Destroying the defective UFM
V CAUTION!
The UFM contains customer information (e.g. IP address, license
numbers). After replacing the UFM, hand the defective UFM over to the
customer. If the customer requests disposal of the defective UFM,
proceed as follows:
Figure 264: Destroying the defective UFM
Ê Use a pair of combination pliers (1) and flat nose pliers (2) to break
the UFM in half as shown.
14.3.3.4 Concluding steps
Ê "Reassembling" on page 62
Ê "Connecting the server to the mains" on page 72
Ê "Switching on the server" on page 73
Ê "Enabling SVOM boot watchdog functionality" on page 96
Ê "Enabling BitLocker functionality" on page 101
14.3.3.5 Software configuration
The UFM delivery set includes the "Recovery Tool CD" to setup the ESXi
configuration. Proceed as follows: