- BIOS: 01.01.0029
- ME: 03.01.03.072
- BMC: 01.60.12335
- FRUSDR: 1.18
- [HSD-ES][1507032918][D0249]System become unresponsive when flash the modified BIOS capsule that change offset 0x70 value from 00 to 4F
- [HSD-ES][1507164194]0xFF transport failed on serial port
- [HSD-ES][1507197471]FW-UEFI-Vuln-2019-117 [BDBA] Intel Server Board S2600TP Family - System Update Package EFI - BIOS 01.01.0024, ME FW 03.01.03.043, BMC 1.51.11142, FRUSDR 1.17
- [HSD-ES][1507218677]Include PRT patch Intel Server and Workstation Processors Microcode Update Rev. Production SRV_P_285 to Xeon E5-2600v3,v4 Family Q3 2019
- [HSD-ES][1507195983][Security] Race conditions in VariableInterface() allow arbitrary writes inside of SMRAM
- [HSD-ES][1507242883]CCB#2664:[BIOS] Add correctable error thresholds for 100 and 500
- [HSD-ES][1507238702]The copyright should be Copyright (c) 2010-2019 instead of Copyright(c) 2010-2018
- [HSD-ES][1507284801]Xeon E5-2600v3,v4 Family Security version update to version 1111
- [HSD-ES][2207342514]Injection of Malformed TLP into PCH slot shows no system reponse
- [HSD-ES][1507402292][S2600KP]Syscfg /fan command failed to change setting on S2600KP
- [HSD-ES][1607116940]Add two BIOS PCIe options for each PCIe slot's add-in card into BIOS setup/Syscfg/ITK options when PCIe Advance Error Reporting feature(AER) is enabled.
- [HSD-ES][1507689901]The copyright should be Copyright (c) 2010-2020 instead of Copyright(c) 2010-2019
- [HSD-ES][1507349222]Unsecure write to SMRAM because of missing buffer validation
- [HSD-ES][1507801623][H1 #744766] SMM-module - MemRas - Missing pointer validatio S2600
- Update 0x38 Microcode for IPU2019.2
- Update ME to 03.01.03.072 for IPU2019.2
- Update SINT ACM: 3.1.3 for IPU2019.2
- [HSD-ES][1507430121]:Xeon E5-2600v3,v4 Family BIOS KCS fix
- [HSD-ES][2103632349]SOL options in BIOS setup can be operated when KCS mode change to Restricted or Deny All.
- [HSD-ES][1507896793]SUT will halt at post code 0x81 when downgrade BIOS from D52 to R28.
- [HSD-ES][2103632353]Set KCS mode to Deny All or Restricted, change some option, press F10 and “Y” to save, there will show a message "Submit Fail for Form: UEFI Network Stack".
- [HSD-ES][2103632466]The BMC Firmware Revision&SDR Revision not hidden in POST Information under KCS Deny All mode.
- [HSD-ES][1507979683]Enable BT(SIO) in Pilot BMC
- [HSD-ES][1507959292]Add new KCS policy done_core flage in BT
- QSR PSIRT-TA-201901-002
- [BMC]After offline update BMC to 1.58, SSH can't connect successfully by default port 22.
- [BMC]The EWS login Window can't be opened sometimes if offline update the BMC to 1.58.
- [BMC]The SSH connection will be closed automatically after issuing some commands.
- [BMC]The SEL for capture KCS policy control mode is incorrect.
- [BMC] KCS policy sensor will show "Unknown" health status after BMC reset for BMC 1.59.
- [BMC] There is no help information about new features "RMCP mode" and "RMCP+ Cipher Suite3" in the EWS.
- [BMC]Changed any secure port of KVM/CDROM/USB/Floppy, the KVM will hang up after mount any remote media.
- The KVM session will hang up when set the "USB key Emulation Type" to "Hard Disk" type and mount the redirected devices.
- It shows, "Description:Unname - Asserted" in the SELText.txt (SELLOG.zip) for all KCS control mode.
- [BMC]The SUT can't get the stateful IPv6 IP address from DHCPv6 server.
- [BMC]The SEL for capture KCS policy control mode is incorrect.
- Replace 05A~08A 1600W PSU fw from 75 to 78 and add 09A~11A 1600W PSU FW version 78
- Upgrade openssl from 1.1.1e to 1.1.1g
- KCS PSIRT enhancement that is for core-bios-done possible security attack
- add Cipher Suite3 setting in EWS
- add RMCP mode setting in EWS
- fix RED team reported problems including Web File upload problem and Authentication Bypass for each ASP endpoint.
- BDBA fix : libs and application upgrade (/usr/bin/unzip and /sbin/lsof removed,libldap to 2.4.49,openssl from 1.1.1d to 1.1.1e,libtasn1 to v4.16, libkrb5.so-keberos upgrade to 1.18.0)
- web page copyright date wrong problem.
- [BMC]The SSH connection will be closed automatically after issuing some commands.
- fail to dump system debug log with syscfg.
- [BMC][H1 761356] buffer overflow in usbe.ko leads to remote code execution.
- DCG RED team reported vulnerabilities fix ID#19 and improvement on ID#4,8,9 fixes.
- BDBA fix - kernel and busybox upgrade
- BDBA Fix - libs and application upgrade (libbz2, libgcrypto, libgpg-error, libsasl2, openssl, zlib, openssh, stunnel, dhclient, glibc)
- KCS PSIRT problem (refer to Xeon E5-2600v3,v4 Family BMC EPS 1.20)
- Only support Cipher suite 17 for IPMI over lan(ipmitool -I lanplus .... -C 17)
- SSH weak cipher remove
- USBanywhere security problem , need to disable unsecure port about KVM
- CCB 2880 Add IPMI commands and Web interface for user to select SSL Cipher
- expl_fdserver problem, need to fix bypass auth issue
- DCG RED team reported about 20 vulnerabilities.
