Posted  by  admin

Download Remote Wake Up For Mac 1.4.1

Comicbooklover 1 4 1 1131 Ubk Download Free Edgeview 2 1 988 – Cutting Edge Image Viewer Video 1 Blocker 1 4 8 X 4 Flux 5 6 10 – Advanced Web Design Tool Twitterrific 5 2 1 – Effortlessly Read And Compose Tweets Remote Wake Up 1 3 16 Deckset 2 0 1 – Simple Presentation Creator. Remote Wake-up and Power modes. An external pull-up or pull-down resistor is required. See Table 2 SCL 12 I/O OD I2C-controller serial input clock. An optional external I2C EEPROM can be used to store default configurations upon power-up including the USB Vendor ID and Device ID. A pull-up resistor (typically 4.7 to 10k Ohms) is.

  1. Download Remote Wake Up For Mac 1.4.1 Free
  2. Download Remote Wake Up For Mac 1.4.1 Crack
  3. Download Remote Wake Up For Mac 1.4.1 Torrent
  4. Remote Wake Up Software
  5. Dell Remote Wake Up
  6. Remote Wake Up Windows 7
-->

Applies to

Download Remote Wake Up for macOS 10.11 or later and enjoy it on your Mac. ‎Remote Wake Up is a tool that allows you to remotely switch on every Wake On Lan capable device. You can also wake up devices over the internet.

  • Windows 10
  • Windows 11
  • Windows Server 2016 and above

This article for IT professionals describes how BitLocker Network Unlock works and how to configure it.

Network Unlock was introduced in Windows 8 and Windows Server 2012 as a BitLocker protector option for operating system volumes. Network Unlock helps you manage BitLocker-enabled desktops and servers in a domain environment by automatically unlocking operating system volumes when the system is rebooted and is connected to a wired corporate network. This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware.

Download Remote Wake Up For Mac 1.4.1 Free

Without Network Unlock, operating system volumes that use TPM+PIN protectors require a PIN when a computer reboots or resumes after hibernation (for example, by Wake on LAN). For enterprises, this setup can make software patches difficult to roll out to unattended desktops and remotely administered servers.

Network Unlock allows BitLocker-enabled systems that use TPM+PIN and that meet the hardware requirements to boot into Windows without user intervention. Network Unlock works like the TPM+StartupKey at boot. But the StartupKey doesn't need to be read from USB media. Instead, the key for Network Unlock is composed from a key that's stored in the TPM and an encrypted network key that's sent to the server. It's decrypted and returned to the client in a secure session.

Network Unlock core requirements

Network Unlock requires the following mandatory hardware and software configurations before it can automatically unlock domain-joined systems:

  • You must be running at least Windows 8 or Windows Server 2012.
  • Any supported operating system that uses UEFI DHCP drivers can be a Network Unlock client.
  • Network Unlock clients must have a TPM (trusted platform module) chip and at least one TPM protector.
  • You must have a server running the Windows Deployment Services (WDS) role on any supported server operating system.
  • The BitLocker Network Unlock optional feature can be installed on any supported server operating system.
  • You must have a DHCP server, separate from the WDS server.
  • You must have a properly configured public/private key pairing.
  • Network Unlock Group Policy settings must be configured.

The network stack must be enabled to use the Network Unlock feature. Equipment manufacturers deliver their products in various states and with different BIOS menus. So confirm that the network stack has been enabled in the BIOS before you start the computer.

Note

To properly support DHCP within UEFI, the UEFI-based system should be in native mode and shouldn't have a compatibility support module (CSM) enabled.

On computers that run Windows 8 and later, the first network adapter on the computer, usually the onboard adapter, must be configured to support DHCP. This adapter must be used for Network Unlock.

Use this configuration especially when you have multiple adapters and you want to configure one without DHCP, such as for a lights-out management protocol. The configuration is necessary because Network Unlock stops enumerating adapters when it reaches an adapter that has a DHCP port that has failed for any reason. So if the first enumerated adapter doesn't support DHCP, isn't plugged into the network, or fails to report availability of the DHCP port for any reason, then Network Unlock will fail.

On supported versions of Windows Server 2012 and later, the Network Unlock server component installs as a Windows feature. It uses Server Manager or Windows PowerShell cmdlets. In Server Manager, the feature name is BitLocker Network Unlock. In Windows PowerShell, the feature name is BitLocker-NetworkUnlock. This feature is a core requirement.

Network Unlock requires WDS in the environment where the feature will be used. Configuration of the WDS installation isn't required. But the WDS service must be running on the server.

The network key is stored on the system drive along with an AES 256 session key. It's encrypted with the 2048-bit RSA public key of the unlock server's certificate. The network key is decrypted with the help of a provider on a supported version of Windows Server that's running WDS. The network key is returned encrypted with its corresponding session key.

Network Unlock sequence

The unlock sequence starts on the client side, when the Windows boot manager detects the existence of the Network Unlock protector. It uses the DHCP driver in UEFI to get an IP address for IPv4. Then it broadcasts a vendor-specific DHCP request that contains the network key and a session key for the reply, all encrypted by the server's Network Unlock certificate, as described earlier. The Network Unlock provider on the supported WDS server recognizes the vendor-specific request, decrypts it with the RSA private key, and returns the network key encrypted with the session key via its own vendor-specific DHCP reply.

On the server side, the WDS server role has an optional plug-in component, like a PXE (preboot execution environment) provider. The plug-in component handles the incoming Network Unlock requests. The provider can also be configured with subnet restrictions. These restrictions require the IP address that's provided by the client in the Network Unlock request to belong to a permitted subnet in order to release the network key to the client. If the Network Unlock provider is unavailable, then BitLocker fails over to the next available protector to unlock the drive. So in a typical configuration, the standard TPM+PIN unlock screen is presented to unlock the drive.

The server-side configuration to enable Network Unlock requires provisioning a 2048-bit RSA public/private key pair in the form of an X.509 certificate. The configuration also requires the public key certificate to be distributed to the clients.

Manage and deploy this certificate through the Group Policy editor directly on a domain controller that has a domain functional level of at least Windows Server 2012. This certificate is the public key that encrypts the intermediate network key. The intermediate network key is one of the two secrets that are required to unlock the drive; the other secret is stored in the TPM.

The Network Unlock process follows these phases:

  1. The Windows boot manager detects a Network Unlock protector in the BitLocker configuration.
  2. The client computer uses its DHCP driver in the UEFI to get a valid IPv4 IP address.
  3. The client computer broadcasts a vendor-specific DHCP request that contains:
    • A network key (a 256-bit intermediate key) that's encrypted by the 2048-bit RSA public key of the Network Unlock certificate from the WDS server.
    • An AES-256 session key for the reply.
  4. The Network Unlock provider on the WDS server recognizes the vendor-specific request.
  5. The provider decrypts the request by using the WDS server's BitLocker Network Unlock certificate RSA private key.
  6. The WDS provider returns the network key encrypted with the session key by using its own vendor-specific DHCP reply to the client computer. This key is an intermediate key.
  7. The returned intermediate key is combined with another local 256-bit intermediate key. This key can be decrypted only by the TPM.
  8. This combined key is used to create an AES-256 key that unlocks the volume.
  9. Windows continues the boot sequence.

Configure Network Unlock

The following steps allow an administrator to configure Network Unlock in a domain where the functional level is at least Windows Server 2012.

Install the WDS server role

The BitLocker Network Unlock feature installs the WDS role if it's not already installed. If you want to install it separately before you install BitLocker Network Unlock, use Server Manager or Windows PowerShell. To install the role in Server Manager, select the Windows Deployment Services role.

To install the role by using Windows PowerShell, use the following command:

Configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. Use the WDS management tool, wdsmgmt.msc. This tool starts the Windows Deployment Services Configuration Wizard.

Confirm the WDS service is running

To confirm the WDS service is running, use the Services Management console or Windows PowerShell. To confirm the service is running in the Services Management console, open the console by using services.msc. Then check the status of the WDS service.

To confirm the service is running by using Windows PowerShell, use the following command:

Install the Network Unlock feature

To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature in the Server Manager console, select BitLocker Network Unlock.

To install the feature by using Windows PowerShell, use the following command:

Create the certificate template for Network Unlock

A properly configured Active Directory Services Certification Authority can use the certificate template to create and issue Network Unlock certificates. To create a certificate template:

  1. Open the certificate template snap-in (certtmpl.msc).

  2. Locate the user template. Right-click the template name, and then select Duplicate Template.

  3. On the Compatibility tab, change the Certification Authority and Certificate recipient fields to Windows Server 2012 and Windows 8, respectively. Ensure Show resulting changes is selected.

  4. Select the General tab of the template. The Template display name and Template name should clearly identify that the template will be used for Network Unlock. Clear the check box for Publish certificate in Active Directory.

  5. Select the Request Handling tab. In the Purpose drop-down menu, select Encryption. Ensure the Allow private key to be exported option is selected.

  6. Select the Cryptography tab. Set the Minimum key size to 2048. (For this template, you can use any Microsoft cryptographic provider that supports RSA. But for simplicity and forward compatibility, we recommend using Microsoft Software Key Storage Provider.)

  7. Select Requests must use one of the following providers. Then clear all options except for your selected cryptography provider, such as the Microsoft Software Key Storage Provider.

  8. Select the Subject Name tab. Select Supply in the request. If the certificate templates dialog box appears, select OK.

  9. Select the Issuance Requirements tab. Then select both CA certificate manager approval and Valid existing certificate.

  10. Select the Extensions tab. Then select Application Policies > Edit.

  11. In the Edit Application Policies Extension dialog box, select Client Authentication, Encrypting File System, and Secure Email. Then choose Remove.

  12. In the Edit Application Policies Extension dialog box, select Add.

  13. In the Add Application Policy dialog box, select New. In the New Application Policy dialog box, enter the following information in the space provided, and then select OK to create the BitLocker Network Unlock application policy.

    • Name: BitLocker Network Unlock
    • Object Identifier: 1.3.6.1.4.1.311.67.1.1
  14. Select the newly created BitLocker Network Unlock application policy, and then select OK.

  15. With the Extensions tab still open, select Edit Key Usage Extension, and then select Allow key exchange only with key encryption (key encipherment). Then select Make this extension critical.

  16. Select the Security tab. Confirm that the Domain Admins group has been granted Enroll permission.

  17. Select OK to complete configuration of the template.

To add the Network Unlock template to the certificate authority, open the certificate authority snap-in (certsrv.msc). Right-click Certificate Templates, and then choose New, Certificate Template to issue. Select the previously created BitLocker Network Unlock certificate.

After you add the Network Unlock template to the certificate authority, you can use this certificate to configure BitLocker Network Unlock.

Create the Network Unlock certificate

Network Unlock can use imported certificates from an existing public key infrastructure (PKI). Or it can use a self-signed certificate.

To enroll a certificate from an existing certificate authority:

  1. On the WDS server, open Certificate Manager by using certmgr.msc.

  2. Under Certificates - Current User, right-click Personal.

  3. Select All Tasks > Request New Certificate.

  4. When the Certificate Enrollment wizard opens, select Next.

  5. Select Active Directory Enrollment Policy.

  6. Choose the certificate template that was created for Network Unlock on the domain controller. Then select Enroll.

  7. When you're prompted for more information, select Subject Name and provide a friendly name value. Your friendly name should include information for the domain or organizational unit for the certificate. Here's an example: BitLocker Network Unlock Certificate for Contoso domain.

  8. Create the certificate. Ensure the certificate appears in the Personal folder.

  9. Export the public key certificate for Network Unlock:

    1. Create a .cer file by right-clicking the previously created certificate and choosing All Tasks > Export.
    2. Select No, do not export the private key.
    3. Select DER encoded binary X.509, and then finish exporting the certificate to a file.
    4. Give the file a name, such as BitLocker-NetworkUnlock.cer.
  10. Export the public key with a private key for Network Unlock:

    1. Create a .pfx file by right-clicking the previously created certificate. Then choose All Tasks > Export.
    2. Select Yes, export the private key.
    3. Complete the steps to create the .pfx file.

To create a self-signed certificate, either use the New-SelfSignedCertificate cmdlet in Windows PowerShell or use certreq.

Here's a Windows PowerShell example:

Here's a certreq example:

  1. Create a text file that has an .inf extension. For example, notepad.exeBitLocker-NetworkUnlock.inf.

  2. Add the following contents to the previously created file:

  3. Open an elevated command prompt and use the certreq tool to create a new certificate. Use the following command, specifying the full path to the file that you created previously. Also specify the file name.

  4. Verify the previous command properly created the certificate by confirming the .cer file exists.

  5. Launch Certificates - Local Machine by running certlm.msc.

  6. Create a .pfx file by opening the Certificates – Local ComputerPersonalCertificates path in the navigation pane. Right-click the previously imported certificate, and then select All Tasks > Export. Follow through the steps to create the .pfx file.

Deploy the private key and certificate to the WDS server

Now that you've created the certificate and key, deploy them to the infrastructure to properly unlock systems. To deploy the certificates:

  1. On the WDS server, open a new Microsoft Management Console (MMC), and then add the certificates snap-in. When you're prompted, select the computer account and local computer.
  2. Right-click Certificates (Local Computer) - BitLocker Drive Encryption Network Unlock, and then choose All Tasks > Import.
  3. In the File to Import dialog box, choose the .pfx file that you created previously.
  4. Enter the password that you used to create the .pfx file, and finish the steps.

Configure Group Policy settings for Network Unlock

You've now deployed the certificate and key to the WDS server for Network Unlock. In the final step, you'll use Group Policy settings to deploy the public key certificate to computers that you want to be able to unlock by using the Network Unlock key. Find Group Policy settings for BitLocker in Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive Encryption by using the Local Group Policy Editor or the MMC.

To enable the Group Policy setting that's required to configure Network Unlock:

  1. Open Group Policy Management Console (gpmc.msc).
  2. Enable the policy Require additional authentication at startup, and then select Require startup PIN with TPM or Allow startup PIN with TPM.
  3. Turn on BitLocker with TPM+PIN protectors on all domain-joined computers.

To deploy the required Group Policy setting:

Note

The Group Policy settings Allow network unlock at startup and Add Network Unlock Certificate were introduced in Windows Server 2012.

  1. Copy the .cer file that you created for Network Unlock to the domain controller.

  2. On the domain controller, open Group Policy Management Console (gpmc.msc).

  3. Create a new Group Policy Object or modify an existing object to enable the Allow network unlock at startup setting.

  4. Deploy the public certificate to clients:

    1. In Group Policy Management Console, go to Computer ConfigurationPoliciesWindows SettingsSecurity SettingsPublic Key PoliciesBitLocker Drive Encryption Network Unlock Certificate.
    2. Right-click the folder, and then choose Add Network Unlock Certificate.
    3. Follow the steps and import the .cer file that you copied earlier.

    Note

    Only one network unlock certificate can be available at a time. If you need a new certificate, delete the current certificate before you deploy a new one. The Network Unlock certificate is located in the HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftSystemCertificatesFVE_NKP key on the client computer.

  5. Reboot the clients after you deploy the Group Policy.

    Note

    The Network (Certificate Based) protector is added only after a reboot where the policy is enabled and a valid certificate is present in the FVE_NKP store.

Subnet policy configuration files on the WDS server (optional)

By default, the server unlocks clients that have the correct Network Unlock certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP. You can create a subnet policy configuration file on the WDS server to limit the subnets that Network Unlock clients can use for unlocking.

The configuration file, called bde-network-unlock.ini, must be located in the same directory as the Network Unlock provider dynamic-link library (%windir%System32Nkpprov.dll). The configuration file applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, then the provider fails and stops responding to requests.

The subnet policy configuration file must use a [SUBNETS] section to identify the specific subnets. You can then use the named subnets to specify restrictions in certificate subsections.

Subnets are defined as simple name-value pairs, in the common INI format. In this format, each subnet has its own line. The name is on the left of the equals sign. The subnet on the right of the equals sign is a Classless Interdomain Routing (CIDR) address or range. The keyword ENABLED is disallowed for subnet names.

Following the [SUBNETS] section are sections for each Network Unlock certificate. A certificate is identified by the certificate thumbprint, which is formatted without any spaces. These sections define subnet clients that you can unlock by using that certificate.

Note

When you specify the certificate thumbprint, don't include spaces. Thumbprints that include spaces aren't recognized as valid. The spaces will cause the subnet configuration to fail.

Each certificate section defines subnet restrictions by denoting the allowed list of permitted subnets. If any subnets are listed in a certificate section, then only those subnets are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate has no section in the subnet policy configuration file, then no subnet unlocking restrictions are applied for that certificate.

So to apply restrictions to every certificate, you must add a certificate section for every Network Unlock certificate on the server. And you must add an explicit allow list set for each certificate section.

Create subnet lists by putting the name of a subnet from the [SUBNETS] section on its own line below the certificate section header. Then, the server will unlock clients that have this certificate only on the subnets that the list specifies.

To troubleshoot, you can quickly exclude a subnet without deleting it from the section. Just comment it out by using a prepended semicolon.

To disallow the use of a certificate altogether, add a DISABLED line to its subnet list.

Turn off Network Unlock

To turn off the unlock server, you can unregister the PXE provider from the WDS server or uninstall it altogether. However, to stop clients from creating Network Unlock protectors, you should disable the Allow Network Unlock at startup Group Policy setting. When you disable this policy setting on client computers, any Network Unlock key protectors on the computer are deleted. Alternatively, you can delete the BitLocker Network Unlock certificate policy on the domain controller to accomplish the same task for an entire domain.

Note

Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server's ability to respond to unlock requests for that certificate. However, this condition is seen as an error. It's not a supported or recommended method for turning off the Network Unlock server.

Update Network Unlock certificates

To update the certificates that Network Unlock uses, administrators need to import or generate the new certificate for the server. Then they must update the Network Unlock certificate Group Policy setting on the domain controller.

Note

Servers that don't receive the Group Policy Object (GPO) will require a PIN when they boot. In such cases, find out why the server didn't receive the GPO to update the certificate.

Troubleshoot Network Unlock

To troubleshoot Network Unlock problems, begin by verifying the environment. Often, a small configuration issue is the root cause of the failure. Verify these items:

  • Client hardware is based on UEFI and uses firmware version 2.3.1, and the UEFI firmware is in native mode and has no compatibility support module (CSM) for BIOS mode enabled. Verify this configuration by ensuring that the firmware has no enabled option such as Legacy mode or Compatibility mode and that the firmware doesn't appear to be in a BIOS-like mode.

  • All required roles and services are installed and started.

  • Public and private certificates have been published and are in the proper certificate containers. Verify the presence of the Network Unlock certificate by using Microsoft Management Console (MMC.exe) on the WDS server. The certificate snap-ins for the local computer should be enabled. Verify the client certificate by checking the registry key HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftSystemCertificatesFVE_NKP on the client computer.

  • Group Policy for Network Unlock is enabled and linked to the appropriate domains.

  • Group Policy is reaching the clients properly. Verify this functionality by using the GPRESULT.exe utility or the RSOP.msc utility.

  • The clients were rebooted after the policy was applied.

  • The Network (Certificate Based) protector is listed on the client. Check for this protector by using either manage-bde or Windows PowerShell cmdlets. For example, the following command lists the key protectors that are currently configured on drive C on the local computer.

    Note

    Use the output of manage-bde along with the WDS debug log to determine whether the proper certificate thumbprint is being used for Network Unlock.

Gather the following files to troubleshoot BitLocker Network Unlock.

  • The Windows event logs. Specifically, get the BitLocker event logs and the Microsoft-Windows-Deployment-Services-Diagnostics-Debug log.

    Debug logging is turned off by default for the WDS server role, so you need to enable it before you can retrieve it. Use either of the following two methods to turn on WDS debug logging.

    • Start an elevated command prompt, and then run the following command:

    • Open Event Viewer on the WDS server:

    1. In the left pane, select Applications and Services Logs > Microsoft > Windows > Deployment-Services-Diagnostics > Debug.
    2. In the right pane, select Enable Log.
  • The DHCP subnet configuration file (if one exists).

  • The output of the BitLocker status on the volume. Gather this output into a text file by using manage-bde -status. Or in Windows PowerShell, use Get-BitLockerVolume.

  • The Network Monitor capture on the server that hosts the WDS role, filtered by client IP address.

Configure Network Unlock Group Policy settings on earlier versions

Network Unlock and the accompanying Group Policy settings were introduced in Windows Server 2012. But you can deploy them by using operating systems that run Windows Server 2008 R2 and Windows Server 2008.

Your system must meet these requirements:

  • The server that hosts WDS must be running a server operating system that's designated in the 'Applies to' list at the beginning of this article.
  • Client computers must be running a client operating system that's designated in the 'Applies to' list at the beginning of this article.

Follow these steps to configure Network Unlock on these older systems.

  1. Configure registry settings for Network Unlock:

    Apply the registry settings by running the following certutil script (assuming your Network Unlock certificate file is called BitLocker-NetworkUnlock.cer) on each computer that runs a client operating system that's designated in the 'Applies to' list at the beginning of this article.

