Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
UPS Application for 1-Phase Symmetra, Symmetra LX.
To upgrade to firmware version 3.0 or later, the only supported method is the Secure NMC System (SNS) Tool, which can be downloaded fromwww.apc.com/secure-nmcor by searching for SFNMC3FMTSU. To access the firmware in the software, a valid Secure NMC subscription is required. For more information, see theSNS Tool User Guide.
NOTE:If you upgrade to firmware version 2.0 or later, you cannot downgrade to a firmware version lower than 2.0.
If you downgrade from firmware version 2.4+ to a firmware version lower than 2.4, this will cause the card to be formatted, erasing all security certificates, encryption keys, configuration settings, and the event and data logs.
New Features
New Feature
UPS Family
Smart-UPS
1-Phase Symmetra
Support added for user authentication via Lightweight Directory Access Protocol (LDAP).
♦
♦
Support added for baud rate 115,200 on the Console connection on Universal I/O port.
♦
♦
Support added for optional Spot Fluid Sensor (NBES0301).
♦
Support added for configuring Universal I/O sensors via the cfguio command on the Command Line Interface (CLI).
♦
Support added for remote authentication via the TACACS+ protocol. (Added for Smart-UPS application in v3.0).
♦
Security Updates
Support added for TLS 1.3.
♦
♦
Support added for SNMPv3 encryption via the SHA-256 and AES-256 protocols.
♦
♦
Password security has been updated to align with the requirements for IEC 62443-4-2. By default, passwords now need to be a minimum of 8 characters in length (strong password setting enabled). (Added for Smart-UPS application in v3.0)
♦
Fixed Issues
Fixed Issue
UPS Family
Smart-UPS
1-Phase Symmetra
Link-RX/TX LED is now working for all embedded NMC3s.
♦
Dates in SNMP, such as upsAdvIdentDateOfManufacture, are now available in the correct format, mm/dd/yyyy.
♦
The audit log of the Web UI is displayed in all supported languages.
♦
The NMC3 Web UI now allows passwords with up to 64 characters, as expected. (Added for Smart-UPS application in v3.0)
♦
For encrypted email settings, install CA certificate to the certificate store and set "Require CA Root Certificate" correctly. (Added for Smart-UPS application in v3.0)
♦
Improved TLS certificate for email. (Added for Smart-UPS application in v3.0)
♦
Security Update
The following security vulnerability has been addressed in this release:
CWE-327: Use of a Broken or Risky Cryptographic Algorithm. This software uses a broken or risky cryptographic algorithm or protocol.
Removed support in SSH for diffie-hellman-group14-sha1.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-598: Use of GET Request Method with Sensitive Query Strings. This software uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
Configuration of HSTS is now independent from HTTP or HTTPS configuration. When HSTS is enabled, an STS header is added to all responses over HTTPS.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-307: Improper Restriction of Excessive Authentication Attempts. This software does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.
The account now gets locked after bad login attempts.
♦
♦
The following security vulnerabilities have been addressed in this release:
CWE-523: Unprotected Transport of Credentials.Login pages do not use adequate measures to protect the user nameand password while they are in transit from the client to the server.
CWE-319: Cleartext Transmission of Sensitive Information.The product transmits sensitive or security-critical data in cleartext in acommunication channel that can be sniffed by unauthorized actors.
The user is now referred as an index rather than the user name NMC/KrtUvuh39YtQmHbyua297g/usercfg.htm?user=2.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-200: Exposure of Sensitive Information to An Unauthorized Actor
SSH Cipher Block Chaining (CBC) cipher has been removed.
♦
♦
The following security vulnerabilities have been addressed in this release:
CWE-74: Improper neutralization of special elements in output used bya downstream component (Injection)
CWE-79: Improper neutralization of input during web page generation (Cross-site Scripting).