NVM Update Package
==================
April 15, 2019
Contents
========
Overview
Limitations and Prerequisites
Updating Your NVM Using Interactive Mode
Updating Using a Script
Results
Legal / Disclaimers
Overview
========
This package contains all the required files to update the NVM on the Intel(R)
Ethernet* adapters in your system. It contains the NVMUpdate utility,
configuration file, updated NVM binaries, and required driver files.
Limitations and Prerequisites
=============================
This package is intended to be used on Intel branded adapters. Please contact
your OEM vendor for an appropriate package. In some cases this package may
update an OEM device. This package only updates the NVM image for the device
family listed on the package. Each Intel Ethernet product family has its own
NVM Update Package.
DO NOT
- Power down your system during the NVM Update.
- Remove the NIC before the NVM Update completes.
- Interrupt the NVM Update in any other way.
Doing so may make your device unusable.
Link Loss during and after NVM update
-------------------------------------
When you update a device based on the Intel(R) Ethernet Controller X710 and
Intel(R) Ethernet Controller XL710, the device may lose link during and after
the update. Power cycle your system after the NVM update completes to resolve
the issue.
Linux, FreeBSD, and ESX Requirements
------------------------------------
The base driver for your NIC must already be installed.
UEFI Requirements
-----------------
Create a bootable disk or other media and extract the update package onto the
media.
Boot your system from the media and run the tool from there.
Firmware Recovery Mode
----------------------
When a device is in Firmware Recovery mode it will not pass traffic or allow
any configuration; you can only attempt to recover the device's firmware. A
device will enter Firmware Recovery mode if it detects a problem that requires
the firmware to be reprogrammed.
NOTE: Before starting the recovery process, make sure that your operating
system, drivers, and tools have been installed properly.
NOTE: You must power cycle your system after using Recovery Mode to completely
reset the firmware and hardware.
Updating Your NVM Using Interactive Mode
========================================
1. Extract the update package into a temporary folder.
2. Start the NVMUpdate utility by running the executable. For example, on an
x64 Microsoft* Windows* system, type:
nvmupdatew64e
On an x64 Linux* system, type:
nvmupdate64e
3. Follow the prompts to update the NVM image on the desired device.
Using a Script
==============
You can use a script to perform an inventory of all the Intel Ethernet devices
in the system or update the Intel Ethernet devices in the system.
Update script example:
nvmupdate64e -u -l -o update.xml -b -c nvmupdate.cfg
This causes the NVMUpdate utility to check the installed Intel Ethernet devices
against those contained in nvmupdate.cfg. If a device contains an NVM version
older than that specified in the config file, the utility will update the
device's NVM. It will create an xml file containing the results of the update.
Note that -b is optional. Specifying -b will create a backup of the current NVM
image(s). This may add about 30% to the tools execution time.
Inventory script example:
nvmupdate64e -i -l -o inventory.xml
This causes the NVMUpdate utility to perform an inventory of all the Intel
Ethernet devices in the system and creates an output file (called
inventory.xml) of the results of the inventory.
Results
=======
The NVMUpdate utility will return an exit code of zero if the update completed
successfully.
Legal / Disclaimers
===================
Copyright (C) 2018-2019, Intel Corporation. All rights reserved.
Intel Corporation assumes no responsibility for errors or omissions in this
document. Nor does �
没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
针对 CVE-2024-5491 和 CVE-2024-5492 的 NetScaler ADC 和 NetScaler Gateway 安全公告 CVE-2024-5491 漏洞 拒绝服务,配置了 SNMP(启用了管理接口的 NSIP、CLIP 或 SNIP)的ADC 或网关设备。CVSS v4.0 基本分数: 7.1 CVE-2024-5492 漏洞 开放重定向漏洞允许未经身份验证的远程攻击者将用户重定向到任意网站,要求目标用户在启用了管理接口且可以访问 NSIP、CLIP 或 SNIP 的网络上访问攻击者控制的 URL
资源推荐
资源详情
资源评论











收起资源包目录





































































































共 287 条
- 1
- 2
- 3
资源评论


虚拟化爱好者
- 粉丝: 1304
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 基于生产制造过程信息化的两化融合建议.docx
- 我国企业信息化建设问题与对策研究.doc
- 电磁场与电磁波在电子通信技术中的应用.doc
- 云计算培训材料..ppt
- 多气体一体化光纤网络传感系统研究.doc
- 弱电系统集成基础知识(3页).doc
- 经济科技和信息化局2021年工作总结及来年工作安排.doc
- 自动控制领域中GA-PID参数整定的MATLAB Simulink实现及其应用
- 软件工程福州大学.doc
- 数字电视前端方案.doc
- 项目管理手册--项目策划df.pdf
- 中外运箱运公司的电子商务解决方案.doc
- 热熔滴下落熔覆仿真:基于随机滴落与双椭球热源模型的质量流动编程指南
- matlab-Matlab资源
- 管理系统中计算机的应用选择题名词解释简答题整理最完整版可缩小做考点版选择题新版.docx
- 2022年自考计算机网络原理模拟试卷及答案.doc
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制
