NMC3-EN
NMC3-EN
The information contained in this Publication is provided as is and has been prepared solely for the purpose of
evaluating data center design and construction. This Publication has been compiled in good faith by Schneider
Electric. However, no representation is made or warranty given, either express or implied, as to the
completeness or accuracy of the information this Publication contains.
Copyright, intellectual, and all other proprietary rights in the content (including but not limited to software, audio,
video, text, and photographs) rests with Schneider Electric or its licensors. All rights in the content not expressly
granted herein are reserved. No rights of any kind are licensed or assigned or shall otherwise pass to persons
accessing this information.
Introduction ....................................................................... 1
Product Description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Supported Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
IPv4 initial setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
IPv6 initial setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Network management with Other Applications . . . . . . . . . . . . . . . . . . . 3
LED Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Status LED. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Link-RX/TX (10/100/1000) LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Watchdog Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Network interface watchdog mechanism . . . . . . . . . . . . . . . . . . . . . . . 10
Resetting the network timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Automatic Logout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
How to Log On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
URL address formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
First log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Shutdown Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
For both the UPS and outlet group options . . . . . . . . . . . . . . . . . . . . . 37
Security menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Session Management screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Ping Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Remote Users authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
LDAP screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Configuring the LDAP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
RADIUS screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configuring the RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
TACACS+ screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Configuring the TACACS+ Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Firewall screens. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
802.1X Security Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
SSL Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Notification menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Types of notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Configuring event actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
E-mail notification screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
SNMP Trap Receivers screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
SNMP Traps test screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
General menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Identification screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Date/ Time screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Creating and Importing settings with the config file . . . . . . . . . . . . . . . 77
Configure Links screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
UPS Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Energy Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Firewall Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Verifying Upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Verify the success of the transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Last Transfer Result codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Verify the version numbers of installed firmware . . . . . . . . . . . . . . . . . 95
Changing UI Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
SNMP Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Modbus Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Supported Devices
The Network Management Card 3 is compatible with:
• Smart-UPS® devices with a SmartSlot with the SUM, SURT, SURTA, SURTD, SMT, SMX, and SRT
prefixes, and SUA devices manufactured after 2008 *.
• Single phase Symmetra® UPS devices.
* To view the full list of compatible UPS in which an NMC 3 can be installed, see Knowledge Base
article FA237786.
To configure the TCP/IP settings, see the Network Management Card Installation Guide in printed
form.
For detailed information on how to use a DHCP server to configure the TCP/IP settings at an NMC,
see DHCP response options.
To set User Name and Password values for Administrator, Device User and Read-Only account
types, see Local Users.
If you forget your password, you must use the Reset button on the NMC to wipe all configuration, including the
password. Hold down the Reset button for 20-25 seconds, ensuring the Status LED is pulsing green during this
time. When the Status LED changes to amber or orange, release the Reset button to allow the NMC to
complete its reboot process.
After the NMC reboots, you must re-configure your NMC. For more information, see the Installation Guide or
Knowledge Base article FA156064.
It is recommended you export the .ini file after configuring your NMC to prevent loss of data in the
event of a lost password. For more information, see Retrieving and Exporting the .ini File.
Network
10/100/
1000
Console Reset
Item Description
Network
USB Universal I/O 10/100/
1000
1
2 Console Reset
Item Description
1 Support for NMC and UPS firmware updates and the optional APC
USB Wi-Fi Device (AP9834). See NMC Firmware Upgrades,
USB ports Update the UPS firmware from a USB drive (AP9641, AP9643,
and embedded NMC devices only), and Wi-Fi screen (AP9641,
AP9643, and devices with an embedded NMC3 only).
7 Link-RX/TX (10/100/1000)
See Link-RX/TX (10/100/1000) LED.
LED
8 Status LED An LED (light-emitting diode) is a light source. See Status LED.
Modbus Network
USB Universal I/O TXD
0- 1+ 10/100/
1000
1
2 Console Reset
0- 1+ Com
RxD
Item Description
Support for NMC and UPS firmware updates and the optional APC
USB Wi-Fi Device (AP9834). See NMC Firmware Upgrades,
1 USB ports Update the UPS firmware from a USB drive (AP9641, AP9643,
and embedded NMC devices only), and Wi-Fi screen (AP9641,
AP9643, and devices with an embedded NMC3 only).
Connect temperature sensors, temperature/humidity sensor, relay
2 input/output accessory connector, or Spot Fluid Sensor to the UIO
Universal I/O port
port. The relay input/output accessory has two input contacts and
one output relay.
Connects the NMC to a Building Management System (BMS). Two-
3 terminal block plugs connectors are included (part number 730-
Modbus connector
0532). To verify if your UPS supports Modbus, consult your UPS
documentation.
7 Link-RX/TX (10/100/1000)
See Link-RX/TX (10/100/1000) LED.
LED
8 Status LED An LED (light-emitting diode) is a light source. See Status LED.
For embedded NMC3 devices within a UPS, see the User’s Guide provided with the device for the
placement of the various NMC connections.
Condition Description
Condition Description
Flashing green The NMC is receiving or transmitting data packets at 1000 Mbps.
Watchdog Features
Overview
To detect internal problems and recover from unanticipated inputs, the NMC 3 uses internal, system-wide
watchdog mechanisms. When it restarts to recover from an internal problem, a System: Network Interface
restarted event is recorded in the event log.
Automatic Logout
By default, users will be automatically logged out of the NMC Web and CLI interfaces after 3 minutes of
inactivity. The default logout time for each user can be adjusted through the web interface:
Configuration > Security > Local Users > Management.
– Click the hyperlink of the user name for the account you want to change.
– Under Session timeout, modify the number of minutes.
How to Log On
Overview
You can use the DNS name or the System IP address of the NMC for the URL address of the UI. Use your
case-sensitive user name and password to log on. The password is not shown as it is entered. If the log in is
unsuccessful, an invalid login message will be displayed.
The default user name differs by account type:
• apc for Administrator or Super User
• device for a Device User
• readonly for a Read-Only User
See also Types of user accounts.
You can set your UI language as you log on by choosing a language from the Language drop-down box. For
more information, see Changing UI Language.
When HTTPS is enabled, the NMC generates its own certificate. This certificate negotiates
encryption methods with your browser. Refer to the Security Handbook for more details.
URL format examples. See also TCP/IP settings for IPv6 screen.
HTTP http://Web1
HTTPS https://Web1
System IP address of 139.225.6.133 and a default
Web server port (80)
HTTP http://139.225.6.133
HTTPS https://139.225.6.133
System IP address of 139.225.6.133 and a non-default
Web server port (5000)
HTTP http://139.225.6.133:5000
HTTPS http://139.225.6.133:5000
System IPv6 address of 2001:db8:1::2c0:b7ff:fe00:1100 and
a non-default Web server port (5000)
HTTP http://
[2001:db8:1::2c0:b7ff:fe00:
1100]:5000
Home Screen
Overview
Path: Home
On the Home screen of the interface, you can view active alarms and the most recent events recorded in the
Event Log.
One or more icons and accompanying text indicate the current operating status of the UPS:
Symbol Description
No Alarms: No alarms are present, and the UPS and NMC are operating normally.
Warning: An alarm condition requires attention and could jeopardize your data or
equipment if its cause is not addressed.
At the upper right corner of every screen, the same icons report the UPS status. If any Critical or Warning
alarms exist, the number of active alarms also displays.
To view the entire Event Log, click More Events.
The options below are not available for all UPS devices.
The Status menu options report on the current state of your UPS and network.
You can configure your UPS and network using the Configuration menu options, see Configuring
your Settings: 1 and Configuring your Settings: 2.
Field Description
Last Battery Transfer The cause of the last switch to battery operation. Excludes Self-Test.
Internal Temperature The temperature inside the UPS.
Runtime Remaining How long the UPS can use battery power to support its present load.
UPS Input
Input Voltage The AC voltage (VAC) being received by the UPS.
The AC voltage (VAC) used when the UPS is in bypass mode.
Bypass Input Voltage
This option is not available for all UPS devices.
UPS Output
Output Voltage The AC voltage (VAC) that the UPS is supplying to its load.
Load Current The current, in Amps, supplied by the input voltage.
Output Load The load placed on each phase by the attached equipment, in kVA.
The load placed on each phase by the attached equipment, as a percentage of
Output Percent Load
the kVA available with no redundancy.
Output Percent The load placed on each phase by the attached equipment, as a percentage of
Power the available kVA.
Output Watts The UPS load as a percentage of available Watts.
Output VA The UPS load as a percentage of available VA.
The percentage of the input power going directly out to the load. Input power not
Output Efficiency
going to the load is consumed by the UPS.
The energy used by the load, starting from when the UPS was last reset to
Output Energy Usage
defaults.
Battery Status
The percentage of the UPS battery capacity that is available to support the
Battery Capacity
attached equipment.
Battery Voltage The DC voltage of the batteries.
External Batteries The number of batteries connected to the UPS, excluding any internal batteries.
The options below are not available for all UPS devices.
.
Field Description
Nominal Battery The rated voltage capacity of the UPS batteries; the DC voltage that the batteries
Voltage are rated to supply when the UPS uses its battery for output power.
Actual Battery Bus
The available DC power.
Voltage
External Battery
The battery cabinet Amp-Hour rating of an external battery source.
Cabinet Rating
Batteries The total number of batteries (both internal and external) that the UPS has.
Bad Batteries The number of “bad” batteries (the batteries that need to be replaced).
Battery Current The current being output from the battery.
Next Battery Among the installed UPS battery cartridges, this is the earliest recommended date
Replacement Date for replacing your batteries.
Information about the Intelligence Module. You may be asked for this information
Intelligence Module (Firmware Revision, Manufacture Date, Serial Number, and Hardware Revision)
when seeking assistance from APC Customer Support.
Input Voltage The AC voltage (VAC) being received by the UPS.
Bypass Input Voltage The AC voltage (VAC) used when the UPS is in bypass mode.
Input Frequency The frequency in Hertz (Hz) of the voltage being received by the UPS.
Frequency The frequency in Hertz (Hz) shared by the input voltage and output voltage.
Bypass Frequency The frequency in Hertz (Hz) of the voltage used when the UPS is in bypass mode.
Output Current The current, in Amps, applied to the load.
Output Frequency The frequency in Hertz (Hz) of the output voltage.
Load Power The UPS load as a percentage of available Watts.
Apparent Load
The UPS load as a percentage of available VA.
Power
Information about the modules installed in the UPS. You may be asked for this
Modules information (Firmware Revision, Manufacture Date, Serial Number, and Hardware
Revision) when seeking assistance from APC Customer Support.
Information about the power module installed in the UPS. You may be asked for
Power Module
this information when seeking assistance from APC Customer Support.
The options below are only applicable for UPS devices with the SRTL/SRYLF prefix with an
embedded NMC.
This shows you the UPS runtime remaining, battery charge, voltage, and other useful information.
Field Description
Last Battery Transfer The cause of the last switch to battery operation. Excludes Self-Test.
Runtime Remaining How long the UPS can use battery power to support its present load.
UPS Input
Input Voltage The AC voltage (VAC) being received by the UPS.
Frequency The frequency in Hertz (Hz) being received by the UPS.
UPS Output
Output Voltage The AC voltage (VAC) that the UPS is supplying to its load.
Frequency The frequency in Hertz (Hz) being sent by the UPS.
Load Current The current, in Amps, supplied by the input voltage.
Output VA The UPS load as a percentage of available VA.
Output Watts The UPS load as a percentage of available Watts.
The energy used by the load, starting from when the UPS was last reset to
Output Energy Usage
defaults.
This value indicates how effectively you use electricity. The ideal value is 1, and
Power Factor
anything less than 1 indicates that there are losses in the electrical system.
Output Efficiency The percentage of the input power going directly out to the load. Input power not
going to the load is consumed by the UPS.
Battery Status
State of Charge The percentage of the UPS battery capacity that is available to support the
attached equipment.
Battery Voltage The DC voltage of the batteries.
Health This includes any battery system errors including the individual frame errors.
Errors are logged as events.
Next Battery Among the installed UPS battery frames, this is the earliest recommended date for
Replacement Date replacing your batteries.
The options below are only applicable for UPS devices with the SRYLF prefix with an embedded
NMC.
This page shows you what is present in different positions of the UPS Main Frame. For example: power
module, battery module, intelligence module, external battery frame.
Path: Status > UPS > Power
The options below are only applicable for UPS devices with the SRYLF prefix with an embedded
NMC.
This page shows you the power modules present, their position, and the status of each module.
Path: Status > UPS > Battery
The options below are only applicable for UPS devices with the SRTL/SRYLF prefix with an
embedded NMC.
This provides an overview battery system status and battery frame status.
Field Description
Battery Capacity The percentage of the UPS battery capacity that is available to support the
attached equipment.
Runtime Remaining How long the UPS can use battery power to support its present load.
Nominal Battery The rated voltage capacity of the UPS batteries; the DC voltage that the batteries
Voltage are rated to supply when the UPS uses its battery for output power.
Actual Battery Bus
The available DC power.
Voltage
Maximum Battery
Temperature Over All The highest temperature of all the installed modules.
Modules
Minimum Battery
Temperature Over All The lowest temperature of all the installed modules.
Modules
Maximum Cell
The highest voltage of all the cells in all of the installed modules.
Voltage
Minimum Cell
The lowest voltage of all the cells in all of the installed modules.
Voltage
Battery Frame Status
The status of the battery frame, including the statuses of the individual frame.
Status Other than OK, this value can signal the battery is near end of its life, or the battery
lifetime is exceeded for the pack. Errors are logged as events.
Critical If there is a value higher than 0 displayed, there is a battery frame issue that
should be addressed immediately.
Warning If there is a value higher than 0 displayed, there is a battery frame issue that may
need to be addressed.
Good If there is a value higher than 0 displayed, everything is working as expected.
Vacant If there is a value higher than 0 displayed, there is no battery module installed in a
slot.
Click on Main or XRn / Battery Frame n to reach the Battery Status: Main Frame / Battery Status: Battery
Frame n screen.
Field Description
Module The battery module and its location within the frame.
Status The status of the battery frame. Other than OK, this value can signal the battery is
near end of its life, or the battery lifetime is exceeded. Errors are logged as events.
Health This includes any battery system errors. Errors are logged as events.
Last Battery The date when the battery was last replaced.
Replacement
The options below are only applicable for UPS devices with the SRYLF prefix with an embedded
NMC.
This page shows you the intelligence modules present, their position, and the status of each module.
Field Description
Field Description
Temperature & Humidity displays the name, alarm status, temperature, and humidity (if supported) for each
sensor. Click the name of a sensor to edit the name and location and to configure its thresholds and its
hysteresis. For more information, see Temperature and Humidity screen.
Input Contacts displays the name, alarm status, and state (open or closed) of each contact. These are
automatically found and displayed here when you install the environmental accessory. Click the name of an
input contact for detailed status or to configure its values. If contacts are configured and disabled, they do not
display here. For more information, see Input Contacts screen.
Output Relay displays the name and state (open or closed) of each relay. These are automatically found and
displayed here when you install the environmental accessory. Click the name of an output relay for detailed
status or to configure its values. For more information, see Output Relay screen.
Fluid Sensor displays the name, alarm status and state (Fluid Detected or No Fluid) of each fluid sensor.
These are automatically found and displayed here when you install the environmental accessory. Click the
name of the fluid sensor for detailed status or to configure its values. For more information, see Fluid Sensor
screen.
Recent Environmental Events displays events that are related to your environmental monitoring, for example
a temperature threshold violation or a warning message about an environmental monitor input contact. Click
the More Events link to see a full list of recent events.
The options below are not available for all UPS devices.
The Control menu options enable you to take immediate actions affecting your UPS and your outlets, and they
also have some security and network functions. See the following sections:
• UPS on Control menu
• Outlet Groups on Control menu
• Security on Control menu
• Network on Control menu
For UPS with Outlet Groups, this is greyed out if no PowerChute clients exist (see
PowerChute Network Shutdown clients).
Signal
Select this option to notify all servers configured as PowerChute Network Shutdown
PowerChute
clients that are in communication with this UPS to shut down according to the values
Network
configured for PowerChute Network Shutdown Parameters (see Shutdown on
Shutdown
Configuration menu).
Clients
However, this option will not notify servers when performing any bypass control
actions.
This option is available for UPS with Outlet Groups only.
Skip outlet off Turn off outlets immediately, skipping the configured Outlet Group delays.
delays You might want to do this in an emergency or to save runtime. Or the load devices
might already have been turn off manually.
Action Description
For more information about the delays and settings, see Shutdown on Configuration menu and
Outlet Groups on Control menu.
Action Description
Restarts the attached equipment by doing the following. (Click Next to see specific
details on timing and delays).
• Turns off power at the UPS.
Reboot UPS
Turns on power at the UPS after the UPS battery capacity returns to at least the
percentage configured for Minimum Battery Capacity (Configuration - Shutdown -
End of Shutdown, see Controlled Early Shutdown and End of Shutdown).
Turns on power at the UPS. The option only displays when the UPS is turned off.
Turn UPS On
Click Next to see specific details on timing and delays.
Turns off the output power of the UPS immediately, without a shutdown delay. The
Turn Off UPS
UPS remains off until you turn it on again.
Puts the UPS into sleep mode by turning off its output power for a defined period of
time. Click Next to see specific details on timing and delays.
• The UPS turns off output power after waiting the time configured Shutdown
Put UPS To Sleep
delays and PowerChute Network Shutdown
• When input power returns, the UPS turns on output power after the configured
Sleep Time.
Put UPS In Bypass These options control the use of bypass mode, which allows maintenance to be
and Return UPS performed at some Smart-UPS devices without turning off power at the UPS.
from Bypass Click Next to see specific details on timing and delays.
These options are only available for Symmetra UPS and some Smart-UPS device.
Use this option to turn on, turn off, or restart individual outlet groups as distinct from the UPS device.(This
screen lists by name and state each UPS outlet group that has been configured through the Configuration -
Outlet Groups option, see Outlet Groups on Configuration menu).
You can select any of the following actions (or no action) for each outlet group. These are one-time actions.
• When the state of the outlet group is off:
– On Immediately
– On with Delay: Turn on the outlet group after the number of seconds configured as Power On
Delay. (For more information, see Shutdown on Configuration menu)
Action Description
Reboot Restarts the management interface (e.g. the Web user interface, the CLI) by logging
Management you off.
Interface The UPS and NMC devices are not rebooted.
Caution:This resets all configurable values to their defaults.
• If you do not select Exclude TCP/IP, all configured values and settings are reset
to their default values, including the setting that determines how this device must
obtain its TCP/IP configuration values and the EAPoL configuration. The default
Reset All1
for TCP/IP configuration settings is DHCP and that for EAPoL access is disabled.
• If you select Exclude TCP/IP, all configured values and settings except the setting
that determines how this device must obtain its TCP/IP and the EAPoL
configuration values are reset to their default values.
TCP/IP: Resets only the setting that determines how this device must obtain its
TCP/IP configuration values including the EAPoL configuration which is reset to
disabled. The default for TCP/IP configuration setting is DHCP and that for EAPoL
access is disabled.
The options below are not available for all UPS devices.
With the Configuration menu options, you can set fundamental operational values for your UPS and NMC.
See the sections below and also Configuring your Settings: 2.
• Outlet Groups on Configuration menu
• Power Settings on Configuration menu
• Shutdown on Configuration menu
• UPS General screen
• Self-Test Schedule screen
• Shutdown Scheduling
• Firmware Update screens
• PowerChute Network Shutdown clients
• Universal I/O screens
• Security menu
NOTE: You can view some of your configuration settings via the Configuration Summary screen
(Configuration > Network > Summary).
Main Outlet Groups. Some UPS devices provide AC utility power to one Main Outlet Group. The Main Outlet
Group controls the distribution of power to all Switched Outlet Groups (if present) for the UPS.
• If the Main Outlet Group is off, the Switched Outlet Groups cannot be turned on.
• If you turn off the Main Outlet Group, the UPS turns off the Switched Outlet Groups before it turns off
the Main Outlet Group.
• To turn on a Switched Outlet Group, the UPS must turn on the Main Outlet Group first.
Field Description
When this outlet group is on, it waits this delay in seconds before turning off. By
Power Off Delay setting different times here for outlets, you can sequence their turn-offs, that is, you
can specify the order in which they turn off.
Reboot Duration The outlet waits this amount of time before rebooting.
When this outlet group is off and receives a signal to turn on, it waits this delay in
Power On Delay seconds before turning on. By setting different times here for outlets, you can
sequence their turn-ons.
Min Return The minimum amount of time the UPS must be able to support the load before it can
Runtime turn on again.
Load-shedding options. Load shedding enables you to specify conditions that cause individual Switched
Outlet Groups to lose power.
NOTE: If you are using PowerChute Network Shutdown to manage your UPS, it is not
recommended to use the NMC load-shedding options, which may conflict with the Outlet Group
settings specified in PowerChute.
An example of using load shedding would be for turning off non-critical loads like monitors when the UPS is
running on battery or is overloaded. This would preserve the battery charge and the runtime for essential
loads. Another example would be to disable an automatic restart after an overload in order to investigate the
cause of the overload before turning the outlet group back on.
The options enable you to shut down an outlet group when ANY of the conditions that you specify are met:
• When the time on battery exceeds a set number of minutes.
• When the runtime remaining of the UPS is less than a set number of minutes. (Runtime is how long the
UPS can use battery power to support its present load).
• The UPS is overloaded (the power demand of the devices connected to the UPS exceeds the amount
of power the UPS can provide).
You can also enable these actions:
• Skip outlet off delay. (Turn the outlet group off immediately, without waiting the number of seconds
configured as Power Off Delay. By default, this option is disabled.)
• Stay off after power returns. (Remain off when AC utility power returns. By default, this option is
disabled, and the UPS waits the number of seconds configured as Power On Delay, then turns on the
outlet groups.)
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is Configuration >
UPS > Power Settings.
The Rated Output Voltage is the AC voltage the UPS supplies to the load, while the UPS is on battery. You
can configure the following types of device-specific items:
• Upper and Lower Voltage settings determine the ranges at which the UPS automatically regulates
battery output to the load. This protects the load.
When the upper voltage is breached, the UPS uses its AVR Trim feature; when the lower voltage is
breached, the UPS uses its AVR Boost feature (or it switches to battery operation if the UPS does not
have AVR Boost).
• Enabling Green Mode runs the UPS in bypass, which uses energy more efficiently. However, in green
mode the speed of transferring to the UPS battery power when necessary is slower. If your
environment needs a fast switching time, you can disable green mode.
• The UPS reacts to input power line noise by going on battery. The Sensitivity setting changes the time
the UPS takes to react to line noise. Use the Reduced and Low options to allow the UPS to accept a
noisy power input for a longer time, before going on battery. Use Low when the input power is known to
have a lot of noise on the line, e.g. input power supplied by a generator.
• Output Watt Rating: the maximum power rating to meet the requirements of your load devices
• Bypass settings define conditions under which the UPS can switch to bypass mode
• Alarm thresholds are based on available runtime and redundant power and on UPS load.
• Output Frequency Range: the range within which the UPS will continue to operate online without
switching to on battery.
• Output Frequency Slew Rate: the maximum amount that the output frequency can change over a
given time period when the UPS is acquiring phase lock with the input source. This is expressed in Hz/
s (Hertz / second).
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is Configuration >
UPS > Shutdown.
Use this screen to configure the parameters of a UPS shutdown. See the table below and also Controlled
Early Shutdown and End of Shutdown.
Start of Shutdown
Define the delays and durations that are considered when a UPS shutdown is required.
Field Description
For a UPS on battery, this defines a runtime remaining threshold, below which a low
battery condition is triggered on the UPS. For example, if the Low Battery Duration is
set to ten minutes and the UPS predicted runtime remaining reaches ten minutes or
Low Battery below, a low battery condition is triggered. If input power is not restored to the UPS, it
Duration will turn off when the battery has exhausted.
A low battery condition will trigger a shutdown on all PowerChute Network Shutdown
clients associated with the NMC.
Calculates the delay needed to ensure that each PowerChute client has enough time
to shut down gracefully when the UPS or the PowerChute client initiates a graceful
shutdown.
Maximum • It is the longest shutdown delay needed by any server listed as a PowerChute
Required Delay Network Shutdown client.
• It is calculated whenever the management interface of the UPS turns on or is reset,
or when the Force Negotiation option is selected and you click Apply.
See Shutdown delays and PowerChute Network Shutdown.
Field Description
Enable Basic Signaling Shutdown if you have connected a server, workstation or third
Basic Signaling
party system to your UPS using a basic signaling cable. Enable it if your UPS does
Shutdown
not support advanced signaling, or is configured to communicate in basic signaling.
For a UPS on battery, this defines a runtime remaining threshold, below which a low
battery condition is triggered on the UPS. The UPS will then:
• Display the low battery notification on the UPS display.
Basic Low • Send the low battery notification from the UPS to connected devices via the simple
Battery Duration signaling cable.
If input power is not restored to the UPS, it will turn off when the battery has
exhausted. This duration is available for SMT, SMX, SRC, SURTD, and SRT Smart-
UPS models only.
Defines a specific duration that the UPS will wait before shutting down, following a
basic shutdown notification. When this duration elapses, the UPS will shut down,
Basic Shutdown irrespective of battery runtime remaining.
Delay
This delay is available for certain SMT, SMX, SRC, SURTD, and SRT Smart-UPS
models only.
Duration of Shutdown
Specify the length of time for which the UPS is powered off.
Field Description
Defines how long the UPS keeps its output power turned off when you issue a UPS/
Outlet Group Sleep command. When the UPS/Outlet Group turns off, it will turn back
on following the Sleep Time defined here, plus the Return Time or Power On Delay for
Sleep Time Outlet Groups. If utility power has not been restored at this point, the UPS will wait
until it is restored to turn back on. See Outlet Groups on Configuration menu.
The Sleep command can be issued via the UPS display, the UPS on Control menu,
via SNMP command or via PowerChute Business Edition.
Field Description
Enabling Force Negotiation resets the Maximum Required Delay value to match the
Low Battery Duration. An updated status packet is sent by the NMC to all of the
registered PowerChute agents. PowerChute then compares the Low Battery Duration
sent in that packet to its total required shutdown time and increases the Maximum
Required Delay accordingly, or the Power Off Delay for the Outlet Group with which it
is registered.
Maximum PowerChute does a runtime remaining verification check every 30 seconds, which
Required Delay - compares the PowerChute total shutdown time required to the NMC Low Battery
Force Negotiation Duration.
Selecting Force Negotiation will reset the Power Off Delay for all Outlet Groups to the
same value as Low Battery Duration.
Force Negotiation can take up to ten minutes to calculate the value required by all of
the PowerChute clients registered on the NMC. For more information see Shutdown
delays and PowerChute Network Shutdown.
Notes:
•If a shutdown has been triggered by a Low Battery condition, the Low Battery Duration value takes
precedence over Maximum Required Delay.
•As an exception, UPS models with the prefix SUM that have Outlet Groups use the UPS without
Outlet Groups method to calculate the UPS shutdown time.
UPS with Outlet Groups. For a UPS WITH outlet groups, the shutdown time is the Power Off Delay value
on the NMC Outlet Groups screen, see Outlet Groups on Configuration menu. (Not available with all UPS
devices).
Outlet Group turn off Outlet Group off
starts
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is Configuration >
UPS > General.
This screen is not available for all UPS devices.
Some of the options explained below might NOT display for some UPS devices.
Field Description
Specify the level of access allowed to the UPS device’s LCD display:
• Locked: All menu items at the LCD display are greyed out except
Status, Configuration, Logs, and About and you cannot make any
configuration changes.
User Mode
• Unlocked: All menu items at the LCD display are accessible.
• Authentication needed: You must provide the UPS device’s
username and password to make any configuration changes via the
LCD display.
Last Battery
Enter the month and year of the most recent UPS battery replacement.
Replacement
Number of Batteries The number of batteries, excluding built-in batteries, that the UPS has.
Some devices that have more than 16 batteries must add batteries in
or
quantities of 16 (e.g., 16, 32, 48, etc.), but can then be adjusted to the
External Batteries correct value.
External Battery
The battery cabinet Amp-Hour rating of an external battery source.
Cabinet
With this field, you can change the speed by which the UPS batteries are
charged, in percentage terms. Here, 100% represents the manufacturer's
recommended rate of charge. For example, to double the charge rate set
this value to 200%.
For example, when the Battery Charger Rate is set to 100%:
• If total battery capacity is increased, the battery charging current
supplied by the UPS battery charger will automatically increase to meet
the 100% charger rate - you do not need to change the Charger Rate.
Battery Charger Rate
• If total battery capacity is decreased, the battery charging current
supplied by the UPS battery charger will automatically decrease to
meet the 100% charger rate - you do not need to change the Charger
Rate.
See your UPS User Guide for more information on Battery Capacity.
Caution: Charging at too high a rate can result in boiling and/or venting of
electrolytes and/or high gas pressure. Do not change this setting unless
you have strong background knowledge in this area.
Indicate the battery type where VRLA is Valve Regulated Lead Acid and
Battery Type
Vented Cell is a wet cell type battery (as used in cars).
Use this setting to specify the total capacity of your UPS batteries,
between 7 and 200 ampere hours (Ah). This is used to estimate runtime
and determine the current needed to charge the batteries. If your UPS has
Total Battery Capacity
the Total Battery Capacity option available, update the value for Total
Battery Capacity when you add batteries to or remove batteries from your
UPS. See your UPS User Guide for more information on Battery Capacity.
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is Configuration >
UPS > Self-Test Schedule.
Use this option to define when your UPS will initiate a self-test.
Shutdown Scheduling
Path: Configuration > Scheduling
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is Configuration >
UPS > Scheduling.
This option is not available for all UPS devices. Self-test schedule options are not the same for all
UPS devices.
NOTE: Do not create shutdown schedules that overlap. An example of an overlapping shutdown
schedule is a Weekly Shutdown set from 8pm to 9pm, and a One-time Shutdown set from 8.10pm
to 8.30pm. Overlapping shutdown schedules result in unknown and untested behavior.
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is Configuration >
UPS > Firmware Update > Upload.
This option is not available for all UPS devices.
The update here refers to the firmware on the UPS. Do not confuse this with an NMC firmware
upgrade (For more information, see NMC Firmware Upgrades).
Follow the instructions on the Firmware Update screen to determine if the output of your UPS
needs to be turned off in advance of a firmware update. This is specific to the UPS model.
NOTE: To view the Firmware Update screen with Internet Explorer ®, use version 10 or higher,
with compatibility view turned off. The Firmware Update screen is not compatible with the Edge ®
browser.
Follow these steps to update the firmware. (See also Update the UPS firmware from a USB drive (AP9641,
AP9643, and embedded NMC devices only) and Using FTP to update the UPS firmware for alternative
ways).
1. See the Knowledge Base article IDs FA164737 and FA170679 for information on obtaining a firmware
update file and further instructions.
2. Choose Configuration > Firmware Update.
3. Click on the button to locate the downloaded update file on your computer.
4. Click the Update UPS button to update the UPS firmware.
5. When the update finishes, check the status under Last Update Result and Current Version, or in the
Event Log.
1. See the Knowledge Base article IDs FA164737 and FA170679 for information on obtaining a firmware
update file and further instructions.
2. FTP the update file onto the card’s upsfw directory to start the firmware update process.
The FTP firmware transfer might be aborted if the update file is corrupted or not applicable to the UPS.
Here's an example of loading an update file using the DOS FTP command:
$ ftp <NMC Network Address Here>
Connected to <NMC Network Address>.
220 AP9641 Network Management Card AOS vX.Y.Z FTP server ready.
The options below are only applicable for UPS devices with the SRTL/SRYLF prefix with an
embedded NMC.
Specify when to switch to the new UPS firmware: only in manual bypass or when the output power is off after
download (not supported on all UPS devices / UPS firmware revisions), only when output power is off after
download, or manually.
NOTE: PowerChute cannot connect to the NMC if HTTP is disabled on the NMC. See Web access
screen to enable HTTP or HTTPS.
Field Description
Alarm Normal if this input contact is not reporting an alarm, or the severity of the alarm if this
Status input contact is reporting an alarm. If not enabled for a contact, it displays Disabled.
State The present state of this input contact: Closed or Open.
Normal
The normal (non-alarm) state of this input contact: Closed or Open.
State
The severity of the alarm that the abnormal state of this input contact generates:
Severity
Warning or Critical.
Field Description
Field Description
Alarm Normal if this fluid sensor is not reporting an alarm, or Critical if this fluid sensor is
Status reporting an alarm. If not enabled for a fluid sensor, it displays Disabled.
State The state of this sensor: Fluid Detected or No Fluid.
Ping Response
Path: Configuration > Security > Ping Response
Enable the IPv4 Ping Response check box to allow the Network Management Card 3 to respond to network
pings. This does not apply to IPv6.
Local Users
Use these menu options to view, and to set up access and individual preferences (like displayed date format),
to the NMC user interfaces. This applies to users as defined by their logon name.
Path: Configuration > Security > Local Users > Management
Setting user access. With this option an administrator or super user can list and configure the users allowed
access to the UI. Click on the name link to view details, and to edit or delete a user.
Click on Add User to add a user. On the resulting User Configuration screen, you can add a user and
withhold access by clearing the Access check box. The maximum length for both the name and password is
64 bytes, with less for multi-byte characters. You have to enter a password.
Values greater than 64 bytes in Name and Password might get truncated.
To change a Super User setting, you must enter the current password. Passwords can be no longer
than 64 ASCII characters.
Use Session Timeout to configure the time that this UI waits before logging off this user (three minutes by
default). If you change this value, you must log off for the change to take effect.
Serial Remote Authentication Override: By selecting this, you can bypass remote authentication protocols
by using the serial console (CLI) connection. This screen enables it for the selected user, but it must also be
enabled globally to work, through Session Management screen.
For more information, see Configuration > Security > Local Users > Default Settings below. For
background information on accounts see Types of user accounts.
Export Log Format: Exported log files can be formatted using CSV (comma-separate values), or tabs. See To
display the Event Log.
Select the temperature scale for measurements in this UI. US Customary corresponds to Fahrenheit and
Metric corresponds to Celsius.
You can specify the default language for the UI with the Language field. This can be set when you log on also.
You can also specify different languages for e-mail recipients and SNMP trap receivers. For more
information, see E-mail recipients and Trap Receivers.
Path: Configuration > Security > Local Users > Default Settings
Setting up defaults can make adding users quicker. Use this option to set defaults for the many options on the
Management screen, see Configuration > Security > Local Users > Management above.
The following authentication and authorization functions of LDAP (Lightweight Directory Access Protocol),
RADIUS (Remote Authentication Dial-In User Service), and TACACS+ (Terminal Access Controller Access
Control System) are supported:
• When a user accesses the NMC or other network-enabled device that has RADIUS or TACACS+
enabled, an authentication request is sent to the server to determine the user’s permission level.
• LDAP, RADIUS, and TACACS+ user names are limited to 64 characters with the NMC.
Setting Description
If Local Authentication is set to Off, and the authentication servers are unavailable,
improperly identified, or improperly configured, remote access is unavailable to all users. To
regain access, you must use a serial connection to the command line interface and change
the access setting to local, radiusLocal or tacacs+Local
For example, the command to change the access setting to local would be:
userauth -a local
For RADIUS server, see RADIUS screen below and Configuring the RADIUS Server.
For TACACS+ server, see TACACS+ screen below and Configuring the TACACS+ Server.
For LDAP server, see LDAP screen below and Configuring the LDAP Server.
An LDAP URI representing the location of a user object to initially bind to. This user
object must have permission to search the LDAP database for users. During a user
login attempt, the LDAP server in this URI is connected to and a bind to the DN is
performed with the password provided in "Search User Password". If this bind is
successful, the user attempting to login is then searched for.
This LDAP URI must include a scheme of either "ldap" or "ldaps". When "ldaps" is
used, then the TLS connection is implicit and the TCP connection defaults to using port
636. When "ldap" is used, then the TLS connection is initiated by sending a StartTLS
request and the TCP connection defaults to using port 389. Use of "ldaps" is non-
standard and discouraged.
This LDAP URI may include the address of the LDAP server and optionally the port
number. The DN of the search user object follows. If the search user DN ends with DC
components, then a DNS lookup of the SRV record for the LDAP service at this domain
is performed. If the SRV record is found, then it is used instead of the host specified in
the URI. If the SRV record is not found, then the host specified in the URI is used. The
host component of the URI may be omitted if the SRV record for LDAP is known to
exist.
If the DN is omitted, then the host component must be present and an anonymous bind
is performed.
Examples:
Search User URI • "ldap://ldap.domain.com/CN=searchuser,OU=users,DC=domain,DC=com
If DNS is available, a DNS lookup of the SRV record for the LDAP service at
domain.com is performed. If it is found, then it is connected to. If it is not found, then
"ldap.domain.com" at port 389 is connected to. TLS is then established after
sending a StartTLS request, and then a bind to the object
"CN=searchuser,OU=users,DC=domain,DC=com" with the password specified in
Search User Password is performed. From here a search for the user logging in is
performed.
• "ldap:///CN=searchuser,OU=users,DC=domain,DC=com
If DNS is available, a DNS lookup of the SRV record for the LDAP service at
domain.com is performed. If it is found, then it is connected to. If it is not found, then
no connection is made because the host component of the URI is omitted and LDAP
authentication cannot proceed. If the connection is successful, then StartTLS, bind,
and search are performed as described above.
• "ldaps://ldap.domain.com
"ldap.domain.com" at port 636 is connected to and a TLS handshake is immediately
performed without sending a StartTLS request. If this succeeds, then an anonymous
bind is performed. From here a search for the user logging in is performed.
• "ldap://ldap.domain.com:42/CN=searchuser,OU=users,DC=domain,DC=com
• This is the same as the first example except that if the SRV record is not found then
"ldap.domain.com" at port 42 is connected to.
The password to use in the initial bind request to the search user as described
Search User
above. If left blank, then either an anonymous or unauthenticated bind is
Password
performed depending on whether or not a search user DN is provided.
The timeout in seconds to use when connecting to and communicating with the
LDAP server. The initial TCP connection must complete within this amount of
time. If it does, then each LDAP response from the server must be received
Reply Timeout within this amount of time following each LDAP request. Because a single
LDAP authentication can consist of multiple requests (and even to multiple
servers if referrals are chased) the overall authentication time may end up
being much longer than the timeout value specified here.
This is the DN of the base object entry under which all users who login must
Users Base DN
exist.
This is the DN of the base object entry under which the user groups specified in
Groups Base DN
the following settings must exist.
This is the common name (CN) of the LDAP group to which NMC
Admins Group
Administrators are members of. If the user logging in is a member of this group,
Name
then the user is granted Administrator access.
This is the common name (CN) of the LDAP group to which NMC Device Users
Device Users
are members of. If the user logging in is a member of this group, then the user
Group Name
is granted Device User access.
This is the common name (CN) of the LDAP group to which NMC Network
Network Users
Users are members of. If the user logging in is a member of this group, then the
Group Name
user is granted Network User access.
This is the common name (CN) of the LDAP group to which NMC Read Only
Read Only Users
Users are members of. If the user logging in is a member of this group, then the
Group Name
user is granted Read Only User access.
If this is enabled, then LDAP directories containing users of the "User" class
Active Directory
and groups of the "Group" class following the standard Active Directory
Schema
schema will be supported.
If this is enabled, then LDAP directories containing users of the "posixAccount"
RFC2307 POSIX
class and groups of the "posixGroup" class following the schema defined in
Schema
RFC 2307 will be supported.
If this is enabled, then LDAP directories containing users of the "uidObject"
RFC4519 User class and groups of either the "groupOfNames" class or the
Schema "groupOfUniqueNames" class following the schema defined in RFC 4519 will
be supported.
RFC2798 If this is enabled, then LDAP directories containing users of the
inetOrgPerson "inetOrgPerson" class as defined in RFC 2798 will be supported.
If this is enabled, then LDAP directories containing users of classes that do not
Custom User conform to any of the supported classes above can be supported. When this is
Class enabled, the settings Custom User Class Name and Custom User Username Attr
must be provided, and Custom User Group Number Attr may optionally be provided.
RADIUS screen
Path: Configuration > Security > Remote Users > RADIUS
You can use a RADIUS server to authenticate remote users.Use this option to do the following:
• List the RADIUS servers (a maximum of two) available to the NMC and the time-out period for each.
• Configure the authentication parameters for a new or existing RADIUS server by clicking on a Radius
Server link.
RADIUS Server The server name or IP address of the primary or secondary RADIUS server.
The port number of the primary or secondary RADIUS server.
Port NOTE: RADIUS servers use port 1812 by default to authenticate users. The
NMC supports ports 1 to 65535.
Secret The shared secret between the RADIUS server and the NMC.
The time in seconds that the NMC waits for a response from the RADIUS
Reply Timeout
server.
Enter the Administrator user name and password in order to test the RADIUS
Test Settings
server path that you have configured.
Skip Test and
Do not test the RADIUS server path.
Apply
See also Remote Users authentication above and Configuring the RADIUS Server below.
TACACS+ screen
Path: Configuration > Security > Remote Users > TACACS+
You can use a TACACS+ server to authenticate remote users. Use this option to do the following:
• List the TACACS+ servers (a maximum of two) available to the NMC and the time-out period for each.
• Configure the authentication parameters for a new or existing TACACS+ server by clicking on a
TACACS+ Server link.
TACACS+ Server The server name or IP address of the primary or secondary TACACS+ server.
The port number of the primary or secondary TACACS+ server.
Port NOTE: TACACS+ servers use port 49 by default to authenticate users. The
NMC supports ports 1 to 65535.
Secret The shared secret between the TACACS+ server and the NMC.
