Description of problem: fence_ilo2 seems working for HP iLO2 blades However fence_ilo3 or fence_ilo4 does not work respectively for HP iLO3 or iLO4 blades. Version-Release number of selected component (if applicable):3.1.5 How reproducible: consistent, issue is hard-on Steps to Reproduce: 1./usr/sbin/fence_ilo3 -a <ilo3 ip addr> -l Administrator -p <password> -P lanplus -C 0 status 2. 3. Actual results: ################### ipmilan: Failed to connect after 20 seconds ipmilan: Failed to connect after 20 seconds Failed ################## Expected results: Success I also ran with the verbose option and below is the output of it: /usr/sbin/fence_ilo3 -a 10.41.127.77 -P lanplus -l Administrator -p r3motehelp -C 0 -vvv status Various options like -C 1, -C 2, -C 3 were tried too. On the iLO i see in the encryption section in the security option,the below: Current cipher RSA_With3DES_EDE_CBC_SHA output of fence_ilo3 command with very verbose output ################# Rebooting machine @ IPMI:10.41.127.77...Spawning: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power status'... Spawned: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power status' - PID 32008 Looking for: 'Password:', val = 1 'Unable to establish LAN', val = 11 'IPMI mutex', val = 14 'Unsupported cipher suite ID', val = 2048 'read_rakp2_message: no support for', val = 2048 'Chassis Power is off', val = 4096 'Chassis Power is on', val = 8192 ExpectToken returned -1 ExpectToken failed. Info returned: >>>>> >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 Get Auth Capabilities error Error issuing Get Channel Authentication Capabilies request Error: Unable to establish IPMI v2 / RMCP+ session <<<<< Error = 2 (No such file or directory) Reaping pid 32008 Spawning: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power cycle'... Spawned: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v chassis power cycle' - PID 32022 Looking for: 'Password:', val = 1 'Unable to establish LAN', val = 11 'IPMI mutex', val = 14 'Unsupported cipher suite ID', val = 2048 'read_rakp2_message: no support for', val = 2048 'Command not supported in present state', val = 16384 ': Cycle', val = 0 ExpectToken returned -1 ExpectToken failed. Info returned: >>>>> >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 Get Auth Capabilities error Error issuing Get Channel Authentication Capabilies request Error: Unable to establish IPMI v2 / RMCP+ session <<<<< Error = 2 (No such file or directory) Reaping pid 32022 Failed ####################### Additional info: similar command executed for HP iLO2 blade works well. # /usr/sbin/fence_ilo2 -a <ilo2 ip addr> -l Administrator -p <password> status Success: Rebooted
@Murali: It looks like a problem on IPMI level. So, let's start with 'status' operation. First issue (not too relevant) in all of your examples you are trying to reboot a machine. If you want that then 'status' at the end is irrelevant. In other case, add -o/--action before status. Which firmware do you have? Can you open connection to iLO (port 623) or it is blocked by firewall? my output with firmware 1.1.15 * /usr/bin/ipmitool -v -I lanplus -H hp-dl580g7-01-ilo.rhts.eng.nay.redhat.com -U Administrator -P XXX -L ADMINISTRATOR chassis power status Running Get PICMG Properties my_addr 0x20, transit 0, target 0x20 Error Response 0xc1 from Get PICMG Properities No PICMG Extenstion discovered Chassis Power is on --- There is no connection between fence_ilo2 and fence_ilo3/4 as communication with them is based on different protocols.