- klockwork problem fix including about 2000 Critical and Error issues in different features.
- Features added: Add KCS Ctrl Mode sensor & Update frusdr.efi and ipmi.efi utility to 14.1 build 18
This package can be updated using one of the following methods:
- Windows or Linux operating system using Intel One-boot Flash Update (OFU) V13.1 Build 13
- Windows Preboot Execution Environment (WinPE)
To update from Windows and Linux or operating systems using the Intel One Boot
- Flash Update Utility (OFU)
Use OFU to update system firmware by the following steps:
- Install OFU on Windows or Linux system
- Download the latest firmware update package from homepage
- Unzip package to a folder
- Run the following command in Windows command line/Linux terminal window:
To update from Windows Preboot Execution Environment (WinPE)
The System Firmware Update Package can be inserted to Windows PE customized image for creating a bootable Windows PE CD. User is able to update system firmware from customized WinPE CD by the following steps:
- Boot server with customized WinPE CD
- Run script "WinPE21_x64_Update.bat" or "WinPE20_x86_Update.bat" (name may be varied depends on your own customization)
- Unzip the contents of the update package and copy all files to the root directory on a USB flash drive
- Insert the USB flash drive to any available USB port on the server system to be updated
- Power on the server
- The system will automatically access the uEFI shell and begin the update process.
Or
- If the files were copied to a folder other than the root, Boot the Server to the uEFI shell. This can be accessed via the
- Run the command "map -r" in the uEFI shell to mount the USB flash drive
- Run the command "fs0:" to change folders to the USB flash drive. The USB flash drive may also mount to fs1: depending on other installed devices. The number of "fs#" is dependent on the result of command "map -r"
- Change folders to the folder holding the update package files and manually start the "Startup.nsh" script file to start loading all updates
- Reboot the system after the update process has successfully completed
- During POST, hit the
- From the BIOS Setup Utility main menu, Hit the
- At the MAIN menu verify the BIOS revision is correct
- Move cursor to the SERVER MANAGEMENT Menu
- Move cursor down to the SYSTEM INFORMATION Option and hit Enter
- Verify the BMC Firmware revision is correct
- Verify the SDR revision is correct
- Verify the ME Firmware revision is correct
- Configure desired BIOS Option settings
- Hit the F10 Key to save changes and Exit
If you wish to apply this ME (Management Engine) Firmware version, you should first make sure that the version number matches your AMT (Active Management Technology) family, as each update is specifically developed for certain system configurations.
While this technology is mostly associated with enterprises, it can also be used by various IT administrators as well as regular users. However, bear in mind that even though other platforms might also be compatible, we do not recommend installing this release on OSes other than the specified ones.
Although installing a newer BIOS version might add new features, update various components, or improve the device’s usability, this process is very risky, so the upgrade is recommended to be performed only when it is really needed.
Regardless of the method used or whether the upgrade is performed by a regular or power user, it’s recommended that the new BIOS be applied in a steady power environment such as the one ensured by a UPS unit.
The Basic Input/Output System (BIOS) is a very important software that loads the currently installed OS, and tests all of the system’s hardware components – so make sure you flash it correctly.
Bear in mind that failing to perform a successful installation could seriously damage your device, and the faulty BIOS resulted from the process might even render it unusable.
Applying a newer firmware version than the one already installed on your unit can bring various enhancements, include workarounds for diverse problems encountered by the device, and improve or add newly developed features.
On the other hand, downgrading the firmware version can recover the device's functionality in the event of a software update either turning up faulty or causing the unit's overall performance to drop. However, bear in mind that applying an older firmware isn't recommended and might not always be possible.
When it comes to the update steps, due to the large variety of devices and numerous ways for installing a new firmware, it is recommended that you carefully read and understand the upgrade steps, and consider applying a different firmware only when you have familiarized yourself with the update method.
As the installation process is most of the times quite risky, this step should be taken by users that have the ability to successfully complete the update; regular users may initiate it at their own risk. Moreover, it's best that this task be performed in a steady power environment such as the one ensured by a UPS unit.
Therefore, if you consider applying this release, hit the download button, take into account all the aforementioned aspects, and update the device's firmware. Also make sure you constantly check with our website to ensure that you don't miss a single new release.
It is highly recommended to always use the most recent driver version available.
Try to set a system restore point before installing a device driver. This will help if you installed an incorrect or mismatched driver. Problems can arise when your hardware device is too old or not supported any longer.
Top 4 Download periodically updates information of Intel HNS2600TPNR Compute Module OFU Firmware 1.01.0029 full driver from the manufacturer, but some information may be slightly out-of-date.
Using warez version of Intel HNS2600TPNR Compute Module OFU Firmware 1.01.0029 driver is hazardous. Our driver download links are directly from our mirrors or publisher's website, Intel HNS2600TPNR Compute Module OFU Firmware 1.01.0029 torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, MailBigFile, DropSend, MediaMax, zUpload, MyOtherDrive, SendSpace, DepositFiles, Letitbit, LeapFile, DivShare or MediaFire, are not allowed!
It is not recommended to download drivers from illegal sites which distribute a keygens, key generators, pirate keys, serial numbers, warez full versions or cracks for Intel HNS2600TPNR Compute Module OFU Firmware 1.01.0029. These drivers might corrupt your computer installation or breach your privacy. A driver might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.