{"id":108,"date":"2018-07-10T11:07:32","date_gmt":"2018-07-10T14:07:32","guid":{"rendered":"http:\/\/www.bfnetworks.com.br\/?p=108"},"modified":"2022-07-15T10:18:46","modified_gmt":"2022-07-15T13:18:46","slug":"dmidecode-info-hardware","status":"publish","type":"post","link":"https:\/\/bfnetworks.com.br\/dmidecode-info-hardware\/","title":{"rendered":"DMIDECODE – INFORMA\u00c7\u00d5ES DE HARDWARE UNIX\/LINUX"},"content":{"rendered":"

Em determinado momento da minha vida precisei saber o modelo da placa m\u00e3e de um firewall pfsense e n\u00e3o conhecia um comando que mostrasse essa informa\u00e7\u00e3o. Foi quando pesquisando conheci o dmidecode, ele mostra info sobre o hardware UNIX\/LINUX de acordo com a tabela dmi da BIOS.<\/p>\n\n

INSTALA\u00c7\u00c3O <\/h3>\n\n\n

Geralmente as distribui\u00e7\u00f5es j\u00e1 tem a ferramenta, testei em debian 8, mint e pfsense 2.3.4 e neles j\u00e1 tinham instalado o pacote, no centos 7 n\u00e3o tinha, caso sua distribui\u00e7\u00e3o n\u00e3o tenha instale o pacote.<\/p>\n\n\n

Debian\/ubuntu:<\/p>\n\n\n

\n
apt install dmidecode<\/div> <\/div>\n\n\n

Centos\/RedHat:<\/p>\n\n\n

\n
yum install dmidecode<\/div> <\/div>\n\n\n

EXEMPLO<\/h3>\n\n\n
\n
dmidecode -t 2<\/div> <\/div>\n\n\n

Result:<\/p>\n\n\n

Scanning \/dev\/mem for entry point.\nSMBIOS 3.0.0 present.\nHandle 0x0002, DMI type 2, 15 bytes\nBase Board Information\n\tManufacturer: BIOSTAR Group\n\tProduct Name: H110MG PRO D4<\/strong>\n\tVersion:\n\tSerial Number: None\n\tAsset Tag: None\n\tFeatures:\n\t\tBoard is a hosting board\n\t\tBoard is replaceable\n\tLocation In Chassis: None\n\tChassis Handle: 0x0003\n\tType: Motherboard\n\tContained Object Handles: 0<\/pre>\n\n\n

OP\u00c7\u00d5ES<\/h3>\n\n\n

Abaixo a tabela DMI, voc\u00ea pode usar o c\u00f3digo e op\u00e7\u00e3o -t como acima para obter a informa\u00e7\u00e3o.<\/p>\n\n\n

Tipo\tInforma\u00e7\u00e3o\n0\tBIOS\n1\tSystem\n2\tBase Board\n3\tChassis\n4\tProcessor\n5\tMemory Controller\n6\tMemory Module\n7\tCache\n8\tPort Connector\n9\tSystem Slots\n10\tOn Board Devices\n11\tOEM Strings\n12\tSystem Configuration Options\n13\tBIOS Language\n14\tGroup Associations\n15\tSystem Event Log\n16\tPhysical Memory Array\n17\tMemory Device\n18\t32-bit Memory Error\n19\tMemory Array Mapped Address\n20\tMemory Device Mapped Address\n21\tBuilt-in Pointing Device\n22\tPortable Battery\n23\tSystem Reset\n24\tHardware Security\n25\tSystem Power Controls\n26\tVoltage Probe\n27\tCooling Device\n28\tTemperature Probe\n29\tElectrical Current Probe\n30\tOut-of-band Remote Access\n31\tBoot Integrity Services\n32\tSystem Boot\n33\t64-bit Memory Error\n34\tManagement Device\n35\tManagement Device Component\n36\tManagement Device Threshold Data\n37\tMemory Channel\n38\tIPMI Device\n39\tPower Supply\n40\tAdditional Information\n41\tOnboard Device<\/pre>\n\n\n

FONTES<\/h3>\n\n\n

https:\/\/forum.netgate.com\/topic\/51625\/pfsense-2-0-2-64-bit-and-info-on-the-motherboard-of-an-firewall\/2
https:\/\/www.vivaolinux.com.br\/dica\/Listando-informacoes-sobre-o-hardware-com-o-comando-dmidecode-atraves-da-tabela-DMI
https:\/\/forum.netgate.com\/topic\/51625\/pfsense-2-0-2-64-bit-and-info-on-the-motherboard-of-an-firewall\/2
https:\/\/www.vivaolinux.com.br\/dica\/Listando-informacoes-sobre-o-hardware-com-o-comando-dmidecode-atraves-da-tabela-DMI<\/p>\n","protected":false},"excerpt":{"rendered":"

Em determinado momento da minha vida precisei saber o modelo da placa m\u00e3e de um firewall pfsense e n\u00e3o conhecia um comando que mostrasse essa informa\u00e7\u00e3o. Foi quando pesquisando conheci o dmidecode, ele mostra info sobre o hardware UNIX\/LINUX de acordo com a tabela dmi da BIOS. INSTALA\u00c7\u00c3O Geralmente as distribui\u00e7\u00f5es j\u00e1 tem a ferramenta, […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[24,25],"tags":[64,70,139],"_links":{"self":[{"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/posts\/108"}],"collection":[{"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/comments?post=108"}],"version-history":[{"count":1,"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/posts\/108\/revisions"}],"predecessor-version":[{"id":1905,"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/posts\/108\/revisions\/1905"}],"wp:attachment":[{"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/media?parent=108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/categories?post=108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bfnetworks.com.br\/wp-json\/wp\/v2\/tags?post=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}