- Security Hardening Enhancements: This release contains important reliability improvements and security hardening enhancements. Mellanox recommends upgrading your devices firmware to this release to improve the devices’ firmware security and reliability.
- When upgrading or changing configuration on multi-host adapter cards, for the changes to take effect, PCIe restart must be simultaneously send from both hosts (servers). To do so, perform the following: 1. Shut down the server with the auxiliary card, 2. Shut down the server with the primary card, 3. Bring back the server with the primary card, 4. Bring back the server with the auxiliary card.
- SR-IOV - Virtual Functions (VF) per Port - The maximum Virtual Functions (VF) per port is 127.
- It is recommended to enable the “above 4G decoding” BIOS setting for features that require large amount of PCIe resources. Such features are: SR-IOV with numerous VFs, PCIe Emulated Switch, and Large BAR Requests.
- NIC scheduling feature support has been disabled for non-privileged functions.
- Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
- Added support for Enabling/Disabling NIC and RDMA (port/partition) via the UEFI HII system settings.
- Increased the maximum number of MSIX per VF to 127.
- Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.
- Added support for RDMA partitioning and RDMA counters in IB mode.
- Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
- Added a new flex parser to support GENEVE hardware offload and ICMP.
- When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
- Enabled UID 0 to create resources with UMEM.
- Added support for receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
- Added support for RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and the DQPN.
- Fixed an issue that caused TX PRBS not to change after reconfiguring it. Now all PRBS mode are enabled in test mode.
- Fixed an assert that was caused when trying to open 1024 functions on the device. The maximum number of functions is 1023.
- Disabled the CNP counter “rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
- Fixed the TMP421 sensor temperature reporting.
- Fixed the rate select mechanism in QSFP modules.
- Fixed classification issues for "Passive" cables to be more robust.
- Fixed an issue that occasionally caused some performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
- Fixed an issue that caused a fatal error, and eventually resulted in the HCA hanging when a packet was larger than a strided receive WQE that was being scattered.
- Fixed a rare issue that caused RX pipe to hang.
- Fixed the resource number size (a 64 bit number) to avoid a scenario where it overwrote it with a 32 bit number and erased the high bits when de-allocating the resource number.
- Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
- CRT_DCR with index larger than 1 << 21 can collide with the CRT_SW_RESERVED address.
- Fixed an issue that caused the TX queue to hang when the VF rate limiter was set and it was leaded as NODNIC.
When connected, the operating system usually installs a generic driver that helps the computer to recognize the newly attached device.
However, proper software must be applied if you want to make use of all features that the network adapter has available. This task also allows computers to properly recognize all device characteristics such as manufacturer, chipset, technology, and others.
Updating the adapter's drivers and utilities version might improve overall performance and stability, increase transfer speeds, fix different compatibility problems and several network-related errors, as well as bring various other changes.
To install this release, simply get the package, extract it if necessary, run the setup, and follow the instructions displayed on-screen. When done, don't forget to perform a system restart and reconnect the network adapter to make sure that all changes take effect properly.
Without further ado, if you intend to apply this version, click the download button and install the package. Moreover, check with our website as often as possible so that you don't miss a single new release.
It is highly recommended to always use the most recent driver version available.
Try to set a system restore point before installing a device driver. This will help if you installed an incorrect or mismatched driver. Problems can arise when your hardware device is too old or not supported any longer.
Top 4 Download periodically updates information of NVIDIA Mellanox MCX556A-ECAT SmartNIC Firmware 16.31.1014 full driver from the manufacturer, but some information may be slightly out-of-date.
Using warez version of NVIDIA Mellanox MCX556A-ECAT SmartNIC Firmware 16.31.1014 driver is hazardous. Our driver download links are directly from our mirrors or publisher's website, NVIDIA Mellanox MCX556A-ECAT SmartNIC Firmware 16.31.1014 torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, MailBigFile, DropSend, MediaMax, zUpload, MyOtherDrive, SendSpace, DepositFiles, Letitbit, LeapFile, DivShare or MediaFire, are not allowed!
It is not recommended to download drivers from illegal sites which distribute a keygens, key generators, pirate keys, serial numbers, warez full versions or cracks for NVIDIA Mellanox MCX556A-ECAT SmartNIC Firmware 16.31.1014. These drivers might corrupt your computer installation or breach your privacy. A driver might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.