X hits on this document

PDF document

February 10, 2006 - page 71 / 238

620 views

0 shares

0 downloads

0 comments

71 / 238

3.12. CHANNEL CONFIGURATION

59

authentication are 16-bytes long. Passwords for RMCP+ may be either 16 or 20 bytes long. You may set a 20-byte password for a user, but then that user may not be used for IPMI 1.5 authentication, only for RMCP+ authentication.

Request

0

User ID: bits 0-5 - User number bit 6 - If this is 0, then use 16-byte passwords. If this is 1, then use 20-byte passwords.

bit 7 - reserved bits 0-1 - Operation:

1

00b - disable the user. 01b - enable the user. 10b - set the password to the value in this command. 11b - test the password in this command and return an error code if it is

incorrect.

2-17/20 Response

bits 2-7 - reserved Password - These bytes are ASCII-encoded bytes that define the name of the user.

This is only present for the set and test password operations.

Completion Code. Special values are:

  • 0

    80h - Password test failed 81h - Password was the wrong length Table 3.23: Set User Password Command, NetFN S/E (06h), Cmd 45h

3.12

Channel Configuration

The channels on an IPMI system are controlled with a channel setting command. In addition, channel information is available.

Channels are numbered 0-7 and Fh. Channel 0 is generally IPMB. Channels 1-7 are used for other IPMB channels, LAN interfaces, serial interfaces, and whatnot. Channel Fh is used for the system interface.

If you specify channel Eh in a command, it will use the channel the command came from; any returned channel number will be the actual channel number of the channel. This can be used to discover the channel number of the current channel.

The channel information contains the channel type, protocol, and other detailed information about the channel.

The channel access allows control of how the channel works. It allows alerting to be enabled, it controls whether user and per-message authentication are required for the channel, it controls when the channel is available and the privilege limit of the channel. Channel access has two separate areas to store the information, a volatile area and a non-volatile area. The volatile area is the area that is used in normal operation, setting that modified behaviour immediately. This area is lost if power is lost to the system. The system loads the volatile area from the non-volatile area at startup. The areas are set separately.

In addition to this, LAN interfaces have specific configuration information as defined in section 3.9.1 on page 45 and serial interfaces have their own information as defined in section 3.10.1 on page 54.

Document info
Document views620
Page views620
Page last viewedWed Dec 07 20:55:45 UTC 2016
Pages238
Paragraphs8090
Words85809

Comments