User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Figure1.1 Typical SEL3022 and SEL5810 Virtual Serial Software Application 1.2
- Figure1.2 Encrypted Packet Stream 1.4
- Figure1.3 Typical Connections for the SEL3022 1.6
- Figure1.4 Typical Alarm Output Installation 1.8
- Figure2.1 SEL3022 Dimension Drawing 2.2
- Figure2.2 Windows Run Command 2.3
- Figure2.3 Product Unregistered Prompt 2.4
- Figure2.4 Select a Device Type to Create 2.7
- Figure2.5 Specify New Device Location 2.8
- Figure2.6 Opening Device 2.8
- Figure2.7 Identification Screen 2.9
- Figure2.8 Status: Device 2.10
- Figure2.9 Settings: Wireless 2.10
- Figure2.10 Settings: WEP Keys 2.11
- Figure2.11 Settings: User 2.11
- Figure2.12 Settings: Operator 2.12
- Figure2.13 Settings: Security Officer 2.12
- Figure2.14 Confirm Send Prompt 2.13
- Figure2.15 Send Operation Message 2.13
- Figure2.16 Select Items to Print 2.14
- Figure2.17 Print Window 2.14
- Figure3.1 Remotely Located Recloser Control 3.2
- Figure3.2 Job Done Example SEL-5809 Top Level View 3.3
- Figure3.3 Select a Wireless Session for DNP3 Job Done Example 3.4
- Figure3.4 Settings: DCE Port 3.4
- Figure3.5 Status: Virtual Serial Port With Connection Status Red 3.5
- Figure3.6 Communication Parameters Window in acSELerator 3.6
- Figure3.7 Status: Virtual Serial Port With Connection Status Green 3.6
- Figure3.8 Reading Settings Via the SEL3022 3.7
- Figure3.9 Monitoring SEL651R Meter Data Via the SEL3022 3.8
- Figure3.10 Status: Virtual Serial Port Connection Status Red 3.9
- Figure3.11 Specify Device to Export to SEL5810 Virtual Serial Software 3.10
- Figure3.12 Export Encrypted User Configuration File 3.10
- Figure3.13 Store Encrypted File 3.11
- Figure3.14 Password Prompt in SEL5810 Virtual Serial Software 3.12
- Figure3.15 Communication Parameters Window in acSELerator 3.13
- Figure3.16 Reading SER Report Via acSELerator 3.14
- FigureB.1 PC to SEL3022 Connection B.2
- FigureB.2 SEL3022 and SEL-5809 Connection Parameters B.2
- FigureB.3 SEL5809 Settings Software Connection Method B.3
- FigureB.4 SEL-5809 Opening Connection B.3
- FigureB.5 Status: Device Window B.4
- FigureB.6 Confirmation Prompt B.4
- FigureB.7 Send Operation Prompt B.4
- FigureB.8 Configuring Serial Port Settings in the Terminal Software B.5
- FigureB.9 Send File Prompt B.6
- FigureB.10 Sending Confirmation Window B.6
- FigureB.11 Terminal Invalid Firmware Error Message B.7
- FigureB.12 Terminal Valid Firmware Message B.7
- FigureC.1 Two Independent Layers of Cryptographic Security Protect the SEL3022 Wireless Operato...
- FigureC.2 Operation of the HMAC SHA-1 Keyed Hash Authentication Function C.9
- FigureC.3 Operation of the AES Encryption Function C.10
- FigureC.4 SEL3022 Security Application Overview C.11
- FigureC.5 Wireless Interface Session Authentication Dialog C.15
- Preface
- Introduction & Specifications
- Installation
- Job Done Example
- Settings and Commands
- Testing and Troubleshooting
- Firmware and Manual Versions
- Firmware Upgrade Instructions
- Wireless Operator Interface Security
- Introduction
- Wireless Interface Security Overview
- IEEE 802.11 WEP Security
- The SEL Security Application
- Certificates
- Glossary
SEL-3022 Transceiver Instruction Manual Date Code 20050615
Settings and Commands
Wireless Port Settings
4.4
Cryptographic Manual—Do Not Copy
The SEL-3022 provides three login roles on the wireless interface. The User role
allows EIA-232 to 802.11b wireless communication. SEL-3022 parameters cannot be
changed in the User role.
The Operator role provides read and write privileges on all settings except those that
may compromise the security of the device (encryption and authentication keys, access
passwords, settings that may disable critical security functions, etc.). In addition, the
Operator login role can access all of the SEL-3022 diagnostics capabilities.
The Security Officer login role provides a slightly higher access privilege by allowing
all of the actions provided by the Operator login role, plus the ability to write new
values to all cryptographic security parameters and sensitive settings. The three
individual roles are authenticated on the wireless operator interface using a completely
separate set of login authentication parameters.
There is an Encryption Key, Authentication Key, and Password associated with each
login role. The values of each of these three settings must be different for each of the
three roles.
Table 4.3 Settings: WEP Keys
Setting Name Setting Description Value or Range
WEP Key 1 Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
WEP Key 2 Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
WEP Key 3 Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
WEP Key 4 Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
Ta b le 4. 4 S e t t i n g s : Use r
Setting Name Description Value or Range
Encryption Key Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Authentication Key Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Password Password or Pass Phrase for user-controlled
access, referred to as Access Level 1.
6–80 printable
ASCII characters
Preliminary Copy