================================================================================
Intel(R) Server Board S2600WP, Intel(R) Server System H2000WP Product Family
 Firmware Update Package
for Intel(R) Deployment Assistant, Intel(R) One Boot Flash Update Utility, 
The embedded EFI Shell, Windows* Preboot Execution Environment 
================================================================================
Intel(R) Server Boards and Systems
Intel Corporation
2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA
================================================================================
DATE    : 	July , 1 2015
TO      : 	Intel(R) Server Board S2600WP, Intel(R) Server System H2000WP Product Family
                customers
SUBJECT : Release Notes for System Firmware Update Package 
================================================================================
				IMPORTANT NOTES
================================================================================

 NOTICE:  As security requirement, R02.05.0004 reversion doesn't support capsule 
 downgrade in normal mode. In order to downgrade from this BIOS version, you must use
 the recovery jumper method.
 
 
 -This version enhances the protection of platform configuration data as described in 
	Intel Security Advisory INTEL-SA-00043
================================================================================
                              ABOUT THIS RELEASE
================================================================================
BIOS   : 02.05.0004
ME     : 02.01.07.328
BMC    : 01.23.7783
FRUSDR : 1.09
================================================================================
                           Support Platforms and Dependency
================================================================================
Processors supported: 
Intel(R) Xeon processor E5-4600/2600/2400 series
Intel(R) Xeon processor E5-4600/2600/2400 v2 series

Microcode update versions:
Intel(R) Xeon processor E5-4600/2600/2400 series C0 stepping: 0x00000513 CPUID = 0x206D5
Intel(R) Xeon processor E5-4600/2600/2400 series C1 stepping: 0x00000619 CPUID = 0x206D6
Intel(R) Xeon processor E5-4600/2600/2400 series C2 stepping: 0x00000710 CPUID = 0x206D7
Intel(R) Xeon processor E5-4600/2600/2400 v2 series C0/C1 stepping: 0x00000428 CPUID = 0x306e4

Production boards:
  Product		Fab Version	      
  S2600WP		Fab3 or above     

The following update process must be followed to ensure a trouble free update.
1.	BMC firmware
2.	BIOS
3.	Manageability Engine (ME) firmware
4.	FRUSDR

================================================================================
                  System Firmware Update Package Usage instructions                   
================================================================================
This package can be updated using one of the following methods:
 - The embedded UEFI shell
 - Intel(R) Deployment Assistant
 - Windows* or Linux* operating system using Intel(R) One-boot Flash Update (OFU)
   V11.0 Build 15 or later)
 - Windows* Preboot Execution Environment (WinPE)

To update from the embedded EFI Shell

Update system firmware from Intel server EFI shell by the following steps:
- Download Intel server system firmware update package from http://downloadcenter.intel.com/
- Unzip package and copy all files to root folder in USB flash drive 
- Insert USB flash drive to server USB port
- Reboot server, system will start BIOS/BMC/FRUSDR update automatically

  If the unzipped package is not under the root folder of USB flash drive:
- Reboot server to EFI shell manually
- Run command "map -r" in EFI shell to find the mount point of the USB flash drive
- The USB flash drive may mount to fs0: or fs1: or other. 
- Run command "fs0:" or other to change folder to USB flash drive, 
- Change folder to the folder storing the firmware package
- Run command "startup.nsh" to start firmware update process

*************************************************************************************
Alternate Update Procedure:   Individual Firmware Update Procedure
*************************************************************************************

If you want to update firmware components individually, like BMC/BIOS/ME/FRUSDR, 
do NOT run the "STARTUP.NSH" file described in the Standard Update Procedure above.  
Instead, run the individual .NSH script file for each update included in the update 
package files. Follow the update order below to ensure a trouble free update:

  1) BMC firmware update
  2) BIOS update
  3) Manageability Engine (ME) Firmware update
  4) FRUSDR update


---- Update BMC Firmware

1) Boot the system to the EFI shell and go to root folder
2) At the shell prompt, run "UpdateBMC.nsh" to start BMC Firmware update
3) When complete, go to the BIOS update section described below, or power off the 
   system and cycle AC power before continuing.


