Pastebin
API
tools
faq
paste
Login
Sign up
Please fix the following errors:
New Paste
Syntax Highlighting
ubuntu@maas:~$ ipmi-chassis-config -D LAN_2_0 -h 192.168.100.4 -u Administrator -p password -v --debug --commit --filename ipmi.cfg 192.168.100.4: ===================================================== 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI Session Header: 192.168.100.4: -------------------- 192.168.100.4: [ 0h] = authentication_type[ 8b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 9h] = ipmi_msg_len[ 8b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 6h] = net_fn[ 6b] 192.168.100.4: [ C8h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 3h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 38h] = cmd[ 8b] 192.168.100.4: [ Eh] = channel_number[ 4b] 192.168.100.4: [ 0h] = reserved1[ 3b] 192.168.100.4: [ 1h] = get_ipmi_v2.0_extended_data[ 1b] 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: IPMI Trailer: 192.168.100.4: -------------- 192.168.100.4: [ A9h] = checksum2[ 8b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI Session Header: 192.168.100.4: -------------------- 192.168.100.4: [ 0h] = authentication_type[ 8b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 10h] = ipmi_msg_len[ 8b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 7h] = net_fn[ 6b] 192.168.100.4: [ 63h] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 3h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 38h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 2h] = channel_number[ 8b] 192.168.100.4: [ 0h] = authentication_type.none[ 1b] 192.168.100.4: [ 0h] = authentication_type.md2[ 1b] 192.168.100.4: [ 0h] = authentication_type.md5[ 1b] 192.168.100.4: [ 0h] = authentication_type.reserved1[ 1b] 192.168.100.4: [ 0h] = authentication_type.straight_password_key[ 1b] 192.168.100.4: [ 0h] = authentication_type.oem_prop[ 1b] 192.168.100.4: [ 0h] = authentication_type.reserved2[ 1b] 192.168.100.4: [ 1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b] 192.168.100.4: [ 0h] = authentication_status.anonymous_login[ 1b] 192.168.100.4: [ 0h] = authentication_status.null_username[ 1b] 192.168.100.4: [ 1h] = authentication_status.non_null_username[ 1b] 192.168.100.4: [ 0h] = authentication_status.user_level_authentication[ 1b] 192.168.100.4: [ 1h] = authentication_status.per_message_authentication[ 1b] 192.168.100.4: [ 0h] = authentication_status.k_g[ 1b] 192.168.100.4: [ 0h] = authentication_status.reserved[ 2b] 192.168.100.4: [ 0h] = channel_supports_ipmi_v1.5_connections[ 1b] 192.168.100.4: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b] 192.168.100.4: [ 0h] = reserved[ 6b] 192.168.100.4: [ 0h] = oem_id[24b] 192.168.100.4: [ 0h] = oem_auxiliary_data[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: -------------- 192.168.100.4: [ 4h] = checksum2[ 8b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Open Session Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 10h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[32B] 192.168.100.4: [ 01h 00h 00h 00h 18h ADh 9Bh BBh ] 192.168.100.4: [ 00h 00h 00h 08h 01h 00h 00h 00h ] 192.168.100.4: [ 01h 00h 00h 08h 01h 00h 00h 00h ] 192.168.100.4: [ 02h 00h 00h 08h 01h 00h 00h 00h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 1h] = message_tag[ 8b] 192.168.100.4: [ 0h] = requested_maximum_privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = reserved2[16b] 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b] 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved3[16b] 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved4[ 2b] 192.168.100.4: [ 0h] = reserved5[24b] 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved6[16b] 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved7[ 2b] 192.168.100.4: [ 0h] = reserved8[24b] 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved9[16b] 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved10[ 2b] 192.168.100.4: [ 0h] = reserved11[24b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Open Session Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 11h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 24h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[36B] 192.168.100.4: [ 01h 00h 04h 00h 18h ADh 9Bh BBh ] 192.168.100.4: [ 30h CBh 8Fh 00h 00h 00h 00h 08h ] 192.168.100.4: [ 01h 00h 00h 00h 01h 00h 00h 08h ] 192.168.100.4: [ 01h 00h 00h 00h 02h 00h 00h 08h ] 192.168.100.4: [ 01h 00h 00h 00h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 1h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = reserved2[ 8b] 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b] 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b] 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved3[16b] 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved4[ 2b] 192.168.100.4: [ 0h] = reserved5[24b] 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved6[16b] 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved7[ 2b] 192.168.100.4: [ 0h] = reserved8[24b] 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved9[16b] 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved10[ 2b] 192.168.100.4: [ 0h] = reserved11[24b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 1 Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 12h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 29h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[41B] 192.168.100.4: [ 02h 00h 00h 00h 30h CBh 8Fh 00h ] 192.168.100.4: [ EDh E0h 50h 90h B3h A5h 95h 99h ] 192.168.100.4: [ 18h 9Dh F8h B7h 92h 2Fh 62h C2h ] 192.168.100.4: [ 14h 00h 00h 0Dh 41h 64h 6Dh 69h ] 192.168.100.4: [ 6Eh 69h 73h 74h 72h 61h 74h 6Fh ] 192.168.100.4: [ 72h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 2h] = message_tag[ 8b] 192.168.100.4: [ 0h] = reserved1[24b] 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = remote_console_random_number[16B] 192.168.100.4: [ EDh E0h 50h 90h B3h A5h 95h 99h ] 192.168.100.4: [ 18h 9Dh F8h B7h 92h 2Fh 62h C2h ] 192.168.100.4: [ 4h] = requested_maximum_privilege_level[ 4b] 192.168.100.4: [ 1h] = name_only_lookup[ 1b] 192.168.100.4: [ 0h] = reserved2[ 3b] 192.168.100.4: [ 0h] = reserved3[16b] 192.168.100.4: [ Dh] = user_name_length[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = user_name[13B] 192.168.100.4: [ 41h 64h 6Dh 69h 6Eh 69h 73h 74h ] 192.168.100.4: [ 72h 61h 74h 6Fh 72h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 2 Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 13h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 3Ch] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[60B] 192.168.100.4: [ 02h 00h 00h 00h 18h ADh 9Bh BBh ] 192.168.100.4: [ 73h 3Ah 01h F5h 3Dh 57h A9h 30h ] 192.168.100.4: [ D4h 73h 2Ch B0h 88h 0Eh FCh C4h ] 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ] 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ] 192.168.100.4: [ D1h 48h 88h F9h D3h 46h 7Eh C8h ] 192.168.100.4: [ C8h 66h 37h 5Ch B4h 0Fh C8h 0Fh ] 192.168.100.4: [ 9Bh F4h 21h DFh ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 2h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 0h] = reserved1[16b] 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_random_number[16B] 192.168.100.4: [ 73h 3Ah 01h F5h 3Dh 57h A9h 30h ] 192.168.100.4: [ D4h 73h 2Ch B0h 88h 0Eh FCh C4h ] 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_guid[16B] 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ] 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ] 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B] 192.168.100.4: [ D1h 48h 88h F9h D3h 46h 7Eh C8h ] 192.168.100.4: [ C8h 66h 37h 5Ch B4h 0Fh C8h 0Fh ] 192.168.100.4: [ 9Bh F4h 21h DFh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 3 Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 14h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 1Ch] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[28B] 192.168.100.4: [ 03h 00h 00h 00h 30h CBh 8Fh 00h ] 192.168.100.4: [ 74h C2h 56h 6Ah F6h C4h 59h 60h ] 192.168.100.4: [ 64h 41h F3h 8Fh 2Ch 10h 84h 61h ] 192.168.100.4: [ 5Ah ECh E0h 1Fh ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 0h] = reserved1[16b] 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B] 192.168.100.4: [ 74h C2h 56h 6Ah F6h C4h 59h 60h ] 192.168.100.4: [ 64h 41h F3h 8Fh 2Ch 10h 84h 61h ] 192.168.100.4: [ 5Ah ECh E0h 1Fh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 4 Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 15h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 14h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[20B] 192.168.100.4: [ 03h 00h 00h 00h 18h ADh 9Bh BBh ] 192.168.100.4: [ FFh BFh 9Fh 30h 5Dh 20h 4Dh A3h ] 192.168.100.4: [ 02h F0h 7Bh 7Ch ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 0h] = reserved1[16b] 192.168.100.4: [ BB9BAD18h] = remote_console_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = integrity_check_value[12B] 192.168.100.4: [ FFh BFh 9Fh 30h 5Dh 20h 4Dh A3h ] 192.168.100.4: [ 02h F0h 7Bh 7Ch ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Set Session Privilege Level Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 1h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 98h 7Fh 04h 05h FEh F3h 1Bh F3h ] 192.168.100.4: [ 4Dh 25h AEh FAh 9Eh C9h 49h AEh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 8B] 192.168.100.4: [ 20h 18h C8h 81h 10h 3Bh 04h 30h ] 192.168.100.4: [ 707060504030201h] = confidentiality_trailer[64b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 6h] = net_fn[ 6b] 192.168.100.4: [ C8h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 4h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3Bh] = cmd[ 8b] 192.168.100.4: [ 4h] = privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 30h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ E7h BAh 22h CFh A7h D4h DBh 8Dh ] 192.168.100.4: [ D7h F8h A0h 1Ch ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Set Session Privilege Level Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 1h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 1Fh B8h 0Eh F6h 4Fh 8Ah CFh F7h ] 192.168.100.4: [ 2Fh D2h 07h 32h 9Eh 08h 74h CBh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 9B] 192.168.100.4: [ 81h 1Ch 63h 20h 10h 3Bh 00h 04h ] 192.168.100.4: [ 91h ] 192.168.100.4: [ 6060504030201h] = confidentiality_trailer[56b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 7h] = net_fn[ 6b] 192.168.100.4: [ 63h] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 4h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3Bh] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 4h] = privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 91h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 18h 2Ah F0h 07h 7Bh 60h C6h 34h ] 192.168.100.4: [ 63h 04h 5Ah 15h ] Entering section `Chassis_Boot_Flags' Parsed `Chassis_Boot_Flags:Boot_Flags_Persistent=No' Parsed `Chassis_Boot_Flags:Boot_Device=PXE' Leaving section `Chassis_Boot_Flags' 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 2h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 85h FAh 35h E5h FEh F3h 86h CBh ] 192.168.100.4: [ 83h D6h 6Dh 81h 92h 10h F0h FEh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 14h 09h 05h 00h ] 192.168.100.4: [ 00h 5Dh ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 5h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 5Dh] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ D0h 3Dh B5h F7h 30h EBh 86h 89h ] 192.168.100.4: [ 9Fh 8Fh F6h 6Fh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 2h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 42h 29h EEh 53h 3Eh 45h 10h 08h ] 192.168.100.4: [ E5h 11h 92h D3h 87h 27h 13h 9Eh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 14h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h BDh ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 5h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h BDh ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ FEh 70h 5Dh DFh 5Ah 16h A1h 9Eh ] 192.168.100.4: [ F2h FFh 59h ECh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 3h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 17h 72h 1Dh 02h FAh 45h 04h 47h ] 192.168.100.4: [ 3Ch 6Eh F5h A2h 6Ch DBh 15h B2h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 18h 09h 05h 00h ] 192.168.100.4: [ 00h 59h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 6h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 59h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ E4h 64h 54h 81h 5Fh 7Eh 0Bh 46h ] 192.168.100.4: [ BEh 00h D5h 