Bei den 300er Maschinen funktioniert das gut. Nur die 600er Maschinen wollen oder können nicht
Die erste Fehlermeldung ist:
No response from remote controller
Get Auth Capabilities command failed
Woran könnte das liegen? Die Authentifizierung ist ok. IPMI antworte auch auf Port 623.
Hier ein paar Daten:
Code: Select all
ipmitool -V:
ipmitool version 1.8.9
IPMI zum RSB einer TX600S3:
Code: Select all
ipmitool -vv -H IP_address -U xxxx -P xxxx session info all
ipmi_lan_send_cmd:opened=[0], open=[4410608]
IPMI LAN host IP_address port 623
Sending IPMI/RMCP presence ping packet
Received IPMI/RMCP response packet:
IPMI Supported
ASF Version 1.0
RMCP Version 1.0
RMCP Sequence 255
IANA Enterprise 47549582939069
ipmi_lan_send_cmd:opened=[1], open=[4410608]
No response from remote controller
Get Auth Capabilities command failed
ipmi_lan_send_cmd:opened=[1], open=[4410608]
No response from remote controller
Get Auth Capabilities command failed
Error: Unable to establish LAN session
Failed to open LAN interface
Get Session Info command failed
Hier ein paar Maschinendaten:
Code: Select all
OS:
Linux hostname 2.6.16.60-0.34-smp #1 SMP Fri Jan 16 14:59:01 UTC 2009 x86_64 x86_64 x86_64 GNU/Linux
Server:
Manufacturer: FUJITSU SIEMENS
Product Name: PRIMERGY TX600 S3 Rack
Version: GS01
Base Board Information
Manufacturer: FSC
Product Name: D2352
Version: d22177-604
irmc:
RemoteView(R) Service Board RSB S2
Product Number: S26361-F2425-E102
Software Revision: RSB_LP_A.7.1.14.39
Local über OS funktioniert der Zugriff auf die BMC Daten:
Code: Select all
ipmitool mc info:
Device ID : 32
Device Revision : 1
Firmware Revision : 1.33
IPMI Version : 2.0
Manufacturer ID : 10368
Manufacturer Name : Unknown (0x2880)
Product ID : 311 (0x0137)
Device Available : yes
Provides Device SDRs : no
Additional Device Support :
Sensor Device
SDR Repository Device
SEL Device
FRU Inventory Device
IPMB Event Receiver
Chassis Device
Aux Firmware Rev Info :
0x00
0x11
0x00
0x12
Bei einer TX300 S3 mit gleichem RSB sieht es so aus:
Code: Select all
ipmitool -vv -H IP_address -U xxxx -P xxxx mc info
ipmi_lan_send_cmd:opened=[0], open=[134709209]
IPMI LAN host IP_address port 623
Sending IPMI/RMCP presence ping packet
Received IPMI/RMCP response packet:
IPMI Supported
ASF Version 1.0
RMCP Version 1.0
RMCP Sequence 255
IANA Enterprise 4542
ipmi_lan_send_cmd:opened=[1], open=[134709209]
Channel 02 Authentication Capabilities:
Privilege Level : ADMINISTRATOR
Auth Types : NONE MD5 PASSWORD
Per-msg auth : enabled
User level auth : enabled
Non-null users : enabled
Null users : disabled
Anonymous login : enabled
Proceeding with AuthType MD5
ipmi_lan_send_cmd:opened=[1], open=[134709209]
Opening Session
Session ID : 756c5720
Challenge : 8201be03b776555bde39f475b3360c52
Privilege Level : ADMINISTRATOR
Auth Type : MD5
ipmi_lan_send_cmd:opened=[1], open=[134709209]
Session Activated
Auth Type : MD5
Max Priv Level : ADMINISTRATOR
Session ID : 756c5720
Inbound Seq : 00000001
ipmi_lan_send_cmd:opened=[1], open=[134709209]
Set Session Privilege Level to ADMINISTRATOR
opened=[1], open=[134709209]
ipmi_lan_send_cmd:opened=[1], open=[134709209]
Device ID : 1
Device Revision : 1
Firmware Revision : 1.1
IPMI Version : 2.0
Manufacturer ID : 10368
Manufacturer Name : Unknown (0x2880)
Product ID : 515 (0x0203)
Device Available : yes
Provides Device SDRs : no
Additional Device Support :
Sensor Device
SDR Repository Device
SEL Device
FRU Inventory Device
IPMB Event Receiver
Bridge
Chassis Device
Aux Firmware Rev Info :
0x01
0x42
0x00
0x41
ipmi_lan_send_cmd:opened=[1], open=[134709209]
Closed Session 756c5720