7.3 Security
33
7.3
Security
One of the goals of these security features is to help in complying with NERC CIP
requirements.
The clock security is flexible, allowing multiple levels of access.
The clock may be queried and configured using the Utility, which uses a proprietary binary
protocol allowing access through a custom user interface. For the upmost in security, clock features
may be set up requiring usernames and passwords.
As such, the clock comes with a default
username and password, which may be changed by the user. Alternatively, the clock may be set up
with unrestricted access, and security disabled. Note that security features may only be configured
through the Utility.
If your clock came with the NTP/PTP option installed, it will have its own security that is
separate from the clock itself and accessed through the web interface. See Section B.11 for details
on general setup of the NTP/PTP option, including security and authentication.
7.3.1
Security Features
There are six levels of security on the clock, which will assist users in two ways: (1) for a specific
use, and (2) protection from unintended use. The clock allows two-letter serial commands as used
on earlier clock models, however these commands will be restricted as described below. Operation
from the front panel interface will likewise be limited as shown in the table.
Level
Password
Front Panel Interface
“Two Letter” Serial Commands
0
No
- Unrestricted use
- Unrestricted use
1
Yes
- Configuration disabled
- Access all clock information
- Configuration disabled, except for
changing broadcast mode
1
- Access all clock information
2
Yes
- Access limited to viewing non-
configuration information
- Configuration disabled
- Access all clock information
3
Yes
- Access limited to viewing non-
configuration information
- Access limited to viewing non-
configuration information
4
Yes
- Only TIME key is active
- All commands disabled.
5
Yes
- Front panel display and keys
disabled
- All commands disabled
Table 7.1: Security Levels and Features
1
For Level 1, a user connected to a COM port may change that port’s configuration (e.g. broadcast
ON/OFF).
2
North American Electric Reliability Corporation – Critical Infrastructure Protection