The time in seconds that the NMC waits for a response from the TACACS+
Reply Timeout
server.
Enter the Administrator user name and password in order to test the TACACS+
Test Settings
server path that you have configured.
Skip Test and
Do not test the TACACS+ server path.
Apply
See also Remote Users authentication above and Configuring the TACACS+ Server below.
Specify a value between 0 and 15. If an authorized user's privilege level (priv-lvl
Read-Only User authorization argument) is greater than or equal to the specified value, and less than
Privilege Level the Administrator Privilege Level, then the user will be granted read-only access.
This value must be less than the Administrator Privilege Level.
Specify a value between 0 and 15. If an authorized user's privilege level (priv-lvl
Administrator authorization argument) is greater than or equal to this then the user will be granted
Privilege Level administrator access. This value must be greater than the Read-Only User Privilege
Level.
See more information on configuring the TACACS+ server in the Security Handbook.
Firewall screens
Path: Configuration > Security > Firewall > Configuration
Enable or disable the firewall functionality. The configured policy is listed by default. Select the Enable check
box to enable the firewall. The check box is un-checked by default.
• Click Apply to confirm a firewall policy you have selected to enable. The Firewall Confirmation page
will open.
– The Confirmation page contains a recommendation to test the firewall before enabling. It is not
mandatory.
– The first hyperlink goes to the Firewall Policy page.
– The second hyperlink goes to the Firewall Test page.
– Click on Apply to enable the firewall and return to the Configuration page.
– Click on Cancel to return to the Configuration page without enabling the Firewall.
• Click Cancel: No new selection will be enabled. You stay on the Configuration page.
1. Select the policy you want to edit from the Policy Name drop-down list, and click Edit Policy.
2. Click Add Rule or select the Priority of an existing rule to go to the Edit Rule page. From this page,
you can change the rule settings or delete the selected rule.
Setting Description
If 2 rules conflict, the rule with the higher priority will determine what happens.
Priority
The highest priority is 1; the lowest is 250.
host: In the IP/any field, you will enter a single IP address.
Type subnet: In the IP/any field, you will enter a subnet address.
range: In the IP/any field, you will enter a range of IP addresses.
Specify the IP address or range of addresses this rule applies to, or select one
of the following:
IP/any • any: The rule applies regardless of the IP address.
• anyipv4:The rule applies for any IPv4 address.
• anyipv6:The rule applies for any IPv6 address.
Specify a port the rule will apply to.
• None: The rule will apply to any port.
Port
• Common Configured ports: Select a standard port.
• Other: Specify a non-standard port number.
It is recommended that you add one of the following as the lowest priority rule in your firewall policy:
• To use the firewall as an allowlist, add
priority 250, destination host any, source host any, protocol any, action
discard
• To use the firewall as a blocklist, add
priority 250, destination host any, source host any, protocol any, action
allow
Delete a policy:
Select Delete Policy to open the Confirm Deletion page.
Click Apply to confirm, and the selected firewall file is removed from the file system.
Setting Description
SSL Certificates
Path: Configuration > Security > SSL Certificates
The NMC supports TLS (Transport Layer Security) and SSL (Secure Sockets Layer) which provide
a layer of security on top of TCP by adding authentication and encryption to the connection. To support TLS/
SSL connections, the NMC provides a certificate store to which both X.509 certificates and private keys can be
uploaded. Both CA (Certificate Authority) certificates and end entity certificates may be uploaded.
A list of all installed certificates is displayed on this page. Clicking on a certificate’s common name navigates to
a certificate details page. The details page provides additional information about the certificate and allows for
the file containing it to be uninstalled.
Upload CA Certificate
Setting Description
Provide the CA certificate. The supported file formats are PEM and DER encoded
Certificate File X.509. The file extension should be .crt, .cer, .pem, or .der.
PEM files may contain a list of any number of CA certificates.
Setting Description
Provide the end entity certificate. The supported file formats are PEM and DER
encoded X.509. The file extension should be .crt, .cer, .pem, or .der. PEM files may
Certificate File contain a certificate chain where the first certificate is the end entity certificate. The
following certificates must be for intermediate CAs where each certificate directly
certifies the one preceding.
Provide the private key for the end entity certificate. The file can be encrypted or
unencrypted and must be PEM or DER encoded with PKCS#8 format. The file
Private Key File
extension must be .p8, .key, .pem, or .der. NOTE: All private keys are encrypted by the
NMC prior to storage.
Private Key Provide the passphrase to decrypt the encrypted private key. Allows up to 64
characters including whitespace. If the private key file is not encrypted, this field must
Passphrase be left blank.
For information on DHCP and DHCP options, see RFC2131 and RFC2132.
Option Description
Manual Specify your IPv4 address, subnet mask, default gateway here.
At 32-second intervals, the device requests network assignment from any BOOTP
server:
• If it receives a valid response, it starts the network services.
• If previously configured network settings exist, and it receives no valid response to
BOOTP* five requests (the original and four retries), by default it uses those previously
configured settings. This ensure that it remains accessible if a BOOTP server is no
longer available.
• If it finds a BOOTP server, but the request to that server does not work or times out,
the device stops requesting network settings until it is restarted.
At 32-second intervals, the device requests network assignment from any DHCP
server:
• If a DHCP server is found, but the request to that server does not work or times out,
DHCP* it stops requesting network settings until it is restarted.
• Optionally, you can set up the device with Require vendor specific cookie to
accept DHCP Address in order to accept the lease and start the network services.
See DHCP response options.
::1 localhost
Option Description
Option Description
Address and
DHCPv6 is used to obtain addresses AND other configuration settings. This is known
Other
as “DHCPv6 stateful”.
Information
Non-Address DHCPv6 is used to configure “other” settings (such as location of DNS servers), but
Information Only NOT to provide addresses. This is known as “DHCPv6 stateless”.
Never DHCPv6 is NOT used for any configuration settings.
DNS screen
Path: Configuration > Network > DNS > Configuration
The values under Domain Name System Status list your current status and setup.
Use the options under Manual Domain Name System Settings to configure the Domain Name System
(DNS):
• Enabling the Override Manual DNS Settings means that configuration data from other sources like
DHCP take precedence over the manual configurations here.
• Specify the Primary DNS Server and, optionally, the Secondary DNS Server with IPv4 or IPv6
addresses. For the NMC to send e-mail, you must at least define the IP address of the primary DNS
server.
– The NMC waits up to 15 seconds for a response from the primary DNS server or the secondary
DNS server. If the NMC does not receive a response within that time, e-mail cannot be sent. Use
DNS servers on the same segment as the NMC or on a nearby segment, but not across a wide-
area network (WAN).
– After you define the IP addresses of the DNS servers, test it, see Testing DNS screen.
• System Name Synchronization: Enabling this synchronizes the DNS hostname with the NMC
System Name. Click on the System Name link to define it.
If the DNS hostname and the NMC System Name are synchronized, the System Name is
limited to a certain number of characters, based on DNS RFC. If they are not synchronized,
the system name is limited to 255 characters.
• Host Name: After you configure a host name here and a domain name in the Domain Name field,
users can enter a host name in any field in the NMC interface (except e-mail addresses) that accepts a
domain name.
Select whether or not to display a read-only, public web page with basic device status using the Limited
Status Access check boxes. This feature is disabled by default and can be set via the Use as default page
option to show as the default landing page when a user accesses the device with just the IP/hostname.
Console screen
Path: Configuration > Network > Console > Access
Path: Configuration > Network > Console > SSH Host Key
Console access. You need to enable console access in order to update your UPS firmware, see Firmware
Update screens. Console access enables use of the command line interface (CLI).
You can enable access to the CLI through either Telnet or SSH or through both, by using the Enable check
boxes. Telnet is disabled by default, and SSH is enabled by default. Telnet does not encrypt user names,
passwords, and data during transmission whereas SSH does.
NOTE: If you enable SSH, SCP (SeCure CoPy) is also enabled, for secure file transfer. See NMC Firmware
Upgrades for more information on the use of SCP.
SNMP screens
All user names, passwords, and community names for SNMPv1 are transferred over the network as plain text.
If your network requires the high security of encryption, disable SNMPv1 access or set the access for each
community to Read. (A community with Read access can receive status information and use SNMPv1 traps.)
When using EcoStruxure™ IT or Data Center Expert to manage a UPS on the public network of an
EcoStruxure system, you must have SNMPv1 or SNMPv3 enabled in the NMC interface. Read access will
allow the EcoStruxure device to receive traps from the NMC, but Write access is required while you use the
NMC user interface to set the EcoStruxure device as a trap receiver.
For detailed information on enhancing and managing the security of your system, see the Security
Handbook.
SNMPv1 is disabled by default. The Community Name must be set before SNMPv1
communications can be established.
Access Control. You can configure up to four access control entries to specify which Network Management
Systems (NMSs) have access to the NMC. To edit, click a community name.
By default one entry is assigned to each of the four available SNMPv1 communities. You can edit these
settings to apply more than one entry to any one community to grant access by several specific IPv4 and IPv6
addresses, host names, or IP address masks.
• By default, a community has access to the NMC from any location on the network.
• If you configure multiple access control entries for any one community name, it means that one or more
of the other communities have no access to the device.
Community Name: The name that a Network Management Station (NMS) must use to access the community.
The maximum length is 16 ASCII characters.
NMS IP/Host Name: The IPv4 or IPv6 address, IP address mask, or host name that controls access by NMSs.
A host name or a specific IP address (for example, 149.225.12.1) allows access only by the NMS at that
location. IP addresses that contain 255 restrict access as follows:
• 149.225.12.255: Access only by an NMS on the 149.225.12 segment.
• 149.225.255.255: Access only by an NMS on the 149.225 segment.
• 149.255.255.255: Access only by an NMS on the 149 segment.
• 0.0.0.0 (the default setting) which can also be expressed as 255.255.255.255: Access by any NMS on
any segment.
Access Type: The actions an NMS can perform through the community.
• Read: GETS only, at any time
• Write: GETS at any time, and SETS when no user is logged onto the UI or command line interface.
• Write+: GETS and SETS at any time.
• Disable: No GETS or SETS at any time.
Enable SNMPv3 access under access enables this method of communication with this device.
User Profiles. By default, lists the settings of four user profiles, configured with the user names apc snmp
profile1 through apc snmp profile4, with no authentication and no privacy (no encryption). To edit the
following settings for a user profile, click a user name in the list.
• User Name: The identifier of the user profile. SNMP version 3 maps GETs, SETs, and traps to a user
profile by matching the user name of the profile to the user name in the data packet being transmitted.
A user name can have up to 32 ASCII characters.
• Authentication Passphrase: A phrase of 8 to 32 ASCII characters that verifies that the NMS
communicating with this device through SNMPv3 is the NMS it claims to be.
It also verifies that the message has not been changed during transmission, and that the message was
communicated in a timely manner. This indicates that it was not delayed and that it was not copied and
sent again later at an inappropriate time.
• Privacy Passphrase: A phrase of 8 to 32 ASCII characters that ensures the privacy of the data that an
NMS is sending to or receiving from this device through SNMPv3, by using encryption.
• Authentication Protocol: The implementation of SNMPv3 supports SHA-256, SHA and MD5
authentication. One of these must be selected.
• Privacy Protocol: The implementation of SNMPv3 supports AES-256, AES and DES as the protocols
for encrypting and decrypting data. You must use both a privacy protocol and a privacy password,
otherwise the SNMP request is not encrypted.
In turn, you cannot select the privacy protocol if no authentication protocol is selected.
Access Control. You can configure up to four access control entries to specify which Network Management
Systems (NMSs) have access to the NMC. To edit, click a user name.
By default one entry is assigned to each of the four user profiles. You can edit these settings to apply more
than one entry to any one user profile to grant access by several specific IP addresses, host names, or IP
address masks.
• By default, all NMSs that use that profile have access to this device.
• If you configure multiple access control entries for one user profile, it means that one or more of the
other user profiles must have no access to this device.
User Name: From the drop-down list, select the user profile to which this access control entry will apply. The
choices available are the four user names that you configure through the User Profiles option.
Modbus screens
UPS devices with the SRTL/SRYLF prefix with an embedded NMC do not support Modbus.
Use the Modbus options to configure your NMC to use the Modbus protocol, to connect to a Building
Management System (BMS). The AP9640 NMC card supports Modbus TCP, and the AP9641 and AP9643
NMC cards support Modbus serial in addition to Modbus TCP.
For more information on the Modbus implementation on your UPS, see the Modbus
Documentation Addendum and Modbus Register Maps on the APC website.
For more information on Switched Outlet Group Management with Modbus for Smart-UPS models
with prefix SMT, SMX, SURTD, SRC and SRT, see Application Note # 177.
NOTE: Temperature and humidity sensors attached to the UIO port(s) of the AP9641 and AP9643
NMCs are not supported via Modbus.
Modbus TCP.
Path: Configuration > Network > Modbus > TCP
1. Use Access to enable or disable Modbus TCP as a method of communication with the NMC.
2. Set the Port number for the TCP connection. It can be set to 502 (default) or to a value between 5000
and 32768.
3. Click Apply to save your changes.
UPS devices with the SRTL/SRYLF prefix with an embedded NMC do not support BACnet.
Use the BACnet options to configure your NMC to use the BACnet protocol, and to make UPS data available to
building automation and control networks.
For more information on the UPS data points made available via BACnet, see the BACnet
Application Maps on the APC website.
BACnet Configuration
Option Description
Select the check box to enable BACnet. If this is not enabled, the NMC cannot be
accessed via BACnet. BACnet is disabled by default.
Access
NOTE: BACnet cannot be enabled until the Device Communication Control
Password is set.
A unique identifier for this BACnet device, used for addressing the device. Acceptable
Device ID
range: 0–4194303.
A name for this BACnet device, which must be unique on the BACnet network. The
default device name is “BACn”+ the last eight digits of the NMC MAC address. The
Device Name
minimum length is 1, the maximum length is 150 characters, and special characters
are permitted.
Option Description
The UDP/IP port the NMC uses to send and receive BACnet/IP messages.
Acceptable range: 5000–65535. Default: 47808.
Local Port
NOTE: The address of a BACnet/IP-enabled NMC is defined as the IP address
of the NMC and the local port.
Select the check box to register the NMC with a BACnet broadcast
management device (BBMD).
NOTE: You need to register your NMC as a foreign device with a BBMD if there
is no BBMD currently on the subnet of the NMC, or if the NMC uses a different
local port to the BBMD.
IP Router
BBMD A BBMD B
Enable foreign
device registration NMC W NMC Y
Port: 47808 Port: 47809
BACnet/IP
The IP address or fully qualified domain name (FQDN) of the BACnet broadcast
Broadcast
management device with which this NMC card will be registered.
Management Device
Port The port of the BBMD with which this NMC card will be registered.
The number of seconds (Time To Live) that the BBMD will maintain the NMC as
a registered device. If the NMC does not re-register before this time expires, the
BBMD will delete it from its foreign-device table, and the NMC will no longer be
TTL
able to send and receive broadcast messages via the BBMD. The TTL controls
how frequently the NMC registers with the BBMD, as the NMC will attempt to
re-register before this time expires.
Option Description
Wi-Fi screen (AP9641, AP9643, and devices with an embedded NMC3 only)
Path: Configuration > Network > Wi-Fi
NOTE: This screen is relevant when the optional APC USB Wi-Fi Device (AP9834) is inserted in a
USB port of an AP9641/AP9643 card, or a UPS device with an embedded NMC.
Use this screen to view the current status of the Wi-Fi network, enable/disable Wi-Fi, and configure the Wi-Fi
network’s settings.
NOTE: Enabling/disabling Wi-Fi will disable/enable the wired LAN connection. The NMC 3 will
reboot when the Wi-Fi settings are configured. After the reboot, the wired network will be disabled
and the NMC 3 will attempt to connect to the given Network Name (SSID).
Network Name (SSID): Specify the network name (SSID) of the Wi-Fi network. The maximum length is 32
characters.
Option Description
WPA
WPA2-AES Wi-Fi Password: Specify a password for the Wi-Fi network. The maximum length is 64
WPA2-Mixed characters.
WPA2-TKIP
• User Name: The user name for WPA2-Enterprise authentication. The
maximum length is 32 characters.
• Password: The password for WPA2-Enterprise authentication. The maximum
WPA2-
length is 32 characters.
Enterprise
• Outer Identity: Specify the WPA-2-Enterprise outer identity. This is an optional
unencrypted identification used by the WPA-2-Enterprise server. For example:
user@example.com or anonymous. The maximum length is 32 characters.
For information on how to upgrade the APC USB Wi-Fi Device’s (AP9834) firmware, see the wifi
command in the NMC 3 CLI Guide.
To troubleshoot the connection to the APC USB Wi-Fi Device (AP9834), and the Device’s LED
descriptions, see APC USB Wi-Fi Device (AP9834) Problems.
Notification menu
See these sections:
• Types of notification
• Configuring event actions
• E-mail notification screens
• SNMP Traps test screen
• SNMP Trap Receivers screen
Types of notification
You can configure notification actions to occur in response to an event. You can notify users of an event in any
of several ways:
• Active, automatic notification. The specified users or monitoring devices are contacted directly.
– E-mail notification
– SNMP traps
– Syslog notification
• Indirect notification
– Event log. If no direct notification is configured, users must check the log to determine which
events have occurred
You can also log system performance data to use for device monitoring. See Data log
for information on how to configure and use this data logging option.
If no Syslog server is configured, items related to Syslog configuration are not displayed.
When viewing details of an event’s configuration, you can enable or disable event logging or
Syslog, or disable notification for specific e-mail recipients or trap receivers, but you cannot add or
remove recipients or receivers. To add or remove recipients or receivers, see the following:
• Identifying Syslog servers
• E-mail recipients
• Trap Receivers
Field Description
If the event persists for the specified time (default is 0), the notification is sent.
Notification Delay
If the condition clears before the time expires, no notification is sent.
The notification is sent repeatedly at the specified interval (the default is every
Repeat Interval
2 minutes until the condition clears).
Number of Notifications
During an active event, the notification repeats for this number of times.
After Initial
or
Notify Until Condition Is
The notification is sent repeatedly until the condition clears or is resolved.
Cleared
For events that have an associated clearing event, you can also set these parameters. (An example of an
event with its clearing event is UPS: Lost communication with the battery packs and
UPS: Restored communication with the battery packs).
SMTP Server.
Path: Configuration > Notification > E-mail > Server
This screen lists your primary and secondary DNS server (see DNS screen) and then these fields:
Field Description
This should be enabled if the security policy of your organization does not allow for implicit
Require CA trust of SSL/TLS connections. If this is enabled, a valid CA certificate for the SMTP server
Root Certificate must be installed to the NMC's certificate store using the certificate loader in order for a TLS
connection with the SMTP server to succeed. See the SSL Certificates page.
E-mail recipients.
Path: Configuration > Notification > E-mail > Recipients
Specify up to four e-mail recipients. Click on a name to configure the settings. See also SMTP Server above.
Field Description
E-mail
Enables (default) or disables sending e-mail to the recipient.
Generation
The user and domain names of the recipient. To use e-mail for paging, use the e-mail
address for the recipient’s pager gateway account (for example,
myacct100@skytel.com). The pager gateway will generate the page.
To Address To bypass the DNS lookup of the mail server’s IP address, use the IP address in brackets
instead of the e-mail domain name, e.g., use jsmith@[xxx.xxx.x.xxx] instead of
jsmith@company.com. This is useful when DNS lookups are not working correctly.
NOTE: The recipient’s pager must be able to use text-based messaging.
The long format contains name, location, contact, IP address, serial number of the device,
Format date and time, event code, and event description. The short format provides only the event
description.
Chose a language from the drop-down list and any mails will be sent in that language. It is
Language
possible to use different languages for different users. See Changing UI Language.
Select one of the following methods for routing e-mail:
• Local: Through the site-local SMTP server. This recommended setting ensures that the
e-mail is sent using the site-local SMTP server. Choosing this setting limits delays and
network outages and retries sending e-mail for many hours.
When choosing the Local setting you must also enable forwarding at the SMTP server of
your device and set up a special external e-mail account to receive the forwarded e-mail.
Check with your SMTP server administrator before making these changes.
Server • Recipient: Through the recipient's SMTP server. The NMC performs an MX record look-
up on the recipients e-mail address and uses that as its SMTP server. The e-mail is only
sent once so it could easily be lost.
NOTE: When using this setting, the From Address will match the To Address,
authentication and encryption (TLS) will be disabled, and port 25 will be used.
• Custom: This setting enables each e-mail recipient to have its own server settings. When
selected, the server settings that follow are enabled. These settings are the same as
those described under SMTP Server above and are independent of them.
Trap Generation Enable (the default) or disable trap generation for this trap receiver.
Choose between these two MIB trap generation types for each trap
created.
The Powernet option is customized for Schneider Electric and contains
many additional variables relevant to the company’s products. The
Powernet MIB Trap
RFC1628 is the generic, standard Management Information Base (MIB)
Generation/
for UPS devices.
RFC1628
If you use the RFC1628 MIB, you can also use the three RFC1628 event
notifications (see Configuring event actions). They can be used to
avoid having to configure notification events outside the NMC
environment, see RFC1628 MIB.
The IPv4/ IPv6 address or host name of this trap receiver. The default,
NMS IP/Host Name
0.0.0.0, leaves the trap receiver undefined.
Chose a language from the drop-down list. This can differ from the UI
Language
and from other trap receivers.
Community Name: The name used as an identifier when SNMPv1 traps
are sent to this trap receiver.
SNMPv1 Authenticate Traps: When this option is enabled (the default), the NMS
identified by the NMS IP/Host Name setting will receive authentication
traps (traps generated by invalid attempts to log on to this device).
User Name: Select the identifier of the user profile for this trap receiver.
SNMPv3
See also User Profiles under SNMP screens.
Identification screen
Path: Configuration > General > Identification
Define the Name (the NMC System Name, see DNS screen), the Location (the physical location), the
System Message (a custom defined message displayed at log on) and the Contact (the person responsible
for the device) used by:
• the SNMP agent of the NMC
• EcoStruxure™ IT or Data Center Expert
Specifically, the name field is used by the sysName, sysContact, and sysLocation object
identifiers (OIDs) in the NMC’s SNMP agent. For more information about MIB-II OIDs, see the
PowerNet® SNMP Management Information Base (MIB) Reference Guide, available on the APC
website.
By default, any NMC on the private side of EcoStruxure™ IT or Data Center Expert obtains its time
settings by using EcoStruxure™ IT or Data Center Expert as an NTP server.
Field Description
Override Manual NTP If you select this, data from other sources (typically DHCP) take
Settings precedence over the NTP configurations you set here.
Primary NTP Server Enter the IP address or domain name of the primary NTP server.
Secondary NTP Enter the IP address or domain name of the secondary NTP server,
Server when a secondary server is available.
Define, in hours, how often the NMC accesses the NTP Server for an
Update Interval
update. Minimum: 1; Maximum: 8760 (1 year).
Update Using NTP
Initiate an immediate update of the date and time by the NTP Server.
Now
Daylight saving.
Path: Configuration > General > Date /Time > Daylight Savings
Daylight Saving Time (DST) is disabled by default. You can enable traditional United States DST, or enable and
configure a customized daylight saving time to match how Daylight Saving Time is implemented in your local
area.
When customizing DST, the system puts the clock forward by an hour when the time and date you specify
under Start is reached and puts the clock back an hour when the time and date you specify under End is
reached.
• If your local DST always starts or ends on the fourth occurrence of a specific weekday of a month (e.g,
the fourth Sunday), choose Fourth/Last. If a fifth Sunday occurs in that month, you should still choose
Fourth/Last.
• If your local DST always starts or ends on the last occurrence of a specific weekday of a month,
whether it is the fourth or the fifth occurrence, choose Fifth/Last.
Syslog Uses IPv4/ IPv6 addresses or host names to identify from one to four servers to receive
Server Syslog messages sent by the NMC.
The port that the NMC will use to send Syslog messages. The default port is 6514
Port
which is the port assigned to secure Syslog (TLS).
Language Choose the language for any Syslog messages.
Protocol Choose between UDP, TCP, or TLS.
When the chosen protocol is TLS, choose a client certificate to use for mutual
TLS Client
authentication with the Syslog server. The default option “None” disables mutual
Certificate
authentication. Client certificates can be installed on the SSL Certificates.
Syslog settings
Path: Configuration > Logs > Syslog > Settings
Field Description
Message Enable the generation and the logging of Syslog messages for events that have
Generation Syslog configured as a notification method. See “Configuring event actions”.
Selects the facility code assigned to the NMC’s Syslog messages (User, by default).
Facility
Code NOTE: User best defines the Syslog messages sent by the NMC. Do not change this
selection unless advised to do so by the Syslog network or system administrator.
Maps each severity level of NMC or Environment events to available Syslog priorities.
The local options are Critical, Warning, and Informational. You should not need to
change the mappings.
The following definitions are from RFC5424:
• Emergency: The system is unusable
• Alert: Action must be taken immediately
• Critical: Critical conditions
• Error: Error conditions
Severity • Warning: Warning conditions
Mapping
• Notice: Normal but significant conditions
• Informational: Informational messages
• Debug: Debug-level messages
Following are the default settings for the Local Priority settings:
• Severe is mapped to Critical
• Warning is mapped to Warning
• Informational is mapped to Info
NOTE: To disable Syslog messages, see Configuring event actions.
The alarm test for a UPS is device-specific and might not be available for your UPS. To enable the alarm, see
UPS General screen.
• When you select UPS Alarm Test, the UPS beeps for four seconds and the LEDs illuminate.
• When you select UPS Alarm Test - Continuous, the UPS beeps and illuminates the LEDs until you
cancel the test. A separate bullet displays on this screen, Cancel Continuous Alarm Test. To cancel
the test, select this and click Apply. Alternatively, you press any key on the LED display interface of the
UPS. This test is useful for locating a UPS.
Event Description
Event log
By default, the log displays all events. See Configuring by event.
The Event Log records all events including access control, request errors, system events, configuration
changes (including via config.ini file) and audit events. It can be configured to store from 25 to 30,000 events,
the default is 1500. If the Event log is full and a new event occurs, the oldest event will be overwritten. If you
want to retain your events, you should configure exporting events to a Syslog server.
You can enable event color coding for through Local Users on the Configuration menu.
Note: Event logs are encrypted using AES-256 ESSIV and cryptographically authenticated with HMAC-
SHA256 by the NMC before use.
To filter the Event Log. Use filtering to omit information you don’t want to display.
Filtering the log Use the Last or From radio buttons. (The filter configuration is saved until the
by date or time NMC restarts).
Data log
Path: Logs > Data > options
Use the Data Log to display measurements about the UPS, the power input to the UPS, and the ambient
temperature of the UPS and batteries.
Note: Data logs are encrypted using AES-256 ESSIV and cryptographically authenticated with HMAC-SHA256
by the NMC before use.
The steps to display and resize the Data Log are the same as for the Event Log, except that you use menu
options under Data instead of Events. See To display the Event Log and To resize the Event Log.
Field Description
FTP Server The IP address or host name of the server where the file will reside.
The user name with password required to send data to the repository
User Name
file. This user must also be configured to have read and write access
Password
to the data repository file and the directory (folder) in which it is stored.
File Path The path to the repository file.
The name of the repository file (an ASCII text file), e.g.
Filename datalog.txt.
Any new data is appended to this file, it does not overwrite it.
Select this check box to save the log as
mmddyyyy_<filename>.txt, where filename is what you specified
Unique Filename in the Filename field above.
Any new data is appended to the file but each day has its own file.
Delay n hours between The number of hours between uploads of data to the file (max. 24
uploads. hours).
Upon failure, try
The number of minutes between attempts to upload data to the file
uploading every n
after an upload does not work.
minutes
The maximum number of times the upload will be attempted after it
up to n times
does not work initially.
until upload succeeds Attempt to upload the file until the transfer is completed.
To use SCP to retrieve the files. Enable SSH on the NMC, see Console access. NOTE: The below
commands are examples only.
To retrieve the event.txt file, use the following command:
scp <username@hostname> or <ip_address>:event.txt ./event.txt
To retrieve the data.txt file, use the following command:
scp <username@hostname> or <ip_address>:data.txt ./data.txt
To use FTP to retrieve the files. To use FTP to retrieve the event.txt or data.txt file:
1. At a command prompt, type ftp and the IP address of the NMC, and press ENTER.
If the Port setting for the FTP Server option (see FTP Server) has been changed from its default (21),
you must use the non-default value in the FTP command.
For Windows FTP clients, use the following command, including spaces. (For some FTP clients, you
must use a colon instead of a space between the IP address and the port number.)
ftp>open ip_address port_number
To set a non-default port value to enhance security for the FTP Server, see FTP Server. You
can specify any port from 5001 to 32768.
2. Use the case-sensitive User Name and Password for Administrator or Device User to log on. For
Administrator, apc is the default user name. For the Device User, the default user name is device.
3. To set the file transfer mode to binary, type:
ftp>bin
To show a progress bar during file transfer, type:
ftp>hash
4. Use the get command to transmit the text of a log to your local drive.
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is Logs > Power
Events.
This information is derived from your UPS device and is separate from your NMC logs. (It is not directly related
to or a subset of the NMC Event log).
The information can be useful to help the technical support team solve problems.
UPS Transfer Logs Displays a table of the UPS stored transfer events, including transfers to battery and
transfers to bypass.
UPS Fault Logs Displays a table of the UPS stored faults.
Energy Usage
Path: Logs > Energy Usage
The cumulative energy usage figures for your UPS device display at the top of the screen, with a week-by-
week breakdown in the table at the bottom of the screen.
Field Description
The amount of energy, in kilowatt-hours, consumed thus far by your UPS. For example,
Energy Usage a UPS providing power to a 350 W light bulb for 1000 hours consumes 350 kWh of
energy.
The estimated total cost of energy used thus far. For example, a light bulb consuming
Total Cost 350kWh of energy over 1000 hours with a price of $0.10 per kWh costs $35 over that
period of time.
The estimated quantity of CO2 released by the AC utility company into the environment
CO2 Emissions
to provide the energy used thus far.
Costs and CO2 emissions vary greatly by energy source and distribution network. You can obtain a rough
estimate by choosing your country from the Location drop-down box, or use the “(edit)” link to input your own
cost and emissions data.
Editing a location creates a custom location and does not alter the default figures for that location. For
example, if you choose IE-Ireland from the drop-down list and subsequently use edit to change data, then an
entry called Custom (IE-Ireland) is created at the top of the drop-down list.
The path for UPS devices with the SRTL/SRYLF prefix with an embedded NMC is About > UPS >
General.
The information displayed under UPS varies according to the device used.
Field Description
Model/
SKU/ These fields identify your UPS device.
Serial Number
Manufacture Date The date your UPS was manufactured.
Firmware Revision The revision numbers of the firmware modules currently installed on the UPS.
The second revision number of the firmware currently installed on the UPS. This is
Firmware Revision2
used when multiple processors require different versions.
Apparent Power The total VA capability of the UPS.
Rating
Real Power Rating The total load capability (in Watts) of the UPS.
The VA capability of each UPS phase.
Apparent Power More technically, it is the present apparent power for each phase in Volt-Amps
Rating/Phase (VA). Apparent power is the product of RMS (root mean square) volts and RMS
amperes.
The total load capability (in Watts) of the UPS.
Real Power
Rating/Phase The present active bypass power for each phase in watts (W). Active power is the
time average of the instantaneous product of voltage and current.
