Attention:
• When the TCM is removed, all TCM functions will be disabled.
To remove the TCM, complete the following steps:
Figure 68. Trusted Cryptographic Module (TCM) removal
Step 1. Locate the TCM connector on the system board (see “System-board connectors” on page 13 ).
Step 2. If an I/O expansion adapter is installed in the I/O expansion 1 connector (see “System-board
connectors” on page 13 for the location of the connector), you will need to remove it first (see
“Remove an I/O expansion adapter” on page 57 ), as it will block your access to the TCM
connector.
Step 3. Carefully hold the TCM by its edges; then, gently press on the latch, and lift it from the system
board.
If you are instructed to return the component or optional device, follow all packaging instructions, and use
any packaging materials for shipping that are supplied to you.
Install the Trusted Cryptographic Module (TCM)
Use this information to install the Trusted Cryptographic Module (TCM).
Before you remove the TCM, complete the following steps:
1. Read “Safety” on page iii and “Installation Guidelines” on page 21 to ensure that you work safely.
To install the TCM, complete the following steps:
Chapter 3. Hardware replacement procedures 93