100.4: [ 1Dh] = checksum2[ 8b]
  2264. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2265. 192.168.100.4: ------------------------------
  2266. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2267. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2268. 192.168.100.4: [ 7h] = next_header[ 8b]
  2269. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2270. 192.168.100.4: [ 70h DBh 06h 8Eh 78h B9h AFh 79h ]
  2271. 192.168.100.4: [ 47h 85h 33h 53h ]
  2272. 192.168.100.4: =====================================================
  2273. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  2274. 192.168.100.4: =====================================================
  2275. 192.168.100.4: RMCP Header:
  2276. 192.168.100.4: ------------
  2277. 192.168.100.4: [ 6h] = version[ 8b]
  2278. 192.168.100.4: [ 0h] = reserved[ 8b]
  2279. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2280. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2281. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2282. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2283. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2284. 192.168.100.4: -----------------------------
  2285. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2286. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2287. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2288. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2289. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2290. 192.168.100.4: [ 9D193786h] = session_id[32b]
  2291. 192.168.100.4: [ 2h] = session_sequence_number[32b]
  2292. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  2293. 192.168.100.4: IPMI RMCPPLUS Payload:
  2294. 192.168.100.4: ----------------------
  2295. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2296. 192.168.100.4: [ 4Ah E9h A7h 64h E1h 51h 1Fh 7Fh ]
  2297. 192.168.100.4: [ 6Bh 8Bh EAh 40h 51h C3h EAh 40h ]
  2298. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  2299. 192.168.100.4: [ 81h 04h 7Bh 20h 54h 09h 00h 01h ]
  2300. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  2301. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2302. 192.168.100.4: [ 00h 00h 7Dh ]
  2303. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  2304. 192.168.100.4: IPMI Message Header:
  2305. 192.168.100.4: --------------------
  2306. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2307. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2308. 192.168.100.4: [ 1h] = net_fn[ 6b]
  2309. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  2310. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2311. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2312. 192.168.100.4: [ 15h] = rq_seq[ 6b]
  2313. 192.168.100.4: IPMI Command Data:
  2314. 192.168.100.4: ------------------
  2315. 192.168.100.4: [ 9h] = cmd[ 8b]
  2316. 192.168.100.4: [ 0h] = comp_code[ 8b]
  2317. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  2318. 192.168.100.4: [ 0h] = reserved[ 4b]
  2319. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2320. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  2321. 192.168.100.4: [ 0h] = reserved1[ 5b]
  2322. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  2323. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  2324. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  2325. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  2326. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  2327. 192.168.100.4: [ 0h] = boot_device[ 4b]
  2328. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  2329. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  2330. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  2331. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  2332. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  2333. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  2334. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  2335. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  2336. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  2337. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  2338. 192.168.100.4: [ 0h] = reserved2[ 4b]
  2339. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  2340. 192.168.100.4: [ 0h] = reserved3[ 3b]
  2341. 192.168.100.4: IPMI Trailer:
  2342. 192.168.100.4: -------------
  2343. 192.168.100.4: [ 0h] = checksum2[ 8b]
  2344. 192.168.100.4: Payload Unexpected Data:
  2345. 192.168.100.4: ------------------------
  2346. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  2347. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2348. 192.168.100.4: [ 00h 00h 00h 7Dh ]
  2349. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2350. 192.168.100.4: ------------------------------
  2351. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2352. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2353. 192.168.100.4: [ 7h] = next_header[ 8b]
  2354. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2355. 192.168.100.4: [ E1h 0Dh 18h 7Eh 88h 79h 08h 02h ]
  2356. 192.168.100.4: [ 24h 43h BBh C6h ]
  2357. 192.168.100.4: =====================================================
  2358. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  2359. 192.168.100.4: =====================================================
  2360. 192.168.100.4: RMCP Header:
  2361. 192.168.100.4: ------------
  2362. 192.168.100.4: [ 6h] = version[ 8b]
  2363. 192.168.100.4: [ 0h] = reserved[ 8b]
  2364. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2365. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2366. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2367. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2368. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2369. 192.168.100.4: -----------------------------
  2370. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2371. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2372. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2373. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2374. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2375. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  2376. 192.168.100.4: [ 3h] = session_sequence_number[32b]
  2377. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2378. 192.168.100.4: IPMI RMCPPLUS Payload:
  2379. 192.168.100.4: ----------------------
  2380. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2381. 192.168.100.4: [ DAh B6h 64h BEh 23h 09h 1Fh 91h ]
  2382. 192.168.100.4: [ 04h 43h C1h BEh 6Dh 8Bh 35h BBh ]
  2383. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  2384. 192.168.100.4: [ 20h 00h E0h 81h 58h 09h 05h 00h ]
  2385. 192.168.100.4: [ 00h 19h ]
  2386. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  2387. 192.168.100.4: IPMI Message Header:
  2388. 192.168.100.4: --------------------
  2389. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2390. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2391. 192.168.100.4: [ 0h] = net_fn[ 6b]
  2392. 192.168.100.4: [ E0h] = checksum1[ 8b]
  2393. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2394. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2395. 192.168.100.4: [ 16h] = rq_seq[ 6b]
  2396. 192.168.100.4: IPMI Command Data:
  2397. 192.168.100.4: ------------------
  2398. 192.168.100.4: [ 9h] = cmd[ 8b]
  2399. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2400. 192.168.100.4: [ 0h] = reserved[ 1b]
  2401. 192.168.100.4: [ 0h] = set_selector[ 8b]
  2402. 192.168.100.4: [ 0h] = block_selector[ 8b]
  2403. 192.168.100.4: IPMI Trailer:
  2404. 192.168.100.4: -------------
  2405. 192.168.100.4: [ 19h] = checksum2[ 8b]
  2406. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2407. 192.168.100.4: ------------------------------
  2408. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2409. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2410. 192.168.100.4: [ 7h] = next_header[ 8b]
  2411. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2412. 192.168.100.4: [ F8h 9Dh F6h 07h C5h C2h E2h 85h ]
