================================================================================ Express5800/T120h System ROM U41 v2.10 (05/21/2019) ================================================================================ Software name : Express5800/T120h System ROM (BIOS) update module Models : Express5800/T120h Operating System : This software supports offline update and the following OS. - Windows Server(R) 2012 R2 - Windows Server(R) 2016 - Red Hat(R) Enterprise Linux(R) 7 Target Users : See [Target Users for Update] below Type : System ROM ================================================================================ [About the software] The Express5800/T120h System ROM (BIOS) update module supports the following changes in the Express5800/T120h models: Notes: - Do not update on a system that meets all the following conditions. OS : VMWare ESXi Processor : - Intel(R) Xeon(R) Bronze 31xx processor - Intel(R) Xeon(R) Silver 41xx processor - Intel(R) Xeon(R) Gold 51xx processor - Intel(R) Xeon(R) Gold 61xx processor - Intel(R) Xeon(R) Platinum 81xx processor BIOS/Platform Configuration(RBSU) : - Intel(R) TXT Support is set to Enabled. System Utilities > System Configuration > RBSU > Server Security > Intel(R) TXT Support - "Current TPM Type" of "Trusted Platform Module Options" is set to "TPM 1.2". System Utilities > System Configuration > RBSU > Server Security > Trusted Platform Module Options > Current TPM Type Note) The factory setting is "TPM 2.0". Enhancements: - Added a new BIOS/Platform Configuration (RBSU) IODC Configuration option to the Power and Performance Menu. System Utilities > System Configuration > RBSU > Power and Performance Options > Advanced Performance Tuning Options > IODC Configuration This option allows for tuning the policy for which I/O transactions interact with the processor cache. - Added support for Fast Fault Tolerant Memory (ADDDC) for memory configurations with single rank memory implemented. After updating the System ROM, the server will automatically configure Advanced Memory Protection option to Fault Tolerant Memory (ADDDC) if both of the following two conditions are satisfied. System Utilities > System Configuration > RBSU > Memory Options > Advanced Memory Protection - A memory configuration that supports Fast Fault Tolerant Memory (ADDDC). - The configuration of Workload Profile is other than "Custom" and "Low latency". System Utilities > System Configuration > RBSU > Workload Profile Problems Fixed: - Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the RESTful API returning a message "An internal error occurred during RIS operation". - Addressed an issue where the memory refresh rate is not set correctly when "Memory Refresh rate" option is "2x Refresh" parameter. System Utilities > System Configuration > RBSU > Memory Options > Memory Refresh Rate = 2x Refresh This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. - Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy BIOS Mode. System Utilities > System Configuration > RBSU > Boot Options > Boot Mode - Addressed following security vulnerabilities. CVE-2019-1559 ------------------------------------------------------------------------------- [ Target Users for Update ] This software is available for the users who use the following models with the following System ROM version. - Models to be supported 1. Express5800/T120h - System ROM Versions to be supported 1. U41 v1.20 (08/18/2017) 2. U41 v1.22 (09/29/2017) 3. U41 v1.26 (11/14/2017) 4. U41 v1.32 (02/01/2018) 5. U41 v1.36 (02/14/2018) 6. U41 v1.42 (06/20/2018) 7. U41 v1.46 (10/02/2018) 8. U41 v2.00 (02/02/2019) 9. U41 v2.02 (03/19/2019) 10. U41 v2.04 (04/18/2019) Note: In case of using newer System ROM from the above version, it has already applied equivalent enhancements. Updating the System ROM isn't needed. Be sure to check the System ROM version and date with the following procedures. Select an arbitrary procedure and check the version before and after the update. ** System Utilities ** You can check the System ROM version and date by the following procedure. 1. Power on the system and the contents of process by POST (Power On Self- Test) will be shown on the screen. After a short time, the following message is shown. Press key, "System Utilities" is started. [F9] System Utilities 2. After starting "System Utilities", select "System Information". 3. Select "Firmware Information". 4. Each firmware version is shown on the screen. The System ROM version and date can be seen at "System ROM" option. Note: After checking the System ROM version, press the key or select "Exit" to exit the System Utilities. Note: About detail of "System Utilities" usage, refer to "1. System Utilities" section in the chapter of "Useful Features" of the maintenance guide. ** Windows(R) OS ** You can check the System ROM date by a following procedure. 1. Hold down key and press key. 2. In the "Run" dialog box, type "msinfo32" and then click "OK". 3. After "System Information" has started, select "System Summary". 4. Check the System ROM version by the profile of "BIOS Version/Date". ** Linux(R) OS ** You can check the System ROM date by a following procedure. 1. Launch the terminal such as xterm. 2. Execute the command as follows. # /usr/sbin/dmidecode | less Note: "#" means prompt. You do not need to input "#". 3. Check the System ROM date by "BIOS Information->Release Date". Note: The dmidecode command has to be installed. ================================================================================ Notes ================================================================================ ** Notes in general ** * Refer to "license_en.txt" about the user license agreement. * When you install the system ROM, the flashing mechanism writes over the backup ROM and saves current ROM as a backup, enabling you to switch easily to the alternate ROM version if the new ROM becomes corrupted for any reason. This feature protects the existing ROM version, even if you experience a power failure while flashing the ROM. * When Windows(R) BitLocker(TM) function is set to "Enabled", install the System ROM after making the function "Disabled". Then make the function "Enabled" after install and reboot of the system. If you install the system ROM without making the function "Disabled", you may need the recovery password when you boot the system. * This software does not support a virtualized environment such as hyper visor, guest OS, etc. Please install either on the OS which this software supports or with the method of offline installation. * To meet firmware dependencies, you can update iLO firmware by latest Starter Pack. And you can update Innovation Engine(IE) firmware by latest "Server Platform Services(SPS) firmware update module and Innovation Engine(IE) firmware update module". You can download latest update module(s) from the following web site. https://www.nec.com/express ("Support & Downloads" of the page top - PCs & Servers - Servers - Downloads - Select Model) ** Note for Windows(R) OS environment and Linux(R) OS environment ** * This software will access to iLO5 (Baseboard Management Controller). It is required that the "iLO 5 Channel Interface Driver" (CHIF) must be installed. The CHIF driver can be installed by using EXPRESSBUILDER or "Starter Pack". -------------------------------------------------------------------------------- [Revision history] Version:2.10 (05/21/2019) Notes: - Do not update on a system that meets all the following conditions. OS : VMWare ESXi Processor : - Intel(R) Xeon(R) Bronze 31xx processor - Intel(R) Xeon(R) Silver 41xx processor - Intel(R) Xeon(R) Gold 51xx processor - Intel(R) Xeon(R) Gold 61xx processor - Intel(R) Xeon(R) Platinum 81xx processor BIOS/Platform Configuration(RBSU) : - Intel(R) TXT Support is set to Enabled. System Utilities > System Configuration > RBSU > Server Security > Intel(R) TXT Support - "Current TPM Type" of "Trusted Platform Module Options" is set to "TPM 1.2". System Utilities > System Configuration > RBSU > Server Security > Trusted Platform Module Options > Current TPM Type Note) The factory setting is "TPM 2.0". Enhancements: - Added a new BIOS/Platform Configuration (RBSU) IODC Configuration option to the Power and Performance Menu. System Utilities > System Configuration > RBSU > Power and Performance Options > Advanced Performance Tuning Options > IODC Configuration This option allows for tuning the policy for which I/O transactions interact with the processor cache. - Added support for Fast Fault Tolerant Memory (ADDDC) for memory configurations with single rank memory implemented. After updating the System ROM, the server will automatically configure Advanced Memory Protection option to Fault Tolerant Memory (ADDDC) if both of the following two conditions are satisfied. System Utilities > System Configuration > RBSU > Memory Options > Advanced Memory Protection - A memory configuration that supports Fast Fault Tolerant Memory (ADDDC). - The configuration of Workload Profile is other than "Custom" and "Low latency". System Utilities > System Configuration > RBSU > Workload Profile Problems Fixed: - Addressed an issue where the Server Backup and Restore functionality may not work properly if initiated through the RESTful API returning a message "An internal error occurred during RIS operation". - Addressed an issue where the memory refresh rate is not set correctly when "Memory Refresh rate" option is "2x Refresh" parameter. System Utilities > System Configuration > RBSU > Memory Options > Memory Refresh Rate = 2x Refresh This issue was introduced with the v2.00 System ROM and did not impact earlier versions of the System ROM. - Addressed an issue where the system would not boot to a USB drive when a non-bootable (non-formatted) drive was also present in the system. This issue only impacts systems configured in Legacy BIOS Mode. System Utilities > System Configuration > RBSU > Boot Options > Boot Mode - Addressed following security vulnerabilities. CVE-2019-1559 Version:2.04 (04/18/2019) Notes: - Do not update on a system that meets all the following conditions. OS : VMWare ESXi Processor : - Intel(R) Xeon(R) Bronze 31xx processor - Intel(R) Xeon(R) Silver 41xx processor - Intel(R) Xeon(R) Gold 51xx processor - Intel(R) Xeon(R) Gold 61xx processor - Intel(R) Xeon(R) Platinum 81xx processor BIOS/Platform Configuration(RBSU) : - Intel(R) TXT Support is set to Enabled. System Utilities > System Configuration > RBSU > Server Security > Intel(R) TXT Support - "Current TPM Type" of "Trusted Platform Module Options" is set to "TPM 1.2". System Utilities > System Configuration > RBSU > Server Security > Trusted Platform Module Options > Current TPM Type Note) The factory setting is "TPM 2.0". Problems Fixed: - Updated microcode for Intel(R) Xeon(R) Scalable processor family. Contents of update - Addressed following security vulnerabilities. CVE-2018-12126, CVE-2018-12130, CVE-2018-12127, CVE-2019-11091, CVE-2019-0119, CVE-2019-0126 - Addressed issues that may be cause for the following case. - Correctable or Uncorrectable Memory Errors - Uncorrectable Machine Check Exception (UMCE) Errors - Addressed an issue where the system boot time may be longer with the following processors. - Intel(R) Xeon(R) Bronze 3xxx processor - Intel(R) Xeon(R) Silver 4xxx processor - Intel(R) Xeon(R) Gold 5xxx processor Version:2.02 (03/19/2019) Notes: - Do not update on a system that meets all the following conditions. OS : VMWare ESXi Processor : Intel (R) Xeon (R) Scalable Processor 3100/4100/5100/6100/8100 series. BIOS/Platform Configuration(RBSU) : - Intel(R) TXT Support is set to Enabled. System Utilities > System Configuration > RBSU > Server Security > Intel(R) TXT Support - "Current TPM Type" of "Trusted Platform Module Options" is set to "TPM 1.2". System Utilities > System Configuration > RBSU > Server Security > Trusted Platform Module Options > Current TPM Type Note) The factory setting is "TPM 2.0". Problems Fixed: - Addressed following security vulnerabilities. CVE-2018-12201, CVE-2018-12202, CVE-2018-12203, CVE-2018-12204, CVE-2018-12205 - Updated microcode for Intel(R) Xeon(R) Scalable Processors. Version:2.00 (02/02/2019) Notes: - Do not update on a system that meets all the following conditions. OS : VMWare ESXi Processor : Intel (R) Xeon (R) Scalable Processor 3100/4100/5100/6100/8100 series. BIOS/Platform Configuration(RBSU) : - Intel(R) TXT Support is set to Enabled. System Utilities > System Configuration > RBSU > Server Security > Intel(R) TXT Support - "Current TPM Type" of "Trusted Platform Module Options" is set to "TPM 1.2". System Utilities > System Configuration > RBSU > Server Security > Trusted Platform Module Options > Current TPM Type Note) The factory setting is "TPM 2.0". Enhancements: - Added a new "Backup and Restore Settings" menu to "System Default Options" in the BIOS/Platform Configuration (RBSU). This option allows you to save the BIOS configuration to a USB storage device. - Added a new "Dual Bifurcation" (quadfurcation) parameter of "PCIe Slot XX Bifurcation option" to "Advanced PCIe Configuration Options" in BIOS/Platform Configuration(RBSU). This option will allow a x16 PCIe slot to be bifurcated into four x4 PCIe slot. Note) XX is PCIe Slot Number. This option is used for certain PCIe option cards that support/require PCIe slot bifurcation. - Updated description of Japanese and Chinese for System Utilities. - Updated the RESTful API BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration(RBSU) options. Problems Fixed: - Addressed following security vulnerabilities. CVE-2018-3613, CVE-2017-5731, CVE-2017-5732, CVE-2017-5733, CVE-2017-5734, CVE-2017-5735, CVE-2018-3630, CVE-2018-12178, CVE-2018-12179, CVE-2018-12180, CVE-2018-12181, CVE-2018-12182, CVE-2018-12183 - Updated microcode for Intel(R) Xeon(R) Scalable Processors. - Addressed an issue where iLO virtual media may not boot properly after setting the "Boot on Next Reset" option in the "Remote Console and Media - Virtual Media" settings in the iLO web interface. - Addressed an issue where "Embedded Applications - Active Health System Log" in System Utilities may fail to work properly with iLO firmware 1.30 or later. - Addressed an issue where an optional SATA DVD drive may not unlock and allow media to be ejected after an operating system reboot. - Addressed an issue where the system may become unresponsive during boot and experience a Red Screen (RSOD) when booting in Legacy BIOS Mode with a M.2 SATA SSD installed. This issue does not impact systems in UEFI Mode. - Addressed an issue where difficult to input seconds part. System Utilities > System Configuration > RBSU > Date and Time > Time (hh:mm:ss) - Addressed an issue that lost setting information such as Serial Number and Product ID recorded in the system if processing such as POST execution or setting change is advanced while iLO is restarted. - Fixed the CPU L2 / L3 cache size display. System Utilities > System Information > Processor Information > L2 Cache System Utilities > System Information > Processor Information > L3 Cache Version:1.50 (12/29/2018) Enhancements: - "Advanced Memory Protection" is now automatically changed to "Fast Fault Tolerant Memory (ADDDC)" mode when the DIMM configuration supporting Fast Fault Tolerant Memory Mode (ADDDC) and "Workload Profile" is other than "Low Latency" and "Custom". System Utilities > System Configuration > RBSU > Processor Options > Workload Profile System Utilities > System Configuration > RBSU > Processor Options > Memory Options > Advanced Memory Protection Fast Fault Tolerant Memory (ADDDC) allows system to detect and correct errors before memory errors adversely affect the system, improving system fault tolerance to memory problems. Note) When The following memory configuration is installed, "Fast Fault Tolerant Memory Mode (ADDDC)" does not work. The "Advanced Memory Protection" setting will remain. - A system that installs the following memory using x8 DRAM technology: 8GB additional memory board(1x8GB/R/SR) [N8102-708] 16GB additional memory board(1x16GB/R/DR) [N8102-710] - A system in which only one memory is installed in one memory channel. 16GB additional memory board(1x16GB/R/SR) [N8102-709] Also, when "Advanced Memory Protection" is set to "Mirrored Memory with Advanced ECC Support" mode or "Online Spare with Advanced ECC Support" mode, the "Advanced Memory Protection" setting will remain. The automatic change to "Fast Fault Tolerant Memory (ADDDC)" mode can be disabled by the following procedure. 1. Press the key during POST to start up the system utility. 2. Set "Workload Profile" to "Custom". 3. Set "Advanced Memory Protection" to "Advanced ECC Support" mode. Version:1.46 (10/02/2018) Firmware Dependencies: - To use the System ROM v1.46 (10/02/2018), following requirements should be met. 1. iLO Firmware: Version 1.35 Aug 14 2018 or later 2. Innovation Engine(IE) Firmware: Version 0.1.6.1 or later Note: About detail of update firmware(s), refer to "Notes in general" in this document. Enhancements: - Added support for flashing the firmware of the optional TPM (Trusted Platform Module) Kit. - Added a new PCIe Peer-to-Peer Serialization option to the Advanced Performance Options menu in the BIOS/Platform Configuration (RBSU). This option can be used to improve peer-to-peer performance between two PCIe devices installed on the same processor. - Updated the RESTful API BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration(RBSU) options. Problems Fixed: - Addressed an issue where early server video output, on a locally attached display, may not show correctly when the display is attached to the server through a KVM Switch. This issue does not impact video output on attached display that are not using a KVM Switch or video output through the iLO Integrated Remote Console. - Addressed an issue where firmware flashing through the RESTful API could periodically fail and the task being marked with an exception in the iLO Web interface. This issue could impact flashing firmware such as the Innovation Engine, Intel SPS Firmware or the TPM (Trusted Platform Module) Kit. - Addressed an issue where a PCIe option card would not properly train to its maximum speed when the PCIe Bifurcation option was enabled. This issue does not impact PCIe option cards that do not require bifurcation. - Addressed an extremely rare issue where a system configured with a SATA DVD drive and a Smart Array controller may become unresponsive during boot, usually with a Red Screen of Death (RSOD), when in legacy BIOS mode. This issue does not impact systems configured in UEFI Mode. - Addressed an issue where a PCIe option card's legacy option ROM may not properly display its legacy setup menu prompt during boot when in legacy BIOS mode. This issue does not impact systems configured in UEFI Mode. Version:1.42 (06/20/2018) Firmware Dependencies: - To use the System ROM v1.42 (06/20/2018), following requirements should be met. 1. iLO Firmware: Version 1.35 Aug 14 2018 or later 2. Innovation Engine(IE) Firmware: Version 0.1.6.1 or later Note: About detail of update firmware(s), refer to "Notes in general" in this document. Problems Fixed: - Updated microcode for Intel(R) Xeon(R) Scalable Processors. This version mitigates security vulnerability of INTEL-SA-00115 and INTEL- SA-00161 in Intel Corporation. - Addressed an issue where systems may experience an 389 - Unexpected Shutdown and Restart - An undetermined error type resulted in a reboot of the server, logged in the iLO Integrated Management Log (IML). - Addressed an issue where systems may log an erroneous Bank 4 Machine Check Exception (MCE) to the IML on a system reset event. Version:1.40 (06/15/2018) Firmware Dependencies: - To use the System ROM v1.40 (06/15/2018), the following requirements should be met. 1. iLO Firmware: Version 1.30 May 31 2018 or later 2. Innovation Engine(IE) Firmware: Version 0.1.6.1 or later If the requirements aren't met, update to the appropriate firmware(s). Enhancements: - Added support for the latest VMware vSphere Secure Boot Certificate. When you intend to use this new certificate, you need to reset "Allowed Signatures Database" by selecting "Reset to Platform default" in System Utilities. And then you need to reconfigure Secure Boot settings. - Added support to decode certain Machine Check Exceptions(MCE) to a specific failing PCIe device. Previous versions of the System ROM would log a generic MCE to the Integrated Management Log (IML) for these error events. - Added a new "Memory Controller Interleaving" to "Memory Options" option of BIOS/Platform Configuration(RBSU). This option allows disabling memory controller interleaving which may improve memory performance for systems configured with an unbalanced memory configuration. - Added a new "Processor Jitter Control Optimization" to "Advanced Performance Options" option of BIOS/Platform Configuration(RBSU). This option setting allows users to choose between optimizing Auto-tuned mode for maximum throughput performance, low latency, or the default - zero latency. - Updated the RESTful API BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration(RBSU) options. - Updated description of Japanese and Chinese for System Utilities. Problems Fixed: - Addressed an issue where the IML Viewer in the System Utilities menu may become unresponsive when launched. - Addressed an issue where the Dual microSD Card USB Module may not boot properly when the UEFI POST Discovery Mode option is set to Force Fast Discovery. - Addressed an issue where the Trusted Platform Module (TPM) Firmware update may not complete properly when the TPM is configured for "TPM 2.0" Mode. This issue does not impact systems configured with a TPM operating in "TPM 1.2" mode. - Addressed an issue where the system may not be able to boot to EXPRESSBUILDER when a specific USB Key was installed in one of the server USB Ports. - Addressed an issue where Integrated Lights-Out (iLO) Virtual Media may not boot properly when the "UEFI POST Discovery Mode" option is set to "Force Full Discovery". - Addressed an issue where the system may become unresponsive during POST or experience a Red Screen on the next boot following an I/O Machine Check Exception (MCE) at runtime. - Addressed an issue where a system configured with the "Internal SD Card" disabled from BIOS/Platform Configuration (RBSU) and an Dual microSD card installed would not boot from the Dual microSD card USB Module when configured in "Legacy Boot Mode". This issue does not impact systems configured in UEFI Boot Mode. - Addressed an issue where systems configured with Smart Array S100i SR Gen10 may experience a failed RAID volume on a system reset. Version:1.36 (02/14/2018) Enhancements: - Added new "Storage Device Information" to "System Information" menu of System Utilities. - Added new "PCIe Bifurcation Options" menu and "PCIe Slot XX Bifurcation" options to BIOS/Platform Configuration(RBSU). (XX is PCIe Slot Number.) When enabled, this option will bifurcate a PCIe slot into two equal width slots. This option is used for certain PCIe option cards that support/require PCIe slot bifurcation. - Added a new "Direct to UPI(D2K)" option to "Power and Performance Options" of BIOS/Platform Configuration(RBSU). If the default "Auto" parameter is selected, the function is configured to "Enabled" or "Disabled" appropriately. Use this option in "Auto" of default unless otherwise specified. - Added a new "Enhanced CPU Cooling" parameter to "Thermal Configuration" option of "Fan and Thermal Options" in BIOS/Platform Configuration(RBSU). When running certain processor intensive workloads, this option can provide additional cooling to the processors which can result in improved performance. - Added support for wheel functionality of the Integrated Lights-Out (iLO) virtual mouse in the System Utilities. In Addition, the wheel function of the virtual mouse is supported with iLO firmware version 1.20 or later. - Added RESTful API configuration support for the Smart Array S100i SR Gen10 SW RAID controller. - Updated the RESTful API BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration(RBSU) options. - Updated description of Japanese and Chinese for System Utilities. Problems Fixed: - Addressed an issue where the UEFI Boot Order would not get reset to a default value when loading a default configuration. This issue does not impact systems configured in Legacy Boot Mode. - Addressed an issue where the High Performance Event Timer (HPET) was reported as "not functioning properly" under Device Manager on Windows(R). - Addressed an issue where the "Embedded Serial Port" option could not be properly configured through the RESTful Interface. - Addressed an issue where the PCI Express I/O Proximity values were not properly allocated in the ACPI System Locality Information Table (SLIT). This change may help provide a performance benefit in applications and configurations that are sensitive to PCIe Device I/O NUMA awareness. - Addressed a rare issue where the system may become unresponsive when a SAS drive was inserted with the Smart Array S100i SR Gen10 SW RAID enabled. This issue does not impact systems configured in AHCI mode. - Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License). Version:1.32 (02/01/2018) Problems Fixed: - Updated microcode for Intel(R) Xeon(R) Scalable Processors. This version mitigates security vulnerability of INTEL-SA-00088 in Intel Corporation. - Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License). Version:1.26 (11/14/2017) Enhancements: - Added support for update function of Innovation Engine (IE) Firmware. Updating System ROM to v1.26 or later is needed to apply IE firmware and SPS firmware. Problems Fixed: - Addressed an issue where the High Performance Event Timer (HPET) was reported as "not functioning properly" under Device Manager on Windows(R). Version:1.22 (09/29/2017) Problems Fixed: - Addressed an issue where the system would not achieve maximum performance results when the BIOS/Platform Configuration (RBSU) Sub-NUMA Clustering option is enabled. This option is not enabled by default. - Addressed an issue where the system may have the system time incorrectly "shifted" to the incorrect time after the operating system has been running for an extended period of time. This issue was typically seen under Microsoft Windows(R) when the Set Time Automatically option was enabled from the Windows Date and Time Settings configuration page. - Addressed an issue where the system may report an inaccurate error message in the Integrated Management Log (IML) when a memory training failure occurred. It is recommended that customers update to this version of the system ROM before replacing any DIMMs due to a training issue. - Addressed an issue where the system may experience an erroneous boot-time message and Integrated Management Log (IML) entry stating that Core Boost Technology is disabled due to a lack of an iLO Advanced License (531 - Core Boost Technology missing required iLO License) when using the Version 1.20 System ROM. -------------------------------------------------------------------------------- [Copyright and Trademark] All contents on this software are the copyright of NEC Corporation or the third-party software developer. All other contents mentioned herein are copyright of their respective owners. Microsoft, Windows, Windows Server are trademarks or registered trademarks of Microsoft Corporation in the United States and other countries. Linux(R) is a registered trademark of Linus Torvalds in the United States and other countries. Red Hat is a trademark or a registered trademark of Red Hat Inc. in the United States and other countries. All other company names and product names mentioned herein are registered trademarks or trademarks of their respective owners. -------------------------------------------------------------------------------- Copyright NEC Corporation 2019