How to configure UEFI on the Vault

UEFI Overview

UEFI is an acronym for Unified Extensible Firmware Interface. It is a specification that defines a new model for the interface between operating systems (OS) and platform firmware. It is a replacement for legacy BIOS. More information may be found on the UEFI Forum website at:

Recent updates to some OS software have introduced incompatibility between the default installation of the OS with some of the Vault hardware platforms. Setting the BIOS mode on the Vault to UEFI eliminates some of these issues. The article below will detail how to set the BIOS mode to UEFI.

Changing BIOS mode to UEFI

  • Verify that the Vault is powered down
  • Verify that the monitor is connected
  • Verify that the USB keyboard is connected
  • While powering up the Vault, press “DEL” key
  • Verify that the system boots into the BIOS
BIOS Main Screen
  • Select the “Advanced” tab
BIOS Advanced Tab
  • Select “CSM Configuration”
CSM Screen
  • Select “Boot option filter”
Boot Option Filter Menu
  • Verify the Boot option filter menu is displayed
  • Select “UEFI only”
  • Press Return(Enter)
  • Press “F4” to save and exit the BIOS
  • Power off the Vault

At this point UEFI mode is enabled. See the specific installation guide for the desired OS.

If you experience any issues, please feel free to reach out to:

How to Customize the Boot Splash Screen


The “Splash Screen” is the graphical image or logo that is briefly displayed at boot up of the system. The splash screen for the Vault can be customized to enhance the brand awareness of the product and/or solution. Protectli provides a Windows tool that can be used to change the BIOS and customize the splash screen.

Splash Screen File

The splash screen file is a “bitmap” file with an extension of “.bmp” in Windows. The bitmap file used for the splash screen must have maximum dimensions of 800 x 600 and be less than 1.4 MB. If there is already a logo file in “.jpg” or “.png” format, that file can be converted to a bitmap file using the Windows Paint program or other tools.

Verify the Desired Splash Screen File

  • On Windows, right click the desired file
  • Select Properties
  • Verify “Type of File” is BMP file
  • Select the Details tab
  • Verify the Dimensions are 800 x 600 or less
  • Verify the Size is 1.4 MB or less

Convert the Desired Splash Screen File

If the desired file is in JPG or PNG format, it can be converted to Bitmap using the Windows Paint program. This procedure is only necessary if the desired file is not already in Bitmap format.

  • On Windows, right click the desired file
  • Select Edit
  • Verify the Paint program starts and the graphical image is displayed
  • Select File->Save As->Save as type:
  • Verify the dropdown menu that contains these bitmap options is displayed
    • Monochrome Bitmap
    • 16 Color Bitmap
    • 24 Color Bitmap
    • 24-bit Bitmap
  • Select the desired bitmap format
  • Note that the formats listed in the dropdown are in increasing order of quality and increasing order of size
  • Select Save
  • Right click on the newly created bitmap and verify that it is less than 1.4 MB
  • If greater than 1.4 MB, repeat this procedure with a lesser quality bitmap format

Download the BIOS

The BIOS folder for each specific model of the Vault is available at this link. Be very sure when downloading and installing the BIOS that it is the correct BIOS for the specific Vault. Installing incorrect BIOS may result in an inoperable system.

  • Download the BIOS zip file for the model of the Vault from the link above
  • Verify the BIOS zip file is downloaded
  • Unzip the file and verify the BIOS folder is downloaded

Download the BIOS Logo Tool

There are two BIOS logo tools. One is for the FW1, FW2, and FW4 models of the Vault. The other is for the FW6 models of the Vault. The FW1, FW2, and FW4 tool is at this link. The FW6 tool is at this link.

  • Download the BIOS logo tool zip file for the model of the Vault from the link above
  • Verify the proper BIOS logo tool zip file is downloaded
  • Unzip the BIOS logo tool

Use the BIOS Logo Tool to Change the Splash Screen

  • Double click on the BIOS Logo executable file
  • Verify the “Change Logo” application appears on the screen

Change Logo Application

  • Select the “Load Image” button

Load Image Button

  • Verify navigator window is displayed

Navigator Window

  • Verify/Select “Files of type:” All Files
  • Navigate to the BIOS folder
  • Select the .bin file
  • Select “Open”

.bin File

  • Verify the .bin file is displayed in the proper folder in the “Aptio Image” Box

Aptio Image Box

  • Select Browse Button

Browse to find Bitmap File

  • Verify the navigator window is displayed
  • Select files of type “BMP Files (*bmp)
  • Navigate to the desired bitmap file
  • Select the .bmp file
  • Select Open
  • Verify the desired bitmap file is displayed in the “Select BMP file” box

Select BMP File

  • Select the Replace Logo button

Replace Logo

  • Verify the “Save Image As” button is now not grayed out

Save Image As Button

  • Select the “Save Image As” button
  • Verify the navigator window is displayed
  • Navigate to the BIOS folder, this is where the new BIOS file will be placed
  • Manually enter the name of the original .bin file, note that it must be exactly the same name

BIN File

  • Select Save button
  • Verify the Success message is displayed in the lower left of the tool

Success Message

Create Bootable USB Drive and Install New BIOS

Now that the new bitmap file has been created, the BIOS folder must be transferred to a USB drive and then used to update the BIOS on the Vault. Follow the instructions at this link to create a bootable USB drive, transfer the new BIOS folder to the USB drive, and install the new BIOS on the Vault.

  • Verify the splash screen has the new logo or image during initial boot
  • Verify the system boots

At this point, the new splash screen should be installed on The Vault.  However, if you experience any issues, please feel free to reach out to us at:




Verify Intel Spectre and Meltdown Vulnerabilities


There are known security vulnerabilities with Intel processors that are named “Spectre” and “Meltdown”. These vulnerabilities are documented at this link. There is a Windows based tool that can analyze the the system to determine if it is vulnerable to Spectre or Meltdown. This document describes how to use that tool to assess the vulnerability of the Vault. Information regarding specific BIOS updates to the different Vault platforms can be found from links on the product pages.

On a Windows computer,

  • Browse to InSpectre homepage at
  • Scroll down to Download Button and download InSpectre application from this link.
  • Verify that the file/application “InSpectre.exe” is downloaded to the Windows computer
  • Run InSpectre (double-click) and verify the application pops up

InSpectre & Meltdown Vulnerability Status  – Not Protected

  • Verify that both Meltdown and Spectre vulnerabilites are protected.

If not, update the Vault to the appropriate BIOS that addresses the vulnerabilities. See the latest BIOS at this link.

  • Update BIOS on the Vault
  • Rerun the InSpectre application
  • Verify vulnerabilities are protected

InSpectre & Meltdown Vulnerability Status  – Protected

At this point the Vault should be protected from the Spectre and Meltdown vulnerabilities. However, if there are any issues, feel free to reach out to us at: 

BIOS Versions for the Vault

Note: Intel has recently announced a security vulnerability that is described at: 

The FW1, FW2, FW4A and FW6 Vaults may be affected by this vulnerability. The FW2B and FW4B are not affected. Protectli understands the urgency of this issue and we are working with our partners to generate BIOS updates to address the issue. We will post the updated BIOS and/or timelines for updated BIOS on this page shortly.


BIOS is the abbreviation for Basic Input Output System. It is a small program that is stored on non-volatile memory that is used to initialize the system hardware during the boot process. BIOS is installed on every system when it ships, but occasionally there are upgrades to the BIOS to address various issues. This page has a table with all of the current versions of BIOS for the Vault. BIOS can be downloaded from this table by clicking on the “Download Link” entry and used to upgrade the BIOS on the Vault.

The currently installed BIOS version can be found on the main BIOS page, as seen in the example screenshot below (circled in red):

BIOS Main Tab

See this link for instructions on how to install BIOS on the Vault.

ModelDownload LinkBIOS IDNotesRelease Date
FW11-190708BTL4A012New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019
FW22-190708BTL4A012New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019
FW2B2B190619BSW4L007New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019
FW4A4A190619E38L4A12New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019
FW4B4B190619BSW4L007New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019
FW6A6-190708KBU6LA09New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019
FW6B6-190708KBU6LA09New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019
FW6C6-190708KBU6LA09New Logo, Enable UEFI and Legacy, Boot Order UEFI before LegacyAugust 1, 2019


Some older versions of FW1 and FW2 Vaults do not automatically update the new Boot Order with version BTL4A012. If this occurs, follow the steps below to set the Boot Order:

  • Power off the unit
  • Reboot the unit and hit the DEL key to enter BIOS
  • Select the Boot Tab
  • Select “F3” to Load Optimized Defaults
  • Verify the proper Boot order of 1) UEFI mSATA 2) UEFI USB 3) Legacy mSATA 4) Legacy USB
  • Select “F4” to Save and Exit
  • Verify the system boots correctly

Older Versions

ModelDownload LinkBIOS IDNotesRelease Date
FW11-181025BTL4A010Intel Spectre and Meltdown fixesOctober 25, 2018
FW22-180706BTL4A008Intel Spectre and Meltdown fixesJuly 6, 2018
FW2B2B180727BSW4L003 V1.02First Customer ShipmentJuly 27, 2018
FW4A4A180804E38L4A05 V1.03Intel Spectre and Meltdown fixes, COM port fixAugust 4, 2018
FW4B4B180727BSW4L003 V1.02First Customer ShipmentJuly 27, 2018
FW6A6-180614KBU6LA06Intel ME, Spectre and Meltdown fixesJune 14, 2018
FW6B6-180614KBU6LA06Intel ME, Spectre and Meltdown fixesJune 14, 2018
FW6C6-180614KBU6LA06Intel ME, Spectre and Meltdown fixesJune 14, 2018

As always, if there are any questions, feel free to reach out to us at: 

How to Install the WiFi Kit into the Vault


Protectli offers an optional WiFi kit that can be used with the Vault. This article will explain how to install the kit into the Vault and how to configure it with one of the supported applications. The SKU for the WiFi Kit is WAP01K.

NOTE: This wireless card is non-standard, in that while it is the PCIe form factor, the electrical connection is via USB.  This is the only type of card that is compatible with the Vault’s hardware.  This is due to a limited number of PCIe lanes available on the Vault’s CPU. The exception is the FW2B. It has more PCIe lanes available and can accomodate standard PCIe WiFi cards.


The WiFi Kit contains the following pieces:

  • 1 WiFi Card
  • 1 Extension Plate
  • 2 Screws to connect the Card to the Plate
  • 2 Micro Coax Cables with Nuts and Washers
  • 2 Antennas

See the photo below for the contents

WiFi Kit Contents

WiFi Card Slot

The WiFi Card installs into a PCIe form factor slot in the Vault and is screwed into the existing standoff. The 2 and 4 port Vaults require an extension plate to be connected to the card. The memory for the FW2B and FW4B is below WiFi socket, therefore, memory must be installed before the WiFi card is installed. The 6 port Vault does not require an extension plate, but it is positioned in the chassis underneath the mSATA slot. Therefore, it will need to be inserted before the mSATA. See the photos below for the WiFi card slots.

WiFi Slot, FW1, FW2

WiFi Slot, FW2B, FW4B

WiFi Slot, FW6

Extension Plate Assembly

As mentioned above, the 2 and 4 port Vaults require an extension plate to be connected to the WiFi card for proper installation. The extension plate is attached to the WiFi card using the 2 small screws in the kit. The screws should be assembled from the top side of the WiFi card and screwed into the threaded holes in the extension plate. See the photo below. The WiFi card can now be inserted into the slot and secured by the screw that comes in the standoff.

WiFi Card and Extension Plate

Install the Antennas

The Antenna Connectors are on the other end of the micro coax cable. The Vault has plastic plugs than can be removed to accommodate the antenna connectors. The plugs can be pushed out using a small screw driver. The location of the plugs on the 2 port and 4 port Vaults is on the side of the chassis. Note that the  holes are not completely circular. The top of the hole is flat and the top of the connector is flat so that the connector does not rotate. When inserting the connector into the hole, verify that the flat sides line up.

  • Remove the screw and lock washer from the connector
  • Insert the connector through the hole with the flat side at the top
  • Attach the lock washer and screw to the connector from the outside of the chassis
  • The Micro Coax cables attach to the WiFi card. The circular micro coax connectors can be seen in the previous photo at the top of the card near the screws. The photo below shows the coax cables connected to the WiFi card.
  • Verify there are no sharp bends in the  cable

See the photos below.

Micro Coax Cable Connectors Through Holes in Chassis

Micro Coax Cable Connectors Screwed In

 Connect the Antennas

The antennas screw into the connectors that protrude outside the chassis. The photo below shows both antennas in a vertical position, but depending on the network one could be put in the horizontal position for better reception.

Antennas Installed to Chassis

FW4B with WiFi Kit Installed

6 Port Vault Installation

The 6 port Vault installation is slightly different than the 2 and 4 port versions. The 6 port Vault does not require the extension plate. The antenna connector plugs are on the front and clearly marked with the WiFi symbol. The flat side of the antenna connector hole is on the bottom and the WiFi slot is underneath the mSATA slot. The WiFi card must be installed and the micro coax connected to the WiFi card before the mSATA card is installed. Be sure not to pinch the micro coax cable when installing the mSATA card. The photo below shows the 6 port installation before the mSATA is installed above the WiFi card.

6 port Vault WiFi Installation

 Configure the WiFi Interface as an Access Point with pfSense® CE

Now that physical hardware has been installed, the WiFi interface must be enabled and configured to operate in the application. Different applications and operating systems will require different configuration procedures. The example below uses pfSense® CE version 2.4.2 to configure the WiFi interface as an Access Point for 802.11G.  There is another Knowledge Base article that describes how to install pfSense® CE on the Vault at this link. The information below is specifically to enable the WiFi card and assumes that the user  has already successfully installed pfSense® CE on the Vault.

  • Browse to an Ethernet port on the Vault in order to access the pfSense® CE Dashboard
  • Verify the login page is displayed
  • Login and verify that the dashboard page is displayed
  • Select Interfaces->Interface Assignments
  • Select Wireless
  • Add the WiFi interface
  • Verify it is “run0(1.0)”
  • Set Mode to “Access Point”
  • Add Description (optional, recommended)
  • Save
  • Return to Interfaces->Interface Assignments
  • Add the WiFi Interface “run0_wlan0”
  • Edit the WiFi interface by hovering over the name in the left column then clicking
  • General Configuration
    • Enable interface
    • IPv4 Configuration Type – Static IPv4
  • Static IPv4 Configuration
    • IPv4 Address – Enter the desired IP address for the WiFi network, set the subnet mask
  • Common Wireless Configuration
    • Standard – 802.11g
    • Channel 1
  • Network-Specific Wireless Configuration
    • Mode – Access Point
    • SSID – Set SSID (case sensitive, this is the ID that other clients will use to connect)
  • WPA
    • Enable WPA
    • WPA Pre-Shared Key – Set key (case sensitive, this is the password that other clients will use to connect)
  • Save
  • Apply Changes
  • Verify the changes have been applied successfully.

As with any other interface, when using pfSense® CE, Services and Firewall rules must be configured in order to connect and pass traffic on the interface. For this example, DHCP server will be configured for the WiFi interface and all traffic will be allowed to pass.

  • Go to Services->DHCP Server and select the WiFi interface
  • Enable DHCP server, set the DHCP range and Save
  • Verify the changes have been applied successfully.
  • Go to Firewall->Rules and select the WiFi interface
  • Add a Rule to allow traffic to pass
  • Save and Apply
  • Verify the changes have been applied successfully.
  • Verify that another device can connect to the WiFi network that was just created using the SSID and password for the WiFi network.

More details regarding WiFi configuration for pfSense® CE can be found at this link.

Screen shots for the configuration are shown below.

Add Wireless Interface


Set Access Point Mode and Add Description

Enable Wireless Interface and Configure Static IP Address

Configure Wireless Settings

Configure WPA Settings

 Configure the WiFi Interface in Infrastructure Mode with FreeBSD

The previous example with the WiFi interface configured it to be an Access Point. An Access Point acts as a communication hub for multiple clients. This example shows how to configure the WiFi interface as a client when the Vault has FreeBSD installed. When configured as a WiFi client, it is referred to as “Infrastructure Mode” or “Base Service Set, (BSS)” There is another article in the Knowledge Base that describes how to install FreeBSD on the Vault at this link. Refer to that article for the basic installation and refer to the instructions below.

During OS installation, in the “Final Configuration” page:

  • Select “Network”
  • Select “run0” interface
  • Select regdomain/country or leave the default to “FCC/US”
  • Verify the system scans the wireless networks
  • Select the desired network SSID
  • Enter the proper password if required for the selected network
  • Select Configure IPv4
  • Select Configure DHCP
  • Select the DNS resolver
  • Exit, complete the installation, and reboot
  • Verify the FreeBSD boots correctly, wlan interface is present, and can connect to the Wireless network


The performance of the WiFi on the Vault is is limited to about 10-15 Mbps with pfSense® CE and FreeBSD. Therefore, the WiFi interface should not be used for heavy duty tasks. Its main use is for basic connectivity when fixed Ethernet ports are not available or practical.

Intel Management Engine Vulnerability Update

Updated: February 5th, 2018

This is an update to a previously posted Knowledge Base article.

Protectli is aware of the recently published Intel® ME/TXE/SPS Elevation of Privileges vulnerabilities and we have been working diligently to address / mitigate these vulnerabilities on affected platforms.  The impacted platforms do include chipsets that Protectli uses in our Vault products. The only Protectli products which are vulnerable are the FW6 Series. We now have a BIOS update that fixes the issue on the FW6 Series. Further details are below.

We have tested each of our products using Intel’s vulnerability assessment tool Intel-SA-00086 Detection Tool and have found that some of our products are not vulnerable, but others are:

Products tested which are NOT vulnerable:

FW1 Series (Intel® J1900 CPU)

FW2 Series (Intel® J1800 CPU)

FW4 Series (Intel®E3845 CPU)

Bay Trail CPU’s (each of those noted above) do NOT have Intel® ME, SPS, or TXE and additionally tested “Not Vulnerable” with Intel’s Detection Tool (here).

Products tested which are potentially vulnerable:

FW6A Series (Intel 3865U CPU)

FW6B Series (Intel 7100U CPU)

FW6C Series (Intel 7200U CPU)

We have tested these models with Intel’s vulnerability assessment tool (Intel-SA-00086 Detection Tool) and they do report potential vulnerabilities.  We have an updated BIOS which addresses the vulnerabilities and now reports “not vulnerable”. See this link for instructions on how to update the FW6 Series BIOS to address these issues.

It is important to note that even without the updated BIOS, as per Intel’s guidance, only one of the identified vulnerabilities (CVE-2017-5712) is exploitable remotely over the network in conjunction with a valid administrative Intel® Management Engine credential. The vulnerability is not exploitable if a valid administrative credential is unavailable.

As a result, exposure in Protectli’s products is low-risk, provided that the user keeps their device under their physical control. However, Protectli recommends a BIOS update despite the low-risk nature of the vulnerability.

For further information, or if there are any questions, please feel free to reach out to Protectli Support.

BIOS Update for FW4A series

A BIOS update has been generated that addresses the problem with the FW4A series and Samsung SSD 850 EVO that is described on this link. It is only an issue with FW4A and Samsung SSD. No other systems need this BIOS update. The instructions to update the BIOS are below. Note that care must be taken so that the system is not powered off during the BIOS update as this could render the system unusable.


  • Create a bootable FreeDOS USB
  • Copy the three files from the BIOS Update link below to the USB drive

BIOS Update

  • Insert the USB and boot the system to BIOS by repeatedly hitting F11 during the boot process
  • Select boot from the USB
  • Verify the system boots to a DOS prompt
  • At the prompt, type bios_upd.bat
  • Verify that script runs, the process is complete and it returns to the DOS prompt
  • Power off the system and remove the BIOS USB
  • Reboot the system to BIOS
  • Verify that the FW4A recognizes the Samsung SSD
  • The system can now install software to the SSD
  • The output from the update process is shown in the photo below


BIOS update screen capture


Vault compatibility with Samsung SSD 850 EVO mSATA

Please note that a BIOS update to address this issue is available at this link.

The Vault is compatible with Samsung SSD 850 EVO mSATA except for the FW4 series. With the FW4 series default BIOS settings, it has been discovered that the system will not boot with the Samsung SSD 850 EVO mSATA. The default BIOS settings must be changed for the system to “see” the Samsung SSD 850 EVO mSATA. The symptoms are that the system will not boot and will not be able to go to BIOS. Protectli is currently working with suppliers to address this issue. The instructions to change the BIOS settings are as follows:

  • Power Off the Vault
  • Verify that memory is installed in the Vault
  • Verify that no mSATA is installed
  • Power On the Vault
  • Verify that the system goes to BIOS
  • Select Setup
  • Select Advanced
  • Select IDE Configuration
  • Select SATA Mode
  • Select IDE Mode
  • Save Changes and Exit (F4)
  • Verify that the system resets and goes to BIOS
  • Power Off the Vault
  • Install mSATA
  • Power On the Vault
  • Verify that it can go to BIOS (hit F11 repeatedly while booting) and it recognizes the Samsung SSD 850 EVO mSATA

At this point software can be installed on the Vault per normal procedures. There are no known performance issues between IDE mode and AHCI mode on the Vault.

See screenshots below for setting IDE Mode in BIOS.

Main Page

Advanced Page


Select IDE Mode

IDE Mode Enabled

Save and Exit (F4)

FW1 FW2 FW4A Series Hardware Overview

As with all Protectli Vault hardware, the FW1, FW2 and FW4A series need only RAM (memory) and mSATA (storage) added in order to have a fully functional hardware system. In addition, an optional WiFi module can be installed as well. For more information on HW compatibility, see this link.

The FW1, FW2, and FW4A series hardware are different in a few subtle ways, but the general board layout, supported hardware, and placement of components is largely the same. The FW1 and FW4A vary only in the type of CPU they have, while the FW2 is different from the other in the number of network ports, as well as CPU. For a full comparison between different models, please see this page.

The annotated photo below shows the location of the various sockets.  The FW4A is pictured.


The FW4A Series uses an Intel Atom E3845U processor (located on the underside of the motherboard). This CPU has built in suport for Intel’s AES-NI hardware encryption.

The FW1 series uses an Intel J1900 processor and the FW2 series uses an Intel J1800 processor.


There is a single SODIMM socket for memory.  Additional information on compatible memory modules can be found in the Hardware Compatibility page.  The maximum supported memory size is 8GB of DDR3L (1.35V). Note that standard DDR3 is incompatible. If using DDR3, the failure symptom is that there will be no video. Only DDR3L is compatible with the FW1, FW2, and FW4A series.


The FW1, FW2, and FW4A series come with a single mSATA socket.  This socket is capable of holding any logical size mSATA.


The WiFi module socket is a PCIe form factor socket.

Note that the wifi module, while PCIe in form factor, operates over USB channel communication, limiting functionality as compared to pure PCIe modules.  Protectli sells a compatible wifi module that is available here.  Instructions for installation of the wifi module can be found here.



Port Connectivity

The ‘Front’ of the 4 port Vault is pictured above.  Connectivity and port counts are the same for the FW1 and the FW4A.  The FW2 is different, as it only has 2 ports (WAN and LAN).

Power should be supplied by the included power supply, which is rated for 12V at 3.3A.

The Power LED, which lights up green when power is applied, indicates that the Vault has power applied.  It does not indicate the status for the operating system

The Drive Activity LED will blink, according to mSATA drive activity.  Usually, the user will see the most activity as the unit is booting, or if the unit is under heavy load.  For most operating systems, this indicator will not be on and only blink occasionally under most conditions.

The Network ports are each independenly connected to the CPU via a PCIe connection.  A table that shows port numbering can be found below.

Vault ModelPort 6Port 5Port 4Port 3Port 2Port 1
FreeBSD (pfSense) Labeling (in software)em5em4em3em2em1em0
Windows 10 (in software)Ethernet 5Ethernet 4Ethernet 3Ethernet 2EthernetEthernet 1


How to Reset the Vault’s CMOS/BIOS

The Vault’s CMOS is a small amount of battery backed memory that retains system information and settings that are used by the BIOS. The CMOS can occasionally get into a state where it needs to be reset in order to address odd behavior.  This can occur due to an improper shutdown (see this FAQ) or other reasons. Symptoms of odd behavior on the Vault include:

  • Video output that is black, despite power being applied to the unit
  • Odd Performance issues
  • BIOS lockouts (setting and forgetting the BIOS Administrator or User Password)
  • Boot directly to BIOS without the Vault being able to recognize any connected drives
  • Other odd behavior

Resetting the CMOS restores the BIOS to the default settings and can sometimes resolve these types of issues.

To reset the CMOS/BIOS on the FW1, FW2, or FW4 series:

  • Verify the Vault power supply is disconnected
  • Open the Vault cover
  • Using a screwdriver or other metal tool, short the two pins shown in the photo below for about 10 seconds.

FW1, FW2, FW4A CMOS Reset Pins

To reset the CMOS/BIOS on the FW2B or FW4B series:

  • Verify the Vault power supply is disconnected
  • Open the Vault cover
  • Using a screwdriver or other metal tool, short the two pins shown in the photo below for about 10 seconds.

FW2B, FW4B CMOS Reset Pins

To reset the CMOS/BIOS on the FW6 series:

  • Verify the Vault power supply is disconnected
  • Open the Vault cover
  • Using a screwdriver or other metal tool, short the two pins shown in the photo below for about 10 seconds.

FW6 CMOS Reset Pins

After resetting, boot the Vault and verify that the system comes up correctly.

If the Vault does not boot and operate correctly, more advanced troubleshooting options may need to be used.

If there are any questions, feel free to reach out to us at: