Cybersecurity recommended secure hardening guidelinesSecuring the Network Management Module – 197•••••••••••••••••••••••••••••••Serial numberHardware versionLocationContactFirmware informationFirmware versionFirmware SHAFirmware dateFirmware installation dateFirmware activation dateBootloader version6.2.2.1.2 Communication settingsIt can be retrieved by navigating toSettings>>>Network or Settings>>>Network & ProtocolLANLink statusMAC addressConfigurationIPV4StatusModeAddressNetmaskGatewayDomainModeFQDNPrimary DNSSecondary DNSIPV6StatusModeAddresses6.2.2.1.3 UPS detailsIt can be retrieved by navigating toHome>>>Details or Home>>>Energy flow .DetailsNameModelP/NS/NLocationFW version6.2.2.2 Defense in DepthDefense in Depth basically means applying multiple counter-measures for mitigating risks, in a layered or step wise manner. Alayered approach to security as shown in the below diagram is what is recommended. Defense in Depth is the responsibility ofboth the manufacturer and the customer.Most of above information are discoverable using SNMP, refer to Settings>>>SNMP.You are using an UNLICENSED copy of Scroll PDF Exporter for Confluence. Do you find Scroll PDF Exporter useful? Consider purchasing it today:https://marketplace.atlassian.com/apps/7019/scroll-pdf-exporter-for-confluence?tab=overview&hosting=datacenter