Supermicro IPMI Firmware Konsolen-Update am Beispiel eines X9DRW Boards
IPMI Firmware Download von Supermicro:
https://www.supermicro.com/support/bios/firmware.aspx
https://www.supermicro.com/about/policies/disclaimer.cfm?SoftwareItemID=2959
Auf dem Host muss das ipmitool installiert sein (hier Proxmox 5.4), falls IPMI zurück gesetzt werden muss.
apt-get install ipmitool
Via scp auf den Proxmox Server kopieren. Auf dem Host geht es weiter:
root@pvecn1:~# unzip IPMI_SMM_X9_2_59.zip Archive: IPMI_SMM_X9_2_59.zip inflating: SMM_X9_2_59.ima inflating: RKCSFlsh2.5.zip inflating: RLinFlsh2.9.zip inflating: RWinFlsh2.9.zip inflating: SMM_IPMI_AA.pdf root@pvecn1:~# unzip RLinFlsh2.9.zip Archive: RLinFlsh2.9.zip creating: Linux_x86_32/ creating: Linux_x86_64/ inflating: Linux_x86_32/RLin32Flsh inflating: Linux_x86_32/libipmi.so.1 inflating: Linux_x86_64/RLin64Flsh inflating: Linux_x86_64/libipmi.so.1 root@pvecn1:~# cd Linux_x86_64 root@pvecn1:~/Linux_x86_64# ls -la total 306 drwxr-xr-x 2 root root 4 Dec 13 2011 . drwx------ 10 root root 25 Jun 4 15:28 .. -rwxr-xr-x 1 root root 482447 Dec 12 2011 libipmi.so.1 -rwxr-xr-x 1 root root 70528 Dec 13 2011 RLin64Flsh root@pvecn1:~/Linux_x86_64# export LD_LIBRARY_PATH=. root@pvecn1:~/Linux_x86_64# ./RLin64Flsh -nw -ip XXX.XXX.XXX.XXX -u ADMIN -p [SUPERGEHEIMES_PASSWORT] ../SMM_X9_2_59.ima ------------------------------------------------- YAFUFlash - Firmware Upgrade Utility (Version 2.9) ------------------------------------------------- (C)Copyright 2008, American Megatrends Inc. Creating IPMI session via network with address 172.20.24.73...Done UBOOT Versions is different Updating of UBOOT is recommended So,Type (Y/y) to Update UBOOT or (N/n) to Skip Enter your Option : Y **************************************************************************** WARNING! FIRMWARE UPGRADE MUST NOT BE INTERRUPTED ONCE IT IS STARTED. PLEASE DO NOT USE THIS FLASH TOOL FROM THE REDIRECTION CONSOLE. **************************************************************************** Preserving Env Variables... done Uploading Firmware Image : 100%... done Flashing Firmware Image : 100%... done Verifying Firmware Image : 100%... done Setting Env variables ... done Resetting the firmware.......... root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 ipsrc static root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 ipaddr XXX.XXX.XXX.XXX Setting LAN IP Address to XXX.XXX.XXX.XXX root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 netmask 255.255.255.0 Setting LAN Subnet Mask to 255.255.255.0 root@pvecn3:~/Linux_x86_64# ipmitool lan set 1 defgw ipaddr XXX.XXX.XXX.XXX Setting LAN Default Gateway IP to 172.20.24.1 root@pvecn3:~/Linux_x86_64# ipmitool mc reset cold
Falls vom letzten Setup noch ein Chassis Intrusion Detection ansteht, kann dieser zurück gesetzt werden:
root@pvecn1:~/Linux_x86_64# ipmitool raw 0x30 0x03
Für den Fall, dass das Passwort zurück gesetzt werden muss, macht man einen Factory Reset:
root@pvecn1:~# wget ftp://ftp.supermicro.com/utility/IPMICFG/IPMICFG_1.29.0_build.181029.zip root@pvecn1:~# unzip IPMICFG_1.29.0_build.181029.zip root@pvecn1:~ cd IPMICFG_1.29.0_build.181029/Linux/64bit# ./IPMICFG-Linux.x86_64 -fd