  2413. 192.168.100.4: [ 3Fh A7h C9h 76h ]
  2414. 192.168.100.4: =====================================================
  2415. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  2416. 192.168.100.4: =====================================================
  2417. 192.168.100.4: RMCP Header:
  2418. 192.168.100.4: ------------
  2419. 192.168.100.4: [ 6h] = version[ 8b]
  2420. 192.168.100.4: [ 0h] = reserved[ 8b]
  2421. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2422. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2423. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2424. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2425. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2426. 192.168.100.4: -----------------------------
  2427. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2428. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2429. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2430. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2431. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2432. 192.168.100.4: [ 9D193786h] = session_id[32b]
  2433. 192.168.100.4: [ 3h] = session_sequence_number[32b]
  2434. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  2435. 192.168.100.4: IPMI RMCPPLUS Payload:
  2436. 192.168.100.4: ----------------------
  2437. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2438. 192.168.100.4: [ EBh D1h 33h 06h 26h DCh 85h 69h ]
  2439. 192.168.100.4: [ CFh 9Bh CBh 2Dh 02h D1h 4Dh 6Eh ]
  2440. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  2441. 192.168.100.4: [ 81h 04h 7Bh 20h 58h 09h 00h 01h ]
  2442. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  2443. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2444. 192.168.100.4: [ 00h 00h 79h ]
  2445. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  2446. 192.168.100.4: IPMI Message Header:
  2447. 192.168.100.4: --------------------
  2448. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2449. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2450. 192.168.100.4: [ 1h] = net_fn[ 6b]
  2451. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  2452. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2453. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2454. 192.168.100.4: [ 16h] = rq_seq[ 6b]
  2455. 192.168.100.4: IPMI Command Data:
  2456. 192.168.100.4: ------------------
  2457. 192.168.100.4: [ 9h] = cmd[ 8b]
  2458. 192.168.100.4: [ 0h] = comp_code[ 8b]
  2459. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  2460. 192.168.100.4: [ 0h] = reserved[ 4b]
  2461. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2462. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  2463. 192.168.100.4: [ 0h] = reserved1[ 5b]
  2464. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  2465. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  2466. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  2467. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  2468. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  2469. 192.168.100.4: [ 0h] = boot_device[ 4b]
  2470. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  2471. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  2472. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  2473. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  2474. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  2475. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  2476. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  2477. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  2478. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  2479. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  2480. 192.168.100.4: [ 0h] = reserved2[ 4b]
  2481. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  2482. 192.168.100.4: [ 0h] = reserved3[ 3b]
  2483. 192.168.100.4: IPMI Trailer:
  2484. 192.168.100.4: -------------
  2485. 192.168.100.4: [ 0h] = checksum2[ 8b]
  2486. 192.168.100.4: Payload Unexpected Data:
  2487. 192.168.100.4: ------------------------
  2488. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  2489. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2490. 192.168.100.4: [ 00h 00h 00h 79h ]
  2491. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2492. 192.168.100.4: ------------------------------
  2493. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2494. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2495. 192.168.100.4: [ 7h] = next_header[ 8b]
  2496. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2497. 192.168.100.4: [ 9Fh 6Ah DDh 94h AEh 7Eh 72h D3h ]
  2498. 192.168.100.4: [ 38h 28h CFh D0h ]
  2499. 192.168.100.4: =====================================================
  2500. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  2501. 192.168.100.4: =====================================================
  2502. 192.168.100.4: RMCP Header:
  2503. 192.168.100.4: ------------
  2504. 192.168.100.4: [ 6h] = version[ 8b]
  2505. 192.168.100.4: [ 0h] = reserved[ 8b]
  2506. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2507. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2508. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2509. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2510. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2511. 192.168.100.4: -----------------------------
  2512. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2513. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2514. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2515. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2516. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2517. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  2518. 192.168.100.4: [ 4h] = session_sequence_number[32b]
  2519. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2520. 192.168.100.4: IPMI RMCPPLUS Payload:
  2521. 192.168.100.4: ----------------------
  2522. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2523. 192.168.100.4: [ 28h 1Fh E6h CBh FFh CDh 2Bh A0h ]
  2524. 192.168.100.4: [ 10h 99h 49h 90h 41h 8Bh 97h 4Ch ]
  2525. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  2526. 192.168.100.4: [ 20h 00h E0h 81h 5Ch 09h 05h 00h ]
  2527. 192.168.100.4: [ 00h 15h ]
  2528. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  2529. 192.168.100.4: IPMI Message Header:
  2530. 192.168.100.4: --------------------
  2531. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2532. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2533. 192.168.100.4: [ 0h] = net_fn[ 6b]
  2534. 192.168.100.4: [ E0h] = checksum1[ 8b]
  2535. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2536. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2537. 192.168.100.4: [ 17h] = rq_seq[ 6b]
  2538. 192.168.100.4: IPMI Command Data:
  2539. 192.168.100.4: ------------------
  2540. 192.168.100.4: [ 9h] = cmd[ 8b]
  2541. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2542. 192.168.100.4: [ 0h] = reserved[ 1b]
  2543. 192.168.100.4: [ 0h] = set_selector[ 8b]
  2544. 192.168.100.4: [ 0h] = block_selector[ 8b]
  2545. 192.168.100.4: IPMI Trailer:
  2546. 192.168.100.4: -------------
  2547. 192.168.100.4: [ 15h] = checksum2[ 8b]
  2548. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2549. 192.168.100.4: ------------------------------
  2550. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2551. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2552. 192.168.100.4: [ 7h] = next_header[ 8b]
  2553. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2554. 192.168.100.4: [ CFh BCh 82h AFh 56h 04h 6Ah AEh ]
  2555. 192.168.100.4: [ 4Fh 79h 8Eh 77h ]
  2556. 192.168.100.4: =====================================================
  2557. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  2558. 192.168.100.4: =====================================================
  2559. 192.168.100.4: RMCP Header:
  2560. 192.168.100.4: ------------
  2561. 192.168.100.4: [ 6h] = version[ 8b]
  2562. 192.168.100.4: [ 0h] = reserved[ 8b]
  2563. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2564. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2565. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2566. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2567. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2568. 192.168.100.4: -----------------------------
  2569. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2570. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2571. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2572. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2573. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2574. 192.168.100.4: [ 9D193786h] = session_id[32b]
  2575. 192.168.100.4: [ 4h] = session_sequence_number[32b]
  2576. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  2577. 192.168.100.4: IPMI RMCPPLUS Payload:
  2578. 192.168.100.4: ----------------------
  2579. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2580. 192.168.100.4: [ BBh AAh EDh CAh 07h A5h 98h 72h ]
  2581. 192.168.100.4: [ 4Ch 20h 25h 64h 83h 11h 29h 66h ]
  2582. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  2583. 192.168.100.4: [ 81h 04h 7Bh 20h 5Ch 09h 00h 01h ]
  2584. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  2585. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2586. 192.168.100.4: [ 00h 00h 75h ]
  2587. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  2588. 192.168.100.4: IPMI Message Header:
  2589. 192.168.100.4: --------------------
  2590. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2591. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2592. 192.168.100.4: [ 1h] = net_fn[ 6b]
  2593. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  2594. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2595. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2596. 192.168.100.4: [ 17h] = rq_seq[ 6b]
  2597. 192.168.100.4: IPMI Command Data:
  2598. 192.168.100.4: ------------------
  2599. 192.168.100.4: [ 9h] = cmd[ 8b]
  2600. 192.168.100.4: [ 0h] = comp_code[ 8b]
  2601. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  2602. 192.168.100.4: [ 0h] = reserved[ 4b]
  2603. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2604. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  2605. 192.168.100.4: [ 0h] = reserved1[ 5b]
  2606. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  2607. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  2608. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  2609. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  2610. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  2611. 192.168.100.4: [ 0h] = boot_device[ 4b]
  2612. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  2613. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  2614. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  2615. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  2616. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  2617. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  2618. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  2619. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  2620. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  2621. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  2622. 192.168.100.4: [ 0h] = reserved2[ 4b]
  2623. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  2624. 192.168.100.4: [ 0h] = reserved3[ 3b]
  2625. 192.168.100.4: IPMI Trailer:
  2626. 192.168.100.4: -------------
  2627. 192.168.100.4: [ 0h] = checksum2[ 8b]
  2628. 192.168.100.4: Payload Unexpected Data:
  2629. 192.168.100.4: ------------------------
  2630. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  2631. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2632. 192.168.100.4: [ 00h 00h 00h 75h ]
  2633. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2634. 192.168.100.4: ------------------------------
  2635. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2636. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2637. 192.168.100.4: [ 7h] = next_header[ 8b]
  2638. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2639. 192.168.100.4: [ 26h F0h 2Ch E7h 2Bh D0h 70h 78h ]
  2640. 192.168.100.4: [ A6h A0h 83h EAh ]
  2641. 192.168.100.4: =====================================================
  2642. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  2643. 192.168.100.4: =====================================================
  2644. 192.168.100.4: RMCP Header:
  2645. 192.168.100.4: ------------
  2646. 192.168.100.4: [ 6h] = version[ 8b]
  2647. 192.168.100.4: [ 0h] = reserved[ 8b]
  2648. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2649. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2650. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2651. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2652. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2653. 192.168.100.4: -----------------------------
  2654. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2655. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2656. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2657. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2658. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2659. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  2660. 192.168.100.4: [ 5h] = session_sequence_number[32b]
  2661. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2662. 192.168.100.4: IPMI RMCPPLUS Payload:
  2663. 192.168.100.4: ----------------------
  2664. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2665. 192.168.100.4: [ F9h 71h D8h 59h 45h 6Dh BDh 3Eh ]
  2666. 192.168.100.4: [ 10h AFh ECh 49h 5Fh 8Ch EFh E1h ]
  2667. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  2668. 192.168.100.4: [ 20h 00h E0h 81h 60h 09h 05h 00h ]
  2669. 192.168.100.4: [ 00h 11h ]
  2670. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  2671. 192.168.100.4: IPMI Message Header:
  2672. 192.168.100.4: --------------------
  2673. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2674. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2675. 192.168.100.4: [ 0h] = net_fn[ 6b]
  2676. 192.168.100.4: [ E0h] = checksum1[ 8b]
  2677. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2678. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2679. 192.168.100.4: [ 18h] = rq_seq[ 6b]
  2680. 192.168.100.4: IPMI Command Data:
  2681. 192.168.100.4: ------------------
  2682. 192.168.100.4: [ 9h] = cmd[ 8b]
  2683. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2684. 192.168.100.4: [ 0h] = reserved[ 1b]
  2685. 192.168.100.4: [ 0h] = set_selector[ 8b]
  2686. 192.168.100.4: [ 0h] = block_selector[ 8b]
  2687. 192.168.100.4: IPMI Trailer:
  2688. 192.168.100.4: -------------
  2689. 192.168.100.4: [ 11h] = checksum2[ 8b]
  2690. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2691. 192.168.100.4: ------------------------------
  2692. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2693. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2694. 192.168.100.4: [ 7h] = next_header[ 8b]
  2695. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2696. 192.168.100.4: [ 74h 4Dh 9Ch F0h A8h F9h 2Ah F5h ]
  2697. 192.168.100.4: [ F1h 31h A1h C4h ]
  2698. 192.168.100.4: =====================================================
  2699. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  2700. 192.168.100.4: =====================================================
  2701. 192.168.100.4: RMCP Header:
  2702. 192.168.100.4: ------------
  2703. 192.168.100.4: [ 6h] = version[ 8b]
  2704. 192.168.100.4: [ 0h] = reserved[ 8b]
  2705. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2706. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2707. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2708. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2709. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2710. 192.168.100.4: -----------------------------
  2711. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2712. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2713. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2714. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2715. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2716. 192.168.100.4: [ 9D193786h] = session_id[32b]
  2717. 192.168.100.4: [ 5h] = session_sequence_number[32b]
  2718. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  2719. 192.168.100.4: IPMI RMCPPLUS Payload:
  2720. 192.168.100.4: ----------------------
  2721. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2722. 192.168.100.4: [ 14h 33h B2h 00h 25h 69h 77h 7Dh ]
  2723. 192.168.100.4: [ D2h C8h 32h E4h 7Bh DAh 7Ch AFh ]
  2724. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  2725. 192.168.100.4: [ 81h 04h 7Bh 20h 60h 09h 00h 01h ]
  2726. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  2727. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2728. 192.168.100.4: [ 00h 00h 71h ]
  2729. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  2730. 192.168.100.4: IPMI Message Header:
  2731. 192.168.100.4: --------------------
  2732. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2733. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2734. 192.168.100.4: [ 1h] = net_fn[ 6b]
  2735. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  2736. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2737. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2738. 192.168.100.4: [ 18h] = rq_seq[ 6b]
  2739. 192.168.100.4: IPMI Command Data:
  2740. 192.168.100.4: ------------------
  2741. 192.168.100.4: [ 9h] = cmd[ 8b]
  2742. 192.168.100.4: [ 0h] = comp_code[ 8b]
  2743. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  2744. 192.168.100.4: [ 0h] = reserved[ 4b]
  2745. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2746. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  2747. 192.168.100.4: [ 0h] = reserved1[ 5b]
  2748. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  2749. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  2750. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  2751. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  2752. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  2753. 192.168.100.4: [ 0h] = boot_device[ 4b]
  2754. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  2755. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  2756. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  2757. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  2758. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  2759. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  2760. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  2761. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  2762. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  2763. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  2764. 192.168.100.4: [ 0h] = reserved2[ 4b]
  2765. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  2766. 192.168.100.4: [ 0h] = reserved3[ 3b]
  2767. 192.168.100.4: IPMI Trailer:
  2768. 192.168.100.4: -------------
  2769. 192.168.100.4: [ 0h] = checksum2[ 8b]
  2770. 192.168.100.4: Payload Unexpected Data:
  2771. 192.168.100.4: ------------------------
  2772. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  2773. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2774. 192.168.100.4: [ 00h 00h 00h 71h ]
  2775. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2776. 192.168.100.4: ------------------------------
  2777. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2778. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2779. 192.168.100.4: [ 7h] = next_header[ 8b]
  2780. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2781. 192.168.100.4: [ B2h 27h C7h F6h 17h 7Eh 28h 89h ]
  2782. 192.168.100.4: [ 29h CFh 28h 06h ]
  2783. 192.168.100.4: =====================================================
  2784. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  2785. 192.168.100.4: =====================================================
  2786. 192.168.100.4: RMCP Header:
  2787. 192.168.100.4: ------------
  2788. 192.168.100.4: [ 6h] = version[ 8b]
  2789. 192.168.100.4: [ 0h] = reserved[ 8b]
  2790. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2791. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2792. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2793. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2794. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2795. 192.168.100.4: -----------------------------
  2796. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2797. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2798. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2799. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2800. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2801. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  2802. 192.168.100.4: [ 6h] = session_sequence_number[32b]
  2803. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2804. 192.168.100.4: IPMI RMCPPLUS Payload:
  2805. 192.168.100.4: ----------------------
  2806. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2807. 192.168.100.4: [ E3h DAh 92h 30h 1Fh 54h 94h B4h ]
  2808. 192.168.100.4: [ 53h 33h 6Dh 0Fh 1Ah 9Dh C7h 81h ]
  2809. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  2810. 192.168.100.4: [ 20h 00h E0h 81h 64h 09h 05h 00h ]
  2811. 192.168.100.4: [ 00h 0Dh ]
  2812. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  2813. 192.168.100.4: IPMI Message Header:
  2814. 192.168.100.4: --------------------
  2815. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2816. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2817. 192.168.100.4: [ 0h] = net_fn[ 6b]
  2818. 192.168.100.4: [ E0h] = checksum1[ 8b]
  2819. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2820. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2821. 192.168.100.4: [ 19h] = rq_seq[ 6b]
  2822. 192.168.100.4: IPMI Command Data:
  2823. 192.168.100.4: ------------------
  2824. 192.168.100.4: [ 9h] = cmd[ 8b]
  2825. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2826. 192.168.100.4: [ 0h] = reserved[ 1b]
  2827. 192.168.100.4: [ 0h] = set_selector[ 8b]
  2828. 192.168.100.4: [ 0h] = block_selector[ 8b]
  2829. 192.168.100.4: IPMI Trailer:
  2830. 192.168.100.4: -------------
  2831. 192.168.100.4: [ Dh] = checksum2[ 8b]
  2832. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2833. 192.168.100.4: ------------------------------
  2834. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2835. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2836. 192.168.100.4: [ 7h] = next_header[ 8b]
  2837. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2838. 192.168.100.4: [ 1Fh 26h D6h 3Dh 28h 4Bh 16h 62h ]
  2839. 192.168.100.4: [ 16h 8Fh C7h 69h ]
  2840. 192.168.100.4: =====================================================
  2841. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  2842. 192.168.100.4: =====================================================
  2843. 192.168.100.4: RMCP Header:
  2844. 192.168.100.4: ------------
  2845. 192.168.100.4: [ 6h] = version[ 8b]
  2846. 192.168.100.4: [ 0h] = reserved[ 8b]
  2847. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2848. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2849. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2850. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2851. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2852. 192.168.100.4: -----------------------------
  2853. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2854. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2855. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2856. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2857. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2858. 192.168.100.4: [ 9D193786h] = session_id[32b]
  2859. 192.168.100.4: [ 6h] = session_sequence_number[32b]
  2860. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  2861. 192.168.100.4: IPMI RMCPPLUS Payload:
