1 Table of Contents Table of Contents ......................4 Contextual Help......................11 Login page 2.1.1 Logging in for the first time 2.1.1.1 1. Enter default password 2.1.1.2 2. Change default password 2.1.1.3 3. Accept license agreement 2.1.2 Troubleshooting login issues Home 2.2.1 Menu structure 2.2.2 Energy flow diagram 2.2.2.1...
Page 5
2.4.7.4 Trusted clients certificates 2.4.8 Email 2.4.8.1 Email sending configuration 2.4.8.2 SMTP 2.4.8.3 Default settings parameters and limitations 2.4.9 My preferences 2.4.9.1 Profile 2.4.9.2 Temperature 2.4.9.3 Date format 2.4.9.4 Time format 2.4.9.5 Language Meters 2.5.1 Power 2.5.1.1 Input 2.5.1.2 Output 2.5.2 Measure logs 2.5.2.1...
Page 6
2.9.2 Alarm configuration (sensors) 2.9.2.1 Temperature 2.9.2.2 Humidity 2.9.2.3 Dry contacts 2.9.2.4 Default settings parameters and limitations 2.9.3 Information (sensors) 2.10 Legal information (footer) 2.10.1 Component list 2.10.2 Notice for our proprietary (i.e. non-Open source) elements 2.10.3 Availability of source code 2.11 Contextual and detailed help 2.11.1...
Page 7
3.13.2.1 Target 3.13.2.2 Step 1: Installation setup 3.13.2.3 Step 2: Agent settings 3.13.2.4 Step 3: Power outage policy settings 3.13.3 Restart sequentially the IT equipment on utility recovery 3.13.3.1 Target 3.13.3.2 Step 1: Installation setup 3.13.3.3 Step 2: Power outage policy settings 3.14 Resetting username and password Securing the Network Management Module .............
Page 8
5.3.4 Defining EMPs address and termination 5.3.4.1 Manual addressing 5.3.5 Connecting an external contact device Commissioning the EMP 5.4.1 On the Network-M2 device Information ........................ 91 Front panel connectors and LED indicators Default settings parameters 6.2.1 Settings 6.2.1.1 General 6.2.1.2 Date &...
Page 9
EMP detection fails at discovery stage 7.1.1 Symptoms 7.1.2 Possible cause 7.1.3 Action #1 7.1.4 Action #2 How do I log in if I forgot my password? 7.2.1 Action IPP is not able to communicate with the Network module 7.3.1 Symptoms 7.3.2 Possible cause...
Login page 2 Contextual Help 2.1 Login page The page language is set to English by default, but can be switched to browser language when it is managed. After navigating to the assigned IP address, accept the untrusted certificate on the browser. 2.1.1 Logging in for the first time 1. Enter default password As you are logging into the Network Module for the first time you must enter the factory set default username and password. •...
Home Settings Module settings: • General • Date & Time • Users • Network • Protocols • SNMP • Certificates • Email • My Preferences Alarms List of alarms with date and time Alarms download Meters Power quality measures: • Frequency •...
Page 13
Home Diagram elements description Description Possible states bols Green Yellow Black / White / Greyed Main utility Powered Out of nominal Not present range Unknown The equipment Normal In overload Not powered is protected and mode Unknown powered Buck through an AVR mode...
Page 14
Home Line interactive diagram examples Normal mode Buck/Boost mode Battery mode Contextual Help – 14...
Home Online Diagram elements description Description Possible states bols Green Yellow Black or white Main utility or Powered Out of nominal Not present second utility range Unknown Rectifier: convert Powered In overload In short Not powered AC power to DC circuit HE mode Unknown...
Page 16
Home Automatic Powered In overload In fault Not powered bypass (standby, Unknown auto bypass, forced bypass, high efficiency mode) Maintenance Powered Not powered bypass (optional) (maintenance Unknown bypass) Wiring Energy flow In overload No energy Out of nominal Unknown range Online diagram examples...
Home Mainte nance bypas mode 2.2.3 Top bar Current user/Logout Status Output power Battery status Alarms button Settings button 2.2.4 Details This view provides a summary of device identification information and nominal values: Name Model Location Firmware version Input Voltage Input Frequency Output Voltage Output Frequency The COPY TO CLIPBOARD button will copy the information to your clipboard so that it can be past. For example, you can copy and paste information into an email. 2.2.5 Outlet status Provides the status of the UPS outlets (ON/OFF) by load segmentation : Status (ON/OFF— Protected/Not protected/Not powered)
Alarms 2.2.6 Active Alarms Only active alarms are displayed, the Alarms icon will also display the number of active alarms. Alarms are sorted by date, alert level, time, and description. Note: To see the alarm history, press the Alarms button. 2.3 Alarms All alarms are displayed and sorted by date, with alert level, time, description, and status. • Alert level : Critical/Warning/Minor • Status : Active/Non-active Above 10 alarms, buttons First, Previous and Next appears to allow navigation in the Alarm list. Press the Download Alarms button to download the file. 2.3.1 Active alarm list with codes For details on alarm codes, see the Information>>>Alarm log codes sectionin the detailed help. 2.4 Settings 2.4.1 General Location...
