Ask Me About Webinar: Data Center Assets - Modeling, Cooling, and CFD Simulation Join our 30-minute expert session on July 10, 2025 (9:00 AM & 5:00 PM CET), to explore Digital Twins, cooling simulations, and IT infrastructure modeling. Learn how to boost resiliency and plan power capacity effectively.Register now to secure your spot!
Release Notes for Smart-UPS Ultra 5-20 kW Firmware v3.4.0.8
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Windows: snst_nmc3_sucan_3-4-0-8.exe Linux & macOS: snst_nmc3_sucan_3-4-0-8.tar.gz
UPS Application for Smart-UPS Ultra 5-20 kW.
To upgrade to firmware version 3.0 or later, the only supported method is the Secure NMC System (SNS) Tool, which can be downloaded fromwww.se.com/secure-nmcor by searching for SFNMC3FMTSUCAN. To access the firmware in the software, a valid Secure NMC subscription is required. For more information, see theSNS Tool User Guide.
If you downgrade from firmware version 2.4+ to a firmware version lower than 2.4, this will cause the card to be formatted, erasing all security certificates, encryption keys, configuration settings, and the event and data logs.
New Features
New Feature
UPS Family
SRTL Devices
SRYL Devices
Added support for viewing the ARP cache in the Command Line Interface (CLI).
♦
♦
Added support for a user-settable runtime alarm threshold.
♦
♦
Added support for a user-settable load alarm threshold.
♦
♦
Support added for the Customer Experience Improvement Program (CEIP) which allows Schneider Electric to collect anonymous data on how the NMC is used in various customer environments.
♦
♦
The display now allows the user to modify the UPS firmware update setting.
♦
The display now allows the user to complete a UPS firmware update.
♦
The display now shows a UPS firmware update in progress, whether the update was started from a USB flash drive or from another interface (e.g., Web UI).
♦
Security Update
Support added for Multi-Factor Authentication (MFA). MFA adds an additional layer of security to user logins by requiring a one-time password (OTP) sent via email after successful username and password authentication.
NOTE:Ensure the NMC user credentials used for the SNS Tool, EcoStruxure IT and Data Center Expert communications do not have email addresses configured. For more information, see Knowledge Base article FAQ000276382.
♦
♦
Fixed Issues
Fixed Issue
UPS Family
SRTL
Devices
SRYL
Devices
Unsuccessful e-mail tests are now displayed as expected in the Web UI.
♦
♦
Styling for the “Password Change Required” web page now displays as expected in the latest update of Chrome.
♦
♦
You can now cancel an initiated firewall test as expected in the Web UI.
♦
♦
CIDR (Classless Inter-Domain Routing) notation is now allowed in SNMP NMS fields and firewall fields (when in subnet mode).
♦
♦
The CIDR notation is now functional in the DNS field and NMP access is now allowed or blocked based on the ranges associated with the network.
♦
♦
DNS lookups previously returned unusable IPv6 addresses in certain scenarios when both IPv4 and IPv6 were enabled (default settings). IPv4 is now prioritized if the NMC has an IPv4 address and only a link-local IPv6 address.
♦
♦
The NMC now uses the correct phrase for switch position on the Service Bypass unit.
♦
♦
The Web UI now shows both revisions for the UPS intelligence modules.
♦
Security Update
The following security vulnerability has been addressed in this release:
CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could cause the device to become unresponsive when malformed SNMP requests are received over the network.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-476: NULL Pointer Dereference vulnerability exists that could cause the device to become temporarily inaccessible when receiving malformed IPv4 packets.
♦
♦
The following security vulnerability has been addressed in this release:
CWE-613: Insufficient Session Expiration vulnerability exists that could cause a user to maintain access to an existing session when their password has been changed.
♦
♦
Known Issues
Known Issue
UPS Family
SRTL
Devices
SRYL
Devices
After updating the NMC’s firmware via a USB flash drive, the USB is not recognized in the display or NMC Web UI.
♦
♦
Some pages in the Web UI help are not updated.
♦
♦
It can take up to 30 minutes to complete a UPS firmware upgrade when using HTTPS. To workaround this, use SCP as an alternative.
♦
♦
When a UPS firmware upgrade is in progress, the upsAdvcontrolFirmwareUpdate SNMP OID incorrectly reports the value as “noFirmwareUpdate” instead of “UpdateinProgress”.
♦
♦
Filtering by time does not work for the Power Event Log.
♦
♦
Entering unsupported commands in the Command Line Interface (CLI) does not return a E102 Parameter error.
♦
♦
You cannot unzip the debug file completely from a USB drive. This issue is seen intermittently.
♦
You are unable to configure upsAdvConfigAlarmRedundancy OID from SNMP interface.
♦
When an internal or external Battery Module is connected or disconnected from its slot, the Event Log entry does not report its serial number.
♦
You cannot make configuration changes via the display when RADIUS is enabled and the User Mode is set to “Authentication Needed”.
♦
The option to cancel or mute a UPS audible alarm is not present in the Web UI.
♦
The ups -s start CLI command is unsuccessful even when the self-test is started correctly.
♦
There is no option to set the language of the display in the NMC Web UI.
♦
You cannot modify the output voltage setting from the SNMP interface if the output is in Manual Bypass.
♦
Secure NMC System (SNS) Tool for Smart-UPS Ultra Hash Signatures