Specifications
Page 20 Steps for Implementing a Secure Configuration Flow
Using the Design Security Features in Altera FPGAs June 2012 Altera Corporation
How to Perform Single-Device Volatile or Non-Volatile Key Programming
Using Quartus II Software
To perform single-device volatile or non-volatile key programming using the
Quartus II software through the EthernetBlaster, perform the following steps:
1. Check the firmware version of the EthernetBlaster. Verify that the JTAG firmware
build number is 101 or greater. If the version precedes build number 101, apply the
firmware upgrade.
1 Apply the firmware upgrade (EBFW100101.tar.gz) to the EthernetBlaster
unit. This updates the JTAG Firmware to Build 101. For firmware upgrade
instructions, refer to the EthernetBlaster Communications Cable User Guide.
2. Start the Quartus II software.
3. On the Tools menu, click Programmer. The Programmer dialog box appears
(Figure 19).
4. In the Mode list, select JTAG as the programming mode (Figure 19).
Figure 19. Key Programming Using EthernetBlaster and Quartus II Software
Add the <filename>.ekp file
EthernetBlaster as
the programming
hardware
JTAG as the
programming mode