Settings The current date and time appears in the footer at the bottom of the screen. You can set the time either manually or automatically. Manual: Manually entering the date and time 1. Select the time zone for your geographic area from the time zone pull-down menu or with the map. 2. Select the date and time. 3. Save the changes. Dynamic (NTP) : Synchronizing the date and time with an NTP server 1. Enter the IP address or host name of the NTP server in the NTP server field. 2. Select the time zone for your geographic area from the time zone pull-down menu or with the map. 3. Save the changes. Note: DST is managed based on the time zone. Default settings parameters and limitations ...
Settings Controls Protection Sensors Status Alarm configuration Information Card System information System logs Administration Sensors (commissioning) Legal information (footer) Contextual and detailed help Command Line Interface • Status – Status could take following values – Inactive/Locked/Password expired/Active Actions Press the New button to create up to ten new users. Remove Select a user and press the Delete button to remove it.
Settings Press Save after modifications. Account expiration To set the account expiration rules, apply the following restrictions: • Password expires after (in days). The main administrator password never expires. • Block account when invalid password is entered after (in number of attempts). The main administrator account will never block.
Settings • Enter the gateway address. The gateway address allows connections to devices or hosts attached to different network segments. Dynamic (DHCP) • Select dynamic DHCP to configure network parameters by a BootP or DHCP server. If a response is not received from the server, the UPS Network Module boots with the last saved parameters from the most recent power up.
Settings Default settings parameters and limitations For details on default parameters and limitations, see the Information>>>Default settings parameters section in the detailed help. 2.4.5 Protocols This tab contains settings for communication protocols used to get information from the device through the network, such as https for web browser. HTTPS Only https is available. The default network port for https is 443. For additional security, the ports can be changed on this page. Press Save after modifications.
Settings For a list of supported MIBs, see the Information>>>Specifications/Technical characteristics section in the detailed help. Press the Supported MIBs button to download the MIBs. Settings This screen allows an administrator to configure SNMP settings for computers that use the MIB to request information from the UPS Network Module. Default ports for SNMP are 161 (SNMP v1 and v3, set/get) and 162 (traps). These ports can be changed on the settings screen for additional security.
Settings Actions 1. Press the New button to create new trap receivers. 2. Set following settings: • Status • Application name • Hostname or IP address • Port • Protocol • Trap community (V1) / User (V3) 3. Press the SAVE button. Remove Select a trap receiver and press the Delete button to remove it. Edit Press the pen icon to edit trap receiver information and access to its settings. Test all traps Press the Test all traps button to send the trap test to all trap receivers.
Page 26
Settings • Expiration • Status — valid, expires soon, or expired Actions Revoke This action will take the selected certificate out of use. Select the certificate to revoke, and then press the Revoke button. A confirmation window appear, press Continue to proceed, this operation cannot be recovered. Revoke will replace current certificate by a new self signed certificate. This may disconnect connected applications: - Web browsers - Shutdown application - Monitoring application...
Settings CSR must be signed with the CA, which is managed outside the card. Import certificate When the CSR is signed by the CA, it can be imported into the Network Module. When the import is complete, the new server certificate information is displayed in the table. Certificate authorities (CA) Manages CAs.
Settings Actions Start Starts the pairing window during the selected timeframe or until it is stopped. Time countdown is displayed. Stop Stops the pairing window. Trusted clients certificates The table shows the following information for each trusted clients certificates. • Used for •...
Settings Edit Press the pen icon to edit email sending configuration and access to the following settings: • Active • Configuration name • Email address • Notify on events – Severity level/Attach logs/Exceptions on events notification • Periodic report – Active/Recurrence/Starting/Topic selection – Card/Devices SMTP SMTP is an internet standard for electronic email transmission. The following SMTP settings are configurable: •...
Meters • °F (Fareinheit) Date format • MM-DD-YYYY • YYY-MM-DD • DD-MM-YYY • MM-DD-YYYY • DD.MM.YYY • DD/MM/YYY • DD MM YYYY Time format • hh:mm:ss (24h) • hh:mm:ss (12h) Language • German • English • Spanish • French • Italian •...