05h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 3h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ D3h 2Dh 83h 63h 67h C4h 26h DCh ] 192.168.100.4: [ 28h 23h 79h 59h 90h 20h 0Dh 45h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 18h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h B9h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 6h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h B9h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 88h 6Ch 5Dh 42h C0h C5h C4h B4h ] 192.168.100.4: [ F1h 0Bh 8Ch 12h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 4h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 65h C6h 02h C6h 1Fh C3h 05h D5h ] 192.168.100.4: [ C8h 67h C0h A3h D2h 28h 0Dh A0h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 1Ch 09h 05h 00h ] 192.168.100.4: [ 00h 55h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 7h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 55h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 59h 67h 50h 08h AEh C3h 58h 0Ch ] 192.168.100.4: [ CAh A3h CEh 69h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 4h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 1Eh 34h 3Ch 42h C2h 95h A3h E0h ] 192.168.100.4: [ 87h 95h EFh E2h 94h 9Ah 00h 1Fh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 1Ch 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h B5h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 7h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h B5h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ C9h B0h EAh 40h 00h 3Ch C5h 5Ah ] 192.168.100.4: [ C3h FCh F7h 08h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 5h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 82h C6h 51h 2Fh D1h 18h 84h 96h ] 192.168.100.4: [ 66h 1Ah ACh 4Bh 1Ch 80h 6Fh 66h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 20h 09h 05h 00h ] 192.168.100.4: [ 00h 51h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 8h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 51h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 29h DFh DFh F1h 30h 1Ah AFh E1h ] 192.168.100.4: [ 62h 91h 2Eh 96h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 5h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ A4h 4Ch 3Fh 21h 66h 4Eh 9Bh ACh ] 192.168.100.4: [ 95h E9h E2h 97h 54h 6Dh 7Bh 05h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 20h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h B1h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 8h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h B1h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 99h F7h 81h 70h 58h 54h 1Eh 25h ] 192.168.100.4: [ 27h F7h 38h 5Eh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 6h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 48h 1Ah 01h A9h A4h 59h ADh 5Fh ] 192.168.100.4: [ CCh 42h C7h 6Eh E4h 50h B1h FFh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 24h 09h 05h 00h ] 192.168.100.4: [ 00h 4Dh ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 9h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 4Dh] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 92h A2h DAh A3h DEh 25h FBh 79h ] 192.168.100.4: [ 25h 4Fh 8Dh 7Fh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 6h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 6Eh 0Ch D7h C5h 2Ah 8Eh DCh 79h ] 192.168.100.4: [ 8Eh 72h 27h F1h C1h 51h 44h 10h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 24h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h ADh ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 9h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h ADh ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 29h 7Fh D9h 27h 62h FEh 1Bh ACh ] 192.168.100.4: [ D0h 42h 25h DAh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 7h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 15h D1h 82h 45h 22h 73h B8h 77h ] 192.168.100.4: [ A1h 96h 4Eh D2h FFh 1Fh 08h 50h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 28h 09h 05h 00h ] 192.168.100.4: [ 00h 49h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ Ah] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 49h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 49h 63h 68h 1Ch A2h 2Eh 78h A1h ] 192.168.100.4: [ 13h AEh E7h DEh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 7h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ CDh 5Eh A5h 79h 69h 15h DCh 2Bh ] 192.168.100.4: [ B2h DEh 76h 1Ah 7Dh 8Ah 30h 34h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 28h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h A9h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ Ah] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h A9h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 97h D3h 35h 12h D3h 4Eh DFh 1Dh ] 192.168.100.4: [ 72h 57h 6Ch 48h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 8h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 68h 2Dh F4h 8Ch DEh FEh A5h E8h ] 192.168.100.4: [ EEh E9h 3Ah BEh 34h 8Dh 29h E8h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 2Ch 09h 05h 00h ] 192.168.100.4: [ 00h 45h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ Bh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 45h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 95h 99h 5Dh D0h B1h 0Fh 2Eh 9Bh ] 192.168.100.4: [ 1Ah 5Eh D2h 8Fh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 8h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 7Dh 77h CFh 8Bh 27h C0h C1h BCh ] 192.168.100.4: [ B1h E8h 4Ah 9Ch 31h 58h 84h 0Dh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 2Ch 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h A5h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ Bh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h A5h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 99h 0Ah D8h 60h AFh 63h FDh 67h ] 192.168.100.4: [ 97h 31h CDh 01h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 9h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 22h 34h 1Dh A2h D8h ADh C2h 0Ah ] 192.168.100.4: [ 66h ACh E4h BBh E5h 6Bh D7h 3Dh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 30h 09h 05h 00h ] 192.168.100.4: [ 00h 41h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ Ch] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 