Removing A Card That Conflicts With The Card You Just Installed; Modeling Mode; Using The Password Features - Dell PowerEdge 4200 Series User Manual

Dell poweredge 4200 servers: user guide
Hide thumbs Also See for PowerEdge 4200 Series:
Table of Contents

Advertisement

Removing a Card That Conflicts With
the Card You Just Installed
If there is a resource conflict between two ISA expansion
cards and you want to remove the card that conflicts with
the one you just installed, use the following procedure:
1.
From the Steps in Configuring Your Computer
menu, select Step 2: Add or Remove Boards and
press <Enter>.
From the list of expansion slots and cards, select the
card in conflict with the one installed, and press
<Del>. When the utility asks you to confirm your
command, press <Enter>. Then press <Esc> to
return to the Steps in Configuring Your Computer
menu.
2.
Select Step 5: Save and Exit, and press <Enter>.
3.
Select Save the Configuration and Restart the
Computer, and press <Enter>.
The system reboots with the new system configura-
tion information.
4.
If you deleted an expansion-card configuration file
from the previously saved system configuration
information, have a trained service technician
remove the card from your computer.
M
odeling Mode
Modeling mode lets you create alternate .sci files to
accommodate different hardware configurations. For
example, if you regularly change the expansion cards or
their arrangement in your computer, you can create and
save a separate system configuration file for each configu-
ration and load that file after changing the cards rather than
having to create a new configuration file every time you
change your configuration.
NOTE: To use modeling mode, you must run the EISA
Configuration Utility from the hard-disk drive.
To use the EISA Configuration Utility in modeling mode,
start the utility from your hard-disk drive by typing sd /n
at the operating system prompt and pressing <Enter>. (To
use the advanced options in modeling mode, type sd /n
/a at the operating system prompt and press <Enter>.)
5-12
Dell PowerEdge 4200 Systems User's Guide
A dialog box appears with two options—Open As. . .
(to load an existing system configuration file) and New
(to create a new file). Highlight the option you want, and
press <Enter>. The screen shows a list of Dell EISA sys-
tems. Choose the system you want to configure, and
press <Enter>. At this point, you can modify or create a
configuration file just as you would with the Configure
Computer option.
Modeling mode also provides access to advanced
system-board and expansion-card features, such as
enabling or disabling nonmaskable interrupts (NMIs)
(see "Advanced Menu" found earlier in this chapter).
Ordinarily, you do not need to adjust these features unless
a Dell service technician instructs you to do so.
When you finish modifying or creating a system configu-
ration file in modeling mode, select Step 5: Save and Exit
from the Steps in Configuring Your Computer menu. A
dialog box appears, offering two choices: to save the con-
figuration file and restart the computer or to discard the
configuration file and return to the Main Menu. If you
choose to save the configuration file, you are prompted to
type a filename for the new configuration file. Then you
are prompted to type a description of the configuration
file that is then stored with the file.
U
sing the Password Features
CAUTION: The password features provide a basic
level of security for the data on your system. How-
ever, they are not foolproof. If your data requires
more security, it is your responsibility to obtain
and use additional forms of protection, such as
data encryption programs.
Your Dell system is shipped to you with the supervisor
and user password features ready to use but with no pass-
words assigned. If system security is a concern, you
should operate your system with password protection.
You can assign a supervisor and/or user password
through the EISA Configuration Utility (as described
later in "Assigning or Changing a User Password" or
"Assigning or Changing a Supervisor Password") or
through the System Setup program (as described in
Chapter 4, "Using the System Setup Program"). After

Advertisement

Table of Contents
loading

Table of Contents