
ADDONICS TECHNOLOGIES 
Model: CRT235SMH 
IMPORTANT
There is no back door for the Cipher tower encrypted hard 
drives if the Cipher keys are lost or stolen. 
Cipher key 
Check to make sure you have the 
correct version of the Cipher key. A 
sample key is shown 
Black label AES-256 stands for 
Cipher 256-bit key. 
To ensure there is a spare key, your Cipher tower comes with   
2 pairs of Cipher keys. These cipher keys have all identical 
encryption code unless you requested then to be coded 
differently. One of these keys should be kept in a safe and 
secure location and can be sent back to Addonics for duplicating 
additional keys. If you are down to the last key, be sure to make 
a back up of all the data stored inside your Cipher tower prior to 
sending the last key to Addonics. Addonics is not responsible for 
key lost in the mail or retrieval of the data inside the encrypted 
hard drive. 
Keeping track of the hard drive  
If you are using the Cipher tower to encrypt multiple hard drives, 
it is important to label your hard drive if you are taking the drive 
out of the Cipher tower. The hard drive from the Cipher tower 
that is encrypted will look like a brand new drive when attach 
directly to the SATA controller of a computer. There will be no 
partition or any hint to indicate that the drive contains encrypted 
data. When the drive is partitioned, all the encrypted data will be 
lost. 
The same holds true if a hard drive already has data on it is 
installed into the Cipher tower. The computer detects the hard 
drive as a brand new drive or a drive that is unallocated. Once 
you proceed to partition the drive, the data that was on the hard 
drive will be erased and cannot be recovered. 
I.  Installing drives into the Cipher Tower 
Step 1 
3.5” SATA hard drive, slide the 
Using 
drive into the drive bay. Close the 
front panel and using the key 
provided, turn the key lock to the Lock 
position. This will secure the drive and 
turn on the power to the hard drive. 
Note: It is recommended to fill up the Cipher tower with SATA 
drives from top to bottom. This is to help in identifying which 
drives connect to which ports for easier troubleshooting. 
II. Connecting the power cable and Cipher Tower to the 
mputer 
co
a. Connect the power cord provided from the wall outlet to the 
back of the Cipher Tower. 
b. A power switch is located on the front of the tower. Make 
sure the power is off on the switch (power LED light should 
be off) 
c. 
Connect the provided eSATA or USB2.0 cable from the back 
of the Cipher tower to the eSATA or USB2.0 on the 
computer. We recommend connecting the eSATA port for 
best performance if this port is available on your computer. 
Power 
Switch 
er 
Pow 
LED 
Drive 1 
Activ
ity 
LED 
HDD LED 
eSATA port 
Cipher 
key
hole 
USB port 
Cipher 
Pow
RAID 
Health 
USB 
Access 
eSATA  
Access 
Drive 2 
Activity 
LED 
 LED Inf
ormation: 
Power LED:        When power switch is turned on, the green 
           LED lights up. 
Drive 1 Activity LED: When there is drive activity, the LED 
           blinks. 
Drive 2 Activity LED: When there is drive activity, the LED 
           blinks. 
eSATA Access LE D : W hen eSATA port is used to connect to a 
           system, the LED lights up. 
USB Access LED:   When USB port is used to connect to a 
           system, the LED lights up. 
RAID Health LED:   When the RAID volume fails, the LED 
           blinks. 
RAID config  
rotary switch 
Cipher 
keyhole 
RAID  
setting  
button 
er LED

ADDONICS TECHNOLOGIES 
Model: CRT235SMH 
III. Initial RAID setup of the Cipher tower: 
a. Insert the AES 256-bit cipher keys into the two cipher 
keyholes located at the back of the Cipher tower. 
b. Set the Rotary switch to the RAID configuration required. 
c. Push the RAID Setting button whil e the Cipher tower is 
turned off.  
d. While holding the RAID setting button, turn on the Cipher 
tower and continue to hold for at least 2 seconds to confirm 
RAID mode setting. 
e. Observed that the green Cipher power LEDs at the back of 
the Cipher tower are on. If they did not, reinsert the cipher 
keys and re-power the Cipher tower while holding the RAID 
setting button. 
f.  Check in the 57xx SteelVine Manager if the RAID 
configuration is correct. 
g. Go to the operating system’s management utility to partition, 
format and mount the encrypted drives. 
IV. How to operate the Cipher tower after initial setup 
1. Insert the AES 256-bit cipher keys into the two cipher 
keyholes located at the back of the Cipher tower. 
2. Push the power switch of the Cipher tower to turn it on. 
Observed that the green Cipher power LEDs at the back of 
the Cipher tower are on. If they did not, reinsert the cipher 
keys and re-power the Cipher tower. 
3.  Use the system’s File Explorer to access the files on the 
encrypted drive. 
4. For security purposes, remove the cipher keys from the 
Cipher tower after the drives are detected by the system. All 
the files being transferred into the drives are still encrypted 
even if the cipher key is removed. 
5. When the Cipher tower is restarted, the two cipher keys 
must be inserted again in order to gain access to the drives. 
V.  57xx SteelVine Manager utility installation for Cipher 
tower 
Note:  If you plan to monitor the status of your raid set, you 
need to install the Sil5744 SteelVine Manager on your system. 
Install the utility from the CD that came with your package. 
1. Turn computer ON. Insert Addonics Driver Disk into 
CDROM. 
2. The Addonics Technologies Driver Disk window pops up. 
3. Select Configuration Utilities. Sil5744 SteelVine Manager. To 
extract the utility select your operating system from the list. 
4. Extract the files into your system. 
5. Install SiI5744 Manager by clicking the 5700Package.msi. 
Follow the instructions. 
6. After software installation, restart your system off. 
The 57xx SteelVine Manager Utility manual can found in the 
Driver Disk under User Guides or can be downloaded from 
http://www.addonics.com/support/user_guides/host_controller/SiI 
57XX_Users_Guide_Rev_1.0.pdf 
Individual drive configuration: 
When the Cipher tower is connected to a SATA Host controller 
with SiI3124 or SiI3132 chip, the 2 SATA drives configured as 
JBOD would be detected by the system otherwise only one drive 
is detected. 
Best Practice: 
Create a label to identify the SATA hard drive and the associated 
Cipher key used. 
Technical Support 
Contact Information 
Phone:  408-573-8580   
Fax:  408-573-8588 
Email:  http://www.addonics.com/sales/query/ 
Internet:  http://www.addonics.com 
TECHNICAL SUPPORT 
Phone:  408-453-6212 
Hours:   8:30 am - 6:00 pm PST 
Email:        http://www.addonics.com/support/query/