6.4.8 Password Protection 360
6.4.9 Protection and Disturbance Recorder Settings 360
6.4.10 Time Synchronisation 361
6.4.11 Power and Energy Measurement Data Formats 362
6.4.12 MODBUS Configuration 363
6.5 IEC 61850 364
6.5.1 Benefits of IEC 61850 364
6.5.2 IEC 61850 Interoperability 365
6.5.3 The IEC 61850 Data Model 365
6.5.4 IEC 61850 in MiCOM IEDs 366
6.5.5 IEC 61850 Data Model Implementation 366
6.5.6 IEC 61850 Communication Services Implementation 366
6.5.7 IEC 61850 Peer-to-peer (GOOSE) communications 367
6.5.8 Mapping GOOSE Messages to Virtual Inputs 367
6.5.9 Ethernet Functionality 367
6.5.10 IEC 61850 Configuration 367
7 Read Only Mode 369
7.1 IEC 60870-5-103 Protocol Blocking 369
7.2 Courier Protocol Blocking 369
7.3 IEC 61850 Protocol Blocking 370
7.4 Read-Only Settings 370
7.5 Read-Only DDB Signals 370
8 Time Synchronisation 371
8.1 Demodulated IRIG-B 371
8.1.1 IRIG-B Implementation 371
8.2 SNTP 372
8.3 Time Synchronsiation using the Communication Protocols 372
Chapter 17 Cyber-Security 373
1 Overview 375
2 The Need for Cyber-Security 376
3 Standards 377
3.1 NERC Compliance 377
3.1.1 CIP 002 378
3.1.2 CIP 003 378
3.1.3 CIP 004 378
3.1.4 CIP 005 378
3.1.5 CIP 006 378
3.1.6 CIP 007 379
3.1.7 CIP 008 379
3.1.8 CIP 009 379
3.2 IEEE 1686-2007 379
4 Cyber-Security Implementation 381
4.1 NERC-Compliant Display 381
4.2 Four-level Access 382
4.2.1 Blank Passwords 383
4.2.2 Password Rules 383
4.2.3 Access Level DDBs 384
4.3 Enhanced Password Security 384
4.3.1 Password Strengthening 384
4.3.2 Password Validation 384
4.3.3 Password Blocking 385
4.4 Password Recovery 386
4.4.1 Password Recovery 386
4.4.2 Password Encryption 387
4.5 Disabling Physical Ports 387
4.6 Disabling Logical Ports 387
Contents P64x
x P64x-TM-EN-1.3