Addonics Technologies CDC5HXAES Manual Download Page 4

 

ADDONICS TECHNOLOGIES 

Model: CDC5HXAES 

 

 

III.  How to operate the Cipher tower after initial setup 

 

1. 

Insert the 5 AES 256-bit cipher keys into each cipher keyhole on the 
Diamond Cipher enclosures located at the front of the Cipher tower. 

2. 

Push the power switch of the Cipher tower to turn it on. Observed 
that the green Cipher power LEDs at the front of the Cipher tower 
are on. If they did not, reinsert the cipher keys and re-power the 
Cipher tower. 

3. 

 

Use the system’s File Explorer to access the files on the encrypted 

drive. 

4. 

For security purposes, remove the cipher keys from the Cipher 
tower after the drives are detected by the system. All the files being 
transferred into the drives are still encrypted even if the cipher key is 
removed. 

5. 

When the Cipher tower is restarted, the 4 cipher keys must be 
inserted again in order to gain access to the drives. 

 
 
 
 
 
 
 
 
 
 
 

Best Practice: 

 
Create a label to identify the SATA hard drive and the associated Cipher 
key used. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

TECHNICAL SUPPORT 

Phone: 

 

408-453-6212 

Hours: 

 

8:30 am - 6:00 pm PST 

Email: 

           http://www.addonics.com/support/query/

 

Summary of Contents for CDC5HXAES

Page 1: ... Cipher tower The computer detects the hard drive as a brand new drive or a drive that is unallocated Once you proceed to partition the drive the data that was on the hard drive will be erased and cannot be recovered I Installing drives into the Cipher Tower Refer to Diamond Cipher enclosure hard drive installation guide Slide the enclosure into the drive bay Using the key provided insert it to th...

Page 2: ...amond Cipher enclosures located at the front of the Cipher tower b When the Cipher Tower power switch is turned on observed that the green Cipher power LEDs at the front of the Cipher tower are on If they did not reinsert the cipher keys and re power the Cipher tower c Run the JMicron HW RAID Manager in Windows d Configure the desired RAID configuration e Go to the operating system s management ut...

Page 3: ...to RAID1 However all of the hard drives will be mirrored Clone mode is useful especially when users like to copy data from a source hard drive to the drives connected to the HPM XA Notes on Spare Drives Using the Easy RAID Setting EZ In reference to the diagram the auto rebuilding to spare drive is ENABLED EZ When EZ mode is ENABLED the degraded RAID group will start rebuilding automatically by us...

Page 4: ...r the Cipher tower 3 Use the system s File Explorer to access the files on the encrypted drive 4 For security purposes remove the cipher keys from the Cipher tower after the drives are detected by the system All the files being transferred into the drives are still encrypted even if the cipher key is removed 5 When the Cipher tower is restarted the 4 cipher keys must be inserted again in order to ...

Reviews: