Removing The Tpm - HP AB464-9003F Service Manual

Hpe integrity rx6600 server user
Table of Contents

Advertisement

system. The encryption keys created by the TPM encapsulate system application encryption
keys to provide an additional layer of security for sensitive system data.
The fundamental capabilities of the TPM include:
Platform authentication
Sensitive information protection
Data integrity
System privacy
WARNING!
disconnected from the server prior to performing this procedure.
Voltages are present at various locations within the server whenever an AC power source is
connected. This voltage is present even when the main power switch is in the off position.
Failure to observe this warning can result in personal injury or damage to equipment.
CAUTION:
follow ESD safety precautions can result in damage to the server.
IMPORTANT:
the TPM security component.

Removing the TPM

To remove the TPM, follow these steps:
1.
Back up the current TPM settings. See the HP-UX operating system documentation for more
information.
2.
Power off the server and disconnect the power cables. See
(page
89).
3.
If rack installed, slide the server completely out from the rack. See
from the Rack" (page
4.
Remove the top cover. See
5.
Remove the core I/O board. See
6.
Grasp the TPM by the edges and lift it out of the socket on the I/O board
CAUTION:
securely destroy the TPM. Do not attempt to use the TPM in another server.
232 Removing and Replacing Server Components
Ensure that the system is powered off and all power sources have been
Observe all ESD safety precautions before attempting this procedure. Failure to
You must run the supported version of the HP-UX operating system to utilize
176).
"Removing the Top Cover" (page
Destroy the TPM after removing it from the server. Follow local regulations to
"Removing the Core I/O Board" (page
"Powering Off the Server"
"Extending the Server
178).
234).
(Figure
80).

Advertisement

Table of Contents
loading

Table of Contents