HP Advanced Services zl Module with Microsoft® Windows Server® 2008 R2 Installation and Getting Started Guide
4-7
Special Guidelines for Using the Advanced Services zl Module with Microsoft Windows Server 2008 R2
Default Policies That Must Not Be Changed
7. The restoration takes about twenty minutes. You can exit the Recovery
Menu at any time by pressing
[Ctrl][Z].
After the module has rebooted, you can contact it and manage it as a new
module. Refer to Chapter 2: “Getting Started.” Remember also to reapply any
updates or patches.
Default Policies That Must Not Be
Changed
By default, the HP Advanced Services zl Module with Microsoft Windows
Server 2008 R2 has power management and screen saver settings that prevent
the video from being shut down after a certain time. The server on the module
does not have an actual video connection; however, it is important to leave
this setting as it is. Otherwise, the video shutting down can interfere with how
the module shuts down.
For example, if the video has shutdown, when you tap the shutdown button
of the module the first button tap activates the video. You must tap the button
again to shut down the module. More important, the video shutting down
interferes with a graceful failover to a standby management module on the
host HP E8200 zl Series switch should the active management module fail. The
switch attempts to gracefully shut down the module for the failover, but
instead it only wakes up the video. Then the newly active management module
cannot take over management of the module, and the module faults, interrupt-
ing your services.
For these reasons, you must not change the default power management and
screen saver settings.
In addition, there are several settings recommended by United States Govern-
ment Configuration Baseline (USGCB) that you must not implement because
they will interfere with the installation process or cause the module to
malfunction.
Note The United States Government Configuration Baseline (USGCB) is an initia-
tive launched in 2010 for the purpose of creating security configuration
baselines for networking products deployed within federal agencies.