EasyManua.ls Logo

Rohde & Schwarz SMW200A - Managing the Security Settings

Rohde & Schwarz SMW200A
1312 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
General Instrument Functions
R&S
®
SMW200A
686User Manual 1175.6632.02 ─ 16
Download the license key as a file and transfer it to the target instrument.
10. In the target instrument, select "System Config > Setup > Instrument Assembly >
Manage License Keys > Import License Keys from File".
Select the created license key file.
The portable option is installed on the target instrument.
11.5 Managing the Security Settings
The protection function of the R&S SMW offers several levels to activate particular
functions like self-test or tests for service purposes specifically.
Protection
The five protection levels are automatically active on startup, the protection levels, that
means all protected functions are locked.
To unlock a protection level:
In the "System Config > Setup > Security > Protection", enter the correct password.
To lock a protection level:
Clear the corresponding checkbox.
Protection levels
The following functions are protected in the respective levels:
Protection level 1
Protects against accidental changes, like for example the clock and date, several
internal adjustments functions and the self-test, as well as network settings or the
instrument hostname.
You can access this level with the password 123456.
Protection level 2
Unlocks protected service functions. It is accessible to authorized personnel of
Rohde & Schwarz service department only.
Protection level 3 to 5
Are reserved for factory internal use.
Security
The security concept of the R&S SMW helps you to protect your instrument against
uncontrolled access and changes. All provided security services require that you enter
the security password.
Provided security services are:
General security parameters, such as:
USB storage that secures controlled access to the mass memory of the instru-
ment
Managing the Security Settings

Table of Contents

Related product manuals