This guide provides removal and replacement procedures for
subassemblies and key components of the computers covered. This guide
also covers basic operating system installation information.
countries.
Intel, Pentium, Intel Inside, and Celeron are trademarks of Intel Corporation in the U.S. and other countries.
Adobe, Acrobat, and Acrobat Reader are trademarks or registered trademarks of Adobe Systems Incorporated.
All other product names mentioned herein may be trademarks of their respective companies.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein or for
incidental or consequential damages in connection with the furnishing, performance, or use of this material. The
information in this document is provided “as is” without warranty of any kind, including, but not limited to, the
implied warranties of merchantability and fitness for a particular purpose, and is subject to change without notice.
The warranties for HP products are set forth in the express limited warranty statements accompanying such
products. Nothing herein should be construed as constituting an additional warranty.
This document contains proprietary information that is protected by copyright. No part of this document may be
photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard
Company.
WARNING: Text set off in this manner indicates that failure to follow directions could result in bodily
Å
harm or loss of life.
CAUTION: Text set off in this manner indicates that failure to follow directions could result in damage to
Ä
equipment or loss of information.
service reference guide
hp workstation xw4000
hp workstation xw6000
second edition (October 2003)
Depending on the workstation model, Microsoft Windo ws 2000 Professional (with latest Service
Pack), Microsoft XP Professional, or Red Hat® Linux® is preinstalled. The operating system is
configured automatically the first time the computer is turned on.
CAUTION: Do not add optional hardware devices to your computer until the operating system is
Ä
successfully installed. Doing so may cause errors and may prevent the operating system from installing
properly.
CAUTION: Once the automatic installation has begun, DO NOT TURN OFF THE COMPUTER UNTIL
Ä
THE PROCESS IS COMPLETE. Turning off the computer during the installation process might damage the
software that runs the computer.
1.1 Installing the Operating System and Software
The following sections discuss the operating system and HP software installation procedures.
1.1.1 Installing Microsoft Windows 2000 Professional
The first time you turn on the computer, you will be prompted to select a language for the
operating system. After selecting the language, read and follow the instructions on the screen to
complete the installation of the operating system. This takes approximately 10 minutes,
depending on the system hardware configuration. During this process, do not turn off your
computer unless you are directed to do so.
Installing or Upgrading Device Drivers
To install hardware devices such as a printer, a display adapter, or network adapter after the
operating system installation is completed, the operating system needs access to the appropriate
software drivers for the devices.
To locate the most current device drivers go to
The I386 directory and its subdirectories provide the HP-specific integration of the operating
system for the computer model and include device drivers supported by Windows 2000.
When prompted for the I386 directory on the operating system CD, replace the path specification
with C:\I386 or use the browse button of the dialog box to browse the computer for the I386
folder.
The service pack for Windows 2000 Professional has been integrated into the program.
www.hp.com.
✎
Service Reference Guide1–1
Installing or Restoring the Operating System
Creating an Emergency Repair Diskette - Windows 2000
1. Click Start > Programs > Accessories > Backup.
2. Select the menu option Tools, then select Create an Emergency Disk.
3. Follow the instructions that appear on the screen.
Using the Emergency Repair Diskette - Windows 2000
1. Insert the diskette into the diskette drive and restart the computer (you may boot the
computer to the Windows 2000 CD on some computers).
2. Press Enter to start the repair process, then choose to repair the system.
3. Select the Emergency Repair Process.
4. Follow the instructions that appear on the screen.
1.1.2 Installing Microsoft Windows XP Professional
The first time you turn on the computer, you will be prompted to select a language for the
operating system. After selecting the language, read and follow the instructions on the screen to
complete the installation of the operating system. This takes approximately 10 minutes,
depending on the system hardware configuration. During this process, do not turn off your
computer unless you are directed to do so.
Installing or Upgrading Device Drivers
To install hardware devices such as a printer, a display adapter, or network adapter after the
operating system installation is completed, the operating system needs access to the appropriate
software drivers for the devices. Device drivers are usually provided on a CD supplied with the
peripheral device.
Some existing peripheral devices may not have been shipped with drivers developed for
Windows XP. To locate the most current device drivers go to www.hp.com.
Creating a Restore Diskette
To create a restore diskette for Windows XP, go to Start > Programs > Accessories > System
Tools > System Restore, and follow the instructions on screen.
1–2Service Reference Guide
1.1.3 Installing Red Hat Linux
The first time the workstation is booted, the Linux Setup Tool utility displays. This program
allows you to enter your password, network, graphics, time, and keyboard settings for your
workstation.
CAUTION: Once the automatic installation has begun, DO NOT TURN OFF THE WORKSTATION
Ä
UNTIL THE PROCESS IS COMPLETE. Turning off the workstation during the installation process may
damage the software that runs the workstation or prevent its proper installation.
When you enable the YPBind feature in the Network tab of the Linux Setup Tool, you may get a
✎
blank screen for about 15-30 seconds after you have selected and saved all of your settings and
have exited the utility. This is normal. The boot process continues its execution after the screen
returns.
In the Time/Time Zone tab of the Linux Setup Tool utility, the Time Zone Region must be
✎
selected first and then the City, before clicking the Save/Exit button.
upgrading device drivers
Installing or Restoring the Operating System
Should you ever have to upgrade a Linux device driver, visit the HP Web site at:
http://www.hp.com/go/workstationsupport.
You can also visit Red Hat at www.redhat.com to check availability of additional device drivers.
1.1.4 hp Software
The Microsoft Windows 2000 Professional or Windows XP Professional operating system is
preinstalled on the computer and will be configured automatically the first time the computer is
turned on. The following HP software will also be installed at that time on selected models:
■
Setup Utilities and diagnostic features
■ Support Software including device drivers
■ HP Configuration Record
■ Online Safety & Comfort Guide
■ HP Intelligent Manageability
■ HP Insight Manager
■ Diagnostics for Windows
■ DMI Support
■ Power Management with energy saver features
■ Security Management tools
■ Software Support Management tools
Certain drivers and utilities are available only in selected languages. You can obtain the latest
version of these files, in English and selected other languages, in one of two ways:
■ Support CD kit
■ HP web site at www.hp.com
Service Reference Guide1–3
Installing or Restoring the Operating System
1.2 Restoring the operating system
The following sections discuss the procedures for restoring the operating system and applications
software.
1.2.1 Microsoft Windows 2000 Professional and Windows XP
Professional
Restore the original operating system and factory-installed software by using the Restore Plus!
CD and the OS CD that came with the workstation. Carefully read and follow the instructions
provided with the Restore Plus! CD.
1.2.2 Red Hat Linux
Should a recovery of the OS or software be required, insert the hp workstations Red Hat Linux
with hp additions (Binary Disk 1/3) CD and follow the prompts on the screen to successfully
complete the recovery process.
1.3 Converting to NTFS
Hard drives are formatted according to a file system format that sets a maximum partition size.
With the increase in drive size and changes in operating systems the FAT32 file system format
has become outdated. The NTFS file system format is preferred for the latest drive sizes and
operating systems.
1.3.1 Windows 2000 Professional
The hard drive may be automatically converted to NTFS when Windows 2000 is configured. On
some systems the following procedure may be required.
To convert an existing partition from a FAT 32 partition to an NTFS partition, double-click the
NTFS Convert icon on the desktop. Carefully read and follow the directions that appear on the
screen.
CAUTION: Converting from a FAT32 partition to NTFS may result in loss of data. Back up all data files
Ä
before changing the file system format.
1.3.2 Windows XP Professional
During the initial unbundling of the operating system, the system will start out with a FAT32
partition but will automatically convert to NTFS. The Windows XP operating system is not
designed to run in a FAT32 partition on these systems.
1–4Service Reference Guide
1.4 Hyper-Threading Technology
Hyper-Threading T echnology is a high performance technology, developed by Intel®, that allows
a single processor to execute multiple threads of instructions simultaneously. Hyper-Threading
Technology enables the processor to utilize its execution resources more efficiently, delivering
performance increases and improving user productivity. Not all systems benefit from the
Hyper-Threading Technology.
To see if Hyper-Threading Technology can benefit you, test your system by turning the feature
on using the Computer Setup (F10) system utility. To do this, run F10 Setup during boot up and
select Advanced > Device Options > Hyper-Threading, and enable the Hyper-Threading
Technology.
Note the following:
■ If your workstation does not support Hyper-Threading Technology, the Hyper-Threading
menu item will not be available on the Computer Setup menu.
■ The Hyper-Threading Technology is recommended for use with Microsoft® Windows® XP
systems. This technology is detected by the system and is turned on in the operating system
after it is enabled in the system BIOS.
■ Hyper-Threading is not recommended for use with Windows 2000-based workstations.
Installing or Restoring the Operating System
■ The Hyper-Threading Technology is compatible with Linux-based systems. An SMP kernel
must be installed on your system before this technology can be enabled.
■ For more information about the Hyper-Threading Technology, you can visit the Intel Web
site at www.intel.com.
Service Reference Guide1–5
Installing or Restoring the Operating System
1–6Service Reference Guide
Setup Utilities and Diagnostic Features
Setup Utilities (F10) and diagnostic features provide information needed about the computer
system when contacting HP Customer Support. These tools can also be used to:
■ Change factory default settings and to set or change the system configuration, which may be
necessary when you add or remove hardware.
■ Determine if all of the devices installed on the computer are recognized by the system and
functioning properly.
■ Determine information about the operating environment of the computer.
■ Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
■ Establish and manage passwords and other security features.
■ Establish and manage energy-saving timeouts.
All features identified in this chapter may not be available on all HP products.
✎
2
Power-On Self-Test (POST)
POST is a series of diagnostic tests that runs automatically when the system is turned on, POST
checks the following items to ensure that the computer system is functioning properly:
■ Keyboard
■ Memory modules
■ Diskette drives
■ All IDE and SCSI mass storage devices
■ Processors
■ Controllers
If the Power-On Password is set, a key icon appears on the screen while POST is running. You
✎
will need to enter the password before continuing. Refer to Chapter 3 for information on setting,
deleting, or bypassing the password.
If POST finds an error in the system, an audible and/or visual message occurs. Refer to Appendix
C for POST error messages and their solutions.
Service Reference Guide2–1
Setup Utilities and Diagnostic Features
2.1 Computer Setup Utilities
Use Computer Setup Utilities (F10) to:
■ Modify or restore factory default settings.
■ Set the system date and time.
■ Set, view, change, or verify the system configuration including settings for processor,
graphics, memory, audio, storage, communications, and input devices.
■ Modify the boot order of bootable devices such as hard drives, diskette drives, CD-ROM
drives, DVD-ROM drives, or PD-CD drives.
■ Configure Quiet Drive options (for drives that support this feature).
■ Enable Quick Boot which is faster than Full Boot but does not run all of the diagnostic tests
run during a Full Boot. You can set your system to:
❏ Always Quick Boot (default);
❏ Periodically Full Boot (from every 1 to 30 days); or
❏ Always Full Boot.
■ Enable or disable Network Server Mode, which allows the computer to boot the operating
system when the power-on password is enabled. The keyboard and mouse remain locked
until the power-on password is entered.
■ Select POST Messages Enabled or Disabled to change the display status of Power-On
Self-Test (POST) messages. POST Messages Disabled suppresses most POST messages,
such as memory count, product name, and other non-error text messages. If a POST error
occurs, the error is displayed regardless of the mode selected. To manually switch to POST
Messages Enabled during POST, press any key (except F10 or F12).
■ Establish Ownership Tag, the text of which is displayed each time the system is turned on or
restarted.
■ Enter the Asset Tag or property identification number assigned to this computer.
■ Enable power-on password prompting during system restarts (warm boots) as well as during
power-on.
■ Establish a setup password that controls access to Computer Setup and the settings described
in this section.
■ Secure the integrated I/O functionality, including the serial, USB, or parallel ports; audio; or
embedded NIC, so that they cannot be used until they are unsecured.
■ Enable or disable Master Boot Record (MBR) Security.
■ Enable or disable removable media boot ability.
■ Enable or disable removable media write ability.
■ Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
■ Replicate your system setup by saving system configuration information on diskette and
restoring it on one or more computers.
■ Execute self-tests on a specified IDE hard drive.
■ Configure various energy-saving features including energy saver mode, system and hard
drive timeouts, power button mode, and power LED behavior.
2–2Service Reference Guide
2.1.1 Using Computer Setup Utilities
To access the Computer Setup Utilities (F10) menu, complete the following steps:
1. Turn on or restart the computer. To restart the computer in Windows click Start > Shut
Down > Restart the Computer.
Setup Utilities and Diagnostic Features
2. When the F10 Setup message appears in the lower-right corner of the screen, press the
key. Press Enter to bypass the title screen, if necessary (for English only).
If you do not press the F10 key while the message is displayed, you must turn the computer off,
✎
then on again, to access the utility.
Pressing the F12 key initiates Network Service Boot for Remote System Installation.
A choice of five headings appears in the Computer Setup Utilities menu: File, Storage, Security ,
Power , and Adv anced. Section 2.1.2 in this chapte r provides more information about the features
that are available.
3. Using the arrow keys or the Tab key, select the option you w ant and press Enter. To return to
the Computer Setup Utilities menu, press Esc.
4. To apply and save changes, select File > Save Changes and Exit.
❏ If you selected an option that automatically restarted the computer, changes were applied
at that time.
❏ If you have made changes that you do not want applied, select Ignore Changes and Exit.
❏ If you have already applied changes you now want to eliminate, select Set Defaults and
Exit. This option will restore the original system defaults.
Be sure to configure new options and drivers in the operating system after they have been
✎
configured by the Setup Utility.
F10
Service Reference Guide2–3
Setup Utilities and Diagnostic Features
2.1.2 Computer Setup Menu
.
HeadingOptionDescription
FileSystem
Information
AboutProvides copyright information
Set Time and
Date
Save to DisketteSaves system configuration, including CMOS, to a formatted
Restore from
Diskette
Set Defaults and
Exit
Ignore Changes
and Exit
Save Changes
and Exit
StorageDevice
Configuration
Lists product name/type/speed/stepping, cache size, system
ROM family and version, installed memory size, system board
revision, chassis serial number, integrated MAC for enabled or
embedded NIC (if applicable), and asset tracking number.
Allows you to set system time and date.
blank 1.44-MB diskette.
Restores system configuration from a diskette.
Restores factory default settings and clears all passwords.
Exits Computer Setup without applying or saving any changes.
Saves changes to system configuration and exits Computer
Setup.
Lists all installed storage devices. The following options appear
when a device is selected:
Diskette Type (For legacy diskette drives only)
Identifies the highest capacity media type accepted by the
diskette drive. Options are 3.5" 1.44 MB, 3.5" 720 KB, 5.25"
1.2 MB, 5.25" 360 KB, and Not Installed.
Drive Emulation(IDE devices only)
Allows you to select a drive emulation type for a storage device.
(For example, a Zip drive can be made bootable by selecting
disk emulation.)
Drive TypeEmulation Options
Hard diskNo emulation options available.
DisketteNone (treated as diskette drive)
Disk (treated as hard drive)
CD-ROMNone (treated as CD-ROM drive)
Diskette (treated as diskette drive)
Disk (treated as hard drive)
Other (e.g., Zip
drive)
2–4Service Reference Guide
None (treated as Other)
CD-ROM (treated as CD-ROM drive)
Diskette (treated as diskette drive)
Setup Utilities and Diagnostic Features
HeadingOptionDescription (Continued)
Disk (treated as hard drive)
Storage
(continued)
Device
Configuration
(continued)
Transfer Mode(IDE devices only)
Specifies the active data transfer mode. Options (subject to
device capabilities) are PIO 0, Max PIO, Enhanced DMA, Ultra
DMA 0, and Max UDMA.
Translation Mode (IDE disks only)
Lets you select the translation mode to be used for the device.
This enables the BIOS to access disks partitioned and formatted
on other systems and may be necessary for users of older
versions of Unix (e.g., SCO Unix 3.2). Options are Bit-Shift, LBA
Assisted, User, and None.
Ordinarily, the translation mode selected automatically by the
Ä
BIOS should not be changed. If the selected translation mode
is not compatible with the translation mode that was active
when the disk was partitioned and formatted, the data on the
disk will be inaccessible.
Translation Parameters (IDE Disks only)
Allows you to specify the parameters (logical cylinders, heads,
and sectors per track) used by the BIOS to translate disk I/O
requests (from the operating system or an application) into terms
the hard drive can accept. Logical cylinders may not exceed
1024. The number of heads may not exceed 256. The number
of sectors per track may not exceed 63. These fields are only
visible and changeable when the drive translation mode is set
to User.
Multisector Transfers (IDE ATA devices only)
Specifies how many sectors are transferred per multi-sector PIO
operation. Options (subject to device capabilities) are Disabled,
8, and 16.
Quiet Drive (available on select drives only)
•Performance
Allows the drive to operate at maximum performance.
•Quiet
Reduces noise from the drive during operation. When set to
Quiet, the drive will not operate at maximum performance.
If the drive does not support Quiet mode, the Quiet Drive
✎
option will not be displayed.
OptionsRemovable Media Boot
Enables/disables ability to boot the system from removable
media.
After saving changes to Removable Media Boot, the
✎
computer will restart. Manually, turn the computer off, then
on.
Primary IDE Controller
Allows you to enable or disable the primary IDE controller.
Secondary IDE Controller
Allows you to enable or disable the secondary IDE controller.
Service Reference Guide2–5
Setup Utilities and Diagnostic Features
HeadingOptionDescription (Continued)
Storage
(continued)
Options
(continued)
DPS Self-TestAllows you to execute self-tests on IDE hard drives capable of
Controller OrderAllows you to specify the order of the attached hard drive
SCSI Narrow
Termination
Boot OrderAllows you to specify boot order of installed peripheral devices
Diskette MBR Validation
Allows you to enable or disable strict validation of the diskette
Master Boot Record (MBR).
If you use a bootable diskette image that you know to be
✎
valid, and it does not boot with Diskette MBR Validation
enabled, you may need to disable this option in order to use
the diskette.
performing the Drive Protection System (DPS) self-tests.
This selection will only appear when at least one drive
✎
capable of performing the IDE DPS self-tests is attached to the
system.
controllers. The first hard drive controller in the order will have
priority in the boot sequence and will be recognized as drive C
(if any devices are attached.
The selection will not appear if all hard drives are attached to
the embedded IDE controllers.
Allows you to configure SCSI termination on the external SCSI
connector for narrow SCSI drives. The feature should only be
enabled if using a narrow SCSI drive to terminate the external
SCSI channel.
(such as LS-120 drive, diskette drive, hard drive, SCSI drive,
CD-ROM drive, or DVD-ROM drive).
See Section 3.4, “Asset Tracking and Security,” for more
information.
Power-On
Password
Password
Options
Smart CoverEnables/disables Smart Cover Sensor and Cover Lock. (Feature
Enables power-on password.
See Section 3.4, “Asset Tracking and Security,” for more
information.
Enables/disables network server mode.
Specifies prompting for power-on password.
See Section 3.4, “Asset Tracking and Security,” for more
information.
This selection will appear only if a power-on password is set
and the network server mode is disabled.
supported on select models only.)
Lists most recent cover removal. (Feature supported on select
models only.)
See Section 3.4, “Asset Tracking and Security,” for more
information.
2–6Service Reference Guide
Setup Utilities and Diagnostic Features
HeadingOptionDescription (Continued)
Security
(continued)
DriveLock*Allows you to assign or modify a master or user password for
certain hard drives. When enabled, the user is prompted to
provide one of the DriveLock passwords during POST. If neither
is successfully entered, the hard drive will remain inaccessible
until one of the passwords is successfully provided during a
subsequent cold-boot sequence.
This selection will only appear when at least one drive that
supports the DriveLock feature is attached to the system.
Master Boot
Record Security*
Allows you to enable or disable Master Boot Record (MBR)
Security. When enabled, the BIOS rejects all requests to write to
the MBR on the current bootable disk. Each time the computer is
powered on or rebooted, the BIOS compares the MBR of the
bootable disk to the previously saved MBR. If changes are
detected, you are given the option of saving the MBR on the
current bootable disk, restoring the previously saved MBR, or
disabling MBR security, You must know the password if one is
set.
Disable MBR Security before intentionally changing the
✎
formatting or partitioning of the current bootable disk.
Several disk utilities (such as FDISK and FORMAT) attempt to
update the MBR. If MBR Security is enabled and disk
accesses are being serviced by the BIOS, write requests to
the MBR are rejected, causing the utilities to report errors. If
MBR Security is enabled and disk accesses are being
serviced by the operating system, any MBR change will be
detected by the BIOS during the next reboot, and an MBR
Security warning message will be displayed.
Save Master
Boot Record*
Saves a backup copy of the Master Boot Record of the current
bootable disk.
✎
Restore Master
Boot
Record*
Restores the backup Master Boot Record to the current bootable
disk.
✎
Device SecurityEnables/disables serial ports A & B; parallel and USB ports;
system audio; network controller (some models); and SCSI
controllers.
Network Service
Boot
*Option not supported on all products.
Enables/disables Network Service Boot. (Feature supported on
select models only.)
Only appears if MBR Security is enabled.
Only appears if all of the following conditions are true:
MBR Security is enabled.
A backup copy of the MBR has been previously saved.
The current bootable disk is the same disk from which the
backup copy of the MBR was saved.
Service Reference Guide2–7
Setup Utilities and Diagnostic Features
HeadingOptionDescription (Continued)
Security
(continued)
PowerEnergy SaverAllows you to set energy saver mode to Advanced, Disabled, or
System IDsAllows you to set Asset Tag and Ownership Tag.
Allows setting of Chassis Serial Number if current number is
invalid.
Also allows you to set keyboard locale setting (e.g., English or
German) for System ID entry.
Allows setting of Ownership Tag and Universal Unique
Identifier (UUID).
See Section 3.4, “Asset Tracking and Security,” for more
information.
Minimal.
In the minimal energy saver mode setting, the hard drive and
✎
system do not go into energy saver mode, but the setting
allows you to press the power button to suspend the
system.This option does not apply under ACPI-enabled
operating systems.
TimeoutsAllows you to enable/disable or manually select timeout values.
This selection will appear only when energy saver mode is
✎
set to advanced.This option does not apply under
ACPI-enabled operating systems.
Energy Saver
Options
Allows you to set power button configuration (on/off or
sleep/wakeup.)
Allows user to enable/disable power LED blink in suspend
mode.
This selection will appear only if the energy saver mode is
✎
enabled. This option does not apply under ACPI-enabled
operating systems.
Advanced**Power-On
Options
Onboard
Devices
**These options should be used by advanced users only.
2–8Service Reference Guide
Allows you to set POST mode (QuickBoot or FullBoot every n
days where n = 1 to 30), enables/disables POST messages,
and delay POST.
Enables/disables Safe Post, F9 prompt, F10 prompt, F12
prompt, option ROM prompt, UUID, I/O APIC Mode, USB
Buffer @ Top of Memory, and Hot-Pluggable MB Floppy.
Allows you to select the wakeup boot source (local hard drive or
remote server).
Allows you to select computer state after a power loss
(On or Off).
The suspend/sleep feature of Remote Management cannot
✎
be used if If the computer was turned off using a power strip.
Allows you to set resources for onboard system devices (serial
port, parallel port, diskette controller, etc.).
Setup Utilities and Diagnostic Features
HeadingOptionDescription (Continued)
PCI DevicesLists currently installed PCI devices and their IRQ settings.
Allows you to reconfigure IRQ settings for these devices or to
disable them entirely. These settings have no effect under an
APIC-based operating system.
Advanced
(continued)**
Bus OptionsEnables/disables PCI bus mastering, PCI VGA palette
snooping, PCI SERR# generation, and ECC on select models.
Device optionsAllows you to set printer mode (EEP+ECP), Output only,
bidirectional, and NumLock state at power-on.
Enable/disable Power Management Events (PME) wakeup
events, processor cache, processor number, ACPI thermal
mode, and ACPI S3 support. (When ACPI S3 is enabled you
may also enable/disable ACPI S3 video repost, PS/2 mouse
wakeup, and hard disk reset.)
Allows you to select AGP aperture size (4, 8, 16, 32, 64, 128,
or 256 MB).
Enables monitor tracking.
PCI VGA
Configuration
Allows users to specify which VGA controller will be the “boot”
or primary VGA controller.
Appears only if there are multiple PCI video adapters in the
system.
*Option not supported on all products.
**These options should be used by advanced users only.
Service Reference Guide2–9
Setup Utilities and Diagnostic Features
2.2 Computer Diagnostics
The following section applies only to computers equipped with a diskette drive and running an
✎
OS that supports the production of a Diagnostics diskette.
HP strongly recommends that you create a diagnostics diskette as soon as you begin to use the
computer. This is a bootable diskette that allows you to test and inspect the hardware outside of
the operating system by running the Computer Checkup (TEST) or View System Information
(INSPECT) diagnostic programs. The diskette will play an important role in the restoration
process if you ever experience a major system failure.
Another diagnostic feature is Diagnostics for Windows, described in Section 2.2.4.
2.2.1 Create a Diagnostics Diskette
DOS-Based
To create a bootable, DOS-based Diagnostic Diskette (some models may require two 1.44-MB
diskettes),
Insert a blank 1.44MB formatted diskette into the diskette drive, then run
C:\DIAGDISK\PDIAG\MAKEDISK.BAT
To obtain the SoftPaqexecutable filename, run DIR C:\DIAGDISK\SP*.EXE
run the SoftPaq executable file found in C:\DIAGDISK\ to extract the necessary files.
✎
Windows-Based
NOTE: Not all versions of Windows support this feature.
Using the Windows operating system:
Click Start > Compaq Information Center > Create Diagnostics Disk. Insert a diskette into the
diskette drive and follow the instructions on the screen.
2.2.2 Computer Checkup (TEST)
Use Computer Checkup (TEST) in the following instances to:
■ Determine if all the devices installed on the computer are recognized by the system and
functioning properly. Running TEST is optional but recommended after installing or
connecting a new device.
Third-party devices not supported by HP may not be detected.
✎
■ Save, print, or display the information generated by TEST. You should run TEST and have
the printed report available before placing a call to the Compaq Customer Support Center.
■ Reproduce the same environment on another computer for testing.
Before you run TEST, you must create a diagnostics diskette. See Section 2.2.1, “Create a
✎
Diagnostics Diskette,” for instructions.
2–10Service Reference Guide
Setup Utilities and Diagnostic Features
Running TEST
1. Turn off the computer.
2. Disconnect all peripheral devices other than the keyboard and monitor . Do not disconnect the
printer if you want to test it or use it to log error messages.
3. Install loop-back and terminating plugs to test external ports if desired.
4. Cold boot the computer from the diagnostics diskette you have created. Press Enter to bypass
the title screen, if necessary.
5. Select Computer Checkup (TEST).
6. Select the option to view the device list. A list of installed hardware devices appears.
7. Verify that TEST correctly detected the devices installed. This utility will detect all devices
manufactured or supported by HP; devices from other manufacturers may not be detected.
❏ If the list is correct, select OK and go to step 8.
❏ If the list is incorrect, be sure that any new devices are installed properly.
8. Select one of the following from the test option menu:
❏ Quick Check Diagnostics—This option runs a quick, general test on each device with a
minimal number of prompts. If errors occur, they are displayed when the testing is
complete. This option will only test the first 16 MB of memory.
❏ Automatic Diagnostics—This option runs unattended, maximum testing of each device
with minimal prompts. You can choose how many times to run the tests, to stop on
errors, or to print or file a log of errors.
❏ Prompted Diagnostics—This option allows maximum control over the device testing
process. You can choose attended or unattended testing, decide to stop on errors, or
choose to print or file a log of errors.
If attended testing is selected, the test itself may result in data loss.
✎
Follow the instructions on the screen as the diagnostic tests are run on the devices. When the
testing is complete, the TEST option menu is displayed again.
9. To exit TEST, press the Esc key to reach the Exit option. Then press Enter.
Refer to Appendix E for a listing of the Diagnostic Error Codes.
✎
Service Reference Guide2–11
Setup Utilities and Diagnostic Features
2.2.3 View System Information (INSPECT)
Use View System Information (INSPECT) to:
■ View information about the system once it has been configured.
■ Save, print, or display the information generated by INSPECT. You should run INSPECT
and have the printed report available before placing a call to the HP Customer Support
Center.
■ Assist your HP/Compaq authorized dealer, reseller, or service provider in analyzing the
system by allowing the service provider to reproduce the same environment on another
computer for testing.
The information provided by INSPECT includes:
■ Contents of the operating system startup files
■ Current memory configuration
■ ROM versions
■ Type of processor and co-processor
■ Diskette, CD-ROM, DVD-ROM, tape, or hard drives installed
■ Active printer and communications interfaces
■ Modem type installed
■ Graphics settings
■ Windows WIN.INI file details
Categories or items of information displayed by INSPECT are similar to but may vary slightly
✎
from those available in Diagnostics for Windows.
Before you run INSPECT, you must create a diagnostics diskette. See Section 2.2.1, “Create a
Diagnostics Diskette,” for instructions.
Running INSPECT
1. Cold boot the computer from the diagnostics diskette you have created. Press Enter to bypass
the title screen, if necessary.
2. Select View System Information (INSPECT).
3. Select one of the available options using the Esc key:
❏ Print the INSPECT status.
❏ Save the INSPECT status to a file.
❏ Add comments to a parameter status.
❏ Exit the utility.
4. To exit INSPECT, press the Esc key to reach the Exit option. Then press Enter.
2–12Service Reference Guide
2.2.4 Diagnostics for Windows
Diagnostics for Windows is a component of Intelligent Manageability that allows you to view:
■ System overview
■ AssetControl information
■ Input devices
■ Communications ports
■ Storage devices
■ Graphics information
■ Memory configuration
■ Security management settings
■ System health
■ Operating system
■ Windows version
Depending on the version, Diagnostics for Windows may include diagnostic tests to determine if
all the devices installed on the computer are recognized by the system and are functioning
properly.
Setup Utilities and Diagnostic Features
Using Diagnostics for Windows
1. Select the Diagnostics for Windows icon, located in the Control Panel.
2. The screen displays an overview of the computer hardware and software.
3. For specific hardware and software information, select a category from the Categories menu
or from the toolbar.
As you move your cursor over the toolbar icons, the corresponding category names appear near
✎
the cursor.
4. To display more detailed information in a selected category, click More in the Information
Level box.
Categories or items of information displayed by Diagnostics for Windows are similar to but may
✎
vary slightly from the information presented in View System Information (INSPECT).
5. Review and print this information.
To print the information, click File, then select Print. Select one of the following options:
✎
Detailed Report (All Categories), Summary Report (All Categories), or Current Category. Click
OK to print the report you selected.
6. To ex it Diagnostics for Windows, click File, then click Exit.
Service Reference Guide2–13
Setup Utilities and Diagnostic Features
Running Diagnostic Tests
If your version of Diagnostics for Windows includes diagnostic testing utilities, four tabs will
appear next to Overview: Test, Status, Log, and Error.
1. Select the Test tab.
2. Select one of the following options:
❏ Quick Test—Runs a quick, general test on each device with a minimal number of
prompts.
❏ Complete Test—Runs maximum testing of each device with minimal prompts.
❏ Custom Test—Runs only the tests you select. To select specific devices or tests, find the
device in the list, then click the box beside each test to select or deselect it. When
selected, a red check mark appears in the box.
3. Select Interactive Mode or Unattended Mode.
4. In Interactive Mode, the diagnostic software will prompt you for input during tests that
require it. Some tests require interaction and will display errors or halt testing if selected in
conjunction with Unattended Mode.
5. Click the Begin Testing button.
6. Test Status is displayed, showing the progress and result of each test.
7. If errors are found, click the Error tab to display more detailed information and
recommended actions. By following the recommended actions, you may be able to solve
some problems yourself.
8. Click Print or Save the error information in case you need to contact your HP authorized
dealer, reseller, or service provider for assistance.
9. To ex it Diagnostics for Windows, click File, then click Exit.
2.3 Protecting the Software
To protect software from loss or damage, you should keep a backup copy of all system software,
applications, and related files stored on the hard drive. The Restore CD or the Restore Plus! CD
that accompanies many desktop and workstation models enables the user to selectively restore
the original system software. You can order a replacement copy of the Restore CD from HP at
nominal cost for all of the software preinstalled on the computer . Refer to the operating system or
backup utility documentation for instructions on making backup copies of data files.
2–14Service Reference Guide
2.3.1 Ordering Backup Software
You can order all software that shipped with the product from HP as a single set, or you can order
the various software packages separately.
Before calling HP to place your order, be sure to have the serial number of the computer
✎
available. This number is necessary for all diskette purchases.
2.3.2 Restore CD
The Windows-based systems ship with either the Restore CD or the Restore Plus! CD that offer
easy deployment and recovery of system software. Along with the Microsoft operating system
CD, the Restore and Restore Plus! CDs enable the user to selectively restore the original system
software. This can be extremely helpful in the ev ent of hard drive failure or corruption. Required
drivers that are not included on the Restore CD or the Restore Plus! CD may be downloaded
from the HP web site at www.hp.com.
Setup Utilities and Diagnostic Features
Service Reference Guide2–15
Setup Utilities and Diagnostic Features
2–16Service Reference Guide
Desktop Management
HP Intelligent Manageability provides standards-based solutions for managing and controlling
workstations in a networked en vironment. This guide summarizes the capabilities and features of
the four key components of desktop management:
■ Initial configuration and deployment
■ Software updating and management
■ Asset tracking and security
■ Fault notification and recovery
Support for specific features described in this guide may vary by model or software version.
✎
3.1 Initial Configuration and Deployment
HP workstations come with a preinstalled system software image. After a very brief software
“unbundling” process, the computer is ready to be used.
3
You may prefer to replace the preinstalled software image with a customized set of system and
application software. There are several methods for deploying a customized software image.
They include:
■ Installing additional software applications after unbundling the preinstalled software image.
■ Using software deployment tools, such as Microsoft MS Batch or NT Distribution Share
(NTDS), or Altiris eXpress to replace the preinstalled software with a customized software
image.
■ Using a disk cloning process to copy the contents from one hard drive to another.
The best deployment method depends on your information technology environment and
processes. The PC Deployment section of the Solutions and Services Web site
(www.compaq.com/solutions/pcsolutions) provides information to help you select the best
deployment method. You’ll also find guides and utilities to integrate Microsoft or PXE-based
deployment tools.
The Restore or the Restore Plus! CD, ROM-based setup, and ACPI-ready hardware provide
further assistance with recovery of system software, configuration management and
troubleshooting, and power management.
Service Reference Guide3–1
Desktop Management
3.2 Remote System Installation
Remote System Installation lets you start and set up your system using the software and
configuration information located on a network server. This feature is usually used as a system
setup and configuration tool, and can be used for the following tasks:
■ Deploying a software image on one or more new PCs.
■ Formatting a hard drive.
■ Installing application software or drivers.
■ Updating the operating system, application software, or drivers.
To initiate Remote System Installation, press F12 when the F12=Network Service Boot message
appears in the lower-right corner of the HP/Compaq logo screen. Follow the instructions on the
screen to continue the process.
3.3 Software Updating and Management
HP provides several tools for managing and updating software on desktops and
workstations—Altiris eXpress, Altiris PC Transplant Pro, PC Transplant for Compaq, Insight
Manager™ LC, System Software Manager, and Remote Management Setup Utilities. Using
Insight Manager LC, you can also monitor a workgroup of PCs from a central console and
remotely update the system software, security settings, flash ROM, or hardware device drivers,
for each of the managed PCs individually.
3.3.1 Altiris eXpress
Altiris eXpress allows the system administrator to create and quickly deploy a customized,
corporate-standard software image across one or more networked client PCs with an interface as
simple to use as Windows Explorer. Altiris eXpress supports Intel’s Wired for Management and
Preboot Execution Environment (PXE). Using Altiris eXpress and the Remote System
Installation features of the computer, there is no need for the system administrator to visit each
new PC individually to deploy the software image.
Altiris eXpress is able to install a disk image containing the operating system, application
software, and the Altiris eXpress client, without requiring the use of a separate boot diskette.
With Altiris eXpress, the network administrator can:
■ Create a new image or edit an existing image, or clone a PC on the network which may have
the ideal image.
■ Create any number of customized disk images for a variety of workgroups.
■ Edit image files, modifying them without having to start from scratch. This is possible
because Altiris eXpress stores files in its native format: NTFS, FAT16, or FAT32.
■ Establish a “New PC Event,” a script that will run automatically when a new PC is added to
the network. The script can, for instance, format the PC hard drive, flash the R OM BIOS, and
install a full, standard software image.
■ Schedule an event to run on a group of computers.
Altiris eXpress also includes easy-to-use software distribution capabilities. You can use Altiris
eXpress to update operating systems and application software from a central console. When used
in conjunction with System Software Manager, Altiris eXpress can also update ROM BIOS and
device driver software.
3–2Service Reference Guide
Desktop Management
For more information, refer to the HP web site at www.hp.com.
3.3.2 PC Transplant Pro and PC Transplant for Compaq
PC Transplant is designed to assist you in personalizing your new HP workstation. It can be
downloaded free from the HP web site. It lets you preserve the “personality” or the customized
settings, such as Start menu entries, drive and printer mappings, software application options,
and so on of an existing PC. It will then transfer those unique settings to a computer.
For more information, refer to the hp web site at www.hp.com.
3.3.3 HP Insight Manager LC
HP Insight Manager LC is a web-based tool for managing workgroups of PCs. It provides a
unified “browser -based roaming console,” not only for HP/Compaq clients but an y standard DMI
2.0–based PC on the network. It can automatically discover, view system information, and
receive alerts from any DMI 2.0 PC on a specified domain or workgroup.
For more information, refer to the HP web site at www.hp.com
3.3.4 System Software Manager
System Software Manager (SSM) is a utility that lets you update system-level software on
multiple systems simultaneously. When executed on a PC client system, SSM detects both
hardware and software versions, then updates the appropriate software from a central repository,
also known as a file store. Support software that works with SSM is flagged with the PC
Lifecycle Management icon on the HP web site. To download the utility or to obtain more
information on SSM, visit the HP web site at www.hp.com.
3.3.5 Remote Management Setup Utilities
The Remote Management Setup Utilities, when integrated with Management Solutions Partners
products supplement the capabilities of Solutions Partners products for distributing new
applications, device driv ers, and other system softw are. The HP web site includes updated ROM
images and device drivers which can be distributed to client PCs using these software tools.
For more information, refer to the online Remote Management Administrators Guide. The Remote Management Administrators Guide is included with the Remote Management Setup
Utilities, which are available on the HP web site at www.hp.com. The follo wing sections pro vide
information on using these utilities to accomplish various remote management functions
including ROM flash, changing security settings, and wakeup/shutdown.
Service Reference Guide3–3
Desktop Management
3.3.6 Remote ROM Flash
Your computer comes with a reprogrammable flash ROM (read only memory). By establishing a
setup password in Computer Setup, you can protect the ROM from being unintentionally updated
or overwritten. This is important to ensure the operating integrity of the computer. Should you
need or want to upgrade your ROM, you may:
■ Order an upgraded ROMPaq diskette from HP.
■ Download the latest ROMPaq images from the HP web site (www.hp.com).
CAUTION: For maximum ROM protection, be sure to establish a setup password. The setup password
Ä
prevents unauthorized ROM upgrades. HP Insight Manager LC allows the system administrator to set the
setup password on one or more PCs simultaneously. For more information, visit the HP web site at
www.hp.com.
Using Remote ROM Flash
Remote ROM Flash allows the system administrator to safely upgrade the ROM on remote HP
computers directly from the centralized network management console. Enabling the system
administrator to perform this task remotely on multiple computers results in a consistent
deployment of and greater control over ROM images over the network.
All ROMPaq ROM images from HP are digitally signed to ensure authenticity and minimize
potential corruption. Your system ROM may include a Boot Block that is protected during the
flash process and allows the computer to be restarted, in the unlikely event of an unsuccessful
ROM flash.
Your computer must be powered on, or turned on through Remote Wakeup, to take advantage of
✎
Remote ROM Flash. Use of Remote ROM Flash also requires an established setup password.
For more information on enabling Remote ROM Flash, refer to the online Remote Management Administrators Guide. The Remote Management Administrators Guide is included with the
Remote Management Setup Utilities, and is available on the HP web site at www.hp.com.
FailSafe Boot Block ROM
The FailSafe Boot Block ROM allows for system recovery in the unlikely event of a ROM flash
failure, for example, if a power failure were to occur during a ROM upgrade. The Boot Block is a
flash-protected section of the ROM that checks for a v alid system ROM flash when po wer to the
system is turned on.
■ If the system ROM is valid, the system starts normally.
■ If the system ROM fails the validation check, the FailSafe Boot Block ROM provides
enough support to start the system from a ROMPaq diskette, which will program the system
ROM with a valid image.
When the Boot Block detects an invalid system ROM, the system sounds a series of beeps (one
long and three short) and flashes the three keyboard lights (on and off two times). A Boot Block
recovery mode message is displayed on the screen.
3–4Service Reference Guide
Desktop Management
To recover the system after it enters Boot Block recovery mode, complete the following steps:
1. Remove any diskettes from the diskette drive and turn off the power.
2. Insert a ROMPaq diskette into the diskette drive.
3. Turn on power to the system.
4. If no ROMPaq diskette is found, you will be prompted to insert one and restart the computer.
5. If a setup password has been established, the Caps Lock light will turn on and you will be
prompted to enter the password.
6. Enter the setup password.
7. If the system successfully starts from the diskette and successfully reprograms the ROM,
then the three keyboard lights will turn on. A “rising tone” series of beeps also signals
successful completion.
The following table lists the various keyboard light combinations used by the Boot Block ROM,
as well as the meaning and action associated with each combination.
Keyboard Light Combinations Used by Boot Block ROM
Failsafe
Boot Block
Mode
Keyboard
LED Color
Keyboard
LED ActivityState/Message
Num LockGreenOnROMPaq diskette not present, is bad, or
drive not ready.*
Caps LockGreenOnEnter password.*
Num, Caps,
Scroll Lock
Num, Caps,
Scroll Lock
Diagnostic lights do not flash on USB keyboards.
✎
GreenTurn on and off
2 times
(accompanied
by 1 long and
3 short beeps)
GreenOnBoot Block ROM Flash successful. Turn
ROM flash failed.*
power off, then on to reboot.
*Insert valid ROMPaq diskette in drive A. Turn power switch off, then on to reflash ROM.
If ROM flash is successful, all three ke yboard LEDs will light up, and you will hear a rising
tone series of beeps. Remove diskette and turn power off, then on to restart the computer.
Service Reference Guide3–5
Desktop Management
3.3.7 Remote Security Management
Remote Security Management allows the system administrator to safely set or modify security
features on remote workstations directly from the centralized network management console.
Enabling the system administrator to perform these tasks remotely, on multiple computers,
results in consistent deployment of and greater control over client computer security parameters
over the network.
Your computer must be powered on, or turned on through Remote Wakeup, to take advantage of
✎
Remote Security Management. Use of Remote Security Management also requires an established
setup password.
For more information about the Remote Management Setup software and enabling Remote
Security Management, refer to the online Remote Management Administrators Guide. The
Remote Management Administrators Guide is included with the Remote Management Setup
Utilities, and is available on the HP web site at www.hp.com.
3.3.8 Remote Wakeup and Remote Shutdown
If your computer has an optional network card installed, it may support the Remote Wakeup and
Remote Shutdown functions. These functions allow a system administrator to power on and
power off a client computer from a remote location supported by PC LAN management tools.
Third-party software tools are required to remotely distribute software.
✎
Remote Wakeup allows the network interface controller to continue functioning when power to
the computer has been turned off, but the power cord is still connected to an electrical outlet.
The computer continues to consume a small amount of electricity even after you turn it of f. Only
✎
when you disconnect the power cord from the electrical outlet does the computer stop consuming
electricity.
To enable Remote Wakeup and Remote Shutdown, complete the following steps:
1. Double-click the Network Icon, located in the Control Panel.
2. Double-click the appropriate network controller.
3. Click the Advanced Properties tab.
4. Select Remote Wakeup.
5. Change the value to ON.
6. Click OK to save and apply changes, then click OK to exit the Network dialog.
For more information on using Remote Wakeup and Remote Shutdown, refer to the online
Remote Management Administrators Guide. The Remote Management Administrators Guide is
included with the Remote Management Setup Utilities, and is available on the HP web site at
www.hp.com.
3.3.9 NIC Alert
The NIC Alert function enables desktop PCs to send an immediate alert to the network
administrator when there is a hardware or operating system failure, or evidence of tampering. An
alert will be sent even if the system is powered off or the operating system has not yet started.
3–6Service Reference Guide
3.3.10 Replicating Your Setup
This procedure gives an administrator the ability to easily copy one setup configuration to other
computers of the same model. This allows for faster, more consistent configuration of multiple
computers. To replicate your setup:
1. Access the Computer Setup Utilities menu.
2. Click File > Save to Diskette. Follow the instructions on the screen.
This requires an internal diskette drive, a MultiBay LS-120 drive, or a portable, external diskette
✎
drive.
3. To replicate the conf iguration, click File > Restore from Diskette, and follo w the instructions
on the screen.
Altiris eXpress and PC Transplant make it easy to replicate the conf iguration and custom settings
of one PC and copy it to one or more PCs. For more information, visit the hp Web site at
www.hp.com.
3.3.11 Dual-State Power Button
With Advanced Configuration and Power Interface (ACPI) enabled for Windows, the power
button can function either as an on/off switch or as a suspend button. The suspend feature does
not completely turn off power, but instead causes the computer to enter a low-power standby.
This allows you to quickly power down without closing applications and to quickly return to the
same operational state without any data loss.
Desktop Management
To change the power button's configuration, complete the following steps:
1. Access the Computer Setup menu.
2. Select Power > Energy Saver. Select Minimal or Advanced to turn on the Energy Saver
Options menu.
3. Select Power > Energy Saver Options. Set the po wer b utton conf iguration to either On/Off or
Suspend/Wakeup, as desired.
4. Refer to the Computer Setup (F10) Utility Guide for more detailed information about the
features of Computer Setup.
5. Select File > Save Changes and Exit.
After configuring the power b utton to function as a suspend b utton, press the po wer b utton to put
the system in a very low po wer state (suspend). Press the button again to quickly bring the system
out of suspend to full power status. To completely turn of f all po wer to the system, press and hold
the power button for four seconds.
If you have selected the “Blink LED during Energy Save” option in Computer Setup, the
✎
power-on light will blink green once every two seconds while the computer is in suspend. Refer
to the Computer Setup (F10) Utility Guide for more information on using Computer Setup.
Service Reference Guide3–7
Desktop Management
3.3.12 Power Management
Power Management is a feature that saves energy by shutting down certain components of the
computer when they are not in use, saving energy without having to shut down the computer.
Timeouts (the period of inactivity allowed before shutting down these components) can be
enabled, customized, or disabled using Computer Setup.
1. Access the Computer Setup menu.
2. Select Power > Energy Saver. Select Advanced to turn on the Timeouts menu.
3. Select Power > Timeouts. Enable, customize, or disable timeouts.
4. Refer to the Computer Setup (F10) Utility Guide for more detailed information about the
features of Computer Setup.
5. Select File > Save Changes and Exit.
To avoid conflicts, never enable monitor timeouts in Windows 98 while system timeouts are
✎
enabled in Computer Setup.
Use Display Properties to establish, modify, or disable Power Management settings for the
monitor. To access Display Properties, right-click on the Windows Desktop, then choose
Properties.
3.3.13 World Wide Web Site
When making the transition to new or revised operating systems, it is important to implement the
support software designed for that operating system. If you plan to run a version of Microsoft
Windo ws or Microsoft Windows NT Workstation that is different from the version included with
your computer, you must install corresponding device drivers and utilities to ensure that all
features are supported and functioning properly.
HP has made the task of locating, accessing, evaluating, and installing the latest support softw are
easier. You can download the software from the HP web site at www.hp.com.
The Web site contains the latest device drivers, utilities, and flashable ROM images needed to
run the latest Microsoft Windows operating system on your HP workstation.
3.3.14 Desktop Management Interface (DMI)
The Desktop Management T ask Force (DMTF) is an industry body with the goal of standardizing
systems manageability . DMTF established the Desktop Management Interface (DMI) frame work
to standardize access to PC configuration data. HP delivers hardware and software
instrumentation that supports the DMI standard.
For more information on configuring the DMI software, refer to the online Intelligent Manageability Guide.
3–8Service Reference Guide
3.3.15 Wired for Management
Intel's Wired for Management initiative is focused on reducing the support and administration
cost of Intel architecture–based systems without compromising flexibility and performance. The
Wired for Management guidelines provide a baseline set of building blocks that are utilized in
Intelligent Manageability to provide standardized management of desktop inventories, remote
system configuration, off-hours maintenance, and next generation power management.
Additional capabilities have been incorporated into Intelligent Manageability to provide an
extensive solution for managing networked computing environments.
Wired for Management technologies include:
■ Desktop Management Interface (DMI) 2.0
■ Remote System Installation
■ Remote Wakeup and Remote Shutdown
■ ACPI-Ready Hardware
■ SMBIOS
■ Pre-boot Execution (PXE) support
■ Boot Integrity Services (BIS)
Desktop Management
3.4 Asset Tracking and Security
The asset control features incorporated into the computer provide key asset tracking data that can
be managed using HP Insight Manager products and Management Solutions Partners products.
Seamless, automatic integration between AssetControl features and these products enables you
to choose the management tool that is best suited to your environment and to leverage your
investment in existing tools.
HP workstations are manufactured with the hardware and firmware required to fully support the
DMI 2.0 standard.
HP also offers several solutions for controlling access to valuable components and information.
Security features such as the Smart Cover Sensor and the Smart Cov er Lock, available on select
models, help to prevent unauthorized access to the internal components of the personal computer .
By disabling parallel, serial, or USB ports, or by disabling removable media boot capability, you
can protect valuable data assets. Memory Change and Smart Cover Sensor alerts can be
automatically forwarded to HP Insight Manager products to deliver proactive notification of
tampering with a computer’s internal components.
There are three ways to manage security settings on your HP computers:
■ Locally, using the Setup Utilities. See the Computer Setup (F10) Utility Guide included with
the computer for additional information and instructions on using the Computer Setup
Utilities.
■ Remotely, using the Remote Security Management software. This software enables the
secure, consistent deployment and control of security settings from a central point on the
network using a third-party PC LAN management application such as Microsoft SMS.
■ Remotely, using HP Insight Manager LC, a tool for managing PC workgroups.
Service Reference Guide3–9
Desktop Management
The following table and sections refer to managing security features of your computer locally
through the Setup Utilities. Refer to the Remote Management Setup Utilities for more
information on using the Remote Security Management software. These utilities are available on
the HP web site at www.hp.com.
Security Features Overview
FeaturePurposeHow It Is Established
Removable Media Boot
Control
Serial, Parallel, USB, or
Infrared Interface Control
Power-On PasswordPrevents use of the computer
Setup PasswordPrevents reconfiguration of
Network Server ModeProvides unique security
DriveLockPrevents unauthorized access
Prevents booting from the
removable media drives.
Prevents transfer of data
through the integrated serial,
parallel, USB (universal serial
bus), or infrared interface.
until the password is entered.
This can apply to both initial
system startup and restarts.
the computer (use of the
Computer Setup Utilities) until
the password is entered.
features for computers being
used as servers.
to the data on specific hard
drives. This feature is
available on select models
only.
From the Setup Utilities menu.
From the Setup Utilities menu.
From the Setup Utilities menu.
From the Setup Utilities menu.
From the Setup Utilities menu.
From the Setup Utilities menu.
Smart Cover SensorIndicates that computer cover
or side panel has been
removed. Can be set to
require the setup password to
restart the computer, after the
cover or side panel has been
removed.
Master Boot Record SecurityMay prevent unintentional or
malicious changes to the
Master Boot Record of the
current bootable disk, and
provides a means of
recovering the “last known
good” MBR.
Memory Change AlertsDetects when memory
modules have been added,
moved, or removed; notifies
user and system
administrator.
3–10Service Reference Guide
From the Setup Utilities menu.
From the Setup Utilities menu.
For information on enabling
Memory Change Alerts, refer
to the online Intelligent
Manageability Guide.
Desktop Management
Security Features Overview (Continued)
FeaturePurposeHow It Is Established
Ownership TagDisplays ownership
Kensington Cable Lock
Provision
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide.
✎
3.4.1 Password Security
The power-on password prevents unauthorized use of the computer by requiring entry of a
password to access applications or data each time the computer is turned on or restarted. The
setup password specifically prevents unauthorized access to Computer Setup, and can also be
used as an override to the power-on password. That is, when prompted for the power-on
password, entering the setup password instead will allow access to the computer.
A network-wide setup password can be established to enable the system administrator to log in to
all network systems to perform maintenance without having to know the power-on password,
even if one has been established.
information, as defined by
the system administrator,
during system startup
(protected by setup
password).
Inhibits access to the interior
of the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a
fixed object to prevent theft.
From the Setup Utilities menu.
Install a Kensington cable
lock to secure the computer
to a fixed object.
Establishing a Setup Password Using Computer Setup
Establishing a setup password through Computer Setup prevents reconf iguration of the computer
(use of the Computer Setup utility) until the password is entered.
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
computer.
2. When the F10 Setup message appears in the lower-right corner of the screen, press the F10
key. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. Select Security, then select Setup Password and follow the instructions on the screen.
4. Before exiting, click File > Save Changes and Exit.
Establishing a Power-On Password Using Computer Setup
Establishing a power-on password through Computer Setup prevents access to the computer
when power is turned on, unless the password is entered. When a power-on password is set,
Computer Setup presents Password Options under the Security menu. The password options
include Network Server Mode and Password Prompt on Warm Boot.
Service Reference Guide3–11
Desktop Management
When Network Server Mode is disabled, the password must be entered each time the computer is
turned on when the key icon appears on the monitor. When Password Prompt on Warm Boot is
enabled, the password must also be entered each time the computer is rebooted. When Network
Server Mode is enabled, the password prompt is not presented during POST, but any attached
PS/2 keyboard will remain locked until the user enters the power-on password.
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer.
2. When the F10 Setup message appears in the lower-right corner of the screen, press the F10
key. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. Select Security, then Power-On Password and follow the instructions on the screen.
4. Before exiting, click File > Save Changes and Exit.
Entering a Power-On Password
To enter a power-on password, complete the following steps:
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer.
2. When the key icon appears on the monitor, type your current password, then press Enter.
Type carefully; for security reasons, the characters you type do not appear on the screen.
✎
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
Entering a Setup Password
If a setup password has been established on the computer, you will be prompted to enter it each
time you run Computer Setup.
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
computer.
2. When the F10=Setup message appears in the lower-right corner of the screen, press the F10
key.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. When the key icon appears on the monitor, type the setup password, then press the Enter ke y.
Type carefully; for security reasons, the characters you type do not appear on the screen.
✎
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
3–12Service Reference Guide
Changing a Power-On or Setup Password
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer. To change the setup password, run Computer Setup.
2. When the key icon appears, type your current password, a slash (/) or alternate delimiter
character, your ne w password, another slash (/) or alternate delimiter character , and your ne w
password again as shown:
current password/new password/new password
Type carefully; for security reasons, the characters you type do not appear on the screen.
✎
3. Press the Enter key.
The new password takes effect the next time you turn on the computer.
Refer to the “National Keyboard Delimiter Characters” section in this chapter for information
✎
about the alternate delimiter characters.
The power-on password and setup password may also be changed using the Security options in
Computer Setup.
Desktop Management
3.4.2 Deleting a Power-On or Setup Password
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer. To delete the setup password, run Computer Setup.
2. When the key icon appears, type your current password followed by a slash (/) or alternate
delimiter character as shown:
current password/
3. Press the Enter key.
Refer to “National Keyboard Delimiter Characters” table for information about the alternate
✎
delimiter characters. The power-on password and setup passw ord may also be changed using the
Security options in Computer Setup.
National Keyboard Delimiter Characters
Each keyboard is designed to meet country-specific requirements. The syntax and keys that you
use for changing or deleting your password depend on the keyboard that came with your
computer.
German-Portuguese-U.S. English/
* For Bosnia-Herzegovina, Croatia, Slovenia, and Yugoslavia
éPolish-U.K. English/
Clearing Passwords
If you forget your password, you cannot access the computer . Refer to the Tr oubleshooting Guide
for instructions on clearing passwords.
3.4.3 Network Server Mode
Network Server Mode provides unique security features for computers being used as servers. It is
only available when a power-on password has been set in Computer Setup. When the Network
Server Mode is enabled, the power-on password is not required to boot the hard drive, and a
keyboard is not required to be attached to the system. If a PS/2 keyboard is present, it will be
locked until the user enters the power-on passw ord. If a USB keyboard is present, it will remain
usable by default. To pre vent USB keyboard access after the operating system has loaded, a user
must hide the USB Port under the Device Security option of Computer Setup’s Security menu.
When used in conjunction with the Computer Setup After Power Loss power -on option, Network
Server Mode permits the “server” to automatically reboot after a power interruption without user
intervention. While Network Server Mode is enabled, the po wer-on password must be entered to
boot the removable media (e.g. diskettes) or removable devices (e.g. USB flash devices).
3.4.4 DriveLock
DriveLock is a security feature that pre vents unauthorized access to the data on specific hard
drives. DriveLock has been implemented as an extension to Computer Setup. It is only available
on certain systems and only when DriveLock-capable hard drives are detected.
DriveLock employs a two-password security scheme. One password is intended to be set and
used by a system administrator while the other is typically set and used by the end-user. There is
no “back-door” that can be used to unlock the drive if both passwords are forgotten. Therefore,
DriveLock is most safely used when the data contained on the hard drive is replicated on a
corporate information system or is regularly backed-up.
In the event that both DriveLock passwords are lost, the hard drive is rendered unusable.
Using DriveLock
The DriveLock option appears under the Security menu in Computer Setup. The user is
presented with options to set the master password or to enable DriveLock. A user passw ord must
be provided in order to enable DriveLock. Since the initial configuration of DriveLock is
typically performed by a system administrator, a master password should be set first. HP
encourages system administrators to set a master password whether they plan to enable
DriveLock or keep it disabled. This will give the administrator the ability to modify DriveLock
settings if the drive is locked in the future. Once the master password is set, the system
administrator may enable DriveLock or choose to keep it disabled.
3–14Service Reference Guide
If a locked hard drive is present, POST will require a password to unlock the device. If a
power-on password is set and it matches the device’s user password, POST will not prompt the
user to re-enter the password. Otherwise, the user will be prompted to enter a DriveLock
password. Either the master or the user password may be used. Users will have two attempts to
enter a correct password. If neither attempt succeeds, POST will continue but the data on the
drive will remain inaccessible.
DriveLock Applications
The most practical use of the DriveLock security feature is in a corporate environment where a
system administrator provides users with multibay hard drives for use in some desktop
computers. The system administrator would be responsible for configuring the multibay hard
drive which would involve, among other things, setting the DriveLock master password. In the
event that the user forgets the user password or the equipment is passed on to another employee,
the master password can always be used to reset the user password and regain access to the hard
drive.
HP recommends that corporate system administrators who choose to enable DriveLock also
establish a corporate policy for setting and maintaining master passwords. This should be done to
prevent a situation where an employee intentionally or unintentionally sets both DriveLock
passwords before leaving the company. In such a scenario, the hard drive would be rendered
unusable and require replacement. Likewise, by not setting a master passw o rd, system
administrators may find themselves locked out of a hard drive and unable to perform routine
checks for unauthorized software, other asset control functions and support.
Desktop Management
For users with less stringent security requirements, HP does not recommend enabling DriveLock.
Users in this category include personal users or users who do not maintain sensitiv e data on their
hard drives as a common practice. For these users, the potential loss of a hard drive resulting
from forgetting both passwords is much greater than the value of the data DriveLock has been
designed to protect. Access to Computer Setup and DriveLock can be restricted through the
Setup password. By specifying a Setup password and not giving it to end users, system
administrators are able to restrict users from enabling DriveLock.
Service Reference Guide3–15
Desktop Management
3.4.5 Smart Cover Sensor
Smart Cover Sensor is a combination of hardware and software technology that can alert you
when the computer cover or side panel has been removed. There are three levels of protection, as
described in the following table.
Smart Cover Sensor Protection Levels
LevelSettingDescription
Level 0Smart Cover = DisabledSmart Cover Sensor is
Level 1Smart Cover = Notify UserWhen the computer is
disabled (default).
restarted, the screen displays
a message indicating that the
computer cover or side panel
has been removed.
Level 2Setup Password = enabled
and
Smart Cover = notify user
When the computer is
restarted, the screen displays
a message indicating that the
computer cover or side panel
has been removed. You must
enter the setup password to
continue.
Setting the Smart Cover Sensor Protection Level
To set the Smart Cover Sensor protection level, complete the following steps:
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer.
2. When the F10 Setup message appears in the lower-right corner of the screen, press the F10
key. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. Select Security, then Smart Cover, and follow the instructions on the screen.
4. Before exiting, click File > Save Changes and Exit.
3–16Service Reference Guide
3.4.6 Smart Cover Lock
The Smart Cover Lock is available as an option on hp workstation xw4000 models. When
installed, the Smart Cover Lock can prevent unauthorized access to the internal components.
CAUTION: For maximum cover lock security, be sure to establish a setup password. The setup password
Ä
prevents unauthorized access to the Setup utility.
Locking the Smart Cover Lock
To activate and lock the Smart Cover Lock, complete the following steps:
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer.
2. When the F10 Setup message appears in the lower-right corner of the screen, press the F10
key. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. Select Security, then select Smart Cover and the Locked option.
Desktop Management
4. Before exiting, click File > Save Changes and Exit.
Unlocking the Smart Cover Lock
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer.
2. When the F10 Setup message appears in the lower-right corner of the screen, press the F10
key. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. Select Security > Smart Cover > Unlocked.
4. Before exiting, click File > Save Changes and Exit.
Service Reference Guide3–17
Desktop Management
Using the Smart Cover FailSafe Key
If you enable the Smart Cover Lock and cannot enter your password to disable the lock, you will
need a Smart Cover FailSafe K ey to open the computer co v er. You will need the key in any of the
following circumstances:
■ Power outage
■ Startup failure
■ PC component failure (such as processor or power supply)
■ Forgotten password
CAUTION: The Smart Cover FailSafe Key is a specialized tool available from HP. Be prepared; order
Ä
this key before you need one.
To obtain the FailSafe Key, do any one of the following:
■ Contact your authorized HP reseller or service provider.
■ Refer to the HP web site (www.hp.com) for ordering information.
■ Call the appropriate number listed in the warranty.
For more information about using the Smart Cover FailSafe Key, consult the Hardware
Reference Guide.
3.4.7 Master Boot Record Security
The Master Boot Record (MBR) contains information needed to successfully boot from a disk
and to access the data stored on the disk. Master Boot Record Security may prevent unintentional
or malicious changes to the MBR, such as those caused by some computer viruses or by the
incorrect use of certain disk utilities. It also allows you to recover the “last known good” MBR,
should changes to the MBR be detected when the system is restarted.
To enable MBR Security, complete the following steps:
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer.
2. When the F10 Setup message appears in the lower-right corner of the screen, press the F10
key. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. Select Security > Master Boot Record Security > Enabled.
4. Select Security > Save Master Boot Record.
5. Before exiting, click File > Save Changes and Exit.
When MBR Security is enabled, the BIOS prevents any changes being made to the MBR of the
current bootable disk while in MS-DOS or Windows Safe Mode.
Most operating systems control access to the MBR of the current bootable disk; the BIOS cannot
✎
prevent changes that may occur while the operating system is running.
3–18Service Reference Guide
Desktop Management
Each time the computer is turned on or restarted, the BIOS compares the MBR of the current
bootable disk to the previously saved MBR. If changes are detected and if the current bootable
disk is the same disk from which the MBR was previously saved, the following message is
displayed:
1999 - Master Boot Record has changed.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk;
■ Restore the previously saved MBR; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists. If changes are detected and if the current
bootable disk is not the same disk from which the MBR was previously saved, the following
message is displayed:
2000 - Master Boot Record Hard Drive has changed.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists.
In the unlikely event that the pre viously sav ed MBR has been corrupted, the following message is
displayed:
1998 - Master Boot Record has been lost.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists.
Service Reference Guide3–19
Desktop Management
Before You Partition or Format the Current Bootable Disk
Ensure that MBR Security is disabled before you change partitioning or formatting of the current
bootable disk. Some disk utilities, such as FDISK and FORMAT, attempt to update the MBR. If
MBR Security is enabled when you change partitioning or formatting of the disk, you may
receive error messages from the disk utility or a warning from MBR Security the next time the
computer is turned on or restarted. To disable MBR Security, complete the following steps:
1. Turn on or restart the computer . If you are in W indo ws, click Start > Shut Down > Restart the
Computer.
2. When the F10 Setup message appears in the lower-right corner of the screen, press the F10
key. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key while the message is displayed, you must restart the computer to
✎
access the utility.
3. Select Security > Master Boot Record Security > Disabled.
4. Before exiting, click File > Save Changes and Exit.
3.4.8 Cable Lock Provision
The rear panel of the chassis can accommodate a cable lock accessory that allows the computer
to be physically secured to a work area.
For illustrated instructions, please see the Hardware Reference Guide on the Documentation Library CD.
3.4.9 Fingerprint Identification Technology
Eliminating the need to enter user passwords, Compaq Fingerprint Identification Technology
tightens network security, simplifies the login process, and reduces the costs associated with
managing corporate networks.
Support for Fingerprint Identification Technology varies by model.
✎
See www.compaq.com/products/options/fit/index.html for more information.
3.5 Fault Notification and Recovery
Fault Notification and Recovery features combine innovative hardware and software technology
to prevent the loss of critical data and minimize unplanned downtime.
When a fault occurs, the computer displays a Local Alert message containing a description of the
fault and any recommended actions. You can then view current system health by using the
Management Agent. If the computer is connected to a network managed by a HP Insight
Manager product or other management products from HP Management Solutions Partners, the
computer also sends a fault notice to the network management application.
3–20Service Reference Guide
3.5.1 Drive Protection System
The Drive Protection System (DPS) is a diagnostic tool built into the hard drives installed in
select HP workstations. DPS is designed to help diagnose problems that might result in
unwarranted hard drive replacement.
Each installed hard drive is tested using DPS, and a permanent record of key information is
written onto the drive. Each time DPS is run, test results are written to the hard drive. Your
service provider can use this information to help diagnose conditions that caused you to run the
DPS software. Refer to the Troubleshooting Guide for instructions on using DPS.
3.5.2 Ultra ATA Integrity Monitoring
Ultra ATA Integrity Monitoring monitors the integrity of data as it is transferred between an Ultra
ATA hard drive and the system’s core logic. If the computer detects an abnormal number of
transmission errors, the computer displays a Local Alert message with recommended actions.
3.5.3 ECC Fault Prediction and Prefailure Warranty
When the computer encounters an excessive number of error checking and correcting (ECC)
memory errors, the computer displays a Local Alert message. This message contains detailed
information about the errant memory module, allowing you to take action before you experience
non-correctable memory errors. The Prefailure Warranty for ECC memory modules allows you
to replace these modules, free of charge, before the modules actually fail. ECC memory modules
are optional on selected HP systems.
Desktop Management
To use this feature, you must replace the standard DIMMs or RIMMs with ECC DIMMs or ECC
✎
RIMMs.
3.5.4 Surge-Tolerant Power Supply
An integrated surge-tolerant power supply provides greater reliability when the computer is hit
with an unpredictable power surge. This power supply is rated to withstand a power surge of up
to 2000 volts without incurring any system downtime or data loss.
3.5.5 Thermal Sensor
The thermal sensor is a hardware and software feature that tracks the internal temperature of the
computer. This feature displays a warning message when the normal range is exceeded, which
gives you time to take action before internal components are damaged or data is lost.
Service Reference Guide3–21
Desktop Management
3–22Service Reference Guide
Ultra ATA Drive Guidelines and Features
4.1 Ultra ATA Jumpers
Ultra ATA drives are configured by means of jumper settings. These systems use driv es ship with
the jumpers preset to the cable-select mode; therefore, no jumper setting changes are required on
factory preinstalled, replacement, or option drives. With cable-select, the drive is configured as
either Master (Drive/De vice 0) or Slave (Driv e/Device 1) by its physical attachment to the cable.
If you purchase a third-party hard drive, refer to the documentation included with the drive kit to
ensure proper cable installation and configuration.
All drives on a controller channel need to have their jumpers either in the cable-select mode or
✎
have the individual drive jumper installed on the appropriate Master (Drive/Device 0) or Slave
(Drive/Device 1) position.
4.2 Ultra ATA Cables
4
When installing a second device on either the primary or secondary controller, you must use an
industry standard 80-conductor Ultra ATA cable for optimal performance. These cables have a
maximum length of 18 inches and a maximum distance of 6 inches between the two devices for a
two-drive cable.
Drives operating at speeds faster than those of the Ultra ATA-33 devices require
industry-standard 40-pin, 80-conductor cables to maintain the higher data transfer rates possible
with the improved technology.
When using Ultra ATA-100, -66, and slower -33 drives in the same system, each drive will
operate at its appropriate data transfer rate.
4.2.1 Cable Layout
The faces of industry-standard cable connectors are color coded for easy recognition:
■ System board connector = blue face
■ Device 0 connector = black face
■ Device 1 connector = gray face
The color code of an industry-standard cable is valid only if the drive’s jumper is in the
✎
cable-select position.
Service Reference Guide4–1
Ultra ATA Drive Guidelines and Features
Single-Drive Cable
System
Board
Blue
Face
Device 0
(master)
Black
Face
Two-Drive Cable
System
Board
Blue
Face
On a two-drive cable, the Drive/Device 0 connector is always the farthest one from the system
board connector and the Drive/Device 1 connector is always the closest to the system board
connector.
Some cables may be labeled “Drive 0” instead of “Device 0” and “Drive 1” instead of “Device
✎
1”.
Device 1
(slave)
Gray
Face
Device 0
(master)
Black
Face
4.3 Drive Installation Guidelines
Most computer system boards have two ATA (IDE) controller channels with a dedicated
connector for each controller. One controller is designated as the primary and the other as the
secondary controller.
Each of the two controllers can have up to two de vices attached to it. Each computer system may
therefore have a maximum of four ATA/ATAPI drives. All drives are connected to these
controllers using an industry-standard 80-conductor cable.
The industry standard 1.44 MB diskette drive has its o wn separate channel and is not included as
✎
a part of the maximum four drives.
Any drive attached to a controller must have a drive designation. If only a single drive is
connected to a controller and its jumper is in the cable-select position, it is designated as the
Master Drive (Drive/Device 0) by its attachment to the Drive/Device 0 cable position. If two
cable-selected drives are connected to a single controller, one will be designated by its
attachment to the cable as the Master (Drive/Device 0) and the other as Slave (Drive/Device 1).
For optimal performance of a computer system, all drives need to be attached to the ATA
controllers in a specified sequence. This sequence is determined by the device class of the drives
and by specific attach sequence rules.
4–2Service Reference Guide
4.3.1 Device Classes
In order to determine the best drive attach sequence, ATA/ATAPI drives are segregated into four
different classes based upon the bandwidth demands they place on an ATA controller. The most
demanding devices are in Class 1 and the least demanding are in Class 4.
Ultra ATA Drive Guidelines and Features
Class 1
Hard
Drives
ATA-100
ATA-66
ATA-33
Class 2
High Speed
Optical Drives
DVD
DVD-CD R/W
Class 3
Optical Storage
Drives
R/W CD-ROM
CD-ROM
General Attach Guidelines
■ The lower the device class number, the faster the device and the more bandwidth required.
■ Drives installed in the Device 0 positions on both the primary and secondary controllers
receive the greatest possible bandwidth.
■ The bootable ATA hard drive should always be installed on the primary controller in the
Device 0 position.
4.3.2 Attach Sequence Rules by Class Priority
Drives should be attached in the sequence shown for optimum performance starting at position
1.
4
1
Class 4
Magnetic
Storage Drives
LS-120
Tape
Zip
3
Primary
2
41
Controller*
Secondary
32
Controller
Device 1Device 0
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary controller first before following the General Attach Sequence Rule.
Service Reference Guide4–3
Ultra ATA Drive Guidelines and Features
The attach sequence rule may also be stated in table format:
General Attach Sequence Rule*
SequenceDescription
1The lowest class drive - bootable hard drive recommended.
2If only two drives, the last drive goes here; otherwise the lowest class of the
remaining drives.
3If only three drives, attach the final drive here. If a fourth drive exists, attach
the lowest class drive here.
4If there is a fourth drive, attach the final drive here - the drive with the
highest class number of all devices.
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary controller first before following the General Attach Sequence Rule.
The rules allow for:
■ Keeping the hard drive on a separate controller channel maximizes drive performance until a
fourth device is added.
■ Keeping the hard drives and removable media drives on separate controller channels
maximizes compatibility.
■ Keeping the hard drive and the writable optical drive on separate controller channels
maximizes optical drive reliability.
4.3.3 Attach Sequence Worksheet
Use the worksheet below for obtaining optimum system performance when setting up a computer
with multiple drives. Use the General Attach Sequence Rule to determine the best drive
installation sequence.
Attach Sequence Worksheet
Device Name
Device
Class
Position
Number
Controller
Name
Device
Number
Two examples of how to use the worksheet are:
■ Three device installation
■ Four device installation
4–4Service Reference Guide
Ultra ATA Drive Guidelines and Features
Example 1: Three Device Installation Sample
A system has three devices: Ultra ATA-100 hard drive, CD-R OM drive, and a DVD drive. Using
the Device Class Table in Section 4.3.1, the devices may be identified as:
■ Ultra ATA-100 hard drive = Class 1
■ DVD drive = Class 2
■ CD-ROM drive = Class 3
Attach Sequence Worksheet - Three Device Installation (Sample)
Device
Device Name
Ultra ATA-100 hard drive11Primary0
DVD drive22Secondary0
CD-ROM drive33Secondary1
Class
4
3
Primary
Position
Number
1
2
Controller
Name
41
Controller*
Secondary
32
Controller
Device 1Device 0
Device
Number
Example 2: Four Device Installation Sample
A system has four devices: Ultra ATA-100 hard drive, Ultra ATA-100 hard drive, DVD-CDR/W
drive, and a ZIP-250 drive. Using the Device Class Table in Section 4.3.1, the devices may be
reidentified as:
■ Ultra ATA-100 hard drive = Class 1
■ Ultra ATA-100 hard drive = Class 1
■ DVD-CDR/W drive = Class 2
■ ZIP-250 drive = Class 4
Service Reference Guide4–5
Ultra ATA Drive Guidelines and Features
Attach Sequence Worksheet - Four Device Installation (Sample)
Device
Device Name
Ultra ATA-100 hard drive11Primary0
DVD-CDR/W drive22Secondary0
ZIP-250 drive 43Secondary1
Ultra ATA-100 hard drive*14Primary1
Class
Position
Number
Controller
Name
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary controller first before following the General Attach Sequence Rule.
4
3
Primary
1
2
41
Controller*
Secondary
32
Controller
Device
Number
Device 1Device 0
4.3.4 Additional Drive Application Notes
■ When replacing a hard drive, the replacement should be of the same type (Ultra ATA -33,
-66, or -100) as that being removed to retain the same level of performance.
■ When Ultra ATA and SCSI hard drives are mixed in the same system, the Ultra ATA drive
will become the boot drive unless the boot order is changed in Computer Setup (F10 Setup).
4.4 SMART
The Self Monitoring Analysis and Recording Technology (SMART) ATA drives for the HP
workstations have built-in drive failure prediction that warns the user or the network
administrator of an impending failure or crash of the hard drive. The SMART drives track fault
prediction and failure indication parameters such as reallocated sector count, spin retry count,
and calibration retry count. If the drive determines that a failure is imminent, it generates a fault
alert.
4–6Service Reference Guide
4.5 Drive Capacities
The combination of the file system and the operating system used in the computer determines the
maximum usable size of a drive partition. A drive partition is the largest segment of a drive that
may be properly accessed by the operating system. A single hard drive may therefore be
subdivided into a number of unique drive partitions in order to make use of all of its space. The
table that follows identifies the capabilities and restrictions imposed on the computer by the
combinations of file and operating systems.
Microsoft to Drive Manufacturer Size Conversion Table*
Ultra ATA Drive Guidelines and Features
Drive Size as Identified by
Microsoft Operating System
2 GB2.1 GB
4 GB4.3 GB
32 GB34.4 GB
64 GB68.7 GB
128 GB137 GB
2 TB2.199 TB
*Drive size calculations by drive manufacturers are bytes to the base 10
while calculations by Microsoft are bytes to the base 2.
Drive Size as Identified by
Drive Manufacturers
Drive/Partition Capacity Limits
Maximum Size
File
System
FAT 16ATA or SCSIDOS/Windows 952 GB128 GB
FAT 16ATA or SCSIWindows NT4 GB128 GB
Controller
TypeOperating System
Partition Drive
FAT 32ATA or SCSIWindows 98/SE64 GB128 GB
FAT 32ATAWindows 98/SE with
QFE* and Windows ME
FAT 32SCSIWindows 98/SE with
QFE* and Windows ME
FAT 32ATAWindows 2000/ XP32 GB128 GB
FAT 32SCSIWindows 2000/ XP32 GB2 TB
NTFSATAWindows NT/2000/XP128 GB128 GB
NTFSSCSIWindows NT/2000/XP2TB2TB
*For Windows 98/SE with QFE see www.microsoft.com, search for Q263044 for
details on how to expand partition size.
Service Reference Guide4–7
128 GB128 GB
2 TB2 TB
Ultra ATA Drive Guidelines and Features
4–8Service Reference Guide
5.1 SCSI Guidelines
These systems support a mixed configuration of UATA/IDE and SCSI hard drives. In a mixed
✎
configuration the UATA/IDE drive must be specified as the boot drive.
When installing and operating SCSI devices, you must follow these guidelines:
■ A narrow (50-pin) SCSI controller allows you to daisy-chain up to 7 additional SCSI
devices. Counting the controller, that amounts to 8 total SCSI devices.
■ A wide (68-pin) SCSI controller allows you to daisy-chain up to 15 additional SCSI devices.
Counting the controller, that amounts to 16 total SCSI devices.
■ If two narrow (50-pin) SCSI controllers are each connected to separate system board SCSI
connectors, each controller may have seven SCSI devices attached. Counting the controller,
this gives a total of 16 SCSI devices on the system.
5
SCSI Devices
■ HP does not recommend mixing different width SCSI devices on the same SCSI chain or on
the same SCSI channel. Mixing devices of different widths on the same chain or channel will
always result in a data transfer rate of the slowest machine in that chain. The only exception
to this is that Ultra Wide SCSI de vices will cause a speed degradation when mix ed with other
68-pin devices.
■ If multiple SCSI devices are used, split the devices between Channels A and B for optimum
performance. Cable length for the second channel should not be longer than 18 inches.
■ If two controllers are used, each may use SCSI devices having widths and speeds different
from the other. If a 68-pin data cable is used on a controller having 50-pin SCSI devices, use
an internal cable adapter (Compaq number 199618-001) or an external cable adapter
(Compaq number 270187-B21).
CAUTION: Do not route data cables near the air intake to the power supply. Cables routed in this
Ä
manner may block the airflow and cause the computer to overheat.
■ All SCSI controllers require a unique SCSI ID (0-7 or 8-15) for each SCSI device installed.
The controller identifies a SCSI device by its SCSI ID number rather than its location.
Moving a SCSI device from one position to another on the SCSI chain does not affect
communication between the controller and the device. The reserved and available SCSI ID
numbers for SCSI devices are:
❏ 0 is reserved for the primary hard drive.
❏ 7 is reserved for the SCSI controller.
❏ 1 through 6 and 8 through 15 are available for all other SCSI devices.
Service Reference Guide5–1
SCSI Devices
■ 68-pin SCSI controllers require a 53 inch maximum length-twisted pair, LVD cable with
built-in terminator, maximum of 5 drives with a minimum driving spacing of 5.25 inches.
■ Every SCSI chain or circuit must be terminated (closed) at both ends. Some system boards
have both ends of the SCSI cable connected to, and terminated by, the system board.
Termination can be accomplished in one of several ways:
❏ Use a cable with a built-in terminator.
❏ Use a cable with a terminating resistor plug in the last connector.
❏ Connect a SCSI device with its termination enabled into the last connector.
❏ Connect an external SCSI device with its termination enabled to the external SCSI
connector on the rear panel of the computer.
■ Turn on all external SCSI devices before turning on the power to the computer. This enables
the SCSI controller to recognize the external devices.
5.2 Using the Multi-Mode SCSI Cable
Some products ship standard with a multi-mode SCSI cable having a terminator 1 on one end.
This cable supports both low voltage differential (LVD) and single ended (SE) devices. One end
of the cable connects to the internal LVD/SE connector on the system board, with the remaining
connectors used on the hard drives.
1
The multi-mode cable included with the computer may differ from the one pictured.
✎
For additional information about installing optional SCSI devices, refer to the documentation
included with the device option kit.
5–2Service Reference Guide
SCSI Devices
5.3 Using SCSI
The Ultra160 and faster SCSI host adapters include the SCSISelect utility to configure the host
adapter and to run the SCSI disk utilities. To run the SCSISelect utility:
■ In POST Messages Enabled mode: Press Ctrl+A when the Press<Ctrl><A> for SCSISelect
Utility message appears during POST.
■ In POST Messages Disabled mode: When the HP/Compaq logo screen appears, press any
key to exit the logo screen. Immediately after ex iting the logo screen, press Ctrl+A to access
the SCSISelect utility
A menu appears with the following options:
■ Configure/View Host Adapter Settings
❏ SCSI Bus Interface Definitions
◆ Host Adapter SCSI ID
◆ SCSI Parity Checking
◆ Host Adapter SCSI Termination
❏ Additional Options
◆ Boot Device Options
◆ SCSI Device Configuration
◆ Advanced Configuration Options
Select
with SCSI Devices
■ SCSI Disk Utilities
❏ Lists all SCSI devices and SCSI ID numbers
For additional information about configuring POST message display status, refer to the
✎
Computer Setup (F10) Utility Guide.
5.4 SMART
The Self Monitoring Analysis and Reporting Technology (SMART) IDE and SCSI hard drives
for HP workstations have built-in drive failure prediction that warns the user or the network
administrator of an impending failure or crash of the hard drive. SMART drives track fault
prediction and failure indication parameters such as re-allocated sector count, spin retry count,
and calibration retry count. If the drive determines that a failure is imminent, it generates a fault
alert.
Service Reference Guide5–3
SCSI Devices
5.5 Jumpers
The specifications included below are the standard drive configurations.
5.5.1 Ultra3 SCSI Hard Drive
SCSI IDBit 2Bit 1Bit 0
0
1jumper
2jumper
3jumperjumper
4jumper
5jumperjumper
6jumperjumper
SCSI ID Settings
Default Settings
SignalDescriptionJumper
SStart unit command
enabled
PParity enabledjumper
WWrite protect disabled
XSwitch data transfer
enabled
1. Drive intended only for non-pluggable applications. Migration to a
✎
hot-pluggable drive tray is not supported.
2. All jumper and switch settings shown in the factory default setting, including
those not labeled.
3. Termination is disabled/removed.
jumper
5–4Service Reference Guide
5.5.2 CD-ROM or DVD-ROM Drive
SCSI Devices
5.5.3 Zip Drive
CSM
SLA
Use CSELSlaveMaster
CSM
SLA
CSM
SLA
Jumper Settings
ConfigurationPair 1Pair 2Pair 3
Device 0 (Master)jumper
Device 1 (Slave)
Cable Select (Default)jumper
After changing the jumper settings, reboot the computer to recognize the new address.
✎
Service Reference Guide5–5
SCSI Devices
5–6Service Reference Guide
6.1 SATA guidelines
The xw6000 system supports a mixed configuration of U AT A /IDE, SCSI, and SAT A hard dri v es.
✎
Review the following diagram and table to determine the correct drive configuration for your
system.
When installing and operating SATA devices, you must follow these guidelines:
■ Connect the 4-2 pin LED cable (225537-001, included with SATA RAID controller kit) from
the RAID card header “JP1” (4 pin header) to the system board header labeled “SCSI LED”
(2 pin header).
■ Use the 14 inch SATA data cable with a straight connectors (326965-004) for the hard drive
bays.
■ Use the longest data cable with the straight connectors (326965-002) if installing a hard drive
in an optical bay (with adaptor).
6
SATA Devices
To maintain Class B standards for radiated emissions, SATA cables on HP workstation xw6000
systems must be routed so they do not contact the access panel. Loosely tie-wrap the SATA
cables to the audio cable as shown in the following illustrations.
cable routing shown with a standard graphics card (left photo) and with an AGP support bracket (right photo)
Service Reference Guide6–1
SATA Devices
6.2 boot order
The following flow diagram shows the boot order of hard drives (C:) connected to the different
controllers in the workstation system.
Using the F10 Computer Setup Utility , you can modify the boot order by arranging the Controller
Order on the Storage tab. Although not shown, other bootable device options such as a diskette,
CD-ROM, USB, network, and so on can be set up from the Storage tab as well.
The F10 Computer Setup Utility can be accessed by pressing F10 during boot.
✎
6–2Service Reference Guide
6.3 hard drive configurations
The following table presents common physical hard drive configurations for the HP workstation
xw6000.
First Hard Drive BaySecond Hard Drive BayThird Hard Drive at
*Part of logical hard drive in a RAID array.
** This could be part of logical hard drives in a RAID array or stand alone physical drive.
The first hard drive bay is the recommended position for the drive containing the bootable OS.
✎
For systems with bootable RAID array, the bootable logical drive can exist on multiple physical
hard drives. SATA plug-in Controller are only recommended for RAID purposes.
Service Reference Guide6–3
SATA Devices
6–4Service Reference Guide
Identifying the Chassis, Routine Care, and
Disassembly Preparation
This chapter provides general service information for the computer . Adherence to the procedures
and precautions described in this chapter is essential for proper service.
CAUTION: When the computer is plugged into an AC power source voltage is always applied to the
Ä
system board. You must disconnect the power cord from the power source before opening the computer
to prevent system board or component damage.
7.1 C h as s i s Type
The hp workstation xw4000 and hp workstation xw6000 series use a Convertible Minitower
chassis. The Convertible Minitower chassis features a hard drive bay cluster that may be rotated,
allowing the chassis to be configured either as a minitower (vertical) or a desktop (horizontal).
7
The chassis of the hp workstation xw4000 and the hp workstation xw6000 are very similar when
viewed from the front. When viewed from the rear the systems are distinguished by the number
of fans (two on the xw4000, three on the xw6000) and minor differences in I/O layout.
Service Reference Guide7–1
Identifying the Chassis, Routine Care, and Disassembly Preparation
7.2 Electrostatic Discharge Information
A sudden discharge of static electricity from your finger or other conductor can destroy
static-sensitive devices or microcircuitry. Often the spark is neither felt nor heard, but damage
occurs. An electronic device exposed to electrostatic discharge (ESD) may not appear to be
affected at all and can work perfectly throughout a normal cycle. The device may function
normally for a while, but it has been degraded in the internal layers, reducing its life expectancy.
Networks built into many integrated circuits provide some protection, but in many cases, the
discharge contains enough power to alter device parameters or melt silicon junctions.
7.2.1 Generating Static
The following table shows that:
■ Different activities generate different amounts of static electricity.
■ Static electricity increases as humidity decreases.
Relative Humidity
Event55%40%10%
Walking across carpet
Walking across vinyl floor
Motions of bench worker
Removing DIPs* from plastic tube
Removing DIPs* from vinyl tray
Removing DIPs* from Styrofoam
Removing bubble pack from PCB
Packing PCBs in foam-lined box
*These are then multi-packaged inside plastic tubes, trays, or Styrofoam.
700 volts can degrade a product.
✎
7,500 V
3,000 V
400 V
400 V
2,000 V
3,500 V
7,000 V
5,000 V
15,000 V
5,000 V
800 V
700 V
4,000 V
5,000 V
20,000 V
11,000 V
35,000 V
12,000 V
6,000 V
2,000 V
11,500 V
14,500 V
26,500 V
21,000 V
7–2Service Reference Guide
Identifying the Chassis, Routine Care, and Disassembly Preparation
7.2.2 Preventing Electrostatic Damage to Equipment
Many electronic components are sensitive to ESD. Circuitry design and structure determine the
degree of sensitivity. The following packaging and grounding precautions are necessary to
prevent damage to electric components and accessories.
■ To avoid hand contact, transport products in static-safe containers such as tubes, bags, or
boxes.
■ Protect all electrostatic parts and assemblies with conductive or approved containers or
packaging.
■ Keep electrostatic sensitive parts in their containers until they arriv e at static-free stations.
■ Place items on a grounded surface before removing them from their container.
■ Always be properly grounded when touching a sensitive component or assembly.
■ Avoid contact with pins, leads, or circuitry.
■ Place reusable electrostatic-sensitive parts from assemblies in protective packaging or
conductive foam.
7.2.3 Personal Grounding Methods and Equipment
Use the following equipment to prevent static electricity damage to equipment:
■ Wrist straps are flexible straps with a maximum of one-megohm ± 10% resistance in the
ground cords. To provide proper ground, a strap must be worn snug against bare skin. The
ground cord must be connected and fit snugly into the banana plug connector on the
grounding mat or workstation.
■ Heel straps/Toe straps/Boot straps can be used at standing workstations and are
compatible with most types of shoes or boots. On conductive floors or dissipati ve floor mats,
use them on both feet with a maximum of one-megohm ± 10% resistance between the
operator and ground.
Identifying the Chassis, Routine Care, and Disassembly Preparation
7.3 Rou t i ne Ca r e
7.3.1 General Cleaning Safety Precautions
1. Never use solvents or flammable solutions to clean the computer.
2. Never immerse any parts in water or cleaning solutions; apply any liquids to a clean cloth
and then use the cloth on the component.
3. Always unplug the computer when cleaning with liquids or damp cloths.
4. Always unplug the computer before cleaning the keyboard, mouse, or air vents.
5. Disconnect the keyboard before cleaning it.
6. Wear safety glasses equipped with side shields when cleaning the keyboard.
7.3.2 Cleaning the Computer Case
Follow all safety precautions in Section 6.2.1 before cleaning the computer.
To clean the computer case, follow the procedures described below:
■ To remove light stains or dirt, use plain water with a clean, lint-free cloth or swab.
■ For stronger stains, use a mild dishwashing liquid diluted with water. Rinse well by wiping it
with a cloth or swab dampened with clear water.
■ For stubborn stains, use isopropyl (rubbing) alcohol. No rinsing is needed as the alcohol will
evaporate quickly and not leave a residue.
■ After cleaning, always wipe the unit with a clean, lint-free cloth.
■ Occasionally clean the air vents on the computer. Lint and other foreign matter can block the
vents and limit the airflow.
7.3.3 Cleaning the Keyboard
Follow all safety precautions in Section 6.2.1 before cleaning the keyboard.
To clean the tops of the keys or the keyboard body, follow the procedures described in Section
6.2.2.
When cleaning debris from under the keys, review all rules in Section 6.2.1 before following
these procedures:
CAUTION: Use safety glasses equipped with side shields before attempting to clean debris from under
Ä
the keys.
■ Visible debris underneath or between the keys may be removed by vacuuming or shaking.
■ Canned, pressurized air may be used to clean debris from under the keys. Caution should be
used as too much air pressure can dislodge lubricants applied under the wide keys.
Service Reference Guide7–5
Identifying the Chassis, Routine Care, and Disassembly Preparation
■ If you remove a key, use a specially designed key puller to prevent damage to the keys. This
tool is available through many electronic supply outlets.
CAUTION: Never remove a wide leveled key (like the space bar) from the keyboard. If these keys are
Ä
improperly removed or installed, the keyboard may not function properly.
■ Cleaning under a key may be done with a swab moistened with isopropyl alcohol and
squeezed out. Be careful not to wipe away lubricants necessary for proper key functions. Use
tweezers to remove any fibers or dirt in confined areas. Allow the parts to air dry before
reassembly.
7.3.4 Cleaning the Monitor
■ Wipe the monitor screen with a clean cloth moistened with water or with a towelette
designed for cleaning monitors. Do not use sprays or aerosols directly on the screen; the
liquid may seep into the housing and damage a component. Never use solvents or flammable
liquids on the monitor.
■ To clean the monitor body follow the procedures in Section 6.2.2.
7.3.5 Cleaning the Mouse
Before cleaning the mouse, ensure that the power to the computer is turned off.
■ Clean the mouse ball by first removing the retaining plate and the ball from the housing. Pull
out any debris from the ball socket and wipe the ball with a clean, dry cloth before
reassembly.
■ To clean the mouse body, follow the procedures in 6.2.2.
7.4 Service Considerations
Listed below are some of the considerations that you should keep in mind during the disassembly
and assembly of the computer.
7.4.1 Power Supply Fan
The power supply fan is a variable-speed fan based on the temperature in the power supply.
CAUTION: The cooling fan is off only when the computer is turned off or the power cable has been
Ä
disconnected.
The cooling fan is always on when the computer is either in the “On,” “Standby,” or “Suspend” modes.
You must disconnect the power cord from the power source before opening the computer to prevent
system board or component damage.
7–6Service Reference Guide
Identifying the Chassis, Routine Care, and Disassembly Preparation
7.4.2 Tools and Software Requirements
To service the computer, you need the following:
■ Torx T-15 screwdriver (Compaq screwdriver with bits, PN 161946-001)
■ Torx T-15 screwdriver with small diameter shank (for certain front bezel removal)
■ Flat-bladed screwdriver (may sometimes be used in place of the Torx screwdriver)
The screws used in the computer are not interchangeable. They may have standard or metric
threads and may be of different lengths. If an incorrect screw is used during the reassembly
process, it can damage the unit. HP strongly recommends that all screws removed during
disassembly be kept with the part that was removed, then returned to their proper locations.
Metric screws have a black finish.
✎
U.S. screws have a silver finish.
As each subassembly is removed from the computer, it should be placed away from the work
✎
area to prevent damage.
7.4.4 Cables and Connectors
Most cables used throughout the unit are flat, flexible cables. These cables must be handled with
care to avoid damage. Apply only the tension required to seat or unseat the cables during
insertion or removal from the connector. Handle cables by the connector whenever possible. In
all cases, avoid bending or twisting the cables, and ensure that the cables are routed in such a way
that they cannot be caught or snagged by parts being removed or replaced.
CAUTION: When servicing this computer, ensure that cables are placed in their proper location during
Ä
the reassembly process. Improper cable placement can damage the computer.
Service Reference Guide7–7
Identifying the Chassis, Routine Care, and Disassembly Preparation
7.4.5 H a r d D rives
Handle hard drives as delicate, precision components, avoiding all physical shock and vibration.
This applies to failed drives as well as replacement spares.
■ If a drive must be mailed, place the drive in a bubble-pack mailer or other suitable protecti v e
packaging and label the package “Fragile: Handle With Care.”
■ Do not remove hard drives from the shipping package for storage. Keep hard drives in their
protective packaging until they are actually mounted in the CPU.
■ Avoid dropping drives from any height onto any surface.
■ If you are inserting or removing a hard drive, turn off the computer. Do not remove a hard
drive while the computer is on or in standby mode.
■ Before handling a drive, ensure that you are discharged of static electricity . While handling a
drive, avoid touching the connector. For more information about preventing electrostatic
damage, refer to Section 6.1, “Electrostatic Discharge Information.”
■ Do not use excessive force when inserting a drive.
■ Avoid exposing a hard dri v e to liquids, temperature extremes, or products that ha v e magnetic
fields such as monitors or speakers.
7.4.6 Lithium Coin Cell Battery
The battery that comes with the computer provides power to the real-time clock and has a
minimum lifetime of about three years.
See Chapter 9, “Removal and Replacement Procedures–Small Components,” for instructions on
the replacement procedures.
WARNING: This computer contains a lithium battery. There is a risk of fire and chemical burn if the
Å
battery is handled improperly. Do not disassemble, crush, puncture, short external contacts, dispose in
water or fire, or expose it to temperatures higher than 140ºF (60ºC).
CAUTION: Batteries, battery packs, and accumulators should not be disposed of together with the
Ä
general household waste.
7–8Service Reference Guide
Removal and Replacement Procedures
Security Components
This chapter describes the security components for the Convertible Minitower chassis. For an
overview of the chassis refer to Chapter 6 “Identifying the Chassis, Routine Care, and
Disassembly Preparation.”
CAUTION: When the computer is plugged into an AC power source voltage is always applied to the
Ä
system board. You must disconnect the power cord from the power source before opening the computer
to prevent system board or component damage.
This chapter provides general service information for the computer . Adherence to the procedures
and precautions described in this chapter is essential for proper service.
After completing all necessary removal and replacement procedures, run the Diagnostics utility
to verify that all components operate properly.
Not all features listed in this guide are available on all computers.
✎
8
8.1 Preparation for Disassembly
See Chapter 6, “Identifying the Chassis, Routine Care, and Disassembly Preparation,” for initial
procedures.
1. Remove/disengage any security devices that prohibit opening the computer.
2. Close any open software applications.
3. Exit the operating system.
4. Remove any diskette, compact disc, or MultiBay device from the computer.
5. Turn off the computer and any peripheral devices that are connected to it.
CAUTION: Turn off the computer before disconnecting any cables.
Ä
CAUTION: The cooling fan is off only when the computer is turned off or the power cable has been
Ä
disconnected. The cooling fan is always on when the computer is in the “On,” “Standby,” or “Suspend”
modes. You must disconnect the power cord from the power source before opening the computer to
prevent system board or component damage.
6. Disconnect the power cord from the electrical outlet and then from the computer.
7. Disconnect all peripheral device cables from the computer.
Service Reference Guide8–1
Removal and Replacement Procedures Security Components
8.2 Security Devices
8.2.1 Smart Cover Lock
The hp workstation xw4000 supports an optional Smart Cover Lock. This software-controllable
lock prevents unauthorized access to the internal components when the Smart Cover Lock and
setup password are enabled.
If you enabled the Smart Cover Lock, use Computer Setup to unlock it. If you cannot enter your
password to disable the lock, you will need a Smart Cover FailSafe Key (Compaq spare PN
166527-001 or 166527-002) to open the computer cover. You will also need the key in any of the
following circumstances:
■ Power outage
■ Startup failure
■ PC component (e.g., processor or power supply) failure
■ Lost password
CAUTION: The cooling fan is off only when the computer is turned off or the power cable has
Ä
been disconnected.
or “Suspend” modes. You must disconnect the power cord from the power source before
opening the computer to prevent system board or component damage.
The cooling fan is always on when the computer is in the “On,” “Standby,”
1. Prepare the computer for disassembly.
2. Using the Smart Cover FailSafe Key, remove the two tamper-proof screws that secure the
Smart Cover Lock to the chassis. Use the special Compaq tamper-resistant T-15 wrench (PN
166527-001) or screwdriver bit (PN 166527-002) for this operation.
To reattach the Smart Cover Lock, secure the lock in place with the tamper-proof screws.
8–2Service Reference Guide
8.2.2 Smart Cover Sensor
The Smart Cover Sensor is a software-controllable feature standard on hp workstation xw4000
and hp workstation xw6000 systems. This sensor can be activa ted with the Setup utility to detect
access panel removal and can be used as a security or maintenance aid. The sensor switch is
located on a mounting bracket toward the front of the chassis next to the drive bay area.
To remove the sensor switch use the following procedure:
1. Prepare the computer for disassembly.
2. Remove the access panel.
3. Disconnect the sensor switch cable 1 from the system board.
4. Push the sensor switch toward the front of the chassis 2 and then remove it downward from
the mounting bracket 3.
Removal and Replacement Procedures Security Components
Installation is the reverse of removal.
Service Reference Guide8–3
Removal and Replacement Procedures Security Components
8.2.3 Security Lock Bracket
The computer includes a provision for securing the access panel and/or computer with an
optional lock. With the access panel in place a padlock may be hooked through a holed flange (as
shown in the figure below) to deter unauthorized access to the inside of the computer.
A cable lock may be attached (using the same method as with a padlock) to secure the unit to a
desk and/or other equipment.
8–4Service Reference Guide
Removal and Replacement Procedures
This chapter describes the procedures for removal and replacement of hard drives. For an
overview of the Convertible Minitower chassis, refer to Chapter 6 “Identifying the Chassis,
Routine Care, and Disassembly Preparation.”
WARNING: Power is applied to the system board and power supply even when the power switch is
Å
turned off. To prevent damage to the unit, disconnect the power cord from the power source or the unit
before beginning disassembly procedures.
9.1 Introduction
When installing additional drives, follow these guidelines:
■ For optimal performance, connect hard drives to the primary controller. Connect expansion
devices, such as CD-ROM, IDE tape, and diskette drives to the secondary controller.
9
Drives
Refer to Chapter 4 for more detailed information on Ultra ATA drives and to Chapter 5 for SCSI
✎
drives.
■ You must install guide screws to ensure that the drive lines up correctly in the drive cage.
Extra guide screws are provided that are installed in the front of the computer chassis behind
the front bezel. Some options require metric hardware. Factory-supplied metric screws are
black.
■ Drive installation requires no jumper setting changes on the existing or optional drives. All
factory-installed drives have the jumpers preset for cable-select installation.
■ The system automatically recognizes hard drives any Plug and Play hard drive and will
automatically reconfigure the computer. If you installed a hard drive that is not a Plug and
Play device, you must run Computer Setup to reconfigure the computer.
If installing a second device on the primary controller, you must use an 80-conductor Ultra ATA
✎
cable for optimal performance. This cable is available as an HP option.
CAUTION: When servicing the computer, ensure that cables are placed in their proper locations during
Ä
the reassembly process. Improper cable placement can damage the computer.
Service Reference Guide9–1
Removal and Replacement Procedures Drives
9.2 Removing a Drive
Use the following procedure for removing a hard drive:
1. Prepare the computer for disassembly.
The computer should be placed in the horizontal (desktop) position for best stability.
✎
2. Remove the access panel.
3. Remove the front bezel.
4. Disconnect the power, data, and audio (if applicable) cables from the back of the drive.
5. Press the drivelock mechanism to unlock the drives. Drivelock 1 (yellow) secures the
external drives in the desktop configuration; drivelock 2 (green) secures all drives in the
minitower configuration and the internal drives in the desktop configuration.
9–2Service Reference Guide
Removal and Replacement Procedures Drives
6. While holding the drivelock in the unlocked position, remove the drive from the
drive bay.
7. Remove the four guide screws from the drive.
8. Install two guide screws on each side of the replacement drive.
Metric screws (M3) have a black finish; U.S. screws have a silver finish.
✎
Replace the drive by reversing the above procedure.
CAUTION: Use only 3/16-inch or 5-mm long screws as guide screws. Longer screws can damage the
Ä
internal components of the drive.
9.3 Installing a New Drive
Use the following procedure for installing a hard drive:
1. Install two guide screws on each side of the replacement drive 1.
2. Ensure that the guide screws line up with the guide slots 2, then slide the drive into the driv e
bay until it snaps into place.
3. Connect the power and signal cables to the back of the drive.
4. Remove the bezel blank from the subpanel, if necessary.
5. Reinstall the subpanel and the front bezel.
Refer to the previous drawing for these steps.
✎
Service Reference Guide9–3
Removal and Replacement Procedures Drives
9.4 Removing a 3.5-Inch Drive From a 5.25-Inch Drive
Adapter
A 3.5-inch drive must be installed into a 5.25-inch drive adapter in order to install the smaller
drive into a standard 5.25-inch drive bay.
1. Remove the bracket brace 1 from the top of the drive adapter by squeezing inward on both
sides, then rotating the brace up and out.
2. Remove the drive bezel 2.
Buttonless drives use a different front bezel but the removal procedure is the same.
✎
3. Remove the three screws 3 that secure the drive to the left and right sides of the drive
adapter.
4. Slide the drive 4 to the rear of the drive adapter until the diskette drive eject button is free of
the button protector, then lift the drive out of the drive adapter.
5. Remove the guide screws from the drive 5.
To replace the drive, reverse the previous procedures.
The primary 3.5-inch diskette drive should only be installed into bay 3 (the bottom bay in the
✎
minitower).
When replacing the drive, use the existing screws. Metric screws (M3) have a black finish while
U.S. screws (#6) have a silver finish.
CAUTION: Use only 3/16-inch or 5-mm long screws as guide screws. Longer screws can damage the
Ä
internal components of the drive.
9–4Service Reference Guide
Removal and Replacement Procedures
This chapter describes the procedures for removal and replacement of chassis subassemblies. For
an overview of the chassis refer to Chapter 6 “Identifying the Chassis, Routine Care, and
Disassembly Preparation.”
CAUTION: When the computer is plugged into an AC power source, voltage is always applied to the
Ä
system board. You must disconnect the power cord from the power source before opening the computer
to prevent system board or component damage.
10.1 Access Panel Removal
CAUTION: The cooling fan is off only when the computer is turned off or the power cable has
Ä
been disconnected.
“Suspend” modes.Access Panel Models with Thumbscrews
The cooling fan is always on when the computer is in the “On,” “Standby,” or
10
Chassis
1. Prepare the computer for disassembly.
2. Loosen the thumbscrews that secure the access panel to the back of the computer chassis.
Not all thumbscrews used are captive. Thumbscrew design may vary by model.
✎
3. Slide the access panel backward approximately 1-inch (2.5-cm); then lift it up and off the
unit.
removing CMT access panel
Service Reference Guide10–1
Removal and Replacement Procedures Chassis
10.2 Front Bezel and Related Components
10.2.1 Front Bezel Removal - Tabs
The front bezel assembly consists of a bezel base and a bezel front and is removed as a single
assembly. The front bezel assembly is connected to the chassis using tabs.
1. Prepare the computer for disassembly.
2. Remove the computer cover.
3. Press the two release tabs 1 to disconnect the bezel from the left side of the chassis.. .
4. Swing the front bezel towards the right of the chassis and unhook it from the unit.
When replacing the front bezel, ensure that the bottom hinge points are properly
✎
placed in the chassis before rotating the front bezel back into its original position.
To replace the front bezel, reverse the removal procedure.
10–2Service Reference Guide
10.2.2 Subpanel and Bezel Blanks
The subpanel and bezel blanks must be removed from the front bezel if you are installing a mass
storage device for the first time, or if you are converting the unit from a desktop to a minitower
configuration or from a minitower to a desktop. See Section 9.7 in this book for more
information on changing unit configuration.
1. Prepare the computer for disassembly.
2. Lay the computer down on its large base for greater stability.
3. Remove the access panel.
4. Remove the front bezel.
5. Pull on the subpanel to remove it from the inside of the front bezel.
CAUTION: Hold the subpanel straight when you pull it away from the front bezel. Pulling at an angle
Ä
could damage the pins that align the subpanel within the front bezel.
6. Gently push on the bezel blanks to remove them from the subpanel.
Removal and Replacement Procedures Chassis
CAUTION: When replacing the subpanel, ensure that the aligning pins and any remaining bezel
Ä
blanks are in the proper orientation to prevent damage to the alignment pins.
The subpanel has markings on it to facilitate installation.
✎
To reassemble the front bezel assembly, reverse the disassembly procedure.
Service Reference Guide10–3
Removal and Replacement Procedures Chassis
Front Bezel USB/Audio/1394 Card
1. Prepare the computer for disassembly.
2. Lay the computer down on its large base for greater stability.
3. Remove the access panel.
4. Remove the front bezel assembly.
5. Disconnect the audio and USB cables (that are attached to the USB/Audio/1394 card) from
the system board.
6. Disconnect the 1394 cable from the 1394 card (if present).
7. Remove the two screws that secure the card to the chassis 1.
8. Remove the card from the chassis by first sliding it away from the chassis panel until the
audio jacks are clear from the chassis cutouts and then lifting the card out.
To replace the card, reverse the removal procedures. If necessary, replace the front bezel insert
with the appropriate insert to allow access to the new ports.
10–4Service Reference Guide
10.3 Power Switch
To remove the power switch use the following procedure:
1. Prepare the computer for disassembly.
2. Remove the access panel.
3. Remove the front bezel.
4. Move/remove any components necessary to gain access to the power switch.
5. Disconnect the Power/LED cable from the system board 1.
6. Push the release tab 2 toward the drive bays, then remove the power switch assembly from
the chassis.
Removal and Replacement Procedures Chassis
Power switch removal
To install the new power switch, reverse the above procedure. Ensure that the orienting pins are
properly aligned with the locating holes before seating the switch assembly. The switch is fully
seated when it snaps into place.
To install a Power/LED cable, reverse the above procedure. The Power/LED connector is keyed
to ensure proper installation.
When replacing the power switch, make sure that the power switch LED cable assembly is
✎
routed under the hard drive.
Service Reference Guide10–5
Removal and Replacement Procedures Chassis
10.4 Board Guide
On the hp workstation xw4000, it is necessary to remove the board guide before removing the
speaker. On the hp workstation xw6000, it is necessary to remove the board guide in order to
install or replace the chassis fan. To remove the board guide use the following procedure:
1. Prepare the computer for disassembly.
2. Remove the access panel.
3. Move/remove any components necessary to gain access to the board guide.
4. Remove any full-length expansion boards.
5. On the hp workstation xw6000, disconnect the front chassis fan cable from the system board.
6. Push down on the two tabs on the side of the board guide.
7. While holding the tabs down, remove the guide from the chassis.
hp workstation xw4000 CMT shown
To install the board guide, reverse the removal procedure.
10–6Service Reference Guide
10.5 Speaker
In hp workstation xw4000 models the speaker is mounted on the front of the chassis behind the
board guide. In hp workstation xw6000 models the speaker is mounted on the drive bay next to
the board guide. The speaker is held in place by screws that are removed from the inside of the
chassis. To remove the speaker use the following procedure:
1. Prepare the computer for disassembly.
2. Remove the access panel.
3. On hp workstation xw4000 models remove the board guide as described in section 9.4.
4. Disconnect the speaker wire 1 from the system board.
5. Remove the screws that secure the speaker to the chassis.
6. Remove the speaker .
Removal and Replacement Procedures Chassis
hp workstation xw4000 speaker mounting
hp workstation xw6000 speaker mounting
To install the speaker, reverse the removal procedure.
Service Reference Guide10–7
Removal and Replacement Procedures Chassis
10.6 Feet
Four (4) rubber feet are mounted to the chassis, as shown below. No parts have to be removed to
access the feet. The replacement feet have an adhesive surface and are shipped with a protective
backing in place. Remove the backing from the feet before installation.
If necessary, remove the old feet and remov e any adhesive residue from the chassis before
attaching the replacements.
.
10–8Service Reference Guide
Removal and Replacement Procedures Chassis
10.7 Converting a Desktop to a Minitower
1. Prepare the computer for disassembly.
2. Lay the computer down on its large base for greater stability.
3. Remove the access panel.
4. Remove the front bezel.
5. Remove the drives from the 5.25-inch drive bays by pressing drivelock 1 for desktop
configuration, drivelock 2 for minitower configuration.
6. Rotate the drives 90 degrees, then reinstall them into the drive bays.
The diskette drive should alw ays be placed in bay number 3, the bay nearest the internal 3.5-inch
✎
drives, for proper placement within the chassis.
Minitower configurationDesktop configuration
CAUTION: The use of unnecessary force may result in damage to the drives.
Ä
7. Reconnect the power, signal, and audio cables to the drives.
Service Reference Guide10–9
Removal and Replacement Procedures Chassis
8. Remove the subpanel and rotate it 90 degrees in a clockwise direction.
CAUTION: Hold the subpanel straight when you pull it away from the front bezel. Pulling the subpanel
Ä
away at an angle could damage the pins that align it within the front bezel.
9. Replace the subpanel, front bezel, and the computer access panel.
10. Rotate the nameplate 180 degrees so that it can be easily read when looking at it from the
front of the computer.
11. Reassemble the computer.
10–10Service Reference Guide
Removal and Replacement Procedures
Expansion Cards and Memory
For an overview of the different chassis discussed in this chapter, refer to Chapter 6 “Identifying
the Chassis, Routine Care, and Disassembly Preparation.”
CAUTION: .Voltage is always applied to the system board when the system is plugged into an AC
Ä
power source. You must disconnect the power cord from the power source before opening the
computer to prevent system board or component damage.
11.1 M e m o r y E x pa n si o n
11.1.1 hp workstation xw4000 DDR Memory
The hp workstation xw4000 DDR system features an Intel 845E-based system board that
includes two memory sockets that accept industry-standard double-data rate (DDR) SDRAM
DIMMs. The two memory module slots are populated with at least one preinstalled memory
module. To achieve the maximum memory support, you may be required to replace the
preinstalled DIMM with a higher capacity DIMM.
11
For proper system operation, the DIMMs must be industry-standard 184-pin, unbuffered
PC2100- compliant DDR DIMMs. The DIMMs must support CAS Latency 2 or 2.5 (CL = 2 or
CL = 2.5). They must also contain the mandatory Joint Electronic Device Engineering Council
(JEDEC) Serial Presence Detect (SPD) information. DIMMs constructed with x4 SDRAM (16
ICs per side) are not supported; the system will not start using unsupported DIMMs.
The Intel 845E chipset supports both PC1600 and PC2100 DDR DIMMs. These systems are
shipped with PC2100 DDR DIMMs, which provide optimal (266-MHz) performance. If both
PC1600 and PC2100 DDR DIMMs are installed in a computer, the system memory will run at
the lower (200-MHz) speed.
The Intel 845E chipset-based systems ship with non-ECC memory, but will support ECC
✎
memory . To utilize ECC functionality all installed DIMMs must be ECC types. Mixing ECC and
non-ECC DIMMs is not supported.
CAUTION: Memory module sockets have gold metal contacts. When upgrading the memory, it is
Ä
important to use memory modules with gold metal contacts to prevent corrosion and/or oxidation
resulting from having incompatible metals in contact with each other.
Service Reference Guide11–1
Removal and Replacement Procedures Expansion Cards and Memory
11.1.2 hp workstation xw6000 Memory
The hp workstation xw6000 system features an Intel E7505 chipset-based system board that
provides dual-channel DDR SDRAM memory support. The four memory module slots accept
industry-standard 184-pin DDR SDRAM DIMMs and are configured with at least two
preinstalled DDR DIMMs (one per channel). To achieve the maximum memory support, you
may be required to replace the preinstalled DDR DIMMs with higher-capacity DDR DIMMs.
The DDR DIMMs must support CAS Latency 2 or 2.5 (CL = 2 or CL = 2.5) and must also
contain the mandatory Joint Electronic Device Engineering Council (JEDEC) Serial Presence
Detect (SPD) information. DIMMs constructed with x4 SDRAM are not supported; the system
will not start using unsupported DIMMs.
The Intel E7505 chipset supports both PC1600 and PC2100 DDR DIMMs. These systems are
shipped with PC2100 DDR DIMMs, which provide optimal (266-MHz) performance. If a mix of
PC1600 and PC2100 DDR DIMMs are installed in the computer, the system memory will run at
the lower (200-MHz) speed.
When adding, upgrading, or replacing PC2100 DDR SDRAM memory modules in the hp
workstation xw6000, care must be taken to avoid incorrect pairing of modules in the same
channel. This system does not support mixed DIMM pairing on the same channel.
WARNING: To reduce the risk of personal injury from hot surfaces, allow the internal system
Å
components to cool before touching.
WARNING: To reduce the risk of personal injury when replacing or removing DIMMs, allow the
Å
module being removed from the DIMM socket sufficient time to cool. DIMM temperatures can reach
212° F (100° C).
CAUTION: When handling a memory module, do not touch any of the contacts. Doing so may damage
Ä
the module.
CAUTION: Static electricity can damage the electronic components of the workstation or option boards.
Ä
Before beginning these procedures, ensure that you are discharged of static electricity by briefly touching
a grounded metal object.
CAUTION: Memory module sockets have gold metal contacts. When upgrading the memory, it is
Ä
important to use memory modules with gold metal contacts to prevent corrosion and/or oxidation
resulting from having incompatible metals in contact with each other.
The Intel E7505 chipset-based systems support ECC memory. To utilize ECC functionality all
✎
installed DIMMs must be ECC types. Mixing ECC and non-ECC DIMMs is not supported.
The xw6000 only suports registered (buffered) DDR DIMMs.
✎
The hp workstation xw6000 can be configured with up to eight gigabytes of memory using 2-GB
✎
DIMMs (when available). Windows XP Server, Windows XP Advanced Server, and Red Hat
Linux operating systems support eight gigabytes of memory. The Windows XP Professional and
Windows 2000 operating systems support up to four gigabytes of memory.
11–2Service Reference Guide
Removal and Replacement Procedures Expansion Cards and Memory
■ DIMMs should be installed in pairs.
■ Do not mix DIMMs of different memory speeds. Performance will reflect the speed of the
slowest DIMM.
■ Each DIMM within a pair should be identical in size. For example, a 256MB DIMM must be
paired with a similar 256MB DIMM.
■ Each DIMM within a pair should be identical in technology. For example, you cannot mix a
256 MB 9-device DIMM with a 128MB 18-device DIMM on the same channel.
To identify which DIMM technology you are using, compare the memory size and number of
✎
DRAM components on the module. A 128 MB DIMM has 18 DRAM components that fully
populate both sides of the module. A 256MB DIMM has 9 DRAM components; four on one side,
five on the other.
■ The first pair of DIMMS should be installed in slots 1 and 2. The DIMM slots are numbered
sequentially. Slot 1 is closest to the CPUs.
■ The second pair of DIMMS, if any, should be installed in slots 3 and 4.
■ DIMMs must be installed correctly. Be sure to match the keyed slot on the DIMM with the
tab on the DIMM socket.
■ For optimal system performance, DIMMs should be installed in identical pairs in the
following three configurations: slot 1 and 2, slot 3 and 4, or all DIMM slots populated in
paired format.
■ If you are using a single DIMM configuration, the DIMM should be installed in slot 1 or slot
3.
Although a single-DIMM configuration is possible, it does not provide the optimal system
✎
performance that a dual-DIMM (dual-channel) of matching sizes, configuration provides.
■ If you are installing two DIMMs of different sizes, they can only be installed in slot 1 and
slot 3 with each DIMM occupying either slot.
Although a mixed size dual-DIMM configuration is possible, it does not provide the optimal
✎
system performance that a dual-DIMM (dual-channel) of matching sizes, configuration provides.
■ No other memory configurations are supported. Attempts to install memory in other
configurations will result in unpredictable system performance.
The following table provides acceptable pairing configurations but do not cover all module
✎
capacities. However, the same pairing configuration applies regardless of the module type and
capacity.
Service Reference Guide11–3
Removal and Replacement Procedures Expansion Cards and Memory
Available Memory Configurations for the xw6000
Channel AChannel B
Module
Total
29-device Empty9-deviceEmpty
2Empty18-deviceEmpty18-device
218-device Empty18-deviceEmpty
2Empty
418-device9-device18-device9-device
49-device
NOTE: Modules must be paired as indicated in this table where slots indicated by like shading
must contain like modules.
Slot
XMM1
Slot
XMM3
9-deviceEmpty9-device
18-device9-device18-device
Slot
XMM2
Slot
XMM4
11–4Service Reference Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.