CN111694782B - Device and method for realizing automatic switching of trusted platform module - Google Patents

Device and method for realizing automatic switching of trusted platform module Download PDF

Info

Publication number
CN111694782B
CN111694782B CN202010444932.0A CN202010444932A CN111694782B CN 111694782 B CN111694782 B CN 111694782B CN 202010444932 A CN202010444932 A CN 202010444932A CN 111694782 B CN111694782 B CN 111694782B
Authority
CN
China
Prior art keywords
controller
switching
trusted platform
platform module
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010444932.0A
Other languages
Chinese (zh)
Other versions
CN111694782A (en
Inventor
郭乃慎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010444932.0A priority Critical patent/CN111694782B/en
Publication of CN111694782A publication Critical patent/CN111694782A/en
Application granted granted Critical
Publication of CN111694782B publication Critical patent/CN111694782B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/40Bus structure
    • G06F13/4004Coupling between buses
    • G06F13/4022Coupling between buses using switching circuits, e.g. switching matrix, connection or expansion network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides a framework and a method for realizing automatic switching of a trusted platform module, wherein a plurality of chips, a controller and a switching information acquisition unit are connected with the controller respectively; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus. According to the invention, before the server is started, the server requirements of the user are acquired, and the server requirements are switched to the correct trusted platform module without replacing a hardware module.

Description

Device and method for realizing automatic switching of trusted platform module
Technical Field
The invention belongs to the technical field of server security, and particularly relates to a device and a method for realizing automatic switching of a trusted platform module.
Background
Nowadays, servers are widely used, and confidential data is often required on the servers, thereby deriving the security requirements of the servers. The TCPA alliance was established by many IT macros in 1999 and defined the TPM specification, which defines that a server must have the capability to generate encryption and decryption keys, and must also be able to perform high-speed data encryption and decryption, and act as a co-processor that protects the BIOS and operating system from modification to secure the data on the server. Then China also puts forward TCM standards as the security standard indexes of domestic servers. A TPM specification-based server with a standard-based security subsystem, typically located on a motherboard, is commonly referred to as a trusted platform module ("TPM"). The Field Replace Unit (abbreviated as "FRU"), Field replaceable Unit, refers to some parts on large-scale equipment such as server, etc. which can be directly replaced without repair, and can obtain the user's demand according to the information in the FRU.
When the existing server is regenerated, the trusted platform module is usually made into a mode of modular small plates, a user-defined connector is used for being connected with a mainboard, and the trusted platform module is fixed on the mainboard by adding a one-way screw, so that the trusted platform module is prevented from being removed; in addition, the trusted platform module determines to follow the TPM specification or the TCM specification according to the user's requirement, but the TPM specification and the TCM specification are incompatible and need to be handled differently.
The existing management mode has the following defects:
(1) because the TPM specification and the TCM specification are not compatible, different chips are required to be used, so that the production and manufacturing cost is increased; the need to distinguish between the same configuration but to ship to different guests or areas results in increased costs for control and management.
(2) The trusted platform module platelet is in case the installation just can't be dismantled, can't directly change the module to the user that needs switch support two kinds of specifications, must return the server to the mill and reprocess, very inconvenient in the use.
Disclosure of Invention
In view of the above-mentioned deficiencies of the prior art, the present invention provides a device and a method for implementing automatic switching of a trusted platform module, so as to solve the above-mentioned technical problems.
In a first aspect, the present invention provides a device for implementing automatic switching of a trusted platform module, including: the switching device comprises a plurality of chips, a controller and a switching information acquisition unit, wherein the chips are respectively connected with the controller; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus.
Furthermore, the chips are two different chips of the trusted platform module, and the two chips are respectively a first chip and a second chip; a first control selection switch is arranged on a connection link of the first chip and the controller; and a second control selection switch is arranged on a connection link of the second chip and the controller.
Further, the controller is connected with the baseboard management controller.
In a second aspect, the present invention provides a method for implementing automatic switching of a trusted platform module, including:
reading the information of the switching information acquisition unit;
judging the chips needing to be switched according to the information;
switching to the corresponding chip by controlling the selection switch;
and outputting the waveform to the control selection switch, and transmitting the waveform back to the controller to confirm the completion of switching.
Further, after the controller confirms that the handover is completed, the method further includes: the controller controls the server to be started.
Further, the method further comprises: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
Further, the method further comprises:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
The beneficial effect of the invention is that,
the invention provides a device and a method for realizing automatic switching of a trusted platform module, before starting, the server requirement of a user is judged according to information in a switching information acquisition unit, a controller is used for switching a trusted platform module chip, the operation is more convenient and faster, a hardware path is switched to a correct trusted platform module, and two trusted platform modules can be quickly switched on a system without replacing a hardware module; after the switching module is confirmed to be successful, the server is started, and the use safety of the server is improved.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic diagram of the structure of an apparatus according to an embodiment of the present application;
FIG. 2 is a schematic diagram of the structure of an apparatus according to an embodiment of the present application;
fig. 3 is a waveform transceiver diagram of a CPLD according to an embodiment of the present application;
FIG. 4 is a flow diagram of a method of one embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
In the description of the present invention, it is to be understood that the terms "first", "second", and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first," "second," etc. may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless otherwise specified.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art through specific situations.
The following explains key terms appearing in the present invention.
FRU: the field replaceable unit stores FRU data including information of manufacturer, product model, product serial number, asset serial number and the like, and provides asset information management for manufacturers and customers. The FRU is a handover information acquisition unit in this embodiment.
The present invention will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
As shown in fig. 1, the present embodiment provides a device for implementing automatic switching of a trusted platform module, including a server motherboard and a trusted platform module board card, where the server motherboard and the trusted platform module board card are connected by a trusted platform module connector; the server mainboard is provided with a CPLD, the trusted platform module board is provided with a TPM chip and a TCM chip, the CPLD is provided with an I2C bus, and the I2C bus is connected with a field replaceable unit; the CPLD and TPM chip are connected with each other through a first control selection switch, the CPLD and TPM chip are connected with each other through a second control selection switch, and the first control selection switch and the second control selection switch are respectively connected with the CPLD.
The circuit device provided by this embodiment exerts the most advanced power-on characteristic of the CPLD, utilizes the CPLD to read the FRU on the motherboard, determines the server requirement of the user according to the information in the FRU, selects the adaptive security standard according to the requirement, utilizes the CPLD to switch the chip included in the corresponding trusted platform module, the TPM chip correspondingly implements the TPM standard, and the TCM chip correspondingly implements the TCM standard, as shown in fig. 3, when the CPLD completes the path switching, the CPLD outputs a waveform through the custom-defined pin direction, and transmits the waveform back to the CPLD through the switched path for confirmation, if the CPLD does not receive the returned waveform after the switching is completed, the path switching is represented as incomplete, or the trusted platform module may not be installed, at this time, the CPLD judges that the module switching is not completed correctly, and stops powering on the server. This design has compatible TPM/TCM standard's support, reduces system BOM's management, has saved the production cost of opening a line of trusted platform module integrated circuit board to increased the elasticity in the design, different SPI/LPC busbar can be walked respectively to TPM chip and TCM chip, let the design end have had more freedom on the selection material, reach best price/performance ratio. This design also can be preferentially examined credible platform module and whether install correctly, just discover to install incomplete risk after avoiding locking the one-way screw.
Example 2
As shown in fig. 2, this embodiment provides a device for implementing automatic switching of a trusted platform module, and a baseboard management controller is added on the basis of embodiment 1, and the baseboard management controller is connected to a CPLD.
If the CPLD does not receive the return waveform after switching, the path switching is incomplete, or the trusted platform module is not installed, at the moment, the CPLD sends an alarm through the substrate management controller and records a fault, and the starting safety of the server is improved.
FIG. 4 is a schematic flow chart diagram of a method of one embodiment of the present invention. The execution subject in fig. 4 may be a device for implementing automatic switching of the trusted platform module.
As shown in fig. 4, the method 100 includes:
step 110, reading the information of the switching information acquisition unit;
step 120, judging the chips needing to be switched according to the information;
step 130, switching to a corresponding chip by controlling a selection switch;
step 140, output waveform to the control selection switch and return to the controller to confirm the completion of switching.
Optionally, as an embodiment of the present invention, after the controller confirms that the handover is completed, the method further includes: the controller controls the server to be started.
Optionally, as an embodiment of the present invention, the method further includes: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
Optionally, as an embodiment of the present invention, the method further includes:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
In order to facilitate understanding of the present invention, the method for automatically switching the trusted platform module according to the present invention is further described below with reference to the principle of the method for automatically switching the trusted platform module according to the present invention and the process of switching the trusted platform module in the embodiment.
Specifically, the method for implementing automatic switching of the trusted platform module includes:
s1, reading system information of the server by the CPLD through the field replaceable unit;
the system information of the server comprises information such as a manufacturer, a product model, a product serial number, an asset serial number and the like, the CPLD can acquire the system information through the FRU and judge whether the CPLD reads the field replaceable unit successfully, and if not, the server is stopped to be started and an error is reported;
s2, the CPLD judges the safety standard which the trusted platform module conforms to according to the system information;
through the above-mentioned server system information, the security standard that the credible platform module of server accords with is analyzed to CPLD, includes: TPM specification and TCM specification; if the TPM specification is met, the CPLD outputs an instruction ' FM _ TPM _ EN =1 and ' FM _ TCM _ EN =0 ', and the trusted platform module is switched to the TPM chip; if the trusted platform module meets the TCM specification, the CPLD outputs an instruction 'FM _ TPM _ EN =0, FM _ TCM _ EN = 1' to switch the trusted platform module to the TCM chip;
s3, the CPLD outputs waveforms to the first control selection switch and the second control selection switch, and the waveforms are transmitted back to the CPLD through the switched path to confirm that the switching is completed;
when the CPLD finishes switching the trusted platform module, outputting a waveform through a self-defined pin and transmitting the waveform back to the CPLD for confirmation through a switched path, and if the CPLD does not receive the waveform sent by the CPLD after switching again, indicating that the path switching is incomplete or the trusted platform module is possibly not installed, alarming and recording through a substrate management controller; and after the CPLD confirms that the switching is completed, the CPLD controls the server to start.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (6)

1. The utility model provides a realize device of trusted platform module automatic switch-over which characterized in that includes: the switching device comprises a plurality of chips, a controller and a switching information acquisition unit, wherein the chips are respectively connected with the controller; the connection links of the chips and the controller are respectively provided with corresponding control selection switches; the controller is connected with the switching information acquisition unit through a serial bus;
the chips are two different chips of the trusted platform module, and the two chips are respectively a first chip and a second chip; a first control selection switch is arranged on a connection link of the first chip and the controller; a second control selection switch is arranged on a connection link of the second chip and the controller;
the framework also comprises a server mainboard and a trusted platform module board card;
the first chip and the second chip are arranged on the trusted platform module board card;
the first chip adopts a TPM chip; the second chip adopts a TCM chip;
the controller adopts a CPLD; the controller is arranged on the server mainboard;
the server motherboard is connected with the trusted platform module board card through the trusted platform module connector;
when the CPLD completes the path switching, the waveform is output through the self-defined pin positions and is transmitted back to the CPLD for confirmation through the switched path, if the CPLD does not receive the returned waveform after the switching is completed, the path switching is incomplete, or the trusted platform module is possibly not installed, at the moment, the CPLD judges that the module switching is not completed correctly, and the server is stopped to be powered on.
2. The apparatus according to claim 1, wherein the architecture further comprises a baseboard management controller, and the controller is connected to the baseboard management controller.
3. A method for implementing trusted platform module automatic switching based on the apparatus for implementing trusted platform module automatic switching claimed in claim 1 or 2, characterized by comprising:
reading the information of the switching information acquisition unit;
judging the chips needing to be switched according to the information;
switching to the corresponding chip by controlling the selection switch;
and outputting the waveform to the control selection switch, and transmitting the waveform back to the controller to confirm the completion of switching.
4. The method of claim 3, wherein after the controller confirms that the switch is completed, the method further comprises: the controller controls the server to be started.
5. The method of claim 3, wherein the method further comprises: judging whether the controller confirms that the switching is completed: and if the controller does not receive the returned waveform, alarming and recording through the substrate management controller.
6. The method of claim 3, wherein the method further comprises:
and judging whether the information of the switching information acquisition unit is successfully read, and if not, stopping starting the server and reporting an error.
CN202010444932.0A 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module Active CN111694782B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010444932.0A CN111694782B (en) 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010444932.0A CN111694782B (en) 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module

Publications (2)

Publication Number Publication Date
CN111694782A CN111694782A (en) 2020-09-22
CN111694782B true CN111694782B (en) 2022-03-04

Family

ID=72477589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010444932.0A Active CN111694782B (en) 2020-05-23 2020-05-23 Device and method for realizing automatic switching of trusted platform module

Country Status (1)

Country Link
CN (1) CN111694782B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113094316B (en) * 2021-04-01 2022-11-25 浪潮电子信息产业股份有限公司 Online switching device and method of NCSI (non-volatile memory) signals

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201820230U (en) * 2010-01-22 2011-05-04 华北计算技术研究所 Computer and trusted-computing trusted root equipment for same
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN204203971U (en) * 2014-10-13 2015-03-11 长城信息产业股份有限公司 A kind of credible accounting system
CN206649517U (en) * 2017-03-28 2017-11-17 华大半导体有限公司 Server credible platform measures control system and the server including the system
CN207182262U (en) * 2017-09-08 2018-04-03 郑州云海信息技术有限公司 A kind of more CPLD selectively burnings frameworks based on BMC controls
CN108984354A (en) * 2018-06-27 2018-12-11 郑州云海信息技术有限公司 A kind of server chips debug circuit, adjustment method and server
CN109508279A (en) * 2018-11-28 2019-03-22 郑州云海信息技术有限公司 A kind of server monitoring device, method and its system
CN110032399A (en) * 2019-04-15 2019-07-19 苏州浪潮智能科技有限公司 A kind of TPM initial method and relevant apparatus
CN111143256A (en) * 2019-11-29 2020-05-12 苏州浪潮智能科技有限公司 Method and device for reading field replaceable unit information

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5303753B2 (en) * 2012-02-10 2013-10-02 日本電信電話株式会社 Wavelength selective switch system and method for controlling wavelength selective switch
US9413765B2 (en) * 2014-03-25 2016-08-09 Intel Corporation Multinode hubs for trusted computing
CN105302759A (en) * 2015-10-29 2016-02-03 青岛海尔智能家电科技有限公司 Automatic switching circuit device and method of 485 communication chip transmitting and receiving data
CN107925481A (en) * 2015-12-21 2018-04-17 三菱电机株式会社 Light relay device, control method and optical transmission system
CN105912488B (en) * 2016-05-20 2019-02-05 英业达科技有限公司 Computer installation and its control method
CN106708567B (en) * 2016-12-06 2020-07-31 英业达科技有限公司 Firmware updating method and system
CN111090539A (en) * 2019-10-30 2020-05-01 苏州浪潮智能科技有限公司 Dual-flash-memory self-repairing method and device based on CPLD

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201820230U (en) * 2010-01-22 2011-05-04 华北计算技术研究所 Computer and trusted-computing trusted root equipment for same
CN202362788U (en) * 2011-11-21 2012-08-01 国民技术股份有限公司 Dependable computing device with USB (Universal Serial Bus) interfaces
CN204203971U (en) * 2014-10-13 2015-03-11 长城信息产业股份有限公司 A kind of credible accounting system
CN206649517U (en) * 2017-03-28 2017-11-17 华大半导体有限公司 Server credible platform measures control system and the server including the system
CN207182262U (en) * 2017-09-08 2018-04-03 郑州云海信息技术有限公司 A kind of more CPLD selectively burnings frameworks based on BMC controls
CN108984354A (en) * 2018-06-27 2018-12-11 郑州云海信息技术有限公司 A kind of server chips debug circuit, adjustment method and server
CN109508279A (en) * 2018-11-28 2019-03-22 郑州云海信息技术有限公司 A kind of server monitoring device, method and its system
CN110032399A (en) * 2019-04-15 2019-07-19 苏州浪潮智能科技有限公司 A kind of TPM initial method and relevant apparatus
CN111143256A (en) * 2019-11-29 2020-05-12 苏州浪潮智能科技有限公司 Method and device for reading field replaceable unit information

Also Published As

Publication number Publication date
CN111694782A (en) 2020-09-22

Similar Documents

Publication Publication Date Title
US7831860B2 (en) System and method for testing redundancy and hot-swapping capability of a redundant power supply
CN112463689B (en) OCP card hot plug device, method and computer readable storage medium
US20030033464A1 (en) Dedicated server management card with hot swap functionality
CN111694782B (en) Device and method for realizing automatic switching of trusted platform module
CN110658758A (en) Control method and control system
CN101494564A (en) Apparatus for monitoring power supply and method for implementing veneer thermal backup
CN115878356A (en) Disk failure prediction method and device
CN100472467C (en) Method and device for monitoring status of computer power supply fan
CN105676052B (en) A kind of method and system of serial ports line sequence identification
CN107544883B (en) Diagnostic device, system and method of server
CN110245048A (en) A kind of cabinet intelligent management system and management method
CN101739320A (en) Error detection device of server and error detection method thereof
CN210038709U (en) Power monitoring management buckle
CN109032867A (en) A kind of method for diagnosing faults, device and equipment
CN113076210A (en) Server fault diagnosis result notification method, system, terminal and storage medium
CN218824636U (en) Power supply detection device for server hard disk backboard
CN112380066A (en) Server maintenance and debugging device based on domestic platform and server
CN107179818A (en) The control circuit and control method of double mainboards
CN101894091B (en) Method and system for single board I2C expansion and ID check
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting the Initial Hardware Configuration
Cisco Troubleshooting the Initial Hardware Configuration
CN108243358A (en) Pluggable business board

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant