Intel S2600KP Server Board BIOS/Firmware 01.01.0021
Typ pliku: Oprogramowanie.
System Operacyjny: AnyOS.
Nazwa pliku: S2600KP_SFUP_BIOS01010021_ME030103043_BMC0149r10574_FRUSDR116.zip.
Bit: 32/64 Bit.
Licencja: Darmowa.
Opis
Wersje:
– BIOS: 01.01.0021
– ME: 03.01.03.043
– BMC: 01.49.10574
– FRUSDR: 1.16
BIOS Changes:
– CCB#483: Allow ITK to change SMBIOS table OEM Strings (Type 11)
– EPSD 100256184:Fix issue PCIe card is not receiving IRQs in the second slot of customer riser
– CCB1713: Add an option in ITK to allow customer to enable/disable Spread Spectrum Clock (SSC)
– EPSD 100036011: [E5-2600V4] SMBIOS have some problem in the BCP24HDD platform with SAS bridge board
– EPSD 100036147: [E5-2600V4] Serial Port / eUSB should belong internal device not external device in SMBIOS Type8
– [HSD-ES][2103614071][E5-2600V4] BMC version show wrong in diagnostic screen
– EPSD 100036010: [E5-2600V4] COM Port amount in Windows Device Manager does not match BIOS Serial Port setting
– Update RC code to v4.0.0
– EPSD 100255807: Some modules are failed in existing vulnerability test by running command “chipsec_main.py”— fix C-State lock issue
– EPSD 100255807: Some modules are failed in existing vulnerability test by running command “chipsec_main.py”— fix MsUnitDeviceFunctionHideLock issue
– EPSD 100036120 : [E5-2600V4] Press F2/F6/F12 on clear ownership interactive page will see unexpected message show up
– HSD-ES 2103614916: [E5-2600V4] A typo in the help text of Crosslink control override option, it should be DSDUSP
– HSD-ES 2103614926: UUT will halt when first 32bit of IPv6 Address/Gateway are set to a value over 32bit
– HSD-ES 1504411152: Grantley Boot performance issue (6 – 8 seconds) reported by customer inside BIOS ACPI _OSC method
– HSD-ES 2006614580: Legacy Network Device Boot Order still boots after disabling
– Update ucode 0000003a for E5-2600V3, 0b000020 for E5-2600V4
ME Changes:
– Flash from Grantley FW to Grantley-R FW could cause SPS reset.
– System unexpected shutdown with SPS FW exception error.
– ME FW changes P state value when no policy is active imapcting performance.
– C8h command power readings for CPU domain are invalid.
BMC Changes:
– SSB Temperature Sensor (0x22) Unable to be read after updating with OFU Utility
– Fix two EWS vulnerabilities reported by scanner: Web Server Vulnerable to Redirection Page Cross-Site Scripting Attacks; Incomplete or No Cache-control and Pragma HTTP Header Set.
– Grantley FW Java certificate expired
– ipmitool command doesn’t stop fan of Cougar rock card (Xeon Phi Co-processor)
– there is not communication between ipmitool command and SMC
– [Grantley][BMC][EWS] An error pop-up when selecting EWS option “SDR Configuration” or “Security Settings” with a user privilege account
– [Grantley][BMC][PHI]With BMC 1.49.10442, the FRU info of Xeon PHI card can’t be detected by FRUSDR utility or EWS.
– EMCTHOL – Inconsistent FW Version format on BMC Release Notes – HEX or DEC
– [Grantley][BMC][SMASH] The SMASH-CLP window closed automatically after running “stop /system1” command.
– Fix six EWS vulnerabilities reported by scanner: X-Frame-Options Header Not Set; Web Browser XSS Protection Not Enabled; X-Content-Type-Options Header Missing; SSL/TLS use of weak RC4 cipher; SSL medium strength and 64bit block ciphers supported; Protection against Clickjacking vulnerability.
– Need a command to check power button status
– upgrade openssl to version 1.0.2k
– upgrade openssh to version 7.4p1
FRUSDR Changes:
– Modified the cfg file to add EBCP SKU.
– Update SDR as per Kennedy Pass FSC Config Sheet Rev 2.2.xlsm
To pobieranie jest ważne dla produktów wymienionych poniżej:
– Intel Server Board S2600KPF
– Intel Server Board S2600KPR
– Intel Server Board S2600KPT
– Intel Compute Module HNS2600KP24R
– Intel Server Board S2600KPTR
– Intel Server Board S2600KP
– Intel Compute Module HNS2600KP
– Intel Server Board S2600KPFR
– Intel Compute Module HNS2600KPFR
– Intel Compute Module HNS2600KPF
– Intel Compute Module HNS2600KPR
– Intel Compute Module HNS2600KP24
System Firmware Update Package Usage instructions
This package can be updated using one of the following methods:
– Windows or Linux operating system using Intel One-boot Flash Update (OFU) V13.1 Build 13
– Windows Preboot Execution Environment (WinPE)
To update from Windows and Linux or operating systems using the Intel One Boot
– Flash Update Utility (OFU)
Use OFU to update system firmware by the following steps:
– Install OFU on Windows or Linux system
– Download the latest firmware update package from http://downloadcenter.intel.com/
– Unzip package to a folder
– Run the following command in Windows command line/Linux terminal window: <OFU install folder name>:flashupdt -u <package folder name>flashupdt.cfg
To update from Windows Preboot Execution Environment (WinPE)
The System Firmware Update Package can be inserted to Windows PE customized image for creating a bootable Windows PE CD. User is able to update system firmware from customized WinPE CD by the following steps:
– Boot server with customized WinPE CD
– Run script “WinPE21_x64_Update.bat” or “WinPE20_x86_Update.bat” (name may be varied depends on your own customization)
Pobierz