IBM NetVista A40 6578, NetVista A40 6648, NetVista A40p 6569, NetVista A40p 6579, NetVista A40p 6649 User Manual

...
IBM NetVista
User Guide A20 Type 6269 A40 Types 6568, 6578, 6648 A40p Types 6569, 6579, 6649

IBM NetVista
User Guide A20 Type 6269 A40 Types 6568, 6578, 6648 A40p Types 6569, 6579, 6649

Note
Before using this information and the product it supports, be sure to read “Safety information” on page iii and “Appendix E. Notices and trademarks” on page 117.
Third Edition (December 2000)
© Copyright International Business Machines Corporation 2000. All rights reserved.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Safety information
DANGER
Electrical current from power, telephone, and communication cables is hazardous.
To avoid a shock hazard: v Do not connect or disconnect any cables or perform installation,
maintenance, or reconfiguration of this product during an electrical storm.
v Connect all power cords to a properly wired and grounded electrical
outlet.
v Connect to properly wired outlets any equipment that will be attached to
this product.
v When possible, use one hand only to connect or disconnect signal cables. v Never turn on any equipment when there is evidence of fire, water, or
structural damage.
v Disconnect the attached power cords, telecommunications systems,
networks, and modems before you open the device covers, unless instructed otherwise in the installation and configuration procedures.
v Connect and disconnect cables as described in the following table when
installing, moving, or opening covers on this product or attached devices.
To connect:
1. Turn everything OFF.
2. First, attach all cables to devices.
3. Attach signal cables to connectors.
4. Attach power cords to outlet.
5. Turn device ON.
To disconnect:
1. Turn everything OFF.
2. First, remove power cords from outlet.
3. Remove signal cables from connectors.
4. Remove all cables from devices.
DANGER
Le courant électrique provenant de l’alimentation, du téléphone et des câbles de transmission peut présenter un danger.
Pour éviter tout risque de choc électrique : v Ne manipulez aucun câble et n’effectuez aucune opération d’installation,
d’entretien ou de reconfiguration de ce produit au cours d’un orage.
v Branchez tous les cordons d’alimentation sur un socle de prise de courant
correctement câblé et mis à la terre.
© Copyright IBM Corp. 2000 iii
v Branchez sur des socles de prise de courant correctement câblés tout
équipement connectéàce produit.
v Lorsque cela est possible, n’utilisez quune seule main pour connecter ou
déconnecter les câbles dinterface.;
v Ne mettez jamais un équipement sous tension en cas dincendie ou
dinondation, ou en présence de dommages matériels.
v Avant de retirer les carters de l’unité, mettez celle-ci hors tension et
déconnectez ses cordons dalimentation, ainsi que les câbles qui la relient aux réseaux, aux systèmes de té lécommunication et aux modems (sauf instruction contraire mentionnée dans les procédures dinstallation et de configuration).
v Lorsque vous installez, que vous déplacez, ou que vous manipulez le
présent produit ou des périphériques qui lui sont raccordés, reportez-vous aux instructions ci-dessous pour connecter et déconnecter les différents cordons.
Connexion:
1. Mettez les unités hors tension.
2. Commencez par brancher tous les
cordons sur les unités.
3. Branchez les câbles dinterface sur des
connecteurs.
4. Branchez les cordons d’alimentation
sur des prises.
5. Mettez les unités sous tension.
Déconnexion:
1. Mettez les unités hors tension.
2. Débranchez les cordons dalimentation
des prises.
3. Débranchez les câbles dinterface des
connecteurs.
4. Débranchez tous les câbles des unités.
iv User Guide
Lithium battery notice
CAUTION: Danger of explosion if battery is incorrectly replaced.
When replacing the battery, use only IBM Part Number 33F8354 or an equivalent type battery recommended by the manufacturer. The battery contains lithium and can explode if not properly used, handled, or disposed of.
Do not:
v Throw or immerse into water v Heat to more than 100°C (212°F) v Repair or disassemble
Dispose of the battery as required by local ordinances or regulations.
ATTENTION
Danger dexplosion en cas de remplacement incorrect de la batterie.
Remplacer uniquement par une batterie IBM de type ou dun type équivalent recommandé par le fabricant. La batterie contient du lithium et peut exploser en cas de mauvaise utilisation, de mauvaise manipulation ou de mise au rebut inappropriée.
Ne pas :
v Lancer ou plonger dans leau v Chauffer à plus de 100°C (212°F) v Réparer ou désassembler
Mettre au rebut les batteries usagées conformément aux règlements locaux.
Modem safety information
To reduce the risk of fire, electrical shock, or injury when using telephone equipment, always follow basic safety precautions, such as:
v Never install telephone wiring during a lightning storm. v Never install telephone jacks in wet locations unless the jack is specifically
designed for wet locations.
v Never touch uninsulated telephone wires or terminals unless the telephone
line has been disconnected at the network interface.
v Use caution when installing or modifying telephone lines. v Avoid using a telephone (other than a cordless type) during an electrical
storm. There may be a remote risk of electric shock from lightning.
Safety information v
v Do not use the telephone to report a gas leak in the vicinity of the leak.
Consignes de sécurité relatives au modem
Lorsdel’utilisation de votre matériel téléphonique, il est important de respecter les consignes ci-après afin de réduire les risques dincendie, d’électrocution et d’autres blessures :
v Ninstallez jamais de cordons téléphoniques durant un orage. v Les prises téléphoniques ne doivent pas être installées dans des endroits
humides, excepté si le modèle a été conçu à cet effet.
v Ne touchez jamais un cordon téléphonique ou un terminal non isolé avant
que la ligne ait été déconnectéeduréseau téléphonique.
v Soyez toujours prudent lorsque vous procédez à linstallation ou à la
modification de lignes téléphoniques.
v Si vous devez téléphoner pendant un orage, pour éviter tout risque de choc
électrique, utilisez toujours un téléphone sans fil.
v En cas de fuite de gaz, n’utilisez jamais un téléphone situéàproximité de la
fuite.
Laser compliance statement
Some IBM Personal Computer models are equipped from the factory with a CD-ROM drive or a DVD-ROM drive. CD-ROM drives and DVD-ROM drives are also sold separately as options. CD-ROM drives and DVD-ROM drives are laser products. These drives are certified in the U.S. to conform to the requirements of the Department of Health and Human Services 21 Code of Federal Regulations (DHHS 21 CFR) Subchapter J for Class 1 laser products. Elsewhere, these drives are certified to conform to the requirements of the International Electrotechnical Commission (IEC) 825 and CENELEC EN 60 825 for Class 1 laser products.
When a CD-ROM drive or a DVD-ROM drive is installed, note the following handling instructions.
CAUTION: Use of controls or adjustments or performance of procedures other than those specified herein might result in hazardous radiation exposure.
Removing the covers of the CD-ROM drive or DVD-ROM drive could result in exposure to hazardous laser radiation. There are no serviceable parts inside the CD-ROM drive or DVD-ROM drive. Do not remove the drive covers.
Some CD-ROM drives and DVD-ROM drives contain an embedded Class 3A or Class 3B laser diode. Note the following statement.
vi User Guide
DANGER
Laser radiation when open. Do not stare into the beam, do not view directly with optical instruments, and avoid direct exposure to the beam.
DANGER:
Certains modèles dordinateurs personnels sont équipésd’origine d’une unité de CD-ROM ou de DVD-ROM. Mais ces unités sont également vendues séparément en tant quoptions. Lunité de CD-ROM/DVD-ROM est un appareil à laser. Aux État-Unis, lunité de CD-ROM/DVD-ROM est certifiée conforme aux normes indiquées dans le sous-chapitre J du DHHS 21 CFR relatif aux produits à laser de classe 1. Dans les autres pays, elle est certifiée être un produit à laser de classe 1 conforme aux normes CEI 825 et CENELEC EN 60 825.
Lorsquune unité de CD-ROM/DVD-ROM est installée, tenez compte des remarques suivantes:
ATTENTION: Pour éviter tout risque dexposition au rayon laser, respectez les consignes de réglage et dutilisation des commandes, ainsi que les procédures décrites.
Louverture de lunité de CD-ROM/DVD-ROM peut entraîner un risque dexposition au rayon laser. Pour toute intervention, faites appel à du personnel qualifié.
Certaines unités de CD-ROM/DVD-ROM peuvent contenir une diode à laser de classe 3A ou 3B. Tenez compte de la consigne qui suit:
DANGER
Rayonnement laser lorsque le carter est ouvert. Évitez toute exposition directe des yeux au rayon laser. Évitez de regarder fixement le faisceau ou de lobserver à l’aide dinstruments optiques.
Safety information vii
viii User Guide
About this book
This book will help you become familiar with your IBM®NetVista™computer and its features. It describes how to set up, operate, maintain, and install options in your computer. In the unlikely event you experience problems, you will find helpful troubleshooting information and instructions for obtaining service in this book.
Related information
More information about your computer might be available by using Access IBM on your desktop to link to help topics.
The following documentation contains additional information about your computer:
v Quick Reference
This publication, that comes with your computer, contains general information to help you to safely set up your computer and access important online publications.
v Understanding Your Personal Computer
This online publication (available on the World Wide Web) includes general information about using personal computers and in-depth information about the specific features of your computer. To access this online publication, go to http://www.ibm.com/pc/support on the World Wide Web.
The following publications contain more information about your computer:
v Hardware Maintenance Manual
This publication contains information for trained service technicians. It can be found at http://www.ibm.com/pc/support/pc on the World Wide Web. Type the model number/machine type into the Quick Path field and click
Go. Click Online publications and then click Hardware Maintenance Manuals.
This manual can also be ordered from IBM. To purchase a copy, refer to Chapter 7. Getting help, service, and informationon page 99.
v Technical Information Manual
This publication contains information for individuals who want to know more about the technical aspects of their computer. It can be found on the World Wide Web at the following Web site: http://www.ibm.com/pc/support/pc/ Type the model number/machine type into the Quick Path field and click Go. Click Online publications and then click Technical Manuals.
© Copyright IBM Corp. 2000 ix
x User Guide
Contents
Safety information ....................iii
Lithium battery notice ...................v
Modem safety information .................v
Lasercompliancestatement.................vi
About this book ....................ix
Relatedinformation....................ix
Chapter 1. IBM NetVista computer overview ...........1
Identifying your computer..................1
Small form factor desktop models ..............2
Desktopmodels....................3
Features........................4
Chapter 2. Setting up your computer .............7
Selecting a location for your computer..............7
Connecting computer cables .................7
Turnonpower.....................11
Finishtheinstallation...................12
Arranging your workspace .................13
Comfort......................13
Glareandlighting...................14
Aircirculation....................14
Electrical outlets and cable lengths .............14
Chapter 3. Operating and caring for your computer ........15
Starting your computer ..................15
Usingvideofeatures...................15
Videodevicedrivers..................16
Changing monitor settings ................16
Using audio features ...................17
Using diskettes .....................18
Handling and storing diskettes ...............18
Inserting and removing diskettes ..............18
UsingaCD-ROMdrive..................18
HandlingaCD....................19
Loading a CD ....................19
UsingtheIBMScrollPointIImouse..............20
Updating system programs .................21
Using network management tools ...............21
WakeonLAN....................22
Remote Program Load or Dynamic Host Configuration Protocol....22
Remote Administration .................22
© Copyright IBM Corp. 2000 xi
LANClient Control Manager (LCCM).............22
System Migration Assistant (SMA)..............23
Desktop Management Interface ...............23
Using security features ..................23
Anti-intrusion features..................23
Component protection ..................23
Asset ID capability ...................24
IBM security solutions..................24
Data protection ....................25
SMARTharddiskdrive................25
SMART Reaction ..................25
Virus protection ...................25
Enhanced Security ..................25
Locking the keyboard ..................25
Shutting down .....................26
Taking care of your computer ................26
Basics .......................26
Cleaning your computer .................26
Computer and keyboard ................27
Monitorscreen...................27
Mouse......................27
Moving your computer .................28
Chapter 4. Using the Configuration/Setup Utility program......29
Starting and using the Configuration/Setup Utility program ......29
Viewing and changing settings ...............30
Exiting from the Configuration/Setup Utility program .......31
Using System Security ...................31
Using Enhanced Security .................31
Using Security Profiles by Device ..............32
Setting Remote Administration ...............33
Usingpasswords ...................34
Usingapower-onpassword...............34
Setting, changing, and deleting a power-on password ......35
Using an administrator password .............36
Setting, deleting, or changing an administrator password .....36
Erasing a lost or forgotten password (clearing CMOS) ......37
Using Adapter ROM security ...............37
Using the IBM Embedded Security Chip............37
Enabling the Pentium III processor serial number feature .......38
Other settings in the Configuration/Setup Utility program ......38
Changing keyboard speed ................38
Changing the primary startup sequence ...........38
Enabling the Error Startup Sequence ............39
Power-management features................39
ACPI BIOS IRQ ...................39
ACPI Standby Mode .................40
xii User Guide
Setting power-management features ............40
Chapter 5. Installing options ................43
Handling static-sensitive devices ...............43
Availableoptions....................43
Toolsrequired.....................44
Removingthecover...................45
Locating componentssmallformfactordesktopmodel.......46
Locating componentsdesktopmodel.............47
Installing options on the system board and riser card (some models) . . . 48
Accessing the system board ................48
Identifying parts on the system board ............48
Components of the A40 and A40p system board ........49
Components of the riser card for small form factor desktop models 50
Components of the A20 system board ...........51
Installing memory ...................51
Installing adapters ...................53
Adapter slots ....................53
Installing adapters smallformfactordesktopmodel......54
Installing adapters desktopmodel............56
Installing internal drives ..................58
Drive specifications smallformfactordesktopmodel......59
Drive specifications desktopmodel............60
Power and signal cables for internal drives ...........61
Installing internal drives in the desktop model computer ......63
Installing a security U-bolt .................66
Completing the installation .................66
Replacing the cover and connecting the cables..........66
Updating the computer configuration.............67
Starting the Configuration/Setup Utility program .......68
Configuring startup devices ...............69
Chapter 6. Troubleshooting ................71
Troubleshootingprocedure.................71
Power-on self-test (POST)..................73
Diagnostic error codes and messages ..............73
POST error codes ...................73
POST beep codes ...................77
Etherneterrormessages..................78
RPL-related error messages ................78
DHCP-relatederrormessages...............79
Devicetroubleshootingcharts................80
Generalproblems...................81
Intermittent problems ..................82
Audio problems ....................83
CD-ROMdriveproblems.................84
Diskette drive problems .................86
Contents xiii
Monitorproblems...................86
Keyboard, mouse, or pointing device problems .........89
Memoryproblems...................90
Optionproblems ...................91
Parallel-port problems ..................92
Serial-portproblems..................92
Printerproblems....................93
Application problems ..................93
Universal Serial Bus (USB) problems .............94
Software-generated error messages ..............94
IBM Enhanced Diagnostics program ..............94
Other diagnostic programs on the Software Selections CD .......96
Recovering from a POST/BIOS update failure ...........96
Installing files from option diskettes ..............97
Replacing the battery ...................97
Chapter 7. Getting help, service, and information.........99
Getting information ...................99
UsingtheWorldWideWeb................99
Getting information by fax ................99
Getting help and service..................100
Using the documentation and diagnostic programs ........100
Calling for service ...................100
Other services ....................102
Purchasing additional services................103
Appendix A. Using the Software Selections CD .........105
Features of the Software Selections CD .............105
Starting the Software Selections CD ..............106
Using the Software Selections program .............106
Appendix B. Specifications ................107
Specifications smallformfactordesktopmodel.........107
Specifications desktop model (A40 and A40p) .........108
Specifications desktop model (A20) .............109
Appendix C. Placing the computer on its side .........113
Placingthesmallformfactordesktopcomputeronitsside......113
Placingthedesktopcomputeronitsside............113
Appendix D. Computer records...............115
Appendix E. Notices and trademarks.............117
Processing date data ...................118
Television output notice ..................118
Trademarks......................118
xiv User Guide
Electronic emissions notices ................119
Class B notices ....................119
Federal Communications Commission (FCC) statement ......119
Class A notices ....................121
Federal Communications Commission (FCC) statement ......121
Industry Canada Class A emission compliance statement ......121
Avis de conformitéàla réglementation dIndustrie Canada .....121
Australia and New Zealand Class A statement .........121
European Union EMC Directive conformance statement ......122
TaiwanClassAwarningstatement.............122
Federal Communications Commission (FCC) and telephone company
requirements....................122
Canadian Department of Communications certification label . . . 123 Étiquette dhomologation du ministère des Communications du
Canada ....................124
Power cord notice ....................125
Index ........................127
Contents xv
xvi User Guide
Chapter 1. IBM NetVista computer overview
Thank you for selecting an IBM NetVista computer. Your computer
incorporates many of the latest advances in computer technology and can be
upgraded as your needs change.
This section provides an overview of the computer features, preinstalled
software, and specifications.
Identifying your computer
The best way to identify your computer is by the machine type/model
number. The machine type/model number indicates the various features of the
computer, such as the type of microprocessor or the number of drive bays. You
can find this number on the small label on the front of your computer. An
example of a machine type/model number is 6568-110.
This book is for all models. When it is necessary to distinguish between
models you will see references to the model type. When the model is not
specified, the information applies to all. See the following pages for
descriptions of the two basic models.
© Copyright IBM Corp. 2000 1
Small form factor desktop models
Small form factor desktop models have a diskette drive and a hard disk drive. Some models have a slimline CD-ROM drive. The power button is located on the right-hand side of the computer as you are facing it.
2 User Guide
Desktop models
Desktop models come with a diskette drive and a hard disk drive. Some
models come with a CD-ROM drive. The power button is located on the
left-hand side of the computer as you are facing it.
Chapter 1. IBM NetVista computer overview 3
Features
Not all models come with all features summarized here.
Microprocessor
Intel
®
Pentium™III microprocessor with 256 KB of internal L2 cache memory
or an Intel Celeron
microprocessor with 128 KB of internal L2 cache memory.
Memory
v Support for:
– 3.3 V, synchronous, 168-pin, dual inline (DIMM), unbuffered, 133 MHz
nonparity SDRAM
– 64 MB, 128 MB, and 256 MB unbuffered nonparity DIMMs for a
maximum of 512 MB
– DIMM heights up to 38.1 mm (1.5 inches)
v 512 KB flash memory for system programs
Internal drives
v 3.5-inch, 1.44 MB diskette drive v Internal hard disk drive v EIDE CD-ROM drive (some models)
Video controller
v Dynamic video memory technology v Accelerated graphics port (AGP) adapter (some models)
Audio subsystem 16-bit integrated Sound Blaster Pro compatible audio subsystem
10/100 Mbps Ethernet adapter that supports Wake on LAN
®
(some models)
System management features
v Remote Program Load (RPL) and Dynamic Host Configuration Protocol
(DHCP)
v Wake on LAN (requires Wake on LAN-supported network adapter) v Wake on Ring (in the Configuration/Setup Utility program, this feature is
called Serial Port Ring Detect for an external modem and Modem Ring Detect for an internal modem) (some models do not have all of these capabilities)
v Wake on Alarm v Remote Administration (the ability to update POST and BIOS over the
network)
v Automatic power-on startup v System Management (SM) BIOS and SM software v Ability to store POST hardware test results
4 User Guide
Input/output features
v 25-pin, ECP/EPP parallel port
v One or two 9-pin serial ports
v Two 4-pin, USB ports
v PS/2 mouse port
v PS/2 keyboard port
v 15-pin monitor port
v Three audio connectors (line/headphone out, line in, and microphone)
v Joystick/MIDI connector (some models)
Expansion
v Small form factor desktop models
Three drive baysTwo peripheral component interconnect (PCI) slots with support for Plug
and Play adapters
v Desktop models
Four drive baysThree PCI expansion slots with support for Plug and Play adaptersOne AGP expansion slot (some models; some models with AGP slot come
with a preinstalled AGP adapter)
Power
v Small form factor desktop: 110 W power supply with automatic ac voltage
sensing
v Desktop: 155 W power supply with manual voltage selection switch
v Automatic 50/60 Hz input frequency switching
v Built-in overload and surge protection
v Advanced Power Management support
v Advance Configuration and Power Interface (ACPI) support
Security features
v Power-on and administrator passwords
v Cover keylock (some models)
v Support for the addition of a U-bolt and lockable cable
v Startup sequence control
v Startup without diskette drive, keyboard, or mouse
v Unattended start mode
v Diskette and hard disk I/O control
v Serial and parallel port I/O control
v Security profile by device
IBM preinstalled software
Your computer might come with preinstalled software. If so, an operating
system, device drivers to support built-in features, and other support programs
are included.
Chapter 1. IBM NetVista computer overview 5
Operating systems (supported)
v Microsoft
®
Windows®2000 Professional
v Microsoft Windows NT
®
Workstation Version 4.0 with Service Pack 6
v Microsoft Windows 98 SE v Microsoft Windows Millennium (Me) v Novell NetWare Versions 3.2, 4.11, 5.0
Operating systems (tested for compatibility)
v Microsoft Windows 95 v DOS 2000 v SCO OpenServer 5.0.2 and later v IBM OS/2
®
Warp Connect 3.0
v IBM OS/2 Warp 4.0 v IBM OS/2 LAN Server 3.0 and 4.0 v Linux: Red Hat, Caldera, S.U.S.E., and Pacific High Tech v Sun Solaris 2.5.1 or later
1. The operating systems listed here are being tested for compatibility at the time this publication
goes to press. Additional operating systems might be identified by IBM as compatible with your computer following the publication of this booklet. Corrections and additions to this list are subject to change. To determine if an operating system has been tested for compatibility, check the Web site of the operating system vendor.
6 User Guide
Chapter 2. Setting up your computer
This section provides information for connecting cables to your computer and
turning on the power.
You will need the following:
v Computer
v Computer power cord
v Keyboard
v Mouse
v Monitor (sold separately with signal cable and power cord)
If you are missing an item, contact your place of purchase.
Selecting a location for your computer
Make sure you have an adequate number of properly grounded electrical
outlets for the computer, monitor, and any other devices. Select a location for
the computer where it will remain dry. Leave about 50 mm (2 in.) of space
around the computer for proper air circulation.
For information about arranging your computer for comfort and ease-of-use,
see Arranging your workspaceon page 13.
Connecting computer cables
When you set up your computer, you will need to know where to find the
connectors.
The following illustration shows the location of the connectors on the back of
the small form factor desktop model computer. You might not have devices for
all of the connectors shown here.
© Copyright IBM Corp. 2000 7
1
2
1Mouse connector 8Audio input connector 2USB connector 2 9Microphone connector 3Parallel connector 10Monitor connector 4Serial connector 2 11Serial connector 1 5Power cord connector 12USB connector 1 6Ethernet connector 13Keyboard connector 7Audio output connector
Note: The connectors on the rear of the computer have color-coded icons.
Icons will help you to determine where to connect the proper cables to set up your computer.
The following illustration shows the location of the connectors on the back of the desktop model computer. You might not have devices for all of the connectors shown here.
8 User Guide
1
1
2
1 Power cord 8 Microphone connector
2 Mouse connector 9 Audio input connector
3 USB connector 2 10 Audio output connector
4 USB connector 1 11 Monitor connector
5 Serial connector 2 12 Serial connector 1
6 Parallel connector 13 Keyboard connector
7 joystick/MIDI
Note: The connectors on the rear of the computer have color-coded icons.
Icons will help you to determine where to connect the proper cables on your computer.
To set up your computer, use the previous illustrations and the following steps
to connect the cables to your computer.
Chapter 2. Setting up your computer 9
1. If your computer is the desktop model, check the position of the
voltage-selection switch. Use a ballpoint pen to slide the switch, if necessary. v If the voltage supply range is 90–137 V ac, set the voltage switch to 115
V.
v If the voltage supply range is 180–265 V ac, set the voltage switch to 230
V.
Voltage Switch
115
2. Connect the monitor cable to the monitor (if it is not already attached), then
to the monitor connector and tighten the attachment screws.
Note: If your computer comes with an accelerated graphics port (AGP)
adapter, the monitor connector on the system board will be disabled. Connect the monitor to the AGP monitor connector.
3. Connect the keyboard cable to the purple keyboard connector. Connect the
mouse cable to the green mouse connector.
Note: If your computer comes with Windows NT and a ScrollPoint
II mouse, the first time you start up your computer, your mouse will function, but your mouse will not have its ScrollPoint function. You must shut down and restart the computer to enable the ScrollPoint function.
4. Connect any additional devices you have.
v Any printer or parallel device to the parallel port connector. v Any serial device or external modem in the serial connector. v Any universal serial bus (USB) devices. v Any optional devices, such as speakers, microphones, or headphones, for
models with an audio device.
v If there is a label covering the power connector, remove it. Connect the
power cords to the computer, monitor, and other devices first, and then plug the cords into properly grounded electrical outlets.
v If your computer comes with an Ethernet adapter, connect the Ethernet
cable.
10 User Guide
Turn on power
Turn on the monitor and other external devices first, and then turn on the computer. See the following illustrations for the location of the power switches for the monitor and the computer.
Chapter 2. Setting up your computer 11
You see a logo screen while the computer performs a short self-test. When the task completes successfully, the logo screen disappears, the BIOS is loaded, and the software is loaded (in models with preinstalled software).
Note: If you suspect a problem, see Chapter 6. Troubleshootingon page 71.
Finish the installation
Note the identification numbers (serial and model/type) on the front of the computer and record this information in Appendix D. Computer recordson page 115. The identification numbers are on the front of the bezel below the CD-ROM drive.
See Related informationon page ix in the front of this book for sources of other information about your computer. Online books are accessible through Access IBM on your desktop or at http://www.ibm.com/pc/support/ on the World Wide Web. Additional programs are on the Software Selections CD and in some cases on other CDs and diskettes. If you install your own operating system, make sure you install the device drivers after installing your operating system. You can obtain device drivers for operating systems that are not
12 User Guide
preinstalled at http://www.ibm.com/pc/support/ on the World Wide Web. Installation instructions are provided in README files with the device driver files.
Arranging your workspace
To get the most from your computer, arrange both the equipment you use and your work area to suit your needs and the kind of work you do. Your comfort is of foremost importance, but light sources, air circulation, and the location of electrical outlets also can affect the way you arrange your workspace.
Comfort
Although no single working position is ideal for everyone, here are a few guidelines to help you find a position that suits you best.
Sitting in the same position for a long time can cause fatigue. A good chair can make a big difference. The backrest and seat should adjust independently and provide good support. The seat should have a curved front to relieve pressure on the thighs. Adjust the seat so that your thighs are parallel to the floor and your feet are either flat on the floor or on a footrest.
When using the keyboard, keep your forearms parallel to the floor and your wrists in a neutral, comfortable position. Try to keep a light touch on the keyboard and your hands and fingers relaxed. You can change the angle of the keyboard for maximum comfort by adjusting the position of the keyboard feet.
Viewing Distance
Lower Back Support
Seat Height
Adjust the monitor so the top of the screen is at, or slightly below, eye level. Place the monitor at a comfortable viewing distance, usually 51 to 61 cm (20 to 24 in.), and position it so you can view it without having to twist your body. Also position other equipment you use regularly, such as the telephone or a mouse, within easy reach.
Chapter 2. Setting up your computer 13
Glare and lighting
Position the monitor to minimize glare and reflections from overhead lights, windows, and other light sources. Even reflected light from shiny surfaces can cause annoying reflections on your monitor screen. Place the monitor at right angles to windows and other light sources, when possible. Reduce overhead lighting, if necessary, by turning off lights or using lower wattage bulbs. If you install the monitor near a window, use curtains or blinds to block the sunlight. You might have to adjust the Brightness and Contrast controls on the monitor as the room lighting changes throughout the day.
Where it is impossible to avoid reflections or to adjust the lighting, an antiglare filter placed over the screen might be helpful. However, these filters might affect the clarity of the image on the screen; try them only after you have exhausted other methods of reducing glare.
Dust buildup compounds problems associated with glare. Remember to clean your monitor screen periodically using a soft cloth moistened with a nonabrasive liquid glass cleaner.
Air circulation
Your computer and monitor produce heat. The computer has a fan that pulls in fresh air and forces out hot air. The monitor lets hot air escape through vents. Blocking the air vents can cause overheating, which might result in a malfunction or damage. Place the computer and monitor so that nothing blocks the air vents; usually, 51 mm (2 in.) of air space is sufficient. Also, make sure the vented air is not blowing on someone else.
Electrical outlets and cable lengths
The location of electrical outlets and the length of power cords and cables that connect to the monitor, printer, and other devices might determine the final placement of your computer.
When arranging your workspace: v Avoid the use of extension cords. When possible, plug the computer power
cord directly into an electrical outlet.
v Keep power cords and cables neatly routed away from walkways and other
areas where they might get kicked accidentally.
For more information about power cords, see Power cord noticeon page 125.
14 User Guide
Chapter 3. Operating and caring for your computer
This chapter provides information to help you in the day-to-day use and care of your computer.
Starting your computer
See Turn on poweron page 11 for an illustration indicating the location of the power buttons on your computer monitor.
What you see and hear when you start up your computer depends on the settings in the Start Options menu of the Configuration/Setup Utility program. The default settings are Power On Status [Disabled] and Power On Self Test [Quick].
Note: Other selections also might change what is displayed when the
computer starts up. When you turn on your computer, you are prompted with the following options:
Press F1 for Configuration/Setup
To start the IBM Product Recovery Program, press F11
Note: The option to press F1 to enter the Configuration/Setup Utility program
appears when you first turn on your computer and is gone very quickly.
For instructions to enter the Configuration/Setup Utility program, see
page 29.
Using video features
Your computer has an integrated super video graphics array (SVGA) video controller. This controller is located on the system board. Some models come with an accelerated graphics port (AGP) adapter.
SVGA is a video standard for displaying text and graphic images on a monitor screen. Like other video standards, SVGA supports a variety of video modes . Video modes are different combinations of resolution, refresh rate, and color defined by a video standard for displaying text or graphics. For more information on video modes, refer to Understanding Your Computer (available at http://www.ibm.com/pc/support/ on the World Wide Web).
© Copyright IBM Corp. 2000 15
Video device drivers
To take full advantage of the graphics adapter in your computer, some operating systems and application programs require custom software, known as video device drivers. These device drivers provide support for greater speed, higher resolution, more available colors, and flicker-free images.
Device drivers for the integrated graphics subsystem and a README file with instructions for installing the device drivers are preinstalled on models with preinstalled operating systems. If your computer has IBM-preinstalled software, video device drivers have already been installed on the hard disk. If your computer did not come with a preinstalled operating system, you can download device drivers from http://www.ibm.com/pc/support/ on the Wor ld Wide Web .
See Chapter 7. Getting help, service, and informationon page 99 for more information.
Changing monitor settings
To get the best possible image on your screen and to reduce flicker, you might need to reset the resolution and refresh rate of your monitor. You can view and change monitor settings through your operating system using the instructions provided in the README files on the Software Selections CD that comes with your computer. Refer to your operating system documentation for further information on monitor settings.
Attention
Before you change any monitor settings, be sure to review the information that comes with your monitor. Using a resolution or refresh rate that is not supported by your monitor might cause the screen to become unreadable and could damage the monitor. The information that comes with your monitor usually includes the resolutions and refresh rates that the monitor supports. If you need additional information, contact the manufacturer of the monitor.
To minimize screen flicker and jitter, set your monitor for the highest noninterlaced refresh rate that the monitor supports. If your monitor complies with the VESA Display Data Channel (DDC) standard, it is probably already set to the highest refresh rate that the monitor and video controller can support. If you are not sure if your monitor is DDC-compliant, refer to the documentation provided with the monitor.
16 User Guide
Using audio features
Your computer comes with an integrated audio controller that supports Sound Blaster applications and is compatible with the Microsoft Windows Sound System. Some models also come with a single internal speaker and three audio connectors. The audio controller provides you with the ability to record and play sound and music and to enjoy sound with multimedia applications. Optionally, you can connect two stereo speakers to the line out connector to enjoy better sound quality.
Procedures for recording and playing back sound vary by operating system. Refer to your operating system documentation for information and instructions.
The audio connectors in your computer are 3.5 mm (1/8-in.) mini-jacks. A description of the connectors follows. (For the location of the connectors, refer to Connecting computer cableson page 7.)
Line/Headphone Out:
This jack is used to send audio signals from the computer to external devices, such as stereo-powered speakers with built-in amplifiers, headphones, multimedia keyboards, or the Audio Line-In jack on a stereo system.
Note: The internal speaker in your computer is disabled when an
external speaker is connected to the headphone port on your computer.
Audio Line In:
This jack is used to accept audio signals from external devices, such as line output from a stereo or television system, or a musical instrument, into the computer sound system.
Microphone:
This jack is used to connect a microphone to your computer when you want to record voice or other sounds on the hard disk. This port can also be used by speech-recognition software.
Note: If you experience interference or speaker feedback while
recording, try reducing the microphone recording volume (gain).
Joystick/MIDI (some models only):
This port is used to connect a joystick for playing games or a MIDI device to interface with digital musical and sound production equipment.
Chapter 3. Operating and caring for your computer 17
Using diskettes
You can use 3.5-inch diskettes in the diskette drive of your computer.
The information that follows will help you use 3.5-inch diskettes.
Handling and storing diskettes
Inside the protective diskette case is a flexible disk with a magnetic coating. This disk can be damaged by heat, dust, a magnetic field, or even a fingerprint. Use the following guidelines when handling and storing diskettes:
v Data is stored on the magnetic surface of the diskette. This surface is
protected by a plastic cover. If the cover is damaged, do not use the diskette. A damaged diskette might damage the diskette drive.
v A protective slide on the top of a 3.5-inch diskette covers part of the
magnetic surface. The diskette drive moves this slide to read data from or write data to the diskette. Do not move this slide because fingerprints and dust can cause loss of data.
v Never touch the magnetic disk itself. v Keep diskettes away from magnets or devices that create a strong magnetic
field, such as electric motors and generators. Diskettes are sensitive to magnets found in television sets, telephones, stereo speakers, and other such items. A magnetic field can erase the data on your diskettes. Do not set diskettes on the monitor or use magnets to attach notes to your computer.
v Do not store diskettes at high temperatures, low temperatures, or in direct
sunlight. Temperatures ranging from 4° to 53°C(39° to 127°F) are acceptable for 3.5-inch diskettes. Keep diskettes away from heat. The plastic outer covering might warp, damaging the diskette.
Inserting and removing diskettes
To insert a 3.5-inch diskette, hold the diskette with the label facing up and insert the end with the protective slide first. Push the diskette into the diskette drive until the diskette clicks into place.
To remove the diskette, press the eject button and slide the diskette out of the drive. Do not remove the diskette while the in-use light is on.
Using a CD-ROM drive
Some models have a preinstalled CD-ROM drive. CD-ROM drives can play back or read from a CD, but cannot write information to it. CD-ROM drives use industry standard, 12 cm (4.75-inch) CDs.
Follow these guidelines when using a CD-ROM drive: v Do not place the drive where there is:
18 User Guide
High temperatureHigh humidityExcessive dustExcessive vibration or sudden shockAn inclined surfaceDirect sunlight
v Do not insert any object other than a CD into the drive. v Before moving the computer, remove the CD from the drive.
Handling a CD
When handling a CD, follow these guidelines: v Hold the CD by its edges. Do not touch the surface of the side that is not
labeled.
v To remove dust or fingerprints, wipe the CD with a clean, soft cloth from
the center to the outside. Wiping the CD in a circular direction might cause loss of data.
v Do not write or stick paper on the CD. v Do not scratch or mark the CD. v Do not place or store the CD in direct sunlight. v Do not use benzene, thinners, or other cleaners to clean the disk. v Do not drop or bend the CD.
Loading a CD
To load a CD into a CD-ROM drive:
1. Press the Eject/Load button. The tray slides out of the drive. (Do not
manually force the tray open.)
Note: If you have a small form factor desktop computer, the CD-ROM
drive disk tray slides partway out of the drive. Manually pull the tray the rest of the way out.
2. Place the CD in the tray with the label facing up.
Note: If you have a small form factor desktop computer, press the disk
down until it clicks into place and is held by the spring-loaded holders.
3. Close the tray by pressing the Eject/Load button or by gently pushing the
tray forward. When the tray is closed, the indicator light on the front of the drive will activate to indicate that the drive is in use.
4. To eject the CD, press the Eject/Load button. When the tray slides out,
carefully remove the disk.
5. Close the tray by pressing the Eject/Load button or by gently pushing the
tray forward.
Chapter 3. Operating and caring for your computer 19
Note: If the tray does not slide out of the drive when you press the Eject/Load
button, insert the pointed end of a large paper clip into the emergency-eject hole located on the front of the CD-ROM drive.
Using the IBM ScrollPoint II mouse
Some models come with an IBM ScrollPoint®II mouse. The ScrollPoint II mouse has the following controls.
1 Primary mouse button:
Use this button to select or start a program or menu item.
2 Quick/Auto scroll button:
Use this button to put the mouse into auto-scroll mode. When the mouse is in auto-scroll mode, the movement of the mouse controls the scrolling direction and speed. To exit from the auto-scroll mode, click any of the mouse buttons.
3 Context menu button:
Use this button to display a menu for the active program, icon, or object.
4 Scroll stick:
Use this stick to control the scrolling action of the mouse. This stick is pressure sensitive. The direction in which you apply pressure controls the direction of the scrolling action. The amount of pressure you apply controls the scrolling speed.
These buttons are controlled by the IBM ScrollPoint II mouse driver. If your computer came with preinstalled software, this device driver was preinstalled. You can obtain an updated ScrollPoint II mouse driver from http://www.ibm.com/pc/support/ on the World Wide Web.
20 User Guide
Updating system programs
System programs are the basic layer of software built into your computer. They include the power-on self-test (POST), the basic input/output system (BIOS) code, and the Configuration/Setup Utility program. POST is a set of tests and procedures that is performed each time you turn on your computer. BIOS is a layer of software that translates instructions from other layers of software into electrical signals that the computer hardware can understand. You can use the Configuration/Setup Utility program to view and change the configuration and setup of your computer.
Your computer system board has a module called electrically erasable programmable read-only memory (EEPROM, also referred to as flash memory). You can easily update POST, BIOS, and the Configuration/Setup Utility program by starting your computer using a flash update diskette or by using the Remote Administration feature, if it is enabled. See Setting Remote Administrationon page 33 for more information.
IBM might make changes and enhancements to the system programs. When updates are released, they are available as downloadable files on the World Wide Web (see Chapter 7. Getting help, service, and informationon page 99). Instructions for using the system programs updates are available in a README file included in the update files.
To update system programs (flash the EEPROM):
1. Insert a system programs update (flash) diskette into the diskette drive
(drive A) in your computer. System programs updates are available at http://www.ibm.com/pc/support/ on the World Wide Web.
2. Turn on the computer. If it is on already, you must turn it off and back on
again. The update begins.
Using network management tools
This section describes features that a network administrator or file server can use to remotely manage and control your computer. For more information about system management, see Understanding Your Personal Computer (available at http://www.ibm.com/pc/support/ on the World Wide Web).
IBM Universal Manageability tools streamline and automate PC systems management and support tasks, such as asset deployment and tracking. These leading-edge PC tools are available for IBM Personal Computers at no additional charge, helping to reduce total cost of ownership of your networked PCs and allowing you to focus vital company resources on essential business activities.
Chapter 3. Operating and caring for your computer 21
Wake on LAN
The Wake on LAN feature requires a Wake on LAN network adapter. A network administrator can use this feature to turn on your computer from a remote location. When Wake on LAN is used in conjunction with network management software (provided on the Software Selections CD that comes with your computer), many types of functions, such as data transfers, software updates, and POST or BIOS updates to your computer can be initiated remotely. For more information, see the documentation that comes with your Ethernet adapter.
