7.3 Security
33
7.3
Security
One of the goals of these security features is to help in complying with NERC CIP
requirements.
The clock security is flexible, allowing multiple levels of access.
The clock may be queried and configured using the Utility, which uses a proprietary binary
protocol allowing access through a custom user interface. For the upmost in security, clock features
may be set up requiring usernames and passwords.
As such, the clock comes with a default
username and password, which may be changed by the user. Alternatively, the clock may be set up
with unrestricted access, and security disabled. Note that security features may only be configured
through the Utility.
If your clock came with the NTP/PTP option installed, it will have its own security that is
separate from the clock itself and accessed through the web interface. See Section B.11 for details
on general setup of the NTP/PTP option, including security and authentication.
7.3.1
Security Features
There are six levels of security on the clock, which will assist users in two ways: (1) for a specific
use, and (2) protection from unintended use. The clock allows two-letter serial commands as used
on earlier clock models, however these commands will be restricted as described below. Operation
from the front panel interface will likewise be limited as shown in the table.
Level
Password
Front Panel Interface
“Two Letter” Serial Commands
0
No
- Unrestricted use
- Unrestricted use
1
Yes
- Configuration disabled
- Access all clock information
- Configuration disabled, except for
changing broadcast mode
1
- Access all clock information
2
Yes
- Access limited to viewing non-
configuration information
- Configuration disabled
- Access all clock information
3
Yes
- Access limited to viewing non-
configuration information
- Access limited to viewing non-
configuration information
4
Yes
- Only TIME key is active
- All commands disabled.
5
Yes
- Front panel display and keys
disabled
- All commands disabled
Table 7.1: Security Levels and Features
1
For Level 1, a user connected to a COM port may change that port’s configuration (e.g. broadcast
ON/OFF).
2
North American Electric Reliability Corporation – Critical Infrastructure Protection
Содержание 1200B
Страница 4: ...iv ...
Страница 135: ...A 3 Physical Dimensions 117 Figure A 2 Suggested Mounting of the GNSS Surge Arrester ...
Страница 143: ...B 7 Four Fiber Optic Outputs 125 Figure B 4 Jumper Locations ...
Страница 145: ...B 8 8 Channel High Drive IRIG B Amplifier 127 Figure B 5 8 High Drive Outputs Jumper Locations ...
Страница 161: ...B 10 Four Additional Outputs and Dry Contacts 25 50 Vdc 143 Figure B 7 Option Connector Signal Locations ...
Страница 212: ...Appendix E Statement of Compliance The following page is a statement of compliance that includes Model 1201B and 1201C ...