5.5 Use of error messages
Transmits error messages
5.6 Update key change methods
None permitted
<4> Symmetric AES-256 /
HMACSHA- 256 (required)
<5> Symmetric AES-256 / AESG-
MAC
<68> Asymmetric RSA-2048 /
DSA SHA-256 (L=2048 N=256) /
HMAC-SHA-256
<69> Asymmetric RSA-3072 /
DSA SHA-256 (L=3072 N=256) /
AES-SHA-256
<70> Asymmetric RSA-2048 /
DSA SHA-256 (L=2048 N=256) /
HMAC-GMAC
<71> Asymmetric RSA-3072 /
DSA SHA-256 (L=3072 N=256) /
AES-GMAC
Other _____________
Mandatory algorithm could not
be provided.
Reason: _____________
5.7 User status change
Non-certificate method (required)
Use IEC/TS 62351-8 Certificates
Secure authentication conformance
statement
2NGA001859 A
48 REX615
IEC 60870-5-104 Communication Protocol Manual