Introduction
This download record contains the BIOS and firmware update package for the Intel® Server Board D50TNP Family for UEFI (R01.01.0010).
Available Downloads
- Size: 30 MB
- SHA256: 4BE5A886E67901210350897E7B904480FDF24D6C9AC1126125CBDC51D2B8D3A6
Detailed Description
Overview
This download record contains the BIOS and firmware update package for the Intel® Server Board D50TNP Family and appropriate Intel® Server System D50TNP Family —for use with Intel's technology-embedded Unified Extensible Firmware Interface (UEFI) shell.
Purpose
UEFI System Update Package (SUP) Installation and Operation Instructions
Intel highly recommends reading the Readme and Update Instructions.txt in its entirety before performing the system update. Verifying that your system meets the documented requirements will ensure a successful update and provide the most reliable system functionality after the update has been completed.
Released - April 28, 2025
This update package includes the following production-level system software updates and update utilities:
System BIOS - R01.01.0010
ME Firmware - 04.04.04.603
BMC Firmware - 2.93.a858f4d1
FRUSDR - 0.47
Pmem - 2.2.0.1553
CPLD - v5P1
sysfwupdt.efi - Version 16.0.12
Supported products
Intel® Server Board D50TNP Family
Contact Intel for pre-production hardware support requirements
Important notes
Suggest updating the firmware to R01.01.0008 and then updating the firmware to R01.01.0009.
Because of following comments, this SUP update CPLD need ImmReset, and BIOS/BMC update need "-recovery" option with SVN +1.
- From R01.01.0008 or later, need update CPLD to v4p7 first and reset, after reboot then update BIOS to R01.01.0008 or later because of HSD15012739591 and HSD15012125093.
- From R01.01.0008 has updated PCH SVN to 03, need add "-recovery" parameter when update BIOS which has lower SVN to latest. (e.g. sysfwupdt.efi -u xxx.bin -recovery)
- From R01.01.0008, downgrade BIOS to R01.01.0007 or older need set PCH SVN Bypass jumper and use flash utility sysfwupdt version older than v16.0.9. (e.g. sysfwupdt.efi -u xxx.bin -recovery)
- From R01.01.0008, downgrade BIOS to R01.01.0007 through EWS need use BMC version lower than 2.91.3b34a3ee because of HSD2103658211.
- From R01.01.0006, Online flash BIOS need add Password parameter when Admin PWD is set. For example, Online update BIOS at EFI shell/OS: sysfwupdt -u xxx.bin Password=xxxx+ImmReset
Online update BIOS through EWS, need to enable BIOS setup option: Server Management->Enforce Password Support, otherwise EWS will pop up msg and can't update BIOS.
xxxx is the BIOS Admin password which set at BIOS setup.
- BIOS R01.01.0010 requires new secure boot keys for Microsoft Windows 2025:
- KEK – Microsoft Corporation KEK 2K Certificate Authority (CA) 2023*.
- DB – Windows UEFI CA 2023*, Microsoft UEFI CA 2023* and Microsoft Option ROM UEFI CA 2023*.
- To update the new KEK and DB keys, the previous secure boot keys stored in BIOS must be removed via the "UpdateNvram" parameter, via SUP (UEFI) or SFUP (Windows/Linux) update packages.
The 'UpdateNvram' parameter cannot be used, if updating the BIOS via the BMC Embedded Web Server (EWS).
- If using SUP/UEFI, modify the UpdBIOS_CYP.nsh script from sysfwupdt.efi -u R01010010_CoyotePass_LBG_ICX_UpdateCapsule_prd.bin ImmReset to sysfwupdt.efi -u R01010010_CoyotePass_LBG_ICX_UpdateCapsule_prd.bin ImmReset+UpdateNvram
- If using SFUP/WINLNX, modify the bios_update.sh from BIOS="R01010010_CoyotePass_LBG_ICX_UpdateCapsule_prd.bin -recovery" to BIOS="R01010010_CoyotePass_LBG_ICX_UpdateCapsule_prd.bin -recovery UpdateNvram"
- This will also restore all BIOS settings to default values.
The above parameter is only necessary if you are using Microsoft Windows 2025 and secure boot keys. Other operating systems will not require these steps.
- From BMC2.91, has updated BMC SVN to 02, need add "-recovery" parameter when update BMC which has lower SVN to latest. (e.g. sysfwupdt.efi -u xxx.bin -recovery)
- From BMC2.91, downgrade BMC to 2.90 or older need set BMC SVN Bypass jumper and add "-recovery" parameter
- From BMC2.93, BMC verifies the platform information in the CPLD capsule to prevent users update incorrect CPLD image.
- If you had previously flashed ITK cap BIOS with specific BIOS settings on a system and then upgrade the FW to R01.01.0005, those specific BIOS settings will be lost after loading BIOS default pressing F9 on BIOS Menu. In order to avoid this, flash a new ITK cap with the required BIOS settings based on R01.01.0005 image included on this package.
