Tripp Lite EVMAGU23X NEW Eaton G4 Universal-Input Managed PDU, 208V and 415/240V, 42 Outlets, Input Cable Sold Separately, 72-Inch 0U Vertical

Eaton G4 Gigabit Network Module GNM Firmware User Guide - Page 6

For EVMAGU23X NEW.

PDF File Manual, 231 pages, Read Online | Download pdf file

EVMAGU23X NEW photo
Loading ...
Loading ...
Loading ...
4.9.1Automatic time synchronization....................................................................................................................................143
4.9.2Manual time synchronization.........................................................................................................................................143
4.10Changing the language of the web pages...........................................................................................................................143
4.11Resetting username and password.....................................................................................................................................144
4.11.1As an admin for other users..........................................................................................................................................144
4.11.2Resetting its own password..........................................................................................................................................144
4.12Recovering main administrator password...........................................................................................................................144
4.13Switching to static IP (Manual) / Changing IP address of the Network Module..................................................................145
4.14Reading device information in a simple way.......................................................................................................................145
4.14.1Web page......................................................................................................................................................................145
4.15Subscribing to a set of alarms for email notification............................................................................................................146
4.15.1Example #1: subscribing only to one alarm (load unprotected).....................................................................................146
4.15.2Example #2: subscribing to all Critical alarms and some specific Warnings.................................................................147
4.16Saving/Restoring/Duplicating Network module configuration settings............................................................................... 148
4.16.1Modifying the JSON configuration settings file.............................................................................................................148
4.16.2Saving/Restoring/Duplicating settings through the CLI.................................................................................................155
4.16.3Saving/Restoring/Duplicating settings through the Web interface................................................................................155
5SECURING THE NETWORK MANAGEMENT MODULE..................................................................................156
5.1Cybersecurity considerations for electrical distribution systems........................................................................................156
5.1.1Purpose.........................................................................................................................................................................156
5.1.2Introduction...................................................................................................................................................................156
5.1.3Connectivity—why do we need to address cybersecurity for industrial control systems (ICS)?..................................156
5.1.4Cybersecurity threat vectors......................................................................................................................................... 156
5.1.5Defense in depth........................................................................................................................................................... 157
5.1.6Designing for the threat vectors....................................................................................................................................158
5.1.7Policies, procedures, standards, and guidelines............................................................................................................160
5.1.8Conclusion..................................................................................................................................................................... 162
5.1.9Terms and definitions....................................................................................................................................................162
5.1.10Acronyms......................................................................................................................................................................162
5.1.11References....................................................................................................................................................................163
5.2Cybersecurity recommended secure hardening guidelines................................................................................................ 164
5.2.1Introduction...................................................................................................................................................................164
5.2.2Secure configuration guidelines....................................................................................................................................164
5.2.3References....................................................................................................................................................................167
5.3Configuring user permissions through profiles....................................................................................................................168
5.4Decommissioning the Network Management module....................................................................................................... 168
6SERVICING THE EMP......................................................................................................................................169
6.1Installing the EMP...............................................................................................................................................................169
6.1.1Mounting the EMP........................................................................................................................................................169
6.2Using the EMP for temperature compensated battery charging.........................................................................................171
6.2.1Addressing the EMP......................................................................................................................................................171
6.2.2Commissioning the EMP...............................................................................................................................................171
6.2.3Enabling temperature compensated battery charging in the UPS.................................................................................171
7INFORMATION.................................................................................................................................................172
7.1Front panel connectors and LED indicators.........................................................................................................................172
7.2Specifications/Technical characteristics.............................................................................................................................. 173
7.3Default settings and possible parameters...........................................................................................................................174
7.3.1Settings.........................................................................................................................................................................174
7.3.2Meters........................................................................................................................................................................... 180
7.3.3Sensors alarm configuration..........................................................................................................................................180
7.3.4User profile.................................................................................................................................................................... 181
Loading ...
Loading ...
Loading ...