Eaton Network-M3 User manual

Eaton is a registered trademark of Eaton Corporation or its subsidiaries and affiliates.
Phillips is a registered trademark of Phillips Screw Company.
National Electrical Code and NEC are registered trademarks of National Fire Protection Association, Inc.
Microsoft®, Windows®, and Windows Server® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
UNIX® is a registered trademark of The Open Group.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.
Google™ is a trademark of Google Inc.
All other trademarks are properties of their respective companies.
©Copyright 2023 Eaton Corporation. All rights reserved.
No part of this document may be reproduced in any way without the express written approval of Eaton Corporation.

1 Table of Contents
1 TABLE OF CONTENTS....................................................................................................................................... 4
2 INSTALLING THE NETWORK MANAGEMENT MODULE ............................................................................... 11
2.1 Overview ............................................................................................................................................................................. 11
2.2 Unpacking the Network module.......................................................................................................................................... 11
2.3 Starting with the Network Module...................................................................................................................................... 11
2.4 Mounting the Network Module........................................................................................................................................... 11
2.5 Accessing the Network Module.......................................................................................................................................... 12
2.5.1 Accessing the web interface through Network............................................................................................................. 12
2.5.2 Finding and setting the IP address ................................................................................................................................ 12
2.5.3 Accessing the web interface through RNDIS................................................................................................................ 13
2.5.4 Accessing the card through serial terminal emulation................................................................................................... 15
2.5.5 Modifying the Proxy exception list ................................................................................................................................ 17
2.6 Configuring the Network Module settings .......................................................................................................................... 19
2.6.1 Menu structure.............................................................................................................................................................. 19
3 CONTEXTUAL HELP OF THE WEB INTERFACE ............................................................................................. 21
3.1 Login page........................................................................................................................................................................... 21
3.1.1 Logging in for the first time........................................................................................................................................... 21
3.1.2 Troubleshooting............................................................................................................................................................. 22
3.2 Home................................................................................................................................................................................... 23
3.2.1 Header structure............................................................................................................................................................ 23
3.2.2 Menu structure.............................................................................................................................................................. 24
3.2.3 Energy flow diagram...................................................................................................................................................... 25
3.2.4 Outlet status.................................................................................................................................................................. 29
3.2.5 Active Alarms ................................................................................................................................................................ 29
3.2.6 Environment .................................................................................................................................................................. 30
3.2.7 Energy flow diagram examples ..................................................................................................................................... 31
3.2.8 Access rights per profiles.............................................................................................................................................. 38
3.3 Meters................................................................................................................................................................................. 39
3.3.1 Measures....................................................................................................................................................................... 39
3.3.2 Battery........................................................................................................................................................................... 41
3.3.3 Data logs........................................................................................................................................................................ 43
3.3.4 Default settings and possible parameters - Meters ...................................................................................................... 43
3.3.5 Access rights per profiles.............................................................................................................................................. 44
3.3.6 Save and Restore .......................................................................................................................................................... 44
3.4 Controls ............................................................................................................................................................................... 45
3.4.1 Entire UPS ..................................................................................................................................................................... 45
3.4.2 Outlets - Group 1/ Group 2 ............................................................................................................................................ 46
3.4.3 Group............................................................................................................................................................................. 47
3.4.4 Schedule........................................................................................................................................................................ 49
3.5 Protection ............................................................................................................................................................................ 52
3.5.1 Agents list...................................................................................................................................................................... 52
3.5.2 Agent shutdown sequencing......................................................................................................................................... 56
3.5.3 Shutdown on power outage.......................................................................................................................................... 60
3.6 Environment ........................................................................................................................................................................ 68
3.6.1 Commissioning/Status................................................................................................................................................... 68
3.6.2 Alarm configuration ....................................................................................................................................................... 73
3.6.3 Information .................................................................................................................................................................... 76

