1 Table of Contents TABLE OF CONTENTS ............................4 INSTALLING THE NETWORK MANAGEMENT MODULE ................10 Wiring the power redundancy (PDU+1) ..........................10 2.1.1 Power redundancy principle ............................10 2.1.2 Examples ..................................11 Connecting PDUs in cascade .............................. 14 Accessing the Network Module ............................15 2.3.1 Accessing the web interface through Network......................
Page 6
Replacing the PDU Network Management and Control Module..................182 5.12.1 To replace the eNMC2 module ........................... 183 5.13 Restarting the eNMC2 Module and Resetting the PDU....................187 SECURING THE NETWORK MANAGEMENT MODULE................188 Cybersecurity considerations for electrical distribution systems ..................188 6.1.1 Purpose ..................................
Page 7
SERVICING THE EMP ............................ 205 Description and features ..............................205 Unpacking the EMP................................205 Installing the EMP ................................206 7.3.1 Defining EMPs address and termination ........................206 7.3.2 Mounting the EMP ..............................206 7.3.3 Cabling the first EMP to the device..........................209 7.3.4 Daisy chaining EMPs ..............................
Page 8
8.7.14 save_configuration | restore_configuration........................248 8.7.15 sanitize..................................249 8.7.16 ssh-keygen .................................. 250 8.7.17 time ..................................... 250 8.7.18 traceroute and traceroute6 ............................251 8.7.19 whoami..................................252 8.7.20 email-test..................................252 8.7.21 systeminfo_statistics..............................253 8.7.22 certificates ................................... 254 Legal information................................255 8.8.1 Availability of Source Code ............................255 8.8.2 Notice for Open Source Elements..........................
Wiring the power redundancy (PDU+1) 2 Installing the Network Management Module 2.1 Wiring the power redundancy (PDU+1) 2.1.1 Power redundancy principle Interconnect 2 Network Modules using the power redundancy port (PDU+1) with a standard Ethernet cable (not supplied). Power the 2 Network Modules with 2 different feeds so that if one feed is down, the Network Module will still be powered ON and alive, providing useful information on the power outage situation.
Wiring the power redundancy (PDU+1) Warning: In case of of a power cut on FEED A, if the module of the FEED B is rebooted, the module on FEED A will reboot aswell 2.1.2 Examples 2.1.2.1 Power redundancy connection with 2 feeds = OK Installation: Result with a power cut on FEED A = all the modules are powered by FEED B...
Page 12
Wiring the power redundancy (PDU+1) Result with a power cut on FEED B = all the modules are powered by FEED A Installing the Network Management Module – 12...
Page 13
Wiring the power redundancy (PDU+1) 2.1.2.2 Power redundancy connection but with only one feed = Not OK Installation: Result with a power cut on FEED A = all the modules are no more powered • With modules interconnected using the PDU+1 port •...
Connecting PDUs in cascade 2.1.2.3 No power redundancy connection = Not OK Installation: Result with a power cut on FEED A = all the modules are no more powered • Without modules interconnected with the PDU+1 port • And with modules powered with the same feed 2.2 Connecting PDUs in cascade Installing the Network Management Module – ...
Accessing the Network Module 2.3 Accessing the Network Module 2.3.1 Accessing the web interface through Network 2.3.1.1 Connecting the network cable Security settings in the Network Module may be in their default states. For maximum security, configure through a USB connection before connecting the network cable. Connect a standard ...
Accessing the Network Module STEP 4 – Enter the user name in the User Name field. The default user name is admin. STEP 5 – Enter the password in the Password field. The default password is admin. STEP 6 – The password must be changed at first login. STEP 7 – Click Login.
Accessing the Network Module To access the web interface through RNDIS, see the Accessing the web interface through RNDIS section. • Navigate to Contextual help>>>Settings>>>Network & Protocol>>>IPV4. • Read the IPv4 settings. 2.3.2.2 Your network is not equipped with a BOOTP/DHCP server 2.3.2.2.1 Define from the configuration port The IP address can be defined by accessing the web interface through RNDIS.
Page 18
Accessing the Network Module b Manual configuration STEP 1 – In case Windows® OS fails to find driver automatically, go to the Windows control panel>Network and sharing center>Local area connection STEP 2 – Right click on the RNDIS local area connection and select Properties. STEP 3 – Select Internet Protocol Version 4 (TCP/IPv4)”...
Page 19
Accessing the Network Module STEP 4 – Then enter the configuration as below and validate (IP = 169.254.0.150 and mask = 255.255.0.0), click OK, then click on Close. Installing the Network Management Module – 19...
2.3.3.2.2 Accessing the web interface STEP 1 – Be sure that the Device is powered on. STEP 2 – On the host computer, download the rndis.7z file from the website www.eaton.com/downloads and extract it. For more information, navigate to Servicing the Network Management Module>>>Accessing to the latest Network Module firmware/ driver section.
Page 21
After the card is connected to the PC, manual configuration of the driver is needed for Windows® OS to discover the serial connection. STEP 1 – On the host computer, download the rndis.7z file from the website www.eaton.com/downloads and extract it. STEP 2 – Plug the USB cable and go to Windows® Device Manager.
Accessing the Network Module STEP 4 – Right click on it and select Update Driver Software. When prompted to choose how to search for device driver software, choose Browse my computer for driver software. Select Let me pick from a list of device drivers on my computer. STEP 5 –...
Page 23
Accessing the Network Module • Open Internet Explorer • Navigate to settings, Internet options; • Select the Connections tab • Press LAN Settings • Press ADVANCED • Add the address 169.254. * Installing the Network Management Module – 23...
Page 24
Accessing the Network Module • Press OK. • Close Internet Explorer and re-open it. • Now you can access the address 169.254.0.1 with Internet Explorer and any other browser. Installing the Network Management Module – 24...
Display and control buttons 3 LCD interface operation 3.1 Display and control buttons 3.1.1 Presentation The PDU has a four-button, graphical LCD display. Use the control buttons to change the screen display, retrieve specific performance data, or change configuration values. The display view can also change automatically.
Operation mode 3.2.2 Main menu selections The PDU menu provides useful performance information, alarms, PDU identification, and configuration settings. • Use the scroll buttons to select a menu item from the Main Menu. • Selected menu items are highlighted and display as blue text on a white bar. •...
Operation mode Note 5 : This menu is only available for dual inputs PDU. Note 6 : This menu is only for sections with current measurement. Note 7 : These menus are only available if Environmental Monitoring Probes (EMP) are plugged. 3.2.2.2 Available menu by topologies Topologies DI PDU...
Operation mode 3.2.4 Screensaver The screensaver displays automatically after 30 seconds of inactivity from the start-up screen, a menu, or a submenu. Values are reset every five seconds. These cycles are not user-configurable. Access to the screensaver information from the startup screen is enabled with a long key press on ESC, it can also be used as a screensaver deactivation.
Alarms When backlight is OFF: • The text is extremely hard to see • Pressing any button does not act as a validation or selection but only to turn the backlight ON 3.3 Alarms The Alarms menu gathers all the alarms in two submenus: LCD interface operation – ...
Alarms 3.3.1 Active alarms 3.3.1.1 Display when an alarm occurs The Active Alarms menu filters and displays only active alarms for the PDU. Active alarm screens have priority over other screens. When an alarm occurs, the Active Alarms screen replaces the current screen and the border becomes red.
PDU info 3.4 PDU info The ePDU Info menu provides identification information for this ePDU. The identification information includes the ePDU model type and part number, serial number, ePDU Network Management and Control (eNMC) module firmware version number, IP address, and ePDU Network Management and Control (eNMC) module MAC (Media Access Control) address.
Meter 3.5.1 Input These screens display Total Input data measurements for ePDUs. In addition to Total Input measurements, you can view Phase Input data measurements for 3Ph, split-phase, and dual input ePDUs. Depending on the ePDU electrical topology, different ePDU measures will display in the Total Input and the Input Phase meter screens.
Meter 3.5.1.1 Total Input Meter Data On the Meter menu, scroll up or down to highlight Input . Press ENTER to display the Total Input submenu for your 1Ph, 3Ph, split- phase, or dual input ePDU. Press ENTER again to see Total Input meter data measurements. Scroll up or down to review other Total Input meter data measurements.
Meter 3.5.4 Environment The Environment submenu provides temperature and humidity data for the EMP. This menu allows to discover the pluged EMP's. On the Meter menu, scroll up or down to highlight Environment. Press ENTER to display the Environment submenu. Press ENTER to discover new EMP.
Admin 3.6 Admin The Admin menu provides access to: Network, Control and the Settings menus can be password-protected (refer to Password protected menu). 3.6.1 Network 3.6.1.1 Ethernet mode On the Network menu, scroll up or down to highlight Ethernet port mode. Press ENTER. Press ENTER to display the options in the drop list.
Page 36
Admin WARNING 1 Moving from Dual to Cascade will bridge the two networks into one network and reboot the card. WARNING 2 Moving from Cascade to Dual will separate the ports into two networks and reboot the card. 3.6.1.2 ETH/X The ETH0 or ETH1 submenus allows you to set options for: •...
Admin • Auto-Nego • 1000-Full • 100-Full • 100-Half • 10-Full 10-Half 3.6.2 Settings The Settings menu provides user configuration options. Only the available options display, depending on the assigned user privileges. There are four standard Settings submenus and one optional submenu: •...
