Fact-checked by Grok 2 weeks ago

Intelligent Platform Management Interface

The Intelligent Platform Management Interface (IPMI) is an open-standard, hardware-level interface specification that defines a set of computer interface protocols for an autonomous subsystem enabling management and monitoring of platform hardware independent of the host system's CPU, firmware (such as or ), and operating system. This approach allows for remote access, control, and diagnostics even when the main system is powered off, unresponsive, or lacking an operational OS. IPMI facilitates essential functions such as monitoring system health through sensors for temperature, voltage, fan speeds, and power supply status; logging events in a System Event Log (SEL); inventorying hardware via (FRU) information; and enabling recovery actions like , resets, or alerts via or SNMP. It supports multiple communication channels, including local buses like the Intelligent Platform Management Bus (IPMB), serial/modems, and notably LAN for remote management over networks, reducing the need for physical intervention in data centers and enterprise environments. At its core, IPMI relies on a Baseboard Management Controller (BMC), a dedicated on the that handles these operations autonomously. Developed collaboratively by , , , and , IPMI version 1.0 was first released on September 16, 1998, as a message-based to standardize across vendors. Version 1.5, published February 21, 2001, introduced IPMI over and / support for broader remote access. The current standard, version 2.0 (released February 12, 2004, with revisions up to 1.1 in 2013), added enhanced security features like RMCP+ , support, stronger authentication (e.g., HMAC-SHA1), and Serial-over- (SOL) for console redirection, while maintaining .

Overview

Definition and Purpose

The Intelligent Platform Management Interface (IPMI) is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities independent of the host system's operating system, , or firmware. Developed by the IPMI Forum—a led by , , , and —IPMI standardizes hardware-level interfaces to ensure across platforms for enterprise and environments. The primary purposes of IPMI include remote monitoring of physical variables such as , voltage levels, and speeds through integrated sensors, as well as to record conditions, out-of-range thresholds, and anomalies in a dedicated log for analysis. It also supports control actions like , resets, and updates, all executed without dependence on the main or operating , thereby enabling proactive and diagnostics. Key benefits of IPMI encompass pre-boot for configuring system states prior to operating system loading, failure recovery through automated resets and diagnostics, and to enhance and in high-availability setups. Unlike in-band , which relies on the active operating system and its network infrastructure, IPMI emphasizes via dedicated channels such as local area networks or connections, allowing access even when the host is powered off or unresponsive; this is typically orchestrated by a baseboard controller as the core subsystem component.

Development History

The Intelligent Platform Management Interface (IPMI) originated in 1998 through a collaborative effort by Corporation, Company, Corporation, and Computer Corporation, who announced the availability of the IPMI v1.0 specifications on September 16 at the Intel Developer Forum. This initiative addressed the growing demands of data centers for reliable remote server management, particularly the limitations of in-band tools like SNMP, which require the operating system to be operational and thus fail to monitor hardware issues during system crashes or shutdowns. The goal was to establish vendor-neutral, open specifications enabling access to platform management functions, such as monitoring temperature, voltage, and fans, to predict hardware failures, improve diagnostics, and reduce through across diverse systems. Version 1.5, released in February 2001, introduced support for IPMI over LAN, expanding remote management capabilities. By the early 2000s, the IPMI standards had gained widespread adoption, with support from over 200 vendors ensuring broad interoperability in server ecosystems. Notable participants included Cisco Systems and Supermicro Computer, which integrated IPMI into their hardware offerings, expanding its application beyond initial promoters to encompass a diverse range of enterprise and data center equipment. This growth reflected the forum's success in fostering a collaborative environment for ongoing refinements, culminating in subsequent specification releases that built on the foundational v1.0 framework. No major specification changes occurred after , though errata updates continued to address minor issues, such as parameter numbering in configurations. IPMI has since been complemented by DMTF's standard, which provides a RESTful for scalable and serves as a modern successor to legacy interfaces like IPMI.

Core Functionality

Monitoring Capabilities

The Intelligent Platform Management Interface (IPMI) provides comprehensive monitoring capabilities through a standardized set of devices that track critical parameters in , independent of the host operating . These s monitor parameters such as temperature thresholds, including CPU hotspots; voltage levels; fan speeds in (RPM); status; and chassis intrusion detection. data is abstracted and accessible via commands like Get Sensor Reading, allowing for threshold-based alerts when parameters exceed predefined limits, such as overheating or voltage instability. A key component of IPMI monitoring is the System Event Log (SEL), a non-volatile storage repository managed by the baseboard management controller (BMC) that records system events with detailed . The SEL stores events such as overheat alerts and memory errors, each entry including a 32-bit timestamp (seconds since January 1, 1970), severity levels, and sensor-specific details for analysis. Events are retrieved using commands like Get SEL Entry or Read Event Message Buffer, supporting capacities of approximately 3-8 with unique record IDs to track the sequence and progression of issues. IPMI supports monitoring through both periodic polling and asynchronous event generation to ensure timely detection of anomalies. Periodic polling involves querying sensors at regular intervals using the Get Sensor Reading command, leveraging Sensor Data Records (SDRs) for configuration details like thresholds and units. Asynchronous events are generated proactively via Platform Event Messages (PETs) or System Event Messages (SEMs), which are queued in the Event Message Buffer or delivered over the Intelligent Platform Management Bus (IPMB) to notify remote managers without constant polling overhead. The specification defines up to 255 distinct types, encompassing both states—such as power-on/off transitions or presses—and analog readings like continuous or voltage values, which include formulas for accurate interpretation. These types are cataloged in the SDR , enabling flexible filtering and to field-replaceable units (FRUs) for precise diagnostics. For instance, sensors might report states like chassis intrusion, while analog ones provide numeric data with to avoid flooding.

Management Operations

The Intelligent Platform Management Interface (IPMI) provides a of remote operations that enable administrators to control and configure server systems without direct physical access, leveraging the baseboard controller (BMC) over interfaces such as or connections. These operations build on collected data, such as event triggers from environmental sensors, to execute automated or manual actions for maintenance and recovery. Key capabilities include , hardware inventory , boot configuration, console access, firmware maintenance, diagnostics, and chassis-level adjustments, all standardized through defined network functions (NetFNs) and commands to ensure across implementations. Remote power management in IPMI allows for precise of system power states, including powering on, powering off, resetting, or initiating graceful shutdowns, which is essential for remote rebooting or recovery in data centers. This is achieved via the NetFN (0x00) with the Chassis Control command (0x02), supporting actions like power down, , power cycle, , diagnostic , and soft shutdown; these can be invoked over terminal modes with commands such as SYS POWER ON or SYS . Additionally, platform event filtering (PEF) integrates power actions—such as power down (action 1), power cycle (2), or (3)—in response to predefined events, enhancing automated reliability without OS dependency. FRU inventory management facilitates the reading and writing of data on field replaceable units (FRUs), such as motherboards, power supplies, or components, to support , serialization, and configuration auditing. Using the Storage NetFN (0x0A), the Get FRU Inventory Area Info command (0x10) retrieves the size and location of FRU data areas, while Read FRU Data (0x11) and Write FRU Data (0x12) enable extraction or modification of structured information like part numbers, serial numbers, and manufacturing dates stored in . This capability extends to private management buses via Master Write-Read commands under the Transport NetFN, allowing comprehensive hardware lifecycle management remotely. Boot device selection and console redirection provide pre-OS remote access akin to keyboard-video-mouse (KVM) functionality, enabling troubleshooting and configuration during system startup. The Chassis NetFN (0x00) with Set System Boot Options command (0x08) configures boot flags to prioritize devices like PXE, HDD, or setup, often set via serial commands like SYS SET BOOT in mode. (SOL) implements console redirection by activating a virtual over the network using the Application NetFN (0x06) with Activate Payload (0x3A, payload type 0x01) and SOL-specific commands like Get SOL Configuration Parameters (Transport NetFN, 0x39), allowing bidirectional text-based access to the system's serial console for diagnostics or OS installation. Firmware updates and diagnostic runs support ongoing system integrity and fault isolation through remote execution. Firmware maintenance involves updating BMC or device firmware via implementation-defined or OEM commands, often under the Application NetFN or using Hot Plug Manager (HPM) extensions, paired with storage operations like entering SDR repository update mode (Storage NetFN, 0x12) and writing sensor data records (0x14) to incorporate new configurations. Diagnostics are triggered using the Application NetFN (0x06) Set command (0x22) for timed interrupts or the Chassis NetFN Chassis (0x02) with the pulse diagnostic interrupt option (0x04), with results queried via Get Self-Test Results (Application NetFN, 0x04); additional tests can use standard commands like Get Self-Test Results for component-level checks. Chassis control operations allow adjustment of physical components, such as speeds, to maintain optimal operating conditions based on predefined s derived from events. Through the NetFN (0x00), commands like Set Power Restore Policy (0x06) or Control (0x02) manage overall chassis state, while speed modifications are typically handled via Sensor NetFN (0x04) Set Sensor (0x25) or settings (0x26) to enable dynamic responses, such as increasing RPM in response to events. PEF configurations further automate these adjustments by linking chassis actions to event filters, ensuring proactive and .

System Components

Baseboard Management Controller

The Baseboard Management Controller (BMC) serves as the for Intelligent Platform Management Interface (IPMI) operations, functioning as a specialized embedded directly on the of a or system. It operates independently of the host (CPU), basic input/output system (), and operating system, relying on its own dedicated processor, firmware, and memory to ensure autonomous management capabilities. This isolation allows the BMC to monitor and control system hardware continuously, even in failure scenarios affecting the primary system components. In processing IPMI commands, the BMC receives requests through various interfaces, including network connections such as (LAN) over (UDP) with (IPv4) or version 6 (IPv6), as well as serial interfaces like keyboard controller style (KCS), system management interface chip (SMIC), block transfer (), or serial/modem. It interfaces directly with system s and actuators to gather data on environmental factors—such as temperatures, voltages, and fan speeds—and to execute control actions, utilizing a sensor model to interpret and respond to these inputs. The BMC then generates appropriate responses, including completion codes, which are routed back via mechanisms like the receive message queue or data output registers, enabling system management software to interact effectively. For internal communication, it may utilize the Intelligent Platform Management Bus (IPMB). The BMC maintains key resource repositories to support its management functions, including Sensor Data Records (SDR) stored in , which contain configurations for sensors such as their types, locations, event thresholds, and system-specific details. Additionally, it stores (FRU) information, providing inventory data like serial numbers, part identifiers, device locations, and access specifications for replaceable components. These repositories are accessible , facilitating remote diagnostics and maintenance without relying on the host system. To enable persistent availability, the BMC operates within a separate power domain, drawing from rails that remain active even when the main system is powered off or in low-power states such as advanced configuration and power interface () S4 or S5. This design supports access for remote monitoring and control, ensuring the BMC can initiate recovery actions like or resets independently of the host's operational status.

Intelligent Platform Management Bus

The Intelligent Platform Management Bus (IPMB) serves as the primary internal communication backbone within an IPMI-managed system, enabling the exchange of management information between the baseboard management controller (BMC) and various satellite controllers. It operates as a multi-drop, two-wire serial bus that connects the BMC—acting as the bus master—to satellite controllers on components such as storage devices, I/O cards, and power supplies, facilitating distributed monitoring and control without relying on the host CPU. IPMB is implemented as a subset of the I²C bus protocol, standardized by Philips (now NXP Semiconductors) and adapted by Intel for platform management, running at a typical speed of 100 kbps to balance reliability and performance in noisy environments. The protocol employs only master write transactions over I²C, where the BMC initiates all communications, ensuring deterministic access in multi-master scenarios. Message framing begins with an IPMB connection header consisting of the target slave address (7-bit, with read/write bit always set to 0), the network function (netFn) and logical unit number (LUN) byte, and an 8-bit checksum, followed by the payload and a second checksum for the entire message. Sequence numbers are incorporated via a 1-byte sequence field in the message header, incremented by the sender for each new request to allow receivers to match responses to specific instances and detect lost or duplicated packets. Checksums use an 8-bit two's complement arithmetic, computed such that the sum of all bytes in the header or message (including the checksum itself) equals zero modulo 256, providing error detection for transmission integrity. Command and response formats are structured with fields for the requester's source address (rqSA), responder's source address (rsSA), LUN, command code, data bytes, and completion code, where requests use even netFn values and responses use the corresponding odd values (e.g., netFn 06h for request becomes 07h for response). The addressing scheme utilizes 7-bit slave addresses, with IPMB reserving specific ranges for intelligent devices—such as 20h for the BMC and 30h–3Fh, B0h–BFh, and D0h–DEh for add-in controllers—allowing configurations that support up to 15 internal nodes per segment to accommodate typical designs. For larger systems, bridging via dedicated bridge controllers (e.g., using address 22h for ICMB interfaces) enables interconnection of multiple IPMB segments through store-and-forward message relaying, where incoming requests are reformatted and retransmitted to the target segment without altering the core . This hierarchical structure supports scalability in multi-node enclosures like blade . IPMB specifications include provisions for extensions, such as private buses attached behind satellite controllers, which allow vendors to implement proprietary -based features for chassis-specific modularity while maintaining compatibility with the standard IPMB protocol on the main segment. These private buses enable non-intelligent devices to coexist without conflicting with IPMI traffic, promoting flexible integration of custom hardware in managed platforms.

Specification Versions

IPMI 1.5

The Intelligent Platform Management Interface (IPMI) version 1.5 specification was released on February 21, 2001, extending the earlier v1.0 standard by introducing serial and LAN interfaces specifically designed for out-of-band access to system monitoring and control functions, independent of the host operating system or main CPU. This version established a foundational framework for remote platform management, supporting interfaces such as the Intelligent Platform Management Bus (IPMB), PCI Management Bus, and serial/modem connections, while supporting compatibility with ACPI power management for enterprise-class servers. A key enhancement in IPMI 1.5 over v1.0 was the addition of the Remote Management Control Protocol (RMCP), which encapsulates IPMI messages within / packets for network-based command transmission, using UDP port 623 for primary communication and enabling pre-OS management scenarios. in this version relies on basic mechanisms, including straight password/key and challenge-response methods, applied per message or at the user level, with support for up to 64 IDs per (implementation-dependent; commonly 16) and configurable privilege levels (, , ). These features facilitated initial remote access without requiring dedicated hardware beyond the baseboard management controller (BMC). Despite these advances, IPMI 1.5 exhibited notable limitations, including weak due to the absence of session or protections in RMCP, making it susceptible to replay attacks and man-in-the-middle interference despite . The specification capped user support at a maximum of 64 per channel (implementation-dependent) and provided only basic platform event filtering (PEF) without advanced capabilities for complex event correlation or . IPMI 1.5 saw widespread adoption in early server platforms from vendors like , , and , serving as the initial standard for standardized remote monitoring and control in data centers before the enhanced security of v2.0.

IPMI 2.0

The Intelligent Platform Management Interface (IPMI) version 2.0 was initially released on June 1, 2004, as the second generation of the specification, building upon the foundational elements of earlier versions to enhance remote management capabilities. It was later revised to version 1.1 on October 1, 2013, with subsequent errata updates issued through April 21, 2015, addressing clarifications, parameter corrections, and implementation guidance without introducing fundamental changes. A key advancement in IPMI 2.0 is the introduction of RMCP+ (Remote Management Control Protocol Plus), which establishes secure, encrypted communication sessions over LAN, replacing the less secure RMCP from prior versions and enabling robust out-of-band management even when the host system is powered off. IPMI 2.0 significantly upgrades authentication mechanisms through the Remote Authenticated Key Exchange () , which supports multiple suites including HMAC-SHA1 for and confidentiality, thereby mitigating risks associated with transmissions in remote access scenarios. This facilitates between the management controller and remote clients, using challenge-response methods to derive session keys without exposing passwords directly over the . Additionally, the specification expands operational features to support multiple simultaneous remote sessions per (implementation-dependent; recommended minimum of 4), allowing multiple administrators to manage the concurrently without . It also incorporates tagging for network isolation and segmentation, enabling IPMI traffic to be confined to specific networks for improved and efficiency. Furthermore, integration with SNMP traps provides standardized alerting mechanisms, where the management controller can send asynchronous notifications to systems for events like hardware failures or threshold breaches. Following the 2015 errata, no major revisions to the IPMI 2.0 core specification have been released, positioning it as the enduring for platform management interfaces as of 2025, with development efforts shifting toward complementary standards such as the Data Center Manageability Interface (DCMI) version 1.1 and .

Security Considerations

Known Vulnerabilities

In 2013, security researchers at Rapid7 identified significant exposure of Baseboard Management Controllers (BMCs) implementing the Intelligent Platform Management Interface (IPMI), revealing over 35,000 IPMI interfaces accessible from the with default credentials such as ADMIN/ADMIN. These weak defaults allowed unauthorized remote access, potentially enabling attackers to execute arbitrary code, reboot systems, or extract sensitive data from the BMC without changes. The IPMI 1.5 specification introduced notable protocol weaknesses over communications, including the transmission of passwords in clear text during user authentication and password changes, which exposed them to by network observers. Additionally, the lack of and session in version 1.5 made it susceptible to replay attacks, where intercepted packets could be reused to impersonate legitimate users and issue unauthorized commands. Common misconfigurations in IPMI deployments have exacerbated risks, particularly leaving UDP port 623 open without firewall protections, which facilitates amplification distributed denial-of-service (DDoS) attacks through IPMI's support for broadcast messages that generate larger response traffic. These broadcasts can overwhelm targets when spoofed with victim IP addresses. Post-2015, vulnerabilities in legacy IPMI systems have persisted, highlighting ongoing risks in unpatched or outdated deployments. For instance, in , a flaw in Cisco's Integrated Management Controller (IMC)—the BMC for Unified Computing System (UCS) servers—allowed unauthenticated remote attackers to execute arbitrary SQL commands via the web , potentially compromising system integrity (CVE-2018-15447). Such incidents underscore the challenges of securing older IPMI implementations amid evolving threats, though addressed some issues like clear-text transmission through enhanced cipher support. More recent vulnerabilities include CVE-2023-28863, disclosed in 2023, which allows attackers with network access to bypass negotiated and in IPMI sessions, potentially enabling unauthorized commands. In 2023, multiple critical flaws in BMC IPMI (e.g., ZDI-23-1200) permitted remote code execution and . The 2024 AMI MegaRAC vulnerability (CVE-2024-54085) enables remote takeover and denial-of-service on affected BMCs. As of 2025, reported additional BMC IPMI issues, including a root-of-trust bypass (CVE-2025-7937) allowing malicious injection. These highlight the continued need for updates and secure configurations.

Specification-Based Mitigations

The IPMI 2.0 specification introduces through defined user privilege levels to mitigate unauthorized access risks. These levels include Callback (privilege 1h), which permits only basic callback initiation for remote session setup; (privilege 2h), restricted to read-only operations such as retrieving sensor data and system event logs without modification capabilities; Operator (privilege 3h), allowing operational tasks like and but excluding configuration changes; and (privilege 4h), granting full access to all commands, including settings and . An optional OEM Proprietary level (privilege 5h) supports vendor-specific extensions. Privilege limits are enforced per and user via commands like Set Channel Access and Set User Access, ensuring the effective privilege is the minimum of the channel limit and user limit, thereby preventing . Encryption in IPMI 2.0 is provided through the RMCP+ protocol, which uses AES-128 in Cipher Block Chaining (CBC) mode for payload confidentiality, derived from a 128-bit Session Integrity Key (SIK) and a per-packet 16-byte initialization vector. This mechanism protects sensitive data, such as user credentials and management commands, during transmission over LAN channels. RMCP+ employs the Remote Authenticated Key-Exchange Protocol (RAKP) with HMAC-SHA1 or HMAC-SHA256 for mutual authentication and integrity, incorporating challenge-response exchanges, session sequence numbers, and a 32-entry sliding window to detect replays, thereby preventing man-in-the-middle attacks by verifying endpoint authenticity and data integrity. Cipher suites, configurable via Get Channel Cipher Suites, support AES-128 alongside other options, with encryption dynamically enabled or suspended per session. Alerting safeguards in the specification include configurable Platform Event Trap (PET) mechanisms for secure notifications, integrated with SNMP traps over UDP port 623, allowing policy-based filtering and multiple destinations with retries and timeouts to ensure reliable delivery without flooding. The System Event Log (SEL) serves as an audit log, autonomously recording events including attempts, thresholds, and security-related incidents with timestamps and generator IDs, supporting commands like Get SEL Entry for retrieval and configurable thresholds for full/nearly full conditions. These features enable auditing of access attempts, such as failed logins from default credentials, to detect potential exploits. Compliance recommendations in IPMI errata emphasize robust , with the Set Channel Security Keys command enabling updates to RMCP+ keys (K_R for remote console and K_G for managed system) and optional locking to prevent further modifications, facilitating periodic rotation for enhanced security. While two-factor is not mandated, the specification's enhanced via pre-shared keys and challenge-response aligns with best practices for multi-layered protection, recommending cryptographically strong, unpredictable random values and full 160-bit keys for one-key logins to maintain integrity against brute-force attacks.

Implementations and Tools

Vendor-Specific Solutions

Major vendors have developed proprietary implementations of the Intelligent Platform Management Interface (IPMI) through integrated baseboard management controllers (BMCs), extending the standard protocol with custom features for enhanced remote management, security, and integration in environments. These solutions build on the core IPMI while adding vendor-specific tools like graphical interfaces, capabilities, and tailored to their ecosystems. Dell's Integrated Dell Remote Access Controller (iDRAC) serves as an embedded BMC that supports IPMI 2.0 for of servers, featuring a web-based () for real-time monitoring and control. It includes virtual media redirection to ISO images remotely and the Lifecycle Controller, which automates updates, , and diagnostics without host OS involvement. iDRAC also enables IPMI over for secure remote access, with configurable settings for channel access and user privileges. Hewlett Packard Enterprise (HPE) implements IPMI via the Integrated Lights-Out (iLO) advanced management processor in ProLiant servers, providing IPMI 2.0 compliance with extensions for scripting and multi-node orchestration. iLO supports advanced scripting through its RESTful API and command-line interface, allowing automation of tasks like power cycling and sensor monitoring across distributed environments. A key extension is iLO Federation, which enables peer-to-peer communication among iLO instances for centralized management of multiple servers in a group, with no specified limit on group size, including shared alert propagation and group policy enforcement without requiring a dedicated management server. Supermicro's BMC offerings integrate IPMI in their server motherboards and systems, emphasizing cost-effective remote management with features like KVM-over-IP for access. Recent models support an HTML5-based web console for browser-native remote control, eliminating the need for plugins and improving compatibility across devices. The BMC also includes media redirection for virtual drives and serial-over-LAN () for text-based console access, alongside health monitoring for components like fans and power supplies. Cisco's Unified Computing System (UCS) incorporates IPMI through the Cisco Integrated Management Controller (CIMC) in C-Series rack servers and via the UCS Manager for B-Series blade servers, enabling standardized management with proprietary extensions. CIMC supports IPMI over for blade and standalone servers, with API extensions including a RESTful interface based on the standard for programmatic integration. These facilitate cloud orchestration by allowing UCS components to interface with platforms like VMware vCenter or AWS for automated provisioning and monitoring in hybrid environments.

Open-Source Software

Open-source software plays a crucial role in enabling developers and system administrators to interact with IPMI interfaces without relying on tools, supporting both in-band and for tasks such as monitoring and control. These tools are typically implemented as libraries, utilities, and integrations that adhere to IPMI specifications, allowing for custom solutions in environments and larger frameworks. OpenIPMI is a prominent open-source designed to simplify the development of IPMI management applications by providing an over the IPMI . It consists of a device driver, such as ipmi_si, which handles low-level communication with the baseboard management controller (BMC), and a user-level that offers higher-level APIs for in-band and out-of-band access. This setup supports features like event-driven monitoring and command execution, making it suitable for integrating IPMI into custom software stacks. The project is hosted on and actively maintained for compatibility with modern kernels. FreeIPMI is a comprehensive GNU suite of tools and libraries for IPMI v1.5 and v2.0 compliance, focusing on in-band and operations to manage remote systems. Key components include ipmidetect, which scans for BMCs on the network; bmc-info, for retrieving detailed BMC configuration and status; and libipmimonitoring with tools like ipmi-sel for parsing and managing system logs (SEL). These utilities abstract IPMI details, enabling straightforward , interpretation, and chassis control without deep protocol knowledge. The suite is distributed under the GPL and available via official GNU repositories. IPMItool serves as a versatile command-line utility for direct interaction with IPMI-enabled devices, supporting both local drivers and remote interfaces over IPMI v1.5 and v2.0. It allows users to send raw IPMI commands, read sensor data repositories (SDR), monitor environmental s, and script operations like or field-replaceable unit (FRU) . For instance, commands such as ipmitool sensor list provide real-time hardware status, while ipmitool chassis power enables automated in scripts. The tool is open-source, licensed under BSD, hosted on (archived as of 2023), and has broad adoption in server administration. These open-source tools integrate seamlessly with platforms to automate IPMI-based provisioning and management at scale. In , modules like community.general.ipmi_power facilitate power control and node management within playbooks, supporting idempotent operations for . Similarly, OpenStack's Ironic service leverages IPMI drivers for bare-metal provisioning, using tools like IPMItool or FreeIPMI to handle PXE booting, power control, and hardware inspection across clusters.

References

  1. [1]
    [PDF] Intelligent Platform Management Interface Specification Second ...
    Oct 1, 2013 · Page 1. - IPMI -. Intelligent Platform Management. Interface Specification. Second Generation v2.0. Document Revision 1.1. October 1, 2013.
  2. [2]
    Using Intelligent Platform Management Interface (IPMI)
    The Intelligent Platform Management Interface (IPMI) is an open-standard hardware management interface specification that defines a specific way for embedded ...
  3. [3]
    Intel and Leading Server Vendors Introduce Server Management ...
    The IPMI specification defines a common interface and message-based protocol for accessing platform management hardware. IPMI is comprised of three ...
  4. [4]
    [PDF] Intelligent Platform Management Interface Specification v2.0 rev. 1.1 ...
    Apr 21, 2015 · ... Intelligent Platform Management Interface Specification. 3. IPMI NON-DISCLOSURE AGREEMENT ... Overview ...
  5. [5]
    Intel, HP, NEC and Dell Announce Availability of Intelligent Platform ...
    "The IPMI specifications give IT managers access to platform management information and control features that allow more accurate prediction of hardware ...
  6. [6]
    Inherent Risks of Using the Intelligent Platform Management ...
    The Intelligent Platform Management Interface (IPMI) is an industry-standard protocol supported by Lenovo and more than 200 computer system vendors that ...
  7. [7]
    [PDF] IPMI - Intel
    Nov 15, 1999 · The Intelligent Platform Management Bus Communications Protocol Specification v1.0 defines a byte- level transport for transferring Intelligent ...
  8. [8]
    ipmb.rst - The Linux Kernel Archives
    The Intelligent Platform Management Bus or IPMB, is an I2C bus that provides a standardized interconnection between different boards within a chassis. This ...
  9. [9]
    [PDF] IPMB v1.0 Address Allocation
    Sep 16, 1998 · Note that most 'non-intelligent' IPMB devices can usually only be configured to one of eight possible slave addresses. This can lead to a ...
  10. [10]
    [PDF] IPMI - extras
    Jan 29, 2004 · 5 Initial release 2/20/02 1.5 1.1 Updated to include addenda and errata 9/12/03 1.5 1.1 Markup to include 9/12/03 addenda and errata 9/26/03 1. ...
  11. [11]
    [PDF] IPMI Addenda, Errata, and Clarifications E6
    Feb 15, 2006 · Interface Specification v1.5, revision 1.1. For the IPMI v1.5 Specification, this errata document picks up where the IPMI v1.5 Addenda ...
  12. [12]
    [PDF] ipmi - fish
    Jan 28, 2013 · Version. 1.5, which is still in fairly wide use, came out in 2001, and 2.0 was rolled out in 2004 (the last revisions being published June 2009.) ...
  13. [13]
    A Penetration Tester's Guide to IPMI and BMCs | Rapid7 Blog
    Jul 2, 2013 · This post goes into detail on how to identify and test for each of the issues that Dan identified, using a handful of free security tools.Missing: limitations integrity
  14. [14]
    Channel Model, Authentication, Sessions, and Users | HPE iLO IPMI ...
    IPMI v2.0 incorporates a common communication ... The Session ID mechanism allows multiple sessions to be simultaneously supported on a channel.Missing: VLAN SNMP
  15. [15]
    [PDF] Supermicro IPMIView User's Guide
    The information in this USER'S GUIDE has been carefully reviewed and is believed to be accurate. The vendor assumes no responsibility for any inaccuracies ...
  16. [16]
    [PDF] IPMI Configuration Guide - ASRock Rack
    The User Guide is for system administrators to remotely access computers with BMC. (Baseboard Management Controllers) and IPMI (Intelligence Platform ...
  17. [17]
    [PDF] Data Center Manageability Interface Specification v1.1 - Intel
    Aug 3, 2010 · This document defines a baseline set of manageability requirements and interfaces for Data. Center Server Management. The specification is ...<|control11|><|separator|>
  18. [18]
    Weekly Update - 11/6/13 | Rapid7 Blog
    Nov 6, 2013 · Experience shows that exposing management interfaces to the Internet is surprisingly common, and a quick peek at the Internet courtesy of ...Missing: report credentials
  19. [19]
    [PDF] IPMI: Freight Train to Hell - fish
    Aug 22, 2013 · When you set or change a user's password the actual password is sent over the network in clear text. The specification also allows remote ...
  20. [20]
    DDoS Attack Vectors - Latest Cyber Threat Intelligence Report
    Like other UDP-based protocols, CoAP can be exploited to perform UDP reflection/amplification DDoS attacks. New attack vector Attack vector symbol ...
  21. [21]
    Cisco Integrated Management Controller Supervisor SQL Injection ...
    Nov 7, 2018 · A vulnerability in the web framework code of Cisco Integrated Management Controller (IMC) Supervisor could allow an unauthenticated, ...Missing: IPMI | Show results with:IPMI
  22. [22]
    [PDF] Intelligent Platform Management Interface Specification v2.0 rev. 1.1 ...
    Jan 27, 2004 · This is the Intelligent Platform Management Interface Specification Second Generation v2.0, revision 1.1, dated October 1, 2013.
  23. [23]
    Integrated Dell Remote Access Controller 9 User's Guide
    iDRAC alerts you to system issues, helps you to perform remote management, and reduces the need for physical access to the system. iDRAC technology is part of a ...
  24. [24]
    [PDF] Integrated Dell Remote Access Controller 9 (iDRAC9)
    iDRAC features are available based on the type of the license. Depending ... To enable IPMI, go to iDRAC Settings > Connectivity and select IPMI Settings.
  25. [25]
    Configuring IPMI over LAN using web interface - Dell
    To configure IPMI over LAN, in the iDRAC Web interface, go to iDRAC Settings > Connectivity. The Network page is displayed.
  26. [26]
    HPE iLO 5 IPMI User Guide
    This document provides customers with information on the implementation of the Intelligent Platform Management Interface in HPE iLO, including the available ...
  27. [27]
    H8PF7AAE | HPE iLO5 Family Technical Training | HPE
    This course covers HPE iLO 5 features, security, scripting, and iLO Federation. It's for IT professionals managing servers and exploring advanced tasks.
  28. [28]
    HPE iLO Federation User Guide for iLO 5 - HPE Support
    This guide explains how to configure and use the HPE iLO Federation features. It is intended for system administrators, Hewlett Packard Enterprise ...
  29. [29]
    Supermicro Intelligent Management (IPMI) - Supermicro
    The Supermicro X11 platform's Baseboard Management Controller (BMC) is built on the ASPEED AST 2500 controller. The AST2500 is designed to dedicatedly ...
  30. [30]
    [PDF] BMC IPMI - Supermicro
    It provides detailed information on how to configure the IPMI settings supported by the AST2400/AST2500 controller. Chapter 1 provides an overview of the ...Missing: motivation | Show results with:motivation
  31. [31]
    [PDF] Baseboard Management Controller - Supermicro
    Super BMC IPMI User's Manual. 214. 4.5 IPMI. Use this feature to configure Intelligent Platform Management Interface (IPMI) settings. BMC Firmware Revision.
  32. [32]
    Cisco UCS C-Series Servers Integrated Management Controller ...
    The Cisco Integrated Management Controller (CIMC) is the management service for the C-Series servers. CIMC runs within the server.
  33. [33]
    Cisco UCS C-Series Servers REST API Programmer's Guide
    Dec 13, 2016 · The Cisco IMC REST API uses RESTful web services, based on Redfish, to configure UCS C-series servers. It uses HTTPS and a RESTful API for ...
  34. [34]
    Cisco UCS C-Series Servers REST API Programmer's Guide ...
    Jun 25, 2021 · The Cisco UCS C-Series REST API uses RESTful web services with Redfish, accessed via a URI, and uses HTTPS for GET, POST, PATCH, and DELETE ...
  35. [35]
    OpenIPMI
    OpenIPMI consists of two main parts: A device driver that goes into the Linux kernel, and a user-level library that provides a higher-level abstraction of IPMI ...
  36. [36]
    FreeIPMI - Home - GNU.org
    Jul 22, 2023 · A library for sensor and system event log (SEL) monitoring that abstracts away most IPMI details. Interpretation of those sensors and events is ...FreeIPMI - Download · Documentation · Core Team
  37. [37]
    An open-source tool for controlling IPMI-enabled systems - GitHub
    The ipmitool program provides a simple command-line interface to this BMC. It features the ability to read the sensor data repository (SDR) and print sensor ...Wiki · Issues 91 · IPMI Tool · Pull requests 56
  38. [38]
    cminyard/openipmi: IPMI abstraction layer, this is here so I can run ...
    This is the OpenIPMI library, a library that makes simplifies building complex IPMI management software.
  39. [39]
    GNU FreeIPMI - Summary [Savannah]
    Sep 20, 2003 · Savannah is a central point for development, distribution and maintenance of free software, both GNU and non-GNU.
  40. [40]
    IPMItool download | SourceForge.net
    Rating 5.0 (2) · Free · CommunicationIPMItool provides a simple command-line interface to IPMI-enabled devices through an IPMIv1.5 or IPMIv2.0 LAN interface or Linux/Solaris kernel driver.<|separator|>
  41. [41]
    community.general.ipmi_power module – Power management for ...
    This module is part of the community.general collection (version 11.4.0). You might already have this collection installed if you are using the ansible package.
  42. [42]
    Ironic - Bare Metal provisioning — kolla-ansible 20.1.0.dev293 ...
    Jan 14, 2025 · Ironic is the OpenStack service for handling bare metal, ie, the physical machines. It can work standalone as well as with other OpenStack services (notably, ...Pre-Deployment Configuration · Avoiding Problems With High... · Post-Deployment...<|control11|><|separator|>