Podcast
Questions and Answers
Which port is used by Power Monitoring Expert services for client machine access to Designer, Vista, and/or Management Console?
Which port is used by Power Monitoring Expert services for client machine access to Designer, Vista, and/or Management Console?
What is the purpose of port 1433 in the Power Monitoring Expert system?
What is the purpose of port 1433 in the Power Monitoring Expert system?
Which of the following ports is associated with the HTTPS protocol in the Power Monitoring Expert system?
Which of the following ports is associated with the HTTPS protocol in the Power Monitoring Expert system?
For Engineering Client Access in Power Monitoring Expert, which ports are used for NetBIOS and Server Message Block?
For Engineering Client Access in Power Monitoring Expert, which ports are used for NetBIOS and Server Message Block?
Signup and view all the answers
What can be customized for the ION Real-time Data Service in terms of communication ports?
What can be customized for the ION Real-time Data Service in terms of communication ports?
Signup and view all the answers
What type of license does each user need to access PME web applications?
What type of license does each user need to access PME web applications?
Signup and view all the answers
Which of the following licenses is optional?
Which of the following licenses is optional?
Signup and view all the answers
What does the Measurement Statistics license include?
What does the Measurement Statistics license include?
Signup and view all the answers
How can the SQL Server license be acquired?
How can the SQL Server license be acquired?
Signup and view all the answers
Which software module deals with circuit breaker monitoring?
Which software module deals with circuit breaker monitoring?
Signup and view all the answers
What does the Backup Power Module design focus on?
What does the Backup Power Module design focus on?
Signup and view all the answers
Which module requires a specific license for each function?
Which module requires a specific license for each function?
Signup and view all the answers
What type of license is NOT mentioned as an option?
What type of license is NOT mentioned as an option?
Signup and view all the answers
What is the first consideration in the planning checklist for a Power Monitoring Expert system installation?
What is the first consideration in the planning checklist for a Power Monitoring Expert system installation?
Signup and view all the answers
Which of the following client types must be identified for a Power Monitoring Expert installation?
Which of the following client types must be identified for a Power Monitoring Expert installation?
Signup and view all the answers
What are the prerequisites to consider for the deployment of a Power Monitoring Expert system?
What are the prerequisites to consider for the deployment of a Power Monitoring Expert system?
Signup and view all the answers
Which of the following is NOT a consideration under IT requirements for Power Monitoring Expert?
Which of the following is NOT a consideration under IT requirements for Power Monitoring Expert?
Signup and view all the answers
In the planning checklist, what should be understood regarding cybersecurity?
In the planning checklist, what should be understood regarding cybersecurity?
Signup and view all the answers
What should be matched with device capabilities during planning?
What should be matched with device capabilities during planning?
Signup and view all the answers
What is essential to understand about licensing for the system?
What is essential to understand about licensing for the system?
Signup and view all the answers
Which factor is important to consider for network connectivity in the planning process?
Which factor is important to consider for network connectivity in the planning process?
Signup and view all the answers
What is the purpose of the Energy Analysis Dashboard Module design?
What is the purpose of the Energy Analysis Dashboard Module design?
Signup and view all the answers
Which module is specifically designed for monitoring isolated power systems?
Which module is specifically designed for monitoring isolated power systems?
Signup and view all the answers
What does the Event Notification Module Design provide?
What does the Event Notification Module Design provide?
Signup and view all the answers
Which security protocol does PME support for encrypted database connections?
Which security protocol does PME support for encrypted database connections?
Signup and view all the answers
What type of billing does the Energy Billing Module design include?
What type of billing does the Energy Billing Module design include?
Signup and view all the answers
What feature does the Power Quality Performance Module provide?
What feature does the Power Quality Performance Module provide?
Signup and view all the answers
What should be done prior to installing PME to ensure secure communications?
What should be done prior to installing PME to ensure secure communications?
Signup and view all the answers
What happens if HTTP connections are enabled after PME installation?
What happens if HTTP connections are enabled after PME installation?
Signup and view all the answers
What is a key function of Windows accounts in PME?
What is a key function of Windows accounts in PME?
Signup and view all the answers
Which credential configuration is necessary when PME uses SQL Server authentication?
Which credential configuration is necessary when PME uses SQL Server authentication?
Signup and view all the answers
Which of the following is NOT a recommended network security measure?
Which of the following is NOT a recommended network security measure?
Signup and view all the answers
Which of the following options enhances the physical security of servers?
Which of the following options enhances the physical security of servers?
Signup and view all the answers
What is one of the purposes of using an application like McAfee® Enterprise Policy Orchestrator?
What is one of the purposes of using an application like McAfee® Enterprise Policy Orchestrator?
Signup and view all the answers
Which security measure focuses on the management of remote access?
Which security measure focuses on the management of remote access?
Signup and view all the answers
Why is deep packet inspection firewall considered useful in network security?
Why is deep packet inspection firewall considered useful in network security?
Signup and view all the answers
What physical locking measure is recommended for servers?
What physical locking measure is recommended for servers?
Signup and view all the answers
Study Notes
Planning Checklist
- Consider the system architecture, standalone or distributed database.
- Determine the types of clients and quantities required (Web, Engineering).
- Plan the required computer hardware and operating system (OS, SQL Server).
- Understand the network dependencies and plan accordingly.
- Select required licenses for the PME, OS, SQL Server and other software.
- Understand the prerequisites and options for new installations and upgrades.
- Define the features and modules for users and user groups.
- Understand the prerequisites and dependencies when designing features and modules.
- Consider device network options, Ethernet or serial.
- Match devices with features and modules based on capabilities, performance, and more.
- Understand customer and application security needs.
IT Requirements
- PME relies on specific ports for communication between components and devices.
- Port 13666 is used for Power Monitoring Expert services accessing Designer, Vista, and Management Console.
- Ports 13670 and 13668 are used when the system includes a secondary server.
- Ports 1433 and 1434 are used for SQL Server Instance and SQL Server Browser respectively.
- Port 139/445 is used for NetBIOS, Server Message Block, and Windows "File and Printer Sharing" for Engineering Client Access.
- Port 80 is used for HTTP (required for Web client, Internet access, IIS server, EWS, and power meter access).
- Port 443 is used for HTTPS Protocol.
- Port 57777 is used for the ION Real-time Data Service to transfer real-time data to Power Monitoring Expert clients, but can be configured to use another port.
- Determine which IP ports are required and which can be disabled, utilizing the PME System Guide for a complete list.
License Types
- Client Access License is required for every user.
- Software Module License is optional and is required for each module (Backup Power, Breaker Performance, Capacity Management, Energy Analysis Dashboard, Energy Analysis Reports, Energy Billing, Event Notification, Insulation Monitoring, and Power Quality Performance).
- Data Exchange Module License is optional and includes Measurement Statistics, Export Report, OPC DA Server, VIP Modbus Slave, Measurement Aggregation, and COMTRADE export with ETL functionality.
- Developer/Demo license is a special license requiring contact with Schneider Electric for details.
- SQL Server license is optional and can be obtained from Schneider Electric, using the free Express version, or purchasing directly.
Planning System Installations
- PME supports Transport Layer Security (TLS) 1.2 for encrypted database connections and web client communication using HTTPS.
- The default configuration only allows HTTPS connections between PME application server and web clients.
- To allow HTTP connections, enable HTTP and disable HTTPS.
- Windows accounts are used for PME report subscriptions and database maintenance.
- SQL Database server accounts are required for PME configured to use SQL Server authentication.
- An EcoStruxure Web Services account is necessary if using EcoStruxure Web Services for data exchange.
- Plan to have an authority-issued security certificate installed before or shortly after PME installation to support TLS 1.2.
Cybersecurity
- Use industrial firewalls for network security.
- Implement intrusion detection and prevention systems (IDS, IPS).
- Apply ISO27001 guidelines.
- Manage wireless and remote access.
- Ensure device security.
- Utilize Deep Packet Inspection firewalls.
- Physically secure device access.
- Consider site security measures like personnel access restrictions, physically locking computers, cementing USB drives, removing CD-ROM drives, and implementing tools for centralized security management.
- Utilize industrial, security-hardened PCs like Magelis Box.
- Determine network and hardware locking measures to ensure the desired security level.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential aspects of planning IT systems, focusing on system architecture, client requirements, and hardware necessities. You will also learn about network dependencies, software licensing, and security considerations. Test your knowledge on creating effective strategies for system design and implementation.