7.4.8 Mapping GOOSE Messages to Virtual Inputs 590
7.4.9 Ethernet Functionality 591
7.4.10 IEC 61850 Configuration 591
7.4.11 IEC 61850 Edition 2 592
8 Read Only Mode 596
8.1 IEC 60870-5-103 Protocol Blocking 596
8.2 Courier Protocol Blocking 596
8.3 IEC 61850 Protocol Blocking 597
8.4 Read-Only Settings 597
8.5 Read-Only DDB Signals 597
9 Time Synchronisation 598
9.1 Demodulated IRIG-B 598
9.1.1 IRIG-B Implementation 599
9.2 SNTP 599
9.2.1 Loss of SNTP Server Signal Alarm 599
9.3 IEEE 1588 Precision time Protocol 599
9.3.1 Accuracy and Delay Calculation 599
9.3.2 PTP Domains 600
9.4 Time Synchronsiation using the Communication Protocols 600
Chapter 23 Cyber-Security 601
1 Overview 603
2 The Need for Cyber-Security 604
3 Standards 605
3.1 NERC Compliance 605
3.1.1 CIP 002 606
3.1.2 CIP 003 606
3.1.3 CIP 004 606
3.1.4 CIP 005 606
3.1.5 CIP 006 606
3.1.6 CIP 007 607
3.1.7 CIP 008 607
3.1.8 CIP 009 607
3.2 IEEE 1686-2007 607
4 Cyber-Security Implementation 609
4.1 NERC-Compliant Display 609
4.2 Four-level Access 610
4.2.1 Blank Passwords 611
4.2.2 Password Rules 611
4.2.3 Access Level DDBs 612
4.3 Enhanced Password Security 612
4.3.1 Password Strengthening 612
4.3.2 Password Validation 612
4.3.3 Password Blocking 613
4.4 Password Recovery 614
4.4.1 Password Recovery 614
4.4.2 Password Encryption 615
4.5 Disabling Physical Ports 615
4.6 Disabling Logical Ports 615
4.7 Security Events Management 616
4.8 Logging Out 618
Chapter 24 Installation 619
1 Chapter Overview 621
2 Handling the Goods 622
2.1 Receipt of the Goods 622
Contents P543i/P545i
xvi P54x1i-TM-EN-1