{}

המותגים שלנו

ברוכים הבאים לאתר האינטרנט של שניידר אלקטריק

ברוכים הבאים לאתר שלנו.
שאלות נפוצות
NMC2 self-signed certificate expired - "connection reset" in Web UI
Issue:
NMC2 devices with a self-signed SSL certificate refuse a web connection. Logging in via serial/telnet/SSH still work.

Product Lines:
  • Network Management Card 2 (NMC2) - AP9630/AP9630CH, AP9631/AP9631CH, AP9635/AP9635CH
Devices with an embedded Network Management Card 2 include (but are not limited to): 2G Metered/Switched Rack PDUs (AP86XX, AP88XX, AP89XX), AP44xx RackATS, Netbotz 250,  Certain Audio/Video Network Management Enabled products.

Solution:
To fix this issue, a device would need to be upgraded to v7.0.4. After upgrading, the SSL certificate will need to be deleted from the NMC; there are a few methods that can be used:

Deleting the certificate via Web UI
  • Navigate to Configuration --> Network --> Web --> SSL Certificate
  • Select "remove", then "apply"
  • Reboot the NMC
Deleting the certificate via CLI
  • Open a Telnet/SSH session
  • Enter "cd ssl"
  • Enter "dir", should return with a file that has a .p15 extension
  • Delete the file with the command "delete <filename>.p15"
  • Reboot the NMC with the "reboot" command
Deleting the certificate via FTP
  • Open an FTP session
  • Enter "cd ssl"
  • Enter "dir", should return with a file that has a .p15 extension
  • delete the file with the command "delete <filename>.p15"
  • Close the FTP session, then reboot the NMC manually.


If a user wishes to remain on a firmware revision older than v7.0.4, the certificate can be deleted and the card rebooted to fix the issue, however the new certificate generated will be valid for only 1 year - the process would need to be repeated every year.

שניידר אלקטריק ישראל

NMC2 self-signed certificate expired - "connection reset" in Web UI
Issue:
NMC2 devices with a self-signed SSL certificate refuse a web connection. Logging in via serial/telnet/SSH still work.

Product Lines: 
  • Network Management Card 2 (NMC2) - AP9630/AP9630CH, AP9631/AP9631CH, AP9635/AP9635CH 
Devices with an embedded Network Management Card 2 include (but are not limited to): 2G Metered/Switched Rack PDUs (AP86XX, AP88XX, AP89XX), AP44xx RackATS, Netbotz 250,  Certain Audio/Video Network Management Enabled products.

Solution:
To fix this issue, a device would need to be upgraded to v7.0.4. After upgrading, the SSL certificate will need to be deleted from the NMC; there are a few methods that can be used:

Deleting the certificate via Web UI
  • Navigate to Configuration --> Network --> Web --> SSL Certificate
  • Select "remove", then "apply"
  • Reboot the NMC
Deleting the certificate via CLI
  • Open a Telnet/SSH session 
  • Enter "cd ssl"
  • Enter "dir", should return with a file that has a .p15 extension
  • Delete the file with the command "delete <filename>.p15"
  • Reboot the NMC with the "reboot" command
Deleting the certificate via FTP
  • Open an FTP session
  • Enter "cd ssl"
  • Enter "dir", should return with a file that has a .p15 extension
  • delete the file with the command "delete <filename>.p15"
  • Close the FTP session, then reboot the NMC manually. 


If a user wishes to remain on a firmware revision older than v7.0.4, the certificate can be deleted and the card rebooted to fix the issue, however the new certificate generated will be valid for only 1 year - the process would need to be repeated every year.

שניידר אלקטריק ישראל

גלה עוד
טווח:
מוצר:
גלה עוד
טווח:
מוצר:
גלה עוד
טווח:
מוצר:
גלה עוד
טווח:
מוצר:
move-arrow-top
Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.
Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.