IBM 68666AU User Guide - Page 6

Using the Configuration/Setup Utility program, Installing options

Page 6 highlights

Wake on LAN 29 Alert on LAN 29 Remote Program Load or Dynamic Host Configuration Protocol . . 30 Remote Administration 30 LANClient Control Manager 30 System Migration Assistant 30 Desktop Management Interface 31 Using security features 31 Anti-intrusion features 31 Component protection 32 Asset ID capability 32 IBM security solutions 33 Data protection 33 Enhanced security 34 Locking the keyboard 34 Shutting down your computer 34 Taking care of your computer 34 Basics 35 Cleaning your computer 35 Moving your computer 36 Chapter 4. Using the Configuration/Setup Utility program 39 Starting and using the Configuration/Setup Utility program 39 Viewing and changing settings 40 Exiting from the Configuration/Setup Utility program 41 Using System Security 42 Using Enhanced Security 42 Using Security Profile by Device 43 Setting Remote Administration 44 Using passwords 45 Using Adapter ROM security 49 Using Asset ID 50 Using the IBM Embedded Security Chip 50 Enabling the Pentium III Xeon processor serial number feature . . . . 50 Other settings in the Configuration/Setup Utility program 51 Changing keyboard speed 51 Changing and viewing the startup sequence 51 Interrupt and DMA resources 53 Power-management features 53 Chapter 5. Installing options 57 Preparing to install options 57 Handling static-sensitive devices 57 Available internal options 58 Tools required 58 Removing the cover and front bezel 59 Locating components 61 iv IntelliStation Z Pro User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

Wake on LAN
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
29
Alert on LAN
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
29
Remote Program Load or Dynamic Host Configuration Protocol
.
.
30
Remote Administration
. . . . . . . . . . . . . . . . . . . . . . . . .
30
LANClient Control Manager
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
System Migration Assistant
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
Desktop Management Interface
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
31
Using security features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
31
Anti-intrusion features
. . . . . . . . . . . . . . . . . . . . . . . . .
31
Component protection
. . . . . . . . . . . . . . . . . . . . . . . . .
32
Asset ID capability
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
32
IBM security solutions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
33
Data protection
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33
Enhanced security
. . . . . . . . . . . . . . . . . . . . . . . . . . .
34
Locking the keyboard
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
Shutting down your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
Taking care of your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
Basics
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
35
Cleaning your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
35
Moving your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
36
Chapter 4.
Using the Configuration/Setup Utility program
.
.
.
.
.
.
39
Starting and using the Configuration/Setup Utility program
.
.
.
.
.
.
39
Viewing and changing settings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
40
Exiting from the Configuration/Setup Utility program
.
.
.
.
.
.
.
41
Using System Security
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
42
Using Enhanced Security
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
42
Using Security Profile by Device
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
43
Setting Remote Administration
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
44
Using passwords
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
45
Using Adapter ROM security
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
49
Using Asset ID
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
50
Using the IBM Embedded Security Chip
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
50
Enabling the Pentium III Xeon processor serial number feature
.
.
.
.
50
Other settings in the Configuration/Setup Utility program
.
.
.
.
.
.
.
51
Changing keyboard speed
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
51
Changing and viewing the startup sequence
.
.
.
.
.
.
.
.
.
.
.
.
.
51
Interrupt and DMA resources
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
53
Power-management features
. . . . . . . . . . . . . . . . . . . . . .
53
Chapter 5.
Installing options
. . . . . . . . . . . . . . . . . . . . . .
57
Preparing to install options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
57
Handling static-sensitive devices
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
57
Available internal options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
58
Tools required
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
58
Removing the cover and front bezel
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
59
Locating components
. . . . . . . . . . . . . . . . . . . . . . . . . .
61
iv
IntelliStation Z Pro User Guide