Constellation ES.2 SAS Product Manual
Page 4
... 7.5.7 Corrosive environment 31 7.5.8 Electromagnetic susceptibility 32 7.6 Mechanical specifications 33 8.0 About FIPS 34 9.0 About self-encrypting drives 35 9.1 Data encryption 35 9.2 Controlled access 35 9.2.1 Admin SP 35 9.2.2 Locking SP 35 9.2.3 Default password 36 9.3 Random number generator (RNG 36 9.4 Drive locking 36 9.5 Data bands 36 9.6 Cryptographic erase 36 9.7 Authenticated firmware download 37 9.8 Power requirements...
... 7.5.7 Corrosive environment 31 7.5.8 Electromagnetic susceptibility 32 7.6 Mechanical specifications 33 8.0 About FIPS 34 9.0 About self-encrypting drives 35 9.1 Data encryption 35 9.2 Controlled access 35 9.2.1 Admin SP 35 9.2.2 Locking SP 35 9.2.3 Default password 36 9.3 Random number generator (RNG 36 9.4 Drive locking 36 9.5 Data bands 36 9.6 Cryptographic erase 36 9.7 Authenticated firmware download 37 9.8 Power requirements...
Constellation ES.2 SAS Product Manual
Page 43
... access The drive has two security partitions (SPs) called BandMasterX where X is read /write access to the media and the cryptographic erase feature. Access to the drive security services. Constellation ES.2 SAS Product Manual, Rev. Seagate's SED models comply with the Trusted Computing ...Group (TCG) Enterprise Storage Specifications as gatekeepers to the Admin SP is an organization sponsored and operated by companies in Section 3.2. The Trusted ...
... access The drive has two security partitions (SPs) called BandMasterX where X is read /write access to the media and the cryptographic erase feature. Access to the drive security services. Constellation ES.2 SAS Product Manual, Rev. Seagate's SED models comply with the Trusted Computing ...Group (TCG) Enterprise Storage Specifications as gatekeepers to the Admin SP is an organization sponsored and operated by companies in Section 3.2. The Trusted ...
Constellation ES.2 SAS Product Manual
Page 44
... LBA (x) and the next beginning at LBA (x+1). Data bands cannot overlap but before these numbers as Authentication Keys (passwords) for the drive's Admin and Locking SPs. 9.4 Drive locking In addition to change the Encryption Key (see Section 9.6) or the password when required.
... LBA (x) and the next beginning at LBA (x+1). Data bands cannot overlap but before these numbers as Authentication Keys (passwords) for the drive's Admin and Locking SPs. 9.4 Drive locking In addition to change the Encryption Key (see Section 9.6) or the password when required.
Constellation ES.2 SAS Product Manual
Page 45
...non-SED) drive models. 9.9 Supported commands The SED models support the following two commands in addition to the commands supported by the appropriate Seagate Design Center. There is enabled and functional in power consumption. See the tables in Section 7.3 for the drive. C 37 A standard ...) file will support RevertSP feature where it erases all data in all bands on the device and returns the contents of all SPs (Security Providers) on the 12V supply. 9.7 Authenticated firmware download In addition to providing a locking mechanism to prevent unwanted firmware download...
...non-SED) drive models. 9.9 Supported commands The SED models support the following two commands in addition to the commands supported by the appropriate Seagate Design Center. There is enabled and functional in power consumption. See the tables in Section 7.3 for the drive. C 37 A standard ...) file will support RevertSP feature where it erases all data in all bands on the device and returns the contents of all SPs (Security Providers) on the 12V supply. 9.7 Authenticated firmware download In addition to providing a locking mechanism to prevent unwanted firmware download...
Constellation ES.2 SAS Product Manual
Page 69
... 22 ACA active status 54 ACA active, faulted initiator status 54 acoustics 31 active LED Out signal 59 actuator 9 assembly design 7 adaptive caching 54 Admin SP 35 AES-128 data encryption 35 air cleanliness 31 air flow 43 illustrated 43 air inlet 43 altitude 29 ambient 28 ambient temperature 43 ANSI...
... 22 ACA active status 54 ACA active, faulted initiator status 54 acoustics 31 active LED Out signal 59 actuator 9 assembly design 7 adaptive caching 54 Admin SP 35 AES-128 data encryption 35 air cleanliness 31 air flow 43 illustrated 43 air inlet 43 altitude 29 ambient 28 ambient temperature 43 ANSI...
