Tektronix products are covered by U.S. and foreign patents, issued and pending. Information in this publication
supersedes that in all previously published material. Specifications and price change privileges reserved.
TEKTRONIX and TEK are registered trademarks of Tektronix, Inc.
Contacting Tektronix
Tektronix, Inc.
14150 SW Karl Braun Drive
P.O. Box 500
Beaverto
USA
For product information, sales, service, and te chnical support:
n, OR 97077
In North America, call 1-800-833-9200.
Worldwide, visit www.tek.com to find contacts in your area.
export devices for the RSA7100B ....................................................................19
RSA7100 and CTRL7100 Series Declassification and Security Instructionsi
Table of Contents
iiRSA7100 and CTRL7100 Series Declassification and Security Instructions
Preface
This document helps customers with data security concerns to sanitize or remove
memory devices from the Tektronix RSA7100 Series Real-Time Spectrum
Analyzer con
These products have data storage (memory) d evices and data output devices (USB
ports). These instructions tell how to clear or sanitize the memory devices and
disable the data output devices. The instructions also tell how to declassify an
instrument that is not functioning.
vertor and CTRL7100 Series controller.
Reference
Products
Terms that may be used in
this document
The procedures in this document are written to meet the requirements specified in:
NISPOM, DoD 5220.22–M, Chapter 8
ISFO Process Manual for Certification & Accreditation of Classified Systems
under NISPOM
This document covers the following Tektronix products:
RSA7100A
CTRL7100A
RSA7100B
CTRL7100B
The following terms may be used in this document:
Clear. This removes data on media/memory before reusing it in a secured
area. All reusable memory is cleared to deny access to previously stored
information by standard means of access.
Erase. This is equivalent to clear.
Instrument Declassification. A term that refers to procedures that must be
undertaken before an instrument can be removed from a secure environment.
Declassification procedures include memory sanitization and memory
removal, and sometimes both.
Media storage/data export device. Any of several devices that can be used
to store or export data from the instrument, such a s a USB port.
Nonvolatile memory. Data is retained when the instrument is powered off.
Power off. Some instruments
still supplied to the instrument. For the purpose of clearing data, putting the
instrument in Standby mode does not qualify as powering off. For these
products, you will need to either pressarear-panelOFFswitchorremovethe
power source from the instrument.
RSA7100 and CTRL7100 Series Declassification and Security Instructionsiii
have a “Standby” mode, in which power is
Preface
Device terms
Remove. This is
device from the instrument. Instructions are available in the product Service
Manual.
Sanitize. This eradicates the data from media/memory so that the data cannot
be recovered by other means or technology. This is typically used when the
device will be moved (temporarily or permanently) from a secured area to a
non-secured area.
Scrub. This is equivalent to sanitize.
User Accessible. User is able to directly retrieve the memory device contents.
User-modifiable. The user can write to the memory device during normal
instrument operation, using the instrument interface or remote control.
User-modifiable. The user can write to the memory device during normal
instrument operation, using the instrument interface or remote control.
Volatile memory. Data is lost when the instrument is powered off.
User data. Describes the type of information stored in the device. Refers to
orms or other measurement data representing signals connected to the
wavef
instrument by users.
aphysicalmeanstoclearthedatabyremovingthememory
settings. Describes the type of information stored in the device. Refers
User
to instrument settings that can be changed by the user.
h. Describes the type of information stored in the device. It means that
Bot
both user data and user settings are stored in the device.
e. Describes the type of information s tored in the device. It means that
Non
neither user data nor user settings are stored in the device.
rectly . Describes how data is modified. It means that the user can modify
Di
the data.
ndirectly. Describes how data is modified. It means that the instrument
I
system resources modify the data and that the u ser cannot modify the data.
ivRSA7100 and CTRL7100 Series Declassification and Security Instructions
Memory devices
The following tables and procedures identify volatile and non-volatile memory
devices in the RSA7100A, CTRL7100A, RSA7100B, and the CTRL7100B and
how to clear and/or sanitize them.