Thanks Marek for your response. Here are the responses for the commands that I ran same as yours. The "-l" option in my case, does not work, since it relates to "lun". If you need the output of my "ipmitool --help", Please let me know. ######################### #/usr/bin/ipmitool -v -I lanplus -H <ip addr> -U Administrator -P <password> -L ADMINISTRATOR chassis power status Get Auth Capabilities error Error issuing Get Channel Authentication Capabilies request Error: Unable to establish IPMI v2 / RMCP+ session # /usr/bin/ipmitool -V ipmitool version 1.8.14 My iLO ver is 1.80 and there is no firewall blocking the port 623. The nmap runs are captured below for reference. Also it was verified that "Enable IPMI/DCMI over LAN on Port 623" is checked in the iLO that I am trying to send the command against: ################# # nmap -sU <iLO3 ip addr> -p 623 Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:10 EDT Nmap scan report for sinkerr.kdc.capitalone.com (<ip addr>) Host is up (0.0035s latency). PORT STATE SERVICE 623/udp open|filtered asf-rmcp Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds # nmap -sT <iLO3 ip addr> -p 623 Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:11 EDT Nmap scan report for sinkerr.kdc.capitalone.com (<ip adddr>) Host is up (0.0018s latency). PORT STATE SERVICE 623/tcp filtered oob-ws-http Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds ################### (In reply to Murali from comment #0) > Description of problem: fence_ilo2 seems working for HP iLO2 blades However > fence_ilo3 or fence_ilo4 does not work respectively for HP iLO3 or iLO4 > blades. Version-Release number of selected component (if applicable):3.1.5 > How reproducible: consistent, issue is hard-on Steps to Reproduce: > 1./usr/sbin/fence_ilo3 -a <ilo3 ip addr> -l Administrator -p <password> -P > lanplus -C 0 status 2. 3. Actual results: ################### ipmilan: > Failed to connect after 20 seconds ipmilan: Failed to connect after 20 > seconds Failed ################## Expected results: Success I also ran > with the verbose option and below is the output of it: /usr/sbin/fence_ilo3 > -a 10.41.127.77 -P lanplus -l Administrator -p r3motehelp -C 0 -vvv status > Various options like -C 1, -C 2, -C 3 were tried too. On the iLO i see in > the encryption section in the security option,the below: Current cipher > RSA_With3DES_EDE_CBC_SHA output of fence_ilo3 command with very verbose > output ################# Rebooting machine @ IPMI:10.41.127.77...Spawning: > '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P > '[set]' -v -v -v chassis power status'... Spawned: '/usr/bin/ipmitool -I > lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P '[set]' -v -v -v > chassis power status' - PID 32008 Looking for: 'Password:', val = 1 > 'Unable to establish LAN', val = 11 'IPMI mutex', val = 14 > 'Unsupported cipher suite ID', val = 2048 'read_rakp2_message: no > support for', val = 2048 'Chassis Power is off', val = 4096 'Chassis > Power is on', val = 8192 ExpectToken returned -1 ExpectToken failed. Info > returned: >>>>> >> Sending IPMI command payload >> netfn : 0x06 >> > command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI > Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 > >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr > : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq > Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI > command payload >> netfn : 0x06 >> command : 0x38 >> data : > 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> > Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 > >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> > Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 > >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 > >> command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> > IPMI Request Session Header >> Authtype : NONE >> Authtype : NONE >> > Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message > Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq > Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 > >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> > data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header > >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : > 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn > : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq > Lun : 0 >> Command : 38 >> Sending IPMI command payload >> > netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A > v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> > Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message > Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq > Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 > >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> > data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header > >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : > 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn > : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq > Lun : 0 >> Command : 38 >> Sending IPMI command payload >> > netfn : 0x06 >> command : 0x38 >> data : 0x0e 0x04 BUILDING A > v1.5 COMMAND >> IPMI Request Session Header >> Authtype : NONE >> > Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message > Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq > Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 > >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> > data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header > >> Authtype : NONE >> Sequence : 0x00000000 >> Session ID : > 0x00000000 >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn > : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq > Lun : 0 >> Command : 38 Get Auth Capabilities