4.2.2 Pairing with automatic acceptance (recommended if done in a secure and trusted network).................................... 180
4.2.3 Pairing with manual acceptance.................................................................................................................................. 181
4.3 Powering down/up applications (examples) ...................................................................................................................... 181
4.3.1 Powering down IT system in a specific order ............................................................................................................. 181
4.3.2 Powering down non-priority equipment first............................................................................................................... 184
4.3.3 Restart sequentially the IT equipment on utility recovery ........................................................................................... 187
4.4 Checking the current firmware version of the Network Module....................................................................................... 189
4.5 Accessing to the latest Network Module firmware/driver/script....................................................................................... 189
4.6 Upgrading the card firmware (Web interface / shell script) ............................................................................................... 189
4.6.1 Web interface.............................................................................................................................................................. 189
4.6.2 Shell script................................................................................................................................................................... 189
4.6.3 Example:...................................................................................................................................................................... 190
4.7 Changing the RTC battery cell........................................................................................................................................... 191
4.8 Updating the time of the Network Module precisely and permanently (ntp server) ......................................................... 192
4.9 Synchronizing the time of the Network Module and the UPS........................................................................................... 192
4.9.1 Automatic time synchronization .................................................................................................................................. 192
4.9.2 Manual time synchronization....................................................................................................................................... 192
4.10 Changing the language of the web pages......................................................................................................................... 192
4.11 Resetting username and password................................................................................................................................... 193
4.11.1 As an admin for other users ........................................................................................................................................ 193
4.11.2 Resetting its own password........................................................................................................................................ 193
4.12 Recovering main administrator password ......................................................................................................................... 193
4.13 Switching to static IP (Manual) / Changing IP address of the Network Module................................................................ 194
4.14 Reading device information in a simple way ..................................................................................................................... 195
4.14.1 Web page .................................................................................................................................................................... 195
4.15 Subscribing to a set of alarms for email notification.......................................................................................................... 195
4.15.1 Example #1: subscribing only to one alarm (load unprotected)................................................................................... 195
4.15.2 Example #2: subscribing to all Critical alarms and some specific Warnings ............................................................... 196
4.16 Saving/Restoring/Duplicating Network module configuration settings ............................................................................. 197
4.16.1 Modifying the JSON configuration settings file........................................................................................................... 197
4.16.2 Saving/Restoring/Duplicating settings through the CLI............................................................................................... 202
4.16.3 Saving/Restoring/Duplicating settings through the Web interface.............................................................................. 202
5 SECURING THE NETWORK MANAGEMENT MODULE................................................................................ 203
5.1 Cybersecurity considerations for electrical distribution systems ...................................................................................... 203
5.1.1 Purpose ....................................................................................................................................................................... 203
5.1.2 Introduction ................................................................................................................................................................. 203
5.1.3 Connectivity—why do we need to address cybersecurity for industrial control systems (ICS)? ................................ 203
5.1.4 Cybersecurity threat vectors ....................................................................................................................................... 203
5.1.5 Defense in depth......................................................................................................................................................... 204
5.1.6 Designing for the threat vectors.................................................................................................................................. 205
5.1.7 Policies, procedures, standards, and guidelines.......................................................................................................... 207
5.1.8 Conclusion................................................................................................................................................................... 209
5.1.9 Terms and definitions.................................................................................................................................................. 209
5.1.10 Acronyms .................................................................................................................................................................... 209
5.1.11 References .................................................................................................................................................................. 210
5.2 Cybersecurity recommended secure hardening guidelines .............................................................................................. 211
5.2.1 Introduction ................................................................................................................................................................. 211
5.2.2 Secure configuration guidelines .................................................................................................................................. 211
5.2.3 References .................................................................................................................................................................. 217
5.3 Configuring user permissions through profiles.................................................................................................................. 218
5.4 Decommissioning the Network Management module ..................................................................................................... 218
6 SERVICING THE EMP .................................................................................................................................... 219