Hi Anthony, thanks a lot for your detailed response. This solved my problem. ILOM was already configured on this machine and I could find out the current network configuration with ipmitool lan print on the Solaris prompt! Thanks! Great help!! Best wishes, Andreas >> we have to get access to the service console of a X4170 server in a remote >> location. We usually >> >> connect to the RSC > > It's ILOM on the x4nnn systems FWIW, RSC is an old card for SPARC systems. Once you get IP configured, please do go update the ILOM+BIOS firmware to the latest available, taking care that the x4170 and the x4170m2 take different images. You'll also want to tightly ACL the router interface that the netmgt port connects to, as there are a number of services that ILOM runs, including an ancient version of SSH, and I phear that there are all kinds of vulnerabilities. You don't want the net at large being able to reach the thing. > >> using a serial connection (Mac book with KeySpan adaptor) >> configure an ipaddress, netmask,... for the service console >> connect to this ipaddress with a webbrowser >> >> In this case we have no access to the physical machine since it has already >> been shipped to a remote location. > > Don't you have the serial console "SERMGT" hooked up to a terminal/console server? 9600bps, no flow control, root/changeme defaults. > >> The ipaddress of the service console has >> not been configured yet (as far as we know). We have access to the Solaris >> installed on the machine though. >> >> Can we configure the ipaddress of the service console (or find out the current >> configuration) from the solaris prompt? If so how? Googling for this got me no >> result so far! :-( > > ipmitool. 1.8.9.4 seems to work, the 1.8.11 that ships with Solaris 10 doesn't. > > > # /opt/ipmitool/bin/ipmitool lan > LAN Commands: > print [<channel number>] > set [<channel number>] > alert [<channel number>] > stats get [<channel number>] > stats clear [<channel number>] > > # /opt/ipmitool/bin/ipmitool lan print 1 > Set in Progress : Set Complete > Auth Type Support : NONE MD2 MD5 PASSWORD > Auth Type Enable : Callback : MD2 MD5 PASSWORD > : User : MD2 MD5 PASSWORD > : Operator : MD2 MD5 PASSWORD > : Admin : MD2 MD5 PASSWORD > : OEM : > IP Address Source : Static Address > IP Address : 10.10.10.10 > Subnet Mask : 255.255.255.128 > MAC Address : 00:14:4f:a6:5f:44 > SNMP Community String : public > IP Header : TTL=0x00 Flags=0x00 Precedence=0x00 TOS=0x00 > BMC ARP Control : ARP Responses Disabled, Gratuitous ARP Disabled > Gratituous ARP Intrvl : 5.0 seconds > Default Gateway IP : 10.10.10.1 > Default Gateway MAC : 00:00:00:00:00:00 > Backup Gateway IP : 0.0.0.0 > Backup Gateway MAC : 00:00:00:00:00:00 > 802.1q VLAN ID : Disabled > 802.1q VLAN Priority : 0 > RMCP+ Cipher Suites : 2,3,0 > Cipher Suite Priv Max : XXXXXXXXXXXXXXX > : X=Cipher Suite Unused > : c=CALLBACK > : u=USER > : o=OPERATOR > : a=ADMIN > : O=OEM > > # /opt/ipmitool/bin/ipmitool lan set > > usage: lan set <channel> <command> [option] > > LAN set commands: > ipaddr <x.x.x.x> Set channel IP address > netmask <x.x.x.x> Set channel IP netmask > macaddr <x:x:x:x:x:x> Set channel MAC address > defgw ipaddr <x.x.x.x> Set default gateway IP address > defgw macaddr <x:x:x:x:x:x> Set default gateway MAC address > bakgw ipaddr <x.x.x.x> Set backup gateway IP address > bakgw macaddr <x:x:x:x:x:x> Set backup gateway MAC address > password <password> Set session password for this channel > snmp <community string> Set SNMP public community string > user Enable default user for this channel > access <on|off> Enable or disable access to this channel > alert <on|off> Enable or disable PEF alerting for this channel > arp respond <on|off> Enable or disable BMC ARP responding > arp generate <on|off> Enable or disable BMC gratuitous ARP generation > arp interval <seconds> Set gratuitous ARP generation interval > vlan id <off|<id>> Disable or enable VLAN and set ID (1-4094) > vlan priority <priority> Set vlan priority (0-7) > auth <level> <type,..> Set channel authentication types > level = CALLBACK, USER, OPERATOR, ADMIN > type = NONE, MD2, MD5, PASSWORD, OEM > ipsrc <source> Set IP Address source > none = unspecified source > static = address manually configured to be static > dhcp = address obtained by BMC running DHCP > bios = address loaded by BIOS or system software > cipher_privs XXXXXXXXXXXXXXX Set RMCP+ cipher suite privilege levels > X = Cipher Suite Unused > c = CALLBACK > u = USER > o = OPERATOR > a = ADMIN > O = OEMReceived on Thu Aug 22 14:30:37 2013
This archive was generated by hypermail 2.1.8 : Wed Mar 23 2016 - 09:24:59 EDT