Intel SE7525GP2 Product Specification - Page 131

Secure Mode Operation

Page 131 highlights

Intel® Server Boards SE7320SP2 and SE7525GP2 Platform Management on-Critical Condition ƒ Temperature, voltage, or fan non-critical threshold crossing ƒ Chassis intrusion ƒ Satellite controller sends a non-critical state, via the Set Fault Indication command, to the mBMC ƒ Set Fault Indication command from system BIOS. The BIOS may use the Set Fault Indication command to indicate additional, non-critical status such as system memory or CPU configuration changes. Degraded Condition ƒ One or more processors are disabled by Fault Resilient Boot (FRB) or BIOS ƒ BIOS has disabled or mapped out some of the system memory 5.3.4.6 Chassis Intrusion Switch Some platforms support chassis intrusion detection. On these platforms, the mBMC monitors the state of the Chassis Intrusion signal and makes the status of the signal available via the Get Chassis Status command and Physical Security sensor state. If enabled, a chassis intrusion state change causes the mBMC to generate a Physical Security sensor event message with a General Chassis Intrusion offset. 5.3.4.7 Front Panel Lockout The management controller monitors a 'Secure Mode' signal from the keyboard controller on the server board. When the Secure Mode signal is asserted, the management controller may lock out the ability to power down or reset the system using the power or reset push buttons, respectively. Secure Mode may also block the ability to initiate a sleep request using the sleep push-button. The management controller generates a 'Secure Mode Violation Attempt' event message if an attempt it made to power-down, sleep, or reset the system using the push buttons while Secure Mode is active. The mBMC will prevent the system from powering up via button press when either secure mode or the front panel lockout I/O signal is asserted. 5.3.5 Secure Mode Operation Secure mode is a signal from the SIO/keyboard controller. Power and reset buttons are locked out, except for the NMI and Chassis ID buttons. A security violation event is generated if buttons are pressed while secure mode active. The Secure Mode feature allows the front panel switches and other system resources to be protected against unauthorized use or access. Secure Mode is enabled and controlled via the Set Secure Mode Options command. Revision 4.0 119

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Intel® Server Boards SE7320SP2 and SE7525GP2
Platform Management
Revision 4.0
119
on-Critical Condition
Temperature, voltage, or fan non-critical threshold crossing
Chassis intrusion
Satellite controller sends a non-critical state, via the
Set Fault Indication
command, to
the mBMC
Set Fault Indication
command from system BIOS. The BIOS may use the
Set Fault
Indication
command to indicate additional, non-critical status such as system memory or
CPU configuration changes.
Degraded Condition
One or more processors are disabled by Fault Resilient Boot (FRB) or BIOS
BIOS has disabled or mapped out some of the system memory
5.3.4.6
Chassis Intrusion Switch
Some platforms support chassis intrusion detection. On these platforms, the mBMC monitors
the state of the
Chassis Intrusion
signal and makes the status of the signal available via the
Get
Chassis Status
command and
Physical Security
sensor state. If enabled, a chassis intrusion
state change causes the mBMC to generate a
Physical Security
sensor event message with a
General Chassis Intrusion
offset.
5.3.4.7
Front Panel Lockout
The management controller monitors a ‘Secure Mode’ signal from the keyboard controller on the
server board. When the Secure Mode signal is asserted, the management controller may lock
out the ability to power down or reset the system using the power or reset push buttons,
respectively. Secure Mode may also block the ability to initiate a sleep request using the sleep
push-button.
The management controller generates a ‘Secure Mode Violation Attempt’ event message if an
attempt it made to power-down, sleep, or reset the system using the push buttons while Secure
Mode is active.
The mBMC will prevent the system from powering up via button press when either secure mode
or the front panel lockout I/O signal is asserted.
5.3.5
Secure Mode Operation
Secure mode is a signal from the SIO/keyboard controller. Power and reset buttons are locked
out, except for the NMI and Chassis ID buttons. A security violation event is generated if buttons
are pressed while secure mode active.
The Secure Mode feature allows the front panel switches and other system resources to be
protected against unauthorized use or access. Secure Mode is enabled and controlled via the
Set Secure Mode Options
command.