3.7 Settings ............................................................................................................................................................................... 78
3.7.1 General .......................................................................................................................................................................... 78
3.7.2 Local users .................................................................................................................................................................... 91
3.7.3 Remote users................................................................................................................................................................ 96
3.7.4 Ports ............................................................................................................................................................................ 111
3.7.5 TCP/IP.......................................................................................................................................................................... 112
3.7.6 Firewall ........................................................................................................................................................................ 119
3.7.7 Protocols...................................................................................................................................................................... 123
3.7.8 SNMP .......................................................................................................................................................................... 131
3.7.9 Certificate .................................................................................................................................................................... 139
3.8 Device details .................................................................................................................................................................... 149
3.8.1 General ........................................................................................................................................................................ 149
3.8.2 Settings - UPS ............................................................................................................................................................. 150
3.8.3 Settings - ATS.............................................................................................................................................................. 151
3.8.4 Power Modules ........................................................................................................................................................... 152
3.9 Maintenance...................................................................................................................................................................... 152
3.9.1 Firmware ..................................................................................................................................................................... 152
3.9.2 Sessions ...................................................................................................................................................................... 156
3.9.3 Services....................................................................................................................................................................... 157
3.9.4 Resources.................................................................................................................................................................... 163
3.9.5 System logs................................................................................................................................................................. 165
3.9.6 System information ..................................................................................................................................................... 166
3.10 Alarms ............................................................................................................................................................................... 167
3.10.1 Alarm sorting ............................................................................................................................................................... 167
3.10.2 Active alarm counter.................................................................................................................................................... 168
3.10.3 Alarm details................................................................................................................................................................ 168
3.10.4 Alarm paging................................................................................................................................................................ 168
3.10.5 Export .......................................................................................................................................................................... 168
3.10.6 Clear ............................................................................................................................................................................ 168
3.10.7 Alarms list with codes ................................................................................................................................................. 168
3.10.8 Access rights per profiles............................................................................................................................................ 169
3.11 User profile........................................................................................................................................................................ 169
3.11.1 Access to the user profile............................................................................................................................................ 169
3.11.2 User profile.................................................................................................................................................................. 170
3.11.3 Legal information......................................................................................................................................................... 173
3.11.4 Component.................................................................................................................................................................. 173
3.11.5 Availability of source code........................................................................................................................................... 173
3.11.6 Notice for proprietary elements................................................................................................................................... 173
3.11.7 Default settings and possible parameters - User profile ............................................................................................. 174
3.11.8 Access rights per profiles............................................................................................................................................ 174
3.11.9 CLI commands ............................................................................................................................................................ 175
3.11.10 Troubleshooting........................................................................................................................................................... 175
3.11.11 Save and Restore ........................................................................................................................................................ 176
3.12 Documentation.................................................................................................................................................................. 177
3.12.1 Access to the embedded documentation ................................................................................................................... 177
3.12.2 Access rights per profiles............................................................................................................................................ 178
4 SERVICING THE NETWORK MANAGEMENT MODULE ............................................................................... 179
4.1 Configuring/Commissioning/Testing LDAP ....................................................................................................................... 179
4.1.1 Commissioning............................................................................................................................................................ 179
4.1.2 Testing LDAP connection............................................................................................................................................ 180
4.1.3 Limitations................................................................................................................................................................... 180
4.2 Pairing agent to the Network Module ............................................................................................................................... 180
4.2.1 Pairing with credentials on the agent .......................................................................................................................... 180

4.2.2 Pairing with automatic acceptance (recommended if done in a secure and trusted network).................................... 180
4.2.3 Pairing with manual acceptance.................................................................................................................................. 181
4.3 Powering down/up applications (examples) ...................................................................................................................... 181
4.3.1 Powering down IT system in a specific order ............................................................................................................. 181
4.3.2 Powering down non-priority equipment first............................................................................................................... 184
4.3.3 Restart sequentially the IT equipment on utility recovery ........................................................................................... 187
4.4 Checking the current firmware version of the Network Module....................................................................................... 189
4.5 Accessing to the latest Network Module firmware/driver/script....................................................................................... 189
4.6 Upgrading the card firmware (Web interface / shell script) ............................................................................................... 189
4.6.1 Web interface.............................................................................................................................................................. 189
4.6.2 Shell script................................................................................................................................................................... 189
4.6.3 Example:...................................................................................................................................................................... 190
4.7 Changing the RTC battery cell........................................................................................................................................... 191
4.8 Updating the time of the Network Module precisely and permanently (ntp server) ......................................................... 192
4.9 Synchronizing the time of the Network Module and the UPS........................................................................................... 192
4.9.1 Automatic time synchronization .................................................................................................................................. 192
4.9.2 Manual time synchronization....................................................................................................................................... 192
4.10 Changing the language of the web pages......................................................................................................................... 192
4.11 Resetting username and password................................................................................................................................... 193
4.11.1 As an admin for other users ........................................................................................................................................ 193
4.11.2 Resetting its own password........................................................................................................................................ 193
4.12 Recovering main administrator password ......................................................................................................................... 193
4.13 Switching to static IP (Manual) / Changing IP address of the Network Module................................................................ 194
4.14 Reading device information in a simple way ..................................................................................................................... 195
4.14.1 Web page .................................................................................................................................................................... 195
4.15 Subscribing to a set of alarms for email notification.......................................................................................................... 195
4.15.1 Example #1: subscribing only to one alarm (load unprotected)................................................................................... 195
4.15.2 Example #2: subscribing to all Critical alarms and some specific Warnings ............................................................... 196
4.16 Saving/Restoring/Duplicating Network module configuration settings ............................................................................. 197
4.16.1 Modifying the JSON configuration settings file........................................................................................................... 197
4.16.2 Saving/Restoring/Duplicating settings through the CLI............................................................................................... 202
4.16.3 Saving/Restoring/Duplicating settings through the Web interface.............................................................................. 202
5 SECURING THE NETWORK MANAGEMENT MODULE................................................................................ 203
5.1 Cybersecurity considerations for electrical distribution systems ...................................................................................... 203
5.1.1 Purpose ....................................................................................................................................................................... 203
5.1.2 Introduction ................................................................................................................................................................. 203
5.1.3 Connectivity—why do we need to address cybersecurity for industrial control systems (ICS)? ................................ 203
5.1.4 Cybersecurity threat vectors ....................................................................................................................................... 203
5.1.5 Defense in depth......................................................................................................................................................... 204
5.1.6 Designing for the threat vectors.................................................................................................................................. 205
5.1.7 Policies, procedures, standards, and guidelines.......................................................................................................... 207
5.1.8 Conclusion................................................................................................................................................................... 209
5.1.9 Terms and definitions.................................................................................................................................................. 209
5.1.10 Acronyms .................................................................................................................................................................... 209
5.1.11 References .................................................................................................................................................................. 210
5.2 Cybersecurity recommended secure hardening guidelines .............................................................................................. 211
5.2.1 Introduction ................................................................................................................................................................. 211
5.2.2 Secure configuration guidelines .................................................................................................................................. 211
5.2.3 References .................................................................................................................................................................. 217
5.3 Configuring user permissions through profiles.................................................................................................................. 218
5.4 Decommissioning the Network Management module ..................................................................................................... 218
6 SERVICING THE EMP .................................................................................................................................... 219

6.1 Description and features ................................................................................................................................................... 219
6.2 Unpacking the EMP........................................................................................................................................................... 219
6.3 Installing the EMP ............................................................................................................................................................. 220
6.3.1 Defining EMPs address and termination..................................................................................................................... 220
6.3.2 Mounting the EMP ...................................................................................................................................................... 220
6.3.3 Cabling the first EMP to the device............................................................................................................................. 223
6.3.4 Daisy chaining EMPs................................................................................................................................................... 224
6.3.5 Connecting an external contact device........................................................................................................................ 225
6.4 Commissioning the EMP................................................................................................................................................... 225
6.4.1 On the Network Module device .................................................................................................................................. 225
6.5 Using the EMP for temperature compensated battery charging....................................................................................... 225
6.5.1 Addressing the EMP.................................................................................................................................................... 226
6.5.2 Commissioning the EMP............................................................................................................................................. 226
6.5.3 Enabling temperature compensated battery charging in the UPS............................................................................... 226
7 INFORMATION............................................................................................................................................... 227
7.1 Front panel connectors and LED indicators....................................................................................................................... 227
7.2 Specifications/Technical characteristics ............................................................................................................................ 228
7.3 Default settings and possible parameters......................................................................................................................... 229
7.3.1 Meters......................................................................................................................................................................... 229
7.3.2 Settings ....................................................................................................................................................................... 229
7.3.3 Sensors alarm configuration........................................................................................................................................ 236
7.3.4 User profile.................................................................................................................................................................. 236
7.4 Access rights per profiles.................................................................................................................................................. 238
7.4.1 Home........................................................................................................................................................................... 238
7.4.2 Meters......................................................................................................................................................................... 238
7.4.3 Controls ....................................................................................................................................................................... 238
7.4.4 Protection .................................................................................................................................................................... 238
7.4.5 Environment ................................................................................................................................................................ 239
7.4.6 Settings ....................................................................................................................................................................... 239
7.4.7 Maintenance................................................................................................................................................................ 240
7.4.8 Alarms ......................................................................................................................................................................... 240
7.4.9 User profile.................................................................................................................................................................. 240
7.4.10 Contextual help............................................................................................................................................................ 241
7.4.11 CLI commands ............................................................................................................................................................ 241
7.5 List of event codes............................................................................................................................................................ 243
7.5.1 System log codes........................................................................................................................................................ 243
7.5.2 UPS(HID) alarm log codes ........................................................................................................................................... 248
7.5.3 UPS(XCP and COPI) alarm log codes .......................................................................................................................... 254
7.5.4 ATS alarm log codes.................................................................................................................................................... 261
7.5.5 EMP alarm log codes................................................................................................................................................... 263
7.5.6 Network module alarm log codes................................................................................................................................ 264
7.6 SNMP traps ....................................................................................................................................................................... 265
7.6.1 UPS Mib ...................................................................................................................................................................... 265
7.6.2 ATS Mib....................................................................................................................................................................... 268
7.6.3 Sensor Mib .................................................................................................................................................................. 269
7.7 CLI ..................................................................................................................................................................................... 269
7.7.1 Commands available.................................................................................................................................................... 269
7.7.2 Contextual help............................................................................................................................................................ 270
7.7.3 get release info............................................................................................................................................................ 270
7.7.4 history.......................................................................................................................................................................... 271
7.7.5 logout........................................................................................................................................................................... 271
7.7.6 maintenance................................................................................................................................................................ 272
7.7.7 netconf ........................................................................................................................................................................ 273