41h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ AFh C5h 1Bh F1h 37h 52h 7Bh 7Ch ] 192.168.100.4: [ 0Eh 7Eh A9h 97h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ BB9BAD18h] = session_id[32b] 192.168.100.4: [ 9h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ F9h 63h 78h 64h 68h 9Fh 91h 73h ] 192.168.100.4: [ 2Dh 68h A8h 95h B7h C9h E7h 4Ah ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 30h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h A1h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ Ch] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h A1h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 15h 45h 5Ah ACh 24h 81h 7Dh 7Bh ] 192.168.100.4: [ FAh 06h BEh DDh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ Ah] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ F1h CEh CDh 84h C9h ABh 1Fh F9h ] 192.168.100.4: [ E0h CEh 14h AEh ECh 49h DCh 9Bh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 34h 09h 05h 00h ] 192.168.100.4: [ 00h 3Dh ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ Dh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 3Dh] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 3Eh 59h 11h 52h 0Fh C4h BEh 4Ch ] 192.168.100.4: [ 56h ACh CAh 77h ] ipmi_cmd_get_system_boot_options_boot_flags: session timeout 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Close Session Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ Bh] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 07h 63h 09h 09h 61h D8h 12h 74h ] 192.168.100.4: [ 23h DEh A9h 49h B0h 4Ch 54h 7Dh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[11B] 192.168.100.4: [ 20h 18h C8h 81h 38h 3Ch 30h CBh ] 192.168.100.4: [ 8Fh 00h 81h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 6h] = net_fn[ 6b] 192.168.100.4: [ C8h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ Eh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3Ch] = cmd[ 8b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 81h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 56h CDh 56h BAh 10h 50h 67h 35h ] 192.168.100.4: [ 1Fh 15h D4h 61h ] ubuntu@maas:~$ ipmi-chassis-config -D LAN_2_0 -h 192.168.100.4 -u Administrator -p openstack --debug --commit --filename ipmi.cfg 192.168.100.4: ===================================================== 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI Session Header: 192.168.100.4: -------------------- 192.168.100.4: [ 0h] = authentication_type[ 8b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 9h] = ipmi_msg_len[ 8b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 6h] = net_fn[ 6b] 192.168.100.4: [ C8h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 13h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 38h] = cmd[ 8b] 192.168.100.4: [ Eh] = channel_number[ 4b] 192.168.100.4: [ 0h] = reserved1[ 3b] 192.168.100.4: [ 1h] = get_ipmi_v2.0_extended_data[ 1b] 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: IPMI Trailer: 192.168.100.4: -------------- 192.168.100.4: [ 69h] = checksum2[ 8b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 1.5 Get Channel Authentication Capabilities Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI Session Header: 192.168.100.4: -------------------- 192.168.100.4: [ 0h] = authentication_type[ 8b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 10h] = ipmi_msg_len[ 8b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 7h] = net_fn[ 6b] 192.168.100.4: [ 63h] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 13h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 38h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 2h] = channel_number[ 8b] 192.168.100.4: [ 0h] = authentication_type.none[ 1b] 192.168.100.4: [ 0h] = authentication_type.md2[ 1b] 192.168.100.4: [ 0h] = authentication_type.md5[ 1b] 192.168.100.4: [ 0h] = authentication_type.reserved1[ 1b] 192.168.100.4: [ 0h] = authentication_type.straight_password_key[ 1b] 192.168.100.4: [ 0h] = authentication_type.oem_prop[ 1b] 192.168.100.4: [ 0h] = authentication_type.reserved2[ 1b] 192.168.100.4: [ 1h] = authentication_type.ipmi_v2.0_extended_capabilities_available[ 1b] 192.168.100.4: [ 0h] = authentication_status.anonymous_login[ 1b] 192.168.100.4: [ 0h] = authentication_status.null_username[ 1b] 192.168.100.4: [ 1h] = authentication_status.non_null_username[ 1b] 192.168.100.4: [ 0h] = authentication_status.user_level_authentication[ 1b] 192.168.100.4: [ 1h] = authentication_status.per_message_authentication[ 1b] 192.168.100.4: [ 0h] = authentication_status.k_g[ 1b] 192.168.100.4: [ 0h] = authentication_status.reserved[ 2b] 192.168.100.4: [ 0h] = channel_supports_ipmi_v1.5_connections[ 1b] 192.168.100.4: [ 1h] = channel_supports_ipmi_v2.0_connections[ 1b] 192.168.100.4: [ 0h] = reserved[ 6b] 192.168.100.4: [ 0h] = oem_id[24b] 192.168.100.4: [ 0h] = oem_auxiliary_data[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: -------------- 192.168.100.4: [ C4h] = checksum2[ 8b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Open Session Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 10h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[32B] 192.168.100.4: [ 41h 00h 00h 00h 86h 37h 19h 9Dh ] 192.168.100.4: [ 00h 00h 00h 08h 01h 00h 00h 00h ] 192.168.100.4: [ 01h 00h 00h 08h 01h 00h 00h 00h ] 192.168.100.4: [ 02h 00h 00h 08h 01h 00h 00h 00h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 41h] = message_tag[ 8b] 192.168.100.4: [ 0h] = requested_maximum_privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = reserved2[16b] 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b] 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved3[16b] 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved4[ 2b] 192.168.100.4: [ 0h] = reserved5[24b] 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved6[16b] 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved7[ 2b] 192.168.100.4: [ 0h] = reserved8[24b] 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved9[16b] 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved10[ 2b] 192.168.100.4: [ 0h] = reserved11[24b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Open Session Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 11h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 24h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[36B] 