  2. Set up a TPM protector on the clients.

  3. Reboot the clients to add the Network (Certificate Based) protector.

See also

Which modem FW should I use?

Some mobile network operators (MNOs) have their own certification programs to ensure that devices connecting to that network behave as they should. The mobile network operator certifications documentation provides the modem FW version that is certified for your specific MNO.

Download the correct modem FW version. If your MNO is not included, download the latest modem FW.

nRF9160-DK application and modem firmware

Selected version

2021-10-20_d29f1dde [Latest version]

nrf9160dk_fw_2021-10-20_d29f1dde.zip

Changelog:

2021-10-20_d29f1dde [Latest version]nrf9160dk_fw_2021-10-20_d29f1dde.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_2021-10-20_d29f1dde.zipsc_DownloadFirmware_nRF9160DK

Changelog:

  • Updated to nRF Connect SDK 1.7.0
  • Includes Modem Firmware v1.3.1

The following samples and applications are part of the package:

2021-06-25_7a076c22nrf9160dk_fw_2021-06-25_7a076c22.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_2021-06-25_7a076c22.zipsc_DownloadFirmware_nRF9160DK

Changelog:

  • Updated to nRF Connect SDK 1.6.0
  • Includes Modem Firmware v1.3.0
  • Added build of Asset Tracker v2

The following samples and applications are part of the package:

2021-03-01_8e8c6089nrf9160dk_fw_2021-03-01_8e8c6089.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_2021-03-01_8e8c6089.zipsc_DownloadFirmware_nRF9160DK

Changelog:

  • Updated to nRF Connect SDK v1.5.0

The following samples and applications are part of the package:

2020-10-30_5522ca2bnrf9160dk_fw_2020-10-30_5522ca2b.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_2020-10-30_5522ca2b.zipsc_DownloadFirmware_nRF9160DK

  • Built from nRF Connect SDK v1.4.0
  • Includes nRF9160 SiP modem firmware v1.2.2

2020-09-23_b6ad40d0nrf9160dk_fw_2020-09-23_b6ad40d0.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_2020-09-23_b6ad40d0.zipsc_DownloadFirmware_nRF9160DK

  • Built from nRF Connect SDK v1.3.1
  • Includes nRF9160 SiP modem firmware v1.2.1
  • Added builds for use with external GPS antenna on nRF9160-DK version 0.15.0 and later

2020-04-29_bc7ade8bnrf9160dk_fw_2020-04-29_bc7ade8b.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_2020-04-29_bc7ade8b.zipsc_DownloadFirmware_nRF9160DK

  • Built from nRF Connect SDK master branch commit bc7ade8b
  • Includes nRF9160 SiP modem firmware v1.2.0
  • Added nRF Connect for Cloud A-GPS support
  • Improved stability and bugfixes
  • Debug builds with modem trace enabled included in .zip

Known Issues:

  • Occasional reboots caused by POLLERR on socket. Varies with network conditions.

2019-11-29_d3130d77nrf9160dk_fw_2019-11-29_d3130d77.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_2019-11-29_d3130d77.zipsc_DownloadFirmware_nRF9160DK

  • Updated to nRF Connect SDK v1.1.0
  • Includes nRF9160 SiP modem firmware v1.1.0
  • Added firmware over-the-air (FOTA) support for application updates and delta updates of the modem firmware.
  • Various bug and stability issues fixed.
  • See details in nRF Connect SDK v1.1.0 release notes.

09-10-2019_c9c833b1nrf9160dk_fw_09-10-2019_c9c833b1.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-SiP-application-firmware/nrf9160dk_fw_09-10-2019_c9c833b1.zipsc_DownloadFirmware_nRF9160DK

  • Precompiled firmware package for nRF9160-DK

Feature Brief

for the nRF9160 SiP modem firmware

nRF9160 SiP modem firmware - what it is and how it works

The nRF9160 SiP modem firmware is provided as pre-compiled binaries, signed and encrypted by Nordic Semiconductor.

  • Details - click to open

    • Pre-compiled binary, signed and encrypted
      • Update via PC tool nRF Connect for Desktop
      • Secure boot with image authentication
    • LTE Rel-13 Cat-M1 (LTE-M/eMTC)
    • LTE Rel-13 Cat-NB1/2 (NB-IoT)
    • Type B half duplex (HD), frequency division duplex (FDD)
    • Cat-M1 operation is enabled on E-UTRA Bands 1, 2, 3, 4, 5, 8, 12, 13, 14, 17, 18, 19, 20, 25, 26, 28 and 66.
    • Cat-NB1 operation is enabled on E-UTRA Bands 1, 2, 3, 4, 5, 8, 12, 13, 17, 19, 20, 25, 26, 28 and 66.
    • Power saving
      • Power Save Mode (PSM)
      • Idle-DRX and Connected Mode-DRX, DRX/extended-DRX in both
      • Independent clock and sleep state control
      • Support for 3GPP AS-RAI (Release Assistance Indication)
      • Support for MAC Inactivity Monitoring
      • Support for NIDD (Non-IP Data Delivery)
      • First LTE search optimizations
      • Modem Sleep notifications
      • Pre-evaluation of a connection
      • LTE based positioning
    • Interface to Application CPU
      • AT-command Interface for control
      • Socket Interface for Data
      • Modem production test support
      • Antenna Tuner per band Configurability with limited MIPI-RFFE support
    • Integrated TLS(1.2)/DTLS(1.2) and TCP/UDP/IPV4/IPV6 Dual Stack
      • Storage of TLS and Cloud credentials
    • SMS PDU Mode
    • Differential FOTA support enables small upgrade images
    • Support for SIM ATK and remote provisioning via Bearer Independent Protocol
      • eSIM support
    • GPS L1 C/A and QZSS L1C/A positioning
    • GPS L1 C/A and QZSS L1C/A receiver during LTE PSM and Idle DRX/extended-DRX modes
    • GPS time based configurable IO-pin / pulse
    • Single shot, fixed interval and continuous tracking modes
  • TLS Cipher suites - click to open

