- EDR link speed is now supported when using ConnectX-6 100Gb/s HCA and connecting with HDR optical cables.
- Implemented the following new commands from NS-SI 1.2 specification: Get IB Link Status, Get IB Statistics, and Get PF Assignment
- Added support for Virtual node GUID, and set & get address through the NC-SI commands.
- Added the ability to inject iCRC/vCRC port level error using Port Transmit Error Register (PTER).
- Added support for in-node sync.
- Support for SX RDMA Flow Table type in IB port
- Support for modifying header action in IB port
- Support for new hairpin mode: IB-to-IB, Eth-to-IB, and IB-to-Eth
- This new feature defines the forwarding behavior in MPFS for packets arriving from the network (uplink) with destination MAC address that does not appear in the MPFS FDB. The new feature is configured by a new NV configuration (UNKNOWN_UPLINK_MAC_FLOOD) which when enabled, floods all local MPFS ports with these packets, otherwise drops these packets.
- Increased the maximum XRQ number to 512.
- Added the following new mlxconfig parameters to the Non-Volatile Configurations section: log_max_outstandng_wqe and ece_disable_mask
- In rare cases, HDR active copper cable link up time might be higher than expected (up to 2 minutes).
- Fixed an issue that caused packets to get stuck when the Rate Limiter was enabled.
- Active SHARP SAT QPs (QP with packet-based e2e credits) can break the live-FW-patch flow and result in firmware getting stuck.
- Fixed an issue that prevented a QP with ATS buffer from being using by the NVMF offload.
When connected, the operating system usually installs a generic driver that helps the computer to recognize the newly attached device.
However, proper software must be applied if you want to make use of all features that the network adapter has available. This task also allows computers to properly recognize all device characteristics such as manufacturer, chipset, technology, and others.
Updating the adapter's drivers and utilities version might improve overall performance and stability, increase transfer speeds, fix different compatibility problems and several network-related errors, as well as bring various other changes.
To install this release, simply get the package, extract it if necessary, run the setup, and follow the instructions displayed on-screen. When done, don't forget to perform a system restart and reconnect the network adapter to make sure that all changes take effect properly.
Without further ado, if you intend to apply this version, click the download button and install the package. Moreover, check with our website as often as possible so that you don't miss a single new release.
It is highly recommended to always use the most recent driver version available.
Try to set a system restore point before installing a device driver. This will help if you installed an incorrect or mismatched driver. Problems can arise when your hardware device is too old or not supported any longer.
Top 4 Download periodically updates information of NVIDIA Mellanox MCX654106A-HCAT SmartNIC Firmware 20.28.1002 full driver from the manufacturer, but some information may be slightly out-of-date.
Using warez version of NVIDIA Mellanox MCX654106A-HCAT SmartNIC Firmware 20.28.1002 driver is hazardous. Our driver download links are directly from our mirrors or publisher's website, NVIDIA Mellanox MCX654106A-HCAT SmartNIC Firmware 20.28.1002 torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, MailBigFile, DropSend, MediaMax, zUpload, MyOtherDrive, SendSpace, DepositFiles, Letitbit, LeapFile, DivShare or MediaFire, are not allowed!
It is not recommended to download drivers from illegal sites which distribute a keygens, key generators, pirate keys, serial numbers, warez full versions or cracks for NVIDIA Mellanox MCX654106A-HCAT SmartNIC Firmware 20.28.1002. These drivers might corrupt your computer installation or breach your privacy. A driver might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.