Keysight N5192A UXG X-Series Security Features And Document Of Volatility
Keysight N5192A UXG X-Series Security Features And Document Of Volatility

Keysight N5192A UXG X-Series Security Features And Document Of Volatility

Agile vector adapter

Advertisement

Quick Links

Keysight
N5192A/94A UXG X-Series
Agile Vector Adapter
Security Features
and Document of
Volatility

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the N5192A UXG X-Series and is the answer not in the manual?

Questions and answers

Summary of Contents for Keysight N5192A UXG X-Series

  • Page 1 Keysight N5192A/94A UXG X-Series Agile Vector Adapter Security Features and Document of Volatility...
  • Page 2: Copyright Notice

    1400 Fountaingrove Parkway pursuant to the FAR and the DFARS Santa Rosa, CA 95403 and are set forth specifically in writing elsewhere in the EULA. Keysight shall Technology Licenses be under no obligation to update, A CAUTION notice denotes a hazard. It...
  • Page 3 Where to Find the Latest Information Documentation is updated periodically. For the latest information about these products, contact your local Keysight office, as detailed in “Contacting Keysight Sales and Service Offices” on page To receive the latest updates by email, subscribe to Keysight Email Updates: http://www.keysight.com/find/emailupdates...
  • Page 4: Table Of Contents

    Security Features and Document of Volatility Contents Table of Contents 1 Contacting Keysight Sales and Service Offices 2 Products Covered by this Document Document Purpose 3 Security Terms and Definitions 4 Instrument Memory & Volatility 5 Memory Clearing, Sanitization and Removal Procedures...
  • Page 5: Contacting Keysight Sales And Service Offices

    Keysight representative. N O T E In any correspondence or telephone conversation, refer to the instrument by its model number and full serial number. With this information, the Keysight representative can determine whether your unit is still within its warranty period.
  • Page 6: Products Covered By This Document

    Be sure that all information stored by the user in the instrument that needs to be saved is properly backed up before attempting to clear any of the instrument memory. Keysight Technologies cannot be held responsible for any lost files or data resulting from the clearing of memory.
  • Page 7: Security Terms And Definitions

    “Clearing and Sanitization Matrix” in Section 5.2.5.5.5 of the ISFO Process Manual for the Certification and Accreditation of Classified Systems under the NISPOM. Secure Erase Secure Erase is a term that is used to refer to either the clearing or sanitization features of Keysight instruments.
  • Page 8: Instrument Memory & Volatility

    Security Features and Document of Volatility Instrument Memory & Volatility Instrument Memory & Volatility This chapter contains information on the memory components in your instrument. The table provides details of the size of each memory component, its type, how it is used, its location, volatility, and the sanitization procedure. Table 4-1 Base Instrument Memory...
  • Page 9 Instrument Memory & Volatility Table 4-1 Base Instrument Memory Purpose/Contents Data Input Location in Sanitization Component, Type Method Instrument Procedure and Size and Remarks 3. Front Panel Front panel keyboard Operating Front Panel None required Memory controller firmware system board (no user data) (Flash) 24 KByte...
  • Page 10 Instrument Memory & Volatility Table 4-1 Base Instrument Memory Purpose/Contents Data Input Location in Sanitization Component, Type Method Instrument Procedure and Size and Remarks 10. SSD User file system, which User-saved data Instrument Remove SSD includes user flatness Rear Panel Assembly from (Flash) calibration*, instrument...
  • Page 11: Memory Clearing, Sanitization And Removal Procedures

    Security Features and Document of Volatility Memory Clearing, Sanitization and Removal Procedures Memory Clearing, Sanitization and Removal Procedures This chapter describes several security functions you can use to remove sensitive data stored in the instrument before moving it from a secure development environment.
  • Page 12: Clear Persistent State Information

    Memory Clearing, Sanitization and Removal Procedures Clear Persistent State Information Clear Persistent State Information The persistent state settings contain instrument setup information that can be specified within predefined limits, such as display intensity, contrast and the GPIB address. The following key sequence or SCPI command can be used to set most operating states that are not affected by an instrument power-on, preset, or *RST command to their factory default.
  • Page 13: Multi-Box Sync Setup

    Memory Clearing, Sanitization and Removal Procedures Multi-box Sync Setup Multi-box Sync Setup N O T E With the exception of Erase SSD, no other feature defaults these values including the actions of Persistent System Settings (:SYSTem:PRESet:PERSistent) and All Settings (:SYSTem:PRESet:ALL). This key sequence or command sets the Multi-box Sync settings to their factory default settings.
  • Page 14: Lan Setup

    Memory Clearing, Sanitization and Removal Procedures LAN Setup LAN Setup You can reset the LAN setup either via the front panel or by sending a SCPI command. Key Sequence: System > I/O Config > LAN Setup > Advanced Settings > Restore LAN Settings to Default Values >Confirm Restore LAN Settings to Default Values SCPI Command:...
  • Page 15 Memory Clearing, Sanitization and Removal Procedures Removal or Replacement of Solid-State Disk Drive (SSD) Figure 5-1 Flowchart for Instrument Sanitization Process by SSD Removal Security Features & Document of Volatility...
  • Page 16: Ssd Removal & Installation Procedures

    Security Features and Document of Volatility SSD Removal & Installation Procedures SSD Removal & Installation Procedures This chapter describes the procedures for physical removal and installation of the instrument’s Solid-State Disk Drive assembly (SSD). Removal of the SSD is an alternate method for instrument sanitization, in addition to the function “Erase SSD”...
  • Page 17: Removing The Ssd

    SSD Removal & Installation Procedures Removing the SSD Removing the SSD 1. Ensure that the instrument power is turned off. 2. Locate the SSD Assembly on the instrument’s rear panel, as shown in Figure 6-1. Figure 6-1 Instrument Rear Panel & SSD Assembly Location 3.
  • Page 18: Installing The Ssd

    SSD Removal & Installation Procedures Installing the SSD Installing the SSD 1. Ensure that the instrument power is turned off. 2. Locate the SSD Assembly placement location on the instrument’s rear panel, as shown in Figure 6-3. Figure 6-3 Instrument Rear Panel & SSD Assembly Location 3.
  • Page 19: Secure Display & Restricted Display

    Security Features and Document of Volatility Secure Display & Restricted Display Secure Display & Restricted Display — “Secure Display” on page 19 — “Restricted Display” on page 20 Secure Display This function prevents unauthorized personnel from reading the instrument display or tampering with the current configuration via the front panel. —...
  • Page 20: Restricted Display

    Secure Display & Restricted Display Restricted Display Restricted Display This command enables or disables the secure restricted display mode. — On This selection turns on the secure restricted display, blanking the frequency. The keys that access Frequency, and User Amplitude, Phase and Time Corrections, are disabled.
  • Page 21: Procedure For Declassifying A Faulty Instrument

    Security Features and Document of Volatility Procedure for Declassifying a Faulty Instrument Procedure for Declassifying a Faulty Instrument If the instrument is not functional: — If the Solid State Drive (SSD) is installed, remove the SSD, see Chapter 6, “SSD Removal & Installation Procedures”, or the Service Guide.
  • Page 22: Appendix A References

    AT Attachment 8 - ATA/ATAPI Command Set (ATA8-ACS) INCITS Technical Committee T13/1699-D Revision 6a, September 6th, 2008 This standard may be downloaded in Acrobat (PDF) format from the INCITS T13 web site: http://www.t13.org/documents/UploadedDocuments/docs2008/D1699r6a-ATA8- ACS.pdf Getting Started Guide Keysight Technologies Inc. Part Number: N5191-90016 http://literature.cdn.keysight.com/litweb/pdf/N5191-90016.pdf...
  • Page 23 References Service Guide Keysight Technologies Inc. Part Number: N5191-90019 To obtain a copy of this document, contact your local Keysight office, as detailed in “Contacting Keysight Sales and Service Offices” on page Security Features & Document of Volatility...
  • Page 24 This information is subject to change without notice. © Keysight Technologies 2017-2020 Edition 1, January 2020 N5191-90018 www.keysight.com...

This manual is also suitable for:

N5194a uxg x-series

Table of Contents