Page 38
Admin 3.6.2.2 Background The Background submenu allows you to set the background color of ePDU LCD screen. On the Settings menu, scroll up or down to highlight Background. Press ENTER. Scroll up or down to highlight the selected background option from the menu. Press ENTER to set the selected background color. Press ESC to return to the previous menu. There are 11 background colors.
Admin 3.6.2.3 Language On the Settings menu, scroll up or down to highlight Language. Press ENTER. Scroll up or down to highlight the selected language option from the menu. Press ENTER to set the selected language. Press ESC to return to the previous menu. 3.6.2.4 Reset to default The Reset to default submenu allows you to reset the PDU to the factory settings.
Login page 4 Contextual help of the web interface 4.1 Login page The page language is set to English by default but can be switched to browser language when it is managed. After navigating to the assigned IP address, accept the untrusted certificate on the browser. 4.1.1 Logging in for the first time 4.1.1.1 1. Enter default password As you are logging into the Network Module for the first time you must enter the factory set default username and password.
Login page 4.1.1.3 3. Accept license agreement On the next step, License Agreement is displayed. Read and accept the agreement to continue. Accounts with identical names When an user attempt to log with a user name that exist both locally & remotely, then only the local account can successfully be logged in by default. ...
Empty the cache of your browser using F5 or CTRL+F5. 4.1.2.1 For other issues For details on other issues, see the Troubleshooting section. 4.2 Home The Home screen provides status information for the device including key measures and active alarms.Eaton Home PDU screenshot missing 4.2.1 Header structure Name Displays the Network module name.
Home Output load level Help: Opens full documentation in a separate browser page. Profile: Displays user profile, password change, account information, logout and legal information. Alarms: Open alarm page and displays the number of active alarms. 4.2.2 Menu structure Extend menu display. Home: Overview and status of the Device (Active alarms, Outlet status, ...). Meters: Power quality meters and logs.
Provides input measures (Current, Voltage, Total power). Note: To access the Meters menu, press the icon: 4.2.4 Environment Eaton Home rack environment screenshot missing Sensor status and data are displayed if available, MIN-MAX shows the minimal and maximal temperature or humidity measured by the sensor.
Home 4.2.6 Branches, outlet status and details 4.2.6.1 Branches Provides the name, color and status of the branch. When selected, it provides the detailed status of the selected PDU branch: • Identification • Type • Current • Current crest factor • Current THD •...
Meters • Total energy (since) • Lifetime energy Note: To access outlet Settings/Control/Identify menu, press the icon: 4.2.7 Access rights per profiles Administrator Operator Viewer Home 4.2.7.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.3 Meters 4.3.1 Input Gauge color code:...
Page 48
Meters Displays the product input voltage measures per phases. • L1 voltage (V) and (THD) • L2 voltage (V) and (THD • L3 voltage (V) and (THD 4.3.1.3 Total input Displays the product total input measures. • Frequency (Hz) • Active power (W) •...
Meters 4.3.2 Group Displays measures for the created groups. • Current (A) • Active power (W) • Apparent power (VA) • Reactive power (VAR) • Total energy (W/h) • Lifetime energy (W/h) 4.3.2.1 Access rights per profiles Administrator Operator Viewer Meters group 4.3.2.1.1 For other access rights For other access rights, see the...
Controls 4.4 Controls 4.4.1 Outlets 4.4.1.1 Outlets status table The table displays the outlets information and includes the following details. • Outlet icon • ID – Outlet identification number • Name • Current (A) • State – On or Off 4.4.1.2 Control outlets Select outlets and press the Control outlets button to display the control panel.
Page 51
Controls Contextual help of the web interface – 51...
Controls 4.4.1.2.1 Commands A set of commands are available and activated when the Execute button is pressed. The outlet selection is listed with the capability to remove outlets from the selection if needed. • Turn On This will switch ON the outlet selection. •...
Page 53
Controls Contextual help of the web interface – 53...
Environment 4.4.2.1.1 Commands A set of commands are available and activated when the Execute button is pressed. The group selection is listed with the capability to remove groups from the selection if needed. • Turn On This will switch ON the outlets included in the group selection. •...
Page 55
Environment • Humidity of <sensor_2> (in %, 1 decimal digit) • Temperature of <sensor_3> (in K, 1 decimal digit) • Humidity of <sensor_3> (in %RH, 1 decimal digit) °C = K - 273.15 °F = K x 9/5 -459.67 4.5.1.2.2 Discover At first the table is empty, press the Discover button to launch the sensor discovery process. If sensors are discovered, the table is populated accordingly 4.5.1.2.3 Delete Select a sensor and press the Delete button to delete the sensor.
Page 56
Environment 4.5.1.2.5 Edit Press the pen logo to edit sensor communication information: You will get access to the following information and settings: • Product reference • Part number • Serial number • Name • Location • Temperature and humidity – Active (Yes, No) •...
Page 57
Environment Press Save after modifications. Deactivated dry contacts are not displayed and replaced by this icon: 4.5.1.3 Access rights per profiles Administrator Operator Viewer Environment/Commissioning Environment/Status 4.5.1.3.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.5.1.4 Troubleshooting EMP communication status shows "Lost"...
Page 58
Environment EMP detection fails at discovery stage In the Network Module, in Contextual help>>>Environment>>>Commissioning/Status , EMPs are missing in the Sensor commissioning table. Symptom #1 The EMPs green RJ45 LED (FROM DEVICE) is not ON. Possible causes The EMPs are not powered by the Network module. Action #1-1 Launch again the discovery, if it is still not ok, go to Action #1-2.
Environment 4.5.1.4.1 For other issues For details on other issues, see the Troubleshooting section. 4.5.2 Alarm configuration Humidity, temperatures or dry contacts deactivated during commissioning are not displayed. Gauge color code: • Green: Value inside thresholds. • Orange/Red: Value outside thresholds. •...
Page 60
Environment The hysteresis is the difference between the value where the alarm turns ON from turning OFF and the value where it turns OFF from turning ON. 4.5.2.2 Humidity The table shows the following information and settings for each sensor: •...
Page 61
Environment 4.5.2.3 Dry contacts The table shows the following settings for each dry contact: • Name • Location • Enabled – yes/no • Alarm severity – Info/Warning/Critical 4.5.2.3.1 Actions a Set Enabled Enable the alarm first and then change the setting in the table and then Save. When disabled, no alarm will be sent.
Environment Humidity Enabled — No Enabled — No/Yes Low critical – 10% 0%<low critical<low warning<high warning<high critical<100% Low warning – 20% High warning – 80% High critical – 90% Dry contacts Enabled — No Enabled — No/Yes Alarm severity – Warning Alarm severity – Info/Warning/Critical 4.5.2.4.1 For other settings For other settings, see the Information>>>Default settings parameters ...
Page 63
Environment • Physical name • Vendor • Part number • Firmware version • UUID • Serial number • Location 4.5.3.1 Access rights per profiles Administrator Operator Viewer Environment/Information 4.5.3.1.1 For other access rights For other access rights, see the Information>>>Access rights per profiles ...
Settings 4.6 Settings 4.6.1 General 4.6.1.1 System details 4.6.1.1.1 Location Text field that is used to provide the card location information. Card system information is updated to show the defined location. 4.6.1.1.2 Contact Text field that is used to provide the contact name information. Card system information is updated to show the contact name.
Page 65
Settings 4.6.1.2 Date & Time The current date and time appears at the top of the screen. You can set the time either manually or automatically. 4.6.1.2.1 Manual mode: Manually entering the date and time 1. Select the time zone for your geographic area. 2.
Page 66
Settings 4.6.1.2.2 Dynamic (NTP): Synchronizing the date and time with an NTP server 1. Select the time zone for your geographic area. 2. Enter the IP address or host name of the NTP servers in the NTP server fields (up to 5 servers). 3.
Page 67
Settings DST is managed based on the time zone. 4.6.1.3 LCD Pin Allows to activate/disactivate the LCD pin code and edit the code. 4.6.1.4 Email notification settings For examples on email sending configuration see the Servicing the Network Management Module>>>Subscribing to a set of alarms for email notification section.
Page 68
Settings 4.6.1.4.1 Email sending configuration table The table shows all the email sending configuration and includes the following details: • Configuration name • Email address • Notification updates – Displays Events notification/Periodic report icons when active. • Status – Active/Inactive/In delegation 4.6.1.4.2 Actions a Add Press the New button to create a new email sending configuration.
Page 69
Settings c Edit Press the pen icon to edit email sending configuration: You will get access to the following settings: • Custom name • Email address • Status – Active/Inactive • Hide the IP address from the email body – Disabled/Enabled This setting will be forced to Enabled if Enabled in the SMTP settings. •...
Page 70
Settings 4.6.1.5 SMTP settings SMTP is an internet standard for electronic email transmission. The following SMTP settings are configurable: Contextual help of the web interface – 70...
Page 71
Choose Mail from the list of available apps. Choose Other from the device list. Enter your Custom Name. You can put any name such as ”eaton-card" in it. Click the Generate button. Copy the password and put in the password field. ( The same password can be reused across multiple cards) Be careful, this password cannot be recovered after clicking the "Done"...
Page 72
Settings Email notification settings No email 5 configurations maximum Custom name — 128 characters maximum Email address — 128 characters maximum Hide IP address from the email body — enable/disabled Status — Active/Inactive • Alarm notifications Active — No/Yes All card events – Subscribe/Attach logs Critical alarm –...
Page 73
Settings 4.6.1.7.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.6.1.8 CLI commands email-test Description mail-test sends test email to troubleshoot SMTP issues. Help Usage: email-test <command> ... Test SMTP configuration. Commands: email-test -h, --help, Display help page email-test -r, --recipient <recipient_address>...
Page 74
Settings time -h Usage: time [OPTION]... Display time and date, change time and date. -h, --help display help page -p, --print display date and time in YYYYMMDDhhmmss format -s, --set <mode> Mode values: - set date and time (format YYYYMMDDhhmmss) manual <date and time> - set preferred and alternate NTP servers ntpmanual <preferred server> <alternate server> - automatically set date and time ntpauto Examples of usage: -> Set date 2017-11-08 and time 22:00 time --set manual 201711082200 -> Set preferred and alternate NTP servers time --set ntpmanual fr.pool.ntp.org de.pool.ntp.org Examples of usage ->...
Page 76
Settings message sender String: refer to default settings and possible parameters for constraints. subject String: refer to default settings and possible parameters for constraints. hideIpAddress true/false SMTP smtp certificateData Certificate Authority of SMTP server port Number: refer to default settings and possible parameters for constraints.
Settings 4.6.2 Local users 4.6.2.1 Local users table The table shows all the supported local user accounts and includes the following details: • Username • Email • Profile • Status – Status could take following values – Inactive/Locked/Password expired/Active For the list of access rights per profile refer to the section Full documentation>>>Information>>>Access rights per profiles.
Page 78
Settings d Global settings Press Save after modifications. Password settings To set the password strength rules, apply the following restrictions: • Minimum length • Minimum upper case • Minimum lower case • Minimum digit • Special character Password expiration To set the password expiration rules, apply the following restrictions: Contextual help of the web interface – ...
Page 79
Settings • Number of days until password expires • Main administrator password never expire Main administrator password never expires If this feature is disabled, the administrator account can be locked after the password expiration. If Enabled, the administrator password never expires, make sure it is changed regularly. Lock account •...
Page 80
Settings Local users 1 user only: 20 users maximum: • Active — Yes • Active — Yes/No • Profile — Administrator • Profile — Administrator/Operator/Viewer • Username — admin • Username — 255 characters maximum • Full Name — blank • Full Name — 128 characters maximum • Email — blank • Email — 128 characters maximum • Phone — blank • Phone — 64 characters maximum •...
Page 81
Settings Help logout <cr> logout the user 4.6.2.4.1 For other CLI commands See the CLI commands in the Information>>>CLI section. 4.6.2.5 Troubleshooting How do I log in if I forgot my password? Action • Ask your administrator for password initialization. • If you are the main administrator, your password can be reset manually by following steps described in the ...
Settings Lock account lockoutRules lockoutRules enabled true/false threshold Number: refer to default settings an possible parameters for defaultAccountNeverBlocks constraints. true Account timeout sessionsService sessionTimeout Numbers: refer to default settings an possible parameters sessionLeaseTime for constraints. Local users PredefinedAccounts credentials enabled true/false username String: refer to default settings...
Page 83
Settings • Certificate • Status – Status could take following values – Unreachable/Active 4.6.3.1.1 Actions a Configure 1.Enable LDAP to be able to configure settings 2. Press Configure to access the following LDAP settings: • Connectivity • Security SSL – None/Start TLS/SSL Verify server certificate •...
Page 84
Settings b Profile mapping For the list of access rights per profile refer to the section Full documentation>>>Information>>>Access rights per profiles. 1. Press Profile mapping to map remote groups to local profiles. 2. Click Save. c Users preferences All users preferences will apply to all remote users (LDAP, RADIUS). Contextual help of the web interface – ...
Page 85
Settings 1. Press Users preferences to define preferences that will apply to all newly logged in LDAP users • Language • Temperature • Date format • Time format 2. Click Save. Contextual help of the web interface – 85...
Page 86
Settings d LDAP Test 1. At the end of each LDAP primary or secondary configuration row you'll be able to launch a LDAP test by clicking on the button. 2. The LDAP test will give you a status ( ok / ko ) on below parameters to make it easier to troubleshoot •...
Page 87
Settings The table shows all the supported severs and includes the following details: • Name - descriptive name for the RADIUS server • Address - hostname or IP address for the RADIUS server • Port - connection port of the RADIUS Server 4.6.3.2.1 Actions a Configure Enable Radius to be able to configure settings...
Page 88
Settings • Address - hostname or IP address for the RADIUS server • UDP port - the UDP port for the RADIUS server (1812 by default) • Time out (s) - length of time the client waits for a response from the RADIUS server •...
Page 89
Profile - the local profile you want users to be mapped Note: The default mapping is used for eaton-specific value : Attribute 28, Vendor 534, Value 1 and Profile administrator. Please refer to your RADIUS protocol provider documentation for further information.
Page 90
Settings 4.6.3.3 Default settings and possible parameters - Remote users Default setting Possible parameters LDAP Configure Configure • Active – No • Active – No/yes • Security • Security SSL – SSL SSL – None/Start TLS/SSL Verify server certificate – enabled Verify server certificate –...
Page 91
Settings RADIUS Configure Configure • Active – No • Active – Yes/No • Retry number – 0 • Retry number – 0 to 128 • Primary server • Primary server Name – blank Name – 128 characters maximum Secret – blank Address –...
Page 92
Settings Help Usage: ldap-test <command> [OPTION]... Test LDAP configuration. Commands: ldap-test -h, --help, Display help page ldap-test --checkusername <username> [--primary|--secondary] [-v] Check if the user can be retrieve from the LDAP server <username> Remote username to test --primary Force the test to use primary server (optional) --secondary Force the test to use secondary server (optional) -v,--verbose...
Page 93
Settings Help logout <cr> logout the user whoami Description whoami displays current user information: • Username • Profile • Realm 4.6.3.5.1 For other CLI commands See the CLI commands in the Information>>>CLI section. 4.6.3.6 Troubleshooting How do I log in if I forgot my password? Action •...
Page 94
Settings 4.6.3.7 Save and Restore Sub section Sub section Sub section Settings Sub settings Possible values section section LDAP ldap settings enabled true/false connectivity primaryServ name String: refer to default settings an possible parameters for constraints. String: refer to default settings an possible parameters for constraints.
Page 95
Settings security type 1: ssl 2: starttls 3: none verifyCertificate true/false mappings remoteGroup String: refer to default settings an possible parameters for constraints. profileName • administrators • viewers • operators preferences language String: refer to default settings an possible parameters for constraints.
Page 96
Settings timeout Unsigned number retryCount Unsigned number secondarySe name String: refer to default rver settings an possible parameters for constraints. secret String: refer to default settings an possible parameters for constraints. String: refer to default settings an possible parameters for constraints.
Settings licenceAgreement String: refer to default settings an possible parameters for constraints. 4.6.3.7.1 Additional information For details on Save and Restore, see the Save and Restore section. 4.6.4 Ports 4.6.4.1 Ethernet port mode 4.6.4.1.1 Dual mode When Dual mode is selected, the 2 Ethernet ports are activated and connected to different networks.
Page 98
Settings 4.6.4.1.2 Cascade mode Selecting Cascade mode can create network loops or bridge separate networks. Be sure to configure switches and cables correctly to avoid this before entering Cascade mode. 4.6.4.1.3 Port forwarding mode One IP address per PDU. Contextual help of the web interface – 98...
Page 99
Settings 4.6.4.2 Ethernet port and interface settings Eaton screenshot missing Eaton screenshot missing Missing Ethernet port and interface overall description. Contextual help of the web interface – 99...
Page 100
Settings 4.6.4.2.1 Edit port Allows to edit the link configuration of the selected port through The different options are listed below. • Auto negotiation • 10 Mbps - Half duplex • 10 Mbps - Full duplex • 100Mbps - Half duplex •...
Settings 4.6.4.4 Access rights per profiles Administrator Operator Viewer Ports 4.6.4.4.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.6.4.5 Save and Restore SRR section SRR sub section Settings Possible values Ethernet port peripherals ethernet mode...
Page 102
Settings • Gateway 4.6.5.2.1 IPV4 configuration After a mouse over on the table, click the edit icon to access settings and configure the network settings for a dedicated interface. Select either the Manual or DHCP settings option. a Manual Select Manual, and then enter the network settings if the network is not configured with a BootP or DHCP server. •...
Page 103
Settings 4.6.5.3 IPV6 The table shows includes the following details: • Interface name • Status • Mode • Addresses • Prefix • Gateway 4.6.5.3.1 IPV6 configuration After a mouse over on the table, click the edit icon to access settings and configure the network settings for a dedicated interface.
Page 104
Settings Enable the configuration and Save it. b Router Select Router, Enable the configuration and Save it. 4.6.5.4 DNS The table shows includes the following details: • Interface name • Mode • FQDN • Primary DNS • Secondary DNS After a mouse over on the table, click the edit icon to access settings and configure the DNS settings for a dedicated interface.
Page 105
Settings • Secondary DNS Save the configuration. 4.6.5.4.2 DHCP Select DHCP and Save the configuration. 4.6.5.5 Default settings and possible parameters - TCP/IP Default setting Possible parameters Protocol - Hostname device -[MAC address] Hostname — 128 characters maximum Protocol - IPV4 Enable —...
Page 106
Settings Help For Viewer and Operator profiles: netconf -h Usage: netconf [OPTION]... Display network information and change configuration. -h, --help display help page -l, --lan display Link status and MAC address -4, --ipv4 display IPv4 Mode, Address, Netmask and Gateway -6, --ipv6 display IPv6 Mode, Addresses and Gateway -d, --domain...
Page 107
Settings manual <network> <prefix> <gateway> - automatically set Network address, Prefix and Gateway router Examples of usage: -> Display Link status and MAC address netconf -l -> Set Auto negotiation to Link netconf --set-lan auto -> Set custom hostname netconf --set-domain hostname ups-00-00-00-00-00-00 -> Set Adress, Netmask and Gateway netconf --set-ipv4 manual 192.168.0.1 255.255.255.0 192.168.0.2 -> Disable IPv6 Examples of usage ->...
Page 108
Settings ping6 The ping6 utility uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a ``struct timeval'' and then an arbitrary number of ``pad'' bytes used to fill out the packet.
Page 110
Settings 4.6.6.1 HTTP redirect to HTTPS 4.6.6.2 Secure web (HTTPS) 4.6.6.3 SSH Contextual help of the web interface – 110...
Page 111
Settings 4.6.6.4 SNMP 4.6.6.5 MQTT 4.6.6.6 ICMP V4 Contextual help of the web interface – 111...
Page 112
Settings 4.6.6.7 ICMP V6 4.6.6.8 Default settings and possible parameters - Firewall Default setting Possible parameters Firewall - WEB State : Active Active / Inactive Port : 80 Integer Address Filter : Empty IP address Firewall - Secure WEB State : Active Active / Inactive Port : 443 Integer ...
Page 113
Settings 4.6.6.9 Access rights per profiles Administrator Operator Viewer Firewall 4.6.6.9.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.6.6.10 Save and Restore SRR section Interface SRR sub section Settings Sub settings Possible values ICMP Firewall ETH x...
Settings port Number : refer to default settings an possible parameters for constraints. address (White list) xx.xxx.xx.xx 4.6.6.10.1 Additional information For details on Save and Restore, see the Save and Restore section. 4.6.7 Protocols 4.6.7.1 Syslog 4.6.7.1.1 Settings This screen allows an administrator to configure up to two syslog servers. To configure the syslog server settings: 1- Enable syslog.
Page 115
Settings • Click the edit icon to access settings. • Enter or change the server name. • Select Yes in the Active drop-down list to activate the server. • Enter the Hostname and Port. • Select the Protocol – UDP/TCP. • In TCP, select the message transfer method – Octet counting/Non-transparent framing. •...
Page 116
Settings Syslog Enable — disabled Enable — disable/enable • Server#1 • Server#1 Name – Primary Name – 128 characters maximum Active – No Active – No/Yes Hostname – empty Hostname – 128 characters maximum Port – 514 Port – x-xxx Protocol –...
Page 117
Settings 4.6.7.3.1 For other settings For other settings, see the Information>>>Default settings parameters section. 4.6.7.4 Access rights per profiles Administrator Operator Viewer Protocols 4.6.7.4.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.6.7.5 Save and Restore SRR section SRR sub section Settings...
Settings name String: refer to default settings an possible parameters for constraints. enabled true/false hostname String: refer to default settings an possible parameters for constraints. protocol 1: UDP 2: TCP port Number: refer to default settings an possible parameters for constraints. tcpFraming 1: TRADITIONAL 2: OCTET_COUNTING...
Page 119
Settings SNMP monitoring Battery status, power status, events, and traps are monitored using third-party SNMP managers. To query SNMP data, you do not need to add SNMP Managers to the Notified Application page. To set-up SNMP managers: • Configure the IP address. •...
Page 120
Settings b Configure the SNMP V1/V2C settings: 1. Click the edit icon on either Read Only or Read/Write account to access settings: 2. Enter the SNMP Community Read-Only string. The Network Module and the clients must share the same community name to communicate.
Page 121
Settings c Configure the SNMP V3 settings: 1. Click the edit icon on either Read Only or Read/Write account to access settings: 2. Edit the user name. 3. Select Active in the Enabled drop-down list to activate the account. 4. Select access level. •...
Page 122
Settings 6. If Auth is selected on the communication security mechanism, select the Authentication algorithms. It is recommended to set SHA256/SHA384/SHA512 with the AES192/AES256 Privacy algorithms. • SHA— SHA1 is not recommended as it is not secured. • SHA256—fill in password and privacy keys. The password can be between 8 and 24 characters and use a combination of alphanumeric and the following special characters <>&@#%_=:;,./?|$*.
Page 123
Settings 4.6.8.2.1 Actions a Add 1. Press the New button to create new trap receivers. 2. Set following settings: • Enabled – Yes/No • Application name • Hostname or IP address • Port • Protocol – V1/V2C/V3 • Trap community (V1/V2C) / User (V3) 3.
Page 124
Settings d Test trap Press the Test trap button to send the trap test to all trap receivers. Separate window provides the test status with following values: • In progress • Request successfully sent • invalid type For details on SNMP trap codes, see the Information>>>SNMP traps section.
Page 125
Settings Trap receivers No trap Enabled — No/Yes Application name — 128 characters maximum Hostname or IP address — 128 characters maximum Port — x-xxx Protocol — V1/V2C/V3 Trap community — 128 characters maximum 4.6.8.4.1 For other settings For other settings, see the Information>>>Default settings parameters ...
Page 126
Settings Name String: refer to default settings an possible parameters for constraints. Enabled true/false enabled true users name String: refer to default settings an possible parameters for constraints. allowWrite true/false enabled true/false auth enabled true/false algorithm password plaintext String: refer to default settings an possible parameters for constraints.
Settings cyphered priv enabled true/false algorithm password plaintext String: refer to default settings an possible parameters for constraints. cyphered traps receivers name String: refer to default settings an possible parameters for constraints. host port Number: refer to default settings an possible parameters for constraints.
Page 128
Settings During the selected timeframe, new connections to the Network Module are automatically trusted and accepted. After automatic acceptance, make sure that all listed clients belong to your infrastructure. If not, access may be revoked using the Delete button. The use of this automatic acceptance should be restricted to a secured and trusted network. For maximum security, we recommend following one of the two methods on the certificate settings page: •...
Page 129
Settings 4.6.9.2.1 Local certificates table The table shows the following information for each local certificate. • Used for • Issued by • Valid from • Expiration • Status — valid, expires soon, or expired 4.6.9.2.2 Actions a Revoke This action will take the selected certificate out of use. Select the certificate to revoke, and then press the Revoke button.
Page 130
Settings • Common name (CN) • Country (C) • State or Province (ST) • City or Locality (L) • Organization name (O) • Organization unit (OU) • Contact email address Press Save button. Issuer configuration will be applied only after the revoke of the certificate. d Edit Press the pen logo: ...
Page 131
Settings This may disconnect applications such as a Web browser, shutdown application, or monitoring application. This operation cannot be recovered. f Create new certificates: g CSR Press Generate Signing Request button in the in the certificate edition. The CSR is automatically downloaded. CSR must be signed with the CA, which is managed outside the card.
Page 132
Settings b Revoke Select the certificate to revoke, and then press the Revoke button. A confirmation window appears, press Continue to proceed, this operation cannot be recovered. Export Exports the selected certificate on your OS browser window. c Edit Press the pen logo to access to the certificate summary: 4.6.9.4 Trusted remote certificates The table shows the following information for each trusted remote certificate.
Page 133
State or Province — 38 State or Province — 64 characters maximum City or Locality — Grenoble City or Locality — 64 characters maximum Organization name — Eaton Organization name — 64 characters maximum Organization unit — Power quality Organization unit — 64 characters maximum Contact email address —...
Page 134
Settings existing. <service_name>: mqtt/syslog/webserver Examples of usage From a linux host: print over SSH: sshpass -p $PASSWORD ssh $USER@$CARD_ADDRESS certificates local print $SERVICE_NAME revoke over SSH: sshpass -p $PASSWORD ssh $USER@$CARD_ADDRESS certificates local revoke $SERVICE_NAME export over SSH: sshpass -p $PASSWORD ssh $USER@$CARD_ADDRESS certificates local export $SERVICE_NAME import over SSH: cat $FILE sshpass...
PDU settings state String: refer to default settings an possible parameters for constraints. location String: refer to default settings an possible parameters for constraints. organizationName String: refer to default settings an possible parameters for constraints. organizationUnit String: refer to default settings an possible parameters for constraints.
PDU settings 4.7.1.2.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.7.2 Input thresholds 4.7.2.1 Current thresholds The table shows the following Input current information for each phases and allow alarm thresholds settings: •...
4.7.2.3.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.7.3 Branch thresholds 4.7.3.1 Title Eaton PDU settings - Branch thresholds screenshot missing Missing description 4.7.3.2 Access rights per profiles Administrator Operator Viewer PDU settings - Branch thresholds 4.7.3.2.1 For other access rights...
PDU settings 4.7.4 Outlet thresholds 4.7.4.1 Title The table shows the following information for each outlets and allow current alarm thresholds settings: • Name • Low warning (A) • Current (A) • High warning (A) • High critical (A) • Energy (kWh) •...
Page 139
PDU settings Select the thresholds to be modified. Set the thresholds values and then Save. 4.7.4.2 Access rights per profiles Administrator Operator Viewer PDU settings - Outlet thresholds Contextual help of the web interface – 139...
PDU settings 4.7.4.2.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.7.5 Outlet switching The table shows the following information for each outlets and allow switching settings: • • Name • State of startup •...
Page 141
PDU settings Select the settings to be modified. Set the settings values and then Save. 4.7.5.3 Access rights per profiles Administrator Operator Viewer PDU settings - Outlet switching 4.7.5.3.1 For other access rights For other access rights, see the Information>>>Access rights per profiles ...
Maintenance 4.7.6 Group definition This page allows to create, edit and delete groups of outlets. The table shows the list of the existing groups, with an overview on the outlets included in each group. 4.7.6.1 Create a group After clicking on Create button, select the oultets you want to add, set a group name and click on Create in the bottom right hand corner.
Displays the associated firmware version and associated Sha. c Generated on Displays the release date of the firmware. For better performance, security, and optimized features, Eaton recommends to upgrade the Network Module regularly. d Installation on Displays when the firmware was installed in the Network Module.
Page 144
Maintenance Transferring > Verifying package > Flashing > Configuring system > Rebooting A confirmation message displays when the firmware upload is successful, and the Network Module automatically restarts. Do not close the web browser or interrupt the operation. Depending on your network configuration, the Network Module may restart with a different IP address. Refresh the browser after the Network module reboot time to get access to the login page.
Page 145
Maintenance 4. Click Upload. The upload can take up to 5 minutes. The firmware that was inactive will be erased by this operation. When an upgrade is in progress, the upload button is disabled, and the progress elements appear below the table with the following steps: Entering bootloader >...
Page 146
Maintenance Possible Cause 1- The IP address has changed. 2- The Network module LED shows solid red after the upgrade. 3- The first boot after the upgrade takes a longer time. Note: If the application is corrupt, due to an interruption while flashing the firmware for example, the boot will be done on previous firmware.
Maintenance 4.8.2 Sessions 4.8.2.1 Sessions • Monitors the information for the connected sessions • End any session as an admin with a re-authentication 4.8.2.1.1 Session information a Username This can be either a default profile name or a custom name b Profile Displays if the session belongs to an administrator, operator or viewer profile c Service...
Page 148
Maintenance To sanitize the Network Module: 1. Click Sanitize. A confirmation message displays, click Sanitize to confirm. Depending on your network configuration, the Network Module may restart with a different IP address. Only main administrator user will remain with default login and password. Refresh the browser after the Network module reboot time to get access to the login page.
Page 149
Maintenance Depending on your network configuration, the Network Module may restart with a different IP address. Refresh the browser after the Network module reboot time to get access to the login page. Communication Lost and Communication recovered may appear in the Alarm section. 4.8.3.1.3 Settings Allow to save and restore the Network module settings.
Page 150
Maintenance 4.8.3.1.4 Save Below settings are not saved: Local users other than the main administratorSensor settings (commissioning, alarm configuration) To save the Network module settings: 1. Click on Save 2. Select to include the Network settings if needed. A passphrase need to be entered twice to cypher the sensitive data. 3.
Page 151
Maintenance 5. Click on Restore to confirm 6. For safety reason, re-enter your own password to confirm your idendity 4.8.3.1.6 Maintenance The maintenance report is for the service representative use to diagnose problems with the network module. It is not intended for the user, which is why the file is protected by a password.
Page 152
Maintenance Help maintenance <cr> Create maintenance report file. -h, --help Display help page Examples of usage Generate the maintenance report by running the "maintenance" command. Then retrieve the report from the card using SCP From a linux host: sshpass -p $PASSWORD scp $USER@$CARD_ADDRESS:report.zip . From a Windows host: pscp -scp -pw $PASSWORD $USER@$CARD_ADDRESS:report.zip report.zip (Require pscp tools from putty)
Page 153
Maintenance Help save_configuration -h save_configuration: print the card configuration in JSON format to standard output. restore_configuration -h restore_configuration: restore the card configuration from a JSON-formatted standard input. Examples of usage From a linux host: Save over SSH: sshpass -p $PASSWORD ssh $USER@$CARD_ADDRESS save_configuration -p $PASSPHRASE> $FILE Restore over SSH: cat $FILE | sshpass -p $PASSWORD ssh $USER@$CARD_ADDRESS restore_configuration -p $PASSPHRASE From a Windows host:...
Maintenance 4.8.3.3.1 For other CLI commands See the CLI commands in the Information>>>CLI section. 4.8.4 Resources Card resources is an overview of the Network Module processor, memory and storage information. The COPY TO CLIPBOARD button will copy the information to your clipboard so that it can be past. For example, you can copy and paste information into an email.
Page 155
Maintenance • Temporary files size in MB 4.8.4.3 Storage • Total size in MB • Available size in MB • Used size in MB 4.8.4.4 Access rights per profiles Administrator Operator Viewer Resources 4.8.4.4.1 For other access rights For other access rights, see the Information>>>Access rights per profiles ...
Maintenance user data total: MB free: MB iii. used: MB Help systeminfo_statistics Display systeminfo statistics -h, --help Display the help page. 4.8.4.5.1 For other CLI commands See the CLI commands in the Information>>>CLI section. 4.8.5 System logs 4.8.5.1 System logs There are 4 types of logs available: •...
4.8.6.3 Access rights per profiles Administrator Operator Viewer System information 4.8.6.3.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.9 Alarms Eaton ePDU Edelweiss screenshot missing Contextual help of the web interface – 157...
Alarms 4.9.1 Alarm sorting Alarms can be sorted by selecting: • • Active only 4.9.2 Active alarm counter Alarms with a severity set as Good are not taken into account into the counter of active alarms. 4.9.3 Alarm details All alarms are displayed and sorted by date, with alert level, time, description, and status. Info/Warning/Critical logo Alarm description text Active...
Alarms 4.9.6 Clear Press the Clear button to clear alarms that are older than a specified date and up to a defined severity. 4.9.7 Alarms list with codes To get access to the Alarm log codes or the System log codes for email subscription, see sections below: •...
User profile 4.10 User profile 4.10.1 Access to the user profile Press the icon on the top right side of the page to access the user profile window: This page is in read-only mode when connected through LDAP and it displays the preferences applied to all LDAP users as configured in the Contextual help>>>Settings>>>Remote users>>>LDAP section.
Page 161
User profile 4.10.2.1 Account settings If you have the administrator's rights, you can click on Edit account to edit user profile and update the following information: Account details • Full name • Email • Phone • Organization Preferences • Language • Date format •...
Page 162
User profile 4.10.2.2 Change password Click on Change password to change the password. In some cases, it is not possible to change the password if it has already been changed within a day period. Refer to the troubleshooting section. Contextual help of the web interface – 162...
User profile 4.10.2.3 Log out Click Log out to close the session. 4.10.3 Legal information This Network Module includes software components that are either licensed under various open source license, or under a proprietary license. 4.10.4 Component All the open source components included in the Network Module are listed with their licenses. 4.10.5 Availability of source code Provides the way to obtain the source code of open source components that are made available by their licensors.
User profile 4.10.7 Default settings and possible parameters - User profile Default setting Possible parameters Profile Account details: Account details: • Full name — Administrator • Full name — 128 characters maximum • Email — blank • Email — 128 characters maximum •...
User profile 4.10.8.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. 4.10.9 CLI commands logout Description Logout the current user. Help logout <cr> logout the user whoami Description whoami displays current user information: •...
User profile Possible cause The password has already been changed once within a day period. Action Let one day between your last password change and retry. 4.10.10.1 For other issues For details on other issues, see the Troubleshooting section. 4.10.11 Save and Restore SRR section Settings Possible values...
Documentation dateFormat Y-m-d: YYYY-MM-DD d-m-Y: DD-MM-YYYY d.m.Y: DD.MM.YYYY d/m/Y: DD/MM/YYYY m/d/Y: MM/DD/YYYY d m Y: DD MM YYYY timeFormat 1: 24h 0: 12h temperatureUnit 1: °C 2: °F 4.10.11.1 Additional information For details on Save and Restore, see the Save and Restore section.
Documentation Search feature is indexed. 4.11.2 Access rights per profiles Administrator Operator Viewer Contextual help Full documentation 4.11.2.1 For other access rights For other access rights, see the Information>>>Access rights per profiles section. Contextual help of the web interface – 168...
Configuring/Commissioning/Testing LDAP 5 Servicing the Network Management Module 5.1 Configuring/Commissioning/Testing LDAP 5.1.1 Commissioning Refer to the section Contextual help>>>Settings>>>Remote users>>>LDAP to get help on the configuration. 5.1.1.1 Configuring connection to LDAP database This step configures the LDAP client of the network module to request data from an LDAP base. Activate LDAP.
5.3 Accessing to the latest Network Module firmware/driver/script Download the latest Network Module firmware, driver or script from the Eaton website www.eaton.com/downloads 5.4 Upgrading the card firmware (Web interface / shell script) For instructions on accessing to the latest firmware and script, refer to: Accessing to the latest firmware and script 5.4.1 Web interface...
Upgrading the card firmware (Web interface / shell script) Debian/Ubuntu sudo apt-get install sshpass RedHat/Fedora/CentOS sudo install sshpass Make shell script executable: chmod 700 install_updatePackage.sh 5.4.2.2 Procedure To upgrade the Network module using: Open a shell terminal on your computer (Linux or cygwin; meaning real or emulated Linux operating system). Use the shell script install_updatePackage.sh Usage: 'install_updatePackage.sh'...
Updating the time of the Network Module precisely and permanently (ntp server) Rebooting... res: Y Update: 5.5 Updating the time of the Network Module precisely and permanently (ntp server) For an accurate and quick update of the RTC for the Network Module, we recommend implementing a NTP server as time source for the Network Module.
Page 173
Refresh the browser after the Network module reboot time to get access to the login page. Access the Network Module, disconnect the Network cable, if needed. Remove the two eNMC2 module mounting screws. Tilt up one side of the eNMC2 module and locate the attached cable harness. Servicing the Network Management Module – 173...
Page 174
Recovering main administrator password Disconnect the cable harness and remove the eNMC2 module. Plug the cable back and hold Enter + Right Arrow buttons until seeing "System is booting" screen. Servicing the Network Management Module – 174...
Switching to static IP (Manual) / Changing IP address of the Network Module Put back the two eNMC2 module mounting screws. Connect the Network Module by using the default credentials of the main administrator : admin/admin. You will be forced to change the password accordingly to the current password strength rules.
Subscribing to a set of alarms for email notification Input the following information: • IPv4 Address • Subnet Mask • Default Gateway Save the changes. 5.10 Subscribing to a set of alarms for email notification 5.10.1 Example #1: subscribing only to one alarm (load unprotected) Follow the steps below: 1. Navigate to Contextual help>>>Settings>>>General>>>Email notification...
Subscribing to a set of alarms for email notification 5.10.2 Example #2: subscribing to all Critical alarms and some specific Warnings Follow the steps below: 1. Navigate to Contextual help>>>Settings>>>General>>>Email notification settings. 2. Press the button New to create a new configuration. 3. Select: •...
Saving/Restoring/Duplicating Network module configuration settings 4. Press Save, the table will show the new configuration. 5.11 Saving/Restoring/Duplicating Network module configuration settings 5.11.1 Modifying the JSON configuration settings file 5.11.1.1 JSON file structure The JSON file is structured into 3 blocks: Servicing the Network Management Module – 178...
Page 179
Saving/Restoring/Duplicating Network module configuration settings 5.11.1.1.1 File block File block cannot be modified, this is the mandatory structure of the JSON file. 5.11.1.1.2 Feature block Feature block contains the full definition of a feature. If it is removed from the JSON file, this feature settings will not be updated/restored in the card. 5.11.1.1.3 Data block Data block contains all the feature settings values.
Page 180
Saving/Restoring/Duplicating Network module configuration settings When restoring the file, the corresponding setting will be updated based on the cyphered value. without 5.11.1.2.2 The JSON file is saved passphrase All sensitive data will have below structure: When restoring the file, the corresponding setting will not be set. This may lead to restoration failure if corresponding setting was not previously set with a valid value.
Page 181
Saving/Restoring/Duplicating Network module configuration settings Original file: Modified file: 5.11.1.3.4 Making a partial update/restoration a Example: Updating/Restoring only LDAP settings If you restore below JSON content, only LDAP settings will be updated/restored, everything else will remain unchanged. "version": "x.x", "features": { Servicing the Network Management Module – ...
Module Handle the eNMC2 module with care. Be aware that there is a risk of electrostatic discharge (ESD). As a preventive measure, wear ESD protection, such as an ESD shoe strap, while replacing the eNMC2 module. Do not put stress on the connection cable during installation.
Typically, the eNMC2 module in your PDU is being replaced because it is not working. In this case, you need to get a copy of the PDU model’s hardware configuration file from the Product Model Web site or from another working PDU of the same model type and configuration.
Page 184
Replacing the PDU Network Management and Control Module 3- Disconnect the cable harness and remove the eNMC2 module. 4- Locate and unwrap the new eNMC2 module. Connect the cable harness to the new eNMC2 module. 5- Reinsert the new eNMC2 module.
Page 185
7- The new eNMC2 module will not have the same MAC address as the one you are replacing. Ensure the old MAC address label is discarded, and that new MAC address label is firmly adhered to the product.
Page 186
17- From the Settings menu, select USB Flash Mode. Press Enter, select yes to confirm, and then press Enter again. The module restarts. (If there is no action within one minute, the eNMC2 module exits USB Flash Mode. Remove and reinsert the flash drive to access this menu again.)
37- Remove the USB flash drive and select Exit. 5.13 Restarting the eNMC2 Module and Resetting the PDU 1- Restart the eNMC2 module using either the reset button on the LCD front panel, or using a serial or network connection to a terminal emulator or Web interface.
6.1 Cybersecurity considerations for electrical distribution systems 6.1.1 Purpose The purpose of this section is to provide high-level guidance to help customers across industries and applications apply Eaton solutions for power management of electrical systems in accordance with current cybersecurity standards.
Cybersecurity considerations for electrical distribution systems 6.1.4.1 Paths to the control network The paths in above figure include: • External users accessing the network through the Internet • Misconfigured firewalls • Unsecure wireless routers and wired modems • Infected laptops located elsewhere that can access the network behind the firewall •...
Cybersecurity considerations for electrical distribution systems 6.1.6 Designing for the threat vectors 6.1.6.1 Firewalls Firewalls provide the capability to add stringent and multifaceted rules for communication between various network segments and zones in an ICS network. They can be configured to block data from certain segments, while allowing the relevant and necessary data through.
Page 191
Cybersecurity considerations for electrical distribution systems 6.1.6.2.1 Three-tier architecture for a secure control network Above figure shows that the control networks are divided into layers or zones based on control functions, which are then connected by conduits (connections between the zones) that provide security controls to: •...
Cybersecurity considerations for electrical distribution systems 6.1.6.3 Intrusion detection and prevention systems (IDPS) These are systems that are primarily focused on identifying possible incidents in an ICS network, logging the information about them, attempting to stop them, and reporting them to ICS security administrators. Because these systems are critical in an ICS network, they are regular targets for attacks and securing them is extremely important.
Page 193
Cybersecurity considerations for electrical distribution systems Existing (traditional) IT standards and policies may not apply (or have not been considered) for control systems. A gap analysis should be performed to determine which components are not covered (or not adequately covered) by existing policies. Relationships with existing policies and standards should be explicitly identified and new or supporting policies should be developed.
Cybersecurity considerations for electrical distribution systems general IT components, while the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) publishes advisories specific to control systems. A regular patch deployment schedule should be established for each component in the environment. Depending on the component, this could range from a monthly schedule to an as-needed deployment, depending on the historical frequency of patch or vulnerability related issues for the component or the vendor.
Cybersecurity considerations for electrical distribution systems Intrusion Prevention Systems Information Technology National Vulnerability Database Open System Interconnection Programmable Logic Controller SCADA Supervisory Control and Data Acquisition SNMP Simple Network Management Protocol Secure Shell SIEM Security Information and Event Management Universal Serial Bus 6.1.11 References [1] Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies, October 2009 https://ics-cert.us-cert.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_Defense_in_Depth_Strategies_S508C.pdf...
Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products and solutions, making them more secure, reliable and competitive for customers.
Page 197
Cybersecurity recommended secure hardening guidelines • Serial number • Hardware version • Location • Contact Firmware information • Firmware version • Firmware SHA • Firmware date • Firmware installation date • Firmware activation date • Bootloader version 6.2.2.1.2 Communication settings It can be retrieved by navigating to ...
Page 198
Cybersecurity recommended secure hardening guidelines 6.2.2.3 Risk Assessment Eaton recommends conducting a risk assessment to identify and assess reasonably foreseeable internal and external risks to the confidentiality, availability and integrity of the system | device and its environment. This exercise should be conducted in accordance with applicable technical and regulatory frameworks such as IEC 62443 and NERC-CIP. ...
Page 199
Network module supports network communication with other devices in the environment. This capability can present risks if it’s not configured securely. Following are Eaton recommended best practices to help secure the network. Additional information about various network protection strategies is available in Eaton Cybersecurity Considerations for Electrical Distribution Systems [R1] .
Page 200
| device and any data it processes. 6.2.2.11 Malware defenses Eaton recommends deploying adequate malware defenses to protect the product or the platforms used to run the Eaton product. 6.2.2.12 Secure Maintenance Troubleshooting information are available in the embedded help for diagnostic purposes.
Page 201
Navigate in the help to Contextual help>>>Card>>>Administration to get information on how to upgrade the Network Module. • Eaton also has a robust vulnerability response process. In the event of any security vulnerability getting discovered in its products, Eaton patches the vulnerability and releases information bulletin through its cybersecurity web site - https:// eaton.com/cybersecurity and patch through www.eaton.com/downloads.
Embedded Flash Memory on Boards and Devices • Eaton recommends the following methods for disposing of motherboards, peripheral cards such as network adapters, or any other adapter containing non-volatile flash memory. Clear: If supported by the device, reset the state to original factory settings. ...
1- Sanitize the Network Module Sanitization erases all the data (user name and password, certificates, keys, settings, logs...). To sanitize the Network Module refer to the Contextual help>>>Maintenance>>>Services>>>Sanitization section. 2- Remove the two eNMC2 module mounting screws. Securing the Network Management Module – 203...
Page 204
Decommissioning the Network Management module 3- Tilt up one side of the eNMC2 module and locate the attached cable harness. 4- Disconnect the cable harness and remove the eNMC2 module. Securing the Network Management Module – 204...
Page 205
Description and features 7 Servicing the EMP 7.1 Description and features Unable to render include or excerpt-include. Could not retrieve page. The optional Environmental Monitoring Probe Unable to render include or excerpt-include. Could not retrieve page. enables you to collect temperature and humidity readings and monitor the environmental data remotely. You can also collect and retrieve the status of one or two dry contact devices (not included).
Page 206
Installing the EMP 7.3 Installing the EMP 7.3.1 Defining EMPs address and termination 7.3.1.1 Manual addressing Address must be defined before the EMP power-up otherwise the changes won't be taken into account. o not set Modbus address to 0, otherwise the EMP will not be detected. Define different address for all the EMPs in the daisy-chain.
Page 207
Installing the EMP Bottom mounting capabilities: Side mounting: • magnets • keyholes • magnets • tie wraps • tie wraps • nylon fastener 7.3.2.1 Rack mounting with keyhole example To mount the EMP on the rack, use the supplied screw, washer and nut. Then, mount the EMP on the screw and tighten it.
Page 208
Installing the EMP Bottom mounting Side mounting 7.3.2.3 Wall mounting with screws example To mount the EMP on the wall close to the rack, use the supplied screw and screw anchor. Then, mount the EMP on the screw and tighten it. 7.3.2.4 Wall mounting with nylon fastener example To mount the EMP within the enclosure environment, attach one nylon fastener to the EMP and the other nylon fastener to an enclosure rail post.
Page 209
Installing the EMP 7.3.3 Cabling the first EMP to the device 7.3.3.1 Available Devices Unable to render include or excerpt-include. Could not retrieve page. Unable to render include or excerpt-include. Could not retrieve page. 7.3.3.2 Connecting the EMP to the device Address must be defined before the EMP power-up otherwise the changes won't be taken into account.
Page 210
Installing the EMP • Additional EMPs • 2 x Ethernet cable (not supplied). • Device 7.3.4.2 Connection steps STEP 1 – Connect the Ethernet cable to the "TO SENSORS" port of the first EMP, and to the "FROM DEVICE" port of the second EMP.
Page 211
Commissioning the EMP STEP 2 – Tighten the corresponding tightening screws on top of the EMP to secure the wires. 7.4 Commissioning the EMP 7.4.1 On the Network Module device STEP 1 – Connect to the Network Module • On a network computer, launch a supported web browser. The browser window appears. •...
Page 212
Front panel connectors and LED indicators 8 Information 8.1 Front panel connectors and LED indicators Name Description Network connector Ethernet port 1 Network speed LED Flashing green sequences: • 1 flash — Port operating at 10Mbps • 2 flashes — Port operating at 100Mbps •...
Page 213
Front panel connectors and LED indicators LCD display The LCD display provides information about load status, events, measurements, identification, and settings. The LCD interface also provides some basic configuration. Navigation buttons Navigate through the display with buttons. Down Press to scroll down on screen or menu. Press to scroll up on screen or menu.
Page 214
Specifications/Technical characteristics Power redundancy readiness • Off — PDU Network Module is not connected to another PDU. • Solid green — The PDU Network Module is connected to another PDU Network Module power redundancy port. 8.2 Specifications/Technical characteristics Module performance Date/Time backup The RTC (CR1220 battery) is able to keep the date and the time when Network Module is OFF.
Page 215
Default settings and possible parameters 8.3.2 Settings Default settings and possible parameters - General Default setting Possible parameters System details Location — empty Location — 31 characters maximum Contact — empty Contact — 255 characters maximum System name — empty System name — 255 characters maximum Time & date settings — Manual (Time zone: Time &...
Page 216
Default settings and possible parameters SMTP settings Server IP/Hostname — blank Server IP/Hostname — 128 characters maximum SMTP server authentication — disabled SMTP server authentication — disable/enable (Username/Password — 128 characters maximum) Port — 25 Port — x-xxx Default sender address — device @networkcard.com Sender address —...
Page 217
Default settings and possible parameters LDAP Configure Configure • Active – No • Active – No/yes • Security • Security SSL – SSL SSL – None/Start TLS/SSL Verify server certificate – enabled Verify server certificate – disabled/enabled • Primary server •...
Page 218
Default settings and possible parameters RADIUS Configure Configure • Active – No • Active – Yes/No • Retry number – 0 • Retry number – 0 to 128 • Primary server • Primary server Name – blank Name – 128 characters maximum Secret –...
Page 219
Default settings and possible parameters Firewall - SSH State : Active Active / Inactive Port : 22 Integer Address Filter : Empty IP address Firewall - SNMP State : Active Active / Inactive Port : 161 Integer Address Filter : Empty IP address Firewall - MQTT State : Active...
Page 220
Default settings and possible parameters Default settings and possible parameters - SNMP Default setting Possible parameters SNMP Activate SNMP — disabled Activate SNMP — disable/enable Port — 161 Port — x-xxx SNMP V1 — disabled SNMP V1 — disable/enable • Community #1 —...
Page 221
State or Province — 38 City or Locality — 64 characters maximum City or Locality — Grenoble Organization name — 64 characters maximum Organization name — Eaton Organization unit — 64 characters maximum Organization unit — Power quality Contact email address — 64 characters maximum Contact email address —...
Page 222
Default settings and possible parameters Profile Account details: Account details: • Full name — Administrator • Full name — 128 characters maximum • Email — blank • Email — 128 characters maximum • Phone — blank • Phone — 64 characters maximum •...
Page 223
Access rights per profiles 8.4 Access rights per profiles 8.4.1 Home Administrator Operator Viewer Home 8.4.2 Meters Administrator Operator Viewer Logs configuration 8.4.3 Controls Administrator Operator Viewer Controls - Outlets Administrator Operator Viewer Controls - Group Administrator Operator Viewer Controls - Identify Administrator Operator Viewer...
Page 226
Access rights per profiles PDU settings - Group thresholds 8.4.6 Maintenance Administrator Operator Viewer System information Administrator Operator Viewer Firmware Administrator Operator Viewer Services Administrator Operator Viewer Resources Administrator Operator Viewer System logs 8.4.7 Alarms Administrator Operator Viewer Alarm list Export Clear 8.4.8 User profile...
Page 227
Access rights per profiles User profile Administrator Operator Viewer Legal information 8.4.9 Contextual help Administrator Operator Viewer Contextual help Full documentation 8.4.10 CLI commands Administrator Operator Viewer get release info Administrator Operator Viewer history Administrator Operator Viewer ldap-test Administrator Operator Viewer logout Administrator...
Page 229
List of event codes systeminfo_statistics Administrator Operator Viewer certificates 8.5 List of event codes To get access to the Alarm log codes or the System log codes for email subscription, see sections below: 8.5.1 System log codes To retrieve System logs, navigate to Contextual help>>>Maintenance>>>System logs section and press the Download System logs button.
Page 230
List of event codes 0B00500 Warning RTC battery cell low logSystem.csv 0E00200 Warning New [self/PKI] signed certificate [generated/imported] for <service> server logSystem.csv 0E00300 Warning The [self/PKI] signed certificate of the <service> server will expires in <X> days logSystem.csv 0800700 Warning User account - password expired logAccount.csv 0800900...
Page 231
List of event codes 0B00100 Notice Time manually changed logSystem.csv 0B00700 Notice NTP sever not available <NTP server address> logSystem.csv 0900100 Notice Session - opened logSession.csv 0900200 Notice Session - closed logSession.csv 0900300 Notice Session - invalid token logSession.csv 0900400 Notice Session - authentication failed ...
Page 232
List of event codes 0100C00 Notice Syslog is started logSystem.csv 0100B00 Notice Syslog is stopping logSystem.csv 0100D00 Notice Network module is booting logSystem.csv 0100E00 Notice Network module is operating logSystem.csv 0100F00 Notice Network module is starting shutdown sequence logSystem.csv 0101000 Notice Network module is ending shutdown sequence logSystem.csv...
Page 233
List of event codes 8.5.2 ePDU alarm log codes To retrieve Alarm logs, navigate to Contextual help>>>Alarms section and press the Download alarms button. Below codes are the one to be used to add "Exceptions on events notification" on email sending configurations. Some zeros maybe added in front of the code when displayed in emails or logs.
Page 234
List of event codes 212201 Critical Input1 phase1 voltage measure out of range (lower Critical) 212203 Input1 phase3 voltage measure out of range (lower Critical) 212301 Warning Input1 phase1 voltage measure out of range (upper warning) 212303 Input1 phase3 voltage measure out of range (upper warning) 212401 Critical...
Page 235
List of event codes 221101 Warning Branch1 Current measure out of range (lower warning) 221112 Branch12 Current measure out of range (lower warning) 221301 Warning Branch1 Current measure out of range (upperwarning) 221312 Branch12 Current measure out of range (upper warning) 221401 Critical Branch1 Current measure out of range...
Page 236
List of event codes 231301 Warning Outlet1 Current measure out of range (upper warning) 231364 Outlet64 Current measure out of range (upper warning) 231401 Critical Outlet1 Current measure out of range (upper Critical) 231464 Outlet64 Current measure out of range (upper Critical) 243100 Info...
Page 237
List of event codes 8.5.3 EMP alarm log codes To retrieve Alarm logs, navigate to Contextual help>>>Alarms section and press the Download alarms button. Below codes are the one to be used to add "Exceptions on events notification" on email sending configurations. Some zeros maybe added in front of the code when displayed in emails or logs.
Page 238
SNMP traps 8.5.4 Network module alarm log codes To retrieve Alarm logs, navigate to Contextual help>>>Alarms section and press the Download alarms button. Below codes are the one to be used to add "Exceptions on events notification" on email sending configurations. Some zeros maybe added in front of the code when displayed in emails or logs.
Page 239
Sent whenever one status of each humidity changes. .1.3.6.1.4.1.534.6.8.1.4.0.1 Sent whenever one status of each digital input alarm changes. 8.6.2 ePDU Mib 8.6.2.1 EATON ePDU traps This information is for reference only. ePDU Traps OID base : Description : OID Data sent with the 1.3.6.1.4.1.534.6.6.7.0...
Page 240
.33 Sent whenever an outlet state On / Off changes. strappingIndex, outletIndex, outletControlStatus Environment / Sensors Traps (41-49) DEPRECATED => please use the Eaton Sensor MIB instead System Traps (51-59) notifyCommunicationStatus Sent whenever the PDU communication status changes. strappingIndex, communicationStatus notifyInternalStatus .52...
Page 241
8.7.1 Commands available You can see this list anytime by typing in the CLI: 8.7.2 Contextual help You can see this help anytime by typing in the CLI: help CONTEXT SENSITIVE HELP [?] - Display context sensitive help. This is either a list of possible command completions with summaries, or the full syntax of the current command.
Page 242
8.7.3 get release info 8.7.3.1 Description Displays certain basic information related to the firmware release. 8.7.3.2 Help get_release_info Get current release date Get current release sha1 Get current release time Get current release version number 8.7.3.3 Specifics 8.7.3.4 Access rights per profiles Administrator Operator Viewer...
Page 243
8.7.5 logout 8.7.5.1 Description Logout the current user. 8.7.5.2 Help logout <cr> logout the user 8.7.5.3 Specifics 8.7.5.4 Access rights per profiles Administrator Operator Viewer logout 8.7.6 maintenance 8.7.6.1 Description Creates a maintenance report file which may be handed to the technical support. 8.7.6.2 Help maintenance <cr>...
Page 244
8.7.6.4 Specifics 8.7.6.5 Access rights per profiles Administrator Operator Viewer maintenance 8.7.7 netconf 8.7.7.1 Description Tools to display or change the network configuration of the card. 8.7.7.2 Help For Viewer and Operator profiles: netconf -h Usage: netconf [OPTION]... Display network information and change configuration. ...
Page 245
-f, --set-domain <mode> Mode values: - set custom Network address, Netmask and Gateway: manual <domain name> <primary DNS> <secondary DNS> - automatically set Domain name, Primary and Secondary DNS dhcp -i, --set-ipv4 <mode> ...
Page 246
netconf (read-only) (read-only) 8.7.8 ping and ping6 8.7.8.1 Description Ping and ping6 utilities are used to test network connection. 8.7.8.2 Help ping The ping utility uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a ``struct timeval''...
Page 247
8.7.9.2 Help Usage: reboot [OPTION] <cr> Reboot the card --help Display help --withoutconfirmation Reboot the card without confirmation 8.7.9.3 Specifics 8.7.9.4 Access rights per profiles Administrator Operator Viewer reboot 8.7.10 rest list 8.7.10.1 Usage rest list <path> This command shall list the endpoints starting from <path> If no path provided, the command shall list all resources starting from "/"...
Page 248
8.7.11.2 Options -d <number> : number of levels to show in the response if no number provided, the default value is 1 8.7.11.3 Example rest get /managers/1/networkService/networkInterfaces/eth1/ipv4/address => 10.130.33.195 8.7.12 rest set 8.7.12.1 Usage rest set <path> <payload> This command sets the resource identified by <path> with the given <payload> rest set ? This command print the help for the command.
Page 249
8.7.14.2 Help save_configuration -h save_configuration: print the card configuration in JSON format to standard output. restore_configuration -h restore_configuration: restore the card configuration from a JSON-formatted standard input. 8.7.14.3 Examples of usage 8.7.14.3.1 From a linux host: Save over SSH: sshpass -p $PASSWORD ssh $USER@$CARD_ADDRESS save_configuration -p $PASSPHRASE> $FILE Restore over SSH: cat $FILE | sshpass -p $PASSWORD ssh $USER@$CARD_ADDRESS restore_configuration -p $PASSPHRASE 8.7.14.3.2 From a Windows host: Save over SSH: plink ...
Page 250
8.7.15.3 Help sanitize -h, --help Display help page --withoutconfirmation Do factory reset of the card without confirmation <cr> Do factory reset of the card 8.7.15.4 Access rights per profiles Administrator Operator Viewer sanitize 8.7.16 ssh-keygen 8.7.16.1 Description Command used for generating the ssh keys. 8.7.16.2 Help ssh-keygen -h, --help...
Page 251
-h, --help display help page -p, --print display date and time in YYYYMMDDhhmmss format For Administrator profile: time -h Usage: time [OPTION]... Display time and date, change time and date. -h, --help display help page -p, --print display date and time in YYYYMMDDhhmmss format ...
Page 252
Specify maximum number of hops <Hostname or IP> Remote system to trace traceroute6 Specify maximum number of hops <IPv6 address> IPv6 address 8.7.18.3 Specifics 8.7.18.4 Access rights per profiles Administrator Operator Viewer traceroute traceroute6 8.7.19 whoami 8.7.19.1 Description whoami displays current user information: •...
Page 253
email-test -h, --help, Display help page email-test -r, --recipient <recipient_address> Send test email to the <recipient_address> Email address of the recipient 8.7.20.3 Specifics 8.7.20.4 Access rights per profiles Administrator Operator Viewer email-test 8.7.21 systeminfo_statistics 8.7.21.1 Description Displays the following system information usage: usage : % upSince : date since the system started total: MB...
Page 254
8.7.22 certificates 8.7.22.1 Description Allows to manage certificates through the CLI. 8.7.22.2 Help certificates <target> <action> <service_name> <target> : - local <action> : - print: provides a given certificate detailed information. - revoke: revokes a given certificate. - export: returns a given certificate contents. - import: upload a given certificate the server CSR.
Page 255
The source code of open source components that are made available by their licensors may be obtained upon written express request by contacting network-m2-opensource@Eaton.com. Eaton reserves the right to charge minimal administrative costs, in compliance with the terms of the underlying open source licenses, when the situation requires.
Page 257
Acronyms and abbreviations 8.9 Acronyms and abbreviations AC: Alternating current. bps: bit per second BOM: In Syslog, placing an encoded Byte Order Mark at the start of a text stream can indicates that the text is Unicode and identify the encoding scheme used. CA: Certificate Authority CLI: Command Line Interface.
Page 258
Acronyms and abbreviations RTC: Real time clock.S/N: Serial number. SMTP: Simple Mail Transfer Protocol is an Internet standard for electronic mail (email) transmission. SNMP: Simple Network Management Protocol is an Internet-standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. SSH: Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network.
Page 259
Acronyms and abbreviations Information – 259...
Page 260
EMP communication status shows "Lost" 9 Troubleshooting 9.1 EMP communication status shows "Lost" In the Network Module, in Contextual help>>>Environment>>>Commissioning/Status , EMPs are missing in the Sensor commissioning table. 9.1.1 Symptom #1 The connection status of the sensor is "Lost" 9.1.1.1 Possible causes The EMPs are not powered by the Network module.
Page 261
How do I log in if I forgot my password? 9.2.1.3 Action #1-2 1- Check the EMPs connection and cables. Refer to the sections Servicing the EMP>>>Installing the EMP>>>Cabling the first EMP to the device and Servicing the EMP>>>Installing the EMP>>>Daisy chaining 3 EMPs.
Page 262
Password change in My profile is not working 9.5 Password change in My profile is not working 9.5.1 Symptoms The password change shows " Invalid credentials " when I try to change my password in My profile menu: 9.5.2 Possible cause The password has already been changed once within a day period.
Page 263
Web user interface is not up to date after a FW upgrade Note: If the application is corrupt, due to an interruption while flashing the firmware for example, the boot will be done on previous firmware. 9.7.2 Action 1- Recover the IP address and connect to the card. 2- Reset the Network module by using the Restart button on the front panel.
Need help?
Do you have a question about the eNMC2 and is the answer not in the manual?
Questions and answers