- From R01.01.0005 it has updated PCH SVN to 02, need add "-recovery" parameter when update BIOS which has lower SVN to R01.01.0005 or higher. (e.g. sysfwupdt.efi -u xxx.bin -recovery).
- This is production FW package, all updates provided in this package are installed using the embedded uEFI operating environment only.
- Do not modify any of the script files. The scripts as written will provide the most reliable update experience.
- This package includes on the "startup.nsh" the function to check the FW version on current system, which can make sure whether System BIOS, BMC Firmware, CPLD, FRU&SDR or Pmem data need to be re-installed, if the FW version installed on the target system is the same version of this package, the update script will skip that ingredient and move to next one, if you want to flash all FW no matter is the same version, you can edit "startup.nsh" and add a "#" before "FwVerCheck.nsh" text and then save the file with the change or also execute the single ingredients update files UpdBIOS_CYP.nsh, UpdM50FruSdr_CYP.nsh, UpdCPLD_CYP.nsh, UpdBMC_CYP.nsh, UpdCPLDRecovery_CYP.nsh, UpdBMCRecovery_CYP.nsh and UpdatePmemFW.nsh.
- If you received a new D50TNP system, Intel recommends to update BIOS, BMC and CPLD recovery region, regular "startup.nsh" or "UpdBIOS_TNP.nsh" will update BIOS image including revocery region but not for BMC and CPLD recovery regions, you can excecute files "UpdBMCRecovery_TNP.nsh" and "updCPLDRecovery_TNP.nsh" to update BMC and CPLD FW including their recovery region.
- After the initial update has been performed, the package does include standalone script files that can be run individually.
These files include:
UpdBIOS_TNP.nsh, UpdBMC_TNP.nsh UpdD50FruSdr_TNP.nsh, UpdCPLD_TNP.nsh, UpdatePmemFW.nsh, UpdBMCRecovery_TNP.nsh, UpdCPLDRecovery_TNP.nsh.
Do NOT use these files until after the system has been updated initially using the startup.nsh file.
System software requirements
To update the system software stack to the versions included in this update package, the system software stack currently installed on the target server system MUST meet the following, or else the update may fail:
System BIOS - R01.01.0009
ME Firmware - 04.04.04.500
BMC Firmware - 2.92.98d15180
FRUSDR - 0.46
Pmem - 2.2.0.1553
CPLD - v4P9
Important information for the update procedure
- - To complete update process of CPLD/Pmem/BMC/FRUSDR/BIOS, must execute the startup.nsh,
- it will update CPLD/Pmem/BMC/FRUSDR/BIOS and then the system will reboot automatically.
- After reset, the screen will be off and blue ID LED will be solid on for some minutes.
- Once update process is completed, the ID LED will be off and system will boot up again.
- - Due the new structure of FW using PFR, the first time the server is rebooted once FW has been updated, will take around 12 minutes on the first reboot to conclude the update process, on that time
- the screen will be off and the System LED will be blinking green/amber, after the first 3 minutes the blue ID LED will be solid on, once the process is completed the ID LED will be off and system will turn on again, after post screen the server could be rebooted a second time.
- The time to conclude the FW update process is an expected behavior and only presented on the first reboot part of the FW update process.
- If you want to flash a custom BIOS file "R01010008_CAPSULE_ITK.cap", first flash all FW ingredients including regular R01.01.0008 BIOS calling the "startup.nsh" and once all the FWhas been updated and the server has completed the reboot process, flash the customized BIOS file "R01010008_CAPSULE_ITK.cap" calling the "UpdBIOS_TNP_CAP.nsh" script.
More information can be found on the Readme and Update Instructions.txt
GENERAL INSTALLATION PROCEDURE
- Unzip the contents of the update package and copy all files to the root directory of a removable media (USB flash drive).
- Insert the USB flash drive to any available USB port on the system to be updated.
- Power on the server and boot into uEFI shell.
- Firmware update process will be started with Startup.nsh running automatically.
- Once BIOS update process has successfully completed, system will reboot automatically and will take around 12 minutes with the screen off, after that time the server will turn on again.
- After first reboot and post screen, the server could be rebooted a second time.
This download is valid for the product(s) listed below.
- Intel® Server System D50TNP1MHCPAC Compute Module
- Intel® Server System D50TNP1MHCRAC Compute Module
- Intel® Server System D50TNP2MHSVAC Management Module
- Intel® Server System D50TNP1MHCRLC Compute Module
- Intel® Server System D50TNP2MHSTAC Storage Module
- Intel® Server System D50TNP2MFALAC Acceleration Module
Disclaimers1
Product and Performance Information
Intel is in the process of removing non-inclusive language from our current documentation, user interfaces, and code. Please note that retroactive changes are not always possible, and some non-inclusive language may remain in older documentation, user interfaces, and code.