4.1.1 Commissioning............................................................................................................................................................. 159
4.1.2 Testing LDAP authentication........................................................................................................................................ 160
4.1.3 Limitations.................................................................................................................................................................... 160
4.2 Pairing agent to the Network Module ................................................................................................................................ 160
4.2.1 Pairing with credentials on the agent ........................................................................................................................... 160
4.2.2 Pairing with automatic acceptance (recommended if done in a secure and trusted network)..................................... 161
4.2.3 Pairing with manual acceptance.................................................................................................................................. 161
4.3 Powering down/up applications (examples) ....................................................................................................................... 162
4.3.1 Powering down IT system in a specific order .............................................................................................................. 162
4.3.2 Powering down non-priority equipment first................................................................................................................ 165
4.3.3 Restart sequentially the IT equipment on utility recovery ............................................................................................ 168
4.4 Checking the current firmware version of the Network Module........................................................................................ 169
4.5 Accessing to the latest Network Module firmware/driver/script........................................................................................ 169
4.6 Upgrading the card firmware (Web interface / shell script) ................................................................................................ 170
4.6.1 Web interface............................................................................................................................................................... 170
4.6.2 Shell script.................................................................................................................................................................... 170
4.6.3 Example:....................................................................................................................................................................... 170
4.7 Changing the RTC battery cell............................................................................................................................................ 171
4.8 Updating the time of the Network Module precisely and permanently (ntp server) .......................................................... 173
4.9 Synchronizing the time of the Network Module and the UPS............................................................................................ 173
4.9.1 Automatic time synchronization ................................................................................................................................... 173
4.9.2 Manual time synchronization........................................................................................................................................ 173
4.10 Changing the language of the web pages.......................................................................................................................... 173
4.11 Resetting username and password.................................................................................................................................... 174
4.11.1 As an admin for other users ......................................................................................................................................... 174
4.11.2 Resetting its own password......................................................................................................................................... 174
4.12 Recovering main administrator password .......................................................................................................................... 174
4.13 Switching to static IP (Manual) / Changing IP address of the Network Module................................................................. 175
4.14 Reading device information in a simple way ...................................................................................................................... 176
4.14.1 Web page ..................................................................................................................................................................... 176
4.15 Subscribing to a set of alarms for email notification........................................................................................................... 176
4.15.1 Example #1: subscribing only to one alarm (load unprotected).................................................................................... 176
4.15.2 Example #2: subscribing to all Critical alarms and some specific Warnings ................................................................ 178
4.16 Saving/Restoring/Duplicating Network module configuration settings .............................................................................. 179
4.16.1 Modifying the JSON configuration settings file............................................................................................................ 179
4.16.2 Saving/Restoring/Duplicating settings through the CLI................................................................................................ 188
4.16.3 Saving/Restoring/Duplicating settings through the Web interface............................................................................... 188
5 SECURING THE NETWORK MANAGEMENT MODULE................................................................................. 189
5.1 Cybersecurity considerations for electrical distribution systems ....................................................................................... 189
5.1.1 Purpose ........................................................................................................................................................................ 189
5.1.2 Introduction .................................................................................................................................................................. 189
5.1.3 Connectivity—why do we need to address cybersecurity for industrial control systems (ICS)? ................................. 189
5.1.4 Cybersecurity threat vectors ........................................................................................................................................ 189
5.1.5 Defense in depth.......................................................................................................................................................... 190
5.1.6 Designing for the threat vectors................................................................................................................................... 191
5.1.7 Policies, procedures, standards, and guidelines........................................................................................................... 193
5.1.8 Conclusion.................................................................................................................................................................... 195
5.1.9 Terms and definitions................................................................................................................................................... 195
5.1.10 Acronyms ..................................................................................................................................................................... 195
5.1.11 References ................................................................................................................................................................... 196
5.2 Cybersecurity recommended secure hardening guidelines ............................................................................................... 197
5.2.1 Introduction .................................................................................................................................................................. 197
5.2.2 Secure configuration guidelines ................................................................................................................................... 197