NVIDIA DGX A100 DU-09821-001 _v01|iii
4.2.Registration............................................................................................................................. 24
4.3.Obtaining an NGC Account.....................................................................................................24
4.4.Turning DGX A100 On and Off................................................................................................24
4.4.1.Startup Considerations.................................................................................................... 25
4.4.2.Shutdown Considerations................................................................................................ 25
4.5.Verifying Functionality - Quick Health Check........................................................................25
4.6.Running the Pre-flight Test................................................................................................... 26
4.7.Running NGC Containers with GPU Support........................................................................ 26
4.7.1.Using Native GPU Support...............................................................................................27
4.7.2.Using the NVIDIA Container Runtime for Docker...........................................................27
4.8.Managing CPU Mitigations..................................................................................................... 28
4.8.1.Determining the CPU Mitigation State of the DGX System............................................ 28
4.8.2.Disabling CPU Mitigations............................................................................................... 29
4.8.3.Re-enabling CPU Mitigations.......................................................................................... 29
Chapter5.Additional Features and Instructions.............................................................. 30
5.1.Managing the DGX Crash Dump Feature.............................................................................. 30
5.1.1.Using the Script................................................................................................................30
5.1.2.Connecting to Serial Over LAN to View the Console......................................................30
Chapter6.Managing the DGX A100 Self-Encrypting Drives............................................. 31
6.1.Overview...................................................................................................................................31
6.2.Installing the Software............................................................................................................32
6.3.Configuring Trusted Computing.............................................................................................32
6.3.1.Determining Whether Drives Support SID......................................................................32
6.3.2.Enabling the TPM and Preventing the BIOS from Sending Block SID Requests...........33
6.4.Initializing the System for Drive Encryption.......................................................................... 33
6.5.Enabling Drive Locking...........................................................................................................34
6.6.Initialization Examples............................................................................................................34
6.6.1.Example 1: Passing in the JSON File............................................................................. 34
6.6.1.1.Determining Which Drives Can be Managed as Self-Encrypting............................ 35
6.6.1.2.Creating the Drive/Password Mapping JSON Files and Using it to Initialize the
System................................................................................................................................ 36
6.6.2.Example 2: Generating Random Passwords.................................................................. 36
6.6.3.Example 3: Specifying Passwords One at a Time When Prompted............................... 37
6.7.Disabling Drive Locking..........................................................................................................37
6.8.Exporting the Vault................................................................................................................. 37
6.9.Erasing Your Data...................................................................................................................37
6.10.Clearing the TPM.................................................................................................................. 38
6.11.Changing Disk Passwords, Adding Disks, or Replacing Disks........................................... 38