Ask Me About Webinar: Data Center Assets - Modeling, Cooling, and CFD Simulation Join our 30-minute expert session on July 10, 2025 (9:00 AM & 5:00 PM CET), to explore Digital Twins, cooling simulations, and IT infrastructure modeling. Learn how to boost resiliency and plan power capacity effectively.Register now to secure your spot!
Release Notes for Smart-UPS & 1-Phase Symmetra Firmware v3.4.0.8
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Windows: snst_nmc3_sy_3-4-0-8.exe Linux & macOS: snst_nmc3_sy_3-4-0-8.tar.gz
UPS Application for 1-Phase Symmetra, Symmetra LX.
To upgrade to firmware version 3.0 or later, the only supported method is the Secure NMC System (SNS) Tool, which can be downloaded fromwww.se.com/secure-nmcor by searching for SFNMC3FMTSU. To access the firmware in the software, a valid Secure NMC subscription is required. For more information, see theSNS Tool User Guide.
NOTE:If you upgrade to firmware version 2.0 or later, you cannot downgrade to a firmware version lower than 2.0.
If you downgrade from firmware version 2.4+ to a firmware version lower than 2.4, this will cause the card to be formatted, erasing all security certificates, encryption keys, configuration settings, and the event and data logs.
New Features
New Feature
UPS Family
Smart-UPS
1-Phase Symmetra
Support added for viewing the ARP cache in the Command Line Interface (CLI).
♦
♦
Support added for EtherNet/IP for selected UPS devices. For more information, refer to Knowledge Base article FAQ000275863.
♦
NMC now displays the UPS Installation date when supported by the UPS.
♦
Added support for configuring outlet groups from the Command Line Interface.
♦
Security Update
Support added for Multi-Factor Authentication (MFA). MFA adds an additional layer of security to user logins by requiring a one-time password (OTP) sent via email after successful username and password authentication.
NOTE:Ensure the NMC user credentials used for the SNS Tool, EcoStruxure IT and Data Center Expert communications do not have email addresses configured. For more information, see Knowledge Base article FAQ000276382.
♦
♦
Fixed Issues
Fixed Issue
UPS Family
Smart-UPS
1-Phase Symmetra
Unsuccessful e-mail tests are now displayed as expected in the Web UI.
♦
♦
Styling for the “Password Change Required” web page now displays as expected in the latest update of Chrome.
♦
♦
You can now cancel an initiated firewall test as expected in the Web UI.
♦
♦
CIDR (Classless Inter-Domain Routing) notation is now allowed in SNMP NMS fields and firewall fields (when in subnet mode).
♦
♦
The CIDR notation is now functional in the DNS field and NMP access is now allowed or blocked based on the ranges associated with the network.
♦
♦
DNS lookups previously returned unusable IPv6 addresses in certain scenarios when both IPv4 and IPv6 were enabled (default settings). IPv4 is now prioritized if the NMC has an IPv4 address and only a link-local IPv6 address.
♦
♦
The NMC now shows the correct RBC SKU string for battery replacement.
♦
The NMC now properly supports USB flash drives for accessing configuration options via the UPS display.
♦
Security Update
The following security vulnerability has been addressed in this release:
CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause the device to become unresponsive when malformed SNMP requests are received over the network.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-476: NULL Pointer Dereference vulnerability exists that could cause the device to become temporarily inaccessible when receiving malformed IPv4 packets.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-613: Insufficient Session Expiration vulnerability exists that could cause a user to maintain access to an existing session when their password has been changed.