Setting the SCSI Security
Installing a Security .Tether. . . . . . . . . . . . . . . . . . . . .
Changing the Battery. . . . . . . . . . . . . . . . . . . . . . . .
Completing the Installation. . . . . . . . . . . . . . . . . . . . . .
Connecting External
Chapter 5. Using the | Online | and Standalone Diagnostics | . . . . . . . . . |
Sources for the Diagnostics. . . . . . . . . . . . . . . . . . . . . . . | |||
Standalone and | Online | Diagnostics Operating | Considerations. . . . . . . . . |
Online | Diagnostics | Modes of | ||||||||
Standalone Diagnostic | ||||||||||
Location | Codes (Model 140 and Model. . | |||||||||
Chapter | 6. | Location | Codes | (Model | 150 | only) | ||||
Physical | Location | |||||||||
AIX Location Codes | ||||||||||
Chapter | 7. | Using the System Verification Procedure |
| . . . . . . . . . . . | ||||||
Step | 1. | Considerations before Running This .Procedure | ||||||||
Step 2. Loading the Diagnostics | ||||||||||
Step 3. Running System | ||||||||||
Step 4. Additional System | ||||||||||
Step | 5. | Stopping the Diagnostics | ||||||||
Chapter | 8. | Hardware | Problem | Determination |
| |||||
Problem Determination Using the Standalone | or Online .Diagnostics | |||||||||
Problem Determination When Unable to | Load | |||||||||
Chapter | 9. | Introduction to | Tasks | and | Service Aids |
| ||||
Add Resource to Resource. . List | ||||||||||
AIX | Shell | |||||||||
Analyze Adapter | ||||||||||
Backup and Restore Media | ||||||||||
Certify Media . . | . . . . . . . . . . . . . . . . | |||||||||
Change Hardware Vital | ||||||||||
Configure | Dials | and | ||||||||
Configure | ISA Adapter | |||||||||
Configure | Reboot | |||||||||
Configure | Remote Maintenance Policy | |||||||||
Configure Ring Indicate Power On. .Policy. . . . . . . . . . . . . . . | ||||||||||
Configure Ring Indicate | ||||||||||
Configure Service | ||||||||||
Configure | Surveillance | |||||||||
Create Customized | Configuration Diskette. . . . . . . . . . . . . . . . | |||||||||
|
|
|
|
|
|
|
|
| Preface | vii |