EasyManua.ls Logo

Eaton Network-M2 - Page 6

Eaton Network-M2
268 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4.1.1 Commissioning............................................................................................................................................................. 159
4.1.2 Testing LDAP authentication........................................................................................................................................ 160
4.1.3 Limitations.................................................................................................................................................................... 160
4.2 Pairing agent to the Network Module ................................................................................................................................ 160
4.2.1 Pairing with credentials on the agent ........................................................................................................................... 160
4.2.2 Pairing with automatic acceptance (recommended if done in a secure and trusted network)..................................... 161
4.2.3 Pairing with manual acceptance.................................................................................................................................. 161
4.3 Powering down/up applications (examples) ....................................................................................................................... 162
4.3.1 Powering down IT system in a specific order .............................................................................................................. 162
4.3.2 Powering down non-priority equipment first................................................................................................................ 165
4.3.3 Restart sequentially the IT equipment on utility recovery ............................................................................................ 168
4.4 Checking the current firmware version of the Network Module........................................................................................ 169
4.5 Accessing to the latest Network Module firmware/driver/script........................................................................................ 169
4.6 Upgrading the card firmware (Web interface / shell script) ................................................................................................ 170
4.6.1 Web interface............................................................................................................................................................... 170
4.6.2 Shell script.................................................................................................................................................................... 170
4.6.3 Example:....................................................................................................................................................................... 170
4.7 Changing the RTC battery cell............................................................................................................................................ 171
4.8 Updating the time of the Network Module precisely and permanently (ntp server) .......................................................... 173
4.9 Synchronizing the time of the Network Module and the UPS............................................................................................ 173
4.9.1 Automatic time synchronization ................................................................................................................................... 173
4.9.2 Manual time synchronization........................................................................................................................................ 173
4.10 Changing the language of the web pages.......................................................................................................................... 173
4.11 Resetting username and password.................................................................................................................................... 174
4.11.1 As an admin for other users ......................................................................................................................................... 174
4.11.2 Resetting its own password......................................................................................................................................... 174
4.12 Recovering main administrator password .......................................................................................................................... 174
4.13 Switching to static IP (Manual) / Changing IP address of the Network Module................................................................. 175
4.14 Reading device information in a simple way ...................................................................................................................... 176
4.14.1 Web page ..................................................................................................................................................................... 176
4.15 Subscribing to a set of alarms for email notification........................................................................................................... 176
4.15.1 Example #1: subscribing only to one alarm (load unprotected).................................................................................... 176
4.15.2 Example #2: subscribing to all Critical alarms and some specific Warnings ................................................................ 178
4.16 Saving/Restoring/Duplicating Network module configuration settings .............................................................................. 179
4.16.1 Modifying the JSON configuration settings file............................................................................................................ 179
4.16.2 Saving/Restoring/Duplicating settings through the CLI................................................................................................ 188
4.16.3 Saving/Restoring/Duplicating settings through the Web interface............................................................................... 188
5 SECURING THE NETWORK MANAGEMENT MODULE................................................................................. 189
5.1 Cybersecurity considerations for electrical distribution systems ....................................................................................... 189
5.1.1 Purpose ........................................................................................................................................................................ 189
5.1.2 Introduction .................................................................................................................................................................. 189
5.1.3 Connectivity—why do we need to address cybersecurity for industrial control systems (ICS)? ................................. 189
5.1.4 Cybersecurity threat vectors ........................................................................................................................................ 189
5.1.5 Defense in depth.......................................................................................................................................................... 190
5.1.6 Designing for the threat vectors................................................................................................................................... 191
5.1.7 Policies, procedures, standards, and guidelines........................................................................................................... 193
5.1.8 Conclusion.................................................................................................................................................................... 195
5.1.9 Terms and definitions................................................................................................................................................... 195
5.1.10 Acronyms ..................................................................................................................................................................... 195
5.1.11 References ................................................................................................................................................................... 196
5.2 Cybersecurity recommended secure hardening guidelines ............................................................................................... 197
5.2.1 Introduction .................................................................................................................................................................. 197
5.2.2 Secure configuration guidelines ................................................................................................................................... 197

Table of Contents

Related product manuals