Network Management Card 4: Security Handbook, Firmware Version 6.x, 15.x and 18.x
Network Management Card 4: Security Handbook, Firmware Version 6.x, 15.x and 18.x
User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Types of User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Secure Shell (SSH), Secure FTP (SFTP) and Secure Copy (SCP) for the Command Line
Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Transport Layer Security (TLS) for the Web interface . . . . . . . .8
Creating and Installing Digital Certificates . . . . . . . . . . . . . . . . .9
Choosing a Method for your System . . . . . . . . . . . . . . . . . . . . . .9
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Supported RADIUS Functions and Servers . . . . . . . . . . . . . . . . . . . . . 15
Supported functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Supported RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Configure the Management Card or Device . . . . . . . . . . . . . . .15
RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Configure the RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . .16
Supported IETF (RFC2865) Attributes . . . . . . . . . . . . . . . . . . .16
Supported APC Vendor Specific Attributes . . . . . . . . . . . . . . . .17
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x i
Secure Disposal Guidelines . . . . . . . . . . . . . . . . . . . . . . 18
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Delete device contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Dispose of physical device . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Description of Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Device Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Software Patch Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Privileged Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Use of Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Minimum Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
SSH Host Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
No Unattended Console Sessions . . . . . . . . . . . . . . . . . . . . . 21
No Unnecessary Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Background and Description of Risk . . . . . . . . . . . . . . . . . . . . 21
Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Network Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Other Security Detection and Monitoring Tools . . . . . . . . . . . . 22
Validate Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
ii Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Introduction
User Management
Types of User Accounts
The Network Management Card has five basic levels of access:
• A Super User: can use all of the management menus available in the Web interface and all of the
commands in the command line interface.
• Administrator: can use all of the management menus available in the Web interface and all of the
commands in the command line interface.
• A Device User: can access the event log (but cannot delete the contents of the log), and can use
the device-related menus and commands.
• Network-Only User: can only access information that is not device-related.
• A Read-Only User: can access the event log, and device-related menus, but cannot change
configurations, control devices, delete data, delete the contents of the log, or use file transfer
options.
Note: A Super User is an Administrator account which is persistent and cannot be deleted, but can still be
enabled or disabled.
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 1
Note: The Event Log records actions performed by users such as logging in to any interface, changing
configuration values and modifying settings of the attached device. These entries contain the username, a
timestamp, and what action was taken by the user.
User Feature Privilege Table
Feature Super User Administrator Device User Network-Only Read-Only
Network
Status ✔ ✔ X ✔ X
Network/
Security ✔ ✔ X ✔ X
Configuration
Network
Control ✔ ✔ X ✔ X
Device Status ✔ ✔ ✔ X ✔
Device
Configuration ✔ ✔ ✔ X X
User
Management ✔ ✔ X X X
View Event
Log ✔ ✔ ✔ ✔ ✔
Delete Event
Log ✔ ✔ X X X
Configure
Event Log ✔ ✔ ✔ X X
File Transfer ✔ ✔ ✔ X X
Security
Security Features
Access by user name, Always enabled. Access level depends on user type.
user type, and password
An overview of the current configuration is available in the CLI banner displayed after log on, or in the
Web UI at the following path: Configuration > Network > Summary.
2 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Remote access to the command line interface
Security Access Description
Available methods For both SNMPv1 and SNMPv3, the host name restricts
(SNMPv1)*: access to the Network Management System (NMS) at that
• Community Name location only, and the NMS IP filters allow access only to the
• Host Name
NMSs specified by one of the IP address formats in the
• NMS IP filters
• Agents that can be following examples:
enabled or disabled • 159.215.12.1: Only the NMS at the IP address
• Four access 159.215.12.1.
communities with read/
• 159.215.12.255: Any NMS on the 159.215.12
write/disable capability
segment.
Available methods
• 159.215.255.255: Any NMS on the 159.215
(SNMPv3):
• Four User Profiles segment.
• Authentication through • 159.255.255.255: Any NMS on the 159 segment.
an authentication
passphrase • 0.0.0.0: Any NMS.
• Encryption through a • SNMPv3 has additional security features that
privacy passphrase include the following:
• SHA or MD5
authentication – An authentication passphrase to ensure that
• AES or DES encryption an NMS trying to access the Management
algorithm Card or device is the NMS it claims to be.
• NMS IP filters – Encryption of data during transmission, with a
privacy passphrase required for encrypting
and decrypting.
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 3
File transfer protocols
Security Access Description
Web Server
Security Access Description
Available methods: In basic HTTP authentication mode, the user name and
• User name and password are transmitted as plain text (with no encoding or
password encryption).
• Selectable server port TLS is available on Web browsers supported for use with the
• Web interface access Management Card or network-enabled device and on most
that can be enabled or Web servers. The Web protocol HyperText Transfer Protocol
disabled over Secure Sockets Layer (HTTPS) encrypts and decrypts
• Transport Layer Security page requests to the Web server and pages returned by the
(TLS) Web server to the user.
RADIUS
Security Access Description
4 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
EAPoL (802.1X Security)
Security Access Description
Syslog
Security Access Description
Available methods Secure Syslog behaves the same way as standard Syslog,
(secure): except the messages are encrypted using Transport Layer
• Configurable server Security (TLS) before being transmitted. The NMC supports
hostname or IP address both one-way and two-way authentication between the client
• Selectable server port (the NMC) and your external Syslog server. Secure Syslog
• Transport Layer Security can only be used with TCP.
message transmission
(over TCP only)
• Allows one or two-way
authentication
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 5
Note: This will reset the Management Card to its default values and remove all information. If you are
copying your configuration to another NMC, it is recommended you export your config.ini file before
resetting the device.
Port assignments
If the FTP server, SSH/SFTP/SCP, or the Web server uses a non-standard port, a user must specify the
port in the command line or Web address used to access the Management Card or device. A non-
standard port number provides an additional level of security. The ports are initially set at the standard
“well known ports” for the protocols. To increase security, change the ports to any unused port numbers
from 5001 to 32768 for the FTP server and from 5000 to 32768 for the other protocols and servers. (The
FTP server uses both the specified port and the port one number lower than the specified port.)
Automatic Logout
By default, users will be automatically logged out of the NMC Web UI and CLI interfaces after 3 minutes of
inactivity. The default logout time for user accounts can be adjusted through the Web UI: Configuration >
Security > Local Users > Default Settings.
Authentication
You can choose security features for the Management Card or network-enabled device that control
access by providing basic authentication through user names, passwords, and IP addresses, without
using encryption. These basic security features are sufficient for most environments in which sensitive
data are not being transferred.
As an added layer of security, network-based port access via EAPoL can also be utilized to request
network access at the individual port level via the network’s switch or router (where applicable) which the
Management Card is connected.
6 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Password Requirements and Recommendations
Strong passwords are enabled by default for all NMC user accounts. Provided passwords must be
between 8 and 64 characters in length. In addition, provided passwords cannot include:
• Your user name as part of the password
• Commonly-used sequences like qwerty1234 or passw0rd
Strong passwords can be disabled for user accounts in the Web UI (Configuration > Security > Local
Users > Default Settings), however, this is not recommended.
For enhanced security, it is recommended that you also configure the Password Change Interval and Bad
Login Attempts features in the Web UI (Configuration > Security > Local Users > Default Settings).
• Password Change Interval: If enabled, all user account passwords must be changed after a user-
specified duration between 0 - 365 days. The default value is 0, never.
• Bad Login Attempts: This feature mitigates brute force attacks by locking user accounts after a
user-specified number of unsuccessful logins between 0 - 99. The default value is 5. When a user
account is locked, it must be re-enabled by the Super User account, or a user account with
Administrator privileges.
If additional password policies or configurations are required, external authentication services such as
RADIUS are recommended. For example, a configurable user lockout time.
Encryption
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 7
Secure Shell (SSH), Secure FTP (SFTP) and Secure Copy (SCP) for the Command Line
Interface
8 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Note: See Creating and Installing Digital Certificates for a summary of how these certificates are used.
TLS also uses various algorithms and encryption ciphers to authenticate the server, encrypt data, and
ensure the integrity of the data, i.e., that it has not been intercepted and sent by another server.
Note: Web pages that you have recently accessed are saved in the cache of your Web browser and allow
you to return to those pages without re-entering your user name and password. Always close your
browser session before you leave your computer unattended.
Purpose
For network communication that requires a higher level of security than password encryption, the Web
interface of the Management Card or network-enabled device supports the use of digital certificates with
the Transport Layer Security (TLS) protocol. Digital certificates can authenticate the Management Card or
device (the server) to the Web browser (the TLS client).
Note: You can generate a 1024-bit key or a 2048-bit key - choose a 2048-bit key for increased security.
The sections that follow summarize the two methods of creating, implementing, and using digital
certificates to help you determine the most appropriate method for your system.
• Method 1: Use the default certificate auto-generated by the Network Management Card or network-
enabled device (2048-bit). Users with sufficient privileges can also regenerate certificates.
• Method 2: Generate your own certificate. The system requires a Privacy-Enhanced Mail (PEM)
encoded public certificate and a PEM encoded private key. Both files should have a .pem file
extension.
Disadvantages:
• This method does not include the authentication provided by a CA certificate (a certificate signed
by a Certificate Authority). There is no CA Certificate cached in the browser. Therefore, when you
log on to the Management Card or device, the browser generates a security alert, indicating that a
certificate signed by a trusted authority is not available, and asks if you want to proceed. To avoid
this message, you must install the default server certificate into the certificate store (cache) of the
browser of each user who needs access to the Management Card or device, and each user must
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 9
always use the fully qualified domain name of the server when logging on to the Management Card
or device.
• The default server certificate has the serial number of the Management Card or device in place of a
valid common name (the DNS name or the IP address of the Management Card or device).
Therefore, although the Management Card or device can control access to its Web interface by
user name, password, and account type (e.g., Super User, Administrator, Device-Only User,
Network-Only, or Read-Only User), the browser cannot authenticate which Management Card or
device is sending or receiving data.
• The length of the public key (RSA key) that is used for encryption when setting up a TLS session is
2048-bit, by default.
Disadvantages
Setup requires the extra step of requesting a signed root certificate from a Certificate Authority.
• An external Certificate Authority may charge a fee for providing signed certificates.
10 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Firewalls
Although some methods of authentication provide a higher level of security than others, complete
protection from security breaches is almost impossible to achieve. Well-configured firewalls are an
essential element in an overall security scheme.
Logs: The Active Firewall Policy Log lists the most recent firewall events, including the protocol, traffic,
action, and rule priority, in reverse chronological order.
Note: This log is not persistent and can hold up to 2000 events.
Configuration: Enable or disable the overall firewall functionality.
Active Rules: Lists the individual rules that are being enforced based on the current active policy.
Test Policy: Temporarily enforce the rules of a policy.
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 11
Command Line Interface Access and
Security
Introduction
Users with Super User, Administrator, Device User, Network-Only, Read-Only accounts can access the
command line interface through Secure Shell (SSH). (A Super User or Administrator can enable these
access methods by selecting the Configuration > Network > Console > Access.) SSH is enabled by
default.
SSH for high-security access. If you use the high security of TLS for the Web interface, use Secure
Shell (SSH) for access to the command line interface. SSH encrypts user names, passwords and
transmitted data.
To use SSH, you must first configure SSH and have an SSH client program installed on your computer.
12 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Web Interface Access and Security
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 13
Parameter Description
Date Issued: The date and time at which the certificate was
Validity issued. Expiration Date: The date and time at which the
certificate expires.
14 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
RADIUS
Authentication
On the Configuration tab, select Security on the top menu bar. Then, under Remote Users on the left
navigation menu, select authentication to define an authentication method:
• Local Authentication Only: RADIUS is disabled. Local authentication is enabled.
• RADIUS, then Local Authentication: Both RADIUS and local authentication are enabled.
Authentication is requested from the RADIUS server first; local authentication is used only if the
RADIUS server fails to respond.
• RADIUS Only: RADIUS is enabled. Local authentication is disabled.
Note: RADIUS configuration supports Password Authentication Protocol (PAP) and Challenge
Handshake Authentication Protocol (CHAP) only.
Note: If RADIUS Only is selected, and the RADIUS server is unavailable, improperly identified, or
improperly configured, remote access is unavailable to all users. You must use a direct connection, via a
micro-USB cable (part number 960-0603), to change the RADIUS access setting to Local
Authentication Only or Radius, then Local Authentication to regain access.
To login serially to RADIUS, Remote Authentication Override (Configuration > Security > Session
Management) and Serial Remote Authentication Override (Configuration > Security > Local Users
> Management) must be enabled. If Override is not enabled, you cannot login serially.
Please see the “Local access to the web interface” section in the NMC 4 Installation Guide for more
information on how to gain local access to the command line interface. These instructions can also be
used to gain local access to the internal NMC using the IP address 169.254.251.1.
