================================================================================ Intel(R) Server Board S2600WP, Intel(R) Server System H2000WP Product Family Firmware Update Package for Intel(R) Deployment Assistant, Intel(R) One Boot Flash Update Utility, The embedded EFI Shell, Windows* Preboot Execution Environment ================================================================================ Intel(R) Server Boards and Systems Intel Corporation 2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA ================================================================================ DATE : July, 18 2017 TO : Intel(R) Server Board S2600WP, Intel(R) Server System H2000WP Product Family customers SUBJECT : Release Notes for System Firmware Update Package ================================================================================ IMPORTANT NOTES ================================================================================ All the updates provided in this package are EFI based (unless otherwise noted).To run these updates, you must boot the system to the embedded EFI shell and then access the USB flash drive or hard disk containing the system software updates. NOTICE: Due to security requirements, downgrade to previous revisions in normal mode is NOT supported. Please use the BIOS Recovery procedure instead. BIOS R02.06.0005 also enhances the protection of the platform configuration data as described in Intel Security Advisory INTEL-SA-00056 https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00056&languageid=en-fr ================================================================================ ABOUT THIS RELEASE ================================================================================ BIOS : 02.06.0006 ME : 02.01.07.328 BMC : 01.28.10603 FRUSDR : 1.09 ================================================================================ Support Platforms and Dependency ================================================================================ Processors supported: Intel(R) Xeon processor E5-4600/2600/2400 series Intel(R) Xeon processor E5-4600/2600/2400 v2 series Microcode update versions: Intel(R) Xeon processor E5-4600/2600/2400 series C0 stepping: 0x00000513 CPUID = 0x206D5 Intel(R) Xeon processor E5-4600/2600/2400 series C1 stepping: 0x00000619 CPUID = 0x206D6 Intel(R) Xeon processor E5-4600/2600/2400 series C2 stepping: 0x00000710 CPUID = 0x206D7 Intel(R) Xeon processor E5-4600/2600/2400 v2 series C0/C1 stepping: 0x00000428 CPUID = 0x306e4 Production boards: Product Fab Version S2600WP Fab3 or above The following update process must be followed to ensure a trouble free update. 1. BMC firmware 2. BIOS 3. Manageability Engine (ME) firmware 4. FRUSDR ================================================================================ System Update Package Usage instructions ================================================================================ This package can be updated using one of the following methods: - The embedded UEFI shell To update from the embedded EFI Shell Update system firmware from Intel server EFI shell by the following steps: - Download Intel server system update package from http://downloadcenter.intel.com/ - Unzip package and copy all files to root folder in USB flash drive - Insert USB flash drive to server USB port - Reboot server, system will start BIOS/BMC/FRUSDR update automatically If the unzipped package is not under the root folder of USB flash drive: - Reboot server to EFI shell manually - Run command "map -r" in EFI shell to find the mount point of the USB flash drive - The USB flash drive may mount to fs0: or fs1: or other. - Run command "fs0:" or other to change folder to USB flash drive, - Change folder to the folder storing the firmware package - Run command "startup.nsh" to start firmware update process ************************************************************************************* Alternate Update Procedure: Individual Firmware Update Procedure ************************************************************************************* If you want to update firmware components individually, like BMC/BIOS/ME/FRUSDR, do NOT run the "STARTUP.NSH" file described in the Standard Update Procedure above. Instead, run the individual .NSH script file for each update included in the update package files. Follow the update order below to ensure a trouble free update: 1) BMC firmware update 2) BIOS update 3) Manageability Engine (ME) Firmware update 4) FRUSDR update ---- Update BMC Firmware 1) Boot the system to the EFI shell and go to root folder 2) At the shell prompt, run "UpdateBMC.nsh" to start BMC Firmware update 3) When complete, go to the BIOS update section described below, or power off the system and cycle AC power before continuing. ---- Update System BIOS 1) Boot the system to the EFI shell and go to root folder 2) At the shell prompt, run "UpdateBIOS.nsh" to