12-29-2016 09:31 AM - edited 03-01-2019 01:00 PM
I have a UCS 220M3 server where running ucs-c220-huu-3.0.1c.iso update-all corrupted my bios. Now it's unable to boot and asking me to recover using recovery.cap file on an USB flash stick root folder. I can't seem to find that file anywhere on the Cisco.com site. Can someone please point me to it?
I found following document as an instruction for the recovery however it doesn't tell me where to download the BIOS update package.
On download page for UCS 220M3, I see following options and the BIOS update utility is not an option. Neither it seems to be embedded inside any other ISO files. Please help.
Solved! Go to Solution.
06-24-2018 12:13 PM
Decryption will fail when openssl1.1 is installed on the system.
The default hash used by
openssl enc for password-based key derivation changed in 1.1.0 to SHA256 versus MD5 in lower versions.
You could try to put an old version of openssl in your path (not tested but should work)
Manually extract the files
Mount the iso, copy the firmware.squashfs.enc
Decipher the file:(the password cannot be posted here)
openssl enc -aes-256-cbc -md md5 -d -in firmware.squashfs.enc -out firmware.squashfs -k "<some password>"
Mount the squafs filesystem:
mount -oro,loop firmware.squashfs /mnt/
Browse the filesystem
ls /mnt/ bios broadcom cimc emulex fusionio hdd intel lsi qlogic
09-10-2018 11:22 AM
i have the same problem. Wehre can I geht the password of the Firmware.squash.enc?
10-04-2018 12:38 PM
Just to check if we found a solution to extract the cimc bin file
10-04-2018 03:13 PM
I was able the run the getfw cli on a Rhel7.3 with openssl ver 1:1.0.1e
Best of Luck,
12-17-2020 10:46 AM
More than a year later and the answer is still no.
01-24-2019 05:23 AM
I got getfw running using an old Debian 7.0 version using OpenSSL 1.0.1t.
However, this does not give me the LSI firmware that I need.
What is the way to extract that firmware? Any chance to post that password in a PM ?
01-24-2019 06:56 AM - edited 01-24-2019 06:58 AM
Alright - when you run getfw and use 'killall getfw' immediately, the decrypted squashfs file is still on the disk:
In that moment, you can mount this image as mentioned by olivier.nicolas and have access to the firmware.
05-31-2021 02:01 PM
Hi, any luck getting the Cisco version of the LSI firmware?
05-31-2021 02:16 PM
05-31-2021 02:12 PM
Hi, is the password in the MD5 file?
12-31-2019 04:46 AM
02-03-2020 07:18 AM
because its Cisco and anything that should take 3 minutes takes hours.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: