- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-29-2016 09:31 AM - edited 03-01-2019 01:00 PM
Hi,
I have a UCS 220M3 server where running ucs-c220-huu-3.0.1c.iso update-all corrupted my bios. Now it's unable to boot and asking me to recover using recovery.cap file on an USB flash stick root folder. I can't seem to find that file anywhere on the Cisco.com site. Can someone please point me to it?
I found following document as an instruction for the recovery however it doesn't tell me where to download the BIOS update package.
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw/C220/install/C220/install.html#88948
On download page for UCS 220M3, I see following options and the BIOS update utility is not an option. Neither it seems to be embedded inside any other ISO files. Please help.
Solved! Go to Solution.
- Labels:
-
Unified Computing System (UCS)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-24-2018 12:13 PM
Decryption will fail when openssl1.1 is installed on the system.
The default hash used by openssl enc
for password-based key derivation changed in 1.1.0 to SHA256 versus MD5 in lower versions.
You could try to put an old version of openssl in your path (not tested but should work)
Manually extract the files
Mount the iso, copy the firmware.squashfs.enc
Decipher the file:(the password cannot be posted here)
openssl enc -aes-256-cbc -md md5 -d -in firmware.squashfs.enc -out firmware.squashfs -k "<some password>"
Mount the squafs filesystem:
mount -oro,loop firmware.squashfs /mnt/
Browse the filesystem
ls /mnt/ bios broadcom cimc emulex fusionio hdd intel lsi qlogic
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-10-2018 11:22 AM
Hallo,
i have the same problem. Wehre can I geht the password of the Firmware.squash.enc?
Kind regards
Uwe
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-04-2018 12:38 PM
Just to check if we found a solution to extract the cimc bin file
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-04-2018 03:13 PM
Hi Uwe,
I was able the run the getfw cli on a Rhel7.3 with openssl ver 1:1.0.1e
Best of Luck,
Muneeb
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-17-2020 10:46 AM
More than a year later and the answer is still no.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2019 05:23 AM
I got getfw running using an old Debian 7.0 version using OpenSSL 1.0.1t.
However, this does not give me the LSI firmware that I need.
What is the way to extract that firmware? Any chance to post that password in a PM ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
01-24-2019 06:56 AM - edited 01-24-2019 06:58 AM
Alright - when you run getfw and use 'killall getfw' immediately, the decrypted squashfs file is still on the disk:
/mnt/TEFW/firmware.squashfs
In that moment, you can mount this image as mentioned by olivier.nicolas and have access to the firmware.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-31-2021 02:01 PM
Hi, any luck getting the Cisco version of the LSI firmware?
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-31-2021 02:16 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
05-31-2021 02:12 PM
Hi, is the password in the MD5 file?
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-18-2024 06:33 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-18-2024 11:20 AM
NEW? you mean a 10 year old server. No one not Cisco can get those files. And Cisco pulled the files when the server went EOL
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-31-2019 04:46 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-03-2020 07:18 AM
because its Cisco and anything that should take 3 minutes takes hours.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-05-2023 04:32 AM
Hi im also wondering where the password is?
I'm hoping that someone has it and I don't have to brute force it.
