.TH "ipmitool" "1" "" "Duncan Laurie" "" .SH "NAME" ipmitool \- utility for controlling IPMI\-enabled devices .SH "SYNOPSIS" ipmitool [\fB\-c\fR|\fB\-h\fR|\fB\-d \fIN\fP\fR|\fB\-v\fR|\fB\-V\fR] \fB\-I\fR \fIopen\fP <\fIcommand\fP> ipmitool [\fB\-c\fR|\fB\-h\fR|\fB\-v\fR|\fB\-V\fR] \fB\-I\fR \fIlan\fP \fB\-H\fR <\fIhostname\fP> [\fB\-p\fR <\fIport\fP>] [\fB\-U\fR <\fIusername\fP>] [\fB\-A\fR <\fIauthtype\fP>] [\fB\-L\fR <\fIprivlvl\fP>] [\fB\-a\fR|\fB\-E\fR|\fB\-P\fR|\fB\-f\fR <\fIpassword\fP>] [\fB\-o\fR <\fIoemtype\fP>] [\fB\-O\fR <\fIsel oem\fP>] [\fB\-e\fR <\fIesc_char\fP>] <\fIcommand\fP> ipmitool [\fB\-c\fR|\fB\-h\fR|\fB\-v\fR|\fB\-V\fR] \fB\-I\fR \fIlanplus\fP \fB\-H\fR <\fIhostname\fP> [\fB\-p\fR <\fIport\fP>] [\fB\-U\fR <\fIusername\fP>] [\fB\-L\fR <\fIprivlvl\fP>] [\fB\-a\fR|\fB\-E\fR|\fB\-P\fR|\fB\-f\fR <\fIpassword\fP>] [\fB\-o\fR <\fIoemtype\fP>] [\fB\-O\fR <\fIsel oem\fP>] [\fB\-C\fR <\fIciphersuite\fP>] [\fB\-K\fR|\fB\-k\fR <\fIkg_key\fP>] [\fB\-y\fR <\fIhex_kg_key\fP>] [\fB\-e\fR <\fIesc_char\fP>] <\fIcommand\fP> .SH "DESCRIPTION" This program lets you manage Intelligent Platform Management Interface (IPMI) functions of either the local system, via a kernel device driver, or a remote system, using IPMI V1.5 and IPMI v2.0. These functions include printing FRU information, LAN configuration, sensor readings, and remote chassis power control. IPMI management of a local system interface requires a compatible IPMI kernel driver to be installed and configured. On Linux this driver is called \fIOpenIPMI\fP and it is included in standard distributions. On Solaris this driver is called \fIBMC\fP and is included in Solaris 10. Management of a remote station requires the IPMI\-over\-LAN interface to be enabled and configured. Depending on the particular requirements of each system it may be possible to enable the LAN interface using ipmitool over the system interface. .SH "OPTIONS" .TP \fB\-a\fR Prompt for the remote server password. .TP \fB\-A\fR <\fIauthtype\fP> Specify an authentication type to use during IPMIv1.5 \fIlan\fP session activation. Supported types are NONE, PASSWORD, MD2, MD5, or OEM. .TP \fB\-c\fR Present output in CSV (comma separated variable) format. This is not available with all commands. .TP \fB\-e\fR <\fIsol_escape_char\fP> Use supplied character for SOL session escape character. The default is to use \fI~\fP but this can conflict with ssh sessions. .TP \fB\-k\fR <\fIkey\fP> Use supplied Kg key for IPMIv2 authentication. The default is not to use any Kg key. .TP \fB\-y\fR <\fIhex key\fP> Use supplied Kg key for IPMIv2 authentication. The key is expected in hexadecimal format and can be used to specify keys with non-printable characters. E.g. '-k PASSWORD' and '-y 50415353574F5244' are equivalent. The default is not to use any Kg key. .TP \fB\-C\fR <\fIciphersuite\fP> The remote server authentication, integrity, and encryption algorithms to use for IPMIv2 \fIlanplus\fP connections. See table 22\-19 in the IPMIv2 specification. The default is 3 which specifies RAKP\-HMAC\-SHA1 authentication, HMAC\-SHA1\-96 integrity, and AES\-CBC\-128 encryption algorightms. .TP \fB\-E\fR The remote server password is specified by the environment variable \fIIPMI_PASSWORD\fP. .TP \fB\-f\fR <\fIpassword_file\fP> Specifies a file containing the remote server password. If this option is absent, or if password_file is empty, the password will default to NULL. .TP \fB\-h\fR Get basic usage help from the command line. .TP \fB\-H\fR <\fIaddress\fP> Remote server address, can be IP address or hostname. This option is required for \fIlan\fP and \fIlanplus\fP interfaces. .TP \fB\-I\fR <\fIinterface\fP> Selects IPMI interface to use. Supported interfaces that are compiled in are visible in the usage help output. .TP \fB\-L\fR <\fIprivlvl\fP> Force session privilege level. Can be CALLBACK, USER, OPERATOR, ADMINISTRATOR. Default is ADMINISTRATOR. .TP \fB\-m\fR <\fIlocal_address\fP> Set the local IPMB address. The default is 0x20 and there should be no need to change it for normal operation. .TP \fB\-o\fR <\fIoemtype\fP> Select OEM type to support. This usually involves minor hacks in place in the code to work around quirks in various BMCs from various manufacturers. Use \fI\-o list\fP to see a list of current supported OEM types. .TP \fB\-O\fR <\fIsel oem\fP> Open selected file and read OEM SEL event descriptions to be used during SEL listings. See examples in contrib dir for file format. .TP \fB\-p\fR <\fIport\fP> Remote server UDP port to connect to. Default is 623. .TP \fB\-P\fR <\fIpassword\fP> Remote server password is specified on the command line. If supported it will be obscured in the process list. \fBNote!\fR Specifying the password as a command line option is not recommended. .TP \fB\-S\fR <\fIsdr_cache_file\fP> Use local file for remote SDR cache. Using a local SDR cache can drastically increase performance for commands that require knowledge of the entire SDR to perform their function. Local SDR cache from a remote system can be created with the \fIsdr dump\fP command. .TP \fB\-t\fR <\fItarget_address\fP> Bridge IPMI requests to the remote target address. .TP \fB\-U\fR <\fIusername\fP> Remote server username, default is NULL user. .TP \fB\-d \fIN\fP\fR Use device number N to specify the /dev/ipmiN (or /dev/ipmi/N or /dev/ipmidev/N) device to use for in-band BMC communication. Used to target a specific BMC on a multi-node, multi-BMC system through the ipmi device driver interface. Default is 0. .TP \fB\-v\fR Increase verbose output level. This option may be specified multiple times to increase the level of debug output. If given three times you will get hexdumps of all incoming and outgoing packets. .TP \fB\-V\fR Display version information. .LP If no password method is specified then ipmitool will prompt the user for a password. If no password is entered at the prompt, the remote server password will default to NULL. .SH "SECURITY" There are several security issues be be considered before enabling the IPMI LAN interface. A remote station has the ability to control a system's power state as well as being able to gather certain platform information. To reduce vulnerability it is strongly advised that the IPMI LAN interface only be enabled in 'trusted' environments where system security is not an issue or where there is a dedicated secure 'management network'. Further it is strongly advised that you should not enable IPMI for remote access without setting a password, and that that password should not be the same as any other password on that system. When an IPMI password is changed on a remote machine with the IPMIv1.5 \fIlan\fP interface the new password is sent across the network as clear text. This could be observed and then used to attack the remote system. It is thus recommended that IPMI password management only be done over IPMIv2.0 \fIlanplus\fP interface or the system interface on the local station. For IPMI v1.5, the maximum password length is 16 characters. Passwords longer than 16 characters will be truncated. For IPMI v2.0, the maximum password length is 20 characters; longer passwords are truncated. .SH "COMMANDS" .TP \fIhelp\fP This can be used to get command\-line help on ipmitool commands. It may also be placed at the end of commands to get option usage help. ipmitool help .br Commands: raw Send a RAW IPMI request and print response i2c Send an I2C Master Write-Read command and print response spd Print SPD info from remote I2C device lan Configure LAN Channels chassis Get chassis status and set power state power Shortcut to chassis power commands event Send events to MC mc Management Controller status and global enables sdr Print Sensor Data Repository entries and readings sensor Print detailed sensor information fru Print built\-in FRU and scan for FRU locators sel Print System Event Log (SEL) pef Configure Platform Event Filtering (PEF) sol Configure and connect IPMIv2.0 Serial\-over\-LAN tsol Configure and connect Tyan IPMIv1.5 Serial\-over\-LAN isol Configure and connect Intel IPMIv1.5 Serial\-over\-LAN user Configure Management Controller users channel Configure Management Controller channels session Print session information sunoem Manage Sun OEM Extensions kontronoem Manage Kontron OEM Extensions picmg Run a PICMG/ATA extended command firewall Configure Firmware Firewall shell Launch interactive IPMI shell exec Run list of commands from file set Set runtime variable for shell and exec echo Used to echo lines to stdout in scripts ekanalyzer run FRU-Ekeying analyzer using FRU files ipmitool chassis help .br Chassis Commands: status, power, identify, policy, restart_cause, poh, bootdev, bootparam, selftest ipmitool chassis power help .br chassis power Commands: status, on, off, cycle, reset, diag, soft .TP \fIbmc|mc\fP .RS .TP \fIreset\fP <\fBwarm\fR|\fBcold\fR> .br Instructs the BMC to perform a warm or cold reset. .TP \fIguid\fP Display the Management Controller Globally Unique IDentifier. .TP \fIinfo\fP .br Displays information about the BMC hardware, including device revision, firmware revision, IPMI version supported, manufacturer ID, and information on additional device support. .TP \fIwatchdog\fP .br These commands allow a user to view and change the current state of the watchdog timer. .RS .TP \fIget\fP .br Show current Watchdog Timer settings and countdown state. .TP \fIreset\fP .br Reset the Watchdog Timer to its most recent state and restart the countdown timer. .TP \fIoff\fP .br Turn off a currently running Watchdog countdown timer. .RE .TP \fIselftest\fP .br Check on the basic health of the BMC by executing the Get Self Test results command and report the results. .TP \fIgetenables\fP .br Displays a list of the currently enabled options for the BMC. .br .TP \fIsetenables\fP <\fBoption\fR>=[\fIon\fP|\fIoff\fP] .br Enables or disables the given \fIoption\fR. This command is only supported over the system interface according to the IPMI specification. Currently supported values for \fIoption\fR include: .RS .TP \fIrecv_msg_intr\fP .br Receive Message Queue Interrupt .TP \fIevent_msg_intr\fP .br Event Message Buffer Full Interrupt .TP \fIevent_msg\fP .br Event Message Buffer .TP \fIsystem_event_log\fP .br System Event Logging .TP \fIoem0\fP .br OEM\-Defined option #0 .TP \fIoem1\fP .br OEM\-Defined option #1 .TP \fIoem2\fP .br OEM\-Defined option #2 .RE .RE .TP \fIchannel\fP .RS .TP \fIauthcap\fP <\fBchannel number\fR> <\fBmax priv\fR> Displays information about the authentication capabilities of the selected channel at the specified privilege level. .RS .TP Possible privilege levels are: .br \fI1\fP Callback level .br \fI2\fP User level .br \fI3\fP Operator level .br \fI4\fP Administrator level .br \fI5\fP OEM Proprietary level .RE .TP \fIinfo\fP [\fBchannel number\fR] Displays information about the selected channel. If no channel is given it will display information about the currently used channel. .RS .PP > ipmitool channel info .br Channel 0xf info: .br Channel Medium Type : System Interface .br Channel Protocol Type : KCS .br Session Support : session\-less .br Active Session Count : 0 .br Protocol Vendor ID : 7154 .RE .TP \fIgetaccess\fP <\fBchannel number\fR> [<\fBuserid\fR>] .br Configure the given userid as the default on the given channel number. When the given channel is subsequently used, the user is identified implicitly by the given userid. .TP \fIsetaccess\fP <\fBchannel number\fR> <\fBuserid\fR> [<\fIcallin\fP=\fBon\fR|\fBoff\fR>] [<\fIipmi\fP=\fBon\fR|\fBoff\fR>] [<\fIlink\fP=\fBon\fR|\fBoff\fR>] [<\fIprivilege\fP=\fBlevel\fR>] .br Configure user access information on the given channel for the given userid. .TP \fIgetciphers\fP <\fIipmi\fP|\fIsol\fP> [<\fBchannel\fR>] .br Displays the list of cipher suites supported for the given application (ipmi or sol) on the given channel. .RE .TP \fIchassis\fP .RS .TP \fIstatus\fP .br Displays information regarding the high\-level status of the system chassis and main power subsystem. .TP \fIpoh\fP .br This command will return the Power\-On Hours counter. .TP \fIidentify\fP <\fBinterval\fR> Control the front panel identify light. Default interval is 15 seconds. Use 0 to turn off. Use "force" to turn on indefinitely. .TP \fIrestart_cause\fP .br Query the chassis for the cause of the last system restart. .TP \fIselftest\fP .br Check on the basic health of the BMC by executing the Get Self Test results command and report the results. .TP \fIpolicy\fP .br Set the chassis power policy in the event power failure. .RS .TP \fIlist\fP .br Return supported policies. .TP \fIalways\-on\fP .br Turn on when power is restored. .TP \fIprevious\fP .br Returned to previous state when power is restored. .TP \fIalways\-off\fP .br Stay off after power is restored. .RE .TP \fIpower\fP .br Performs a chassis control command to view and change the power state. .RS .TP \fIstatus\fP .br Show current chassis power status. .TP \fIon\fP .br Power up chassis. .TP \fIoff\fP .br Power down chassis into soft off (S4/S5 state). \fBWARNING\fR: This command does not initiate a clean shutdown of the operating system prior to powering down the system. .TP \fIcycle\fP .br Provides a power off interval of at least 1 second. No action should occur if chassis power is in S4/S5 state, but it is recommended to check power state first and only issue a power cycle command if the system power is on or in lower sleep state than S4/S5. .TP \fIreset\fP .br This command will perform a hard reset. .TP \fIdiag\fP .br Pulse a diagnostic interrupt (NMI) directly to the processor(s). .TP \fIsoft\fP .br Initiate a soft\-shutdown of OS via ACPI. This can be done in a number of ways, commonly by simulating an overtemperture or by simulating a power button press. It is necessary for there to be Operating System support for ACPI and some sort of daemon watching for events for this soft power to work. .RE .TP \fIbootdev\fP <\fBdevice\fR> [<\fIclear\-cmos\fP=\fByes\fR|\fBno\fR>] [<\fIoptions\fP=\fBhelp,...\fR>] .br Request the system to boot from an alternate boot device on next reboot. The \fIclear\-cmos\fP option, if supplied, will instruct the BIOS to clear its CMOS on the next reboot. Various options may be used to modify the boot device settings. Run \fI"bootdev none options=help"\fP for a list of available boot device modifiers/options. .RS .TP Currently supported values for are: .TP \fInone\fP .br Do not change boot device .TP \fIpxe\fP .br Force PXE boot .TP \fIdisk\fP .br Force boot from BIOS default boot device .TP \fIsafe\fP .br Force boot from BIOS default boot device, request Safe Mode .TP \fIdiag\fP .br Force boot from diagnostic partition .TP \fIcdrom\fP .br Force boot from CD/DVD .TP \fIbios\fP .br Force boot into BIOS setup .TP \fIfloppy\fP .br Force boot from Floppy/primary removable media .RE .TP \fIbootparam\fP .br Get or set various system boot option parameters. .RS .TP \fIget\fP <\fBparam #\fR> .br Get boot parameter. Currently supported values for <\fBparam #\fR> are: \fI0\fP - Set In Progress \fI1\fP - Service Partition Selector \fI2\fP - Service Partition Scan \fI3\fP - BMC Boot Flag Valid Bit Clearing \fI4\fP - Boot Info Acknowledge \fI5\fP - Boot Flags \fI6\fP - Boot Initiator Info \fI7\fP - Boot Initiator Mailbox .br .TP \fIset\fP <\fBoption\fR> [\fBvalue ...\fR] .br Set boot parameter. .RS .TP Currently supported values for \fB