User's Manual

7
address as a legitimate machine that is the target for external data distribution. This cannot be defeated using firewall
configuration, since external access for on-demand reads and alarm configuration is necessary.
There is currently no
effective answer in these specifications for this form of attack. There is no potential for harm to the source utility
databases or the Innovatec communications network, however meter data that was set up for external data
distribution could be monitored.
A computer cracker runs a program that bombards the ENICS system with random packets or bogus login attempts.
By using up the available bandwidth, access to the ENICS system by legitimate users is prevented (i.e., a denial of
service attack). There is no way to automatically defeat this type of attack. Rejects of improper access attempts to
the ENICS system should be logged, including the host name of the source of the attempt. Care should be taken that
repeated illegal access attempt by the same source do not fill up the logging database. This log will aid in tracking
down the offending party.
Export Restrictions
Some of the strong cryptographic algorithms that we plan to use to protect data confidentiality are export restricted.
This means that if an ENICS system is deployed outside of the borders of the United States that it may be necessary to
plug in a different set of weaker algorithms to meet export restrictions. The software shall be structured in such a way
that it is possible to easily produce an export version that uses different cryptographic algorithms than the regular
ENICS software.
Internationalization
There are no plans to export the ENICS software to non English speaking countries. Internationalization of the ENICS
servers, applications or applets is not required.
Factory/Depot/Installation Work Flow
IMUs, relays and gateways are expected to follow a certain work flow during their lifetimes, as shown in Figure 2.
IMUs, relays and gateways are assembled at the factory. At this point IMUs and relays are assigned a Utility Serial
Number (i.e., pin #) and a channel. Gateways should have their WANs activated, if possible. IMUs, relays and
gateways should be tested via the RF and (in the case of gateways) via the WAN interface (
see Gateway Node
Noninvasive Test Procedure Specification
). The tool used to perform these functions is the Factory Commissioning
and Test tool.
IMUs, relays and gateways are manufactured in response to projected demand, rather than for a specific utility order.
Therefore, at the factory utility serial numbers (i.e., pin numbers) are assigned sequentially, but not associated with
any specific Innovatec customer.
IMUs, relays and gateways are forwarded to a utility depot. At this point they must be associated with a certain
customer (for IMUs) or a certain location and set of IMUs (for relays and gateways), the association loaded into the
network configuration database and work orders generated and IMUs registered with their respective gateways. These
functions are preformed (directly or indirectly) using the Depot Commissioning tool. In addition, the units may be
tested again using the Field Maintenance and Diagnosis tool.