Agilent Technologies E8267D PSG User Manual

Page 85

Advertising
background image

Chapter 2

71

Basic Operation

Using Security Functions

To carry out this function, press

Utility

>

Memory Catalog

>

More (1 of 2)

>

Security

>

Erase and Sanitize All

>

Confirm Sanitize

.

Removing Persistent State Information Not Removed During Erase

Persistent State

The persistent state settings contain instrument setup information that can be toggled within
predefined limits such as display intensity, contrast and the GPIB address. In vector models, the user
IQ Cal is also saved in this area.

The following key presses or SCPI commands can be used to clear the IQ cal file and to set the
operating states that are not affected by a signal generator power–on, preset, or *RST command to
their factory default:

Instrument Setup

On the front panel, press:

Utility

>

Power On/Preset

>

Restore System Defaults

>

Confirm Restore Sys Defaults

Or send the command: :SYSTem:PRESet:PERSistent

LAN Setup

The LAN setup (hostname, IP address, subnet mask, and default gateway) information is not defaulted with a
signal generator power–on or *RST command. This information can only be changed or cleared by entering new
data.

User IQ Cal File (Vector Models Only)

When a user–defined IQ calibration has been performed, the cal file data is removed by setting the cal file to
default, as follows:

1.

On the front panel, press:

I/Q

>

I/Q Calibration

>

Revert to Default Cal Settings

2.

Send these commands:

:CAL:IQ:DEF

:CAL:WBIQ:DEF

Using the Secure Mode

The secure mode automatically applies the selected Security Level action the next time the
instrument’s power is cycled.

DRAM/SDRAM

Follow the Department of Defence (DoD) manual’s requirements. The instrument must be powered off to purge
the memory contents. The instrument must remain powered off in a secure location for 3 minutes.

Hard Disk

All addressable locations are overwritten with a single character and then a random character. (This is
insufficient for top secret data, according to DoD standards. For top secret data, the hard drive must be
removed and destroyed.)

Flash Drive

All addressable locations are overwritten with a single character and then a random character. (This is
insufficient for top secret data, according to DoD standards. For top secret data, consult with your local security
officer for approved procedures.)

Advertising
This manual is related to the following products: