Home
86100 Series Infiniium DCA Oscilloscope
Contents
1. TECHNOLOGIES 7 Instrument Memory This section contains information on the types of memory available in your instrument It explains the size of memory how It is used its location volatility and the sanitization procedure Table 1 Summary of instrument memory Memory Type g Purpose Contents Data Input Location in Sanitization and Size T Method Instrument and Procedure 2 Remarks Ga 5 2 E 2 9 ae ES 2 o Ak HDD SSD Yes Yes Windows OS OS User Drive Bay Remove 40 GByte or Mainframe Firmware Drive Calibration and License 80 GByte files User files including instrument states waveforms and screen shots Main Memory Yes No PC Memory OS User CPU board Remove DRAM Main Power 4 GByte or 8 GByte EEPROM No Yes FPGA Code NA Acquisition Board NA Contains no user data EEPROM No Yes FPGA Code NA Distribution Board NA 86100D only Contains no user data SRAM Yes No Data Acquisition Control FW Operations Acquisition Board Remove Storage and Cal Tables Main Power SRAM Yes No Data Buffers FW Operations Distribution Board Remove 86100D only Main Power KEYSIGHT TECHNOLOGIES g summary of Memory Declassification Procedures This section explains how to clear sanitize and remove memory from your instrument for all classes of memory that are writeable during normal operation IMPORTANT Before beginning clearing or sanitization be sure to write down and save the instrument s Option and Lice
2. by its model number and full serial number With this information the Keysight representative can determine whether your unit is still within its warranty period KEYSIGHT TECHNOLOGIES 5 Products Covered by this Document Product Family Name Product Names Model Numbers Oscilloscopes Infiniium DCA Oscilloscope 86100C 86100D Mainframe This document describes instrument security features and the steps to declassify an instrument through memory clearing sanitization or removal For additional information go to http www keysight com find security eam Be sure that all information stored by the user in the instrument that needs to be saved is 7 i properly backed up before attempting to clear any of the instrument memory Keysight Technologies cannot be held responsible for any lost files or data resulting from the clearing of memory Be sure to read this document entirely before proceeding with any file deletion or memory clearing This document contains sample information to indicate the content and style of typical sections in a particular Security Docu ment The details may or may not apply to specific instruments so check and edit all information as appropriate KEYSIGHT TECHNOLOGIES 6 security Terms and Definitions Term Clearing Instrument Declassification Sanitization Secure Erase Definition As defined in Section 8 301a of Error Reference source not found clearing is the process of
3. radicating the data on media before reusing the media so that the data can no longer be retrieved using the standard interfaces on the instrument Clearing is typically used when the instrument is to remain in an environment with an acceptable level of protection A term that refers to procedures that must be undertaken before an instrument can be removed from a secure environment such as is the case when the instrument Is returned for calibration Declassification procedures include memory sanitization or memory removal or both Keysight declassification procedures are designed to meet the requirements specified in Error Reference ource not found Chapter 8 As defined in Section 8 301b of Error Reference source not found sanitization is the process of emoving or eradicating stored data so that the data cannot be recovered using any known technology Instrument sanitization is typically required when an instrument is moved from a secure to a non secure environment such as when it is returned to the factory for calibration Keysight memory sanitization procedures are designed for customers who need to meet the requirements specified by the US Defense Security Service DSS These requirements are specified in the Clearing and Sanitization Matrix in Section 5 2 5 5 5 of the Error Reference source not ound Secure Erase is a term that is used to refer to either the clearing or sanitization features of Keysight instruments KEYSIGHT
4. 86100 Series Infinitum DCA Oscilloscope This manual provides the documentation for the following instruments 86100D 86100C User s Manual KEYSIGHT TECHNOLOGIES Notices Keysight Technologies Inc 20xx 2014 No part of this manual may be reproduced in any form or by any means including electronic storage and retrieval or translation into a foreign language without prior agreement and written consent from Keysight Technologies Inc as governed by United States and international copyright laws Trademark Acknowledgements N A Manual Part Number Print Date October 2014 Supersedes None Published in USA Keysight Technologies Inc 1400 Fountaingrove Parkway Santa Rosa CA 95403 Warranty THE MATERIAL CONTAINED IN THIS DOCUMENT IS PROVIDED AS IS AND IS SUBJECT TO BEING CHANGED WITHOUT NOTICE IN FUTURE EDITIONS FURTHER TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW KEYSIGHT DISCLAIMS ALL WARRANTIES EITHER EXPRESS OR IMPLIED WITH REGARD TO THIS MANUAL AND ANY INFORMATION CONTAINED HEREIN INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE KEYSIGHT SHALL NOT BE LIABLE FOR ERRORS OR FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING USE OR PERFORMANCE OF THIS DOCUMENT OR ANY INFORMATION CONTAINED HEREIN SHOULD KEYSIGHT AND THE USER HAVE A SEPARATE WRITTEN AGREEMENT WITH WARRANTY TERMS COVERING
5. THE MATERIAL IN THIS DOCUMENT THAT CONFLICT WITH THESE TERMS THE WARRANTY TERMS IN THE SEPARATE AGREEMENT WILL CONTROL Technology Licenses The hardware and or software described in this document are furnished under a license and may be used or copied only in accordance with the terms of such license Restricted Rights Legend 2 If software is for use in the performance of a U S Government prime contract or subcontract Software Is delivered and licensed as Commercial computer software as defined in DFAR 252 227 7014 June 1995 or as a commercial item as defined in FAR 2 101 a or as Restricted computer software as defined in FAR 52 227 19 June 1987 or any equivalent agency regulation or contract clause Use duplication or disclosure of Software is subject to Keysight Technologies standard commercial license terms and non DOD Departments and Agencies of the U S Government will receive no greater than Restricted Rights as defined in FAR 52 227 19 c 1 2 June 1987 U S Government users will receive no greater than Limited Rights as defined in FAR 52 227 14 June 1987 or DFAR 252 227 7015 b 2 November 1995 as applicable in any technical data safety Notices A CAUTION notice denotes a hazard It calls attention to an operating procedure practice or the like that if not correctly performed or adhered to could result in damage to the product or loss of important data Do not pro
6. ble to discover IP addresses of connected Instruments in order to query their setups over the net or break into the code Reset Remote Interface GPIB Address Ti Click Utilities Remote Interface 2 Enter 7 G Close the window KEYSIGHT TECHNOLOGIES 11 Procedure for Declassifying a Faulty Instrument Remove and secure the HDD SSD For instruments with a removable drive power the Instrument off and remove the drive from the rear panel access panel For instruments with an internal drive follow the procedure below to remove the instrument cover to access the internal drive for removal Removing the Instrument Cover to Access Non removable HDD SSD CAUTION Electrostatic discharge ESD can damage or destroy electrostatic components All work on electronic assemblies should be performed at a static safe work station 1 Disconnect the power cord from the instrument WARNING Opening covers or removing parts is likely to expose dangerous voltages Disconnect the instrument from all voltages before it is opened 2 Remove the four cabinet screws and four feet screws as Shown in Figure 1 Feet Screws Cabinet Screws 4 places 4 places Figure 1 Removing the Rear Cabinet Screws 3 Remove the two screws that secure each handle to the side of the mainframe as shown in Figure 2 Screws 2 places Figure 2 Removing the Side Handles 4 Use a small flat bladed screw driver to remove the hole plug on the bott
7. ceed beyond a CAUTION notice until the indicated conditions are fully understood and met A WARNING notice denotes a hazard It calls attention to an operating procedure practice or the like that if not correctly performed or adhered to could result in personal injury or death Do not proceed beyond a WARNING notice until the indicated conditions are fully understood and met Warranty This Keysight technologies instrument product is warranted against defects in material and workmanship for a period of three years from the date of shioment During the warranty period Keysight Technologies will at its option either repair or replace products that prove to be defective For warranty service or repair this product must be returned to a service facility designated by Keysight Technologies Buyer shall prepay shipping charges to Keysight Technologies and Keysight Technologies shall pay shipping charges to return the product to Buyer For products returned to Keysight Technologies from another country Buyer shall pay all shipping charges duties and taxes Where to Find the Latest Information Documentation Is updated periodically For the latest information about these products including instrument software upgrades application information and product information see the following URLs http www keysight com find 86100D To receive the latest updates by email subscribe to Keysight Email Updates http www keysight com find M
8. e of the secure area or when returning the instrument to Agilent for calibration or repair NA KEYSIGHT TECHNOLOGIES User and Remote Interface Security Measures Remote Access Interfaces The GPIB command LLO local lockout can be sent by the controller to prevent front panel keyboard access The user is responsible for providing security for the I O ports for remote access by controlling physical access to the I O ports The I O ports must be controlled because they provide access to most user settings user states and the display memory Operating System Security Features USB Mass Storage Device Security To prevent USB write capability create a new registry key of HKLM System CurrentControlSet Control StorageDevicePolicies Then create a REG_DWORD entry in it called WriteProtect Set it to 1 and you ll be able to read from USB drives but not write to them Remote Access Interfaces The user is responsible for providing security for the I O ports for remote access by controlling physical access to the I O ports The I O ports must be controlled because they provide access to all user settings user states and the display image The I O ports include RS 232 GPIB and LAN The LAN port provides the following services which can be selectively disabled a http b ftp C sockets d telnet There is also a ping service which presently cannot be selectively disabled The concern here might be that it is possi
9. nse Key information The Error Reference source not found procedure rases the option and license key information and this information is essential for successful restoration of the instrument s operating system Read this entire document before using any sanitization procedure Failure to do so may necessitate returning the instrument to an Authorized Keysight Service Center for firmware downloads and recalibration Description and purpose Size Memory clearing Memory sanitization Memory removal Memory validation Remarks Table 2 Declassify HDD SSD HDD SSD stores Windows operating system instrument firmware and Software calibration files license files and customer data including screen shots instrument setups measurement data or any other programs or data the customer wished to save Either 40 GB early 86100C or 80 GB late 86100C 86100D Remove and Secure drive Remove and Secure drive Remove SSD as described below For Option 092 Standard HD the user must remove the instrument cover and locate the SSD on the main deck near the CPU board The drive can be removed by taking four screws from the mounting bracket and disconnecting the SATA cables For Option 090 Removable HD the hard drive can be removed externally by unscrewing the rear access panel and pulling the drive out Option 090 ships with two Identical drives so one can be kept in the secure area and the second hard drive can be used outsid
10. om of the instrument to avoid damaging the plug n n ey Ty A I ey le i i Me Bares n AA oe RTA a gt eeee eee amp Plug Figure 3 Removing the Timebase Adjustment Access Plug 5 Locate the front left foot and its retaining clip as identified in Figure 4 Retaining Clip Figure 4 Front Left Foot 14 6 Carefully insert the blade of a flat bladed screwdriver under the black retaining clip Gently pry the clip straight up from the foot as shown in Figure 5 m aa Retaining Clip l Side View Figure 5 Removing the Front Left Foot 7 Push the foot s release tab in the direction indicated in Figure 6 and remove the foot Release Tab Figure 6 Release Tab 8 To slide the cover off the instrument first turn the mainframe upside down on the bench Place your hands on each side of the cover and using your thumbs push the instrument out the front of the cover 9 Once the instrument has begun to slide forward you can then set the instrument on its side and slide the cover off completely and locate the drive in the rear of the instrument for removal
11. yKeysight Information on preventing instrument damage can be found at Is your product software up to date Periodically Keysight releases software updates to fix known defects and incorporate product enhancements To search for software updates for your product go to the Keysight Technical Support website at http www keysight com find techsupport Table of Contents T Contacting Keysight Sales and Service OMICES ste co5s ios ots edate a alesse nada macce 5 2 Products Covered DY this DOCUMEN gic s nied chant ach eaaa a adnan a imal a gion ities 6 3 SECUPILY Terms and Definito Sareren ea a a tity Ae E E E E E E aes 7 4 Strument MEMO srruinoeiinee a A a E E a terrae 8 5 Summary of Memory Declassification Procedures ccccccceceeeeeeeeeeeeeeeeeeeeeeenettaaseeeeeeeeeeeeeeeeeeeeeennaaas g 6 User and Remote Interface Security Measures 00 oc ccc ctecceee eee eeeeeeeeeeeeeeeetaesaaaeeeeeeeeeeeeeeeeeeeentaaas 10 7 Procedure for Declassifying a Faulty Instrument 0 cece cece eee eeeeeeeeeeeeeeeetetaaaaeeeeeeeeeeeeeeeeens 12 Contacting Keysight Sales and Service Offices Assistance with test and measurement needs and information on finding a local Keysight office is available on the Internet at http www keysight com find assist If you do not have access to the Internet please contact your field engineer NOTE In any correspondence or telephone conversation refer to the instrument
Download Pdf Manuals
Related Search
Related Contents
Genie Z_80/60 Product Specifications 映像システム 取扱説明書 FICHA TÉCNICA Y DE SEGURIDAD 対象製品:286S - ヒビノプロオーディオセールス Div. Trekstor USB-Stick SE 32GB 取扱説明書 mets de noël, très bon de commande mets de noël, livraison ici et là Samsung SGH-M310 Užívateľská príručka Gemini User Guide - Ag Tech Services Copyright © All rights reserved.
Failed to retrieve file