background image

UPS Industrial Gateway Card

INDGW-M2
User's Guide

English

06/25/2021

2.1.5

Summary of Contents for INDGW-M2

Page 1: ...UPS Industrial Gateway Card INDGW M2 User s Guide English 06 25 2021 2 1 5 ...

Page 2: ......

Page 3: ...t Corporation in the United States and or other countries UNIX is a registered trademark of The Open Group Linux is the registered trademark of Linus Torvalds in the U S and other countries VMware is a registered trademark or trademark of VMware Inc in the United States and or other jurisdictions Google is a trademark of Google Inc All other trademarks are properties of their respective companies ...

Page 4: ...ing Modbus 22 2 5 1 Configuring the communication parameters 22 2 5 2 Available maps 22 2 5 3 Modbus communication monitoring tool 23 2 5 4 Example of supported Modbus mapping 23 2 6 Configuring the Network Module settings 27 2 6 1 Menu structure 27 3 CONTEXTUAL HELP OF THE WEB INTERFACE 29 3 1 Login page 29 3 1 1 Logging in for the first time 29 3 1 2 Troubleshooting 30 3 2 Home 30 3 2 1 Informat...

Page 5: ...gs 153 3 9 Legal information 154 3 9 1 Component 154 3 9 2 Availability of source code 154 3 9 3 Notice for proprietary elements 155 3 9 4 Access rights per profiles 155 3 10 Alarms 156 3 10 1 Alarm sorting 156 3 10 2 Active alarm counter 156 3 10 3 Alarm details 156 3 10 4 Alarm paging 157 3 10 5 Export 157 3 10 6 Clear 157 3 10 7 Alarms list with codes 157 3 10 8 Access rights per profiles 157 3...

Page 6: ...her users 179 4 11 2 Resetting its own password 179 4 12 Recovering main administrator password 179 4 13 Switching to static IP Manual Changing IP address of the Network Module 180 4 14 Reading device information in a simple way 181 4 14 1 Web page 181 4 15 Subscribing to a set of alarms for email notification 181 4 15 1 Example 1 subscribing only to one alarm load unprotected 181 4 15 2 Example 2...

Page 7: ... 214 7 INFORMATION 215 7 1 Front panel connectors and LED indicators 215 7 2 Specifications Technical characteristics 216 7 3 Default settings and possible parameters 218 7 3 1 Settings 218 7 3 2 Meters 225 7 3 3 Sensors alarm configuration 226 7 3 4 User profile 227 7 4 Access rights per profiles 228 7 4 1 Home 228 7 4 2 Meters 228 7 4 3 Controls 228 7 4 4 Protection 228 7 4 5 Environment 228 7 4...

Page 8: ... and abbreviations 266 8 TROUBLESHOOTING 269 8 1 Action not allowed in Control Schedule Power outage policy 269 8 1 1 Symptom 269 8 1 2 Possible Cause 269 8 1 3 Action 269 8 2 Card wrong timestamp leads to Full acquisition has failed error message on Software 269 8 2 1 Symptoms 269 8 2 2 Possible cause 269 8 2 3 Action 269 8 3 Client server is not restarting 269 8 3 1 Symptom 269 8 3 2 Possible Ca...

Page 9: ...8 10 1 Affected FW versions 274 8 10 2 Symptom 274 8 10 3 Cause 274 8 10 4 Action 274 8 11 The alarm list has been cleared after an upgrade 274 8 11 1 Symptom 274 8 11 2 Action 274 8 12 The Network Module fails to boot after upgrading the firmware 275 8 12 1 Possible Cause 275 8 12 2 Action 275 8 13 Web user interface is not up to date after a FW upgrade 275 8 13 1 Symptom 275 ...

Page 10: ...rews securing the option slot cover plate and store the plate for possible future use Install the Network Module along the alignment channels in the option slot Secure the Network Module using the two screws Packing materials must be disposed of in compliance with all local regulations concerning waste Recycling symbols are printed on the packing materials to facilitate sorting It is not necessary...

Page 11: ...d loops 2 3 2 Cable shield connection foiled or braided The cable shield should be continuous on the entire length of the bus and should be connected to ground earth at only one point to limit the flow of ground loop currents in the shield caused by ground potential differences 2 3 3 Two wire networks Interconnect R with T and R with T on the Modbus Network Module terminal strip Connect the RS 485...

Page 12: ...tion needs to be enabled Termination is used to match impedance of a node to the impedance of the transmission line being used When impedances are mismatched the transmitted signal is not completely absorbed by the load and a portion is reflected into the transmission line To enable the on board termination resistor 120Ω Locate the termination switch that is located on the top of the Modbus Networ...

Page 13: ... the Network Management Module 13 2 3 Peel off the protection Change the position of the termination switch according to your needs Switch position No termination default Termination for two wire networks One of the two position below can be used or ...

Page 14: ...ars STEP 4 Enter the user name in the User Name field The default user name is admin STEP 5 Enter the password in the Password field The default password is admin STEP 6 The password must be changed at first login STEP 7 Click Login The Network Module web interface appears 2 4 2 Finding and setting the IP address 2 4 2 1 Your network is equipped with a BOOTP DHCP server default 2 4 2 1 1 Read from...

Page 15: ...S see the Accessing the web interface through RNDIS section Define the IP settings Navigate to Contextual help Settings Network Protocol IPV4 Select Manual Static IP Input the following information Address Subnet Mask Default Gateway Save the changes 2 4 3 Accessing the web interface through RNDIS This connection is used to access and configure the Network Module network settings locally through a...

Page 16: ...TEP 1 In case Windows OS fails to find driver automatically go to the Windows control panel Network and sharing center Local area connection STEP 2 Right click on the RNDIS local area connection and select Properties STEP 3 Select Internet Protocol Version 4 TCP IPv4 and press the Properties button ...

Page 17: ...Accessing the Network Module Installing the Network Management Module 17 STEP 4 Then enter the configuration as below and validate IP 169 254 0 150 and mask 255 255 0 0 click OK then click on Close ...

Page 18: ...work Management Module Accessing the Network Module Modifying the Proxy exception list section in the full documentation STEP 4 Launch a supported browser the browser window appears STEP 5 In the Address Location field enter https 169 254 0 1 the static IP address of the Network Module for RNDIS The log in screen appears STEP 6 Enter the user name in the User Name field The default user name is ad...

Page 19: ...llow the steps 4 5 6 7 otherwise configuration is OK STEP 4 Right click on it and select Update Driver Software When prompted to choose how to search for device driver software choose Browse my computer for driver software Select Let me pick from a list of device drivers on my computer STEP 5 Select the folder where you have previously downloaded the driver file Click on Next STEP 6 A warning wind...

Page 20: ...the Proxy exception list To connect to the Network Module via a USB cable and your system uses a Proxy server to connect to the internet the proxy settings can reject the IP address 169 254 0 1 The 169 254 Sequence is used to set up communication with devices via a physical connection To activate this connection exceptions will have to be made in the proxy settings Open Internet Explorer Navigate ...

Page 21: ...Accessing the Network Module Installing the Network Management Module 21 Select the Connections tab Press LAN Settings Press ADVANCED Add the address 169 254 ...

Page 22: ...extual help Settings Modbus and press the Supported MAPs button to download the MAPs This section is only for the Modbus Network Module INDGW For Modbus RTU configuration refer to the section Contextual help Settings Modbus Modbus RTU For Modbus TCP configuration refer to the section Contextual help Settings Modbus Modbus TCP File is generated in real time and will take into account the device cap...

Page 23: ...lable on current device Value Shows current value of the register on current device 2 5 3 Modbus communication monitoring tool Access the CLI through SSH or the Serial terminal emulation Get available commands by typing in the CLI CLI commands can be used to retrieve Modbus communication statistics see Information CLI modbus_statistics section fo r more details 2 5 4 Example of supported Modbus ma...

Page 24: ...Configuring Modbus Installing the Network Management Module 24 ...

Page 25: ...Configuring Modbus Installing the Network Management Module 25 ...

Page 26: ...Configuring Modbus Installing the Network Management Module 26 ...

Page 27: ...work Management Module 27 2 6 Configuring the Network Module settings Use the web interface to configure the Network Module The main web interface menus are described below 2 6 1 Menu structure Home Overview and status of the Device Active alarms Outlet status ...

Page 28: ... Environment Commissioning Status Alarm configuration Information Settings Network Module settings Maintenance Firmware Services Resources System logs Legal Legal information Availability of source code Notice for proprietary elements Profile Displays user profile password change account information and logout Help Opens full documentation in a separate browser page Alarms Open alarm page and disp...

Page 29: ...avigating to the assigned IP address accept the untrusted certificate on the browser 3 1 1 Logging in for the first time 3 1 1 1 1 Enter default password As you are logging into the Network Module for the first time you must enter the factory set default username and password Username admin Password admin 3 1 1 2 2 Change default password Changing the default password is mandatory and requested in...

Page 30: ...d can be reset manually by following steps described in the Servicing the Network Management Module Recovering main administrator password Web user interface is not up to date after a FW upgrade Symptom After an upgrade The Web interface is not up to date New features of the new FW are not displayed An infinite spinner is displayed on a tile Possible causes The browser is displaying the Web interf...

Page 31: ...section Contextual help Maintenance System information Card firmware version Date and time Displays local time but not the UTC time Device status Displays if the device status Output power Provides output power status information Battery status Provides battery status information 3 2 2 Menu structure Home Overview and status of the Device Active alarms Outlet status Meters Power quality meters and...

Page 32: ...m configuration Information Settings Network Module settings Maintenance Firmware Services Resources System logs Legal Legal information Availability of source code Notice for proprietary elements Profile Displays user profile password change account information and logout Help Opens full documentation in a separate browser page Alarms Open alarm page and displays the number of active alarms ...

Page 33: ...Home Contextual help of the web interface 33 3 2 3 Energy flow diagram 3 2 3 1 Line interactive UPS 3 2 3 2 Online UPS 3 2 3 3 ATS ...

Page 34: ...through an AVR device Normal mode Buck mode Boost mode In overload Rectifier Rectifier convert AC power to DC power Normal HE mode ready ESS mode ready In overload In short circuit In fault Battery Charger Battery and internal battery charger Battery OK Charger Charging Floating Resting Off Battery End of life Battery In fault Charger In fault Not present Inverter Inverter convert DC power to AC p...

Page 35: ... Unknown 3 2 3 5 Details To access the device details press the icon This view provides a summary of device identification information and nominal values Name Model P N S N Location Firmware version Input Voltage Input Frequency Output Voltage Output Frequency The COPY TO CLIPBOARD button will copy the information to your clipboard For example you can copy and paste information into an email 3 2 3...

Page 36: ...cted Not powered Load level W availability depending on the UPS model Note To access Controls menu press the icon 3 2 5 Active Alarms Only active alarms are displayed the Alarms icon will also display the number of active alarms Alarms are sorted by date alert level time and description Note To see the alarm history press the icon 3 2 6 Environment Sensor status and data are displayed if available...

Page 37: ...Home Contextual help of the web interface 37 3 2 7 Energy flow diagram examples 3 2 7 1 Line interactive UPS 3 2 7 1 1 Normal mode 3 2 7 1 2 Buck Boost mode ...

Page 38: ...Home Contextual help of the web interface 38 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode ...