---- Update System BIOS 

1) Boot the system to the EFI shell and go to root folder
2) At the shell prompt, run "UpdateBIOS.nsh" to start BIOS update
3) When complete, reboot the system and enter BIOS Setup by pressing the F2 Key during
   POST 
4) Verify the BIOS string on main BIOS menu
5) Press F9 to load defaults and press F10 to save and reset the system
6) Go to the ME firmware update section described below
The BIOS update is complete. Either reboot the server or go to the ME firmware Update section 
described below.


---- Update ME Firmware

1) Boot the system to the EFI shell and go to root folder
2) At the shell prompt, run "UpdateME.nsh" to start ME firmware update
3) When complete, go to the FRUSDR update section described below, or power off the 
   system and cycle AC power before continuing.

   

---- Update FRUSDR

1) Boot the system to the EFI shell and go to root folder
2) At the EFI command prompt, run "UpdateFRUSDR.nsh" to start FRUSDR update
3) Answer questions and enter desired information when prompted.
4) When complete, reboot the system by front control panel


---- Verifying updates


- Reboot the server  
- During POST, hit the <F2> Key when prompted to access the BIOS Setup Utility
-  Hit the F9 key to load BIOS Defaults
-  At the MAIN menu verify the BIOS revision is correct
-  Move cursor to the SERVER MANAGEMENT Menu
-  Move cursor down to the SYSTEM INFORMATION Option and hit Enter
-  Verify the BMC Firmware revision is correct
-  Verify the SDR revision is correct
-  Verify the ME Firmware revision is correct
-  Hit the F10 Key to save changes and Exit


The System Software Update is Complete.







*******************************************************************************
BIOS Recovery Process
*******************************************************************************
In the unlikely event the BIOS is corrupted, leaving the system in an 
unbootable state, it may be necessary to perform the following BIOS Recovery 
procedure.  

1.  Copy the following BIOS update files to the root directory of a USB media 
device (Recovery Media):
Note: These specific files will be located in the "BIOS Recovery Files" folder 
included in the System Update Package.

- IPMI.EFI 
- IFlash32.EFI 
- RML.ROM 
- R##.##.####REC.CAP (where ##.##.#### = BIOS revision number) 
- STARTUP.NSH (modified to support BIOS recovery)


2.  Power OFF the system

3.  Locate the BIOS Recovery Jumper on the server board and move the jumper 
block from pins 1-2 (default) to pins 2-3 (recovery setting)

4.  Insert the recovery media into any available USB port on the back of 
the server
Note: The front panel USB ports may not work for this procedure on some server 
systems.

5.  Power ON the system

6.  The system will automatically boot into the embedded EFI Shell

7.  The STARTUP.NSH file automatically executes and initiates the flash update.
When complete, the IFlash utility will display a message

8.  Power OFF the system and return the BIOS Recovery jumper to its default 
position

9.  Remove recovery media from the USB port

10. Power ON the system 

11. Do *NOT* interrupt the BIOS POST during the first boot.


=================================================================================   
 
 				      BIOS R02.05.0004
=================================================================================
NOTICE:  As security requirement, R02.05.0004 reversion doesn't support capsule 
 downgrade in normal mode. In order to downgrade from this BIOS version, you must use
 the recovery jumper method.
 
 
 -This version enhances the protection of platform configuration data as described in 
	Intel Security Advisory INTEL-SA-00043
	
 - Updated: RSTe OPROM to 4.2.0.1036 
 - Fixed: BIOS is configuring PCI configuration space Device control register 08 on one of the downstream port of PLX and the two 10GB NIC endpoints to 256B instead of 128 .
 - Fixed: Sysinfo_v13.1.4: BIOS information "system information" cannot be dump into sysinfo_log.txt. 
 - Fixed: AXX10GBNIAIOM intermittently can not be detected on HNS2600WP after rebooting when installing two to four nodes in chassis. 
 - Fixed: "ID_NET_NAME_ONBOARD=eno1" are same for two onboard NICs which should be different. 
 - Fixed: EFI Boot Options issue in BIOS  
 - Fixed: Syscfg v12 build 14: BootOrder will be changed before and after running cmd: syscfg /s file.ini /f /b 
 - Fixed: Boot order will not be load default by F9 but could load default by 'Syscfg /bldfs'. 
 - Fixed: No Usable Memory Found after 240V AC line exponential dropout test Variable. 
 - Fixed: R02.05.0001 OFU/iflash32 hang.
 - Fixed: Sysinfo_v13.1.4: BIOS option "Processor PCIe Linkd Speed<socket1 and socket2>"  cannot be dump into sysinfo_log.txt. 
 - Fixed: [x]BIOS configuration re-initialization issue after cold boots. 


================================================================================
                     		ME 2.01.07.328 
================================================================================
- Fixed: Platform is not able to power on properly after being shut down by NM
         Policy
- Fixed: Global platform power consumption reported by NM Statistics in S5 is
         incorrect
- Fixed: OOB (out-of-band) stress test by issuing the wrong username may cause
         connection to be unavailable
- Fixed: Shutdown action can be interrupted by cold reset when volatile NM
         policy is in use
===============================================================================
                                BMC 01.23.7783
===============================================================================
- Fixed: IPMB Bridging commands to a Satellite controller doesn't work
- Fixed: The result of IPMI raw command 20 c0 71 00 02 00 00 shows telnet can be supported.
- Fixed: The satellite FW updating status is 00 while updating HSBP FW.
- Fixed: i2c-adapter i2c-7: Arbitration lost on data transmission
- Fixed: Remote KVM video have some dirty mouse cursor under linux system
- Fixed: The System Fan 5 spining in 100% speed on S2400BB Platform after updated the BMC to 1.21.6038.
- Fixed: FW update will fail with OS based utility (OFU), failure rate is 20% with USB mode and 40% with KCS mode.
- Fixed: BMC code issue for fan detection on S2600CO.
- Fixed: EWS can't interpret SmaRT/CLST event
- Fixed: S2600GZ/GL EWS_update tool fail with SUP S2600GZ_GL_EFI_BIOS02030003_ME20107328_BMC1216038_FRUSDR113 
- Fixed: Openssl update (see TA-1065)
- Fixed: IPv6 can't get IP address via DHCP server.
- Fixed: S4600LH P3 LVDIMM voltate reading is 1.5V sometimes during system booting up
- Fixed: HSC firmware not updating with BMC 1.21.6038;
- Fixed: BMC Hangs upon the first A/C Power On of the board. Subsequent A/C power cycles, the BMC boots. 
-Bundled the new PSU fw for PSSF162202A.
-Bundled the new PSU fw for "DPS 750AB 32A".
-Set RMM4 DMN speed to 100Mbps on half width products

================================================================================
                                   FRUSDR 1.09
================================================================================    
- Add SDR 'PSU0 Status' and 'PSU1 Status'.
=============================================================================
                            LEGAL INFORMATION
=============================================================================
Information in this document is provided in connection with Intel products. 
No license, express or implied, by estoppel or otherwise, to any intellectual 
property rights is granted by this document. Except as provided in Intel's 
Terms and Conditions of Sale for such products, Intel assumes no liability 
whatsoever, and Intel disclaims any express or implied warranty, relating to 
sale and/or use of Intel products including liability or warranties relating 
to fitness for a particular purpose, merchantability, or infringement of any 
patent, copyright or other intellectual property right. Intel Corporation may 
have patents or pending patent applications, trademarks, copyrights, or other 
intellectual property rights that relate to the presented subject matter.  
The furnishing of documents and other materials and information does not 
provide any license, express or implied, by estoppel or otherwise, to any 
such patents, trademarks, copyrights, or other intellectual property rights.  
Intel products are not intended for use in medical, life saving, or life 
sustaining applications. Intel may make changes to specifications and product 
descriptions at any time, without notice.

Intel is a registered trademark of Intel Corporation. 
*Other names and brands are the property of their respective owners.
Copyright (c) 2015 Intel Corporation.

A portion of this firmware is open source code, which falls under the
GPL 2.0 license.  

[END OF RELEASE NOTES]
