Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 212
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Serial number
Hardware version
Location
Contact
Firmware information
Firmware version
Firmware SHA
Firmware date
Firmware installation date
Firmware activation date
Bootloader version
5.2.2.1.2 Communication settings
It can be retrieved by navigating to
Settings>>>Network or Settings>>>Network & Protocol
LAN
Link status
MAC address
Configuration
IPV4
Status
Mode
Address
Netmask
Gateway
Domain
Mode
FQDN
Primary DNS
Secondary DNS
IPV6
Status
Mode
Addresses
5.2.2.1.3 UPS details
It can be retrieved by navigating to
Home>>>Details or Home>>>Energy flow
.
Details
Name
Model
P/N
S/N
Location
FW version
5.2.2.2 Defense in Depth
Defense in Depth basically means applying multiple counter-measures for mitigating risks, in a layered or step wise manner. A
layered approach to security as shown in the below diagram is what is recommended. Defense in Depth is the responsibility of
both the manufacturer and the customer.
Most of above information are discoverable using SNMP, refer to Settings>>>SNMP.
Summary of Contents for Network-M3
Page 1: ...UPS Network Management Card Network M3 User s Guide English 10 27 2023...
Page 2: ......
Page 10: ...Table of Contents 10 Applicable product Eaton UPS ATS...
Page 32: ...Home Contextual help of the web interface 32 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode...
Page 34: ...Home Contextual help of the web interface 34 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode...
Page 36: ...Home Contextual help of the web interface 36 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode...
Page 63: ...Protection Contextual help of the web interface 63 Example 2 Immediate OFF...
Page 64: ...Protection Contextual help of the web interface 64 Example 4 Custom Settings 1...
Page 120: ...Settings Contextual help of the web interface 120 3 7 6 3 SSH 3 7 6 4 SNMP 3 7 6 5 MQTT...
Page 287: ...Acronyms and abbreviations Information 287...
Page 294: ......