Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Technologies VEP4600 BIOS User guide

PDF

BIOS

New features and version history.

Table 1. New features and version history
Functional area Feature description
BIOS 3.41.0.9-23 VEP4600-3.41.0.9-23
  • Update to Intel IPU 2021.2 to address security issues:
    • Microcode_330 (2006C0A)
    • SPS v04.00.04.402.0
    • ACM binaries v1.3.61
    • PSRC-16050 EDKII HTTP Boot
      • CVE-2019-14553
    • PSRC-15545 Intel IPU 2021.2 Feb
      • CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0060, CVE-2021-0119, CVE-2021-0124, CVE-2021-0125, CVE-2021-0127
    • PSRC-15791 Intel IPU 2021 Nov x710 rNDC FW
      • CVE-2021-0200
BIOS 3.41.0.9-21 VEP4600-3.41.0.9-21:
  • Addresses the following Intel Security Advisory: INTEL-SA-00463. A security advisory is a statement by the manufacturer when a security vulnerability impacts a product and a remedy is available for the vulnerability. Update requires cold reboot to take effect.
    • INTEL-SA-00463: Update Microcode and Intel RC for: CVE-2020-8670, CVE-2020-8700, CVE-2020-12357, CVE-2020-12358, CVE-2020-12359, CVE-2020-12360, CVE-2020-24486, CVE-2020-24509, CVE-2021-0095
  • Update to AMI label 38
  • Update BIOS components
  • Microcode version: v04.00.04.317.0
  • SPS Firmware version: 02006B06
  • ACM version: 1.3.51_LBG_BKRV
  • SINIT version: 1.3.53_LBG_BKRV
BIOS 3.41.0.9-19
  1. Added Secure Boot support. Secure Boot supports Microsoft Key for signed image when enabled.
    NOTE: Secure Boot is disabled by default. To configure, see the VEP4600 Operating System Installation Guide.
  2. Fixed Diag in BIOS test reboot automatically and boot the system into back BIOS.
  3. Fixed PSU_test in embedded BIOS. Shows PSU1 and PSU2 as filed.
BIOS 3.41.0.9-18
  1. Beginning with BIOS VEP4600-BIOS-3.41.0.9-18.BIN Dell has introduced a BIOS setup manual admin user password.
    1. If your system is running BIOS VEP4600-BIOS-3.41.0.9-18.BIN or later the BIOS setup manual admin user password is <servicetag>!
      NOTE: The password is case-sensitive. The password must match servicetag exactly.
      NOTE: For example if the service tag is: GWGRG02 then the password is GWGRG02!
      1. Setup admin user manual password: <servicetag>!
    2. If your system is running less than BIOS VEP4600-BIOS-3.41.0.9-18.BIN there is no default setup manual admin user password.
    NOTE: No password is required for setup manual user account.
  2. New Intel microcode with security vulnerability fixes (microcode 0x02009606)
  3. Update AMI BakervillePkg to label 29 to fix security vulnerability.
BIOS 3.41.0.9-16
  1. Micro code security-related fixes
  2. Intel security vulnerabilities
    1. Intel-SA-00240: Intel CPU Local Privilege Escalation Advisory
      1. CVE-2019-0151
      2. CVE-2019-0152
    2. Intel-SA-00280:
      1. CVE-2019-1113
      2. CVE-2019-11137
    3. Intel-SA-00255:
      1. CVE-2019-0139
      2. CVE-2019-0140
      3. CVE-2019-0144
      4. CVE-2019-0150
    4. Intel-SA-00270:
      1. CVE-2019-11135
    5. Intel-SA-00271:
      1. CVE-2019-11139
BIOS 3.41.0.9-15
  1. Fix for known Intel-SA-00233 Microarchitectural Data Sampling Vulnerabilities.
  2. Fixed Missing SPF port 1 information with ethtool.
BIOS 3.41.0.9-14
  1. Support for changing BIOS password from Linux
  2. Fix for infrequent garbled DMI table outputs.
BIOS 3.41.0.9-13
  1. DIAGS in BIOS enabled
  2. Add i350 network legacy PXE support.
  3. Fix system boot from backup BIOS after enabling PCIe PHY test mode.
  4. Grayed-out the subitems of Driver Health in BIOS Setup
BIOS 3.41.0.9-12
  1. Option ROM dispatches policy:
    • Restore if failure -> Disabled.
    • Primary Video Ignore -> Disabled
    • Device class option ROM dispatches policy (slot number 1, slot number 4, and so forth). All removed except for mass storage controller.
  2. PCI subsystem settings:
    • SR-IOV support -> Enabled
  3. CSM configuration:
    • Boot option filter -> UEFI and legacy
    • Option ROM execution:
      • Network -> UEFI
      • Storage - > Legacy
      • Video - > Legacy
      • Other -> UEFI
  4. Intel Ethernet connection 722 (All four)
    • NIC configuration -> Wake on LAN - > Disable
  5. Platform configuration:
    • PCH configuration -> Azalia -> Disabled
  6. IIO configuration:
    • Socket0 configuration -> IOUO, IOu1 -> x8x8
  7. Server management:
    • Operating system watchdog timer -> Disabled
      NOTE: Turn this on based on specific OS needs.
Table 2. BIOS 3.41.0.9-12 settings changesTable listing new BIOS 3.41.0.9-12 settings changes
BIOS 3.41.0.9-12 settings changes
Updated the ECC test function. PR# BL-90
Added DMI information (Production Version/Serial Number/SKU Number/Family) to DMI Type 1 from FRU.
Fixed the UART 1 that does not print out when BMC stays in uboot.
Set MC slot Bifurcation based on GPIO. PR# BL-207
Support for new boot order in sequence: Legacy USB, UEFI USB, embedded network (PXE), UEFI hard disk, other UEFI device, legacy hard disk, UEFI shell. PR# BL-180
Set critical boot device timeout to 60 seconds for final failure to force boot to backup BIOS and disabled critical device test by default.
Added function to read if SR-IOV is enabled and choose the correct PCI device list for POST PCI test. Post PCI test (critical test) will not fail if SR-IOV is enabled or disabled. PR# BL-227
PchHdAudio default set to disable.
Changed default timeout to break into the setup menu to 10 seconds. PR# BL-188
Baseline for DIAG in BIOS feature is disabled.
Set Dell proprietary GUID to DMI type 11.
Deemphasis setting of MC1 and MC2. PR# BL-207

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\