Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006

Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006

Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006 Download Summary

  • File size: 27.30 MB
  • Platform: OS Independent
  • Price: FREE DOWNLOAD
  • Downloads: 96
  • Released: November 27, 2023
  • Manufacturer URL: Intel

Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006

This download record contains the BIOS and firmware update package for the Intel Server Board D50TNP Family and appropriate Intel Server System D50TNP Family —for use with Intel's technology-embedded Unified Extensible Firmware Interface (UEFI) shell. 

To update the system software stack to the versions included in this update package, the system software stack currently installed on the target server system MUST meet the following, or else the update may fail.

Firmware requirements:

- System BIOS: R01.01.0005 or later
- ME Firmware: 04.04.04.62
- BMC Firmware: 2.88.e5f45b9c or later
- FRUSDR: 0.40 or later
- CPLDL: v3P5 or later
- Pmem: 2.2.0.1553

Included Software Updates and Update Utilities:

- System BIOS: R01.01.0006
- ME Firmware: 04.04.04.202
- BMC Firmware: 2.89.7e3b728b
- FRUSDR: 0.42
- Pmem: 2.2.0.1553
- CPLD: v3P9
- sysfwupdt.efi - Version 16.0.5

BMC Changes:

- Cache PSU FRU and loosen the check of PSU data.
- Add recovery method for PSU related sensor in "SDR Parse" action.
- Fix PSU FRU/Sensor missing issue when hotplug or AC cycle occurs. (#485)
- Fix getting wrong FRU data bytes issue that causes losing P… (#483)
- Add nVidia A100-80G support (#482)
- Add "Reason Code" for PLDM_TYPE5 reading failed, and extend the delay time for EWS display of NCSI (#481)
- Add delay on ClearNVMeState to make NVMe_features_enabled effective
- CCB#3622 - The CPU1 SSDs can not be detected in UEFI and BIOS setup menu. (#474)
- Remove display of hostinterface in vlan (#469)
- [TNP] Support new NVIDIA A40 GPGPU card. (#468)
- Avoid to check oob_firmware_update_enabled for Non-BIOS-OOB components (#466)
- Extend timeout and sleep time when probing FRU (#465)
- Avoid to check oob_firmware_update_enabled for internalVM (#464)
- Fix the fan profile always keeps profile 0 when Intel lan card is inserted, no matter the different HSBP quantity. (#463)
- Fix 500 error if AD server is unreachable and timeout is longer than 15 (#453)
- Auto power on host when BIOS is recovered (#449)
- Change "Critical Interrupt" to "PCIe Interrupt" for sensor type 0x13 (#446)
- CCB#3622 - Enable CPU1 SlimSAS ports when CYP Interposer module is connected to CPU0. (#447)
- Add PCIe Gen 4/5 desciption according to NVMe MI spec.
- Remove check tmp size when using PutFileToImage
- Check if the internal image is mounted before UmountImage
- Fix java & html5 mount folder status error
- Clear the vMedia Usable while closing the VM over html5 window
- Auto power on host when BIOS is recovered. (#443)
- Enter OS and inject UCE, there are many unexpected log for 'OEM timestamped' and 'Event type 6f, offset 1' generated. (#442)
- Modify the 0x147 event log. (#439)
- Fix AD user structure (#422)
- Support new PCIe cards NVIDIA A2/A40 and Intel ATS M1/M3 for CYP. (#419)
- Upload .cfg / .sdr files and click parse will update fail in EWS if BMC is offline update to BMC 2.88d. (#418)
- Fail to save on SNMP server configuration in EWS (#411)
- Enter OS and inject UCE, there are many unexpected log for 'OEM timestamped' and 'Event type 6f, offset 1' generated. (#413)
- Fix the mounted folder is empty when mount a Chinese folder via Java KVM (#409)
- Fixed klocwork issues of JavaAP. (#408)
- Use NVME driver to obtain U.2 NVMe SSD temperature (#396)
- The EWS can't be login with a AD account(user logon name@domain name)when the user logon name is different from the pre-Windows 2000 user logon name. (#407)
- mount/umount WebISO will not affect vMedia Usable (#405)
- Fix crashdump lock&unlock bugs. (#402)
- The LDAP accounts can be set to callback privilege in EWS->LDAP Settings. (#398)
- Remove lock operation on bus30ToPostEnumeratedBus (#390)
- Debug Log enhancement for NVMe drives (#383)
- The LDAP accounts can be set to callback privilege in EWS->LDAP Settings. (#380)
- Use the correct session id to store vm stat in the session file (#379)
- Fix the “Invalid” ISO file can be mounted via WebISO
- Fix virtual storage always pop up a message when selecting the device after plug in a virtual media over HTML5 (#377)
- Crashdump log cannot be found in DebugLogs.zip
- Fix BMC reports multiple drive rebuild/faults events during a VROC Virtual drive initialization. (#378)
- Fix the wrong basic fan profile, and wrong fan profile when plug NVIDIA A16 in riser 1.
- When enabled user's SNMPv3 Access , it will be disabled after restore BMC with checking "Keep User and LAN configuration" in EWS. (#368)
- When select media type to ISO/IMG/IMA in virtual media over HTML5,all ISO/IMG/IMA files can't be displayed in the "ISO.IMG.IMA File" search mode.
- Chinese and English EWS help information does not match.
- The ISO/IMA file can't be mounted in the Virtual Media > virtual storage > Device 2/Device 3 after mounting a folder in Device 1.
- Fixed_java_kvm_linux_windows_asynchronous_issue
- Fix the MAC address error of E810-CQDA1 (#364)
- Update Whitley crashdump to latest code and format (#360)
- The FRUSDR file and EWS copyright is not correctly. (#306)
- Use lazy umount for umount internal vm (#356)
- Upgrade libxml2 from v2.9.12 to v2.9.13 (#334) (#355)
- Ensure MUX disable on Intel Vendor ID failure (#173)
- Many PCIe items listed under EWS -> BIOS Configurations -> Integrated IO Configuration, cannot match the BIOS setup. (#49)
- Value overflow, structure format, Double free in MDR function (#227)
- Add single quote to eascape special characters (#282) (#352)
- When a zip or gz file containing a folder is uploaded via redfish,the timestamp of some files are displayed as 1935. (#281)
- Check if the space is enough before upload file (#283)
- Modify Web_Server/OS/Linux/Web_Style/INSYDE/js/sys_nic.js for drop-down box displays normal (#284)

BIOS Changes:

- Change BIOS ID to SE5C620.01.01.0006
- [BIOS Option change]:[CCB]:[3692][HSD-ES]:[15011178883] VMD PCIe address changed after FW update
- Add Advanced->PCI Configuration->Reset PCI Rebalance Data option, default is Disabled
- [CCB]:[3622][HSD-ES]:[15011020304][CCB3622] Enable CPU1 SlimSAS ports when CYP Interposer module is connected to CPU0
- [HSD-ES]:[2103653665] After enable VMD, the NVME SSDs connected to CPU0 3x port are mapped as CPU0 PCIe 2x port in RSD Type 194 and EWS.(Regression)
- [HSD-ES]:[2103652088] Remove extra WhitleypcPkg definition
- [HSD-ES]:[2103652083] Correct Console Redirection expression for EWS."
- [HSD-ES]:[2103652819] No Password Salt or System Wide Salt Used"
- [HSD-ES]:[2103652714] Remove unnecessary option information.
- [HSD-ES]:[2103648335] PPR finish log is shown as Critical severity in EWS after inject CE to DIMM
- [HSD-ES]:[15011379852] Update default code reviewer for Whitley commercial Platform
- [HSD-ES]:[15011558718] When SMX is fused off then SINIT & BIOS ACMs SVNs should contain Reset Value in SE SVN MSR."
- [Hsd-ES]:[2103652088] SUT does FRB2 reset when system under driver health manager screen of destroyed RAID volume.
- [Hsd-ES]:[2103651861] System cannot save the BIOS setting after load BIOS default by syscfg or sysfwupdt utility
- [Hsd-ES]:[15011215869] No Password Salt or System Wide Salt Used
- [Hsd-ES]:[22103651902] "Connector type" is wrong for M.2 NVMe SSD under EWS-->Storage information
- [Hsd-ES]:[15011209414] Intel Server BIOS Buffer overflow vulnerability.
- [Hsd-ES]:[15011347802] ME version is incorrect in BMC Event Log
- [BIOS Option change]:[CCB]:[3584][Hsd-ES]:[15010770843] [CCB3584] [BIOS] Redfish NIC config Knobs and SMBIOS type 42 for Redfish (Clone Purley CCB3158)
- Add Server Management->BMC LAN Configuration->"HI BMC Lan Configuration/HI Host LAN configuration" related settings
- [CCB]:[3622][Hsd-ES]:[15011020304] [CCB3622] Enable CPU1 SlimSAS ports when CYP Interposer module is connected to CPU0.
- [CCB]:[3473][Hsd-ES]:[15010873024] [CCB3473]Log SEL when OptionROM fails to verify with UEFI secure boot. Do not hang system boot or wait for key.
- [CCB]:[3609][Hsd-ES]:[15010770752] [CCB3609] [BMC/BIOS] Improve FRB2 behavior so on 3 attempt it is disabled
- [CCB]:[3535][Hsd-ES]:[15010770685] Change 'RAPL limit MSR Lock' knob value into Enable.
- [CCB]:[3610][Hsd-ES]:[15010770813] Improve Pfr panic checkpoint
- [Hsd-ES]:[2103644614] Correct Console Redirection expression for EWS.
- [Hsd-ES]:[2103650268] Correct callback issue.
- [Hsd-ES]:[2103644020] Correct SOL for Baseboard Mgmt2 option handling on CYP.
- [Hsd-ES]:[15010590176] Remove AMT complete SEL
- [Hsd-ES]:[15011182852] Enable PCIe ATS on Whitley BIOS
- [Hsd-ES]:[15011206608] Update RC version to 001B to align RP PLR3 Beta Candidate RC version 001C.
- [Hsd-ES]:[14016342444] M50CYP SUP R0005 does not report bad DIMM in POST message.
- [Hsd-ES]:[22014887190] Change PFR Watchdog Timer behavior to meet product requirements Problem.
- [Hsd-ES]:[15011062024] Change the GenITK tool from GenITK.exe into GenITK.py
- [Hsd-ES]:[15011040227] SUT can't log in the EWS when a user with a 20 characters password created in the BIOS setup
- [Hsd-ES]:[15010775402] ITK setting still can be applied successfully when PFR flash active BIOS failed.
- [Hsd-ES]:[16015331172] SATA and sSATA Driver depex
- [Hsd-ES]:[15011197631] Intel Server BIOS Buffer overflow vulnerability
- [Hsd-ES]:[2014627819] SPI PCIe config base after changing to 3G base
- [Hsd-ES]:[18019438530] Clear ITCCTRL23.rcb128 to align MS3IOSF RCB to PCIe RCB
- [Hsd-ES]:[15010809178] [Whitley] BMC received incorrect DIMM temperature data when DIMM SMBus met recovery situation (due to BIOS disabling the CLTT)
- [Hsd-ES]:[22014638487] RemoveInvalidPprEntry input parameter is Ch in Socket (0 to 7) and PprAddrSetup uses mc Channel (0 to 1)""
- [Hsd-ES]:[22014623287] ICX Media Disabled Pmem module preventing reprovisioning of other modules on socket
- [Hsd-ES]:[22014700950] BSSA RMT fix for per bit margins
- [Hsd-ES]:[22014671673] Copyright tag shows old value in BIOS page.
- [Hsd-ES]:[22014638461] Block Decoder will not get mapped if DDR is mapped up to MMIOH
- [Hsd-ES]:[22014631175] Adding settings for DDR_2666
- [Hsd-ES]:[22014638962] Remove HMRC WA from IPClean BIOS source
- [Hsd-ES]:[22014638861] The Memory RAS code may clean and corrupt the SystemMemory Map structure if the VariableSize being to a large value
- [Hsd-ES]:[22014638800] [PCI] Updating help text for Relaxed Ordering option.
- [Hsd-ES]:[22014630286] Silent Data Corruption occurs when Reversing and Forward ADDDC Rank Sparing
- [Hsd-ES]:[22014637898] Fix cpgcGblTrainingSetup.rwMode overwritten to read mode
- [Hsd-ES]:[18018607038] Change the way which buffer is passed between DXE and SMM drivers from UEFI variable to protocols
- [Hsd-ES]:[22014637927] EWL logging is missing for UCE PPR using failing DIMM
- [Hsd-ES]:[22014637905] Program Margin Read to reduced or increased values in case TSE EEPROM CRC failures
- [Hsd-ES]:[22014638380] when eMCA enabled MCE is not propagated to socket1 after socket0-punit catastrophic error injection
- [Hsd-ES]:[22014638893] Inclusion of SGX NVRAM manifest file in firmware build
- [Hsd-ES]:[14015874261] BaseResetSystemLinConstructor() is launched prior
- [Hsd-ES]:[22014698846] When SMX is fused off then SINIT & BIOS ACMs SVNs should contain Reset Value in SE SVN MSR.
- [Hsd-ES]:[15010270944] Memory ce skip ppr
- [Inclusive language]Replace deprecated terms in source code and remove some end of line space and tab.
- Change copyright of OEM post screen.
- Server-RC-0.4.2.001C

FRUSDR Changes:

- Correct 'OS event' sensor number and owner ID
- Upgrade utility to 16.0.3
- Enter OS and inject UCE, there are many unexpected log for 'OEM timestamped' and 'Event type 6f, offset 1' generated.
- The FRUSDR file and EWS copyright is not correctly

GENERAL INSTALLATION PROCEDURE

1. Unzip the contents of the update package and copy all files to the root directory of a removable media (USB flash drive)
2. Insert the USB flash drive to any available USB port on the system to be updated
3. Power on the server and load the uEFI shell
4. Begin the update process running the Startup.nsh
5. Reboot the system after the update process has successfully completed

Web GUI update

1. Unzip the package onto your system
2. Log into the BMC web GUI
3. Navigate to Configuration, then Firmware Update
4. Click browse, and direct the browser to the location of Purley_1.04.f80688d0.bin
5. Click upload. Progress and status will be shown as the update progresses

UEFI update

1. Unzip package and load onto a flash drive
2. Boot to UEFI shell, and navigate to the folder where this package lives
3. Run fwUpdateBMC.nsh and follow the prompts

Verifying Updates:

01. After the final update has completed successfully, reboot the system
02. During POST, hit the Key when prompted to access the BIOS Setup Utility
03. From the BIOS Setup Utility main menu, hit the key to load BIOS defaults
04. Hit the key to Save Changes and Exit the BIOS defaults
04. At the main menu verify the BIOS revision is correct
05. Move cursor to the SERVER MANAGEMENT menu and hit Enter
06. Move cursor to the SYSTEM INFORMATION Option and hit Enter
07. Verify the BMC Firmware revision is correct
08. Verify the SDR revision is correct
09. Verify the ME Firmware revision is correct
10. Configure desired BIOS Option settings
11. Hit the F10 Key to Save Changes and Exit

About Firmware Updates:

Applying a newer firmware version than the one already installed on your unit can bring various enhancements, include workarounds for diverse problems encountered by the device, and improve or add newly developed features.

On the other hand, downgrading the firmware version can recover the device's functionality in the event of a software update either turning up faulty or causing the unit's overall performance to drop. However, bear in mind that applying an older firmware isn't recommended and might not always be possible.

When it comes to the update steps, due to the large variety of devices and numerous ways for installing a new firmware, it is recommended that you carefully read and understand the upgrade steps, and consider applying a different firmware only when you have familiarized yourself with the update method.

As the installation process is most of the times quite risky, this step should be taken by users that have the ability to successfully complete the update; regular users may initiate it at their own risk. Moreover, it's best that this task be performed in a steady power environment such as the one ensured by a UPS unit.

Therefore, if you consider applying this release, hit the download button, take into account all the aforementioned aspects, and update the device's firmware. Also make sure you constantly check with our website to ensure that you don't miss a single new release.

Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006 Bookmark

Hyperlink code:
Hyperlink for Forum code:

Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006 Drivers Download Notice

Top 4 Download periodically updates information of Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006 full driver from the manufacturer, but some information may be slightly out-of-date.

Using warez version of Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006 driver is hazardous. Our driver download links are directly from our mirrors or publisher's website, Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006 torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, MailBigFile, DropSend, MediaMax, zUpload, MyOtherDrive, SendSpace, DepositFiles, Letitbit, LeapFile, DivShare or MediaFire, are not allowed!

It is not recommended to download drivers from illegal sites which distribute a keygens, key generators, pirate keys, serial numbers, warez full versions or cracks for Intel D50TNP2MHSVAC Server System UEFI BIOS/Firmware 01.01.0006. These drivers might corrupt your computer installation or breach your privacy. A driver might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.