Eaton is a registered trademark of Eaton Corporation or its subsidiaries and affiliates.
Phillips and Pozidriv are a registered trademarks of Phillips Screw Company.
National Electrical Code and NEC are registered trademarks of National Fire Protection Association, Inc.
Microsoft®, Windows®, and Windows Server® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
UNIX® is a registered trademark of The Open Group.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.
Google™ is a trademark of Google Inc.
All other trademarks are properties of their respective companies.
No part of this document may be reproduced in any way without the express written approval of Eaton Corporation.
1 Table of Contents
1TABLE OF CONTENTS..................................................................................................................................... 4
2CONTEXTUAL HELP ...................................................................................................................................... 13
2.1.1Logging in for the first time ......................................................................................................................................... 13
2.3.6Alarm list with codes ................................................................................................................................................... 23
2.4.1.3System name .......................................................................................................................................................... 24
2.4.1.4Default settings parameters and limitations............................................................................................................ 24
2.4.2Date & Time ................................................................................................................................................................ 24
2.4.2.1Manual:Manually entering the date and time......................................................................................................... 24
2.4.2.2Dynamic (NTP):Synchronizing the date and time with an NTP server.................................................................... 24
2.4.2.3Default settings parameters and limitations............................................................................................................ 25
2.4.7.3Pairing with clients .................................................................................................................................................. 49
2.4.9.3Date format ............................................................................................................................................................. 55
2.6.2.1Group 1/ Group 2..................................................................................................................................................... 60
2.7.2Agent list ..................................................................................................................................................................... 62
2.7.2.1Pairing with shutdown agents................................................................................................................................. 62
2.7.2.2Agent list table......................................................................................................................................................... 62
2.7.4.1On power outage..................................................................................................................................................... 65
2.7.4.3When utility comes back ......................................................................................................................................... 70
2.8.1System information ..................................................................................................................................................... 70
2.8.1.2Firmware information .............................................................................................................................................. 71
2.10Legal information (footer) .................................................................................................................................................. 85
2.10.1Component list ............................................................................................................................................................ 85
2.10.2Notice for our proprietary (i.e. non-Open source) elements........................................................................................ 85
2.10.3Availability of source code........................................................................................................................................... 86
2.11Contextual help and full documentation............................................................................................................................ 86
2.11.1Access to contextual help ........................................................................................................................................... 86
2.11.2Access to full documentation...................................................................................................................................... 86
3SERVICING THE NETWORK MANAGEMENT MODULE ............................................................................... 88
3.1Unpacking the Network module........................................................................................................................................ 88
3.2Installing the Network Module .......................................................................................................................................... 88
3.2.1Mounting the Network Module ................................................................................................................................... 88
3.3Accessing the Network Module........................................................................................................................................ 88
3.3.1Accessing the web interface through Network ........................................................................................................... 88
3.3.1.1Connecting the network cable................................................................................................................................. 88
3.3.1.2Accessing the web interface................................................................................................................................... 89
3.3.2Finding and setting the IP address .............................................................................................................................. 89
3.3.2.1Your network is equipped with a BOOTP/DHCP server (default)............................................................................ 89
3.3.2.2Your network is not equipped with a BOOTP/DHCP server.................................................................................... 89
3.3.3Accessing the web interface through RNDIS .............................................................................................................. 90
3.3.3.1Connecting the configuration cable......................................................................................................................... 90
3.3.3.2Web interface access through RNDIS..................................................................................................................... 90
3.3.4Accessing the card through serial terminal emulation................................................................................................. 92
3.3.4.1Connecting the configuration cable......................................................................................................................... 92
3.3.4.2Manual configuration of the serial connection......................................................................................................... 93
3.3.4.3Accessing the card through Serial........................................................................................................................... 94
3.3.5Modifying the Proxy exception list .............................................................................................................................. 94
3.4Configuring the Network Module settings ........................................................................................................................ 96
3.6Pairing agent to the Network Module ............................................................................................................................... 98
3.6.1Pairing with credentials on the agent .......................................................................................................................... 99