Page 39: ...Home Contextual help of the web interface 39 3 2 7 2 Online UPS with single input source 3 2 7 2 1 Online mode 3 2 7 2 2 Bypass mode ...

Page 40: ...Home Contextual help of the web interface 40 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode ...

Page 41: ...Home Contextual help of the web interface 41 3 2 7 2 5 HE mode ESS mode 3 2 7 3 Online UPS with dual inputs sources and Maintenance bypass 3 2 7 3 1 Online mode ...

Page 42: ...Home Contextual help of the web interface 42 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode ...

Page 43: ...Home Contextual help of the web interface 43 3 2 7 3 4 HE mode ESS mode 3 2 7 3 5 Maintenance bypass mode ...

Page 44: ...3 2 7 4 ATS 3 2 7 4 1 Normal mode 3 2 7 4 2 Prefered source missing 3 2 8 Access rights per profiles Administrator Operator Viewer Home 3 2 8 1 For other access rights For other access rights see the Information Access rights per profiles section ...

Page 45: ...ers 3 3 1 Main utility input Displays the product main utility measures Current A Voltage V 3 3 2 Second utility input if available Gauge color code Green Value inside thresholds Orange Red Value outside thresholds Grey No thresholds provided by the device ...

Page 46: ...f presents displays the product second utility measures Current A Voltage V 3 3 3 Output Voltage V Power W Current A 3 3 4 Battery status Battery status section is an overview of the battery information The information displayed depends on the device ...

Page 47: ...ate 3 3 5 Battery health Battery health section provides status of the battery and allow to launch a battery test The status reflects the last completed battery test result as well as its critical status color and completion time Pass Warning Fail Unknown 3 3 5 1 Commands Launch test button is disabled if a battery test is already in progress or scheduled The Abort test button is enabled only when...

Page 48: ...ut Frequency Hz Bypass Voltage V Bypass Frequency Hz Output Voltage V Output Frequency Hz Output Current A Output Apparent Power VA Output Active Power W Output Power Factor Output Percent Load Battery Voltage V Battery Capacity Battery Remaining Time s 3 3 7 Default settings and possible parameters Meters Default setting Possible parameters Meters Logs Log measures every 60s Log measures every 36...

Page 49: ...splays UPS status the associated commands on off and the pending action 3 4 1 1 Status Reflects the current mode of the UPS The following is a list of potential table values that are displayed based on the UPS topology On Protected Not protected Off Not powered Not protected 3 4 1 2 Commands A set of commands are available and activated when one of the following buttons is pressed A confirmation w...

Page 50: ... startup 3 4 2 Outlets Group 1 Group 2 Load segmentations allow battery runtime to remain on essential equipment and automatically power down non priority equipment during an extended power outage This feature is also used for remote reboot and the sequential start of servers to restrict inrush currents 3 4 2 1 Status It reflects the current outlet status On Protected Not protected Off Not powered...

Page 51: ...ge policy Symptom Below message is displayed when you access the Control Schedule or Power outage policy page This action is not allowed by the UPS To enable it please refer to the user manual of the UPS and its instructions on how to configure the UPS settings and allow remote commands Possible Cause 1 Remote commands are not allowed due to the UPS configuration see the action below 2 The UPS doe...

Page 52: ...matically trusted and accepted After automatic acceptance make sure that all listed agents belong to your infrastructure If not access may be revoked using the Delete button For maximum security Eaton recommend following one of the two methods on the certificate settings page Import client certificates manually Generate trusted certificate for both clients and Network Module using your own PKI 3 5...

Page 53: ... 5 1 3 Actions 3 5 1 3 1 Delete When communication with the agent is lost agent can be deleted by using the Delete button Select an agent and press the Delete button to delete the agent 3 5 1 4 Access rights per profiles Administrator Operator Viewer Protection Agent list 3 5 1 4 1 For other access rights When the agent is connected the Delete function will not work correctly because the agent wil...

Page 54: ...shows the error message The full data acquisition has failed even if the credentials are correct Possible cause The Network module timestamp is not correct Probably the MQTT certificate is not valid at Network module date Action Set the right date time and timezone If possible use a NTP server refer to Contextual help Settings General System details Time date settings section ...

Page 55: ...tatic IP address of the Network Module The log in screen appears Enter the user name in the User Name field Enter the password in the Password field Click Login The Network Module web interface appears STEP 2 Navigate to Settings Certificates page STEP 3 In the Trusted remote certificates section check the status of the Protected applications MQTT If it is Valid go to Action 2 STEP 2 if it is Not ...

Page 56: ...agent IPP IPM while the time to accepts new agents is running on the Network Module Remove the Network module certificate file s 0 that is are located in the folder Eaton IntelligentPowerProtector configs tls Client server is not restarting Symptom Utility power has been restored the UPS and its load segments are powered on but the Client server does not restart Possible Cause The Automatic Power ...

Page 57: ...Protection Contextual help of the web interface 57 3 5 2 Agent shutdown sequencing 3 5 2 1 Agent shutdown sequence timing ...

Page 58: ...n The tables include the following details Name Delay in seconds OS shutdown duration in seconds 3 5 2 2 Actions 3 5 2 2 1 Set Delay Select and directly change the setting in the table and then Save 3 5 2 2 2 Set OS shutdown duration Select and directly change the setting in the table and then Save 3 5 2 3 Examples Examples below show the impact of agent settings on the shutdown sequence for a shu...

Page 59: ...Protection Contextual help of the web interface 59 3 5 2 3 1 Example 1 Shutdown time 210s 10s 220s Immediate shutdown time 120s 10s 130s ...

Page 60: ...180s 10s 190s Immediate shutdown time 180s 10s 190s The trigger in the diagram is the moment when the shutdown sequence starts and it is defined in the Contextual help Protection Scheduled shutdown or the Contextual help Protection Shutdown on power outage sections for each power source ...

Page 61: ...arios are defined for any of the connected servers or appliances they will be triggered before the corresponding outlets are turned off as configured in shutdown settings 3 5 3 1 Scheduled shutdown table The table displays the scheduled shutdowns and includes the following details Recurrence Once Every day Every week Load segment Primary Group 1 Group 2 Shutdown time Date Time Restart time Date Ti...

Page 62: ...o the UPS user manual and its instruction on how to configure the UPS settings and allow remote commands Example UPS menu Settings ON OFF settings Remote command Enable 3 5 3 4 1 For other issues 3 5 4 Shutdown on power outage These setting are in conjunction with the shutdown agents and control how the network module directs the shutdown of protected servers and appliances It gives the possibilit...

Page 63: ...Protection Contextual help of the web interface 63 3 5 4 1 Shutdown on power outage criteria ...

Page 64: ...sequence when on battery for 10 seconds To initiate the sequence when the battery reaches the set capacity in To initiate or end the shutdown sequence after the set time in s before the end of backup time When there are several conditions to start the shutdown sequence the shutdown sequence will start as soon as one of the condition is reached d Settings examples All the following examples are usi...

Page 65: ...Protection Contextual help of the web interface 65 Example 2 Immediate OFF ...

Page 66: ...Protection Contextual help of the web interface 66 Example 4 Custom Settings 1 ...

Page 67: ...d battery the capacity is much lower than anticipated The UPS gives a Low battery warning when there is 2 3 minutes of estimated runtime left depending on the UPS and its settings This time is typically enough for shutting down a server but does not allow sophisticated sequential shutdown schemes The Low battery policy is intended for these cases ...

Page 68: ...ayer when needed A sequential startup will also help avoid a peak power draw in the beginning a Options Keep shutdown sequence running until the end and then restart forced reboot Wait until UPS battery capacity exceeds a set percentage value in and then automatically restart the UPS Then restart Group 1 after a set time in s Then restart Group 2 after a set time in s b Enable Disable Each option ...

Page 69: ...n Refer to the UPS user manual and its instruction on how to configure the UPS settings and allow remote commands Example UPS menu Settings ON OFF settings Remote command Enable Client server is not restarting Symptom Utility power has been restored the UPS and its load segments are powered on but the Client server does not restart Possible Cause The Automatic Power ON server setup setting might b...

Page 70: ...1 in K 1 decimal digit Humidity of sensor_1 in 1 decimal digit Temperature of sensor_2 in K 1 decimal digit Humidity of sensor_2 in 1 decimal digit Temperature of sensor_3 in K 1 decimal digit Humidity of sensor_3 in RH 1 decimal digit 3 6 1 2 2 Discover At first the table is empty press the Discover button to launch the sensor discovery process If sensors are discovered the table is populated acc...

Page 71: ...es and humidity will be updated accordingly 5 Press the Save button when done 3 6 1 2 5 Edit Press the pen logo to edit sensor communication information You will get access to the following information and settings Product reference Part number Serial number Name Location Temperature and humidity Active Yes No Dry contacts Active Yes No Name Polarity Normally open Normally closed Deactivated humid...

Page 72: ...s not normal because it is configured as normally open Press Save after modifications 3 6 1 3 Note 3 6 1 4 Access rights per profiles Administrator Operator Viewer Environment Commissioning Environment Status 3 6 1 4 1 For other access rights Deactivated dry contacts are not displayed and replaced by this icon If the UPS provides temperature compensated battery charging option see the Servicing th...

Page 73: ... Disconnect and reconnect the USB to RS485 cable 3 Launch the discovery if it is still not ok go to Action 1 3 Action 1 3 1 Reboot the Network module 2 Launch the discovery Symptom 2 The EMPs orange RJ45 LEDs are not blinking Possible causes C 1 the EMP address switches are all set to 0 C 2 the EMPs are daisy chained the Modbus address is the same on the missing EMPs Action 2 1 1 Change the addres...

Page 74: ... measured by the sensor 3 6 2 1 1 Actions a Set Enabled Select and directly change the setting in the table and then Save When disabled no alarm will be sent b Set alarm threshold Enable the alarm first and then change the setting in the table and then Save When a warning threshold is reached an alarm will be sent with a warning level When a critical threshold is reached an alarm will be sent with...

Page 75: ...al update Live reading MIN MAX shows the minimal and maximal humidity measured by the sensor 3 6 2 2 1 Actions a Set Enabled Select and directly change the setting in the table and then Save When disabled no alarm will be sent b Set alarm threshold Enable the alarm first and then change the setting in the table and then Save When a warning threshold is reached an alarm will be sent with a warning ...

Page 76: ...sabled no alarm will be sent b Set alarm severity Enable the alarm first and then change the setting in the table and then Save When the dry contacts is not in a normal position an alarm will be sent at the selected level The dry contact is open and this is not normal because it is configured as normally close The dry contact is close and this is not normal because it is configured as normally ope...

Page 77: ...g high warning high critical 100 Dry contacts Enabled No Alarm severity Warning Enabled No Yes Alarm severity Info Warning Critical 3 6 2 4 1 For other settings 3 6 2 5 Access rights per profiles Administrator Operator Viewer Environment Alarm configuration 3 6 2 5 1 For other access rights 3 6 3 Information Sensor information is an overview of all the sensors information connected to the Network ...

Page 78: ... Vendor Part number Firmware version UUID Serial number Location 3 6 3 1 Access rights per profiles Administrator Operator Viewer Environment Information 3 6 3 1 1 For other access rights For other access rights see the Information Access rights per profiles section ...

