IPMI Firmware Download von Supermicro:
https://www.supermicro.com/support/bios/firmware.aspx
https://www.supermicro.com/about/policies/disclaimer.cfm?SoftwareItemID=2959
Auf dem Host muss das ipmitool installiert sein (hier Proxmox 5.4), falls IPMI zurück gesetzt werden muss.
apt-get install ipmitool
Via scp auf den Proxmox Server kopieren. Auf dem Host geht es weiter:
root@pvecn1:~# unzip IPMI_SMM_X9_2_59.zip
Archive: IPMI_SMM_X9_2_59.zip
inflating: SMM_X9_2_59.ima
inflating: RKCSFlsh2.5.zip
inflating: RLinFlsh2.9.zip
inflating: RWinFlsh2.9.zip
inflating: SMM_IPMI_AA.pdf
root@pvecn1:~# unzip RLinFlsh2.9.zip
Archive: RLinFlsh2.9.zip
creating: Linux_x86_32/
creating: Linux_x86_64/
inflating: Linux_x86_32/RLin32Flsh
inflating: Linux_x86_32/libipmi.so.1
inflating: Linux_x86_64/RLin64Flsh
inflating: Linux_x86_64/libipmi.so.1
root@pvecn1:~# cd Linux_x86_64
root@pvecn1:~/Linux_x86_64# ls -la
total 306
drwxr-xr-x 2 root root 4 Dec 13 2011 .
drwx------ 10 root root 25 Jun 4 15:28 ..
-rwxr-xr-x 1 root root 482447 Dec 12 2011 libipmi.so.1
-rwxr-xr-x 1 root root 70528 Dec 13 2011 RLin64Flsh
root@pvecn1:~/Linux_x86_64# export LD_LIBRARY_PATH=.
root@pvecn1:~/Linux_x86_64# ./RLin64Flsh -nw -ip XXX.XXX.XXX.XXX -u ADMIN -p [SUPERGEHEIMES_PASSWORT] ../SMM_X9_2_59.ima
-------------------------------------------------
YAFUFlash - Firmware Upgrade Utility (Version 2.9)
-------------------------------------------------
(C)Copyright 2008, American Megatrends Inc.
Creating IPMI session via network with address 172.20.24.73...Done
UBOOT Versions is different Updating of UBOOT is recommended
So,Type (Y/y) to Update UBOOT
or (N/n) to Skip
Enter your Option : Y
****************************************************************************
WARNING!
FIRMWARE UPGRADE MUST NOT BE INTERRUPTED ONCE IT IS STARTED.
PLEASE DO NOT USE THIS FLASH TOOL FROM THE REDIRECTION CONSOLE.
****************************************************************************
Preserving Env Variables... done
Uploading Firmware Image : 100%... done
Flashing Firmware Image : 100%... done
Verifying Firmware Image : 100%... done
Setting Env variables ... done
Resetting the firmware..........
root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 ipsrc static
root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 ipaddr XXX.XXX.XXX.XXX
Setting LAN IP Address to XXX.XXX.XXX.XXX
root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 netmask 255.255.255.0
Setting LAN Subnet Mask to 255.255.255.0
root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 defgw ipaddr XXX.XXX.XXX.XXX
Setting LAN Default Gateway IP to 172.20.24.1
root@pvecn3:~/Linux_x86_64# ipmitool mc reset cold
Falls vom letzten Setup noch ein Chassis Intrusion Detection ansteht, kann dieser zurück gesetzt werden:
root@pvecn1:~/Linux_x86_64# ipmitool raw 0x30 0x03
Für den Fall, dass das Passwort zurück gesetzt werden muss, macht man einen Factory Reset:
root@pvecn1:~# wget ftp://ftp.supermicro.com/utility/IPMICFG/IPMICFG_1.29.0_build.181029.zip root@pvecn1:~# unzip IPMICFG_1.29.0_build.181029.zip root@pvecn1:~ cd IPMICFG_1.29.0_build.181029/Linux/64bit# ./IPMICFG-Linux.x86_64 -fd

0 Kommentare