As of 17 February 2024, no functional, security, or other updates will be provided for Intel® Server Board S2600ST Family BIOS and Firmware Update Packages. Intel® Server Board S2600ST Family BIOS and Firmware Update Packages will no longer be available after 29 March 2024. All versions are provided as is. Intel recommends that users of Intel® Server Board S2600ST Family BIOS and Firmware discontinue use as soon as possible. Intel® Server Board S2600ST Family BIOS and firmware update for Intel® One Boot Flash Update (Intel® OFU) Utility and WinPE*. (00.01.0013), read firmware dependencies in requirements section
- OS Independent
- Size: 17.5 MB
- SHA1: 27CFCC4790C49DDC383601E943C77C5C6E6AF62F
System firmware requirements
To update the system firmware stack to the versions included in this update package, the currently loaded system firmware stack on the system must meet the following:
System BIOS - 00.01.0009
ME Firmware - 04.00.04.288
BMC Firmware - 1.29.7d703f59
FRUSDR - 1.24
Failure to get to the required firmware stack, may cause unexpected results.
About this release
FRUSDR : 1.28
Support platforms and dependency
Intel® Xeon® Scalable Processors
CPUID Version Status
0x50653 0x01000140 (Intel Xeon Scalable B1)
0x50654 0x02000043 (Intel Xeon Scalable H0)
The following update process must be followed to ensure a trouble-free update:
1. BMC firmware
3. Intel® Manageability Engine Firmware (Intel® ME FW)
You must install this update package using Intel® One Boot Flash Update (Intel® OFU) v14.1 Build 14 or later.
1. Package C-State only works well with Xeon Scalable Family H0 parts. For other Intel Xeon Scalable Family stepping, C6 non-retention is hardcode from BIOS side.
2. BIOS R00.01.0001 doesn't support online downgrade to any Dxxx or Xxxx BIOS.
3. BIOS R00.01.0001 removed Intel Xeon Scalable Family A1 microcode(m1350651_8000002B) and Intel Xeon Scalable Family B0 microcode(m9750652_80000035).
4. Removed UpdateNvram support for iflash32 tool for security reason of SRA bios.
5. Security revision upgrade to v0002 on BIOS R00.01.0002 will prevent BIOS downgrade through normal mode to R00.01.0001. You can use BIOS recovery mode for BIOS downgrade, although Intel doesn't recommend downgrading firmware.
6. One new production key is integrated onto R0004 BIOS, which will correct an OEM string.
7. This release include security revision upgrade to version 0004. This will prevent BIOS downgrade through normal mode to previous version with lower security revision. You can use BIOS recovery mode process for BIOS downgrade.
8. System will prevent downgrading Intel ME from 04.00.04.288 to 04.00.04.235 or older version, if system BIOS version is R0009. This is an expected behavior.
9. Security revision upgrade to 0005 since BIOS R010. It will prevent BIOS downgrade through normal mode to previous version that with lower security revision. You can use BIOS recovery mode for BIOS downgrade.
10. Downgrading BMC below 1.43.660a4315 isn't supported due to a security revision change.
System firmware update package usage instructions
You can update this package using one of the following methods:
- Windows* or Linux* operating system using Intel® One Boot Flash Update (Intel® OFU) v14.1 Build 14 or later
- Windows Preboot Execution Environment* (WinPE*)
To update from Windows* and Linux* or operating systems using the Intel® One Boot Flash Update Utility (Intel® OFU)
You can download Intel® One Boot Flash Update utility, and it is part of the BIOS, Firmware Update & Configuration Utilities for Windows* and Linux*. Refer to the Intel® OFU user guide for the details of
installation and usage of Intel OFU.
Use Intel OFU to update system firmware by the following steps:
- Install Intel OFU on Windows* or Linux* system.
- Download the latest firmware update package.
- Unzip package to a folder.
- Run the following command in Windows* command line/Linux* terminal window:
- :\flashupdt -u \flashupdt.cfg
To update from Windows Preboot Execution Environment* (WinPE*)
You can insert the System Firmware Update Package to Windows PE* customized image for creating a bootable Windows PE* CD. You're able to update system firmware from the customized WinPE CD by the following steps:
- Boot server with customized WinPE CD.
- Run script WinPE_x64_Update.bat (The name may be varied depends on your own customization).
- Note: The Intel® OFU utility is case sensitive. Therefore, when you transfer the
- Firmware Update Package using USB flash drive from a Microsoft Windows* system to a Linux
- environment, you must first extract under the Linux* environment. Otherwise, you
- will need to mount the USB flash drive manually with vfat option under Linux to avoid
- conversion from upper case to lower case and vice versa.
- To make the Intel® OFU utility run properly under x64 OS, you have to read the Intel OFU release notes on known issues for Intel OFU installation.
- In this SFUP package, Intel only provides the WinPE_x64_Update.bat batch file for WinPE2.1/3.0 64 bit solution as an example. Refer to the White Paper-Intel Server Utilities Procedure for WinPE.pdf white paper for details on building your own customized WinPE CD.
- Windows PE 2.0: Built from Windows Vista* SP1 EM64T
- Windows PE 2.1: Built from Windows Vista SP1 or Windows Server* 2008, EM64T
- Windows PE 3.1: Built from Windows Server 2008 R2, EM64T
- Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use .
If you have an Intel IPMI driver instead of MS IPMI driver for firmware update, you can un-install the Microsoft IPMI* driver by:
Devicesetup.exe ¨Cv remove *IPI0001
Note: IPI0001 is the device ID for Microsoft IPMI driver.