Note: If the computer power cord is plugged into a surge protector, make sure
that when you turn off power you use the computer power switch and not the surge protector switch. Otherwise, the Wake on LAN feature will not work.
Remote Program Load or Dynamic Host Configuration Protocol
If your computer comes with an Ethernet adapter, a network administrator can use Remote Program Load (RPL) or Dynamic Host Configuration Protocol (DHCP) to control your computer. If you use RPL in conjunction with software such as IBM LANClient Control Manager, you can use a feature called Hybrid RPL, which installs hybrid images (or files) on the hard disk. Then, each time the computer starts from the network, LANClient Control Manager recognizes your computer as a Hybrid RPL client and a small bootstrap program is downloaded to your computer hard disk. Hybrid RPL avoids the network traffic associated with a standard RPL.
Remote Administration
A network administrator can use this feature to remotely update the POST and BIOS in your computer. Network management software, such as LANClient Control Manager, is required in order to take advantage of this feature. See Setting Remote Administrationon page 33 for configuration information.
LANClient Control Manager (LCCM)
LANClient Control Manager is a graphical, server-based program that aids in system deployment by allowing mass unattended system installation of operating systems, complete software images, device drivers, and BIOS updates. Used with Wake on LAN, LCCM can remotely start up your system from a powered-off state, which means all this can be done while the system is not being used. If you have purchased an IBM PC, LCCM is available for downloading at no additional charge (Internet access fees excepted).
For more information or to download this software go to http://www.ibm.com/pc/us/desktop/lccm on the World Wide Web.
22 User Guide
System Migration Assistant (SMA)
System Migration Assistant (SMA) delivers wizard-like functionality to help administrators remotely transfer configurations, profile settings, printer drivers, and files from an IBM or non-IBM PC to supported IBM systems. If you have purchased an IBM computer, SMA is available for downloading at no additional charge (Internet access fees excepted).
For more information or to download this software go to http://www.ibm.com/pc/us/software/sysmgmt/products/sma on the World Wide Web.
Desktop Management Interface
Desktop Management Interface (DMI) is a method for gathering information about the hardware and software in your computer. In a network environment, network administrators can use DMI to remotely monitor and control your computer.
Using security features
To deter unauthorized use of your computer, you can use anti-intrusion features and other security features that are provided with your computer.
Anti-intrusion features
IBM anti-intrusion features help protect against the theft of computer components, such as the microprocessor, system memory modules, or drives.
A cover lock is built into some models to prevent the cover from being removed. Two identical keys for the cover lock are also supplied. A tag attached to the keys has the key serial number and the address of the key manufacturer.
Some models have a chassis-intrusion detector inside. You can set the chassis-intrusion detector to alert the system administrator each time the computer cover is removed. This detector is enabled after you set an administrator password in the Configuration/Setup Utility program. If a password is set and the cover is removed, a POST error message (176) displays on the computer screen the next time the computer is turned on. You must type the correct administrator password to start up the computer. For information on setting the passwords, see Using passwordson page 34.
Component protection
Your computer has serialized components that can be registered with a third-party security company. (You can also register the entire system.) By registering computer components, you can improve the chances of identifying the components if they are ever stolen and recovered. For more information
Chapter 3. Operating and caring for your computer 23
about component registration, see the IBM support page at http://www.ibm.com/pc/us/desktop/assetid/ on the World Wide Web.
Asset ID capability
IBM provides the basis for Asset ID2support in some models. Asset ID provides the capability to access information that is stored in an EEPROM module on the system board, using a radio-frequency-enabled portable scanner.
The Asset ID EEPROM contains prerecorded information about the system, including its configuration and serial numbers of key components. The Asset ID EEPROM also includes a number of blank fields you can record with your choice of information. The Asset ID can be scanned from a short distance. The scanning of the Asset ID does not require the computer cover to be removed or even require that the computer be removed from the box in which it is shipped. This type of wireless tracking enables quicker system deployment and improved asset control. Also, Asset ID information is available through UM services.
For the latest information about security features for your computer, go to the IBM support page at http://www.ibm.com/pc/us/desktop/assetid/ on the Wor ld Wide Web .
To determine if your computer comes with Asset ID capability, check the Configuration/Setup Utility program. For instructions to start the Configuration/Setup Utility program, see Starting and using the Configuration/Setup Utility programon page 29. If your computer comes with Asset ID capability, see Using Enhanced Securityon page 31 for information about enabling Asset ID.
IBM security solutions
IBM security solutions keep electronic business transactions safe. They include the following:
v Integrated security chip that gives you the functionality of a SMART card
without the added cost (some models only)
v Enhanced Security support v User Verification Manager software that helps manage authentication so that
you decide who has access to the components of your system
Not all models come with all the features listed here.
2. Asset ID enables your personal computer to be scanned by various radio frequency-emitting devices supplied by independent companies. Asset ID is intended for use only with radio frequency equipment that meets ANSI/IEEE C95.1 1991 RF Radiation Limits.
24 User Guide
Data protection
You can lose data from the hard disk for a variety of reasons. Security violations, viruses, or hard disk drive failure can all contribute to the destruction of data files. To protect against the loss of valuable information, IBM has incorporated many data-saving features within your computer.
SMART hard disk drive
Your computer comes with a SMART (Self-Monitoring, Analysis, and Reporting Technology) hard disk drive that is enabled to report potential hard disk failures. If an error is detected, a DMI-compliant warning message is sent to the computer screen and, if the computer is part of a network, to an administrator console. When an error is detected, the data on the hard disk can be backed up and the drive replaced.
SMART Reaction
SMART Reaction software is available to owners of IBM NetVista computers as part of a package called Universal Management Services. SMART Reaction software is a tool that you can use to help back up important data. SMART Reaction is a client/server software application that helps users and administrators respond effectively to a warning issued by the SMART hard disk drive. You can download SMART Reaction software from http://www.ibm.com/pc/support/ on the World Wide Web.
Virus protection
Your computer has built-in virus protection that can be enabled through the Configuration/Setup Utility program. Norton AntiVirus for IBM is on the IBM Software Selections CD.
Enhanced Security
Some models have an enhanced security feature that provides extra protection for your administrator password and your startup sequence settings. With enhanced security, your administrator password and startup sequence are stored in a highly protected, nonvolatile, security EEPROM module that is separate from CMOS memory and the EEPROM module that stores system programs. When your administrator password and security sequence are protected by enhanced security, they remain intact even if the battery in your computer expires or is removed. For more information, see Using Enhanced Securityon page 31.
Locking the keyboard
You can disable the keyboard so that others are unable to use it. If a power-on password is set, the keyboard is locked when you turn on the computer. You must type the correct password before the keyboard will unlock. You can enable the power-on password feature with the Configuration/Setup Utility program. See Using a power-on passwordon page 34.
Chapter 3. Operating and caring for your computer 25
Note: If you have a USB keyboard, it will function even if a password has
been placed on the computer.
Some operating systems have a keyboard and mouse lock-up feature. Check the documentation that comes with your operating system for more information.
Shutting down
When you are ready to turn off your computer, follow the shutdown procedure for your operating system to prevent the loss of unsaved data or damage to your software programs. See your operating system documentation for instructions.
Taking care of your computer
This section provides guidelines for the proper handling and care of your computer.
Basics
Here are some basic points about keeping your computer functioning properly: v Keep your computer in a clean, dry environment. Make sure it rests on a
flat, sturdy surface.
v Do not place items on top of the monitor or cover any vents in the monitor
or computer. These vents provide air flow to keep your computer from overheating.
v Keep food and drinks away from all parts of your computer. Food particles
and spills might make the keyboard and mouse sticky and unusable.
v Do not get the power switches or other controls wet. Moisture can damage
these parts and cause an electrical hazard.
v Always disconnect a power cord by grasping the plug, not the cord.
Cleaning your computer
It is a good practice to clean your computer periodically to protect the surfaces and ensure trouble-free operation.
CAUTION: Be sure to turn off the computer and monitor power switches before cleaning the computer and monitor screen.
26 User Guide
Computer and keyboard
Use only mild cleaning solutions and a damp cloth to clean the painted surfaces of the computer.
Monitor screen
Do not use abrasive cleaners when cleaning the surface of the monitor screen. The screen surface is easily scratched, so avoid touching it with pens, pencil points, and erasers.
To clean the screen surface, wipe it gently with a soft, dry cloth, or blow on the screen to remove grit and other loose particles. Then use a soft cloth moistened with a nonabrasive liquid glass cleaner.
Mouse
If the pointer on the screen does not move smoothly with the mouse, you might need to clean the mouse.
To clean your mouse:
1. Turn off the computer.
2. Disconnect the mouse cable from the computer.
3. Turn the mouse upside down. Unlock the retainer on the bottom of the
mouse by moving it in the direction indicated by the arrow on the retainer.
4. Turn the mouse right-side up, and the retainer and ball will drop out.
5. Wash the ball in warm, soapy water and dry it well.
6. Using a damp cloth, wipe the outside of the mouse and the retainer. Be
sure to wipe the rollers inside the mouse.
7. Insert the ball and retainer. Lock the retainer by moving it in the opposite
direction of the arrow.
8. Reconnect the mouse cable to the computer.
Chapter 3. Operating and caring for your computer 27
Moving your computer
Take the following precautions before moving your computer.
1. Back up all files and data from the hard disk.
Operating systems can vary in the way they perform backup procedures. Refer to your operating system documentation for information about software backup.
2. Remove all media (diskettes, compact discs, tapes, and so on) from the
drives.
3. Turn off the computer and all attached devices. Your hard disk drive
automatically parks the read/write heads in a nondata area. This process prevents damage to the hard disk.
4. Unplug the power cords from electrical outlets.
5. Note where you have attached your cables to the rear of the computer; then
remove them.
6. If you saved the original shipping cartons and packing materials, use them
to pack the units. If you are using different cartons, cushion the computer components to avoid damage.
28 User Guide
Chapter 4. Using the Configuration/Setup Utility program
The Configuration/Setup Utility program is stored in the electrically erasable programmable read-only memory (EEPROM) of your computer. You can use the Configuration/Setup Utility program to view and change the configuration settings of your computer, regardless of which operating system you are using. However, the settings you select in your operating system might override any similar settings in the Configuration/Setup Utility program.
Starting and using the Configuration/Setup Utility program
The Configuration/Setup Utility program might start automatically when POST detects that newly installed or removed hardware is not reflected in your current configuration. A 162 POST message is displayed. See Power-on self-test (POST)on page 73.
To start the Configuration/Setup Utility program:
1. Press and hold down F1 and turn on the computer. If your computer is
already on when you start this procedure, you must shut down the operating system, turn off the computer, wait a few seconds until all in-use lights go off, and restart the computer. (Do not use Ctrl+Alt+Del to restart the computer.)
2. If you have not set a password, the Configuration/Setup Utility program
menu appears on the screen. If you have set a password, the Configuration/Setup Utility program menu will not appear until you type your password and press Enter. See Using passwordson page 34 for more information.
© Copyright IBM Corp. 2000 29
Viewing and changing settings
The menu on your computer might look slightly different from the menu shown here, but it will operate the same way.
Configuration/Setup Utility
Select Option:
v System Summary v Product Data v Devices and I/O Ports v Start Options v Date and Time v System Security v Advanced Setup v Power Management
Save Settings Restore Settings Load Default Settings Exit Setup
The Configuration/Setup Utility program menu lists items that identify system configuration topics. You might see symbols next to configuration menu items. See the following table for the meaning of the symbols.
Symbol Explanation
v An additional menu or screen is available.
A change to that item has been made in the system configuration or
the Configuration/Setup Utility program has detected an error and attempted to correct it. Also, an additional menu might follow a menu item with a beside it.
* A system resource conflict was detected. Resolve this conflict before
exiting from the Configuration/Setup Utility program so that your computer will function properly.
[ ] In the Configuration/Setup Utility program menus, the configuration
information you can change is enclosed in brackets like these. You cannot change information that is not surrounded by brackets.
When working with the Configuration/Setup Utility program menu, you must use the keyboard. Refer to the following table for the keys used to accomplish various tasks.
Keys Function
↑↓ Use the arrow keys to move among menu items until the item you
want is highlighted.
←→ Use these arrow keys to display and toggle among choices for a
menu item.
Enter Press this key to select a highlighted menu item.
30 User Guide
Keys Function
Esc Press this key to exit from a menu after viewing or making changes
to the settings in the menu.
+ Use this key in some menus to increase the numerical value of a
setting.
Use this key (the minus or hyphen key) in some menus to decrease the numerical value of a setting.
0-9 Use the number keys in some menus to change the numerical value
of a setting.
F1 Press this key for help on a selected menu item. F9 Press this key if you changed and saved the setting of a selected
menu item and you want to restore the setting that was active before you made the change.
F10 Press this key to return the setting of a selected menu item to a
default value.
Note: Active keys are displayed at the bottom of each screen; not all of the
above keys are active on every menu.
Exiting from the Configuration/Setup Utility program
When you finish viewing or changing settings, press Esc until you return to the Configuration/Setup Utility program menu. You might have to press Esc several times to get back to the Configuration/Setup Utility program menu. If you want to save the changes or settings, select Save Settings before you exit. Otherwise, your changes will not be saved.
Using System Security
Use the System Security menu to customize the security features of your computer. The features included in the System Security menu are Enhanced Security, Security Profile by Device, Remote Administration, and Power On and Administrator Passwords.