Internal Battery SKU/ These fields identify the part numbers for your batteries. This can be useful when
External Battery SKU troubleshooting problems or when ordering replacement parts.
The options below are only applicable for UPS devices with the SRYLF prefix with an embedded
NMC.
Field Description
Click on Main or XRn / Battery Frame n to reach the Main Frame / Battery Frame n screen for additional
battery information.
Path: About > UPS > Battery
The options below are only applicable for UPS devices with the SRTL/SRYLF prefix with an
embedded NMC.
Field Description
The options below are only applicable for UPS devices with the SRYLF prefix with an embedded
NMC.
Field Description
Support screen
Path: About > Support
With this option, you can consolidate various data in this interface into a single zipped file for troubleshooting
purposes and customer support. The data includes the event and data logs, the configuration file (see
Creating and Importing settings with the config file) and complex debugging information.
Click Generate Logs to create the file and then Download. You are asked whether you want to view or save
the zipped file.
Detailed procedures
Retrieving. To set up and retrieve an .ini file to export:
1. If possible, use the interface of an NMC to configure it with the settings to export. (Directly editing the
.ini file risks introducing errors).
2. The example below shows how to use FTP to retrieve config.ini from the configured NMC using a
command prompt type client:
a. Open a connection to the NMC, using its IP address:
ftp> ip_address
b. Log on using the Administrator user name and password.
c. To set the file transfer mode to binary, type:
ftp> bin
To show a progress bar during file transfer, type:
ftp> hash
d. Retrieve the config.ini file containing the NMC’s settings:
ftp> get config.ini
The file is written to the folder from which you launched the FTP client from.
Messages in config.ini
A device associated with the NMC from which you download the config.ini file must be discovered successfully
in order for its configuration to be included. If the device (such as a UPS) is not present or is not discovered,
the config.ini file contains a message under the appropriate section name, instead of keywords and values. For
example:
UPS not discovered
If you did not intend to export the configuration of the device as part of the .ini file import, ignore these
messages.
See Contents of the .ini file for information about which values are overridden.
Because the overridden values are device-specific and not appropriate to export to other NMCs,
ignore these error messages. To prevent these error messages, delete the lines that contain the Override
keyword and the lines that contain the values that they override. Do not delete or change the line containing
the section heading.
Verifying Upgrades
Verify the success of the transfer
To verify whether a firmware upgrade succeeded, you can use the xferStatus command in the command
line interface to view the last transfer result.
Changing UI Language
You can display the NMC user interface (UI) in different languages by selecting a language from the Language
drop-down box in the Login screen.
The UI has nine languages available: French, Italian, German, Spanish, Brazilian Portuguese, Russian,
Korean, Japanese, and Simplified Chinese.
Problem Solution
If the NMC’s Status LED is green, try to ping another node on the
same network segment as the NMC. If that does not work, it is not a
problem with the NMC. If the Status LED is not green, or if the ping
test succeeds, perform the following checks:
• Verify that the NMC is properly seated in the UPS.
Unable to ping the NMC • Verify all network connections.
• Verify the IP addresses of the NMC and the NMS.
• If the NMS is on a different physical network (or subnetwork) from
the NMC, verify the IP address of the default gateway (or router).
• Verify the number of subnet bits for the NMC’s subnet mask.
Cannot allocate the Before you can use a terminal program to configure the NMC, you
communications port must shut down any application, service, or program using the
through a terminal program communications port.
Cannot access the
Make sure that you did not change the baud rate. Try 2400, 9600,
command line interface
19200, 38400, 57600 or 115200.
through a serial connection
• Make sure you are using the correct access method, Telnet or
Secure SHell (SSH). An Administrator can enable these access
Cannot access the methods. By default, Telnet is disabled, and SSH is enabled. SSH
command line interface and Telnet can be enabled/disabled independently.
remotely • For SSH, the NMC may be creating a host key. The NMC can take
up to one minute to create the host key, and SSH is inaccessible for
that time.
• Verify that HTTP or HTTPS access is enabled.
• Make sure you are specifying the correct URL — one that is
consistent with the security system used by the NMC. SSL requires
https, not http, at the beginning of the URL.
• Verify that you can ping the NMC.
Cannot access the user
interface (UI) • Verify that you are using a Web browser supported for the NMC.
See “APC Worldwide Customer Support”.
• If the NMC has just restarted and SSL security is being set up, the
NMC may be generating a server certificate. The NMC can take up
to one minute to create this certificate, and the SSL server is not
available during that time.
Problem Solution
• Verify the read (GET) community name (SNMPv1) or the user profile
Unable to perform a configuration (SNMPv3).
GET • Use the command line interface or UI to ensure that the NMS has access.
See SNMP screens.
• Verify that SNMP is enabled. SNMPv1 and SNMPv3 are disabled by default.
• Verify the read/write (SET) community name (SNMPv1) or the user profile
Unable to perform a configuration (SNMPv3).
SET • Use the command line interface or UI to ensure that the NMS has write
(SET) access (SNMPv1) or is granted access to the target IP address
through the access control list (SNMPv3). See SNMP screens.
• Make sure the trap type (SNMPv1 or SNMPv3) is correctly configured for
the NMS as a trap receiver.
• For SNMP v1, query the mconfigTrapReceiverTable MIB OID to verify that
the NMS IP address is listed correctly and that the community name defined
Unable to receive for the NMS matches the community name in the table. If either is not
traps at the NMS correct, use SETs to the mconfigTrapReceiverTable OIDs, or use the
command line interface or UI to correct the trap receiver definition.
• For SNMPv3, check the user profile configuration for the NMS, and run a
trap test.
See SNMP screens, Trap Receivers, and SNMP Traps test screen.
Traps received at an
See your NMS documentation to verify that the traps are properly integrated in
NMS are not
the alarm/trap database.
identified
Modbus Problems
For more information on Modbus wiring and serial configuration for the AP9641 and AP9643 cards,
see the Modbus Documentation Addendum. For detailed information on Modbus registers and
bit descriptions, see the Modbus Register Maps on the APC website.
Problem Solution
• Verify that the APC USB Wi-Fi Device is correctly inserted in a USB port of
an AP9641/AP9643 card.
• Verify that the correct Wi-Fi settings are provided in the NMC Web UI or CLI.
• Verify that there are no Wi-Fi-related events in the NMC’s Event Log. If the
Unable to connect to
Wi-Fi settings are entered incorrectly or left blank, the NMC will log an error
wi-fi network
to the Event Log. For example: “USB Wi-Fi Device error. Wi-Fi Settings”.
If the issue still persists, contact Customer Support. See APC Worldwide
Customer Support.
LED Descriptions
Condition Description
Terms of warranty
APC warrants its products to be free from defects in materials and workmanship for a period of two years from
the date of purchase. APC will repair or replace defective products covered by this warranty. This warranty
does not apply to equipment that has been damaged by accident, negligence or misapplication or has been
altered or modified in any way. Repair or replacement of a defective product or part thereof does not extend the
original warranty period. Any parts furnished under this warranty may be new or factory-remanufactured.
Non-transferable warranty
This warranty extends only to the original purchaser who must have properly registered the product. The
product may be registered at the APC Web site, www.apc.com.
Exclusions
APC shall not be liable under the warranty if its testing and examination disclose that the alleged defect in the
product does not exist or was caused by end user’s or any third person’s misuse, negligence, improper
installation or testing. Further, APC shall not be liable under the warranty for unauthorized attempts to repair or
modify wrong or inadequate electrical voltage or connection, inappropriate on-site operation conditions,
corrosive atmosphere, repair, installation, exposure to the elements, Acts of God, fire, theft, or installation
contrary to APC recommendations or specifications or in any event if the APC serial number has been altered,
defaced, or removed, or any other cause beyond the range of the intended use.
THERE ARE NO WARRANTIES, EXPRESS OR IMPLIED, BY OPERATION OF LAW OR OTHERWISE, OF
PRODUCTS SOLD, SERVICED OR FURNISHED UNDER THIS AGREEMENT OR IN CONNECTION
HEREWITH. APC DISCLAIMS ALL IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTION
AND FITNESS FOR A PARTICULAR PURPOSE. APC EXPRESS WARRANTIES WILL NOT BE
ENLARGED, DIMINISHED, OR AFFECTED BY AND NO OBLIGATION OR LIABILITY WILL ARISE OUT
OF, APC RENDERING OF TECHNICAL OR OTHER ADVICE OR SERVICE IN CONNECTION WITH THE
PRODUCTS. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND IN LIEU OF ALL
OTHER WARRANTIES AND REMEDIES. THE WARRANTIES SET FORTH ABOVE CONSTITUTE APC’S
SOLE LIABILITY AND PURCHASER’S EXCLUSIVE REMEDY FOR ANY BREACH OF SUCH
WARRANTIES. APC WARRANTIES EXTEND ONLY TO PURCHASER AND ARE NOT EXTENDED TO ANY
THIRD PARTIES.
IN NO EVENT SHALL APC, ITS OFFICERS, DIRECTORS, AFFILIATES OR EMPLOYEES BE LIABLE FOR
ANY FORM OF INDIRECT, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES, ARISING OUT OF
THE USE, SERVICE OR INSTALLATION, OF THE PRODUCTS, WHETHER SUCH DAMAGES ARISE IN
CONTRACT OR TORT, IRRESPECTIVE OF FAULT, NEGLIGENCE OR STRICT LIABILITY OR WHETHER
APC HAS BEEN ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH DAMAGES. SPECIFICALLY,
APC IS NOT LIABLE FOR ANY COSTS, SUCH AS LOST PROFITS OR REVENUE, LOSS OF EQUIPMENT,
LOSS OF USE OF EQUIPMENT, LOSS OF SOFTWARE, LOSS OF DATA, COSTS OF SUBSTITUENTS,
CLAIMS BY THIRD PARTIES, OR OTHERWISE.
NO SALESMAN, EMPLOYEE OR AGENT OF APC IS AUTHORIZED TO ADD TO OR VARY THE TERMS
OF THIS WARRANTY. WARRANTY TERMS MAY BE MODIFIED, IF AT ALL, ONLY IN WRITING SIGNED
BY AN APC OFFICER AND LEGAL DEPARTMENT.
Copyright Notices
To view Copyright Notices for Network Management Card 3, see here.
For information on how to obtain local customer support, contact the representative or other
distributors from whom you purchased your product.
© 2024 Schneider Electric. All Rights Reserved. Schneider Electric, APC and Network
Management Card are trademarks and the property of Schneider Electric SE, its subsidiaries and
affiliated companies. All other trademarks are property of their respective owners.
990-91148M--001 09/2024