IPMI Dedicated VPN

Posted on by Helpful Humans of Liquid Web | Updated:
Category: Technical Support | Tags: IPMI, VPN
Reading Time: < 1 minute

IPMI stands for Intelligent Platform Management Interface. It is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities on the host systems CPU, firmware, and operating system. It defines a set of interfaces used by system administrators for out-of-band management of computer systems.

As an example, IPMI provides a way to manage a server that is powered off or unresponsive by using a network connection to the hardware rather than to the operating system or login shell. This means you can bypass the operating system and log in via console to troubleshoot and get your server back up and running if it goes unresponsive for any reason.

Liquid Web provides IPMI access via VPN for your dedicated server. Before you can access IPMI, you will first need to download and install a VPN (Virtual Private Network) client on your computer. See our article Setting Up Your Cloud VPN for operating system specific instructions on how to download and install the Storm® VPN service.


Our Heroic Support team is happy to help you with configurations of your Storm® VPN but because it is through third-party software, the support we provide falls beyond the scope of support.

Once you’ve set up your Cloud VPN through your Liquid Web Account and installed the VPN client, you will need to contact our Heroic Support team to obtain the IPMI address, username and password to connect. After you have this information, navigate to https://$IPMI-ADDRESS in your internet browser. The IPMI login page will open for you to enter your username and password and connect to IPMI via your VPN client.

Avatar for Helpful Humans of Liquid Web

About the Author: Helpful Humans of Liquid Web

Latest Articles

Controlling PHP settings with a custom php.ini file

Read Article

How to install Puppet Server on Linux (AlmaLinux)

Read Article

Email security best practices for using SPF, DKIM, and DMARC

Read Article

Linux dos2unix command syntax — removing hidden Windows characters from files

Read Article

Change cPanel password from WebHost Manager (WHM)

Read Article