Eaton eNMC2 User manual

Eaton is a registered trademark of Eaton Corporation or its subsidiaries and affiliates.
Phillips and Pozidriv are a registered trademarks of Phillips Screw Company.
National Electrical Code and NEC are registered trademarks of National Fire Protection Association, Inc.
Microsoft®, Windows®, and Windows Server® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
UNIX® is a registered trademark of The Open Group.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions.
Google™ is a trademark of Google Inc.
All other trademarks are properties of their respective companies.
©Copyright 2019 Eaton Corporation. All rights reserved.
No part of this document may be reproduced in any way without the express written approval of Eaton Corporation.

1 Table of Contents
1 TABLE OF CONTENTS.........................................................................................................................................4
2 INSTALLING THE NETWORK MANAGEMENT MODULE ...................................................................................9
2.1 Unpacking the Network module.............................................................................................................................................. 9
2.2 Mounting the Network Module............................................................................................................................................... 9
2.3 Accessing the Network Module............................................................................................................................................ 10
2.3.1 Accessing the web interface through Network............................................................................................................... 10
2.3.2 Finding and setting the IP address .................................................................................................................................. 10
2.3.3 Accessing the web interface through RNDIS.................................................................................................................. 11
2.3.4 Accessing the card through serial terminal emulation..................................................................................................... 14
2.3.5 Modifying the Proxy exception list .................................................................................................................................. 16
2.4 Configuring the Network Module settings ............................................................................................................................ 18
2.4.1 Menu structure................................................................................................................................................................ 18
3 CONTEXTUAL HELP OF THE WEB INTERFACE ...............................................................................................20
3.1 Login page............................................................................................................................................................................. 20
3.1.1 Logging in for the first time............................................................................................................................................. 20
3.1.2 Troubleshooting............................................................................................................................................................... 20
3.2 Home..................................................................................................................................................................................... 21
3.2.1 Menu structure................................................................................................................................................................ 22
3.2.2 Energy flow diagram examples ....................................................................................................................................... 24
3.2.3 Access rights per profiles................................................................................................................................................ 31
3.3 Meters................................................................................................................................................................................... 31
3.3.1 Main utility input.............................................................................................................................................................. 32
3.3.2 Second utility input (if available) ...................................................................................................................................... 32
3.3.3 Output ............................................................................................................................................................................. 33
3.3.4 Battery status .................................................................................................................................................................. 33
3.3.5 Battery health .................................................................................................................................................................. 34
3.3.6 Logs................................................................................................................................................................................. 35
3.3.7 Default settings and possible parameters - Meters ........................................................................................................ 35
3.3.8 Access rights per profiles................................................................................................................................................ 36
3.4 Controls ................................................................................................................................................................................. 36
3.4.1 Entire UPS ....................................................................................................................................................................... 36
3.4.2 Outlets - Group 1/ Group 2 .............................................................................................................................................. 37
3.4.3 Scheduled shutdown....................................................................................................................................................... 38
3.5 Protection .............................................................................................................................................................................. 39
3.5.1 Agents list........................................................................................................................................................................ 39
3.5.2 Agent shutdown sequencing........................................................................................................................................... 44
3.5.3 Shutdown on power outage............................................................................................................................................ 47
3.6 Environment .......................................................................................................................................................................... 54
3.6.1 Commissioning/Status..................................................................................................................................................... 54
3.6.2 Alarm configuration ......................................................................................................................................................... 58
3.6.3 Information ...................................................................................................................................................................... 62
3.7 Settings ................................................................................................................................................................................. 63
3.7.1 General ............................................................................................................................................................................ 63
3.7.2 Local users ...................................................................................................................................................................... 70
3.7.3 Remote users.................................................................................................................................................................. 74
3.7.4 Network & Protocol......................................................................................................................................................... 84
3.7.5 SNMP .............................................................................................................................................................................. 91

3.7.6 Certificate ........................................................................................................................................................................ 98
3.8 Maintenance........................................................................................................................................................................ 107
3.8.1 Firmware ....................................................................................................................................................................... 107
3.8.2 Services......................................................................................................................................................................... 110
3.8.3 Resources...................................................................................................................................................................... 116
3.8.4 System logs................................................................................................................................................................... 118
3.8.5 System information ....................................................................................................................................................... 119
3.9 Legal information................................................................................................................................................................. 120
3.9.1 Component.................................................................................................................................................................... 120
3.9.2 Availability of source code............................................................................................................................................. 120
3.9.3 Notice for proprietary elements..................................................................................................................................... 120
3.9.4 Access rights per profiles.............................................................................................................................................. 121
3.10 Alarms ................................................................................................................................................................................. 121
3.10.1 Alarm sorting ................................................................................................................................................................. 121
3.10.2 Active alarm counter...................................................................................................................................................... 122
3.10.3 Alarm details.................................................................................................................................................................. 122
3.10.4 Alarm paging.................................................................................................................................................................. 122
3.10.5 Export ............................................................................................................................................................................ 122
3.10.6 Clear .............................................................................................................................................................................. 122
3.10.7 Alarms list with codes ................................................................................................................................................... 122
3.10.8 Access rights per profiles.............................................................................................................................................. 123
3.11 User profile.......................................................................................................................................................................... 123
3.11.1 Access to the user profile.............................................................................................................................................. 123
3.11.2 User profile.................................................................................................................................................................... 123
3.11.3 Default settings and possible parameters - User profile ............................................................................................... 125
3.11.4 Access rights per profiles.............................................................................................................................................. 126
3.11.5 CLI commands .............................................................................................................................................................. 126
3.11.6 Troubleshooting............................................................................................................................................................. 127
3.12 Documentation.................................................................................................................................................................... 128
3.12.1 Access to the embedded documentation ..................................................................................................................... 128
3.12.2 Access rights per profiles.............................................................................................................................................. 128
4 SERVICING THE NETWORK MANAGEMENT MODULE .................................................................................129
4.1 Configuring/Commissioning/Testing LDAP ......................................................................................................................... 129
4.1.1 Commissioning.............................................................................................................................................................. 129
4.1.2 Testing LDAP authentication......................................................................................................................................... 130
4.1.3 Limitations..................................................................................................................................................................... 130
4.2 Pairing agent to the Network Module ................................................................................................................................. 130
4.2.1 Pairing with credentials on the agent ............................................................................................................................ 131
4.2.2 Pairing with automatic acceptance (recommended if done in a secure and trusted network)...................................... 131
4.2.3 Pairing with manual acceptance.................................................................................................................................... 131
4.3 Powering down/up applications (examples) ........................................................................................................................ 132
4.3.1 Powering down IT system in a specific order ............................................................................................................... 132
4.3.2 Powering down non-priority equipment first................................................................................................................. 135
4.3.3 Restart sequentially the IT equipment on utility recovery ............................................................................................. 138
4.4 Checking the current firmware version of the Network Module......................................................................................... 139
4.5 Accessing to the latest Network Module firmware/driver/script......................................................................................... 139
4.6 Upgrading the card firmware (Web interface / shell script) ................................................................................................. 140
4.6.1 Web interface................................................................................................................................................................ 140
4.6.2 Shell script..................................................................................................................................................................... 140
4.6.3 Example:........................................................................................................................................................................ 140
4.7 Changing the RTC battery cell............................................................................................................................................. 141
4.8 Updating the time of the Network Module precisely and permanently (ntp server) ........................................................... 143
4.9 Synchronizing the time of the Network Module and the UPS............................................................................................. 143

4.9.1 Automatic time synchronization .................................................................................................................................... 143
4.9.2 Manual time synchronization......................................................................................................................................... 143
4.10 Changing the language of the web pages........................................................................................................................... 143
4.11 Resetting username and password..................................................................................................................................... 144
4.11.1 As an admin for other users .......................................................................................................................................... 144
4.11.2 Resetting its own password.......................................................................................................................................... 144
4.12 Recovering main administrator password ........................................................................................................................... 144
4.13 Switching to static IP (Manual) / Changing IP address of the Network Module.................................................................. 145
4.14 Reading device information in a simple way ....................................................................................................................... 145
4.14.1 Web page ...................................................................................................................................................................... 145
4.15 Subscribing to a set of alarms for email notification............................................................................................................ 146
4.15.1 Example #1: subscribing only to one alarm (load unprotected)..................................................................................... 146
4.15.2 Example #2: subscribing to all Critical alarms and some specific Warnings ................................................................. 147
4.16 Saving/Restoring/Duplicating Network module configuration settings ............................................................................... 148
4.16.1 Modifying the JSON configuration settings file............................................................................................................. 148
4.16.2 Saving/Restoring/Duplicating settings through the CLI................................................................................................. 155
4.16.3 Saving/Restoring/Duplicating settings through the Web interface................................................................................ 155
5 SECURING THE NETWORK MANAGEMENT MODULE..................................................................................156
5.1 Cybersecurity considerations for electrical distribution systems ........................................................................................ 156
5.1.1 Purpose ......................................................................................................................................................................... 156
5.1.2 Introduction ................................................................................................................................................................... 156
5.1.3 Connectivity—why do we need to address cybersecurity for industrial control systems (ICS)? .................................. 156
5.1.4 Cybersecurity threat vectors ......................................................................................................................................... 156
5.1.5 Defense in depth........................................................................................................................................................... 157
5.1.6 Designing for the threat vectors.................................................................................................................................... 158
5.1.7 Policies, procedures, standards, and guidelines............................................................................................................ 160
5.1.8 Conclusion..................................................................................................................................................................... 162
5.1.9 Terms and definitions.................................................................................................................................................... 162
5.1.10 Acronyms ...................................................................................................................................................................... 162
5.1.11 References .................................................................................................................................................................... 163
5.2 Cybersecurity recommended secure hardening guidelines ................................................................................................ 164
5.2.1 Introduction ................................................................................................................................................................... 164
5.2.2 Secure configuration guidelines .................................................................................................................................... 164
5.2.3 References .................................................................................................................................................................... 167
5.3 Configuring user permissions through profiles.................................................................................................................... 168
5.4 Decommissioning the Network Management module ....................................................................................................... 168
6 SERVICING THE EMP ......................................................................................................................................169
6.1 Installing the EMP ............................................................................................................................................................... 169
6.1.1 Mounting the EMP ........................................................................................................................................................ 169
6.2 Using the EMP for temperature compensated battery charging......................................................................................... 171
6.2.1 Addressing the EMP...................................................................................................................................................... 171
6.2.2 Commissioning the EMP............................................................................................................................................... 171
6.2.3 Enabling temperature compensated battery charging in the UPS................................................................................. 171
7 INFORMATION.................................................................................................................................................172
7.1 Front panel connectors and LED indicators......................................................................................................................... 172
7.2 Specifications/Technical characteristics .............................................................................................................................. 173
7.3 Default settings and possible parameters........................................................................................................................... 174
7.3.1 Settings ......................................................................................................................................................................... 174
7.3.2 Meters........................................................................................................................................................................... 180
7.3.3 Sensors alarm configuration.......................................................................................................................................... 180
7.3.4 User profile.................................................................................................................................................................... 181

7.4 Access rights per profiles.................................................................................................................................................... 182
7.4.1 Home............................................................................................................................................................................. 182
7.4.2 Meters........................................................................................................................................................................... 182
7.4.3 Controls ......................................................................................................................................................................... 182
7.4.4 Protection ...................................................................................................................................................................... 182
7.4.5 Environment .................................................................................................................................................................. 183
7.4.6 Settings ......................................................................................................................................................................... 183
7.4.7 Maintenance.................................................................................................................................................................. 184
7.4.8 Legal information........................................................................................................................................................... 184
7.4.9 Alarms ........................................................................................................................................................................... 184
7.4.10 User profile.................................................................................................................................................................... 185
7.4.11 Contextual help.............................................................................................................................................................. 185
7.4.12 CLI commands .............................................................................................................................................................. 185
7.5 List of event codes.............................................................................................................................................................. 187
7.5.1 System log codes.......................................................................................................................................................... 187
7.5.2 UPS(HID) alarm log codes ............................................................................................................................................. 191
7.5.3 9130 UPS(XCP) alarm log codes.................................................................................................................................... 196
7.5.4 ATS alarm log codes...................................................................................................................................................... 200
7.5.5 EMP alarm log codes..................................................................................................................................................... 202
7.5.6 Network module alarm log codes.................................................................................................................................. 203
7.6 SNMP traps ......................................................................................................................................................................... 204
7.6.1 UPS Mib ........................................................................................................................................................................ 204
7.6.2 ATS Mib......................................................................................................................................................................... 206
7.6.3 Sensor Mib .................................................................................................................................................................... 207
7.7 CLI ....................................................................................................................................................................................... 207
7.7.1 Commands available...................................................................................................................................................... 208
7.7.2 Contextual help.............................................................................................................................................................. 208
7.7.3 get release info.............................................................................................................................................................. 209
7.7.4 history............................................................................................................................................................................ 209
7.7.5 logout............................................................................................................................................................................. 210
7.7.6 maintenance.................................................................................................................................................................. 210
7.7.7 netconf .......................................................................................................................................................................... 210
7.7.8 ping and ping6 ............................................................................................................................................................... 212
7.7.9 reboot ............................................................................................................................................................................ 213
7.7.10 save_configuration | restore_configuration.................................................................................................................... 214
7.7.11 sanitize........................................................................................................................................................................... 214
7.7.12 ssh-keygen .................................................................................................................................................................... 215
7.7.13 time ............................................................................................................................................................................... 215
7.7.14 traceroute and traceroute6............................................................................................................................................ 216
7.7.15 whoami.......................................................................................................................................................................... 217
7.7.16 email-test....................................................................................................................................................................... 217
7.7.17 systeminfo_statistics..................................................................................................................................................... 218
7.7.18 certificates..................................................................................................................................................................... 219
7.8 Legal information................................................................................................................................................................. 220
7.8.1 Availability of Source Code............................................................................................................................................ 220
7.8.2 Notice for Open Source Elements................................................................................................................................. 220
7.8.3 Notice for our proprietary (i.e. non-Open source) elements.......................................................................................... 221
7.9 Acronyms and abbreviations ............................................................................................................................................... 222
8 TROUBLESHOOTING.......................................................................................................................................225
8.1 Action not allowed in Control/Schedule/Power outage policy............................................................................................. 225
8.1.1 Symptom....................................................................................................................................................................... 225
8.1.2 Possible Cause .............................................................................................................................................................. 225
8.1.3 Action ............................................................................................................................................................................ 225

8.2 Card wrong timestamp leads to "Full acquisition has failed" error message on Software................................................... 225
8.2.1 Symptoms: .................................................................................................................................................................... 225
8.2.2 Possible cause:.............................................................................................................................................................. 225
8.2.3 Action: ........................................................................................................................................................................... 225
8.3 Client server is not restarting .............................................................................................................................................. 225
8.3.1 Symptom....................................................................................................................................................................... 225
8.3.2 Possible Cause .............................................................................................................................................................. 225
8.3.3 Action ............................................................................................................................................................................ 226
8.4 EMP detection fails at discovery stage ............................................................................................................................... 226
8.4.1 Symptom #1.................................................................................................................................................................. 226
8.4.2 Symptom #2.................................................................................................................................................................. 226
8.5 How do I log in if I forgot my password? ............................................................................................................................ 227
8.5.1 Action ............................................................................................................................................................................ 227
8.6 Software is not able to communicate with the Network module........................................................................................ 227
8.6.1 Symptoms ..................................................................................................................................................................... 227
8.6.2 Possible cause............................................................................................................................................................... 227
8.6.3 Setup ............................................................................................................................................................................. 227
8.6.4 Action #1 ....................................................................................................................................................................... 227
8.6.5 Action #2 ....................................................................................................................................................................... 228
8.7 LDAP configuration/commissioning is not working............................................................................................................. 228
8.8 Password change in My profile is not working.................................................................................................................... 228
8.8.1 Symptoms ..................................................................................................................................................................... 228
8.8.2 Possible cause............................................................................................................................................................... 228
8.8.3 Action ............................................................................................................................................................................ 228
8.9 SNMPv3 password management issue with Save and Restore ......................................................................................... 228
8.9.1 Affected FW versions.................................................................................................................................................... 228
8.9.2 Symptom....................................................................................................................................................................... 229
8.9.3 Cause............................................................................................................................................................................. 229
8.9.4 Action ............................................................................................................................................................................ 229
8.10 The alarm list has been cleared after an upgrade................................................................................................................ 229
8.10.1 Symptom....................................................................................................................................................................... 229
8.10.2 Action ............................................................................................................................................................................ 229
8.11 The Network Module fails to boot after upgrading the firmware ........................................................................................ 229
8.11.1 Possible Cause .............................................................................................................................................................. 229
8.11.2 Action ............................................................................................................................................................................ 230
8.12 Web user interface is not up to date after a FW upgrade ................................................................................................... 230
8.12.1 Symptom....................................................................................................................................................................... 230

Unpacking the Network module
Installing the Network Management Module – 9
•
•
•
•
2 Installing the Network Management Module
2.1 Unpacking the Network module
The
Unable to render include or excerpt-include. Could not retrieve page.
will include the following accessories:
QuickStart
USB AM to Micro USB/M/5P 5ft Cable
2.2 Mounting the Network Module
The Network Module is hot-swappable. Inserting and/or extracting the Network Module from the communication slot of theproduct
has no effect on the output.
Remove the two screws securing the option slot cover plate and store the plate for possible future use.
Install theNetwork Module along the alignment channels in the option slot.
Secure the Network Module using the two screws.
Packing materials must be disposed of in compliance with all local regulations concerning waste.
Recycling symbols are printed on the packing materials to facilitate sorting.
It is not necessary to power down theDevice before installing the Network Module. Required tools: No. 2 Phillips
screwdriver.
If theproduct is powered up, you can verify that the Network
Module is seated properly and communicating with theproduct by
checking that the Status ON LEDflashes green after 2 minutes.

Accessing the Network Module
Installing the Network Management Module – 10
•
•
2.3 Accessing the Network Module
2.3.1 Accessing the web interface through Network
2.3.1.1 Connecting the network cable
Connect a standard
gigabit compatible shielded ethernetcable (F/UTP or F/FTP)
between the network connector on theNetwork Module and a
network jack.
2.3.1.2 Accessing the web interface
STEP 1 –On a network computer, launch a supported web browser. The browser window appears.
STEP 2 –In the Address/Location field, enterhttps://
[IPaddress]
with the static IP address of the Network Module.
STEP 3 –The login screen appears.
STEP 4 –Enter the user name in the User Name field. The default user name is admin.
STEP 5 –Enter the password in the Password field. The default password is admin.
STEP 6 –The password must be changed at first login.
STEP 7 –Click Login. The Network Module web interface appears.
2.3.2 Finding and setting the IP address
2.3.2.1 Your network is equipped with a BOOTP/DHCP server (default)
2.3.2.1.1 Read from the device LCD
If your device has an LCD, from the LCD’s menu, navigate to Identification>>>"COM card IPv4".
Note the IP address of the card.
Go to the section: Accessing the web interface through Network.
Security settings in the Network Module may be in their default states.
For maximum security, configure through a USB connection before connecting the network cable.
It is highly recommended that browser access to the Network Module is isolated from outside access using a
firewall or isolated network.
Note: some older Devices may not be able to display the IP address even if they have an LCD. Please consult the
Device manual.

