Addonics Technologies CIPHER RAID TOWER CRT535PES User Manual

T E C H N O L O G I E S  
R
HDD  
Cipher  
Ci  
pherChain  
eS  
ATA  
PW  
R
User Guide  
Cipher RAIDTower  
(CRT535PES)  
v5.1.11  
Technical Support  
If you need any assistance to get your unit functioning properly, please have your  
product information ready and contact Addonics Technical Support at:  
Hours: 8:30 am - 6:00 pm PST  
Phone: 408-453-6212  
HD LED  
Auxillary Power Switch  
HD LED  
R
HD Power Switch  
Power & HDD LED  
HDD  
Ci  
pher  
CipherChain  
eS  
AT  
A
PWR  
eSATA Port  
Cipher Keyhole  
II.  
Connecting the power cable and Cipher Tower  
to the computer  
a.  
Connect the power cord provided from the wall outlet to the  
back of the Cipher Tower.  
b.  
A main power switch is located at the back of the tower. Turn  
the switch on. Another auxiliary switch is located on the front of  
the tower.  
c.  
d.  
Make sure the power is off on the auxiliary switch (power LED  
light should be off)  
Connect the provided eSATA cable from the back of the Cipher  
Tower to the eSATA controller card on the computer.  
Note: Check with your system supplier to confirm the PM  
support on your existing eSATA port  
Technical Support (M-F 8:30am - 6:00pm PST)  
Phone: 408-453-6212  
III.  
Initial setup of the Cipher tower:  
a.  
Insert the AES 256-bit cipher key into the cipher keyhole located at  
the front of the Cipher tower.  
b.  
Power on the Cipher tower. Observed that the green Cipher power  
LED at the front of the Cipher tower is on. If not, reinsert the cipher  
key and re-power the Cipher tower.  
c.  
Option of individual drive or raid volume configuration:  
1.  
Individual drive configuration:  
When the Cipher tower is connected to a eSATA Host  
controller with SiI3124 or SiI3132 chip (port multiplier  
compatible), the 5 SATA drives will be detected by the  
system otherwise only one drive is detected.  
2.  
RAID volume configuration  
When the Cipher tower is connected to a eSATA Host  
controller with SiI3124 or SiI3132 chip (port multiplier  
compatible), the 5 SATA drives will be detected by the  
system otherwise only one drive is detected.  
Once the system detect all 5 drives, use the SATARAID5  
array manager or Windows RAID software utility to  
configure the RAID volume.  
d.  
Go to the operating system’s management utility to partition, format  
and mount the encrypted drives.  
IV. How to operate the Cipher tower after initial setup  
1.  
Insert the AES 256-bit cipher key into the cipher keyhole located at  
the front of the Cipher tower.  
2.  
Power on the Cipher tower. Observed that the green Cipher power  
LED at the front of the Cipher tower is on. If not, reinsert the cipher  
key and re-power the Cipher tower.  
3.  
4.  
Use the system’s File Explorer to access the files on the encrypted  
drive.  
For security purposes, remove the cipher keys from the Cipher  
tower after the drives are detected by the system. All the files being  
transferred into the drives are still encrypted even if the cipher key is  
removed.  
5.  
When the Cipher tower is restarted, the cipher key must be inserted  
again in order to gain access to the drives.  
Technical Support (M-F 8:30am - 6:00pm PST)  
Phone: 408-453-6212  

HP Hewlett Packard HP Pavilion LED LCD Monitor XP599AAABA User Manual
GE 21018 User Manual
FieldServer A Sierra Monitor Company FS 8700 122 User Manual
Envision Peripherals EN7410e User Manual
Electrolux EN 64 TM User Manual
Dell S2340M 23 293M3 User Manual
Creative Labs 3D BLASTER ANNIHILATOR 2 MX GB0050 User Manual
ClearOne comm MAX Wireless 910 158 007 User Manual
Clarion VMA6492 User Manual
Asus MOTHERBOARD P5N64 WS User Manual