HP Integrity rx1600 Installation Guide, Second Edition - HP Integrity rx1600 - Page 23

Removing and Replacing the Cover, Removing the Cover

Page 23 highlights

Installing and Configuring Removing and Replacing the Cover Removing and Replacing the Cover CAUTION Do not operate the server without the cover in place. Operation of the server without the cover in place will result in system failure. Operation of the server without the cover in place will make the server susceptible to EMI and overheating problems. Observe all ESD safety precautions before attempting this procedure. Failure to follow ESD safety precautions could result in damage to the server. Figure 3-9 Removing and Replacing the Cover OPEN CLOSED Intrusion sensor Removing the Cover To remove the cover, perform the following steps: Chapter 3 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90

Chapter 3
Installing and Configuring
Removing and Replacing the Cover
23
Removing and Replacing the Cover
CAUTION
Do not operate the server without the cover in place. Operation of the server without the cover
in place will result in system failure. Operation of the server without the cover in place will
make the server susceptible to EMI and overheating problems.
Observe all ESD safety precautions before attempting this procedure. Failure to follow ESD
safety precautions could result in damage to the server.
Figure 3-9
Removing and Replacing the Cover
Removing the Cover
To remove the cover, perform the following steps:
OPEN
CLOSED
Intrusion
sensor