Cisco Cisco UCS B440 M2 High-Performance Blade Server Ficha De Dados

Página de 74
Cisco UCS B200 M4 Blade Server
30
CONFIGURING the SERVER
STEP 7
ORDER TRUSTED PLATFORM MODULE (OPTIONAL)
Trusted Platform Module (TPM) is a computer chip or microcontroller that can securely store 
artifacts used to authenticate the platform or server. These artifacts can include passwords, 
certificates, or encryption keys. A TPM can also be used to store platform measurements that 
help ensure that the platform remains trustworthy. Authentication (ensuring that the platform 
can prove that it is what it claims to be) and attestation (a process helping to prove that a 
platform is trustworthy and has not been breached) are necessary steps to ensure safer 
computing in all environments. See 
 for the mounting location of the TPM.
The TPM ordering information is listed in 
.
Table 11
  Trusted Platform Module
Product ID (PID)
PID Description
UCSX-TPM2-001
Trusted Platform Module 1.2 for UCS (SPI-based)
UCSX-TPM2-002
Trusted Platform Module 2.0 for UCS servers
NOTE:  The module used in this system conforms to TPM v1.2 and 2.0, as defined by 
the Trusted Computing Group (TCG). It is also SPI-based.
NOTE:  TPM installation is supported after-factory. However, a TPM installs with a 
one-way screw and cannot be replaced, upgraded, or moved to another server. If a 
server with a TPM is returned, the replacement server must be ordered with a new 
TPM. If there is no existing TPM in the server, you can install TPM 2.0. You must first 
upgrade to UCS firmware that supports Intel E5-2600 v4 CPUs, which is Cisco UCS 
Manager Release 2.2(7) and later or Release 3.1(1) and later (because Cisco aligned 
support for TPM 2.0 with these CPUs).
CAUTION:  
 If the Cisco UCS server (with Intel E5-2600 v4 or v3 CPUs) is running UCS 
firmware that added support for Intel E5-2600 v4 CPUs, then it will work with TPM 
version 2.0. However, if you downgrade the firmware and BIOS to a version earlier 
than Release 2.2(7) or earlier than Release 3.1(1), then you are vulnerable to a 
potential security exposure. See the following support matrix for TPM versions.