[go: up one dir, main page]

CN107832091A - A kind of BMC configuring management methods and device - Google Patents

A kind of BMC configuring management methods and device Download PDF

Info

Publication number
CN107832091A
CN107832091A CN201711183837.4A CN201711183837A CN107832091A CN 107832091 A CN107832091 A CN 107832091A CN 201711183837 A CN201711183837 A CN 201711183837A CN 107832091 A CN107832091 A CN 107832091A
Authority
CN
China
Prior art keywords
bmc
configuration files
bmc configuration
summary info
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711183837.4A
Other languages
Chinese (zh)
Inventor
管沛伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Information Technologies Co Ltd
Original Assignee
Unis Huashan Information Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unis Huashan Information Technologies Co Ltd filed Critical Unis Huashan Information Technologies Co Ltd
Priority to CN201711183837.4A priority Critical patent/CN107832091A/en
Publication of CN107832091A publication Critical patent/CN107832091A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application, which provides a kind of BMC configuring management methods and device, methods described, to be included:Obtain the first BMC configuration files;Second summary info is generated according to the file content of the first BMC configuration files, and the 2nd BMC configuration files are generated according to the file content of the first BMC configuration files and second summary info;The 2nd BMC configuration files are sent to the BMC of server to be managed, so that the BMC of the server to be managed carries out BMC configurations after passing through according to second summary info to the 2nd BMC configuration files verification, according to the 2nd BMC configuration files.The efficiency of BMC configurations can be improved using the embodiment of the present application.

