Appendix D. Statement Of Volatile Memory Components - Intel S2600WF Technical Product Specification

Server board product family
Hide thumbs Also See for S2600WF:
Table of Contents

Advertisement

Intel® Server Board S2600WF Product Family Technical Product Specification

Appendix D. Statement of Volatile Memory Components

This section is used to identify the volatile and non-volatile memory components of the Intel® Server Board
S2600WF product family.
Table 59 provides the following data for each identified component.
Component Type: Three types of components are on the server board assembly:
o Non-volatile: Non-volatile memory is persistent, and is not cleared when power is removed
from the system. Non-volatile memory must be erased to clear data. The exact method of
clearing these areas varies by the specific component. Some areas are required for normal op-
eration of the server, and clearing these areas may render the server board inoperable
o Volatile: Volatile memory is cleared automatically when power is removed from the system.
o Battery powered RAM: Battery powered RAM is similar to volatile memory, but is powered by
a battery on the server board. Data in battery powered RAM is persistent until the battery is
removed from the server board.
Size: Size of each component in bits, Kbits, Mbits, bytes, kilobytes (KB), or megabytes (MB).
Board Location: Board location is the physical location of each component corresponding to infor-
mation on the server board silkscreen.
User Data: The flash components on the server boards do not store user data from the operating sys-
tem. No operating system level data is retained in any listed components after AC power is removed.
The persistence of information written to each component is determined by its type as described in
the table.
Each component stores data specific to its function. Some components may contain passwords that
provide access to that device's configuration or functionality. These passwords are specific to the
device and are unique and unrelated to operating system passwords. The specific components that
may contain password data are:
o BIOS: The server board BIOS provides the capability to prevent unauthorized users from con-
figuring BIOS settings when a BIOS password is set. This password is stored in BIOS flash, and
is only used to set BIOS configuration access restrictions.
o BMC: The server boards support an Intelligent Platform Management Interface (IPMI) 2.0 con-
formant baseboard management controller (BMC). The BMC provides health monitoring, alert-
ing and remote power control capabilities for the Intel® Server Board. The BMC does not have
access to operating system level data.
The BMC supports the capability for remote software to connect over the network and
perform health monitoring and power control. This access can be configured to require
authentication by a password. If configured, the BMC maintains user passwords to control this
access. These passwords are stored in the BMC flash.
134

Advertisement

Table of Contents
loading

Table of Contents