background image

Z207251-0C 

Page 36 of 42 

©2020 Veris Industries   USA 800.354.8556 or +1.503.598.4564  / [email protected] 0420 

 

Alta Labs, Enercept, Enspector, Hawkeye, Trustat, Aerospond, Veris, and the Veris ‘V’ logo are trademarks or registered trademarks of  Veris Industries, L.L.C. in the USA and/or other countries.

Other companies’ trademarks are hereby acknowledged to belong to their respective owners.

E34 Series Installation Guide

TM

Protected Environment Assumptions

•  Cybersecurity governance – available and up-to-date guidance on governing the use of information and technology 

assets in your company.

•  Perimeter security – installed devices, and devices that are not in service, are in an access-controlled or monitored 

location.

•  Emergency power – the control system provides the capability to switch to and from an emergency power supply 

without affecting the existing security state or a documented degraded mode.

•  Firmware upgrades – device upgrades are implemented consistently to the current version of firmware.

•  Controls against malware – detection, prevention and recovery controls 

to help protect against malware are implemented and combined with appropriate user awareness.

•  Physical network segmentation – the control system provides the capability to:

•  Physically segment control system networks from non-control system networks.

•  Physically segment critical control system networks from non-critical control system networks.

•  Logical isolation of critical networks – the control system provides the capability to logically and physically isolate 

critical control system networks from non-critical control system networks. For example, using VLANs.

•  Independence from non-control system networks – the control system provides network services to control system 

networks, critical or non-critical, without a connection to non-control system networks.

•  Encrypt protocol transmissions over all external connections using an encrypted tunnel, TLS wrapper or a similar 

solution.

•  Zone boundary protection – the control system provides the capability to:

•  Manage connections through managed interfaces consisting of appropriate boundary protection devices, such as: 

proxies, gateways, routers, firewalls and encrypted tunnels.

•  Use an effective architecture, for example, firewalls protecting application gateways residing in a DMZ.

•  Control system boundary protections at any designated alternate processing sites should provide the same 

levels of protection as that of the primary site, for example, data centers.

•  No public internet connectivity – access from the control system to the internet is not recommended. If a remote site 

connection is needed, for example, encrypt protocol transmissions.

•  Resource availability and redundancy – ability to break the connections between different network segments or use 

duplicate devices in response to an incident.

•  Manage communication loads – the control system provides the capability to manage communication loads to 

mitigate the effects of information flooding types of DoS (Denial of Service) events.

•  Control system backup – available and up-to-date backups for recovery from a control system failure.

Potential Risks and Compensating Controls

Address potential risks using these compensating controls:

Area

Issue

Risk

Compensating Control

User accounts

Default account settings are often 

the source of unauthorized access by 

malicious users.

If you do not change the default 

password, unauthorized access can 

occur.

Change the default password to help 

reduce unauthorized access.

Secure protocols

Modbus TCP, BACnet/IP and SNMP 

protocols are unsecure.
The device does not have the 

capability to transmit encrypted data 

using these protocols.

If a malicious user gained access to 

your network, they could intercept 

communications.

For transmitting data over an internal 

network, physically or logically 

segment the network.
For transmitting data over an 

external network, encrypt protocol 

transmissions over all external 

connections using an encrypted 

tunnel, TLS wrapper or a similar 

solution.

Default Security Settings

Area

Setting

Default

Communication 

protocols

Modbus TCP

Enabled

BACnet/IP

Disabled

SNMP

Disabled

Cybersecurity (cont.)

Summary of Contents for E34 Series

Page 1: ...ng an RS 485 Modbus protocol E34E models also incorporate Ethernet with support for BACNet IP Modbus TCP and SNMP protocols and include BACnet MS TP serial capability and a sturdy metal enclosure The...

Page 2: ...ference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment to an outlet on a circuit d...

Page 3: ...Rate DIP switch selectable 9600 19200 38400 Parity DIP switch selectable NONE ODD EVEN Communication Format 8 data bits 1 start bit 1 stop bit Termination 5 position plug in connector TX TX SHIELD TX...