Volatile me
mory devices (RSA7100A)
Type and
min. sizeFunction
k,
Device
configuration,
traffic
buffering
Data
g
bufferin
Data
buffering
Fan,
voltage,
and
rature
tempe
monitoring
and
rol
cont
Temperature
monitoring
ule
Mod
control
and bus
ntrol
co
PCIe switch,
122 kB
FPGA bloc
1548 kB
PCI DMA,
s
1536 bit
SRAM 96 kB
SRAM 96 kB
FPGA 2910
logic elements
Typ e
of user
info
stored
NoneNoNoneFirmware
NoneNoNoneFirmware
NoneNoNoneFirmware
NoneNoNoneuP cont
NoneNoNoneuP control
e
Non
Backed
up by
battery
NoNon
Method
of
modification
Data
input
methodLocation
operations
operatio
operations
e
System
writes
User
accessibleTo clearTo sanitize
MXI
module
GPS
ns
module
GPS
module
rol
Chassis
module
Chassis
modu
MXI
module
NoRemove
NoRemove
NoRemove
NoRemove
NoRemove
le
NoRem
power from
instrument for
at least 20
seconds.
m
power fro
instrument for
at least 20
.
seconds
power from
ent for
instrum
at least 20
seconds.
power from
instrument for
st 20
at lea
seconds.
power from
trument for
ins
at least 20
seconds.
ove
power from
instrument for
least 20
at
seconds.
Remove
power from
instrument for
at least 20
seconds.
Remove
m
power fro
instrument for
at least 20
.
seconds
Remove
power from
ent for
instrum
at least 20
seconds.
Remove
power from
instrument for
st 20
at lea
seconds.
Remove
power from
trument for
ins
at least 20
seconds.
ove
Rem
power from
instrument for
least 20
at
seconds.
RSA7100 and CTRL7100 Series Declassification and Security Instructions1
Memory devices
Volatile memo
Type and
min. sizeFunction
256 Byte
Battery
Backed RTC
CMOS RAM
DDR4 SDRAM
64 GB (std)
RAID
Adaptec
Card
AMD W9100
ics Card
Graph
16 GB
Micron 16M x
DR3
16 D
XILINX ~2.3
ytes FPGA
Mb
Holds
time,
date, and
system
configuration
date
Micropro
system
memory
Controls
data
n
writte
to SSDs
for higher
write
speed
Memory
for
graphics
card
FPGA
scratchpad
RAM
GA
FP
scratchpad
RAM
ry devices (CTRL7100A)
Type
of user
info
stored
NoneYesIndirectly
cessor
User
data,
user
settings
system
data
Configuration
data,
buffer
user
data
Program
and us
data
Program
user
and
data
Program
duser
an
data
Backed
up by
battery
NoDirectlyWritten b
,
NoIndirec
s
NoIndirectlyWritten by
er
NoIndirectlyWritten by
NoIndirectlyWritten by
Method
of
modification
through
BIOS
interface
tly
Data
input
methodLocation
User
option
selectable
processor
system
Written
processor
system
ssor
proce
system
cessor
pro
system
ocessor
pr
system
by
y
Main
controller
motherboard
Main
controller
motherboard
memory
sockets
PCIe
slot on
board
mother
PCIe
slot on
motherboard
PCIe
slot on
motherboard
Ie
PC
slot on
motherboard
User
accessibleTo clearTo san itize
NoUse the
YesRemove po
NoRemove p
NoRemove power
NoRemove power
NoRemove power
“Procedure to
Clear CMOS”
locatedinth
document.
Or pull the
backup batt
out of the
holder on the
motherboa
for 20
seconds.
from the
instrument
for at lea
seconds.
from the
instrument
for at l
seconds.
from t
instrument
for at least 20
seco
fro
instrument
for at least 20
sec
fr
instrument
for at least 20
s
rd
st 20
ower
east 20
he
nds.
mthe
onds.
om the
econds.
is
ery
wer
Use the
“Procedure to
Clear CMOS”
locatedinth
document.
Resets time,
date, and
settings
to factory
default
settings.
Remove
power
from the
nt
instrume
foratleast20
seconds.
Remove
power
from the
ment
instru
foratleast20
seconds.
Remove
power
from the
instrument
tleast20
for a
seconds.
Remove
er
pow
from the
instrument
at least 20
for
seconds.
Remove
wer
po
from the
instrument
or at least 20
f
seconds.
is
2RSA7100 and CTRL7100 Series Declassification and Security Instructions
Memory devices
Vo latile memo
Type and
min. sizeFunction
PCIe switch,
122 kB
FPGA block,
1548 kB
PCI DMA,
1536 bits
SRAM 96 kB
SRAM 96 kB
FPGA 2910
logic elements
Device
configuration,
traffic
buffering
Data
buffering
Data
buffering
Fan,
voltage,
and
tempera
monitoring
and
l
contro
Temperature
monitoring
le
Modu
control
and bus
rol
cont
ry devices (RSA7100B)
Typ e
of user
info
stored
NoneNoNoneFirmware
NoneNoNoneFirmware
NoneNoNoneFirmware
NoneNoNoneuP contr
ture
NoneNoNoneuP control
NoneNoNone
Backed
up by
battery
Method
of
modification
Data
input
methodLocation
operations
operations
operations
System
writes
MXI
module
GPS
module
GPS
module
ol
Chassis
module
Chassis
e
modul
MXI
module
User
accessibleTo clearTo sanitize
NoRemove
NoRemove
NoRemove
NoRemove
NoRemove
NoRemo
power from
instrument for
at least 20
seconds.
power from
instrument for
at least 20
seconds.
power from
instrume
at least 20
seconds.
power from
instrument for
at least
seconds.
power from
ument for
instr
at least 20
seconds.
power from
instrument for
ast 20
at le
seconds.
nt for
20
ve
Remove
power from
instrument for
at least 20
seconds.
Remove
power from
instrument for
at least 20
seconds.
Remove
power from
nt for
instrume
at least 20
seconds.
Remove
power from
instrument for
20
at least
seconds.
Remove
power from
ument for
instr
at least 20
seconds.
ve
Remo
power from
instrument for
ast 20
at le
seconds.
RSA7100 and CTRL7100 Series Declassification and Security Instructions3
Memory devices
Volatile memo
Type and
min. sizeFunction
256 Byte
Battery
Backed RTC
CMOS RAM
DDR4 SDRAM
64 GB (std)
RAID
Adaptec
Card
AMD WX9100
ics Card
Graph
16 GB
Micron 16M x
DR3
16 D
XILINX ~2.3
ytes FPGA
Mb
Holds
time,
date, and
system
configuration
date
Micropro
system
memory
Controls
data
n
writte
to SSDs
for higher
write
speed
Memory
for
graphics
card
FPGA
scratchpad
RAM
GA
FP
scratchpad
RAM
ry devices (CTRL7100B)
Type
of user
info
stored
NoneYesIndirectly
cessor
User
data,
user
settings
system
data
Configuration
data,
buffer
user
data
Program
and us
data
Program
user
and
data
Program
duser
an
data
Backed
up by
battery
NoDirectlyWritten b
,
NoIndirec
s
NoIndirectlyWritten by
er
NoIndirectlyWritten by
NoIndirectlyWritten by
Method
of
modification
through
BIOS
interface
tly
Data
input
methodLocation
User
option
selectable
processor
system
Written
processor
system
ssor
proce
system
cessor
pro
system
ocessor
pr
system
by
y
Main
controller
motherboard
Main
controller
motherboard
memory
sockets
PCIe
slot on
board
mother
PCIe
slot on
motherboard
PCIe
slot on
motherboard
Ie
PC
slot on
motherboard
User
accessibleTo clearTo san itize
NoUse the
YesRemove po
NoRemove p
NoRemove power
NoRemove power
NoRemove power
“Procedure to
Clear CMOS”
locatedinth
document.
Or pull the
backup batt
out of the
holder on the
motherboa
for 20
seconds.
from the
instrument
for at lea
seconds.
from the
instrument
for at l
seconds.
from t
instrument
for at least 20
seco
fro
instrument
for at least 20
sec
fr
instrument
for at least 20
s
rd
st 20
ower
east 20
he
nds.
mthe
onds.
om the
econds.
is
ery
wer
Use the
“Procedure to
Clear CMOS”
locatedinth
document.
Resets time,
date, and
settings
to factory
default
settings.
Remove
power
from the
nt
instrume
foratleast20
seconds.
Remove
power
from the
ment
instru
foratleast20
seconds.
Remove
power
from the
instrument
tleast20
for a
seconds.
Remove
er
pow
from the
instrument
at least 20
for
seconds.
Remove
wer
po
from the
instrument
or at least 20
f
seconds.
is
4RSA7100 and CTRL7100 Series Declassification and Security Instructions
Memory devices
Non-volatile
memory devices (RSA7100A)
Type a nd
min. sizeFunction
EEPROM,
2kB
Flash, 4 MBDevice
CPLD, 256
macro cells
Flash64MBProduct
EEPROM,
16 kB
EEPROM,
2kbit
EEPROM,
2kbit
EEPROM,
32 kB
CPLD, 8 kB
CPLD, 72
macro cells
CPLD, 72
macro cells
lash 4 MB
F
Flash 256 kBFan,
Flash 4 MBTemperature
Flash 256 kBTemperature
TCXO
calibration
data
configuration
data
Trigger
routing
ID and
calibration
data
Clock tuning
configuration
PCI bridge
configuration
plane
Back
configuration
PCIe switch
configuration
clock
PXI
configuration
igger
Tr
routing logic
PCI
configuration
an,
F
voltage, and
temperature
onitoring
m
voltage, and
temperature
monitoring
monitoring
monitoring
Typ e
of user
info
stored
Calibration
NoneNone
NoneNone
Arbitrary
text
NoneNoneuP wri
NoneNoneuP wr
NoneNoneuP wr
e
Non
e
Non
ne
No
ne
No
one
N
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
Method of
modification
APIFactory
API and
system
writes
e
Non
e
Non
ne
No
ne
No
one
N
Data
input
methodLocation
programming
System
writes
System
writes
Factory
and sys
writes and
user inputs
tes
ites
ites
rites
uP w
rites
uP w
writes
uP
writes
uP
Pwrites
u
tem
GPS
module
GPS
module
GPS
module
Conver
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
User
accessibleTo clearTo sanitize
NoNoneNot applicab
NoNoneNot applicable.
NoNoneNot appli
NoNoneNot applicable.
tor
NoNoneNone
NoNoneNone
NoNoneNone
NoNon
NoNon
NoNo
NoNo
o
N
NoNoneNone
NoNoneNone
NoNoneNone
e
e
ne
ne
one
N
Does not
contain user
data or setti
Does not
contain use
data or settings.
Sanitizing
would disa
instrument
functionality.
Does not
contain user
data or se
Sanitizing
would disable
instrum
functionality.
Does no
contain user
data or settings.
Non
Non
No
No
one
N
le.
ngs.
r
ble
cable.
ttings.
ent
t
e
e
ne
ne
RSA7100 and CTRL7100 Series Declassification and Security Instructions5
Memory devices
Typ e
Type a nd
min. sizeFunction
EEPROM 128 kB
FPGA 2910
logic elements
Device
configuration
Module
control and
bus control
of user
info
stored
NoneNone
NoneNone
Method of
modification
Data
input
methodLocation
System
writes
System
writes
Non-volatile memory devices (CTRL7100A)
There is no user-modifiable non-volatile memory (besides removable drives).
All user data is stored on Solid-State Drives (SSDs) or user inserted USB drives.
The SSD drives are removable from the CTRL7100A front-panel, and the USB
drives are removable from the CTRL7100A front and rear panels.
See the instructions for removing these devices from the CTRL7100A. (See
page 21, Clear or sanitize a non-functional instrument.)
MXI
module
MXI
module
User
accessibleTo cl earTo sanitize
NoNoneNone
NoRemove power
from instrument
for at least 20
seconds.
Remove power
from instrument
for at least 20
seconds.
d
Type a n
min. sizeFunction
Solid State
Hard Drive,
holds System
OS, programs
and user data
512 GB
Small RAID
option using
1TBSSDs,
total size
10 TB
Holds
instrument
operating
system and
application
software.
Holds all
user-storable
data such as
waveforms,
measurement
results, and
instrument
settings.
Holds
data from
instrument
acquisition
system
To clear CMOS, see the procedure after the f ollowing table. (See page 15,
Procedure to clear the CMOS (CTRL7100A).)
Typ e
of user
info
stored
User
data, user
settings
Acquisition
data, user
data
Method
modification
DirectFirmware
DirectAcquisition
Data
of
input
methodLocation
operations,
user input
generated
data,
programmatic
generated
data, or
direct data
input
In user
accessible
drive tray
on front of
controller.
In user
accessible
drive trays
behind
lower
door on
CTRL7100A.
User
accessibleTo clearTo sanitize
Yes
Yes
Use the SSD
manufacturer’s
secure erase
function.
Reinstall
Microsoft
Windows.
Reinstall the
instrument
software.
Contact
Tektronix for
software if
needed.
Use the SSD
manufacturer’s
secure erase
function.
Remove the hard
drive. Store the
removed hard
drive in a secure
area or destroy
it. Conversely,
you can also
use the SSD
manufacturer’s
secure erase
function.
Use the SSD
manufacturer’s
secure erase
function.
6RSA7100 and CTRL7100 Series Declassification and Security Instructions
Type a nd
min. sizeFunction
Large RAID
option using
2 TB SSDs,
total size
16 TB
BMC FW flash
ROM 16 MB
BIOS Flash
ROM 16 MB
Holds
data from
instrument
acquisition
system
Holds
motherboard
firmware
and
diagnostic
information
Holds
motherboard
firmware,
system
configuration
and
diagnostic
information
Typ e
of user
info
stored
Acquisition
data, user
data
NoneIndirect
NoneIndirect
Method of
modification
DirectAcquisition
Data
input
methodLocation
generated
data,
programmatic
generated
data, or
direct data
input
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
In user
accessible
drive trays
behind
lower
door on
CTRL7100A.
U2F1NoMemory must
U4G2
Memory devices
User
accessibleTo clearTo sanitize
Yes
NoMemory must
Use the SSD
manufacturer’s
secure erase
function.
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
Use the SSD
manufacturer’s
secure erase
function.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
RSA7100 and CTRL7100 Series Declassification and Security Instructions7
Memory devices
Type a nd
min. sizeFunction
Adaptec RAID
controller
BIOS
I350 EEROM
256 kB
X540 Flash
ROM 16 MB
Holds
configuration
data
Holds MAC
address and
firmware
settings for
LAN
Holds MAC
address and
firmware
settings for
LAN
Typ e
of user
info
stored
NoneIndirect
NoneIndirect
System
configuration
information
Method of
modification
Indirect
Data
input
methodLocation
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
Settings
applied
through
vendor
supplied
tools.
On RAID
controller
card
U8L1NoMemory must
U2A1NoMemory must
User
accessibleTo clearTo sanitize
NoMemory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of the
RAID controller,
and clearing
these areas
may render the
RAID controller
inoperable.
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of the
RAID controller,
and clearing
these areas
may render the
RAID controller
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
8RSA7100 and CTRL7100 Series Declassification and Security Instructions
Type a nd
min. sizeFunction
NXP
EEPROM
128k x 8
INTEL FLASH
32M x 16
Used by
Pentek
for fixed
configuration
Contains
programming
information
for FPGAs
Typ e
of user
info
stored
NoneDirect via a
NoneDirect via a
Method of
modification
data path
and with
special
software
available
only from
Pentek.
Setting
the switch
SW2-1 to
the “on”
position
will inhibit
programming.
data path
and with
special
software
available
only from
Pentek.
Setting
the switch
SW2-1 to
the “on”
position
will inhibit
programming
Data
input
methodLocation
Settings
applied
through
vendor
supplied
tools.
Settings
applied
through
vendor
supplied
tools.
U1 on
Pentek
78610-104-155-165
LVD S
U84 on
Pentek
78610-104-155-165
LVD S
Memory devices
User
accessibleTo clearTo sanitize
No
No
Can be written
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
Can be written
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
Can be written
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
Can be written
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
Non-volatile memory devices (RSA7100B)
Typ e
and
Type
min. sizeFunction
EEPROM,
2kB
Flash, 4 MBDevice
TCXO
calibration
data
configuration
data
of user
info
stored
Calibration
NoneNone
Meth
modification
APIFactory
od of
Data
t
inpu
methodLocation
programming
System
writes
GPS
module
GPS
module
User
accessibleTo clearTo sanitize
NoNoneNot applicable.
Does not
contain user
data or settings.
NoNoneNot applicable.
Does not
contain user
data or settings.
Sanitizing
would disable
instrument
functionality.
RSA7100 and CTRL7100 Series Declassification and Security Instructions9
Memory devices
Type a nd
min. sizeFunction
CPLD, 256
macro cells
Flash64MBProduct
EEPROM,
16 kB
EEPROM,
2kbit
EEPROM,
2kbit
EEPROM,
32 kB
CPLD, 8 kB
CPLD, 72
macro cells
CPLD, 72
macro cells
Flash 4 MBFan,
Flash 256 kBFan,
Flash 4 MBTemperature
Flash 256 kBTemperature
EEPROM 128 kB
FPGA 2910
logic elements
Trigger
routing
ID and
calibration
data
Clock tuning
configuration
PCI bridge
configuration
Backplane
configuration
PCIe switch
configuration
PXI clock
configuration
Trigger
routing logic
PCI
configuration
voltage, and
temperature
monitoring
voltage, and
temperature
monitoring
monitoring
monitoring
Device
configuration
Module
control and
bus control
Typ e
of user
info
stored
NoneNone
Arbitrary
text
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNoneuP writes
NoneNone
NoneNone
Method of
modification
API and
system
writes
Data
input
methodLocation
System
writes
Factory
and system
writes and
user inputs
System
writes
System
writes
GPS
module
Convertor
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
Chassis
module
MXI
module
MXI
module
User
accessibleTo cl earTo sanitize
NoNoneNot applicable.
NoNoneNot applicable.
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoNoneNone
NoRemove power
from instrument
for at least 20
seconds.
Does not
contain user
data or settings.
Sanitizing
would disable
instrument
functionality.
Does not
contain user
data or settings.
Remove power
from instrument
for at least 20
seconds.
10RSA7100 and CTRL7100 Series Declassification and Security Instructions
All user data is stored on Solid-State Drives (SSDs) or user inserted USB drives.
The SSD drives are removable from the CTRL7100B front-panel, and the USB
drives are removable from the CTRL7100B front and rear panels.
See the instructions for removing these devices from the CTRL7100B. (See
page 21, Clear or sanitize a non-functional instrument.)
To clear CMOS, see the clear procedure. (See page 17, Procedure to clear theCMOS (CTRL7100B).)
Typ e
of user
info
stored
User
er
data, us
settings
Acquisition
,user
data
data
Acquisition
data, user
ta
da
Method of
modification
DirectFirmware
DirectAcquisition
DirectAcquisition
Data
input
methodLocation
ons,
operati
user input
rated
gene
data,
programmatic
erated
gen
data, or
direct data
ut
inp
generated
ta,
da
programmatic
generated
ata, or
d
direct data
input
In user
ble
accessi
drive tray
on front of
ller.
contro
In user
ssible
acce
drive trays
behind
er
low
door on
CTRL7100A.
In user
accessible
ive trays
dr
behind
lower
oor on
d
CTRL7100A.
User
accessibleTo clearTo sanitize
Yes
Yes
Yes
Use the SS
manufacturer’s
secure erase
functio
Reinstall
Microsoft
Window
Reinstall the
instrument
softw
Contact
Tektronix for
softw
needed.
Use t
manufacturer’s
secure erase
fun
Use the SSD
ma
secure erase
function.
D
n.
s.
are.
are if
he SSD
ction.
nufacturer’s
Remove the hard
tore the
drive. S
removed hard
drive in a secure
estroy
area or d
it. Conversely,
you can also
SSD
use the
manufacturer’s
secure erase
ion.
funct
he SSD
Use t
manufacturer’s
secure erase
ction.
fun
Use the SSD
nufacturer’s
ma
secure erase
function.
RSA7100 and CTRL7100 Series Declassification and Security Instructions11
Memory devices
Type a nd
min. sizeFunction
BMC FW flash
ROM 32MB/
64MB
BIOS Flash
ROM 32MB/
64MB
Adaptec RAID
controller
BIOS
Holds
motherboard
firmware
and
diagnostic
information
Holds
motherboard
firmware,
system
configuration
and
diagnostic
information
Holds
configuration
data
Typ e
of user
info
stored
NoneIndirect
NoneIndirect
NoneIndirect
Method of
modification
Data
input
methodLocation
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
U1D2NoMemory must
U3E1NoMemory must
On RAID
controller
card
User
accessibleTo clearTo sanitize
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
NoMemory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of the
RAID controller,
and clearing
these areas
may render the
RAID controller
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of the
RAID controller,
and clearing
these areas
may render the
RAID controller
inoperable.
12RSA7100 and CTRL7100 Series Declassification and Security Instructions
Type a nd
min. sizeFunction
Inphi PHY
EEPROM
512 kB
LAN Riser
FRU 2 kB
Holds MAC
address and
firmware
settings for
LAN
Holds MAC
address and
firmware
settings for
LAN
Typ e
of user
info
stored
NoneIndirect
System
configuration
information
Method of
modification
Indirect
Data
input
methodLocation
Settings
applied
through
vendor
supplied
tools. Not
directly
accessible
by user.
Settings
applied
through
vendor
supplied
tools.
EU2A1NoMemory must
EU3A1NoMemory must
Memory devices
User
accessibleTo clearTo sanitize
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required
for normal
operation of
the server,
and clearing
these areas
may render the
server board
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
Memory must
be erased to
clear data. The
exact method of
clearing these
areas varies
by the specific
component.
Some areas
are required for
normal operation
of the server, and
clearing these
areas may render
the server board
inoperable.
RSA7100 and CTRL7100 Series Declassification and Security Instructions13
Memory devices
Type a nd
min. sizeFunction
NXP
EEPROM
128k x 8
INTEL FLASH
32M x 16
Used by
Pentek
for fixed
configuration
Contains
programming
information
for FPGAs
Typ e
of user
info
stored
NoneDirect via a
NoneDirect via a
Method of
modification
data path
and with
special
software
available
only from
Pentek.
Setting
the switch
SW2-1 to
the “on”
position
will inhibit
programming.
data path
and with
special
software
available
only from
Pentek.
Setting
the switch
SW2-1 to
the “on”
position
will inhibit
programming
Data
input
methodLocation
Settings
applied
through
vendor
supplied
tools.
Settings
applied
through
vendor
supplied
tools.
U1 on
Pentek
78610-104-155-165
LVD S
U84 on
Pentek
78610-104-155-165
LVD S
User
accessibleTo clearTo sanitize
No
No
Canbewritten
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
Canbewritten
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
Canbewritten
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
Canbewritten
only with
special software
available only
from Pentek.
Without this
software it is
impossible for a
user to write to
these devices
inadvertently.
14RSA7100 and CTRL7100 Series Declassification and Security Instructions
Procedure to clear the CMOS (CTRL7100A)
Procedure to c
lear the CMOS (CTRL7100A)
To clear the C
1. Power down the server and unplug the power cord.
2. Open the server chassis.
3. Move the J1F6 jumper from the default operating position (covering pins 1
and 2) to the reset/clear position (covering pins 2 and 3).
This jumper is shown in the following diagram and labeled BIOS Default.
4. Wait five seconds.
5. Move the jumper back to the default position (covering pins 1 and 2).
6. Close th
7. Install AC power cord.
8. Power up the server and access the BIOS setup utility by <F2>.
9. Visually verify that the BIOS settings are reset to the default settings and the
RTC date/time is not set to the current time, but it is set to the default date
and time. This confirms sanitization is complete.
MOS, perform the following procedure:
e server chassis.
The CMOS is now cleared and can be reset by going into the BIOS setup.
NOTE. This jumper does not reset Administrator or User passwords. In order
eset passwords, the Password Clear jumper must be used. The system will
to r
automatically power on after AC is applied to the system.
RSA7100 and CTRL7100 Series Declassification and Security Instructions15
Procedure to clear the CMOS (CTRL7100A)
16RSA7100 and CTRL7100 Series Declassification and Security Instructions
Procedure to clear the CMOS (CTRL7100B)
Procedure to c
lear the CMOS (CTRL7100B)
To clear the C
1. Power down the server and unplug the power cord.
2. Open the server chassis.
3. Move the J1F1 jumper from the default operating position (covering pins 1
and 2) to the reset/clear position (covering pins 2 and 3).
This jumper is shown in the following diagram and labeled BIOS Default.
4. Wait five seconds.
5. Move the jumper back to the default position (covering pins 1 and 2).
6. Close th
7. Install AC power cord.
8. Power up the server and access the BIOS setup utility by <F2>.
9. Verify the BIOS default operation was successful by view the Error Manager
screen. Two errors should be logged:
a. 5220 BIOS Settings reset to default settings.
MOS, perform the following procedure:
e server chassis.
b. 0012 System RTC date/time not set.
The CMOS is now cleared and can be reset by going into the BIOS setup.
NOTE. This jumper does not reset Administrator or User passwords. In order
to reset passwords, the Password Clear jumper must be used. The system will
automatically power on after AC is applied to the system.
RSA7100 and CTRL7100 Series Declassification and Security Instructions17
Procedure to clear the CMOS (CTRL7100B)
18RSA7100 and CTRL7100 Series Declassification and Security Instructions
Data export devices
The following tables and procedures identify data export devices in the
RSA7100A, CTRL7100A, RSA7100B, and CTRL7100B and how to clear and/or
sanitize the
Data export devices for the RSA7100A
m.
Data export devices
TypeFunction
LAN Ethernet
connector
PCIeTransfer waveform
No intended useNone
samples
Method of
modification
NoneNoneFront panelNoNone
Data input
methodLocationUser accessibleProcess to disable
N/A
Data export devices for the CTRL7100A
TypeFunction
USB device
port
LAN Ethernet
connector
Supports
removab
flash drive.
User storage
rence
of refe
waveforms, screen
images, and
ument setups.
instr
Supports data
fer
trans
le USB
Method of
modificat
DirectlyDirectly by system
Directly
ion
Data input
methodLocationUser acce
resources
System resources
Data export devices for the RSA7100B
Rear panelNoNone
ssible
Front and rear
panel
Rear panelNoNone
No
Process t
Remove all USB
memory d
USB devices can
be formatted, stored
in a sec
destroyed.
odisable
evices.
ure area, or
TypeFunction
LAN Ethernet
connector
PCIeTransfer waveform
No intended useNone
samples
od of
Meth
modification
NoneNoneFront panelNoNone
input
Data
methodLocationUser accessibleProcess to disable
N/A
Rear panelNoNone
RSA7100 and CTRL7100 Series Declassification and Security Instructions19
Data export devices
Data export de
vices for the CTRL7100B
TypeFunction
USB device
port
LAN Ethernet
connector
40 GbESupports data
Supports
removable USB
flash drive.
User storage
of reference
waveforms, screen
images, and
instrument setups.
Supports data
transfer
transfer
Method of
modification
DirectlyDirectly by system
Directly
Directly
Data input
methodLocationUser accessibleProcess to disable
resources
System resources
System resources
Front and rear
panel
Rear panelNoNone
Rear panelNoNone
No
Remove all USB
memory devices.
USB devices can
be formatted, stored
in a secure area, or
destroyed.
20RSA7100 and CTRL7100 Series Declassification and Security Instructions
Clear or sanitize a non-functional instrument
Clear or sanit
ize a non-functional instrument
00 is not functioning, perform the following actions and then return
00 is not functioning, perform the USB removal procedure below
replacement.
Charges
If the CTRL71
the CTRL7100 to Tektronix for repair.
If the RSA71
andthenreturntheRSA7100toTektronixforrepair.
Replacement of any missing hardware will be charged according to the rate at
the time of
Remove SSD, RAID SSD, and USB drive from the CTRL7100
Operating system SSD
removal
The oper
as configurations.
1. Locate
2. Push the unlock button to unlock the removal lever.
3. Pull the lever to the fully open position and slide out the drive.
4. Refer to your company’s internal policies regarding storage or disposal of
ating system (OS) SSD contains the OS, programs, and user data such
the OS SSD located in one of the upper drive bays.
the drive.
RAID SSD removal
USB drive removal
The RAID SSDs contain streamed samples from one or more user configured
acquisitions. These drives can be removed from the front panel.
1. Open the lower drive bay door.
2. Locate all of the SSDs associated with the RAID system.
ess on the green tab to pop out the lever to extract the drive bracket and
3. Pr
then remove the drive.
epeat step 3 for each drive you want to remove.
4.R
5. Refer to your company’s internal policies regarding storage or disposal of
the drives.
The USB drives may contain user data and configurations. Pull the USB device
from the USB port to remove. Refer to your company’s internal policies regarding
storage or disposal of the drives.
RSA7100 and CTRL7100 Series Declassification and Security Instructions21
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.