6.4.5 Event Extraction 339
6.4.6 Disturbance Record Extraction 340
6.4.7 Setting Changes 347
6.4.8 Password Protection 347
6.4.9 Protection and Disturbance Recorder Settings 347
6.4.10 Time Synchronisation 348
6.4.11 Power and Energy Measurement Data Formats 349
6.4.12 MODBUS Configuration 350
6.5 IEC 61850 351
6.5.1 Benefits of IEC 61850 351
6.5.2 IEC 61850 Interoperability 352
6.5.3 The IEC 61850 Data Model 352
6.5.4 IEC 61850 in MiCOM IEDs 353
6.5.5 IEC 61850 Data Model Implementation 353
6.5.6 IEC 61850 Communication Services Implementation 353
6.5.7 IEC 61850 Peer-to-peer (GOOSE) communications 354
6.5.8 Mapping GOOSE Messages to Virtual Inputs 354
6.5.9 Ethernet Functionality 354
6.5.10 IEC 61850 Configuration 355
6.6 Concurrent IEC 61850 and DNP3.0 Operation 356
7 Read Only Mode 358
7.1 IEC 60870-5-103 Protocol Blocking 358
7.2 Courier Protocol Blocking 358
7.3 IEC 61850 Protocol Blocking 359
7.4 Read-Only Settings 359
7.5 Read-Only DDB Signals 359
8 Time Synchronisation 360
8.1 Demodulated IRIG-B 360
8.1.1 Demodulated IRIG-B Implementation 361
8.2 SNTP 361
8.3 Time Synchronsiation using the Communication Protocols 361
Chapter 17 Cyber-Security 363
1 Overview 365
2 The Need for Cyber-Security 366
3 Standards 367
3.1 NERC Compliance 367
3.1.1 CIP 002 368
3.1.2 CIP 003 368
3.1.3 CIP 004 368
3.1.4 CIP 005 368
3.1.5 CIP 006 368
3.1.6 CIP 007 369
3.1.7 CIP 008 369
3.1.8 CIP 009 369
3.2 IEEE 1686-2007 369
4 Cyber-Security Implementation 371
4.1 NERC-Compliant Display 371
4.2 Four-level Access 372
4.2.1 Blank Passwords 373
4.2.2 Password Rules 374
4.2.3 Access Level DDBs 374
4.3 Enhanced Password Security 374
4.3.1 Password Strengthening 374
4.3.2 Password Validation 375
4.3.3 Password Blocking 375
4.4 Password Recovery 376
Contents P24xM
x P24xM-TM-EN-2.1