
1
OVERVIEW
In the past, substation networks were traditionally isolated and the protocols and data formats used to transfer
information between devices were often proprietary.
For these reasons, the substation environment was very secure against cyber-attacks. The terms used for this
inherent type of security are:
●
Security by isolation (if the substation network is not connected to the outside world, it cannot be accessed
from the outside world).
●
Security by obscurity (if the formats and protocols are proprietary, it is very difficult to interpret them).
The increasing sophistication of protection schemes, coupled with the advancement of technology and the desire
for vendor interoperability, has resulted in standardisation of networks and data interchange within substations.
Today, devices within substations use standardised protocols for communication. Furthermore, substations can be
interconnected with open networks, such as the internet or corporate-wide networks, which use standardised
protocols for communication. This introduces a major security risk making the grid vulnerable to cyber-attacks,
which could in turn lead to major electrical outages.
Clearly, there is now a need to secure communication and equipment within substation environments. This
chapter describes the security measures that have been put in place for our range of Intelligent Electronic Devices
(IEDs).
Note:
Cyber-security compatible devices do not enforce NERC compliance, they merely facilitate it. It is the responsibility of the user
to ensure that compliance is adhered to as and when necessary.
This chapter contains the following sections:
P64x
Chapter 17 - Cyber-Security
P64x-TM-EN-1.3
375
Summary of Contents for P642
Page 2: ......
Page 18: ...Contents P64x xvi P64x TM EN 1 3 ...
Page 24: ...Table of Figures P64x xxii P64x TM EN 1 3 ...
Page 25: ...CHAPTER 1 INTRODUCTION ...
Page 26: ...Chapter 1 Introduction P64x 2 P64x TM EN 1 3 ...
Page 36: ...Chapter 1 Introduction P64x 12 P64x TM EN 1 3 ...
Page 37: ...CHAPTER 2 SAFETY INFORMATION ...
Page 38: ...Chapter 2 Safety Information P64x 14 P64x TM EN 1 3 ...
Page 50: ...Chapter 2 Safety Information P64x 26 P64x TM EN 1 3 ...
Page 51: ...CHAPTER 3 HARDWARE DESIGN ...
Page 52: ...Chapter 3 Hardware Design P64x 28 P64x TM EN 1 3 ...
Page 87: ...CHAPTER 4 SOFTWARE DESIGN ...
Page 88: ...Chapter 4 Software Design P64x 64 P64x TM EN 1 3 ...
Page 98: ...Chapter 4 Software Design P64x 74 P64x TM EN 1 3 ...
Page 99: ...CHAPTER 5 CONFIGURATION ...
Page 100: ...Chapter 5 Configuration P64x 76 P64x TM EN 1 3 ...
Page 121: ...CHAPTER 6 TRANSFORMER DIFFERENTIAL PROTECTION ...
Page 122: ...Chapter 6 Transformer Differential Protection P64x 98 P64x TM EN 1 3 ...
Page 165: ...CHAPTER 7 TRANSFORMER CONDITION MONITORING ...
Page 166: ...Chapter 7 Transformer Condition Monitoring P64x 142 P64x TM EN 1 3 ...
Page 189: ...CHAPTER 8 RESTRICTED EARTH FAULT PROTECTION ...
Page 190: ...Chapter 8 Restricted Earth Fault Protection P64x 166 P64x TM EN 1 3 ...
Page 215: ...CHAPTER 9 CURRENT PROTECTION FUNCTIONS ...
Page 216: ...Chapter 9 Current Protection Functions P64x 192 P64x TM EN 1 3 ...
Page 249: ...CHAPTER 10 CB FAIL PROTECTION ...
Page 250: ...Chapter 10 CB Fail Protection P64x 226 P64x TM EN 1 3 ...
Page 259: ...CHAPTER 11 VOLTAGE PROTECTION FUNCTIONS ...
Page 260: ...Chapter 11 Voltage Protection Functions P64x 236 P64x TM EN 1 3 ...
Page 274: ...Chapter 11 Voltage Protection Functions P64x 250 P64x TM EN 1 3 ...
Page 275: ...CHAPTER 12 FREQUENCY PROTECTION FUNCTIONS ...
Page 276: ...Chapter 12 Frequency Protection Functions P64x 252 P64x TM EN 1 3 ...
Page 286: ...Chapter 12 Frequency Protection Functions P64x 262 P64x TM EN 1 3 ...
Page 287: ...CHAPTER 13 MONITORING AND CONTROL ...
Page 288: ...Chapter 13 Monitoring and Control P64x 264 P64x TM EN 1 3 ...
Page 306: ...Chapter 13 Monitoring and Control P64x 282 P64x TM EN 1 3 ...
Page 307: ...CHAPTER 14 SUPERVISION ...
Page 308: ...Chapter 14 Supervision P64x 284 P64x TM EN 1 3 ...
Page 322: ...Chapter 14 Supervision P64x 298 P64x TM EN 1 3 ...
Page 323: ...CHAPTER 15 DIGITAL I O AND PSL CONFIGURATION ...
Page 324: ...Chapter 15 Digital I O and PSL Configuration P64x 300 P64x TM EN 1 3 ...
Page 336: ...Chapter 15 Digital I O and PSL Configuration P64x 312 P64x TM EN 1 3 ...
Page 337: ...CHAPTER 16 COMMUNICATIONS ...
Page 338: ...Chapter 16 Communications P64x 314 P64x TM EN 1 3 ...
Page 397: ...CHAPTER 17 CYBER SECURITY ...
Page 398: ...Chapter 17 Cyber Security P64x 374 P64x TM EN 1 3 ...
Page 415: ...CHAPTER 18 INSTALLATION ...
Page 416: ...Chapter 18 Installation P64x 392 P64x TM EN 1 3 ...
Page 431: ...CHAPTER 19 COMMISSIONING INSTRUCTIONS ...
Page 432: ...Chapter 19 Commissioning Instructions P64x 408 P64x TM EN 1 3 ...
Page 460: ...Chapter 19 Commissioning Instructions P64x 436 P64x TM EN 1 3 ...
Page 461: ...CHAPTER 20 MAINTENANCE AND TROUBLESHOOTING ...
Page 462: ...Chapter 20 Maintenance and Troubleshooting P64x 438 P64x TM EN 1 3 ...
Page 477: ...CHAPTER 21 TECHNICAL SPECIFICATIONS ...
Page 478: ...Chapter 21 Technical Specifications P64x 454 P64x TM EN 1 3 ...
Page 507: ...APPENDIX A ORDERING OPTIONS ...
Page 508: ...Appendix A Ordering Options P64x P64x TM EN 1 3 ...
Page 512: ...Appendix A Ordering Options P64x A4 P64x TM EN 1 3 ...
Page 513: ...APPENDIX B SETTINGS AND SIGNALS ...
Page 515: ...APPENDIX C WIRING DIAGRAMS ...
Page 516: ...Appendix C Wiring Diagrams P64x P64x TM EN 1 3 ...
Page 590: ......
Page 591: ......