Description

A kind of BMC configuring management methods and device
Technical field
The application is related to network communication technology field, more particularly to a kind of BMC configuring management methods and device.
Background technology
BMC (Baseboard Management Controller, baseboard management controller) is one group and is cured to one solely The program stood on the service processor of mainboard CPU (Center Process Unit, CPU), it utilizes sensing Device monitors the state of a computer, the webserver either other hardware driving equipment, and passes through independent connection Circuit and system manager are communicated.
The content of the invention
The application provides a kind of BIOS configuring management methods and device, to improve the security of BIOS configuration managements.
According to the first aspect of the embodiment of the present application, there is provided a kind of BMC configuring management methods, including:
Obtain the first BMC configuration files;
Second summary info is generated according to the file content of the first BMC configuration files, and matched somebody with somebody according to the first BMC The file content and second summary info for putting file generate the 2nd BMC configuration files;
The 2nd BMC configuration files are sent to the BMC of server to be managed, so that the server to be managed BMC is configured after being passed through according to second summary info to the 2nd BMC configuration files verification according to the 2nd BMC File carries out BMC configurations.
According to the second aspect of the embodiment of the present application, there is provided a kind of BMC configuration managements device, including:
Acquiring unit, for obtaining the first BMC configuration files;
Generation unit, for according to the file content of the first BMC configuration files generate the second summary info, and according to The file content of the first BMC configuration files and second summary info generate the 2nd BMC configuration files;
Transmitting element, for the 2nd BMC configuration files to be sent to the BMC of server to be managed, so that described treat The BMC of management server according to second summary info to the 2nd BMC configuration files verification after passing through, according to described 2nd BMC configuration files carry out BMC configurations.
Using the embodiment of the present application, by obtaining the first BMC configuration files, and according to the file of the first BMC configuration files Content generates the second summary info, and generates the 2nd BMC according to the file content of the first BMC configuration files and the second summary info Configuration file, and then, the 2nd BMC configuration files are sent to the BMC of server to be managed, so that the BMC of server to be managed After passing through according to the second summary info to the verification of the 2nd BMC configuration files, BMC configurations are carried out according to the 2nd BMC configuration files, The BMC batch configurations of multiple servers can be realized automatically, while ensureing to configure security, improve the effect of BMC configurations Rate.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet for BMC configuring management methods that the embodiment of the present application provides;
Fig. 2 is a kind of configuration diagram for concrete application scene that the embodiment of the present application provides;
Fig. 3 is a kind of structural representation for BMC configuration managements device that the embodiment of the present application provides;
Fig. 4 is the structural representation for another BMC configuration managements device that the embodiment of the present application provides.
Embodiment
In some application scenarios, multiple model version identical servers can be used as an integrity service in specific Business.When business changes, it is necessary to which the BMC configurations to every server carry out the modification of configuration item.
And the mode of BMC configuration items modification at present is typically the BMC configuration items of each server of manual modification, as user matches somebody with somebody Put, network configuration, system configuration etc., its is less efficient, and easily makes a mistake.
In order that those skilled in the art more fully understand the technical scheme in the embodiment of the present application, and make the application real Apply the above-mentioned purpose of example, feature and advantage can be more obvious understandable, below in conjunction with the accompanying drawings to technical side in the embodiment of the present application Case is described in further detail.
Fig. 1 is referred to, a kind of schematic flow sheet of BMC configuring management methods is provided for the embodiment of the present application, such as Fig. 1 institutes Show, the BMC configuring management methods may comprise steps of:
It should be noted that in the embodiment of the present application, above-mentioned BMC configuring management methods can apply to server admin Management equipment in system, the management equipment can be PC (Personal Computer, personal computer) or server;Should Server management system can be that (Fast Intelligent Scalable Toolkit are quick, intelligent expansible by support FIST Tool set) server management system, in the server management system, run FIST in management equipment, management equipment can be with The BMC of each server is managed by the FIST.
For ease of understanding, below so that management equipment is managed by FIST to the BMC of the server in server as an example Illustrate, however, it should be understood that this is not the restriction to the application protection domain, i.e., in the embodiment of the present application, management is set Standby that the BMC of each server can also be managed otherwise, the embodiment of the present application is subsequently no longer repeated.
Step 101, obtain the first BMC configuration files.
In the embodiment of the present application, when needing to carry out BMC configurations to each server, it can first obtain to enter for each server The BMC configuration files (referred to herein as the first BMC configuration files) of row BMC configurations, the file content of the first BMC configuration files The value of each configuration item of BMC including each server.
In the one of embodiment of the application, the above-mentioned BMC configuration files of acquisition the first, it can include:
Log in the BMC of source server;
The export instruction of BMC configuration files is sent to the BMC of source server;Wherein, BMC configuration files export instruction is used for Indicate the BMC response BMC configuration files export instruction export BMC configuration files of source server, and by derived BMC configuration files As the first BMC configuration files;
In wherein a kind of implementation, file content generation the first summary letter of the acceptable configuration file derived from Breath, and the first BMC configuration files are generated according to the file content of the BMC configuration files and the first summary info;
Receive the first BMC configuration files that the BMC of source server is sent.
In this embodiment, source server can be a certain server in server management system, or clothes Not limited this for server, the embodiment of the present application derived from BMC configuration files outside business device.
In this embodiment, management equipment can send HTTPS (Hyper by browser to the BMC of source server Text Transfer Protocol over Secure Socket Layer, the Hyper text transfer association in security socket layer View) or HTTP (Hyper Text Transfer Protocol, HTTP) requests, realize that simulation logs in source service The BMC of device;Or management equipment can also be according to source server the information such as IP address, user name, password it is actual log in source clothes The BMC of business device.
When logging in successfully, management equipment can send the export instruction of BMC configuration files to the BMC of source server;Source When server receives BMC configuration files export instruction, BMC configuration files are exported according to the value of itself each configuration item.
In wherein a kind of implementation, in order to avoid BMC configuration files are maliciously tampered in transmitting procedure, source service After the BMC export BMC configuration files of device, summary info can be generated according to the file content of the BMC configuration files (herein Referred to as the first summary info), and the file content of the BMC configuration files and the first summary info are generated into the first BMC configurations File.
After the BMC of source server generates the first BMC configuration files, the first BMC configuration files can be sent to pipe Manage equipment.
Correspondingly, in this embodiment, after the above-mentioned BMC configuration files of acquisition the first, can also include:
The first summary info according to being carried in the first BMC configuration files verifies to the first BMC configuration files;
After verification passes through, it is determined that performing step 102.
In this embodiment, after management equipment gets the first BMC configuration files, text can be configured according to the first BMC The first summary info carried in part verifies to the first BMC configuration files, to determine in the file of the first BMC configuration files The integrality and accuracy of appearance.
In a wherein implementation, it is above-mentioned according to the first summary info carried in the first BMC configuration files to One BMC configuration files are verified, and can be included:
According to the file content of the first BMC configuration files and default first checking parameter, the first preset algorithm is utilized Generate the 3rd summary info;
Compare the 3rd summary info and the first summary info;
If the two is identical, it is determined that verification passes through;
Otherwise, it determines verification does not pass through.
In the implementation, after management equipment gets the first BMC configuration files, management equipment can according to this The file content and default checking parameter of one BMC configuration files, utilize preset algorithm (the referred to herein as first pre- imputation Method) summary info corresponding to generation (referred to herein as the 3rd summary info).
After management equipment generates the 3rd summary info, the 3rd summary info and the first BMC configuration texts can be compared The first summary info that part includes;If the two is identical, it is determined that verification passes through, i.e. the file content of the first BMC configuration files It is not tampered with;Otherwise, i.e., the two is differed, it is determined that verification does not pass through.
In wherein a kind of implementation, first checking parameter can be the first character string, and first preset algorithm can Think SHA1 (Secure Hash Algorithm, Secure Hash Algorithm) algorithm, MD5 (Message Digest Algorithm, Message Digest 5) or RSA Algorithm etc..
It should be noted that in this embodiment, after the BMC export BMC configuration files of source server, source server life During into the first summary info, according to the file content of the BMC configuration files and above-mentioned first checking parameter, above-mentioned first is utilized Preset algorithm generates the first summary info, i.e., above-mentioned first preset algorithm and the first checking parameter need in management equipment and Consult in advance between the BMC of source server, and be consistent.
In addition, in the embodiment of the present application, after the BMC export BMC configuration files of source server, it will directly can also lead The BMC configuration files gone out are sent to management equipment, the generation without carrying out the first summary info;Correspondingly, management equipment After receiving BMC configuration files, it is not required that carry out safety check.
Furthermore above-mentioned first BMC configuration files can also be pre-configured, and is stored in management equipment, so as to management Equipment can be directly from the BMC configuration files that pre-save locally be obtained, without being obtained from source server;On or Management equipment can also be transmitted directly to by source server or miscellaneous equipment by stating the first BMC configuration files, and it is implemented herein Do not repeat.
Step 102, the second summary info generated according to the file content of the first BMC configuration files, and matched somebody with somebody according to the first BMC The file content and the second summary info for putting file generate the 2nd BMC configuration files.
In the embodiment of the present application, after management equipment receives the first BMC configuration files, it can be matched somebody with somebody according to the first BMC Summary info (referred to herein as the second summary info) corresponding to the file content generation of file is put, and is configured according to the first BMC BMC configuration files (referred to herein as the 2nd BMC configuration files) corresponding to the file content of file and the generation of the second summary info.
It is above-mentioned to be plucked according to the file content of the first BMC configuration files generation second in the one of embodiment of the application Information is wanted, can be included:
According to the file content of the first BMC configuration files and default second checking parameter, the second preset algorithm is utilized Generate the second summary info.
In this embodiment, can be according to this after file content verification of the management equipment to the first BMC configuration files passes through The file content of first BMC configuration files and default second checking parameter, utilize the summary of the second preset algorithm generation second Information, and the 2nd BMC configuration files are generated according to the file content of the first BMC configuration files and second summary info.
In wherein a kind of implementation, second checking parameter can be the second character string, and second preset algorithm can Think SHA1 algorithms, MD5 or RSA Algorithm etc..
It should be noted that in this embodiment, above-mentioned second preset algorithm and the second checking parameter need managing Consult in advance between the BMC of equipment and server to be managed, and be consistent.
In addition, the first checking parameter can be with identical with the second checking parameter, can also be different;First preset algorithm and second Preset algorithm can be the same or different.
Step 103, the BMC that the 2nd BMC configuration files are sent to server to be managed, so that server to be managed BMC carries out BMC after passing through according to the second summary info to the verification of the 2nd BMC configuration files, according to the 2nd BMC configuration files and matched somebody with somebody Put.
In the embodiment of the present application, server to be managed refers to the clothes for needing to carry out BMC configuration modifications in server management system Business device, it can include the part or all of server in server management system.
For example, management equipment can be according to the IP address of each server, username and password etc. in server management system The server for needing to carry out BMC configuration modifications is added in list to be managed by information, so as to the clothes in the list to be managed The BMC configurations of business device carry out bulk management.
In the embodiment of the present application, after management equipment generates the 2nd BMC configuration files, the 2nd BMC can be configured File is sent to the BMC of server to be managed.
After the BMC of server to be managed receives the 2nd BMC configuration files, text can be configured according to the 2nd BMC The file content of part and default second checking parameter, utilize summary info (this corresponding to the generation of above-mentioned second preset algorithm Referred to herein as the 4th summary info), and compare the 4th summary info and the second summary info, if the two is identical, it is determined that should The configuration content of 2nd BMC configuration files is not tampered with, and now, the BMC of server to be managed can be according to the second configuration text The file content of part carries out BMC configurations, is configured for example, covering original BMC using the file content of the 2nd BMC configuration files, and Execution is restarted so that configuration take-effective;If the two is differed, refusal carries out BMC configurations according to the 2nd BMC configuration files.
It should be noted that BMC configuration files are transmitted and set in management between the BMC of source server and management equipment When being transmitted between the BMC of server standby and to be managed, it can be transmitted by HTTPS or http protocol, other associations can also be passed through View, such as TCP (Transmission Control Protocol transmission control protocols)/IP (Internet Protocol, interconnection FidonetFido) agreement is transmitted.
It can be seen that in the method flow shown in Fig. 1, by obtaining BMC configuration files and by under the configuration file got The BMC of server to be managed is sent to, carrying out BMC automatically according to the BMC configuration files received by the BMC of server to be managed matches somebody with somebody Put, realize BMC and automatically configure, and batch configuration can be carried out to more servers to be managed, further increase BMC configurations Efficiency;In addition, in BMC configuration file transmitting procedures, the summary info for carrying out safety check is carried, it is ensured that file transmits During file integrality and accuracy, improve file transmission security.
In order that those skilled in the art more fully understand the technical scheme that the embodiment of the present application provides, with reference to specific The technical scheme that application scenarios are provided the embodiment of the present application illustrates.
Fig. 2 is referred to, the schematic diagram of a kind of concrete application scene provided for the embodiment of the present application, as shown in Fig. 2 management Equipment is managed by FIST to the BMC of each server in server management system, wherein, source server is server 0, is treated Management server includes 1~server of server N (N >=2).
In this embodiment it is assumed that the first preset algorithm and the second preset algorithm are SHA1 algorithms, the first checking parameter is Character string " megaracsp1 ", the second checking parameter are character string " megaracsp2 ".
Based on application scenarios shown in Fig. 2, the BMC schemes for configuration and management implementation processs that the embodiment of the present application provides are as follows:
1st, management equipment sends HTTPS/HTTP requests by browser to server 0, simulates the BMC of game server 0, And after logging in successfully, management equipment sends the export instruction of BMC configuration files to the BMC of server 0;
2nd, after the BMC of server 0 receives the export instruction of BMC configuration files, BMC configuration files are exported, and according to the BMC The file content and character string " megaracsp1 " of configuration file, the first summary info is generated using SHA1 algorithms, and should First summary info is carried at the end of BMC configuration files, generates the first BMC configuration files, and by the first BMC configuration files It is sent to management equipment;
3rd, after management equipment receives the first BMC configuration files, according to the file content of the first BMC configuration files and Character string " megaracsp1 ", the 3rd summary info is generated using SHA1 algorithms, and compare the 3rd summary info and first and pluck Want information;If the two is identical, 4 are gone to;Otherwise, the first BMC configuration files are reacquired;
4th, management equipment utilizes according to the file content and character string " megaracsp2 " of the first BMC configuration files SHA1 algorithms generate the second summary info, and second summary info is replaced to the first summary carried in the first BMC configuration files Information, the 2nd BMC configuration files are generated, and the second configuration file of generation is sent to 1~server of server N BMC;
5th, after server i (1≤i≤N) BMC receives the 2nd BMC configuration files, text is configured according to the 2nd BMC The file content and character string " megaracsp2 " of part, using SHA1 algorithms, the 4th summary info is generated, and compare the 4th and pluck Information and the second summary info are wanted, if the two is identical, is matched somebody with somebody using the file content covering of the 2nd BMC configuration files is original Put, and restarted, so that configuration take-effective;If the two is different, refusal carries out BMC configurations according to the 2nd BMC configuration files.
By be can be seen that with foregoing description in the technical scheme that the embodiment of the present application provides, by obtaining the first BMC Configuration file, and the second summary info is generated according to the file content of the first BMC configuration files, and text is configured according to the first BMC The file content of part and the second summary info generate the 2nd BMC configuration files, and then, the 2nd BMC configuration files are sent to and treated The BMC of management server, so that the BMC of server to be managed is verifying according to the second summary info to the 2nd BMC configuration files By rear, BMC configurations are carried out according to the 2nd BMC configuration files, the BMC batch configurations of multiple servers can be realized automatically, While ensureing configuration security, the efficiency of BMC configurations is improved.
Fig. 3 is referred to, a kind of structural representation of the BMC configuration managements device provided for the embodiment of the present application, wherein, should The management equipment that BMC configuration management devices can apply in above method embodiment, as shown in figure 3, the BMC configuration managements fill Putting to include:
Acquiring unit 310, for obtaining the first BMC configuration files;
Generation unit 320, for generating the second summary info according to the file content of the first BMC configuration files, and 2nd BMC configuration files are generated according to the file content of the first BMC configuration files and second summary info;
Transmitting element 330, for the 2nd BMC configuration files to be sent to the BMC of server to be managed, so that described The BMC of server to be managed according to second summary info to the 2nd BMC configuration files verification after passing through, according to institute State the 2nd BMC configuration files and carry out BMC configurations.
Please also refer to Fig. 4, the structural representation of another BMC configuration managements device provided for the embodiment of the present application, As shown in figure 4, on the basis of the devices of BMC configuration managements shown in Fig. 3, the BMC configuration management devices shown in Fig. 4 also include:
Login unit 340, for logging in the BMC of source server;
The transmitting element 330, it is additionally operable to send the export instruction of BMC configuration files to the BMC of the source server, so that The BMC of the source server responds the BMC configuration files export instruction export BMC configuration files, and derived BMC is configured File is as the first BMC configuration files;
In wherein a kind of embodiment, the transmitting element 330 is additionally operable to send BMC to the BMC of the source server Configuration file export instruction, so that the BMC of the source server responds the BMC configuration files export instruction export BMC configurations File, and the first summary info is generated according to the file content of the BMC configuration files, and according to the file of the BMC configuration files Content and the first summary info generate the first BMC configuration files;
The acquiring unit 310, the first BMC configuration files that the BMC for receiving the source server is sent;
In wherein a kind of implementation, when the file content of the first BMC configuration files including BMC configuration files and the During one summary info, the BMC configuration managements device also includes:
Verification unit 350, for according to the first summary info carried in the first BMC configuration files to described first BMC configuration files are verified;
The generation unit 320, for when verification unit 350 verification pass through after, according to the first BMC configuration files File content generates the second summary info.
In one of the embodiments, the generation unit 320, it is additionally operable to the text according to the first BMC configuration files Part content and default first checking parameter, the 3rd summary info is generated using the first preset algorithm;
The verification unit 350, for the 3rd summary info and first summary info;If the two phase Together, it is determined that verification passes through;Otherwise, it determines verification does not pass through.
In one of the embodiments, the generation unit 320, it is additionally operable to the text according to the first BMC configuration files Part content and default second checking parameter, the second summary info is generated using the second preset algorithm.
In one of the embodiments, default first checking parameter is the first character string, and described first imputes in advance Method is Secure Hash Algorithm SHA1 algorithms, Message Digest 5 MD5 algorithms or RSA Algorithm;
Or/and
Default second checking parameter is the second character string, and second preset algorithm is SHA1 algorithms, MD5 algorithms Or RSA Algorithm.
The function of unit and the implementation process of effect specifically refer to and step are corresponded in the above method in said apparatus Implementation process, it will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component The unit of explanation can be or may not be physically separate, can be as the part that unit is shown or can also It is not physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can be according to reality Need to select some or all of module therein to realize the purpose of application scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
As seen from the above-described embodiment, by obtaining the first BMC configuration files, and according to the file of the first BMC configuration files Content generates the second summary info, and generates the 2nd BMC according to the file content of the first BMC configuration files and the second summary info Configuration file, and then, the 2nd BMC configuration files are sent to the BMC of server to be managed, so that the BMC of server to be managed After passing through according to the second summary info to the verification of the 2nd BMC configuration files, BMC configurations are carried out according to the 2nd BMC configuration files, The BMC batch configurations of multiple servers can be realized automatically, while ensureing to configure security, improve the effect of BMC configurations Rate.
Those skilled in the art will readily occur to the application its after considering specification and putting into practice application disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the application, these modifications, purposes or Person's adaptations follow the general principle of the application and including the undocumented common knowledges in the art of the application Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the application and spirit are by following Claim is pointed out.
It should be appreciated that the precision architecture that the application is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.Scope of the present application is only limited by appended claim.

Claims (10)

  1. A kind of 1. baseboard management controller BMC configuring management methods, it is characterised in that including:
    Obtain the first BMC configuration files;
    Second summary info is generated according to the file content of the first BMC configuration files, and text is configured according to the first BMC The file content of part and second summary info generate the 2nd BMC configuration files;
    The 2nd BMC configuration files are sent to the BMC of server to be managed, so that the BMC of the server to be managed exists After being passed through according to second summary info to the 2nd BMC configuration files verification, entered according to the 2nd BMC configuration files Row BMC is configured.
  2. 2. according to the method for claim 1, it is characterised in that the first BMC configuration files of the acquisition, including:
    Log in the BMC of source server;
    The export instruction of BMC configuration files is sent to the BMC of the source server;Wherein, the BMC configuration files export instruction is used The BMC configuration files export instruction export BMC configuration files are responded in the BMC for indicating the source server, and by the BMC Configuration file is as the first BMC configuration files;
    Receive the first BMC configuration files that the BMC of the source server is sent.
  3. 3. according to the method for claim 1, it is characterised in that the first BMC configuration files include BMC configuration files File content and the first summary info;
    After the first BMC configuration files of the acquisition, in addition to:
    The first summary info according to being carried in the first BMC configuration files verifies to the first BMC configuration files;
    After verification passes through, it is determined that performing described according to the file content of the first BMC configuration files generation the second summary letter The step of breath;
    Wherein, it is described according to the first summary info carried in the first BMC configuration files to the first BMC configuration files Verified, including:
    According to the file content of the first BMC configuration files and default first checking parameter, the first preset algorithm is utilized Generate the 3rd summary info;
    Compare the 3rd summary info and first summary info;
    If the two is identical, it is determined that verification passes through;
    Otherwise, it determines verification does not pass through.
  4. 4. according to the method for claim 3, it is characterised in that in the file according to the first BMC configuration files Hold the second summary info of generation, including:
    According to the file content of the first BMC configuration files and default second checking parameter, the second preset algorithm is utilized Generate the second summary info.
  5. 5. according to the method for claim 4, it is characterised in that default first checking parameter is the first character string, First preset algorithm is Secure Hash Algorithm SHA1 algorithms, Message Digest 5 MD5 algorithms or RSA Algorithm;
    Or/and
    Default second checking parameter is the second character string, second preset algorithm be SHA1 algorithms, MD5 algorithms or RSA Algorithm.
  6. A kind of 6. baseboard management controller BMC configuration management devices, it is characterised in that including:
    Acquiring unit, for obtaining the first BMC configuration files;
    Generation unit, for generating the second summary info according to the file content of the first BMC configuration files, and according to described The file content of first BMC configuration files and second summary info generate the 2nd BMC configuration files;
    Transmitting element, for the 2nd BMC configuration files to be sent to the BMC of server to be managed, so that described to be managed The BMC of server according to second summary info to the 2nd BMC configuration files verification after passing through, according to described second BMC configuration files carry out BMC configurations.
  7. 7. device according to claim 6, it is characterised in that described device also includes:
    Login unit, the BMC of source server is logged in for simulating;
    The transmitting element, it is additionally operable to send the export instruction of BMC configuration files to the BMC of the source server;Wherein, it is described The export instruction of BMC configuration files is used to indicate that the BMC of the source server to respond the BMC configuration files export instruction export BMC configuration files, and using the BMC configuration files as the first BMC configuration files;
    The acquiring unit, the first BMC configuration files that the BMC specifically for receiving the source server is sent.
  8. 8. device according to claim 7, it is characterised in that the first BMC configuration files include BMC configuration files File content and the first summary info;
    Described device also includes:
    Verification unit, for being configured according to the first summary info carried in the first BMC configuration files to the first BMC File is verified;
    The generation unit, for after verification passes through, being plucked according to the file content of the first BMC configuration files generation second Want information;
    Wherein, the generation unit, the file content according to the first BMC configuration files and default first school are additionally operable to Parameter is tested, the 3rd summary info is generated using the first preset algorithm;
    The verification unit, specifically the 3rd summary info and first summary info;If the two is identical, it is determined that Verification passes through;Otherwise, it determines verification does not pass through.
  9. 9. device according to claim 8, it is characterised in that
    The generation unit, it is additionally operable to the file content according to the first BMC configuration files and default second verification ginseng Number, the second summary info is generated using the second preset algorithm.
  10. 10. device according to claim 9, it is characterised in that default first checking parameter is the first character string, First preset algorithm is Secure Hash Algorithm SHA1 algorithms, Message Digest 5 MD5 algorithms or RSA Algorithm;
    Or/and
    Default second checking parameter is the second character string, second preset algorithm be SHA1 algorithms, MD5 algorithms or RSA Algorithm.
CN201711183837.4A 2017-11-23 2017-11-23 A kind of BMC configuring management methods and device Pending CN107832091A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711183837.4A CN107832091A (en) 2017-11-23 2017-11-23 A kind of BMC configuring management methods and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711183837.4A CN107832091A (en) 2017-11-23 2017-11-23 A kind of BMC configuring management methods and device

