Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
To upgrade to firmware version 3.0 or later, the only supported method is the Secure NMC System (SNS) Tool, which can be downloaded fromwww.apc.com/secure-nmcor by searching for SFNMC3FMTSUCAN. To access the firmware in the software, a valid Secure NMC subscription is required. For more information, see theSNS Tool User Guide.
If you downgrade from firmware version 2.4+ to a firmware version lower than 2.4, this will cause the card to be formatted, erasing all security certificates, encryption keys, configuration settings, and the event and data logs.
New Features
New Feature
UPS Family
SRTL Devices
SRYL Devices
Support added for user authentication via Lightweight Directory Access Protocol (LDAP).
♦
♦
Support added for baud rate 115,200 on the Console connection on Universal I/O port.
♦
♦
Support added for optional Spot Fluid Sensor (NBES0301).
♦
♦
Support added for configuring Universal I/O sensors via thecfguio command on the Command Line Interface (CLI).
♦
♦
Security Updates
Support added for TLS 1.3.
♦
♦
Support added for SNMPv3 encryption via the SHA-256 and AES-256 protocols.
♦
♦
Fixed Issues
Fixed Issue
UPS Family
SRTL
Devices
SRYL
Devices
The UPS service log properly updates under all conditions now.
♦
♦
Dates in SNMP, such asupsAdvIdentDateOfManufacture, are now available in the correct format, mm/dd/yyyy.
♦
♦
The NMC now supports the latest set of UPS alarms with the correct severity and improved alarm messages.
♦
♦
Corrected SNMP OID upsAdvBatteryNumOfBattPacks to provide the total number of battery packs connected both internally and externally.
♦
♦
Corrected SNMP OID upsAdvOutputKVACapacity to show full kVA capacity.
♦
Security Update
The following security vulnerability has been addressed in this release:
CWE-327: Use of a Broken or Risky Cryptographic Algorithm. This software uses a broken or risky cryptographic algorithm or protocol.
Removed support in SSH for diffie-hellman-group14-sha1.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-598: Use of GET Request Method with Sensitive Query Strings. This software uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
Configuration of HSTS is now independent from HTTP or HTTPS configuration. When HSTS is enabled, an STS header is added to all responses over HTTPS.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-307: Improper Restriction of Excessive Authentication Attempts. This software does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks.
The account now gets locked after bad login attempts.
♦
♦
The following security vulnerabilities have been addressed in this release:
CWE-523: Unprotected Transport of Credentials. Login pages do not use adequate measures to protect the user name and password while they are in transit from the client to the server.
CWE-319: Cleartext Transmission of Sensitive Information. The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
The user is now referred as an index rather than the user name NMC/KrtUvuh39YtQmHbyua297g/usercfg.htm?user=2.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-200: Exposure of Sensitive Information to An Unauthorized Actor
SSH Cipher Block Chaining (CBC) cipher has been removed.
♦
♦
Known Issues
Known Issue
UPS Family
SRTL
Devices
SRYL
Devices
After updating the NMC’s firmware via a USB flash drive, the USB is not recognized in the display or NMC Web UI.
♦
♦
Some pages in the Web UI help are not updated.
♦
♦
It can take up to 30 minutes to complete a UPS firmware upgrade when using HTTPS. To work around this, use SCP as an alternative.
♦
♦
The alarm description is shown incorrectly in DCE for outlet group-related alarms.
♦
You cannot unzip the debug file completely from a USB drive. This issue is seen intermittently.
♦
When a UPS firmware upgrade is in progress, theupsAdvcontrolFirmwareUpdateSNMP OID incorrectly reports the value as “noFirmwareUpdate” instead of “UpdateinProgress”.
♦
Filtering by time does not work for the Power Event Log.
♦
Entering unsupported commands in the Command Line Interface (CLI) does not return a E102 Parameter error.
♦
You are unable to configureupsAdvConfigAlarmRedundancyOID from SNMP interface.
♦
Only alphanumeric passwords are supported for new users created in the NMC for access to the display.
♦
When an internal or external Battery Module is connected or disconnected from its slot, the Event Log entry does not report its serial number.
♦
You cannot make configuration changes via the display when RADIUS is enabled, and theUser Modeis set to “Authentication Needed”.
♦
The option to cancel or mute a UPS audible alarm is not present in the Web UI.
♦
Theups -s start CLIcommand is unsuccessful even when the self-test is started correctly.
♦
There is no option to set the language of the display in the NMC Web UI.
♦
There is no option in the Web UI or the display to cancel a UPS audible alarm test. It is not recommended to initiate a continuous alarm as the only way to stop the UPS beeping is to turn off the UPS.
♦
You cannot modify the output voltage setting from the SNMP interface if the output is inManual Bypass.
♦
The “Minimum Redundancy lost" event is not displayed in PowerChute Network Shutdown although it is supported by the NMC. If this event occurs, the server will not shutdown.
♦
Secure NMC System (SNS) Tool for Smart-UPS Ultra Hash Signatures