================================================================================
Intel(R) Server Board S2600JF, Intel(R) Server System H2000JF Product Family 
Firmware Update Package
for Intel(R) Deployment Assistant, Intel(R) One Boot Flash Update Utility, 
The embedded EFI Shell, Windows* Preboot Execution Environment 
================================================================================
Intel(R) Server Boards and Systems
Intel Corporation
2111 N.E. 25th Avenue, Hillsboro, OR 97124 USA
================================================================================
DATE    : 	September, 20 2016
TO      : 	Intel(R) Server Board S2600JF, Intel(R) Server System H2000JF Product Family
                customers
SUBJECT : Release Notes for System Firmware Update Package 
================================================================================
				IMPORTANT NOTES
================================================================================
  All the updates provided in this package are EFI based (unless otherwise noted).To 
  run these updates, you must boot the system to the embedded EFI shell and then 
  access the USB flash drive or hard disk containing the system software updates.

 NOTICE:  Due to security requirements, downgrade to previous revisions in normal mode 
 is NOT supported. Please use the BIOS Recovery procedure instead.
 
BIOS R02.06.0005 also enhances the protection of the platform configuration data as described in
Intel Security Advisory INTEL-SA-00056
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00056&languageid=en-fr

================================================================================
                              ABOUT THIS RELEASE
================================================================================
BIOS   : 02.06.0005
ME     : 02.01.07.328
BMC    : 01.27.9958
FRUSDR : 1.13
================================================================================
                           Support Platforms and Dependency
================================================================================
Processors supported: 
Intel(R) Xeon processor E5-4600/2600/2400 series
Intel(R) Xeon processor E5-4600/2600/2400 v2 series

Microcode update versions:
Intel(R) Xeon processor E5-4600/2600/2400 series C0 stepping: 0x00000513 CPUID = 0x206D5
Intel(R) Xeon processor E5-4600/2600/2400 series C1 stepping: 0x00000619 CPUID = 0x206D6
Intel(R) Xeon processor E5-4600/2600/2400 series C2 stepping: 0x00000710 CPUID = 0x206D7
Intel(R) Xeon processor E5-4600/2600/2400 v2 series C0/C1 stepping: 0x00000428 CPUID = 0x306e4

Production boards:
  Product		Fab Version	      
  S2600JF		Fab5 or above     

The following update process must be followed to ensure a trouble free update.
1.	BMC firmware
2.	BIOS
3.	Manageability Engine (ME) firmware
4.	FRUSDR

================================================================================
                  System Update Package Usage instructions                   
================================================================================
This package can be updated using one of the following methods:
 - The embedded UEFI shell

To update from the embedded EFI Shell

Update system firmware from Intel server EFI shell by the following steps:
- Download Intel server system update package from http://downloadcenter.intel.com/
- Unzip package and copy all files to root folder in USB flash drive 
- Insert USB flash drive to server USB port
- Reboot server, system will start BIOS/BMC/FRUSDR update automatically

  If the unzipped package is not under the root folder of USB flash drive:
- Reboot server to EFI shell manually
- Run command "map -r" in EFI shell to find the mount point of the USB flash drive
- The USB flash drive may mount to fs0: or fs1: or other. 
- Run command "fs0:" or other to change folder to USB flash drive, 
- Change folder to the folder storing the firmware package
- Run command "startup.nsh" to start firmware update process

*************************************************************************************
Alternate Update Procedure:   Individual Firmware Update Procedure
*************************************************************************************

If you want to update firmware components individually, like BMC/BIOS/ME/FRUSDR, 
do NOT run the "STARTUP.NSH" file described in the Standard Update Procedure above.  
Instead, run the individual .NSH script file for each update included in the update 
package files. Follow the update order below to ensure a trouble free update:

  1) BMC firmware update
  2) BIOS update
  3) Manageability Engine (ME) Firmware update
  4) FRUSDR update


---- Update BMC Firmware

1) Boot the system to the EFI shell and go to root folder
2) At the shell prompt, run "UpdateBMC.nsh" to start BMC Firmware update
3) When complete, go to the BIOS update section described below, or power off the 
   system and cycle AC power before continuing.


---- Update System BIOS 

1) Boot the system to the EFI shell and go to root folder
2) At the shell prompt, run "UpdateBIOS.nsh" to start BIOS update
3) When complete, reboot the system and enter BIOS Setup by pressing the F2 Key during
   POST 
4) Verify the BIOS string on main BIOS menu
5) Press F9 to load defaults and press F10 to save and reset the system
6) Go to the ME firmware update section described below
The BIOS update is complete. Either reboot the server or go to the ME firmware Update section 
described below.


---- Update ME Firmware

1) Boot the system to the EFI shell and go to root folder
2) At the shell prompt, run "UpdateME.nsh" to start ME firmware update
3) When complete, go to the FRUSDR update section described below, or power off the 
   system and cycle AC power before continuing.

   

---- Update FRUSDR

1) Boot the system to the EFI shell and go to root folder
2) At the EFI command prompt, run "UpdateFRUSDR.nsh" to start FRUSDR update
3) Answer questions and enter desired information when prompted.
4) When complete, reboot the system by front control panel


---- Verifying updates


- Reboot the server  
- During POST, hit the <F2> Key when prompted to access the BIOS Setup Utility
-  Hit the F9 key to load BIOS Defaults
-  At the MAIN menu verify the BIOS revision is correct
-  Move cursor to the SERVER MANAGEMENT Menu
-  Move cursor down to the SYSTEM INFORMATION Option and hit Enter
-  Verify the BMC Firmware revision is correct
-  Verify the SDR revision is correct
-  Verify the ME Firmware revision is correct
-  Hit the F10 Key to save changes and Exit


The System Software Update is Complete.


*******************************************************************************
BIOS Recovery Process
*******************************************************************************
In the unlikely event the BIOS is corrupted, leaving the system in an 
unbootable state, it may be necessary to perform the following BIOS Recovery 
procedure.  

1.  Copy the following BIOS update files to the root directory of a USB media 
device (Recovery Media):
Note: These specific files will be located in the "BIOS Recovery Files" folder 
included in the System Update Package.

- IPMI.EFI 
- IFlash32.EFI 
- RML.ROM 
- R##.##.####REC.CAP (where ##.##.#### = BIOS revision number) 
- STARTUP.NSH (modified to support BIOS recovery)


2.  Power OFF the system

3.  Locate the BIOS Recovery Jumper on the server board and move the jumper 
block from pins 1-2 (default) to pins 2-3 (recovery setting)

4.  Insert the recovery media into any available USB port on the back of 
the server
Note: The front panel USB ports may not work for this procedure on some server 
systems.

5.  Power ON the system

6.  The system will automatically boot into the embedded EFI Shell

7.  The STARTUP.NSH file automatically executes and initiates the flash update.
When complete, the IFlash utility will display a message

8.  Power OFF the system and return the BIOS Recovery jumper to its default 
position

9.  Remove recovery media from the USB port

10. Power ON the system 

11. Do *NOT* interrupt the BIOS POST during the first boot.

=================================================================================   
				BIOS R02.06.0005
=================================================================================
 NOTICE: Due to security requirements, downgrade to previous revisions in normal mode
 is NOT supported. Please use the BIOS Recovery procedure instead.

 - Hotfix for security hole about RtcRead
 
================================================================================
				ME 2.01.07.328 
================================================================================
- Fixed: Platform is not able to power on properly after being shut down by NM
         Policy
- Fixed: Global platform power consumption reported by NM Statistics in S5 is
         incorrect
- Fixed: OOB (out-of-band) stress test by issuing the wrong username may cause
         connection to be unavailable
- Fixed: Shutdown action can be interrupted by cold reset when volatile NM
         policy is in use
===============================================================================
				BMC 01.27.9958
===============================================================================
-EPSD100252407: BMC no responds and bus hang on EMC isilon system
-EPSD100252321: Privilege Escalation Attack via EWS

================================================================================
				FRUSDR 1.13
================================================================================    
- None.
=============================================================================
                            LEGAL INFORMATION
=============================================================================
Information in this document is provided in connection with Intel products. 
No license, express or implied, by estoppel or otherwise, to any intellectual 
property rights is granted by this document. Except as provided in Intel's 
Terms and Conditions of Sale for such products, Intel assumes no liability 
whatsoever, and Intel disclaims any express or implied warranty, relating to 
sale and/or use of Intel products including liability or warranties relating 
to fitness for a particular purpose, merchantability, or infringement of any 
patent, copyright or other intellectual property right. Intel Corporation may 
have patents or pending patent applications, trademarks, copyrights, or other 
intellectual property rights that relate to the presented subject matter.  
The furnishing of documents and other materials and information does not 
provide any license, express or implied, by estoppel or otherwise, to any 
such patents, trademarks, copyrights, or other intellectual property rights.  
Intel products are not intended for use in medical, life saving, or life 
sustaining applications. Intel may make changes to specifications and product 
descriptions at any time, without notice.

Intel is a registered trademark of Intel Corporation. 
*Other names and brands are the property of their respective owners.
Copyright (c) 2016 Intel Corporation.

A portion of this firmware is open source code, which falls under the
GPL 2.0 license.  

[END OF RELEASE NOTES]
