Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
UPS Application for 1-Phase Symmetra, Symmetra LX.
For details on upgrading the UPS Network Management Card 3 (NMC 3) firmware, see theNMC3 User Guide.
NOTE: If you upgrade to firmware version 2.0 or later, you cannot downgrade to a firmware version lower than 2.0.
If you downgrade from firmware version 2.4+ or later to a firmware version lower than 2.4, this will cause the card to be formatted, erasing all security certificates, encryption keys, configuration settings, and the event and data logs.
New Features
New Feature
There is no new feature in this release.
Fixed Issues
Fixed Issue
UPS Family
Smart-UPS
1-Phase Symmetra
Downloading the Event Log via the Web UI works as expected when the language is set to Japanese.
♦
♦
Security Update
The following security vulnerability has been addressed in this release:
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
SSH Cipher Block Chaining (CBC) cipher has been removed.
♦
♦
The following security vulnerabilities have been addressed in this release:
CWE-523: Unprotected Transport of Credentials. Login pages do not use adequate measures to protect the user name and password while they are in transit from the client to the server.
CWE-319: Cleartext Transmission of Sensitive Information. The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
The user is now referenced as an index rather than their username, for example: NMC/KrtUvuh39YtQmHbyua297g/usercfg.htm?user=2
♦
♦
The following security vulnerability has been addressed in this release:
CWE-863: Incorrect Authorization
The Network-Only user can only perform actions in the Web UI relevant to the user access level.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-20: Improper Input Validation
Incoming BACnet packet sizes are now validated.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-598: Use of GET Request Method With Sensitive Query Strings. This software uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
Configuration of HSTS is now independent from HTTP or HTTPS configuration. When HSTS is enabled an STS header is added to all responses over HTTPS.