EasyManua.ls Logo

ABB RELION REX615 - Page 8

ABB RELION REX615
59 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
3.7 Secure communication.........................................................................................................................22
3.7.1 Secure authentication setup............................................................................................... 22
3.7.2 TLS encryption.......................................................................................................................23
3.7.3 Relay user and key management (IEC 60870-5-104 client)........................................... 23
3.7.4 Secure authentication settings..........................................................................................24
3.7.5 Statistics and security events.............................................................................................25
3.7.6 Troubleshooting.................................................................................................................... 25
3.8 Commissioning......................................................................................................................................25
3.8.1 Communication link settings..............................................................................................25
3.8.2 Secure communication settings........................................................................................ 28
3.8.3 IEC 60870-5-104 application level settings......................................................................29
3.8.4 Update rate of analog and indication protocol data......................................................31
3.8.5 Diagnostic values.................................................................................................................. 32
3.8.6 Advanced protocol customization..................................................................................... 33
4 IEC 60870-5-104 interoperability.......................................................... 35
4.1 Overview..................................................................................................................................................35
4.2 System or device....................................................................................................................................35
4.3 Network configuration.........................................................................................................................35
4.4 Link layer................................................................................................................................................. 36
4.5 Application layer.................................................................................................................................... 37
4.6 Basic application functions.................................................................................................................42
5 Secure authentication conformance statement..................................47
5.1 Overview of clause................................................................................................................................ 47
5.2 Required algorithms............................................................................................................................. 47
5.3 MAC algorithms..................................................................................................................................... 47
5.4 Key wrap algorithms.............................................................................................................................47
5.5 Use of error messages......................................................................................................................... 48
5.6 Update key change methods..............................................................................................................48
5.7 User status change...............................................................................................................................48
5.8 Configurable parameters.................................................................................................................... 49
5.9 Configurable statistic thresholds and statistic information object addresses.......................50
5.10 Critical functions...................................................................................................................................50
6 IEC 60870-5-104 parameters................................................................. 53
6.1 IEC 101-104 General settings...............................................................................................................53
6.2 Secure communication parameters.................................................................................................. 54
6.2.1 IEC 101-104 Secure settings................................................................................................ 54
6.2.2 IEC 101-104 Secure statistics thresholds settings..........................................................55
6.3 IEC 101-104 Monitored data................................................................................................................ 56
6.4 Monitored data for secure communication..................................................................................... 56
Contents
8 REX615
IEC 60870-5-104 Communication Protocol Manual

Table of Contents

Related product manuals