Intel® Server System R2000WF Product Family Technical Product Specification
Intel Confidential
163
Appendix F.
Statement of Volatility
The tables in this section are used to identify the volatile and non-volatile memory components for system
boards used within the Intel® Server System R2000WF product family.
The tables provide the following data for each identified component.
Component Type
: Three types of components are on the server board assembly:
o
Non-volatile
: Non-volatile memory is persistent, and is not cleared when power is removed
from the system. Non-volatile memory must be erased to clear data. The exact method of
clearing these areas varies by the specific component. Some areas are required for normal
operation of the server, and clearing these areas may render the server board inoperable
o
Volatile
: Volatile memory is cleared automatically when power is removed from the system.
o
Battery powered RAM
: Battery powered RAM is similar to volatile memory, but is powered by
a battery on the server board. Data in battery powered RAM is persistent until the battery is
removed from the server board.
Size
: Size of each component in bits, Kbits, Mbits, bytes, kilobytes (KB), or megabytes (MB).
Board Location
: Board location is the physical location of each component corresponding to
information on the server board silkscreen.
User Data
: The flash components on the server boards do not store user data from the operating
system. No operating system level data is retained in any listed components after AC power is
removed. The persistence of information written to each component is determined by its type as
described in the table.
Each component stores data specific to its function. Some components may contain passwords that
provide access to that device’s configuration or functionality. These passwords are specific to the
device and are unique and unrelated to operating system passwords. The specific components that
may contain password data are:
o
BIOS
: The server board BIOS provides the capability to prevent unauthorized users from
configuring BIOS settings when a BIOS password is set. This password is stored in BIOS flash,
and is only used to set BIOS configuration access restrictions.
o
BMC
: The server boards support an Intelligent Platform Management Interface (IPMI) 2.0
conformant baseboard management controller (BMC). The BMC provides health monitoring,
alerting and remote power control capabilities for the Intel® Server Board. The BMC does not
have access to operating system level data.
The BMC supports the capability for remote software to connect over the network and
perform health monitoring and power control. This access can be configured to require
authentication by a password. If configured, the BMC maintains user passwords to control this
access. These passwords are stored in the BMC flash.
Summary of Contents for R2000WF series
Page 2: ...Blank page...