Addonics Technologies CRC4HESU Computer Accessories User Manual


 
ADDONICS TECHNOLOGIES
Model: CRC4HESU
IMPORTANT
There is no back door for the Cipher tower encrypted hard
drives if the Cipher keys are lost or stolen.
Cipher key
Check to make sure you have the
correct version of the Cipher key. A
sample key is shown
Black label AES-256 stands for
Cipher 256-bit key.
To ensure there is a spare key, your Cipher tower comes with
4 pairs of Cipher keys. These cipher keys have all identical
encryption code unless you requested then to be coded
differently. One of these keys should be kept in a safe and
secure location and can be sent back to Addonics for duplicating
additional keys. If you are down to the last key, be sure to make
a back up of all the data stored inside your Cipher tower prior to
sending the last key to Addonics. Addonics is not responsible for
key lost in the mail or retrieval of the data inside the encrypted
hard drive.
Keeping track of the hard drive
If you are using the Cipher tower to encrypt multiple hard drives,
it is important to label your hard drive if you are taking the drive
out of the Cipher tower. The hard drive from the Cipher tower
that is encrypted will look like a brand new drive when attach
directly to the SATA controller of a computer. There will be no
partition or any hint to indicate that the drive contains encrypted
data. When the drive is partitioned, all the encrypted data will be
lost.
The same holds true if a hard drive already has data on it is
installed into the Cipher tower. The computer detects the hard
drive as a brand new drive or a drive that is unallocated. Once
you proceed to partition the drive, the data that was on the hard
drive will be erased and cannot be recovered.
I. Installing drives into the Cipher Tower
Refer to Ruby Cipher enclosure hard drive installation guide
Open the front panel of the Cipher
tower.
Slide the enclosure into the drive bay.
A switch located on the left hand side of the Ruby Cipher
enclosure front panel must be placed to the “INT” position. This
will secure the enclosure and provide power to the drive.
Sw
itch
Note: It is recommen
ded to fill up the tower with SATA drives
from top to bottom. This is to help in identifying which drives
connect to which ports for easier troubleshooting.
II. Connecting the power cable and Cipher Tower to the
co
mputer
a. Connect the power cord provided from the wall outlet to the
back of the Cipher Tower.
b. A power switch is located on the front of the tower. Make
sure the power is off on the switch (power LED light should
be off)
c. Connect the provided eSATA or USB2.0 cable from the back
of the Cipher tower to the eSATA or USB2.0 on the
computer. We recommend connecting the eSATA port for
best performance if this port is available on your computer.
Power LED and
Drive Access LED
Cipher keyhole
Power
Switch
(LED 4)
HPM
Health
(LED 2)
USB
Status
Pow
er
LED
R
AID
setting
button
USB port
eSATA port
RAID config
rotary switch
(LED 3)
HPM
Pow
er
(LED 1)
eSATA
Status