background image

Types of Memory and Information Storage in the R&S

 

FSV/A

R&S

®

FSVA3000 / R&S

®

FSV3000

5

Instrument Security Procedures 1179.0097.02 ─ 01

Instrument declassification

The term "instrument declassification" refers to procedures that must be undertaken
before an instrument can be removed from a secure environment, for example when
the instrument is returned for calibration. Declassification procedures include memory
sanitization or memory removal, or both. The declassification procedures described in
this document are designed to meet the requirements specified in DoD 5220.22-M,
"National Industrial Security Program Operating Manual (NISPOM)", Chapter 8.

4

 

Types of Memory and Information Storage

in the R&S

 

FSV/A

The R&S

 

FSV/A Signal and Spectrum Analyzers contain various memory components.

The following table provides an overview of the memory components that are part of
your instrument. For further information, refer to the subsequent sections.

Table 4-1: Information on memory types

Memory type

Size

Content

Volatility

User
Data

Sanitization procedure

SDRAM

(CPU board)

8

 

Gbyte (IPC11/1)

or

16

 

Gbyte (IPC11/4)

or

16

 

Gbyte (IPS14)

Temporary information storage for
operating system and instrument
firmware

Volatile

Yes

Turn off instrument power

SDRAM

(motherboard)

2

 

Gbyte

Measurement data

Volatile

Yes

Turn off instrument power

SDRAM

(option R&S

 

FSV3-

B200/-B400)

6

 

Gbyte

EEPROM

(smart card)

 1

 

Mbyte

Module-specific data:

Serial number

Product options

Board internal correction
data

Non-volatile

No

None required (no user
data)

Flash

(CPU board)

8

 

Mbyte (IPC11/1)

or

8

 

Mbyte (IPC11/4)

or

8

 

Mbyte (IPS14)

BIOS

Non-volatile

No

None required (no user
data)

Flash

(frontend)

4

 

Mbyte

Module-specific data:

Serial number

Product options

Board internal correction
data

FPGA bitstream data

Non-volatile

No

None required (no user
data)

Flash

(microwave con-
verter)

4

 

Mbyte

Содержание FSVA3000 Series

Страница 1: ...R S FSVA3000 R S FSV3000 Signal and Spectrum Analyzer Instrument Security Procedures Instrument Security Procedures Version 01 1179009702 Ý0ï2 ...

Страница 2: ...The following abbreviations are used throughout this manual R S FSVA3000 is abbreviated as R S FSVA R S FSV3000 is abbreviated as R S FSV R S FSV A refers to both the R S FSV3000 and the R S FSVA3000 ...

Страница 3: ... R S FSV A Signal and Spectrum Analyzers are used in a secured environment Generally these highly secured environments do not allow any test equipment to leave the area unless it can be proven that no user information leaves with the test equipment Security concerns can arise when devices need to leave a secured area e g to be calibrated or serviced This document describes the types of memory and ...

Страница 4: ...efore clearing is typically used when the instrument is to remain in an environment with an acceptable level of protection Sanitization The term sanitization is defined in Section 8 301b of DoD 5220 22 M National Industrial Security Program Operating Manual NISPOM Sanitization is the process of removing or eradicating stored data so that the data cannot be recovered using any known technology Inst...

Страница 5: ...n overview of the memory components that are part of your instrument For further information refer to the subsequent sections Table 4 1 Information on memory types Memory type Size Content Volatility User Data Sanitization procedure SDRAM CPU board 8 Gbyte IPC11 1 or 16 Gbyte IPC11 4 or 16 Gbyte IPS14 Temporary information storage for operating system and instrument firmware Volatile Yes Turn off ...

Страница 6: ...olid State Drive CPU board on page 7 Configuration with option R S FSV3 B20 removable hard drive Memory type Size Content Volatility User Data Sanitization procedure CFAST memory card removable 64 Gbyte Operating system Instrument firmware and firmware options with license keys Instrument states and setups Trace data Limit lines transducer tables Screen images Non volatile Yes Remove CFAST memory ...

Страница 7: ...ng on the instrument The R S FSV A saves user data and instrument setups permanently on the SSD All data including user data leaves the secure area with the instrument Sanitization procedure Sanitizing is not possible without physically removing the SSD If R S FSV3 K33 is available with Secure User Mode enabled The R S FSV A redirects user data and instrument setups to the volatile memory SDRAM Sa...

Страница 8: ...u can remove the R S FSV A from a secured area for example to perform service or calibration all classified user data needs to be removed Overview for declassification of the R S FSV A depending on the configuration The options R S FSV3 B20 removable hard drive and R S FSV3 K33 security write protection of solid state drive determine the sanitization procedures for the R S FSV A as shown in Figure...

Страница 9: ...rocedures 1179 0097 02 01 Figure 5 1 Sanitizing overview R S FSV A with and without R S FSV3 B20 removable hard drive and R S FSV3 K33 You can declassify the R S FSV A as shown in the diagram These declassification procedures meet the needs of customers working in secured areas ...

Страница 10: ...ment data To establish the functionality a Insert a second CFAST memory card R S FSV3 B18 This memory card enables the R S FSV A to start the operating system b Turn on the R S FSV A The instrument is ready for use 7 Validity of Instrument Calibration after Declassification Calibration makes sure that measurements comply to the specified characteristics Rohde Schwarz recommends that you follow the...

Страница 11: ...rument has sufficient warm up time before you perform the self align ment To make sure that no self alignment data get lost keep closely to the instructions 1 Deactivate the write protection of the SSD or the CFAST memory card to allow the alignment data to be saved on the card The write protection is disabled by deacti vating the secure user mode requires administrator login Note If you do not re...

Страница 12: ...ate when turned on 10 Special Considerations for USB Ports USB ports can pose a security risk in high security locations Generally this risk comes from small USB pen drives also known as memory sticks or key drives They can be easily concealed and can quickly read write several Gbyte of data Disabling USB ports for writing user data You can disable the write capability on the USB ports of the R S ...

Страница 13: ...e Schwarz GmbH Co KG Mühldorfstr 15 81671 München Germany Phone 49 89 41 29 0 Fax 49 89 41 29 12 164 Email info rohde schwarz com Internet www rohde schwarz com Subject to change Data without tolerance limits is not binding R S is a registered trademark of Rohde Schwarz GmbH Co KG Trade names are trademarks of the owners ...

Отзывы: