User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Figure1.1 Typical SEL3022 and SEL5810 Virtual Serial Software Application 1.2
- Figure1.2 Encrypted Packet Stream 1.4
- Figure1.3 Typical Connections for the SEL3022 1.6
- Figure1.4 Typical Alarm Output Installation 1.8
- Figure2.1 SEL3022 Dimension Drawing 2.2
- Figure2.2 Windows Run Command 2.3
- Figure2.3 Product Unregistered Prompt 2.4
- Figure2.4 Select a Device Type to Create 2.7
- Figure2.5 Specify New Device Location 2.8
- Figure2.6 Opening Device 2.8
- Figure2.7 Identification Screen 2.9
- Figure2.8 Status: Device 2.10
- Figure2.9 Settings: Wireless 2.10
- Figure2.10 Settings: WEP Keys 2.11
- Figure2.11 Settings: User 2.11
- Figure2.12 Settings: Operator 2.12
- Figure2.13 Settings: Security Officer 2.12
- Figure2.14 Confirm Send Prompt 2.13
- Figure2.15 Send Operation Message 2.13
- Figure2.16 Select Items to Print 2.14
- Figure2.17 Print Window 2.14
- Figure3.1 Remotely Located Recloser Control 3.2
- Figure3.2 Job Done Example SEL-5809 Top Level View 3.3
- Figure3.3 Select a Wireless Session for DNP3 Job Done Example 3.4
- Figure3.4 Settings: DCE Port 3.4
- Figure3.5 Status: Virtual Serial Port With Connection Status Red 3.5
- Figure3.6 Communication Parameters Window in acSELerator 3.6
- Figure3.7 Status: Virtual Serial Port With Connection Status Green 3.6
- Figure3.8 Reading Settings Via the SEL3022 3.7
- Figure3.9 Monitoring SEL651R Meter Data Via the SEL3022 3.8
- Figure3.10 Status: Virtual Serial Port Connection Status Red 3.9
- Figure3.11 Specify Device to Export to SEL5810 Virtual Serial Software 3.10
- Figure3.12 Export Encrypted User Configuration File 3.10
- Figure3.13 Store Encrypted File 3.11
- Figure3.14 Password Prompt in SEL5810 Virtual Serial Software 3.12
- Figure3.15 Communication Parameters Window in acSELerator 3.13
- Figure3.16 Reading SER Report Via acSELerator 3.14
- FigureB.1 PC to SEL3022 Connection B.2
- FigureB.2 SEL3022 and SEL-5809 Connection Parameters B.2
- FigureB.3 SEL5809 Settings Software Connection Method B.3
- FigureB.4 SEL-5809 Opening Connection B.3
- FigureB.5 Status: Device Window B.4
- FigureB.6 Confirmation Prompt B.4
- FigureB.7 Send Operation Prompt B.4
- FigureB.8 Configuring Serial Port Settings in the Terminal Software B.5
- FigureB.9 Send File Prompt B.6
- FigureB.10 Sending Confirmation Window B.6
- FigureB.11 Terminal Invalid Firmware Error Message B.7
- FigureB.12 Terminal Valid Firmware Message B.7
- FigureC.1 Two Independent Layers of Cryptographic Security Protect the SEL3022 Wireless Operato...
- FigureC.2 Operation of the HMAC SHA-1 Keyed Hash Authentication Function C.9
- FigureC.3 Operation of the AES Encryption Function C.10
- FigureC.4 SEL3022 Security Application Overview C.11
- FigureC.5 Wireless Interface Session Authentication Dialog C.15
- Preface
- Introduction & Specifications
- Installation
- Job Done Example
- Settings and Commands
- Testing and Troubleshooting
- Firmware and Manual Versions
- Firmware Upgrade Instructions
- Wireless Operator Interface Security
- Introduction
- Wireless Interface Security Overview
- IEEE 802.11 WEP Security
- The SEL Security Application
- Certificates
- Glossary
SEL-3022 Transceiver Instruction Manual Date Code 20050615
Wireless Operator Interface Security
The SEL Security Application
C.16
Cryptographic Manual—Do Not Copy
The connection dialog begins with a connection request frame (Frame 1 in Figure C.5)
that is encrypted and authenticated with encryption and authentication keys
programmed into the SEL-5809 Settings Software device image. Upon receiving the
connection request, the SEL-3022 decrypts and authenticates the frame. If the
authentication fails, indicating that the session request came from other than an
authorized user (i.e., a PC programmed with the appropriate AES encryption and
HMAC SHA-1 authentication keys), the SEL-3022 ignores the session request and
remains silent. Note that the initial connection frame must be directed at the correct
User Datagram Protocol (UDP) port on the wireless TCP/IP interface of the SEL-3022
transceiver. Because the UDP protocol does not require a connection handshake, as
does TCP protocol, the SEL-3022 only transmits a TCP/IP frame in response to a fully
authenticated connection request frame. This feature ensures that the SEL-3022 is
immune to traditional port mapping and network reconnaissance techniques such as
ping sweeps, TCP SYN scans, or TCP FIN scans.
If the initial connection request frame passes the authentication process, the SEL-3022
generates a large, random challenge value and transmits it to the PC (Frame 2 in
Figure C.5). Upon receipt of the First Challenge frame, the PC must insert the received
challenge value into a new encrypted and authenticated frame and transmit it to the
SEL-3022 (Frame 3 in Figure C.5). In addition, this First Challenge frame contains the
password information you entered in the SEL-5809 Settings Software session
connection dialog box. When the SEL-3022 receives this frame, it decrypts and
authenticates it. If the authentication fails, again indicating that the session request
came from an unauthorized user, the SEL-3022 terminates the session and resets the
session connection dialog. If the frame passes authentication, the SEL-3022 compares
the transmitted password information with the password value stored in the SEL-3022
settings. It is important to note that if the transmitted password information indicates
that the user entered the wrong password, or if the decrypted challenge value does not
match the challenge value transmitted in Frame 2 of the connection dialog, the
SEL-3022 again terminates the session and resets the connection dialog.
➤ The password you entered in the SEL-5809 Settings Software must
match the password value stored in the SEL-3022 device, or the
session connection will fail. This guarantees that a stolen
maintenance PC programmed with the correct encryption and
authentication keys cannot be used to connect to the SEL-3022
without the user having direct knowledge of the programmed
password value stored in the SEL-3022 (the SEL-5809 Settings
Software never stores the password value on the PC hard drive).
➤ The large, random challenge value that the SEL-3022 formed and
transmitted in Frame 2 of the connection dialog is, with very high
probability, different for every wireless session. Because of this large,
random value, a malicious individual cannot capture a previous
session dialog and use the captured packets to reconnect to the
SEL-3022 (known as a session replay attack). If someone attempted
such an attack, the challenge value transmitted in the First Challenge
Response With Password frame (Frame 3 in Figure C.5) would not
Preliminary Copy