Sanitization procedures are intended to return the board to new condition and remove data that may have been programmed to non-volatile storage. These procedures are often performed when removing products from confidential areas.
Note that these procedures only cover removal of data from storage accessible by supported means. We don’t support sanitization of data written by undocumented methods.
The XEM6001 USB 2.0 firmware does not store any logs on the attached NVRAM.
|8 kB I2C EEPROM|
USB 2.0 firmware and device settings.
|32 Mb SPI Flash|
Flash available to FPGA for configuration boot and user storage.
This firmware has only two user-accessible areas:
- Device ID String – This is a short string used to identify each board. This can be written using the FrontPanel Application or the FrontPanel API
- PLL Settings – This contains the settings for the on-board PLL. This can be written using the FrontPanel Application of the FrontPanel API
The firmware itself is not accessible by supported means and is therefore outside the scope of these sanitization procedures. If you are concerned about the contents of this section, you should purchase a new board and destroy the “dirty” board.
The FPGA flash may be reprogrammed by writing an appropriate file to the flash using the Flash Programming Tool in the FrontPanel Application. You can select “erase all” to erase the flash. If you need to overwrite the contents, you will need to generate a binary image to write to this flash.
Alternatively, you can write to this flash from the FPGA. You will need to design and configure the FPGA with appropriate logic to do this. Opal Kelly does not provide any example HDL to do this.