================================================================================ Intel(R) Server Board S2600JF, Intel(R) Server System H2000JF Product Family Firmware Update Package for Intel(R) Deployment Assistant, Intel(R) One Boot Flash Update Utility, The embedded EFI Shell, Windows* Preboot Execution Environment ================================================================================ Intel(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : January, 11 2016 TO : Intel(R) Server Board S2600JF, Intel(R) Server System H2000JF Product Family customers SUBJECT : Release Notes for System Firmware Update Package ================================================================================ IMPORTANT NOTES ================================================================================ NOTICE: As security requirement, R02.05.0004 reversion doesn't support capsule downgrade in normal mode. In order to downgrade from this BIOS version, you must use the recovery jumper method. -This version enhances the protection of platform configuration data as described in Intel Security Advisory INTEL-SA-00043 ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS : 02.06.0002 ME : 02.01.07.328 BMC : 01.25.9398 FRUSDR : 1.13 ================================================================================ Support Platforms and Dependency ================================================================================ Processors supported: Intel(R) Xeon processor E5-4600/2600/2400 series Intel(R) Xeon processor E5-4600/2600/2400 v2 series Microcode update versions: Intel(R) Xeon processor E5-4600/2600/2400 series C0 stepping: 0x00000513 CPUID = 0x206D5 Intel(R) Xeon processor E5-4600/2600/2400 series C1 stepping: 0x00000619 CPUID = 0x206D6 Intel(R) Xeon processor E5-4600/2600/2400 series C2 stepping: 0x00000710 CPUID = 0x206D7 Intel(R) Xeon processor E5-4600/2600/2400 v2 series C0/C1 stepping: 0x00000428 CPUID = 0x306e4 Production boards: Product Fab Version S2600JF Fab5 or above The following update process must be followed to ensure a trouble free update. 1. BMC firmware 2. BIOS 3. Manageability Engine (ME) firmware 4. FRUSDR ================================================================================ System Firmware Update Package Usage instructions ================================================================================ This package can be updated using one of the following methods: - The embedded UEFI shell - Intel(R) Deployment Assistant - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU) V11.0 Build 15 or later) - Windows* Preboot Execution Environment (WinPE) To update from the embedded EFI Shell Update system firmware from Intel server EFI shell by the following steps: - Download Intel server system firmware update package from http://downloadcenter.intel.com/ - Unzip package and copy all files to root folder in USB flash drive - Insert USB flash drive to server USB port - Reboot server, system will start BIOS/BMC/FRUSDR update automatically If the unzipped package is not under the root folder of USB flash drive: - Reboot server to EFI shell manually - Run command "map -r" in EFI shell to find the mount point of the USB flash drive - The USB flash drive may mount to fs0: or fs1: or other. - Run command "fs0:" or other to change folder to USB flash drive, - Change folder to the folder storing the firmware package - Run command "startup.nsh" to start firmware update process ************************************************************************************* Alternate Update Procedure: Individual Firmware Update Procedure ************************************************************************************* If you want to update firmware components individually, like BMC/BIOS/ME/FRUSDR, do NOT run the "STARTUP.NSH" file described in the Standard Update Procedure above. Instead, run the individual .NSH script file for each update included in the update package files. Follow the update order below to ensure a trouble free update: 1) BMC firmware update 2) BIOS update 3) Manageability Engine (ME) Firmware update 4) FRUSDR update ---- Update BMC Firmware 1) Boot the system to the EFI shell and go to root folder 2) At the shell prompt, run "UpdateBMC.nsh" to start BMC Firmware update 3) When complete, go to the BIOS update section described below, or power off the system and cycle AC power before continuing. ---- Update System BIOS 1) Boot the system to the EFI shell and go to root folder 2) At the shell prompt, run "UpdateBIOS.nsh" to start BIOS update 3) When complete, reboot the system and enter BIOS Setup by pressing the F2 Key during POST 4) Verify the BIOS string on main BIOS menu 5) Press F9 to load defaults and press F10 to save and reset the system 6) Go to the ME firmware update section described below The BIOS update is complete. Either reboot the server or go to the ME firmware Update section described below. ---- Update ME Firmware 1) Boot the system to the EFI shell and go to root folder 2) At the shell prompt, run "UpdateME.nsh" to start ME firmware update 3) When complete, go to the FRUSDR update section described below, or power off the system and cycle AC power before continuing. ---- Update FRUSDR 1) Boot the system to the EFI shell and go to root folder 2) At the EFI command prompt, run "UpdateFRUSDR.nsh" to start FRUSDR update 3) Answer questions and enter desired information when prompted. 4) When complete, reboot the system by front control panel ---- Verifying updates - Reboot the server - During POST, hit the Key when prompted to access the BIOS Setup Utility - Hit the F9 key to load BIOS Defaults - At the MAIN menu verify the BIOS revision is correct - Move cursor to the SERVER MANAGEMENT Menu - Move cursor down to the SYSTEM INFORMATION Option and hit Enter - Verify the BMC Firmware revision is correct - Verify the SDR revision is correct - Verify the ME Firmware revision is correct - Hit the F10 Key to save changes and Exit The System Software Update is Complete. ******************************************************************************* BIOS Recovery Process ******************************************************************************* In the unlikely event the BIOS is corrupted, leaving the system in an unbootable state, it may be necessary to perform the following BIOS Recovery procedure. 1. Copy the following BIOS update files to the root directory of a USB media device (Recovery Media): Note: These specific files will be located in the "BIOS Recovery Files" folder included in the System Update Package. - IPMI.EFI - IFlash32.EFI - RML.ROM - R##.##.####REC.CAP (where ##.##.#### = BIOS revision number) - STARTUP.NSH (modified to support BIOS recovery) 2. Power OFF the system 3. Locate the BIOS Recovery Jumper on the server board and move the jumper block from pins 1-2 (default) to pins 2-3 (recovery setting) 4. Insert the recovery media into any available USB port on the back of the server Note: The front panel USB ports may not work for this procedure on some server systems. 5. Power ON the system 6. The system will automatically boot into the embedded EFI Shell 7. The STARTUP.NSH file automatically executes and initiates the flash update. When complete, the IFlash utility will display a message 8. Power OFF the system and return the BIOS Recovery jumper to its default position 9. Remove recovery media from the USB port 10. Power ON the system 11. Do *NOT* interrupt the BIOS POST during the first boot. ================================================================================= BIOS R02.06.0002 ================================================================================= - Fixed:The EFI script “Variable_reclaim.nsh” cannot complete successful and the BIOS Error Manager screen will show "A0A8" memory update failure error. - Fixed:POST screen and BIOS setup screen will shows different BIOS version under recovery mode. - Fixed: Victor Sokolov - Removable RAID Controller . - Fixed : Change Boot Order with SYSCFG in S2600CO2 - Fixed: "Melock" fix. - Fixed: (X) BIOS 2.04 help screen text typos. - Fixed: Romley Security issue. - Fixed: The link speed of RS3WC080 storage card only report to Gen2 on BIOS R02.04.0002 with SNB CPU. - Fixed: UEFI Optimized Boot acknowledges F2 Setup to start, but boots Windows instead. ================================================================================ ME 2.01.07.328 ================================================================================ - Fixed: Platform is not able to power on properly after being shut down by NM Policy - Fixed: Global platform power consumption reported by NM Statistics in S5 is incorrect - Fixed: OOB (out-of-band) stress test by issuing the wrong username may cause connection to be unavailable - Fixed: Shutdown action can be interrupted by cold reset when volatile NM policy is in use =============================================================================== BMC 01.25.9398 =============================================================================== - BMC change to ensure the system remains off after an over current event until the system has been AC power cycled - Add a new support for only TLS1.2 protocol(both for stunnel and openssl). - Disable stunnel for ihc - The www sectionas location is changed from 00c00000 to 00c20000. - Update openssl to 1.0.2d. ================================================================================ FRUSDR 1.13 ================================================================================ - None. ============================================================================= LEGAL INFORMATION ============================================================================= Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2015 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license. [END OF RELEASE NOTES]