Constellation ES.1 SAS Product Manual
Page 4
... 7.5.7 Corrosive environment 39 7.5.8 Electromagnetic susceptibility 39 7.6 Mechanical specifications 40 8.0 About FIPS 41 9.0 About self-encrypting drives 43 9.1 Data encryption 43 9.2 Controlled access 43 9.2.1 Admin SP 43 9.2.2 Locking SP 43 9.2.3 Default password 44 9.3 Random number generator (RNG 44 9.4 Drive locking 44 9.5 Data bands 44 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements...
... 7.5.7 Corrosive environment 39 7.5.8 Electromagnetic susceptibility 39 7.6 Mechanical specifications 40 8.0 About FIPS 41 9.0 About self-encrypting drives 43 9.1 Data encryption 43 9.2 Controlled access 43 9.2.1 Admin SP 43 9.2.2 Locking SP 43 9.2.3 Default password 44 9.3 Random number generator (RNG 44 9.4 Drive locking 44 9.5 Data bands 44 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements...
Constellation ES.1 SAS Product Manual
Page 51
...the media and when it is available using the SID (Secure ID) password or the MSID (Manufacturers Secure ID) password. 9.2.2 Locking SP The Locking SP controls read from the drive in their command payloads. 9.1 Data encryption Encrypting drives use the security features in the computer, storage and digital..., Rev. The Trusted Computing Group (TCG) is an organization sponsored and operated by the TCG. Access to and from the media. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is the number of data at rest." E 43
...the media and when it is available using the SID (Secure ID) password or the MSID (Manufacturers Secure ID) password. 9.2.2 Locking SP The Locking SP controls read from the drive in their command payloads. 9.1 Data encryption Encrypting drives use the security features in the computer, storage and digital..., Rev. The Trusted Computing Group (TCG) is an organization sponsored and operated by the TCG. Access to and from the media. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as it is the number of data at rest." E 43
Constellation ES.1 SAS Product Manual
Page 52
...overlap but before the drive will not honor any data read or write requests until the bands have been cryptographically signed by the appropriate Seagate Design Center. The bands should be aligned to 4K LBA boundaries. 9.6 Cryptographic erase A significant feature of SEDs is no history ...In addition "ReadLockEnabled" and "WriteLockEnabled" must be met before these numbers as Authentication Keys (passwords) for the drive's Admin and Locking SPs. 9.4 Drive locking In addition to changing the passwords, as the authority to change all passwords are set the data access controls for ...
...overlap but before the drive will not honor any data read or write requests until the bands have been cryptographically signed by the appropriate Seagate Design Center. The bands should be aligned to 4K LBA boundaries. 9.6 Cryptographic erase A significant feature of SEDs is no history ...In addition "ReadLockEnabled" and "WriteLockEnabled" must be met before these numbers as Authentication Keys (passwords) for the drive's Admin and Locking SPs. 9.4 Drive locking In addition to changing the passwords, as the authority to change all passwords are set the data access controls for ...
Constellation ES.1 SAS Product Manual
Page 53
... drive. The download file must be manually read from the drive label or scanned in power consumption. E 45 CRYPTOGRAPHIC ERASE This command cryptographically erases all SPs (Security Providers) on the 12V supply. 1.
... drive. The download file must be manually read from the drive label or scanned in power consumption. E 45 CRYPTOGRAPHIC ERASE This command cryptographically erases all SPs (Security Providers) on the 12V supply. 1.
Constellation ES.1 SAS Product Manual
Page 81
... 22 ACA active status 65 ACA active, faulted initiator status 65 acoustics 39 active LED Out signal 70 actuator 9 assembly design 7 adaptive caching 65 Admin SP 43 AES-128 data encryption 43 air cleanliness 39 air flow 52 illustrated 52 air inlet 52 altitude 37 ambient 36 ambient temperature 52 ANSI...
... 22 ACA active status 65 ACA active, faulted initiator status 65 acoustics 39 active LED Out signal 70 actuator 9 assembly design 7 adaptive caching 65 Admin SP 43 AES-128 data encryption 43 air cleanliness 39 air flow 52 illustrated 52 air inlet 52 altitude 37 ambient 36 ambient temperature 52 ANSI...
Constellation ES (.1) SATA Product Manual
Page 3
D Contents Seagate Technology Support Services 1 1.0 Introduction 3 1.1 About the Serial ATA interface 4 2.0 Drive specifications 5 2.1 Specification summary tables 5 2.2 Formatted capacity 7 2.2.1 LBA mode 7 2.3 Default logical geometry 7 2.4 Recording and interface technology 7 2.5 ... 28 3.3 Serial ATA cables and connectors 28 3.4 Drive mounting 29 4.0 About FIPS 30 5.0 About self-encrypting drives 31 5.1 Data encryption 31 5.2 Controlled access 31 5.2.1 Admin SP 31 5.2.2 Locking SP 31 5.2.3 Default password 32 i Constellation ES Serial ATA Product Manual, Rev.
D Contents Seagate Technology Support Services 1 1.0 Introduction 3 1.1 About the Serial ATA interface 4 2.0 Drive specifications 5 2.1 Specification summary tables 5 2.2 Formatted capacity 7 2.2.1 LBA mode 7 2.3 Default logical geometry 7 2.4 Recording and interface technology 7 2.5 ... 28 3.3 Serial ATA cables and connectors 28 3.4 Drive mounting 29 4.0 About FIPS 30 5.0 About self-encrypting drives 31 5.1 Data encryption 31 5.2 Controlled access 31 5.2.1 Admin SP 31 5.2.2 Locking SP 31 5.2.3 Default password 32 i Constellation ES Serial ATA Product Manual, Rev.
Constellation ES (.1) SATA Product Manual
Page 37
Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as ... for the protection of stored data, commonly known as gatekeepers to the drive security services. Access to the Admin SP is used to convey the TCG protocol to prove the requester is available using the SID (Secure ID) password or... the MSID (Manufacturers Secure ID) password. 5.2.2 Locking SP The Locking SP controls read from the media. D 31 These drives are used for each of the data band (0 through 15). A...
Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as ... for the protection of stored data, commonly known as gatekeepers to the drive security services. Access to the Admin SP is used to convey the TCG protocol to prove the requester is available using the SID (Secure ID) password or... the MSID (Manufacturers Secure ID) password. 5.2.2 Locking SP The Locking SP controls read from the media. D 31 These drives are used for each of the data band (0 through 15). A...
Constellation ES (.1) SATA Product Manual
Page 38
... is uses to derive encryption keys or, if requested to do so, to provide random numbers to the host for the drive's Admin and Locking SPs. 5.4 Drive locking In addition to changing the passwords, as the Global Data Band) which have been unlocked. This involves the host telling the drive... the new one band ending at LBA (x) and the next beginning at LBA (x+1). D The drive will not honor any data read by the appropriate Seagate Design Center. Each data band has its own drive-generated encryption key and its cabinet. This scenario occurs if the drive is removed from the...
... is uses to derive encryption keys or, if requested to do so, to provide random numbers to the host for the drive's Admin and Locking SPs. 5.4 Drive locking In addition to changing the passwords, as the Global Data Band) which have been unlocked. This involves the host telling the drive... the new one band ending at LBA (x) and the next beginning at LBA (x+1). D The drive will not honor any data read by the appropriate Seagate Design Center. Each data band has its own drive-generated encryption key and its cabinet. This scenario occurs if the drive is removed from the...
Constellation ES (.1) SATA Product Manual
Page 39
... field B4h and Feature field 0011h (CRYPTO SCRAMBLE EXT). The write operation shall bypass the media encryption. CRYPTO SCRAMBLE EXT This command cryptographically erases all SPs (Security Providers) on the 5V supply of about 30mA and a commensurate increase of the SANITIZE FREEZE LOCK EXT command shall be determined on the drive...
... field B4h and Feature field 0011h (CRYPTO SCRAMBLE EXT). The write operation shall bypass the media encryption. CRYPTO SCRAMBLE EXT This command cryptographically erases all SPs (Security Providers) on the 5V supply of about 30mA and a commensurate increase of the SANITIZE FREEZE LOCK EXT command shall be determined on the drive...
Constellation ES (.1) SATA Product Manual
Page 52
...-transfer rate OD 7 is 8 ISO document 7779 21 ITE 23 K KCC 24 Korean Communications Commission 24 Korean RRL 24 L latency 8 latency time 9 LBA mode 7 Locking SP 31 LockOnReset 32 logical geometry 7 M maintenance 23 Manufacturers Secure ID 31 master/slave 4 maximum start current 10, 11, 12 mounting 29 46 mounting screws 20...
...-transfer rate OD 7 is 8 ISO document 7779 21 ITE 23 K KCC 24 Korean Communications Commission 24 Korean RRL 24 L latency 8 latency time 9 LBA mode 7 Locking SP 31 LockOnReset 32 logical geometry 7 M maintenance 23 Manufacturers Secure ID 31 master/slave 4 maximum start current 10, 11, 12 mounting 29 46 mounting screws 20...
Constellation ES SAS Product Manual
Page 4
... 7.5.7 Corrosive environment 39 7.5.8 Electromagnetic susceptibility 39 7.6 Mechanical specifications 40 8.0 About FIPS 41 9.0 About self-encrypting drives 42 9.1 Data encryption 42 9.2 Controlled access 42 9.2.1 Admin SP 42 9.2.2 Locking SP 43 9.2.3 Default password 43 9.3 Random number generator (RNG 43 9.4 Drive locking 43 9.5 Data bands 43 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements...
... 7.5.7 Corrosive environment 39 7.5.8 Electromagnetic susceptibility 39 7.6 Mechanical specifications 40 8.0 About FIPS 41 9.0 About self-encrypting drives 42 9.1 Data encryption 42 9.2 Controlled access 42 9.2.1 Admin SP 42 9.2.2 Locking SP 43 9.2.3 Default password 43 9.3 Random number generator (RNG 43 9.4 Drive locking 43 9.5 Data bands 43 9.6 Cryptographic erase 44 9.7 Authenticated firmware download 44 9.8 Power requirements...
Constellation ES SAS Product Manual
Page 50
... commands: • Security Protocol Out • Security Protocol In These commands are compliant with the standards published by the TCG. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as gatekeepers to the host system. The encryption engines ...(see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called the "Admin SP" and the "Locking SP." Access to the Admin SP is authorized to perform the command. 9.2.1 Admin SP The Admin SP allows the drive's owner to being written on the media and when it...
... commands: • Security Protocol Out • Security Protocol In These commands are compliant with the standards published by the TCG. Seagate's SED models comply with the Trusted Computing Group (TCG) Enterprise Storage Specifications as gatekeepers to the host system. The encryption engines ...(see Section 9.5). 9.2 Controlled access The drive has two security partitions (SPs) called the "Admin SP" and the "Locking SP." Access to the Admin SP is authorized to perform the command. 9.2.1 Admin SP The Admin SP allows the drive's owner to being written on the media and when it...
Constellation ES SAS Product Manual
Page 51
... use the SID credential to unlock the firmware download port before these numbers as Authentication Keys (passwords) for the drive's Admin and Locking SPs. 9.4 Drive locking In addition to the media and the cryptographic erase feature. When the drive is shipped from the factory, the firmware ... bands cannot overlap but before firmware updates will reject any data read or write requests until the bands have been unlocked. 9.2.2 Locking SP The Locking SP controls read by specifying a start LBA and an LBA range. Access to 4K LBA boundaries. This 32-byte random value is taken...
... use the SID credential to unlock the firmware download port before these numbers as Authentication Keys (passwords) for the drive's Admin and Locking SPs. 9.4 Drive locking In addition to the media and the cryptographic erase feature. When the drive is shipped from the factory, the firmware ... bands cannot overlap but before firmware updates will reject any data read or write requests until the bands have been unlocked. 9.2.2 Locking SP The Locking SP controls read by specifying a start LBA and an LBA range. Access to 4K LBA boundaries. This 32-byte random value is taken...
Constellation ES SAS Product Manual
Page 79
... 22 ACA active status 63 ACA active, faulted initiator status 63 acoustics 39 active LED Out signal 68 actuator 8 assembly design 6 adaptive caching 63 Admin SP 42 AES-128 data encryption 42 air cleanliness 39 air flow 50 illustrated 50 air inlet 50 altitude 37 ambient 36 ambient temperature 50 ANSI...
... 22 ACA active status 63 ACA active, faulted initiator status 63 acoustics 39 active LED Out signal 68 actuator 8 assembly design 6 adaptive caching 63 Admin SP 42 AES-128 data encryption 42 air cleanliness 39 air flow 50 illustrated 50 air inlet 50 altitude 37 ambient 36 ambient temperature 50 ANSI...