- Продукты для ИТ-инфраструктуры
- Услуги по сопровождению и технической поддержке
- Программное обеспечение
- Электронные устройства
Windows | Windows Server 2008 | Precautions
Last Reviewed January 18, 2011
The following table lists items that must be checked when using PRIMEQUEST Series and Bundled Software.
Applies To | Precautions | Last Review |
---|---|---|
PRIMEQUEST
Fibre Channel cards [MC-08FC31 MC-08FC41 MC-08FC51 MC-08FC61 MC-08FC71 MC-08FC81 MC-08FC91] |
Under a server environment with LUNs by multi-path Fiber Channel (FC) cards, a failed FC path may not be switched to the alternative path. As the result, connections to corresponding disks are disconnected.
This problem occurs if the transmission line trouble occurs due to unstable FC connection even if an alternative path exists. A error record below is added to Windows Event Log because the Windows Server OS judges this error as a disk problem. Log name : system Source : disk Event ID:15 Description: The device, \Device\Harddiskxx\DRxx, is not ready for access yet. This problem may occur under the following states. - A FC cable is not plugged properly to the FC card, or, - Connecting parts of either a FC cable or the FC card the cable is plugged are deteriorated Please ask your local Fujitsu sales representative whether there is problem in the FC cable and the FC card. |
Jan. 18, 2011 |
Fibre Channel cards
[MC-08FC31 MC-08FC41 MC-08FC51 MC-08FC61 MC-08FC71 MC-08FC81 MC-08FC91] |
To use these Fibre Channel cards in a Windows Server 2008 environment, the Fibre Channel card driver, firmware and EFI driver must be updated.
The matching Fibre Channel card driver, firmware and EFI driver versions differ depending on the Fibre Channel card model being used. To determine the correct matching version refer to: "How to update PRIMEQUEST Fibre Channel Card Firmware/EFI driver." Download Fibre Channel card drivers from here. |
Jul. 2, 2009 |
Broadcom onboard Gigabit Ethernet | To use the network adaptor teaming feature of Broadcom onboard Gigabit Either, confirm that Broadcom Advanced Control Suite used is 11.5.13 or later, and the driver used is 11.7.1.2 or later. You can download Broadcom Advanced Control Suite and the driver from here. | Feb. 11, 2009 |
Single Channel 10G BASE-SR LAN card
[MC-08XE11] |
When using the network adaptor teaming feature of 10G BASE-SR LAN card, confirm that the driver being used is 2.6.22.13614 or later. You can download this driver from here. | Dec. 4, 2008 |
SAS Card
[MC-08SS11] PCI Express SAS card [MC-08SS21] |
To use these SAS cards in a Windows Server 2008 environment, confirm that the driver used is 1.27.03.00 or later. You can download this driver from here.
NOTE: If using these SAS cards and the on-board SAS controller together, the driver must be installed twice. One for these SAS cards and again for on-board SAS controller. |
Dec. 4, 2008 |
PRIMEQUEST | To install Windows Server 2008 for PRIMEQUEST 500A/ 500 series, use the firmware for Windows Server 2008.
To obtain the firmware for Windows Server 2008, please ask your local Fujitsu sales representative. |
Jun. 30, 2008 |
PRIMEQUEST | An upgrade to Windows Server 2008 is not possible from Windows Server 2003.
This is due to the design of Windows Serve 2008. Windows Server 2008 must be Installed as new. |
Feb. 27, 2008 |
Applies To | Version | Precautions | Last Review |
---|---|---|---|
SystemcastWizard Lite | V1.1
V1.1A V1.2 V1.2A V1.2B V1.3 V1.4 V1.5 V1.6 V1.6A V1.7 V1.8 V1.8A V1.9 V2.0 V2.0A |
A vulnerability exists in the PXE service, TFTP service and in the Registry Setting Tool.
1. Description of Vulnerability A buffer overflow can occur in the PXE service and due to the Registry Setting Tool of this software. In addition, a directory traversal occurs with the TFTP service of this software. 2. Vulnerability Threat Can cause arbitrary code to be executed on the deployment server and can cause the PXE service to crash. In addition it may allow users not authorised to use the deployment server to refer to files. 3. Update Patch Download Patch from here. credit: Ruben Santamarta of R&D/Reverse Engineer in Wintercore, reported this vulnerability to us. |
Jan. 29, 2009 |
Поделиться |
![]() |
![]() |
![]() |
![]() |