Datasheet

IBM United States Hardware Announcement 113-198 IBM is a registered trademark of International Business Machines Corporation
31
Product machine code license and other licenses and notices
Environmental Notice and User Guide Documentation CD
The Installation and Service Guide on the Product Documentation CD contains the
installation, use, and troubleshooting information necessary to use and service the
product.
Security, auditability, and control
Three of the most important features in compute node design are reliability,
availability, and serviceability (RAS). These RAS features help to ensure the integrity
of the data that is stored in the compute node, the availability of the compute node
when you need it, and the ease with which you can diagnose and correct problems.
The compute node has the following RAS features:
Advanced Configuration and Power Interface (ACPI)
Automatic server restart (ASR)
Built-in diagnostics using DSA Preboot, which is stored NAND Flash memory
Built-in monitoring for temperature, voltage, and hard disk drives
Customer support center 24 hours per day, 7 days a week
Customer upgrade of flash ROM-resident code and diagnostics
Customer-upgradeable Unified Extensible Firmware Interface (UEFI) code and
diagnostics
ECC protected DDR3 memory
ECC protection on the L2 cache
Error codes and messages
Integrated management module 2 (IMM2) that communicates with the Chasis
Management Module to enable remote systems management
Light path diagnostics
Memory parity testing
Microprocessor built-in self-test (BIST) during power-on self-test (PST)
Microprocessor serial number access
PCI Express 2.0 and PCI Express 3.0
PCI PMI 2.2
POST
Power policy 24-hour support center
Processor presence detection
ROM-resident diagnostics
System-error logging
Vital product data (VPD) on memory
Wake on LAN capability
Wake on PCI (PME) capability
Wake on USB 2.0 capability
This offering uses the security and auditability features from standard IBM offerings
and supported Linux distributions.
The customer is responsible for evaluation, selection, and implementation of security
features, administrative procedures, and appropriate controls in application systems
and communications facilities.