fmadio / public

fmadio issue tracking
MIT License
8 stars 3 forks source link

BMC Update #345

Closed fmadio closed 2 years ago

fmadio commented 3 years ago

Step 1) Save FRU information


fmadio@fmadio20v2-149:/opt/fmadio/firmware/bmc$ sudo ipmitool fru  read 0 fru.bak
Fru Size         : 192 bytes
Done
fmadio@fmadio20v2-149:/opt/fmadio/firmware/bmc$

Save it to disk

fmadio@fmadio20v2-149:/opt/fmadio/firmware/bmc$ cp fru.bak  /mnt/store0/tmp2/
fmadio@fmadio20v2-149:/opt/fmadio/firmware/bmc$

Step 2) Flash


fmadio@fmadio100v2-228U:/opt/fmadio/firmware/bmc$ sudo ./NR_flashall64.sh
chmod: gigaflash_x64: Read-only file system
chmod: socflash_x64: Read-only file system
gigaflash v1.6.3
Loading Firmware...
****************************************
* When update finish, unplug AC cable. *
****************************************
Update Firmware
Update finished.
Please unplug AC cable.
fmadio@fmadio100v2-228U:/opt/fmadio/firmware/bmc$
fmadio commented 3 years ago

Step 3)

take about 5-15 minutes after power cables disconnected before the Management port is back up


fmadio@fmadio100v2-228U:~$ sudo ipmitool bmc info
Device ID                 : 32
Device Revision           : 1
Firmware Revision         : 12.41
IPMI Version              : 2.0
Manufacturer ID           : 15370
Manufacturer Name         : Unknown (0x3C0A)
Product ID                : 308 (0x0134)
Product Name              : Unknown (0x134)
Device Available          : yes
Provides Device SDRs      : yes
Additional Device Support :
    Sensor Device
    SDR Repository Device
    SEL Device
    FRU Inventory Device
    IPMB Event Receiver
    IPMB Event Generator
    Chassis Device
Aux Firmware Rev Info     :
    0x0d
    0x00
    0x00
    0x00

By default it uses DHCP host setting (if FRU info is saves maybe different)


fmadio@fmadio100v2-228U:~$ sudo ipmitool lan print
Set in Progress         : Set Complete
Auth Type Support       : NONE MD2 MD5 PASSWORD OEM
Auth Type Enable        : Callback : MD5
                        : User     : MD5
                        : Operator : MD5
                        : Admin    : MD5
                        : OEM      : MD5
IP Address Source       : DHCP Address
IP Address              : 192.168.2.102
Subnet Mask             : 255.255.255.0
MAC Address             : e0:d5:5e:5d:21:56
SNMP Community String   : AMI
IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
BMC ARP Control         : ARP Responses Enabled, Gratuitous ARP Disabled
Gratituous ARP Intrvl   : 1.0 seconds
Default Gateway IP      : 192.168.2.254
Default Gateway MAC     : 10:da:43:c8:03:ac
Backup Gateway IP       : 0.0.0.0
Backup Gateway MAC      : 00:00:00:00:00:00
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites     : 0,1,2,3,6,7,8,11,12,15,16,17
Cipher Suite Priv Max   : caaaaaaaaaaaXXX
                        :     X=Cipher Suite Unused
                        :     c=CALLBACK
                        :     u=USER
                        :     o=OPERATOR
                        :     a=ADMIN
                        :     O=OEM
Bad Password Threshold  : 0
Invalid password disable: no
Attempt Count Reset Int.: 0
User Lockout Interval   : 0
fmadio@fmadio100v2-228U:~$
fmadio commented 3 years ago

Step 4) restore LAN info

set the BMC lan

edit: need to statically set it first


fmadio@fmadio100v2-228U:~$ sudo ipmitool lan set 1

usage: lan set <channel> <command> <parameter>

LAN set command/parameter options:
  ipaddr <x.x.x.x>               Set channel IP address
  netmask <x.x.x.x>              Set channel IP netmask
  macaddr <x:x:x:x:x:x>          Set channel MAC address
  defgw ipaddr <x.x.x.x>         Set default gateway IP address
  defgw macaddr <x:x:x:x:x:x>    Set default gateway MAC address
  bakgw ipaddr <x.x.x.x>         Set backup gateway IP address
  bakgw macaddr <x:x:x:x:x:x>    Set backup gateway MAC address
  password <password>            Set session password for this channel
  snmp <community string>        Set SNMP public community string
  user                           Enable default user for this channel
  access <on|off>                Enable or disable access to this channel
  alert <on|off>                 Enable or disable PEF alerting for this channel
  arp respond <on|off>           Enable or disable BMC ARP responding
  arp generate <on|off>          Enable or disable BMC gratuitous ARP generation
  arp interval <seconds>         Set gratuitous ARP generation interval
  vlan id <off|<id>>             Disable or enable VLAN and set ID (1-4094)
  vlan priority <priority>       Set vlan priority (0-7)
  auth <level> <type,..>         Set channel authentication types
    level  = CALLBACK, USER, OPERATOR, ADMIN
    type   = NONE, MD2, MD5, PASSWORD, OEM
  ipsrc <source>                 Set IP Address source
    none   = unspecified source
    static = address manually configured to be static
    dhcp   = address obtained by BMC running DHCP
    bios   = address loaded by BIOS or system software
  cipher_privs XXXXXXXXXXXXXXX   Set RMCP+ cipher suite privilege levels
    X = Cipher Suite Unused
    c = CALLBACK
    u = USER
    o = OPERATOR
    a = ADMIN
    O = OEM

  bad_pass_thresh <thresh_num> <1|0> <reset_interval> <lockout_interval>
                                Set bad password threshold

fmadio@fmadio100v2-228U:~$ sudo ipmitool lan set 1 ipsrc static

fmadio@fmadio100v2-228U:~$ sudo ipmitool lan set 1  ipaddr 192.168.2.173
Setting LAN IP Address to 192.168.2.173

fmadio@fmadio100v2-228U:~$ sudo ipmitool lan set 1 netmask 255.255.255.0
Setting LAN Subnet Mask to 255.255.255.0

fmadio@fmadio100v2-228U:~$ sudo ipmitool lan set 1 defgw ipaddr 192.168.2.254
Setting LAN Default Gateway IP to 192.168.2.254

fmadio@fmadio100v2-228U:~$ sudo ipmitool lan print
Set in Progress         : Set Complete
Auth Type Support       : NONE MD2 MD5 PASSWORD OEM
Auth Type Enable        : Callback : MD5
                        : User     : MD5
                        : Operator : MD5
                        : Admin    : MD5
                        : OEM      : MD5
IP Address Source       : Static Address
IP Address              : 192.168.2.173
Subnet Mask             : 255.255.255.0
MAC Address             : e0:d5:5e:5d:21:56
SNMP Community String   : AMI
IP Header               : TTL=0x40 Flags=0x40 Precedence=0x00 TOS=0x10
BMC ARP Control         : ARP Responses Enabled, Gratuitous ARP Disabled
Gratituous ARP Intrvl   : 1.0 seconds
Default Gateway IP      : 192.168.2.254
Default Gateway MAC     : 10:da:43:c8:03:ac
Backup Gateway IP       : 0.0.0.0
Backup Gateway MAC      : 00:00:00:00:00:00
802.1q VLAN ID          : Disabled
802.1q VLAN Priority    : 0
RMCP+ Cipher Suites     : 0,1,2,3,6,7,8,11,12,15,16,17
Cipher Suite Priv Max   : caaaaaaaaaaaXXX
                        :     X=Cipher Suite Unused
                        :     c=CALLBACK
                        :     u=USER
                        :     o=OPERATOR
                        :     a=ADMIN
                        :     O=OEM
Bad Password Threshold  : 0
Invalid password disable: no
Attempt Count Reset Int.: 0
User Lockout Interval   : 0
fmadio@fmadio100v2-228U:~$
fmadio commented 3 years ago

Step 5)

use BMC web interface to set the password

default admin:password

Probably best to do a webex/zoom/nexi walk you thru this

bmc -> settings -> fan profile ( need to create a new one with the following settings)

image

fmadio commented 3 years ago

Step 6) restore FRU

fmadio@fmadio20v2-149:/opt/fmadio/firmware/bmc$ sudo ipmitool fru  write 0 fru.bak
Fru Size         : 192 bytes
Size to Write    : 192 bytes
fmadio@fmadio20v2-149:/opt/fmadio/firmware/bmc$