Controls Measure logs Press the Download measures button to download the log file. If available, possible measures are listed below: • Input Voltage (V) • Input Frequency (Hz) • Bypass Voltage (V) • Bypass Frequency (Hz) • Output Voltage (V) • Output Frequency (Hz) •...
Controls This control is available only if the status is not OFF and if there are no active commands running. • Switch ON This will switch ON the load or turn ON the online UPS. This control is available when the status is OFF, if there are no active commands running and if the Online UPS is on bypass.
Protection This will shut off the load connected to the associated load segment. Protected applications are safely powered down. This control is available only if the status is not OFF and if there are no active commands running. • Safe reboot This will power down and then switch ON the load connected to the associated load segment.
After automatic acceptance, make sure that all listed agents belong to your infrastructure. If not, access may be revoked using the Delete button. For maximum security, Eaton recommend following one of the two methods on the certificate settings page: - import client certificates manually. - generate trusted certificate for both clients and Network Module using your own PKI.
Protection Actions Delete When the agent is connected, the Delete function will not work correctly because the agent will keep on trying to re-connect. So connect to the software, remove the Network module from the Software nodes list (in the nodes list, right click on the Network module and click remove nodes).
Protection Note: The trigger in the diagram is the moment when the shutdown sequence starts and it is defined in the power outage policy section for each power source. 2.7.4 Power outage policy These setting are in conjuntion with the shutdown agents and control how the network module directs the shutdown of protected servers and appliances. It gives the possibility to prioritize and schedule shutdown actions so that the IT system is powered down in the correct order. For example, applications first, database servers next, and storage last.
Page 37
Protection On custom policy, if the 2 checkboxes are unchecked, only the last condition is taken into account. Settings examples All the following examples are using below agents settings. • Example 1: Maximize availability policy • Example 2: Immediate graceful shutdown policy Contextual Help – 37...
Page 38
Protection • Example 3: Load shedding policy Settings Settings Contextual Help – 38...
Protection • Example 4: Custom policy Settings Settings On low battery warning In some cases, like a renewed power failure or failed battery, the capacity is much lower than anticipated. The UPS gives a Low battery warning when there is 2 - 3 minutes of estimated runtime left, depending on the UPS and its settings.
Card • Wait until UPS battery capacity exceeds a set percentage value in (%), and then automatically restart the UPS. - Then restart Group 1 after a set time in (s). - Then restart Group 2 after a set time in (s). Enable/Disable Each option listed above can be enabled or disabled with check-boxes. When disabled, the option will be greyed out. 2.8 Card 2.8.1 System information System information is an overview of the main Network Module information.
• Active Version Displays the associated firmware version. Release date Displays the release date of the firmware. For better performance, security, and optimized features, Eaton recommends to upgrade the Network Module regularly. Installation date Displays when the firmware was installed in the Network Module. Activation date Displays when the firmware was activated in the Network Module.
Card For details on default settings, see the Information>>>Default settings parameters section in the detailed help. To sanitize the Network Module: 1. Click Sanitize. 2. A confirmation message displays, click Sanitize to confirm. Depending on your network configuration, the Network Module may restart with a different IP address. Only main administrator user will remain with default login and password.
Card • User accounts (user settings, passwords, preferences) • Protection agents (agent list, agent settings) • Sensor settings (commissioning, alarm configuration) • SNMPv3 authentication and privacy keys To save the Network module settings: Click on Save Select the settings to exclude Click on Continue Restore ...
Sensors Actions Discover At first the table is empty, press the Discover button to lauch the sensor discovery process. If sensors are discovered, the table is populated accordingly Delete Select a sensor and press the Delete button to delete the sensor. When a sensor is deleted, all the commissioning informations are deleted. Define offsets Select the sensors. Press the Define offset button to adjust the temperature and humidity offsets of the selected sensors.
Sensors • Current temperature • Communication – Connected/Lost with dates Humidity table The table shows the following information for each sensors. • Name • Location • Current humidity • Communication – Connected/Lost with dates Dry contacts table The table shows the following information for dry contacts. •...
Sensors Set alarm threshold Select and directly change the setting in the table and then Save. When a warning threshold is reached, an alarm will be sent with a warning level. When a critical threshold is reached, an alarm will be sent with a critical level. Set Hysteresis Select and directly change the setting in the table and then Save. The hysteresis is the difference between the value where the alarm turns ON from turning OFF and the value where it turns OFF from turning ON.
Legal information (footer) Dry contacts alarm will be sent at the selected level. Default settings parameters and limitations For details on default parameters and limitations, see the Information>>>Default settings parameters section in the detailed help 2.9.3 Information (sensors) Sensor information is an overview of all the sensors informations connected to the Network Module. • Physical name • Model • Part number • Firmware version • UUID •...
Contextual and detailed help Search feature is indexed, but when inside the contextual help section it won't search in the detailed help sections. To get better results when searching, search inside the detailed help section. 2.11.2 Access to detailed help Press ? icon on the top right side of the page to access the contextual help.
Unpacking the Network module 3 Servicing the Network Management Module 3.1 Unpacking the Network module The network module will include the following: • Network module • Quickstart • USB AM to Micro USB/M/5P 5ft Cable Packing materials must be disposed of in compliance with all local regulations concerning waste. Recycling symbols are printed on the packing materials to facilitate sorting.
Installing the Network Module 3.2.2 Accessing the web interface through Network Connecting the network cable Security settings in the Network Module may be in their default states. For maximum security, configure through a USB connection before connecting the network cable. Connect a standard gigabit compatible shielded ethernet cable (F/UTP or F/FTP) between the network connector on the Network Module and a network jack.
Installing the Network Module • To access the web interface through RNDIS, see the Accessing the web interface through RNDIS section. • Navigate to Settings>>>Network>>>IPV4. • Read the IPv4 settings. Your network is not equipped with a BOOTP/DHCP server Define from the configuration port The IP address can be defined by accessing the web interface through RNDIS. To access web interface through RNDIS, see the Accessing the web interface through RNDIS section.
Page 52
Installing the Network Module On some others it may fail then proceed to manual configuration. Manual configuration 1. In case Windows® OS fails to find driver automatically, go to the Windows control panel>Network and sharing center>Local area connection 2. Right click on the RNDIS local area connection and select Properties. 3. Select Internet Protocol Version 4 (TCP/IPv4)” and press the Properties button. Servicing the Network Management Module – 52...
Page 53
Installing the Network Module 4. Then enter the configuration as below and validate (IP = 169.254.0.150 and mask = 255.255.255.0), click OK, then click on Close. Servicing the Network Management Module – 53...
Installing the Network Module Accessing the web interface 1. Be sure that the UPS is powered on. 2. On the host computer, download the RNDIS_Serial.zip file from the website www.powerquality.eaton.com/Support/ and extract it. For more information, navigate to Accessing to the latest Network Module firmware/driver section. 3. Launch setProxy.bat to add 169.254.* in proxy’s exceptions list, if needed. 4. Launch a supported browser, the browser window appears. 6. Enter the user name in the User Name field. The default user name is admin. 7. Enter the password in the Password field. The default password is admin. 8. Click Sign In. The Network Module local web interface appears. 3.2.5 Accessing the card through serial terminal emulation Connecting the configuration cable 1.
Serial driver is used to emulate a serial connection from USB. After the card is connected to the PC, manual configuration of the driver is needed for Windows® OS to discover the serial connection. 1. On the host computer, download the RNDIS_Serial.zip file from the website www.powerquality.eaton.com/ Support/ and extract it. 2. Plug the USB cable and go to Windows® Device Manager. 3- Check the CDC Serial in the list, if it is with a yellow exclamation mark implying that driver has not been installed follow the steps 4-5-6-7 otherwise configuration is OK.
Accessing the card through Serial Use the console and get access to the card, refer to CLI section to get command instructions. 3.2.6 Configuring the UPS Network Module settings Use Eaton UPS Network Module web interface to configure the UPS Network Module. Main web interface menus are described below: Home page with overview of the UPS/Module status (Synoptic, Alarm, Meters, Load segments,…). Module settings (Date&Time, Users, Alerts, Network, Protocols, System logs, My Preferences, …).
Pairing agent to the Network Module Entire UPS Control, Battery test, Load Segments control. Scheduled Shutdown, Protected Application, Agents Settings, Power Outage Policy. Sensors (only displayed when sensors have been discovered in card administration) Card administration (Firmware upgrade, reboot, save and restore, sensor commissioning,...) 3.3 Pairing agent to the Network Module Authentication and encryption of connections between the UPS network module and shutdown agents is based on matching certificates.
4. Select the client.pem file previously saved, click Open. Communication with the agent is restored. 3.4 Accessing to the latest Network Module firmware/driver/script Download the latest Eaton Network Module firmware, driver or script from the Eaton website www.powerquality.eaton.com/Support/. 3.5 Upgrading the card firmware (Web interface / shell script) ...
Upgrading the card firmware (Web interface / shell script) 3.5.2 Shell script Prerequisite Shell script uses the following tools: sshpass, scp. To get it installed on your linux host, use the following commands. Debian/Ubuntu sudo apt-get install sshpass RedHat/Fedora/CentOS sudo install sshpass Make shell script executable:...
Changing the RTC battery cell Uncompress and flash upgrade inProgress(%):28 Uncompress and flash upgrade inProgress(%):44 Uncompress and flash upgrade inProgress(%):61 Uncompress and flash upgrade inProgress(%):78 Uncompress and flash upgrade inProgress(%):92 Uncompress and flash upgrade inProgress(%):100 Uncompress and flash upgrade inProgress(%):100 Uncompress and flash upgrade Executing post post_upgrade.sh script upgrade Upgrade done...
Page 61
Changing the RTC battery cell 6. Replace the Network Module and secure the screw, reconnect the Network cable if it was unplugged during the operation. 7. Connect the Network Module and set the date and time. For more information, see the Date & Time section. Servicing the Network Management Module – 61...
Changing the language of the web pages 3.7 Changing the language of the web pages Update the language of the web page in the Settings menu. Navigate to Settings>>>My preferences>>>Language. 2. Select the language, and then press the Save button. The language of the login page is English by default or browser language when it is managed. 3.8 Checking the current firmware version of the Network Module Current firmware of the Network Module can be accessed in : •...
Switching to static IP (Manual) / Changing IP address of the Network Module 5. Change the position of switch number 3, this change is detected during power ON and the reset will be applied : Case 1 : Case 2 : ...
Powering down/up applications (examples) LANs have an internal NTP server (Domain Controller, mail servers, Outlook servers are generally time servers too) but you can use a public ntp server like pool.ntp.org (after addition of the related rules to your firewall system). For more information, see the Date and Time section. 3.13 Powering down/up applications (examples) 3.13.1 Powering down IT system in a specific order Target Powering down applications first (when on battery for 30s), database servers next (3min after the...
Powering down/up applications (examples) Step 2: Agent settings Objective Ensure IT solution is shutdown gracefully. Resulting setup 1. Install IPP Software on each servers (Application, Database servers, Storage) and register the UPS load segment as power source: • Applications: Group 1 • Database servers: Group 2 • Storage: Entire UPS 2. Pair agent to the Network Module (Pairing agent to the Network Module).
Powering down/up applications (examples) Storage is the last one to power down, its availability is maximized and its shutdown will end 30s before the end of backup time. 4. Set Group 1 and Group 2 to: load shedding policy. Applications must shutdown first so Group 1 has been set to start shutdown when on battery for 30s. Servers must shutdown second so Group 2 has been set to start shutdown when on battery for 210s, so 3min after the applications.
Powering down/up applications (examples) Step 1: Installation setup Objective Use load segmentation provided by the UPS to independently control the power supply of each IT equipment categories (Applications, Database servers, Storage). Load segmentation also allows IT equipment to restart sequentially on utility recovery (Restart sequentially the IT equipment on utility recovery). Resulting setup UPS provides outlets (Group 1 and Group 2) and a primary output.
Page 68
Powering down/up applications (examples) For examples of Power outage policy, see the following sections: • Maximize availability policy example • Immediate graceful shutdown policy example • Load shedding policy examples • Custom policy examples 2. Enable policies of Primary, Group 1 and Group 2. 3. Set Primary and Group 1 to: custom policy and set it to end shutdown sequence 180s before the end of backup time.
Powering down/up applications (examples) 3.13.3 Restart sequentially the IT equipment on utility recovery Target Restart the storage first (right after utility recovery), database servers next (2min after utility recovery) and applications last (3min after utility recovery). Step 1: Installation setup Objective Use load segmentation provided by the UPS to independently control the power supply of each IT equipment categories (Applications, Database servers, Storage).
Resetting username and password 2. Enable the "Keep shutdown sequence running until the end and then restart (forced reboot)". 3. Enable the "Automatically restart the UPS when battery capacity exceeds" and set it to 0%. The storage will restart first, right after utility recovery without waiting the battery capacity to exceed a % limit. 4. Set Then Group 1 after to 120s. The database servers will restart 120s after the utility recovery. 5. Set Then Group 2 after to 60s. The database servers will restart 180s after the utility recovery.
4.1.1 Purpose The purpose of this section is to provide high-level guidance to help customers across industries and applications apply Eaton solutions for power management of electrical systems in accordance with current cybersecurity standards. This document is intended to provide an overview of key security features and practices to consider in order to meet industry recommended standards and best practices.
Cybersecurity considerations for electrical distribution systems Paths to the control network The paths in above figure include: • External users accessing the network through the Internet • Misconfigured firewalls • Unsecure wireless routers and wired modems • Infected laptops located elsewhere that can access the network behind the firewall •...
Cybersecurity considerations for electrical distribution systems 4.1.6 Designing for the threat vectors Firewalls Firewalls provide the capability to add stringent and multifaceted rules for communication between various network segments and zones in an ICS network. They can be configured to block data from certain segments, while allowing the relevant and necessary data through.
Page 74
Cybersecurity considerations for electrical distribution systems Three-tier architecture for a secure control network Above figure shows that the control networks are divided into layers or zones based on control functions, which are then connected by conduits (connections between the zones) that provide security controls to: •...
Cybersecurity considerations for electrical distribution systems Intrusion detection and prevention systems (IDPS) These are systems that are primarily focused on identifying possible incidents in an ICS network, logging the information about them, attempting to stop them, and reporting them to ICS security administrators. Because these systems are critical in an ICS network, they are regular targets for attacks and securing them is extremely important.
Cybersecurity considerations for electrical distribution systems Security policy and procedures It is important to identify “asset owners,” and to develop policies and procedures for a cybersecurity program. These policies need to be practical and enforceable in order to be effective. Policies should also address access related issues, such as physical access, contractors, and vendors. Existing (traditional) IT standards and policies may not apply (or have not been considered) for control systems.
Cybersecurity considerations for electrical distribution systems • Physical security • People and processes • Network security • Host security • Applications security (both internally developed and commercially off-the-shelf (COTS)) Patch management planning and procedures A patching and vulnerability management process should be established based on the timely awareness of issues and appropriate action.
Cybersecurity considerations for electrical distribution systems 4.1.10 Acronyms COTS Commercially Off-the-Shelf Demilitarized Zone Denial of Service File Transfer Protocol Human Machine Interface Industrial Control Systems ICS-CERT Industrial Control Systems - Cyber EmergencyResponse Team IDPS Intrusion Detection and Prevention Systems Intrusion Detection Systems Intrusion Prevention Systems Information Technology National Vulnerability Database...
“hardening” guidelines provide information to the users to securely deploy and maintain their product to adequately minimize the cybersecurity risks to their system. Eaton is committed to minimizing the Cybersecurity risk in its products and deploys cybersecurity best practices and latest cybersecurity technologies in its products and solutions; making them more secure, reliable and competitive for our customers. Eaton also offers Cybersecurity Best Practices whitepapers to its customers that can be referenced at www.eaton.com/cybersecurity...
The device also provide multiple options to connect with the device i.e. SSH, SNMP,SMTP,HTTPS etc. Services like SNMPv1 are considered insecure and Eaton recommends disabling all such insecure services. • It is recommended to disable unused physical ports like USB and SD card.
- http://eaton.com/cybersecurity and patch through www.powerquality.eaton.com/Support/. Conduct regular Cybersecurity risk analyses of the organization /system. Eaton has worked with third-party security firms to perform system audits, both as part of a specific customer’s deployment and within Eaton’s own development cycle process. Eaton can provide guidance and support to your organization’s effort to perform regular cybersecurity audits or assessments. Plan for Business Continuity / Cybersecurity Disaster Recovery It’s a Cybersecurity best practice for organizations to plan for Business continuity. Establish an OT Business Continuity plan, periodically review and, where possible, exercise the established continuity plans.
Configuring user permissions through profiles https://ics-cert.us-cert.gov/Standards-and-References [R4] National Institute of Technology (NIST) Interagency “Guidelines on Firewalls and Firewall Policy, NIST Special Publication 800-41”, October 2009: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf 4.3 Configuring user permissions through profiles The user profile can be defined when creating a new users or changed when modifying an existing one. Refer to the section Users in the settings. 4.4 Decommissioning the Network Management module With the increased frequency of reported data breaches, it’s becoming more and more necessary for companies to implement effective and reliable decommissioning policies and procedures in order to protect the data stored on retired IT equipment from falling into the wrong hands, or a data breach. ...
Description and features 5 Servicing the EMP 5.1 Description and features The optional Environmental Monitoring Probe (EMP) enables you to collect temperature and humidity readings and monitor the environmental data remotely. You can also collect and retrieve the status of one or two dry contact devices (not included). You can monitor readings remotely using SNMP or a standard Web browser through the Network module.
Installing the EMP 5.3.1 Mounting the EMP The EMP includes magnets, cable ties slots and keyholes to enable multiple ways of mounting it on your installation. Bottom mounting capabilities: Side mounting • magnets • magnets • keyholes • tie wraps •...
Installing the EMP Bottom mounting Side mounting Wall mounting with screws example To mount the EMP on the wall close to the rack, use the supplied screw and screw anchor. Then, mount the EMP on the screw and tighten it. Wall mounting with nylon fastener example To mount the EMP within the enclosure environment, attach one nylon fastener to the EMP and the other nylon fastener to an enclosure rail post.
3- Connect the USB connector of the USB to RS485 converter cable to the Network-Module USB connector. Use the supplied tie wraps to secure the RS485 to USB cable connection. Example: EMP connection to the Network-M2 Servicing the EMP – 87...
RJ45 connector of the third EMP (FROM DEVICE). 3- Refer to next section for the EMPs addressing in daisy chain. Example: connection to the Network-M2 5.3.4 Defining EMPs address and termination Manual addressing Define different address for all the EMPs in the daisy-chain.
• External contact device 2. Connect the return and signal input wires from device 2 to screw terminals 2- Tighten the corresponding tightening screws on top of the EMP to secure the wires. 5.4 Commissioning the EMP 5.4.1 On the Network-M2 device STEP 1: Connect to the Network Module Servicing the EMP – 89...
Page 90
Commissioning the EMP • On a network computer, launch a supported web browser. The browser window appears. • In the Address/Location field, enter: https://xxx.xxx.xxx.xxx/ where xxx.xxx.xxx.xxx is the IP address of the Network Module. • The log in screen appears. • Enter the user name in the User Name field. • Enter the password in the Password field. •...
Front panel connectors and LED indicators 6 Information 6.1 Front panel connectors and LED indicators Name Description Network connector Ethernet port Network speed LED Flashing green sequences: • 1 flash — Port operating at 10Mbps • 2 flashes — Port operating at 100Mbps •...
Default settings parameters Warning LED Solid red — Network Module is in error state. Boot LEDs Solid green and flashing red — Network Module is starting boot sequence. Settings/UPS data Configuration port. connector Access to Network Module’s web interface through RNDIS (Emulated Network port). Access to the Network Module console through Serial (Emulated Serial port).
Default settings parameters Minimum length — enabled (8) Minimum length — enable (6-32)/disable Password Minimum upper case — enabled (1) Minimum upper case — enable (0-32)/disable strength Minimum lower case — enabled (1) Minimum lower case — enable (0-32)/disable Minimum digit — enabled (1) Minimum digit — enable (0-32)/disable Special character — enabled (1) Special character — enable (0-32)/disable Password expires after — disabled Password expires after — disable/enable Account (1-99999) Main administrator password never expiration expires — disabled Main administrator password never expires — disable/enable Block account when invalid password is entered after — Block account when invalid password is disabled entered after — disable/enable (1-99) Main administrator account never Main administrator account never blocks —...
Default settings parameters Email Default setting Possible parameters No email 5 configurations maximum Email sending Active — Active/Inactive configuration Configuration name — 128 characters maximum Email address — 128 characters maximum • Delegate email to Active — No/Yes Email addresses – List of emails Keep primary email address in copy – disable/enable Starting – Date and time Ending – Date and time • Notify on events Active — No/Yes On card events – Subscribe/Attach logs (Critical/Warning/Info) On devices events – Subscribe/Attach logs...
Default settings parameters My preferences Default setting Possible parameters Edit user: Edit user: Profile • Full name — Administrator • Full name — 128 characters maximum • Email — blank • Email — 128 characters maximum • Phone — blank • Phone — 64 characters maximum • Organization — blank • Organization — 128 characters maximum °C (Celsius) °C (Celsius)/°F (Fahrenheit) Temperature MM-DD-YYYY...
Specifications/Technical characteristics 6.3 Specifications/Technical characteristics Physical characteristics Dimensions (wxdxh) 132 x 66 x 42 mm | 5.2 x 2.6 x 1.65 in Weight 70 g | 0.15 lb RoHS 100% compatible Storage Storage temperature -25°C to 70°C (14°F to 158°F) Ambient conditions Operating temperature 0°C to 70°C (32°F to 158°F)
List of events codes Settings/UPS data USB RNDIS Apipa compatible | IP address: 169.254.0.1 | Subnet mask: connector 255.255.0.0 *xUPS MIB | Standard IETF UPS MIB (RFC 1628) 6.4 List of events codes To get access to the Alarm log codes or the System log codes for email subscription, see the Alarm log codes and System log codes sections. 6.5 Alarm log codes ...
Page 100
Alarm log codes Critical Rectifier short circuit Rectifier OK Reduce output load Critical DCDC converter failure DCDC converter OK Service required Critical Battery charger fault Battery charger OK Service required Critical Battery fuse fault Battery fuse OK Service required Critical Battery low Battery OK Critical...
Alarm log codes Critical Inverter thermal No power overload Reduce output overload load Critical Inverter voltage too low Inverter voltage OK Service required Critical Inverter voltage too high Inverter voltage OK Service required 6.5.2 Warning Code Severity Active message Non active message Advice Warning On battery...
Alarm log codes Warning Battery low voltage Battery OK Warning Battery voltage too high Battery voltage OK Warning Load not powered Load powered Warning Power overload No power overload Reduce output load Warning Overload alarm No overload Reduce output load 1032 Warning Protection: immediate...
System log codes 6.6 System log codes To retrieve System logs, navigate to Card>>>System logs section and press the Download System logs button. 6.6.1 Alert Code Severity Log message File 0801000 Alert User account - admin password reset to default logAccount.csv 6.6.2 Critical Code Severity Log message File 0E00400 Critical The [selfsign/PKI] signed certificate of the <service> logSystem.csv server is not valid 6.6.3 Error...
System log codes 6.6.6 Info Code Severity Log message File 0A00100 Info Network module upgrade success <f/w: xx.yy.zzzz> logUpdate.csv 0A00300 Info Network module upgrade started logUpdate.csv 0A00600 Info Network module file system integrity OK <f/w: logUpdate.csv xx.yy.zzzz> 0B00300 Info Time with NTP synchronized logSystem.csv 0B00600 Info...
CLI .1.3.6.1.4.1.534.1.11.4.1.0.43 Sensor humidity is below/above critical threshold .1.3.6.1.4.1.534.1.11.4.1.0.48 Maintenance bypass 6.8 CLI CLI can be accessed through SSH. It is intended mainly for automated configuration of the network and time settings of the network card. It can also be used for troubleshooting and remote reboot/reset of the network interface in case the web user interface is not accessible.
-4, --ipv4 <mode> Mode values: manual <network> <mask> <gateway> set custom Network address, Netmask and Gateway dhcp automatically set Network Address, Netmask and Gateway Examples of usage • Display Link status and MAC address netconf -L • Set Auto negotiation to Link netconf -L auto • Set custom hostname\n \ netconf -d hostname ups-00-00-00-00-00-00 •...
6.9.1 Availability of Source Code The source code of open source components that are made available by their licensors may be obtained upon written express request by contacting network-m2-opensource@Eaton.com. Eaton reserves the right to charge minimal administrative costs, in compliance with the terms of the underlying open source licenses, when the situation requires.
Acronyms and abbreviations 6.10 Acronyms and abbreviations AC: Alternating current. AVR: Automatic Voltage Regulation provides stable voltage to keep equipment running in the optimal range. CA: Certificate Authority CLI: Command Line Interface. Aim is to interact with the Network Module by using commands in the form of successive lines of text (command lines). CSR: Certificate Signing Request DC: Direct current.
Page 113
Acronyms and abbreviations SSH: Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network. TLS: Transport Layer Security (TLS) is cryptographic protocol that provide communications security over a computer network. TFTP: Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. UPS: An uninterruptible power supply is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails. A UPS is typically used to protect hardware such as computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, fatalities, serious business disruption or data loss.
Page 114
Acronyms and abbreviations Information – 114...
EMP detection fails at discovery stage 7 Troubleshooting 7.1 EMP detection fails at discovery stage 7.1.1 Symptoms In the Network Module, in Card>>>Sensors, EMPs are missing in the Sensor commissioning table. 1. The EMPs orange RJ45 LEDs are not blinking. 2. The EMPs green RJ45 LED (FROM DEVICE) is not ON. 7.1.2 Possible cause 1.
IPP is not able to communicate with the Network module 7.3.2 Possible cause The IPP certificate is not yet valid for the Network Module. Certificates of IPP and the Network Module are not matching so that authentication and encryption of connections between the Network Module and the shutdown agents is not working.
During the selected timeframe, new agent connections to the Network Module are automatically trusted and accepted. STEP 4: Action on the agent (IPP) while the time to accepts new agents is running on the Network Module Remove the Network module certificate file(s) *.0 that is (are) located in the folder Eaton \IntelligentPowerProtector\configs\tls. 7.4 Password change in My preferences is not working 7.4.1 Symptoms The password change shows "Invalid credentials" when I try to change my password in My preferences menu.
Need help?
Do you have a question about the Network-M2 and is the answer not in the manual?
Questions and answers