User and remote interface security measures
Screen and annotation blanking
You can prevent frequency information from appearing on the PNA screen and print-
outs. To set security levels from the PNA menu, click System, then Security. When the
security level is set to Low or High, frequency information is blanked from the following:
– Display annotation
– Calibration properties
– All tables
– All toolbars
– All printouts
– GPIB console – When set to None or Low, nothing is blanked. When set to High, the
GPIB console is inactive.
Frequency information is NOT blanked from the following regardless of security level:
– The frequency converter application (Option 083)
dialog box information or printouts.
– Service programs.
– Your COM or SCPI programs.
USB mass storage device security
To prevent USB write capability on XPSP2, create a new registry key of:
HKLM\System\CurrentControlSet\Control\StorageDevicePolicies.
Then create a REG_DWORD entry in it called WriteProtect. Set it to “1” and you’ll be
able to read from USB drives but not write to them.
Remote access interfaces
The user is responsible for providing security for the I/O ports that allow remote access
by controlling physical access to the I/O ports. The I/O ports must be controlled be-
cause they provide access to all user settings, user states and the display image.
The I/O ports include RS-232, GPIB, and LAN.
The LAN port provides the following services, common to all Windows-based comput-
ers, which can be selectively disabled:
– http
– ftp
– sockets
– telnet
There is also a ‘ping’ service, which cannot be selectively disabled. This makes it pos-
sible to discover IP addresses of connected instruments and allows you to query their
setups over the internet, but it can also be used to break into the code.
76 | Keysight | Antenna Test – Selection Guide