s2600gzgl Tps r2 4
s2600gzgl Tps r2 4
s2600gzgl Tps r2 4
Revision 2.4
October 2014
Revision History Intel® Server Board S2600GZ/GL TPS
Revision History
Date Revision Modifications
Number
January 2012 1.0 First public release.
Deleted section 6.9.2 Fan Profile.
Deleted chapter 11 - Environmental Limits Specification.
March 2012 1.1
Added chapter 12 - BIOS Setup Utility.
®
Added Figure 17. Intel Server Board S2600GZ/GL PCI Layout.
® ®
Added support for Intel Xeon processor E5-2600 v2 product family
Updated memory support tables
August 2013 2.0
Corrected POST code table - E0h – E3h
Updated reference documents table
Corrected Table 39 - pin out for on-board 7-pin SATA connectors.
Updated PCIe Gen 3 support verbiage – section 3.2.5
Added Phase Shedding support verbiage – section 3.2.4.1.1
February 2014 2.1 Updated BIOS Setup options to include Phase Shedding option, PCIe Gen3
support option.
Updated BIOS Setup options to include Extended ATR option, PFloor tuning
option, Memory Mapped I/O Size option, PCIe AER Support option, Log
Correctable Errors option and System Early POST Timeout option.
Corrected Figure 9 and Figure 16 – PCIe Gen1x48GB/s
April 2014 2.2 Updated BIOS Setep options to include Phase Shedding and Memory SPD
Override options.
Updated Table 37. System Status LED State Definitions – Remove the
“Battery Failure” from Description column.
June 2014 2.3
Updated Table 51. SystemStatus LED State Definitions – Remove the
“Battery Failure” from Description column.
October 2014 2.4 Add note for Figure 29.
ii Revision 2.4
Intel® Server Board S2600GZ/GL TPS Disclaimers
Disclaimers
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in
personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION
CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS
AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL
CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF,
DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN
ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR
WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS
PARTS.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on
the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for
future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to
them. The information here is subject to change without notice. Do not finalize a design with this information.
The products described in this document may contain design defects or errors known as errata which may cause the
product to deviate from published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product
order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be
obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm
Table of Contents
1. Introduction ........................................................................................................................1
1.1 Chapter Outline ......................................................................................................1
1.2 Server Board Use Disclaimer .................................................................................1
2. Product Overview ...............................................................................................................2
2.1 Server Board Component/Feature Identification .....................................................4
2.2 Server Board Dimensional Mechanical Drawings ...................................................6
3. Product Architecture Overview .......................................................................................11
3.1 Processor Support ...............................................................................................12
3.1.1 Processor Socket Assembly .................................................................................12
3.1.2 Processor Population Rules .................................................................................13
3.1.3 Processor Initialization Error Summary.................................................................14
3.1.4 Processor Thermal Design Power (TDP) Support ................................................16
3.2 Processor Functions Overview .............................................................................16
3.2.1 Processor Core Features: ....................................................................................17
3.2.2 Supported Technologies: .....................................................................................17
3.2.3 Intel® QuickPath Interconnect ...............................................................................17
3.2.4 Integrated Memory Controller (IMC) and Memory Subsystem .............................. 18
3.2.4.1 Supported Memory ............................................................................................19
3.2.4.2 Memory Slot Identification and Population Rules...............................................21
3.2.4.3 Publishing System Memory ...............................................................................25
3.2.4.4 Integrated Memory Controller Operating Modes ................................................25
3.2.4.5 Memory RAS Support .......................................................................................26
3.2.5 Processor Integrated I/O Module (IIO) ..................................................................29
3.2.5.1 PCIe Interface ...................................................................................................30
3.2.5.2 Riser Card Support ...........................................................................................32
3.2.5.3 PCIe Add-in card support ..................................................................................34
3.2.5.4 Network Interface ..............................................................................................38
3.2.5.5 I/O Module Support ...........................................................................................38
3.2.5.6 Intel® Integrated RAID Option ............................................................................39
3.3 Intel® C602 Chipset Functional Overview .............................................................40
3.3.1 Low Pin Count (LPC) Interface .............................................................................41
3.3.2 Universal Serial Bus (USB) Controller ..................................................................41
3.3.2.1 eUSB SSD Support ...........................................................................................41
3.3.3 Embedded Serial ATA (SATA)/Serial Attached SCSI (SAS)/RAID Support .......... 41
3.3.3.1 Intel® Embedded Server RAID Technology 2 (ESRT2) ...................................... 43
3.3.3.2 Intel® Rapid Storage Technology (RSTe) ..........................................................43
3.3.4 Manageability .......................................................................................................44
3.4 Integrated Baseboard Management Controller Overview ..................................... 44
3.4.1 Super I/O Controller .............................................................................................46
3.4.1.1 Keyboard and Mouse Support ...........................................................................46
3.4.1.2 Wake-up Control ...............................................................................................46
3.4.2 Graphics Controller and Video Support ................................................................46
iv Revision 2.4
Intel® Server Board S2600GZ/GL TPS Table of Contents
Revision 2.4 v
Table of Contents Intel® Server Board S2600GZ/GL TPS
vi Revision 2.4
Intel® Server Board S2600GZ/GL TPS Table of Contents
List of Figures
Figure 1. Server Board Component/Features Identification .........................................................4
Figure 2. Intel® Light Guided Diagnostic LED Identification .........................................................5
Figure 3. Jumper Block Identification ..........................................................................................6
Figure 4. Intel® Server Board S2600GZ/S2600GL External I/O Connector Layout ......................6
Figure 5. Intel® Server Board S2600GZ/GL – Primary Side Keepout Zone.................................7
Figure 6. Intel® Server Board S2600GZ/GL– Hole and Component Positions .............................8
Figure 7. Intel® Server Board S2600GZ/GL – Secondary Side Keepout Zone .............................9
Figure 8. Intel® Server Board S2600GZ/GL– Primary Side Height Restrictions ......................... 10
Figure 9. Intel® Server Boards S2600GZ, S2600GL Functional Block Diagram......................... 11
Figure 10. Processor Socket Assembly .....................................................................................13
Figure 11. Processor Socket ILM Variations .............................................................................13
Figure 12. Integrated Memory Controller Functional Block Diagram.......................................... 18
Figure 13. Memory Slots Definition ...........................................................................................22
Figure 14. Intel® Server Board S2600GZ Memory Slot Layout ..................................................23
Figure 15. Intel® Server Board S2600GL Memory Slot Layout ..................................................24
Figure 16. Functional Block Diagram of Processor IIO Sub-system .......................................... 29
Figure 17. Intel® Server Board S2600GZ/GL PCI Layout ..........................................................30
Figure 18. PCIe Port Bifurcation Options...................................................................................31
Figure 19. 1U PCIe riser for Intel® Server Board S2600GZ/GL..................................................32
Figure 20. 2U three PCIe slots riser for Intel® Server Board S2600GZ/GL ................................ 32
Figure 21. 2U two PCIe slots riser for Intel® Server Board S2600GZ/GL ................................... 33
Figure 22. 2U three PCIx/PCIe slots riser for Intel® Server Board S2600GZ/GL ........................ 33
Figure 23. Intel® Server Board S2600GZ/GL External RJ45 NIC Port LED Definition................ 38
Figure 24. Server Board Layout - I/O Module Connector...........................................................39
Figure 25. Server Board Layout – Intel® Integrated RAID Module Option Placement ................ 39
Figure 26. Functional Block Diagram - Chipset Supported Features and Functions .................. 40
Figure 27. Low Profile eUSB SSD Support ...............................................................................41
Figure 28. Intel® RAID C600 Upgrade Key Connector...............................................................42
Figure 29. Integrated BMC Block Diagram ................................................................................45
Figure 30. Integrated BMC Functional Block Diagram ...............................................................45
Figure 31. Setup Utility – TPM Configuration Screen ................................................................52
Figure 32. Fan Speed Control Process .....................................................................................63
Figure 33. Intel® RMM4 Lite Activation Key Installation .............................................................77
Figure 34. Intel® RMM4 Dedicated Management NIC Installation............................................. 77
Figure 35. Serial-A RJ45 connector pin-out...............................................................................91
Figure 36. Serial A Configuration Jumper Block Location..........................................................91
Figure 37. Reset and Recovery Jumper Block Location ............................................................92
Figure 38. On-Board Diagnostic LED Placement ......................................................................96
Figure 39. Memory Slot Fault LED Locations ............................................................................96
Figure 40. Turn On/Off Timing (Power Supply Signals) ........................................................... 104
Revision 2.4 ix
List of Figures Intel® Server Board S2600GZ/GL TPS
x Revision 2.4
Intel® Server Board S2600GZ/GL TPS List of Tables
List of Tables
Table 1. Intel® Server Board S2600GZ/S2600GL Feature Set ....................................................2
Table 2. Supported Intel® Xeon® processor product family feature comparison table ................ 12
Table 3. Mixed Processor Configurations Error Summary .........................................................15
Table 4. UDIMM Support Guidelines – Intel® Xeon® processor E5-2600 product family ............ 19
Table 5. UDIMM Support Guidelines – Intel® Xeon® processor E5-2600 v2 product family ....... 19
Table 6. RDIMM Support Guidelines – Intel® Xeon® processor E5-2600 product family ............ 20
Table 7. RDIMM Support Guidelines – Intel® Xeon® processor E5-2600 v2 product family ....... 20
Table 8. LRDIMM Support Guidelines – Intel® Xeon® processor E5-2600 product family .......... 21
Table 9. LRDIMM Support Guidelines – Intel® Xeon® processor E5-2600 v2 product family ..... 21
Table 10. Intel® Server Board S2600GZ Memory Slot Identification .......................................... 22
Table 11. Intel® Server Board S2600GL Memory Slot Nomenclature ........................................ 23
Table 12. Riser Slot #1 – PCIe Port Routing .............................................................................35
Table 13. Riser Slot #2 – PCIe Port Routing .............................................................................36
Table 14. Supported Intel® I/O Module Options .........................................................................39
Table 15. Supported Intel® Integrated RAID Modules ................................................................40
Table 16. Intel® RAID C600 Upgrade Key Options ....................................................................43
Table 17. Video Modes .............................................................................................................46
Table 18. BIOS Setup Options for Configuring Video ................................................................47
Table 19. TPM Setup Utility – Security Configuration Screen Fields ......................................... 52
Table 20. Intel® Intelligent Power Node Manager ......................................................................55
Table 21. ACPI Power States....................................................................................................59
Table 22. Power Control Initiators .............................................................................................59
Table 23. Mesaaging Interfaces ................................................................................................64
Table 24. Factory Configured PEF Table Entries ......................................................................71
Table 25. Diagnostic Data .........................................................................................................76
Table 26. Additional Diagnostics on Error. ................................................................................76
Table 27. Intel® Remote Management Module 4 (RMM4) Options ............................................ 77
Table 28. Enabling Advanced Management Features ...............................................................77
Table 29. Main Power (Slot 1) Connector Pin-out (“MAIN PWR 1”) .......................................... 81
Table 30. Main Power (Slot 2) Connector Pin-out ("MAIN PWR 2”) ........................................... 82
Table 31. Riser Slot Power Pin-out ("OPT_12V_PWR_1" & " OPT_12V_PWR_2")................... 82
Table 32. Hot Swap Backplane Power Connector Pin-out (“HSBP PWR") ................................ 83
Table 33. Peripheral Drive Power Connector Pin-out ("ODD/SSD_PWR") ................................ 83
Table 34. SSI Front Panel Header Pin-out ("Front Panel") ........................................................84
Table 35. Power/Sleep LED Functional States ..........................................................................84
Table 36. NMI Signal Generation and Event Logging ................................................................85
Table 37. System Status LED State Definitions.........................................................................85
Table 38. Front Panel USB Connector Pin-out ("FP USB") .......................................................87
Table 39. Front Panel Video Connector Pin-out ("FP VIDEO") ..................................................87
Table 40. Intel Local Control Panel Connector Pin-out ("LCP") .................................................87
Revision 2.4 xi
List of Tables Intel® Server Board S2600GZ/GL TPS
Table 41. Single Port AHCI SATA Controller Connector Pin-out ("SATA 0" & "SATA 1") .......... 88
Table 42. Multiport SAS/SATA Connector Pin-out ("SCU_0 (0-3)") ........................................... 88
Table 43. Multiport SAS/SATA Connector Pin-out ("SCU_1 (4-7)") ........................................... 89
Table 44. Internal Type-A USB Connector Pin-out ("USB 2") ....................................................89
Table 45. Internal eUSB Connector Pin-out ("eUSB SSD") .......................................................89
Table 46. System Fan Connector Pin-out ("SYS_FAN #") .........................................................90
Table 47. Serial-B Connector Pin-out ........................................................................................90
Table 48. Serial A Connector Pin-out ........................................................................................91
Table 49. Chassis Intrusion Header Pin-out ("CHAS_INTR") ....................................................91
Table 50. Hard Drive Activity Header Pin-out ("HDD_LED") ......................................................91
Table 51. SystemStatus LED State Definitions..........................................................................96
Table 52. BMC Boot/Reset Status LED Indicators ....................................................................98
Table 53. Power Supply DC Power Output Connector Pinout ................................................. 100
Table 54. Minimum Load Ratings ............................................................................................101
Table 55. Voltage Regulation Limits ........................................................................................101
Table 56. Transient Load Requirements .................................................................................101
Table 57. Capacitive Loading Conditions ................................................................................102
Table 58. Ripples and Noise ...................................................................................................103
Table 59. Timing Requirements ..............................................................................................103
Table 60. BIOS Setup: Keyboard Command Bar .................................................................... 106
Table 61. BMC Core Sensors .................................................................................................198
Table 62. Server Platform Services Firmware Health Event .................................................... 210
Table 63. Node Manager Health Event ...................................................................................211
Table 64. POST Progress Code LED Example ....................................................................... 212
Table 65. POST Progress Codes ............................................................................................213
Table 66. MRC Progress Codes .............................................................................................215
Table 67. MRC Fatal Error Codes ...........................................................................................215
Table 68. POST Error Codes and Messages .......................................................................... 217
Table 69. POST Error Beep Codes .........................................................................................221
Table 70. Integrated BMC Beep Codes ...................................................................................222
Table 71. Intel® Server System R1000GZ/GL Product Family Feature Set.............................. 224
Table 72. Intel® Server System R2000GZ/GL Product Family Feature Set.............................. 226
1. Introduction
This Technical Product Specification (TPS) provides board-specific information detailing the features,
functionality, and high-level architecture of the Intel® Server Boards S2600GZ and S2600GL.
Design-level information related to specific server board components and subsystems can be obtained by
ordering External Product Specifications (EPS) or External Design Specifications (EDS) related to this server
generation. EPS and EDS documents are made available under NDA with Intel and must be ordered through
your local Intel representative. See the Reference Documents section for a list of available documents.
Chapter 1 – Introduction
Chapter 2 – Product Overview
Chapter 3 – Product Architecture Overview
Chapter 4 – System Security
Chapter 5 – Technology Support
Chapter 6 – Platform Management Functional Overview
Chapter 7 – Advanced Management Feature Support (RMM4)
Chapter 8 – On-board Connector/Header Overview
Chapter 9 – Reset and Recovery Jumpers
Chapter 10 – Light-Guided Diagnostics
Chapter 11 – Power Supply Specification Guidelines
Chapter 12 – BIOS Setup Utility
Appendix A – Integration and Usage Tips
Appendix B – Integrated BMC Sensor Tables
Appendix C – Management Engine Generated SEL Event Messages
Appendix D – POST Code Diagnostic LED Decoder
Appendix E – POST Code Errors
Appendix F – Supported Intel® Server Systems
Revision 2.4 1
Product Overview Intel® Server Board S2600GZ/GL TPS
2. Product Overview
The Intel® Server Boards S2600GZ and S2600GL are monolithic printed circuit board assemblies with features
that are intended for high density 1U and 2U rack mount servers. These server boards are designed to support
both the Intel® Xeon® processor E5-2600 product family and Intel® Xeon® processor E5-2600 v2 product family.
Previous generation Intel® Xeon® processors are not supported. Many of the features and functions of these
two server boards are common. A board will be identified by name when a described feature or function is
unique to it.
®
Table 1. Intel Server Board S2600GZ/S2600GL Feature Set
Feature Description
• Two LGA2011 (Socket R) processor sockets
• Support for one or two processors:
® ®
Processor Support o Intel Xeon processor E5-2600 product family with TDP support up to 135 W
® ®
o Intel Xeon processor E5-2600 v2 product family with TDP support up to 130 W
• S2600GL - 16 DIMM slots – 2 DIMMs/Channel – 4 memory channels per processor
• S2600GZ - 24 DIMM slots – 3 DIMMs/Channel – 4 memory channels per processor
• Unbuffered DDR3 (UDIMM), registered DDR3 (RDIMM), Load Reduced DDR3 (LRDIMM)
Memory
• Memory DDR3 data transfer rates of 800, 1066, 1333, 1600, 1866 1 MT/s
• DDR3 standard I/O voltage of 1.5V and DDR3 Low Voltage of 1.35V
®
Chipset Intel C602 chipset with support for optional Storage Option Select keys
• DB-15 Video connector
External (Back Panel) • RJ-45 Serial Port A connector
I/O connections • Four RJ-45 Network Interface Connectors supporting 10/100/1000Mb
• Three USB 2.0 connectors
• One Type-A USB 2.0 connector
• One 2x5 pin connector providing front panel support for two USB 2.0 ports
Internal I/O • One 2x15 pin SSI-EEB compliant front panel header
connectors/headers • One 2x7pin Front Panel Video connector
•
®
One 1x7pin header for optional Intel Local Control Panel support
• One DH-10 Serial Port B connector
The following I/O modules utilize a proprietary on-board connector. An installed I/O module can be
supported in addition to standard on-board features and any add-in expansion cards.
• AXX4P1GBPWLIOM – Quad port 1 GbE based on Intel® Ethernet Controller I350
• AXX10GBTWLIOM – Dual RJ-45 port 10GBase-T I/O Module based on Intel® Ethernet
I/O Module Options Controller x540
• AXX10GBNIAIOM – Dual SFP+ port 10GbE module based on Intel® 82599 10 GbE
controller
• AXX1FDRIBIOM – Single Port FDR 56GT/S speed InfiniBand module with QSFP connector
• AXX2FDRIBIOM – Dual port FDR 56GT/S speed infiniband module with QSFP connector
System Fans • Six 10-pin managed system fan headers
Two riser card slots.
Riser Card Support • Each riser card slot has a total of 24PCIe lanes routed to them
• Each riser card slot has support for various 1U and 2U riser cards
• Integrated 2D Video Controller
Video
• 16 MB DDR3 Memory
2 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Overview
Feature Description
• One eUSB 2x5 pin connector to support 2mm low-profile eUSB solid state devices
• Two 7-pin single port AHCI SATA connectors capable of supporting up to 6 GB/sec
• Two SCU 4-port mini-SAS connectors capable of supporting up to 3 GB/sec SAS/SATA
On-board storage o SCU 0 Port (Enabled standard)
controllers and o SCU 1 Port (Requires Intel RAID C600 Upgrade Key)
options •
®
Intel RAID C600 Upgrade Key support providing optional expanded SCU SATA / SAS RAID
capabilities
• ®
Intel Integrated RAID module support (Optional)
•
®
Security Intel TPM module - AXXTPME5 (Accessory Option)
• Integrated Baseboard Management Controller, IPMI 2.0 compliant
• Support for Intel Server Management Software
®
Server Management
• Intel Remote Management Module 4 support (Accessory Option)
®
Revision 2.4 3
Product Overview Intel® Server Board S2600GZ/GL TPS
4 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Overview
®
Figure 2. Intel Light Guided Diagnostic LED Identification
Revision 2.4 5
Product Overview Intel® Server Board S2600GZ/GL TPS
Label Description
A NIC 1
B NIC 2
C NIC 3
D NIC 4
E Video
F Serial Port A
G USB Ports
®
Figure 4. Intel Server Board S2600GZ/S2600GL External I/O Connector Layout
6 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Overview
®
Figure 5. Intel Server Board S2600GZ/GL – Primary Side Keepout Zone
Revision 2.4 7
Product Overview Intel® Server Board S2600GZ/GL TPS
®
Figure 6. Intel Server Board S2600GZ/GL– Hole and Component Positions
8 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Overview
®
Figure 7. Intel Server Board S2600GZ/GL – Secondary Side Keepout Zone
Revision 2.4 9
Product Overview Intel® Server Board S2600GZ/GL TPS
®
Figure 8. Intel Server Board S2600GZ/GL– Primary Side Height Restrictions
10 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
The architecture of Intel® Server Boards S2600GZ and S2600GL is developed around the integrated features
and functions of the Intel® Xeon® processor E5-2600 product family, the Intel® C602 chipset, the Intel® Ethernet
Controller I350 GbE controller chip, and the Emulex* Pilot-III Server Management Controller.
The following diagram provides an overview of the server board architecture, showing the features and
interconnects of each of the major sub-system components.
®
Figure 9. Intel Server Boards S2600GZ, S2600GL Functional Block Diagram
Revision 2.4 11
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
Intel® Xeon® processor E5-2600 product family, with a Thermal Design Power (TDP) of up to 135W.
Intel® Xeon® processor E5-2600 v2 product family, with a Thermal Design Power (TDP) of up to 130W.
Note: Previous generation Intel® Xeon® processors are not supported on the Intel server boards described in
this document.
® ®
Table 2. Supported Intel Xeon processor product family feature comparison table
Cores Up to 8 Up to 12
Memory RAS ECC, Patrol Scrubbing, Demand Scrubbing, Sparing, Mirroring, Lockstep Mode, x4/x8 SDDC
Idle Power Targets (W) 15 W or higher, 12 W for LV SKUs 10.5 W or higher, 7.5 W for LV SKUs
12 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
Heat Sink
Server Board
Independent Latching
Mechanism (ILM)
Back Plate
80mm
94mm
80mm
56mm
The square ILM has an 80x80mm heat sink mounting hole pattern and is used on the Intel® Server
Board S2600GL.
The narrow ILM has a 56x94mm heat sink mounting hole pattern and is used on the Intel® Server
Board S2600GZ.
Note: Processor heat sink solutions for the Intel® server boards S2600GL and S2600GZ are NOT the same.
Care must be taken when selecting heat sinks for the given server board ensuring the screw layout pattern of
the heat sink matches the screw hole pattern of the ILM.
3.1.2 Processor Population Rules
Note: Although the server board does support dual-processor configurations consisting of different processors
that meet the defined criteria below, Intel does not perform validation testing of this configuration. For optimal
system performance in dual-processor configurations, Intel recommends that identical processors be installed.
When using a single processor configuration, the processor must be installed into the processor socket labeled
“CPU_1”.
Revision 2.4 13
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
When two processors are installed, the following population rules apply:
Fatal: If the system can boot, it pauses at a blank screen with the text “Unrecoverable fatal error found.
System will not boot until the error is resolved” and “Press <F2> to enter setup”, regardless of whether
the “Post Error Pause” setup option is enabled or disabled.
When the operator presses the <F2> key on the keyboard, the error message is displayed on the Error
Manager screen, and an error is logged to the System Event Log (SEL) with the POST Error Code.
The system cannot boot unless the error is resolved. The user needs to replace the faulty part and restart the
system.
For Fatal Errors during processor initialization, the System Status LED will be set to a steady Amber color,
indicating an unrecoverable system failure condition.
Major: If the “Post Error Pause” setup option is enabled, the system goes directly to the Error Manager to
display the error, and logs the POST Error Code to SEL. Operator intervention is required to continue booting
the system.
Otherwise, if “POST Error Pause” is disabled, the system continues to boot and no prompt is given for the error,
although the Post Error Code is logged to the Error Manager and in a SEL message.
Minor: The message is displayed on the screen or on the Error Manager screen, and the POST Error Code is
logged to the SEL. The system continues booting in a degraded state. The user may want to replace the
erroneous unit. The POST Error Pause option setting in the BIOS setup does not have any effect on this error.
14 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
Revision 2.4 15
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
If the link frequencies for all QPI links cannot be adjusted to be the
same, then this is an error, and the BIOS responds as follows:
Logs the POST Error Code into the SEL.
Alerts the BMC to set the System Status LED to steady Amber.
®
Displays “0195: Processor Intel QPI link frequencies unable to
synchronize” message in the Error Manager.
Does not disable the processor.
Takes Fatal Error action (see above) and will not boot until the fault
condition is remedied.
Processor microcode update missing Minor The BIOS detects the error condition and responds as follows:
Logs the POST Error Code into the SEL.
Displays “818x: Processor 0x microcode update not found”
message in the Error Manager or on the screen.
The system continues to boot in a degraded state, regardless of the
setting of POST Error Pause in the Setup.
Processor microcode update failed Major The BIOS detects the error condition and responds as follows:
Logs the POST Error Code into the SEL.
Displays “816x: Processor 0x unable to apply microcode
update” message in the Error Manager or on the screen.
Takes Major Error action. The system may continue to boot in a
degraded state, depending on the setting of POST Error Pause in
Setup, or may halt with the POST Error Code in the Error Manager
waiting for operator intervention.
Disclaimer Note: Intel Corporation server boards contain a number of high-density VLSI and power delivery
components that need adequate airflow to cool. Intel ensures through its own chassis development and testing
that when Intel server building blocks are used together, the fully integrated system will meet the intended
thermal requirements of these components. It is the responsibility of the system integrator who chooses not to
use Intel developed server building blocks to consult vendor datasheets and operating parameters to
determine the amount of airflow required for their specific application and environmental conditions. Intel
Corporation cannot be held responsible if components fail or the server board does not operate correctly when
used outside any of their published operating or non-operating limits.
16 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
The following sections will provide an overview of the key processor features and functions that help to define
the architecture, performance and supported functionality of the server board. For more comprehensive
processor specific information, refer to the Intel® Xeon® processor E5-2600 product family documents listed in
the Reference Documents list.
3.2.1 Processor Core Features:
Up to 8 execution cores (Intel® Xeon® processor E5-2600 product family)
Up to 12 execution cores (Intel® Xeon® processor E5-2600 v2 product family)
Each core supports two threads (Intel® Hyper-Threading Technology), up to 16 threads per socket
46-bit physical addressing and 48-bit virtual addressing
1 GB large page support for server applications
A 32-KB instruction and 32-KB data first-level cache (L1) for each core
A 256-KB shared instruction/data mid-level (L2) cache for each core
Up to 20 MB last level cache (LLC): up to 2.5 MB per core instruction/data last level cache (LLC),
shared among all cores
The physical connectivity of each interconnect link is made up of twenty differential signal pairs plus a
differential forwarded clock. Each port supports a link pair consisting of two uni-directional links to complete the
connection between two components. This supports traffic in both directions simultaneously. To facilitate
flexibility and longevity, the inter-connect is defined as having five layers: Physical, Link, Routing, Transport, and
Protocol.
The Intel® QuickPath Interconnect includes a cache coherency protocol to keep the distributed memory and
caching structures coherent during system operation. It supports both low-latency source snooping and a
Revision 2.4 17
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
scalable home snoop behavior. The coherency protocol provides for direct cache-to-cache transfers for optimal
latency.
2 DIMMs / Ch S2600GL
2 DIMMs / Ch S2600GL
3 DIMMs / Ch S2600GZ
Figure 12. Integrated Memory Controller Functional Block Diagram
Integrated into the processor is a memory controller. Each processor provides four DDR3 channels that
support the following:
18 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
Improved Thermal Throttling with dynamic Closed Loop Thermal Throttling (CLTT)
Memory thermal monitoring support for DIMM temperature
® ®
Table 5. UDIMM Support Guidelines – Intel Xeon processor E5-2600 v2 product family
Revision 2.4 19
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
® ®
Table 6. RDIMM Support Guidelines – Intel Xeon processor E5-2600 product family
QRx8 4GB 8GB 16GB 800 1066 800 800 800 1066 800 800 n/a n/a
® ®
Table 7. RDIMM Support Guidelines – Intel Xeon processor E5-2600 v2 product family
800 800
QRx8 4GB 8GB 16GB 800 800 800 800 800 800 n/a n/a
1066 1066
800 800
QRx4 8GB 16GB 32GB 800 800 800 800 800 800 n/a n/a
1066 1066
20 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
® ®
Table 8. LRDIMM Support Guidelines – Intel Xeon processor E5-2600 product family
® ®
Table 9. LRDIMM Support Guidelines – Intel Xeon processor E5-2600 v2 product family
Note: The Phase Shedding BIOS setup option can be found in BIOS revision 02.02.0002 and later.
Each installed processor provides four channels of memory. On the Intel® Server Board S2600GZ
each memory channel supports three memory slots, for a total possible 24 DIMMs installed. On the
Intel® Server Board S2600GL each memory channel supports 2 memory slots, for a total possible 16
DIMMs installed.
System memory is organized into physical slots on DDR3 memory channels that belong to processor
sockets.
The memory channels from processor socket 1 are identified as Channel A, B, C and D. The memory
channels from processor socket 2 are identified as Channel E, F, G, and H.
Revision 2.4 21
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
Each memory slot on the server board is identified by channel and slot number within that channel. For
example, DIMM_A1 is the first slot on Channel A on processor 1; DIMM_E1 is the first DIMM socket on
Channel E on processor 2.
The memory slots associated with a given processor are unavailable if the corresponding processor
socket is not populated.
A processor may be installed without populating the associated memory slots provided a second
processor is installed with associated memory. In this case, the memory is shared by the processors.
However, the platform suffers performance degradation and latency due to the remote memory.
Processor sockets are self-contained and autonomous. However, all memory subsystem support (such
as Memory RAS, Error Management,) in the BIOS setup are applied commonly across processor
sockets.
The BLUE memory slots on the server board identify the first memory slot for a given memory channel.
DIMM population rules require that DIMMs within a channel be populated starting with the BLUE DIMM slot or
DIMM farthest from the processor in a “fill-farthest” approach. In addition, when populating a Quad-rank DIMM
with a Single- or Dual-rank DIMM in the same channel, the Quad-rank DIMM must be populated farthest from
the processor. Note that Quad-rank DIMMs and UDIMMs are not allowed in three slots populated
configurations. Intel MRC will check for correct DIMM placement.
On the Intel® Server Board S2600GZ, a total of 24 DIMM slots is provided (2 CPUs – 4 Channels/CPU, 3
DIMMs/Channel). The nomenclature for memory slots is detailed in the following table:
®
Table 10. Intel Server Board S2600GZ Memory Slot Identification
22 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
®
Figure 14. Intel Server Board S2600GZ Memory Slot Layout
On the Intel® Server Board S2600GL a total of 16 DIMM slots is provided (2 CPUs – 4 Channels/CPU, 2
DIMMs /Channel). The nomenclature for memory slots is detailed in the following table:
®
Table 11. Intel Server Board S2600GL Memory Slot Nomenclature
Revision 2.4 23
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
®
Figure 15. Intel Server Board S2600GL Memory Slot Layout
The following are generic DIMM population requirements that generally apply to both the Intel® Server Board
S2600GZ and Intel® Server Board S2600GL.
24 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
Lockstep channels must be populated identically. That is, each DIMM in one channel must have a
corresponding DIMM of identical organization (number ranks, number banks, number rows, number columns).
DIMMs may be of different speed grades, but the iMC module will be configured to operate all DIMMs
according to the slowest parameters present by the Memory Reference Code (MRC).
Performance in lockstep mode cannot be as high as with independent channels. The burst length for DDR3
DIMMs is eight which is shared between two channels that are in lockstep mode. Each channel of the pair
provides 32 bytes to produce the 64-byte cache-line. DRAMs on independent channels are configured to
deliver a burst length of eight. The maximum read bandwidth for a given Rank is half of peak. There is another
draw back in using lockstep mode, that is, higher power consumption since the total activation power is about
twice of the independent channel operation if comparing to same type of DIMMs.
Revision 2.4 25
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
For Lockstep Channel Mode and Mirroring Mode, processor channels are paired together as a “Domain”.
For RAS modes that require matching populations, the same slot positions across channels must hold the
same DIMM type with regards to size and organization. DIMM timings do not have to match but timings will be
set to support all DIMMs populated (that is, DIMMs with slower timings will force faster DIMMs to the slower
common timing modes).
3.2.4.5.1 Single Device Data Correction (SDDC)
SDDC – Single Device Data Correction is a technique by which data can be replaced by the IMC from an
entire x4 DRAM device which is failing, using a combination of CRC plus parity. This is an automatic IMC
driven hardware. It can be extended to x8 DRAM technology by placing the system in Channel Lockstep Mode.
3.2.4.5.2 Error Correction Code (ECC) Memory
ECC uses “extra bits” – 64-bit data in a 72-bit DRAM array – to add an 8-bit calculated “Hamming Code” to
each 64 bits of data. This additional encoding enables the memory controller to detect and report single or
multiple bit errors when data is read, and to correct single-bit errors.
26 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
The system BIOS has logic to cope with the random factor in correctable ECC errors. Rather than reporting
every correctable error that occurs, the BIOS has a threshold and only logs a correctable error when a
threshold value is reached. Additional correctable errors that occur after the threshold has been reached are
disregarded. In addition, on the expectation the server system may have extremely long operational runs
without being rebooted, there is a “Leaky Bucket” algorithm incorporated into the correctable error counting
and comparing mechanism. The “Leaky Bucket” algorithm reduces the correctable error count as a function of
time – as the system remains running for a certain amount of time, the correctable error count will “leak out” of
the counting registers. This prevents correctable error counts from building up over an extended runtime.
The correctable memory error threshold value is a configurable option in the <F2> BIOS Setup Utility, where
you can configure it for 20/10/5/ALL/None
Once a correctable memory error threshold is reached, the event is logged to the System Event Log (SEL) and
the appropriate memory slot fault LED is lit to indicate on which DIMM the correctable error threshold crossing
occurred.
However, before returning control to the OS drivers from Machine Check Exception (MCE) or Non-Maskable
Interrupt (NMI), the Uncorrectable Memory ECC Error is logged to the SEL, the appropriate memory slot fault
LED is lit, and the System Status LED state is changed to a solid Amber.
Demand Scrubbing is enabled/disabled (default is enabled) in the Memory Configuration screen in Setup.
3.2.4.5.4 Patrol Scrubbing for ECC Memory
Patrol scrubs are intended to ensure that data with a correctable error does not remain in DRAM long enough
to stand a significant chance of further corruption to an uncorrectable stage.
3.2.4.5.5 Rank Sparing Mode
Rank Sparing Mode enhances the system’s RAS capability by “swapping out” failing ranks of DIMMs. Rank
Sparing is strictly channel and rank oriented. Each memory channel is a Sparing Domain.
For Rank Sparing to be available as a RAS option, there must be 2 or more single rank or dual rank DIMMs, or
at least one quad rank DIMM installed on each memory channel.
Rank Sparing Mode is enabled/disabled in the Memory RAS and Performance Configuration screen in the <F2>
Bios Setup Utility
When Sparing Mode is operational, for each channel, the largest size memory rank is reserved as a “spare”
and is not used during normal operations. The impact on Effective Memory Size is to subtract the sum of the
reserved ranks from the total amount of installed memory.
Hardware registers count the number of Correctable ECC Errors for each rank of memory on each channel
during operations and compare the count against a Correctable Error Threshold. When the correctable error
count for a given rank hits the threshold value, that rank is deemed to be “failing”, and it triggers a Sparing Fail
Over (SFO) event for the channel in which that rank resides. The data in the failing rank is copied to the Spare
Rank for that channel, and the Spare Rank replaces the failing rank in the IMC’s address translation registers.
Revision 2.4 27
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
An SFO Event is logged to the BMC SEL. The failing rank is then disabled, and any further Correctable Errors
on that now non-redundant channel will be disregarded.
The correctable error that triggered the SFO may be logged to the BMC SEL, if it was the first one to occur in
the system. That first correctable error event will be the only one logged for the system. However, since each
channel is a Sparing Domain, the correctable error counting continues for other channels which are still in a
redundant state. There can be as many SFO Events as there are memory channels with DIMMs installed.
3.2.4.5.6 Mirrored Channel Mode
Channel Mirroring Mode gives the best memory RAS capability by maintaining two copies of the data in main
memory. If there is an Uncorrectable ECC Error, the channel with the error is disabled and the system
continues with the “good” channel, but in a non-redundant configuration.
For Mirroring mode to be to be available as a RAS option, the DIMM population must be identical between
each pair of memory channels that participate. Not all channel pairs need to have memory installed, but for
each pair, the configuration must match. If the configuration is not matched up properly, the memory operating
mode falls back to Independent Channel Mode.
Mirroring Mode is enabled/disabled in the Memory RAS and Performance Configuration screen in the <F2>
BIOS Setup Utility.
When Mirroring Mode is operational, each channel in a pair is “mirrored” by the other channel. The impact on
Effective Memory size is to reduce by half the total amount of installed memory available for use.
When Mirroring Mode is operational, the system treats Correctable Errors the same way as it would in
Independent channel mode. There is a correctable error threshold. Correctable error counts accumulate by
rank, and the first event is logged.
What Mirroring primarily protects against is the possibility of an Uncorrectable ECC Error occurring with critical
data “in process”. Without Mirroring, the system would be expected to “Blue Screen” and halt, possibly with
serious impact to operations. But with Mirroring Mode in operation, an Uncorrectable ECC Error from one
channel becomes a Mirroring Fail Over (MFO) event instead, in which the IMC retrieves the correct data from
the “mirror image” channel and disables the failed channel. Since the ECC Error was corrected in the process
of the MFO Event, the ECC Error is demoted to a Correctable ECC Error. The channel pair becomes a single
non-redundant channel, but without impacting operations, and the Mirroring Fail Over Event is logged to SEL
to alert the user that there is memory hardware that has failed and needs to be replaced.
28 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
PCI Express Interfaces: The integrated I/O module incorporates the PCI Express interface supporting
up to 40 PCI Express bus lanes via three PCIe ports.
DMI2 Interface to the PCH: The platform requires an interface to the legacy Southbridge (PCH) which
provides basic, legacy functions required for the server platform and operating systems. Since only one
PCH is required and allowed for the system, any sockets which do not connect to PCH would use this
port as a standard x4 PCI Express 2.0 interface.
Integrated IOAPIC: Provides support for PCI Express devices implementing legacy interrupt messages
without interrupt sharing
Non Transparent Bridge: PCI Express non-transparent bridge (NTB) acts as a gateway that enables
high performance, low overhead communication between two intelligent subsystems; the local and the
remote subsystems. The NTB allows a local processor to independently configure and control the local
subsystem, provides isolation of the local host memory domain from the remote host memory domain
while enabling status and data exchange between the two domains.
Intel® QuickData Technology: Used for efficient, high bandwidth data movement between two
locations in memory or from memory to I/O.
The following sub-sections describe the server board I/O features supported by the PCIe interface of the
processor IIO module. Features and functions of the Intel® C600 Series chipset will be described in its own
dedicated section.
Revision 2.4 29
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
®
Figure 17. Intel Server Board S2600GZ/GL PCI Layout
30 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
Each PCIe port from the given processor IIO module can be bifurcated down to smaller segments as needed.
The number of PCIe port segments required is dependent on the number and type of PCIe devices that need
to be supported for the given system configuration. The root port is identified by the port number followed by
the letter “A”. As each port is bifurcated, the smaller segments are identified by the port number followed by
sequential letters starting with “A”. The following diagrams illustrate possible PCIe port bifurcation options and
port identification.
Revision 2.4 31
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
Each riser slot has support for a total of x24 PCIe bus lanes. For Riser Slot 1, x16 PCIe lanes are routed from
CPU 1 + x8 PCIe lanes are routed from CPU 2. For Riser Slot 2, all x24 PCIe lanes are routed from CPU 2.
Note: Riser Slot 2 can only be used in dual processor configurations. In addition, some 2U riser cards installed
in Riser Slot 1 may also require two processors to be installed in order to support all available add-in card slots.
Available riser cards are common between both riser slots. Supported 1U and 2U riser cards include:
1U Riser Card – 1 PCIe add-in card slot – PCIe x16, x16 mechanical
®
Figure 19. 1U PCIe riser for Intel Server Board S2600GZ/GL
Slot # Description
Slot-1 (Top) PCIe x8, x16 mechanical
Slot-2 (Middle) PCIe x8, x16 mechanical
Slot-3 (Bottom) PCIe x8, x8 mechanical
®
Figure 20. 2U three PCIe slots riser for Intel Server Board S2600GZ/GL
32 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
Slot # Description
Slot-1 (Top) PCIe x16, x16 mechanical
Slot-2 (Bottom) PCIe x8, x8 mechanical
®
Figure 21. 2U two PCIe slots riser for Intel Server Board S2600GZ/GL
Slot # Description
Slot-1 (Top) PCIx 133MHz
Slot-2 (Middle) PCIx 133 MHz
Slot-3 (Bottom) PCIe x8, x8 mechanical
®
Figure 22. 2U three PCIx/PCIe slots riser for Intel Server Board S2600GZ/GL
Revision 2.4 33
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
Intel has implemented the following PCIe Gen 3 support model for this generation of its server boards and
server systems.
3.2.5.3.1 PCIe Gen3 support – Systems configured with an Intel® Xeon® processor E5-2600 product family
For a server system configured with one or more Intel® Xeon® processor E5-2600 product family, the system
BIOS will use an embedded PCIe Gen 3 compatibility list which identifies all PCIe Gen 3 add-in cards tested by
Intel to operate reliably at Gen 3 speeds on the given server system. During POST, the system BIOS will
compare installed PCIe Gen 3 add-in cards with those included in the embedded compatibility list. If BIOS
matches an installed card to one listed on the compatibility list, the BIOS will configure the device to operate at
PCIe Gen 3 speeds. If the BIOS cannot match an installed PCIe add-in card with any device included in the
list, the BIOS will force the device to operate at PCIe Gen2 speeds.
Note: The latest available BIOS should be installed on the system to ensure the most up to date embedded
PCIe Gen 3 compatibility list is being used.
Visit the following Intel web site for a list of Intel tested PCIe Gen 3 compatible cards included in the BIOS
embedded compatibility list – http://intel.com/support/motherboards/server/sb/CS-034157.htm
3.2.5.3.2 PCIe Gen3 support – Systems configured with an Intel® Xeon® processor E5-2600 V2 product family
For a server system configured with one or more Intel® Xeon® processor E5-2600 V2 product family, the
system BIOS will configure all installed PCIe Gen 3 compatible add-in cards to operate at PCIe Gen 3 speeds
by default. For a list of Intel tested PCIe Gen 3 add-in cards, review the Tested Hardware and OS list (THOL)
using Intel’s Server Configurator Tool at the following web site:
https://serverconfigurator.intel.com
The following tables identify the PCIe port routing for each add-in card slot on all supported riser cards as
installed in either Riser Slot # 1 or Riser Slot #2. Note the specific processor, PCIe port ID, and number of
PCIe bus lanes supporting each add-in card slot.
Depending on the riser card installed, specific PCIe ports routed from the processor IIO module provide the
PCIe interface to each riser card slot.
For a system configuration that includes a PCIe add-in card that is not included on Intel’s THOL and/or may be
operating erratically, BIOS setup includes an option to force specified PCIe ports to operate at a different PCIe
level than the card is optimally designed to support. To configure this option, access the <F2> BIOS setup
utility.
34 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
From the BIOS Setup “Main Menu”, navigate to the following menus: “Advanced Menu”, “PCI Configuration”,
“Processor PCIe Link Speed”
The “Processor PCIe Link Speed” menu will display selectable options for each installed processor, identified
as “Socket #”, where # identifies the CPU number.
Using information provided in the following tables, select the processor associated with the PCIe port to be
configured.
Revision 2.4 35
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
The “Socket # PCIe Ports Link Speed” window displays selectable options for each configurable PCIe port
associated with the current system configuration.
Note: The illustrations below are for reference purposes only. Actual PCIe port data displayed in the “Socket #
PCIe Ports Link Speed” window may be different than what is shown here.
Using the arrow keys, move the cursor down to the PCIe port to be changed.
Once a port is selected, a port configuration window appears and provides options to configure the specified
PCIe port to operate at a specified PCIe Gen level.
36 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
Select the desired PCIe Gen level. After making all desired changes in BIOS setup, be sure to save the
changes and reboot the system.
Revision 2.4 37
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
Each Ethernet port drives two LEDs located on each network interface connector. The LED at the right of the
connector is the link/activity LED and indicates network connection when on, and transmit/receive activity when
blinking. The LED at the left of the connector indicates link speed as defined in the following table:
®
Figure 23. Intel Server Board S2600GZ/GL External RJ45 NIC Port LED Definition
The server board has seven MAC addresses programmed at the factory. MAC addresses are assigned as
follows:
NIC 1 MAC address (for OS usage)
NIC 2 MAC address = NIC 1 MAC address + 1 (for OS usage)
NIC 3 MAC address = NIC 1 MAC address + 2 (for OS usage)
NIC 4 MAC address = NIC 1 MAC address + 3 (for OS usage)
BMC LAN channel 1 MAC address = NIC1 MAC address + 4
BMC LAN channel 2 MAC address = NIC1 MAC address + 5
BMC LAN channel 3 (RMM) MAC address = NIC1 MAC address + 6
The printed MAC address on the server board and/or server system is assigned to NIC1 on the server board.
38 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
®
Figure 25. Server Board Layout – Intel Integrated RAID Module Option Placement
Intel designed flash + optional support for Intel® RAID Maintenance Free Backup Units (AXXRMFBU2)
or improved Lithium Polymer battery
®
Table 15. Supported Intel Integrated RAID Modules
For additional product information, please reference the following Intel document:
Intel Integrated RAID Module RMS25PB080, RMS25PB040, RMS25CB080, and RMS25C040 Hardware Users
Guide.
AHCI
SATA 0 9x USB 2.0
8MB SPI
Flash
3x USB
Rear I/O Panel
2x USB
Front Panel (Header)
BMC
(Option) Int. 1x USB
eUSB SSD 2x USB
Figure 26. Functional Block Diagram - Chipset Supported Features and Functions
On the Intel® Server Boards S2600GZ and S2600GL, the chipset provides support for the following on-board
functions:
40 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
• 2 wire small form factor Universal Serial Bus 2.0 (Hi-Speed USB) interface to host
• Read Speed up to 35 MB/s and write Speed up to 24 MB/s.
• Capacity range from 256 MB to 32 GB.
• Support USB Mass Storage Class requirements for Boot capability.
3.3.3 Embedded Serial ATA (SATA)/Serial Attached SCSI (SAS)/RAID Support
®
The Intel C602 chipset provides storage support from two integrated controllers: AHCI and SCU. By default
the server board will support up to 6 SATA ports: Two single 6Gb/sec SATA ports routed from the AHCI
controller to the two white SATA connectors labeled “SATA-0” and “SATA-1”, and four 3Gb/sec SATA ports
routed from the SCU to the mini-SAS connector labeled “SCU_0 (0-3)”.
Note: The mini-SAS connector labeled “SCU_1 (4-7)” is NOT functional by default and is only enabled with the
addition of an Intel® RAID C600 Upgrade Key option supporting 8 SAS/SATA ports.
Revision 2.4 41
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
The server board is capable of supporting additional chipset embedded SAS, SATA, and RAID options when
configured with one of several available Intel® RAID C600 Upgrade Keys. Upgrade keys install onto a 4-pin
connector on the server board labeled “STOR_UPG_KEY”.
®
Figure 28. Intel RAID C600 Upgrade Key Connector
The following table identifies available upgrade key options and their supported features.
42 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
®
Table 16. Intel RAID C600 Upgrade Key Options
Additional information for the on-board RAID features and functionality can be found in the Intel® RAID
Software Users Guide (Intel Document Number D29305-015).
The system includes support for two embedded software RAID options:
Intel® Embedded Server RAID Technology 2 (ESRT2) based on LSI* MegaRAID SW RAID technology
Intel® Rapid Storage Technology (RSTe)
Using the <F2> BIOS Setup Utility, accessed during system POST, options are available to enable/disable SW
RAID, and select which embedded software RAID option to use.
Note: No boot drive support to targets attached through SAS expander card.
44 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
The server board utilizes the I/O controller, Graphics Controller, and Baseboard Management features of the
Emulex* Pilot-III Management Controller. The following is an overview of the features as implemented on the
server board from each embedded controller.
USB 2.0
Analog Video
DDR3
128MB
Revision 2.4 45
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
The integrated video controller supports all standard IBM VGA modes. The following table shows the 2D
modes supported for both CRT and LCD:
The server board provides two video interfaces. The primary video interface is accessed using a standard 15-
pin VGA connector found on the back edge of the server board. In addition, video signals are routed to a 14-
pin header labeled “FP_Video” on the leading edge of the server board, allowing for the option of cabling to a
front panel video connector. Attaching a monitor to the front panel video connector will disable the primary
external video connector on the back edge of the board.
The BIOS supports dual-video mode when an add-in video card is installed.
46 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Product Architecture Overview
In the single mode (dual monitor video = disabled), the on-board video controller is disabled when an add-in
video card is detected.
In the dual mode (on-board video = enabled, dual monitor video = enabled), the on-board video controller is
enabled and is the primary video device. The add-in video card is allocated resources and is considered the
secondary video device. The BIOS Setup utility provides options to configure the feature as follows:
Revision 2.4 47
Product Architecture Overview Intel® Server Board S2600GZ/GL TPS
For these channels, support can be enabled for IPMI-over-LAN and DHCP. For security reasons, embedded
LAN channels have the following default settings:
IP Address: Static.
All users disabled.
For a functional overview of the baseboard management features, refer to Platform Management Functional
Overview.
48 Revision 2.4
Intel® Server Board S2600GZ/GL TPS System Security
4. System Security
4.1 BIOS Password Protection
The BIOS uses passwords to prevent unauthorized tampering with the server setup. Passwords can restrict
entry to the BIOS Setup, restrict use of the Boot Popup menu, and suppress automatic USB device reordering.
There is also an option to require a Power On password entry in order to boot the system. If the Power On
Password function is enabled in Setup, the BIOS will halt early in POST to request a password before
continuing POST.
Both Administrator and User passwords are supported by the BIOS. An Administrator password must be
installed in order to set the User password. The maximum length of a password is 14 characters. A password
can have alphanumeric (a-z, A-Z, 0-9) characters and it is case sensitive. Certain special characters are also
allowed, from the following set:
! @ # $ % ^ & * ( ) - _ + = ?
The Administrator and User passwords must be different from each other. An error message will be displayed
if there is an attempt to enter the same password for one as for the other.
The use of “Strong Passwords” is encouraged, but not required. In order to meet the criteria for a “Strong
Password”, the password entered must be at least 8 characters in length, and must include at least one each
of alphabetic, numeric, and special characters. If a “weak” password is entered, a popup warning message will
be displayed, although the weak password will be accepted.
Once set, a password can be cleared by changing it to a null string. This requires the Administrator password,
and must be done through BIOS Setup or other explicit means of changing the passwords. Clearing the
Administrator password will also clear the User password.
Alternatively, the passwords can be cleared by using the Password Clear jumper if necessary. Resetting the
BIOS configuration settings to default values (by any method) has no effect on the Administrator and User
passwords.
Entering the User password allows the user to modify only the System Time and System Date in the Setup
Main screen. Other setup fields can be modified only if the Administrator password has been entered. If any
password is set, a password is required to enter the BIOS setup.
The Administrator has control over all fields in the BIOS setup, including the ability to clear the User password
and the Administrator password.
It is strongly recommended that at least an Administrator Password be set, since not having set a password
gives everyone who boots the system the equivalent of Administrative access. Unless an Administrator
password is installed, anyone with access to the system can go into Setup and change BIOS settings at will.
In addition to restricting access to most Setup fields to viewing only when a User password is entered, defining
a User password imposes restrictions on booting the system. In order to simply boot in the defined boot order,
no password is required. However, the F6 Boot popup prompts for a password, and can only be used with the
Administrator password. Also, when a User password is defined, it suppresses the USB Reordering that occurs,
if enabled, when a new USB boot device is attached to the system. A User is restricted from booting in
anything other than the Boot Order defined in the Setup by an Administrator.
As a security measure, if a User or Administrator enters an incorrect password three times in a row during the
boot sequence, the system is placed into a halt state. A system reset is required to exit out of the halt state.
This feature makes it more difficult to guess or break a password.
Revision 2.4 49
System Security Intel® Server Board S2600GZ/GL TPS
In addition, on the next successful reboot, the Error Manager displays a Major Error code 0048, which also
logs a SEL event to alert the authorized user or administrator that a password access failure has occurred
A TPM device is optionally installed onto a high density 14-pin connector labeled “TPM” on the server board,
and is secured from external software attacks and physical theft. A pre-boot environment, such as the BIOS
and operating system loader, uses the TPM to collect and store unique measurements from multiple factors
within the boot process to create a system fingerprint. This unique fingerprint remains the same unless the pre-
boot environment is tampered with. Therefore, it is used to compare to future measurements to verify the
integrity of the boot process.
After the system BIOS completes the measurement of its boot process, it hands off control to the operating
system loader and in turn to the operating system. If the operating system is TPM-enabled, it compares the
BIOS TPM measurements to those of previous boots to make sure the system was not tampered with before
continuing the operating system boot process. Once the operating system is in operation, it optionally uses
TPM to provide additional system and data security (for example, Microsoft Vista* supports Bitlocker drive
encryption).
Measures and stores the boot process in the TPM microcontroller to allow a TPM enabled operating
system to verify system boot integrity.
Produces EFI and legacy interfaces to a TPM-enabled operating system for using TPM.
Produces ACPI TPM device and methods to allow a TPM-enabled operating system to send TPM
administrative command requests to the BIOS.
Verifies operator physical presence. Confirms and executes operating system TPM administrative
command requests.
Provides BIOS Setup options to change TPM security states and to clear TPM ownership.
For additional details, refer to the TCG PC Client Specific Implementation Specification, the TCG PC Client
Specific Physical Presence Interface Specification, and the Microsoft BitLocker* Requirement documents.
Administrative operations to the TPM require TPM ownership or physical presence indication by the operator to
confirm the execution of administrative operations. The BIOS implements the operator presence indication by
verifying the setup Administrator password.
A TPM administrative sequence invoked from the operating system proceeds as follows:
1. User makes a TPM administrative request through the operating system’s security software.
2. The operating system requests the BIOS to execute the TPM administrative command through TPM ACPI
methods and then resets the system.
50 Revision 2.4
Intel® Server Board S2600GZ/GL TPS System Security
3. The BIOS verifies the physical presence and confirms the command with the operator.
4. The BIOS executes TPM administrative command(s), inhibits BIOS Setup entry and boots directly to the
operating system which requested the TPM command(s).
The BIOS TPM Setup allows the operator to view the current TPM state and to carry out rudimentary TPM
administrative operations. Performing TPM administrative options through the BIOS setup requires TPM
physical presence verification.
Using BIOS TPM Setup, the operator can turn ON or OFF TPM functionality and clear the TPM ownership
contents. After the requested TPM BIOS Setup operation is carried out, the option reverts to No Operation.
The BIOS TPM Setup also displays the current state of the TPM, whether TPM is enabled or disabled and
activated or deactivated. Note that while using TPM, a TPM-enabled operating system or application may
change the TPM state independent of the BIOS setup. When an operating system modifies the TPM state, the
BIOS Setup displays the updated TPM state.
The BIOS Setup TPM Clear option allows the operator to clear the TPM ownership key and allows the operator
to take control of the system with TPM. You use this option to clear security settings for a newly initialized
system or to clear a system for which the TPM ownership security key was lost.
When the Setup is entered, the Main screen displays. The BIOS Setup utility provides the Security screen to
enable and set the user and administrative passwords and to lock out the front panel buttons so they cannot be
used. The Intel® Server Board S2600GZ/GL provides TPM settings through the security screen.
To access this screen from the Main screen, select the Security option.
Revision 2.4 51
System Security Intel® Server Board S2600GZ/GL TPS
52 Revision 2.4
Intel® Server Board S2600GZ/GL TPS System Security
Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology enabled
(both VT-x and VT-d), an Intel® Trusted Execution Technology-enabled processor, chipset and BIOS,
Authenticated Code Modules, and an Intel® Trusted Execution Technology compatible measured launched
environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition,
Intel® Trusted Execution Technology requires the system to include a TPM v1.2, as defined by the Trusted
Computing Group TPM PC Client Specifications, Revision 1.2.
When available, Intel Trusted Execution Technology can be enabled or disabled in the processor from a BIOS
Setup option.
For general information about Intel® TXT, visit the Intel® Trusted Execution Technology website,
http://www.intel.com/technology/security/ .
Revision 2.4 53
Technology Support Intel® Server Board S2600GZ/GL TPS
5. Technology Support
5.1 Intel® Virtualization Technology – Intel® VT-x/VT-d/VT-c
Intel® Virtualization Technology consists of three components which are integrated and interrelated, but which
address different areas of Virtualization.
Intel® Virtualization Technology (VT-x) is processor-related and provides capabilities needed to
provide hardware assist to a Virtual Machine Monitor (VMM).
Intel® Virtualization Technology for Directed I/O (VT-d) is primarily concerned with virtualizing I/O
efficiently in a VMM environment. This would generally be a chipset I/O feature, but in the Second
Generation Intel® Core™ Processor Family there is an Integrated I/O unit embedded in the
processor, and the IIO is also enabled for VT-d.
Intel® Virtualization Technology for Connectivity (VT-c) is primarily concerned I/O hardware assist
features, complementary to but independent of VT-d.
Intel ®VT-x is designed to support multiple software environments sharing same hardware resources. Each
software environment may consist of OS and applications. The Intel® Virtualization Technology features can be
enabled or disabled in the BIOS setup. The default behavior is disabled.
Intel® VT-d is supported jointly by the Intel® Xeon® Processor E5 4600/2600/2400/1600 Product Families and
the C600 chipset. Both support DMA remapping from inbound PCI Express* memory Guest Physical Address
(GPA) to Host Physical Address (HPA). PCI devices are directly assigned to a virtual machine leading to a
robust and efficient virtualization.
The Intel® S4600/S2600/S2400/S1600/S1400 Server Board Family BIOS publishes the DMAR table in the
ACPI Tables. For each DMA Remapping Engine in the platform, one exact entry of DRHD (DMA Remapping
Hardware Unit Definition) structure is added to the DMAR. The DRHD structure in turn contains a Device
Scope structure that describes the PCI endpoints and/or sub-hierarchies handled by the particular DMA
Remapping Engine.
Similarly, there are reserved memory regions typically allocated by the BIOS at boot time. The BIOS marks
these regions as either reserved or unavailable in the system address memory map reported to the OS. Some
of these regions can be a target of DMA requests from one or more devices in the system, while the OS or
executive is active. The BIOS reports each such memory region using exactly one RMRR (Reserved Memory
Region Reporting) structure in the DMAR. Each RMRR has a Device Scope listing the devices in the system
that can cause a DMA request to the region.
For more information on the DMAR table and the DRHD entry format, refer to the Intel® Virtualization
Technology for Directed I/O Architecture Specification. For more general information about VT-x, VT-d, and
VT-c, a good reference is Enabling Intel® Virtualization Technology Features and Benefits White Paper.
54 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Technology Support
®
Table 20. Intel Intelligent Power Node Manager
IT Challenge Requirement
Over-allocation of power Ability to monitor actual power consumption
Control capability that can maintain a power budget to enable
dynamic power allocation to each server
Under-population of rack space Control capability that can maintain a power budget to enable increased rack
population.
High energy costs Control capability that can maintain a power budget to ensure that a set
energy cost can be achieved
Capacity planning Ability to monitor actual power consumption to enable power usage
modeling over time and a given planning period
Ability to understand cooling demand from a temperature and airflow
perspective
Detection and correction of hot spots Control capability that reduces platform power consumption to
protect a server in a hot-spot
Ability to monitor server inlet temperatures to enable greater rack
utilization in areas with adequate cooling.
The requirements listed above are those that are addressed by the C600 chipset Management Engine (ME)
and Intel® Intelligent Power Node Manager (NM) technology. The ME/NM combination is a power and thermal
control capability on the platform, which exposes external interfaces that allow IT (through external
management software) to query the ME about platform power capability and consumption, thermal
characteristics, and specify policy directives (for example, set a platform power budget).
Node Manager (NM) is a platform resident technology that enforces power capping and thermal-triggered
power capping policies for the platform. These policies are applied by exploiting subsystem knobs (such as
processor P and T states) that can be used to control power consumption. NM enables data center power
management by exposing an external interface to management software through which platform policies can
be specified. It also implements specific data center power management usage models such as power limiting,
and thermal monitoring.
The NM feature is implemented by a complementary architecture utilizing the ME, BMC, BIOS, and an ACPI-
compliant OS. The ME provides the NM policy engine and power control/limiting functions (referred to as Node
Manager or NM) while the BMC provides the external LAN link by which external management software can
interact with the feature. The BIOS provides system power information utilized by the NM algorithms and also
exports ACPI Source Language (ASL) code used by OS-Directed Power Management (OSPM) for negotiating
processor P and T state changes for power limiting. PMBus*-compliant power supplies provide the capability to
monitoring input power consumption, which is necessary to support NM.
Below are the some of the applications of Intel® Intelligent Power Node Manager technology.
Platform Power Monitoring and Limiting: The ME/NM monitors platform power consumption and
hold average power over duration. It can be queried to return actual power at any given instance. The
power limiting capability is to allow external management software to address key IT issues by setting a
power budget for each server. For example, if there is a physical limit on the power available in a room,
then IT can decide to allocate power to different servers based on their usage – servers running critical
systems can be allowed more power than servers that are running less critical workload.
Inlet Air Temperature Monitoring: The ME/NM monitors server inlet air temperatures periodically. If
there is an alert threshold in effect, then ME/NM issues an alert when the inlet (room) temperature
exceeds the specified value. The threshold value can be set by policy.
Memory Subsystem Power Limiting: The ME/NM monitors memory power consumption. Memory
power consumption is estimated using average bandwidth utilization information
Processor Power monitoring and limiting: The ME/NM monitors processor or socket power
consumption and holds average power over duration. It can be queried to return actual power at any
given instant. The monitoring process of the ME will be used to limit the processor power consumption
through processor P-states and dynamic core allocation
Core allocation at boot time: Restrict the number of cores for OS/VMM use by limiting how many
cores are active at boot time. After the cores are turned off, the CPU will limit how many working cores
Revision 2.4 55
Technology Support Intel® Server Board S2600GZ/GL TPS
are visible to BIOS and OS/VMM. The cores that are turned off cannot be turned on dynamically after
the OS has started. It can be changed only at the next system reboot.
Core allocation at run-time: This particular use case provides a higher level processor power control
mechanism to a user at run-time, after booting. An external agent can dynamically use or not use cores
in the processor subsystem by requesting ME/NM to control them, specifying the number of cores to
use or not use.
5.2.1 Hardware Requirements
NM is supported only on platforms that have the NM FW functionality loaded and enabled on the Management
Engine (ME) in the SSB and that have a BMC present to support the external LAN interface to the ME. NM
power limiting features requires a means for the ME to monitor input power consumption for the platform. This
capability is generally provided by means of PMBus*-compliant power supplies although an alternative model
using a simpler SMBus* power monitoring device is possible (there is potential loss in accuracy and
responsiveness using non-PMBus* devices). The NM SmaRT/CLST feature does specifically require PMBus*-
compliant power supplies as well as additional hardware on the baseboard.
56 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
This chapter provides a high level overview of the platform management features and functionality
implemented on the server board.
For more in depth and design level Platform Management information, please refer the BMC Core Firmware
External Product Specification (EPS) and BIOS Core External Product Specification (EPS) for Intel® Server
products based on the Intel® Xeon® processor E5-4600,2600,1600 product families.
o Redundant BMC boot blocks to avoid possibility of a corrupted boot block resulting in a scenario
that prevents a user from updating the BMC.
o BMC System Management Health Monitoring
Fault resilient booting (FRB): FRB2 is supported by the watchdog timer functionality.
Enable/Disable of System Reset Due CPU Errors
Chassis intrusion detection
Fan speed control
Fan redundancy monitoring and support
Hot-swap fan support
Power Supply Fan Sensors
System Airflow Monitoring
Exit Air Temperature Monitoring
Acoustic management: Support for multiple fan profiles
Ethernet Controller Thermal Monitoring
Global Aggregate Temperature Margin Sensor
Platform environment control interface (PECI) thermal management support
Memory Thermal Management
DIMM temperature monitoring: New sensors and improved acoustic management using closed-loop fan
control algorithm taking into account DIMM temperature readings.
Power supply redundancy monitoring and support
Power unit management: Support for power unit sensor. The BMC handles power-good dropout
conditions.
Intel® Intelligent Power Node Manager support
Signal testing support: The BMC provides test commands for setting and getting platform signal states.
The BMC generates diagnostic beep codes for fault conditions.
System GUID storage and retrieval
Front panel management: The BMC controls the system status LED and chassis ID LED. It supports
secure lockout of certain front panel functionality and monitors button presses. The chassis ID LED is
turned on using a front panel button or a command.
Local Control Display Panel support
Power state retention
Power fault analysis
Intel® Light-Guided Diagnostics
Address Resolution Protocol (ARP): The BMC sends and responds to ARPs (supported on embedded
NICs).
Dynamic Host Configuration Protocol (DHCP): The BMC performs DHCP (supported on embedded
NICs).
E-mail alerting
Embedded web server
o Support for embedded web server UI in Basic Manageability feature set.
o Human-readable SEL
o Additional system configurability
o Additional system monitoring capability
o Enhanced on-line help
Integrated KVM
58 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
Revision 2.4 59
Platform Management Functional Overview Intel® Server Board S2600GZ/GL TPS
Command Routed through command processor Turns power on or off, or power cycle
Power state retention Implemented by means of BMC internal logic Turns power on when AC power returns
Chipset Sleep S4/S5 signal (same as POWER_ON) Turns power on or off
CPU Thermal CPU Thermtrip Turns power off
WOL(Wake On LAN) LAN Turns power on
This feature is comprised of a set of capabilities whose purpose is to detect misbehaving subsections of BMC
firmware, the BMC CPU itself, or HW subsystems of the BMC component, and to take appropriate action to
restore proper operation. The action taken is dependent on the nature of the detected failure and may result in
a restart of the BMC CPU, one or more BMC HW subsystems, or a restart of malfunctioning FW subsystems.
The BMC watchdog feature will only allow up to three resets of the BMC CPU (such as HW reset) or entire FW
stack (such as a SW reset) before giving up and remaining in the uBOOT code. This count is cleared upon
cycling of power to the BMC or upon continuous operation of the BMC without a watchdog-generated reset
occurring for a period of > 30 minutes. The BMC FW logs a SEL event indicating that a watchdog-generated
BMC reset (either soft or hard reset) has occurred. This event may be logged after the actual reset has
occurred. Refer sensor section for details for the related sensor definition. The BMC will also indicate a
degraded system status on the Front Panel Status LED after a BMC HW reset or FW stack reset. This state
(which follows the state of the associated sensor) will be cleared upon system reset or (AC or DC) power cycle.
Note: A reset of the BMC may result in the following system degradations that will require a system reset or
power cycle to correct:
1. Timeout value for the rotation period can be set using this parameterPotentially incorrect ACPI Power
State reported by the BMC.
2. Reversion of temporary test modes for the BMC back to normal operational modes.
3. FP status LED and DIMM fault LEDs may not reflect BIOS detected errors.
FRB2 refers to the FRB algorithm that detects system failures during POST. The BIOS uses the BMC
watchdog timer to back up its operation during POST. The BIOS configures the watchdog timer to indicate that
the BIOS is using the timer for the FRB2 phase of the boot operation.
After the BIOS has identified and saved the BSP information, it sets the FRB2 timer use bit and loads the
watchdog timer with the new timeout interval.
If the watchdog timer expires while the watchdog use bit is set to FRB2, the BMC (if so configured) logs a
watchdog expiration event showing the FRB2 timeout in the event data bytes. The BMC then hard resets the
system, assuming the BIOS-selected reset as the watchdog timeout action.
The BIOS is responsible for disabling the FRB2 timeout before initiating the option ROM scan and before
displaying a request for a boot password. If the processor fails and causes an FRB2 timeout, the BMC resets
the system.
60 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
The BIOS gets the watchdog expiration status from the BMC. If the status shows an expired FRB2 timer, the
BIOS enters the failure in the system event log (SEL). In the OEM bytes entry in the SEL, the last POST code
generated during the previous boot attempt is written. FRB2 failure is not reflected in the processor status
sensor value.
The FRB2 failure does not affect the front panel LEDs.
The information gathered from physical sensors is translated into IPMI sensors as part of the “IPMI Sensor
Model”. The BMC also reports various system state changes by maintaining virtual sensors that are not
specifically tied to physical hardware.
See Appendix B – Integrated BMC Sensor Tables for additional sensor information.
The BMC provides FRU device command access to its own FRU device and to the FRU devices throughout
the server. The FRU device ID mapping is defined in the Platform Specific Information. The BMC controls the
mapping of the FRU device ID to the physical device
The BMC allocates 65,502 bytes (approx 64 KB) of non-volatile storage space to store system events. The
SEL timestamps may not be in order. Up to 3,639 SEL records can be stored at a time. Any command that
results in an overflow of the SEL beyond the allocated space is rejected with an “Out of Space” IPMI
completion code (C4h).
Events logged to the SEL can be viewed using Intel’s SELVIEW utility, Embedded Web Server, and Active
System Console.
Revision 2.4 61
Platform Management Functional Overview Intel® Server Board S2600GZ/GL TPS
The system fans are divided into fan domains, each of which has a separate fan speed control signal and a
separate configurable fan control policy. A fan domain can have a set of temperature and fan sensors
associated with it. These are used to determine the current fan domain state.
A fan domain has three states: sleep, nominal, and boost. The sleep and boost states have fixed (but
configurable through OEM SDRs) fan speeds associated with them. The nominal state has a variable speed
determined by the fan domain policy. An OEM SDR record is used to configure the fan domain policy.
System fan speeds are controlled through pulse width modulation (PWM) signals, which are driven separately
for each domain by integrated PWM hardware. Fan speed is changed by adjusting the duty cycle, which is the
percentage of time the signal is driven high in each pulse
This capability requires the BMC to access temperature sensors on the individual memory DIMMs. Additionally,
closed-loop thermal throttling is only supported with buffered DIMMs.
In order to maintain comprehensive thermal protection, deliver the best system acoustics, and fan power
efficiency, an intelligent Fan Speed Control (FSC) and thermal management technology (mechanism) is used.
Options in <F2> BIOS Setup (BIOS > Advanced > System Acoustic and Performance Configuration) allow
for parameter adjustments based on the actual system configuration and usage. Refer to System Acoustic and
Performance Configuration for a description of each setting.
Note: The above features may or may not be in effective depends on the actual thermal characters of a
specific system. Refer to Intel® Server System R1000GZ/GL product family Technical Product Specification and
Intel® Server System R2000GZ/GL product family Technical Product Specification for system thermal and
acoustic management.
The following IPMI thermal sensors are used as input to the fan speed control:
62 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
Notes:
1. For fan speed control in Intel chassis
2. For fan speed control in 3rd party chassis
3. Temperature margin from throttling threshold
4. Absolute temperature
5. PECI value or margin value
6. On-die sensor
7. On-board sensor
8. Virtual sensor
9. Available only when PSU has PMBus*
The following illustration provides a simple model showing the fan speed control structure that implements the
resulting fan speeds.
The following terminology is used for the various memory throttling options:
Static Open Loop Thermal Throttling (Static-OLTT): OLTT control registers that are configured by
BIOS MRC remain fixed after post. The system does not change any of the throttling control registers in
the embedded memory controller during runtime.
Revision 2.4 63
Platform Management Functional Overview Intel® Server Board S2600GZ/GL TPS
Static Closed Loop Thermal Throttling (Static-CLTT): CLTT control registers are configured by BIOS
MRC during POST. The memory throttling is run as a closed-loop system with the DIMM temperature
sensors as the control input. Otherwise, the system does not change any of the throttling control registers
in the embedded memory controller during runtime.
Dynamic Closed Loop Thermal Throttling (Dynamic-CLTT): CLTT control registers are configured by
BIOS MRC during POST. The memory throttling is run as a closed-loop system with the DIMM
temperature sensors as the control input. Adjustments are made to the throttling during runtime based on
changes in system cooling (fan speed).
Both Static and Dynamic CLTT modes implement a Hybrid Closed Loop Thermal Throttling mechanism
whereby the Integrated Memory Controller estimates the DRAM temperature in between actual reads of the
memory thermal sensors.
Host SMS interface by means of low pin count (LPC)/keyboard controller style (KCS) interface
Host SMM interface by means of low pin count (LPC)/keyboard controller style (KCS) interface
Intelligent Platform Management Bus (IPMB) I2C interface
LAN interface using the IPMI-over-LAN protocols
Every messaging interface is assigned an IPMI channel ID by IPMI 2.0. The following tables shows the
standard channel assignments.
1. User names for User IDs 1 and 2 cannot be changed. These are always “” (Null/blank) and “root”
respectively.
2. User 2 (“root”) always has the administrator privilege level.
3. All user passwords (including passwords for 1 and 2) may be modified.
User IDs 3-15 may be used freely, with the condition that user names are unique. Therefore, no other users
can be named “” (Null), “root,” or any other existing user name.
64 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
The BMC both sends and receives IPMB messages over the IPMB interface. Non-IPMB messages received by
means of the IPMB interface are discarded.
Messages sent by the BMC can either be originated by the BMC, such as initialization agent operation, or by
another source. One example is KCS-IPMB bridging.
See the Intelligent Platform Management Interface Specification Second Generation v2.0 for details about the
IPMI-over-LAN protocol.
Run-time determination of LAN channel capabilities can be determined by both standard IPMI defined
mechanisms.
The NC-SI is a DMTF industry standard protocol for the side band management LAN interface. This protocol
provides a fast multi-drop interface for management traffic.
The baseboard NIC(s) are connected to a single BMC RMII/RGMII port that is configured for RMII operation.
The NC-SI protocol is used for this connection and provides a 100 Mb/s full-duplex multi-drop interface which
allows multiple NICs to be connected to the BMC. The physical layer is based upon RMII, however RMII is a
point-to-point bus whereas NC-SI allows 1 master and up to 4 slaves. The logical layer (configuration
commands) is incompatible with RMII.
The server board will provide support for a dedicated management channel that can be configured to be
hidden from the host and only used by the BMC. This mode of operation is configured from a BIOS setup
option.
Revision 2.4 65
Platform Management Functional Overview Intel® Server Board S2600GZ/GL TPS
The PHY on the RMM4 connects to the BMC’s other RMII/RGMII interface (that is, the one that is not
connected to the baseboard NICs). This BMC port is configured for RGMII usage.
In addition to the use of an RMM4 add-in card for a dedicated management channel, on systems that support
multiple Ethernet ports on the baseboard, the system BIOS provides a setup option to allow one of these
baseboard ports to be dedicated to the BMC for manageability purposes. When this is enabled, that port is
hidden from the OS.
6.10.3.2.3 Concurrent Server Management Use of Multiple Ethernet Controllers
The BMC FW supports concurrent OOB LAN management sessions for the following combination:
2 on-board NIC ports
1 on-board NIC and the optional dedicated RMM4 add-in management NIC.
2 on-board NICs and optional dedicated RMM4 add-in management NIC.
All NIC ports must be on different subnets for the above concurrent usage models.
MAC addresses are assigned for management NICs from a pool of up to 3 MAC addresses allocated
specifically for manageability.
The server board has seven MAC addresses programmed at the factory. MAC addresses are assigned as
follows:
NIC 1 MAC address (for OS usage)
NIC 2 MAC address = NIC 1 MAC address + 1 (for OS usage)
NIC 3 MAC address = NIC 1 MAC address + 2 (for OS usage)
NIC 4 MAC address = NIC 1 MAC address + 3 (for OS usage)
BMC LAN channel 1 MAC address = NIC1 MAC address + 4
BMC LAN channel 2 MAC address = NIC1 MAC address + 5
BMC LAN channel 3 (RMM) MAC address = NIC1 MAC address + 6
The printed MAC address on the server board and/or server system is assigned to NIC1 on the server board.
For security reasons, embedded LAN channels have the following default settings:
IP Address: Static
All users disabled
IPMI-enabled network interfaces may not be placed on the same subnet. This includes the Intel® Dedicated
Server Management NIC and either of the BMC’s embedded network interfaces.
Host-BMC communication over the same physical LAN connection – also known as “loopback” – is not
supported. This includes “ping” operations.
On server boards with more than two onboard NIC ports, only the first two ports can be used as BMC LAN
channels. The remaining ports have no BMC connectivity.
66 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
The BMC supports IPv4 and IPv6 simultaneously so they are both configured separately and completely
independently. For example, IPv4 can be DHCP configured while IPv6 is statically configured or vice versa.
The parameters for IPv6 are similar to the parameters for IPv4 with the following differences:
An IPv6 address is 16 bytes vs. 4 bytes for IPv4.
An IPv6 prefix is 0 to 128 bits whereas IPv4 has a 4 byte subnet mask.
The IPv6 Enable parameter must be set before any IPv6 packets will be sent or received on that channel.
There are two variants of automatic IP Address Source configuration vs. just DHCP for IPv4.
The three possible IPv6 IP Address Sources for configuring the BMC are:
Static (Manual): The IP, Prefix, and Gateway parameters are manually configured by the user. The BMC
ignores any Router Advertisement messages received over the network.
DHCPv6: The IP comes from running a DHCPv6 client on the BMC and receiving the IP from a DHCPv6
server somewhere on the network. The Prefix and Gateway are configured by Router Advertisements from the
local router. The IP, Prefix, and Gateway are read-only parameters to the BMC user in this mode.
Stateless auto-config: The Prefix and Gateway are configured by the router through Router Advertisements.
The BMC derives its IP in two parts: the upper network portion comes from the router and the lower unique
portion comes from the BMC’s channel MAC address. The 6-byte MAC address is converted into an 8-byte
value per the EUI-64* standard. For example, a MAC value of 00:15:17:FE:2F:62 converts into a EUI-64 value
of 215:17ff:fefe:2f62. If the BMC receives a Router Advertisement from a router at IP 1:2:3:4::1 with a prefix of
64, it would then generate for itself an IP of 1:2:3:4:215:17ff:fefe:2f62. The IP, Prefix, and Gateway are read-
only parameters to the BMC user in this mode.
IPv6 can be used with the BMC’s Web Console, JViewer (remote KVM and Media), and Systems Management
Architecture for Server Hardware – Command Line Protocol (SMASH-CLP) interface (ssh). There is no
standard yet on how IPMI RMCP or RMCP+ should operate over IPv6 so that is not currently supported.
The LAN Failover feature applies only to BMC LAN traffic. It bonds all available Ethernet devices but only one
is active at a time. When enabled, If the active connection’s leash is lost, one of the secondary connections is
automatically configured so that it has the same IP address (the next active LAN link will be chosen randomly
from the pool of backup LAN links with link status as “UP”). Traffic immediately resumes on the new active
connection.
The LAN Failover enable/disable command may be sent at any time. After it has been enabled, standard IPMI
commands for setting channel configuration that specify a LAN channel other than the first will return an error
code.
6.10.3.5 BMC IP Address Configuration
Enabling the BMC’s network interfaces requires using the Set LAN Configuration Parameter command to
configure LAN configuration parameter 4, IP Address Source. The BMC supports this parameter as follows:
Revision 2.4 67
Platform Management Functional Overview Intel® Server Board S2600GZ/GL TPS
1h, static address (manually configured): Supported on all management NICs. This is the BMC’s default
value.
2h, address obtained by BMC running DHCP: Supported only on embedded management NICs.
IP Address Source value 4h, address obtained by BMC running other address assignment protocol, is not
supported on any management NIC.
Attempting to set an unsupported IP address source value has no effect, and the BMC returns error code
0xCC, Invalid data field-in request. Note that values 0h and 3h are no longer supported, and will return a 0xCC
error completion code.
6.10.3.5.1 Static IP Address (IP Address Source Values 0h, 1h, and 3h)
The BMC supports static IP address assignment on all of its management NICs. The IP address source
parameter must be set to “static” before the IP address; the subnet mask or gateway address can be manually
set.
The BMC takes no special action when the following IP address source is specified as the IP address source
for any management NIC:
1h – Static address (manually configured)
The Set LAN Configuration Parameter command must be used to configure LAN configuration parameter 3, IP
Address, with an appropriate value.
The BIOS does not monitor the value of this parameter, and it does not execute DHCP for the BMC under any
circumstances, regardless of the BMC configuration.
When changing from DHCP to Static configuration, the initial values of these three parameters will be
equivalent to the existing DHCP-set parameters. Additionally, the BMC observes the following network safety
precautions:
1. The user may only set a subnet mask that is valid, per IPv4 and RFC 950 (Internet Standard Subnetting
Procedure). Invalid subnet values return a 0xCC (Invalid Data Field in Request) completion code, and
the subnet mask is not set. If no valid mask has been previously set, default subnet mask is 0.0.0.0.
2. The user may only set a default gateway address that can potentially exist within the subnet specified
above. Default gateway addresses outside the BMC’s subnet are technically unreachable and the BMC
will not set the default gateway address to an unreachable value. The BMC returns a 0xCC (Invalid
Data Field in Request) completion code for default gateway addresses outside its subnet.
3. If a command is issued to set the default gateway IP address before the BMC’s IP address and subnet
mask are set, the default gateway IP address is not updated and the BMC returns 0xCC.
If the BMC’s IP address on a LAN channel changes while a LAN session is in progress over that channel, the
BMC does not take action to close the session except through a normal session timeout. The remote client
must re-sync with the new IP address. The BMC’s new IP address is only available in-band through the “Get
LAN Configuration Parameters” command.
68 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
If the BMC has previously been assigned an IP address through DHCP or the Set LAN Configuration
Parameter command, it requests that same IP address to be reassigned. If the BMC does not receive the
same IP address, system management software must be reconfigured to use the new IP address. The new
address is only available in-band, through the IPMI Get LAN Configuration Parameters command.
Changing the IP Address Source parameter from 2h to any other supported value will cause the BMC to stop
the DHCP process. The BMC uses the most recently obtained IP address until it is reconfigured.
If the physical LAN connection is lost (that is, the cable is unplugged), the BMC will not re-initiate the DHCP
process when the connection is re-established.
6.10.3.5.4 DHCP-related LAN Configuration Parameters
Users may not change the following LAN parameters while the DHCP is enabled:
LAN configuration parameter 3 (IP Address)
LAN configuration parameter 6 (Subnet Mask)
LAN configuration parameter 12 (Default Gateway Address)
To prevent users from disrupting the BMC’s LAN configuration, the BMC treats these parameters as read-only
while DHCP is enabled for the associated LAN channel. Using the Set LAN Configuration Parameter command
to attempt to change one of these parameters under such circumstances has no effect, and the BMC returns
error code 0xD5, “Cannot Execute Command. Command, or request parameter(s) are not supported in present
state.”
6.10.3.6 DHCP BMC Hostname
The BMC allows setting a DHCP Hostname using the Set/Get LAN Configuration Parameters command.
DHCP Hostname can be set regardless of the IP Address source configured on the BMC. But this
parameter is only used if the IP Address source is set to DHCP.
When Byte 2 is set to “Update in progress”, all the 16 Block Data Bytes (Bytes 3 – 18) must be present in
the request.
When Block Size < 16, it must be the last Block request in this series. In other words Byte 2 is equal to
“Update is complete” on that request.
Whenever Block Size < 16, the Block data bytes must end with a NULL Character or Byte (=0).
All Block write requests are updated into a local Memory byte array. When Byte 2 is set to “Update is
Complete”, the Local Memory is committed to the NV Storage. Local Memory is reset to NULL after
changes are committed.
When Byte 1 (Block Selector = 1), firmware resets all the 64 bytes local memory. This can be used to
undo any changes after the last “Update in Progress”.
User should always set the hostname starting from block selector 1 after the last “Update is complete”. If
the user skips block selector 1 while setting the hostname, the BMC will record the hostname as “NULL,”
because the first block contains NULL data.
This scheme effectively does not allow a user to make a partial Hostname change. Any Hostname
change needs to start from Block 1.
Byte 64 ( Block Selector 04h byte 16) is always ignored and set to NULL by BMC which effectively means
we can set only 63 bytes.
User is responsible for keeping track of the Set series of commands and Local Memory contents.
While BMC firmware is in “Set Hostname in Progress” (Update not complete), the firmware continues using the
Previous Hostname for DHCP purposes.
Revision 2.4 69
Platform Management Functional Overview Intel® Server Board S2600GZ/GL TPS
LAN configuration options are now supported (by means of the Set LAN Config Parameters command,
parameters 20 and 21) that allow support for 802.1Q VLAN (Layer 2). This allows VLAN headers/packets to be
used for IPMI LAN sessions. VLAN ID’s are entered and enabled by means of parameter 20 of the Set LAN
Config Parameters IPMI command. When a VLAN ID is configured and enabled, the BMC only accepts
packets with that VLAN tag/ID. Conversely, all BMC generated LAN packets on the channel include the given
VLAN tag/ID. Valid VLAN ID’s are 1 through 4094, VLAN ID’s of 0 and 4095 are reserved, per the 802.1Q
VLAN specification. Only one VLAN can be enabled at any point in time on a LAN channel. If an existing VLAN
is enabled, it must first be disabled prior to configuring a new VLAN on the same LAN channel.
Parameter 21 (VLAN Priority) of the Set LAN Config Parameters IPMI command is now implemented and a
range from 0-7 will be allowed for VLAN Priorities. Please note that bits 3 and 4 of Parameter 21 are
considered Reserved bits.
Parameter 25 (VLAN Destination Address) of the Set LAN Config Parameters IPMI command is not supported
and returns a completion code of 0x80 (parameter not supported) for any read/write of parameter 25.
If the BMC IP address source is DHCP, then the following behavior is seen:
If the BMC is first configured for DHCP (prior to enabling VLAN), when VLAN is enabled, the BMC
performs a discovery on the new VLAN in order to obtain a new BMC IP address.
If the BMC is configured for DHCP (before disabling VLAN), when VLAN is disabled, the BMC performs a
discovery on the LAN in order to obtain a new BMC IP address.
If the BMC IP address source is Static, then the following behavior is seen:
If the BMC is first configured for static (prior to enabling VLAN), when VLAN is enabled, the BMC has the
same IP address that was configured before. It is left to the management application to configure a
different IP address if that is not suitable for VLAN.
If the BMC is configure for static (prior to disabling VLAN), when VLAN is disabled, the BMC has the
same IP address that was configured before. It is left to the management application to configure a
different IP address if that is not suitable for LAN.
70 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
IPMI 2.0 introduced a standard serial-over-LAN feature. This is implemented as a standard payload type (01h)
over RMCP+.
“Get SOL 2.0 Configuration Parameters” and “Set SOL 2.0 Configuration Parameters”: These commands
are used to get and set the values of the SOL configuration parameters. The parameters are
implemented on a per-channel basis.
“Activating SOL”: This command is not accepted by the BMC. It is sent by the BMC when SOL is
activated to notify a remote client of the switch to SOL.
Activating a SOL session requires an existing IPMI-over-LAN session. If encryption is used, it should be
negotiated when the IPMI-over LAN session is established.
The BMC supports 20 PEF filters. The first twelve entries in the PEF filter table are pre-configured (but may be
changed by the user). The remaining entries are left blank, and may be configured by the user.
Revision 2.4 71
Platform Management Functional Overview Intel® Server Board S2600GZ/GL TPS
The BMC provides an embedded “lite” version of SM-CLP that is syntax-compatible but not considered fully
compliant with the DMTF standards.
The SM-CLP utilized by a remote user by connecting a remote system from one of the system NICs. It is
possible for third party management applications to create scripts using this CLP and execute them on server
to retrieve information or perform management tasks such as reboot the server, configure events, and so on
The BMC embedded SM-CLP feature includes the following capabilities:
The embedded web server is supported over any system NIC port that is enabled for server management
capabilities.
6.10.13 Embedded Web Server
BMC Base manageability provides an embedded web server and an OEM-customizable web GUI which
exposes the manageability features of the BMC base feature set. It is supported over all on-board NICs that
72 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
have management connectivity to the BMC as well as an optional RMM4 dedicated add-in management NIC.
At least two concurrent web sessions from up to two different users is supported. The embedded web user
interface shall support the following client web browsers:
Microsoft Internet Explorer 7.0*
Microsoft Internet Explorer 8.0*
Microsoft Internet Explorer 9.0*
Mozilla Firefox 3.0*
Mozilla Firefox 3.5*
Mozilla Firefox 3.6*
The embedded web user interface supports strong security (authentication, encryption, and firewall support)
since it enables remote server configuration and control. Embedded web server uses ports #80 and #443. The
user interface presented by the embedded web user interface shall authenticate the user before allowing a
web session to be initiated. Encryption using 128-bit SSL is supported. User authentication is based on user id
and password.
The GUI presented by the embedded web server authenticates the user before allowing a web session to be
initiated. It presents all functions to all users but grays-out those functions that the user does not have privilege
to execute. (for example, if a user does not have privilege to power control, then the item shall be displayed in
grey-out font in that user’s UI display). The web GUI also provides a launch point for some of the advanced
features, such as KVM and media redirection. These features are grayed out in the GUI unless the system has
been updated to support these advanced features.
Capability to block logins for a period of time after several consecutive failed login attempts. The lock-
out period and the number of failed logins that initiates the lock-out period are configurable by the user.
Server Power Control - Ability to force into Setup on a reset.
6.10.14 Virtual Front Panel
Virtual Front Panel is the module present as “Virtual Front Panel” on the left side in the embedded web
server when "remote Control" tab is clicked.
Main Purpose of the Virtual Front Panel is to provide the front panel functionality virtually.
Virutal Front Panel (VFP) will mimic the status LED and Power LED status and Chassis ID alone. It is
automatically in sync with BMC every 40 seconds.
For any abnormal status LED state, Virtual Front Panel will get the reason behind the abnormal or status
LED changes and displayed in VFP side.
As Virtual Front Panel uses the chassis control command for power actions. It won’t log the Front button
press event since Logging the front panel press event for Virtual Front Panel press will mislead the
administrator.
For Reset from Virtual Front Panel, the reset will be done by a “Chassis control” command.
For Reset from Virtual Front Panel, the restart cause will be because of “Chassis control” command.
During Power action, Power button/Reset button should not accept the next action until current Power
action is complete and the acknowledgment from BMC is received.
EWS will provide a valid message during Power action until it completes the current Power action.
The VFP does not have any effect on whether the front panel is locked by “Set Front Panel Enables”
command.
The chassis ID LED provides a visual indication of a system being serviced. The state of the chassis ID
LED is affected by the following actions:
Toggled by turning the chassis ID button on or off.
There is no precedence or lock-out mechanism for the control sources. When a new request arrives,
previous requests are terminated. For example, if the chassis ID button is pressed, then the chassis ID
LED changes to solid on. If the button is pressed again, then the chassis ID LED turns off.
Note that the chassis ID will turn on because of the original chassis ID button press and will reflect in the
Virtual Front Panel after VFP sync with BMC. Virtual Front Panel won’t reflect the chassis LED software
blinking from software command as there is no mechanism to get the chassis ID Led status.
Only Infinite chassis ID ON/OFF from software command will reflect in EWS during automatic /manual
EWS sync up with BMC.
Virtual Front Panel help should available for virtual panel module.
At present, NMI button in VFP is disabled in Intel® S1400/S1600/S2400/S2600 Server Platforms. It can
be used in future.
A list of data that may be captured using this feature includes but is not limited to:
Platform sensor readings – This includes all “readable” sensors that can be accessed by the BMC FW
and have associated SDRs populated in the SDR repository. This does not include any “event-only”
sensors. (All BIOS sensors and some BMC and ME sensors are “event-only”; meaning that they are not
readable using an IPMI Get Sensor Reading command but rather are used just for event logging
purposes).
SEL – The current SEL contents are saved in both hexadecimal and text format.
74 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Platform Management Functional Overview
CPU/memory register data – useful for diagnosing the cause of the following system errors: CATERR,
ERR[2], SMI timeout, PERR, and SERR. The debug data is saved and timestamped for the last 3
occurrences of the error conditions.
o PCI error registers
o MSR registers
o MCH registers
BMC configuration data
o BMC FW debug log (that is, SysLog) – Captures FW debug messages.
o Non-volatile storage of captured data. Some of the captured data will be stored persistently in
the BMC’s non-volatile flash memory and preserved across AC power cycles. Due to size
limitations of the BMC’s flash memory, it is not feasible to store all of the data persistently.
SMBIOS table data. The entire SMBIOS table is captured from the last boot.
PCI configuration data for on-board devices and add-in cards. The first 256 bytes of PCI configuration
data is captured for each device for each boot.
System memory map. The system memory map is provided by BIOS on the current boot. This includes
the EFI memory map and the Legacy (E820) memory map depending on the current boot.
Power supplies debug capability.
o Capture of power supply “black box” data and power supply asset information. Power supply
vendors are adding the capability to store debug data within the power supply itself. The
platform debug feature provides a means to capture this data for each installed power supply.
The data can be analyzed by Intel for failure analysis and possibly provided to the power supply
vendor as well. The BMC gets this data from the power supplies from PMBus* manufacturer-
specific commands.
o Storage of system identification in power supply. The BMC copies board and system serial
numbers and part numbers into the power supply whenever a new power supply is installed in
the system or when the system is first powered on. This information is included as part of the
power supply black box data for each installed power supply.
Accessibility from IPMI interfaces. The platform debug file can be accessed from an external IPMI
interface (KCS or LAN).
POST code sequence for the two most recent boots. This is a best-effort data collection by the BMC as
the BMC real-time response cannot guarantee that all POST codes are captured.
Support for multiple debug files. The platform debug feature provides the ability to save data to 2
separate files that are encrypted with different passwords.
o File #1 is strictly for viewing by Intel engineering and may contain BMC log messages (that is,
syslog) and other debug data that Intel FW developers deem useful in addition to the data
specified in this document.
o File #2 can be viewed by Intel partners who have signed an NDA with Intel and its contents are
restricted to specific data items specified in this with the exception of the BMC syslog messages
and power supply “black box” data.
6.10.15.1 Output Data Format
The diagnostic feature shall output a password-protected compressed HTML file containing specific BMC and
system information. This file is not intended for end-customer usage, this file is for customer support and
engineering only.
6.10.15.2 Output Data Availability
The diagnostic data shall be available on-demand from the embedded web server, KCS, or IPMI over LAN
commands.
Category Data
Internal BMC Data BMC uptime/load
Process list
Free Memory
Detailed Memory List
Filesystem List/Info
BMC Network Info
BMC Syslog
BMC Configuration Data
External BMC Data Hex SEL listing
Human-readable SEL listing
Human-readable sensor listing
External BIOS Data BIOS configuration settings
POST codes for the two most recent boots
System Data SMBIOS table for the current boot
256 bytes of PCI config data for each PCI device
Memory Map (EFI and Legacy) for current boot
Category Data
System Data First 256 bytes of PCI config data for each PCI
device
PCI error registers
MSR registers
MCH registers
76 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Advanced Management Feature Support (RMM4)
RMM4 is comprised of two boards – RMM4 lite and the optional Dedicated Server Management NIC (DMN).
®
Table 27. Intel Remote Management Module 4 (RMM4) Options
On the server board each Intel® RMM4 component is installed at the following locations.
®
Figure 33. Intel RMM4 Lite Activation Key Installation
®
Figure 34. Intel RMM4 Dedicated Management NIC Installation
If the optional Dedicated Server Management NIC is not used then the traffic can only go through the onboard
Integrated BMC-shared NIC and will share network bandwidth with the host system. Advanced manageability
features are supported over all NIC ports enabled for server manageability.
The BMC supports an embedded KVM application (Remote Console) that can be launched from the
embedded web server from a remote console. USB1.1 or USB 2.0 based mouse and keyboard redirection are
supported. It is also possible to use the KVM-redirection (KVM-r) session concurrently with media-redirection
(media-r). This feature allows a user to interactively use the keyboard, video, and mouse (KVM) functions of
the remote server as if the user were physically at the managed server. KVM redirection console support the
following keyboard layouts: English, Dutch, French, German, Italian,
Russian, and Spanish.
KVM redirection includes a “soft keyboard” function. The “soft keyboard” is used to simulate an entire
keyboard that is connected to the remote system. The “soft keyboard” functionality supports the following
layouts: English, Dutch, French, German, Italian, Russian, and Spanish.
The KVM-redirection feature automatically senses video resolution for best possible screen capture and
provides high-performance mouse tracking and synchronization. It allows remote viewing and configuration in
pre-boot POST and BIOS setup, once BIOS has initialized video.
Other attributes of this feature include:
Encryption of the redirected screen, keyboard, and mouse
Compression of the redirected screen.
Ability to select a mouse configuration based on the OS type.
supports user definable keyboard macros.
KVM redirection feature supports the following resolutions and refresh rates:
640x480 at 60Hz, 72Hz, 75Hz, 85Hz, 100Hz
800x600 at 60Hz, 72Hz, 75Hz, 85Hz
1024x768 at 60Hx, 72Hz, 75Hz, 85Hz
1280x960 at 60Hz
1280x1024 at 60Hz
1600x1200 at 60Hz
1920x1080 (1080p),
1920x1200 (WUXGA)
1650x1080 (WSXGA+)
7.1.1 Remote Console
The Remote Console is the redirected screen, keyboard and mouse of the remote host system. To use the
Remote Console window of your managed host system, the browser must include a Java* Runtime
78 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Advanced Management Feature Support (RMM4)
Environment plug-in. If the browser has no Java support, such as with a small handheld device, the user can
maintain the remote host system using the administration forms displayed by the browser.
The Remote Console window is a Java Applet that establishes TCP connections to the BMC. The protocol that
is run over these connections is a unique KVM protocol and not HTTP or HTTPS. This protocol uses ports
#7578 for KVM, #5120 for CDROM media redirection, and #5123 for Floppy/USB media redirection. When
encryption is enabled, the protocol uses ports #7582 for KVM, #5124 for CDROM media redirection, and
#5127 for Floppy/USB media redirection. The local network environment must permit these connections to be
made, that is, the firewall and, in case of a private internal network, the NAT (Network Address Translation)
settings have to be configured accordingly.
7.1.2 Performance
The remote display accurately represents the local display. The feature adapts to changes to the video
resolution of the local display and continues to work smoothly when the system transitions from graphics to text
or vice-versa. The responsiveness may be slightly delayed depending on the bandwidth and latency of the
network.
Enabling KVM and/or media encryption will degrade performance. Enabling video compression provides the
fastest response while disabling compression provides better video quality.
For the best possible KVM performance, a 2Mb/sec link or higher is recommended.
The redirection of KVM over IP is performed in parallel with the local KVM without affecting the local KVM
operation.
7.1.3 Security
The KVM redirection feature supports multiple encryption algorithms, including RC4 and AES. The actual
algorithm that is used is negotiated with the client based on the client’s capabilities.
7.1.4 Availability
The remote KVM session is available even when the server is powered-off (in stand-by mode). No re-start of
the remote KVM session shall be required during a server reset or power on/off. An BMC reset (for example,
due to an BMC Watchdog initiated reset or BMC reset after BMC FW update) will require the session to be re-
established.
KVM sessions persist across system reset, but not across an AC power loss.
7.1.5 Usage
As the server is powered up, the remote KVM session displays the complete BIOS boot process. The user is
able interact with BIOS setup, change and save settings as well as enter and interact with option ROM
configuration screens.
At least two concurrent remote KVM sessions are supported. It is possible for at least two different users to
connect to same server and start remote KVM sessions
7.1.6 Force-enter BIOS Setup
KVM redirection can present an option to force-enter BIOS Setup. This enables the system to enter F2 setup
while booting which is often missed by the time the remote console redirects the video.
Media Redirection
The embedded web server provides a Java applet to enable remote media redirection. This may be used in
conjunction with the remote KVM feature, or as a standalone applet.
The media redirection feature is intended to allow system administrators or users to mount a remote IDE or
USB CD-ROM, floppy drive, or a USB flash disk as a remote device to the server. Once mounted, the remote
device appears just like a local device to the server, allowing system administrators or users to install software
(including operating systems), copy files, update BIOS, and so on, or boot the server from this device.
Revision 2.4 79
Advanced Management Feature Support (RMM4) Intel® Server Board S2600GZ/GL TPS
The operation of remotely mounted devices is independent of the local devices on the server. Both
remote and local devices are useable in parallel.
Either IDE (CD-ROM, floppy) or USB devices can be mounted as a remote device to the server.
It is possible to boot all supported operating systems from the remotely mounted device and to boot from
disk IMAGE (*.IMG) and CD-ROM or DVD-ROM ISO files. See the Tested/supported Operating System
List for more information.
Media redirection supports redirection for both a virtual CD device and a virtual Floppy/USB device
concurrently. The CD device may be either a local CD drive or else an ISO image file; the Floppy/USB
device may be either a local Floppy drive, a local USB device, or else a disk image file.
The media redirection feature supports multiple encryption algorithms, including RC4 and AES. The
actual algorithm that is used is negotiated with the client based on the client’s capabilities.
A remote media session is maintained even when the server is powered-off (in standby mode). No restart
of the remote media session is required during a server reset or power on/off. An BMC reset (for example,
due to an BMC reset after BMC FW update) will require the session to be re-established
The mounted device is visible to (and useable by) managed system’s OS and BIOS in both pre-boot and
post-boot states.
The mounted device shows up in the BIOS boot order and it is possible to change the BIOS boot order to
boot from this remote device.
It is possible to install an operating system on a bare metal server (no OS present) using the remotely
mounted device. This may also require the use of KVM-r to configure the OS during install.
USB storage devices will appear as floppy disks over media redirection. This allows for the installation of
device drivers during OS installation.
If either a virtual IDE or virtual floppy device is remotely attached during system boot, both the virtual IDE and
virtual floppy are presented as bootable devices. It is not possible to present only a single-mounted device type
to the system BIOS.
7.1.7 Availability
The default inactivity timeout is 30 minutes and is not user-configurable. Media redirection sessions persist
across system reset but not across an AC power loss or BMC reset.
7.1.8 Network Port Usage
The KVM and media redirection features use the following ports:
5120 – CD Redirection
5123 – FD Redirection
5124 – CD Redirection (Secure)
5127 – FD Redirection (Secure)
7578 – Video Redirection
7582 – Video Redirection (Secure)
80 Revision 2.4
Intel® Server Board S2600GZ/GL TPS On-board Connector/Header Overview
Table 29. Main Power (Slot 1) Connector Pin-out (“MAIN PWR 1”)
Revision 2.4 81
On-board Connector/Header Overview Intel® Server Board S2600GZ/GL TPS
Table 30. Main Power (Slot 2) Connector Pin-out ("MAIN PWR 2”)
Table 31. Riser Slot Power Pin-out ("OPT_12V_PWR_1" & " OPT_12V_PWR_2")
82 Revision 2.4
Intel® Server Board S2600GZ/GL TPS On-board Connector/Header Overview
Table 32. Hot Swap Backplane Power Connector Pin-out (“HSBP PWR")
Power/Sleep Button
System ID Button
System Reset Button
NMI Button
NIC Activity LEDs
Hard Drive Activity LEDs
System Status LED
System ID LED
Revision 2.4 83
On-board Connector/Header Overview Intel® Server Board S2600GZ/GL TPS
On the server board, this header is labeled “FRONT PANEL”. The following table provides the pin-out for this
header.
Power-off Non-ACPI Off System power is off, and the BIOS has not initialized the chipset.
Power-on Non-ACPI On System power is on
S5 ACPI Off Mechanical is off, and the operating system has not saved any context
to the hard disk.
S4 ACPI Off Mechanical is off. The operating system has saved context to the hard
disk.
1
S3-S1 ACPI Slow blink DC power is still on. The operating system has saved context and
gone into a level of low-power state.
S0 ACPI Steady on System and the operating system are up and running.
84 Revision 2.4
Intel® Server Board S2600GZ/GL TPS On-board Connector/Header Overview
The following table describes behavior regarding NMI signal generation and event logging by the BMC.
NMI
Signal
Causal Event Front Panel Diag Interrupt Sensor Event Logging Support
Generation
Revision 2.4 85
On-board Connector/Header Overview Intel® Server Board S2600GZ/GL TPS
86 Revision 2.4
Intel® Server Board S2600GZ/GL TPS On-board Connector/Header Overview
Revision 2.4 87
On-board Connector/Header Overview Intel® Server Board S2600GZ/GL TPS
Table 41. Single Port AHCI SATA Controller Connector Pin-out ("SATA 0" & "SATA 1")
88 Revision 2.4
Intel® Server Board S2600GZ/GL TPS On-board Connector/Header Overview
Revision 2.4 89
On-board Connector/Header Overview Intel® Server Board S2600GZ/GL TPS
Serial-B is an internal 10-pin DH-10 connector labeled “Serial_B” and has the following pin-out.
Serial-A is an external RJ45 type connector and has the following pin-out configuration.
90 Revision 2.4
Intel® Server Board S2600GZ/GL TPS On-board Connector/Header Overview
** Pin 7 of the RJ45 Serial A connector is configurable to support either a DSR (Default) signal or a DCD signal
by switching jumper locations on the 3-pin jumper block labeled “J3A2” on the server board which is located
next to the stacked external USB connectors near the back edge of the board.
Signal Pins
DSR (Default) 1-2
DCD 2-3
The server board includes a 2-pin hard drive activity LED header used with some SAS/SATA controller add-in
cards. On the server board, this header is labeled “HDD LED” and is located on the left edge of the server
board. The header has the following pin-out.
Revision 2.4 91
Reset and Recovery Jumpers Intel® Server Board S2600GZ/GL TPS
Note:
1. For safety purposes, the power cord should be disconnected from a system before removing any
system components or moving any of the on-board jumper blocks.
2. Access to jumper blocks B-E is limited, removal of Riser Card #2 may be necessary to move these
jumpers.
3. System Update and Recovery files are included in the System Update Packages (SUP) posted to
Intel’s web site.
92 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Reset and Recovery Jumpers
Note: The BIOS Recovery jumper is ONLY used to re-install a BIOS image in the event the BIOS has become
corrupted. This jumper is NOT used when the BIOS is operating normally and you need to update the BIOS
from one version to another.
1. After downloading the latest System Update Package (SUP) from the Intel Web site, copy the following
files to the root directory of a USB media device:
IPMI.EFI
IFlash32.EFI
RML.ROM
####REC.CAP (where #### = BIOS revision number)
STARTUP.NSH
Note: It may be necessary to edit the STARTUP.NSH file to ensure the ####REC.CAP file is called in
the shell script.
2. Power OFF the system.
3. Locate the BIOS Recovery Jumper on the server board and move the jumper block from pins 1-2
(default) to pins 2-3 (recovery setting).
4. Insert the recovery media into a USB port.
5. Power ON the system.
6. The system will automatically boot into the embedded EFI Shell.
7. The STARTUP.NSH file automatically executes and initiates the flash update. When complete, the
IFlash utility will display a message.
8. Power OFF the system and return the BIOS Recovery jumper to its default position.
9. Power ON the system.
10. Do *NOT* interrupt the BIOS POST during the first boot.
Note: System Update and Recovery files are included in the System Update Packages (SUP) posted to Intel’s
web site.
Revision 2.4 93
Reset and Recovery Jumpers Intel® Server Board S2600GZ/GL TPS
Note: If the ME FRC UPD jumper is moved with AC power applied, the ME will not operate
properly. The system will need have the AC power cords removed, wait for at least 10 seconds and
then reinstalled to ensure proper operation.
10. Install PCI Riser
11. Install AC power cords
12. Power on system
The jumper is normally in the de-asserted position. The system must be completely powered off (A/C power
removed) before the jumper is moved. After power is re-applied and the firmware update is complete, the
system must be powered off again and the jumper must be returned to the de-asserted position before normal
operation can begin.
94 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Light Guided Diagnostics
Revision 2.4 95
Light Guided Diagnostics Intel® Server Board S2600GZ/GL TPS
The System ID LED on the server board is tied directly to the System ID LED on system front panel if present.
When the server is powered down (transitions to the DC-off state or S5), the BMC is still on standby power and
retains the sensor and front panel status LED state established before the power-down event.
When AC power is first applied to the system, the status LED turns solid amber and then immediately changes
to blinking green to indicate that the BMC is booting. If the BMC boot process completes with no errors, the
status LED will change to solid green.
96 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Light Guided Diagnostics
Revision 2.4 97
Light Guided Diagnostics Intel® Server Board S2600GZ/GL TPS
Chassis ID
Status LED
BMC Boot/Reset State LED Comment
®
Solid Solid Nonrecoverable condition. Contact your Intel representative for
BMC/Video memory test failed
Blue Amber information on replacing this motherboard.
®
Both Universal Bootloader (u-Boot) Solid Solid Nonrecoverable condition. Contact your Intel representative for
images bad Blue Amber information on replacing this motherboard.
Blinking green indicates degraded state (no manageability), blinking
Blink
Blink blue indicates u-Boot is running but has not transferred control to
BMC in u-Boot Green
Blue 3Hz BMC Linux. Server will be in this state 6-8 seconds after BMC reset
1Hz
while it pulls the Linux image into flash.
Solid green with solid blue after an AC cycle/BMC reset, indicates that
Solid Solid
BMC Booting Linux the control has been passed from u-Boot to BMC Linux itself. It will be
Blue Green
in this state for ~10-~20 seconds.
End of BMC boot/reset process. Solid Indicates BMC Linux has booted and manageability functionality is up
Off
Normal system operation Green and running. Fault/Status LEDs operate as per usual.
98 Revision 2.4
Intel® Server Board S2600GZ/GL TPS Light Guided Diagnostics
associated Memory Slot Fault LED. These LEDs are only active when the system is in the ‘on’ state. The BMC
will not activate or change the state of the LEDs unless instructed by the BIOS.
Revision 2.4 99
Power Supply Specification Guidelines Intel® Server Board S2600GZ/GL TPS
Note: The power supply data provided in this section is for reference purposes only. It reflects Intel’s own DC
power out requirements for a 750W power supply as used in an Intel designed 2U server platform. The intent
of this section is to provide customers with a guide to assist in defining and/or selecting a power supply for
custom server platform designs that utilize the server boards detailed in this document.
Notes:
1. 12Vstby must provide 4.0A with two power supplies in parallel. The Fan may start to work when stby current >1.5A
2. Peak combined power for all outputs shall not exceed 850W.
3. Length of time peak power can be supported is based on thermal sensor and assertion of the SMBAlert# signal. Minimum
peak power duration shall be 20 seconds without asserting the SMBAlert# signal at maximum operating temperature.
Output ∆ Step Load Size Load Slew Rate Test capacitive Load
+12VSB 1.0A 0.25 A/µsec 20 µF
+12V 60% of max load 0.25 A/µsec 2000 µF
11.2.6 Grounding
The output ground of the pins of the power supply provides the output power return path. The output
connector ground pins shall be connected to the safety ground (power supply enclosure). This grounding
should be well designed to ensure passing the max allowed Common Mode Noise levels.
The power supply shall be provided with a reliable protective earth ground. All secondary circuits shall be
connected to protective earth ground. Resistance of the ground returns to chassis shall not exceed 1.0 mΩ.
This path may be used to carry DC current.
11.2.7 Closed loop stability
The power supply shall be unconditionally stable under all line/load/transient load conditions including specified
capacitive load ranges. A minimum of: 45 degrees phase margin and -10dB-gain margin is required.
Closed-loop stability must be ensured at the maximum and minimum loads as applicable.
11.2.8 Residual Voltage Immunity in Standby mode
The power supply should be immune to any residual voltage placed on its outputs (Typically a leakage voltage
through the system from standby output) up to 500mV. There shall be no additional heat generated, nor
stressing of any internal components with this voltage applied to any individual or all outputs simultaneously. It
also should not trip the protection circuits during turn on.
The residual voltage at the power supply outputs for no load condition shall not exceed 100mV when AC
voltage is applied and the PSON# signal is de-asserted.
11.2.9 Common Mode Noise
The Common Mode noise on any output shall not exceed 350mV pk-pk over the frequency band of 10Hz to
20MHz.
12VSBoutput of the power supplies are connected together in the system so that a failure or hot swap of a
redundant power supply does not cause these outputs to go out of regulation in the system.
11.2.14 Ripple/Noise
The maximum allowed ripple/noise output of the power supply is defined in the following table. This is
measured over a bandwidth of 10Hz to 20MHz at the power supply output connectors. A 10µF tantalum
capacitor in parallel with a 0.1µF ceramic capacitor is placed at the point of measurement.
AC Input
Tvout_holdup
Vout
TAC_on_delay Tpwok_low
12Vsb
Tsb_vout
T5Vsb_holdup
Tpson_on_delay
PSON
The BIOS Setup interface consists of a number of pages or screens. Each page contains information or links to
other pages. The advanced tab in Setup displays a list of general categories as links. These links lead to
pages containing a specific category’s configuration.
The following sections describe the look and behavior for the platform setup utility.
Localization – The Intel® Server Board BIOS is only available in English. However, BIOS Setup uses
the Unicode standard and is capable of displaying data and input in Setup fields in all languages
currently included in the Unicode standard.
Console Redirection – BIOS Setup is functional from Console Redirection over various terminal
emulation standards. When Console Redirection is enabled, the POST display out is in purely Text
Mode due to Redirection data transfer in a serial port data terminal emulation mode. This may limit
some functionality for compatibility, for example, usage of colors or some keys or key sequences or
support of pointing devices.
Setup screens are designed to be displayable in an 80-character x 24-line format in order to work with
Console Redirection, although that screen layout should display correctly on any format with longer
lines or more lines on the screen.
Password protection – BIOS Setup may be protected from unauthorized changes by setting an
Administrative Password in the Security screen. When an Administrative Password has been set, all
selection and data entry fields in Setup (except System Time and Date) are grayed out and cannot be
changed unless the Administrative Password has been entered.
o Note: If an Administrative Password has not been set, anyone who boots the system to Setup
has access to all selection and data entry fields in Setup and can change any of them.
12.1.1 Entering BIOS Setup
To enter the BIOS Setup using a keyboard (or emulated keyboard), press the <F2> function key during boot
time when the OEM or Intel Logo Screen or the POST Diagnostic Screen is displayed.
The following message is displayed on the Diagnostic Screen or under the Quiet Boot Logo Screen:
Press <F2> to enter setup, <F6> Boot Menu, <F12> Network Boot
Note: With a USB keyboard, it is important to wait until the BIOS “discovers” the keyboard and beeps – until
the USB Controller has been initialized and the USB keyboard activated.
When the Setup Utility is entered, the Main screen is displayed initially. However, serious errors cause the
system to display the Error Manager screen instead of the Main screen.
It is also possible to cause a boot directly to Setup using an IPMI 2.0 command “Get/Set System Boot Options”.
For details on that capability, see the explanation in the IPMI description.
Each Setup menu page contains a number of features. Each feature is associated with a value field, except
those used for informative purposes. Each value field contains configurable parameters. Depending on the
security option chosen and in effect by the password, a menu feature’s value may or may not be changed. If a
value cannot be changed, its field is made inaccessible and appears grayed out.
If “Yes” is highlighted and <Enter> is pressed, all Setup fields are set to their
default values. If “No” is highlighted and <Enter> is pressed, or if the <Esc> key is
pressed, the user is returned to where they were before <F9> was pressed without
affecting any existing field values.
<F10> Save and Exit Pressing the <F10> key causes the following message to display:
If “Yes” is highlighted and <Enter> is pressed, all changes are saved and the Setup
is exited. If “No” is highlighted and <Enter> is pressed, or the <Esc> key is
pressed, the user is returned to where they were before <F10> was pressed
without affecting any existing values.
For each of these screens, there is an image of the screen with a list of Field Descriptions which describe the
contents of each item on the screen. Each item on the screen is hyperlinked to the relevant Field Description.
Each Field Description is hyperlinked back to the screen image.
There are a number of screens in the entire Setup collection. They are organized into major categories. Each
category has a hierarchy beginning with a top-level screen from which lower-level screens may be selected.
Each top-level screen appears as a tab, arranged across the top of the Setup screen image of all top-level
screens.
There are more categories than will fit across the top of the screen, so at any given time there will be some
categories which will not appear until the user has scrolled across the tabs which are present.
The categories and the screens included in each category are listed below, with links to each of the screens
named.
System BIOS
BIOS Version <Platform.86B.xx.yy.zzzz>
Build Date <MM/DD/YYYY>
Memory
Total Memory <Amount of memory installed>
Option Values: <Date and time when the currently installed BIOS was created (built)>
Help Text: <None>
Comments: Information only. The time and date displayed are taken from the timestamp
segment of the BIOS ID String.
Back to [Main Screen]
Total Memory
Option Values: <System Date initially displays the current system calendar date,
including the day of the week>
Help Text:
System Date has configurable fields for the current Month, Day, and Year.
The year must be between 2005 and 2099.
Use [Enter] or [Tab] key to select the next field.
Use [+] or [-] key to modify the selected field.
Comments: This field will initially display the current system day of week and date. It may be
edited to change the system date. When the System Date is reset by the “BIOS Defaults” jumper, BIOS
Recovery Flash Update, or other method, the date will be the earliest date in the allowed range –
Saturday 01/01/2005.
Back to [Main Screen]
System Time
Option Values: <System Time initially displays the current system time of day, in 24-hour
format>
Help Text:
System Time has configurable fields for Hours, Minutes, and Seconds.
Hours are in 24-hour format.
Use the [Enter] or [Tab] key to select the next field.
Use the [+] or [-] key to modify the selected field.
Comments: This field will initially display the current system time (24 hour time). It may be
edited to change the system time. When the System Time is reset by the “BIOS Defaults” jumper, BIOS
Recovery Flash Update, or other method, the time will be the earliest time of day in the allowed range –
00:00:00 (although the time will updated beginning from when it is reset early in POST).
This screen is the same for all board series, selecting between the same groups of options, although the
options for different boards are not necessarily identical.
To access this screen from the Main screen or other top-level “Tab” screen, press the right or left arrow keys to
traverse the tabs at the top of the Setup screen until the Advanced screen is selected.
► Processor Configuration
► Power & Performance
► Memory Configuration
► Mass Storage Controller Configuration
► PCI Configuration
► Serial Port Configuration
► USB Configuration
► System Acoustic and Performance Configuration
To access this screen from the Main screen, select Advanced > Processor Configuration. To move to
another screen, press the <Esc> key to return to the Advanced screen, then select the desired screen.
Advanced
Processor Configuration
See following…
Processor 1 Version
See following…
Processor 2 Version
Enhanced Intel SpeedStep (R) Technology allows the system to dynamically adjust processor
voltage and core frequency, which can result in decreased average power consumption and
decreased average heat production.
Contact your OS vendor regarding OS support of this feature.
Comments: When Disabled, the processor setting reverts to running at Max TDP Core
Frequency (rated frequency).
This option is only visible if all processors installed in the system support Enhanced Intel® SpeedStep®
Technology. In order for the Intel® Turbo Boost option to be available, Enhanced Intel® SpeedStep®
Technology must be Enabled.
Back to [Processor Configuration Screen] — [Advanced Screen]
Processor C3
Comments: This option only appears when Intel® Virtualization Technology for Directed I/O is
Enabled. For some processors this will be enabled unconditionally whenever Intel® VT-d is enabled. In
that case, this option will be shown as "Enabled", and grayed out and not changeable.
Back to [Processor Configuration Screen] — [Advanced Screen]
Intel® TXT
Extended ATR
To access this screen from the Main screen, select Advanced > Power and Performance. To move to
another screen, press the <Esc> key to return to the Advanced screen, then select the desired screen.
There are four possible profiles from which to choose. When a Power and Performance Profile is chosen, that in
turn will cause the system to implement a defined list of Setup option settings and internal (non-visible) settings.
There is an explanation displayed on the screen, because of the fact that other settings may be adjusted without
specifically notifying the user.
Advanced
Power & Performance
[Performance] Optimization is strongly toward performance, even at the expense of energy efficiency.
[Balanced Performance] Weights optimization toward performance, while conserving energy.
[Balanced Power] Weights optimization toward energy conservation, with good performance.
[Power] Optimization is strongly toward energy efficiency, even at the expense of performance.
For S1400, S1600, S2400, S2600, and S4600 series boards this screen shows memory system information,
has options to select, and allows the user to select the “Configure Memory RAS and Performance” screen for
further system memory information and configuration.
This screen differs somewhat between different boards which have different memory configurations. Some
boards have one processor socket and fewer DIMMs, while other boards have two sockets or four sockets,
more DIMMs, and the boards may have RAS and Performance options if configured for them
To access this screen from the Main screen, select Advanced > Memory Configuration. To move to another
screen, press the <Esc> key to return to the Advanced screen, then select the desired screen.
Advanced
Memory Configuration
DIMM Information
DIMM_A1 <DIMM Size> <DIMM Status>
DIMM_A2 <DIMM Size> <DIMM Status>
DIMM_A3 <DIMM Size> <DIMM Status>
DIMM_B1 <DIMM Size> <DIMM Status>
~~ (repeated for B2-H2, omitted) ~~
DIMM_H3 <DIMM Size> <DIMM Status>
~~ (repeated for I1-P2, omitted) ~~
DIMM_P3 <DIMM Size> <DIMM Status>
2. Effective Memory
Option Values: <Total Effective Memory>
Help Text: <None>
Comments: Information only. Displays the amount of memory available to the OS in MB or
GB.
The Effective Memory is the Total Physical Memory minus the sum of all memory reserved for internal
usage, RAS redundancy and SMRAM.
Note: Some server operating systems do not display the total physical memory installed.
Back to [Memory Configuration Screen] — [Advanced Screen]
3. Current Configuration
Option Values: Independent Channel
Mirror
Rank Sparing
Lockstep
Help Text: <None>
Comments: Information only: Displays one of the following:
• Independent Channel – DIMMs are operating in Independent Channel Mode, the default
configuration when there is no RAS Mode configured.
• Mirror – Mirroring RAS Mode has been configured and is operational.
• Rank Sparing – Rank Sparing RAS Mode has been configured and is operational
• Lockstep – Lockstep RAS Mode has been configured and is operational
Back to [Memory Configuration Screen] — [Advanced Screen]
4. Current Memory Speed
Option Values: <Operational Memory Speed in MT/s>
Help Text: <None>
Comments: Information only. Displays the speed in MT/s at which the memory is currently
running.
The supported memory speeds are 800 MT/s, 1066 MT/s, 1333 MT/s, and 1600 MT/s. The actual
memory speed capability depends on the memory configuration.
Back to [Memory Configuration Screen] — [Advanced Screen]
5. Memory Operating Speed Selection
Option Values: Auto
800
1066
1333
1600
Help Text: Force specific Memory Operating Speed or use Auto setting.
Comments: Allows the user to select a specific speed at which memory will operate. Only
speeds that are legitimate are available, that is, the user can only specify speeds less that or equal to
the auto-selected Memory Operating Speed. The default Auto setting will select the highest achievable
Memory Operating Speed consistent with the DIMMs and processors installed.
1600 MT/s memory speed is available only on certain models.
13. DIMM_A1
14. DIMM_A2
15. DIMM_A3
16. DIMM_B1
(DIMM_B2 through DIMM_H2 omitted)
17. DIMM_H3
(DIMM_I1 through DIMM_P2 omitted)
18. DIMM_P3
Option Values: <DIMM Size> <DIMM Status>
Where DIMM Size is:
Size of DIMM in GB
Where DIMM Status is:
Installed&Operational
Not Installed
Failed/Disabled
Help Text: <None>
Comments: Information only: Displays the status of each DIMM socket present on the board.
There is one line for each DIMM socket present on the board.
For each DIMM socket, the DIMM Status reflects one of the following three possible states:
Installed&Operational – There is a DDR3 DIMM installed and operational in this slot.
Not Installed – There is no DDR3 DIMM installed in this slot.
Failed/Disabled – The DIMM installed in this slot has failed during
initialization and/or was disabled during initialization.
For each DIMM that is in the Installed&Operational state, the DIMM Size in GB of that DIMM is
displayed. This is the physical size of the DIMM, regardless of how it is counted in the Effective Memory
size.
Note: In “DIMM_XY”, X denotes the Channel Identifier A - P, and Y denotes the DIMM Slot identifier 1 -
3 within the Channel. DIMM_A2 is the DIMM socket on Channel A, Slot 2. Not all boards have the
same number of channels and slots – this is dependent on the board features.
S1400 boards can have DIMMs A1, A2 to C1, C2 (max 3 channels/2 DPC)
S1600 boards can have DIMMs A1, A2, A3 to D1, D2, D3 (max 4 channels/3 DPC)
S2400 boards can have DIMMs A1, A2 to F1, F2 (max 2 CPU/3 channels/2 DPC)
S2600 boards can have DIMMs A1, A2, A3 to H1, H2, H3 (max 2 CPU/4 chan/3 DPC)
S4600 boards can have DIMMs A1, A2, A3 to P1, P2, P3 (max 4 CPU/4 chan/3 DPC)
Back to [Memory Configuration Screen] — [Advanced Screen]
Advanced
Memory RAS and Performance Configuration
Capabilities
Comments: Information only. Displays whether the current DIMM configuration is capable of
Memory Lockstep. For Memory Lockstep to be possible, DIMM configurations on all paired channels
must be identical between the channel pair.
Back to [Memory RAS and Performance Configuration Screen] — [Memory Configuration Screen] —
[Advanced Screen]
4. Select Memory RAS Configuration
Option Values: Maximum Performance
Mirroring
Rank Sparing
Lockstep
Help Text:
Allows the user to select the memory RAS Configuration to be applied for the next boot.
Comments: Available modes depend on the current memory population. Modes which are not
listed as “possible” should not be available as choices. If the only valid choice is “Maximum
Performance”, then this option should be grayed out and unavailable.
Maximum Performance – (default) no RAS, but best memory utilization since full amount of
memory is available, operating in Independent Channel Mode.
Mirroring - most reliability by using half of memory as a mirror image, can survive an
Uncorrectable ECC Error.
Rank Sparing – offers reliability by reserving spare ranks to replace failing ranks which are
generating excessive Correctable ECC Errors.
Lockstep – allows SDDC capability with x8 DIMMs installed. No memory size impact, but does
have a performance and power penalty.
Note: since only RAS Modes which are listed as “possible” are available for selection, it is not possible
to select a RAS Mode without first installing an appropriate DIMM configuration.
Back to [Memory RAS and Performance Configuration Screen] — [Memory Configuration Screen] —
[Advanced Screen]
5. NUMA Optimized
Option Values: Enabled
Disabled
Help Text:
If enabled, BIOS includes ACPI tables that are required for NUMA-aware Operating Systems.
Comments: This option is only present for boards which have two or more processor sockets.
When a multi-socket board has only a single processor installed, this option is grayed out and set as
Disabled.
When enabled, the SRAT and SLIT ACPI tables are provided that show the locality of systems
resources, especially memory, which allows a “NUMA Aware” OS to optimize which processor threads
are used by processes which can benefit by having the best access to those resources.
Back to [Memory RAS and Performance Configuration Screen] — [Memory Configuration Screen] —
[Advanced Screen]
12.2.2.5 Mass Storage Controller Configuration
The Mass Storage Configuration screen allows the user to configure the Mass Storage controllers that are
integrated into the server board on which the BIOS is executing. This includes only onboard Mass Storage
controllers. Mass Storage controllers on add-in cards are not included in this screen, nor are other storage
mechanisms such as USB-attached storage devices or Network Attached Storage.
There are two types of onboard controller configured in this screen, the AHCI SATA controller and the Storage
Control Unit (SCU) with SATA or SAS drive support and RAID support. There are also informational displays of
AHCI and SCU controller configuration, and SATA Drive Information when applicable. If the presence of an
Intel® Storage Module is detected, the type of Storage Module is displayed as information-only.
To access this screen from the Main screen, select Advanced > Mass Storage Controller Configuration. To
move to another screen, press the <Esc> key to return to the Advanced screen, then select the desired
screen.
Advanced
Comments: Information only. This is a display showing which ports are available through the
onboard AHCI capable SATA controller, if the controller is enabled.
This information is also displayed during POST in the POST Diagnostic Screen.
The number of SATA ports available from the integrated AHCI-capable SATA Controller is dependent
on the specific server board installed in the system. Different server board designs expose different
SATA port configurations. The Platform ID (Board ID) is displayed in the Main Screen.
Back to [Mass Storage Controller Configuration Screen]
1. SATA/SAS Controller Configuration
Option Values: <SCU SAS/SATA Port Configuration>
One of these strings:
Controller is disabled
4 ports in SATA mode
4 ports in SAS mode
8 ports in SATA mode
8 ports in SAS mode
Help Text: <None>
Comments: Information only. This is a display showing the number of ports which are
available through the SCU controller, and whether they are configured for SATA or SAS.
Various SATA/SAS Capable Controller configurations require the installation of Intel® RAID C600
Upgrade Keys:
4 port SATA requires no key or AXXRKSATA4R5 key
4 port SAS requires AXXRKSAS4 or AXXRKSAS4R5 key
8 port SATA requires AXXRKSATA8 or AXXRKSATA8R5 key
8 port SAS requires AXXRKSAS8 or AXXRKSAS8R5 key
Back to [Mass Storage Controller Configuration Screen]
2. AHCI Capable SATA Controller
Option Values: Disabled
Compatibility
Enhanced
AHCI
RAID Mode
Help Text:
- Compatibility provides PATA emulation on the SATA device
- Enhanced provides Native SATA support
- AHCI enables the Advanced Host Controller Interface, which provides Enhanced SATA
functionality
- RAID Mode provides host based RAID support on the onboard SATA ports
Comments: This option configures the onboard AHCI-capable SATA controller, which is
distinct from the SCU. The number and type of ports it controls differs between board series.
If the SATA Controller is Disabled, the SATA Ports will not operate. and any installed SATA devices will
be unavailable.
Compatibility provides PATA emulation on the SATA device, allowing the use of legacy IDE/PATA
drivers. Enhanced provides Native SATA support., using native SATA drivers included with the vast
majority of current OSes. AHCI enables the Advanced Host Controller Interface, which provides
Enhanced SATA functionality. plus possible additional functionality (Native Command Queuing, Hot
Plug, Staggered Spin Up). It uses AHCI drivers available for the majority of current OSes.
RAID Mode provides host based RAID support on the onboard SATA ports. RAID levels supported and
required drivers depend on the RAID stack selected
Back to [Mass Storage Controller Configuration Screen]
AHCI eSATA Options
Once selected and set up (if necessary), individual bootable logical or physical drives available on the
selected controller will be listed in the Bootable Devices menu display.
If only one device selects RSTe, it will be available as a boot device along with any other devices – this
option is only necessary to distinguish between which RSTe device runs the Option ROM instance.
BIOS is required to designate the OPROM for the boot device selected here. Two iterations of the
OPROM cannot fully load simultaneously, and the version fully loaded will only show devices
connected to the given controller, so the OPROM load order is based on BIOS selecting the correct
device.
Note: If RSTe is selected, then only one CONTROLLER can be bootable, so there will be situations
where the boot drive *OR* an optical device will be bootable, but not both.
Please also see the product System Guide for restrictions on expander boot support.
Back to [Mass Storage Controller Configuration Screen]
Intel® Storage Module
Advanced
PCI Configuration
► NIC Configuration
Warning: System video is completely disabled if this option is disabled and an add-in video
adapter is not installed.
Comments: When disabled, the system requires an add-in video card for the video to be seen.
When there is no add-in video card installed, Onboard Video is set to Enabled and grayed out so it
cannot be changed.
If there is an add-in video card installed in a PCIe slot connected to CPU Socket 1, and the Legacy
VGA Socket option is set to CPU Socket 1, then this Onboard Video option is available to be set.
If there is an add-in video card installed on a PCIe slot connected to CPU Socket 2, and the Legacy
VGA Socket option is set to CPU Socket 2, this option is grayed out and unavailable, with a value set to
Disabled. This is because the Onboard Video is connected to CPU Socket 1, and is not functional when
CPU Socket 2 is the active path for video. When Legacy VGA Socket is set back to CPU Socket 1, this
option becomes available again, set to its default value of Enabled.
Note: This option does not appear on some models.
Back to [PCI Configuration Screen] — [Advanced Screen]
5. Legacy VGA Socket
Option Values: CPU Socket 1
CPU Socket 2
Help Text:
Determines whether Legacy VGA video output is enabled for PCIe slots attached to Processor
Socket 1 or 2. Socket 1 is the default.
Comments: This option is necessary when using an add-in video card on a PCIe slot
attached to CPU Socket 2, due to a limitation of the processor IIO. The Legacy video device can be
connected through either socket, but there is a setting that must be set on only one of the two. This
option allows the switch to using a video card in a slot connected to CPU Socket 2.
This option does not appear unless the BIOS is running on a board which have one processor installed
on CPU Socket 2 and can potentially a video card installed in a PCIe slot connected to CPU Socket 2.
This option is grayed out as unavailable and set to CPU Socket 1 unless there is a processor installed
on CPU Socket 2 and a video card installed in a PCIe slot connected to CPU Socket 2. When this
option is active and is set to CPU Socket 2, then both Onboard Video and Dual Monitor Video are set to
Disabled and grayed out as unavailable. This is because the Onboard Video is a PCIe device
connected to CPU Socket 1, and is unavailable when the Legacy VGA Socket is set to Socket 2.
To access this screen from the Main screen, select Advanced > PCI Configuration > NIC Configuration. To
move to another screen, press the <Esc> key to return to the PCI Configuration screen, if necessary press
the <Esc> key again to return to the Advanced screen, then select the desired screen.
There is usually one Onboard NIC built into the baseboard, although in some cases there are two Onboard
NICs. There are several possible types of NICs which are incorporated into different boards. When an
Infiniband* controller is on the baseboard, it appears as an Onboard NIC.
Most boards in this family also can have an IO Module that installs on the board in a specialized connector.
There are boards which can have two IO Modules installed.
The descriptive names of the Onboard NIC types are:
1. Intel® 82574 Single-Port Gigabit Ethernet Controller
For boards with only one Onboard NIC, the “Onboard NIC2” entries are not present on the screen. The number
of “Port” options which are displayed for each NIC will match the number of ports the Onboard NIC presents.
The IO Modules currently available are:
1. Intel® I350 Quad-Port Gigabit Ethernet Module
For the IO Module entries on the NIC Configuration screen, only entries for modules which are currently
installed will appear, and only ports which exist on those IO Modules will appear.
If an IO Module which had been installed is no longer installed when the system is booted, all NIC
Configuration entries which are specific to that IO Module will be reset to their default values and hidden. If a
different IO Module is installed than had been previously installed, the module-specific settings will still be
returned to defaults, but not hidden. This will not necessarily affect the Option ROM settings, which depend on
the aggregate capabilities of all installed Onboard and IO Module NICs.
For each NIC port which is present on an Onboard NIC or IO Module other than Infiniband* controllers, there
will be a port-specific PXE Boot enabling option and a MAC Address display. Onboard NICs and NIC ports also
have enable/disable options. IO Modules and the ports on them cannot be disabled by BIOS.
Infiniband* controllers which appear as Onboard NICs or as IO Modules have a slightly different format. They
do not have enable/disable options, but they do have a choice of whether to enable loading and executing the
embedded Option ROM for the controller, which will cause it to become bootable. For Infiniband*, both a GUID
and a MAC Address are displayed. The GUID is used for Infiniband* Fabric operations, and the MAC Address
is used when the controller is attached as an Ethernet device.
For non-Infiniband* NICs, there are different OPROMs for different protocols, which are also differentiated by
speed, 1 Gb or 10 Gb. For a given protocol/speed, all Ethernet controllers of the same speed use the same
Option ROM.
PXE – there are two separate PXE Option ROMs, one for 1 Gb NICs and another for 10 Gb NICs. The two are
independent of each other, but each must be the only Option ROM enabled in its speed class. If 1 GbE PXE is
enabled, then the discs OPROM cannot be enabled. If 10 GbE PXE is enabled, then neither discs nor 10 GbE
FCoE may be enabled.
discs – there is only one discs Option ROM for both 1 GbE and 10 GbE NICs. If discs is enabled, then neither
PXE nor FCoE OPROMs may be enabled for the 1 GbE or 10 GbE NICs.
FCoE – there is a 10 GbE FCoE Option ROM that supports the Intel® 82599 NIC. When it is enabled, the discs
OPROM and the 10 GbE PXE OPROM must be disabled
Note: These Option ROMs are only in support of onboard NICs and installed IO Modules. They do not support
NICs on add-in network cards, even if the NIC on an add-in card is the same type of device as an onboard NIC
or IO Module controller.
Only the Option ROMs for which controller capabilities are present are shown in the screen for selection. For
example, if there are no 10 GbE NICs installed, then the 10 GbE OPROMs will not appear for selection. If
controller capabilities are present, but all controllers with those capabilities are disabled, then the relevant
OPROM options will appear, but will be disabled and grayed out and not changeable.
Similarly, when the PXE OPROM of a given speed is disabled, all PXE port enable/disable options using that
OPROM will be disabled and grayed out. Conversely, if all ports are disabled for PXE, the PXE OPROM will be
disabled and grayed out.
When a NIC Port is disabled, the PXE enable/disable option for it will be disabled and grayed out, and the
MAC Address will be blank. When a NIC controller is disabled, all Ports and PXE options for that controller will
become disabled and grayed out and all MAC Addresses for those ports will be blank. Conversely, if all ports
for a given controller are disabled, the controller itself will appear as disabled.
Advanced
NIC Configuration
This FCoE option does not appear unless there is a FCoE-capable 10GbE NIC installed in the system
as an Onboard or IO Module NIC.
Back to [NIC Configuration Screen] — [PCI Configuration Screen] — [Advanced Screen]
5. discs 1GbE/10GbE Option ROM
Option Values: Enabled
Disabled
Help Text:
Enable/Disable Onboard/IOM NIC discs Option ROM Load.
Comments: This selection is to enable/disable the discs Option ROM that is used by all
Onboard and IO Module 1 GbE and 10 GbE controllers.
This option is grayed out and not accessible if the 1 GbE or 10GbE PXE Option ROM is enabled or if
the 10 GbE FCoE Option ROM is enabled. It can co-exist with an Infiniband* controller Option ROM.
If the discs Option ROM is disabled, and no other Option ROM is enabled, the system cannot perform a
Network Boot and cannot respond for Wake-on-LAN.
This discs option does not appear unless there is an discs-capable NIC installed in the system as an
Onboard or IO Module NIC.
Back to [NIC Configuration Screen] — [PCI Configuration Screen] — [Advanced Screen]
6. Onboard NIC1 Type
Onboard NIC2 Type
Option Values: <Onboard NIC Description>
One of these strings:
Intel® 82574 Single-Port Gigabit Ethernet Controller
Intel® I350 Dual-Port Gigabit Ethernet Controller
Intel® I350 Quad-Port Gigabit Ethernet Controller
Intel® I540 Dual-Port X540 10 Gigabit RJ-45 Controller
Mellanox* ConnectX-3* Single-Port Infiniband* FD14 Controller
Help Text: <None>
Comments: Information only. This is a display showing which NICs are available as Network
Controllers integrated into the baseboard. Each of these Onboard NICs will be followed by a section
including a group of options that are specific to the type of NIC, either as an Ethernet controller or an
Infiniband* controller.
If a board only has one onboard NIC, the second NIC Type and following options section will not
appear. If there is an Infiniband* controller integrated onboard, it will appear as NIC2.
Back to [NIC Configuration Screen] — [PCI Configuration Screen] — [Advanced Screen]
7. IO Module 1 Type
IO Module 2 Type
Option Values: <IO Module Description>
One of these strings:
Intel® I350 Quad-Port Gigabit Ethernet Module
Intel® I540 Dual-Port X540 10 Gigabit RJ-45 Module
Intel® 82599 Dual-Port 10 Gigabit SFP+ Module
Mellanox* ConnectX-3* Single-Port Infiniband* FD14 Module
Help Text: <None>
Only ports which actually exist for a particular NIC or IOM will appear in this section. That is, Port1-
Port4 will appear for a quad-port NIC, Port1-Port2 will appear for a dual-port NIC, and only Port1 will
appear for a single-port NIC.
The default state of each Port PXE Boot option is Enabled, if the corresponding PXE Boot OPROM of
the same speed is Enabled. If a PXE Boot OPROM for 1 GbE or 10 GbE changes from Disabled to
Enabled, then the Port PXE Boot option becomes Enabled for all ports of that speed
If the PXE Boot OPROM for1 GbE NICs or 10 GbE NICs is disabled, PXE Boot will be disabled and
grayed out as unchangeable for all ports on NICs or IO Modules of that same speed.
Conversely, if PXE Boot is disabled for all ports of a given speed, the corresponding PXE Option ROM
will be disabled, but not grayed out since it could be selected.
Back to [NIC Configuration Screen] — [PCI Configuration Screen] — [Advanced Screen]
31. NIC1 Port1 MAC Address
32. NIC1 Port2 MAC Address
33. NIC1 Port3 MAC Address
NIC1 Port4 MAC Address
34. NIC2 Port1 MAC Address
35. NIC2 Port2 MAC Address
36. NIC2 Port3 MAC Address
NIC2 Port4 MAC Address
37. IOM1 Port1 MAC Address
38. IOM1 Port2 MAC Address
39. IOM1 Port3 MAC Address
IOM1 Port4 MAC Address
40. IOM2 Port1 MAC Address
41. IOM2 Port2 MAC Address
42. IOM2 Port3 MAC Address
IOM2 Port4 MAC Address
Option Values: <Mac Address Display>
Help Text: <None>
Comments: Information only. 12 hex digits of the MAC address of Port1- Port4 of the Network
Controller corresponding to NIC1, NIC2, IOM1, or IOM2.
This display will appear only for ports which actually exist on the corresponding Network Controller. If
the Network Controller or port is disabled, the port MAC Address will not appear.
Back to [NIC Configuration Screen] — [PCI Configuration Screen] — [Advanced Screen]
12.2.2.8 Serial Port Configuration
The Serial Port Configuration screen allows the user to configure the Serial A and Serial B ports. In Legacy ISA
nomenclature, these are ports COM1 and COM2 respectively.
To access this screen from the Main screen, select Advanced > Serial Port Configuration. To move to
another screen, press the <Esc> key to return to the Advanced screen, then select the desired screen.
The primary usage for these serial ports is to enable Serial Console Redirection and Serial Over LAN (SOL)
capabilities. Either port can be used for Serial Console Redirection, but SOL is only supported on Serial A. See
Figure 55 for Console Redirection Configuration.
The exception to this is the W2600CR Workstation, which does not provide a Serial A port. With W2600CR,
Serial A will not appear for configuration here, and Serial B will support SOL functionality if required.
Advanced
Serial Port Configuration
4. Serial B Enable
Option Values: Enabled
Disabled
Help Text:
Enable or Disable Serial port B.
Comments: Serial Port B can be used for Serial Console Redirection. SOL cannot be routed
to Serial B except on W2600CR boards, which do not have a Serial A port.
Back to [Serial Port Configuration Screen]
5. Address
Option Values: 3F8h
2F8h
3E8h
2E8h
Help Text:
Select Serial port B base I/O address.
Comments: Legacy I/O port address.
Back to [Serial Port Configuration Screen]
6. IRQ
Option Values: 3
4
Help Text:
Select Serial port B interrupt request (IRQ) line.
Comments: Legacy IRQ
Back to [Serial Port Configuration Screen]
12.2.2.9 USB Configuration
The USB Configuration screen allows the user to configure the available USB controller options.
To access this screen from the Main screen, select Advanced > USB Configuration. To move to another
screen, press the <Esc> key to return to the Advanced screen, then select the desired screen.
This screen should display all USB Mass Storage devices which have been detected in the system. These
include USB-attached Hard Disk Drives (HDDs), Floppy Disk Drives (FDDs), CDROM and DVDROM drives,
and USB Flash Memory devices (USB Key, Keyfob, and so on).
Each USB Mass Storage device may be set to allow the media emulation for which it is formatted, or an
emulation may be specified. For USB Flash Memory devices in particular, there are some restrictions:
A USB Key formatted as a CDROM drive will be recognized as an HDD.
A USB Key formatted without a Partition Table will be forced to FDD emulation.
A USB Key formatted with one Partition Table, and less than 528 MB in size, will be forced to FDD
emulation – otherwise if it is 528 MB or greater in size, it will be forced to HDD emulation.
Note: USB devices can be “hotplugged” during POST, and will be detected and “beeped”. They will be
enumerated and displayed on this screen, though they may not be enumerated as bootable devices.
Advanced
USB Configuration
To access this screen from the Main screen, select Advanced > System Acoustic and Performance
Configuration. To move to another screen, press the <Esc> key to return to the Advanced screen, then
select the desired screen.
Advanced
System Acoustic and Performance Configuration
Help Text:
Sets Thermal Throttling mode for memory, to control fans and DRAM power as needed to
control DIMM temperatures.
[Auto] – BIOS selects mode. BIOS automatically detect and identify the appropriate thermal
throttling mechanism based on DIMM type, airflow input, DIMM sensor availability.
[DCLTT] – Dynamic Closed Loop Thermal Throttling.
[SCLTT] – Static Closed Loop Thermal Throttling.
[SOLTT] – Static Open Loop Thermal Throttling.
Comments: The Thermal Throttling Mode chosen reflects whether the DIMMs have
Temperature Sensors (TSOD), and whether the chassis is an Intel chassis for which thermal data are
available. Note that this is for thermal throttling only, independent of any controls imposed for the
purpose of power limiting.
The server board provides support for system thermal management through open loop throttling (OLTT)
and closed loop throttling (CLTT) of system memory. Normal system operation uses closed-loop
thermal throttling (CLTT) and DIMM temperature monitoring as major factors in overall thermal and
acoustics management. In the event that BIOS is unable to configure the system for CLTT, it defaults to
open-loop thermal throttling (OLTT). In the OLTT mode, it is assumed that the DIMM temperature
sensors are not available for fan speed control.
Throttling levels are changed dynamically to cap throttling based on memory and system thermal
conditions as determined by the system and DIMM power and thermal parameters. The BMC’s fan
speed control functionality is linked to the memory throttling mechanism used.
DCLTT is the expected mode for a board in an Intel chassis with inlet and outlet air
temperature sensors and TSOD. The firmware can update the offset registers for closed
loop during runtime, as BIOS sends the dynamic CLTT offset temperature data.
SCLTT would be used with an OEM chassis and DIMMs with TSOD. The firmware does not
change the offset registers for closed loop during runtime, although the Management Engine
can do so.
Both Static and Dynamic CLTT modes implement a Hybrid Closed Loop Thermal Throttling
mechanism whereby the Integrated Memory Controller estimates the DRAM temperature in
between actual reads of the memory thermal sensors.
SOLTT is intended for a system with UDIMMs which do not have TSOD. The thermal control
registers are configured during POST, and the firmware does not change them.
Back to [System Acoustic and Performance Configuration]
1. Altitude
Option Values: 300m or less
301m-900m
901m-1500m
Higher than 1500m
Help Text:
[300m or less](980ft or less) Optimal near sea level.
[301m-900m](980ft-2950ft) Optimal performance setting at moderate elevation.
[901m-1500m](2950ft-4920ft) Optimal performance setting at high elevation.
[Above 1500m](above 4920ft) Optimal performance setting at the highest elevations.
Comments: This option sets an altitude value in order to choose a Fan Profile that is
optimized for the air density at the current altitude at which the system is installed.
Lower altitude selection can lead to potential thermal risk. And higher altitude selection provides better
cooling but with undesired acoustic and fan power consumption. If the altitude is known, higher altitude
is recommended in order to provide sufficient cooling.
Back to [System Acoustic and Performance Configuration]
While Quiet Fan Idle Mode is engaged, fan sensors become unavailable and are not monitored by the
BMC.
Quiet Fan Idle Mode does not conflict with Fan PWM Offset (above) – they work in concert, with Fan
PWM Offset applied to fans in Quiet Fan Idle Mode just as when the fans are operating in “normal
mode”. A Fan PWM Offset of zero is necessary for fans to actually stop turning.
Back to [System Acoustic and Performance Configuration]
This BIOS supports (but does not require) “Strong Passwords” for security. The “Strong Password” criteria for
both Administrator and User passwords require that passwords be between 8 and 14 characters in length, and
a password must contain at least one case-sensitive alphabetic character, one numeric character, and one
special character. A warning is given when a password is set which does not meet the Strong Password
criteria, but the password is accepted.
For further security, the BIOS optionally may require a Power on Password to be entered in early POST in
order to boot the system. When Power On Password is enabled, POST is halted soon after power on while the
BIOS queries for a Power On Password. Either the Administrator or the User password may entered for a
Power on Password.
To access this screen from the Main screen or other top-level “Tab” screen, press the right or left arrow keys to
traverse the tabs at the top of the Setup screen until the Security screen is selected.
6. TPM State
Option Values: <Displays current TPM Device State>
May be:
Enabled & Activated
Enabled & Deactivated
Disabled & Activated
Disabled & Deactivated
Help Text: <None>
Comments: Information only. Shows the current TPM device state.
A Disabled TPM device does not execute commands that use the TPM functions and TPM
security operations are not available.
An Enabled & Deactivated TPM is in the same state as a disabled TPM, except that setting of
the TPM ownership is allowed if it is not present already.
An Enabled & Activated TPM executes all commands that use the TPM functions and TPM
security operations are also available.
Note: This option appears only on boards equipped with a TPM.
Back to [Security Screen]
7. TPM Administrative Control
Option Values: No Operation
Turn On
Turn Off
Clear Ownership
Help Text:
[No Operation] - No changes to current state.
[Turn On] - Enables and activates TPM.
[Turn Off] - Disables and deactivates TPM.
[Clear Ownership] - Removes TPM ownership & returns TPM to factory default state.
Note: Setting returns to [No Operation] on every boot.
Comments: Any Administrative Control operation selected will require the system to perform
a Hard Reset in order to become effective.
Note: This option appears only on boards equipped with a TPM.
Back to [Security Screen]
To access this screen from the Main screen or other top-level “Tab” screen, press the right or left arrow keys to
traverse the tabs at the top of the Setup screen until the Server Management screen is selected.
► Console Redirection
► System Information
► BMC LAN Configuration
6. Reset on ERR2
Option Values: Enabled
Disabled
Help Text:
When enabled system gets reset upon encountering ERR2 (Fatal error); when disabled system
does not get reset on ERR2
Comments: This option controls whether the system will be reset if the BMC’s ERR2 Monitor
times out, that is, the ERR2 signal has been continuously asserted long enough to indicate that the SMI
Handler is not able to service the condition
Note: If “Reset on ERR2” is Disabled, this can result in a system hang for certain error conditions,
possibly with the system unable to update the System Status LED or log an error to the SEL before
hanging.
Back to [Server Management Screen]
7. Resume on AC Power Loss
Option Values: Stay Off
Last State
Power On
Help Text:
System action to take on AC power loss recovery.
[Stay Off] - System stays off.
[Last State] - System returns to the same state before the AC power loss.
[Power On] - System powers on.
Comments: This option controls the policy that the BMC will follow when AC power is
restored after an unexpected power outage. The BMC will either hold DC power off or always turn it on
to boot the system, depending on this setting – and in the case of Last State, depending on whether
the power was on and the system was running before the AC power went off.
When this setting is changed in Setup, the new setting will be sent to the BMC. However, the BMC
maintains (“owns”) this Power Restore Policy setting, and it can be changed independently with an IPMI
command to the BMC. BIOS gets this setting from the BMC early in POST, and also for the Setup
Server Management screen.
Back to [Server Management Screen]
8. Power Restore Delay
Option Values: Disabled
Auto
Fixed
Help Text:
Allows a delay in powering up after a power failure, to reduce peak power requirements. The
delay can be fixed or automatic between 25-300 seconds.
Comments: When the AC power resume policy (above) is either Power On or Last State,
this option allows a delay to be taken after AC power is restored before the system actually begins to
power up. This delay can be either a fixed time or an “automatic” time, where “automatic” means that
the BIOS will select a randomized delay time of 25-300 seconds when it sends the Power Restore
Delay setting to the BMC.
This option will be grayed out and unavailable when the AC power resume policy is Stay Off.
The Power Restore Delay setting is maintained by BIOS. This setting does not take effect until a reboot
is done. Early in POST, the Power Restore Policy is read from the BMC, and if the policy is Power On
or Last State, the delay settings are sent to the BMC.
Bear in mind that even if the Power Restore Delay is Disabled, there will still be a delay of about 20
seconds while the BMC itself boots up after AC power is restored.
Note: This Power Restore Delay option applies only to powering on when AC is applied. It has no effect
on powering the system up using the Power Button on the Front Panel. A DC power on using the
Power Button is not delayed.
The purpose of this delay is to avoid having all systems draw “startup surge” power at the same time.
Different systems or racks of systems can be set to different delay times to spread out the startup
power draws. Alternatively, all systems can be set to Automatic, and then each system will wait for a
random period before powering up.
Back to [Server Management Screen]
9. Power Restore Delay Value
Option Values: [Entry Field 25 – 300, 25 is default]
Help Text:
Fixed time period 25-300 seconds for Power Restore Delay.
Comments: When the power restore policy is Power On or Last State, and the Power
Restore Delay selection is Fixed, this field allows for specifying how long in seconds that fixed delay
will be.
When the Power Restore Delay is Disabled or Auto, this field will be grayed out and unavailable.
The Power Restore Delay Value setting is maintained by BIOS. This setting does not take effect until
a reboot is done. Early in POST, the Power Restore Policy is read from the BMC, and if the policy is
Power On or Last State, the delay settings are sent to the BMC. When the Power Restore Delay
setting is Fixed, this delay value is used to provide the length of the delay.
Back to [Server Management Screen]
10. Clear System Event Log
Option Values: Enabled
Disabled
Help Text:
If enabled, clears the System Event Log. All current entries will be lost.
Note: This option is reset to [Disabled] after a reboot.
Comments: This option sends a message to the BMC to request it to clear the System Event
Log. The log will be cleared, and then the “Clear” action itself will be logged as an event. This give the
user a time/date for when the log was cleared.
Back to [Server Management Screen]
11. FRB-2 Enable
Option Values: Enabled
Disabled
Help Text:
Fault Resilient Boot (FRB).
BIOS programs the BMC watchdog timer for approximately 6 minutes. If BIOS does not
complete POST before the timer expires, the BMC will reset the system.
Comments: This option controls whether the system will be reset if the BMC Watchdog Timer
detects what appears to be a hang during POST. When the BMC Watchdog Timer is purposed as an
FRB-2 timer, it is initially set to allow 6 minutes for POST to complete.
However, the FRB-2 Timer is suspended during times when some lengthy operations are in progress,
like executing Option ROMS, during Setup, and when BIOS is waiting for a password. or for input to the
F6 BBS Boot Menu. The FRB-2 Timer is also suspended while POST is paused with the <Pause> key.
Back to [Server Management Screen]
12. OS Boot Watchdog Timer
Option Values: Enabled
Disabled
Help Text:
BIOS programs the watchdog timer with the timeout value selected. If the OS does not complete
booting before the timer expires, the BMC will reset the system and an error will be logged.
Requires OS support or Intel Management Software Support.
Comments: This option controls whether the system will set the BMC Watchdog to detect an
appearent to be a hang during OS booting. BIOS sets the timer before starting the OS bootstrap load
procedure. If the OS Load Watchdog Timer times out, then presumably the OS failed to boot properly.
If the OS does boot up successfully, it must be aware of the OS Load Watchdog Timer and immediately
turn it off before it expires. The OS may turn off the timer, or more often the timer may be repurposed
as an OS Watchdog Timer to protect against runtime OS hangs.
Unless the OS does have timer-aware software to support the OS Load Watchdog Timer, the system
will be unable to boot successfully with the OS Load Watchdog Timer enabled. When the timer expires
without having been reset or turned off, the system will either reset or power off repeatedly.
Back to [Server Management Screen]
13. OS Boot Watchdog Timer Policy
Option Values: Power off
Reset
Help Text:
If the OS watchdog timer is enabled, this is the system action taken if the watchdog timer
expires.
[Reset] - System performs a reset.
[Power Off] - System powers off.
Comments: This option is grayed out and unavailable when the O/S Boot Watchdog Timer is
disabled.
Back to [Server Management Screen]
14. OS Boot Watchdog Timer Timeout
Option Values: 5 minutes
10 minutes
15 minutes
20 minutes
Help Text:
If the OS watchdog timer is enabled, this is the timeout value BIOS will use to configure the
watchdog timer.
Comments: This option is grayed out and unavailable when the O/S Boot Watchdog Timer is
disabled.
Back to [Server Management Screen]
When Console Redirection is active, all POST and Setup displays are in Text Mode. The Quiet Boot setting is
disregarded, and the Text Mode POST Diagnostic Screen will be displayed regardless of the Quiet Boot setting.
This is due to the limitations of Console Redirection, which is based on data terminal emulation using a serial
data interface to transfer character data.
Console Redirection can use either of the two Serial Ports provided by the SuperIO in the BMC. However, if
Console Redirection is to be coordinated with Serial Over LAN, the user should be aware that SOL is only
supported through Serial Port A (except for W200CR, which only has Serial B and supports SOL on Serial B).
Server Management
Console Redirection
To access this screen from the Main screen, select Server Management > System Information. To move to
another screen, press the <Esc> key to return to the Server Management screen, then select the desired
screen.
Server Management
System Information
The BMC configuration screen allows the user to configure the BMC Baseboard LAN channel and an Intel®
RMM4 LAN channel, and to manage BMC User settings for up to five BMC Users.
If the Management Module is installed, it may also have a Dedicated Server Management NIC Module (DMN)
installed with it. In that case, the LAN settings for the Intel®RMM4 with Dedicated Server Management NIC
may be configured.
When there is no Management Module installed in the system, or there is an Intel® RMM4-Lite without a DMN
installed, the LAN settings specific to the Intel® RMM4 are grayed out and not available.
This screen has a choice of IPv4 or IPv6 addressing. When IPv6 is disabled, only the IPv4 addressing options
appear. When IPv6 is enabled, the IPv4 options are grayed out and unavailable, and there is an additional
section active for IPv6-addressing. This is true for both the Baseboard LAN configuration and the Intel® RMM4
with Dedicated Server Management NIC Module.
IP addresses for either IPv4 or IPv6 addressing can be assigned by static IP addresses manually typed in, or
by dynamic IP addresses supplied by a Dynamic Host Configuration Protocol (DHCP) server. IPv6 addressing
can also be provided by “stateless autoconfiguration” which does not require a DHCP server.
The BMC LAN Configuration screen is unusual in that the LAN Configuration parameters are maintained by the
BMC itself, so this screen is just a User Interface to the BMC configuration. As such, the initial values of the
LAN options shown on the screen are acquired from the BMC when this screen is initially accessed by a user,.
Any values changed by the user are communicated back to the BMC when a “Save Changes” or “Save
Changes and Exit” action is performed. If a “Discard Changes” or “Discard Changes and Exit” action is
performed instead, any accumulated changes from this screen will be disregarded and lost.
Server Management
BMC LAN Configuration
User Configuration
User ID anonymous/root/User3/User4/User5
Privilege Callback/ User/Operator/Administrator
User Status Disable/Enable
User Name [User Name display/edit]
User Password
Comments: This specifies the IP Source for IPv4 addressing for the Baseboard LAN. There is
a separate IP Source field for the Intel® RMM4 LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC, and its setting
determines whether the other Baseboard LAN IPv4 addressing fields are display-only (when Dynamic)
or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
1. IP Address
Option Values: [Entry Field 0.0.0.0, 0.0.0.0 is default]
Help Text:
View/Edit IP Address. Press <Enter> to edit.
Comments: This specifies the IPv4 Address for the Baseboard LAN. There is a separate IPv4
Address field for the Intel® RMM4 LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC. The setting of IP
Source determines whether this field is display-only (when Dynamic) or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
2. Subnet Mask
Option Values: [Entry Field 0.0.0.0, 0.0.0.0 is default]
Help Text:
View/Edit Subnet Mask. Press <Enter> to edit.
Comments: This specifies the IPv4 addressing Subnet Mask for the Baseboard LAN. There is
a separate IPv4 Subnet Mask field for the Intel® RMM4 LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC. The setting of IP
Source determines whether this field is display-only (when Dynamic) or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
3. Gateway IP
Option Values: [Entry Field 0.0.0.0, 0.0.0.0 is default]
Help Text:
View/Edit Gateway IP. Press <Enter> to edit.
Comments: This specifies the IPv4 addressing Gateway IP for the Baseboard LAN. There is
a separate IPv4 Gateway IP field for the Intel® RMM4 LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC. The setting of IP
Source determines whether this field is display-only (when Dynamic) or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
4. IPv6
Option Values: Enabled
Disabled
Help Text:
Option to Enable/Disable IPv6 addressing and any IPv6 network traffic on these channels.
Comments: The initial value for this field is acquired from the BMC. It may be changed in
order to switch between IPv4 and IPv6 addressing technologies.
When this option is set to Disabled, all other IPv6 fields will not be visible for the Baseboard LAN and
Intel® RMM4 DMN (if installed). When IPv6 addressing is Enabled, all IPv6 fields for the Baseboard
LAN and Intel® RMM4 DMN will become visible, and all IPv4 fields will be grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
5. IPv6 Source
Option Values: Static
Dynamic
Auto
Help Text:
Select BMC IPv6 source: If [Static], IPv6 parameters may be edited. If [Dynamic], these fields
are display-only and IPv6 address is acquired automatically (DHCP). If [Auto], these fields are
display-only and IPv6 address is acquired using ICMPv6 router/neighbor discovery.
Comments: This specifies the IP Source for IPv6 addressing for the Baseboard LAN
configuration. There is a separate IPv6 Source field for the Intel® RMM4 LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is Enabled, the initial value for this field is acquired from the BMC, and its
setting determines whether the other Baseboard LAN IPv6 addressing fields are display-only (when
Dynamic or Auto) or can be edited (when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
6. IPv6 Address
Option Values: [Entry Field 0000.0000.0000.0000.0000.0000.0000.0000,
0000.0000.0000.0000.0000.0000.0000.0000 is default]
Help Text:
View/Edit IPv6 address. Press <Enter> to edit. IPv6 addresses consist of 8 hexadecimal 4 digit
numbers separated by colons.
Comments: This specifies the IPv6 Address for the Baseboard LAN. There is a separate IPv6
Address field for the Intel® RMM4 LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is used, the initial value for this field is acquired from the BMC. The setting of
IPv6 Source determines whether this field is display-only (when Dynamic or Auto) or can be edited
(when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
7. Gateway IPv6
Option Values: [Entry Field 0000.0000.0000.0000.0000.0000.0000.0000,
0000.0000.0000.0000.0000.0000.0000.0000 is default]
Help Text:
View/Edit Gateway IPv6 address. Press <Enter> to edit. Gateway IPv6 addresses consist of 8
hexadecimal 4 digit numbers separated by colons.
Comments: This specifies the Gateway IPv6 Address for the Baseboard LAN. There is a
separate Gateway IPv6 Address field for the Intel® RMM4 LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is used, the initial value for this field is acquired from the BMC. The setting of
IPv6 Source determines whether this field is display-only (when Dynamic or Auto) or can be edited
(when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
8. IPv6 Prefix Length
Option Values: [Entry Field 0 – 128, 64 is default]
Help Text:
View/Edit IPv6 Prefix Length from zero to 128 (default 64). Press <Enter> to edit.
Comments: This specifies the IPv6 Prefix Length for the Baseboard LAN. There is a separate
IPv6 Prefix Length field for the Intel® RMM4 LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is used, the initial value for this field is acquired from the BMC. The setting of
IPv6 Source determines whether this field is display-only (when Dynamic or Auto) or can be edited
(when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
9. Intel® RMM4
Option Values: Not Present
®
Intel RMM4-Lite
Intel® RMM4 + DMN
Help Text: <None>
Comments: Information only. Displays whether an Intel® RMM4 component is currently
installed. This information may come from querying the BMC.
Intel® RMM4-Lite is the Management Module without the Dedicated Server Management NIC Module.
When this is present, or if the Management Module is Not Present at all, the fields for Intel® RMM4
LAN Configuration will not be visible.
When an Intel® RMM4 + DMN is installed, the options for Intel® RMM4 LAN Configuration will be
visible. When IPv6 is Disabled, the IPv4 configuration fields will be visible and the IPv6 configuration
fields will not be visible. When IPv6 is Enabled, the IPv4 fields will be grayed out and inactive, while the
IPv6 Configuration fields will be visible.
In either case, the Intel® RMM4 section IP Source or IPv6 Source will determine whether the IPv4 or
IPv6 address fields are display-only or can be edited.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
10. IP Source
Option Values: Static
Dynamic
Help Text:
Select RMM4 IP source: If [Static], IP parameters may be edited. If [Dynamic], these fields are
display-only and IP address is acquired automatically (DHCP).
Comments: This specifies the IP Source for IPv4 addressing for the Intel® RMM4 DMN LAN
connection. There is a separate IP Source field for the Baseboard LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC, and its setting
determines whether the other Intel® RMM4 DMN LAN IPv4 addressing fields are display-only (when
Dynamic) or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
11. IP Address
Option Values: [Entry Field 0.0.0.0, 0.0.0.0 is default]
Help Text:
View/Edit IP Address. Press <Enter> to edit.
Comments: This specifies the IPv4 Address for the Intel® RMM4 DMN LAN. There is a
separate IPv4 Address field for the Baseboard LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC. The setting of IP
Source determines whether this field is display-only (when Dynamic) or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
12. Subnet Mask
Option Values: [Entry Field 0.0.0.0, 0.0.0.0 is default]
Help Text:
View/Edit Subnet Mask. Press <Enter> to edit.
Comments: This specifies the IPv4 addressing Subnet Mask for the Intel® RMM4 DMN LAN.
There is a separate IPv4 Subnet Mask field for the Baseboard LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC. The setting of IP
Source determines whether this field is display-only (when Dynamic) or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
13. Gateway IP
Option Values: [Entry Field 0.0.0.0, 0.0.0.0 is default]
Help Text:
View/Edit Gateway IP. Press <Enter> to edit.
Comments: This specifies the IPv4 addressing Gateway IP for the Intel® RMM4 DMN LAN.
There is a separate IPv4 Gateway IP field for the Baseboard LAN configuration.
When IPv4 addressing is used, the initial value for this field is acquired from the BMC. The setting of IP
Source determines whether this field is display-only (when Dynamic) or can be edited (when Static).
When IPv6 addressing is enabled, this field is grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
14. IPv6 Source
Option Values: Static
Dynamic
Auto
Help Text:
Select Intel® RMM4 IPv6 source: If [Static], IPv6 parameters may be edited. If [Dynamic], these
fields are display-only and IPv6 address is acquired automatically (DHCP). If [Auto], these fields
are display-only and IPv6 address is acquired using ICMPv6 router/neighbor discovery.
Comments: This specifies the IP Source for IPv6 addressing for the Intel® RMM4 DMN LAN
configuration. There is a separate IPv6 Source field for the Baseboard LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is Enabled, the initial value for this field is acquired from the BMC, and its
setting determines whether the other Intel® RMM4 DMN LAN IPv6 addressing fields are display-only
(when Dynamic or Auto) or can be edited (when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
15. IPv6 Address
Option Values: [Entry Field 0000.0000.0000.0000.0000.0000.0000.0000,
0000.0000.0000.0000.0000.0000.0000.0000 is default]
Help Text:
View/Edit IPv6 address. Press <Enter> to edit. IPv6 addresses consist of 8 hexadecimal 4 digit
numbers separated by colons.
Comments: This specifies the IPv6 Address for the Intel® RMM4 DMN LAN. There is a
separate IPv6 Address field for the Baseboard LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is used, the initial value for this field is acquired from the BMC. The setting of
IPv6 Source determines whether this field is display-only (when Dynamic or Auto) or can be edited
(when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
16. Gateway IPv6
Option Values: [Entry Field 0000.0000.0000.0000.0000.0000.0000.0000,
0000.0000.0000.0000.0000.0000.0000.0000 is default]
Help Text:
View/Edit Gateway IPv6 address. Press <Enter> to edit. Gateway IPv6 addresses consist of 8
hexadecimal 4 digit numbers separated by colons.
Comments: This specifies the Gateway IPv6 Address for the Intel® RMM4 DMN LAN. There
is a separate Gateway IPv6 Address field for the Baseboard LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is used, the initial value for this field is acquired from the BMC. The setting of
IPv6 Source determines whether this field is display-only (when Dynamic or Auto) or can be edited
(when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
17. IPv6 Prefix Length
Option Values: [Entry Field 0 – 128, 64 is default]
Help Text:
View/Edit IPv6 Prefix Length from zero to 128 (default 64). Press <Enter> to edit.
Comments: This specifies the IPv6 Prefix Length for the Intel® RMM4 DMN LAN. There is a
separate IPv6 Prefix Length field for the Baseboard LAN configuration.
This option is only visible when the IPv6 option is set to Enabled.
When IPv6 addressing is used, the initial value for this field is acquired from the BMC. The setting of
IPv6 Source determines whether this field is display-only (when Dynamic or Auto) or can be edited
(when Static).
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
18. BMC DHCP Host Name
Option Values: [Entry Field, 2-63 characters]
Help Text:
View/Edit BMC DHCP host name. Press <Enter> to edit. Host name should start with an
alphabetic, remaining can be alphanumeric characters. Host name length may be from 2 to 63
characters.
Comments: This field is active and may be edited whenever at least one of the IP Source or
IPv6 Source options is set to Dynamic. This is the name of the DHCP Host from which dynamically
assigned IPv4 or IPv6 addressing parameters are acquired.
The initial value for this field is supplied from the BMC, if there is a DHCP Host available. The user can
edit the existing Ho or enter a different DHCP Host Name.
If none of the IP/IPv6 Source fields is set to Dynamic, then this BMC DHCP Host Name field will be
grayed out and inactive.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
19. User ID
Option Values: anonymous
root
User3
User4
User5
Help Text:
Select the User ID to configure: User1 (anonymous), User2 (root), and User3/4/5 are supported.
Comments: These 5 User IDs are fixed choices and cannot be changed. The BMC supports
15 User IDs natively, but only the first 5 are supported through this interface.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
20. Privilege
Option Values: Callback
User
Operator
Administrator
Help Text:
View/Select user privilege. User2 (root) privilege is "Administrator" and cannot be changed.
Comments: The level of privilege that is assigned for a User ID affects which functions that
user may perform.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
21. User Status
Option Values: Enabled
Disabled
Help Text:
Enable/Disable LAN access for selected user. Also enables/disables SOL, KVM, and media
redirection.
Comments: Note that status setting is Disabled by default until set to Enabled.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
22. User Name
Option Values: [Entry Field, 4 - 15 characters]
Help Text:
Press <Enter> to edit User Name. User Name is a string of 4 to 15 alphanumeric characters,
and must begin with an alphabetic character. User Name cannot be changed for User1
(anonymous) and User2 (root).
Comments: User Name can only be edited for users other than “anonymous” and “root”.
Those two User Names may not be changed.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
23. User Password
Option Values: [Popup Entry Field, 0 - 15 characters]
Help Text:
Press <Enter> key to enter password. Maximum length is 15 characters. Any ASCII printable
characters can be used: case-sensitive alphabetic, numeric, and special characters.
**Note: Password entered will override any previously set password.
Comments: This field will not indicate whether there is a password set already. There is no
display - just press <Enter> for a popup with an entry field to enter a new password. Any new password
entered will override the previous password, if there was one.
Back to [BMC LAN Configuration Screen] — [Server Management Screen]
The first boot device in the specified Boot Order which is present and is bootable during POST will be used to
boot the system, and will continue to be used to reboot the system until the boot device configuration has
changed (that is, which boot devices are present), or until the system has been powered down and booted in a
“cold” power-on boot.
Note: USB devices can be “hotplugged” during POST, and will be detected and “beeped”. They will be
enumerated and displayed on the USB Configuration Setup screen. However, they may not be enumerated as
bootable devices, depending on when in POST they were hotplugged. If they were recognized before the
enumeration of bootable devices, they will appear as Boot Devices if appropriate. If they were recognized after
Boot Device enumeration, they will not appear as a bootable device for the Boot Options screen, the Boot
Manager screen, or the F6 Boot Menu.
There are two main types of boot order control, Legacy Boot and EFI Optimized boot. These are mutually
exclusive – when EFI Optimized Boot is enabled, Legacy Boot (the default) is disabled. Within Legacy Boot
operation, there are two further methods of ordering boot devices, Dynamic Boot Order and Static Boot Order.
The default for Boot Order control is Legacy Boot, with Dynamic Boot Order. If all types of bootable devices are
installed in the system, then the default Boot Order is as follows :
CD/DVD-ROM
Floppy Disk Drive
Hard Disk Drive
PXE Network Device
BEV (Boot Entry Vector) Device
EFI Shell and EFI Boot paths
In this default Boot Order, a USB device may appear in any of several Device Classes, due to the flexibility of
USB connections and USB emulation of various types of devices.
Note: A USB Key (USB Flash Drive) can be formatted to emulate either a Floppy Drive or a Hard Drive and will
appear in that Boot Device Class. However, although it can be formatted as a CDROM Drive, it will not be
detected as such. It will be treated as a Hard Disk and will appear in the list of available Hard Drives.
► CDROM Order
► Hard Disk Order
► Floppy Order
► Network Device Order
► BEV Device Order
Note: A USB attached CDROM device will appear in this section. However, a USB Key formatted as a
CRDOM device will not – it will be detected as a Hard Disk device and will be included in the Hard Disk Order
Screen.
Revision 2.4 183
BIOS Setup Utility Intel® Server Board S2600GZ/GL TPS
To access this screen from the Main screen, select Boot Options > CDROM Order. To move to another
screen, press the <Esc> key to return to the Boot Options screen, then select the desired screen.
Boot Options
CDROM Order
To access this screen from the Main screen, select Boot Options > Hard Disk Order. To move to another
screen, press the <Esc> key to return to the Boot Options screen, then select the desired screen.
Boot Options
Hard Disk Order
To access this screen from the Main screen, select Boot Options > Floppy Order. To move to another
screen, press the <Esc> key to return to the Boot Options screen, then select the desired screen.
Boot Options
Floppy Order
To access this screen from the Main screen, select Boot Options > Network Device Order. To move to
another screen, press the <Esc> key to return to the Boot Options screen, then select the desired screen.
Boot Options
Network Device Order
To access this screen from the Main screen, select Boot Options > BEV Device Order. To move to another
screen, press the <Esc> key to return to the Boot Options screen, then select the desired screen.
Boot Options
BEV Device Order
To access this screen from the Main screen, select Boot Options > Add EFI Boot Option. To move to
another screen, press the <Esc> key to return to the Boot Options screen, then select the desired screen.
Boot Options
Add EFI Boot Option
To access this screen from the Main screen, select Boot Options > Delete EFI Boot Option. To move to
another screen, press the <Esc> key to return to the Boot Options screen, then select the desired screen.
Boot Options
Delete EFI Boot Option
Regardless of whether any other bootable devices are available, the “Internal EFI Shell” will always be
available,.
Note that this list is not in order according to the system Boot Option order. Reordering Boot Devices or even
removing them from the Boot Order completely has no effect on the Boot Manager.
To access this screen from the Main screen or other top-level “Tab” screen, press the right or left arrow keys to
traverse the tabs at the top of the Setup screen until the Boot Manager screen is selected.
To access this screen from the Main screen or other top-level “Tab” screen, press the right or left arrow keys to
traverse the tabs at the top of the Setup screen until the Error Manager screen is selected.
4. DESCRIPTION
Option Values: <N/A>
Help Text: <Description of POST Error Code>
Comments: This is a description of the meaning of the POST Error Code that is being
reported. This text actually appears in the screen space that is usually reserved for “Help” messages.
Back to [Error Manager Screen]
Note that there is a Legal Disclaimer footnote at the bottom of the Save & Exit screen:
Save Changes
Discard Changes
Comments: Selection only. Position to this line and press the <Enter> key to exit Setup with
any changes in BIOS settings saved. If there have been no changes made in the settings, the BIOS will
resume executing POST.
If changes have been made in BIOS settings, a confirmation pop-up will appear. If the “Save Changes
& Exit” action is positively confirmed,, any persistent changes will applied and saved to the BIOS
settings in NVRAM storage, then the system will reboot if necessary (which is normally the case). If the
“Save Changes & Exit” action is not confirmed, BIOS will resume executing Setup.
The <F10 > function key may also be used from anyplace in Setup to initiate a “Save Changes & Exit”
action.
Back to [Save & Exit Screen]
2. Discard Changes and Exit
Option Values: <None>
Help Text:
Exit BIOS Setup Utility without saving changes.
The [Esc] key can also be used.
Comments: Selection only. Position to this line and press the <Enter> key to exit Setup
without saving any changes in BIOS settings. If there have been no changes made in the settings, the
BIOS will resume executing POST.
If changes have been made in BIOS settings, a confirmation pop-up will appear. If the “Discard
Changes & Exit” action is positively confirmed,, all pending changes will be discarded and BIOS will
resume executing POST. If the “Discard Changes & Exit” action is not confirmed, BIOS will resume
executing Setup without discarding any changes.
The <Esc > key may also be used in Setup to initiate a “Discard Changes & Exit” action.
Back to [Save & Exit Screen]
3. Save Changes
Option Values: <None>
Help Text:
Save Changes made so far to any of the setup options.
Comments: Selection only. Position to this line and press the <Enter> key to save any
pending changes in BIOS settings. If there have been no changes made in the settings,
Also, the user should be aware that most changes require a reboot to become active. If changes have
been made and saved, without exiting Setup, the system should be rebooted later even if no additional
changes are made.
Back to [Save & Exit Screen]
4. Discard Changes
Option Values: <None>
Help Text:
Discard Changes made so far to any of the setup options.
Comments: Selection only. Position to this line and press the <Enter> key to discard any
pending unsaved changes in BIOS settings. If there have been no changes made in the settings, the
BIOS will resume executing POST.
If changes have been made in BIOS settings and not yet saved, a confirmation pop-up will appear. If
the “Discard Changes” action is positively confirmed, all pending changes will be discarded and BIOS
will resume executing POST. If the “Discard Changes” action is not confirmed, BIOS will resume
executing Setup without discarding pending changes.
Back to [Save & Exit Screen]
5. Load Default Values
Option Values: <None>
Help Text:
Load Defaults Values for all the setup options.
Comments: Selection only. Position to this line and press the <Enter> key to load default
values for all BIOS settings. These are the initial factory settings (“failsafe” settings) for all BIOS
parameters.
There will be a confirmation popup to verify that the user really meant to take this action.
After initializing all BIOS settings to default values, the BIOS will resume executing Setup, so the user
may made additional changes in the BIOS settings if necessary (for example, Boot Order) before doing
a “Save Changes and Exit” with a reboot to make the default settings take effect, including any changes
made after loading the defaults.
The <F9> function key may also be used from anyplace in Setup to initiate a “Load Default Values”
action.
Back to [Save & Exit Screen]
6. Save as User Default Values
Option Values: <None>
Help Text:
Save the changes made so far as User Default Values.
Comments: Selection only. Position to this line and press the <Enter> key to save the current
state of the settings for all BIOS parameters as a customized set of “User Default Values”.
These are a user-determined set of BIOS default settings that can be used as an alternative instead of
the initial factory settings (“failsafe” settings) for all BIOS parameters.
By changing the BIOS settings to values that the user prefers to have for defaults, and then using this
operation to save them as “User Default Values”, that version of BIOS settings can be restored at any
time by using the following “Load User Default Values” operation.
There will be a confirmation popup to verify that the user really intended to take this action.
Loading the “factory default” values with F9 or the “Load Default Values” – or by any other means –
does not affect the User Default Values. They remain set to whatever values they were saved as.
Back to [Save & Exit Screen]
7. Load User Default Values
Option Values: <None>
Help Text:
Load the User Default Values to all the setup options.
Comments: Selection only. Position to this line and press the <Enter> key to load User
Default Values for all BIOS settings. These are user-customized BIOS default settings for all BIOS
parameters, previously established by doing a “Save User Defaults” action (see above).
There will be a confirmation popup to verify that the user really intended to take this action.
Back to [Save & Exit Screen]
Sensor Type
The Sensor Type values are the values enumerated in the Sensor Type Codes table in
the IPMI specification. The Sensor Type provides the context in which to interpret the
sensor, such as the physical entity or characteristic that is represented by this sensor.
Event/Reading Type
The Event/Reading Type values are from the Event/Reading Type Code Ranges and
Generic Event/Reading Type Codes tables in the IPMI specification. Digital sensors are
a specific type of discrete sensor, which have only two states.
Event Offset/Triggers
Event Thresholds are event-generating thresholds for threshold types of sensors.
- [u,l][nr,c,nc]: upper non-recoverable, upper critical, upper non-critical, lower non-
recoverable, lower critical, lower non-critical
- uc, lc: upper critical, lower critical
Event Triggers are supported event-generating offsets for discrete type sensors. The
offsets can be found in the Generic Event/Reading Type Codes or Sensor Type Codes
tables in the IPMI specification, depending on whether the sensor event/reading type is
generic or a sensor-specific response.
Assertion/De-assertion Enables
Assertion and de-assertion indicators reveal the type of events the sensor generates:
- As: Assertions
- De: De-assertion
Readable Value/Offsets
- Readable Value indicates the type of value returned for threshold and other non-
discrete type sensors.
- Readable Offsets indicate the offsets for discrete sensors that are readable with the
Get Sensor Reading command. Unless otherwise indicated, all event triggers are
readable; Readable Offsets consist of the reading type offsets that do not generate
events.
196
Intel® Server Board S2600GZ/GL TPS Appendix B: Integrated BMC Sensor Tables
Event Data
Event data is the data that is included in an event message generated by the sensor. For
threshold-based sensors, the following abbreviations are used:
- R: Reading value
- T: Threshold value
Rearm Sensors
The rearm is a request for the event status for a sensor to be rechecked and updated
upon a transition between good and bad states. Rearming the sensors can be done
manually or automatically. This column indicates the type supported by the sensor. The
following abbreviations are used to describe a sensor:
- A: Auto-rearm
- M: Manual rearm
Default Hysteresis
The hysteresis setting applies to all thresholds of the sensor. This column provides the
count of hysteresis for the sensor, which can be 1 or 2 (positive or negative hysteresis).
Criticality
Criticality is a classification of the severity and nature of the condition. It also controls the
behavior of the Control Panel Status LED.
Standby
Some sensors operate on standby power. These sensors may be accessed and/or
generate events when the main (system) power is off, but AC power is present.
Note: All sensors listed below may not be present on all platforms. Please check platform EPS section for platform applicability and
platform chassis section for chassis specific sensors. Redundancy sensors will be only present on systems with appropriate
hardware to support redundancy (for instance, fan or power supply)
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
00 - Power down OK
02 - 240 VA power
Fatal
down
Sensor As
Power Unit Status Power Unit 04 - A/C lost OK
01h All Specific and – Trig Offset A X
(Pwr Unit Status) 09h 05 - Soft power De
6Fh
control failure
Fatal
02 - Redundancy Degraded
degraded
03 - Non-redundant: Degraded As
Note1
Power Unit Redundancy Chassis- Power Unit Generic sufficient resources.
02h and – Trig Offset A X
(Pwr Unit Redund) specific 09h 0Bh Transition from full De
redundant state.
04 – Non-redundant: Degraded
sufficient resources.
Transition from
insufficient state.
05 - Non-redundant: Fatal
insufficient resources
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
06 – Redundant: Degraded
degraded from fully
redundant state.
07 – Redundant: Degraded
Transition from non-
redundant state.
00 - Timer expired,
status only
Sensor 01 - Hard reset
IPMI Watchdog Watchdog 2 Trig Offset
03h All Specific OK As – A X
(IPMI Watchdog) 23h 02 - Power down
6Fh
03 - Power cycle
08 - Timer interrupt
Chassis Physical Sensor 00 - Chassis intrusion
Physical Security As
Intrusion is Security Specific
04h 04 - LAN leash lost OK and – Trig Offset A X
(Physical Scrty) chassis-
05h 6Fh De
specific
Critical Sensor 00 - Front panel
FP Interrupt Chassis -
05h Interrupt Specific NMI/diagnostic OK As – Trig Offset A –
(FP NMI Diag Int) specific interrupt
13h 6Fh
Digital 01 – State asserted As
SMI Timeout SMI Timeout
06h All Discrete Fatal and – Trig Offset A –
(SMI Timeout) F3h De
03h
Event
Sensor
System Event Log Logging 02 - Log area
07h All Specific OK As – Trig Offset A X
(System Event Log) Disabled reset/cleared
6Fh
10h
Sensor 02 - Undetermined As
System Event system H/W failure
System Event Specific Fatal and
08h All 12h De - Trig Offset A X
(System Event) 6Fh 04 – PEF action OK
As
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
Sensor
Button Sensor Button/Switch 00 – Power Button
09h All Specific OK AS _ Trig Offset A X
(Button) 14h 02 – Reset Button
6Fh
03 - Non-redundant:
Sufficient resources.
Degraded
Transition from
redundant
Note1 04 - Non-redundant: As
Fan Redundancy Chassis- Fan Generic Sufficient resources.
0Ch Degraded and – Trig Offset A –
(Fan Redundancy) specific 04h 0Bh Transition from De
insufficient.
05 - Non-redundant:
Non-Fatal
insufficient resources.
06 – Non-Redundant:
degraded from fully Degraded
redundant.
07 - Redundant
degraded from non- Degraded
redundant
Digital As
Temperature
SSB Thermal Trip Discrete 01 – State Asserted Fatal and – Trig Offset M X
0Dh All
(SSB Therm Trip) 01h
03h De
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
Module/Boar Digital As
IO Module Presence Platform-
0Eh d Discrete 01 – Inserted/Present OK and – Trig Offset M X
(IO Mod Presence) specific
15h 08h De
Module/Boar Digital As
SAS Module Presence Platform-
0Fh d Discrete 01 – Inserted/Present OK and – Trig Offset M X
(SAS Mod Presence) specific
15h 08h De
Sensor
BMC Firmware Health Mgmt Health Degraded
10h All Specific 04 – Sensor Failure As - Trig Offset A X
(BMC FW Health) 28h
6Fh
System Airflow Other Units Threshold
11h All – – – Analog – – –
(System Airflow) 0Bh 01h
nc = As
Baseboard Temperature 1 Platform- Temperature Threshold
20h [u,l] [c,nc] Degraded and Analog R, T A X
(Platform Specific) specific 01h 01h
c = Non-fatal De
nc = As
Front Panel Temperature Temperature Threshold
21h All [u,l] [c,nc] Degraded and Analog R, T A X
(Front Panel Temp) 01h 01h De
c = Non-fatal
nc = As
SSB Temperature Temperature Threshold
22h All [u,l] [c,nc] Degraded and Analog R, T A X
(SSB Temp) 01h 01h
c = Non-fatal De
nc = As
Baseboard Temperature 2 Platform- Temperature Threshold
23h [u,l] [c,nc] Degraded and Analog R, T A X
(Platform Specific) specific 01h 01h
c = Non-fatal De
nc = As
Baseboard Temperature 3 Platform- Temperature Threshold
24h [u,l] [c,nc] Degraded and Analog R, T A X
(Platform Specific) specific 01h 01h
c = Non-fatal De
nc = As
Baseboard Temperature 4 Platform- Temperature Threshold
25h [u,l] [c,nc] Degraded and Analog R, T A X
(Platform Specific) specific 01h 01h
c = Non-fatal De
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
nc = As
IO Module Temperature Platform- Temperature Threshold
26h [u,l] [c,nc] Degraded and Analog R, T A X
(I/O Mod Temp) specific 01h 01h
c = Non-fatal De
nc = As
PCI Riser 1 Temperature Platform- Temperature Threshold
27h [u,l] [c,nc] Degraded and Analog R, T A X
(PCI Riser 1 Temp) specific 01h 01h
c = Non-fatal De
nc = As
IO Riser Temperature Platform- Temperature Threshold
28h [u,l] [c,nc] Degraded and Analog R, T A X
(IO Riser Temp) specific 01h 01h
c = Non-fatal De
Hot-swap Backplane 1 nc = As
Chassis- Temperature Threshold
Temperature 29h [u,l] [c,nc] Degraded and Analog R, T A X
specific 01h 01h
(HSBP 1 Temp) c = Non-fatal De
Hot-swap Backplane 2 nc = As
Chassis- Temperature Threshold
Temperature 2Ah [u,l] [c,nc] Degraded and Analog R, T A X
specific 01h 01h
(HSBP 2 Temp) c = Non-fatal De
Hot-swap Backplane 3 nc = As
Chassis- Temperature Threshold
Temperature 2Bh [u,l] [c,nc] Degraded and Analog R, T A X
specific 01h 01h
(HSBP 3 Temp) c = Non-fatal De
nc = As
PCI Riser 2 Temperature Platform- Temperature Threshold
2Ch [u,l] [c,nc] Degraded and Analog R, T A X
(PCI Riser 2 Temp) specific 01h 01h
c = Non-fatal De
nc = As
SAS Module Temperature Platform- Temperature Threshold
2Dh [u,l] [c,nc] Degraded and Analog R, T A X
(SAS Mod Temp) specific 01h 01h
c = Non-fatal De
Chassis & nc = As
Exit Air Temperature Temperature Threshold
2Eh Platform [u,l] [c,nc] Degraded and Analog R, T A X
(Exit Air Temp) Specific 01h 01h De
c = Non-fatal
Network Interface Controller nc = As
Temperature Threshold
Temperature 2Fh All [u,l] [c,nc] Degraded and Analog R, T A X
01h 01h De
(LAN NIC Temp) c = Non-fatal
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
nc =
Fan Tachometer Sensors Chassis & As
30h– Fan Threshold Degraded
(Chassis specific Platform [l] [c,nc] and Analog R, T M -
3Fh 04h 01h c = Non-
sensor names) Specific Note2 De
fatal
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
nc = As
Power Supply 1 Temperature Chassis- Temperature Threshold
5Ch [u] [c,nc] Degraded and Analog R, T A X
(PS1 Temperature) specific 01h 01h
c = Non-fatal De
nc = As
Power Supply 2 Temperature Chassis- Threshold
5Dh Temperature [u] [c,nc] Degraded and Analog R, T A X
(PS2 Temperature) specific 01h
c = Non-fatal De
00 - Drive Presence OK
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
Digital As
Processor 1 ERR2 Timeout Processor
7Ch All Discrete 01 – State Asserted fatal and – Trig Offset A –
(P1 ERR2) 07h De
03h
Digital As
Processor 2 ERR2 Timeout Processor
7Dh All Discrete 01 – State Asserted fatal and – Trig Offset A –
(P2 ERR2) 07h De
03h
Digital As
Catastrophic Error Processor
80h All Discrete 01 – State Asserted fatal and – Trig Offset M –
(CATERR) 07h De
03h
Digital As
Processor0 MSID Mismatch Processor
81h All Discrete 01 – State Asserted fatal and – Trig Offset M –
(P0 MSID Mismatch) 07h De
03h
Digital As
Processor Population Fault Processor
82h All Discrete 01 – State Asserted Fatal and – Trig Offset M –
(CPU Missing) 07h De
03h
Digital As
Processor1 MSID Mismatch Processor
87h All Discrete 01 – State Asserted fatal and – Trig Offset M –
(P1 MSID Mismatch) 07h De
03h
Processor 1 VRD Digital As
Temperature
Temperature 90h All Discrete 01 - Limit exceeded Non-fatal and – Trig Offset M –
01h De
(P1 VRD Hot) 05h
Processor 2 VRD Digital As
Temperature
Temperature 91h All Discrete 01 - Limit exceeded Non-fatal and – Trig Offset M –
01h De
(P2 VRD Hot) 05h
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
Processor 2 Memory VRD Digital As
Temperature
Hot 0-1 96h All Discrete 01 - Limit exceeded Non-fatal and – Trig Offset A –
01h De
(P2 Mem01 VRD Hot) 05h
Digital As
Processor 2 DIMM Temperature
Discrete 01 – State Asserted Fatal and – Trig Offset M X
Thermal Trip C1h All
01h
(P2 Mem Thrm Trip) 03h De
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 1 C8h
Specific 01h 01h
(Agg Therm Mrgn 1)
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 2 C9h
Specific 01h 01h
(Agg Therm Mrgn 2)
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 3 CAh
Specific 01h 01h
(Agg Therm Mrgn 3)
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 4 CBh
Specific 01h 01h
(Agg Therm Mrgn 4)
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 5 CCh
Specific 01h 01h
(Agg Therm Mrgn 5)
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 6 CDh
Specific 01h 01h
(Agg Therm Mrgn 6)
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 7 CEh
Specific 01h 01h
(Agg Therm Mrgn 7)
Global Aggregate Temperature Threshold
Platform - - - Analog R, T A –
Temperature Margin 8 CFh
Specific 01h 01h
(Agg Therm Mrgn 8)
nc = As
Baseboard +12V Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
D0h All
(BB +12.0V) 02h 01h
c = Non-fatal De
nc = As
Baseboard +5V Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
D1h All
(BB +5.0V) 02h 01h
c = Non-fatal De
nc = As
Baseboard +3.3V Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
D2h All
(BB +3.3V) 02h 01h
c = Non-fatal De
nc = As
Baseboard +5V Stand-by Voltage Threshold
D3h All [u,l] [c,nc] Degraded and Analog R, T A X
(BB +5.0V STBY) 02h 01h
c = Non-fatal De
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
nc = As
Baseboard +3.3V Auxiliary Voltage Threshold
D4h All [u,l] [c,nc] Degraded and Analog R, T A X
(BB +3.3V AUX) 02h 01h
c = Non-fatal De
Baseboard +1.05V Processor nc = As
1 Vccp Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
D6h All
02h 01h
(BB +1.05Vccp P1) c = Non-fatal De
Baseboard +1.05V Processor nc = As
1 Vccp Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
D7h All
02h 01h
(BB +1.05Vccp P2) c = Non-fatal De
Baseboard +1.5V P1 Memory nc = As
AB VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
D8h All
02h 01h
(BB +1.5 P1MEM AB) c = Non-fatal De
Baseboard +1.5V P1 Memory nc = As
CD VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
D9h All
02h 01h
(BB +1.5 P1MEM CD) c = Non-fatal De
Baseboard +1.5V P2 Memory nc = As
AB VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
DAh All
02h 01h
(BB +1.5 P2MEM AB) c = Non-fatal De
Baseboard +1.5V P2 Memory nc = As
CD VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
DBh All
02h 01h
(BB +1.5 P2MEM CD) c = Non-fatal De
nc = As
Baseboard +1.8V Aux Voltage Threshold
DCh All [u,l] [c,nc] Degraded and Analog R, T A –
(BB +1.8V AUX) 02h 01h
c = Non-fatal De
nc = As
Baseboard +1.1V Stand-by Voltage Threshold
DDh All [u,l] [c,nc] Degraded and Analog R, T A –
(BB +1.1V STBY) 02h 01h
c = Non-fatal De
nc = As
Baseboard CMOS Battery Voltage Threshold
DEh All [u,l] [c,nc] Degraded and Analog R, T A –
(BB +3.3V Vbat) 02h 01h
c = Non-fatal De
Full Sensor Name Sensor Platform Sensor Type Event/Readi Event Offset Triggers Contrib. To Assert/ Readable Event Rearm Stand-
(Sensor name in SDR) # Applicability ng Type System Status De- Data by
assert Value/Of
fsets
Baseboard +1.35V P1 Low nc = As
Voltage Memory AB VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
E4h All
02h 01h
(BB +1.35 P1LV AB) c = Non-fatal De
Baseboard +1.35V P1 Low nc = As
Voltage Memory CD VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
E5h All
02h 01h
(BB +1.35 P1LV CD) c = Non-fatal De
Baseboard +1.35V P2 Low nc = As
Voltage Memory AB VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
E6h All
02h 01h
(BB +1.35 P2LV AB) c = Non-fatal De
Baseboard +1.35V P2 Low nc = As
Voltage Memory CD VDDQ Voltage Threshold [u,l] [c,nc] Degraded and Analog R, T A –
E7h All
02h 01h
(BB +1.35 P2LV CD) c = Non-fatal De
Baseboard +3.3V Riser 1 nc = As
Power Good Platform Voltage Threshold Degraded
EAh [u,l] [c,nc] and Analog R, T A –
Specific 02h 01h
(BB +3.3 RSR1 PGD) c = Non-fatal De
Baseboard +3.3V Riser 2 nc = As
Power Good Platform Voltage Threshold Degraded
EBh [u,l] [c,nc] and Analog R, T A –
Specific 02h 01h
(BB +3.3 RSR2 PGD) c = Non-fatal De
00 - Drive Presence OK
01- Drive Fault Degraded
F0h Sensor As
Hard Disk Drive 1 -15 Status Chassis- Drive Slot 07 - Rebuild/Remap in
- Specific and – Trig Offset A X
(HDD 1 - 15 Status) specific 0Dh progress
FEh 6Fh Degraded De
During the system boot process, Memory Reference Code (MRC) and System BIOS execute a number of
memory initialization and platform configuration processes, each of which is assigned a specific hex POST
code number. As each routine is started, the given POST code number is displayed to the POST Code
Diagnostic LEDs on the back edge of the server board.
During a POST system hang, the displayed post code can be used to identify the last POST routine that was
run prior to the error occurring, helping to isolate the possible cause of the hang condition.
Each POST code is represented by eight LEDs; four Green and four Amber. The POST codes are divided into
two nibbles, an upper nibble and a lower nibble. The upper nibble bits are represented by Amber Diagnostic
LEDs #4, #5, #6, #7. The lower nibble bits are represented by Green Diagnostics LEDs #0, #1, #2 and #3. If
the bit is set in the upper and lower nibbles, the corresponding LED is lit. If the bit is clear, the corresponding
LED is off.
In the following example, the BIOS sends a value of ACh to the diagnostic LED decoder. The LEDs are
decoded as follows:
Note: Diag LEDs are best read and decoded when viewing the LEDs from the back of the system
8h 4h 2h 1h 8h 4h 2h 1h
Upper nibble bits = 1010b = Ah; Lower nibble bits = 1100b = Ch; the two are concatenated as ACh
8h 4h 2h 1h 8h 4h 2h 1h
#7 #6 #5 #4 #3 #2 #1 #0
LED #
Description
SEC Phase
01h 0 0 0 0 0 0 0 1 First POST code after CPU reset
02h 0 0 0 0 0 0 1 0 Microcode load begin
03h 0 0 0 0 0 0 1 1 CRAM initialization begin
04h 0 0 0 0 0 1 0 0 Pei Cache When Disabled
05h 0 0 0 0 0 1 0 1 SEC Core At Power On Begin.
06h 0 0 0 0 0 1 1 0 Early CPU initialization during Sec Phase.
07h 0 0 0 0 0 1 1 1 Early SB initialization during Sec Phase.
08h 0 0 0 0 1 0 0 0 Early NB initialization during Sec Phase.
09h 0 0 0 0 1 0 0 1 End Of Sec Phase.
0Eh 0 0 0 0 1 1 1 0 Microcode Not Found.
0Fh 0 0 0 0 1 1 1 1 Microcode Not Loaded.
PEI Phase
10h 0 0 0 1 0 0 0 0 PEI Core
11h 0 0 0 1 0 0 0 1 CPU PEIM
15h 0 0 0 1 0 1 0 1 NB PEIM
19h 0 0 0 1 1 0 0 1 SB PEIM
MRC Process Codes – MRC Progress Code Sequence is executed - See Table 63
PEI Phase continued…
31h 0 0 1 1 0 0 0 1 Memory Installed
32h 0 0 1 1 0 0 1 0 CPU PEIM (Cpu Init)
33h 0 0 1 1 0 0 1 1 CPU PEIM (Cache Init)
34h 0 0 1 1 0 1 0 0 CPU PEIM (BSP Select)
35h 0 0 1 1 0 1 0 1 CPU PEIM (AP Init)
36h 0 0 1 1 0 1 1 0 CPU PEIM (CPU SMM Init)
4Fh 0 1 0 0 1 1 1 1 Dxe IPL started
DXE Phase
60h 0 1 1 0 0 0 0 0 DXE Core started
61h 0 1 1 0 0 0 0 1 DXE NVRAM Init
62h 0 1 1 0 0 0 1 0 SB RUN Init
63h 0 1 1 0 0 0 1 1 Dxe CPU Init
68h 0 1 1 0 1 0 0 0 DXE PCI Host Bridge Init
69h 0 1 1 0 1 0 0 1 DXE NB Init
6Ah 0 1 1 0 1 0 1 0 DXE NB SMM Init
70h 0 1 1 1 0 0 0 0 DXE SB Init
71h 0 1 1 1 0 0 0 1 DXE SB SMM Init
72h 0 1 1 1 0 0 1 0 DXE SB devices Init
78h 0 1 1 1 1 0 0 0 DXE ACPI Init
79h 0 1 1 1 1 0 0 1 DXE CSM Init
90h 1 0 0 1 0 0 0 0 DXE BDS Started
91h 1 0 0 1 0 0 0 1 DXE BDS connect drivers
92h 1 0 0 1 0 0 1 0 DXE PCI Bus begin
93h 1 0 0 1 0 0 1 1 DXE PCI Bus HPC Init
94h 1 0 0 1 0 1 0 0 DXE PCI Bus enumeration
95h 1 0 0 1 0 1 0 1 DXE PCI Bus resource requested
96h 1 0 0 1 0 1 1 0 DXE PCI Bus assign resource
8h 4h 2h 1h 8h 4h 2h 1h
#7 #6 #5 #4 #3 #2 #1 #0
LED #
Description
97h 1 0 0 1 0 1 1 1 DXE CON_OUT connect
98h 1 0 0 1 1 0 0 0 DXE CON_IN connect
99h 1 0 0 1 1 0 0 1 DXE SIO Init
9Ah 1 0 0 1 1 0 1 0 DXE USB start
9Bh 1 0 0 1 1 0 1 1 DXE USB reset
9Ch 1 0 0 1 1 1 0 0 DXE USB detect
9Dh 1 0 0 1 1 1 0 1 DXE USB enable
A1h 1 0 1 0 0 0 0 1 DXE IDE begin
A2h 1 0 1 0 0 0 1 0 DXE IDE reset
A3h 1 0 1 0 0 0 1 1 DXE IDE detect
A4h 1 0 1 0 0 1 0 0 DXE IDE enable
A5h 1 0 1 0 0 1 0 1 DXE SCSI begin
A6h 1 0 1 0 0 1 1 0 DXE SCSI reset
A7h 1 0 1 0 0 1 1 1 DXE SCSI detect
A8h 1 0 1 0 1 0 0 0 DXE SCSI enable
A9h 1 0 1 0 1 0 0 1 DXE verifying SETUP password
ABh 1 0 1 0 1 0 1 1 DXE SETUP start
ACh 1 0 1 0 1 1 0 0 DXE SETUP input wait
ADh 1 0 1 0 1 1 0 1 DXE Ready to Boot
AEh 1 0 1 0 1 1 1 0 DXE Legacy Boot
AFh 1 0 1 0 1 1 1 1 DXE Exit Boot Services
B0h 1 0 1 1 0 0 0 0 RT Set Virtual Address Map Begin
B1h 1 0 1 1 0 0 0 1 RT Set Virtual Address Map End
B2h 1 0 1 1 0 0 1 0 DXE Legacy Option ROM init
B3h 1 0 1 1 0 0 1 1 DXE Reset system
B4h 1 0 1 1 0 1 0 0 DXE USB Hot plug
B5h 1 0 1 1 0 1 0 1 DXE PCI BUS Hot plug
B6h 1 0 1 1 0 1 1 0 DXE NVRAM cleanup
B7h 1 0 1 1 0 1 1 1 DXE Configuration Reset
00h 0 0 0 0 0 0 0 0 INT19
S3 Resume
E0h 1 1 1 0 0 0 0 0 S3 Resume PEIM (S3 started)
E1h 1 1 1 0 0 0 0 1 S3 Resume PEIM (S3 boot script)
E2h 1 1 1 0 0 0 1 0 S3 Resume PEIM (S3 Video Repost)
E3h 1 1 1 0 0 0 1 1 S3 Resume PEIM (S3 OS wake)
BIOS Recovery
F0h 1 1 1 1 0 0 0 0 PEIM which detected forced Recovery condition
F1h 1 1 1 1 0 0 0 1 PEIM which detected User Recovery condition
F2h 1 1 1 1 0 0 1 0 Recovery PEIM (Recovery started)
F3h 1 1 1 1 0 0 1 1 Recovery PEIM (Capsule found)
F4h 1 1 1 1 0 1 0 0 Recovery PEIM (Capsule loaded)
The MRC Progress Codes are displays to the Diagnostic LEDs that show the execution point in the MRC
operational path at each step.
Checkpoint
MSB
LSB Description
8h 4h 2h 1h 8h 4h 2h 1h
#3 #2 #1 #0
LED #7 #6 #5 #4
MRC Progress Codes
B0h 1 0 1 1 0 0 0 0 Detect DIMM population
B1h 1 0 1 1 0 0 0 1 Set DDR3 frequency
B2h 1 0 1 1 0 0 1 0 Gather remaining SPD data
B3h 1 0 1 1 0 0 1 1 Program registers on the memory controller level
B4h 1 0 1 1 0 1 0 0 Evaluate RAS modes and save rank information
B5h 1 0 1 1 0 1 0 1 Program registers on the channel level
B6h 1 0 1 1 0 1 1 0 Perform the JEDEC defined initialization sequence
B7h 1 0 1 1 0 1 1 1 Train DDR3 ranks
B8h 1 0 1 1 1 0 0 0 Initialize CLTT/OLTT
B9h 1 0 1 1 1 0 0 1 Hardware memory test and init
BAh 1 0 1 1 1 0 1 0 Execute software memory init
BBh 1 0 1 1 1 0 1 1 Program memory map and interleaving
BCh 1 0 1 1 1 1 0 0 Program RAS configuration
BFh 1 0 1 1 1 1 1 1 MRC is done
Memory Initialization at the beginning of POST includes multiple functions, including: discovery, channel
training, validation that the DIMM population is acceptable and functional, initialization of the IMC and other
hardware settings, and initialization of applicable RAS configurations.
When a major memory initialization error occurs and prevents the system from booting with data integrity, a
beep code is generated, the MRC will display a fatal error code on the diagnostic LEDs, and a system halt
command is executed. Fatal MRC error halts do NOT change the state of the System Status LED, and they do
NOT get logged as SEL events. The following table lists all MRC fatal errors that are displayed to the
Diagnostic LEDs.
8h 4h 2h 1h 8h 4h 2h 1h
#7 #6 #5 #4 #3 #2 #1 #0
LED
MRC Fatal Error Codes
8h 4h 2h 1h 8h 4h 2h 1h
#7 #6 #5 #4 #3 #2 #1 #0
LED
02h = Memory DIMMs on all channels of all sockets are disabled due to
hardware memtest error.
3h = No memory installed. All channels are disabled.
E9h Memory is locked by Intel Trusted Execution Technology and is
1 1 1 0 1 0 0 1
inaccessible
EAh DDR3 channel training error
01h = Error on read DQ/DQS (Data/Data Strobe) init
1 1 1 0 1 0 1 0 02h = Error on Receive Enable
3h = Error on Write Leveling
04h = Error on write DQ/DQS (Data/Data Strobe
EBh Memory test failure
01h = Software memtest failure.
02h = Hardware memtest failed.
1 1 1 0 1 0 1 1
03h = Hardware Memtest failure in Lockstep Channel mode requiring a
channel to be disabled. This is a fatal error which requires a reset and
calling MRC with a different RAS mode to retry.
EDh DIMM configuration population error
01h = Different DIMM types (UDIMM, RDIMM, LRDIMM) are detected
installed in the system.
02h = Violation of DIMM population rules.
1 1 1 0 1 1 0 1
03h = The 3rd DIMM slot cannot be populated when QR DIMMs are
installed.
04h = UDIMMs are not supported in the 3rd DIMM slot.
05h = Unsupported DIMM Voltage.
EFh Indicates a CLTT table structure error
1 1 1 0 1 1 1 1
There are exception cases in early initialization where system resources are not adequately
initialized for handling POST Error Code reporting. These cases are primarily Fatal Error
conditions resulting from initialization of processors and memory, and they are handed by a
Diagnostic LED display with a system halt.
The following table lists the supported POST Error Codes. Each error code is assigned an error
type which determines the action the BIOS will take when the error is encountered. Error types
include Minor, Major, and Fatal. The BIOS action for each is defined as follows:
Minor: The error message is displayed on the screen or on the Error Manager screen, and an
error is logged to the SEL. The system continues booting in a degraded state. The user may
want to replace the erroneous unit. The POST Error Pause option setting in the BIOS setup
does not have any effect on this error.
Major: The error message is displayed on the Error Manager screen, and an error is logged to
the SEL. The POST Error Pause option setting in the BIOS setup determines whether the
system pauses to the Error Manager for this type of error so the user can take immediate
corrective action or the system continues booting.
Note that for 0048 “Password check failed”, the system halts, and then after the next
reset/reboot will displays the error code on the Error Manager screen.
Fatal: The system halts during post at a blank screen with the text “Unrecoverable fatal error
found. System will not boot until the error is resolved” and “Press <F2> to enter setup”
The POST Error Pause option setting in the BIOS setup does not have any effect with this class
of error.
When the operator presses the F2 key on the keyboard, the error message is displayed on the
Error Manager screen, and an error is logged to the SEL with the error code. The system cannot
boot unless the error is resolved. The user needs to replace the faulty part and restart the
system.
Note: The POST error codes in the following table are common to all current generation Intel
server platforms. Features present on a given server board/system will determine which of the
listed error codes are supported.
The Integrated BMC may generate beep codes upon detection of failure conditions. Beep codes
are sounded each time the problem is discovered, such as on each power-up attempt, but are
not sounded continuously. Codes that are common across all Intel server boards and systems
that use same generation chipset are listed in the following table. Each digit in the code is
represented by a sequence of beeps whose count is equal to the digit.
®
Figure 70. Intel Server System R1000GZ/GL
®
Figure 71. Intel Server System R2000GZ/GL
®
Table 71. Intel Server System R1000GZ/GL Product Family Feature Set
Feature Description
®
Security Intel Trusted Platform Module (TPM) - AXXTPME5 (Accessory Option)
Integrated Baseboard Management Controller, IPMI 2.0 compliant
®
Support for Intel Server Management Software
Server Management ®
Intel Remote Management Module 4 Lite – Accessory Option
®
Intel Remote Management Module 4 Management NIC – Accessory Option
Feature Description
The server system can have up to two power supply modules installed, providing support
for the following power configurations: 1+0, 1+1 Redundant Power, and 2+0 Combined
Power
Power Supply Three power supply options:
Options o AC 460W Gold
o AC 750W Platinum
o DC 750W
The server system can have up to two power supply modules installed, providing support
for the following power configurations: 1+0, 1+1 Redundant Power, and 2+0 Combined
Power
Power Supply
Options Three power supply options:
o AC 460W Gold
o AC 750W Platinum
4x – 3.5” SATA/SAS Hot Swap Hard Drive Bays + Optical Drive support
Storage Bay Options
8x – 2.5” SATA/SAS Hot Swap Hard Drive Bays + Optical Drive support (capable)
Tool-less rack mount rail kit – Intel Product Code – AXXPRAIL
Supported Rack Value rack mount rail kit – Intel Product Code – AXXVRAIL
Mount Kit Accessory
Cable Management Arm – Intel Product Code – AXX1U2UCMA (*supported with
Options
AXXPRAIL only)
2-post fixed mount bracket kit – Intel Product Code – AXX2POSTBRCKT
Notes:
1. With a system fan failure, processor throttling may occur.
2. Processor throttling may occur with systems configured using the following processors: E5-2690, E5-2643.
® ®
3. Intel Xeon processor E5-2600 v2 product family only
®
Table 72. Intel Server System R2000GZ/GL Product Family Feature Set
Feature Description
Support for one or two processors:
® ® 1,2
Processor Support o Intel Xeon processor E5-2600 product family with TDP support up to 135 W
® ®
o Intel Xeon processor E5-2600 v2 product family with TDP support up to 130 W
S2600GL - 16 DIMM slots – 2 DIMMs/Channel – 4 memory channels per processor
S2600GZ - 24 DIMM slots – 3 DIMMs/Channel – 4 memory channels per processor
Unbuffered DDR3 (UDIMM), Registered DDR3 (RDIMM), and Load Reduced DDR3
Memory (LRDIMM)
3
Memory DDR3 data transfer rates of 800, 1066, 1333 MT/s,1600 and 1866 MT/s
DDR3 standard I/O voltage of 1.5V and DDR3 Low Voltage of 1.35V
®
Chipset Intel C602 chipset with support for optional Storage Option Select keys
Video – Back Panel + Front Panel on Non-Max Hard drive SKUs
External I/O RJ-45 Serial- A Port
connections Four RJ-45 Network Interface Connectors supporting 10/100/1000Mb
USB 2.0 connectors - 3 on back panel + 2 on front panel on non-max hard drive SKUs
Internal I/O One Type-A USB 2.0 connector
connectors/headers One DH-10 Serial-B port connector
The following I/O modules utilize a single proprietary on-board connector. An installed I/O
module can be supported in addition to standard on-board features and any add-in expansion
cards.
AXX4P1GBPWLIOM – Quad port 1 GbE based on Intel® Ethernet Controller I350
AXX10GBTWLIOM – Dual RJ-45 port 10GBase-T I/O Module based on Intel® Ethernet
Controller x540
Optional I/O Module
support AXX10GBNIAIOM – Dual SFP+ port 10GbE module based on Intel® 82599 10 GbE
controller
AXX1FDRIBIOM – Single Port FDR 56GT/S speed InfiniBand module with QSFP
connector
AXX2FDRIBIOM – Dual port FDR 56GT/S speed infiniband module with QSFP connector
®
AXXQAAIOMOD - Intel Quick Assist Accelerator Card
Five managed system fans
System Fans
One power supply fan for each installed power supply module
Support for two riser card slots. Each riser card slot has support for the following riser card
options:
3-slot PCIe Riser Card: (Slots 1 & 2) – PCIe x16 slot, x8 lanes, (Slot 3) – PCIe x8 slot, x8
Riser Cards lanes
2-slot PCIe Riser Card: (Slot 1) – PCIe x16 slot, x16 lanes, (Slot 2) – PCIe x8 slot, x8
lanes
3-slot PCIx/PCIe Riser Card: (Slots 1 & 2) – PCIx 64-bit, (Slot 3) – PCIe x8 slot, x8 lanes
Integrated 2D Video Controller
Video
16 MB DDR3 Memory
One eUSB 2x5 pin connector to support 2mm low-profile eUSB solid state devices
Two 7-pin single port AHCI SATA connectors capable of supporting up to 6 GB/sec
On-board storage Two SCU 4-port mini-SAS connectors capable of supporting up to 3 GB/sec SAS/SATA
controllers and ®
options Intel Integrated RAID module support (Optional)
®
Intel RAID C600 Upgrade Key support providing optional expanded SATA/SAS RAID
capabilities
®
Security Intel Trusted Platform Module (TPM) - AXXTPME5 (Accessory Option)
Refer to the Technical Product Specification for each these two Intel® Server Product families
for more information.
Glossary
This appendix contains important terms used in this document. For ease of use, numeric entries
are listed first (for example, “82460GX”) followed by alpha entries (for example, “AGP 4x”).
Acronyms are followed by non-acronyms.
Term Definition
ACPI Advanced Configuration and Power Interface
AP Application Processor
APIC Advanced Programmable Interrupt Control
ARP Address Resolution Protocal
ASIC Application Specific Integrated Circuit
ASMI Advanced Server Management Interface
BIOS Basic Input/Output System
BIST Built-In Self Test
BMC Baseboard Management Controller
BPP Bits per pixel
Bridge Circuitry connecting one computer bus to another, allowing an agent on one to access the other
BSP Bootstrap Processor
Byte 8-bit quantity
CBC Chassis Bridge Controller (A microcontroller connected to one or more other CBCs, together they
bridge the IPMB buses of multiple chassis.
CEK Common Enabling Kit
CHAP Challenge Handshake Authentication Protocol
CMOS Complementary Metal-oxide-semiconductor
In terms of this specification, this describes the PC-AT compatible region of battery-backed 128 bytes
of memory, which normally resides on the server board.
DHCP Dynamic Host Configuration Protocal
DPC Direct Platform Control
EEPROM Electrically Erasable Programmable Read-Only Memory
EHCI Enhanced Host Controller Interface
EMP Emergency Management Port
EPS External Product Specification
ESB2 Enterprise South Bridge 2
FBD Fully Buffered DIMM
F MB Flexible Mother Board
FRB Fault Resilient Booting
FRU Field Replaceable Unit
FSB Front Side Bus
GB 1024 MB
GPA Guest Physical Address
GPIO General Purpose I/O
GTL Gunning Transceiver Logic
HPA Host Physical Address
HSC Hot-swap Controller
Hz Hertz (1 cycle/second)
Term Definition
2
IC Inter-Integrated Circuit Bus
®
IA Intel Architecture
IBF Input Buffer
ICH I/O Controller Hub
ICMB Intelligent Chassis Management Bus
IERR Internal Error
IFB I/O and Firmware Bridge
ILM Independent Loading Mechanism
IMC Integrated Memory Controller
INTR Interrupt
I/OAT I/O Acceleration Technology
IOH I/O Hub
IP Internet Protocol
IPMB Intelligent Platform Management Bus
IPMI Intelligent Platform Management Interface
IR Infrared
ITP In-Target Probe
KB 1024 bytes
KCS Keyboard Controller Style
KVM Keyboard, Video, Mouse
LAN Local Area Network
LCD Liquid Crystal Display
LDAP Local Directory Authentication Protocol
LED Light Emitting Diode
LPC Low Pin Count
LUN Logical Unit Number
MAC Media Access Control
MB 1024 KB
MCH Memory Controller Hub
MD2 Message Digest 2 – Hashing Algorithm
MD5 Message Digest 5 – Hashing Algorithm – Higher Security
ME Management Engine
MMU Memory Management Unit
ms Milliseconds
MTTR Memory Type Range Register
Mux Multiplexor
NIC Network Interface Controller
NMI Nonmaskable Interrupt
OBF Output Buffer
OEM Original Equipment Manufacturer
Ohm Unit of electrical resistance
OVP Over-voltage Protection
PECI Platform Environment Control Interface
PEF Platform Event Filtering
PEP Platform Event Paging
Term Definition
PIA Platform Information Area (This feature configures the firmware for the platform hardware)
PLD Programmable Logic Device
PMI Platform Management Interrupt
POST Power-On Self Test
PSMI Power Supply Management Interface
PWM Pulse-Width Modulation
QPI QuickPath Interconnect
RAM Random Access Memory
RASUM Reliability, Availability, Serviceability, Usability, and Manageability
RISC Reduced Instruction Set Computing
RMII Reduced Media-Independent Interface
ROM Read Only Memory
RTC Real-Time Clock (Component of ICH peripheral chip on the server board)
SDR Sensor Data Record
SECC Single Edge Connector Cartridge
SEEPROM Serial Electrically Erasable Programmable Read-Only Memory
SEL System Event Log
SIO Server Input/Output
SMBUS* System Management BUS
SMI Server Management Interrupt (SMI is the highest priority non-maskable interrupt)
SMM Server Management Mode
SMS Server Management Software
SNMP Simple Network Management Protocol
SPS Server Platform Services
SSE2 Streaming SIMD Extensions 2
SSE3 Streaming SIMD Extensions 3
SSE4 Streaming SIMD Extensions 4
TBD To Be Determined
TDP Thermal Design Power
TIM Thermal Interface Material
UART Universal Asynchronous Receiver/Transmitter
UDP User Datagram Protocol
UHCI Universal Host Controller Interface
URS Unified Retention System
UTC Universal time coordinare
VID Voltage Identification
VRD Voltage Regulator Down
VT Virtualization Technology
Word 16-bit quantity
WS-MAN Web Services for Management
ZIF Zero Insertion Force
Reference Documents
13 GND 14 TX_CTL
15 GND 16 RX_CTL
17 GND 18 RXD_0
19 GND 20 RXD_1
21 GND 22 RXD_2
23 GND 24 RXD_3
25 GND 26 TX_CLK
27 GND 28 RX_CLK
29 GND 30 PRESENT#