beautypg.com

NEC MH4500 User Manual

Page 134

background image

B-2 System Setup Utility

The System Setup Utility (SSU) is a DOS-based utility that supports extended
system configuration operations for onboard resources and add-in boards. It also
allows you to view the system event log and to set system boot and security
options. Use the SSU when you need to:

T

add and remove ISA Legacy boards affecting the assignment of resources
(ports, memory, IRQs, DMA)

T

modify the server’s boot device order or security settings

T

change the server configuration resource settings

T

save the server configuration

T

view or clear the system event log

T

view field replaceable unit (FRU) information

T

view the sensor data record (SDR) table.

If you install or remove an ISA Legacy add-in board, you must run the SSU to
reconfigure the server. Running the SSU is optional for a PCI add-in board

The SSU is PCI-aware, and it complies with the ISA Plug and Play
specifications. The SSU works with any compliant configuration file (.CFG)
supplied by the peripheral device manufacturer.

The I/O system board includes .CFG files. The .CFG file describes the
characteristics of the board and the system resources that it requires. The
configuration registers on PCI and ISA Plug and Play add-in boards contain the
same type of information that is in a .CFG file. Some ISA boards also include a
.CFG file.

The SSU uses the information provided by the .CFG files, configuration
registers, NVRAM, and the information that you enter, to specify a system
configuration. The SSU writes the configuration information to NVRAM
memory.

The SSU stores configuration values in NVRAM memory. These values take
effect when you boot the server. POST checks the values against the actual
hardware configuration. If they do not agree, POST generates an error message.
You must then run the SSU to specify the correct configuration before the server
boots up.

The SSU always includes a checksum with the configuration data so the BIOS
can detect any potential data corruption before the actual hardware configuration
takes place.