solterm -V (return code: 1)
main: solterm only supports lan connections
solterm (return code: 1)
Usage: solterm <conparms> [-e escape_char] [-notencrypted] [-notauthenticated] [-bitrate (9600|19200|38400|57600|115200)] [-alerts (succeed|defer|fail)] [-holdoff] [-ack-retries n] [-ack-timeout usec] [-v] [-q] -e escape_char The escape character to use. Default is ~. -notencrypted Specify that SoL packets should not be encrypted. -notauthenticated Specify that SoL packets should not be authenticated. -bitrate xxx Specify bit rate to use. BMCs are not required to support all bit rates. Make sure this matches the bit rate at which the baseboard is communicating! Defaults to the BMC's configured nonvolatile bit rate. -alerts succeed Specify that serial/modem alerts are to succeed while SoL is active. -alerts deferred Serial/modem alerts are to be deferred for the duration of the SoL session. -alerts fail Serial/modem alerts automatically fail during the SoL session. This is the default. -holdoff Specifies that CTS, DTR and DSR are to be deasserted at the start of the SoL session,so that the configuration may be modified before the handshake is released. -v Be more verbose. May be specified multiple times. -q Be quieter. Opposite of -v. <conparms> specified connection parameters for solterm. Note that only lan connection are supported for solterm. These parms are: lan lan [-U <username>] [-P <password>] [-p port] [-A <authtype>] [-L <privilege>] [-s] [-Ra <auth alg>] [-Ri <integ alg>] [-Rc <conf algo>] [-Rl] [-Rk <bmc key>] [-H <hackname>] [-M <max outstanding msgs>] <host1> [<host2>] If -s is supplied, then two host names are taken (the second port may be specified with -p2). Otherwise, only one hostname is taken. The defaults are an empty username and password (anonymous), port 623, admin privilege, and authtype defaulting to the most secure one available. privilege is one of: callback, user, operator, admin, or oem. These select the specific commands that are available to the connection. Higher privileges (ones further to the right in the above list) have more commands available to them. authtype is one of the following: rmcp+, md5, md2, straight, or none. Setting this to anything but rmcp+ forces normal rmcp authentication. By default the most secure method available is chosen, in the order given above. For RMCP+ connections, the authentication algorithms supported (-Ra) are: bmcpick, rakp_none, rakp_hmac_sha1, and rakp_hmac_md5. The integrity algorithms (-Ri) supported are: bmcpick, none, hmac_sha1, hmac_md5, and md5. The confidentiality algorithms (-Rc) are: bmcpick, aes_cbc_128, xrc4_128, and xrc_40. The defaults are rackp_hmac_sha1, hmac_sha1, and aes_cb_128. -Rl turns on lookup up names by the name and the privilege level (allowing the same name with different privileges and different passwords), the default is straight name lookup. -Rk sets the BMC key, needed if the system does two-key lookups. The -M option sets the maximum outstanding messages. The default is 2, ranges 1-63. The -H option enables certain hacks for broken platforms. This may be listed multiple times to enable multiple hacks. The currently available hacks are: intelplus - For Intel platforms that have broken RMCP+. rakp3_wrong_rolem - For systems that truncate role(m) in the RAKP3 msg. rmcpp_integ_sik - For systems that use SIK instead of K(1) for integrity.