error Error issuing > Get Channel Authentication Capabilies request Error: Unable to establish > IPMI v2 / RMCP+ session <<<<< Error = 2 (No such file or directory) Reaping > pid 32008 Spawning: '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U > 'Administrator' -C 0 -P '[set]' -v -v -v chassis power cycle'... Spawned: > '/usr/bin/ipmitool -I lanplus -H '10.41.127.77' -U 'Administrator' -C 0 -P > '[set]' -v -v -v chassis power cycle' - PID 32022 Looking for: > 'Password:', val = 1 'Unable to establish LAN', val = 11 'IPMI > mutex', val = 14 'Unsupported cipher suite ID', val = 2048 > 'read_rakp2_message: no support for', val = 2048 'Command not supported > in present state', val = 16384 ': Cycle', val = 0 ExpectToken returned > -1 ExpectToken failed. Info returned: >>>>> >> Sending IPMI command > payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 > BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> Authtype : > NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 >> IPMI > Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> Rs LUN > : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 >> > Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> > command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI > Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 > >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr > : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq > Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI > command payload >> netfn : 0x06 >> command : 0x38 >> data : > 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> > Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 > >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> > Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 > >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 >> > command : 0x38 >> data : 0x8e 0x04 BUILDING A v1.5 COMMAND >> IPMI > Request Session Header >> Authtype : NONE >> Sequence : 0x00000000 > >> Session ID : 0x00000000 >> IPMI Request Message Header >> Rs Addr > : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : 81 >> Rq > Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending IPMI > command payload >> netfn : 0x06 >> command : 0x38 >> data : > 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> > Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 > >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> > Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 > >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 > >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> > IPMI Request Session Header >> Authtype : NONE >> Sequence : > 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> > Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : > 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 >> Sending > IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data > : 0x0e 0x04 BUILDING A v1.5 COMMAND >> IPMI Request Session Header >> > Authtype : NONE >> Sequence : 0x00000000 >> Session ID : 0x00000000 > >> IPMI Request Message Header >> Rs Addr : 20 >> NetFn : 06 >> > Rs LUN : 0 >> Rq Addr : 81 >> Rq Seq : 00 >> Rq Lun : 0 > >> Command : 38 >> Sending IPMI command payload >> netfn : 0x06 > >> command : 0x38 >> data : 0x0e 0x04 BUILDING A v1.5 COMMAND >> > IPMI Request Session Header >> Authtype : NONE >> Sequence : > 0x00000000 >> Session ID : 0x00000000 >> IPMI Request Message Header >> > Rs Addr : 20 >> NetFn : 06 >> Rs LUN : 0 >> Rq Addr : > 81 >> Rq Seq : 00 >> Rq Lun : 0 >> Command : 38 Get Auth > Capabilities error Error issuing Get Channel Authentication Capabilies > request Error: Unable to establish IPMI v2 / RMCP+ session <<<<< Error = 2 > (No such file or directory) Reaping pid 32022 Failed ####################### > Additional info: similar command executed for HP iLO2 blade works well. # > /usr/sbin/fence_ilo2 -a <ilo2 ip addr> -l Administrator -p <password> status > Success: Rebooted
Thanks Marek for your response. Here are the responses for the commands that I ran same as yours. The "-l" option in my case, does not work, since it relates to "lun". If you need the output of my "ipmitool --help", Please let me know. ######################### #/usr/bin/ipmitool -v -I lanplus -H <ip addr> -U Administrator -P <password> -L ADMINISTRATOR chassis power status Get Auth Capabilities error Error issuing Get Channel Authentication Capabilies request Error: Unable to establish IPMI v2 / RMCP+ session # /usr/bin/ipmitool -V ipmitool version 1.8.14 My iLO ver is 1.80 and there is no firewall blocking the port 623. The nmap runs are captured below for reference. Also it was verified that "Enable IPMI/DCMI over LAN on Port 623" is checked in the iLO that I am trying to send the command against: ################# # nmap -sU <iLO3 ip addr> -p 623 Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:10 EDT Nmap scan report for sinkerr.kdc.capitalone.com (<ip addr>) Host is up (0.0035s latency). PORT STATE SERVICE 623/udp open|filtered asf-rmcp Nmap done: 1 IP address (1 host up) scanned in 0.35 seconds # nmap -sT <iLO3 ip addr> -p 623 Starting Nmap 5.51 ( http://nmap.org ) at 2015-03-12 09:11 EDT Nmap scan report for sinkerr.kdc.capitalone.com (<ip adddr>) Host is up (0.0018s latency). PORT STATE SERVICE 623/tcp filtered oob-ws-http Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds ###################
@Murali: I don't have a firmware 1.80 installed yet but as you have mentioned blades. Can you take a look it there is not other fence agent that could work. There is fence_hpblade (connect to chassis) and fence_ilo_ssh/ilo_mp/ilo_moonshot that might work too.
This can be closed. The issue has been traced to a firewall block in our environment. Both iLO3 and iLO4 worked using the ipmiutil.