Figure 2-24
Slot numbers of fan modules
NO TICE
Configure fan modules based on the following guidelines. Otherwise, compute nodes can
power off due to insufficient heat dissipation.
Configure fan modules based on the following guidelines:
l
If a chassis houses eight or fewer half-width compute nodes or four or fewer full-width
compute nodes, install all fan modules except fan modules 5, 6, 11, and 12.
l
If a chassis houses more than eight half-width compute nodes or more than four full-
width compute nodes, install all fan modules.
2.7 Security
2.7.1 Compute Node
Compute nodes support security solutions based on the Trusted Platform Module (TPM).
The TPM is a security chip that complies with the Trusted Computing Group (TCG) TPM
specification. As a hardware-based system security module, TPM 1.2 supports data
encryption, key protection, identity authentication, and internal resource access protection.
TPM V1.2 is currently available.
The TPM is installed on a compute node mainboard and connects to the mainboard over a
port. You can access a compute node with the TPM in a specific way only after authorization
and authentication are completed, which ensures user data security in the aspect of hardware.
2.7.2 Switch Module
Device Security
Hierarchical Command Protection
E9000 Server
User Guide
2 Overview
Issue 25 (2019-11-30)
Copyright © Huawei Technologies Co., Ltd.
35