ā12-29-2016 09:31 AM - edited ā03-01-2019 01:00 PM
Hi,
I have a UCS 220M3 server where running ucs-c220-huu-3.0.1c.iso update-all corrupted my bios. Now it's unable to boot and asking me to recover using recovery.cap file on an USB flash stick root folder. I can't seem to find that file anywhere on the Cisco.com site. Can someone please point me to it?
I found following document as an instruction for the recovery however it doesn't tell me where to download the BIOS update package.
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw/C220/install/C220/install.html#88948
On download page for UCS 220M3, I see following options and the BIOS update utility is not an option. Neither it seems to be embedded inside any other ISO files. Please help.
Solved! Go to Solution.
ā06-24-2018 12:13 PM
Decryption will fail when openssl1.1 is installed on the system.
The default hash used by openssl enc
for password-based key derivation changed in 1.1.0 to SHA256 versus MD5 in lower versions.
You could try to put an old version of openssl in your path (not tested but should work)
Manually extract the files
Mount the iso, copy the firmware.squashfs.enc
Decipher the file:(the password cannot be posted here)
openssl enc -aes-256-cbc -md md5 -d -in firmware.squashfs.enc -out firmware.squashfs -k "<some password>"
Mount the squafs filesystem:
mount -oro,loop firmware.squashfs /mnt/
Browse the filesystem
ls /mnt/ bios broadcom cimc emulex fusionio hdd intel lsi qlogic
ā09-10-2018 11:22 AM
Hallo,
i have the same problem. Wehre can I geht the password of the Firmware.squash.enc?
Kind regards
Uwe
ā10-04-2018 12:38 PM
Just to check if we found a solution to extract the cimc bin file
ā10-04-2018 03:13 PM
Hi Uwe,
I was able the run the getfw cli on a Rhel7.3 with openssl ver 1:1.0.1e
Best of Luck,
Muneeb
ā12-17-2020 10:46 AM
More than a year later and the answer is still no.
ā01-24-2019 05:23 AM
I got getfw running using an old Debian 7.0 version using OpenSSL 1.0.1t.
However, this does not give me the LSI firmware that I need.
What is the way to extract that firmware? Any chance to post that password in a PM ?
ā01-24-2019 06:56 AM - edited ā01-24-2019 06:58 AM
Alright - when you run getfw and use 'killall getfw' immediately, the decrypted squashfs file is still on the disk:
/mnt/TEFW/firmware.squashfs
In that moment, you can mount this image as mentioned by olivier.nicolas and have access to the firmware.
ā05-31-2021 02:01 PM
Hi, any luck getting the Cisco version of the LSI firmware?
Thanks
ā05-31-2021 02:16 PM
ā05-31-2021 02:12 PM
Hi, is the password in the MD5 file?
Thanks
ā10-18-2024 06:33 AM
ā10-18-2024 11:20 AM
NEW? you mean a 10 year old server. No one not Cisco can get those files. And Cisco pulled the files when the server went EOL
ā12-31-2019 04:46 AM
ā02-03-2020 07:18 AM
because its Cisco and anything that should take 3 minutes takes hours.
ā04-05-2023 04:32 AM
Hi im also wondering where the password is?
I'm hoping that someone has it and I don't have to brute force it.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide