xcat-core/xCAT-nbroot/overlay/bin/bmcsetup
jbjohnso 419aa05c18 -Fix off-by-one bug in the autodetect script with respect to NICs
-Relax cipher suite 1, which still requires a password, cipher suite 0 remains banned from access as it cannot be secured at all


git-svn-id: https://svn.code.sf.net/p/xcat/code/xcat-core/trunk@721 8638fb3e-16cb-4fca-ae20-7b5d299a9bcd
2008-03-07 00:01:14 +00:00

44 lines
1.3 KiB
Plaintext
Executable File

# IBM(c) 2007 EPL license http://www.eclipse.org/legal/epl-v10.html
modprobe ipmi_si
modprobe ipmi_devintf
while ! getipmi
do
echo "Retrying retrieval of IPMI settings from server"
done
BMCIP=`grep bmcip /tmp/ipmi.data |awk -F\> '{print $2}'|awk -F\< '{print $1}'`
BMCGW=`grep gateway /tmp/ipmi.data |awk -F\> '{print $2}'|awk -F\< '{print $1}'`
BMCNM=`grep netmask /tmp/ipmi.data |awk -F\> '{print $2}'|awk -F\< '{print $1}'`
BMCUS=`grep username /tmp/ipmi.data |awk -F\> '{print $2}'|awk -F\< '{print $1}'`
BMCPW=`grep password /tmp/ipmi.data |awk -F\> '{print $2}'|awk -F\< '{print $1}'`
ipmitool lan set 1 ipsrc static
ipmitool lan set 1 ipaddr $BMCIP
ipmitool lan set 1 netmask $BMCNM
if [ ! -z "$BMCGW" ]; then
ipmitool lan set 1 defgw ipaddr $BMCGW
fi
ipmitool user disable 1
ipmitool user disable 3
ipmitool user disable 4
ipmitool user enable 2
ipmitool user priv 2 4 1
ipmitool user set name 2 $BMCUS
ipmitool user set password 2 $BMCPW
echo "Set up following user table: "
ipmitool user list 1
echo "Enabling Channel 1: "
ipmitool raw 0x6 0x40 0x1 0x42 0x44
ipmitool raw 0x6 0x40 0x1 0x82 0x84
echo "Enabling ARP responses: "
ipmitool lan set 1 arp respond on
echo "Enabling IPMI v 1.5 MD5 LAN access:"
ipmitool lan set 1 auth admin md5
echo "Enabling IPMI v 2.0 LAN access:"
ipmitool lan set 1 cipher_privs uaaaXXXXXXXXXXX