  2862. 192.168.100.4: ----------------------
  2863. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2864. 192.168.100.4: [ F1h C9h 24h EBh 08h 99h 51h B0h ]
  2865. 192.168.100.4: [ 4Bh 5Fh 73h FDh 57h 39h FCh F2h ]
  2866. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  2867. 192.168.100.4: [ 81h 04h 7Bh 20h 64h 09h 00h 01h ]
  2868. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  2869. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2870. 192.168.100.4: [ 00h 00h 6Dh ]
  2871. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  2872. 192.168.100.4: IPMI Message Header:
  2873. 192.168.100.4: --------------------
  2874. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2875. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2876. 192.168.100.4: [ 1h] = net_fn[ 6b]
  2877. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  2878. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2879. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2880. 192.168.100.4: [ 19h] = rq_seq[ 6b]
  2881. 192.168.100.4: IPMI Command Data:
  2882. 192.168.100.4: ------------------
  2883. 192.168.100.4: [ 9h] = cmd[ 8b]
  2884. 192.168.100.4: [ 0h] = comp_code[ 8b]
  2885. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  2886. 192.168.100.4: [ 0h] = reserved[ 4b]
  2887. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2888. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  2889. 192.168.100.4: [ 0h] = reserved1[ 5b]
  2890. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  2891. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  2892. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  2893. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  2894. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  2895. 192.168.100.4: [ 0h] = boot_device[ 4b]
  2896. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  2897. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  2898. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  2899. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  2900. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  2901. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  2902. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  2903. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  2904. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  2905. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  2906. 192.168.100.4: [ 0h] = reserved2[ 4b]
  2907. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  2908. 192.168.100.4: [ 0h] = reserved3[ 3b]
  2909. 192.168.100.4: IPMI Trailer:
  2910. 192.168.100.4: -------------
  2911. 192.168.100.4: [ 0h] = checksum2[ 8b]
  2912. 192.168.100.4: Payload Unexpected Data:
  2913. 192.168.100.4: ------------------------
  2914. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  2915. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  2916. 192.168.100.4: [ 00h 00h 00h 6Dh ]
  2917. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2918. 192.168.100.4: ------------------------------
  2919. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2920. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2921. 192.168.100.4: [ 7h] = next_header[ 8b]
  2922. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2923. 192.168.100.4: [ C9h 34h 24h 5Eh FAh 76h CFh 21h ]
  2924. 192.168.100.4: [ 1Dh 75h AFh 2Ah ]
  2925. 192.168.100.4: =====================================================
  2926. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  2927. 192.168.100.4: =====================================================
  2928. 192.168.100.4: RMCP Header:
  2929. 192.168.100.4: ------------
  2930. 192.168.100.4: [ 6h] = version[ 8b]
  2931. 192.168.100.4: [ 0h] = reserved[ 8b]
  2932. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2933. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2934. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2935. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2936. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2937. 192.168.100.4: -----------------------------
  2938. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2939. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2940. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2941. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2942. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  2943. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  2944. 192.168.100.4: [ 7h] = session_sequence_number[32b]
  2945. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  2946. 192.168.100.4: IPMI RMCPPLUS Payload:
  2947. 192.168.100.4: ----------------------
  2948. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  2949. 192.168.100.4: [ CFh 8Ah 43h FFh E7h 3Fh DCh 41h ]
  2950. 192.168.100.4: [ 95h D3h 2Ah BAh 4Ah D6h 8Eh 50h ]
  2951. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  2952. 192.168.100.4: [ 20h 00h E0h 81h 68h 09h 05h 00h ]
  2953. 192.168.100.4: [ 00h 09h ]
  2954. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  2955. 192.168.100.4: IPMI Message Header:
  2956. 192.168.100.4: --------------------
  2957. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  2958. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  2959. 192.168.100.4: [ 0h] = net_fn[ 6b]
  2960. 192.168.100.4: [ E0h] = checksum1[ 8b]
  2961. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  2962. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  2963. 192.168.100.4: [ 1Ah] = rq_seq[ 6b]
  2964. 192.168.100.4: IPMI Command Data:
  2965. 192.168.100.4: ------------------
  2966. 192.168.100.4: [ 9h] = cmd[ 8b]
  2967. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  2968. 192.168.100.4: [ 0h] = reserved[ 1b]
  2969. 192.168.100.4: [ 0h] = set_selector[ 8b]
  2970. 192.168.100.4: [ 0h] = block_selector[ 8b]
  2971. 192.168.100.4: IPMI Trailer:
  2972. 192.168.100.4: -------------
  2973. 192.168.100.4: [ 9h] = checksum2[ 8b]
  2974. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  2975. 192.168.100.4: ------------------------------
  2976. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  2977. 192.168.100.4: [ 2h] = pad_length[ 8b]
  2978. 192.168.100.4: [ 7h] = next_header[ 8b]
  2979. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  2980. 192.168.100.4: [ 95h 09h A6h 35h F4h 70h 4Ch 6Eh ]
  2981. 192.168.100.4: [ D9h 44h CDh 42h ]
  2982. 192.168.100.4: =====================================================
  2983. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  2984. 192.168.100.4: =====================================================
  2985. 192.168.100.4: RMCP Header:
  2986. 192.168.100.4: ------------
  2987. 192.168.100.4: [ 6h] = version[ 8b]
  2988. 192.168.100.4: [ 0h] = reserved[ 8b]
  2989. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  2990. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  2991. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  2992. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  2993. 192.168.100.4: IPMI RMCPPLUS Session Header:
  2994. 192.168.100.4: -----------------------------
  2995. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  2996. 192.168.100.4: [ 0h] = reserved1[ 4b]
  2997. 192.168.100.4: [ 0h] = payload_type[ 6b]
  2998. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  2999. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  3000. 192.168.100.4: [ 9D193786h] = session_id[32b]
  3001. 192.168.100.4: [ 7h] = session_sequence_number[32b]
  3002. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  3003. 192.168.100.4: IPMI RMCPPLUS Payload:
  3004. 192.168.100.4: ----------------------
  3005. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  3006. 192.168.100.4: [ 13h FDh FAh C7h 39h 9Ch F5h 4Ch ]
  3007. 192.168.100.4: [ FFh 19h B1h 3Eh 7Ch 17h B8h 8Bh ]
  3008. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  3009. 192.168.100.4: [ 81h 04h 7Bh 20h 68h 09h 00h 01h ]
  3010. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  3011. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  3012. 192.168.100.4: [ 00h 00h 69h ]
  3013. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  3014. 192.168.100.4: IPMI Message Header:
  3015. 192.168.100.4: --------------------
  3016. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  3017. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  3018. 192.168.100.4: [ 1h] = net_fn[ 6b]
  3019. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  3020. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  3021. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  3022. 192.168.100.4: [ 1Ah] = rq_seq[ 6b]
  3023. 192.168.100.4: IPMI Command Data:
  3024. 192.168.100.4: ------------------
  3025. 192.168.100.4: [ 9h] = cmd[ 8b]
  3026. 192.168.100.4: [ 0h] = comp_code[ 8b]
  3027. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  3028. 192.168.100.4: [ 0h] = reserved[ 4b]
  3029. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  3030. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  3031. 192.168.100.4: [ 0h] = reserved1[ 5b]
  3032. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  3033. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  3034. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  3035. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  3036. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  3037. 192.168.100.4: [ 0h] = boot_device[ 4b]
  3038. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  3039. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  3040. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  3041. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  3042. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  3043. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  3044. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  3045. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  3046. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  3047. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  3048. 192.168.100.4: [ 0h] = reserved2[ 4b]
  3049. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  3050. 192.168.100.4: [ 0h] = reserved3[ 3b]
  3051. 192.168.100.4: IPMI Trailer:
  3052. 192.168.100.4: -------------
  3053. 192.168.100.4: [ 0h] = checksum2[ 8b]
  3054. 192.168.100.4: Payload Unexpected Data:
  3055. 192.168.100.4: ------------------------
  3056. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  3057. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  3058. 192.168.100.4: [ 00h 00h 00h 69h ]
  3059. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  3060. 192.168.100.4: ------------------------------
  3061. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  3062. 192.168.100.4: [ 2h] = pad_length[ 8b]
  3063. 192.168.100.4: [ 7h] = next_header[ 8b]
  3064. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  3065. 192.168.100.4: [ 8Fh FEh 66h BDh BCh A0h 93h C2h ]
  3066. 192.168.100.4: [ 14h B4h E7h 27h ]
  3067. 192.168.100.4: =====================================================
  3068. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  3069. 192.168.100.4: =====================================================
  3070. 192.168.100.4: RMCP Header:
  3071. 192.168.100.4: ------------
  3072. 192.168.100.4: [ 6h] = version[ 8b]
  3073. 192.168.100.4: [ 0h] = reserved[ 8b]
  3074. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  3075. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  3076. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  3077. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  3078. 192.168.100.4: IPMI RMCPPLUS Session Header:
  3079. 192.168.100.4: -----------------------------
  3080. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  3081. 192.168.100.4: [ 0h] = reserved1[ 4b]
  3082. 192.168.100.4: [ 0h] = payload_type[ 6b]
  3083. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  3084. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  3085. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  3086. 192.168.100.4: [ 8h] = session_sequence_number[32b]
  3087. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  3088. 192.168.100.4: IPMI RMCPPLUS Payload:
  3089. 192.168.100.4: ----------------------
  3090. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  3091. 192.168.100.4: [ 9Ch 5Ch 64h B7h 1Dh FFh 66h 60h ]
  3092. 192.168.100.4: [ 59h B7h 21h F4h 4Eh B4h 88h D3h ]
  3093. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  3094. 192.168.100.4: [ 20h 00h E0h 81h 6Ch 09h 05h 00h ]
  3095. 192.168.100.4: [ 00h 05h ]
  3096. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  3097. 192.168.100.4: IPMI Message Header:
  3098. 192.168.100.4: --------------------
  3099. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  3100. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  3101. 192.168.100.4: [ 0h] = net_fn[ 6b]
  3102. 192.168.100.4: [ E0h] = checksum1[ 8b]
  3103. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  3104. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  3105. 192.168.100.4: [ 1Bh] = rq_seq[ 6b]
  3106. 192.168.100.4: IPMI Command Data:
  3107. 192.168.100.4: ------------------
  3108. 192.168.100.4: [ 9h] = cmd[ 8b]
  3109. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  3110. 192.168.100.4: [ 0h] = reserved[ 1b]
  3111. 192.168.100.4: [ 0h] = set_selector[ 8b]
  3112. 192.168.100.4: [ 0h] = block_selector[ 8b]
  3113. 192.168.100.4: IPMI Trailer:
  3114. 192.168.100.4: -------------
  3115. 192.168.100.4: [ 5h] = checksum2[ 8b]
  3116. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  3117. 192.168.100.4: ------------------------------
  3118. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  3119. 192.168.100.4: [ 2h] = pad_length[ 8b]
  3120. 192.168.100.4: [ 7h] = next_header[ 8b]
  3121. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  3122. 192.168.100.4: [ 86h 31h 9Eh 69h AAh 76h 5Ah 01h ]
  3123. 192.168.100.4: [ 23h 81h 8Eh A8h ]
  3124. 192.168.100.4: =====================================================
  3125. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  3126. 192.168.100.4: =====================================================
  3127. 192.168.100.4: RMCP Header:
  3128. 192.168.100.4: ------------
  3129. 192.168.100.4: [ 6h] = version[ 8b]
  3130. 192.168.100.4: [ 0h] = reserved[ 8b]
  3131. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  3132. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  3133. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  3134. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  3135. 192.168.100.4: IPMI RMCPPLUS Session Header:
  3136. 192.168.100.4: -----------------------------
  3137. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  3138. 192.168.100.4: [ 0h] = reserved1[ 4b]
  3139. 192.168.100.4: [ 0h] = payload_type[ 6b]
  3140. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  3141. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  3142. 192.168.100.4: [ 9D193786h] = session_id[32b]
  3143. 192.168.100.4: [ 8h] = session_sequence_number[32b]
  3144. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  3145. 192.168.100.4: IPMI RMCPPLUS Payload:
  3146. 192.168.100.4: ----------------------
  3147. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  3148. 192.168.100.4: [ 11h 4Dh 75h 57h 45h 9Bh 3Bh B3h ]
  3149. 192.168.100.4: [ 65h 43h BBh F0h 44h EFh 00h A7h ]
  3150. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  3151. 192.168.100.4: [ 81h 04h 7Bh 20h 6Ch 09h 00h 01h ]
  3152. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  3153. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  3154. 192.168.100.4: [ 00h 00h 65h ]
  3155. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  3156. 192.168.100.4: IPMI Message Header:
  3157. 192.168.100.4: --------------------
  3158. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  3159. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  3160. 192.168.100.4: [ 1h] = net_fn[ 6b]
  3161. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  3162. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  3163. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  3164. 192.168.100.4: [ 1Bh] = rq_seq[ 6b]
  3165. 192.168.100.4: IPMI Command Data:
  3166. 192.168.100.4: ------------------
  3167. 192.168.100.4: [ 9h] = cmd[ 8b]
  3168. 192.168.100.4: [ 0h] = comp_code[ 8b]
  3169. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  3170. 192.168.100.4: [ 0h] = reserved[ 4b]
  3171. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  3172. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  3173. 192.168.100.4: [ 0h] = reserved1[ 5b]
  3174. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  3175. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  3176. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  3177. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  3178. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  3179. 192.168.100.4: [ 0h] = boot_device[ 4b]
  3180. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  3181. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  3182. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  3183. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  3184. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  3185. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  3186. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  3187. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  3188. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  3189. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  3190. 192.168.100.4: [ 0h] = reserved2[ 4b]
  3191. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  3192. 192.168.100.4: [ 0h] = reserved3[ 3b]
  3193. 192.168.100.4: IPMI Trailer:
  3194. 192.168.100.4: -------------
  3195. 192.168.100.4: [ 0h] = checksum2[ 8b]
  3196. 192.168.100.4: Payload Unexpected Data:
  3197. 192.168.100.4: ------------------------
  3198. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  3199. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  3200. 192.168.100.4: [ 00h 00h 00h 65h ]
  3201. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  3202. 192.168.100.4: ------------------------------
  3203. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  3204. 192.168.100.4: [ 2h] = pad_length[ 8b]
  3205. 192.168.100.4: [ 7h] = next_header[ 8b]
  3206. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  3207. 192.168.100.4: [ 7Fh CAh C7h CCh 9Ah BAh 98h DEh ]
  3208. 192.168.100.4: [ 9Eh 6Fh A5h 47h ]
  3209. 192.168.100.4: =====================================================
  3210. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  3211. 192.168.100.4: =====================================================
  3212. 192.168.100.4: RMCP Header:
  3213. 192.168.100.4: ------------
  3214. 192.168.100.4: [ 6h] = version[ 8b]
  3215. 192.168.100.4: [ 0h] = reserved[ 8b]
  3216. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  3217. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  3218. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  3219. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  3220. 192.168.100.4: IPMI RMCPPLUS Session Header:
  3221. 192.168.100.4: -----------------------------
  3222. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  3223. 192.168.100.4: [ 0h] = reserved1[ 4b]
  3224. 192.168.100.4: [ 0h] = payload_type[ 6b]
  3225. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  3226. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  3227. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  3228. 192.168.100.4: [ 9h] = session_sequence_number[32b]
  3229. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  3230. 192.168.100.4: IPMI RMCPPLUS Payload:
  3231. 192.168.100.4: ----------------------
  3232. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  3233. 192.168.100.4: [ 38h 61h CBh 24h DAh 79h 27h 71h ]
  3234. 192.168.100.4: [ 6Bh DCh DDh E4h 38h D8h 29h D5h ]
  3235. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  3236. 192.168.100.4: [ 20h 00h E0h 81h 70h 09h 05h 00h ]
  3237. 192.168.100.4: [ 00h 01h ]
  3238. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  3239. 192.168.100.4: IPMI Message Header:
  3240. 192.168.100.4: --------------------
  3241. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  3242. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  3243. 192.168.100.4: [ 0h] = net_fn[ 6b]
  3244. 192.168.100.4: [ E0h] = checksum1[ 8b]
  3245. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  3246. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  3247. 192.168.100.4: [ 1Ch] = rq_seq[ 6b]
  3248. 192.168.100.4: IPMI Command Data:
  3249. 192.168.100.4: ------------------
  3250. 192.168.100.4: [ 9h] = cmd[ 8b]
  3251. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  3252. 192.168.100.4: [ 0h] = reserved[ 1b]
  3253. 192.168.100.4: [ 0h] = set_selector[ 8b]
  3254. 192.168.100.4: [ 0h] = block_selector[ 8b]
  3255. 192.168.100.4: IPMI Trailer:
  3256. 192.168.100.4: -------------
  3257. 192.168.100.4: [ 1h] = checksum2[ 8b]
  3258. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  3259. 192.168.100.4: ------------------------------
  3260. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  3261. 192.168.100.4: [ 2h] = pad_length[ 8b]
  3262. 192.168.100.4: [ 7h] = next_header[ 8b]
  3263. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  3264. 192.168.100.4: [ 26h B0h D3h 68h 6Bh FBh C5h 2Fh ]
  3265. 192.168.100.4: [ 04h 15h F1h EBh ]
  3266. 192.168.100.4: =====================================================
  3267. 192.168.100.4: IPMI 2.0 Get System Boot Options Response
  3268. 192.168.100.4: =====================================================
  3269. 192.168.100.4: RMCP Header:
  3270. 192.168.100.4: ------------
  3271. 192.168.100.4: [ 6h] = version[ 8b]
  3272. 192.168.100.4: [ 0h] = reserved[ 8b]
  3273. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  3274. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  3275. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  3276. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  3277. 192.168.100.4: IPMI RMCPPLUS Session Header:
  3278. 192.168.100.4: -----------------------------
  3279. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  3280. 192.168.100.4: [ 0h] = reserved1[ 4b]
  3281. 192.168.100.4: [ 0h] = payload_type[ 6b]
  3282. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  3283. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  3284. 192.168.100.4: [ 9D193786h] = session_id[32b]
  3285. 192.168.100.4: [ 9h] = session_sequence_number[32b]
  3286. 192.168.100.4: [ 30h] = ipmi_payload_len[16b]
  3287. 192.168.100.4: IPMI RMCPPLUS Payload:
  3288. 192.168.100.4: ----------------------
  3289. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  3290. 192.168.100.4: [ 5Eh C0h 0Fh 9Dh 28h 22h 87h E1h ]
  3291. 192.168.100.4: [ DBh 35h DAh B8h 9Eh EAh CEh 89h ]
  3292. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B]
  3293. 192.168.100.4: [ 81h 04h 7Bh 20h 70h 09h 00h 01h ]
  3294. 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ]
  3295. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  3296. 192.168.100.4: [ 00h 00h 61h ]
  3297. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  3298. 192.168.100.4: IPMI Message Header:
  3299. 192.168.100.4: --------------------
  3300. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  3301. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  3302. 192.168.100.4: [ 1h] = net_fn[ 6b]
  3303. 192.168.100.4: [ 7Bh] = checksum1[ 8b]
  3304. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  3305. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  3306. 192.168.100.4: [ 1Ch] = rq_seq[ 6b]
  3307. 192.168.100.4: IPMI Command Data:
  3308. 192.168.100.4: ------------------
  3309. 192.168.100.4: [ 9h] = cmd[ 8b]
  3310. 192.168.100.4: [ 0h] = comp_code[ 8b]
  3311. 192.168.100.4: [ 1h] = parameter_version[ 4b]
  3312. 192.168.100.4: [ 0h] = reserved[ 4b]
  3313. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  3314. 192.168.100.4: [ 0h] = parameter_valid[ 1b]
  3315. 192.168.100.4: [ 0h] = reserved1[ 5b]
  3316. 192.168.100.4: [ 0h] = bios_boot_type[ 1b]
  3317. 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b]
  3318. 192.168.100.4: [ 0h] = boot_flags_valid[ 1b]
  3319. 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b]
  3320. 192.168.100.4: [ 0h] = screen_blank[ 1b]
  3321. 192.168.100.4: [ 0h] = boot_device[ 4b]
  3322. 192.168.100.4: [ 0h] = lock_keyboard[ 1b]
  3323. 192.168.100.4: [ 0h] = cmos_clear[ 1b]
  3324. 192.168.100.4: [ 0h] = console_redirection[ 2b]
  3325. 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b]
  3326. 192.168.100.4: [ 0h] = user_password_bypass[ 1b]
  3327. 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b]
  3328. 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b]
  3329. 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b]
  3330. 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b]
  3331. 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b]
  3332. 192.168.100.4: [ 0h] = reserved2[ 4b]
  3333. 192.168.100.4: [ 0h] = device_instance_selector[ 5b]
  3334. 192.168.100.4: [ 0h] = reserved3[ 3b]
  3335. 192.168.100.4: IPMI Trailer:
  3336. 192.168.100.4: -------------
  3337. 192.168.100.4: [ 0h] = checksum2[ 8b]
  3338. 192.168.100.4: Payload Unexpected Data:
  3339. 192.168.100.4: ------------------------
  3340. 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B]
  3341. 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ]
  3342. 192.168.100.4: [ 00h 00h 00h 61h ]
  3343. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  3344. 192.168.100.4: ------------------------------
  3345. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  3346. 192.168.100.4: [ 2h] = pad_length[ 8b]
  3347. 192.168.100.4: [ 7h] = next_header[ 8b]
  3348. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  3349. 192.168.100.4: [ 2Fh 32h F3h 1Fh 07h B5h EDh ADh ]
  3350. 192.168.100.4: [ C6h 65h 64h 02h ]
  3351. 192.168.100.4: =====================================================
  3352. 192.168.100.4: IPMI 2.0 Get System Boot Options Request
  3353. 192.168.100.4: =====================================================
  3354. 192.168.100.4: RMCP Header:
  3355. 192.168.100.4: ------------
  3356. 192.168.100.4: [ 6h] = version[ 8b]
  3357. 192.168.100.4: [ 0h] = reserved[ 8b]
  3358. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  3359. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  3360. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  3361. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  3362. 192.168.100.4: IPMI RMCPPLUS Session Header:
  3363. 192.168.100.4: -----------------------------
  3364. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  3365. 192.168.100.4: [ 0h] = reserved1[ 4b]
  3366. 192.168.100.4: [ 0h] = payload_type[ 6b]
  3367. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  3368. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  3369. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  3370. 192.168.100.4: [ Ah] = session_sequence_number[32b]
  3371. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  3372. 192.168.100.4: IPMI RMCPPLUS Payload:
  3373. 192.168.100.4: ----------------------
  3374. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  3375. 192.168.100.4: [ 2Eh 9Dh 2Ah 93h 97h A1h 0Dh 9Ch ]
  3376. 192.168.100.4: [ 3Bh 84h 2Dh 13h 2Ah 01h AFh 26h ]
  3377. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B]
  3378. 192.168.100.4: [ 20h 00h E0h 81h 74h 09h 05h 00h ]
  3379. 192.168.100.4: [ 00h FDh ]
  3380. 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b]
  3381. 192.168.100.4: IPMI Message Header:
  3382. 192.168.100.4: --------------------
  3383. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  3384. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  3385. 192.168.100.4: [ 0h] = net_fn[ 6b]
  3386. 192.168.100.4: [ E0h] = checksum1[ 8b]
  3387. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  3388. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  3389. 192.168.100.4: [ 1Dh] = rq_seq[ 6b]
  3390. 192.168.100.4: IPMI Command Data:
  3391. 192.168.100.4: ------------------
  3392. 192.168.100.4: [ 9h] = cmd[ 8b]
  3393. 192.168.100.4: [ 5h] = parameter_selector[ 7b]
  3394. 192.168.100.4: [ 0h] = reserved[ 1b]
  3395. 192.168.100.4: [ 0h] = set_selector[ 8b]
  3396. 192.168.100.4: [ 0h] = block_selector[ 8b]
  3397. 192.168.100.4: IPMI Trailer:
  3398. 192.168.100.4: -------------
  3399. 192.168.100.4: [ FDh] = checksum2[ 8b]
  3400. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  3401. 192.168.100.4: ------------------------------
  3402. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  3403. 192.168.100.4: [ 2h] = pad_length[ 8b]
  3404. 192.168.100.4: [ 7h] = next_header[ 8b]
  3405. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  3406. 192.168.100.4: [ 21h 49h 54h D6h 56h E6h E6h CAh ]
  3407. 192.168.100.4: [ CFh 66h 8Eh E0h ]
  3408. ipmi_cmd_get_system_boot_options_boot_flags: session timeout
  3409. 192.168.100.4: =====================================================
  3410. 192.168.100.4: IPMI 2.0 Close Session Request
  3411. 192.168.100.4: =====================================================
  3412. 192.168.100.4: RMCP Header:
  3413. 192.168.100.4: ------------
  3414. 192.168.100.4: [ 6h] = version[ 8b]
  3415. 192.168.100.4: [ 0h] = reserved[ 8b]
  3416. 192.168.100.4: [ FFh] = sequence_number[ 8b]
  3417. 192.168.100.4: [ 7h] = message_class.class[ 5b]
  3418. 192.168.100.4: [ 0h] = message_class.reserved[ 2b]
  3419. 192.168.100.4: [ 0h] = message_class.ack[ 1b]
  3420. 192.168.100.4: IPMI RMCPPLUS Session Header:
  3421. 192.168.100.4: -----------------------------
  3422. 192.168.100.4: [ 6h] = authentication_type[ 4b]
  3423. 192.168.100.4: [ 0h] = reserved1[ 4b]
  3424. 192.168.100.4: [ 0h] = payload_type[ 6b]
  3425. 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b]
  3426. 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b]
  3427. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  3428. 192.168.100.4: [ Bh] = session_sequence_number[32b]
  3429. 192.168.100.4: [ 20h] = ipmi_payload_len[16b]
  3430. 192.168.100.4: IPMI RMCPPLUS Payload:
  3431. 192.168.100.4: ----------------------
  3432. 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B]
  3433. 192.168.100.4: [ CCh 86h 8Ah 4Ah 12h 6Eh 85h 05h ]
  3434. 192.168.100.4: [ 09h 61h F4h DBh 00h 9Eh 0Fh 8Eh ]
  3435. 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[11B]
  3436. 192.168.100.4: [ 20h 18h C8h 81h 78h 3Ch 30h CBh ]
  3437. 192.168.100.4: [ 8Fh 00h 41h ]
  3438. 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b]
  3439. 192.168.100.4: IPMI Message Header:
  3440. 192.168.100.4: --------------------
  3441. 192.168.100.4: [ 20h] = rs_addr[ 8b]
  3442. 192.168.100.4: [ 0h] = rs_lun[ 2b]
  3443. 192.168.100.4: [ 6h] = net_fn[ 6b]
  3444. 192.168.100.4: [ C8h] = checksum1[ 8b]
  3445. 192.168.100.4: [ 81h] = rq_addr[ 8b]
  3446. 192.168.100.4: [ 0h] = rq_lun[ 2b]
  3447. 192.168.100.4: [ 1Eh] = rq_seq[ 6b]
  3448. 192.168.100.4: IPMI Command Data:
  3449. 192.168.100.4: ------------------
  3450. 192.168.100.4: [ 3Ch] = cmd[ 8b]
  3451. 192.168.100.4: [ 8FCB30h] = session_id[32b]
  3452. 192.168.100.4: IPMI Trailer:
  3453. 192.168.100.4: -------------
  3454. 192.168.100.4: [ 41h] = checksum2[ 8b]
  3455. 192.168.100.4: IPMI RMCPPLUS Session Trailer:
  3456. 192.168.100.4: ------------------------------
  3457. 192.168.100.4: [ FFFFh] = integrity_pad[16b]
  3458. 192.168.100.4: [ 2h] = pad_length[ 8b]
  3459. 192.168.100.4: [ 7h] = next_header[ 8b]
  3460. 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B]
  3461. 192.168.100.4: [ 12h DBh 89h E8h 84h 77h F3h 26h ]
  3462. 192.168.100.4: [ BCh 25h 4Bh 55h ]
RAW Paste Data