7.7.8 ping and ping6 ............................................................................................................................................................. 274
7.7.9 reboot .......................................................................................................................................................................... 275
7.7.10 rest list......................................................................................................................................................................... 276
7.7.11 rest get ........................................................................................................................................................................ 276
7.7.12 rest set ........................................................................................................................................................................ 277
7.7.13 rest exec...................................................................................................................................................................... 277
7.7.14 save_configuration | restore_configuration.................................................................................................................. 277
7.7.15 sanitize......................................................................................................................................................................... 278
7.7.16 ssh-keygen .................................................................................................................................................................. 279
7.7.17 time ............................................................................................................................................................................. 279
7.7.18 traceroute and traceroute6.......................................................................................................................................... 280
7.7.19 whoami........................................................................................................................................................................ 281
7.7.20 email-test..................................................................................................................................................................... 281
7.7.21 systeminfo_statistics................................................................................................................................................... 282
7.7.22 certificates................................................................................................................................................................... 282
7.8 Legal information............................................................................................................................................................... 284
7.8.1 Availability of Source Code.......................................................................................................................................... 284
7.8.2 Notice for Open Source Elements............................................................................................................................... 284
7.8.3 Notice for our proprietary (i.e. non-Open source) elements........................................................................................ 284
7.9 Acronyms and abbreviations ............................................................................................................................................. 285
8 TROUBLESHOOTING..................................................................................................................................... 288
8.1 Action not allowed in Control/Schedule/Power outage policy........................................................................................... 288
8.1.1 Symptom..................................................................................................................................................................... 288
8.1.2 Possible Cause ............................................................................................................................................................ 288
8.1.3 Action .......................................................................................................................................................................... 288
8.2 Card wrong timestamp leads to "Full acquisition has failed" error message on Software................................................. 288
8.2.1 Symptoms: .................................................................................................................................................................. 288
8.2.2 Possible cause:............................................................................................................................................................ 288
8.2.3 Action: ......................................................................................................................................................................... 288
8.3 Client server is not restarting ............................................................................................................................................ 288
8.3.1 Symptom..................................................................................................................................................................... 288
8.3.2 Possible Cause ............................................................................................................................................................ 288
8.3.3 Action .......................................................................................................................................................................... 289
8.4 EMP communication status shows "Lost"......................................................................................................................... 289
8.4.1 Symptom #1................................................................................................................................................................ 289
8.5 EMP detection fails at discovery stage ............................................................................................................................. 289
8.5.1 Symptom #1................................................................................................................................................................ 289
8.5.2 Symptom #2................................................................................................................................................................ 290
8.6 How do I log in if I forgot my password? .......................................................................................................................... 290
8.6.1 Action .......................................................................................................................................................................... 290
8.7 Software is not able to communicate with the Network module...................................................................................... 291
8.7.1 Symptoms ................................................................................................................................................................... 291
8.7.2 Possible cause............................................................................................................................................................. 291
8.7.3 Setup ........................................................................................................................................................................... 291
8.7.4 Action #1 ..................................................................................................................................................................... 291
8.7.5 Action #2 ..................................................................................................................................................................... 291
8.8 LDAP configuration/commissioning is not working........................................................................................................... 292
8.9 Password change in My profile is not working.................................................................................................................. 292
8.9.1 Symptoms ................................................................................................................................................................... 292
8.9.2 Possible cause............................................................................................................................................................. 292
8.9.3 Action .......................................................................................................................................................................... 292
8.10 The alarm list has been cleared after an upgrade.............................................................................................................. 292
8.10.1 Symptom..................................................................................................................................................................... 292

8.10.2 Action .......................................................................................................................................................................... 292
8.11 The Network Module fails to boot after upgrading the firmware ...................................................................................... 293
8.11.1 Possible Cause ............................................................................................................................................................ 293
8.11.2 Action .......................................................................................................................................................................... 293
8.12 Web user interface is not up to date after a FW upgrade ................................................................................................. 293
8.12.1 Symptom..................................................................................................................................................................... 293

Overview
Installing the Network Management Module – 11
•
•
•
2 Installing the Network Management Module
2.1 Overview
2.2 Unpacking the Network module
The
Unable to render include or excerpt-include. Could not retrieve page.
will include the following accessories:
Installation instructions
2.3 Starting with the Network Module
2.4 Mounting the Network Module
The Network Module is hot-swappable. Inserting and/or extracting the Network Module from the communication slot of theproduct
has no effect on the output.
Remove the two screws securing the option slot cover plate and store the plate for possible future use.
Install theNetwork Module along the alignment channels in the option slot.
Secure the Network Module using the two screws.
Packing materials must be disposed of in compliance with all local regulations concerning waste.
Recycling symbols are printed on the packing materials to facilitate sorting.
It is not necessary to power down theDevice before installing the Network Module. Required tools: No. 2 Phillips
screwdriver.
If theproduct is powered up, you can verify that the Network
Module is seated properly and communicating with theproduct by
checking that the Status ON LEDflashes green after 2 minutes.

Accessing the Network Module
Installing the Network Management Module – 12
•
•
2.5 Accessing the Network Module
2.5.1 Accessing the web interface through Network
2.5.1.1 Connecting the network cable
Connect a standard
gigabit compatible shielded ethernetcable (F/UTP or F/FTP)
between the network connector on theNetwork Module and a
network jack.
2.5.1.2 Accessing the web interface
STEP 1 –On a network computer, launch a supported web browser. The browser window appears.
STEP 2 –In the Address/Location field, enterhttps://
[IPaddress]
with the static IP address of the Network Module.
STEP 3 –The login screen appears.
STEP 4 –Enter the user name in the User Name field. The default user name is admin.
STEP 5 –Enter the password in the Password field. The default password is admin.
STEP 6 –The password must be changed at first login.
STEP 7 –Click Login. The Network Module web interface appears.
At first login:
STEP 8 - Accept License Agreement. The Network Module web interface appears.
2.5.2 Finding and setting the IP address
2.5.2.1 Your network is equipped with a BOOTP/DHCP server (default)
2.5.2.1.1 Read from the device LCD
If your device has an LCD, from the LCD’s menu, navigate to Identification>>>"COM card IPv4".
Note the IP address of the card.
Go to the section: Accessing the web interface through Network.
Security settings in the Network Module may be in their default states.
For maximum security, configure through a USB connection before connecting the network cable.
It is highly recommended that browser access to the Network Module is isolated from outside access using a
firewall or isolated network.
Note: some older Devices may not be able to display the IP address even if they have an LCD. Please consult the
Device manual.

Accessing the Network Module
Installing the Network Management Module – 13
•
•
•
•
•
•
2.5.2.1.2 With web browser throughthe configuration port
For example, if your device does not have an LCD, the IP address can be discovered by accessing the web interface through RNDIS
andbrowsing to Settings>Network.
To access the web interface through RNDIS, see theAccessing the web interface through RNDISsection.
Navigate toContextual help>>>Settings>>>Network & Protocol>>>IPV4.
Read the IPv4 settings.
2.5.2.2 Your network is not equipped with a BOOTP/DHCP server
2.5.2.2.1 Define from the configuration port
The IP address can be defined by accessing the web interface through RNDIS.
To access web interface through RNDIS, see theAccessing the web interface through RNDISsection.
Define the IP settings:
Navigate toContextual help>>>Settings>>>Network & Protocol>>>IPV4.
Select Manual (Static IP).
Input the following information: Address, Subnet Mask, Default Gateway
Save the changes.
2.5.3 Accessing the web interface through RNDIS
This connection is used to access and configure the Network Module network settings locally through a RNDIS(Ethernet over USB
interface).
2.5.3.1 Connecting the configuration cable
1. Connect a Micro-B to USB cable to a USB connector on the host computer.
2. Connect the cable to the Settings connector on theNetwork Module.
2.5.3.2 Web interface access through RNDIS
2.5.3.2.1 Configuring the RNDIS
a Automatic configuration
b Manual configuration
STEP 1 –In case Windows® OS fails to find driver automatically, go to theWindows control panel>Network and sharing
center>Local area connection
RNDIS driver is used to emulate a network connection from USB.
After the card is connected to the PC, Windows® OS will automatically search for the RNDIS driver.
On some computers, the OS can find the RNDIS driver then configuration is completed, and you can go to
Accessing the web interface.
On some others it may fail then proceed to manual configuration.

Accessing the Network Module
Installing the Network Management Module – 14
STEP 2 –Right click on the RNDIS local area connection and select Properties.
STEP 3 –Select Internet Protocol Version 4 (TCP/IPv4)” and press the Properties button
STEP 4– Then enter the configuration as below and validate (IP = 169.254.0.150 and mask = 255.255.0.0), click OK, then click on
Close.

Accessing the Network Module
Installing the Network Management Module – 15
2.5.3.2.2 Accessing the web interface
STEP 1 –Be sure that the Deviceis powered on.
STEP 2 – On the host computer, download the rndis.7z file from the website www.eaton.com/downloads and extract it. For more
information, navigate toServicing the Network Management Module>>>Accessing to the latest Network Module firmware/
driversection.
STEP 3 – Launch setProxy.bat to add 169.254.* in proxy’s exceptions list, if needed. For manual configuration, navigate to Installing
the Network Management Module>>>Accessing the Network Module>>>Modifying the Proxy exception list section in the full
documentation.
STEP 4 –Launch a supported browser, the browser window appears.
STEP 5 –In the Address/Location field, enter: https://169.254.0.1, the static IP address of the Network Module for RNDIS. The log
in screen appears.
STEP 6 –Enter the user name in the User Name field. The default user name isadmin.
STEP 7 –Enter the password in the Password field. The default password isadmin.
STEP 8 –ClickLogin. The Network Module local web interface appears.
2.5.4 Accessing the card through serial terminal emulation
This connection is used to access and configure the Network Module network settings locally through Serial (Serial over USB
interface).

Accessing the Network Module
Installing the Network Management Module – 16
2.5.4.1 Connecting the configuration cable
STEP 1 – Connect the Micro-B to USB cable to a USB connector on the host computer.
STEP 2 – Connect the cable to the Settings connector on theNetwork Module.
2.5.4.2 Manual configuration of the serial connection
STEP 1 –On the host computer,download therndis.7z file from the website www.eaton.com/downloads and extract it.
STEP 2 – Plug the USB cable and go to Windows® Device Manager.
STEP 3 – Check the CDC Serial in the list, if it is with a yellow exclamation mark implying that driver has not been installed follow
the steps 4-5-6-7 otherwise configuration is OK.
STEP 4 – Right click on it and select Update Driver Software. When prompted to choose how to search for device driver software,
choose Browse my computer for driver software. Select Let me pick from a list of device drivers on my computer.
STEP 5 – Select the folder where you have previously downloaded the driver file Click on Next.
STEP 6 – A warning window will come up because the driver is not signed. Select Install this driver software anyway
Serial driver is used to emulate a serial connection from USB.
After the card is connected to the PC, manual configuration of the driver is needed for Windows® OS to discover
the serial connection.

Accessing the Network Module
Installing the Network Management Module – 17
•
•
•
•
STEP 7 – The installation is successful when the COM port number is displayed for the Gadget Serial device in theWindows®
Device Manager.
2.5.4.3 Accessing the card through Serial
It is intended mainly for automated configuration of the network and time settings of the network card. It can also be used for
troubleshooting and remote reboot/reset of the network interface in case the web user interface is not accessible.
CLI can be accessed through:
SSH
Serial terminal emulation.
For more details, refer toInformation>>>CLIsection
2.5.5 Modifying the Proxy exception list
To connect to the Network Module via a USB cable and your system uses a Proxy server to connect to the internet, the proxy
settings can reject the IP address 169.254.0.1.
The 169.254. * Sequence is used to set up communication with devices via a physical connection.
To activate this connection, exceptions will have to be made in the proxy settings.
Open Internet Explorer
Navigate to settings, Internet options;
Changing network parameters may cause the card to become unavailable remotely. If this happens it can only be
reconfigured locally through USB.
You can see this list of available commands by typing in the CLI:
?
You can see the help by typing in the CLI:
help

Configuring the Network Module settings
Installing the Network Management Module – 19
•
•
•
Press OK.
Close Internet Explorer and re-open it.
Now you can access the address 169.254.0.1 with Internet Explorer and any other browser.
2.6 Configuring the Network Module settings
Use the web interface to configure the Network Module. The main web interface menus are described below:
2.6.1 Menu structure
Extend menu display.
Home:Overview and status oftheDevice(Active alarms, Outlet status, ...).
Meters:Power quality meters and logs.
Controls:Device and outlets control.
Protection:Agents list, Agents shutdown sequencing, Shutdown on power outage.
Environment: Commissioning/Status, Alarm configuration, Information.

Configuring the Network Module settings
Installing the Network Management Module – 20
Settings:Network Module settings.
or
Device settings: General information, Settings.
Maintenance:Firmware, Services, Resources, System logs.
FW Display Network module firmware version.
Time Display Network Module local time (not the UTC time).
Table of contents
Other Eaton Network Card manuals

Eaton
Eaton Network Management Card User manual

Eaton
Eaton Network-M2 User manual

Eaton
Eaton Network-M2 User manual

Eaton
Eaton Network-MS User manual

Eaton
Eaton QSNAP User manual

Eaton
Eaton Network Card-MS User manual

Eaton
Eaton POW-R-COMMAND 1000 User manual

Eaton
Eaton DeviceNet Starter Network Adapter D77B-DSNAP User manual

Eaton
Eaton Modbus MS Card User manual

Eaton
Eaton PXGMS Power Xpert Gateway Minislot UPS User manual