Setup Guide

Dell - Internal Use - Confidential
Dell - Internal Use - Confidential
Item
How is data input to this
memory?
How is this memory write
protected?
How is the memory
cleared?
controller BIOS and
selecting Discard
Preserved Cache.
SDRAM
ROC writes to this
memory - using it as cache
for data IO to HDDs
Not WP. Not visible to
Host Processor
Cache can be cleared by
powering off the card
H330 PERC
NVSRAM memory
ROC writes configuration
data to NVSRAM
Not WP. Not visible to
Host Processor
Cannot be cleared with
existing tools available to
the customer
FRU
Programmed at ICT during
production.
Not WP
Cannot be cleared with
existing tools available to
the customer
1-Wire EEPROM
ROC writes data to this
memory
Not WP. Not visible to
Host Processor
Cannot be cleared with
existing tools available to
the customer
SBR
Pre-programmed before
assembly
Not WP. Not visible to
Host Processor
Cannot be cleared with
existing tools available to
the customer
Flash
Pre-programmed before
assembly. Can be updated
using Dell/LSI tools
Not WP. Not visible to
Host Processor
Cannot be cleared with
existing tools available to
the customer
HBA 330 PERC
NVSRAM memory
ROC writes configuration
data to NVSRAM
No write protect. Not
visible to Host Processor
The user cannot clear
memory.
FRU
Programmed at ICT during
production
No write protect
The user cannot clear
memory.
Serial Boot ROM
Pre-programmed before
assembly
No write protect. Not
visible to Host Processor
The user cannot clear
memory.
Flash
Pre-programmed before
assembly. Can be updated
using Dell/LSI tools
No write protect. Not
visible to Host Processor
The user cannot clear
memory.
TPM
Trusted Platform Module
(TPM, TPM 2.0 only)
Using TPM Enabled
operating systems
SW write protected
F2 Setup option
IDSDM - vFlash
vFlash (uSD)
User can provide data to
iDRAC (entirely in the
iDRAC domain) to be
pushed into vFlash
No write protect
1. The card may be
physically removed and
destroyed or cleared via
standard means on a
separate computer. Or
2. The user has access to
the card in the host
domain and may clear it
manually.
iDSDM (uSD1, uSD2)
Device resides in host
domain; they are exposed
to the user via an
Physical write protect
switch on ACE card
(1) card may be physically
removed and destroyed or
cleared via standard