6-45
Installing and setting up a TCM or TPM
Installation and setup flowchart
Figure 6-53 TCM/TPM installation and setup flowchart
Installing a TCM or TPM
Guidelines
•
Do not remove an installed TCM or TPM. Once installed, the module becomes a permanent
part of the management module.
•
When installing or replacing hardware, H3C service providers cannot enable the TCM or TPM
or the encryption technology. For security reasons, only the customer can enable these
features.
•
When replacing the management module, do not remove the TCM or TPM from the
management module. H3C will provide a TCM or TPM with the spare management module for
management module, TCM, or TPM replacement.
•
Any attempt to remove an installed TCM or TPM from the management module breaks or
disfigures the TCM or TPM security rivet. Upon locating a broken or disfigured rivet on an
installed TCP or TPM, administrators should consider the system compromised and take
appropriate measures to ensure the integrity of the system data.
•
H3C is not liable for blocked data access caused by improper use of the TCM or TPM. For more
information, see the encryption technology feature documentation provided by the operating
system.
Procedure
The installation procedure is the same for a TPM and a TCM. The following information uses a TPM
to show the procedure.