EasyManua.ls Logo

Eaton Network-M3 - Page 212

Eaton Network-M3
294 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 212
Serial number
Hardware version
Location
Contact
Firmware information
Firmware version
Firmware SHA
Firmware date
Firmware installation date
Firmware activation date
Bootloader version
5.2.2.1.2 Communication settings
It can be retrieved by navigating to
Settings>>>Network orSettings>>>Network & Protocol
LAN
Link status
MAC address
Configuration
IPV4
Status
Mode
Address
Netmask
Gateway
Domain
Mode
FQDN
Primary DNS
Secondary DNS
IPV6
Status
Mode
Addresses
5.2.2.1.3 UPS details
It can be retrieved by navigating to
Home>>>Details or Home>>>Energy flow .
Details
Name
Model
P/N
S/N
Location
FW version
5.2.2.2 Defense in Depth
Defense in Depth basically means applying multiple counter-measures for mitigating risks, in a layered or step wise manner. A
layered approach to security as shown in the below diagram is what is recommended. Defense in Depth is the responsibility of
both the manufacturer and the customer.
Most of above information are discoverable using SNMP, refer to Settings>>>SNMP.

Table of Contents

Related product manuals