192.168.100.4: [ 41h 00h 04h 00h 86h 37h 19h 9Dh ] 192.168.100.4: [ 30h CBh 8Fh 00h 00h 00h 00h 08h ] 192.168.100.4: [ 01h 00h 00h 00h 01h 00h 00h 08h ] 192.168.100.4: [ 01h 00h 00h 00h 02h 00h 00h 08h ] 192.168.100.4: [ 01h 00h 00h 00h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 41h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 4h] = maximum_privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = reserved2[ 8b] 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b] 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b] 192.168.100.4: [ 0h] = authentication_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved3[16b] 192.168.100.4: [ 8h] = authentication_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = authentication_payload.authentication_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved4[ 2b] 192.168.100.4: [ 0h] = reserved5[24b] 192.168.100.4: [ 1h] = integrity_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved6[16b] 192.168.100.4: [ 8h] = integrity_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = integrity_payload.integrity_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved7[ 2b] 192.168.100.4: [ 0h] = reserved8[24b] 192.168.100.4: [ 2h] = confidentiality_payload.payload_type[ 8b] 192.168.100.4: [ 0h] = reserved9[16b] 192.168.100.4: [ 8h] = confidentiality_payload.payload_length[ 8b] 192.168.100.4: [ 1h] = confidentiality_payload.confidentiality_algorithm[ 6b] 192.168.100.4: [ 0h] = reserved10[ 2b] 192.168.100.4: [ 0h] = reserved11[24b] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 1 Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 12h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 29h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[41B] 192.168.100.4: [ 42h 00h 00h 00h 30h CBh 8Fh 00h ] 192.168.100.4: [ AFh 2Ah 4Fh 60h 05h A1h D7h 59h ] 192.168.100.4: [ E9h 45h 42h 12h 93h 4Ch B0h 9Bh ] 192.168.100.4: [ 14h 00h 00h 0Dh 41h 64h 6Dh 69h ] 192.168.100.4: [ 6Eh 69h 73h 74h 72h 61h 74h 6Fh ] 192.168.100.4: [ 72h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 42h] = message_tag[ 8b] 192.168.100.4: [ 0h] = reserved1[24b] 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = remote_console_random_number[16B] 192.168.100.4: [ AFh 2Ah 4Fh 60h 05h A1h D7h 59h ] 192.168.100.4: [ E9h 45h 42h 12h 93h 4Ch B0h 9Bh ] 192.168.100.4: [ 4h] = requested_maximum_privilege_level[ 4b] 192.168.100.4: [ 1h] = name_only_lookup[ 1b] 192.168.100.4: [ 0h] = reserved2[ 3b] 192.168.100.4: [ 0h] = reserved3[16b] 192.168.100.4: [ Dh] = user_name_length[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = user_name[13B] 192.168.100.4: [ 41h 64h 6Dh 69h 6Eh 69h 73h 74h ] 192.168.100.4: [ 72h 61h 74h 6Fh 72h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 2 Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 13h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 3Ch] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[60B] 192.168.100.4: [ 42h 00h 00h 00h 86h 37h 19h 9Dh ] 192.168.100.4: [ 8Bh 83h A0h 13h 79h CAh 1Bh 14h ] 192.168.100.4: [ AEh 6Ch 03h 78h 03h 56h 37h B3h ] 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ] 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ] 192.168.100.4: [ E7h 3Ah BFh 62h B2h C8h 19h 00h ] 192.168.100.4: [ 8Ah 75h B0h 8Ch B9h 45h 43h 97h ] 192.168.100.4: [ 9Eh 0Eh 7Dh E8h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 42h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 0h] = reserved1[16b] 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_random_number[16B] 192.168.100.4: [ 8Bh 83h A0h 13h 79h CAh 1Bh 14h ] 192.168.100.4: [ AEh 6Ch 03h 78h 03h 56h 37h B3h ] 192.168.100.4: [ BYTE ARRAY ... ] = managed_system_guid[16B] 192.168.100.4: [ 33h 39h 31h 38h 33h 35h 55h 53h ] 192.168.100.4: [ 45h 38h 33h 30h 4Eh 42h 53h 41h ] 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B] 192.168.100.4: [ E7h 3Ah BFh 62h B2h C8h 19h 00h ] 192.168.100.4: [ 8Ah 75h B0h 8Ch B9h 45h 43h 97h ] 192.168.100.4: [ 9Eh 0Eh 7Dh E8h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 3 Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 14h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 1Ch] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[28B] 192.168.100.4: [ 43h 00h 00h 00h 30h CBh 8Fh 00h ] 192.168.100.4: [ 52h 48h 3Dh E2h 43h 66h 89h 13h ] 192.168.100.4: [ 8Dh DAh 6Dh 7Bh 05h A4h 07h 95h ] 192.168.100.4: [ 10h 56h C1h C5h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 43h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 0h] = reserved1[16b] 192.168.100.4: [ 8FCB30h] = managed_system_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = key_exchange_authentication_code[20B] 192.168.100.4: [ 52h 48h 3Dh E2h 43h 66h 89h 13h ] 192.168.100.4: [ 8Dh DAh 6Dh 7Bh 05h A4h 07h 95h ] 192.168.100.4: [ 10h 56h C1h C5h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 RAKP Message 4 Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 15h] = payload_type[ 6b] 192.168.100.4: [ 0h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 0h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 0h] = session_id[32b] 192.168.100.4: [ 0h] = session_sequence_number[32b] 192.168.100.4: [ 14h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[20B] 192.168.100.4: [ 43h 00h 00h 00h 86h 37h 19h 9Dh ] 192.168.100.4: [ FDh E1h 87h DBh C0h 62h DDh EFh ] 192.168.100.4: [ 9Dh 8Eh 1Fh B2h ] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 43h] = message_tag[ 8b] 192.168.100.4: [ 0h] = rmcpplus_status_code[ 8b] 192.168.100.4: [ 0h] = reserved1[16b] 192.168.100.4: [ 9D193786h] = remote_console_session_id[32b] 192.168.100.4: [ BYTE ARRAY ... ] = integrity_check_value[12B] 192.168.100.4: [ FDh E1h 87h DBh C0h 62h DDh EFh ] 192.168.100.4: [ 9Dh 8Eh 1Fh B2h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Set Session Privilege Level Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 1h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 99h 4Fh F4h FAh 6Dh 16h 62h A1h ] 192.168.100.4: [ F4h 08h 26h 9Fh 5Fh 75h FAh 65h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 8B] 192.168.100.4: [ 20h 18h C8h 81h 50h 3Bh 04h F0h ] 192.168.100.4: [ 707060504030201h] = confidentiality_trailer[64b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 6h] = net_fn[ 6b] 192.168.100.4: [ C8h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 14h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3Bh] = cmd[ 8b] 192.168.100.4: [ 4h] = privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ F0h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 5Ah E5h 89h 54h D4h 6Dh 5Dh CFh ] 192.168.100.4: [ 96h BFh 26h 5Eh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Set Session Privilege Level Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 1h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 36h 33h 63h 81h 76h 64h 4Fh 8Dh ] 192.168.100.4: [ 05h B2h 2Dh 8Eh CAh 51h FEh B7h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[ 9B] 192.168.100.4: [ 81h 1Ch 63h 20h 50h 3Bh 00h 04h ] 192.168.100.4: [ 51h ] 192.168.100.4: [ 6060504030201h] = confidentiality_trailer[56b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 7h] = net_fn[ 6b] 192.168.100.4: [ 63h] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 14h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3Bh] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 4h] = privilege_level[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 51h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 7Dh 11h 90h 3Dh 56h 85h AAh 01h ] 192.168.100.4: [ 92h 85h 82h D0h ] Entering section `Chassis_Boot_Flags' Parsed `Chassis_Boot_Flags:Boot_Flags_Persistent=No' Parsed `Chassis_Boot_Flags:Boot_Device=PXE' Leaving section `Chassis_Boot_Flags' 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 2h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ C9h DCh 18h 01h 19h 9Ch E3h 51h ] 192.168.100.4: [ F6h 99h D9h 05h BAh DBh 7Ah 28h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 54h 09h 05h 00h ] 192.168.100.4: [ 00h 1Dh ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 15h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 1Dh] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 70h DBh 06h 8Eh 78h B9h AFh 79h ] 192.168.100.4: [ 47h 85h 33h 53h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 2h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 4Ah E9h A7h 64h E1h 51h 1Fh 7Fh ] 192.168.100.4: [ 6Bh 8Bh EAh 40h 51h C3h EAh 40h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 54h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 7Dh ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 15h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 7Dh ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ E1h 0Dh 18h 7Eh 88h 79h 08h 02h ] 192.168.100.4: [ 24h 43h BBh C6h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 3h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ DAh B6h 64h BEh 23h 09h 1Fh 91h ] 192.168.100.4: [ 04h 43h C1h BEh 6Dh 8Bh 35h BBh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 58h 09h 05h 00h ] 192.168.100.4: [ 00h 19h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 16h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 19h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ F8h 9Dh F6h 07h C5h C2h E2h 85h ] 192.168.100.4: [ 3Fh A7h C9h 76h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 3h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ EBh D1h 33h 06h 26h DCh 85h 69h ] 192.168.100.4: [ CFh 9Bh CBh 2Dh 02h D1h 4Dh 6Eh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 58h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 79h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 16h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 79h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 9Fh 6Ah DDh 94h AEh 7Eh 72h D3h ] 192.168.100.4: [ 38h 28h CFh D0h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 4h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 28h 1Fh E6h CBh FFh CDh 2Bh A0h ] 192.168.100.4: [ 10h 99h 49h 90h 41h 8Bh 97h 4Ch ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 5Ch 09h 05h 00h ] 192.168.100.4: [ 00h 15h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 17h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 15h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ CFh BCh 82h AFh 56h 04h 6Ah AEh ] 192.168.100.4: [ 4Fh 79h 8Eh 77h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 4h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ BBh AAh EDh CAh 07h A5h 98h 72h ] 192.168.100.4: [ 4Ch 20h 25h 64h 83h 11h 29h 66h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 5Ch 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 75h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 17h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 75h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 26h F0h 2Ch E7h 2Bh D0h 70h 78h ] 192.168.100.4: [ A6h A0h 83h EAh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 5h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ F9h 71h D8h 59h 45h 6Dh BDh 3Eh ] 192.168.100.4: [ 10h AFh ECh 49h 5Fh 8Ch EFh E1h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 60h 09h 05h 00h ] 192.168.100.4: [ 00h 11h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 18h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 11h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 74h 4Dh 9Ch F0h A8h F9h 2Ah F5h ] 192.168.100.4: [ F1h 31h A1h C4h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 5h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 14h 33h B2h 00h 25h 69h 77h 7Dh ] 192.168.100.4: [ D2h C8h 32h E4h 7Bh DAh 7Ch AFh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 60h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 71h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 18h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 71h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ B2h 27h C7h F6h 17h 7Eh 28h 89h ] 192.168.100.4: [ 29h CFh 28h 06h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 6h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ E3h DAh 92h 30h 1Fh 54h 94h B4h ] 192.168.100.4: [ 53h 33h 6Dh 0Fh 1Ah 9Dh C7h 81h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 64h 09h 05h 00h ] 192.168.100.4: [ 00h 0Dh ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 19h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ Dh] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 1Fh 26h D6h 3Dh 28h 4Bh 16h 62h ] 192.168.100.4: [ 16h 8Fh C7h 69h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 6h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ F1h C9h 24h EBh 08h 99h 51h B0h ] 192.168.100.4: [ 4Bh 5Fh 73h FDh 57h 39h FCh F2h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 64h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 6Dh ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 19h] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 6Dh ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ C9h 34h 24h 5Eh FAh 76h CFh 21h ] 192.168.100.4: [ 1Dh 75h AFh 2Ah ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 7h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ CFh 8Ah 43h FFh E7h 3Fh DCh 41h ] 192.168.100.4: [ 95h D3h 2Ah BAh 4Ah D6h 8Eh 50h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 68h 09h 05h 00h ] 192.168.100.4: [ 00h 09h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1Ah] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 9h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 95h 09h A6h 35h F4h 70h 4Ch 6Eh ] 192.168.100.4: [ D9h 44h CDh 42h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 7h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 13h FDh FAh C7h 39h 9Ch F5h 4Ch ] 192.168.100.4: [ FFh 19h B1h 3Eh 7Ch 17h B8h 8Bh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 68h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 69h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 1Ah] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 69h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 8Fh FEh 66h BDh BCh A0h 93h C2h ] 192.168.100.4: [ 14h B4h E7h 27h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 8h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 9Ch 5Ch 64h B7h 1Dh FFh 66h 60h ] 192.168.100.4: [ 59h B7h 21h F4h 4Eh B4h 88h D3h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 6Ch 09h 05h 00h ] 192.168.100.4: [ 00h 05h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1Bh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 5h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 86h 31h 9Eh 69h AAh 76h 5Ah 01h ] 192.168.100.4: [ 23h 81h 8Eh A8h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 8h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 11h 4Dh 75h 57h 45h 9Bh 3Bh B3h ] 192.168.100.4: [ 65h 43h BBh F0h 44h EFh 00h A7h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 6Ch 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 65h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 1Bh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 65h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 7Fh CAh C7h CCh 9Ah BAh 98h DEh ] 192.168.100.4: [ 9Eh 6Fh A5h 47h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ 9h] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 38h 61h CBh 24h DAh 79h 27h 71h ] 192.168.100.4: [ 6Bh DCh DDh E4h 38h D8h 29h D5h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 70h 09h 05h 00h ] 192.168.100.4: [ 00h 01h ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1Ch] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 1h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 26h B0h D3h 68h 6Bh FBh C5h 2Fh ] 192.168.100.4: [ 04h 15h F1h EBh ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Response 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 9D193786h] = session_id[32b] 192.168.100.4: [ 9h] = session_sequence_number[32b] 192.168.100.4: [ 30h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 5Eh C0h 0Fh 9Dh 28h 22h 87h E1h ] 192.168.100.4: [ DBh 35h DAh B8h 9Eh EAh CEh 89h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[27B] 192.168.100.4: [ 81h 04h 7Bh 20h 70h 09h 00h 01h ] 192.168.100.4: [ 05h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 61h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1h] = net_fn[ 6b] 192.168.100.4: [ 7Bh] = checksum1[ 8b] 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 1Ch] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 0h] = comp_code[ 8b] 192.168.100.4: [ 1h] = parameter_version[ 4b] 192.168.100.4: [ 0h] = reserved[ 4b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = parameter_valid[ 1b] 192.168.100.4: [ 0h] = reserved1[ 5b] 192.168.100.4: [ 0h] = bios_boot_type[ 1b] 192.168.100.4: [ 0h] = boot_flags_persistent[ 1b] 192.168.100.4: [ 0h] = boot_flags_valid[ 1b] 192.168.100.4: [ 0h] = lock_out_reset_button[ 1b] 192.168.100.4: [ 0h] = screen_blank[ 1b] 192.168.100.4: [ 0h] = boot_device[ 4b] 192.168.100.4: [ 0h] = lock_keyboard[ 1b] 192.168.100.4: [ 0h] = cmos_clear[ 1b] 192.168.100.4: [ 0h] = console_redirection[ 2b] 192.168.100.4: [ 0h] = lock_out_sleep_button[ 1b] 192.168.100.4: [ 0h] = user_password_bypass[ 1b] 192.168.100.4: [ 0h] = force_progress_event_traps[ 1b] 192.168.100.4: [ 0h] = firmware_bios_verbosity[ 2b] 192.168.100.4: [ 0h] = lock_out_via_power_button[ 1b] 192.168.100.4: [ 0h] = bios_mux_control_override[ 3b] 192.168.100.4: [ 0h] = bios_shared_mode_override[ 1b] 192.168.100.4: [ 0h] = reserved2[ 4b] 192.168.100.4: [ 0h] = device_instance_selector[ 5b] 192.168.100.4: [ 0h] = reserved3[ 3b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 0h] = checksum2[ 8b] 192.168.100.4: Payload Unexpected Data: 192.168.100.4: ------------------------ 192.168.100.4: [ BYTE ARRAY ... ] = unexpected_data[12B] 192.168.100.4: [ 00h 00h 00h 00h 00h 00h 00h 00h ] 192.168.100.4: [ 00h 00h 00h 61h ] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 2Fh 32h F3h 1Fh 07h B5h EDh ADh ] 192.168.100.4: [ C6h 65h 64h 02h ] 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Get System Boot Options Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ Ah] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ 2Eh 9Dh 2Ah 93h 97h A1h 0Dh 9Ch ] 192.168.100.4: [ 3Bh 84h 2Dh 13h 2Ah 01h AFh 26h ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[10B] 192.168.100.4: [ 20h 00h E0h 81h 74h 09h 05h 00h ] 192.168.100.4: [ 00h FDh ] 192.168.100.4: [ 50504030201h] = confidentiality_trailer[48b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 0h] = net_fn[ 6b] 192.168.100.4: [ E0h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1Dh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 9h] = cmd[ 8b] 192.168.100.4: [ 5h] = parameter_selector[ 7b] 192.168.100.4: [ 0h] = reserved[ 1b] 192.168.100.4: [ 0h] = set_selector[ 