Publications (1)

Publication Number Publication Date
CN107832091A true CN107832091A (en) 2018-03-23

Family

ID=61652399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711183837.4A Pending CN107832091A (en) 2017-11-23 2017-11-23 A kind of BMC configuring management methods and device

Country Status (1)

Country Link
CN (1) CN107832091A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388442A (en) * 2018-10-31 2019-02-26 郑州云海信息技术有限公司 A kind of method, apparatus and computer equipment of batch configuration BMC user
CN109766118A (en) * 2019-01-02 2019-05-17 紫光华山信息技术有限公司 Firmware file loading method, device and girff formula server
CN109783238A (en) * 2019-01-25 2019-05-21 郑州云海信息技术有限公司 A method and system for mirroring AEP memory configuration policies between servers
CN109901862A (en) * 2019-02-28 2019-06-18 苏州浪潮智能科技有限公司 A kind of BMC configuration parameter storage method
CN110399719A (en) * 2019-06-28 2019-11-01 苏州浪潮智能科技有限公司 BIT file loading method, apparatus, device and computer-readable storage medium
CN112492061A (en) * 2020-11-20 2021-03-12 浪潮电子信息产业股份有限公司 IP address modification method, device and equipment of BMC (baseboard management controller) and readable storage medium
CN120263637A (en) * 2025-06-04 2025-07-04 安擎计算机信息股份有限公司 A BMC configuration management method and server system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136019A (en) * 2011-11-29 2013-06-05 国际商业机器公司 Method and device used for uploading configuration information
US20140068026A1 (en) * 2012-08-31 2014-03-06 Inventec Corporation System for automatically configuring server using pre-recorded configuration script and method thereof
CN104699497A (en) * 2013-12-09 2015-06-10 联想(新加坡)私人有限公司 Service processor for configuring servers joining peer to peer network
CN102064966B (en) * 2010-12-29 2016-04-13 北京世纪互联宽带数据中心有限公司 A kind of collocation method, server, equipment and system
US20160316043A1 (en) * 2015-04-27 2016-10-27 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Impersonating a specific physical hardware configuration on a standard server
CN106445528A (en) * 2016-09-27 2017-02-22 郑州云海信息技术有限公司 Method and device for configuring SETUP options of BIOS quickly
CN106528143A (en) * 2016-10-27 2017-03-22 杭州昆海信息技术有限公司 Configuration management method and device
CN106951787A (en) * 2017-04-28 2017-07-14 紫光华山信息技术有限公司 A kind of BIOS configuring management methods and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102064966B (en) * 2010-12-29 2016-04-13 北京世纪互联宽带数据中心有限公司 A kind of collocation method, server, equipment and system
CN103136019A (en) * 2011-11-29 2013-06-05 国际商业机器公司 Method and device used for uploading configuration information
US20140068026A1 (en) * 2012-08-31 2014-03-06 Inventec Corporation System for automatically configuring server using pre-recorded configuration script and method thereof
CN104699497A (en) * 2013-12-09 2015-06-10 联想(新加坡)私人有限公司 Service processor for configuring servers joining peer to peer network
US20160316043A1 (en) * 2015-04-27 2016-10-27 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Impersonating a specific physical hardware configuration on a standard server
CN106445528A (en) * 2016-09-27 2017-02-22 郑州云海信息技术有限公司 Method and device for configuring SETUP options of BIOS quickly
CN106528143A (en) * 2016-10-27 2017-03-22 杭州昆海信息技术有限公司 Configuration management method and device
CN106951787A (en) * 2017-04-28 2017-07-14 紫光华山信息技术有限公司 A kind of BIOS configuring management methods and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王海林著: "《元建模与Web应用系统生成》", 31 January 2014, 国防工业出版社 *
耿新宇: "《计算机网络信息安全研究》", 28 February 2015, 天津科学技术出版社 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109388442A (en) * 2018-10-31 2019-02-26 郑州云海信息技术有限公司 A kind of method, apparatus and computer equipment of batch configuration BMC user
CN109766118A (en) * 2019-01-02 2019-05-17 紫光华山信息技术有限公司 Firmware file loading method, device and girff formula server
CN109783238A (en) * 2019-01-25 2019-05-21 郑州云海信息技术有限公司 A method and system for mirroring AEP memory configuration policies between servers
CN109901862A (en) * 2019-02-28 2019-06-18 苏州浪潮智能科技有限公司 A kind of BMC configuration parameter storage method
CN110399719A (en) * 2019-06-28 2019-11-01 苏州浪潮智能科技有限公司 BIT file loading method, apparatus, device and computer-readable storage medium
CN112492061A (en) * 2020-11-20 2021-03-12 浪潮电子信息产业股份有限公司 IP address modification method, device and equipment of BMC (baseboard management controller) and readable storage medium
CN120263637A (en) * 2025-06-04 2025-07-04 安擎计算机信息股份有限公司 A BMC configuration management method and server system

Similar Documents

Publication Publication Date Title
CN107832091A (en) A kind of BMC configuring management methods and device
TWI540457B (en) Non-intrusive method and apparatus for automatically dispatching security rules in cloud environment
CN108475312A (en) Single-point logging method for equipment safety shell
CN110351228A (en) Remote entry method, device and system
WO2021021511A1 (en) Method and system for authenticating a secure credential transfer to a device
WO2020003131A1 (en) Systems and methods to automatically evaluate blockchain-based solution performance
EP3803662B1 (en) Data processing
CN111367821B (en) Software testing method and system
CN108027857B (en) Browser Authentication Challenge and Response System
US12052130B2 (en) Adaptive segmentation of data center asset telemetry information
JP6914436B2 (en) Systems and methods for authentication
CN114363088B (en) Method and apparatus for requesting data
CN114020678A (en) Redirection method, device and system for server serial console and electronic equipment
CN111756808A (en) Data processing method and system
CN114978675B (en) Access authentication method and device, electronic equipment and storage medium
CN106951787A (en) A kind of BIOS configuring management methods and device
CN114139131A (en) Operating system login method and device and electronic equipment
CN112804201A (en) Method and device for acquiring equipment information
KR20180090060A (en) Internet of Things Security Module
US12225124B2 (en) Data center asset onboarding authentication for a data center asset via an onboarding operation
CN114745216B (en) Dynamic access method and device
JP7042624B2 (en) Methods and systems for auditing for evaluation platforms
KR102428409B1 (en) User authentication device, user authentication method using security code and computer program
CN105515913A (en) Method and device for monitoring device performance
CN114143379A (en) HTTPS redirection device and method based on Portal authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: H3C INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Applicant before: UNIS HUASHAN INFORMATION TECHNOLOGIES Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180323