IPMI Dedicated VPN

Posted on by Helpful Humans of Liquid Web
Category: Technical Support | Tags: IPMI, VPN
Reading Time: < 1 minute

IPMI stands for Intelligent Platform Management Interface. It is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities on the host systems CPU, firmware, and operating system. It defines a set of interfaces used by system administrators for out-of-band management of computer systems.

As an example, IPMI provides a way to manage a server that is powered off or unresponsive by using a network connection to the hardware rather than to the operating system or login shell. This means you can bypass the operating system and log in via console to troubleshoot and get your server back up and running if it goes unresponsive for any reason.

Liquid Web provides IPMI access via VPN for your dedicated server. Before you can access IPMI, you will first need to download and install a VPN (Virtual Private Network) client on your computer. See our article Setting Up Your Cloud VPN for operating system specific instructions on how to download and install the Storm® VPN service.


Our Heroic Support team is happy to help you with configurations of your Storm® VPN but because it is through third-party software, the support we provide falls beyond the scope of support.

Once you’ve set up your Cloud VPN through your Liquid Web Account and installed the VPN client, you will need to contact our Heroic Support team to obtain the IPMI address, username and password to connect. After you have this information, navigate to https://$IPMI-ADDRESS in your internet browser. The IPMI login page will open for you to enter your username and password and connect to IPMI via your VPN client.

About the Author: Helpful Humans of Liquid Web

Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.


Latest Articles

Cloning an Existing Virtual Machine with VMware

Read Article

Podman vs Docker: A Comparison

Read Article

Five Steps to Create a Robots.txt File for Your Website

Read Article

Premium Business Email Pricing FAQ

Read Article

Microsoft Exchange Server Security Update

Read Article