是否启动检查
linux-xen02:~ # /etc/init.d/ipmi status
ipmi_msghandler module loaded.
ipmi_si module loaded.
ipmi_devintf module loaded.
/dev/ipmi0 exists.
linux-datastore:~ # lsmod |grep ipmi
ipmi_devintf 17509 0
ipmi_si 53294 0
ipmi_msghandler 49895 2 ipmi_devintf,ipmi_si
linux-datastore:~ # lsmod |grep ipmi|wc -l
电源操作
linux-xen02:~ # ipmitool chassis
Chassis Commands: status, power, identify, policy, restart_cause, poh, bootdev, bootparam, selftest
raw Send a RAW IPMI request and print response
i2c Send an I2C Master Write-Read command and print response
spd Print SPD info from remote I2C device
lan Configure LAN Channels
chassis Get chassis status and set power state
power Shortcut to chassis power commands
event Send pre-defined events to MC
mc Management Controller status and global enables
sdr Print Sensor Data Repository entries and readings
sensor Print detailed sensor information
fru Print built-in FRU and scan SDR for FRU locators
gendev Read/Write Device associated with Generic Device locators sdr
sel Print System Event Log (SEL)
pef Configure Platform Event Filtering (PEF)
sol Configure and connect IPMIv2.0 Serial-over-LAN
tsol Configure and connect with Tyan IPMIv1.5 Serial-over-LAN
isol Configure IPMIv1.5 Serial-over-LAN
user Configure Management Controller users
channel Configure Management Controller channels
session Print session information
sunoem OEM Commands for Sun servers
kontronoem OEM Commands for Kontron devices
picmg Run a PICMG/ATCA extended cmd
fwum Update IPMC using Kontron OEM Firmware Update Manager
firewall Configure Firmware Firewall
delloem OEM Commands for Dell systems
shell Launch interactive IPMI shell
exec Run list of commands from file
set Set runtime variable for shell and exec
hpm Update HPM components using PICMG HPM.1 file
ekanalyzer run FRU-Ekeying analyzer using FRU files
管理信息级别
linux-xen01:~ # ipmitool channel
Channel Commands: authcap <channel number> <max privilege>
getaccess <channel number> [user id]
setaccess <channel number> <user id> [callin=on|off] [ipmi=on|off] [link=on|off] [privilege=level]
info [channel number]
getciphers <ipmi | sol> [channel]
Possible privilege levels are:
1 Callback level
2 User level
3 Operator level
4 Administrator level
5 OEM Proprietary level
15 No access
新增用户
linux-xen01:~ # ipmitool user set name 10 dcloud
linux-xen01:~ # ipmitool user set password 10 dcloud
linux-xen01:~ # ipmitool user enable 10
linux-xen01:~ # ipmitool user priv 10 4 1
linux-xen01:~ # ipmitool user list 1
ID Name Callin Link Auth IPMI Msg Channel Priv Limit
2 root true true true ADMINISTRATOR
10 dcloud true false true ADMINISTRATOR
设置IP
ipmitool lan set 1 ipaddr 192.168.70.222
设置网关
ipmitool lan set 1 defgw ipaddr 192.168.70.254
arp -s 192.168.0.10 78:2b:cb:65:75:31
开启lan 1 可访问
ipmitool lan set 1 access on
如果远程访问可以,但不能使用本地的地址因为-H hostname Remote host name for LAN interface,
也是说执行命令时,他能检测IP是否为远程地址,如果不是远程地址,则执行失败,如果是本地地址则直接执行即可
远程地址
linux-xen01:~ # ipmitool -I lan -H 192.168.70.224 -U root -P 123456 chassis power status
Chassis Power is on
linux-xen01:~ # ipmitool -I lan -H 192.168.70.222 -U root -P 123456 chassis power status
Error: Unable to establish LAN session
Unable to get Chassis Power Status
linux-xen01:~ #
本机
linux-xen01:~ # ipmitool chassis power status
Chassis Power is on
linux-xen01:~ #
检查是否安装IPMI
linux-datastore:~ # lsmod |grep ipmi
linux-datastore:~ # /etc/init.d/ipmi start
Starting ipmi drivers: done
linux-datastore:~ #
linux-datastore:~ # lsmod |grep ipmi
ipmi_devintf 17509 0
ipmi_si 53294 0
ipmi_msghandler 49895 2 ipmi_devintf,ipmi_si
linux-datastore:~ # lsmod |grep ipmi|wc -l
3
配置IP和网关
ipmitool lan set 1 ipaddr 192.168.60.222 设置IP
ipmitool lan set 1 defgw ipaddr 192.168.60.254 设置网关
linux-xen01:~ # ipmitool lan set
usage: lan set <channel> <command> <parameter>
LAN set command/parameter options:
ipaddr <x.x.x.x> Set channel IP address
netmask <x.x.x.x> Set channel IP netmask
macaddr <x:x:x:x:x:x> Set channel MAC address
defgw ipaddr <x.x.x.x> Set default gateway IP address
defgw macaddr <x:x:x:x:x:x> Set default gateway MAC address
bakgw ipaddr <x.x.x.x> Set backup gateway IP address
bakgw macaddr <x:x:x:x:x:x> Set backup gateway MAC address
password <password> Set session password for this channel
snmp <community string> Set SNMP public community string
user Enable default user for this channel
access <on|off> Enable or disable access to this channel
alert <on|off> Enable or disable PEF alerting for this channel
arp respond <on|off> Enable or disable BMC ARP responding
arp generate <on|off> Enable or disable BMC gratuitous ARP generation
arp interval <seconds> Set gratuitous ARP generation interval
vlan id <off|<id>> Disable or enable VLAN and set ID (1-4094)
vlan priority <priority> Set vlan priority (0-7)
auth <level> <type,..> Set channel authentication types
level = CALLBACK, USER, OPERATOR, ADMIN
type = NONE, MD2, MD5, PASSWORD, OEM
ipsrc <source> Set IP Address source
none = unspecified source
static = address manually configured to be static
dhcp = address obtained by BMC running DHCP
bios = address loaded by BIOS or system software
cipher_privs XXXXXXXXXXXXXXX Set RMCP+ cipher suite privilege levels
X = Cipher Suite Unused
c = CALLBACK
u = USER
o = OPERATOR
a = ADMIN
O = OEM