Page 4: ...ons E34E Models FCC part 15 Class A EN6100 6 4 EN61326 1 Class A Conducted and Radiated Immunity EN 61000 6 2 and EN 61326 1 See Configuration section for details The E34 must be installed in an appro...

Page 5: ...wledgedtobelongtotheirrespectiveowners E34 Series Installation Guide TM Table of Contents Dimensions 6 Product Diagrams 7 Data Outputs 9 Blink Codes for Status LED 10 Installation 11 Wiring 15 Configu...

Page 6: ...emarksof VerisIndustries L L C intheUSAand orothercountries Othercompanies trademarksareherebyacknowledgedtobelongtotheirrespectiveowners E34 Series Installation Guide TM Dimensions E34ABaseBoard 7 3...

Page 7: ...L C intheUSAand orothercountries Othercompanies trademarksareherebyacknowledgedtobelongtotheirrespectiveowners E34 Series Installation Guide TM Product Diagrams Dimensions cont 28 MeterCTAdapterAssem...

Page 8: ...r 3 Control power fuse 600 Vac 500 mA time lag factory replaceable 4 Alive LED E34A models Red green amber LEDs Blink codes are described in the Blink Codes for Status LED section of this document 5 V...

Page 9: ...2 or 3 channels that are adjacent in the panel to a logical meter referred to in the point map as a logical circuit that provides accurate multi phase measurement totals Map these logical circuits by...

Page 10: ...ents Current multi phase average and per phase Current phase angle per branch Real power kW multi phase total and per phase Apparent power kVA multi phase total and per phase Power factor multi phase...

Page 11: ...ons Read understand and follow the instructions before installing this product Turn off all power supplying equipment before working on or inside the equipment Product may use multiple voltage power s...

Page 12: ...kets placed on the two sides for vertical mounting If desired you can move the brackets from the sides to the ends of the housing Loosen the screws on the sides of the E34 that hold the brackets in pl...

Page 13: ...eherebyacknowledgedtobelongtotheirrespectiveowners E34 Series Installation Guide TM Installation cont EQUIPMENT DAMAGE Do not use CTs with current mode outputs Failure to follow this instruction can r...

Page 14: ...able ties are included with the product for strain relief on the E34A28 and E34E28 Insert the strain relief device into one of the available holes on the adapter board Figure 7A Gather all current sen...

Page 15: ...f Treat all measurement circuits and CT connections as energized live Failure to follow these instructions will result in death or serious injury DANGER ESD SENSITIVE DEVICES Observe handling precauti...

Page 16: ...being monitored without exceeding the limit For higher voltages e g 480 V line to line this must be supplied from a source that is 277 Vac or less It could be a separate source or a transformer can be...

Page 17: ...Othercompanies trademarksareherebyacknowledgedtobelongtotheirrespectiveowners E34 Series Installation Guide TM Figure13 1 Connect 2 wire or 4 wire Modbus RS 485 daisy chain network Figures 14 and 15...

Page 18: ...rated for the installation HAZARD OF ELECTRIC SHOCK EXPLOSION OR ARC FLASH Turn off all power supplying equipment before working on or inside the equipment Use a properly rated voltage sensing device...

Page 19: ...etwork must have a unique address Set the switch block to assign a unique address before the device is connected to the Modbus RS 485 network If an address is selected that conflicts with another devi...

Page 20: ...heVeris V logoaretrademarksorregisteredtrademarksof VerisIndustries L L C intheUSAand orothercountries Othercompanies trademarksareherebyacknowledgedtobelongtotheirrespectiveowners E34 Series Installa...

Page 21: ...gisteredtrademarksof VerisIndustries L L C intheUSAand orothercountries Othercompanies trademarksareherebyacknowledgedtobelongtotheirrespectiveowners E34 Series Installation Guide TM DO NOT USE ZERO 1...

Page 22: ...lying equipment before working on or inside the equipment Product may use multiple voltage power sources Disconnect ALL sources before servicing Use a properly rated voltage sensing device to confirm...

Page 23: ...nd the E34E if they are not already connected Secure a ferrite filter included around the Ethernet cable to ensure the device meets emission requirements E34E 2 Temporarily change the IP address of th...

Page 24: ...ris V logoaretrademarksorregisteredtrademarksof VerisIndustries L L C intheUSAand orothercountries Othercompanies trademarksareherebyacknowledgedtobelongtotheirrespectiveowners E34 Series Installation...

Page 25: ...net mask Enterstatic IPaddress Entersubnet mask f Click OK 3 Open a PC web browser and enter the IP address of the E34E default address is 192 168 1 24 to access the GUI If this is the first time logg...

Page 26: ...et BBMD device d Click the Update IP Settings button The E34E changes its settings e Click the System Restart button and wait for the E34E to fully initialize The GUI will connect when the E34E is ins...

Page 27: ...tocols the product communicates with The E34E supports five protocols some of which can operate simultaneously The table below shows which protocols are supported in each mode Protocol Mode Primary Pr...

Page 28: ...e MAC address To use this product with MS TP the BACnet system must support the discovery and use of a BACnet router on the MS TP trunk and any devices beyond it This virtual router creates an exclusi...

Page 29: ...addresses on the MS TP network The final field for the BACnet MS TP mode is RTC_Control which selects which protocol BACnet or Modbus has write access to the RTC If 0 BACnet is selected the RTC is set...

Page 30: ...atever values are entered here must also be used in the MIB browser or SNMP access software to communicate with this device The Read_Community string is used to enable reading data The Write_Community...

Page 31: ...m 1 to 65534 if other values are entered the network number defaults to 5 b Device_ID Offset Every BACnet device must have a BACnet Device_ID number that is unique throughout the entire enterprise Sin...

Page 32: ...Data Sharing WriteProperty B DS WP B K 1 10 BIBB Data Sharing WritePropertyMultiple B DS WPM B K 1 12 BIBB Data Sharing COV B DS COV B K 2 2 BIBB Alarm and Event Notification Internal B AE N I B K 2...

Page 33: ...e Object_name property The E34E supports Subscribe_COV with default COV increment values assigned as shown in the data object tables If these values are not appropriate for a specific application writ...

Page 34: ...rs and to the data set under Modbus address 2 or BACnet device identified as Node_2 in the GUI For each panel data is arranged under six tree branches The Configuration branch contains all writable co...

Page 35: ...sswords to help prevent unauthorized access to device settings and information Disable unused ports services and default accounts where possible to minimize pathways for malicious attacks Place networ...

Page 36: ...control system provides the capability to Manage connections through managed interfaces consisting of appropriate boundary protection devices such as proxies gateways routers firewalls and encrypted...

Page 37: ...zation or contact your network administrator for example maximum password age or history policies DefaultPasswordandUserAccounts Accessing the GUI for the First Time with Firmware Version 1 027 or Hig...

Page 38: ...TLS certificate recommended and most secure mode Once this mode is selected the user can drag and drop their own SSL Certificate and Private Key files into their respective fields If the Private Key...

Page 39: ...rd tab Enter the new alphanumeric complex password in the Password and Confirm Password fields Click Confirm to save the changes To confirm the changes click the Logout button and access the GUI with...

Page 40: ...your network administrator to determine a responsible method of disposal Dispose the device according to the legislation of the country Some regulatory organizations include The United States Environm...

Page 41: ...ufficient biasing on the Modbus bus Modbus physical specification calls for 450 650 biasing This is usually provided by the master The main board has a slow flashing amber light E34A models One or mor...

Page 42: ...Guide TM China RoHS Compliance Information Environment Friendly Use Period EFUP Table SJ T11364 O GB T 26572 X GB T 26572 This table is made according to SJ T 11364 O indicates that the concentration...

Reviews: