User Guide DDOC0199-000-A9
1-Slot Data Transport System (CSfC) 8 - 6 Operation
© 2024 Curtiss-Wright Defense Solutions Revision 2.0
8.4 Encryption
The DTS1+ CSfC uses two layers of encryption:
• Hardware encryption layer
• Software encryption Layer
The user is required to use the CLI to issue initialization and key management commands.
8.4.1 Hardware Encryption Layer
Refer to paragraph 6.3 Hardware Layer Encryption for detailed instructions on how to create /
log into the HWE layer.
8.4.2 Software Encryption Layer
Refer to paragraph 6.4 Software Layer Encryption for detailed instructions on how to create / log
into the SWE layer.
8.4.3 Zeroize / Delete SWE Container / RMC Purge
CAUTION
LOSS OF CONTENT. Deletion of SWE container(s) will result in making the stored content
unrecoverable.
• The destruction of the HWE layer key is accomplished via zeroization.
• The SWE layer passphrase(s) is / are destroyed via deleting the SWE container(s).
• The RMC module data is destroyed via the rmcpurge command.
Refer to paragraph paragraph 6.5 Zeroize HWE Key / Delete SWE Container / RMC Purge for
additional information,
8.5 Storage Media
NOTE
The DTS1+ CSfC must have the hardware encryption layer initialized and open before the RMC
module (storage media) can be accessed.
If desired, the RMC module disk can be used without partitioning. The unpartitioned disk must
have services started and assigned before formatting and mounting. Refer to paragraph 6.6
Services for additional information.
8.5.1 Preparation for Partition
The following steps must be done in sequential order.
1. Stop services.
Commands:
Stop services: serv -a 0
Stop iSCSI targets: istarget --stop
Stop PCAP recording: pcap --stop
2. Unmount drive.
Command
rmcctl -U
CAUTION
DATA LOSS. If the RMC module has been previously used with full hardware and software
encryption applied, erasing all partitions will delete the SWE container(s) and result in the loss of
all data on the drive.
3. Erase existing partitions.
Command:
rmcctl -W --force