III.Initial setup of the Cipher tower:
a.Insert the AES
b.Power on the Cipher tower. Observed that the green Cipher power LED at the front of the Cipher tower is on. If not, reinsert the cipher key and
c.Option of individual drive or raid volume configuration:
1.Individual drive configuration:
When the Cipher tower is connected to a eSATA Host controller with SiI3124 or SiI3132 chip (port multiplier compatible), the 5 SATA drives will be detected by the system otherwise only one drive is detected.
2.RAID volume configuration
When the Cipher tower is connected to a eSATA Host controller with SiI3124 or SiI3132 chip (port multiplier compatible), the 5 SATA drives will be detected by the system otherwise only one drive is detected.
Once the system detect all 5 drives, use the SATARAID5 array manager or Windows RAID software utility to configure the RAID volume.
d.Go to the operating system’s management utility to partition, format and mount the encrypted drives.
IV. How to operate the Cipher tower after initial setup
1.Insert the AES
2.Power on the Cipher tower. Observed that the green Cipher power LED at the front of the Cipher tower is on. If not, reinsert the cipher key and
3.Use the system’s File Explorer to access the files on the encrypted drive.
4.For security purposes, remove the cipher keys from the Cipher tower after the drives are detected by the system. All the files being transferred into the drives are still encrypted even if the cipher key is removed.
5.When the Cipher tower is restarted, the cipher key must be inserted again in order to gain access to the drives.
www.addonics.com
Technical Support | Phone: | Email: www.addonics.com/support/query/ |