HSM CMN4000R, CMN3000R manual Care and Maintenance, Recommended Preventative Maintenance Schedule

Page 14

CARE AND MAINTENANCE

This device is designed to be maintenance-free. It can be cleaned with a damp cloth or nonabrasive cleanser.

WARNING: Do not use ACETONE-BASE cleaning solutions. Keep cleaning solutions out of the electrical receptacles on this device.

Be sure filters, vents and fans are kept free from accumulation of dust, dirt or lint. Below is a simple maintenance schedule that will assist you in keeping the system at its peak level of performance and also minimizing potential premature failures.

Your system contains sealed maintenance-free batteries. When situated in the proper environment, with the proper charging and limited cycling, these batteries can last many years.

WARNING: Never attempt to service batteries. High voltage exists within the unit which could cause electrical shock. Servicing of batteries should be performed or supervised by personnel knowledgeable of batteries and the required precautions. Keep unauthorized personnel away from batteries. When replacing batteries, use the same number and type batteries.

CAUTION - Do not dispose of battery or batteries in a fire. The battery may explode.

CAUTION

!

RISK OF ELECTRIC

SHOCK DO NOT OPEN

T H E C O N T I N U O U S P O W E R C O M P A N Y

CAUTION - Do not open or mutilate the battery or batteries. Released electrolyte is harmful to the skin and eyes. It may be toxic.

CAUTION - A battery can present a risk of electrical shock and high short circuit current. The following precautions should be observed when working on batteries.

1.Remove watches, rings, or other metal objects.

2.Use tools with insulated handles.

3.Wear rubber gloves and boots.

4.Do not lay tools or metal parts on top of batteries.

5.Disconnect the charging source prior to connecting or disconnecting battery terminals.

6.Determine if the battery is inadvertently grounded. If inadvertently grounded, remove source of ground. Contact with any part of a grounded battery can result in electrical shock. The likelihood of such shock will be reduced if

such grounds are removed during installation and maintenance.

The internal rechargeable battery is recyclable. At the end of its useful life, under various state and local laws, it may be illegal to dispose of this battery into the municipal waste stream. Check with the factory for details in your area for recycling options or proper disposal.

RECOMMENDED PREVENTATIVE MAINTENANCE SCHEDULE

TIME

TASK

TOOLS REQ’D

INITIAL

Every 6 mo.

Test battery operation, check back-up time

None

 

Every 12 mo.

Thoroughly clean unit

Vacuum, brush

 

Every 42 mo.

Replace battery

3/8 Hex Nut Driver

 

Every 72 mo.

Replace cooling fans

Screwdriver

 

 

 

 

 

Page 14

Image 14
Contents Owner’s Operating Manual Model CoveredTable of Contents Important Safety Instructions IntroductionTechnical Description ContactsSimplified System Interconnect Packaging Physical Description Rackmount Front Panel ViewRackmount Rear Panel View Summary of Indicators and Controls Installation OptionsOperation Normal Operation on AC Start-UpSignals and Interfacing Specifications Electrical DesignCare and Maintenance Recommended Preventative Maintenance ScheduleService and Repair Clary Corporation 150 E. Huntington Dr. Monrovia, CA 91016Clary Corporation Limited Warranty

CMN4000R, CMN3000R specifications

The HSM CMN3000R and CMN4000R are advanced data security solutions designed for organizations that require high levels of data protection and compliance. Both models are part of HSM's larger portfolio of hardware security modules (HSMs) that ensure the confidentiality, integrity, and availability of sensitive information.

One of the most notable features of the CMN3000R and CMN4000R is their robust encryption capabilities. These devices support a variety of encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), and ECC (Elliptic Curve Cryptography). This flexibility allows organizations to choose the encryption standards that best meet their security needs, ensuring strong data protection against unauthorized access.

Both models are equipped with HSM's cutting-edge key management technology. This includes secure key generation, distribution, storage, and destruction, ensuring the lifecycle of cryptographic keys is managed securely. The modules are designed to comply with global security standards such as FIPS 140-2 Level 3, ensuring they meet stringent regulatory and industry requirements.

Another prominent feature of the HSM CMN3000R and CMN4000R is their high availability options, which support redundant setups and failover capabilities. This ensures that critical security operations can continue uninterrupted, even in the event of hardware failure. This is particularly important for organizations that rely on real-time data encryption and decryption for operational continuity.

The devices also boast impressive performance metrics. The CMN4000R, in particular, is designed to handle high throughput, with the ability to process thousands of cryptographic operations per second, making it ideal for large-scale applications where speed is essential.

In terms of connectivity, both models feature multiple interfaces including USB, Ethernet, and serial options, allowing them to integrate seamlessly with existing infrastructures. This adaptability enables organizations to deploy the HSMs in a variety of environments, whether on-premises or in cloud-based systems.

Additionally, the CMN3000R and CMN4000R provide strong physical security features such as tamper-evident sealing and hardware-based protection against physical attacks, safeguarding against unauthorized access to the device itself.

In conclusion, the HSM CMN3000R and CMN4000R represent cutting-edge solutions for organizations determined to bolster their data security posture. With their comprehensive encryption capabilities, advanced key management, high availability options, impressive performance, and robust physical security features, these HSMs stand out as essential tools in the fight against data breaches and cyber threats.