8b] 192.168.100.4: [ 0h] = block_selector[ 8b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ FDh] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 21h 49h 54h D6h 56h E6h E6h CAh ] 192.168.100.4: [ CFh 66h 8Eh E0h ] ipmi_cmd_get_system_boot_options_boot_flags: session timeout 192.168.100.4: ===================================================== 192.168.100.4: IPMI 2.0 Close Session Request 192.168.100.4: ===================================================== 192.168.100.4: RMCP Header: 192.168.100.4: ------------ 192.168.100.4: [ 6h] = version[ 8b] 192.168.100.4: [ 0h] = reserved[ 8b] 192.168.100.4: [ FFh] = sequence_number[ 8b] 192.168.100.4: [ 7h] = message_class.class[ 5b] 192.168.100.4: [ 0h] = message_class.reserved[ 2b] 192.168.100.4: [ 0h] = message_class.ack[ 1b] 192.168.100.4: IPMI RMCPPLUS Session Header: 192.168.100.4: ----------------------------- 192.168.100.4: [ 6h] = authentication_type[ 4b] 192.168.100.4: [ 0h] = reserved1[ 4b] 192.168.100.4: [ 0h] = payload_type[ 6b] 192.168.100.4: [ 1h] = payload_type.authenticated[ 1b] 192.168.100.4: [ 1h] = payload_type.encrypted[ 1b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: [ Bh] = session_sequence_number[32b] 192.168.100.4: [ 20h] = ipmi_payload_len[16b] 192.168.100.4: IPMI RMCPPLUS Payload: 192.168.100.4: ---------------------- 192.168.100.4: [ BYTE ARRAY ... ] = confidentiality_header[16B] 192.168.100.4: [ CCh 86h 8Ah 4Ah 12h 6Eh 85h 05h ] 192.168.100.4: [ 09h 61h F4h DBh 00h 9Eh 0Fh 8Eh ] 192.168.100.4: [ BYTE ARRAY ... ] = payload_data[11B] 192.168.100.4: [ 20h 18h C8h 81h 78h 3Ch 30h CBh ] 192.168.100.4: [ 8Fh 00h 41h ] 192.168.100.4: [ 404030201h] = confidentiality_trailer[40b] 192.168.100.4: IPMI Message Header: 192.168.100.4: -------------------- 192.168.100.4: [ 20h] = rs_addr[ 8b] 192.168.100.4: [ 0h] = rs_lun[ 2b] 192.168.100.4: [ 6h] = net_fn[ 6b] 192.168.100.4: [ C8h] = checksum1[ 8b] 192.168.100.4: [ 81h] = rq_addr[ 8b] 192.168.100.4: [ 0h] = rq_lun[ 2b] 192.168.100.4: [ 1Eh] = rq_seq[ 6b] 192.168.100.4: IPMI Command Data: 192.168.100.4: ------------------ 192.168.100.4: [ 3Ch] = cmd[ 8b] 192.168.100.4: [ 8FCB30h] = session_id[32b] 192.168.100.4: IPMI Trailer: 192.168.100.4: ------------- 192.168.100.4: [ 41h] = checksum2[ 8b] 192.168.100.4: IPMI RMCPPLUS Session Trailer: 192.168.100.4: ------------------------------ 192.168.100.4: [ FFFFh] = integrity_pad[16b] 192.168.100.4: [ 2h] = pad_length[ 8b] 192.168.100.4: [ 7h] = next_header[ 8b] 192.168.100.4: [ BYTE ARRAY ... ] = authentication_code[12B] 192.168.100.4: [ 12h DBh 89h E8h 84h 77h F3h 26h ] 192.168.100.4: [ BCh 25h 4Bh 55h ]
Optional Paste Settings
Category:
None
Cryptocurrency
Cybersecurity
Fixit
Food
Gaming
Haiku
Help
History
Housing
Jokes
Legal
Money
Movies
Music
Pets
Photo
Science
Software
Source Code
Spirit
Sports
Travel
TV
Writing
Tags:
Syntax Highlighting:
None
Bash
C
C#
C++
CSS
HTML
JSON
Java
JavaScript
Lua
Markdown (PRO members only)
Objective C
PHP
Perl
Python
Ruby
Swift
4CS
6502 ACME Cross Assembler
6502 Kick Assembler
6502 TASM/64TASS
ABAP
AIMMS
ALGOL 68
APT Sources
ARM
ASM (NASM)
ASP
ActionScript
ActionScript 3
Ada
Apache Log
AppleScript
Arduino
Asymptote
AutoIt
Autohotkey
Avisynth
Awk
BASCOM AVR
BNF
BOO
Bash
Basic4GL
Batch
BibTeX
Blitz Basic
Blitz3D
BlitzMax
BrainFuck
C
C (WinAPI)
C Intermediate Language
C for Macs
C#
C++
C++ (WinAPI)
C++ (with Qt extensions)
C: Loadrunner
CAD DCL
CAD Lisp
CFDG
CMake
COBOL
CSS
Ceylon
ChaiScript
Chapel
Clojure
Clone C
Clone C++
CoffeeScript
ColdFusion
Cuesheet
D
DCL
DCPU-16
DCS
DIV
DOT
Dart
Delphi
Delphi Prism (Oxygene)
Diff
E
ECMAScript
EPC
Easytrieve
Eiffel
Email
Erlang
Euphoria
F#
FO Language
Falcon
Filemaker
Formula One
Fortran
FreeBasic
FreeSWITCH
GAMBAS
GDB
GDScript
Game Maker
Genero
Genie
GetText
Go
Godot GLSL
Groovy
GwBasic
HQ9 Plus
HTML
HTML 5
Haskell
Haxe
HicEst
IDL
INI file
INTERCAL
IO
ISPF Panel Definition
Icon
Inno Script
J
JCL
JSON
Java
Java 5
JavaScript
Julia
KSP (Kontakt Script)
KiXtart
Kotlin
LDIF
LLVM
LOL Code
LScript
Latex
Liberty BASIC
Linden Scripting
Lisp
Loco Basic
Logtalk
Lotus Formulas
Lotus Script
Lua
M68000 Assembler
MIX Assembler
MK-61/52
MPASM
MXML
MagikSF
Make
MapBasic
Markdown (PRO members only)
MatLab
Mercury
MetaPost
Modula 2
Modula 3
Motorola 68000 HiSoft Dev
MySQL
Nagios
NetRexx
Nginx
Nim
NullSoft Installer
OCaml
OCaml Brief
Oberon 2
Objeck Programming Langua
Objective C
Octave
Open Object Rexx
OpenBSD PACKET FILTER
OpenGL Shading
Openoffice BASIC
Oracle 11
Oracle 8
Oz
PARI/GP
PCRE
PHP
PHP Brief
PL/I
PL/SQL
POV-Ray
ParaSail
Pascal
Pawn
Per
Perl
Perl 6
Phix
Pic 16
Pike
Pixel Bender
PostScript
PostgreSQL
PowerBuilder
PowerShell
ProFTPd
Progress
Prolog
Properties
ProvideX
Puppet
PureBasic
PyCon
Python
Python for S60
QBasic
QML
R
RBScript
REBOL
REG
RPM Spec
Racket
Rails
Rexx
Robots
Roff Manpage
Ruby
Ruby Gnuplot
Rust
SAS
SCL
SPARK
SPARQL
SQF
SQL
SSH Config
Scala
Scheme
Scilab
SdlBasic
Smalltalk
Smarty
StandardML
StoneScript
SuperCollider
Swift
SystemVerilog
T-SQL
TCL
TeXgraph
Tera Term
TypeScript
TypoScript
UPC
Unicon
UnrealScript
Urbi
VB.NET
VBScript
VHDL
VIM
Vala
Vedit
VeriLog
Visual Pro Log
VisualBasic
VisualFoxPro
WHOIS
WhiteSpace
Winbatch
XBasic
XML
XPP
Xojo
Xorg Config
YAML
YARA
Z80 Assembler
ZXBasic
autoconf
jQuery
mIRC
newLISP
q/kdb+
thinBasic
Paste Expiration:
Never
Burn after read
10 Minutes
1 Hour
1 Day
1 Week
2 Weeks
1 Month
6 Months
1 Year
Paste Exposure:
Public
Unlisted
Private
Folder:
(members only)
Password
NEW
Enabled
Disabled
Burn after read
NEW
Paste Name / Title:
Create New Paste
Hello
Guest
Sign Up
or
Login
Sign in with Facebook
Sign in with Twitter
Sign in with Google
You are currently not logged in, this means you can not edit or delete anything you paste.
Sign Up
or
Login
Public Pastes
Insane Crypto Profits
34 sec ago | 0.10 KB
Untitled
Python | 1 hour ago | 0.13 KB
Decentralized Moneys
2 hours ago | 0.42 KB
120 million in 5 years
3 hours ago | 0.12 KB
December smells like money
3 hours ago | 0.07 KB
Crypto Liquidity Pools
3 hours ago | 0.47 KB
Trustless Finance
3 hours ago | 0.51 KB
The Lunar Kitsune - Yohana Tsukiko
4 hours ago | 21.38 KB
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the
Cookies Policy
.
OK, I Understand
Not a member of Pastebin yet?
Sign Up
, it unlocks many cool features!