Eaton Network-M2 User Manual page 6

Ups network management card
Hide thumbs Also See for Network-M2:
Table of Contents

Advertisement

4.1.1
Commissioning............................................................................................................................................................. 159
4.1.2
Testing LDAP authentication ........................................................................................................................................ 160
4.1.3
Limitations .................................................................................................................................................................... 160
4.2
Pairing agent to the Network Module ................................................................................................................................ 160
4.2.1
Pairing with credentials on the agent ........................................................................................................................... 160
4.2.2
4.2.3
Pairing with manual acceptance  .................................................................................................................................. 161
4.3
Powering down/up applications (examples) ....................................................................................................................... 162
4.3.1
Powering down IT system in a specific order .............................................................................................................. 162
4.3.2
Powering down non-priority equipment first ................................................................................................................ 165
4.3.3
Restart sequentially the IT equipment on utility recovery ............................................................................................ 168
4.4
Checking the current firmware version of the Network Module........................................................................................ 169
4.5
Accessing to the latest Network Module firmware/driver/script........................................................................................ 169
4.6
Upgrading the card firmware (Web interface / shell script) ................................................................................................ 170
4.6.1
Web interface ............................................................................................................................................................... 170
4.6.2
Shell script .................................................................................................................................................................... 170
4.6.3
Example:....................................................................................................................................................................... 170
4.7
Changing the RTC battery cell ............................................................................................................................................ 171
4.8
Updating the time of the Network Module precisely and permanently (ntp server) .......................................................... 173
4.9
Synchronizing the time of the Network Module and the UPS............................................................................................ 173
4.9.1
Automatic time synchronization ................................................................................................................................... 173
4.9.2
Manual time synchronization........................................................................................................................................ 173
4.10
Changing the language of the web pages .......................................................................................................................... 173
4.11
Resetting username and password.................................................................................................................................... 174
4.11.1
As an admin for other users ......................................................................................................................................... 174
4.11.2
Resetting its own password......................................................................................................................................... 174
4.12
Recovering main administrator password .......................................................................................................................... 174
4.13
Switching to static IP (Manual) / Changing IP address of the Network Module................................................................. 175
4.14
Reading device information in a simple way ...................................................................................................................... 176
4.14.1
Web page ..................................................................................................................................................................... 176
4.15
Subscribing to a set of alarms for email notification........................................................................................................... 176
4.15.1
Example #1: subscribing only to one alarm (load unprotected) .................................................................................... 176
4.15.2
Example #2: subscribing to all Critical alarms and some specific Warnings ................................................................ 178
4.16
Saving/Restoring/Duplicating Network module configuration settings .............................................................................. 179
4.16.1
Modifying the JSON configuration settings file............................................................................................................ 179
4.16.2
Saving/Restoring/Duplicating settings through the CLI ................................................................................................ 188
4.16.3
Saving/Restoring/Duplicating settings through the Web interface............................................................................... 188
5
SECURING THE NETWORK MANAGEMENT MODULE................................................................................. 189
5.1
Cybersecurity considerations for electrical distribution systems ....................................................................................... 189
5.1.1
Purpose ........................................................................................................................................................................ 189
5.1.2
Introduction .................................................................................................................................................................. 189
5.1.3
5.1.4
Cybersecurity threat vectors ........................................................................................................................................ 189
5.1.5
Defense in depth .......................................................................................................................................................... 190
5.1.6
Designing for the threat vectors................................................................................................................................... 191
5.1.7
Policies, procedures, standards, and guidelines........................................................................................................... 193
5.1.8
Conclusion .................................................................................................................................................................... 195
5.1.9
Terms and definitions ................................................................................................................................................... 195
5.1.10
Acronyms ..................................................................................................................................................................... 195
5.1.11
References ................................................................................................................................................................... 196
5.2
Cybersecurity recommended secure hardening guidelines ............................................................................................... 197
5.2.1
Introduction .................................................................................................................................................................. 197
5.2.2
Secure configuration guidelines ................................................................................................................................... 197

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Network-M2 and is the answer not in the manual?

Questions and answers

Table of Contents

Save PDF