This is the command ipmitool that can be run in the OnWorks free hosting provider using one of our multiple free online workstations such as Ubuntu Online, Fedora Online, Windows online emulator or MAC OS online emulator
PROGRAM:
NAME
ipmitool - utility for controlling IPMI-enabled devices
SYNOPSIS
ipmitool [ <options> ] <command> [ <sub-commands and sub-options> ]
<options> := [ <general-options> | <conditional-opts> ]
Any recognized option is accepted. Conditional options may be ignored or it's usage
postponed until shell or exec processes relevant command.
<general-options> := [ -h | -V | -v | -I <interface> | -H <address> |
-d <N> | -p <port> | -c | -U <username> |
-L <privlvl> | -l <lun> | -m <local_address> |
-N <sec> | -R <count> | <password-option> |
<oem-option> | <bridge-options> ]
<conditional-opts> := [ <lan-options> | <lanplus-options> |
<command-options> ]
Bridging:
<bridge-options> := -t <target_address> [ -b <channel> |
[ -T <address> | -B <channel> ] ]
Options used with -I lan:
<lan-options> := [ -A <authtype> ]
Options used with -I lanplus:
<lanplus-options> := [ -C <ciphersuite> | <key-option> ]
Option groups setting same value:
<key-option> := [ -k <key> | -K | -y <hex_key> | -Y ]
<password-option> := [ -f <password_file> | -a | -P <password> | -E ]
<oem-option> := [ -o <oemtype> | -g | -s ]
Options used with specific command <command-options>:
<options-sdr> := [ -S <sdr_cache_file> ]
<options-sel> := [ -O <sel_oem> ]
<options-sol> := [ -e <sol_escape_char> ]
DESCRIPTION
This program lets you manage Intelligent Platform Management Interface (IPMI) functions of
either the local system, via a kernel device driver, or a remote system, using IPMI v1.5
and IPMI v2.0. These functions include printing FRU information, LAN configuration, sensor
readings, and remote chassis power control.
IPMI management of a local system interface requires a compatible IPMI kernel driver to be
installed and configured. On Linux this driver is called OpenIPMI and it is included in
standard distributions. On Solaris this driver is called BMC and is included in Solaris
10. Management of a remote station requires the IPMI-over-LAN interface to be enabled and
configured. Depending on the particular requirements of each system it may be possible to
enable the LAN interface using ipmitool over the system interface.
OPTIONS
-a Prompt for the remote server password.
-A <authtype>
Specify an authentication type to use during IPMIv1.5 lan session activation.
Supported types are NONE, PASSWORD, MD2, MD5, or OEM.
-b <channel>
Set destination channel for bridged request.
-B <channel>
Set transit channel for bridged request (dual bridge).
-b <channel>
Set destination channel for bridged request.
-B <channel>
Set transit channel for bridged request. (dual bridge)
-c Present output in CSV (comma separated variable) format. This is not available
with all commands.
-C <ciphersuite>
The remote server authentication, integrity, and encryption algorithms to use for
IPMIv2.0 lanplus connections. See table 22-19 in the IPMIv2.0 specification. The
default is 3 which specifies RAKP-HMAC-SHA1 authentication, HMAC-SHA1-96 integrity,
and AES-CBC-128 encryption algorithms.
-d N Use device number N to specify the /dev/ipmiN (or /dev/ipmi/N or /dev/ipmidev/N)
device to use for in-band BMC communication. Used to target a specific BMC on a
multi-node, multi-BMC system through the ipmi device driver interface. Default is
0.
-e <sol_escape_char>
Use supplied character for SOL session escape character. The default is to use ~
but this can conflict with ssh sessions.
-E The remote server password is specified by the environment variable IPMI_PASSWORD
or IPMITOOL_PASSWORD. The IPMITOOL_PASSWORD takes precedence.
-f <password_file>
Specifies a file containing the remote server password. If this option is absent,
or if password_file is empty, the password will default to NULL.
-g Deprecated. Use: -o intelplus
-h Get basic usage help from the command line.
-H <address>
Remote server address, can be IP address or hostname. This option is required for
lan and lanplus interfaces.
-I <interface>
Selects IPMI interface to use. Supported interfaces that are compiled in are
visible in the usage help output.
-k <key>
Use supplied Kg key for IPMIv2.0 authentication. The default is not to use any Kg
key.
-K Read Kg key from IPMI_KGKEY environment variable.
-l <lun>
Set destination lun for raw commands.
-L <privlvl>
Force session privilege level. Can be CALLBACK, USER, OPERATOR, ADMINISTRATOR.
Default is ADMINISTRATOR. This value is ignored and always set to ADMINISTRATOR
when combined with -t target address.
-m <local_address>
Set the local IPMB address. The local address defaults to 0x20 or is auto
discovered on PICMG platforms when -m is not specified. There should be no need to
change the local address for normal operation.
-N <sec>
Specify nr. of seconds between retransmissions of lan/lanplus messages. Defaults
are 2 seconds for lan and 1 second for lanplus interfaces. Command raw uses fixed
value of 15 seconds. Command sol uses fixed value of 1 second.
-o <oemtype>
Select OEM type to support. This usually involves minor hacks in place in the code
to work around quirks in various BMCs from various manufacturers. Use -o list to
see a list of current supported OEM types.
-O <sel oem>
Open selected file and read OEM SEL event descriptions to be used during SEL
listings. See examples in contrib dir for file format.
-p <port>
Remote server UDP port to connect to. Default is 623.
-P <password>
Remote server password is specified on the command line. If supported it will be
obscured in the process list. Note! Specifying the password as a command line
option is not recommended.
-R <count>
Set the number of retries for lan/lanplus interface (default=4). Command raw uses
fixed value of one try (no retries). Command hpm uses fixed value of 10 retries.
-s Deprecated. Use: -o supermicro
-S <sdr_cache_file>
Use local file for remote SDR cache. Using a local SDR cache can drastically
increase performance for commands that require knowledge of the entire SDR to
perform their function. Local SDR cache from a remote system can be created with
the sdr dump command.
-t <target_address>
Bridge IPMI requests to the remote target address. Default is 32. The -L privlvl
option is always ignored and value set to ADMINISTRATOR.
-T <address>
Set transit address for bridge request (dual bridge).
-T <transmit_address>
Set transit address for bridge request. (dual bridge)
-U <username>
Remote server username, default is NULL user.
-v Increase verbose output level. This option may be specified multiple times to
increase the level of debug output. If given three times you will get hexdumps of
all incoming and outgoing packets. Using it five times provides details on request
and expected reply procesing. The hpm commands targetcap compprop abort upgstatus
rollback rollbackstatus selftestresult increases the verbosity level
-V Display version information.
-y <hex key>
Use supplied Kg key for IPMIv2.0 authentication. The key is expected in hexadecimal
format and can be used to specify keys with non-printable characters. E.g. '-k
PASSWORD' and '-y 50415353574F5244' are equivalent. The default is not to use any
Kg key.
-Y Prompt for the Kg key for IPMIv2.0 authentication.
-z <size>
Change Size of Communication Channel. (OEM)
If no password method is specified then ipmitool will prompt the user for a password. If
no password is entered at the prompt, the remote server password will default to NULL.
SECURITY
There are several security issues be be considered before enabling the IPMI LAN interface.
A remote station has the ability to control a system's power state as well as being able
to gather certain platform information. To reduce vulnerability it is strongly advised
that the IPMI LAN interface only be enabled in 'trusted' environments where system
security is not an issue or where there is a dedicated secure 'management network'.
Further it is strongly advised that you should not enable IPMI for remote access without
setting a password, and that that password should not be the same as any other password on
that system.
When an IPMI password is changed on a remote machine with the IPMIv1.5 lan interface the
new password is sent across the network as clear text. This could be observed and then
used to attack the remote system. It is thus recommended that IPMI password management
only be done over IPMIv2.0 lanplus interface or the system interface on the local station.
For IPMI v1.5, the maximum password length is 16 characters. Passwords longer than 16
characters will be truncated.
For IPMI v2.0, the maximum password length is 20 characters; longer passwords are
truncated.
