3.7 Secure communication.........................................................................................................................22
3.7.1 Secure authentication setup............................................................................................... 22
3.7.2 TLS encryption.......................................................................................................................23
3.7.3 Relay user and key management (IEC 60870-5-104 client)........................................... 23
3.7.4 Secure authentication settings..........................................................................................24
3.7.5 Statistics and security events.............................................................................................25
3.7.6 Troubleshooting.................................................................................................................... 25
3.8 Commissioning......................................................................................................................................25
3.8.1 Communication link settings..............................................................................................25
3.8.2 Secure communication settings........................................................................................ 28
3.8.3 IEC 60870-5-104 application level settings......................................................................29
3.8.4 Update rate of analog and indication protocol data......................................................31
3.8.5 Diagnostic values.................................................................................................................. 32
3.8.6 Advanced protocol customization..................................................................................... 33
4 IEC 60870-5-104 interoperability.......................................................... 35
4.1 Overview..................................................................................................................................................35
4.2 System or device....................................................................................................................................35
4.3 Network configuration.........................................................................................................................35
4.4 Link layer................................................................................................................................................. 36
4.5 Application layer.................................................................................................................................... 37
4.6 Basic application functions.................................................................................................................42
5 Secure authentication conformance statement..................................47
5.1 Overview of clause................................................................................................................................ 47
5.2 Required algorithms............................................................................................................................. 47
5.3 MAC algorithms..................................................................................................................................... 47
5.4 Key wrap algorithms.............................................................................................................................47
5.5 Use of error messages......................................................................................................................... 48
5.6 Update key change methods..............................................................................................................48
5.7 User status change...............................................................................................................................48
5.8 Configurable parameters.................................................................................................................... 49
5.9 Configurable statistic thresholds and statistic information object addresses.......................50
5.10 Critical functions...................................................................................................................................50
6 IEC 60870-5-104 parameters................................................................. 53
6.1 IEC 101-104 General settings...............................................................................................................53
6.2 Secure communication parameters.................................................................................................. 54
6.2.1 IEC 101-104 Secure settings................................................................................................ 54
6.2.2 IEC 101-104 Secure statistics thresholds settings..........................................................55
6.3 IEC 101-104 Monitored data................................................................................................................ 56
6.4 Monitored data for secure communication..................................................................................... 56
Contents
8 REX615
IEC 60870-5-104 Communication Protocol Manual