When you deal with Supermicro IPMI/BMC, you could access it via:
- HTTP(S) in your browser - seeing web pages with sensors/configs and java applet to run redirection console
- IPMI protocol (using
ipmitool
-like CLI orIPMIView
-like GUI apps)
Once I discovered I could just ssh [email protected]
and get into the BMC - there is Linux-like shell, ifconfig
(not with server's, but with BMC's network settings), and - the greatest thing! - ability to tape reboot
to reset BMC when IPMI starts glitching.
But now, having access to numerous Supermicro boxes with IPMI, I discover that SSH access works differently: about a half of boxes runs "normal" shell on IPMI's 22 port, other runs the "ATEN SMASH-CLP System Management Shell". It is not Linux-like, not supports standard commands like ls
, and I can't reset BMC with it.
Google mainly says of SMASH-CLP in source-of-security-breaches way. Is there any user documentation for it? Or could I make my IPMI/BMC run "normal" shell via SSH, not SMASH-CLP?
I deal with X9DRW-iF, X9DRi-F and X9SCL-F motherboards.
On all my Super Micro BMCs there is a hidden SMASH command to drop out of the default environment and into a BusyBox shell.
Try typing "shell sh" in the SMASH shell and see if that works.
Say I wish to use server A to reach the IPMI interface of server B, then this works for me: