Keyboard and mouse, Acpi, Security – Intel SHG2 User Manual

Page 17: Security with mechanical locks and monitoring

Advertising
background image

Description 17

Keyboard and Mouse

The keyboard/mouse controller is PS/2-compatible. If specified through the System Setup Utility
(SSU), the server may be locked automatically if there is no keyboard or mouse activity for a
predefined length of time. Once the inactivity (lockout) timer has expired, the keyboard and mouse
do not respond until the previously stored password is entered.

ACPI

The SHG2 supports the Advanced Configuration and Power Interface (ACPI) as defined by the
ACPI 1.0b. An ACPI-aware operating system can put the system into a sleep state where the hard
drives spin down, the system fans stop, and all processing is halted. However, the power supply
will still be on and the processors will still be dissipating some power, so the power supply fan and
processor fans will still run.

The SHG2 supports sleep states s0, s1, s4, and s5.
• s0: Normal running state.
• s1: Processor sleep state: No context will be lost in this state and the processor caches will

maintain coherency.

• s4: Hibernate or Save to Disk: The memory and machine state are saved to disk. Pressing the

power button or other wakeup event will restore the system state from the disk and resume
normal operation. This assumes that no hardware changes have been made to the system while
it was off.

• s5: Soft off: Only the real time clock (RTC) section of the chipset and the Baseboard

Management Controller (BMC) are running in this state.

CAUTION

The system is off only when the AC power is disconnected.

Security

To help prevent unauthorized entry or use of the server, Intel

®

Server Management software

monitors the system intrusion switch.

Security with Mechanical Locks and Monitoring

If installed, you can activate the chassis intrusion alarm switch. When the side door is opened, the
switch transmits an alarm signal to the server board, where BMC firmware and server management
software process the signal. The system can be programmed to respond to an intrusion by locking
the keyboard, for example.

Advertising