Overview

Welcome to the User's Guide for Intel PRO/1000 Server Adapters installed in Intel® Itanium®-based computers. This guide covers hardware and software installation, setup procedures, and troubleshooting tips for Intel network adapters. 

NOTE: This guide refers only to drivers and features available on Intel® Itanium®-based computers. These drivers are not compatible on IA-32-based platforms, or platforms with Intel® Extended Memory 64 Technology (Intel® EM64T).

To select a topic, click a link in the table of contents column to the left.

Installing the Network Adapter

If you are installing a network adapter, follow this procedure. 
If you are upgrading the driver software, start with step 5.

  1. Make sure that the driver software on the Intel CD or in the downloaded files from the Intel support web site supports the adapter you are installing. For a list of supported adapters, click here.

  2. Go over the basic requirements in system requirements.

  3. Follow the procedure in put the network adapter(s) in the computer.

  4. Carefully attach the network cable(s).

  5. After the network adapter is in the computer, install the network driver.

  6. For Windows systems, install the Intel® PROSet software. For more information, select Intel PROSet in the table of contents.

  7. Test the network adapter. Click here for more information.

  8. Register your adapter online. Go to Intel Product Registration web site.

If you have any problems with basic installation, see Troubleshooting. Once you have installed the network adapter(s), you can set other advanced features. The configuration process varies, depending on your operating system. For more information, see the following topics.

Intel Network Encryption Co-Processor

The Intel PRO/100 Server Family of network adapters includes an Intel® 82594ED IPSec Encryption Co-processor. If Windows* XP is enabled for IPSec encryption, it automatically offloads the intensive encryption and authentication functions to the adapter, increasing throughput and decreasing CPU utilization. Tunnel mode processing is off-loaded to the encryption co-processor.


Last modified on 4/07/04 1:59p Revision 2