Page 79: ...Text field that is used to provide the system name information Card system information is updated to show the system name 3 7 1 1 4 Time date settings The current date and time appears in the footer at the bottom of the screen You can set the time either manually or automatically a Manual Manually entering the date and time 1 Select the time zone for your geographic area from the time zone pull do...

Page 80: ...tails Configuration name Email address Notification updates Displays Events notification Periodic report icons when active Status Active Inactive In delegation 3 7 1 2 2 Actions a Add Press the New button to create a new email sending configuration b Remove Select an email sending configuration and press the Delete button to remove it DST is managed based on the time zone For examples on email sen...

Page 81: ...ss Status Active Inactive Hide the IP address from the email body Disabled Enabled This setting will be forced to Enabled if Enabled in the SMTP settings Schedule report Active Recurrence Starting Topic selection Card Devices Alarm notifications Severity level Attach logs Exceptions on events notification Attachment will contains only logs that have occurred during the recurrence ...

Page 82: ...Settings Contextual help of the web interface 82 3 7 1 3 SMTP settings SMTP is an internet standard for electronic email transmission The following SMTP settings are configurable ...

Page 83: ...ty SMTP server authentication Username Password Select the SMTP server authentication checkbox to require a user name and a password for SNMP authentication enter the Username and the Password Save and test server configuration 3 7 1 4 Default settings and possible parameters General Default setting Possible parameters System details Location empty Contact empty System name empty Time date setting...

Page 84: ... events with code Schedule report Active No Yes Recurrence Every day Every week Every month Starting Date and time Card events Subscribe Attach logs Device events Subscribe Attach measures Attach logs SMTP settings Server IP Hostname blank SMTP server authentication disabled Port 25 Default sender address device networkcard com Hide IP address from the email body disabled Secure SMTP connection en...

Page 85: ...ands email test Description mail test sends test email to troubleshoot SMTP issues Help Usage email test command Test SMTP configuration Commands email test h help Display help page email test r recipient recipient_address Send test email to the recipient_address Email address of the recipient For other access rights see the Information Access rights per profiles section ...

Page 86: ... format s set mode Mode values set date and time format YYYYMMDDhhmmss manual date and time set preferred and alternate NTP servers ntpmanual preferred server alternate server automatically set date and time ntpauto Examples of usage Set date 2017 11 08 and time 22 00 time set manual 201711082200 Set preferred and alternate NTP servers time set ntpmanual fr pool ntp org de pool ntp org Examples of...

Page 87: ...ew button to create up to ten new users b Remove Select a user and press the Delete button to remove it c Edit Press the pen logo to edit user information You will get access to the following settings Active Profile Username Full name Email Phone Organization Notify by email about account modification Password Reset password Generate randomly Enter manually Force password to be changed on next log...

Page 88: ... Password settings To set the password strength rules apply the following restrictions Minimum length Minimum upper case Minimum lower case Minimum digit Special character Password expiration To set the password expiration rules apply the following restrictions Number of days until password expires ...

Page 89: ...nable 0 32 disable Password expiration Number of days until password expires disabled Main administrator password never expires disabled Number of days until password expires disable enable 1 99999 Main administrator password never expires disable enable Lock account Lock account after xx invalid tries disabled Main administrator account never blocks disabled Lock account after xx invalid tries di...

Page 90: ...imum Phone 64 characters maximum Organization 128 characters maximum 3 7 2 2 1 For other settings 3 7 2 3 Access rights per profiles Administrator Operator Viewer Local users 3 7 2 3 1 For other access rights 3 7 2 4 CLI commands whoami Description whoami displays current user information Username Profile Realm logout Description Logout the current user Help logout cr logout the user For other set...

Page 91: ...nually by following steps described in the Servicing the Network Management Module Recovering main administrator password 3 7 2 5 1 For other issues 3 7 3 Remote users 3 7 3 1 LDAP The table shows all the supported severs and includes the following details Name Address Port Security Certificate Status Status could take following values Unreachable Active See the CLI commands in the Information CLI...

Page 92: ... access Security SSL None Start TLS SSL Verify server certificate Primary server Name Hostname Port Secondary server Name Hostname Port Credentials Anonymous search bind Search user DN Password Search base Search base DN Request parameters User base DN User name attribute UID attribute Group base DN Group name attribute GID attribute 2 Click Save ...

Page 93: ...s Profile mapping to map remote groups to local profiles 2 Click Save c Users preferences For the list of access rights per profile refer to the section Full documentation Information Access rights per profiles All users preferences will apply to all remote users LDAP RADIUS ...

Page 94: ...references that will apply to all LDAP users Language Temperature Date format Time format 2 Click Save 3 7 3 2 RADIUS The table shows all the supported severs and includes the following details Radius is not a secured protocol for a maximum security it is recomended to use LDAP over TLS ...

Page 95: ...hared secret between the client and the RADIUS server Address hostname or IP address for the RADIUS server UDP port the UDP port for the RADIUS server 1812 by default Time out s length of time the client waits for a response from the RADIUS server Secondary server Name descriptive name for the RADIUS server Secret a shared secret between the client and the RADIUS server Address hostname or IP addr...

Page 96: ... Profile mapping to map RADIUS profile to local profiles 2 Click Save c Users preferences For the list of access rights per profile refer to the section Full documentation Information Access rights per profiles All users preferences will apply to all remote users LDAP RADIUS ...

Page 97: ...ace 97 1 Press Users preferences to define preferences that will apply to all LDAP users Language Temperature Date format Time format 2 Click Save 3 7 3 3 Default settings and possible parameters Remote users Default setting Possible parameters ...

Page 98: ...ificate disabled enabled Primary server Name 128 characters maximum Hostname 128 characters maximum Port x xxx Secondary server Name 128 characters maximum Hostname 128 characters maximum Port x xxx Credentials Anonymous search bind disabled enabled Search user DN 1024 characters maximum Password 128 characters maximum Search base Search base DN 1024 characters maximum Request parameters User base...

Page 99: ... characters maximum UDP port 1 to 65535 Time out 3 to 60 Secondary server Name 128 characters maximum Address 128 characters maximum Secret 128 characters maximum UDP port 1 to 65535 Time out 3 to 60 Users preferences Language English French German Italian Japanese Russian Simplified Chinese Spanish Traditional Chinese Temperature unit C Celsius Date format MM DD YYYY Time format hh mm ss 24h 3 7 ...

Page 100: ... login to the card username Remote username to test p primary Force the test to use primary server optional s secondary Force the test to use secondary server optional v verbose Print the exchanges with LDAP server optional ldap test checkmappedgroups primary secondary v Check LDAP mapping p primary Force the test to use primary server optional s secondary Force the test to use secondary server op...

Page 101: ... Ask your administrator for password initialization If you are the main administrator your password can be reset manually by following steps described in the Servicing the Network Management Module Recovering main administrator password LDAP configuration commissioning is not working Refer to the section Servicing the Network Management Module Commissioning Testing LDAP 3 7 3 6 1 For other issues ...

Page 102: ... interface 102 3 7 4 Network Protocol 3 7 4 1 Network 3 7 4 1 1 IPv4 Press the Edit button to configure the network settings select either the Manual or DHCP settings option Any modifications are applied after the Network Module reboots ...

Page 103: ...The gateway address allows connections to devices or hosts attached to different network segments b DHCP Select dynamic DHCP to configure network parameters by a BootP or DHCP server If a response is not received from the server the Network Module boots with the last saved parameters from the most recent power up After each power up the Network Module makes five attempts to recover the network par...

Page 104: ...Settings Contextual help of the web interface 104 a Current configuration Address Gateway b Address settings Enabled Mode Manual DHCP Address Prefix Gateway ...

Page 105: ...ources connected to the Internet or a private network Press the Edit button to configure the network settings select either the Static or Dynamic settings a Manual Enter the Network Module Hostname Enter the Network Module Domain name Primary DNS server Enter the IP address of the DNS server that provides the translation of the domain name to the IP address ...

Page 106: ...rnet A LAN is a computer network that interconnects computers within a limited area The available values for LAN configuration are listed below Auto negotiation 10Mbps Half duplex 10Mbps Full duplex 100Mbps Half duplex 100Mbps Full duplex 1 0 Gbps Full duplex Any modifications are applied after the next Network Module reboot 3 7 4 2 Protocol This tab contains settings for communication protocols u...

Page 107: ... https is 443 For additional security the ports can be changed on this page Press Save after modifications 3 7 4 2 2 Syslog a Settings This screen allows an administrator to configure up to two syslog servers To configure the syslog server settings 1 Enable syslog Since only https is available port 80 is not supported ...

Page 108: ...Unicode BOM if needed Press Save after modifications 3 7 4 3 Default settings and possible parameters Network Protocol Default setting Possible parameters IPV4 Mode DHCP Mode DHCP Manual Address Netmask Gateway IPV6 Enable checked Mode DHCP Enabled Active Inactive Mode DHCP Manual Address Prefix Gateway DNS DHCP Hostname device MAC address Mode DHCP Hostname 128 characters maximum Mode DHCP Manual...

Page 109: ...stname 128 characters maximum Port x xxx Protocol UDP TCP Message transfer method Non transparent framing Using unicode byte order mask BOM disable enable Server 2 Name 128 characters maximum Status Disabled Enabled Hostname 128 characters maximum Port x xxx Protocol UDP TCP Message transfer method in TCP Octet counting Non transparent framing Using unicode byte order mask BOM disable enable 3 7 4...

Page 110: ... Viewer and Operator profiles netconf h Usage netconf OPTION Display network information and change configuration h help display help page l lan display Link status and MAC address 4 ipv4 display IPv4 Mode Address Netmask and Gateway 6 ipv6 display IPv6 Mode Addresses and Gateway d domain display Domain mode FQDN Primary and Secondary DNS For Administrator profile ...

Page 111: ...Mode values set custom Network address Netmask and Gateway manual domain name primary DNS secondary DNS automatically set Domain name Primary and Secondary DNS dhcp i set ipv4 mode Mode values set custom Network address Netmask and Gateway manual network mask gateway automatically set Network address Netmask and Gateway dhcp x set ipv6 status Status values enable IPv6 enable disable IPv6 disable x...

Page 112: ... elicit an ICMP ECHO_RESPONSE from a host or gateway ECHO_REQUEST datagrams pings have an IP and ICMP header followed by a struct timeval and then an arbitrary number of pad bytes used to fill out the packet c Specify the number of echo requests to be sent h Specify maximum number of hops Hostname or IP Host name or IP address ping6 The ping6 utility uses the ICMP protocol s mandatory ECHO_REQUEST...

Page 113: ...IPv6 address IPv6 address 3 7 4 5 1 For other CLI commands 3 7 5 SNMP This tab contains settings for SNMP protocols used for network management systems 3 7 5 1 SNMP tables See the CLI commands in the Information CLI section Changes to authentication settings need to be confirmed by entering a valid password for the active user account The default port for SNMP is 161 and normally this should not b...

Page 114: ...ndard IETF UPS MIB RFC 1628 Sensor MIB Press the Supported MIBs button to download the MIBs 3 7 5 1 1 Settings This screen allows an administrator to configure SNMP settings for computers that use the MIB to request information from the Network Module Default ports for SNMP are 161 SNMP v1 and v3 set get and 162 traps These ports can be changed on the settings screen for additional security To con...

Page 115: ...n either Read Only or Read Write account to access settings 2 Enter the SNMP Community Read Only string The Network Module and the clients must share the same community name to communicate 3 Select Active in the Enabled drop down list to activate the account 4 Access level is set to display information only ...

Page 116: ...vate the account 4 Select access level Read only The user does not use authentication and privacy to access SNMP variables Read Write The user must use authentication but not privacy to access SNMP variables 5 Select the communication security mechanism Auth Priv Communication with authentication and privacy Auth No Priv Communication with authentication and without privacy No Auth No Priv Communi...

Page 117: ...n security mechanism select the Privacy algorithms AES fill in password and privacy keys The password can be between 8 and 24 characters and use a combination of alphanumeric and the following special characters _ AES192 fill in password and privacy keys The password can be between 8 and 24 characters and use a combination of alphanumeric and the following special characters _ AES256 fill in passw...

Page 118: ...3 3 Press the SAVE button b Remove Select a trap receiver and press the Delete button to remove it c Edit Press the pen icon to edit trap receiver information and access to its settings d Test trap Press the Test trap button to send the trap test to all trap receivers Separate window provides the test status with following values In progress Request successfully sent invalid type For details on SN...

Page 119: ... x xxx SNMP V1 disable enable Community 1 128 characters maximum Enabled Inactive Active Access Read only Community 2 128 characters maximum Enabled Inactive Active Access Read Write SNMP V3 disable enable User 1 32 characters maximum Enabled Inactive Active Access Read only Read Write Authentication Auth SHA 1 None Password 128 characters maximum Confirm password 128 characters maximum Privacy Se...

Page 120: ...ectivity is not properly working after a restore settings on a 1 7 0 version or above Cause The SNMPv3 was configured prior to 1 7 0 In that case SNMPv3 configuration is not well managed by the Save and by the Restore settings Action Reconfigure your SNMPv3 users and passwords on versions 1 7 0 or above and Save the settings The SNMPv3 configuration can then be Restored 3 7 5 6 1 For other issues ...

Page 121: ...rable Enable Baud rate Parity Stop bits This section is only for the Modbus Network ModuleINDGW For instructions on connecting Modbus RTU see the section Installing the Network Management Module Wiring the RS 485 Modbus RTU terminal Configuring the termination For instructions on configuring Modbus see the section Installing the Network Management Module Configuring Modbus ...

Page 122: ...le Port 3 7 6 1 2 Mapping configuration a Mapping configuration table The table shows all the mapping configuration and includes the following details Custom name MAP Transport Access Illegal read IP filtering Coil register base address shift b Actions Add Press the New button to create new mapping configuration Remove ...

Page 123: ...e button to remove it Edit Press the pen logo to edit mapping configuration You will get access to the following settings Custom name MAP Transport Device ID Access Illegal read behaviour Coil register base address shift IP filtering Supported MAPs Press the Supported MAPs button to download the MAPs ...

Page 124: ...equal 1 Available True False Shows if the register is available on current Device Value Shows current value of the register on current Device 3 7 6 2 BACnet BACnet IP communication provides read only data from Building Automation Systems BASs so that the Network Module can be easily integrated in a BAS alongside other BACnet IP capable devices File is generated in real time and will take into acco...

Page 125: ...ble IPv4 address of the BBMD we will register with BBDM Time to live The BBMD time to live in seconds we must ping the BBMD we are registered with within this time a Actions Get EPICS file An electronic protocol implementation conformance statement EPICS file provides verification that devices meet BACnet standards for objects and services This allows EPICS files to provide data to software test p...

Page 126: ...Access None Read only Read Write Illegal read behaviour Return exception Return zeros IP filtering IP address Coil register base address shift No shift Shift by 1 JBUS BACnet BACnet IP Inactive BACnet IP Inactive Active Device Id Automatically generated must be unique 4194304 characters maximum Device Name Automatically generated must be unique 1 255 characters maximum only Latin letters numbers s...

Page 127: ...ay Description modbus_message_display restarts the server and displays Modbus message This command allow you to verifiy that Modbus server is working as expected Help modbus_message_display help Restart server and display modbus message h Restart server and display modbus message For other settings see the Information Default settings parameters section For other access rights see the Information ...

Page 128: ...ge count CRC error count Incoming message count Discarded message count Processed message count Success returned count Exception returned count Help modbus_statistics Display modbus server statistics h help Display the help page r reset Reset modbus server statistics The counter from A1 1 to A1 4 are reset only at startup of the server 3 7 6 5 1 For other CLI commands This section is only for the ...

Page 129: ...o the section Installing the Network Management Module Wiring the RS 485 Modbus RTU terminal Four wire networks If the Modbus Card is the last device installed in the network chain or the length of the network cable is excessive termination needs to be enabled Verify the termination settings and refer to the section Installing the Network Management Module Wiring the RS 485 Modbus RTU terminal Con...

Page 130: ... secured and trusted network For maximum security we recommend following one of the two methods on the certificate settings page Import agent s certificates manually Generate trusted certificate for both agents and Network Module using your own PKI 3 7 7 1 1 Actions a Start Starts the pairing window during the selected timeframe or until it is stopped Time countdown is displayed b Stop Stops the p...

Page 131: ...and then press the Revoke button A confirmation window appears press Continue to proceed this operation cannot be recovered b Export Exports the selected certificate on your OS browser window c Configure issuer Press the Configure issuer button A configuration window appears to edit issuer data Revoke will replace current certificate by a new self signed certificate This may disconnect connected a...

Page 132: ...the following Certificate summary Actions Generate a new self signed certificate Generate CSR Import certificate only available when CSR is generated Details e Generate a new self signed certificate To replace a selected certificate with a new self signed certificate This may disconnect applications such as a Web browser shutdown application or monitoring application Issuer configuration will be a...

Page 133: ... signed by the CA it can be imported into the Network Module When the import is complete the new local certificate information is displayed in the table 3 7 7 3 Certificate authorities CA Manages CAs 3 7 7 3 1 CA table The table displays certificate authorities with the following details Used for Issued by Issued to Valid from Expiration Status valid expires soon or expired 3 7 7 3 2 Actions a Imp...

Page 134: ...ertificate Used for Issued by Issued to Valid from Expiration In case a certificate expires the connection with the client will be lost If this happens the user will have to recreate the connection and associated certificates Status valid expires soon or expired 3 7 7 4 1 Actions a Import When importing the client certificate you must select the associated service and then upload process can begin...

Page 135: ...ommon name 64 characters maximum Country Country code State or Province 64 characters maximum City or Locality 64 characters maximum Organization name 64 characters maximum Organization unit 64 characters maximum Contact email address 64 characters maximum 3 7 7 5 1 For other settings 3 7 7 6 Access rights per profiles Administrator Operator Viewer Certificate 3 7 7 6 1 For other access rights For...

Page 136: ...ates local export SERVICE_NAME import over SSH cat FILE sshpass p PASSWORD ssh USER CARD_ADDRESS certificates local import SERVICE_NAME csr over SSH sshpass p PASSWORD ssh USER CARD_ADDRESS certificates local csr mqtt From a Windows host plink tools from putty is required print over SSH plink USER CARD_ADDRESS pw PASSWORD batch certificates local print SERVICE_NAME revoke over SSH plink USER CARD_...

Page 137: ...Settings Contextual help of the web interface 137 3 7 7 7 1 For other CLI commands See the CLI commands in the Information CLI section ...

Page 138: ...on field enter https xxx xxx xxx xxx where xxx xxx xxx xxx is the static IP address of the Network Module The log in screen appears Enter the user name in the User Name field Enter the password in the Password field Click Login The Network Module web interface appears STEP 2 Navigate to Settings Certificates page STEP 3 In the Trusted remote certificates section check the status of the Protected a...

Page 139: ...me to accepts new agents is running on the Network Module Remove the Network module certificate file s 0 that is are located in the folder Eaton IntelligentPowerProtector configs tls Card wrong timestamp leads to Full acquisition has failed error message on Software Symptoms IPP IPM shows the error message The full data acquisition has failed even if the credentials are correct Possible cause The ...

Page 140: ...t the transfer mode between sources Standard by default with no additional break even if sources are no synchronized Gap with additional break during transfer if sources are not synchronized Nominal voltage To set voltage thresholds 3 7 8 1 Specifics 3 7 8 2 Access rights per profiles Administrator Operator Viewer ATS 3 7 8 2 1 For other access rights 3 8 Maintenance This section is only for the A...

Page 141: ...hysical name Vendor UUID Part number Serial number Hardware version Location Contact MAC address 3 8 1 2 Firmware information Version SHA Build date Installation date Activation date Bootloader version 3 8 1 3 Access rights per profiles Administrator Operator Viewer System information 3 8 1 3 1 For other access rights 3 8 2 Firmware 3 8 2 1 Update firmware Monitors the information for the two embe...

Page 142: ... Module does not monitor the Device status To upgrade the firmware 1 Download the latest firmware version from the website For more information see the Servicing the Network Management Module Accessing to the latest Network Module firmware driver section 2 Click Upload 3 Click Choose file and select the firmware package by navigating to the folder where you saved the downloaded firmware 4 Click Up...

Page 143: ...umber 3 8 2 4 1 For other CLI commands Do not close the web browser or interrupt the operation Depending on your network configuration the Network Module may restart with a different IP address Refresh the browser after the Network module reboot time to get access to the login page Press F5 or CTRL F5 to empty the browser to get all the new features displayed on the Web user interface Communicatio...

Page 144: ... is not up to date after a FW upgrade Symptom After an upgrade The Web interface is not up to date New features of the new FW are not displayed An infinite spinner is displayed on a tile Possible causes The browser is displaying the Web interface through the cache that contains previous FW data Action Empty the cache of your browser using F5 or CTRL F5 3 8 2 5 1 For other issues 3 8 3 Services 3 8...

Page 145: ...reboot the Network Module Click Reboot A confirmation message displays click Reboot to confirm the reboot time will take approximately less than 2min Depending on your network configuration the Network Module may restart with a different IP address Only main administrator user will remain with default login and password Refresh the browser after the Network module reboot time to get access to the ...

Page 146: ...ork configuration the Network Module may restart with a different IP address Refresh the browser after the Network module reboot time to get access to the login page Communication Lost and Communication recovered may appear in the Alarm section For more details navigate to Servicing the Network Management Module Saving Restoring Duplicating section ...

Page 147: ...e data 3 Click on Save 3 8 3 1 5 Restore To restore the Network module settings 1 Click on Restore 2 Select to include the Network settings if needed 3 Enter the passphrase used when the file was saved 4 Click on Choose file and select the JSON file Below settings are not saved Local users other than the main administratorSensor settings commissioning alarm configuration Restoring settings may res...

Page 148: ...e It is not intended for the user which is why the file is protected by a password To download the maintenance report file Click Download report A confirmation message displays Maintenance report file successfully downloaded 3 8 3 2 Access rights per profiles Administrator Operator Viewer Services 3 8 3 2 1 For other access rights For other access rights see the Information Access rights per profi...

Page 149: ...a maintenance report file which may be handed to the technical support Help maintenance cr Create maintenance report file h help Display help page reboot Description Tool to Reboot the card Help Usage reboot OPTION cr Reboot the card help Display help withoutconfirmation Reboot the card without confirmation ...

Page 150: ... p PASSWORD ssh USER CARD_ADDRESS save_configuration p PASSPHRASE FILE Restore over SSH cat FILE sshpass p PASSWORD ssh USER CARD_ADDRESS restore_configuration p PASSPHRASE From a Windows host Save over SSH plink USER CARD_ADDRESS pw PASSWORD batch save_configuration p PASSPHRASE FILE Restore over SSH type FILE plink USER CARD_ADDRESS pw PASSWORD batch restore_configuration p PASSPHRASE Require pl...

Page 151: ...d without confirmation cr Do factory reset of the card 3 8 3 3 1 For other CLI commands 3 8 4 Resources Card resources is an overview of the Network Module processor memory and storage information The COPY TO CLIPBOARD button will copy the information to your clipboard so that it can be past For example you can copy and paste information into an email 3 8 4 1 Processor Used in Up since date See th...

Page 152: ...152 3 8 4 2 Memory Total size in MB Available size in MB Application size in MB Temporary files size in MB 3 8 4 3 Storage Total size in MB Available size in MB Used size in MB 3 8 4 4 Access rights per profiles Administrator Operator Viewer Resources ...

Page 153: ...ed MB tmpfs temporary files usage MB Flash user data total MB free MB used MB Help systeminfo_statistics Display systeminfo statistics h help Display the help page 3 8 4 5 1 For other CLI commands 3 8 5 System logs 3 8 5 1 System logs There are 4 types of logs available Update Account Session System Select the log files to download and press the download icon For other access rights see the Inform...

Page 154: ...der various open source license or under a proprietary license 3 9 1 Component All the open source components included in the Network Module are listed with their licenses 3 9 2 Availability of source code Provides the way to obtain the source code of open source components that are made available by their licensors For the list of system logs see the Information System Logs codes section For othe...

Page 155: ...proprietary elements Provides notice for our proprietary i e non Open source elements 3 9 4 Access rights per profiles Administrator Operator Viewer Legal information 3 9 4 1 For other access rights For other access rights see the Information Access rights per profiles section ...

Page 156: ...ve alarm counter 3 10 3 Alarm details All alarms are displayed and sorted by date with alert level time description and status Info Warning Critical logo Alarm description text Active In color In bold with Active label Opened In color Closed Greyed Alarms with a severity set as Good are not taken into account into the counter of active alarms ...

Page 157: ... button to download the file 3 10 6 Clear Press the Clear button to clear alarms that are older than a specified date and up to a defined severity 3 10 7 Alarms list with codes To get access to the Alarm log codes or the System log codes for email subscription see sections below System log codes UPS HID alarm log codes 9130 UPS XCP alarm log codes ATS alarm log codes EMP alarm log codes Network mo...

Page 158: ...indow 3 11 2 User profile This page displays the current username with its realm local remote and allows to Change passwords Edit account and Log out For other access rights see the Information Access rights per profiles section This page is in read only mode when connected through LDAP and it displays the preferences applied to all LDAP users as configured in the Contextual help Settings Remote u...

Page 159: ...e web interface 159 3 11 2 1 Change password Click on Change password to change the password In some cases it is not possible to change the password if it has already been changed within a day period Refer to the troubleshooting section ...

Page 160: ... Edit account to edit user profile and update the following information Account details Full name Email Phone Organization Preferences Language Date format Time format Temperature 3 11 2 3 Edit account Click Log out to close the session 3 11 3 Default settings and possible parameters User profile Default setting Possible parameters ...

Page 161: ...rench German Italian Japanese Russian Simplified Chinese Spanish Traditional Chinese Date format MM DD YYYY YYY MM DD DD MM YYY DD MM YYY DD MM YYY DD MM YYYY Time format hh mm ss 24h hh mm ss 12h Temperature C Celsius F Fahrenheit 3 11 3 1 For other settings 3 11 4 Access rights per profiles Administrator Operator Viewer User profile 3 11 4 1 For other access rights 3 11 5 CLI commands logout Des...

Page 162: ...als when I try to change my password in My profile menu Possible cause The password has already been changed once within a day period Action Let one day between your last password change and retry 3 11 6 1 For other issues 3 12 Documentation 3 12 1 Access to the embedded documentation Press the icon on the top right side of the page to access the documentation in a new window See the CLI commands ...

Page 163: ...ent Module How to install and use the Network module Securing the Network Management Module How to secure the Network module Information General information of the Network Module and Devices Troubleshooting How to troubleshoot the Network Module 3 12 2 Access rights per profiles Administrator Operator Viewer Contextual help Full documentation 3 12 2 1 For other access rights Search feature is inde...

Page 164: ...figure credentials to bind with the LDAP server or select anonymous if no credentials are required Configure the Search base DN Configure the request parameters see examples below 4 1 1 1 1 Typical request parameters Parameter OpenLDAP Active Directory with POSIX account activated Active Directory User base DN ou users dc example dc com ou users dc example dc com ou users dc example dc com User na...

Page 165: ...d will display its local profile In case of error use the verbose option of the command to investigate the reason 4 1 3 Limitations If the same username exists in both local and LDAP databases the behavior is undefined If a user belongs to multiple LDAP groups mapped to different profiles the behavior is undefined No client certificate provided It is not possible for the server to verify the clien...

Page 166: ...he agent 2 Detect the UPS Network Module with a Quick scan Range scan or an Address es scan 3 Right click on the UPS Network Module when discovered and then Set as power source Configure it and Save it STEP 3 Action on the Network Module 1 Make sure all listed agents in the card Contextual help Protection Agents list belong to your infrastructure if not access may be revoked using the Delete butto...

Page 167: ...Target Powering down applications first when on battery for 30s database servers next 3min after the applications and storage last as late as possible 4 3 1 2 Step 1 Installation setup 4 3 1 2 1 Objective Use load segmentation provided by the UPS to independently control the power supply of each IT equipment categories Applications Database servers Storage It also allows IT equipment to sequential...

Page 168: ...ation to the time needed for your server to shutdown gracefully This will make sure IPP shutdowns your servers before the load segment is powered down As a result it will define the overall shutdown sequence duration for each load segments 4 3 1 4 Step 3 Power outage policy settings 4 3 1 4 1 Objective Use load segment policies to define shutdown sequencing 4 3 1 4 2 Resulting setup 1 Navigate to ...

Page 169: ...ty is maximized and its shutdown will end 30s before the end of backup time 3 Set Group 1 and Group 2 to Custom Applications must shutdown first so Group 1 has been set to start shutdown when on battery for 30s Servers must shutdown second so Group 2 has been set to start shutdown when on battery for 210s so 3min after the applications ...

Page 170: ...ical equipment Powering down critical equipment 3min before the end of backup time 4 3 2 2 Step 1 Installation setup 4 3 2 2 1 Objective Use load segmentation provided by the UPS to independently control the power supply of each IT equipment categories Applications Database servers Storage Load segmentation also allows IT equipment to restart sequentially on utility recovery Restart sequentially t...

Page 171: ...tion Agent shutdown sequencing page 4 Set the OS shutdown duration to the time needed for your server to shutdown gracefully This will make sure IPP shutdowns your servers before the load segment is powered down As a result it will define the overall shutdown sequence duration for each load segments 4 3 2 4 Step 3 Power outage policy settings 4 3 2 4 1 Objective Use load segment policies to define...

Page 172: ...examples Servicing the Network Management Module 172 Critical equipment is the last one to power down their availability will be maximized and their shutdown will end 180s before the end of backup time 3 Set Group 2 to Immediate off ...

Page 173: ...ially the IT equipment on utility recovery 4 3 3 1 Target Restart the storage first right after utility recovery database servers next 2min after utility recovery and applications last 3min after utility recovery 4 3 3 2 Step 1 Installation setup 4 3 3 2 1 Objective Use load segmentation provided by the UPS to independently control the power supply of each IT equipment categories Applications Data...

Page 174: ...e Automatically restart the UPS when battery capacity exceeds and set it to 0 The storage will restart first right after utility recovery without waiting the battery capacity to exceed a limit 4 Set Then Group 1 after to 120s The database servers will restart 120s after the utility recovery 5 Set Then Group 2 after to 60s The database servers will restart 180s after the utility recovery 4 4 Checki...

Page 175: ...ll script executable chmod 700 install_updatePackage sh 4 6 2 2 Procedure To upgrade the Network module using Open a shell terminal on your computer Linux or cygwin meaning real or emulated Linux operating system Use the shell script install_updatePackage sh Usage install_updatePackage sh options Upgrade tool Mandatory arguments are f i u and p h show help f path path of the upgrade file u usernam...

Page 176: ... upgrade inProgress 61 Uncompress and flash upgrade inProgress 78 Uncompress and flash upgrade inProgress 92 Uncompress and flash upgrade inProgress 100 Uncompress and flash upgrade inProgress 100 Uncompress and flash upgrade Executing post post_upgrade sh script upgrade Upgrade done Warning Permanently added X X X X ECDSA to the list of known hosts Rebooting res Y Update OK 4 7 Changing the RTC b...

Page 177: ... battery cell the positive mark should be visible when inserting it 6 Replace the Network Module and secure the screw reconnect the Network cable if it was unplugged during the operation 7 Connect the Network Module and set the date and time For more information see the Date Time section ...

Page 178: ... local time is synchronized with the Network Module 4 9 1 2 If the Network Module time is lost The Network Module and the UPS time is synchronized with the oldest time between the last know Network Module time and the UPS time 4 9 2 Manual time synchronization 4 9 2 1 From the Network Module On the Network Module navigate to Contextual help Settings General System details Time date settings sectio...

Page 179: ... 4 Press Submit to save the changes 4 12 Recovering main administrator password To recover the main administrator password ask another administrator to initialize the password If it is not possible proceed to the card sanitization Access the Network Module disconnect the Network cable if needed Unscrew the Network Module and remove it from the slot Locate the SANITIZATION switch that is located on...

Page 180: ...needed Connect the Network Module by using the default credentials of the main administrator admin admin You will be forced to change the password accordingly to the current password strength rules 4 13 Switching to static IP Manual Changing IP address of the Network Module Administrators can switch to static IP in the Settings menu and change the IP address of the Network Module Navigate to Conte...

Page 181: ...h the button on the top of the diagram 4 15 Subscribing to a set of alarms for email notification 4 15 1 Example 1 subscribing only to one alarm load unprotected Follow the steps below 1 Navigate to Contextual help Settings General Email notification settings 2 Press the button New to create a new configuration 3 Select Active Yes Configuration name Load unprotected notification Email address myad...

Page 182: ...s for email notification Servicing the Network Management Module 182 4 Press Save the table will show the new configuration Logs will be attached by default in that example even if there is no subscription on card or device events ...

Page 183: ...l Email notification settings 2 Press the button New to create a new configuration 3 Select Active Yes Configuration name ALL Critical and User account Warning notification Email address myaddress mycompany com Notify on events Active Subscribe to Critical card events and Critical device events Always notify events with code 0800700 0800900 User account password expired User account locked 4 Press...

Page 184: ...tion settings Servicing the Network Management Module 184 4 16 Saving Restoring Duplicating Network module configuration settings 4 16 1 Modifying the JSON configuration settings file 4 16 1 1 JSON file structure The JSON file is structured into 3 blocks ...

Page 185: ... a Data block Data block cannot be modified this is the mandatory structure of the JSON file b Value block If some values inside the Value block need to be kept Value block structure cannot be modified this is the mandatory structure of the JSON file If it is removed from the JSON file these values will not be updated restored c Values Values can be kept as is modified or removed Removed values wi...

Page 186: ...l users is not yet available only the predefined account main administrator can be modified 4 16 1 3 3 Modifying SNMP settings Original file Modified file SNMP disabled SNMP enabled on port 161 SNMPv1 disabled SNMPv3 enabled 2 x accounts 1 x read only user enabled with Auth Priv security level and passwords 1x read write user enabled with Auth Priv security level and passwords 1 x active trap When...

Page 187: ...ng the Network Management Module 187 Original file Modified file 4 16 1 3 4 Making a partial update restoration a Example Updating Restoring only LDAP settings If you restore below JSON content only LDAP settings will be updated restored everything else will remain unchanged ...

Page 188: ...xx OU xxxx OU xxxx DC xxxx DC xxxx password plaintext null searchBase searchBaseDN DC xxx DC xxx DC xxx requestParameters userBaseDN OU xxxx DC xxxx userNameAttribute xxxx uidAttribute objectSid x x x xx xxxxxxxxxx xxxxxxxxxx xxxxxxxxxx groupBaseDN OU xxxx DC xxxx groupNameAttribute xx gidAttribute objectSid x x x xx xxxxxxxxxx xxxxxxxxxx xxxxxxxxxx profileMapping remoteGroup xxxxxxxxxxxxxx profil...

Page 189: ...s dateFormat Y m d YYYY MM DD d m Y DD MM YYYY d m Y DD MM YYYY d m Y DD MM YYYY m d Y MM DD YYYY d m Y DD MM YYYY preferences timeFormat 1 24h 0 12h preferences temperatureUnit 1 C 2 F Data BACnet BACnet Data Values example BACnet Data Values example Card Data Values example Certificate Settings Data Values example Date timeZone Europe Paris Africa Johannesburg America New_York Asia Shanghai Refe...

Page 190: ...dbus mapping configurations transport 1 RTU 2 TCP mapping configurations map network_card Card System Information modbus_ms Eaton ModbusMS compatible Eaton PowerXpert UID 0 compatible Card System Information mapping configurations transportFilter Access to all xx xxx xx xx yy yyy yy yy Access to a list of IP address mapping configurations deviceID 1 to 247 mapping configurations access 0 None 1 Re...

Page 191: ...us_ms Eaton ModbusMS compatible Eaton PowerXpert UID 0 compatible Card System Information mapping configurations transportFilter Access to all xx xxx xx xx yy yyy yy yy Access to a list of IP address mapping configurations deviceID 1 to 247 mapping configurations access 0 None 1 Read only 3 Read Write mapping configurations illegalReadBehavior 1 Return exception 2 return zeros Data Values example ...

Page 192: ...t 繁體中文 preferences dateFormat Y m d YYYY MM DD d m Y DD MM YYYY d m Y DD MM YYYY d m Y DD MM YYYY m d Y MM DD YYYY d m Y DD MM YYYY preferences timeFormat 1 24h 0 12h preferences temperatureUnit 1 C 2 F Data Values example Schedule scheduler 1 Primary 2 Group 1 3 Group 2 recurrence 0 once 1 every day 2 every week shutdownTimeStamp timestamp unix restartTimeStamp timestamp unix Data Values example ...

Page 193: ... servers protocol 1 UDP 2 TCP servers tcpframing 1 TRADITIONAL 2 OCTET_COUNTING Data Values example Web server 4 16 2 Saving Restoring Duplicating settings through the CLI Navigate to Information CLI save_configuration restore_configuration section to get example on how to save and restore settings through the CLI 4 16 3 Saving Restoring Duplicating settings through the Web interface Navigate to C...

Page 194: ...reasing concern regarding cybersecurity across industries where companies are steadily integrating field devices into enterprise wide information systems This occurs in discrete manufacturing and process industrial environments a wide range of general and specific purpose commercial buildings and even utility networks Traditionally electrical systems were controlled through serial devices connecte...

Page 195: ...ograms and provides access to that device Worm a device program that spreads without user interaction and affects the stability and performance of the ICS network Spyware a device program that changes the configuration of a device 5 1 5 Defense in depth While there are differences between traditional IT systems and ICS the fundamental concept of defense in depth is applicable to both Defense in de...

Page 196: ...ll protection methods that hide and protect individual devices and computers in a control network These firewalls communicate at the application layer and can provide better inspection capabilities Because they collect extensive log data application level proxy firewalls can negatively impact the performance of an ICS network Stateful inspection firewalls These firewalls work at the network sessio...

Page 197: ...ontrol both physical and logical should be defined and implemented The key consideration when designing access control is defining the required interactions both within a given zone and between zones These interactions should be mapped out clearly and prioritized based on need It is important to realize that every hole poked in a firewall and each non essential functionality that provides access o...

Page 198: ...andards 5 1 7 1 Understanding an ICS network Creating an inventory of all the devices applications and services that are hosted in a network can establish an initial baseline for what to monitor Once those components are identified and understood control ownership and operational consideration can be developed 5 1 7 2 Log and event management It is important to understand what is happening within ...

Page 199: ...ice Extensive testing needs to be conducted before deployment to minimize this impact 5 1 7 5 Continuous assessment and security training It is critical that ICS network administrators and regular users be properly trained to ensure the security of the ICS and the safety of the people who operate and depend on it Ongoing vulnerability assessments are critical to identify issues and understand the ...

Page 200: ... To protect important assets all organizations must take cybersecurity threats seriously and meet them proactively with a system wide defensive approach specific to organizational needs There is no protection method that is completely secure A defense mechanism that is effective today may not be effective tomorrow the ways and means of cyber attacks constantly change It is critical ICS administrat...

Page 201: ...t gov sites default files FactSheets NCCIC 20ICS_FactSheet_Defense_in_Depth_Strategies_S508C pdf 2 NIST SP 800 82 Guide to Industrial Control Systems ICS Security June 2011 http csrc nist gov publications nistpubs 800 82 SP800 82 final pdf 3 NIST SP 800 94 Guide to Intrusion Detection and Prevention Systems IDPS Feb 2007 http csrc nist gov publications nistpubs 800 94 SP800 94 pdf 4 Common Cyberse...

Page 202: ...ers that can be referenced at www eaton com cybersecurity 5 2 2 Secure configuration guidelines 5 2 2 1 Asset identification and Inventory Keeping track of all the devices in the system is a prerequisite for effective management of Cybersecurity of a system Ensure you maintain an inventory of all the components in your system in a manner in which you uniquely identify each component To facilitate ...

Page 203: ...d such as locks card readers and or guards etc Network module supports the following physical access ports controller mode switches and USB ports RJ45 USB A USB Micro B Access to them need to be restricted Do not connect unauthorized USB device or SD card for any operation e g Firmware upgrade Configuration change and Boot application change Before connecting any portable device through USB or SD ...

Page 204: ...or instructions on how to edit a user account Server and client certificate configuration Navigate to Contextual help Settings Certificate Follow embedded help for instructions on how to configure it 5 2 2 4 Deactivate unused features Network module provides multiple options to upgrade firmware change configurations set power schedules etc The device also provide multiple options to connect with t...

Page 205: ...nd when required or released Navigate in the help to Contextual help Maintenance Services to get information on how to upgrade the Network Module Eaton also has a robust vulnerability response process In the event of any security vulnerability getting discovered in its products Eaton patches the vulnerability and releases information bulletin through its cybersecurity web site http eaton com cyber...

Page 206: ...e Refer to the section Contextual help Settings Local users in the settings 5 4 Decommissioning the Network Management module With the increased frequency of reported data breaches it s becoming more and more necessary for companies to implement effective and reliable decommissioning policies and procedures In order to protect the data stored on retired IT equipment from falling into the wrong han...

Page 207: ...or to the loads that are connected to it The EMP monitors temperature and humidity information to help you protect critical equipment The EMP measures temperatures from 0 C to 70 C with an accuracy of 2 C The EMP measures relative humidity from 10 to 90 with an accuracy of 5 The EMP can be located some distance away from the device with a CAT5 network cable up to 50m 165 ft long The EMP monitors t...

Page 208: ...l the other EMPs 6 3 1 1 1 Example manual addressing of 3 EMPs connected to the Device 6 3 2 Mounting the EMP The EMP includes magnets cable ties slots and keyholes to enable multiple ways of mounting it on your installation Address must be defined before the EMP power up otherwise the changes won t be taken into account Do not set Modbus address to 0 otherwise the EMP will not be detected Green L...

Page 209: ...tener Side mounting magnets tie wraps 6 3 2 1 Rack mounting with keyhole example To mount the EMP on the rack use the supplied screw washer and nut Then mount the EMP on the screw and tighten it 6 3 2 2 Rack mounting with tie wraps example To mount the EMP on the door of the rack use the supplied cable ties ...

Page 210: ...and tighten it 6 3 2 4 Wall mounting with nylon fastener example To mount the EMP within the enclosure environment attach one nylon fastener to the EMP and the other nylon fastener to an enclosure rail post Then press the two nylon strips together to secure the EMP to the rail post Cut nylon fastener and stick it on the EMP bottom on the location highlighted below this will prevent to interfere wi...

Page 211: ...P RJ45 female female connector supplied in EMP accessories USB to RS485 converter cable supplied in EMP accessories Ethernet cable not supplied Device 6 3 3 2 2 Connection steps STEP 1 Connect the USB to RS485 converter cable to the USB port of the Device Address must be defined before the EMP power up otherwise the changes won t be taken into account Do not set Modbus address to 0 otherwise the E...

Page 212: ... EMPs 2 x Ethernet cable not supplied Device 6 3 4 2 Steps STEP 5 Connect the Ethernet cable to the TO SENSORS port of the first EMP and to the FROM DEVICE port of the second EMP STEP 6 Connect the Ethernet cable to the TO SENSORS port of the second EMP and to the FROM DEVICE port of the third EMP 6 3 5 Connecting an external contact device Use the supplied tie wraps to secure the RS485 to USB cab...

Page 213: ...ck Discover The EMP connected to the Network module appears in the table Press the pen logo to edit EMP information and access its settings Click Define offsets to define temperature or humidity offsets if needed STEP 4 Define alarm configuration refer to the contextual help for details Contextual help Environment Alarm configuration Select the Alarm configuration page Enable or disable alarms Def...

Page 214: ...MP Refer to the section Contextual help Environment Commissioning Status 6 5 3 Enabling temperature compensated battery charging in the UPS To enable the temperature compensated battery charging refer to the UPS user manual The temperature compensated battery charging feature needs to be enabled in the UPS ...

Page 215: ...he network Solid yellow UPS Network Module is connected to the network but no activity detected Flashing yellow UPS Network Module is connected to the network and sending or receiving data AUX connector For Network Module accessories only Restart button Ball point pen or equivalent will be needed to restart Short press 6s Safe software restart firmware safely shutdown before restart Long press 9s ...

Page 216: ...0 g 0 15 lb RoHS 100 compatible Storage Storage temperature 25 C to 70 C 14 F to 158 F Ambient conditions Operating temperature 0 C to 70 C 32 F to 158 F Relative humidity 5 95 noncondensing Module performance Module input power 5V 12V 5 1A AUX output power 5V 5 200mA Date Time backup CR1220 battery coin cell The RTC is able to keep the date and the time when Network Module is OFF Functions Langua...

Page 217: ... ntp org Port 443 https 22 ssh 161 snmp 162 snmp trap 25 smtp 8883 mqtts 123 ntp 5353 mdns sd 80 http 514 syslog 636 LDAP 1812 RADIUS Web interface access control User name admin Password admin Settings Device data connector USB RNDIS Apipa compatible IP address 169 254 0 1 Subnet mask 255 255 0 0 ...

Page 218: ...cters maximum Hide IP address from the email body enable disabled Status Active Inactive Alarm notifications Active No Yes All card events Subscribe Attach logs Critical alarm Subscribe Attach logs Warning alarm Subscribe Attach logs Info alarm Subscribe Attach logs All device events Subscribe Attach measures Attach logs Critical alarm Subscribe Attach measures Attach logs Warning alarm Subscribe ...

Page 219: ...nable 0 32 disable Minimum lower case enable 0 32 disable Minimum digit enable 0 32 disable Special character enable 0 32 disable Password expiration Number of days until password expires disabled Main administrator password never expires disabled Number of days until password expires disable enable 1 99999 Main administrator password never expires disable enable Lock account Lock account after xx...

Page 220: ...ecurity SSL None Start TLS SSL Verify server certificate disabled enabled Primary server Name 128 characters maximum Hostname 128 characters maximum Port x xxx Secondary server Name 128 characters maximum Hostname 128 characters maximum Port x xxx Credentials Anonymous search bind disabled enabled Search user DN 1024 characters maximum Password 128 characters maximum Search base Search base DN 102...

Page 221: ...e format hh mm ss 24h Configure Active Yes No Retry number 0 to 128 Primary server Name 128 characters maximum Address 128 characters maximum Secret 128 characters maximum UDP port 1 to 65535 Time out 3 to 60 Secondary server Name 128 characters maximum Address 128 characters maximum Secret 128 characters maximum UDP port 1 to 65535 Time out 3 to 60 Users preferences Language English French German...

Page 222: ...l duplex HTTPS Port 443 Port x xxx Syslog Inactive Server 1 Name Primary Status Disabled Hostname empty Port 514 Protocol UDP Message transfer method Non transparent framing Using unicode byte order mask BOM disabled Server 2 Name empty Status Disabled Hostname empty Port 514 Protocol UDP Message transfer method DIsabled in UDP Using unicode byte order mask BOM disabled Inactive Active Server 1 Na...

Page 223: ...xxx SNMP V1 disable enable Community 1 128 characters maximum Enabled Inactive Active Access Read only Community 2 128 characters maximum Enabled Inactive Active Access Read Write SNMP V3 disable enable User 1 32 characters maximum Enabled Inactive Active Access Read only Read Write Authentication Auth SHA 1 None Password 128 characters maximum Confirm password 128 characters maximum Privacy Secur...

Page 224: ...compatible Card System Information Transport RTU TCP Access None Read only Read Write Illegal read behaviour Return exception Return zeros IP filtering IP address Coil register base address shift No shift Shift by 1 JBUS BACnet BACnet IP Inactive BACnet IP Inactive Active Device Id Automatically generated must be unique 4194304 characters maximum Device Name Automatically generated must be unique ...

Page 225: ...on Organization unit Power quality Contact email address blank Common name 64 characters maximum Country Country code State or Province 64 characters maximum City or Locality 64 characters maximum Organization name 64 characters maximum Organization unit 64 characters maximum Contact email address 64 characters maximum 7 3 2 Meters Default settings and possible parameters Meters Default setting Po...

Page 226: ...d No Low critical 0 C 32 F Low warning 10 C 50 F High warning 70 C 158 F High critical 80 C 176 F Enabled No Yes low critical low warning high warning high critical Humidity Enabled No Low critical 10 Low warning 20 High warning 80 High critical 90 Enabled No Yes 0 low critical low warning high warning high critical 100 Dry contacts Enabled No Alarm severity Warning Enabled No Yes Alarm severity I...

Page 227: ...nglish Date format MM DD YYYY Time format hh mm ss 24h Temperature C Celsius Account details Full name 128 characters maximum Email 128 characters maximum Phone 64 characters maximum Organization 128 characters maximum Preferences Language English French German Italian Japanese Russian Simplified Chinese Spanish Traditional Chinese Date format MM DD YYYY YYY MM DD DD MM YYY DD MM YYY DD MM YYY DD ...

Page 228: ...tor Operator Viewer Control 7 4 4 Protection Administrator Operator Viewer Protection Scheduled shutdowns Administrator Operator Viewer Protection Agent list Administrator Operator Viewer Protection Agent settings Administrator Operator Viewer Protection Sequence 7 4 5 Environment Administrator Operator Viewer Environment Commissioning Environment Status Administrator Operator Viewer Environment A...

Page 229: ...otocols Administrator Operator Viewer SNMP Administrator Operator Viewer Industrial protocols Modbus Industrial protocols BACnet for INDGW only Administrator Operator Viewer Certificate Administrator Operator Viewer ATS 7 4 7 Maintenance Administrator Operator Viewer System information Administrator Operator Viewer Firmware Administrator Operator Viewer Services Administrator Operator Viewer Resou...

Page 230: ...iewer User profile 7 4 11 Contextual help Administrator Operator Viewer Contextual help Full documentation 7 4 12 CLI commands Administrator Operator Viewer get release info Administrator Operator Viewer history Administrator Operator Viewer ldap test Administrator Operator Viewer logout Administrator Operator Viewer maintenance Administrator Operator Viewer modbus_message_display for INDGW only A...

Page 231: ...erator Viewer sanitize Administrator Operator Viewer ssh keygen Administrator Operator Viewer time read only read only Administrator Operator Viewer traceroute traceroute6 Administrator Operator Viewer whoami Administrator Operator Viewer email test Administrator Operator Viewer systeminfo_statistics Administrator Operator Viewer certificates 7 5 List of event codes To get access to the Alarm log ...

Page 232: ...rated imported for service server logSystem csv 0E00300 Warning The self PKI signed certificate of the service server will expires in X days logSystem csv 0800700 Warning User account password expired logAccount csv 0800900 Warning User account locked logAccount csv 0C00100 Warning Unable to send email Smtp server is unknown logSystem csv 0C00200 Warning Unable to send email Authentication method ...

Page 233: ...00600 Info Notice Error Debug Script execution log message logSystem csv 0800100 Notice User account created user account id logAccount csv 0800200 Notice User account deleted user account id logAccount csv 0800400 Notice User account name changed user account id logAccount csv 0800600 Notice User account password changed logAccount csv 0800800 Notice User account password reset user account id lo...

Page 234: ...zzz logUpdate csv 0B00300 Info Time with NTP synchronized logSystem csv 0B00600 Info Time settings changed logSystem csv 0B01100 Info Time reset to last known date date logSystem csv 0C00F00 Info Test email 1000100 Info Settings saving requested logSystem csv 1000200 Info feature settings saved logSystem csv 1000A00 Info Settings restoration requested logSystem csv 1000E00 Info feature settings re...

Page 235: ...ry voltage high critical Battery voltage OK Check battery 62D Critical Battery charge current low critical Battery charge current OK Check battery 62F Critical Battery charge current high critical Battery charge current OK Check battery 631 Critical Battery discharge current low critical Battery discharge current OK Check battery 633 Critical Battery discharge current high critical Battery dischar...

Page 236: ...nput AC voltage in range 109 Warning Input AC voltage out of range Input AC voltage in range 110 Warning Building alarm through dry contact Building alarm OK 11F Warning Building alarm through Network module Building alarm OK 10A Warning Input AC unbalanced End of input AC unbalanced 200 Warning Bypass phase out range Bypass phase in range 201 Warning Bypass not available Bypass available Service ...

Page 237: ...eck battery 62E Warning Battery charge current high warning Battery charge current OK Check battery 630 Warning Battery discharge current low warning Battery discharge current OK Check battery 632 Warning Battery discharge current high warning Battery discharge current OK Check battery 634 Warning Battery temperature low warning Battery temperature OK Check battery 636 Warning Battery temperature ...

Page 238: ...Warning Batteries are aging Consider replacement Batteries aging condition cleared 7 5 2 3 Info Code Severity Active message Non active message Advice 005 Info Communication lost with UPS Communication recovered with UPS Service required 009 Info On high efficiency On ESS mode High efficiency disabled ESS disabled 013 Info Upgrading limited communication End of upgrade mode 101 Info On AVR Boost E...

Page 239: ... thermal overload No power overload 2112 Critical DCDC converter failure DCDC converter OK 2132 Critical Parallel UPS protection lost Parallel UPS protection OK 2143 Critical Maintenance bypass Not on maintenance bypass 2188 Critical Bypass AC module failure Bypass AC module OK 2191 Critical Battery fault Battery OK Check battery 2192 Critical Fuse fault Fuse OK 2193 Critical Fan fault Fan OK 2199...

Page 240: ...K 2011 Warning Output frequency out of range Output frequency in range 2021 Warning Charger temperature alarm Charger temperature OK 2023 Warning Max charger voltage Charger voltage OK 2025 Warning Power overload No power overload 2027 Warning Output over current No output over current 2028 Warning DC bus too high DC bus voltage OK 2029 Warning DC bus too low DC bus voltage OK 2032 Warning Battery...

Page 241: ...er closed 2326 Warning Bypass phase out range Bypass phase in range 2327 Warning Bypass voltage out of range Bypass voltage in range 2366 Warning Bypass bad wiring Bypass wiring OK 7 5 3 3 Info Code Severity Active message Non active message Advice 2063 Info Communication lost Communication recovered 2196 Info On AVR Buck End of AVR Buck 2197 Info On AVR Boost End of AVR Boost 2227 Info On high ef...

Page 242: ...nge F02 Warning Out of range In range F04 Warning Voltage in derated range Voltage in normal range F06 Warning Frequency out of range Frequency in range F07 Warning Not in range In range F09 Warning Voltage in derated range Voltage in normal range F0C Warning In overload Not in overload F0F Warning Internal configuration failure Internal configuration OK F12 Warning Overload Fault No overload faul...

Page 243: ...essage Advice F05 Good Source 1 used to power the load Source 1 not used to power the load F0A Good Source 2 used to power the load Source 2 not used to power the load F19 Good On preferred source Alarms with a severity set as Good are not taken into account into the counter of active alarms ...

Page 244: ...ation lost Communication recovered 1202 Warning Temperature is low Temperature is back to normal 1203 Warning Temperature is high Temperature is back to normal 1212 Warning Humidity is low Humidity is back to normal 1213 Warning Humidity is high Humidity is back to normal 7 5 5 3 With settable severity Code Severity Active message Non active message Advice 1221 Settable Contact is active Contact i...

Page 245: ...otection sequential shutdown in progress Protection sequential shutdown completed 1054 Info Protection agent is in unknown state Protection agent is in service 1055 Info Protection agent is starting Protection agent is in service 1056 Info Protection agent is stopping Protection agent is in service 1057 Info Protection agent is stopped Protection agent is in service 1100 Info Schedule shutdown dat...

Page 246: ...les in the table below Alarm oid at 1 3 6 1 2 1 33 1 6 3 x Description when trap 3 Description when trap 4 1 3 6 1 2 1 33 1 6 3 1 Battery test failed Battery test OK 1 3 6 1 2 1 33 1 6 3 2 Battery discharging End of UPS battery discharge 1 3 6 1 2 1 33 1 6 3 3 Low battery Battery OK 1 3 6 1 2 1 33 1 6 3 5 Temperature alarm Temperature OK 1 3 6 1 2 1 33 1 6 3 6 Input AC not present Input AC present...

Page 247: ... 4 1 534 1 11 4 1 0 13 Load not powered 1 3 6 1 4 1 534 1 11 4 1 0 14 On battery 1 3 6 1 4 1 534 1 11 4 1 0 15 Building alarm through input dry contact 1 3 6 1 4 1 534 1 11 4 1 0 16 Shutdown imminent 1 3 6 1 4 1 534 1 11 4 1 0 17 No more on bypass 1 3 6 1 4 1 534 1 11 4 1 0 20 Breaker open 1 3 6 1 4 1 534 1 11 4 1 0 23 Battery test failed 1 3 6 1 4 1 534 1 11 4 1 0 26 Communication lost 1 3 6 1 4 ...

Page 248: ...0 20 Remote temperature low 1 3 6 1 4 1 534 10 2 10 21 Remote temperature high 1 3 6 1 4 1 534 10 2 10 22 Remote temperature normal 1 3 6 1 4 1 534 10 2 10 23 Remote humidity low 1 3 6 1 4 1 534 10 2 10 24 Remote humidity high 1 3 6 1 4 1 534 10 2 10 25 Remote humidity normal 1 3 6 1 4 1 534 10 2 10 26 Contact 1 active 1 3 6 1 4 1 534 10 2 10 27 Contact 1 inactive 1 3 6 1 4 1 534 10 2 10 28 Contac...

Page 249: ...etwork and time settings of the network card It can also be used for troubleshooting and remote reboot reset of the network interface in case the web user interface is not accessible Warning Changing network parameters may cause the card to become unavailable remotely If this happens it can only be reconfigured locally through USB 7 7 1 Commands available You can see this list anytime by typing in...

Page 250: ...start of the line CTRL E Move to the end of the line up Move to the previous command line held in history down Move to the next command line held in history left Move the insertion point left one character right Move the insertion point right one character DELETION KEYS CTRL C Delete and abort the current line CTRL D Delete the character to the right on the insertion point CTRL K Delete all the ch...

Page 251: ...p history cr Display the current session s command line history by default display last 10 commands Unsigned integer Set the size of history list zero means unbounded Example history 6 display the 6 last command 7 7 4 3 Specifics 7 7 4 4 Access rights per profiles Administrator Operator Viewer history 7 7 5 ldap test 7 7 5 1 Description Ldap test help to troubleshoot LDAP configuration issues or w...

Page 252: ...ry Force the test to use secondary server optional v verbose Print the exchanges with LDAP server optional ldap test checkmappedgroups primary secondary v Check LDAP mapping p primary Force the test to use primary server optional s secondary Force the test to use secondary server optional v verbose Print the exchanges with LDAP server optional Quick guide for testing In case of issue with LDAP con...

Page 253: ...iewer logout 7 7 7 maintenance 7 7 7 1 Description Creates a maintenance report file which may be handed to the technical support 7 7 7 2 Help maintenance cr Create maintenance report file h help Display help page 7 7 7 3 Specifics 7 7 7 4 Access rights per profiles Administrator Operator Viewer maintenance 7 7 8 modbus_message_display This section is only for the Modbus Network Module INDGW ...

Page 254: ...9 modbus_statistics 7 7 9 1 Description modbus_statistics displays Modbus RTU and TCP status and server statistics Bus character overrun count Bus frame error count Bus parity error count Buffer overrun count Bus message count Valid message count CRC error count Incoming message count Discarded message count Processed message count Success returned count Exception returned count 7 7 9 2 Help modbu...

Page 255: ...k configuration of the card 7 7 10 2 Help For Viewer and Operator profiles netconf h Usage netconf OPTION Display network information and change configuration h help display help page l lan display Link status and MAC address 4 ipv4 display IPv4 Mode Address Netmask and Gateway 6 ipv6 display IPv6 Mode Addresses and Gateway d domain display Domain mode FQDN Primary and Secondary DNS For Administra...

Page 256: ...alues set custom Network address Netmask and Gateway manual domain name primary DNS secondary DNS automatically set Domain name Primary and Secondary DNS dhcp i set ipv4 mode Mode values set custom Network address Netmask and Gateway manual network mask gateway automatically set Network address Netmask and Gateway dhcp x set ipv6 status Status values enable IPv6 enable disable IPv6 disable x set i...

Page 257: ...utility uses the ICMP protocol s mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway ECHO_REQUEST datagrams pings have an IP and ICMP header followed by a struct timeval and then an arbitrary number of pad bytes used to fill out the packet c Specify the number of echo requests to be sent h Specify maximum number of hops Hostname or IP Host name or IP address ping...

Page 258: ...pecifics 7 7 12 4 Access rights per profiles Administrator Operator Viewer reboot 7 7 13 save_configuration restore_configuration 7 7 13 1 Description Save_configuration and restore_configuration are using JSON format to save and restore certain part of the configuration of the card 7 7 13 2 Help save_configuration h save_configuration print the card configuration in JSON format to standard output...

Page 259: ...he user shall have administrator profile PASSWORD is the user password PASSPHRASE is any passphrase to encrypt decrypt sensible data CARD_ADDRESS is IP or hostname of the card FILE is a path to the JSON file on your host computer where the configuration is saved or restored 7 7 13 4 Specifics 7 7 13 5 Access rights per profiles Administrator Operator Viewer save_configuration restore_configuration...

Page 260: ... 3 Specifics 7 7 15 4 Access rights per profiles Administrator Operator Viewer ssh keygen 7 7 16 time 7 7 16 1 Description Command used to display or change time and date 7 7 16 2 Help For Viewer and Operator profiles time h Usage time OPTION Display time and date h help display help page p print display date and time in YYYYMMDDhhmmss format For Administrator profile ...

Page 261: ...d alternate NTP servers time set ntpmanual fr pool ntp org de pool ntp org 7 7 16 3 Examples of usage Set date 2017 11 08 and time 22 00 time set manual 201711082200 Set preferred and alternate NTP servers time set ntpmanual fr pool ntp org de pool ntp org 7 7 16 4 Specifics 7 7 16 5 Access rights per profiles Administrator Operator Viewer time read only read only 7 7 17 traceroute and traceroute6...

Page 262: ...file Realm 7 7 18 2 Specifics 7 7 18 3 Access rights per profiles Administrator Operator Viewer whoami 7 7 19 email test 7 7 19 1 Description mail test sends test email to troubleshoot SMTP issues 7 7 19 2 Help Usage email test command Test SMTP configuration Commands email test h help Display help page email test r recipient recipient_address Send test email to the recipient_address Email address...

Page 263: ...age CPU usage upSince date since the system started Ram total MB free MB used MB tmpfs temporary files usage MB Flash user data total MB free MB used MB 7 7 20 2 Help systeminfo_statistics Display systeminfo statistics h help Display the help page 7 7 20 3 Specifics 7 7 20 4 Access rights per profiles Administrator Operator Viewer systeminfo_statistics 7 7 21 certificates 7 7 21 1 Description Allo...

Page 264: ...tes local import SERVICE_NAME csr over SSH sshpass p PASSWORD ssh USER CARD_ADDRESS certificates local csr mqtt 7 7 21 3 2 From a Windows host plink tools from putty is required print over SSH plink USER CARD_ADDRESS pw PASSWORD batch certificates local print SERVICE_NAME revoke over SSH plink USER CARD_ADDRESS pw PASSWORD batch certificates local revoke SERVICE_NAME export over SSH plink USER CAR...

Page 265: ...l org This product includes cryptographic software written by Eric Young eay cryptsoft com This product includes software released under MIT license and developed by various projects peoples and entities such as but not limited to Google Inc the AngularUI Team Lucas Galfasó nerv Angular Konstantin Skipor Filippo Oretti Dario Andrei The angular translate team and Pascal Precht Twitter Inc Zeno Roch...

Page 266: ...PS consists of communication over Hypertext Transfer Protocol HTTP within a connection encrypted by Transport Layer Security TLS IPP Intelligent Power Protector is a web based application that enables administrators to manage an Devices from a browser based management console Administrators can monitor manage and control a single Device UPS ATS ePDU locally and remotely A familiar browser interfac...

Page 267: ...ting and organizing information about managed devices on IP networks and for modifying that information to change device behavior SSH Secure Shell is a cryptographic network protocol for operating network services securely over an unsecured network SSL Secure Sockets Layer is a cryptographic protocol used for network traffic TCP Transmission Control Protocol TLS Transport Layer Security is cryptog...

Page 268: ...Acronyms and abbreviations Information 268 ...

Page 269: ...onfigure the UPS settings and allow remote commands Example UPS menu Settings ON OFF settings Remote command Enable 8 2 Card wrong timestamp leads to Full acquisition has failed error message on Software 8 2 1 Symptoms IPP IPM shows the error message The full data acquisition has failed even if the credentials are correct 8 2 2 Possible cause The Network module timestamp is not correct Probably th...

Page 270: ...ice and Servicing the EMP Installing the EMP Daisy chaining 3 EMPs 2 Disconnect and reconnect the USB to RS485 cable 3 Launch the discovery if it is still not ok go to Action 1 3 8 4 1 4 Action 1 3 1 Reboot the Network module 2 Launch the discovery 8 4 2 Symptom 2 The EMPs orange RJ45 LEDs are not blinking 8 4 2 1 Possible causes C 1 the EMP address switches are all set to 0 C 2 the EMPs are daisy...

Page 271: ...rk Module Certificates of IPP IPM and the Network Module are not matching so that authentication and encryption of connections between the Network Module and the shutdown agents is not working 8 6 3 Setup IPP IPM is started Network module is connected to the UPS and to the network 8 6 4 Action 1 Check if the IPP IPM certificate validity for the Network Module STEP 1 Connect to the Network Module O...

Page 272: ...d in the folder Eaton IntelligentPowerProtector configs tls 8 7 LDAP configuration commissioning is not working Refer to the section Servicing the Network Management Module Commissioning Testing LDAP 8 8 Modbus communication doesn t work 8 8 1 Symptoms Communication doesn t work 8 8 2 Possible cause Incorrect communication parameters Verify that the communication parameters are set to the desired ...

Page 273: ...ommunication doesn t work Troubleshooting 273 Verify the termination settings and refer to the section Installing the Network Management Module Wiring the RS 485 Modbus RTU terminal Configuring the termination ...

Page 274: ... versions prior to 1 7 0 when applied to versions 1 7 0 or above 8 10 2 Symptom SNMPv3 connectivity is not properly working after a restore settings on a 1 7 0 version or above 8 10 3 Cause The SNMPv3 was configured prior to 1 7 0 In that case SNMPv3 configuration is not well managed by the Save and by the Restore settings 8 10 4 Action Reconfigure your SNMPv3 users and passwords on versions 1 7 0...

Page 275: ... The IP address has changed Note If the application is corrupt due to an interruption while flashing the firmware for example the boot will be done on previous firmware 8 12 2 Action Recover the IP address and connect to the card Refer to Installing the Network Management Module Accessing the Network Module Finding and setting the IP address section 8 13 Web user interface is not up to date after ...

Page 276: ......

Reviews: