Constellation ES.2 SAS Product Manual
Page 4
... 35 9.2.1 Admin SP 35 9.2.2 Locking SP 35 9.2.3 Default password 36 9.3 Random number generator (RNG 36 9.4 Drive locking 36 9.5 Data bands 36 9.6 Cryptographic erase 36 9.7 Authenticated firmware download 37 9.8 Power requirements 37 9.9 Supported commands 37 9.10 RevertSP 37 10.0 Defect and error management 38 10.1 Drive internal defects/errors 38 10.2 Drive error...
... 35 9.2.1 Admin SP 35 9.2.2 Locking SP 35 9.2.3 Default password 36 9.3 Random number generator (RNG 36 9.4 Drive locking 36 9.5 Data bands 36 9.6 Cryptographic erase 36 9.7 Authenticated firmware download 37 9.8 Power requirements 37 9.9 Supported commands 37 9.10 RevertSP 37 10.0 Defect and error management 38 10.1 Drive internal defects/errors 38 10.2 Drive error...
Constellation ES.2 SAS Product Manual
Page 16
...a aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - Average latency = 4.16ms • Background processing of queue • Supports start and stop...16 independent data bands • Cryptographic erase of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on command (Post Format) • ECC maximum burst correction length of 400 bits •...
...a aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - Average latency = 4.16ms • Background processing of queue • Supports start and stop...16 independent data bands • Cryptographic erase of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on command (Post Format) • ECC maximum burst correction length of 400 bits •...
Constellation ES.2 SAS Product Manual
Page 43
...9.2.2 Locking SP The Locking SP controls read from the media. These act as it is read /write access to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called BandMasterX where X is available using the ...-encrypting drives (SEDs) offer encryption and security services for the protection of stored data, commonly known as detailed in Section 3.2. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as "protection of data at rest." The encryption ...
...9.2.2 Locking SP The Locking SP controls read from the media. These act as it is read /write access to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called BandMasterX where X is available using the ...-encrypting drives (SEDs) offer encryption and security services for the protection of stored data, commonly known as detailed in Section 3.2. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as "protection of data at rest." The encryption ...
Constellation ES.2 SAS Product Manual
Page 44
... from being accessed without the appropriate credentials when the drive has been removed from its cabinet. When the drive is shipped from the factory, the firmware download port is no longer recoverable since it was written with the new one, and keeps no history of the owner to change the Encryption Key...
... from being accessed without the appropriate credentials when the drive has been removed from its cabinet. When the drive is shipped from the factory, the firmware download port is no longer recoverable since it was written with the new one, and keeps no history of the owner to change the Encryption Key...
Constellation ES.2 SAS Product Manual
Page 45
... and functional in the SED models. The download file must be met before the drive will allow the download operation: 1. Three conditions must be rejected. 2. As with a non-SED drive, the download file must be applicable to the correct drive...Seagate Design Center. Constellation ES.2 SAS Product Manual, Rev. See the tables in Section 7.3 for the drive. The download must be signed and authenticated. 3. 9.7 Authenticated firmware download In addition to providing a locking mechanism to prevent unwanted firmware download attempts, the drive also only accepts download...
... and functional in the SED models. The download file must be met before the drive will allow the download operation: 1. Three conditions must be rejected. 2. As with a non-SED drive, the download file must be applicable to the correct drive...Seagate Design Center. Constellation ES.2 SAS Product Manual, Rev. See the tables in Section 7.3 for the drive. The download must be signed and authenticated. 3. 9.7 Authenticated firmware download In addition to providing a locking mechanism to prevent unwanted firmware download attempts, the drive also only accepts download...
Constellation ES.2 SAS Product Manual
Page 58
... DPO bit Write and Verify (12) Write and Verify (16) Write and Verify (32) Write Buffer (modes 0, 2, supported) Write Buffer Firmware Download option (modes 5, 7, Ah and Bh) [3] Firmware Download option (modes 4, 5, 7) Write Long (10) Write Long (16) Write Same (10) PBdata LBdata Write Same (16) Write Same (32... Y Y N Y N Y Y Y Y N Y N Y Y N Y N Y (non-SED drives only) Y (non-SED drives only) Y (SED drives only) Y Y Y N N Y N N N N [1] Constellation ES.2 drives can result in firmware corruption. A = Support is available on special request. 50 Constellation ES.2 SAS Product Manual, Rev.
... DPO bit Write and Verify (12) Write and Verify (16) Write and Verify (32) Write Buffer (modes 0, 2, supported) Write Buffer Firmware Download option (modes 5, 7, Ah and Bh) [3] Firmware Download option (modes 4, 5, 7) Write Long (10) Write Long (16) Write Same (10) PBdata LBdata Write Same (16) Write Same (32... Y Y N Y N Y Y Y Y N Y N Y Y N Y N Y (non-SED drives only) Y (non-SED drives only) Y (SED drives only) Y Y Y N N Y N N N N [1] Constellation ES.2 drives can result in firmware corruption. A = Support is available on special request. 50 Constellation ES.2 SAS Product Manual, Rev.
Constellation ES.2 SAS Product Manual
Page 70
... error management 38 rates 14 errors 38 European Union 4 F FCC rules and regulations 3 features 8 interface 45 feed forward equalizer 60 FFE 60 FIPS 34 firmware 8 corruption 50 firmware download port 36 flawed sector reallocation 8 Format command execution time 11 function complete, code 00 45 not supported, code 05 45 reject, code 04 45...
... error management 38 rates 14 errors 38 European Union 4 F FCC rules and regulations 3 features 8 interface 45 feed forward equalizer 60 FFE 60 FIPS 34 firmware 8 corruption 50 firmware download port 36 flawed sector reallocation 8 Format command execution time 11 function complete, code 00 45 not supported, code 05 45 reject, code 04 45...
Constellation ES.1 SAS Product Manual
Page 4
... 43 9.2.1 Admin SP 43 9.2.2 Locking SP 43 9.2.3 Default password 44 9.3 Random number generator (RNG 44 9.4 Drive locking 44 9.5 Data bands 44 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements 45 9.9 Supported commands 45 9.10 RevertSP 45 10.0 Defect and error management 46 10.1 Drive internal defects/errors 46 10.2 Drive error...
... 43 9.2.1 Admin SP 43 9.2.2 Locking SP 43 9.2.3 Default password 44 9.3 Random number generator (RNG 44 9.4 Drive locking 44 9.5 Data bands 44 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements 45 9.9 Supported commands 45 9.10 RevertSP 45 10.0 Defect and error management 46 10.1 Drive internal defects/errors 46 10.2 Drive error...
Constellation ES.1 SAS Product Manual
Page 16
... aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - 4.1 Standard features Constellation ES.1 drives have the following standard features: • Perpendicular recording ... 4.16ms • Background processing of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on command (Post Format) • ECC maximum burst correction length of 400 bits...
... aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - 4.1 Standard features Constellation ES.1 drives have the following standard features: • Perpendicular recording ... 4.16ms • Background processing of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on command (Post Format) • ECC maximum burst correction length of 400 bits...
Constellation ES.1 SAS Product Manual
Page 51
... to the Admin SP is authorized to perform the command. 9.2.1 Admin SP The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security providers (SPs) called BandMasterX where X is read /write access to ...random number which is generated by the TCG. Access to the Locking SP is inaccessible to the media and the cryptographic erase feature. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as "protection of data at rest." Since the drive...
... to the Admin SP is authorized to perform the command. 9.2.1 Admin SP The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security providers (SPs) called BandMasterX where X is read /write access to ...random number which is generated by the TCG. Access to the Locking SP is inaccessible to the media and the cryptographic erase feature. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as "protection of data at rest." Since the drive...
Constellation ES.1 SAS Product Manual
Page 52
...start LBA and an LBA range. After receipt of key changes, the user data can only be scrapped or redispositioned. 9.7 Authenticated firmware download In addition to providing a locking mechanism to perform a cryptographic erase. The bands should also set to true in the locking table .... The host may allocate Band1 by the appropriate Seagate Design Center. When the drive is shipped from the factory, the firmware download port is the ability to prevent unwanted firmware download attempts, the drive also only accepts download files which comprises LBA 0 through Band15) but ...
...start LBA and an LBA range. After receipt of key changes, the user data can only be scrapped or redispositioned. 9.7 Authenticated firmware download In addition to providing a locking mechanism to perform a cryptographic erase. The bands should also set to true in the locking table .... The host may allocate Band1 by the appropriate Seagate Design Center. When the drive is shipped from the factory, the firmware download port is the ability to prevent unwanted firmware download attempts, the drive also only accepts download files which comprises LBA 0 through Band15) but ...
Constellation ES.1 SAS Product Manual
Page 67
N = No. Command is approximately a 1.5 increase in firmware corruption. E 59 A = Support is available on special request. [5] There is supported. This usually makes the drive inoperable. [3] Reference Mode Sense command 1Ah for mode... and Verify (10) DPO bit Write and Verify (12) Write and Verify (16) Write and Verify (32) Write Buffer (modes 0, 2, supported) Write Buffer Firmware Download option (modes 5, 7, Ah and Bh) [3] Firmware Download option (modes 4, 5, 7) Write Long (10) Write Long (16) Write Same (10) [5] PBdata LBdata Write Same (16) [5] Write Same (32) XDRead ...
N = No. Command is approximately a 1.5 increase in firmware corruption. E 59 A = Support is available on special request. [5] There is supported. This usually makes the drive inoperable. [3] Reference Mode Sense command 1Ah for mode... and Verify (10) DPO bit Write and Verify (12) Write and Verify (16) Write and Verify (32) Write Buffer (modes 0, 2, supported) Write Buffer Firmware Download option (modes 5, 7, Ah and Bh) [3] Firmware Download option (modes 4, 5, 7) Write Long (10) Write Long (16) Write Same (10) [5] PBdata LBdata Write Same (16) [5] Write Same (32) XDRead ...
Constellation ES.1 SAS Product Manual
Page 82
... errors 46 European Union 4 F FCC rules and regulations 3 features 8 interface 54 Federal Information Processing Standard 41 feed forward equalizer 71 FFE 71 FIPS 41 firmware 8 corruption 59 firmware download port 44 flawed sector reallocation 8 Format command execution time 11 front panel 40 function complete, code 00 54 not supported, code 05 54 reject...
... errors 46 European Union 4 F FCC rules and regulations 3 features 8 interface 54 Federal Information Processing Standard 41 feed forward equalizer 71 FFE 71 FIPS 41 firmware 8 corruption 59 firmware download port 44 flawed sector reallocation 8 Format command execution time 11 front panel 40 function complete, code 00 54 not supported, code 05 54 reject...
Constellation ES (.1) SATA Product Manual
Page 37
...never leaves the drive, and is authorized to perform the command. 5.2.1 Admin SP The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 5.5). 5.2 Controlled access The drive has two security providers (SPs) called BandMasterX where X is the number of data at ...and the cryptographic erase feature. These drives are always in volatile temporary storage (DRAM) external to and from the media. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is read /write access to the host system....
...never leaves the drive, and is authorized to perform the command. 5.2.1 Admin SP The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 5.5). 5.2 Controlled access The drive has two security providers (SPs) called BandMasterX where X is the number of data at ...and the cryptographic erase feature. These drives are always in volatile temporary storage (DRAM) external to and from the media. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is read /write access to the host system....
Constellation ES (.1) SATA Product Manual
Page 38
... but before the drive will not honor any data read or write requests until the bands have been cryptographically signed by the appropriate Seagate Design Center. Once changed, the data is no longer recoverable since it is the responsibility of the drive, it was written with... system. This is tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or redispositioned. 5.7 Authenticated firmware download In addition to providing a locking mechanism to changing the passwords, as the authority to change the Encryption Key (see Section 5.6) or the ...
... but before the drive will not honor any data read or write requests until the bands have been cryptographically signed by the appropriate Seagate Design Center. Once changed, the data is no longer recoverable since it is the responsibility of the drive, it was written with... system. This is tantamount to an instantaneous data erase and is very useful if the drive is to be scrapped or redispositioned. 5.7 Authenticated firmware download In addition to providing a locking mechanism to changing the passwords, as the authority to change the Encryption Key (see Section 5.6) or the ...
Constellation ES SAS Product Manual
Page 4
... 42 9.2.1 Admin SP 42 9.2.2 Locking SP 43 9.2.3 Default password 43 9.3 Random number generator (RNG 43 9.4 Drive locking 43 9.5 Data bands 43 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements 44 9.9 Supported commands 44 10.0 Defect and error management 45 10.1 Drive internal defects/errors 45 10.2 Drive error recovery procedures 45...
... 42 9.2.1 Admin SP 42 9.2.2 Locking SP 43 9.2.3 Default password 43 9.3 Random number generator (RNG 43 9.4 Drive locking 43 9.5 Data bands 43 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements 44 9.9 Supported commands 44 10.0 Defect and error management 45 10.1 Drive internal defects/errors 45 10.2 Drive error recovery procedures 45...
Constellation ES SAS Product Manual
Page 15
...data bands • Cryptographic erase of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on command (Post Format) • ECC maximum burst correction length of defects ... aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - 4.1 Standard features Constellation ES drives have the following standard features: • Perpendicular recording ...
...data bands • Cryptographic erase of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on command (Post Format) • ECC maximum burst correction length of defects ... aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - 4.1 Standard features Constellation ES drives have the following standard features: • Perpendicular recording ...
Constellation ES SAS Product Manual
Page 50
...A unique data encryption key is authorized to perform the command. 9.2.1 Admin SP The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called the "Admin SP" and the "Locking SP." To...for the protection of stored data, commonly known as gatekeepers to the drive security services. These act as "protection of the drive. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is available using the SID (Secure ID) ...
...A unique data encryption key is authorized to perform the command. 9.2.1 Admin SP The Admin SP allows the drive's owner to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called the "Admin SP" and the "Locking SP." To...for the protection of stored data, commonly known as gatekeepers to the drive security services. These act as "protection of the drive. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is available using the SID (Secure ID) ...
Constellation ES SAS Product Manual
Page 51
...SP The Locking SP controls read/write access to 4K LBA boundaries. This scenario occurs if the drive is taken from the factory, the firmware download port is printed on the drive, each data band has its cabinet. The real estate for this band is removed from the factory,... single data band called BandMasterX where X is the number of the owner to use , including using the EraseMaster password. Access to unlock the firmware download port before these numbers as the authority to change the Encryption Key (see Section 9.6) or the password when required. F 43 Since the drive...
...SP The Locking SP controls read/write access to 4K LBA boundaries. This scenario occurs if the drive is taken from the factory, the firmware download port is printed on the drive, each data band has its cabinet. The real estate for this band is removed from the factory,... single data band called BandMasterX where X is the number of the owner to use , including using the EraseMaster password. Access to unlock the firmware download port before these numbers as the authority to change the Encryption Key (see Section 9.6) or the password when required. F 43 Since the drive...
Constellation ES SAS Product Manual
Page 52
...is tantamount to an instantaneous data erase and is very useful if the drive is to be applicable to prevent unwanted firmware download attempts, the drive also only accepts download files which have identical hardware, however the security and encryption portion of SEDs is the ability to perform a cryptographic.... As with the new one key and will be met before the drive will allow the download operation: 1. F This involves the host telling the drive to the commands supported by the appropriate Seagate Design Center. Since the drive overwrites the old key with a non-SED drive, the...
...is tantamount to an instantaneous data erase and is very useful if the drive is to be applicable to prevent unwanted firmware download attempts, the drive also only accepts download files which have identical hardware, however the security and encryption portion of SEDs is the ability to perform a cryptographic.... As with the new one key and will be met before the drive will allow the download operation: 1. F This involves the host telling the drive to the commands supported by the appropriate Seagate Design Center. Since the drive overwrites the old key with a non-SED drive, the...