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 15
RADIUS
To configure RADIUS, navigate to Configuration > Security > Remote Users > RADIUS on the Web UI.
Note: You can configure two RADIUS servers i) primary server, and ii) secondary server.
Settings Description
Idle-Timeout
Configures a time in seconds that a user can remain idle for before being logged off.
Service-Type
Only the values listed in the below table are supported.
Providing any other value will result in the user having read-only access.
16 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Supported APC Vendor Specific Attributes
Vendor Specific Attributes (VSAs) take precedence over IETF RADIUS attributes. For an example of a
RADIUS dictionary file, please see dictionary.apc. The dictionary can be used in RADIUS server
configurations.
APC-Service-Type
APC-Service-Type VSA is of identifier equals to 1.
The attribute values supported by the Management Card or device are listed in the below table.
Providing any other value will result in the user having read-only access.
Please see Knowledge Base article FA156083 for information on how to configure a RADIUS server to
authenticate with a Network Management Card.
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 17
Secure Disposal Guidelines
Introduction
This topic outlines how to wipe the Network Management Card of all information and configurations.
18 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Appendix 1: Network Management Card
Security Deployment Guide
Overview
As network security continues to grow and change in the fast-paced IT industry, user requirements for
security solutions are becoming a requirement for system delivery. The Network Management Card
(NMC) interfaces are implemented to provide users with as much flexibility as possible. Industry standard
security implementation coupled with the flexibility of the Network Management Card, enables products to
exist in different user environments.
Physical Security
Deploy the equipment in a secure location
Custodians should secure equipment from unauthorized physical access.
• Access should be restricted to those who require access to maintain the equipment.
• Restricted areas should be clearly marked for authorized personnel only.
• Restricted areas should be secured by locked doors.
• Access to the restricted areas should produce a physical or electronic audit trail.
Description of Risk
Attackers with physical access to covered equipment can access the device without authorization.
Recommendations
Physical security must be in place to control physical access to restricted areas and facilities containing
devices. Devices should be locked behind cabinets or protected by physical restraints that prevent
unauthorized access or removal from restricted areas. Access to areas containing covered equipment
should only be granted to personnel who require access based on their job function.
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 19
Restricted areas should display signs that clearly indicate access is for authorized personnel only.
Facilities containing covered devices should give minimum indication of their purpose, with no obvious
signs identifying the presence of related functions.
Physical access control devices, such as key card readers, doors and cabinet locks, should be tested
prior to use and on a periodic basis (e.g. annually). Resource custodians should produce physical or
electronic audit trails to record all personnel's physical access to restricted areas for security incident
investigation. Inventory of who has physical access to control devices should be regularly reviewed, and
any inappropriate access identified during the review should be promptly removed.
Device Security
Note: For more information on Device Security options, refer to Appendix 2: Security Hardening
Checklist.
Privileged Accounts
Privileged and super-user accounts (Administrator, root, etc.) must not be used for non-administrator
activities. Network services must run under accounts assigned the minimum necessary privileges.
Also minimize the number of local accounts.
Certificates
Use of Authentication
Network services and local (console) device access must require authentication by means of passphrases
or other secure authentication mechanisms unless the explicit purpose of the service/device is to provide
unauthenticated access.
Minimum Protocol
Set the minimum allowed Transport Layer Security Protocol that Hypertext Transfer Protocol over Secure
Sockets Layer (HTTPS) uses to secure the communication between the browser and the device. This
should be set to TLS 1.2. (Configuration > Network > Webaccess)
20 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Logging
Schneider Electric recommends enabling the generation (and therefore, the logging) of Syslog messages
for events that have Syslog configured as a notification method. To configure notification methods for
events, navigate to the Event Actions screen (Configuration > Notifications > Event Actions). Use the
available functionality to integrate with Syslog.
No Unnecessary Services
If a network service is not necessary for the intended purpose or operation of the device, ensure that
service is not running.
Network Security
When deploying a Network Management Card to a production environment, Schneider Electric strongly
recommends that the below key configuration changes are made.
Firewalls
Recommendations
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 21
Allow incoming traffic from Information Security scanners
Configure your firewalls to allow network-based scanning by Information Security (IS) vulnerability
scanners. IS should scan hosts on the network and determine if hosts are vulnerable to common network
threats, or if a system appears to have been compromised.
Network Segmentation
Schneider Electric strongly recommends that network traffic to the device’s management interface is
separated, either physically or logically, from normal network traffic. A flat network architecture makes it
easier for malicious actors to move around within the network; whereas with network segmentation,
organizations can enhance network security by controlling access to sensitive data in the form of enabling
or denying network access. A strong security policy entails segmenting the network into multiple zones,
with varying security requirements, and rigorously enforcing the policy on what is allowed to move from
zone to zone.
22 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Appendix 2: Security Hardening Checklist
This checklist contains recommended configuration changes to help provide a security hardening profile
for Network Management Card-enabled products.
Upload a custom HTTPS certificate
Your Network Management Card-enabled device creates an internally-generated HTTPS certification. It is
recommended that you create a custom certificate to help strengthen authentication.
Disable older versions of TLS
Transport Layer Security (TLS) is a cryptographic protocol that provides communication security over the
internet. Ensure that older versions of TLS are disabled on your Network Management Card-enabled
device, and use the latest version available.
Disable FTP
Disable File Transfer Protocol (FTP) when it is not in use to help harden security on your device. If SSH is
enabled, SFTP and SCP, which are more secure than FTP, can be used for file transfers.
Configure SNMPv3 to use AES/SHA
Configure SNMPv3 to use the most secure algorithms, AES and SHA, to provide encryption and
authentication.
Use custom network ports where applicable
By using a non-standard port, your device may not be detected by scans looking only for standard ports.
This applies to protocols such as HTTPS, SSH, SMTP, Syslog, etc.
Change the Super User account password
After installation and initial configuration of your Network Management Card-enabled device, you will be
prompted to enter a new password for the Super User account.
Disable Super User account
Ensure there is at least one Administrator account enabled on your device. Once an Administrator
account is configured, it is recommended that the Super User account is disabled. The Administrator
account has the same privileges as the Super User account.
Enable Strong Passwords
Enable this feature to ensure strong passwords are created. All passwords will be required to be a
minimum length and shall not appear in a list of passwords known to be compromised.
Enable Force Password Change
Enable this feature to force all passwords to be changed after a user-specified number of days.
Disable unused network addressing protocols (IPv4/IPv6)
To help secure your device, disabled unused addressing protocols such as IPv4 and IPv6.
Disable Ping Response (IPv4)
IPv4 Ping Response allows your device to respond to network pings. Disable this feature to help make
your device undetectable.
Enable internal firewall with appropriate access rules
Your Network Management Card-enabled device has an inbuilt firewall that can be used to restrict access
to and from your device for various protocols and addresses.
Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x 23
Disable IPv6 auto-configuration
When the NMC is configured for IPv6 auto-configuration, it is vulnerable to IPv6 router advertisement
flood attacks on the local network segment. If your network is susceptible to these type of attacks, it is
recommended you configure the NMC with a static IPv6 address or add protection for such attacks.
Enable Syslog Mutual Authentication over TLS
Enable the NMC to send Syslog messages to a Syslog server using Mutual Authentication. Note: Your
Syslog server must be configured to use Mutual Authentication.
Disable Modbus TCP
By default, Modbus TCP is disabled as it is an insecure protocol and needs to be protected at the network
level. If Modbus TCP is required, we recommend that it is protected using the NMC’s firewall to restrict the
clients that can connect to the Modbus server.
24 Network Management Card 4 Security Handbook, Firmware Version 6.x, 15.x and 18.x
Worldwide Customer Support
Customer support for this or any other product is available at no charge in any of the following ways:
• Visit the Schneider Electric Web site to access documents in the Schneider Electric Knowledge
Base and to submit customer support requests.
– www.schneider-electric.com (Corporate Headquarters)
Connect to localized Schneider Electric Web sites for specific countries, each of which
provides customer support information.
– www.schneider-electric.com/support/
Global support searching Schneider Electric Knowledge Base and using e-support.
• Contact the Schneider Electric Customer Support Center by telephone or e-mail.
– Local, country-specific centers: go to www.schneider-electric.com click > Support > Contact
Support for contact information.
For information on how to obtain local customer support, contact the representative or other
distributors from whom you purchased your product.
© 2025 Schneider Electric, All Rights Reserved. Schneider Electric, and Network Management Card are trademarks and the property of
Schneider Electric SE, its subsidiaries and affiliated companies. All other trademarks are property of their respective owners.
990-6121M-001 01/25