Page 1
Instruction manual December 2020 MTL Industrial Network Solutions INM 9475-ETGRev 1 9475-ETG Instrinsically Safe Gigabit Ethernet Dual Port Media Converter...
Page 2
DECLARATION OF CONFORMITY A printed version of the Declaration of Conformity has been provided separately within the original shipment of goods. However, you can find a copy of the latest version at - http://www.mtl-inst.com/certificates INM 9475-ETG Rev 1...
DESCRIPTION The 9475-ETG is an Intrinsically Safe (IS) Gigabit Ethernet Dual Port Media converter suitable for Zone 1 / Zone 21 mounting, (Zone 0 / Zone 20 with a suitable Ex ia Power Supply). There are 2x RJ45 (LAN) ports that support 10/100/1000 IS Ethernet connections – these can allow ‘daisy-chaining’...
CONNECTIONS 3 .1 DATA & POWER TERMINALS Power + External IP Rated LEDs (CON1) Function Function Power In +12V Power In 0V LAN1 EXT LED LAN2 EXT LED FIBRE1 EXT LED FIBRE2 EXT LED External IP66 rated LEDs wire down to 0V Power Ui = 15.4V 3 .2 LAN (RJ45) 10/100/1000 BASE-T Ethernet...
ORDERING INFORMATION Part Number Description Comments 9475-ETG Gigabit Ethernet Dual Port Media Converter Standard DIMENSIONS Width 42mm Height 160mm Depth 140mm Weight 1500g Mounting Din Rail ENVIRONMENTAL Operating Temperature -40°C…+70°C Storage Temperature -40°C…+70°C Humidity 0…95% RH, non-condensing Ingress Protection Select enclosure to suit application, see certificates for information WASTE REMOVAL INFORMATION The electronic equipment within must not be treated as general waste.
INSTALLATION The module requires mounting within an enclosure providing a degree of protection of at least IP6x, in accordance with EN60529 and in a manner that does not impair the existing creepage and clearance distances. The enclosure must also comply with the requirements of Clauses 7 and 8 of EN50014 and be sealed to prevent the ingress of dust.
Specification Power supplies 12VDC IS Power Supply Input PoEx (Power over IS Ethernet) Typically 12V @ 270mA (Inrush < 400mA) Ui =15.4V 9492-PS-PLUS recommended Ethernet Intrinsically Safe 10/100/1000Base-T Connector RJ45 (x2) Fibre-Optic Type SC (1310nm) Cable Length Up to 100m Cat5e Up to 10Km Single Mode Fibre Up to 500m Multi Mode Fibre 9 .1...
CERTIFICATE INSTALLATION The certificate works on the Hostname of “9475-Media” To be able to view the HTTPS pages of the unit securely you are required to install a SSL certificate. Below are the steps required in the Google Chrome browser (other browser setups are similar).
Page 11
Click on the Trusted Root Certification Authorities Ab and click Insert Browse for the “ca-cert.pem” file and install it. You will now get and entry in the list of certificates called Controlled Systems Ltd ECDSA root INM 9475-ETG Rev 1...
CONNECTING THE 9475-ET(G)TO A PC/NETWORK Ensure that the 9475 unit is powered by a suitable IS supply, such as the MTL 9492-PS-PLUS. PoEx can be used to power the unit via the LAN port if required. The 9475 unit should then be connected to an IS Ethernet Network/PC using a ...
SYSTEM INFORMATION This is the main page of the 9475 and show the main information of the 9475 Media Converter. This page show the status of the unit to confirm everything is functioning correctly. Hardware and Software version is shown here as well to ensure the latest firmware is being used.
PORT STATUS This page show the current status of the 2 LAN ports and the 2 Fibre ports on the 9475. The unit will display any connected Gigabit ports in green and any connected 10/100Mbps ports in Yellow. INM 9475-ETG Rev 1...
NETWORK STATISTICS On this page counters are shown to enable fault finding on your network infrastructure. There are 64 counters for the 4 external ports and the one internal port connected to the CPU. The counters can be cleared using the Clear Statistics button. INM 9475-ETG Rev 1...
MAC TABLE This page shows in blocks of 10 the relative location of network devices in relation to the unit Trunk Specifies the DPV value is the trunk ID Destination Port Vector value is a bit pattern of the ports on the unit ...
ACTIVITY LOG This page accessed via the password shows any changes that have occured to the unit. This includes configuration changes, password entered wrong and other useful information. The Clear Log button will empty the existing log. NOTE: The Factory Default Password is "Pa55W075" (without quotes) INM 9475-ETG Rev 1...
SYSTEM SETTINGS This page accessible via password allows the changing of the Web Server Security and the local IP Address of the 9475 System Settings Web Server Security HTTP (clear text) HTTPS (encrypted) We strongly recommend the use of HTTPS so that the data between browser and 9475 is encrypted Admin Password The admin password can be changed here...
PORT SETTINGS This page accessible via password allows the changing of the 2 Ethernet ports. • Mode Off, Auto or Fixed Negotiation • Duplex Half or Full • Speed 10 Mbps, 100Mbps 1Gbps (1000) The 2 Fibre Ports are fixed 1000BASE-X and cannot be changed. Click Submit to save the selection.
RESTORE FACTORY DEFAULTS This page allow the resetting of the unit back to Factory Defaults. To reset enter the factory reset code . This page is only accessed via a password The default factory reset code is “DEFA” REBOOT MEDIA CONVERTER This page allow the rebooting of the unit.
LOGOUT OF CURRENT WEB SESSION This page logs the current user out of the web session. It is highly recommended that once finished using the web interface that you log out enforcing that the password will have to be entered next time the unit is accessed.
Authorized Party may not use any part of the Product Software to establish any independent data files, databases, compendiums or any other reference materials. Any attempt to do so is a violation of the rights of Eaton. If Authorized Party breaches these restrictions, Authorized Party may be subject to prosecution and damages.
Page 24
Product Software at any time. Certain functions of the Product Software may be modified or discontinued as a result of any such updates or upgrades. If Eaton elects to provide maintenance or support of any kind, Eaton may terminate that maintenance or support at any time without notice to Authorized Party.
Page 25
Source Software”) or third-party proprietary software. Some Open Source Software or proprietary software (collectively, “Third-Party Software”) is owned by third parties. Eaton provides the Third-Party Software to You “AS IS” without any indemnities or warranties of any kind. The Open Source Software is not subject to the terms and conditions of this Agreement.
Page 26
(including reasonable attorneys' fees, costs of defense, and direct, indirect, punitive, special, individual, consequential, or exemplary damages), Eaton or any of the Indemnified Parties suffer in relation to, arising from, or from the purpose of avoiding, any claim or demand from a third party that relates to Authorized Party’s: (a) breach or...
Page 27
Software on the Authorized Party’s behalf. Authorized Party is liable for all transactions and other activities carried out under the Authorized Party’s Credentials. Authorized Party agrees to promptly notify Eaton if any password is lost, stolen, disclosed to an unauthorized party, or otherwise may have been compromised. Authorized Party agrees to immediately notify Eaton at mailto:mtltechsupport@eaton.com of any unauthorized...
Page 28
The section titles in this Agreement are for convenience only and have no legal or contractual effect. No failure or delay by Eaton or its affiliates to exercise any right or enforce any obligation shall impair or be construed as a waiver or ongoing waiver of that...
Page 29
Consistent with 48 C.F.R. § 12.212 and 48 C.F.R. §§ 227.7202-1 through 227.7202-4, all U.S. Government End Users acquire the Software with only those rights set forth herein. Contractor/manufacturer is Eaton Corporation, 1000 Eaton Boulevard, Cleveland, Ohio 44122.
Page 30
Any questions regarding this Agreement should be directed to Eaton at: Eaton Attn: IP Law Group 1000 Eaton Boulevard Mail Code 4N Cleveland, OH 44122 Eaton Attn: Global Data Protection and Privacy Office 1000 Eaton Boulevard Cleveland, OH 44122 Email: dataprotection@eaton.com...
Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products and solutions, making them more secure, reliable and competitive for customers.
Page 32
<Include for software> - publisher, name, version, and version date. Risk Assessment Eaton recommends conducting a risk assessment to identify and assess reasonably foreseeable internal and external risks to the confidentiality, availability and integrity of the system | device and its environment.
Page 33
Category Description COTS Platform Security Eaton recommends that customers harden third- party commercial off-the-shelf (COTS) operating systems or plat- forms that are used to run Eaton applications / products (e.g., third party hardware, operating systems hyper- visors, such as those made available by Dell, Microsoft, VMware, Cisco, etc.).
Page 34
Network Security The 9475 Gigabit Media Converter supports network communication with other devices in the environment. This capability can present risks if it’s not configured securely. Following are Eaton recommended best practices to help secure the network. Additional information about various...
Page 35
For many non-COTS products vulnerabilities will be communicated directly through the vendor site. Malware Defenses Eaton recommends deploying adequate malware defenses to protect the product or the platforms used to run the Eaton product. INM 9475-ETG Rev 1...
Page 36
Update device firmware prior to putting the device into production. Thereafter, apply firmware updates and soft- ware patches regularly. Eaton publishes patches and updates for its products to protect them against vulnerabilities that are discovered. Eaton encourages customers to maintain a consistent process to promptly monitor for and install new firmware updates.
Page 37
It is a best practice to purge data before disposing of any device containing data. Guidelines for Zeroisation decommissioning are provided in NIST SP 800- 88. Eaton recommends that products containing embedded flash memory be securely destroyed to ensure data is unrecoverable. from NIST SP800-88 •...
APPENDIX C CYBERSECURITY REFERENCES • [R1] Cybersecurity Considerations for Electrical Distribution Systems (WP152002EN): http://www.eaton.com/ecm/groups/public/@pub/@eaton/@corp/documents/ content/pct_1603172.pdf • [R2] Cybersecurity Best Practices Checklist Reminder (WP910003EN): http://www.cooperindustries.com/content/dam/public/powersystems/resources/ library/1100_EAS/WP910003EN.pdf • [R3] NIST SP 800-82 Rev 2, Guide to Industrial Control Systems (ICS) Security, May 2015: https://ics-cert.us-cert.gov/Standards-and-References...
Page 39
This page is left intentionally blank INM 9475-ETG Rev 1...
Page 40
This page is left intentionally blank INM 9475-ETG Rev 1...
Page 41
AUSTRALIA NORWAY Eaton Electrical (Australia) Pty Ltd, Norex AS 10 Kent Road, Mascot, New South Wales, 2020, Australia Fekjan 7c, Postboks 147 , N-1378 Nesbru, Norway Tel: +61 1300 308 374 Fax: +61 1300 308 463 E-mail: mtlsalesanz@eaton.com Tel: +47 66 77 43 80 Fax: +47 66 84 55 33 E-mail: info@norex.no...
Need help?
Do you have a question about the MTL 9475-ETG and is the answer not in the manual?
Questions and answers