Addonics Technologies Computer Drive CDC5HXAES User Manual

ADDONICS TECHNOLOGIES  
Model: CDC5HXAES  
IMPORTANT  
Cipher  
keyhole  
There is no back door for the Cipher tower encrypted hard drives if  
the Cipher keys are lost or stolen.  
Locking  
mechanism  
HDD  
Power LED  
Cipher key  
Check to make sure you have the  
correct version of the Cipher key. A  
sample key is shown  
HDD  
Activity LED  
Black label AES-256 stands for Cipher  
256-bit key.  
To ensure there is a spare key, your Cipher tower comes with 5 pairs of  
Cipher keys. These cipher keys have all identical encryption code unless  
you requested then to be coded differently. One of these keys should be  
kept in a safe and secure location and can be sent back to Addonics for  
duplicating additional keys. If you are down to the last key, be sure to  
make a back up of all the data stored inside your Cipher tower prior to  
sending the last key to Addonics. Addonics is not responsible for key lost  
in the mail or retrieval of the data inside the encrypted hard drive.  
Power Switch  
Cipher tower power LED  
HDD Activity LED 1  
HDD Activity LED 2  
HDD Activity LED 3  
HDD Activity LED 4  
HDD Activity LED 5  
Keeping track of the hard drive  
If you are using the Cipher tower to encrypt multiple hard drives, it is  
important to label your hard drive if you are taking the drive out of the  
Cipher tower. The hard drive from the Cipher tower that is encrypted will  
look like a brand new drive when attach directly to the SATA controller of  
a computer. There will be no partition or any hint to indicate that the drive  
contains encrypted data. When the drive is partitioned, all the encrypted  
data will be lost.  
eSATA port  
The same holds true if a hard drive already has data on it is installed into  
the Cipher tower. The computer detects the hard drive as a brand new  
drive or a drive that is unallocated. Once you proceed to partition the  
drive, the data that was on the hard drive will be erased and cannot be  
recovered.  
Power Connector  
Power Switch  
I.  
Installing drives into the Cipher Tower  
Refer to Diamond Cipher enclosure hard drive installation guide  
III. 5-port HPM-XA mounted on the Cipher Tower  
Slide the enclosure into the drive bay.  
Using the key provided, insert it to the lock  
mechanism and turn it to the “LOCK”  
position. This will secure the enclosure and  
provide power to the drive.  
eSATA host port  
Floppy power  
connector  
Note: It is recommended to fill up the tower  
with SATA drives from top to bottom. This  
is to help in identifying which drives  
connects to which ports for easier  
troubleshooting.  
buzzer  
SATA port 5  
SATA port 4  
SATA port 1  
RAID settting  
jumper block (J4)  
II. Connecting the power cable and Cipher Tower to the computer  
a. Connect the power cord provided from the wall outlet to the back of  
the Cipher Tower.  
SATA port 3  
SATA port 2  
Error and drive activity  
LED jumper block (J1, J3)  
b. A power switch is located on the front of the tower. Make sure the  
power is off on the switch (power LED light should be off)  
c. Connect the provided eSATA or USB2.0 cable from the back of the  
Cipher tower to the eSATA or USB2.0 on the computer. We  
recommend connecting the eSATA port for best performance if this  
port is available on your computer.  
 
ADDONICS TECHNOLOGIES  
Model: CDC5HXAES  
All settings on the diagram shows  
RAID mode setting modification is ENAABLED (SET)  
Error buzzer function is DISABLED (BZS)  
Note: On this setting, there is no jumper on SET.  
RAID Setting Notes:  
When 2 drives are connected to the  
HPM-XA, and J4 is set to this setting,  
the 2 drives will be configured as a  
2-drive RAID1 array.  
When 4 drives are connected to the  
HPM-XA, the 4 drives will be  
configured as a 4-drive RAID10 array.  
Clone’s action is similar to RAID1.  
However, all of the hard drives will be  
mirrored. Clone mode is useful  
especially when users like to copy  
data from a source hard drive to the  
drives connected to the HPM-XA.  
Notes on Spare Drives  
Using the Easy RAID Setting (EZ)  
7. Power on the Cipher Tower.  
In reference to the diagram, the auto-rebuilding to spare drive is  
ENABLED (EZ)  
8. Verify if the RAID array is detected by the system  
a. If the 5-port HPM-XA is connected to the motherboard onboard  
SATA, on the CMOS setup utility, the raid array will display as  
“Addonics H/W RAID5” if setup as a RAID5 array.  
b. If the 5-port HPM-XA is connected to an eSATA host controller  
card, on the RAID BIOS, the raid array will display as  
“Addonics H/W RAID0” if setup as a RAID0 array.  
c. If booted into Windows, in Disk Drives under Device Manager,  
the raid array will display as “Addonics H/W LARGE” if setup as  
a RAID0 array.  
When EZ mode is ENABLED, the degraded RAID group will start  
rebuilding automatically by using the existing spare drive.  
* Spare drive can be either plugged before RAID building or a new drive  
can be plug as the spare drive when RAID rebuild is required.  
A. Which port acts as a spare drive?  
The last drive will automatically become the spare drive.  
9. Once raid array is verified, you can set back the RAID jumper setting  
back to default  
For a 3-drive RAID5 with spare:  
Drives connected to SATA ports 1~3 belong to the active RAID5 array  
and drive connected to port 4 is the spare.  
For a 4-drive RAID10 with spare:  
Drives connected to SATA ports 1~4 belong to the active RAID10 array  
and drive connected to port 5 is the spare.  
For a 2-drive RAID1 with spare:  
Drives connected to SATA ports 1& 4 belong to the active RAID1 array  
and drive connected to port 5 is the spare.  
or the diagram below where buzzer is ENABLED.  
B. When will rebuild action start?  
When the raid fails and EZ is enabled, the HPM-XA will  
automatically rebuild the RAID group using the spare.  
When the raid fails and EZ is disabled, the HPM-XA will NOT rebuild the  
raid group unless you install a good drive to replace the failed drive.  
 
ADDONICS TECHNOLOGIES  
Model: CDC5HXAES  
III. How to operate the Cipher tower after initial setup  
1. Insert the 5 AES 256-bit cipher keys into each cipher keyhole on the  
Diamond Cipher enclosures located at the front of the Cipher tower.  
2. Push the power switch of the Cipher tower to turn it on. Observed  
that the green Cipher power LEDs at the front of the Cipher tower  
are on. If they did not, reinsert the cipher keys and re-power the  
Cipher tower.  
3.  
Use the system’s File Explorer to access the files on the encrypted  
drive.  
4. For security purposes, remove the cipher keys from the Cipher  
tower after the drives are detected by the system. All the files being  
transferred into the drives are still encrypted even if the cipher key is  
removed.  
5. When the Cipher tower is restarted, the 4 cipher keys must be  
inserted again in order to gain access to the drives.  
Best Practice:  
Create a label to identify the SATA hard drive and the associated Cipher  
key used.  
TECHNICAL SUPPORT  
Phone:  
Hours:  
Email:  
408-453-6212  
8:30 am - 6:00 pm PST  
 

6 948RE ML 135223 00G48 960RE ML 135224 00G60 User Manual
Acer Tablet P31314602 User Manual
Agri Fab Spreader 45 02141 User Manual
Airfree Air Cleaner Enviro 60 User Manual
Airlink101 Network Card AWLL5026 User Manual
Amana Range AER5522VCW User Manual
Amerec Stove PKLE 181 User Manual
ATO Speaker System Professional Series User Manual
Axis Communications Intercom System A8004 VE User Manual
Bakers Pride Oven Oven 4151 User Manual