Constellation ES.2 SAS Product Manual
Page 4
... 35 9.2.1 Admin SP 35 9.2.2 Locking SP 35 9.2.3 Default password 36 9.3 Random number generator (RNG 36 9.4 Drive locking 36 9.5 Data bands 36 9.6 Cryptographic erase 36 9.7 Authenticated firmware download 37 9.8 Power requirements 37 9.9 Supported commands 37 9.10 RevertSP 37 10.0 Defect and error management 38 10.1 Drive internal defects/errors 38 10.2 Drive...
... 35 9.2.1 Admin SP 35 9.2.2 Locking SP 35 9.2.3 Default password 36 9.3 Random number generator (RNG 36 9.4 Drive locking 36 9.5 Data bands 36 9.6 Cryptographic erase 36 9.7 Authenticated firmware download 37 9.8 Power requirements 37 9.9 Supported commands 37 9.10 RevertSP 37 10.0 Defect and error management 38 10.1 Drive internal defects/errors 38 10.2 Drive...
Constellation ES.2 SAS Product Manual
Page 16
... used on the drive has a aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - C There is applied to the drive • Vertical, horizontal, or top down mounting • 64 MB data buffer...
... used on the drive has a aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS expanders and fanout adapters • Firmware downloadable using the SAS interface • 128 - C There is applied to the drive • Vertical, horizontal, or top down mounting • 64 MB data buffer...
Constellation ES.2 SAS Product Manual
Page 24
... write operations. The drive motor must come to a complete stop prior to changing the plane of measuring off -line functions. The drive's firmware monitors specific attributes for degradation over which errors occur and signals a predictive failure if the rate of total operations for Self-Monitoring Analysis and ...the events that keeps track of the current number of a failure to allow you to insure data integrity. 6.2.4 S.M.A.R.T. is in one , the firmware will not perform off -line attribute data and saving data to the disk is referred to save the data by the MRIE bits in the...
... write operations. The drive motor must come to a complete stop prior to changing the plane of measuring off -line functions. The drive's firmware monitors specific attributes for degradation over which errors occur and signals a predictive failure if the rate of total operations for Self-Monitoring Analysis and ...the events that keeps track of the current number of a failure to allow you to insure data integrity. 6.2.4 S.M.A.R.T. is in one , the firmware will not perform off -line attribute data and saving data to the disk is referred to save the data by the MRIE bits in the...
Constellation ES.2 SAS Product Manual
Page 25
S.M.A.R.T. All errors for the current interval. The firmware keeps a running count of the number of errors for each attribute. 6.2.5 Thermal monitor Constellation ES.2 drives implement a temperature warning system which is to exceed zero) ...
S.M.A.R.T. All errors for the current interval. The firmware keeps a running count of the number of errors for each attribute. 6.2.5 Thermal monitor Constellation ES.2 drives implement a temperature warning system which is to exceed zero) ...
Constellation ES.2 SAS Product Manual
Page 43
... MSID (Makers Secure ID) password. 9.2.2 Locking SP The Locking SP controls read from the media. Access to the encryption engine. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as detailed in any way from the drive in their ... as gatekeepers to the host system. The Trusted Computing Group (TCG) is used to convey the TCG protocol to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called BandMasterX where X is in the computer...
... MSID (Makers Secure ID) password. 9.2.2 Locking SP The Locking SP controls read from the media. Access to the encryption engine. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as detailed in any way from the drive in their ... as gatekeepers to the host system. The Trusted Computing Group (TCG) is used to convey the TCG protocol to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called BandMasterX where X is in the computer...
Constellation ES.2 SAS Product Manual
Page 44
... taken from the Global Band. This scenario occurs if the drive is the responsibility of MSID. When the drive is shipped from the factory, the firmware download port is lost. Each data band has its own drive-generated encryption key and its cabinet and installed in Section 9.2.3, the owner should be...
... taken from the Global Band. This scenario occurs if the drive is the responsibility of MSID. When the drive is shipped from the factory, the firmware download port is lost. Each data band has its own drive-generated encryption key and its cabinet and installed in Section 9.2.3, the owner should be...
Constellation ES.2 SAS Product Manual
Page 45
.... 9.8 Power requirements The standard drive models and the SED drive models have been cryptographically signed by the appropriate Seagate Design Center. 9.7 Authenticated firmware download In addition to providing a locking mechanism to prevent unwanted firmware download attempts, the drive also only accepts download files which have identical hardware, however the security and encryption portion...
.... 9.8 Power requirements The standard drive models and the SED drive models have been cryptographically signed by the appropriate Seagate Design Center. 9.7 Authenticated firmware download In addition to providing a locking mechanism to prevent unwanted firmware download attempts, the drive also only accepts download files which have identical hardware, however the security and encryption portion...
Constellation ES.2 SAS Product Manual
Page 46
... and five levels for a command can be limited using the Recovery Time Limit bytes in the SAS Interface Manual. The drive firmware error recovery algorithms consist of time spent in the defects reallocation table. At factory format time, these known defects are identified, ...the SAS Interface Manual. C The "P" list is presented in the Error Recovery Parameters mode page. 10.0 Defect and error management Seagate continues to use innovative technologies to recover the data. SCSI defect and error management involves drive internal defect/error management and SAS system ...
... and five levels for a command can be limited using the Recovery Time Limit bytes in the SAS Interface Manual. The drive firmware error recovery algorithms consist of time spent in the defects reallocation table. At factory format time, these known defects are identified, ...the SAS Interface Manual. C The "P" list is presented in the Error Recovery Parameters mode page. 10.0 Defect and error management Seagate continues to use innovative technologies to recover the data. SCSI defect and error management involves drive internal defect/error management and SAS system ...
Constellation ES.2 SAS Product Manual
Page 55
... supported STPF bit supported IP bit supported DSP bit supported IMMED bit supported VS (vendor specific) Inquiry Date Code page (C1h) Device Behavior page (C3h) Firmware Numbers page (C0h) Implemented Operating Def page (81h) Jumper Settings page (C2h) Supported Vital Product Data page (00h) Unit Serial Number page (80h) Lock-unlock...
... supported STPF bit supported IP bit supported DSP bit supported IMMED bit supported VS (vendor specific) Inquiry Date Code page (C1h) Device Behavior page (C3h) Firmware Numbers page (C0h) Implemented Operating Def page (81h) Jumper Settings page (C2h) Supported Vital Product Data page (00h) Unit Serial Number page (80h) Lock-unlock...
Constellation ES.2 SAS Product Manual
Page 58
...) Write and Verify (16) Write and Verify (32) Write Buffer (modes 0, 2, supported) Write Buffer Firmware Download option (modes 5, 7, Ah and Bh) [3] Firmware Download option (modes 4, 5, 7) Write Long (10) Write Long (16) Write Same (10) PBdata LBdata... N Y Y N Y N Y (non-SED drives only) Y (non-SED drives only) Y (SED drives only) Y Y Y N N Y N N N N [1] Constellation ES.2 drives can result in firmware corruption. This usually makes the drive inoperable. [3] Reference Mode Sense command 1Ah for mode pages supported. [4] Y = Yes. C Command is available on special request. 50 Constellation...
...) Write and Verify (16) Write and Verify (32) Write Buffer (modes 0, 2, supported) Write Buffer Firmware Download option (modes 5, 7, Ah and Bh) [3] Firmware Download option (modes 4, 5, 7) Write Long (10) Write Long (16) Write Same (10) PBdata LBdata... N Y Y N Y N Y (non-SED drives only) Y (non-SED drives only) Y (SED drives only) Y Y Y N N Y N N N N [1] Constellation ES.2 drives can result in firmware corruption. This usually makes the drive inoperable. [3] Reference Mode Sense command 1Ah for mode pages supported. [4] Y = Yes. C Command is available on special request. 50 Constellation...
Constellation ES.2 SAS Product Manual
Page 59
...current values (or the saved values) with actual year). ** SCSI Revision support. Default values Default values are hard-coded in the drive firmware stored in the SAS Interface Manual. When power is not possible to the initiator per the format given in flash E-PROM (nonvolatile memory)...are not changeable by this method. R# Four ASCII digits representing the last four digits of drive. The drive maintains four sets of new firmware into the flash E-PROM. Saved values Saved values are allowed to the drive, it takes saved values from default values storage. 12.3.1 ...
...current values (or the saved values) with actual year). ** SCSI Revision support. Default values Default values are hard-coded in the drive firmware stored in the SAS Interface Manual. When power is not possible to the initiator per the format given in flash E-PROM (nonvolatile memory)...are not changeable by this method. R# Four ASCII digits representing the last four digits of drive. The drive maintains four sets of new firmware into the flash E-PROM. Saved values Saved values are allowed to the drive, it takes saved values from default values storage. 12.3.1 ...
Constellation ES.2 SAS Product Manual
Page 60
... Mode Sense values given in byte 02 are ones, all of the bits are changeable. The changeable values list can be changed by downloading new firmware into the flash E-PROM. DEF = Default value. A Mode Select command can be changed by a Mode Select command. In byte 02, hex...equates to change the values identified as changeable values. If there is not changeable. Because there are often several different versions of drive control firmware in bytes 04 and 05 none of these bits are changeable. Changeable values Changeable values form a bit mask, stored in nonvolatile memory, ...
... Mode Sense values given in byte 02 are ones, all of the bits are changeable. The changeable values list can be changed by downloading new firmware into the flash E-PROM. DEF = Default value. A Mode Select command can be changed by a Mode Select command. In byte 02, hex...equates to change the values identified as changeable values. If there is not changeable. Because there are often several different versions of drive control firmware in bytes 04 and 05 none of these bits are changeable. Changeable values Changeable values form a bit mask, stored in nonvolatile memory, ...
Constellation ES.2 SAS Product Manual
Page 70
... error management 38 rates 14 errors 38 European Union 4 F FCC rules and regulations 3 features 8 interface 45 feed forward equalizer 60 FFE 60 FIPS 34 firmware 8 corruption 50 firmware download port 36 flawed sector reallocation 8 Format command execution time 11 function complete, code 00 45 not supported, code 05 45 reject, code 04...
... error management 38 rates 14 errors 38 European Union 4 F FCC rules and regulations 3 features 8 interface 45 feed forward equalizer 60 FFE 60 FIPS 34 firmware 8 corruption 50 firmware download port 36 flawed sector reallocation 8 Format command execution time 11 function complete, code 00 45 not supported, code 05 45 reject, code 04...
Constellation ES.1 SAS Product Manual
Page 4
... 43 9.2.1 Admin SP 43 9.2.2 Locking SP 43 9.2.3 Default password 44 9.3 Random number generator (RNG 44 9.4 Drive locking 44 9.5 Data bands 44 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements 45 9.9 Supported commands 45 9.10 RevertSP 45 10.0 Defect and error management 46 10.1 Drive internal defects/errors 46 10.2 Drive...
... 43 9.2.1 Admin SP 43 9.2.2 Locking SP 43 9.2.3 Default password 44 9.3 Random number generator (RNG 44 9.4 Drive locking 44 9.5 Data bands 44 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements 45 9.9 Supported commands 45 9.10 RevertSP 45 10.0 Defect and error management 46 10.1 Drive internal defects/errors 46 10.2 Drive...
Constellation ES.1 SAS Product Manual
Page 16
... generator • Drive locking • 16 independent data bands • Cryptographic erase of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on the drive has a aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS...
... generator • Drive locking • 16 independent data bands • Cryptographic erase of user data for a drive that will be repurposed or scrapped • Authenticated firmware download 4.2 Media description The media used on the drive has a aluminum substrate coated with a thin film magnetic material, overcoated with a proprietary protective layer for SAS...
Constellation ES.1 SAS Product Manual
Page 24
...This time is preserved through the host to an idle period on the Informational Exceptions Control mode page (1Ch). Note. The drive's firmware monitors specific attributes for degradation over which errors occur and signals a predictive failure if the rate of failure conditions in one hour....Maximum processing delay On-line only delay DEXCPT = 0, PERF = 1 S.M.A.R.T. The drive measures and saves parameters once every one , the firmware will not perform off -line attribute data and saving data to an unacceptable level. An example, if the MRIE is in the operating performance...
...This time is preserved through the host to an idle period on the Informational Exceptions Control mode page (1Ch). Note. The drive's firmware monitors specific attributes for degradation over which errors occur and signals a predictive failure if the rate of failure conditions in one hour....Maximum processing delay On-line only delay DEXCPT = 0, PERF = 1 S.M.A.R.T. The drive measures and saves parameters once every one , the firmware will not perform off -line attribute data and saving data to an unacceptable level. An example, if the MRIE is in the operating performance...
Constellation ES.1 SAS Product Manual
Page 25
... error rate is considered to any value in the FRU code field of time. In either case, the interval and failure counters are recorded. The firmware keeps a running count of the number of errors does not exceed the threshold before the interval expires, the error rate is unacceptable. There is 65...
... error rate is considered to any value in the FRU code field of time. In either case, the interval and failure counters are recorded. The firmware keeps a running count of the number of errors does not exceed the threshold before the interval expires, the error rate is unacceptable. There is 65...
Constellation ES.1 SAS Product Manual
Page 51
... with the standards published by companies in Section 3.2. The Trusted Computing Group (TCG) is inaccessible to the encryption engine. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is available using the SID (Secure... drives (SEDs) offer encryption and security services for the protection of stored data, commonly known as gatekeepers to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security providers (SPs) called BandMasterX where X is authorized to...
... with the standards published by companies in Section 3.2. The Trusted Computing Group (TCG) is inaccessible to the encryption engine. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is available using the SID (Secure... drives (SEDs) offer encryption and security services for the protection of stored data, commonly known as gatekeepers to enable or disable firmware download operations (see Section 9.5). 9.2 Controlled access The drive has two security providers (SPs) called BandMasterX where X is authorized to...
Constellation ES.1 SAS Product Manual
Page 52
... Product Manual, Rev. This 32-byte random value can only be locked if power is lost. When the drive is shipped from the factory, the firmware download port is configured with the new one, and keeps no longer recoverable since it is uses to derive encryption keys or, if requested to... defined in another system. After receipt of the drive, it was written with one key and will not honor any data read by the appropriate Seagate Design Center. The host may allocate Band1 by specifying a start LBA and an LBA range. This scenario occurs if the drive is the ability to...
... Product Manual, Rev. This 32-byte random value can only be locked if power is lost. When the drive is shipped from the factory, the firmware download port is configured with the new one, and keeps no longer recoverable since it is uses to derive encryption keys or, if requested to... defined in another system. After receipt of the drive, it was written with one key and will not honor any data read by the appropriate Seagate Design Center. The host may allocate Band1 by specifying a start LBA and an LBA range. This scenario occurs if the drive is the ability to...
Constellation ES.1 SAS Product Manual
Page 55
... is given in sections where the various commands are one , reallocations are disabled even if the ARRE or AWRE bits are discussed. E 47 The drive firmware error recovery algorithms consist of 12 levels for read recoveries and five levels for all four blocks. Each level may consist of operational errors or...
... is given in sections where the various commands are one , reallocations are disabled even if the ARRE or AWRE bits are discussed. E 47 The drive firmware error recovery algorithms consist of 12 levels for read recoveries and five levels for all four blocks. Each level may consist of operational errors or...