Using Enhanced Security
Some models support Enhanced Security. Enhanced Security can be enabled or disabled only when you update system programs.
If Enhanced Security is enabled and you have not set an administrator password, your computer will operate as though enhanced security is disabled.
If Enhanced Security is enabled and you have set an administrator password, your computer will operate as follows:
v The contents of the security EEPROM (your administrator password and
startup sequence) will be protected from failure of the battery and CMOS memory.
Chapter 4. Using the Configuration/Setup Utility program 31
v The security EEPROM will be protected from unauthorized access because it
locks after your computer is turned on and the system programs have completed their startup routine. Once it is locked, the security EEPROM cannot be read from or written to by any software application or system software until the computer is turned off and back on again. On a network, this might prevent certain functions from being performed remotely on your computer.
Enhanced Security adds a hard lock for an extra measure of protection for the system programs in your computer. Normally, the entire contents of the system programs EEPROM is write protected with a soft lock. A soft lock enables the Remote Administration program to function in a network environment. With a hard lock, when your computer is turned on and the system programs startup routine is completed, Remote Administration is locked and cannot be unlocked until the computer is restarted and the administrator password is entered. Note that, in a networking environment, this prevents the system programs in your computer from being updated remotely. Someone must be present at your computer to turn it on and off and enter the administrator password.
v Some models have a chassis-intrusion feature that will alert you if the cover
of your computer has been opened. This feature will work if your computer is on or off. If the cover has been opened, a prompt for your administrator password will appear on your screen, and your computer will remain in a suspended state until your administrator password is entered.
v Configuration settings cannot be changed in the Configuration/Setup Utility
program until you enter the administrator password. This means that any changes to the computer hardware that the system programs detect will generate a configuration error until you enter the administrator password.
To enable or disable Enhanced Security:
1. Update the system programs. See Updating system programson page 21.
2. During the run of the system program update, you are given the option of
enabling or disabling Enhanced Security. Your choice is automatically recorded in the System Security menu of the Configuration/Setup Utility program.
Using Security Profiles by Device
Security Profiles by Device enables you to control the level of security for the following:
v IDE controller (for example, hard disk drives): When the feature is set to
Disable, all devices connected to the IDE controller are disabled and will not appear in the system configuration.
v Diskette Drive Access: When the feature is set to Disable, the diskette drive
cannot be accessed.
32 User Guide
v Diskette Write Protect: When the feature is set to Enable, all diskettes are
treated as if write-protected.
Setting Security Profile by Device also enables you to control which devices require a password before they start up. There are three classes of these devices:
v Removable media, such as diskette drives and CD-ROM drives v Hard disk drives v Network devices
You can set these devices to request a user password, an administrator password, or not to require a password. This way, if you have a power-on or administrator password set for your system, you can configure your computer to prompt you for a password only when certain devices are accessed at startup. For example, if you set hard disk devices to require a user password, each time you attempt to start up from the hard disk, you will be prompted to type the password before the startup proceeds.
Some operating systems require you to type a password before the operating system will load. Security Profile by Device does not change the way the operating system works. If an operating system password is required, you must still type it when prompted, regardless of the Security Profile by Device settings.
To set Security Profiles by Device:
1. Start the Configuration/Setup Utility program (see “Starting and using the
Configuration/Setup Utility programon page 29).
2. From the Configuration/Setup Utility program menu, select System
Security and press Enter.
3. Select Security Profile by Device and press Enter.
4. Select the desired devices and settings and press Enter.
5. Press Esc twice to return to the Configuration/Setup Utility program menu.
6. Select Save Settings from the Configuration/Setup Utility program menu;
then press Esc and follow the instructions on the screen to exit from the Configuration/Setup Utility program.
Setting Remote Administration
You can remotely update the system programs, such as POST and BIOS, from a network server by enabling Remote Administration. If you have set an administrator password for your computer, the password does not have to be entered in order to remotely update programs. Consult your network administrator for information about setting up your network server to perform POST and BIOS updates.
Chapter 4. Using the Configuration/Setup Utility program 33
To set Remote Administration, follow these steps:
1. Start the Configuration/Setup Utility program. See “Starting and using the
Configuration/Setup Utility programon page 29.
2. Select System Security and press Enter.
3. Select Remote Administration and press Enter.
4. To enable Update Remote Administration, select Enabled. To disable, select
Disabled.
5. Press Esc until you return to the Configuration/Setup Utility program main
menu.
6. Select Save Settings from the Configuration/Setup Utility program menu;
then press Esc and follow the instructions on the screen to exit from the Configuration/Setup Utility program.
Using passwords
You can use two kinds of passwords to provide security for your computer and data: a power-on password and an administrator password. You do not have to set a password of either type to use your computer. However, if you decide to set one, read the following sections.
Using a power-on password
The power-on password feature deters unauthorized persons from gaining access to your computer. When you set the power-on password, some models give you the option to choose one of three password prompt modes:
On In password prompt On mode, you are prompted for the power-on
password when you turn on the computer. Until the correct password is entered, the computer operating system will not start, and you will not be able to use the keyboard or mouse to input any other information.
Notes:
1. If you have a mouse connected to a serial port, it will be activated
when the computer is started, regardless of whether the password is set.
2. If Remote Administration is enabled, you cannot select On. In this
case, select Dual. If you try to set this mode to On when Remote Administration is enabled, it will automatically be reset to Dual. For more information, see Setting Remote Administrationon page 33.
3. If you have a USB keyboard connected to your computer, the
keyboard will not lock when you have set a password.
Off In password prompt Off mode (sometimes referred to as unattended
start mode), you are not prompted to enter your power-on password
34 User Guide
when you turn on the computer. The operating system will start but you must type the password before you can log on or access applications.
Dual In the password prompt Dual mode, the startup behavior of the
computer depends on whether the computer is started from the computer power switch or by an unattended method, such as remotely over a LAN.
If you start your computer using the power switch, you will be prompted for a password.
If the computer is started by an unattended method, the computer operates the same as it does in password prompt Off mode.
The password does not appear on the screen as you type it. If you type the wrong password, you receive a screen message telling you so. If you type the wrong password three times, you must turn off the computer and start again. When you type the correct password, the computer begins normal operation.
Setting, changing, and deleting a power-on password
A power-on password can be any combination of up to seven characters (A-Z, a-z, and 0-9).
To set, change, or delete a power-on password:
1. Start the Configuration/Setup Utility program (see “Starting and using the
Configuration/Setup Utility programon page 29).
2. From the Configuration/Setup Utility program menu, select System
Security and press Enter.
3. Select Power-on Password and press Enter.
4. To set or change a power-on password, type your new password and press
the Down Arrow. Type your new password again and press the Down Arrow.
5. At Change Power-On Password, press Enter.
6. If your computer supports password prompt modes want to change the
password prompt mode, select Password Prompt and then select either Off, On,orDual. Continue at step 8.
7. To delete a power-on password, select Delete Power-On Password.A
screen warning you that any existing power-on password will be deleted appears. Press Enter to continue.
8. Press Esc twice to return to the Configuration/Setup Utility program menu.
9. Select Save Settings from the Configuration/Setup Utility program menu;
then press Enter and follow the instructions on the screen to exit from the Configuration/Setup Utility program.
Chapter 4. Using the Configuration/Setup Utility program 35
Using an administrator password
Setting an administrator password deters unauthorized persons from changing configuration settings. If you are responsible for maintaining the settings of several computers, you might want to set an administrator password.
After you set an administrator password, a password prompt appears each time you try to access the Configuration/Setup Utility program. If you type the wrong password, you receive a message telling you so. If you type the wrong password three times, you must turn the computer off and start again.
If both a power-on and administrator password are set, you can type either password. However, in order to change any settings, you must use your administrator password. If you enter the power-on password, you will only be able to view limited information.
Setting, deleting, or changing an administrator password
An administrator password can be any combination of up to seven characters (A-Z, a-z, and 0-9).
To set, change, or delete an administrator password:
1. Start the Configuration/Setup Utility program (see “Starting and using the
Configuration/Setup Utility programon page 29).
2. From the Configuration/Setup Utility program menu, select System
Security and press Enter.
3. Select Administrator Password and press Enter.
4. To set or change an administrator password, type your new password and
press the Down Arrow. Type your new password again and press the Down Arrow.
5. At Change Administrator Password, press Enter.
6. In the Power-On Password Changeable by User field, select Yes or No.
(If you select Ye s and an administrator password is set, the power-on password can be changed without having to enter the administrator password. If you select No and an administrator password is set, the power-on password cannot be changed unless the administrator password is entered.)
7. In the Require Power-On Password on Warm boot field, select Yes or No.
Continue at step 9.
8. To delete an administrator password, select Delete Administrator
Password and press Enter.
9. Press Esc until you return to the Configuration/Setup Utility program
menu.
10. Select Save Settings from the Configuration/Setup Utility program menu;
then press Enter and follow the instructions on the screen to exit from the Configuration/Setup Utility program.
36 User Guide
Erasing a lost or forgotten password (clearing CMOS)
This section applies to lost or forgotten passwords that are not protected by Enhanc ed Security. For information about lost or forgotten passwords that are protected by Enhanced Security, see Using Enhanced Securityon page 31.
To erase a forgotten password:
1. Turn off the computer and all attached devices.
2. Unplug the power cord.
3. Remove the cover. See Removing the coveron page 45.
4. Refer to the system board cover label inside the computer to locate the
clear CMOS jumper on the system board.
5. Set the jumper from the standard position (pins 1 and 2) to pins 2 and 3.
6. Replace the cover and plug in the power cord. See Replacing the cover
and connecting the cableson page 66.
7. Restart the computer, leave it on for about ten seconds, and then turn off
the computer.
8. Repeat steps 2 through 4.
9. Set the jumper back to the standard position (pins 1 and 2).
10. Replace the cover and plug in the power cord. See Replacing the cover
and connecting the cableson page 66.
Using Adapter ROM security
Adapter ROM security prevents unauthorized users from altering the setup of vital adapters in your computer. You can set Adapter ROM security to on or off.
Using the IBM Embedded Security Chip
Some models come with the IBM Embedded Security Chip. The Embedded Security Chip is a built-in cryptographic technology that can be used to secure the electronic transmission of information. To use the security features on this chip, you must also install security software that is available at http://www.ibm.com/pc/support/ on the World Wide Web.
To enable the IBM Embedded Security Chip, do the following:
1. Start the Configuration/Setup Utility program. See “Starting and using the
Configuration/Setup Utility programon page 29.
2. Select System Security and press Enter.
3. Select IBM Embedded Security Chip and press Enter.
4. Set IBM Embedded Security Chip and press Enter.
5. Type the password in the bracketed field and press Enter.
Chapter 4. Using the Configuration/Setup Utility program 37
You can clear the IBM Embedded Security Chip by selecting Clear IBM Security Chip and pressing Enter. This will delete all IBM Embedded Security
Chip passwords and encryption values and disable the IBM Embedded Security Chip feature.
Enabling the Pentium III processor serial number feature
The Pentium III microprocessor features a processor serial number feature. The processor serial number is an electronic number unique to each Pentium III microprocessor. This feature is used primarily to enhance security with Internet transactions. Your computer is shipped to you with this feature Off (disabled).
To enable this feature, use the following procedure:
1. Start the Configuration/Setup Utility program. See “Starting and using the
Configuration/Setup Utility programon page 29.
2. Select Advanced Setup and press Enter.
3. Select Processor Control and press Enter.
4. Change the value for Processor Serial Number Access from Disabled to
Enabled and press Enter.
5. Save the settings, exit the program, and restart the computer with the
computer power switch to activate the new setting.
Other settings in the Configuration/Setup Utility program
The information in this section includes instructions for changing other settings using the Configuration/Setup Utility program, such as the keyboard speed, the startup sequence, and power management.
Changing keyboard speed
You can change the speed at which the keyboard responds when you hold down a key. This setting can be found under Start Options in the Configuration/Setup Utility program. The default typematic rate is 30 characters per second (fast rate).
Changing the primary startup sequence
These settings control the sequence of devices used to start up your computer when it is turned on using the power switch. The default or preset settings for the primary startup sequence are:
First startup device [Diskette drive] Second startup device [Hard disk drive] Third startup device [Network] Fourth startup device [Disabled]
38 User Guide
To view or change the primary or automatic power on startup sequence:
1. Start the Configuration/Setup Utility program (see “Starting and using the
Configuration/Setup Utility programon page 29.
2. Select Start Options and press Enter.
3. Select Startup Sequence and press Enter.
4. Make your selections and press Esc until you return to the
Configuration/Setup Utility program menu.
5. Select Save Settings from the Configuration/Setup Utility menu and press
Enter. Then press Esc and follow the instructions on the screen to exit from the Configuration/Setup Utility program.
Enabling the Error Startup Sequence
You can set your computer to initiate the Error Startup Sequence when POST detects an error by enabling this feature.
To enable the Error Startup Sequence:
1. Start the Configuration/Setup Utility program (see “Starting and using the
Configuration/Setup Utility programon page 29).
2. Select Start Options and press Enter.
3. Select Startup Sequence from the Start Options menu and press Enter.
4. Select Error Startup Sequence and set it to Primary, Automatic,or
Disabled.
5. Press Esc until you return to the Configuration/Setup Utility menu and
press Enter to save settings. Then press Esc and follow the instruction on the screen to exit from the Configuration/Setup Utility program.
Power-management features
Your computer comes with built-in energy-saving capabilities. You can view and change energy-saving settings using the power-management menu in the Configuration/Setup Utility program. This section describes the power-management features in your computer and provides instructions for using these features.
ACPI BIOS IRQ
Automatic Configuration and Power Interface (ACPI) BIOS IRQ enables the operating system to control the power-management features of your computer. You can use the ACPI BIOS IRQ setting to configure the interrupts that this feature uses so that you can free resources for other devices. Not all operating systems support ACPI BIOS IRQ. See your operating system documentation to determine if ACPI is supported.
Chapter 4. Using the Configuration/Setup Utility program 39
ACPI Standby Mode
Some models might allow you to select the power level to which the computer will go when entering standby mode. These models allow you to select standby mode S1 or S3.
When the computer enters S1 mode, power is maintained to all devices, but microprocessor activity is halted.
When the computer enters S3 mode, power is maintained only for main memory. Some computers do not support S3 mode. If the Standby Mode setting the Configuration/Setup Utility program does not allow you to select S3, your computer only supports Standby Mode S1. If the Standby Mode setting in the Configuration/Setup Utility program allows you to select S3, be sure to read the following important information.
Important
Some adapters might not wake up properly from Standby Mode S3. If your computer appears to have stopped and will not wake up from standby, press and hold the power switch for 5 seconds. Your computer will exit standby mode and turn off. Press the power switch to turn the computer back on.
If you encounter a problem with Standby Mode S3, set this option to S1 and check to see if updated device drivers that support Standby Mode S3 are available for your adapters.
Setting power-management features
With power management, the computer and monitor (if the monitor supports DPMS) can be set to go into a reduced power state if they are inactive for a specified length of time.
v Time to Low Power: When you enable Automatic Hardware Power
Management, you can use this option to specify the amount of time that the
computer must be inactive before power-management features are activated.
v System Power: You can select ON if you want the computer to remain on or
OFF if you want the computer to shut down.
v Display: You can use this option to select one of the following
reduced-power states: – Standby: In this mode, the screen is blanked, but the screen image is
restored immediately when any activity is detected.
Suspend: In this mode, the monitor uses less power than in Standby
mode. The screen is blanked, but the screen image is restored within a few seconds after any activity is detected.
40 User Guide
Off: In this mode, the monitor power is turned off. To restore power to
the monitor, you must press the monitor power switch. On some monitors, you might have to press the power switch twice.
If Off is selected, you must specify the Time to Display Off.You c an select 5 minutes to 1 hour.
Note: Time to display off is the amount of time from when the
reduced-power state begins until the display turns off.
Disable: In this mode, the monitor is unaffected by the power
management settings.
v IDE Drives: You can use this selection to specify whether the IDE drives are
enabled or disabled when power-management features are activated.
To set power management features:
1. Start the Configuration/Setup Utility program (see “Starting and using the
Configuration/Setup Utility programon page 29).
2. Select Power Management and press Enter.
3. Select APM and press Enter.
4. Set APM BIOS Mode to Enabled or Disabled.
5. Set Automatic Hardware Power Management to Enabled.
6. Select values for power management (time to low power, system power,
processor speed, display, and time to display off), as desired.
7. Select Low Power Entry Activity Monitor and press Enter.
8. Set to Enabled or Disabled devices you want to be monitored for power
management.
Note: If all devices are set to disabled, you must restart the computer to
wake the system.
9. Press Esc until you return to the Configuration/Setup Utility program
menu; then select Save Settings and press Esc and follow the instructions on the screen to exit from the Configuration/Setup Utility program.
Setting automatic power-on features: You can use the automatic power-on features on the power-management menu to enable and disable features that automatically turn on your computer. You must also select the startup sequence you want to use for the type of power-on event you select.
v Wake on LAN: If you have remote network-management software, you can
use the IBM-developed Wake on LAN feature. When you set Wake on LAN to Enabled, your computer will turn on when it receives a specific signal from another computer on your local area network (LAN).
v Wake on Alarm: With this feature, you can specify a date and time at which
the computer will be turned on automatically. This can be either a single event, a daily event, or a weekly event.
Chapter 4. Using the Configuration/Setup Utility program 41
v PCI Wake Up: If this setting is enabled, your computer turns on in response
to wake up requests from PCI devices that support this feature.
To set automatic power-on features, follow these steps:
1. Start the Configuration/Setup Utility program (see “Starting and using the
Configuration/Setup Utility programon page 29).
2. Select Power Management and press Enter.
3. Select Automatic Power On and press Enter.
4. Select the menu item for the feature you want to set. Select either Enabled
or Disabled. Press Enter.
5. Select Startup Sequence for the feature. Select either Primary or Automatic.
If you select Automatic, make sure Automatic Power On Startup Sequence in the Startup Sequence menu is set to Enabled. Otherwise, the system will use the Primary Startup Sequence.
6. Press Esc until you return to the Configuration/Setup Utility program
menu.
7. Select Save Settings from the Configuration/Setup Utility program menu
and press Enter. Then press Esc and follow the instructions on the screen to exit from the Configuration/Setup Utility program.
42 User Guide
Chapter 5. Installing options
You can expand the capabilities of your computer by adding memory, drives, or adapters. When adding an option, use these instructions along with the instructions that come with the option.
Important: Before you install any option, see the safety notices in the Quick Reference and read the Safety informationon page iii. These precautions and
guidelines will help you work safely.
Handling static-sensitive devices
Static electricity, although harmless to you, can seriously damage computer components and options.
When you add an option, do not open the static-protective package containing the option until you are instructed to do so.
When you handle options and other computer components, take these precautions to avoid static electricity damage:
v Limit your movement. Movement can cause static electricity to build up
around you.
v Always handle components carefully. Handle adapters and memory modules
by the edges. Never touch any exposed circuitry.
v Prevent others from touching components. v When you install a new option, touch the static-protective package
containing the option to a metal expansion-slot cover or other unpainted metal surface on the computer for at least two seconds. This reduces static electricity in the package and your body.
v When possible, remove the option and install it directly in the computer
without setting the option down. When this is not possible, place the static-protective package that the option came in on a smooth, level surface and place the option on it.
v Do not place the option on the computer cover or other metal surface.
Available options
The following are some available options:
v System memory, called dual in-line memory modules (DIMMs) v Peripheral component interconnect (PCI) adapters v Internal drives
– CD-ROM
© Copyright IBM Corp. 2000 43
Hard diskDiskette drives and other removable media drives
For the latest information about available options, see the following World Wide Web pages:
v http://www.ibm.com/pc/us/options/ v http://www.ibm.com/pc/support/
You can also obtain information by calling the following telephone numbers: v Within the United States, call 1-800-IBM-2YOU (1-800-426-2968), your IBM
reseller, or IBM marketing representative.
v Within Canada, call 1-800-565-3344 or 1-800-465-7999. v Outside the United States and Canada, contact your IBM reseller or IBM
marketing representative.
Important: Some models come with only one internal fan to cool components in the computer and prevent overheating. Do not install an internal hard disk that is 7200 rpm or more. This might cause your computer to overheat and damage your computer.
Tools required
To install some options in your computer, you might need a flat-blade screwdriver. Additional tools might be needed for certain options. See the instructions that come with the option.
44 User Guide
Removing the cover
Important:
Read Safety informationon page iii and Handling static-sensitive deviceson page 43 before removing the cover.
To remove the cover:
1. Shut down your operating system, remove any media (diskettes, CDs, or
tapes) from the drives, and turn off all attached devices and the computer.
2. Unplug all power cords from electrical outlets.
3. Disconnect all cables attached to the computer. This includes power cords,
input/output (I/O) cables, and any other cables connected to the computer.
4. Press the buttons on the sides of the computer and pivot the rear end of
the cover up toward the front of the computer.
Chapter 5. Installing options 45
Locating components—small form factor desktop model
The following illustration will help you locate the various components in your computer.
1Fan 5Slimline CD-ROM drive (some models) 2Microprocessor 6System board 3DIMM 7Riser card housing 4Diskette drive
46 User Guide
Locating componentsdesktop model
The following illustration will help you locate the various components in your computer.
1CD-ROM drive 6System board 2Empty drive bay 7Microprocessor 3Hard disk drive 8AGP adapter (some models) 4Diskette drive 9PCI slot 5DIMM
Chapter 5. Installing options 47
Installing options on the system board and riser card (some models)
This section provides instructions for installing options, such as system memory and adapters, on the system board and the riser card (some models).
Accessing the system board
To access the system board, you must remove the computer cover. For information on removing the computer cover, see Removing the coveron page 45. You might need to remove adapters in order to access some components of the system board. For information about expansion adapters, see Installing adapterson page 53. When disconnecting cables, be sure to note where they attach, so you can correctly reattach them later.
Identifying parts on the system board
The system board, also called the planar or motherboard, is the main circuit board in your computer. It provides basic computer functions and supports a variety of devices that are IBM-installed or that you can install later. Depending on the model, your computer comes with one of the following two system boards.
48 User Guide
Components of the A40 and A40p system board
If your computer is a type A40 or A40p, see the following illustration for the location of parts on the system board.
Note: An illustration of the system board and additional information is
provided on a label located on the inside of the computer chassis.
1 CPU fan connector 12 CMOS clear/recovery jumper 2 Microprocessor 13 Front fan connector 3 DIMM 1 14 Battery 4 DIMM 2 15 SCSI adapter LED connector 5 Power LED connector 16 Wake on LAN connector 6 RFID connector 17 PCI slot 3 7 Front USB connector 18 PCI slot 2 8 Secondary IDE connector 19 PCI slot 1 9 Diskette connector 20 AGP connector 10 Primary IDE connector 21 CD-ROM audio connector 11 Power connector 22 Speaker connector
Chapter 5. Installing options 49
Components of the riser card for small form factor desktop models
The following illustration shows the location of PCI connectors on the riser card for small form factor desktop model computers.
1 PCI slot 1
2 Ethernet disable jumper
3PCI slot 2
50 User Guide
Components of the A20 system board
If your computer is a type A20 computer, see the following information for the location of parts on the system board.
Note: An illustration of the system board and additional information is
provided on a label located on the inside of the computer chassis.
1 CPU fan connector 10 Clear CMOS/Recovery jumper 2 Microprocessor 11 Front fan connector 3 Power connector 12 Wake on LAN connector 4 DIMM 1 13 PCI connector 3 5 DIMM 2 14 PCI connector 2 6 Diskette connector 15 PCI connector 1 7 Secondary IDE connector 16 CD-ROM audio connector 8 Primary IDE connector 17 Serial 2 connector 9 Battery
Installing memory
Your computer has two connectors for installing memory modules that provide up to a maximum of 512 MB of system RAM.
Chapter 5. Installing options 51
Your computer uses dual inline memory modules (DIMMs). The IBM-installed DIMMs that come with your computer are unbuffered, synchronous dynamic random access memory (SDRAM).
When installing DIMMs, the following rules apply:
v Fill each system memory connector sequentially, starting at DIMM 1. v Use 3.3 V, 133 MHz, unbuffered, SDRAM DIMMs. v Use only 64, 128, or 256 MB DIMMs in any combination.
Notes:
1. To locate the memory connectors on the system board, see Identifying
parts on the system boardon page 48.
2. To open the retaining clips on the DIMM connectors in the desktop model,
you will have to remove the AGP adapter first.
a. Remove the adapter slot cover latch. b. Remove the AGP adapter.
To install a DIMM:
1. Remove the cover. See Removing the coveron page 45.
2. If the retaining clips are not already open, open them.
3. Install the DIMM straight down into the connector until the retaining clips
close. Make sure the notches in the DIMM align with the tabs on the connector.
52 User Guide
Notches
What to do next:
v Replace the AGP adapter and adapter slot cover latch. v To work with another option, go to the appropriate section. v To complete the installation, go to Completing the installationon
page 66.
Installing adapters
This section provides information and instructions for installing and removing adapters.
Adapter slots
The small form factor desktop model has two expansion slots used to connect adapters to the peripheral component interconnect (PCI) bus. You can install an adapter up to 174.6 mm (6.875 inches) long in the small form factor desktop model.
The desktop model has three expansion slots used to connect adapters to the peripheral component interconnect (PCI) bus and one slot used to connect an accelerated graphics port (AGP) adapter. You can install an adapter up to 330 mm (13 inches) long in the desktop model.
All adapters supported by your computer use Plug and Play technology that enables the computer to automatically configure the adapter. For more information, see Updating the computer configurationon page 67.
Chapter 5. Installing options 53
Installing adapters small form factor desktop model
To install an adapter in a PCI expansion slot:
1. Remove the cover and all cables. See Removing the coveron page 45.
2. Remove the riser card housing and place the housing on its side with the
adapter slots facing up.
3. Remove the adapter from its static-protective package.
4. Remove the screw and adapter slot cover for the adapter slot into which
you are installing the adapter.
54 User Guide
5. Install the adapter and insert the retaining screw.
Note: If you are installing a Wake on LAN-supported network adapter,
attach the Wake on LAN cable that came with the adapter to the Wake on LAN connector on the system board.
Chapter 5. Installing options 55
6. Replace the riser card housing.
7. Replace the cover and connect the cables (see Replacing the cover and
connecting the cableson page 66); then continue with Updating the computer configurationon page 67.
Installing adapters desktop model
To install an adapter in a PCI or AGP expansion slot:
1. Remove the cover. See “Removing the coveron page 45.
56 User Guide
2. Remove the adapter slot cover latch and the slot cover for the appropriate
expansion slot.
3. Remove the adapter from its static-protective package.
4. Install the adapter into the appropriate slot on the system board.
5. Install the adapter slot cover latch.
Chapter 5. Installing options 57
Note: If you are installing a Wake on LAN-supported network adapter,
attach the Wake on LAN cable that came with the adapter to the Wake on LAN connector on the system board.
6. Replace the cover and connect the cables (see “Replacing the cover and
connecting the cableson page 66); then continue with Updating the computer configurationon page 67.
What to do next:
v To work with another option, go to the appropriate section. v To complete the installation, go to Completing the installationon
page 66.
Installing internal drives
This section provides information and instructions for installing and removing internal drives.
Internal drives are devices that your computer uses to read and store data. You can add drives to your computer to increase storage capacity and to enable your computer to read other types of media. Some of the different drives available for your computer are:
v Hard disk drives v Tape drives v CD-ROM drives v Removable media drives
Internal drives are installed in bays. Within this book, the bays are referred to as bay 1, bay 2, and so on.
When you install an internal drive, it is important to note what type and size of drive you can install in each bay. Also, it is important to correctly connect the internal drive cables to the installed drive.
58 User Guide
Drive specifications small form factor desktop model
Your computer comes with the following IBM-installed drives:
v A CD-ROM drive in bay 1 (some models) v A 3.5-inch hard disk drive in bay 2 v A 3.5-inch diskette drive in bay 3
Models that do not have drives installed in bay 3 have a static shield and bay panel installed.
The following table describes some of the drives you can install in each bay and their height requirements.
1 Bay 1 - Max Height: 25.4 mm (1.0 in.) Slimline CD-ROM drive (standard in
some models)
2 Bay 2 - Max Height: 25.4 mm (1.0 in.) 3.5-inch hard disk drive (preinstalled) 3 Bay 3 - Max Height: 12.7 mm (0.5 in.) 3.5-inch hard disk drive (preinstalled)
Chapter 5. Installing options 59
Drive specifications desktop model
Your computer comes with the following IBM-installed drives:
v A CD-ROM drive in bay 1 (some models). v A 3.5-inch hard disk drive in bay 3. v A 3.5-inch diskette drive in bay 4.
Models that do not have drives installed in bays 1 and 2 have a static shield and bay panel installed.
The following illustration shows the locations of the drive bays in the desktop model.
The following table describes some of the drives you can install in each bay and their height requirements.
1 Bay 1 - Max Height: 41.3 mm (1.6 in.) CD-ROM drive (standard in some
models) 5.25-inch hard disk drive
2 Bay 2 - Max Height: 41.3 mm (1.6 in.) 5.25-inch hard disk drive 3.5-inch hard
disk drive (requires a mounting bracket) CD-ROM drive DVD-ROM drive
3 Bay 3 - Max Height: 25.4 mm (1.0 in.) 3.5-inch hard disk drive (preinstalled) 4 Bay 4 - Max Height: 25.4 mm (1.0 in.) 3.5-inch diskette drive (preinstalled)
Notes:
1. Drives that are greater than 41.3 mm (1.6 in.) high cannot be installed.
2. Install removable media (tapes or CDs) drives in the accessible bays: bays 1
or 2.
60 User Guide
Power and signal cables for internal drives
Your computer uses cables to connect integrated drive electronics (IDE) drives to the power supply and to the system board. The following cables are provided:
v Four-wire power cables connect most drives to the power supply. At the end
of these cables are plastic connectors that attach to different drives; these connectors vary in size. Also, certain power cables attach to the system board.
v Flat signal cables, also called ribbon cables, connect IDE and diskette drives to
the system board. There are two sizes of ribbon signal cables that come with your computer:
– The wider signal cable has two or three connectors.
- If the cable has three connectors, one of these connectors is attached to the drive, one is a spare, and the third attaches to the primary or secondary IDE connector on the system board.
- If the cable has two connectors, one of these connectors is attached to the hard disk drive, and the other attaches to the primary or secondary IDE connector on the system board.
Notes:
1. If you want to add another device, and your computer does not
come with a CD-ROM preinstalled, you will need a second signal cable with three connectors. You will need an 80-conductor ATA 66 signal cable if you are replacing the existing signal cable or adding a second hard disk. ATA 66 signal cables are color-coded. The blue connector attaches to the system board; the black connector attaches to the master device, and the gray middle connector attaches to the slave device.
If your computer comes with a CD-ROM drive, it will have an ATA 66 signal cable. However, if you installing a hard disk drive, you must change the switch setting on the CD-ROM drive to secondary and change the connector used for the CD-ROM drive to the gray middle connector.
2. If you are installing a slimline CD-ROM drive in the small form
factor desktop model, the IDE cable requires a special connector to attach to the slimline CD-ROM drive. This connector can be attached only to an optional slimline CD-ROM drive.
– The narrower signal cable has two connectors for attaching the diskette
drive to the diskette-drive connector on the system board.
Note: To locate connectors on the system board, see Identifying parts on the
system boardon page 48. The following are some important points to remember when connecting power and signal cables to internal drives:
Chapter 5. Installing options 61
v The drives that are preinstalled in your computer come with power and
signal cables attached. If you replace any drives, it is important to remember which cable is attached to which drive.
v When you install a drive, ensure that the drive connector at the end of the
signal cable is always connected to a drive; also, ensure that the drive connector at the other end is connected to the system board. This reduces electronic noise from the computer.
v If two IDE devices are used on a single cable, one must be designated as the
primary or master device and the other as the secondary or subordinate device; otherwise, some of the IDE devices might not be recognized by the system. The primary or secondary designation is determined by switch or jumper settings on each IDE device.
v If two IDE devices are on a single cable, and only one is a hard disk drive,
the hard disk drive must be set as the master device.
v If you have only one IDE device on a cable, it must be set as master.
For help in selecting drives, cables, and other options for your computer, see page 44.
62 User Guide
Installing internal drives in the desktop model computer
To install an internal drive in the desktop model computer: To remove the cover:
1. See “Removing the coveron page 45.
Note: If your computer has a CD-ROM drive, you might need to remove
the signal and power cables from the CD-ROM drive.
2. Pivot the drive bay latch handle toward the front of the computer and
pivot the drive bay cage toward the front of the computer until the drive cage latch catches to the chassis.
Chapter 5. Installing options 63
3. Install the drive into the bay. Align the screw holes and insert the two
screws.
4. Pivot the drive bay cage back into place.
64 User Guide
5. If you are installing a drive with removable media, insert a flat–bladed
screwdriver into one of the slots on the static shield in the drive bay into which you are installing the drive and gently pry the static shield loose from the drive bay.
6. If the drive you installed is a removable-media drive, remove the bay panel
from the front bezel and place the bezel frame that comes with your computer over the drive bay.
7. Connect the power and signal cables to the drive.
Chapter 5. Installing options 65
What to do next
v To work with another option, go to the appropriate section. v To complete the installation, go to Completing the installation”.
Installing a security U-bolt
To help prevent hardware theft, you can add a security U-bolt and cable to your computer. After you add the security cable, make sure that it does not interfere with other cables that are connected to the computer.
To install a U-bolt:
1. Use a tool, such as a screwdriver, to remove the two metal knockouts.
2. Insert the U-bolt through the rear panel; then attach and tighten the nuts
with an appropriately sized or adjustable wrench.
3. Replace the computer cover. For more information, see Replacing the
cover and connecting the cables”.
4. Thread the cable through the U-bolt and around an object that is not a part
of or permanently secured to the building structure or foundation, and from which it cannot be removed; then fasten the cable ends together with a lock.
Completing the installation
After working with options, you need to install any removed parts, replace the cover, and reconnect any cables, including power cords and telephone lines. Also, depending on the option installed, you might need to confirm the updated information in the Configuration/Setup Utility program.
Replacing the cover and connecting the cables
To replace the cover and connect cables to your computer:
1. Ensure that all components have been reassembled correctly and that no
tools or loose screws are left inside your computer.
2. Clear any cables that might impede the replacement of the cover.
66 User Guide
3. Position the cover over the chassis and pivot the cover down over the
computer until the cover snaps into place.
4. Reconnect the external cables and cords to the computer. See “Connecting
computer cableson page 7.
Updating the computer configuration
You might need to install device drivers after updating the configuration settings. For more information, see the instructions that come with the option
Chapter 5. Installing options 67
to determine if device drivers are required and how to install them. Some device drivers are included in the service partition of your computer.
You might need to install device drivers after updating the configuration settings. For more information, see the instructions that come with the option to determine if device drivers are required and how to install them. Some device drivers are included in the service partition of your computer.
After adding options, the configuration settings are updated automatically by system programs. If the settings are not updated properly or an error occurs as a result of the installed option, you can use the Configuration/Setup Utility program to reconfigure the appropriate settings. In either case, you must save the settings before exiting from the Configuration/Setup Utility program.
For example, when you start your computer after adding most internal hard disk drives, the settings might be updated. If the settings are not updated properly, use the Configuration/Setup Utility program to make and save those changes.
Note: For more information on error messages from configuration conflicts, see
Chapter 6. Troubleshootingon page 71.
Along with the documentation that comes with your adapter, use the following information to help with adapter configuration.
Plug and Play is a configuration method that makes expanding your computer easier. The system board of your computer supports operating systems that use Plug and Play technology.
PCI adapters that you can install in your computer are Plug and Play devices. A Plug and Play adapter has no switches or jumpers that must be set. A Plug and Play adapter comes with configuration specifications that provide installation information to the computer during startup. When you install Plug and Play adapters, this information is interpreted by the basic input/output system (BIOS), which supports Plug and Play technology. If the required resources are available, the BIOS software automatically configures the adapter using resources not already used by other devices.
Starting the Configuration/Setup Utility program
When you restart the computer for the first time after working with most options, a message might appear indicating that a configuration change has occurred. If such a message appears, you are then prompted to enter the Configuration/Setup Utility program to confirm and save settings that were automatically updated by the system programs.
68 User Guide
After you change an option and restart the computer, the following screen might appear.
POST Startup Error(s)
The following error(s) were detected when the system was started:
162 Configuration Change Has Occurred
Select one of the following:
Continue Exit Setup
Note: Depending on the configuration changes that occurred, the error
message you see might be different from the one shown here. If the
preceding screen appears, select Continue until you reach the program
menu (see Chapter 4. Using the Configuration/Setup Utility program
on page 29).
If the preceding screen does not appear, use the program to configure your computer. For more information, see Chapter 4. Using the Configuration/Setup Utility programon page 29.
Configuring startup devices
When your computer is turned on, it looks for an operating system. The order in which it searches devices for the operating system is the startup sequence. After adding new devices to the computer, you might want to change the startup sequence. You can use the program to configure startup devices. See Changing the primary startup sequenceon page 38.
Chapter 5. Installing options 69
70 User Guide
Chapter 6. Troubleshooting
This chapter describes diagnostic tools that you can use to identify and correct problems that might arise. This chapter also contains information about option diskettes and how to recover from a BIOS update failure.
Computer problems can be caused by hardware, software, or user error (for example, pressing the wrong key). You can use the diagnostic aids discussed in this chapter to help you solve such problems yourself or gather helpful information you can pass on to a service technician.
Computer problems can be caused by hardware, software, or user error (for example, pressing the wrong key). You can use the diagnostic aids discussed in this chapter to help you solve such problems yourself or gather helpful information you can pass on to a service technician.
You can check the hardware by following the procedures in this chapter. You can also use the diagnostic programs provided with your computer (see IBM Enhanced Diagnostics programon page 94 for a description of these programs).
If the hardware checks out, and you have not made a user error, you might have a software problem. If you suspect that you have a software problem and your computer comes with IBM-preinstalled software, see IBM Enhanced Diagnostics programon page 94 for information about how to run the IBM Enhanced Diagnostics program provided by IBM. Also see the operating system documentation supplied with your computer. If you have installed software applications yourself, see the documentation supplied with the software.
The following tools are available to diagnose hardware-related problems:
v Power-on self-test (POST) v Troubleshooting procedure v Error codes and messages v Troubleshooting charts v IBM Enhanced Diagnostics program
Troubleshooting procedure
Use this procedure as a starting point for problem identification.
1. To begin troubleshooting, perform the following steps:
a. Remove all diskettes and CDs from the drives. b. Turn off the computer and wait for a few seconds.
© Copyright IBM Corp. 2000 71
c. Turn on any attached devices; then, turn on the computer. d. Wait the normal amount of time for the first window of your
application or the operating system to be displayed.
Is either the Windows desktop or the first screen of your application program displayed?
No - continue at step 2.
Yes - The power-on self-test (POST) did not detect a problem. Further diagnostic testing is required. Go to IBM Enhanced Diagnostics program
on page 94 and run the diagnostic programs. If you are unable to run the diagnostic programs or if the diagnostic programs do not detect an error, go to Device troubleshooting chartson page 80.
2. You have an unreadable display, an error message, or the computer is
sounding a series of beeps. Is an error message displayed? No - continue at step 3. Yes-SeePOST error codeson page 73 and look for the error message;
then, return here. Is the error message in this table? No - the message might be from your software. Refer to documentation for
your application program. Yes - continue at step 4.
3. Do you hear a series of beeps?
No - Go to Device troubleshooting chartson page 80. Find the symptom that best describes the problem and take the appropriate action. If the problem persists, have the computer serviced.
Yes-GotoPOST beep codeson page 77.
4. Did the Configuration/Setup Utility program start automatically after the
error message was displayed? No - Follow the action for this error message described in POST error
codeson page 73. Yes - continue to step 5.
5. Have you recently added, removed, or changed any hardware?
No - Have the computer serviced. Yes - Do one of the following: v If the failure occurred immediately after you installed or removed an
option, and you have not yet updated the configuration, see Chapter 4. Using the Configuration/Setup Utility programon page 29.
72 User Guide
v If the computer was functioning correctly after you installed an option
and is now malfunctioning, have the computer serviced.
v If the failure occurred immediately after you made a change to the
configuration, verify that you selected the correct settings.
v If the failure occurred immediately after you installed or removed a new
option and you get an error message from the Configuration/Setup Utility program, disconnect the new device.
Power-on self-test (POST)
Each time you turn on your computer, it performs a series of tests that check the basic operation of the base computer. This series of tests is called the power-on self-test (POST).
POST does the following:
v Checks basic system board operations v Checks the memory operation v Compares the current system configuration with that established by the
Configuration/Setup Utility program
v Starts the video operation v Verifies that the diskette drives are working v Verifies that the hard disk drive and the CD-ROM drive are working
POST error messages appear when POST finds problems with or changes to the hardware during startup. POST error messages are 3-, 4-, 5-, 8-, or 12-character alphanumeric messages and include brief explanations (except I999XXXX errors).
Diagnostic error codes and messages
Diagnostic codes and messages appear if a hardware problem is detected by one of the IBM Enhanced Diagnostics test programs or if POST detects a problem. Along with error codes, the messages present text information that can be used to identify a failing part.
POST error codes
Table 1. POST Error Codes
Code Description Action
101 Interrupt failure Have the computer serviced. 102 Timer failure Have the computer serviced. 106 System board failure Have the computer serviced. 110 Parity error Have the computer serviced.
Chapter 6. Troubleshooting 73
Table 1. POST Error Codes (continued)
Code Description Action
111 I/O parity error 2 Go to IBM Enhanced Diagnostics
programon page 94 and follow the
instruction to run diagnostics. 129 Level 1 cache error Have the computer serviced. 135 Fan failure Have the computer serviced. 151 Real time clock failure Have the computer serviced. 161 Defective CMOS battery Replace the battery. See Replacing
the batteryon page 97. 162 A change in device configuration
occurred
1. Verify that all external devices
are turned on.
2. Verify that all devices are
properly installed and securely connected.
3. If you added, removed, or
changed the location of a device, save the new configuration in the Configuration/Setup Utility program. See Starting the Configuration/Setup Utility programon page 68 and Chapter 4. Using the Configuration/Setup Utility programon page 29 for more
information. 163 Clock not updating Have the computer serviced. 164 CMOS RAM memory size does not
match
Go to IBM Enhanced Diagnostics programon page 94 and follow the
instructions to run diagnostics. 166 Boot block check sum error Have the computer serviced. 167 No processor patch Update the BIOS. See Updating
system programson page 21. 168 Alert on LAN is not working
correctly.
1. Go to “Chapter 4. Using the
Configuration/Setup Utility programon page 29 and follow the instructions to verify that Alert on LAN is enabled.
2. If Alert on LAN is enabled and
the error persists, have the computer serviced.
175 System board error Have the computer serviced.
74 User Guide
Table 1. POST Error Codes (continued)
Code Description Action
176 System cover has been removed. Type in the administrator password.
If problem persists, have the computer serviced.
177 An inventory violation occurred,
such as a hardware component was removed. This error message is part of the AssetCare and Asset ID features of the computer.
Type in the administrator password. If the problem persists, have the computer serviced.
183 Administrator password required. Type the administrator password. 184 Asset control antenna not detected. Have the computer serviced. 186 System board or hardware security
error
Have the computer serviced.
187 Administrator password and
startup sequence has been cleared.
Go to ““Starting the Configuration/Setup Utility programon page 68 and follow the instructions to set an administrator password and the startup sequence.
190 The computer chassis-intrusion
detector was cleared. This is an informational message.
No action is required.
20x Memory error Go to IBM Enhanced Diagnostics
programon page 94 and follow the
instructions to run diagnostics. 229 Level 2 cache error Have the computer serviced. 301 or 303 Keyboard error
1. Make sure the keyboard is
properly connected.
2. If the keyboard is properly
connected, have the computer serviced.
601 Diskette drive or controller error 1. Go to IBM Enhanced
Diagnostics programon page 94 and if possible run the IBM Enhanced Diagnostics program.
2. If the problem persists, have the
computer serviced.
602 Diskette IPL boot record not valid 1. The diskette might be defective.
Try another diskette.
2. If the problem persists, have the
computer serviced.
Chapter 6. Troubleshooting 75
Table 1. POST Error Codes (continued)
Code Description Action
604 Unsupported diskette drive
installed
1. Go to “IBM Enhanced
Diagnostics programon page 94 and if possible run the IBM Enhanced Diagnostics program.
2. If the problem persists, have the
computer serviced.
605 Diskette unlocked problem Have the computer serviced. 662 Diskette drive configuration error 1. Go to the configuration
procedure and follow the instructions to verify the diskette drive configuration.
2. Run diagnostics on the diskette
drive. See IBM Enhanced Diagnostics programon page 94.
3. If the problem persists, have the
computer serviced.
762 Math coprocessor configuration
error
Have the computer serviced.
11xx Serial port error (xx = serial port
number)
Have the computer serviced.
1762 Hard disk configuration error 1. Go to Chapter 4. Using the
Configuration/Setup Utility programon page 29 and follow the instructions to verify the hard disk configuration.
2. If the problem persists, have the
computer serviced.
178x Hard disk or IDE device failed
1. Go to “IBM Enhanced
Diagnostics programon page 94 to run diagnostics on the hard disk and the IDE devices.
2. If the problem persists, have the
computer serviced.
18xx A PCI adapter has requested an
unavailable resource.
Go to Chapter 4. Using the Configuration/Setup Utility programon page 29 and follow the instructions to reconfigure the PCI devices.
76 User Guide
Table 1. POST Error Codes (continued)
Code Description Action
1962 Boot sequence error
1. Go to “Changing the primary
startup sequenceon page 38 and follow the instructions to verify that the startup sequence is configured.
2. If the problem persists, have the
computer serviced.
2400 Display adapter failed; using
alternate.
Have the computer serviced.
2462 Video configuration error. Have the computer serviced. 5962 IDE CD-ROM configuration error Have the computer serviced. 8601 Pointing device error Have the computer serviced. 8603 Pointing device or system board
error
Have the computer serviced.
I9990301 Hard disk failure Have the computer serviced.
POST beep codes
One beep and the appearance of text on the monitor indicate successful completion of POST. More than one beep indicates that POST detected an error. Beep codes are sounded in a series of two or three sets of beeps.
The duration of each beep is constant, but the length of the pause between the beeps varies. For example, a 1–2–4 beep code sounds like one beep, a pause, two consecutive beeps, another pause, and four more consecutive beeps.
For the following beep codes, the numbers indicate the sequence and number of beeps. For example, a “2–3–2” error symptom (a burst of two beeps, three beeps, then two beeps) indicates a memory module problem.
If the following beep codes occur, have the computer serviced.
Beep code Probable cause
1–1–3 CMOS write/read failure 1–1–4 BIOS ROM checksum failure 1–2–1 Programmable interval timer test failure 1–2–2 DMA initialization failure 1–2–3 DMA page register write/read test failure 1–2–4 RAM refresh verification failure 1–3–1 RAM test failure
Chapter 6. Troubleshooting 77
Beep code Probable cause
1–3–2 RAM parity test failure 1–4–3 Fail-safe timer test in progress 1–4–4 Software NMI port test in progress 2–1–1 Secondary DMA register test in progress or failure 2–1–2 Primary DMA register test in progress or failure 2–1–3 Primary interrupt mask register test failure 2–1–4 Secondary interrupt mask register test failure 2–2–2 Keyboard controller test failure 2–3–2 Screen memory test in progress or failure 2–3–3 Screen retrace tests in progress or failure
Ethernet error messages
The error messages listed in this section apply only to models with a preinstalled Ethernet adapter or riser card.
If a failure condition occurs after the Ethernet controller is initialized, an error message appears on the screen. The error messages that can occur are shown below. If you experience any error related to the Ethernet adapter, record the error message, and tell your network administrator about the problem.
RPL-related error messages
These error messages are specific to the Ethernet adapter and the RPL environment of your computer.
The two most common error messages are shown below.
RPL-ROM-ERR: 105 The integrated Ethernet failed the loopback test. RPL-ROM-ERR: 107 Media test failed; check the cable.
Error 105 indicates that a power-on diagnostic test performed by the Ethernet module did not execute correctly. If this error message appears, you must have the computer serviced. Error 107 indicates that the cable from the LAN is not securely connected to the Ethernet port on your computer. Check the cable to ensure that it is properly connected.
Other error messages that might occur are shown in the following table.
RPL-ROM-ERR: 100 The Ethernet adapter cannot be found. RPL-ROM-ERR: 101 The Ethernet adapter was unable to initialize. RPL-ROM-ERR: 102 The Ethernet adapter could not be reset.
78 User Guide
RPL-ROM-ERR: 103 There are multiple Ethernet adapters in the system. Specify the correct serial number in NET.CFG.
RPL-ROM-ERR: 104 The Ethernet adapter EEPROM is faulty or not present. RPL-ROM-ERR: 106 The Ethernet adapter is configured for Plug and Play in a non-Plug
and Play system. RPL-ROM-ERR: 110 The Ethernet adapter RAM failed the memory test.
DHCP-related error messages
Error messages related to DHCP and the Ethernet adapter are shown in the following table.
E61: Service boot canceled. E62: Cannot initialize controller. E63: Cannot initialize controller. E67: Cannot initialize controller. E6d: Cannot find BOOTP server. E6e: Cannot start from downloaded image. E71: Too many MTFTP packages. M10: ARP canceled by keystroke. M11: ARP timeout. M20: Cannot copy memory. M21: Cannot write to memory. M22: Cannot write to memory. M30: Cannot ARP TFTP address. M31: TFTP canceled by keystroke. M32: TFTP open timeout. M33: Unknown TFTP opcode. M34: TFTP read canceled by keystroke. M35: TFTP timeout. M38: Cannot open TFTP connection. M39: Cannot read from TFTP connection. M40: BOOTP canceled by keystroke. M40: DHCP canceled by keystroke. M41: BOOTP timeout. M41: DHCP timeout. M42: No client or server IP. M43: No bootfile name.
Chapter 6. Troubleshooting 79
M44: Cannot ARP redirected BOOTP server. M6f: System is locked! Press Ctrl+Alt+Del to restart. M90: Cannot initialize controller for multicast. M91: MTFTP canceled by keystroke. M92: MTFTP open timeout. M93: Unknown MTFTP opcode. M94: MTFTP read canceled by keystroke. M95: MTFTP timeout. M96: Cannot ARP MTFTP address. M98: Cannot open MTFTP connection. M99: Cannot read from MTFTP connection. Txx: <message from TFTP error packet>
Note: An x value that follows an error code represents any alphanumeric
character.
Device troubleshooting charts
You can use the troubleshooting charts in this section to find solutions to problems that have definite symptoms.
Important:
If you find it necessary to remove the computer cover, first read Safety informationon page iii and Removing the coveron page 45 for important safety information and instructions.
If you have just added new software or a new computer option and your computer is not working, do the following before using the troubleshooting charts:
1. Remove the software or device you just added.
2. Run the diagnostic programs to determine if your computer is running
correctly. (See IBM Enhanced Diagnostics programon page 94 for information about diagnostic programs provided with your computer.)
3. Reinstall the new software or new device.
The following directory will help you quickly locate problem categories in the troubleshooting charts.
Problem type Go to:
Audio problems Audio problemson page 83
80 User Guide
Problem type Go to:
CD-ROM drive CD-ROM drive problemson page 84 Diskette drive Diskette drive problemson page 86 General General problems Intermittent Intermittent problemson page 82 Keyboard, mouse, or
pointing-device
Keyboard, mouse, or pointing device problemson page 89
Memory Memory problemson page 90 Monitor Monitor problemson page 86 Optional device Option problemson page 91 Parallel Port Parallel-port problemson page 92 Printer Printer problemson page 93 Serial Port 1 Serial-port problemson page 92 Serial Port 2 Serial-port problemson page 92 Software Application problemson page 93 Universal Serial Bus
(USB) device
Universal Serial Bus (USB) problemson page 94
General problems
General problems Action
The computer does not start when you press the power switch.
Verify that:
1. All cables are securely connected to the proper
connectors on the computer. For the location of the connectors, see Connecting computer cableson page 7.
2. The computer cover is properly installed.
If you cannot correct the problem, have the computer serviced.
Problems such as a broken cover lock or indicator lights not working.
Have the computer serviced.
Chapter 6. Troubleshooting 81
Intermittent problems
Intermittent problems Action
A problem occurs only occasionally and is difficult to detect.
Verify that:
1. All cables and cords are securely connected to the
rear of the computer and attached devices.
2. When the computer is turned on, the fan grill is not
blocked (there is air flow around the grill), and the fans are working. If airflow is blocked or the fans are not working, the computer might overheat.
3. If SCSI devices are installed, the last external device
in each SCSI chain is terminated correctly. (See your SCSI documentation.)
If you cannot correct the problem, have the computer serviced.
82 User Guide
Loading...