create account

Password Override Jumper on RTAC 3505 by jmkengineering

View this thread on: hive.blogpeakd.comecency.com
· @jmkengineering ·
$2.63
Password Override Jumper on RTAC 3505
<center>https://jmkengineering.com/wp-content/uploads/2020/06/image-14.png</center> <br/><p>Have you ever arrived at a site and there is no password for the device? You have to log on the PLC or RTU but the owner doesn't know the password and it isn't written down anywhere?</p>
<p>Or maybe you have a bench unit that you forgot the password for. That's what happened to me this week. I finally got around to upgrading the firmware on my RTAC 3505 but I forgot the password.</p>
<p>Luckily SEL knows that this happens and they have a work around, assuming you have physical access to the device. There is a jumper for that.</p>
<h2>First download the instruction manual</h2>
<p>In case your device is different from the one that I'm working with, make sure that you download the instruction manual.</p>
<img src="https://i0.wp.com/jmkengineering.com/wp-content/uploads/2020/06/image-11.png?fit=1024%2C552&amp;ssl=1" alt="" class="wp-image-6907"/>
<h2>Why this is a secure method</h2>
<p>The reason the jumper method works is that you have to have physical access to the device. This is not something that you can "remote" into it and lock out everyone, you have to be able to power it down, remove it from where its mounted, open the device, add the jumper and then power it back on before changing the passwords.</p>
<p>If this is a critical facility, you will have your first indication that something is wrong when the device is offline, and you can go and check what's happening. If you believe the device has been tampered with, you can take your backup settings and re-upload to the last known settings and be back running with a secure system.</p>
<h2>Open the RTAC</h2>
<p>Opening the RTAC 3505 is four screws, then you tilt/slide towards the end of the RTAC with the serial ports.</p>
<img src="https://jmkengineering.com/wp-content/uploads/2020/06/image-12.png" alt="" class="wp-image-6908"/>
<img alt=""/>
<img src="https://jmkengineering.com/wp-content/uploads/2020/06/image-13.png" alt="" class="wp-image-6909"/>
<h2>Add the Jumper</h2>
<p>Once open you find the JMP terminal strip. If you are old like me you remember the jumpers on IDE harddrives, its the same style here.</p>
<p>SEL even includes a couple of Jumpers, one for the factory reset and the other for password override.</p>
<p>Install the password override jumper, in this case its JMP3, and then power up and log in.</p>
<img src="https://jmkengineering.com/wp-content/uploads/2020/06/image-14.png" alt="" class="wp-image-6910"/>
<h2>Connect to RTAC with default username</h2>
<p>I used the USB connection and when you get to the log-in screen the default username is "Edison" without a password. Now you can update the users with new passwords, remembering to add them to your password manager (<a href="https://1password.com">I use 1password</a>) so you don't have to go through this again.</p>
<img src="https://jmkengineering.com/wp-content/uploads/2020/06/image-15.png" alt="" class="wp-image-6911"/><br/><i>Connected over USB<br /></i>
<h2>And change the password.</h2>
<img src="https://jmkengineering.com/wp-content/uploads/2020/06/image-16.png" alt="" class="wp-image-6912"/>
<h2>Put everything back together</h2>
<p>Then its a matter of removing the password again and placing the device back in service, or in my case upgrading the firmware.</p>
<img src="https://jmkengineering.com/wp-content/uploads/2020/06/image-17.png" alt="" class="wp-image-6913"/>
<h2>15min for the entire process</h2>
<p>This entire process takes no more than 15min and that is pretty awesome for a secure way to reset access information in the event of a failure in IT procedures.</p>
<p>Members have early access to the tutorial video walking through the entire process below. If you are a member, <a href="https://jmkengineering.com/my-account/">log in here</a>, if you want to become a member check out the options below.</p>
<div class="wp-block-woocommerce-memberships-member-content"><center></center>
</div>
<h2>Closing</h2>
<p>If you like posts like this be sure to share on <a href="https://www.linkedin.com/company/jmkengineering/">Linkedin</a> or <a href="https://twitter.com/jmkengineering">Twitter</a>. And if you like what I'm producing here consider joining our <a href="https://jmkengineering.com/nl">newsletter</a> or becoming a complimentary member. </p>
<p>As a member you get early access to video tutorials that walk you through these how-tos and discounts on our paid memberships.</p>
<div class="wp-block-woocommerce-memberships-non-member-content"><h2>Get early access to all tutorial videos!</h2>
<p>To get early access to the tutorial video that goes with this post become a member. </p>
</div>
 <br><br><br><center><b>Posted from our blog at https://jmkengineering.com/password-override-jumper-on-rtac-3505/.
<br /><br />
If you like this article and want to hear more sign up for our newsletter at <a href="http://jmkengineering.com/newsletter/">jmkengineering.com/newsletter</a>

</b></center>  
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
properties (23)
authorjmkengineering
permlinkpasswordoverridejumperonrtac3505-v6qwz2zhve
categoryengineering
json_metadata{"community":"steempress","app":"steempress","image":[""],"tags":["engineering","overridejumper","rtac","rtac3505","sel"],"canonical_url":"https://jmkengineering.com/password-override-jumper-on-rtac-3505/"}
created2020-08-09 13:05:03
last_update2020-08-09 13:05:03
depth0
children1
last_payout2020-08-16 13:05:03
cashout_time1969-12-31 23:59:59
total_payout_value1.214 HBD
curator_payout_value1.416 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,993
author_reputation7,327,516,810,836
root_title"Password Override Jumper on RTAC 3505"
beneficiaries
0.
accountsteempress
weight1,500
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id98,977,826
net_rshares7,571,186,364,418
author_curate_reward""
vote details (54)
@mtammy ·
The password override jumper on RTAC 3505 is a hardware feature used for resetting or bypassing password protection. It's typically located on the motherboard and requires careful manipulation. For a detailed guide on its usage and implications, check out this Tableau visualization: https://public.tableau.com/app/profile/wi.ccap/vizzes.
properties (22)
authormtammy
permlinkre-jmkengineering-2024519t125429368z
categoryengineering
json_metadata{"tags":["engineering","overridejumper","rtac","rtac3505","sel"],"app":"ecency/3.2.0-vision","format":"markdown+html"}
created2024-05-19 07:24:06
last_update2024-05-19 07:24:06
depth1
children0
last_payout2024-05-26 07:24:06
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length338
author_reputation-17,569,017,921
root_title"Password Override Jumper on RTAC 3505"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id133,775,014
net_rshares0