User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Figure1.1 Typical SEL3022 and SEL5810 Virtual Serial Software Application 1.2
- Figure1.2 Encrypted Packet Stream 1.4
- Figure1.3 Typical Connections for the SEL3022 1.6
- Figure1.4 Typical Alarm Output Installation 1.8
- Figure2.1 SEL3022 Dimension Drawing 2.2
- Figure2.2 Windows Run Command 2.3
- Figure2.3 Product Unregistered Prompt 2.4
- Figure2.4 Select a Device Type to Create 2.7
- Figure2.5 Specify New Device Location 2.8
- Figure2.6 Opening Device 2.8
- Figure2.7 Identification Screen 2.9
- Figure2.8 Status: Device 2.10
- Figure2.9 Settings: Wireless 2.10
- Figure2.10 Settings: WEP Keys 2.11
- Figure2.11 Settings: User 2.11
- Figure2.12 Settings: Operator 2.12
- Figure2.13 Settings: Security Officer 2.12
- Figure2.14 Confirm Send Prompt 2.13
- Figure2.15 Send Operation Message 2.13
- Figure2.16 Select Items to Print 2.14
- Figure2.17 Print Window 2.14
- Figure3.1 Remotely Located Recloser Control 3.2
- Figure3.2 Job Done Example SEL-5809 Top Level View 3.3
- Figure3.3 Select a Wireless Session for DNP3 Job Done Example 3.4
- Figure3.4 Settings: DCE Port 3.4
- Figure3.5 Status: Virtual Serial Port With Connection Status Red 3.5
- Figure3.6 Communication Parameters Window in acSELerator 3.6
- Figure3.7 Status: Virtual Serial Port With Connection Status Green 3.6
- Figure3.8 Reading Settings Via the SEL3022 3.7
- Figure3.9 Monitoring SEL651R Meter Data Via the SEL3022 3.8
- Figure3.10 Status: Virtual Serial Port Connection Status Red 3.9
- Figure3.11 Specify Device to Export to SEL5810 Virtual Serial Software 3.10
- Figure3.12 Export Encrypted User Configuration File 3.10
- Figure3.13 Store Encrypted File 3.11
- Figure3.14 Password Prompt in SEL5810 Virtual Serial Software 3.12
- Figure3.15 Communication Parameters Window in acSELerator 3.13
- Figure3.16 Reading SER Report Via acSELerator 3.14
- FigureB.1 PC to SEL3022 Connection B.2
- FigureB.2 SEL3022 and SEL-5809 Connection Parameters B.2
- FigureB.3 SEL5809 Settings Software Connection Method B.3
- FigureB.4 SEL-5809 Opening Connection B.3
- FigureB.5 Status: Device Window B.4
- FigureB.6 Confirmation Prompt B.4
- FigureB.7 Send Operation Prompt B.4
- FigureB.8 Configuring Serial Port Settings in the Terminal Software B.5
- FigureB.9 Send File Prompt B.6
- FigureB.10 Sending Confirmation Window B.6
- FigureB.11 Terminal Invalid Firmware Error Message B.7
- FigureB.12 Terminal Valid Firmware Message B.7
- FigureC.1 Two Independent Layers of Cryptographic Security Protect the SEL3022 Wireless Operato...
- FigureC.2 Operation of the HMAC SHA-1 Keyed Hash Authentication Function C.9
- FigureC.3 Operation of the AES Encryption Function C.10
- FigureC.4 SEL3022 Security Application Overview C.11
- FigureC.5 Wireless Interface Session Authentication Dialog C.15
- Preface
- Introduction & Specifications
- Installation
- Job Done Example
- Settings and Commands
- Testing and Troubleshooting
- Firmware and Manual Versions
- Firmware Upgrade Instructions
- Wireless Operator Interface Security
- Introduction
- Wireless Interface Security Overview
- IEEE 802.11 WEP Security
- The SEL Security Application
- Certificates
- Glossary
SEL-3022 Transceiver Instruction Manual Date Code 20050615
Wireless Operator Interface Security
The SEL Security Application
C.14
Cryptographic Manual—Do Not Copy
Even with a strong, six-character password, an attacker could expect to spend more
than 60,000 years trying to launch a successful brute-force password-guessing attack
on the SEL-3022. Such a brute-force password guessing attack is statistically
impossible because of the potential strength of the SEL-3022 connection passwords
(very long password length with the password consisting of a very large number of
possible characters), and password-guessing rate limit that the five-second wireless
port timeout imposes on all connection authentication failures.
Connection Authentication
and Session Replay Protection
SEL-3022 Wireless Port Status
Prior to Security Parameter Initialization
The SEL-3022 uses two access levels for monitoring and configuration. Each access
level has the following security parameters: 128-bit encryption key, 128-bit
authentication key, and a password containing as many as 80 characters. Also included
in the security parameters are the 104-bit WEP keys. From the factory, cryptographic
security parameters are zeroized. At power up, the SEL-3022 determines if the
cryptographic security parameters are set to trivial (zero) values. If these parameters
are set to trivial values, the 802.11b wireless port is disabled. If the SEL-3022 is
initialized with zeroized values, or if any of these initial security parameters are left at
a zeroized value, the device will not leave the initialization mode, and the wireless port
will remain disabled. Following entry of non-zeroized security parameters, the
SEL-3022 enables the wireless module and enables both WEP and the SEL Security
Application. This ensures that data are never transmitted via the 802.11b interface with
default/trivial encryption keys.
SEL-3022 Security Parameters and Passwords
The SEL-5809 Settings Software is necessary to initiate a wireless session. The
SEL-5809 Settings Software must be programmed with identical encryption and
authentication security parameters as the SEL-3022 to which it will be connected.
Furthermore, you must enter into the SEL-5809, when prompted, the same password
stored in the SEL-3022. Note that neither a PC nor a PDA stores this password; the
user must enter this password from memory. Because the PC does not store password
values, no one can use just a PC or PDA to connect successfully with the SEL-3022
... ... ...
80 3.86 • 10
158
3.06 • 10
151
Table C.1 Number of Years Required to Guess an SEL-3022 Password
Password
Length
Number of Possible
Password Values
Average Number of Years Required to
Guess the Password (Assuming Strong
Password Choice)
Preliminary Copy