Intel® Server Board S2600ST Family BIOS and Firmware Update for Intel® One Boot Flash Update (Intel® OFU) Utility and WinPE*

19139
11/23/2018

Introduction

Intel® Server Board S2600ST Family BIOS and firmware update for Intel® One Boot Flash Update (Intel® OFU) Utility and WinPE*. (00.01.0015), read firmware dependencies in requirements section.

Available Downloads

  • OS Independent
  • Size: 33.4 MB
  • SHA1: 707C151F1D56EDC88AEF6533997C4391A6CF30BF

Detailed Description

System firmware requirements

To update the system firmware stack to the versions included in this update package, the currently loaded system firmware stack on the system must meet the following:

System BIOS - 00.01.0014 or later
ME Firmware - 04.00.04.340 or later
BMC Firmware - 1.74 or later
FRUSDR - 1.40 or later

Failure to get to the required firmware stack, may cause unexpected results.

About this release

BIOS: 00.01.0015
ME: 04.00.04.340
BMC: 1.74.ee39402a
FRUSDR: 1.74

Support platforms and dependency

Processors supported:
Intel® Xeon® Scalable processors

Microcode versions:
CPUID Version Status
0x50653 0x01000144 (Xeon Scalable B1)
0x50654 0x0200004D (Xeon Scalable H0)

The following update process must be followed to ensure a trouble-free update.
1. BMC firmware
2. BIOS
3. Intel® Management Engine firmware
4. FD
5. FRUSDR

Important note

This Update package must be installed using Intel® One Boot Flash Update (Intel® OFU) V14.1 Build 19 or later.

1. Package C-State only works well with Intel® Xeon Scalable Family H0 parts. For other Intel Xeon Scalable Family stepping, C6 non-retention is hardcode from BIOS side.
2. BIOS R00.01.0001 doesn't support online downgrade to any Dxxx or Xxxx BIOS.
3. BIOS R00.01.0001 removed Intel Xeon Scalable Family A1 microcode(m1350651_8000002B) and Intel Xeon Scalable Family B0 microcode(m9750652_80000035).
4. Removed UpdateNvram support for iflash32 tool for security reason of SRA bios.
5. Security revision upgrade to v0002 on BIOS R00.01.0002 will prevent BIOS downgrade via normal mode to R00.01.0001. You can use BIOS recovery mode for BIOS downgrade, although Intel doesn't recommend downgrading firmware.
6. One new production key is integrated onto R0004 BIOS, which will correct an OEM string.
7. This release includes security revision upgrade to version 0004. This will prevent BIOS downgrade via normal mode to previous version with lower security revision. You can use BIOS recovery mode process for BIOS downgrade.
8. System will prevent downgrading ME from 04.00.04.288 to 04.00.04.235 or older version, if system BIOS version is R0009. This is an expected behavior.
9. Security revision upgrade to 0005 since BIOS R010. It will prevent BIOS downgrade via normal mode to previous version. With lower security revision, you can use BIOS recovery mode for BIOS downgrade.
10. Downgrading below 1.43.660a4315 isn't supported due to a security revision change.
11. Security revision upgrade to 0006 on BIOS R0014. It will prevent BIOS downgrade via normal mode to previous version. With lower security revision, you can use BIOS recovery mode for BIOS downgrade.


System firmware update package usage instructions

You can update this package using one of the following methods:
 - Windows* or Linux* operating system using Intel One Boot Flash Update (Intel OFU) V14.1 Build 19 or later
 - Windows* Preboot Execution Environment (WinPE*)

To update from Windows* and Linux* or operating systems using the Intel One Boot Flash Update Utility (Intel OFU)

You can download the Intel One Boot Flash Update utility. It's part of the BIOS, Firmware Update & Configuration Utilities for Windows and Linux. Refer to Intel OFU user guide about the details of installation and usage of Intel OFU.

Use Intel OFU to update system firmware by the following steps:
- Install Intel OFU on Windows or Linux system.
- Download the latest firmware update package 
- Unzip package to a folder.
- Run the following command in the Windows* command line/Linux terminal window:
  :\flashupdt -u  \flashupdt.cfg
                      
To update from Windows Preboot Execution Environment (WinPE)

You can insert the System Firmware Update Package to Windows PE customized image for creating a bootable Windows PE CD. You're able to update system firmware from customized WinPE CD by the following steps:

  1. Boot server with customized WinPE CD.
  2. Run the WinPE_x64_Update.batscript (Name may vary depending on your own customization).
     
    Note: The Intel OFU utility is case sensitive. Therefore, when you transfer the Firmware Update Package using USB flash drive from a Microsoft Windows system to a Linux environment, you must first extract under the Linux* environment. Otherwise, you will need to mount the USB flash drive manually with the vfat option under Linux to avoid conversion from upper case to lower case and vice versa.
  3. To make Intel OFU utility run properly under x64 OS, you have to read Intel OFU release notes on known issues for Intel OFU installation. In this SFUP package, Intel only provides batch file WinPE_x64_Update.bat for WinPE2.1/3.0 64 bit solution as an example. Refer to the White Paper-Intel Server Utilities Procedure for WinPE.pdf white paper for details on building your own customized WinPE CD.
  4. Windows PE 2.0 - built from Windows Vista SP1 EM64T
  5. Windows PE 2.1 - built from Windows Vista SP1 or Windows Server 2008, EM64T
  6. Windows PE 3.1 - built from Windows Server 2008 R2, EM64T
  7. Microsoft IPMI driver is loaded by default from WinPE CD, if you want to use 

Intel IPMI driver instead of MS IPMI driver for firmware update. You can un-install the
Microsoft IPMI driver by:
                Devicesetup.exe ¨Cv remove *IPI0001
                Note: IPI0001 is the device ID for Microsoft IPMI driver.

 

This download is valid for the product(s) listed below.