ipmicmd --version (return code: 0)
ipmicmd This little utility is an ipmi command tool ;-) It can be used to send commands to an IPMI interface type -? for usage info. Enjoy!
ipmicmd -HELP (return code: 1)
ipmicmd [-k <command>] [-v] <con_parms> Where <con_parms> is one of: smi smi <num> where the <num> is the IPMI device number to connect to. lan lan [-U <username>] [-P <password>] [-p port] [-A <authtype>] [-L <privilege>] [-s] [-Ra <auth alg>] [-Ri <integ alg>] [-Rc <conf algo>] [-Rl] [-Rk <bmc key>] [-H <hackname>] [-M <max outstanding msgs>] <host1> [<host2>] If -s is supplied, then two host names are taken (the second port may be specified with -p2). Otherwise, only one hostname is taken. The defaults are an empty username and password (anonymous), port 623, admin privilege, and authtype defaulting to the most secure one available. privilege is one of: callback, user, operator, admin, or oem. These select the specific commands that are available to the connection. Higher privileges (ones further to the right in the above list) have more commands available to them. authtype is one of the following: rmcp+, md5, md2, straight, or none. Setting this to anything but rmcp+ forces normal rmcp authentication. By default the most secure method available is chosen, in the order given above. For RMCP+ connections, the authentication algorithms supported (-Ra) are: bmcpick, rakp_none, rakp_hmac_sha1, and rakp_hmac_md5. The integrity algorithms (-Ri) supported are: bmcpick, none, hmac_sha1, hmac_md5, and md5. The confidentiality algorithms (-Rc) are: bmcpick, aes_cbc_128, xrc4_128, and xrc_40. The defaults are rackp_hmac_sha1, hmac_sha1, and aes_cb_128. -Rl turns on lookup up names by the name and the privilege level (allowing the same name with different privileges and different passwords), the default is straight name lookup. -Rk sets the BMC key, needed if the system does two-key lookups. The -M option sets the maximum outstanding messages. The default is 2, ranges 1-63. The -H option enables certain hacks for broken platforms. This may be listed multiple times to enable multiple hacks. The currently available hacks are: intelplus - For Intel platforms that have broken RMCP+. rakp3_wrong_rolem - For systems that truncate role(m) in the RAKP3 msg. rmcpp_integ_sik - For systems that use SIK instead of K(1) for integrity.