ADDONICS TECHNOLOGIES
Model: CDC5HXAES
IMPORTANT
Cipher
keyhole
There is no back door for the Cipher tower encrypted hard drives if
the Cipher keys are lost or stolen.
Locking
mechanism
HDD
Power LED
Cipher key
Check to make sure you have the
correct version of the Cipher key. A
sample key is shown
HDD
Activity LED
Black label AES-256 stands for Cipher
256-bit key.
To ensure there is a spare key, your Cipher tower comes with 5 pairs of
Cipher keys. These cipher keys have all identical encryption code unless
you requested then to be coded differently. One of these keys should be
kept in a safe and secure location and can be sent back to Addonics for
duplicating additional keys. If you are down to the last key, be sure to
make a back up of all the data stored inside your Cipher tower prior to
sending the last key to Addonics. Addonics is not responsible for key lost
in the mail or retrieval of the data inside the encrypted hard drive.
Power Switch
Cipher tower power LED
HDD Activity LED 1
HDD Activity LED 2
HDD Activity LED 3
HDD Activity LED 4
HDD Activity LED 5
Keeping track of the hard drive
If you are using the Cipher tower to encrypt multiple hard drives, it is
important to label your hard drive if you are taking the drive out of the
Cipher tower. The hard drive from the Cipher tower that is encrypted will
look like a brand new drive when attach directly to the SATA controller of
a computer. There will be no partition or any hint to indicate that the drive
contains encrypted data. When the drive is partitioned, all the encrypted
data will be lost.
eSATA port
The same holds true if a hard drive already has data on it is installed into
the Cipher tower. The computer detects the hard drive as a brand new
drive or a drive that is unallocated. Once you proceed to partition the
drive, the data that was on the hard drive will be erased and cannot be
recovered.
Power Connector
Power Switch
I.
Installing drives into the Cipher Tower
Refer to Diamond Cipher enclosure hard drive installation guide
III. 5-port HPM-XA mounted on the Cipher Tower
Slide the enclosure into the drive bay.
Using the key provided, insert it to the lock
mechanism and turn it to the “LOCK”
position. This will secure the enclosure and
provide power to the drive.
eSATA host port
Floppy power
connector
Note: It is recommended to fill up the tower
with SATA drives from top to bottom. This
is to help in identifying which drives
connects to which ports for easier
troubleshooting.
buzzer
SATA port 5
SATA port 4
SATA port 1
RAID settting
jumper block (J4)
II. Connecting the power cable and Cipher Tower to the computer
a. Connect the power cord provided from the wall outlet to the back of
the Cipher Tower.
SATA port 3
SATA port 2
Error and drive activity
LED jumper block (J1, J3)
b. A power switch is located on the front of the tower. Make sure the
power is off on the switch (power LED light should be off)
c. Connect the provided eSATA or USB2.0 cable from the back of the
Cipher tower to the eSATA or USB2.0 on the computer. We
recommend connecting the eSATA port for best performance if this
port is available on your computer.
Download from Www.Somanuals.com. All Manuals Search And Download.
ADDONICS TECHNOLOGIES
Model: CDC5HXAES
All settings on the diagram shows
RAID mode setting modification is ENAABLED (SET)
Error buzzer function is DISABLED (BZS)
Note: On this setting, there is no jumper on SET.
RAID Setting Notes:
When 2 drives are connected to the
HPM-XA, and J4 is set to this setting,
the 2 drives will be configured as a
2-drive RAID1 array.
When 4 drives are connected to the
HPM-XA, the 4 drives will be
configured as a 4-drive RAID10 array.
Clone’s action is similar to RAID1.
However, all of the hard drives will be
mirrored. Clone mode is useful
especially when users like to copy
data from a source hard drive to the
drives connected to the HPM-XA.
Notes on Spare Drives
Using the Easy RAID Setting (EZ)
7. Power on the Cipher Tower.
In reference to the diagram, the auto-rebuilding to spare drive is
ENABLED (EZ)
8. Verify if the RAID array is detected by the system
a. If the 5-port HPM-XA is connected to the motherboard onboard
SATA, on the CMOS setup utility, the raid array will display as
“Addonics H/W RAID5” if setup as a RAID5 array.
b. If the 5-port HPM-XA is connected to an eSATA host controller
card, on the RAID BIOS, the raid array will display as
“Addonics H/W RAID0” if setup as a RAID0 array.
c. If booted into Windows, in Disk Drives under Device Manager,
the raid array will display as “Addonics H/W LARGE” if setup as
a RAID0 array.
When EZ mode is ENABLED, the degraded RAID group will start
rebuilding automatically by using the existing spare drive.
* Spare drive can be either plugged before RAID building or a new drive
can be plug as the spare drive when RAID rebuild is required.
A. Which port acts as a spare drive?
The last drive will automatically become the spare drive.
9. Once raid array is verified, you can set back the RAID jumper setting
back to default
For a 3-drive RAID5 with spare:
Drives connected to SATA ports 1~3 belong to the active RAID5 array
and drive connected to port 4 is the spare.
For a 4-drive RAID10 with spare:
Drives connected to SATA ports 1~4 belong to the active RAID10 array
and drive connected to port 5 is the spare.
For a 2-drive RAID1 with spare:
Drives connected to SATA ports 1& 4 belong to the active RAID1 array
and drive connected to port 5 is the spare.
or the diagram below where buzzer is ENABLED.
B. When will rebuild action start?
When the raid fails and EZ is enabled, the HPM-XA will
automatically rebuild the RAID group using the spare.
When the raid fails and EZ is disabled, the HPM-XA will NOT rebuild the
raid group unless you install a good drive to replace the failed drive.
Download from Www.Somanuals.com. All Manuals Search And Download.
ADDONICS TECHNOLOGIES
Model: CDC5HXAES
III. How to operate the Cipher tower after initial setup
1. Insert the 5 AES 256-bit cipher keys into each cipher keyhole on the
Diamond Cipher enclosures located at the front of the Cipher tower.
2. Push the power switch of the Cipher tower to turn it on. Observed
that the green Cipher power LEDs at the front of the Cipher tower
are on. If they did not, reinsert the cipher keys and re-power the
Cipher tower.
3.
Use the system’s File Explorer to access the files on the encrypted
drive.
4. For security purposes, remove the cipher keys from the Cipher
tower after the drives are detected by the system. All the files being
transferred into the drives are still encrypted even if the cipher key is
removed.
5. When the Cipher tower is restarted, the 4 cipher keys must be
inserted again in order to gain access to the drives.
Best Practice:
Create a label to identify the SATA hard drive and the associated Cipher
key used.
TECHNICAL SUPPORT
Phone:
Hours:
Email:
408-453-6212
8:30 am - 6:00 pm PST
Download from Www.Somanuals.com. All Manuals Search And Download.
|