start BIOS update 3) When complete, reboot the system and enter BIOS Setup by pressing the F2 Key during POST 4) Verify the BIOS string on main BIOS menu 5) Press F9 to load defaults and press F10 to save and reset the system 6) Go to the ME firmware update section described below The BIOS update is complete. Either reboot the server or go to the ME firmware Update section described below. ---- Update ME Firmware 1) Boot the system to the EFI shell and go to root folder 2) At the shell prompt, run "UpdateME.nsh" to start ME firmware update 3) When complete, go to the FRUSDR update section described below, or power off the system and cycle AC power before continuing. ---- Update FRUSDR 1) Boot the system to the EFI shell and go to root folder 2) At the EFI command prompt, run "UpdateFRUSDR.nsh" to start FRUSDR update 3) Answer questions and enter desired information when prompted. 4) When complete, reboot the system by front control panel ---- Verifying updates - Reboot the server - During POST, hit the Key when prompted to access the BIOS Setup Utility - Hit the F9 key to load BIOS Defaults - At the MAIN menu verify the BIOS revision is correct - Move cursor to the SERVER MANAGEMENT Menu - Move cursor down to the SYSTEM INFORMATION Option and hit Enter - Verify the BMC Firmware revision is correct - Verify the SDR revision is correct - Verify the ME Firmware revision is correct - Hit the F10 Key to save changes and Exit The System Software Update is Complete. ******************************************************************************* BIOS Recovery Process ******************************************************************************* In the unlikely event the BIOS is corrupted, leaving the system in an unbootable state, it may be necessary to perform the following BIOS Recovery procedure. 1. Copy the following BIOS update files to the root directory of a USB media device (Recovery Media): Note: These specific files will be located in the "BIOS Recovery Files" folder included in the System Update Package. - IPMI.EFI - IFlash32.EFI - RML.ROM - R##.##.####REC.CAP (where ##.##.#### = BIOS revision number) - STARTUP.NSH (modified to support BIOS recovery) 2. Power OFF the system 3. Locate the BIOS Recovery Jumper on the server board and move the jumper block from pins 1-2 (default) to pins 2-3 (recovery setting) 4. Insert the recovery media into any available USB port on the back of the server Note: The front panel USB ports may not work for this procedure on some server systems. 5. Power ON the system 6. The system will automatically boot into the embedded EFI Shell 7. The STARTUP.NSH file automatically executes and initiates the flash update. When complete, the IFlash utility will display a message 8. Power OFF the system and return the BIOS Recovery jumper to its default position 9. Remove recovery media from the USB port 10. Power ON the system 11. Do *NOT* interrupt the BIOS POST during the first boot. ================================================================================= BIOS R02.06.0006 ================================================================================= NOTICE: Due to security requirements, downgrade to previous revisions in normal mode is NOT supported. Please use the BIOS Recovery procedure instead. - Hotfix for security hole about RtcRead ================================================================================ ME 2.01.07.328 ================================================================================ - Fixed: Platform is not able to power on properly after being shut down by NM Policy - Fixed: Global platform power consumption reported by NM Statistics in S5 is incorrect - Fixed: OOB (out-of-band) stress test by issuing the wrong username may cause connection to be unavailable - Fixed: Shutdown action can be interrupted by cold reset when volatile NM policy is in use =============================================================================== BMC 01.28.10603 =============================================================================== -EPSD100252407: BMC no responds and bus hang on EMC isilon system -EPSD100252321: Privilege Escalation Attack via EWS ================================================================================ FRUSDR 1.09 ================================================================================ - Add SDR 'PSU0 Status' and 'PSU1 Status'. ============================================================================= LEGAL INFORMATION ============================================================================= Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Intel is a registered trademark of Intel Corporation. *Other names and brands are the property of their respective owners. Copyright (c) 2017 Intel Corporation. A portion of this firmware is open source code, which falls under the GPL 2.0 license. [END OF RELEASE NOTES]