openipmi_conparms - Online Linux Manual PageSection : 7
Updated : 05/13/03
Source : OpenIPMI
Note : Connection Parameters for OpenIPMI

NAMEopenipmi_cmdparms − Connection parmeters for OpenIPMI

SYNOPSISsmi smi-num lan [−U username] [−P password] [−p[2] port] [−A authtype] [−L privilege] [−s] [−Ra auth alg] [−Ri integ alg] [−Rc conf algo] [−Rl] [−Rk bmc key] [−H hackname] host [ host]

DESCRIPTIONThe connection parameters for OpenIPMI vary depending on the connection type. This document describes the standard connection types; others may be available from OEMs.

OPTIONSsmi-num  The SMI interface for the local connection. There may be more than one BMC connection on a system and they are generally numbered, like /dev/ipmi0, /dev/ipmi1, etc. −U username  Use the given username for the LAN connection. If none is given, then no username is used. −P password  The password to use for the connection. If none is given, the user is assumed to have an empty password −p[2] port  The UCP port to connect to. This defaults to the standard 623 port, so it is not necessary unless a special port is required. Note that since you can have two connections (hosts), −p is for the first host and −p2 is for the second host. −A authtype  The authentication type to use, one of rmcp+, md5, md2, straight, or none. If you don't supply this, the most secure one available is chosen, in the order given in the previous list. −L privilege  The privilege to use for the connection. Lower privileges cannot execute some commands. Privileges are: callback, user, operator, admin, and oem. The default is admin. −Ra authentication algorithm  Set the RMCP+ authentication algorithm to use. Options are: bmcpick, rakp_none, rakp_hmac_sha1, and rakp_hmac_md5. The bmcpick option is used by default, which means the BMC picks the algorithm it wants to use. −Ri integrity algorithm  The RMCP+ integrity algorithm to use. This ensures that the data has not be altered between the sender and receiver. Valid options are: bmcpick, none, hmac_sha1, hmac_md5, and md5. The bmcpick option is used by default, which means the BMC picks the algorithm it wants to use. −Rc confidentiality algorithm  The RMCP+ confidentiality (encryption) algorithm to use. This keeps evesdroppers from seeing the data. Valid values are: bmcpick, aes_cbc_128, xrc4_128, and xrc_40. The bmcpick option is used by default, which means the BMC picks the algorithm it wants to use. −Rl  If this is specified, the username is looked up using the privilege level along with the username. This allows the same name to have different passwords with different privilege levels. −Rk BMC Key  If the system requires two-key lookups, this specifies the second key (the BMC key) to use. This is ignored if two-key lookups are not enabled by the BMC. −H hackname  Well, it always happens. Things in the field don't work quite like they are supposed to. There was some vagueness in the first IPMI specs and different vendors interpreted RMCP+ in different ways. This allows different options to be supported. Try different hacks if your RMCP+ systems don't authenticate properly. These are: rakp3_wrong_rolem  Some systems use the incorrect Role(m) field in a specific authentication message (the RAKP3 message). This is a common problem. rmcpp_integ_sik  The original IPMI 2.0 spec specified the incorrect key to use for the integrity key. This forces use of the Session Initiation Key. The default is to use K(1) −s  Make two connections to the BMC. This means the BMC has two different IP addresses/ports that are equivalent. If this is specified, a second host must be supplied. This is not the same as two connections to two different BMCs. This must be a connection to the same BMC. host  The IP address (either by name lookup or specified directly) to connect to. If the −s is specified, two hosts must be supplied. The −Ra, −Ri, −Rc, −Rk and −Rl options only apply to RMCP+ connections and will be ignored if the connection does not support RMCP+ or if a non-RMCP+ authentication type is specified.

SEE ALSOipmish(8), openipmicmd(8), solterm(1)

KNOWN PROBLEMSThis is excessively complicated, but the defaults should be good.

AUTHORCorey Minyard <cminyard@mvista.org>
0
Johanes Gumabo
Data Size   :   17,318 byte
man-openipmi_conparms.7Build   :   2024-12-05, 20:55   :  
Visitor Screen   :   x
Visitor Counter ( page / site )   :   3 / 180,922
Visitor ID   :     :  
Visitor IP   :   3.142.172.250   :  
Visitor Provider   :   AMAZON-02   :  
Provider Position ( lat x lon )   :   39.962500 x -83.006100   :   x
Provider Accuracy Radius ( km )   :   1000   :  
Provider City   :   Columbus   :  
Provider Province   :   Ohio ,   :   ,
Provider Country   :   United States   :  
Provider Continent   :   North America   :  
Visitor Recorder   :   Version   :  
Visitor Recorder   :   Library   :  
Online Linux Manual Page   :   Version   :   Online Linux Manual Page - Fedora.40 - march=x86-64 - mtune=generic - 24.12.05
Online Linux Manual Page   :   Library   :   lib_c - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Online Linux Manual Page   :   Library   :   lib_m - 24.10.03 - march=x86-64 - mtune=generic - Fedora.40
Data Base   :   Version   :   Online Linux Manual Page Database - 24.04.13 - march=x86-64 - mtune=generic - fedora-38
Data Base   :   Library   :   lib_c - 23.02.07 - march=x86-64 - mtune=generic - fedora.36

Very long time ago, I have the best tutor, Wenzel Svojanovsky . If someone knows the email address of Wenzel Svojanovsky , please send an email to johanes_gumabo@yahoo.co.id .
If error, please print screen and send to johanes_gumabo@yahoo.co.id
Under development. Support me via PayPal.