When you deal with Supermicro IPMI/BMC, you could access it via:
- HTTP(S) in your browser - seeing web pages with sensors/configs and java applet to run redirection console
- IPMI protocol (using
ipmitool
-like CLI orIPMIView
-like GUI apps)
Once I discovered I could just ssh ADMIN@my.ipmi.address.net
and get into the BMC - there is Linux-like shell, ifconfig
(not with server's, but with BMC's network settings), and - the greatest thing! - ability to tape reboot
to reset BMC when IPMI starts glitching.
But now, having access to numerous Supermicro boxes with IPMI, I discover that SSH access works differently: about a half of boxes runs "normal" shell on IPMI's 22 port, other runs the "ATEN SMASH-CLP System Management Shell". It is not Linux-like, not supports standard commands like ls
, and I can't reset BMC with it.
Google mainly says of SMASH-CLP in source-of-security-breaches way. Is there any user documentation for it? Or could I make my IPMI/BMC run "normal" shell via SSH, not SMASH-CLP?
I deal with X9DRW-iF, X9DRi-F and X9SCL-F motherboards.