Accessing the Network Module
Installing the Network Management Module – 11
•
•
•
•
•
•
2.3.2.1.2 With web browser throughthe configuration port
For example, if your device does not have an LCD, the IP address can be discovered by accessing the web interface through RNDIS
andbrowsing to Settings>Network.
To access the web interface through RNDIS, see theAccessing the web interface through RNDISsection.
Navigate toContextual help>>>Settings>>>Network & Protocol>>>IPV4.
Read the IPv4 settings.
2.3.2.2 Your network is not equipped with a BOOTP/DHCP server
2.3.2.2.1 Define from the configuration port
The IP address can be defined by accessing the web interface through RNDIS.
To access web interface through RNDIS, see theAccessing the web interface through RNDISsection.
Define the IP settings:
Navigate toContextual help>>>Settings>>>Network & Protocol>>>IPV4.
Select Manual (Static IP).
Input the following information: Address, Subnet Mask, Default Gateway
Save the changes.
2.3.3 Accessing the web interface through RNDIS
This connection is used to access and configure the Network Module network settings locally through a RNDIS(Ethernet over USB
interface).
2.3.3.1 Connecting the configuration cable
1. Connect the Micro-B to USB cable to a USB connector on the host computer.
2. Connect the cable to the Settings connector on theNetwork Module.
2.3.3.2 Web interface access through RNDIS
2.3.3.2.1 Configuring the RNDIS
a Automatic configuration
RNDIS driver is used to emulate a network connection from USB.
After the card is connected to the PC, Windows® OS will automatically search for the RNDIS driver.
On some computers, the OS can find the RNDIS driver then configuration is completed, and you can go to
Accessing the web interface.
On some others it may fail then proceed to manual configuration.

Accessing the Network Module
Installing the Network Management Module – 12
b Manual configuration
STEP 1 –In case Windows® OS fails to find driver automatically, go to theWindows control panel>Network and sharing
center>Local area connection
STEP 2 –Right click on the RNDIS local area connection and select Properties.
STEP 3 –Select Internet Protocol Version 4 (TCP/IPv4)” and press the Properties button

Accessing the Network Module
Installing the Network Management Module – 14
2.3.3.2.2 Accessing the web interface
STEP 1 –Be sure that the Deviceis powered on.
STEP 2 – On the host computer, download the rndis.7z file from the website www.eaton.com/downloads and extract it. For more
information, navigate toServicing the Network Management Module>>>Accessing to the latest Network Module firmware/
driversection.
STEP 3 – Launch setProxy.bat to add 169.254.* in proxy’s exceptions list, if needed. For manual configuration, navigate to Installing
the Network Management Module>>>Accessing the Network Module>>>Modifying the Proxy exception list section in the full
documentation.
STEP 4 –Launch a supported browser, the browser window appears.
STEP 5 –In the Address/Location field, enter: https://169.254.0.1, the static IP address of the Network Module for RNDIS. The log
in screen appears.
STEP 6 –Enter the user name in the User Name field. The default user name isadmin.
STEP 7 –Enter the password in the Password field. The default password isadmin.
STEP 8 –ClickLogin. The Network Module local web interface appears.
2.3.4 Accessing the card through serial terminal emulation
This connection is used to access and configure the Network Module network settings locally through Serial (Serial over USB
interface).

Accessing the Network Module
Installing the Network Management Module – 15
2.3.4.1 Connecting the configuration cable
STEP 1 – Connect the Micro-B to USB cable to a USB connector on the host computer.
STEP 2 – Connect the cable to the Settings connector on theNetwork Module.
2.3.4.2 Manual configuration of the serial connection
STEP 1 –On the host computer,download therndis.7z file from the website www.eaton.com/downloads and extract it.
STEP 2 – Plug the USB cable and go toWindows® Device Manager.
STEP 3 – Check the CDC Serial in the list, if it is with a yellow exclamation mark implying that driver has not been installed follow
the steps 4-5-6-7 otherwise configuration is OK.
STEP 4 – Right click on it and select Update Driver Software. When prompted to choose how to search for device driver software,
choose Browse my computer for driver software. Select Let me pick from a list of device drivers on my computer.
STEP 5 – Select the folder where you have previously downloaded the driver file Click on Next.
Serial driver is used to emulate a serial connection from USB.
After the card is connected to the PC, manual configuration of the driver is needed for Windows® OS to discover
the serial connection.

Accessing the Network Module
Installing the Network Management Module – 16
•
•
•
•
STEP 6 – A warning window will come up because the driver is not signed. Select Install this driver software anyway
STEP 7 – The installation is successful when the COM port number is displayed for the Gadget Serial device in theWindows®
Device Manager.
2.3.4.3 Accessing the card through Serial
It is intended mainly for automated configuration of the network and time settings of the network card. It can also be used for
troubleshooting and remote reboot/reset of the network interface in case the web user interface is not accessible.
CLI can be accessed through:
SSH
Serial terminal emulation.
For more details, refer toInformation>>>CLIsection
2.3.5 Modifying the Proxy exception list
To connect to the Network Module via a USB cable and your system uses a Proxy server to connect to the internet, the proxy
settings can reject the IP address 169.254.0.1.
The 169.254. * Sequence is used to set up communication with devices via a physical connection.
To activate this connection, exceptions will have to be made in the proxy settings.
Open Internet Explorer
Navigate to settings, Internet options;
Changing network parameters may cause the card to become unavailable remotely. If this happens it can only be
reconfigured locally through USB.
You can see this list of available commands by typing in the CLI:
?
You can see the help by typing in the CLI:
help

Configuring the Network Module settings
Installing the Network Management Module – 18
•
•
•
Press OK.
Close Internet Explorer and re-open it.
Now you can access the address 169.254.0.1 with Internet Explorer and any other browser.
2.4 Configuring the Network Module settings
Use the web interface to configure the Network Module. The main web interface menus are described below:
2.4.1 Menu structure
Home:Overview and status oftheDevice(Active alarms, Outlet status, ...).
Meters:Power quality meters and logs.
Controls:Device and outlets control.
Protection:Agents list, Agents shutdown sequencing, Shutdown on power outage.

Configuring the Network Module settings
Installing the Network Management Module – 19
Unable to
render
include or
excerpt-
include.
Could not
retrieve
page.
Environment: Commissioning/Status, Alarm configuration, Information.
Settings:Network Module settings.
Maintenance:Firmware, Services, Resources, System logs.
Legal:Legal information, Availability of source code, Notice for proprietary elements.
Profile:Displays user profile, password change, account information and logout.
Help:Opens full documentation in a separate browser page.
Alarms:Open alarm page and displays the number of active alarms.

Login page
Contextual help of the web interface – 20
•
•
3 Contextual help of the web interface
3.1 Login page
The page language is set toEnglish
by default but can be switched tobrowser language when it is managed.
After navigating to theassigned IP address, accept the untrusted certificate on the browser.
3.1.1 Logging in for the first time
3.1.1.1 1.Enter default password
As you are logging into the Network Module for the first time you must enter the factory set default username and password.
Username = admin
Password = admin
3.1.1.2 2. Change default password
Changing the default password is mandatory and requested in a dedicated window.
Enter your current password first, and then enter the new password twice.
Follow the password format recommendations on the tooltip in order to define a secure password.
3.1.1.3 3. Accept license agreement
On the next step, License Agreement is displayed.
Read and accept the agreement to continue.
3.1.2 Troubleshooting
How do I log in if I forgot my password?
Other manuals for eNMC2
2
Table of contents
Other Eaton Network Hardware manuals

Eaton
Eaton D77A User manual

Eaton
Eaton Halo Home HWB1BLE40AWH User manual

Eaton
Eaton SPD150i User manual

Eaton
Eaton APS6-400 Series Operating instructions

Eaton
Eaton Halohome User manual

Eaton
Eaton INDGW-X2 User manual

Eaton
Eaton AFL User manual

Eaton
Eaton SONiX Pm10 User manual

Eaton
Eaton xComfort CCIA-02/0x User manual