background image

32

INM 9475-ETG Rev 1

Category

Description

Remote Access

Remote access to devices/systems creates another 

entry point into the network. Strict management 

and validation of termination of such access is vital 

for maintaining control over overall ICS security. The 

9475 Gigabit Media Converter requires additional 

hardware to allow Remote Access. This hardware 

will need securing correctly to ensure security

Logging and
Event
Management

• 

Eaton recommends logging all relevant 

system and application events, including all 

administrative and maintenance activities.

• 

Logs should be protected from tampering and 

other risks to their integrity (for example, by 

restricting permissions to access and modify 

logs, transmitting logs to a security information 

and event management system,  etc.).

• 

Ensure that logs are retained for a reasonable 

and appropriate length of time.

• 

Review the logs regularly.  The frequency 

of review should be reasonable, taking into 

account the sensitivity and criticality of the 

system | device and any data it processes.

Vulnerability Scanning

Any known critical or high severity vulnerabilities 

on third party component/libraries used to run 

software /applications should be remediated 

before putting the device | system into production.
• 

Eaton recommends running a vulnerability 

scan to identify known vulnerabilities for 

software used with the product.   For COTS 

components (e.g., applications running on 

Windows), vulnerabilities can be tracked on 

the National Vulnerability Database (NVD), 

available at https://nvd.nist.gov/.

• 

Keep software updated by monitoring security 

patches made available by COTS vendors and 

installing them as soon as possible.

Note: Many compliance frameworks and security 

best practices require a monthly vulnerability 

review. For many non-COTS products vulnerabilities 

will be communicated directly through the vendor 

site.

Malware Defenses

Eaton recommends deploying adequate malware 

defenses to protect the product or the platforms 

used to run the Eaton product.

Summary of Contents for MTL 9475-ETG

Page 1: ...9475 ETG Instrinsically Safe Gigabit Ethernet Dual Port Media Converter December 2020 INM 9475 ETGRev 1 Instruction manual MTL Industrial Network Solutions ...

Page 2: ...ARATION OF CONFORMITY A printed version of the Declaration of Conformity has been provided separately within the original shipment of goods However you can find a copy of the latest version at http www mtl inst com certificates ...

Page 3: ...9 1 Fibre Port Specification 6 10 APPROVALS 6 11 CERTIFICATE INSTALLATION 7 12 CONNECTING THE 9475 ET G TO A PC NETWORK 9 13 SYSTEM INFORMATION 10 14 PORT STATUS 11 15 NETWORK STATISTICS 12 16 MAC TABLE 13 17 ACTIVITY LOG 14 18 SYSTEM SETTINGS 15 19 PORT SETTINGS 17 20 REBOOT MEDIA CONVERTER 17 21 RESET SWITCH 16 22 LOGOUT OF CURRENT WEB SESSION 18 23 CONTACT 19 24 APPENDIX A END USER LICENSE AGRE...

Page 4: ...Dual 1310nm Gigabit Fibre Optic Ports 10Km CPU Management Feature via Web Pages Fibre Optic Repeater Mode with 2 local LAN Ports Compact dimensions W 42 x H 160 x D 140 mm Ex ia op is IIB T4 Ga Ex ia Da IIIC non mining Ex ia op is I Ma M1 mining Ta 40ºC to 70ºC Zone 1 Zone 21 mounting Zone 0 Zone 20 with a suitable Ex ia Power Supply ...

Page 5: ...s presented The use of 1310nm optics allows a longer fibre optic link length typically 10Km at Gigabit 1000Mbps using Single Mode fibre or 500m when using multi mode fibre Power 12V DC is supplied to the module locally The compact and cost effective design makes it the ideal choice for many applications Petrochem Process Monitoring Control Mining Underground Communication Links PLC and Machine Mon...

Page 6: ... BI_DB 4 BI_DC 5 BI_DC 6 BI_DB 7 BI_DD 8 BI_DD 3 3 LED indicators OFF FLASH ON PWR green Power Fail N A Power OK WDG red green Fault Green Healthy 10Hz Fault STAT red green N A Green Identify module mode Red fault Green healthly RJ45 ACT yellow Ethernet link disconnected Ethernet link activity Ethernet link connected RJ45 1000 green 10 100Mbps N A 1000Mbps Fibre Ports Purple No Link Fibre Link Act...

Page 7: ...densing Ingress Protection Select enclosure to suit application see certificates for information 7 WASTE REMOVAL INFORMATION The electronic equipment within must not be treated as general waste By ensuring that this product is disposed of correctly you will be helping to prevent potentially negative consequences for the environment and human health which could otherwise be caused by incorrect wast...

Page 8: ...s shown above As the 9475 Gigabit Media Converter supports Auto MDI MDI X a straight connected RJ45 Cat5e cable is used to connect to any device required it is also possible to daisy chain the units using the two LAN ports It is recommended that Cat5e cables for Hazardous Area Zone 1 use are Blue in colour and are of good quality see accessories section the Safe Area cables being a colour other th...

Page 9: ...Fibre Up to 500m Multi Mode Fibre 9 1 Fibre Port Specification 1000BASE X TX Output 1310nm Single Mode 9 5dBm Min 3dBm Max Note 1 RX Sensitivity Single Mode 21dBm Max note 1 transmit power coupled into9um single mode fibre 10 APPROVALS Location of Unit Zone 1 IIBT4 hazardous area 9475 ETG Certification Code Ex ia op is IIBT4 Ga Ex ia Da IIICT135 C non mining Ex ia op is I Ma M1 mining Ta 40ºC to 7...

Page 10: ... be able to view the HTTPS pages of the unit securely you are required to install a SSL certificate Below are the steps required in the Google Chrome browser other browser setups are similar Click on the 3 dots in the top right corner of the browser Click Advanced Privacy and Security Manage certificates ...

Page 11: ...ev 1 Click on theTrusted Root Certification Authorities Ab and click Insert Browse for the ca cert pem file and install it You will now get and entry in the list of certificates called Controlled Systems Ltd ECDSA root ...

Page 12: ...can be found on the MTL website this will automatically search for and locate any 9475 units connected to the network Click on the device that you are looking to configure then click the configure IP settings button and this will bring up the following screen Manually type in the settings that you require and then enter the password CSL Click the apply button to send the settings to the 9475 Reboo...

Page 13: ...is functioning correctly Hardware and Software version is shown here as well to ensure the latest firmware is being used The Password lockout timer indicates the time remaining if the configuration of the unit has been locked out due to the password being entered incorrect 3 or more times If intermittent problems exist check the Temperature and voltage settings as this may indicate what is wrong ...

Page 14: ...TG Rev 1 14 PORT STATUS This page show the current status of the 2 LAN ports and the 2 Fibre ports on the 9475 The unit will display any connected Gigabit ports in green and any connected 10 100Mbps ports in Yellow ...

Page 15: ...S On this page counters are shown to enable fault finding onyour network infrastructure There are 64 counters for the 4 external ports and the one internal port connected to the CPU The counters can be cleared using the Clear Statistics button ...

Page 16: ...relation to the unit T Trunk Specifies the DPV value is the trunk ID DPV Destination Port Vector value is a bit pattern of the ports on the unit MAC Address The unique 48bit MAC address PRI The priority assigned to the MAC address FID Forwarding Information Database allows the same MAC Address on different ports ...

Page 17: ...a the password shows any changes that have occured to the unit This includes configuration changes password entered wrong and other useful information The Clear Log button will empty the existing log NOTE The Factory Default Password is Pa55W075 without quotes ...

Page 18: ...he unit to reboot can be changed here NTP IP Address Enter the IP Address of an NTP server to allow the unit to get the correct time NTP Request Frequency This is the frequency that the unit will request the time from an NTP server NTP Offset This value can be used to offset the time received from the NTP server This value is the number of hours the local time is different from Greenwich Mean Time...

Page 19: ...the changing of the 2 Ethernet ports Mode Off Auto or Fixed Negotiation Duplex Half or Full Speed 10 Mbps 100Mbps 1Gbps 1000 The 2 Fibre Ports are fixed 1000BASE X and cannot be changed Click Submit to save the selection NOTE The Factory Default Password is Pa55W075 without quotes ...

Page 20: ...actory reset code This page is only accessed via a password The default factory reset code is DEFA 21 REBOOT MEDIA CONVERTER This page allow the rebooting of the unit To reset enter the reboot device code This page is only accessed via a password The default reboot code is 4E5E NOTE The Factory Default Password is Pa55W075 without quotes ...

Page 21: ...RENT WEB SESSION This page logs the current user out of the web session It is highly recommended that once finished using the web interface that you log out enforcing that the password will have to be entered next time the unit is accessed ...

Page 22: ...19 INM 9475 ETG Rev 1 23 CONTACT This page list the contacts for support and offers a quick way to access our websites ...

Page 23: ...ation Utility Software for Eaton 9475 Instrinsically Safe Gigabit Ethernet Dual Port Media Converter The software can be accessed through a web Graphical User Interface GUI through an IP Address by physically connecting to the switch License Subject to the terms and conditions of this Agreement Eaton hereby grants to Authorized Party a limited non transferable non sublicensable non assignable non ...

Page 24: ...Party waives and holds harmless Eaton from any claims resulting from any action taken by Eaton during or as a result of Eaton s investigation and or from any actions taken as a consequence of investigations by either Eaton or law enforcement related to the Authorized Party s use of the Product Services Updates and Events outside of Eaton s control Eaton may update or upgrade the Product Software a...

Page 25: ...ces related to the Product Software Support Services Use of Support Services is governed by the policies and programs described in the Documentation and or other Eaton provided materials Any supplemental materials provided to Authorized Party as part of the Support Services shall be considered part of the Product Software as applicable and subject to the terms and conditions of this Agreement No W...

Page 26: ... EMOTIONALDISTRESS OR SIMILAR DAMAGES OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES ARISING OUT OF OR RELATED TO AUTHORIZED PARTY S USE OR INABILITY TO USE THE PRODUCT SOFTWARE HOWEVER CAUSED REGARDLESS OF THE THEORY OF LIABILITY CONTRACT TORT OR OTHERWISE AND EVEN IF EATON OR THE AFOREMENTIONED PARTIES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES TO THE EXTENT PERMITTED BY LAW IN NO EVENT WIL...

Page 27: ...916 928 1227 or 800 326 2297 via TTY device Registration To use the Product Software Authorized Party must have a valid account with a username and password Credentials Authorized Party is responsible for maintaining the confidentiality of Authorized Party s username and passwords and for ensuring that each password is only used by employees granted access to the Product Software on the Authorized...

Page 28: ...he internet or otherwise without the express written consent of Eaton The Authorized Party acknowledges that the Authorized Party has no right title or interest in or to the Product Software and or any Eaton Content EATON and MTL947x are trade names and or marks owned exclusively by Eaton The Authorized Party shall not use any trade names or marks that are confusingly similar in Eaton s sole opini...

Page 29: ...that term is defined at 48 C F R 2 101 consisting of commercial computer software and commercial computer software documentation as such terms are used in 48 C F R 12 212 and is provided to the U S Government only as a commercial end item Consistent with 48 C F R 12 212 and 48 C F R 227 7202 1 through 227 7202 4 all U S Government End Users acquire the Software with only those rights set forth her...

Page 30: ... this Agreement should be directed to Eaton at Eaton Attn IP Law Group 1000 Eaton Boulevard Mail Code 4N Cleveland OH 44122 Eaton Attn Global Data Protection and Privacy Office 1000 Eaton Boulevard Cleveland OH 44122 Email dataprotection eaton com ...

Page 31: ...ther to complement customers existing cybersecurity programs Eaton is committed to minimizing the cybersecurity risk in its products and deploying cybersecurity best practices in its products and solutions making them more secure reliable and competitive for customers The following Eaton whitepapers are available for more information on general cybersecurity best practices and guidelines Cybersecu...

Page 32: ...ical Security An attacker with unauthorized physical access can cause serious disruption to device functionality Additionally Industrial Control Protocols don t offer cryptographic protections making ICS and SCADA communications especially vulnerable to threats to their confidentiality Physical security is an important layer of defence in such cases The 9475 Gigabit Media Converter is designed to ...

Page 33: ...MP access using access control lists Disable unneeded ports services Account Management Logical access to the system device should be restricted to legitimate users who should be assigned only the privileges necessary to complete their job roles functions Some of the following best practices may need to be implemented by incorporating them into the organization s written policies Ensure default cr...

Page 34: ...his capability can present risks if it s not configured securely Following are Eaton recommended best practices to help secure the network Additional information about various network protection strategies is available in Eaton Cybersecurity Considerations for Electrical Distribution Systems R1 Eaton recommends segmentation of networks into logical enclaves denying traffic between segments except ...

Page 35: ...uency of review should be reasonable taking into account the sensitivity and criticality of the system device and any data it processes Vulnerability Scanning Any known critical or high severity vulnerabilities on third party component libraries used to run software applications should be remediated before putting the device system into production Eaton recommends running a vulnerability scan to i...

Page 36: ...g The 9475 Gigabit Media converter into the organization s business continuity and disaster recovery plans Organizations should establish a Business Continuity Plan and a Disaster Recovery Plan and should periodically review and where possible exercise these plans As part of the plan important system device data should be backed up and securely stored including Updated firmware for The 9475 Gigabi...

Page 37: ... Boards and Devices Eaton recommends the following methods for disposing of motherboards peripheral cards such as network adapters or any other adapter containing non volatile flash memory Clear If supported by the device reset the state to original factory settings Purge If the flash memory can be easily identified and removed from the board the flash memory may be destroyed independently of the ...

Page 38: ...lic powersystems resources library 1100_EAS WP910003EN pdf R3 NIST SP 800 82 Rev 2 Guide to Industrial Control Systems ICS Security May 2015 https ics cert us cert gov Standards and References R4 National Institute of Technology NIST Interagency Guidelines on Firewalls and Firewall Policy NIST special Publication 800 41 October 2009 http nvlpubs nist gov nistpubs Legacy SP nistspecialpublication80...

Page 39: ...36 INM 9475 ETG Rev 1 This page is left intentionally blank ...

Page 40: ...37 INM 9475 ETG Rev 1 This page is left intentionally blank ...

Page 41: ...Off Old Mahabalipuram Road Sholinganallur Chennai 600 119 India Tel 91 0 44 24501660 24501857 Fax 91 0 44 24501463 E mail mtlindiasales eaton com ITALY MTL Italia srl Via San Bovio 3 20090 Segrate Milano Italy Tel 39 02 959501 Fax 39 02 95950759 E mail chmninfo eaton com JAPAN Cooper Industries Japan K K MT Building 3F 2 7 5 Shiba Diamon Minato ku Tokyo Japan 102 0012 Tel 81 0 3 6430 3128 Fax 81 0...

Reviews: