5.2 Cybersecurity recommended secure hardening guidelines
5.2.1 Introduction
This Network module has been designed with Cybersecurity as an important consideration. Number of Cybersecurity features are
now offered in the product which if implemented as per the recommendations in this section would minimize Cybersecurity risk to
the Network module. This section "secure configuration" or "hardening" guidelines provide information to the users to securely
deploy and maintain their product to adequately minimize the cybersecurity risks to their system.
Eaton is committed to minimizing the Cybersecurity risk in its products and deploys cybersecurity best practices and latest
cybersecurity technologies in its products and solutions; making them more secure, reliable and competitive for our customers.
Eaton also offers Cybersecurity Best Practices whitepapers to its customers that can be referenced at
cybersecurity
5.2.2 Secure configuration guidelines
5.2.2.1 Asset identification and Inventory
Keeping track of all the devices in the system is a prerequisite for effective management of Cybersecurity of a system. Ensure you
maintain an inventory of all the components in your system in a manner in which you uniquely identify each component. To
facilitate this Network module supports the following identifying information - manufacturer, type, serial number, f/w version
number, and location.
5.2.2.1.1 Network Module identification and its firmware information
It can be retrieved by navigating
Identification
•
System name
•
Product
•
Physical name
•
Vendor
•
UUID
•
Part number
•
Serial number
•
Hardware version
•
Location
•
Contact
Firmware information
•
Firmware version
•
Firmware SHA
•
Firmware date
•
Firmware installation date
•
Firmware activation date
•
Bootloader version
The COPY TO CLIPBOARD button will copy the information to the clipboard.
5.2.2.1.2 Communication settings
It can be retrieved by navigating
LAN
•
Link status
•
MAC address
•
Configuration
to Contextual help>>>Maintenance>>>System
to Contextual help>>>Settings>>>Network &
Cybersecurity recommended secure hardening guidelines
information.
Protocol.
Securing the Network Management Module – 197
www.eaton.com/
Need help?
Do you have a question about the Network-M2 and is the answer not in the manual?