4.1.1
Commissioning............................................................................................................................................................. 159
4.1.2
Testing LDAP authentication ........................................................................................................................................ 160
4.1.3
Limitations .................................................................................................................................................................... 160
4.2
4.2.1
4.2.2
4.2.3
Pairing with manual acceptance .................................................................................................................................. 161
4.3
4.3.1
4.3.2
4.3.3
4.4
4.5
4.6
4.6.1
Web interface ............................................................................................................................................................... 170
4.6.2
Shell script .................................................................................................................................................................... 170
4.6.3
Example:....................................................................................................................................................................... 170
4.7
Changing the RTC battery cell ............................................................................................................................................ 171
4.8
4.9
4.9.1
Automatic time synchronization ................................................................................................................................... 173
4.9.2
Manual time synchronization........................................................................................................................................ 173
4.10
Changing the language of the web pages .......................................................................................................................... 173
4.11
Resetting username and password.................................................................................................................................... 174
4.11.1
As an admin for other users ......................................................................................................................................... 174
4.11.2
Resetting its own password......................................................................................................................................... 174
4.12
4.13
4.14
4.14.1
Web page ..................................................................................................................................................................... 176
4.15
4.15.1
4.15.2
4.16
4.16.1
4.16.2
4.16.3
5
5.1
5.1.1
Purpose ........................................................................................................................................................................ 189
5.1.2
Introduction .................................................................................................................................................................. 189
5.1.3
5.1.4
Cybersecurity threat vectors ........................................................................................................................................ 189
5.1.5
Defense in depth .......................................................................................................................................................... 190
5.1.6
Designing for the threat vectors................................................................................................................................... 191
5.1.7
5.1.8
Conclusion .................................................................................................................................................................... 195
5.1.9
Terms and definitions ................................................................................................................................................... 195
5.1.10
Acronyms ..................................................................................................................................................................... 195
5.1.11
References ................................................................................................................................................................... 196
5.2
5.2.1
Introduction .................................................................................................................................................................. 197
5.2.2
Secure configuration guidelines ................................................................................................................................... 197
Need help?
Do you have a question about the Network-M2 and is the answer not in the manual?
Questions and answers