Cybersentry - GE 845 Instruction Manual

Transformer protection relay
Hide thumbs Also See for 845:
Table of Contents

Advertisement

DEVICE
NOTE:

CyberSentry

FASTPATH:
4–18
If the maximum number of Observer roles already logged in on the relay has been reached,
you must log in on the Security screen within one minute of making the connection
otherwise your session is terminated.
The following features are supported in the CyberSentry feature:
CyberSentry provides secure tunneling of MODBUS communications between itself
and the EnerVista setup software, using SSH.
All the roles supported in the Basic Security are supported.
Server authentication using RADIUS is added.
SECURE TUNNELING
The following items are supported in the feature:
Under the CyberSentry option, the 8 Series supports SSH secure tunneling of MODBUS
communications between itself and EnerVista setup software.
SSH secure tunneling is supported on Ethernet only.
If bypass security is set (through setpoint access), the communications over Ethernet
is not encrypted.
ROLE ACCESS MAP
The detailed role access map is defined in the following figure.
Figure 4-8: Role Access Map
Commands may be issued freely through protocols other than Modbus (e.g., DNP, IEC 104,
and, IEC 61850) without user authentication or encryption of data taking place, even if the
relay has the advanced security feature enabled.
SECURITY SETTINGS STRUCTURE
The figure below shows the location of the Security settings in the device display hierarchy.
845 TRANSFORMER PROTECTION SYSTEM – INSTRUCTION MANUAL
CHAPTER 4: SETPOINTS

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents