Cybersecurity recommended secure hardening guidelines
Securing the Network Management Module – 197
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
5.2 Cybersecurity recommended secure hardening guidelines
5.2.1 Introduction
This Network module has been designed with Cybersecurity as an important consideration. Number of Cybersecurity features are
now offered in the product which if implemented as per the recommendations in this section would minimize Cybersecurity risk to
the Network module. This section “secure configuration” or “hardening” guidelines provide information to the users to securely
deploy and maintain their product to adequately minimize the cybersecurity risks to their system.
Eaton is committed to minimizing the Cybersecurity risk in its products and deploys cybersecurity best practices and latest
cybersecurity technologies in its products and solutions; making them more secure, reliable and competitive for our customers.
Eaton also offers Cybersecurity Best Practices whitepapers to its customers that can be referenced at
5.2.2 Secure configuration guidelines
5.2.2.1 Asset identification and Inventory
Keeping track of all the devices in the system is a prerequisite for effective management of Cybersecurity of a system. Ensure you
maintain an inventory of all the components in your system in a manner in which you uniquely identify each component. To
facilitate this Network module supports the following identifying information - manufacturer, type, serial number, f/w version
number, and location.
5.2.2.1.1 Network Module identification and its firmware information
It can be retrieved by navigating to
Contextual help>>>Maintenance>>>System information
Identification
System name
Product
Physical name
Vendor
UUID
Part number
Serial number
Hardware version
Location
Contact
Firmware information
Firmware version
Firmware SHA
Firmware date
Firmware installation date
Firmware activation date
Bootloader version
5.2.2.1.2 Communication settings
It can be retrieved by navigating to
Contextual help>>>Settings>>>Network & Protocol
.
LAN
Link status
MAC address
Configuration
The COPY TO CLIPBOARD button will copy the information to the clipboard.
Содержание Network-M2
Страница 1: ...UPS Network Management Card Network M2 User s Guide English 10 15 2020 2 0 5 ...
Страница 2: ......
Страница 24: ...Configuring Modbus Installing the Network Management Module 24 ...
Страница 25: ...Configuring Modbus Installing the Network Management Module 25 ...
Страница 26: ...Configuring Modbus Installing the Network Management Module 26 ...
Страница 38: ...Home Contextual help of the web interface 38 3 2 7 1 3 Battery mode 3 2 7 1 4 Off mode ...
Страница 40: ...Home Contextual help of the web interface 40 3 2 7 2 3 Battery mode 3 2 7 2 4 Off mode ...
Страница 42: ...Home Contextual help of the web interface 42 3 2 7 3 2 Bypass mode 3 2 7 3 3 Battery mode ...
Страница 43: ...Home Contextual help of the web interface 43 3 2 7 3 4 HE mode ESS mode 3 2 7 3 5 Maintenance bypass mode ...
Страница 64: ...Protection Contextual help of the web interface 64 Example 2 Immediate OFF Example 4 Custom ...
Страница 65: ...Protection Contextual help of the web interface 65 Settings 1 ...
Страница 261: ...Acronyms and abbreviations Information 261 ...
Страница 268: ......