COMMANDS
help This can be used to get command-line help on ipmitool commands. It may also be
placed at the end of commands to get option usage help.
ipmitool help
Commands:
bmc Deprecated. Use mc
channel Configure Management Controller channels
chassis Get chassis status and set power state
dcmi Data Center Management Interface
delloem Manage Dell OEM Extensions.
echo Used to echo lines to stdout in scripts
ekanalyzer run FRU-Ekeying analyzer using FRU files
event Send events to MC
exec Run list of commands from file
firewall Configure Firmware Firewall
fru Print built-in FRU and scan for FRU locators
fwum Update IPMC using Kontron OEM Firmware Update Manager
gendev Read/Write Device associated with Generic Device locators sdr
hpm Update HPM components using PICMG HPM.1 file
i2c Send an I2C Master Write-Read command and print response
ime Upgrade/Query Intel ME firmware
isol Configure and connect Intel IPMIv1.5 Serial-over-LAN
kontronoem Manage Kontron OEM Extensions
lan Configure LAN Channels
mc Management Controller status and global enables
nm Node Manager
pef Configure Platform Event Filtering (PEF)
picmg Run a PICMG/ATA extended command
power Shortcut to chassis power commands
raw Send a RAW IPMI request and print response
sdr Print Sensor Data Repository entries and readings
sel Print System Event Log (SEL)
sensor Print detailed sensor information
session Print session information
set Set runtime variable for shell and exec
shell Launch interactive IPMI shell
sol Configure and connect IPMIv2.0 Serial-over-LAN
spd Print SPD info from remote I2C device
sunoem Manage Sun OEM Extensions
tsol Configure and connect Tyan IPMIv1.5 Serial-over-LAN
user Configure Management Controller users
channel
authcap <channel number> <max priv>
Displays information about the authentication capabilities of the selected
channel at the specified privilege level.
Possible privilege levels are:
1 Callback level
2 User level
3 Operator level
4 Administrator level
5 OEM Proprietary level
15 No access
info [channel number]
Displays information about the selected channel. If no channel is given
it will display information about the currently used channel.
> ipmitool channel info
Channel 0xf info:
Channel Medium Type : System Interface
Channel Protocol Type : KCS
Session Support : session-less
Active Session Count : 0
Protocol Vendor ID : 7154
getaccess <channel number> [<userid>]
Configure the given userid as the default on the given channel number. When
the given channel is subsequently used, the user is identified implicitly by
the given userid.
setaccess <channel number> <userid> [<callin=on|off>]
[<ipmi=on|off>] [<link=on|off>] [<privilege=level>]
Configure user access information on the given channel for the given
userid.
getciphers <ipmi|sol> [<channel>]
Displays the list of cipher suites supported for the given
application (ipmi or sol) on the given channel.
chassis
status
Status information related to power, buttons, cooling, drives and faults.
power
status
on
off
cycle
reset
diag
soft
identify [<seconds>|force]
Identify interval.
Default is 15 seconds.
0 - Off
force - To turn on indefinitely
policy
What to do when power is restored.
list
Show available options.
always-on
previous
always-off
restart_cause
Last restart cause.
poh
Get power on hours.
bootdev
none
Do not change boot device order.
pxe
Force PXE boot.
disk
Force boot from default Hard-drive.
safe
Force boot from default Hard-drive, request Safe Mode.
diag
Force boot from Diagnostic Partition.
cdrom
Force boot from CD/DVD.
bios
Force boot into BIOS Setup.
floppy
Force boot from Floppy/primary removable media.
bootparam
force_pxe
Force PXE boot
force_disk
Force boot from default Hard-drive
force_safe
Force boot from default Hard-drive, request Safe Mode
force_diag
Force boot from Diagnostic Partition
force_cdrom
Force boot from CD/DVD
force_bios
Force boot into BIOS Setup
selftest
dcmi
discover
This command is used to discover supported capabilities in DCMI.
power <command>
Platform power limit command options are:
reading
Get power related readings from the system.
get_limit
Get the configured power limits.
set_limit <parameter> <value>
Set a power limit option.
Possible parameters/values are:
action <No Action | Hard Power Off & Log Event to SEL | Log Event to
SEL>
Exception Actions are taken as "No Action", "Hard Power Off
system and log events to SEL", or "Log event to SEL only".
limit <number in Watts>
Power Limit Requested in Watts.
correction <number in milliseconds>
Correction Time Limit in milliseconds.
sample <number in seconds>
Statistics Sampling period in seconds.
activate
Activate the set power limit.
deactivate
Deactivate the set power limit.
sensors
Prints the available DCMI sensors.
asset_tag
Prints the platforms asset tag.
set_asset_tag <string>
Sets the platforms asset tag
get_mc_id_string
Get management controller identifier string.
set_mc_id_string <string>
Set management controller identifier string. The maximum length is 64 bytes
including a null terminator.
thermalpolicy [<get | set>]
Thermal Limit policy get/set.
The commands are:
Get <entityID> <instanceID>
Get Thermal Limit values.
entityID is the physical entity that a sensor or device is associated
with. instanceID is a particular instance of an entity. Entity
Instance can be in one of two ranges, system-relative or device-
relative. For example, a system with four processors could use an
Entity Instance value of "0" to identify the first processor.
Set <entityID> <instanceID>
Set Thermal Limit values.
entityID is the physical entity that a sensor or device is associated
with. instanceID is a particular instance of an entity. Entity
Instance can be in one of two ranges, system-relative or device-
relative. For example, a system with four processors could use an
Entity Instance value of "0" to identify the first processor.
get_temp_reading
Get Temperature Sensor Readings.
get_conf_param
Get DCMI Configuration Parameters.
set_conf_param <parameters>
Set DCMI Configuration Parameters.
The Configuration Parameters are:
activate_dhcp
Activate/restart DHCP
dhcp_config
Discover DHCP Configuration.
init
Set DHCP Initial timeout interval, in seconds. The recommended
default is four seconds.
timeout
Set DHCP Server contact timeout interval, in seconds. The
recommended default timeout is two minutes.
retry
Set DHCP Server contact retry interval, in seconds. The recommended
default timeout is sixty-four seconds.
oob_discover
Ping/Pong Message for DCMI Discovery.
delloem
The delloem commands provide information on Dell-specific features.
setled {b:d.f} {state..}
Sets the drive backplane LEDs for a device.
{b:d.f} = PCI Address of device (eg. 06:00.0)
{state} = one or more of the following:
online | present | hotspare | identify | rebuilding | fault | predict
| critical | failed
lcd
set {mode}|{lcdqualifier}|{errordisplay}
Allows you to set the LCD mode and user-defined string.
lcd set mode
{none}|{modelname}|{ipv4address}|{macaddress}|
{systemname}|{servicetag}|{ipv6address}|
{ambienttemp}|{systemwatt}|{assettag}|
{userdefined}<text>
Allows you to set the LCD display mode to any of the preceding
parameters.
lcd set lcdqualifier
{watt}|{btuphr}|
{celsius}|{fahrenheit}
Allows you to set the unit for the system ambient temperature mode.
lcd set errordisplay
{sel}|{simple}
Allows you to set the error display.
lcd info
Displays the LCD screen information.
lcd set vkvm
{active}|{inactive}
Allows you to set the vKVM status to active or inactive. When it is
active and session is in progress, a message appears on LCD.
lcd status
Displays the LCD status for vKVM display active or inactive and Front
Panel access mode (viewandmodify, view-only or disabled).
mac
Displays the information about the system NICs.
mac list
Displays the NIC MAC address and status of all NICs. It also displays
the DRAC/iDRAC MAC address.
mac get
<NIC number>
Displays the selected NICs MAC address and status.
lan
Displays the information of Lan.
lan set
<Mode>
Sets the NIC selection mode (dedicated, shared with lom1, shared with
lom2,shared with lom3,shared with lom4,shared with failover
lom1,shared with failover lom2,shared with failover lom3,shared with
failover lom4,shared with Failover all loms, shared with Failover
None).
lan get
Returns the current NIC selection mode (dedicated, shared with lom1,
shared with lom2, shared with lom3, shared with lom4,shared with
failover lom1, shared with failover lom2,shared with failover
lom3,shared with failover lom4,shared with Failover all loms,shared
with Failover None).
lan get active
Returns the current active NIC (dedicated, LOM1, LOM2, LOM3 or LOM4).
powermonitor
Displays power tracking statistics.
powermonitor clear cumulativepower
Reset cumulative power reading.
powermonitor clear peakpower
Reset peak power reading.
powermonitor powerconsumption
<watt>|<btuphr>
Displays the power consumption in watt or btuphr.
powermonitor powerconsumptionhistory
<watt>|<btuphr>
Displays the power consumption history in watt or btuphr.
powermonitor getpowerbudget
<watt>|<btuphr>
Displays the power cap in watt or btuphr.
powermonitor setpowerbudget
<val><watt|btuphr|percent>
Allows you to set the power cap in watt, BTU/hr or percentage.
powermonitor enablepowercap
Enables set power cap.
powermonitor disablepowercap
Disables set power cap.
vFlash info Card
Shows Extended SD Card information.
echo
For echoing lines to stdout in scripts.
ekanalyzer <command> <xx=filename1> <xx=filename2> [<rc=filename3>] ...
NOTE : This command can support a maximum of 8 files per command line
filename1 : binary file that stores FRU data of a Carrier or an AMC module
filename2 : binary file that stores FRU data of an AMC module.
These binary files can be generated from command:
ipmitool fru read <id> <filename>
filename3 : configuration file used for configuring On-Carrier Device ID
or OEM GUID. This file is optional.
xx : indicates the type of the file. It can take the following value:
oc : On-Carrier device
a1 : AMC slot A1
a2 : AMC slot A2
a3 : AMC slot A3
a4 : AMC slot A4
b1 : AMC slot B1
b2 : AMC slot B2
b3 : AMC slot B3
b4 : AMC slot B4
sm : Shelf Manager
The available commands for ekanalyzer are:
print [<carrier | power | all>]
carrier (default) <oc=filename1> <oc=filename2> ...
Display point to point physical connectivity between carriers and AMC
modules.
Example:
> ipmitool ekanalyzer print carrier oc=fru oc=carrierfru
From Carrier file: fru
Number of AMC bays supported by Carrier: 2
AMC slot B1 topology:
Port 0 =====> On Carrier Device ID 0, Port 16
Port 1 =====> On Carrier Device ID 0, Port 12
Port 2 =====> AMC slot B2, Port 2
AMC slot B2 topology:
Port 0 =====> On Carrier Device ID 0, Port 3
Port 2 =====> AMC slot B1, Port 2
*-*-*-* *-*-* *-*-* *-*-* *-*-* *-*-* *-*-*
From Carrier file: carrierfru
On Carrier Device ID 0 topology:
Port 0 =====> AMC slot B1, Port 4
Port 1 =====> AMC slot B1, Port 5
Port 2 =====> AMC slot B2, Port 6
Port 3 =====> AMC slot B2, Port 7
AMC slot B1 topology:
Port 0 =====> AMC slot B2, Port 0
AMC slot B1 topology:
Port 1 =====> AMC slot B2, Port 1
Number of AMC bays supported by Carrier: 2
power <xx=filename1> <xx=filename2> ...
Display power supply information between carrier and AMC modules.
all <xx=filename> <xx=filename> ...
Display both physical connectivity and power supply of each carrier
and AMC modules.
frushow <xx=filename>
Convert a binary FRU file into human readable text format. Use -v option to
get more display information.
summary [<match | unmatch | all>]
match (default) <xx=filename> <xx=filename> ...
Display only matched results of Ekeying match between an On-Carrier
device and an AMC module or between 2 AMC modules. Example:
> ipmitool ekanalyzer summary match oc=fru b1=amcB1 a2=amcA2
On-Carrier Device vs AMC slot B1
AMC slot B1 port 0 ==> On-Carrier Device 0 port 16
Matching Result
- From On-Carrier Device ID 0
-Channel ID 11 || Lane 0: enable
-Link Type: AMC.2 Ethernet
-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
-Link Group ID: 0 || Link Asym. Match: exact match
- To AMC slot B1
-Channel ID 0 || Lane 0: enable
-Link Type: AMC.2 Ethernet
-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
-Link Group ID: 0 || Link Asym. Match: exact match
*-*-*-* *-*-* *-*-* *-*-* *-*-* *-*-* *-*-*
AMC slot B1 port 1 ==> On-Carrier Device 0 port 12
Matching Result
- From On-Carrier Device ID 0
-Channel ID 6 || Lane 0: enable
-Link Type: AMC.2 Ethernet
-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
-Link Group ID: 0 || Link Asym. Match: exact match
- To AMC slot B1
-Channel ID 1 || Lane 0: enable
-Link Type: AMC.2 Ethernet
-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
-Link Group ID: 0 || Link Asym. Match: exact match
*-*-*-* *-*-* *-*-* *-*-* *-*-* *-*-* *-*-*
On-Carrier Device vs AMC slot A2
AMC slot A2 port 0 ==> On-Carrier Device 0 port 3
Matching Result
- From On-Carrier Device ID 0
-Channel ID 9 || Lane 0: enable
-Link Type: AMC.2 Ethernet
-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
-Link Group ID: 0 || Link Asym. Match: exact match
- To AMC slot A2
-Channel ID 0 || Lane 0: enable
-Link Type: AMC.2 Ethernet
-Link Type extension: 1000BASE-BX (SerDES Gigabit) Ethernet link
-Link Group ID: 0 || Link Asym. Match: exact match
*-*-*-* *-*-* *-*-* *-*-* *-*-* *-*-* *-*-*
AMC slot B1 vs AMC slot A2
AMC slot A2 port 2 ==> AMC slot B1 port 2
Matching Result
- From AMC slot B1
-Channel ID 2 || Lane 0: enable
-Link Type: AMC.3 Storage
-Link Type extension: Serial Attached SCSI (SAS/SATA)
-Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact
match}
- To AMC slot A2
-Channel ID 2 || Lane 0: enable
-Link Type: AMC.3 Storage
-Link Type extension: Serial Attached SCSI (SAS/SATA)
-Link Group ID: 0 || Link Asym. Match: FC or SAS interface {exact
match}
*-*-*-* *-*-* *-*-* *-*-* *-*-* *-*-* *-*-*
unmatch <xx=filename> <xx=filename> ...
Display the unmatched results of Ekeying match between an On-Carrier
device and an AMC module or between 2 AMC modules
all <xx=filename> <xx=filename> ...
Display both matched result and unmatched results of Ekeying match
between two cards or two modules.
event
<predefined event number N>
Send a pre-defined test event to the System Event Log. The following events
are included as a means to test the functionality of the System Event Log
component of the BMC (an entry will be added each time the event N command
is executed).
Currently supported values for N are:
1 Temperature: Upper Critical: Going High
2 Voltage Threshold: Lower Critical: Going Low
3 Memory: Correctable ECC
NOTE: These pre-defined events will likely not produce "accurate" SEL
records for a particular system because they will not be correctly tied to a
valid sensor number, but they are sufficient to verify correct operation of
the SEL.
file <filename>
Event log records specified in <filename> will be added to the System Event
Log.
The format of each line in the file is as follows:
<{EvM Revision} {Sensor Type} {Sensor Num} {Event Dir/Type} {Event Data 0}
{Event Data 1} {Event Data 2}>[# COMMENT]
e.g.: 0x4 0x2 0x60 0x1 0x52 0x0 0x0 # Voltage threshold: Lower Critical:
Going Low
EvM Revision - The "Event Message Revision" is 0x04 for messages that comply
with the IPMI 2.0 Specification and 0x03 for messages that comply with the
IPMI 1.0 Specification.
Sensor Type - Indicates the Event Type or Class.
Sensor Num - Represents the 'sensor' within the management controller that
generated the Event Message.
Event Dir/Type - This field is encoded with the event direction as the high
bit (bit 7) and the event type as the low 7 bits. Event direction is 0 for
an assertion event and 1 for a deassertion event.
See the IPMI 2.0 specification for further details on the definitions for
each field.
<sensorid> <list>
Get a list of all the possible Sensor States and pre-defined Sensor State
Shortcuts available for a particular sensor. sensorid is the character
string representation of the sensor and must be enclosed in double quotes if
it includes white space. Several different commands including ipmitool
sensor list may be used to obtain a list that includes the sensorid strings
representing the sensors on a given system.
> ipmitool -I open event "PS 2T Fan Fault" list
Finding sensor PS 2T Fan Fault... ok
Sensor States:
State Deasserted
State Asserted
Sensor State Shortcuts:
present absent
assert deassert
limit nolimit
fail nofail
yes no
on off
up down
<sensorid> <sensor state> [<direction>]
Generate a custom event based on existing sensor information. The optional
event direction can be either assert (the default) or deassert.
> ipmitool event "PS 2T Fan Fault" "State Asserted"
Finding sensor PS 2T Fan Fault... ok
0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Asserted
> ipmitool event "PS 2T Fan Fault" "State Deasserted"
Finding sensor PS 2T Fan Fault... ok
0 | Pre-Init Time-stamp | Fan PS 2T Fan Fault | State Desserted
exec <filename>
Execute ipmitool commands from filename. Each line is a complete command. The
syntax of the commands are defined by the COMMANDS section in this manpage. Each
line may have an optional comment at the end of the line, delimited with a `#'
symbol.
e.g., a command file with two lines:
sdr list # get a list of sdr records
sel list # get a list of sel records
firewall
This command supports the Firmware Firewall capability. It may be used to add or
remove security-based restrictions on certain commands/command sub-functions or to
list the current firmware firewall restrictions set on any commands. For each
firmware firewall command listed below, parameters may be included to cause the
command to be executed with increasing granularity on a specific LUN, for a
specific NetFn, for a specific IPMI Command, and finally for a specific command's
sub-function (see Appendix H in the IPMI 2.0 Specification for a listing of any
sub-function numbers that may be associated with a particular command).
Parameter syntax and dependencies are as follows:
[<channel H>] [<lun L> [ <netfn N> [<command C [<subfn S>]]]]
Note that if "netfn <N>" is specified, then "lun <L>" must also be specified; if
"command <C>" is specified, then "netfn <N>" (and therefore "lun <L>") must also be
specified, and so forth.
"channel <H>" is an optional and standalone parameter. If not specified, the
requested operation will be performed on the current channel. Note that command
support may vary from channel to channel.
Firmware firewall commands:
info [<Parms as described above>]
List firmware firewall information for the specified LUN, NetFn, and Command
(if supplied) on the current or specified channel. Listed information
includes the support, configurable, and enabled bits for the specified
command or commands.
Some usage examples:
info [<channel H>] [<lun L>]
This command will list firmware firewall information for all NetFns
for the specified LUN on either the current or the specified channel.
info [<channel H>] [<lun L> [ <netfn N> ]
This command will print out all command information for a single
LUN/NetFn pair.
info [<channel H>] [<lun L> [ <netfn N> [<command C] ]]
This prints out detailed, human-readable information showing the
support, configurable, and enabled bits for the specified command on
the specified LUN/NetFn pair. Information will be printed about each
of the command subfunctions.
info [<channel H>] [<lun L> [ <netfn N> [<command C [<subfn S>]]]]
Print out information for a specific sub-function.
enable [<Parms as described above>]
This command is used to enable commands for a given NetFn/LUN combination on
the specified channel.
disable [<Parms as described above>] [force]
This command is used to disable commands for a given NetFn/LUN combination
on the specified channel. Great care should be taken if using the "force"
option so as not to disable the "Set Command Enables" command.
reset [<Parms as described above>]
This command may be used to reset the firmware firewall back to a state
where all commands and command sub-functions are enabled.
fru
Read all Field Replaceable Unit (FRU) inventory data and extract such
information as serial number, part number, asset tags, and short strings
describing the chassis, board, or product.
read <fru id> <fru file>
fru id is the digit ID of the FRU (see output of 'fru print'). fru file is
the absolute pathname of a file in which to dump the binary FRU data
pertaining to the specified FRU entity.
write <fru id> <fru file>
fru id is the digit ID of the FRU (see output of 'fru print'). fru file is
the absolute pathname of a file from which to pull the binary FRU data
before uploading it to the specified FRU.
upgEkey <fru id> <fru file>
Update a multirecord FRU location. fru id is the digit ID of the FRU (see
output of 'fru print'). fru file is the absolute pathname of a file from
which to pull the binary FRU data to upload into the specified multirecord
FRU entity.
edit <fru id>
This command provides interactive editing of some supported records, namely
PICMG Carrier Activation Record. fru id is the digit ID of the FRU (see
output of 'fru print'); default is 0.
edit <fru id> field <section> <index> <string>
This command may be used to set a field string to a new value. It replaces
the FRU data found at index in the specified section with the supplied
string.
fru id is the digit ID of the FRU (see output of 'fru print').
<section> is a string which refers to FRU Inventory Information
Storage Areas and may be refer to:
c FRU Inventory Chassis Info Area
b FRU Inventory Board Info Area
p FRU Inventory Product Info Area
<index> specifies the field number. Field numbering starts on the first
'english text' field type. For instance in the <board> info area field '0'
is <Board Manufacturer> and field '2' is <Board Serial Number>; see IPMI
Platform Management FRU Information Storage Definition v1.0 R1.1 for field
locations.
<string> must be the same length as the string being replaced and must be
8-bit ASCII (0xCx).
edit <fru id> oem iana <record> <format> [<args>]
This command edits the data found in the multirecord area. Support for OEM
specific records is limited.
fwum
Update IPMC using Kontron OEM Firmware Update Manager.
info
Show information about current firmware.
status
Show status of each firmware bank present in the hardware.
download <filename>
Download specified firmware.
upgrade [filename]
Install firmware upgrade. If the filename is specified, the file is
downloaded first, otherwise the last firmware downloaded is used.
rollback
Ask IPMC to rollback to previous version.
tracelog
Show firmware upgrade log.
gendev
list
List All Generic Device Locators.
read <sdr name> <file>
Read to file eeprom specify by Generic Device Locators.
write <sdr name> <file>
Write from file eeprom specify by Generic Device Locators
hpm
PICMG HPM.1 Upgrade Agent
check
Check the target information.
check <filename>
Display both the existing target version and image version on the screen.
download <filename>
Download specified firmware.
upgrade <filename> [all] [component <x>] [activate]
Upgrade the firmware using a valid HPM.1 image file. If no option is
specified, the firmware versions are checked first and the firmware is
upgraded only if they are different.
all
Upgrade all components even if the firmware versions are the same
(use this only after using "check" command).
component <x>
Upgrade only given component from the given file.
component 0 - BOOT
component 1 - RTK
activate
Activate new firmware right away.
activate
Activate the newly uploaded firmware.
targetcap
Get the target upgrade capabilities.
compprop <id> <select>
Get the specified component properties. Valid component id: 0-7. Select can
be one of following:
0 - General properties
1 - Current firmware version
2 - Description string
3 - Rollback firmware version
4 - Deferred firmware version
abort
Abort the on-going firmware upgrade.
upgstatus
Show status of the last long duration command.
rollback
Perform manual rollback on the IPM Controller firmware.
rollbackstatus
Show the rollback status.
selftestresult
Query the self test results.
i2c <i2caddr> <read bytes> [<write data>]
This command may be used to execute raw I2C commands with the Master Write-Read
IPMI command.
ime
help
Print usage information
info
Displays information about the Manageability Engine (ME)
update <file>
Upgrade the ME firmware with the specified image file
WARNING You MUST use a supported image provided by your board vendor
rollback
Perform manual rollback of the ME firmware
isol
info
Retrieve information about the Intel IPMI v1.5 Serial-Over-LAN
configuration.
set <parameter> <value>
Configure parameters for Intel IPMI v1.5 Serial-over-LAN.
Valid parameters and values are:
enabled
true, false.
privilege-level
user, operator, admin, oem.
bit-rate
9.6, 19.2, 38.4, 57.6, 115.2.
activate
Causes ipmitool to enter Intel IPMI v1.5 Serial Over LAN mode. An RMCP+
connection is made to the BMC, the terminal is set to raw mode, and user
input is sent to the serial console on the remote server. On exit, the SOL
payload mode is deactivated and the terminal is reset to its original
settings.
Special escape sequences are provided to control the SOL session:
~. Terminate connection
~^Z Suspend ipmitool
~^X Suspend ipmitool, but don't restore tty on restart
~B Send break
~~ Send the escape character by typing it twice
~? Print the supported escape sequences
Note that escapes are only recognized immediately after newline.
kontronoem
OEM commands specific to Kontron devices.
setsn
Set FRU serial number.
setmfgdate
Set FRU manufacturing date.
nextboot <boot device>
Select the next boot order on the Kontron CP6012.
lan
These commands will allow you to configure IPMI LAN channels with network
information so they can be used with the ipmitool lan and lanplus interfaces.
NOTE: To determine on which channel the LAN interface is located, issue the
`channel info number' command until you come across a valid 802.3 LAN channel. For
example:
> ipmitool -I open channel info 1
Channel 0x1 info:
Channel Medium Type : 802.3 LAN
Channel Protocol Type : IPMB-1.0
Session Support : session-based
Active Session Count : 8
Protocol Vendor ID : 7154
print [<channel>]
Print the current configuration for the given channel. The default
will print information on the first found LAN channel.
set <channel number> <command> <parameter>
Set the given command and parameter on the specified channel. Valid
command/parameter options are:
ipaddr <x.x.x.x>
Set the IP address for this channel.
netmask <x.x.x.x>
Set the netmask for this channel.
macaddr <xx:xx:xx:xx:xx:xx>
Set the MAC address for this channel.
defgw ipaddr <x.x.x.x>
Set the default gateway IP address.
defgw macaddr <xx:xx:xx:xx:xx:xx>
Set the default gateway MAC address.
bakgw ipaddr <x.x.x.x>
Set the backup gateway IP address.
bakgw macaddr <xx:xx:xx:xx:xx:xx>
Set the backup gateway MAC address.
password <pass>
Set the null user password.
snmp <community string>
Set the SNMP community string.
user
Enable user access mode for userid 1 (issue the `user' command to
display information about userids for a given channel).
access <on|off>
Set LAN channel access mode.
alert <on|off>
Enable or disable PEF alerting for this channel.
ipsrc <source>
Set the IP address source:
none unspecified
static manually configured static IP address
dhcp address obtained by BMC running DHCP
bios address loaded by BIOS or system software
arp respond <on|off>
Set BMC generated ARP responses.
arp generate <on|off>
Set BMC generated gratuitous ARPs.
arp interval <seconds>
Set BMC generated gratuitous ARP interval.
vlan id <off|id>
Disable VLAN operation or enable VLAN and set the ID.
ID: value of the virtual lan identifier between 1 and 4094 inclusive.
vlan priority <priority>
Set the priority associated with VLAN frames.
ID: priority of the virtual lan frames between 0 and 7 inclusive.
auth <level,...> <type,...>
Set the valid authtypes for a given auth level.
Levels: callback, user, operator, admin
Types: none, md2, md5, password, oem
cipher_privs <privlist>
Correlates cipher suite numbers with the maximum privilege level that
is allowed to use it. In this way, cipher suites can restricted to
users with a given privilege level, so that, for example,
administrators are required to use a stronger cipher suite than
normal users.
The format of privlist is as follows. Each character represents a
privilege level and the character position identifies the cipher
suite number. For example, the first character represents cipher
suite 0, the second represents cipher suite 1, and so on. privlist
must be 15 characters in length.
Characters used in privlist and their associated privilege levels
are:
X Cipher Suite Unused
c CALLBACK
u USER
o OPERATOR
a ADMIN
O OEM
So, to set the maximum privilege for cipher suite 0 to USER and suite
1 to ADMIN, issue the following command:
> ipmitool -I interface lan set channel cipher_privs uaXXXXXXXXXXXXX
bad_pass_thresh <thresh_num> <1|0> <reset_interval> <lockout_interval>
Sets the Bad Password Threshold.
<thresh_num> If non-zero, this value determines the number of
sequential bad passwords that will be allowed to be entered for the
identified user before the user is automatically disabled from access
on the channel.
<1|0> 1 = generate a Session Audit sensor "Invalid password disable"
event message. 0 = do not generate an event message when the user is
disabled.
<reset_interval> Attempt Count Reset Interval. The interval, in tens
of seconds, for which the accumulated count of bad password attempts
is retained before being automatically reset to zero.
<lockout_interval> User Lockout Interval. The interval, in tens of
seconds, that the user will remain disabled after being disabled
because the Bad Password Threshold number was reached.
alert print [<channel>] [<alert destination>]
Print alert information for the specified channel and destination. The
default will print all alerts for all alert destinations on the first found
LAN channel.
alert set <channel number> <alert destination> <command> <parameter>
Set an alert on the given LAN channel and destination. Alert Destinations
are listed via the 'lan alert print' command. Valid command/parameter
options are:
ipaddr <x.x.x.x>
Set alert IP address.
macaddr <xx:xx:xx:xx:xx:xx>
Set alert MAC address.
gateway <default | backup>
Set the channel gateway to use for alerts.
ack <on | off>
Set Alert Acknowledge on or off.
type <pet | oem1 | oem2>
Set the destination type as PET or OEM.
time <seconds>
Set ack timeout or unack retry interval.
retry <number>
Set the number of alert retries.
stats get [<channel number>]
Retrieve information about the IP connections on the specified channel. The
default will retrieve statistics on the first found LAN channel.
stats clear [<channel number>]
Clear all IP/UDP/RMCP Statistics to 0 on the specified channel. The default
will clear statistics on the first found LAN channel.
mc | bmc
reset <warm|cold>
Instructs the BMC to perform a warm or cold reset.
guid
Display the Management Controller Globally Unique IDentifier.
info
Displays information about the BMC hardware, including device revision,
firmware revision, IPMI version supported, manufacturer ID, and information
on additional device support.
watchdog
These commands allow a user to view and change the current state of the
watchdog timer.
get
Show current Watchdog Timer settings and countdown state.
reset
Reset the Watchdog Timer to its most recent state and restart the
countdown timer.
off
Turn off a currently running Watchdog countdown timer.
selftest
Check on the basic health of the BMC by executing the Get Self Test results
command and report the results.
getenables
Displays a list of the currently enabled options for the BMC.
setenables <option>=[on|off]
Enables or disables the given option. This command is only supported over
the system interface according to the IPMI specification. Currently
supported values for option include:
recv_msg_intr
Receive Message Queue Interrupt
event_msg_intr
Event Message Buffer Full Interrupt
event_msg
Event Message Buffer
system_event_log
System Event Logging
oem0
OEM-Defined option #0
oem1
OEM-Defined option #1
oem2
OEM-Defined option #2
getsysinfo <argument>
Retrieves system info from bmc for given argument.
See setsysinfo for argument definitions
setsysinfo <argument> <string>
Stores system info string to bmc for given argument
Possible arguments are:
primary_os_name Primary Operating System Name
os_name Operating System Name
system_name System Name of Server
delloem_os_version Running version of operating system
delloem_URL URL of BMC Webserver
chassis
status
Displays information regarding the high-level status of the system
chassis and main power subsystem.
poh
This command will return the Power-On Hours counter.
identify <interval>
Control the front panel identify light. Default interval is 15
seconds. Use 0 to turn off. Use "force" to turn on indefinitely.
restart_cause
Query the chassis for the cause of the last system restart.
selftest
Check on the basic health of the BMC by executing the Get Self Test
results command and report the results.
policy
Set the chassis power policy in the event power failure.
list
Return supported policies.
always-on
Turn on when power is restored.
previous
Returned to previous state when power is restored.
always-off
Stay off after power is restored.
power
Performs a chassis control command to view and change the power
state.
status
Show current chassis power status.
on
Power up chassis.
off
Power down chassis into soft off (S4/S5 state). WARNING: This
command does not initiate a clean shutdown of the operating
system prior to powering down the system.
cycle
Provides a power off interval of at least 1 second. No action
should occur if chassis power is in S4/S5 state, but it is
recommended to check power state first and only issue a power
cycle command if the system power is on or in lower sleep
state than S4/S5.
reset
This command will perform a hard reset.
diag
Pulse a diagnostic interrupt (NMI) directly to the
processor(s).
soft
Initiate a soft-shutdown of OS via ACPI. This can be done in
a number of ways, commonly by simulating an overtemperture or
by simulating a power button press. It is necessary for there
to be Operating System support for ACPI and some sort of
daemon watching for events for this soft power to work.
bootdev <device> [<clear-cmos=yes|no>] [<options=help,...>]
Request the system to boot from an alternate boot device on next
reboot. The clear-cmos option, if supplied, will instruct the BIOS
to clear its CMOS on the next reboot. Various options may be used to
modify the boot device settings. Run "bootdev none options=help" for
a list of available boot device modifiers/options.
Currently supported values for <device> are:
none
Do not change boot device
pxe
Force PXE boot
disk
Force boot from BIOS default boot device
safe
Force boot from BIOS default boot device, request Safe Mode
diag
Force boot from diagnostic partition
cdrom
Force boot from CD/DVD
bios
Force boot into BIOS setup
floppy
Force boot from Floppy/primary removable media
bootparam
Get or set various system boot option parameters.
get <param #>
Get boot parameter. Currently supported values for <param #>
are:
0 - Set In Progress
1 - Service Partition Selector
2 - Service Partition Scan
3 - BMC Boot Flag Valid Bit Clearing
4 - Boot Info Acknowledge
5 - Boot Flags
6 - Boot Initiator Info
7 - Boot Initiator Mailbox
set <device> [<options=help,...>]
Set boot device parameter used for next boot. Various options
may be used to change when the the next boot device is
cleared. Run "options=help" for a list of available bootparam
set device options.
Currently supported bootparam device settings are:
force_pxe
Force PXE boot
force_disk
Force boot from default hard-drive
force_safe
Force boot from default hard-drive, request Safe Mode
force_diag
Force boot from diagnostic partition
force_cdrom
Force boot from CD/DVD
force_bios
Force boot into BIOS setup
Currently supported bootparam options settings are associated
with BMC Boot Valid Bit Clearing and are as follows: Any
option can be prefixed with "no-" to invert the sense of the
operation.
PEF
Clear valid bit on reset/power cycle caused by PEF
timeout
Automatically clear boot flag valid bit if Chassis
Control command is not received within 60 seconds.
watchdog
Clear valid bit on reset/power cycle caused by watchdog
timeout
reset
Clear valid bit on push button reset / soft-reset
power
Clear valid bit on power up via power push button or
wake event
nm
alert
clear dest <dest>
Clear the Node Manager Alert lan destination.
get
Get the Node Manager Alert settings.
set chan <chan> dest <dest> string <string>
Set the Node Manager alert channel, lan destination, and alert string
number.
capability
Obtain the Node Manager power control capabilities and ranges.
control
enable|disable
global
Enable/disable all policies for all domains.
per_domain <platform|CPU|Memory>
Enable/disable all policies of the specified domain.
per_policy <0-7>
Enable/disable the policy for the specified domain/policy
combination.
discover
Discover Node Manager presence as well as the Node Manager version,
revision, and patch number.
policy
add
power <watts> policy_id <0-7> [correction auto|soft|hard] trig_lim
<seconds> stats <seconds> [domain <platform|CPU|Memory>]
enable|disable
Add a new power policy, or overwrite an existing policy. The
correction parameter is the agressiveness of frequency
limiting, default is auto. The trig_lim is the correction
time limit and must be at least 6000 and not greater than
65535. The stats setting is the averaging period in seconds
and ranges from 1-65535. If domain is not supplied a default
of platform is used.
inlet <temp> policy_id <0-7> [correction auto|soft|hard] trig_lim
<seconds> stats <seconds> [domain <platform|CPU|Memory>]
enable|disable
Add a new inlet temp policy, or overwrite an existing policy.
The correction parameter is the agressiveness of frequency
limiting, default is auto. The trig_lim is the correction
time limit and must be at least 6000 and not greater than
65535. The stats setting is the averaging period in seconds
and ranges from 1-65535. If domain is not supplied a default
of platform is used.
get policy_id <0-7>
Get a previously stored policy.
limiting
Report policy number if any policy is limiting power.
remove policy_id <0-7> [domain <platform|CPU|Memory>]
Remove a policy. If domain is not supplied a default of platform is
used.
power min <minimum> max <maximum> [domain <platform|CPU|Memory>]
Configure Node Manager power minimum and maximum power draw limits. The min
and max values must be in the range of 0-65535. If domain is not supplied a
default of platform is used.
reset
comm policy_id <0-7> [domain <platform|CPU|Memory>]
Reset Node Manager communication statistics. If domain is not
supplied a default of platform is used.
global
Reset Node Manager global statistics.
memory policy_id <0-7> [domain <platform|CPU|Memory>]
Reset Node Manager memory throttling statistics. If domain is not
supplied a default of platform is used.
per_policy policy_id <0-7> [domain <platform|CPU|Memory>]
Reset Node Manager per policy statistics. If domain is not supplied
a default of platform is used.
requests policy_id <0-7> [domain <platform|CPU|Memory>]
Reset Node Manager unhandled requests statistics. If domain is not
supplied a default of platform is used.
response policy_id <0-7> [domain <platform|CPU|Memory>]
Reset Node Manager response time statistics. If domain is not
supplied a default of platform is used.
throttling policy_id <0-7> [domain <platform|CPU|Memory>]
Reset Node Manager throttling statistics. If domain is not supplied
a default of platform is used.
statistics
comm_fail
Report Node Manager communication failure statistics.
cpu_throttling
Report Node Manager cpu throttling statistics.
mem_throttling
Report Node Manager memory throttling statistics.
policy_power policy_id <0-7> [domain <platform|CPU|Memory>]
Report Node Manager per policy power statistics (policy must be a
power limit type policy). If domain is not supplied a default of
platform is used.
policy_temps policy_id <0-7> [domain <platform|CPU|Memory>]
Report Node Manager per policy temp statistics (policy must be an
inlet temp limit policy). If domain is not supplied a default of
platform is used.
policy_throt policy_id <0-7> [domain <platform|CPU|Memory>]
Report Node Manager per policy throttling statistics. If domain is
not supplied a default of platform is used.
requests
Report Node Manager unhandled requests statistics.
response
Report Node Manager response time statistics.
suspend
get policy_id <0-7> [domain <platform|CPU|Memory>]
Get Node Manager policy suspend periods. If domain is not supplied a
default of platform is used.
set policy_id <0-7> [domain <platform|CPU|Memory>] <start> <stop> <repeat>
Set Node Manager policy suspend periods. If domain is not supplied a
default of platform is used. The <start> and <stop> values must be
in the range of 0-239, which is the number of minutes past midnight
divided by 6. The <repeat> value is the daily recurrence pattern.
Bit 0 is repeat every Monday, bit 1 is repeat every Tuesday, on
through bit 6 for Sunday.
threshold
get policy_id <0-7> [domain <platform|CPU|Memory>]
Get Node Manager policy Alert Threshold settings. If domain is not
supplied a default of platform is used.
set policy_id <0-7> [domain <platform|CPU|Memory>] thresh_array
Set Node Manager policy Alert Threshold values. If domain is not
supplied a default of platform is used. The thresh_array is 1, 2, or
3 integers that set three alert threshold settings. The setting type
is a power or temperature value which must match the type of policy.
pef
info
This command will query the BMC and print information about the PEF
supported features.
status
This command prints the current PEF status (the last SEL entry processed by
the BMC, etc).
policy
This command lists the PEF policy table entries. Each policy entry
describes an alert destination. A policy set is a collection of table
entries. PEF alert actions reference policy sets.
list
This command lists the PEF table entries. Each PEF entry relates a sensor
event to an action. When PEF is active, each platform event causes the BMC
to scan this table for entries matching the event, and possible actions to
be taken. Actions are performed in priority order (higher criticality
first).
picmg <properties>
Run a PICMG/ATA extended command. Get PICMG properties may be used to obtain and
print Extension major version information, PICMG identifier, FRU Device ID and Max
FRU Device ID.
addrinfo
Get address information. This command may return information on the
Hardware address, IPMB-0 Address, FRU ID, Site/Entity ID, and Site/Entity
Type.
frucontrol <fru id> <options>
Set various control options:
0x00 - Cold Reset
0x01 - Warm Reset
0x02 - Graceful Reboot
0x03 - Issue Diagnostic Interrupt
0x04 - Quiesce [AMC only]
0x05-0xFF - Cold Reset
activate <fru id>
Activate the specified FRU.
deactivate <fru id>
Deactivate the specified FRU.
policy get <fru id>
Get FRU activation policy.
policy set <fru id> <lockmask> <lock>
Set FRU activation policy. lockmask is 1 or 0 to indicate action on the
deactivation or activation locked bit respectively. lock is 1 or 0 to
set/clear locked bit.
portstate set|getall|getgranted|getdenied <parameters>
Get or set various port states. See usage for parameter details.
power <chassis power command>
Shortcut to the chassis power commands. See the chassis power commands for usage
information.
raw <netfn> <cmd> [<data>]
This will allow you to execute raw IPMI commands. For example to query the POH
counter with a raw command:
> ipmitool -v raw 0x0 0xf
RAW REQ (netfn=0x0 cmd=0xf data_len=0)
RAW RSP (5 bytes)
3c 72 0c 00 00
Note that the OpenIPMI driver provided by the Linux kernel will reject the Get
Message, Send Message and Read Event Message Buffer commands because it handles the
message sequencing internally.
sdr
get <id> ... [<id>]
Prints information for sensor data records specified by sensor id.
info
This command will query the BMC for Sensor Data Record (SDR) Repository
information.
type [<sensor type>]
This command will display all records from the SDR Repository of a specific
type. Run with type list (or simply with no type) to see the list of
available types. For example to query for all Temperature sensors:
> ipmitool sdr type Temperature
Baseboard Temp | 30h | ok | 7.1 | 28 degrees C
FntPnl Amb Temp | 32h | ok | 12.1 | 24 degrees C
Processor1 Temp | 98h | ok | 3.1 | 57 degrees C
Processor2 Temp | 99h | ok | 3.2 | 53 degrees C
list | elist [<all|full|compact|event|mcloc|fru|generic>]
This command will read the Sensor Data Records (SDR) and extract sensor
information of a given type, then query each sensor and print its name,
reading, and status. If invoked as elist then it will also print sensor
number, entity id and instance, and asserted discrete states.
The default output will only display full and compact sensor types, to see
all sensors use the all type with this command.
Valid types are:
all
All SDR records (Sensor and Locator)
full
Full Sensor Record
compact
Compact Sensor Record
event
Event-Only Sensor Record
mcloc
Management Controller Locator Record
fru
FRU Locator Record
generic
Generic SDR records
entity <id>[.<instance>]
Displays all sensors associated with an entity. Get a list of valid entity
ids on the target system by issuing the sdr elist command. A list of all
entity ids can be found in the IPMI specifications.
dump <file>
Dumps raw SDR data to a file. This data file can then be used as a local
SDR cache of the remote managed system with the -S <file> option on the
ipmitool command line. This can greatly improve performance over system
interface or remote LAN.
fill sensors
Create the SDR Repository for the current configuration. Will perform a
'Clear SDR Repository' command so be careful.
fill file <filename>
Fill the SDR Repository using records stored in a binary data file. Will
perform a 'Clear SDR Repository' command so be careful.
sel
NOTE: System Event Log (SEL) entry-times are displayed as `Pre-Init Time-stamp' if
the SEL clock needs to be set. Ensure that the SEL clock is accurate by invoking
the sel time get and sel time set <time string> commands.
info
This command will query the BMC for information about the System Event Log
(SEL) and its contents.
clear
This command will clear the contents of the SEL. It cannot be undone so be
careful.
list | elist
When this command is invoked without arguments, the entire contents of the
System Event Log are displayed. If invoked as elist (extended list) it will
also use the Sensor Data Record entries to display the sensor ID for the
sensor that caused each event. Note this can take a long time over the
system interface.
<count> | first <count>
Displays the first count (least-recent) entries in the SEL. If count
is zero, all entries are displayed.
last <count>
Displays the last count (most-recent) entries in the SEL. If count
is zero, all entries are displayed.
delete <SEL Record ID> ... <SEL Record ID>
Delete one or more SEL event records.
add <filename ID>
Read event entries from a file and add them to the SEL. New SEL entries
area added onto the SEL after the last record in the SEL. Record added is
of type 2 and is automatically timestamped.
get <SEL Record ID>
Print information on the specified SEL Record entry.
save <file>
Save SEL records to a text file that can be fed back into the event file
ipmitool command. This can be useful for testing Event generation by
building an appropriate Platform Event Message file based on existing
events. Please see the available help for the 'event file ...' command for
a description of the format of this file.
writeraw <file>
Save SEL records to a file in raw, binary format. This file can be fed back
to the sel readraw ipmitool command for viewing.
readraw <file>
Read and display SEL records from a binary file. Such a file can be created
using the sel writeraw ipmitool command.
time
get
Displays the SEL clock's current time.
set <time string>
Sets the SEL clock. Future SEL entries will use the time set by this
command. <time string> is of the form "MM/DD/YYYY HH:MM:SS". Note
that hours are in 24-hour form. It is recommended that the SEL be
cleared before setting the time.
sensor
list
Lists sensors and thresholds in a wide table format.
get <id> ... [<id>]
Prints information for sensors specified by name.
thresh <id> <threshold> <setting>
This allows you to set a particular sensor threshold value. The sensor is
specified by name.
Valid thresholds are:
unr Upper Non-Recoverable
ucr Upper Critical
unc Upper Non-Critical
lnc Lower Non-Critical
lcr Lower Critical
lnr Lower Non-Recoverable
thresh <id> lower <lnr> <lcr> <lnc>
This allows you to set all lower thresholds for a sensor at the same time.
The sensor is specified by name and the thresholds are listed in order of
Lower Non-Recoverable, Lower Critical, and Lower Non-Critical.
thresh <id> upper <unc> <ucr> <unr>
This allows you to set all upper thresholds for a sensor at the same time.
The sensor is specified by name and the thresholds are listed in order of
Upper Non-Critical, Upper Critical, and Upper Non-Recoverable.
session
info <active|all|id 0xnnnnnnnn|handle 0xnn>
Get information about the specified session(s). You may identify sessions
by their id, by their handle number, by their active status, or by using the
keyword `all' to specify all sessions.
set
hostname <host>
Session hostname.
username <user>
Session username.
password <pass>
Session password.
privlvl <level>
Session privilege level force.
authtype <type>
Authentication type force.
localaddr <addr>
Local IPMB address.
targetaddr <addr>
Remote target IPMB address.
port <port>
Remote RMCP port.
csv [level]
Enable output in comma separated format. Affects following commands: user,
channel, isol, sunoem, sol, sensor, sdr, sel, session.
verbose [verbose]
Verbosity level.
shell
This command will launch an interactive shell which you can use to send multiple
ipmitool commands to a BMC and see the responses. This can be useful instead of
running the full ipmitool command each time. Some commands will make use of a
Sensor Data Record cache and you will see marked improvement in speed if these
commands are able to reuse the same cache in a shell session. LAN sessions will
send a periodic keepalive command to keep the IPMI session from timing out.
sol
info [<channel number>]
Retrieve information about the Serial-Over-LAN configuration on the
specified channel. If no channel is given, it will display SOL
configuration data for the currently used channel.
payload <enable | disable | status> <channel number> <userid>
Enable, disable or show status of SOL payload for the user on the specified
channel.
set <parameter> <value> [<channel>]
Configure parameters for Serial Over Lan. If no channel is given, it will
display SOL configuration data for the currently used channel.
Configuration parameter updates are automatically guarded with the updates
to the set-in-progress parameter.
Valid parameters and values are:
set-in-progress
set-complete set-in-progress commit-write
enabled
true false
force-encryption
true false
force-authentication
true false
privilege-level
user operator admin oem
character-accumulate-level
Decimal number given in 5 milliseconds increments
character-send-threshold
Decimal number
retry-count
Decimal number. 0 indicates no retries after packet is transmitted.
retry-interval
Decimal number in 10 millisecond increments. 0 indicates that
retries should be sent back to back.
non-volatile-bit-rate
serial, 19.2, 38.4, 57.6, 115.2. Setting this value to serial
indicates that the BMC should use the setting used by the IPMI over
serial channel.
volatile-bit-rate
serial, 19.2, 38.4, 57.6, 115.2. Setting this value to serial
indicates that the BMC should use the setting used by the IPMI over
serial channel.
activate [usesolkeepalive | nokeepalive] [instance=<number>]
Causes ipmitool to enter Serial Over LAN mode, and is only available when
using the lanplus interface. An RMCP+ connection is made to the BMC, the
terminal is set to raw mode, and user input is sent to the serial console on
the remote server. On exit, the the SOL payload mode is deactivated and the
terminal is reset to its original settings.
If the instance is given, it will activate using the given instance number.
The default is 1.
Special escape sequences are provided to control the SOL session:
~. Terminate connection
~^Z Suspend ipmitool
~^X Suspend ipmitool, but don't restore tty on restart
~B Send break
~~ Send the escape character by typing it twice
~? Print the supported escape sequences
Note that escapes are only recognized immediately after newline.
deactivate [instance=<number>]
Deactivates Serial Over LAN mode on the BMC. Exiting Serial Over LAN mode
should automatically cause this command to be sent to the BMC, but in the
case of an unintentional exit from SOL mode, this command may be necessary
to reset the state of the BMC.
If the instance is given, it will deactivate the given instance number. The
default is 1.
spd <i2cbus> <i2caddr> [<channel>] [<axread>]
This command may be used to read SPD (Serial Presence Detect) data using the I2C
Master Write-Read IPMI command.
sunoem
cli [<command string> ...]
Execute the service processor command line interface commands. Without any
command string, an interactive session is started in the service processor
command line environment. If a command string is specified, the command
string is executed on the service processor and the connection is closed.
led
These commands provide a way to get and set the status of LEDs on a Sun
Microsystems server. Use 'sdr list generic' to get a list of devices that
are controllable LEDs. The ledtype parameter is optional and not necessary
to provide on the command line unless it is required by hardware.
get <sensorid> [<ledtype>]
Get status of a particular LED described by a Generic Device Locator
record in the SDR. A sensorid of all will get the status of all
available LEDS.
set <sensorid> <ledmode> [<ledtype>]
Set status of a particular LED described by a Generic Device Locator
record in the SDR. A sensorid of all will set the status of all
available LEDS to the specified ledmode and ledtype.
LED Mode is required for set operations:
OFF Off
ON Steady On
STANDBY 100ms on 2900ms off blink rate
SLOW 1HZ blink rate
FAST 4HZ blink rate
LED Type is optional:
OK2RM Ok to Remove
SERVICE Service Required
ACT Activity
LOCATE Locate
nacname <ipmi name>
Return the full NAC name of a target identified by ipmi name.
ping <count> [<q>]
Send and receive count packets. Each packet is 64 bytes.
q - Quiet. Displays output only at the start and end of the process.
getval <property name>
Returns value of specified ILOM property.
setval <property name> <property value> [<timeout>]
Sets value of ILOM property. If timeout is not specified, the default value
is 5 seconds. NOTE: setval must be executed locally on host!
sshkey
set <userid> <keyfile>
This command will allow you to specify an SSH key to use for a
particular user on the Service Processor. This key will be used for
CLI logins to the SP and not for IPMI sessions. View available users
and their userids with the 'user list' command.
del <userid>
This command will delete the SSH key for a specified userid.
version
Display the version of ILOM firmware.
getfile <file identifier> <destination file name>
This command will return various files from service processor and store them
in specified destination file. Note that some files may not be present or be
supported by your SP.
File identifiers:
SSH_PUBKEYS
DIAG_PASSED
DIAG_FAILED
DIAG_END_TIME
DIAG_INVENTORY
DIAG_TEST_LOG
DIAG_START_TIME
DIAG_UEFI_LOG
DIAG_TEST_LOG
DIAG_LAST_LOG
DIAG_LAST_CMD
getbehavior <feature identifier>
This command will test if various ILOM features are enabled.
Feature identifiers:
SUPPORTS_SIGNED_PACKAGES
REQUIRES_SIGNED_PACKAGES
tsol
This command allows Serial-over-LAN sessions to be established with Tyan IPMIv1.5
SMDC such as the M3289 or M3290. The default command run with no arguments will
establish default SOL session back to local IP address. Optional arguments may be
supplied in any order.
<ipaddr>
Send receiver IP address to SMDC which it will use to send serial traffic
to. By default this detects the local IP address and establishes two-way
session. Format of ipaddr is XX.XX.XX.XX
port=NUM
Configure UDP port to receive serial traffic on. By default this is 6230.
ro|rw
Confiure SOL session as read-only or read-write. Sessions are read-write by
default.
user
summary
Displays a summary of userid information, including maximum number of
userids, the number of enabled users, and the number of fixed names defined.
list
Displays a list of user information for all defined userids.
set
name <userid> <username>
Sets the username associated with the given userid.
password <userid> [<password>]
Sets the password for the given userid. If no password is given, the
password is cleared (set to the NULL password). Be careful when
removing passwords from administrator-level accounts.
disable <userid>
Disables access to the BMC by the given userid.
enable <userid>
Enables access to the BMC by the given userid.
priv <userid> <privilege level> [<channel number>]
Set user privilege level on the specified channel. If the channel is not
specified, the current channel will be used.
test <userid> <16|20> [<password>]
Determine whether a password has been stored as 16 or 20 bytes.
OPEN INTERFACE
The ipmitool open interface utilizes the OpenIPMI kernel device driver. This driver is
present in all modern 2.4 and all 2.6 kernels and it should be present in recent Linux
distribution kernels. There are also IPMI driver kernel patches for different kernel
versions available from the OpenIPMI homepage.
The required kernel modules is different for 2.4 and 2.6 kernels. The following kernel
modules must be loaded on a 2.4-based kernel in order for ipmitool to work:
ipmi_msghandler
Incoming and outgoing message handler for IPMI interfaces.
ipmi_kcs_drv
An IPMI Keyboard Controller Style (KCS) interface driver for the message handler.
ipmi_devintf
Linux character device interface for the message handler.
The following kernel modules must be loaded on a 2.6-based kernel in order for ipmitool to
work:
ipmi_msghandler
Incoming and outgoing message handler for IPMI interfaces.
ipmi_si
An IPMI system interface driver for the message handler. This module supports
various IPMI system interfaces such as KCS, BT, SMIC, and even SMBus in 2.6
kernels.
ipmi_devintf
Linux character device interface for the message handler.
Once the required modules are loaded there will be a dynamic character device entry that
must exist at /dev/ipmi0. For systems that use devfs or udev this will appear at
/dev/ipmi/0.
To create the device node first determine what dynamic major number it was assigned by the
kernel by looking in /proc/devices and checking for the ipmidev entry. Usually if this is
the first dynamic device it will be major number 254 and the minor number for the first
system interface is 0 so you would create the device entry with:
mknod /dev/ipmi0 c 254 0
ipmitool includes some sample initialization scripts that can perform this task
automatically at start-up.
In order to have ipmitool use the OpenIPMI device interface you can specify it on the
command line:
ipmitool -I open <command>
BMC INTERFACE
The ipmitool bmc interface utilizes the bmc device driver as provided by Solaris 10 and
higher. In order to force ipmitool to make use of this interface you can specify it on
the command line:
ipmitool -I bmc <command>
The following files are associated with the bmc driver:
/platform/i86pc/kernel/drv/bmc
32-bit ELF kernel module for the bmc driver.
/platform/i86pc/kernel/drv/amd64/bmc
64-bit ELF kernel module for the bmc driver.
/dev/bmc
Character device node used to communicate with the bmc driver.
LIPMI INTERFACE
The ipmitool lipmi interface uses the Solaris 9 IPMI kernel device driver. It has been
superceeded by the bmc interface on Solaris 10. You can tell ipmitool to use this
interface by specifying it on the command line.
ipmitool -I lipmi <expression>
LAN INTERFACE
The ipmitool lan interface communicates with the BMC over an Ethernet LAN connection using
UDP under IPv4. UDP datagrams are formatted to contain IPMI request/response messages
with a IPMI session headers and RMCP headers.
IPMI-over-LAN uses version 1 of the Remote Management Control Protocol (RMCP) to support
pre-OS and OS-absent management. RMCP is a request-response protocol delivered using UDP
datagrams to port 623.
The LAN interface is an authentication multi-session connection; messages delivered to the
BMC can (and should) be authenticated with a challenge/response protocol with either
straight password/key or MD5 message-digest algorithm. ipmitool will attempt to connect
with administrator privilege level as this is required to perform chassis power functions.
You can tell ipmitool to use the lan interface with the -I lan option:
ipmitool -I lan -H <hostname> [-U <username>] [-P <password>] <command>
A hostname must be given on the command line in order to use the lan interface with
ipmitool. The password field is optional; if you do not provide a password on the command
line, ipmitool will attempt to connect without authentication. If you specify a password
it will use MD5 authentication if supported by the BMC and straight password/key
otherwise, unless overridden with a command line option.
LANPLUS INTERFACE
Like the lan interface, the lanplus interface communicates with the BMC over an Ethernet
LAN connection using UDP under IPv4. The difference is that the lanplus interface uses
the RMCP+ protocol as described in the IPMI v2.0 specification. RMCP+ allows for improved
authentication and data integrity checks, as well as encryption and the ability to carry
multiple types of payloads. Generic Serial Over LAN support requires RMCP+, so the
ipmitool sol activate command requires the use of the lanplus interface.
RMCP+ session establishment uses a symmetric challenge-response protocol called RAKP
(Remote Authenticated Key-Exchange Protocol) which allows the negotiation of many options.
ipmitool does not yet allow the user to specify the value of every option, defaulting to
the most obvious settings marked as required in the v2.0 specification. Authentication
and integrity HMACS are produced with SHA1, and encryption is performed with AES-CBC-128.
Role-level logins are not yet supported.
ipmitool must be linked with the OpenSSL library in order to perform the encryption
functions and support the lanplus interface. If the required packages are not found it
will not be compiled in and supported.
You can tell ipmitool to use the lanplus interface with the -I lanplus option:
ipmitool -I lanplus -H <hostname> [-U <username>] [-P <password>] <command>
A hostname must be given on the command line in order to use the lan interface with
ipmitool. With the exception of the -A and -C options the rest of the command line
options are identical to those available for the lan interface.
The -C option allows you specify the authentication, integrity, and encryption algorithms
to use for for lanplus session based on the cipher suite ID found in the IPMIv2.0
specification in table 22-19. The default cipher suite is 3 which specifies
RAKP-HMAC-SHA1 authentication, HMAC-SHA1-96 integrity, and AES-CBC-128 encryption
algorightms.
FREE INTERFACE
The ipmitool free interface utilizes the FreeIPMI libfreeipmi drivers.
You can tell ipmitool to use the FreeIPMI interface with the -I option:
ipmitool -I free <command>
IMB INTERFACE
The ipmitool imb interface supports the Intel IMB (Intel Inter-module Bus) Interface
through the /dev/imb device.
You can tell ipmitool to use the IMB interface with the -I option:
ipmitool -I imb <command>
EXAMPLES
Example 1: Listing remote sensors
> ipmitool -I lan -H 1.2.3.4 -f passfile sdr list
Baseboard 1.25V | 1.24 Volts | ok
Baseboard 2.5V | 2.49 Volts | ok
Baseboard 3.3V | 3.32 Volts | ok
Example 2: Displaying status of a remote sensor
> ipmitool -I lan -H 1.2.3.4 -f passfile sensor get "Baseboard 1.25V"
Locating sensor record...
Sensor ID : Baseboard 1.25V (0x10)
Sensor Type (Analog) : Voltage
Sensor Reading : 1.245 (+/- 0.039) Volts
Status : ok
Lower Non-Recoverable : na
Lower Critical : 1.078
Lower Non-Critical : 1.107
Upper Non-Critical : 1.382
Upper Critical : 1.431
Upper Non-Recoverable : na
Example 3: Displaying the power status of a remote chassis
> ipmitool -I lan -H 1.2.3.4 -f passfile chassis power status
Chassis Power is on
Example 4: Controlling the power on a remote chassis
> ipmitool -I lan -H 1.2.3.4 -f passfile chassis power on
Chassis Power Control: Up/On
Use ipmitool online using onworks.net services