Destroying the defective UFM
V
CAUTION!
The UFM contains customer information (e.g. IP address, license
numbers). After replacing the UFM, hand the defective UFM over to the
customer. If the customer requests disposal of the defective UFM,
proceed as follows:
Figure 262: Destroying the defective UFM
Ê Use a pair of combination pliers (1) and flat nose pliers (2) to break
the UFM in half as shown.
14.3.3.4 Concluding steps
"Reassembling" on page 62
Ê
"Connecting the server to the mains" on page 72
Ê
"Switching on the server" on page 73
Ê
"Enabling SVOM boot watchdog functionality" on page 93
Ê
"Enabling BitLocker functionality" on page 98
Ê
14.3.3.5 Software configuration
The UFM delivery set includes the "Recovery Tool CD" to setup the ESXi
configuration. Proceed as follows:
TX2540 M1
Upgrade and Maintenance Manual
System board and components
347