Technical Product Specification
Intel® Server System SR2625UR TPS Product Overview
Revision 1.8 Intel order number E46130-010
15
Figure 10. Front Bezel Supporting Intel
®
Local Control Panel
2.8 Rack and Cabinet Mounting Options
The system is designed to support 19 inches wide by up to 30 inches deep server cabinets. The
system supports three rack mount options:
A fixed mount relay rack/cabinet mount kit (Product Order Code - AXXBRACKETS)
which can be configured to mount the system into either a 2-post rack or 4-post cabinet.
A tool-less full extracting slide rail kit (Product Order Code – AXXHERAIL2) designed to
support an optional cable management arm (Product Order Code – AXXRACKCARM2).
A basic slide rail kit (Product Order Code – AXXBASRAIL13) designed to mount the
system into a standard (19 inches by up to 30 inches deep) EIA-310D compatible
server cabinet.
2.9 Trusted Platform Module (TPM) – Supported only on SR2625URLXT
2.9.1 Overview
Trusted Platform Module (TPM) is a hardware-based security device that addresses the
growing concern on boot process integrity and offers better data protection. TPM protects the
system start-up process by ensuring it is tamper-free before releasing system control to the
operating system. A TPM device provides secured storage to store data, such as security keys
and passwords. In addition, a TPM device has encryption and hash functions. The Intel
®
Server
System SR2625URLXT implements TPM as per TPM PC Client specifications revision 1.2 by
the Trusted Computing Group (TCG).
A TPM device is affixed to the motherboard of the server and is secured from external software
attacks and physical theft. A pre-boot environment, such as the BIOS and operating system
loader, uses the TPM to collect and store unique measurements from multiple factors within the
boot process to create a system fingerprint. This unique fingerprint remains the same unless
the pre-boot environment is tampered with. Therefore, it is used to compare to future
measurements to verify the integrity of the boot process.
After the BIOS complete the measurement of its boot process, it hands off control to the
operating system loader and in turn to the operating system. If the operating system is TPM-
enabled, it compares the BIOS TPM measurements to those of previous boots to make sure
the system was not tampered with before continuing the operating system boot process. Once
the operating system is in operation, it optionally uses TPM to provide additional system and
data security (for example, Microsoft Vista* supports Bitlocker drive encryption).