
USB 3.0-to-SATA II RAID Subsystem
User’s Manual
21
2.2 Using the Key Token (Optional)
NOTE: The key token provides data encryption.
When key token is in the key token port, and the RAID subsystem is
powered on and then the RAID volume is formatted and data is stored,
the data is encrypted. If the key token is removed and RAID
subsystem is powered off then powered on, the data cannot be
accessed. The key token must be in the key token port during power
on. However, the key token can be removed or kept while the RAID
subsystem is in use.
When the RAID subsystem is powered on and used without the key
token, and RAID volume is formatted and data is stored, the data is
not encrypted. The RAID subsystem works like standard model.
Here are some steps and scenarios when using the key token:
Scenario 1: Data is accessed normally
1.
While the RAID subsystem is powered off, insert the key token and USB cable.
2.
Power on the RAID subsystem.
3.
In host system, format the RAID volume and copy data.
4.
Finish setup
Scenario 2: Data will not be accessible
1.
After you do steps in scenario 1, data is accessible.
2.
If you power off the unit, remove the key token, power on, and rescan disk drives in
OS, the RAID volume will be shown as “Unknown Disk”. Data cannot be accessed.
WARNING: Do not initialize and format the unknown disk. If you do
this, the previous data will be erased.
How to solve this issue?
1.
Unmount/ uninstall the RAID volume.
2.
Power off the RAID subsystem, insert the key token, and power on the unit.
3.
RAID volume is online again and data can be accessed.