2.4.15
LVDS Port (CN16) ....................................................................................... 27
2.4.16
2.4.17
COM Port2 RS-485 .................................................................................... 30
2.4.18
COM Port2 RS-422 .................................................................................... 30
2.4.19
LPC Port (CN18)........................................................................................... 31
2.4.20
USB 2.0 Port 1 (CN19) ................................................................................ 32
2.5
2.6
Function Block ........................................................................................................ 34
3.1
3.2
AMI BIOS Setup ..................................................................................................... 37
3.3
Main.......................................................................................................................... 38
3.4
Advanced ................................................................................................................ 39
3.4.1
CPU Configuration .................................................................................... 40
3.4.2
SATA Configuration ................................................................................... 42
3.4.3
Hardware Monitor ..................................................................................... 43
3.4.4
SIO Configuration ...................................................................................... 44
3.4.4.1
3.4.5
DIO Configuration ..................................................................................... 46
3.4.6
Trusted Computing .................................................................................... 47
3.4.7
Power Management .................................................................................. 49
3.5
Chipset ..................................................................................................................... 50
3.5.1
North Bridge ................................................................................................ 51
3.5.1.1
3.5.2
South Bridge ............................................................................................... 54
3.6
Security .................................................................................................................... 55
3.6.1
Secure Boot ................................................................................................. 56
3.6.1.1
Preface
Key Management .............................................................................. 57
XII