    • mbed TLS Name / NIST Name
      Value
      TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
      {0xC0,0x24}
      TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA
      {0xC0,0x0A}
      TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
      {0xC0,0x23}
      TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
      {0xC0,0x09}
      TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 {0xC0,0x2B}
      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
      {0xC0,0x30}
      TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
      {0xC0,0x14}
      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256{0xC0,0x2F}
      TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
      {0xC0,0x27}
      TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
      {0xC0,0x13}
      TLS-PSK-WITH-AES-256-CBC-SHA
      {0x00,0x8D}
      TLS-PSK-WITH-AES-128-CBC-SHA256
      {0x00,0xAE}
      TLS-PSK-WITH-AES-128-CBC-SHA
      {0x00,0x8C}
      TLS-PSK-WITH-AES-128-CCM-8
      {0xC0,0xA8}
      TLS-EMPTY-RENEGOTIATIONINFO-SCSV{0x00,0xFF}

nRF9160 SiP modem firmware

Programming app available in nRF Connect

Selected version

1.3.1 nRF91 firmware binaries

mfw_nrf9160_1.3.1.zip

Changelog:

1.3.1nRF91 firmware binariesmfw_nrf9160_1.3.1.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfw_nrf9160_1.3.1.zipsc_DownloadFirmware_nRF9160modem

Before applying this version:

  • Note that this modem firmware is targeted nRF9160 SiP Revision 2
  • It can be used for nRF9160 SiP Revision 1, but only for testing and development
  • It cannot be used for engineering samples of Revision 1 (e.g. DKs or Thingy:91 with version older than v0.9.0)
  • After you upgrade to MFW 1.3.x it is not recommended to downgrade to MFW 1.2.x or MFW 1.1.x.(potential file system issues)

Read out your revision by either AT command: AT%HWVERSION or look on the nRF9160 SIP for marking 'B1'.

'B1' = Revision 2

'B0' = Revision 1

The AT command responses for Revision 1 and Revision 2 SiPs will be 'nRF9160 SICA B0A' and 'nRF9160 SICA B1A' respectively.
Early engineering Revision 2 (B1A) SiPs and Revision 1 (B0A) SiPs might produce AT command responses such as 'nRF9160 SICA BQA' and 'nRFFFFFFFFF SICA FFFFFFFF' respectively.

Changelog:

  • 3GPP feature that can be used by the network for restricting sending of data packets using PDN connection established to certain APN.
  • Feature for configuring periodic network searches. Application can configure how often modem performs periodic network search while the device is out of coverage.
  • Added support for TLS cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 and TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384.
  • New feature additions and improvements for client requested neighbor cell measurement feature (AT%NCELLMEAS).
  • Improved accuracy of <energy_estimate> provision for AT command AT%CONEVAL.
  • Feature for application to prioritize either SIB16 (time information) reception or connection establishment speed.
  • XCOEX2 IO-pin configurability options now contain possibility to configure XCOEX2 IO-pin as TX indicator or RX indicator.
  • In MFW 1.3.1, the amount of ownership keys is restricted to one. Multiple instances are not allowed, and it is not allowed to write ownership key with AT%CMNG AT command.
  • Feature for application to enable or disable GNSS scheduled almanac and ephemeris broadcast reception in periodic mode.
  • Performance and speed-up improvement for GNSS reception and acquisition control if no successful location fix.
  • Optimization for GNSS not to request AGPS data from the modem when AGPS data is already injected and GNSS is started at the first time.
  • Improvements for GNSS receiver to tolerate rapid temperature changes.
  • Improvement for SIM interface RST- and IO-signal pin configurations to improve voltage level stability.
  • Correction for sleep time handling when sleep time was longer than approximately 36 hours.
  • Correction for modem deep sleep entry sequences. Defect may have caused extra current consumption during deep sleep.
  • Correction for 3GPP Release 15 enabled LTE-M cell detection.
  • Correction for GNSS 1PPS accuracy after GNSS sleep.

A complete list of new functionality, changes and bug fixes is in the release notes found hereor inside the .zip file.

This release is aligned with v1.8 of nRF91 AT command reference guide.

It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.

1.3.0nRF91 firmware binariesmfw_nrf9160_1.3.0.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfw_nrf9160_1.3.0.zipsc_DownloadFirmware_nRF9160modem

Before applying this version:

  • Note that this modem firmware is targeted nRF9160 SiP Revision 2
  • It can be used for nRF9160 SiP Revision 1, but only for testing and development
  • It cannot be used for engineering samples of Revision 1 (e.g. DKs or Thingy:91 with version older than v0.9.0)
  • After you upgrade to MFW 1.3.0 it is not recommended to downgrade to mfw 1.2.x or mfw 1.1.x.(potential file system issues)
Mac

Read out your revision by either AT command: AT%HWVERSION or look on the nRF9160 SIP for marking 'B1'.

'B1' = Revision 2

'B0' = Revision 1

The AT command responses for Revision 1 and Revision 2 SiPs will be 'nRF9160 SICA B0A' and 'nRF9160 SICA B1A' respectively.
Early engineering Revision 2 (B1A) SiPs and Revision 1 (B0A) SiPs might produce AT command responses such as 'nRF9160 SICA BQA' and 'nRFFFFFFFFF SICA FFFFFFFF' respectively.

Changelog:

  • QZSS L1C/A positioning support.
  • GPS time based configurable IO-pin / pulse.
  • GPS dynamic modes for stationary, pedestrian and automotive.
  • GPS power consumption optimizations during satellite tracking.
  • GPS enhancements to reduce GPS TTFF.
  • Support for 3GPP NB-IoT-NB2.
  • Support for 3GPP AS-RAI. Release Assistance Indication.
  • Support for Non-IP Data Delivery (NIDD).
  • Feature for application to configure country specific parameters to speed up NW search and connection times.
  • Feature for application to take benefit of modem sleep events. For power saving possibilities.
  • Feature for application to execute LTE channel pre-evaluation before establishing connection. For power saving possibilities.
  • Feature for application to measure serving and neighbor cells for cellular based positioning purposes.
  • Feature for application to optimize device power consumption when modem is searching network.
  • Feature for application to enable both LTE-M and NB-IoT system modes and modem performs automatic system mode selection.
  • Feature for application to configure RF Rx and Tx indications from IO-pin.
  • Speed-up improvements to modem cell selection and re-selection.
  • Power consumption optimization in LTE-M and NB-IoT RRC Idle mode.
  • Improvements for NB-IoT receiver performance.
  • Non-wired full modem update with pre-validation.
  • Support for on device key generation.

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

This release is aligned with v1.7 of nRF91 AT command reference guide.

It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.

We have also published a webinar showcasing all the new features and improvements, you can watch it here.


1.2.3nRF91 firmware binariesmfw_nrf9160_1.2.3.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160123.zipsc_DownloadFirmware_nRF9160modem

Changelog:

  • Correction to sleep mode entry timings. Earlier timings may have failed on sleep mode entry and
    cause additional current consumption. Updated PMIC debounce setting at boot up improves
    reliability of mode change.

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.

This release is aligned with v1.5 of nRF91 AT command reference guide.

It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.


1.2.2nRF91 firmware binariesmfw_nrf9160_1.2.2.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160122.zipsc_DownloadFirmware_nRF9160modem

Changelog:

  • Added option to use previously obtained altitude information with GPS three-satellite first fix
  • Improved GPS hot start sensitivity
  • Improved GPS time to first fix in poor signal conditions
  • Completed TCP server support
  • Various improvements to LTE-M, NB-IoT and GPS stability and performance

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.

This release is aligned with v1.5 of the nRF91 AT command reference guide.
It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.

Note:
Release 1.2.2 is not recommended for production use due to sleep mode current consumption issue.
Please refer to release 1.2.3.

1.2.1nRF91 firmware binariesmfw_nrf9160_1.2.1.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160121.zipsc_DownloadFirmware_nRF9160modem

Changelog:

  • Added support for new nRF9160 product variant (nRF9160-SIxA-B1).
  • Added support for TLS extension Server Name Indication (SNI).
  • Added support for (D)TLS cache over power cycle.
  • Added various new AT commands and improved existing ones.
  • Various improvements to LTE-M, NB-IoT and GNSS stability and performance.

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.

This release is aligned with v1.4 of the nRF91 AT command reference guide.

It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.


1.2.0nRF91 firmware binariesmfw_nrf9160_1.2.0.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160120.zipsc_DownloadFirmware_nRF9160modem

  • Various improvements to LTE-M and NB-IoT stability and performance
  • Added new socket options for improving LTE modem power consumption
  • Improved GPS power consumption
  • Improved GPS tracking performance for sensitivity and accuracy
  • Improved GPS hot and cold start acquisition sensitivity and time-to-first-fix
  • Added AT command for routing GPS signal when using a single antenna for LTE and GPS signals
  • Added various new AT commands and improved existing ones

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.

This release is aligned with v1.2 of the nRF91 AT command reference guide.

1.1.4nRF91 firmware binariesmfw_nrf9160_1.1.4.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160114.zipsc_DownloadFirmware_nRF9160modem

Changelog:

  • Bugfix that addresses rare occurrences of increased sleep current.
  • Improvement for very rare occasion where modem program NVM access may have failed at modem sleep wakeup.
  • Correction for GNSS sleep timer handling. Incorrect handling may have resulted that acquiring GNSS location may have failed after a long period of time.

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.

This release is aligned with v1.5 of nRF91 AT command reference guide.

It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.

1.1.3nRF91 firmware binariesmfw_nrf9160_1.1.3.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160113.zipsc_DownloadFirmware_nRF9160modem

Highlights:
  • Added support for new nRF9160 product variant (nRF9160-SIxA-B1)
  • Added various new AT commands and improved existing ones
  • Various improvements to LTE-M, NB-IoT and GPS stability and performance

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.

This release is aligned with v1.3 of the nRF91 AT command reference guide.

Note:
Release 1.1.3 is not recommended for production use due to sleep mode current consumption issue.
Please refer to release 1.1.4.

1.1.2nRF91 firmware binariesmfw_nrf9160_1.1.2.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160112.zipsc_DownloadFirmware_nRF9160modem

Highlights:
  • A software workaround fix for flash memory controller hardware issue, which may have caused flash accesses to fail after sleep wake-up.
  • A software correction for handling FOTA rollback in case of security or watchdog reset. Issue may have caused unnecessary modem firmware rollback after FOTA.

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.
It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.

1.1.1nRF91 firmware binariesmfw_nrf9160_1.1.1.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160111.zipsc_DownloadFirmware_nRF9160modem

The mfw_nrf9160 is the firmware for the modem subsystem of nRF9160. It supports 3GPP LTE
release 13 Cat-M1 and Cat-NB1 standards, and GPS L1C/A positioning.
Cat-M1 operation is enabled on E-UTRA Bands 1, 2, 3, 4, 5, 8, 12, 13, 14, 17, 18, 19, 20, 25,
26, 28 and 66.
Cat-NB1 operation is enabled on E-UTRA Bands 1, 2, 3, 4, 5, 8, 12, 13, 17, 19, 20, 25, 26,
28 and 66.
This release is aligned with v1.1 of nRF91 AT command reference guide.

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.
It is recommended to use the latest version of nRF Connect and nRF Connect Programmer tools.

Download Remote Wake Up For Mac 1.4.1 Crack

1.1.0nRF91 firmware binariesmfw_nrf9160_1.1.0.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160-modem-FW/mfwnrf9160110.zipsc_DownloadFirmware_nRF9160modem

This release represents a long list of:

  • New features
  • Changes
  • Bugfixes

A complete list of new functionality, changes and bug fixes is in the release notes found here or inside the .zip file.

Before applying this version, please make sure it has the mobile network operator certifications your product needs.

Board controller firmware

Selected version

1.0.0 nRF91 firmware binaries

nRF9160_DK_board_controller_FW.hex

Changelog:

1.0.0nRF91 firmware binariesnRF9160_DK_board_controller_FW.hex/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/nRF9160_DK_board_controller_FW.hexsc_DownloadFirmware_nRF9160DK

Hardware files

Selected version

1.0.0 Layout and BOM resources

nRF9160-DK - Hardware files 1_0_0.zip

Changelog:

Download Remote Wake Up For Mac 1.4.1 Torrent

1.0.0Layout and BOM resourcesnRF9160-DK - Hardware files 1_0_0.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/Hardware-files/nRF9160-DK---Hardware-files-1_0_0.zipsc_DownloadHWfiles_nRF9160DK

0.15.0Layout and BOM resourcesnRF9160-DK - Hardware files 0_15_0.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/Hardware-files/nRF9160-DK---Hardware-files-0_15_0.zipsc_DownloadHWfiles_nRF9160DK

  • Updated nRF9160 to Revision 2 (SICA-B1)
  • New GPS frontend
  • Added external serial flash memory
  • Updated power supply decoupling of nRF9160 based on most recent recommendations
  • All GPIOs now always connected to headers
  • Optional I/O expander for buttons, switches and LEDs added
  • Added connection of nRF52840 RESET line to nRF9160
  • Added current measurement header for SIM card

0.9.0Layout and BOM resourcesnRF9160-DK - Hardware files 0_9_0.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/Hardware-files/nRF9160-DK---Hardware-files-0_9_0.zipsc_DownloadHWfiles_nRF9160DK

0.8.5Layout and BOM resourcesnRF9160-DK - Hardware files 0_8_5.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/Hardware-files/nRF9160-DK---Hardware-files-0_8_5.zipsc_DownloadHWfiles_nRF9160DK

0.8.2Layout and BOM resourcesnRF9160-DK - Hardware files 0_8_2.zip/-/media/Software-and-other-downloads/Dev-Kits/nRF9160-DK/Hardware-files/nRF9160-DK---Hardware-files-0_8_2.zipsc_DownloadHWfiles_nRF9160DK

nRF9160 SiP SUPL client library

for assisted GPS support

Available versions:

After having signed up for the SUPL client license, you will be directed to a page where you can select between the available versions.

----------------------------------------------------------------------------------------------------------------

SUPL client library v0.7.1
Changelog:

  • Added soft-float build of the library.
  • Fixed cell ID encoding in the sent request, so that the server can determine the location of the device and send a reference location back to the device. The MCC table is used as a fall back in case no reference location is received from the server.
  • Reference location is now only injected if it was requested.
  • Fixed usage of an IPv6 address as the device ID.
  • Removed the dependency to the modem library (modemlib). This version works with both modem and old bsdlib (sdk-nrfxlib/bsdlib) library.

----------------------------------------------------------------------------------------------------------------
SUPL client library v0.7.0
Changelog:

  • Updated library to make it compile with the new Modem Library (sdk-nrfxlib/nrf_modem) that replaces the BSD library (sdk-nrfxlib/bsdlib).
  • If you are still using the old BSD library, you must continue using v0.6.1 of the SUPL Client library

Remote Wake Up Software

----------------------------------------------------------------------------------------------------------------
SUPL Client library v0.6.1
Changelog:

  • Fixed the altitude uncertainty for the MCC case.
  • Last release supporting the old BSD library (sdk-nrfxlib/bsdlib)

Dell Remote Wake Up

----------------------------------------------------------------------------------------------------------------

Remote Wake Up Windows 7

Click here to read the SUPL client library license agreement.
Click here to apply for a SUPL client library license and get an email with a download link.