Addonics Technologies Computer Hardware CRT535PES User Manual

T E C H N O L O G I E S  
R
HDD  
Cipher  
Ci  
pherChain  
eS  
ATA  
PW  
R
User Guide  
Cipher RAIDTower  
(CRT535PES)  
v5.1.11  
Technical Support  
If you need any assistance to get your unit functioning properly, please have your  
product information ready and contact Addonics Technical Support at:  
Hours: 8:30 am - 6:00 pm PST  
Phone: 408-453-6212  
 
HD LED  
Auxillary Power Switch  
HD LED  
R
HD Power Switch  
Power & HDD LED  
HDD  
Ci  
pher  
CipherChain  
eS  
AT  
A
PWR  
eSATA Port  
Cipher Keyhole  
II.  
Connecting the power cable and Cipher Tower  
to the computer  
a.  
Connect the power cord provided from the wall outlet to the  
back of the Cipher Tower.  
b.  
A main power switch is located at the back of the tower. Turn  
the switch on. Another auxiliary switch is located on the front of  
the tower.  
c.  
d.  
Make sure the power is off on the auxiliary switch (power LED  
light should be off)  
Connect the provided eSATA cable from the back of the Cipher  
Tower to the eSATA controller card on the computer.  
Note: Check with your system supplier to confirm the PM  
support on your existing eSATA port  
 
Technical Support (M-F 8:30am - 6:00pm PST)  
Phone: 408-453-6212  
III.  
Initial setup of the Cipher tower:  
a.  
Insert the AES 256-bit cipher key into the cipher keyhole located at  
the front of the Cipher tower.  
b.  
Power on the Cipher tower. Observed that the green Cipher power  
LED at the front of the Cipher tower is on. If not, reinsert the cipher  
key and re-power the Cipher tower.  
c.  
Option of individual drive or raid volume configuration:  
1.  
Individual drive configuration:  
When the Cipher tower is connected to a eSATA Host  
controller with SiI3124 or SiI3132 chip (port multiplier  
compatible), the 5 SATA drives will be detected by the  
system otherwise only one drive is detected.  
2.  
RAID volume configuration  
When the Cipher tower is connected to a eSATA Host  
controller with SiI3124 or SiI3132 chip (port multiplier  
compatible), the 5 SATA drives will be detected by the  
system otherwise only one drive is detected.  
Once the system detect all 5 drives, use the SATARAID5  
array manager or Windows RAID software utility to  
configure the RAID volume.  
d.  
Go to the operating system’s management utility to partition, format  
and mount the encrypted drives.  
IV. How to operate the Cipher tower after initial setup  
1.  
Insert the AES 256-bit cipher key into the cipher keyhole located at  
the front of the Cipher tower.  
2.  
Power on the Cipher tower. Observed that the green Cipher power  
LED at the front of the Cipher tower is on. If not, reinsert the cipher  
key and re-power the Cipher tower.  
3.  
4.  
Use the system’s File Explorer to access the files on the encrypted  
drive.  
For security purposes, remove the cipher keys from the Cipher  
tower after the drives are detected by the system. All the files being  
transferred into the drives are still encrypted even if the cipher key is  
removed.  
5.  
When the Cipher tower is restarted, the cipher key must be inserted  
again in order to gain access to the drives.  
 
Technical Support (M-F 8:30am - 6:00pm PST)  
Phone: 408-453-6212  

Accton Technology Switch USB204A User Manual
Acer Network Card AcceleRAID 170 User Manual
ADC Switch TrueNet TracerLight User Manual
Addonics Technologies Computer Drive ADSA2 User Manual
AEG Freezer AGN71200F0 User Manual
Agri Fab Spreader 45 03641 User Manual
Aiwa Car Stereo System CDC XI User Manual
Alamo Lawn Mower SM72 User Manual
American Audio Music Mixer Q MX2 BPM User Manual
Axis Communications Security Camera Q1614 E User Manual