3.6.2Pairing with automatic acceptance (recommended if done in a secure and trusted network).................................... 99
3.6.3Pairing with manual acceptance ................................................................................................................................. 99
3.7.1Powering down IT system in a specific order ........................................................................................................... 100
3.7.1.4Step 3: Power outage policy settings.................................................................................................................... 101
3.7.2Powering down non-priority equipment first ............................................................................................................. 102
3.7.2.4Step 3: Power outage policy settings.................................................................................................................... 104
3.7.3Restart sequentially the IT equipment on utility recovery ......................................................................................... 105
3.7.3.3Step 2: Power outage policy settings.................................................................................................................... 106
3.8Checking the current firmware version of the Network Module..................................................................................... 107
3.9Accessing to the latest Network Module firmware/driver/script..................................................................................... 107
3.11Changing the RTC battery cell......................................................................................................................................... 108
3.12Updating the time of the Network Module precisely and permanently (ntp server) ....................................................... 110
3.13Synchronizing the time of the Network Module and the UPS......................................................................................... 110
3.13.1Automatic time synchronization ................................................................................................................................ 110
3.13.1.1Every day at 5 a.m................................................................................................................................................. 110
3.13.1.2If the Network Module time is lost........................................................................................................................ 110
3.13.2Manual time synchronization..................................................................................................................................... 110
3.13.2.1From the Network Module.................................................................................................................................... 110
3.13.2.2From the UPS........................................................................................................................................................ 110
3.14Changing the language of the web pages....................................................................................................................... 110
3.15Resetting username and password................................................................................................................................. 111
3.15.1As an admin for other users ...................................................................................................................................... 111
3.15.2Resetting its own password...................................................................................................................................... 111
3.16Recovering main administrator password ....................................................................................................................... 111
3.17Switching to static IP (Manual) / Changing IP address of the Network Module.............................................................. 112
3.18Reading product (UPS) information in a simple way ....................................................................................................... 112
3.19Subscribing to a set of alarms for email notification........................................................................................................ 113
3.19.1Example #1: subscribing only to one alarm (load unprotected)................................................................................. 113
3.19.2Example #2: subscribing to all Critical alarms and some specific Warnings ............................................................. 115
3.20.1.4Non-intuitive data values in the JSON file ............................................................................................................. 121
3.20.2Saving/Restoring/Duplicating settings through the CLI............................................................................................. 124
3.20.3Saving/Restoring/Duplicating settings through the Web interface............................................................................ 124
4SECURING THE NETWORK MANAGEMENT MODULE.............................................................................. 125
4.1Cybersecurity considerations for electrical distribution systems .................................................................................... 125
4.1.4.1Paths to the control network................................................................................................................................. 126
4.1.5Defense in depth ....................................................................................................................................................... 126
4.1.6Designing for the threat vectors................................................................................................................................ 127
4.1.6.2Demilitarized zones (DMZ) .................................................................................................................................... 127
4.1.6.3Intrusion detection and prevention systems (IDPS) .............................................................................................. 129
4.1.7Policies, procedures, standards, and guidelines........................................................................................................ 129
4.1.7.1Understanding an ICS network.............................................................................................................................. 129
4.1.7.2Log and event management.................................................................................................................................. 129
4.1.7.3Security policy and procedures.............................................................................................................................. 130
4.1.9Terms and definitions ................................................................................................................................................ 131
4.2.2.3Authorization and Access Control.......................................................................................................................... 134
4.3Configuring user permissions through profiles................................................................................................................ 137
4.4Decommissioning the Network Management module ................................................................................................... 137
5SERVICING THE EMP .................................................................................................................................. 138
5.1Description and features ................................................................................................................................................. 138
5.2Unpacking the EMP......................................................................................................................................................... 138
5.3Installing the EMP ........................................................................................................................................................... 139
5.3.1Defining EMPs address and termination ................................................................................................................... 139
5.3.2Mounting the EMP .................................................................................................................................................... 139
5.3.2.1Rack mounting with keyhole example................................................................................................................... 140
5.3.2.2Rack mounting with tie wraps example ................................................................................................................ 140
5.3.2.3Wall mounting with screws example .................................................................................................................... 141
5.3.2.4Wall mounting with nylon fastener example......................................................................................................... 141
5.3.3Cabling the first EMP to the device........................................................................................................................... 142
5.3.3.2Connecting the EMP to the device........................................................................................................................ 142
5.3.5Connecting an external contact device...................................................................................................................... 144
5.4Commissioning the EMP................................................................................................................................................. 144
5.4.1On the Network-M2 device ....................................................................................................................................... 144
5.5Using the EMP for temperature compensated battery charging..................................................................................... 145
5.5.1Addressing the EMP.................................................................................................................................................. 145
5.5.2Commissioning the EMP........................................................................................................................................... 146
5.5.3Enabling temperature compensated battery charging in the UPS............................................................................. 146
6.1Front panel connectors and LED indicators..................................................................................................................... 147
6.2Default settings and possible parameters....................................................................................................................... 148
6.2.1.2Date & Time .......................................................................................................................................................... 148
6.4List of event codes.......................................................................................................................................................... 156
6.8.8.4Examples of usage ................................................................................................................................................ 173
6.8.9ping and ping6 ........................................................................................................................................................... 173
6.8.11.4Examples of usage ................................................................................................................................................ 174
6.8.14.4Examples of usage ................................................................................................................................................ 176
6.8.15traceroute and traceroute6........................................................................................................................................ 176
6.8.19.4Examples of usage ................................................................................................................................................ 179
6.9.1Availability of Source Code ........................................................................................................................................ 179
6.9.2Notice for Open Source Elements............................................................................................................................. 179
6.9.3Notice for our proprietary (i.e. non-Open source) elements ...................................................................................... 180
6.10Acronyms and abbreviations ........................................................................................................................................... 181
7.1Action not allowed in Control/Schedule/Power outage policy......................................................................................... 184
7.1.2Possible Cause .......................................................................................................................................................... 184
7.2Client server is not restarting .......................................................................................................................................... 184
7.2.2Possible Cause .......................................................................................................................................................... 184
7.4How do I log in if I forgot my password? ........................................................................................................................ 185
7.6IPP/IPM is not able to communicate with the Network module ..................................................................................... 186
7.7LDAP configuration/commissioning is not working......................................................................................................... 187
7.8Password change in My preferences is not working ...................................................................................................... 187
7.10The Network Module fails to boot after upgrading the firmware .................................................................................... 188
7.10.1Possible Cause .......................................................................................................................................................... 188
7.11Web user interface is not up to date after a FW upgrade ............................................................................................... 188
The page language is set toEnglishby default but can be switched tobrowser language when it is managed.
After navigating to theassigned IP address, accept the untrusted certificate on the browser.
2.1.1 Logging in for the first time
1.Enter default password
As you are logging into the Network Module for the first time you must enter the factory set default username and password.
•
Username = admin
•
Password = admin
2. Change default password
Changing the default password is mandatory and requested in a dedicated window.
Enter your current password first, and then enter the new password twice.
Follow the password format recommendations on the tooltip in order to define a secure password.
3. Accept license agreement
On the next step, License Agreement is displayed.
Read and accept the agreement to continue.
2.1.2 Troubleshooting login issues
For details on troubleshooting, see the
Troubleshooting
section.
2.2 Home
The Home screen providesstatus informationfor the deviceincluding synoptic diagrams, key measures andactive alarms.
Home
Contextual Help – 14
2.2.1 Menu structure
ButtonDescription
Home
Overview and status ofUPS Module:
•
Synoptic
•
Active alarms
•
Outlet status
Settings
Alarms
Module settings:
•
General
•
Date & Time
•
Users
•
Network
•
Protocols
•
SNMP
•
Certificates
•
Email
•
My preferences
List of alarms with date and time:
•
Details
•
Clear
•
Export
Home
Contextual Help – 15
Meters
Power:
•
Frequency
•
Voltage
•
Current
•
Power
Battery:
•
Overview
•
Details
•
Test
Measure logs:
•
Configuration
•
Measure logs
Controls
Protection
Sensors*
Card
Control of:
•
•
•
•
•
•
•
•
•
•
•
•
•
Entire UPS
Outlets
Scheduled shutdown
Agent list
Agent settings
Power outage policy
Status
Alarm configuration
Information
System information
System logs
Administration
Commissioning (Sensors)
*Displayed when sensors are commissioned in Card menu.
Home
Contextual Help – 16
2.2.2 Energy flow diagram
2.2.2.1 Line interactive
2.2.2.1.1 Diagram elements description
Description and
symbols
InputMain utility input.PoweredOut of nominal rangeNot present
AVR device.The equipment is
OutputOutput of the UPS.ProtectedIn overload
ChargerInternal battery charger.Charging
DescriptionPossible states
GreenYellowRedBlack / White /
protected and powered
through an AVR device.
Normal mode
Buck mode
Boost mode
Floating
Greyed
Unknown
In overloadNot powered
Unknown
In short circuitNot powered
Not protected
In faultResting
Unknown
Not powered
Unknown
Battery statusBattery status information. Powering the loadEnd of lifeIn fault
Not present
Not used to power
the load
Unknown
Home
Contextual Help – 17
Battery levelBattery level for the
backup power.
> 50%
and
> low battery
threshold (Settable
on the UPS)
< 50%
and
> low battery
threshold (Settable
on the UPS)
< Below low battery
threshold (Settable on
the UPS)
InverterInverter: convert DC
power to AC power.
WiringElectrical connection
between blocks.
PoweredIn overloadIn short circuit
Energy flowIn overload
2.2.2.1.2 Line interactive diagram examples
Normal mode
Out of nominal range
In fault
Not powered
Unknown
No energy
Unknown
Buck/Boost mode
Home
Contextual Help – 18
Battery mode
2.2.2.2 Online
2.2.2.2.1 Diagram elements description
Description and
symbols
InputMain utility or second
RectifierRectifier: convert AC
InverterInverter: convert DC
DescriptionPossible states
GreenYellowRedBlack or white
utility.
power to DC power.
power to AC power.
PoweredOut of nominal rangeNot present
Powered
HE mode (ready) / ESS
mode (ready)
Powered
HE mode (ready) / ESS
mode (ready)
In overloadIn short circuit
In fault
In overloadIn short circuit
In fault
Unknown
Not powered
Unknown
Not powered
Unknown
Home
Contextual Help – 19
OutputOutput of the UPS.ProtectedIn overload
Not protected
In short circuitNot powered
Unknown
ChargerInternal battery
Battery statusBattery status
Battery levelBattery level for the
Automatic
bypass
charger.
information.
backup power.
Automatic bypass.Powered (standby, auto
Charging
Floating
Powering the loadEnd of lifeIn fault
> 50% and > low
battery threshold
(Settable on the UPS)
bypass, forced bypass,
HE mode, ESS mode)
< 50% and > low
battery threshold
(Settable on the UPS)
In overloadIn faultNot powered
In faultResting
Not present
< Below low battery
threshold (Settable on
the UPS)
Not powered
Unknown
Not used to power the
load
Unknown
Unknown
Maintenance
bypass
(optional)
WiringElectrical connection
Maintenance bypass
closed.
Maintenance bypass
opened.
between blocks.
Powered (maintenance
bypass)
Energy flowIn overload
2.2.2.2.2 Online diagram examples
Not powered
Unknown
No energy
Out of nominal range
Single input source
UPS name – Displays by default the UPS model or the system name if filled in the section Card>>>System
information>>>System name
Current user– Displays current user name
Logout–Logs the current user out by destroying the current user session
Status–Provides device (example UPS) status information
Output power– Provides output power status information
Battery status– Provides battery status information
Alarms button– Open alarm page
Settings button– Open settings page
Home
Contextual Help – 21
2.2.4 Details
Thisview provides a summary of device identification information and nominal values:
•
Name
•
Model
•
P/N
•
S/N
•
Location
•
Firmware version
•
Input Voltage
•
Input Frequency
•
Output Voltage
•
Output Frequency
The COPY TO CLIPBOARD button will copy the information toyour clipboard so that it can be past.
For example, you can copy and paste information into an email.
2.2.5 Show measures
Provides input and output measures on the synoptic.
2.2.5.1 Example #1
Single input source with 1 phase in and 1 phase out:
Input measures Output measures
Voltage (V)
Current (A)
Frequency (Hz)
Voltage (V)
Current (A)
Frequency (Hz)
2.2.5.2 Example #2
Dual input sources with 3 phases in and 3 phases out
Input measures (main and secondary)Output measures
Phase #1
Voltage (V)
Current (A)
Frequency (Hz)Frequency (Hz)
Phase #2
Voltage (V)
Current (A)
Phase #3
Voltage (V)
Current (A)
Phase #1
Voltage (V)
Current (A)
2.2.6 Outlet status
Providesthe status of the UPS outlets (ON/OFF) by load segmentation:
Phase #2
Voltage (V)
Current (A)
Phase #3
Voltage (V)
Current (A)
Load (W)
Load (%)
•
Status (ON/OFF— Protected/Not protected/Not powered)
•
Load level (W)– availability depending on the UPS model
•
Shutdown countdown
•
Startup countdown
Alarms
Contextual Help – 22
Note: Load segmentations allow non-priority equipment to automatically power down during an
extended power outage to keep battery runtime on essential equipment.
This feature is also used toremote reboot and sequential startservers to restrict inrush currents.
2.2.7 Active Alarms
Only active alarms are displayed, the Alarmsicon will alsodisplay the number of active alarms.
Alarms are sorted by date,alert level, time, anddescription.
Note:To seethe alarm history,press the Alarms button.
2.3 Alarms
2.3.1 Alarm sorting
Alarms can be sorted by selecting:
•
All
•
Active only
2.3.2 Alarm details
Allalarms are displayed andsorted by date, with alert level, time, description, and status.
Info/Warning/Critical logo Alarm description text
ActiveIn colorIn bold with "Active" label
Opened In color
ClosedGreyed
2.3.3 Alarm paging
The number of alarms per page can be changed (10-15-25-50-100).
When the number of alarms is above the number of alarms per page,the buttons First, Previous andNextappears to allow
navigation in the Alarm list.
Settings
Contextual Help – 23
2.3.4 Alarm export
Press theExportbutton to download the file.
2.3.5 Clear alarm logs
Press theClearbutton to clear alarms that are older than a specified date and up to a defined severity.
2.3.6 Alarm list with codes
For details on alarm codes, see the
2.4 Settings
2.4.1 General
Information>>>Alarm log codes
section.
2.4.1.1 Location
Text field that is used to provide the card location information.
Card system information is updated to show the defined location.
Settings
Contextual Help – 24
2.4.1.2 Contact
Text field that is used to provide the contact name information.
Card system information is updated to show the contact name.
2.4.1.3 System name
Text field that is used to provide the system name information.
Card system information is updated to show the system name.
2.4.1.4 Default settings parameters and limitations
For details on default parameters and limitations, see the
parameters
section.
2.4.2 Date & Time
The current date and time appearsin the footer at the bottom of the screen.
You can set the time either manually or automatically.
Information>>>Default settings
2.4.2.1 Manual:Manually entering the date and time
1.
2.
3.
2.4.2.2 Dynamic (NTP):Synchronizing the date and time with an NTP server
1.
2.
3.
Note:DST is managed based on the time zone.
Select the time zone for your geographic area from the time zone pull-down menu orwiththe map.
Select the date and time.
Save the changes.
Enter the IP address or host name of the NTP server in theNTP server field.
Select the time zone for your geographic area from the time zone pull-down menu orwiththe map.
Save the changes.
Settings
Contextual Help – 25
2.4.2.3 Default settings parameters and limitations
For details on default parameters and limitations, see the
parameters
section.
2.4.3 Users
2.4.3.1 Password strength rules
To set the password strength rules, apply the following restrictions:
•
Minimum length
•
Minimum upper case
•
Minimum lower case
•
Minimum digit
•
Special character
Information>>>Default settings
PressSaveafter modifications.
2.4.3.2 Account expiration
To set the account expiration rules, apply the following restrictions:
•
Password expires after (in days).
The main administrator password never expires.
Settings
Contextual Help – 26
1.2.If this feature is disabled, the administrator account can be locked after the password expiration.
If Enabled, the administrator password never expires, make sure it is changed regularly.
•
Block account when invalid password is entered after (in number of attempts).
The main administrator account will never block.
1.2.If this feature is disabled, the administrator account can be locked after the number of failed connections
defined.
If Enabled, the security level of the administrator account is reduced because unlimited password entry
attempts are allowed.
PressSaveafter modifications.
2.4.3.3 Session expiration
To set the session expiration rules,apply the following restrictions:
•
No activity timeout (in minutes).
If there is no activity, session expires after the specified amount of time.
•
Session lease time (in minutes).
If there is activity, session still expires afterthe specified amount of time.
PressSaveafter modifications.
2.4.3.4 Local users table
Settings
Contextual Help – 27
The table shows all the supported local user accounts and includes the following details:
▪
Username
▪
Email
▪
Profile
AdministratorOperatorViewer
Home
AlarmsAlarm list
Export
Clear
SettingsGeneral
Date & Time
Users
Network
Protocols
SNMP
Certificates
Email
My preferences
MetersPower
Battery
Measure logs
Configuration
Controls
Protection
SensorsStatus
Alarm configuration
Settings
Contextual Help – 28
Information
CardSystem information
Resources
System logs
Administration
Commissioning (Sensors)
Legal information (footer)
Contextual and Full documentation
Command Line
Interface
get release info
history
ldap-test
logout
maintenance
netconf (read-only)
(read-only)(read-only)
ping and ping6
reboot
save_configuration |
restore_configuration
sanitize
ssh-keygen
time
(read-only)(read-only)
traceroute and traceroute6
whoami
email-test
systeminfo_statistics
certificates
•
Status –Status could take following values– Inactive/Locked/Password expired/Active
Settings
Contextual Help – 29
2.4.3.4.1 Actions
a Add
Press the New button to create up to ten new users.
b Remove
Select a user and press the Delete button to remove it.
c Edit
Press the pen logo to edit user information and access to the following settings:
•
Active
•
Profile
•
Username
•
Full name
•
Email
•
Phone
•
Organization– Notify by email about account modification/Password
•
Reset password
•
Generate randomly
•
Enter manually
•
Force password to be changed on next login
2.4.3.5 LDAP
The table shows all the supported severs and includes the following details:
•
Name
•
Address
•
Port
•
Security
•
Status–Status could take following values– Unreachable/Active
Settings
Contextual Help – 30
2.4.3.5.1 Actions
a Configure
1. Press Configureto access the following LDAP settings:
•
Active
•
Base access
Loading...
+ 159 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.