Addonics Technologies CRC4HESU Merkblatt

Seite von 2
 
ADDONICS TECHNOLOGIES 
Model: CRC4HESU 
 
IMPORTANT  
There is no back door for the Cipher tower encrypted hard 
drives if the Cipher keys are lost or stolen.  
 
Cipher key 
Check to make sure you have the 
correct version of the Cipher key. A 
sample key is shown 
 
Black label AES-256 stands for 
Cipher 256-bit key. 
 
To ensure there is a spare key, your Cipher tower comes with     
4 pairs of Cipher keys. These cipher keys have all identical 
encryption code unless you requested then to be coded 
differently. One of these keys should be kept in a safe and 
secure location and can be sent back to Addonics for duplicating 
additional keys. If you are down to the last key, be sure to make 
a back up of all the data stored inside your Cipher tower prior to 
sending the last key to Addonics. Addonics is not responsible for 
key lost in the mail or retrieval of the data inside the encrypted 
hard drive. 
 
 
 
Keeping track of the hard drive 
 
 
If you are using the Cipher tower to encrypt multiple hard drives, 
it is important to label your hard drive if you are taking the drive 
out of the Cipher tower.  The hard drive from the Cipher tower 
that is encrypted will look like a brand new drive when attach 
directly to the SATA controller of a computer. There will be no 
partition or any hint to indicate that the drive contains encrypted 
data.  When the drive is partitioned, all the encrypted data will be 
lost.  
 
The same holds true if a hard drive already has data on it is 
installed into the Cipher tower. The computer detects the hard 
drive as a brand new drive or a drive that is unallocated. Once 
you proceed to partition the drive, the data that was on the hard 
drive will be erased and cannot be recovered.  
 
 
 
I. 
Installing drives into the Cipher Tower 
 
Refer to Ruby Cipher enclosure hard drive installation guide 
 
Open the front panel of the Cipher 
tower. 
 
Slide the enclosure into the drive bay.  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
A switch located on the left hand side of the Ruby Cipher 
enclosure front panel must be placed to the “INT” position. This 
will secure the enclosure and provide power to the drive. 
 
 
 
Switch 
 
 
 
 
 
 
 
Note:  
It is recommended to fill up the tower with SATA drives 
from top to bottom. This is to help in identifying which drives 
connect to which ports for easier troubleshooting. 
 
 
 
II.  Connecting the power cable and Cipher Tower to the 
computer 
 
a.  Connect the power cord provided from the wall outlet to the 
back of the Cipher Tower. 
b.  A power switch is located on the front of the tower. Make 
sure the power is off on the switch (power LED light should 
be off) 
c. 
Connect the provided eSATA or USB2.0 cable from the back 
of the Cipher tower to the eSATA or USB2.0 on the 
computer. We recommend connecting the eSATA port for 
best performance if this port is available on your computer. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Power LED and 
Drive Access LED 
Cipher keyhole 
Power 
Switch 
(LED 4) 
HPM 
Health 
(LED 2) 
USB  
Status  
 
Power 
LED 
RAID  
setting  
button 
USB port 
eSATA port 
RAID config  
rotary switch 
(LED 3) 
HPM 
Power 
(LED 1) 
eSATA 
Status