Schweitzer Engineering Laboratories SEL3X22 SEL-3022 User Manual 3022

Schweitzer Engineering Laboratories, Inc. SEL-3022 3022

Users Manual

Download: Schweitzer Engineering Laboratories SEL3X22 SEL-3022 User Manual 3022
Mirror Download [FCC.gov]Schweitzer Engineering Laboratories SEL3X22 SEL-3022 User Manual 3022
Document ID556498
Application IDvKyi06LVoYKN8kroOicRyw==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize198.66kB (2483248 bits)
Date Submitted2005-06-28 00:00:00
Date Available2005-06-28 00:00:00
Creation Date2005-06-15 07:37:17
Producing SoftwareAcrobat Distiller 6.0.1 (Windows)
Document Lastmod2005-06-20 09:28:00
Document Title3022.book
Document CreatorFrameMaker 6.0
Document Author: heatkn

Preliminary Copy
SEL-3022
Wireless Encrypting Transceiver
Instruction Manual
20050615
Attention
The SEL-3022 is a cryptographic device. Limit access to the
SEL-3022, SEL-5809 Settings Software, SEL-5810 Virtual
Serial Software, and SEL-3022 Instruction Manual to authorized
personnel only. Do not copy these items. Securely store these
items when not in use. Destroy these items when no longer
needed.
Preliminary Copy
CAUTION: Removal of enclosure
! panels exposes circuitry which may
cause electrical shock which can result in
injury.
ATTENTION: Le retrait des
! panneaux du boîtier expose le circuit qui
peut causer des chocos électriques pouvant
entraîner des blessures.
The software (firmware), drawings, commands, and messages are copyright protected by the United States
Copyright Law and International Treaty provisions. All rights are reserved.
You may not copy, alter, disassemble, or reverse-engineer the software. You may not provide the software to
any third party.
All brand or product names appearing in this document are the trademark or registered trademark of their
respective holders.
ACSELERATOR, Connectorized, Job Done, MIRRORED BITS, Schweitzer Engineering Laboratories,
SELOGIC, SEL-PROFILE, and CONSELTANT are registered trademarks of Schweitzer Engineering
Laboratories, Inc.
, SEL,
The English language manual is the only approved SEL manual.
© 2005 Schweitzer Engineering Laboratories. All rights reserved.
This product is covered by U.S. Patent(s) Pending, and Foreign Patent(s) Issued and Pending.
This product is covered by the standard SEL 10-year warranty. For warranty details, visit www.selinc.com or
contact your customer service representative.
PM3022-01
Cryptographic Manual—Do Not Copy
Preliminary Copy
Table of Contents
List of Tables ........................................................................................................... iii
List of Figures ...........................................................................................................v
Preface...................................................................................................................... vii
Section 1: Introduction & Specifications
Introduction ............................................................................................................1.1
Product Overview...................................................................................................1.2
Application Overview ............................................................................................1.5
Connections, Reset Button, and LED Indications..................................................1.6
Software System Requirements ...........................................................................1.10
General Safety and Care Information ..................................................................1.11
Specifications .......................................................................................................1.12
Section 2: Installation
Introduction ............................................................................................................2.1
Dimension Drawing ...............................................................................................2.2
Setting Up Your PC or PDA With the SEL-5809 and SEL-5810 Software ...........2.3
Initializing the SEL-3022 .......................................................................................2.7
Section 3: Job Done Example
Introduction ............................................................................................................3.1
Job Done Example 1 ..............................................................................................3.2
Section 4: Settings and Commands
Introduction ............................................................................................................4.1
Serial Port Settings.................................................................................................4.2
Wireless Port Settings ............................................................................................4.3
Communication Status Command..........................................................................4.6
Device Information ................................................................................................4.7
Section 5: Testing and Troubleshooting
Introduction ............................................................................................................5.1
Testing Philosophy .................................................................................................5.2
Communications Channel Diagnostics ..................................................................5.4
Self-Tests................................................................................................................5.6
Troubleshooting .....................................................................................................5.7
Factory Assistance..................................................................................................5.8
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
ii
Table of Contents
Cryptographic Manual—Do Not Copy
Preliminary Copy
Appendix A: Firmware and Manual Versions
Firmware............................................................................................................... A.1
Instruction Manual................................................................................................ A.2
Appendix B: Firmware Upgrade Instructions
Introduction ...........................................................................................................B.1
Factory Assistance .................................................................................................B.8
Appendix C: Wireless Operator Interface Security
Introduction ...........................................................................................................C.1
Wireless Interface Security Overview ...................................................................C.2
IEEE 802.11 WEP Security...................................................................................C.5
The SEL Security Application...............................................................................C.9
Appendix D: Certificates
Glossary ................................................................................................................ GL.1
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
List of Tables
Table 1.1
Table 1.2
Table 4.1
Table 4.2
Table 4.3
Table 4.4
Table 4.5
Table 4.6
Table 4.7
Table 4.8
Table 4.9
Table 4.10
Table 4.11
Table 5.1
Table 5.2
Table 5.3
Table 5.4
Table A.1
Table A.2
Table C.1
Date Code 20050615
DCE (Female DB9) ..........................................................................1.8
Operating Systems and Wireless
Modules Tested With the SEL-5809 Settings Software ............1.10
Settings: DCE Port............................................................................4.2
Settings: Wireless..............................................................................4.3
Settings: WEP Keys ..........................................................................4.4
Settings: User....................................................................................4.4
Settings: Operator .............................................................................4.5
Settings: Security Officer..................................................................4.5
Status Command Names and Descriptions.......................................4.6
Identification .....................................................................................4.7
Status: Device ...................................................................................4.7
Status: Output Alarm ........................................................................4.8
Status: Virtual Serial Port .................................................................4.8
Status: Comm....................................................................................5.4
Device Status: Device Status ............................................................5.4
SEL-3022 Self-Test Capabilities ......................................................5.6
Troubleshooting ................................................................................5.7
Firmware Revision History..............................................................A.1
Instruction Manual Revision History...............................................A.2
Number of Years Required to Guess an SEL-3022 Password ....... C.13
Instruction Manual
SEL-3022 Transceiver
Preliminary Copy
This page intentionally left blank
Cryptographic Manual—Do Not Copy
Preliminary Copy
List of Figures
Figure 1.1
Figure 1.2
Figure 1.3
Figure 1.4
Figure 2.1
Figure 2.2
Figure 2.3
Figure 2.4
Figure 2.5
Figure 2.6
Figure 2.7
Figure 2.8
Figure 2.9
Figure 2.10
Figure 2.11
Figure 2.12
Figure 2.13
Figure 2.14
Figure 2.15
Figure 2.16
Figure 2.17
Figure 3.1
Figure 3.2
Figure 3.3
Figure 3.4
Figure 3.5
Figure 3.6
Figure 3.7
Figure 3.8
Figure 3.9
Figure 3.10
Figure 3.11
Figure 3.12
Figure 3.13
Figure 3.14
Figure 3.15
Figure 3.16
Figure B.1
Figure B.2
Date Code 20050615
Typical SEL-3022 and
SEL-5810 Virtual Serial Software Application ...........................1.2
Encrypted Packet Stream ..................................................................1.4
Typical Connections for the SEL-3022.............................................1.6
Typical Alarm Output Installation ....................................................1.8
SEL-3022 Dimension Drawing ........................................................2.2
Windows Run Command ..................................................................2.3
Product Unregistered Prompt............................................................2.4
Select a Device Type to Create .........................................................2.7
Specify New Device Location ..........................................................2.8
Opening Device ................................................................................2.8
Identification Screen .........................................................................2.9
Status: Device .................................................................................2.10
Settings: Wireless............................................................................2.10
Settings: WEP Keys ........................................................................2.11
Settings: User..................................................................................2.11
Settings: Operator ...........................................................................2.12
Settings: Security Officer................................................................2.12
Confirm Send Prompt .....................................................................2.13
Send Operation Message ................................................................2.13
Select Items to Print........................................................................2.14
Print Window ..................................................................................2.14
Remotely Located Recloser Control.................................................3.2
Job Done Example SEL-5809 Top Level View ................................3.3
Select a Wireless Session for DNP3 Job Done Example..................3.4
Settings: DCE Port............................................................................3.4
Status: Virtual Serial Port With Connection Status Red ...................3.5
Communication Parameters Window in ACSELERATOR ..................3.6
Status: Virtual Serial Port With Connection Status Green................3.6
Reading Settings Via the SEL-3022 .................................................3.7
Monitoring SEL-651R Meter Data Via the SEL-3022 .....................3.8
Status: Virtual Serial Port Connection Status Red............................3.9
Specify Device to Export to
SEL-5810 Virtual Serial Software.............................................3.10
Export Encrypted User Configuration File .....................................3.10
Store Encrypted File .......................................................................3.11
Password Prompt in
SEL-5810 Virtual Serial Software.............................................3.12
Communication Parameters Window in ACSELERATOR ................3.13
Reading SER Report Via ACSELERATOR .......................................3.14
PC to SEL-3022 Connection............................................................ B.2
SEL-3022 and SEL-5809 Connection Parameters........................... B.2
Instruction Manual
SEL-3022 Transceiver
vi
Cryptographic Manual—Do Not Copy
List of Figures
Preliminary Copy
Figure B.3
Figure B.4
Figure B.5
Figure B.6
Figure B.7
Figure B.8
Figure B.9
Figure B.10
Figure B.11
Figure B.12
Figure C.1
Figure C.2
Figure C.3
Figure C.4
Figure C.5
SEL-5809 Settings Software Connection Method ...........................B.3
SEL-5809 Opening Connection .......................................................B.3
Status: Device Window ....................................................................B.4
Confirmation Prompt........................................................................B.4
Send Operation Prompt ....................................................................B.4
Configuring Serial Port Settings in the Terminal Software..............B.5
Send File Prompt..............................................................................B.6
Sending Confirmation Window........................................................B.6
Terminal Invalid Firmware Error Message ......................................B.7
Terminal Valid Firmware Message ..................................................B.7
Two Independent Layers of Cryptographic
Security Protect the SEL-3022 Wireless Operator Interface ......C.2
Operation of the HMAC SHA-1
Keyed Hash Authentication Function .........................................C.9
Operation of the AES Encryption Function ...................................C.10
SEL-3022 Security Application Overview ....................................C.11
Wireless Interface Session Authentication Dialog.........................C.15
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Preface
Manual Overview
The SEL-3022 Wireless Encrypting Transceiver Instruction Manual describes common
aspects of the wireless encrypting transceiver application and use. It includes the
necessary information to install, set, test, and operate the transceiver.
An overview of each manual section and topics follows:
Preface. Describes the manual organization and conventions used to present
information.
Section 1: Introduction & Specifications. Introduces SEL-3022 applications,
cabling and external connections, and PC and PDA Software system
requirements. This section also lists specifications.
Section 2: Installation. Provides dimension drawings on the SEL-3022 and
instructions for setting up your PC or PDA, and initializing the
SEL-3022.
Section 3: Job Done Example. Provides a Job Done® example for applying the
SEL-3022 to an SEL-651R Recloser Control mounted twenty feet above
the street.
Section 4: Settings and Commands. This section lists all the SEL-3022 settings
including those for serial port, wireless port, encryption parameters, and
SCADA protocol. Includes information on the communication status
command for analyzing and monitoring the status of the SEL-3022 serial
port communication channel.
Section 5: Testing and Troubleshooting. Describes the SEL-3022 self-test along
with troubleshooting guidelines.
Appendix A: Firmware and Manual Versions. Lists firmware and manual revision
dates and description of modifications.
Appendix B: Firmware Upgrade Instructions. Describes the procedure to update
the firmware stored in flash memory.
Appendix C: Wireless Operator Interface Security. Discusses how the SEL-3022
incorporates a wireless LAN interface including recommended security
settings. Explains the additional AES encryption and cryptographic
authentication employed on the wireless operator interface.
Appendix D: Certificates. Describes certificates related to the SEL-3022.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
viii
Cryptographic Manual—Do Not Copy
Preface
Manual Overview
Preliminary Copy
Page Numbering
This manual shows page identifiers at the top of each page; see the figure
below.
Introduction & Specifications
Product Overview
Title Block
1.3
Page Number
Page Number Format
The page number appears at the outside edge of each page; a vertical bar separates the
page number from the page title block. The page numbers of the SEL-3022 Serial
Encrypting Transceiver Instruction Manual are represented by the following building
blocks:
➤
Section number
➤
Actual page number in the particular section
The section title is at the top of the page title block, with the main subsection reference
in bold type underneath the section title.
Cross-References
Cross-references are formatted as described below in both the hard copy and electronic
documentation for the SEL-3022. In the electronic documentation, clicking with the
mouse on cross-references takes you to the referenced location.
➤
References to figures, tables, examples, and equations include only
the referenced item:
➢
➢
➤
Table 3.1 (3 indicates the section number)
Figure 4.5 (4 indicates the section number)
References to headings on another page include the heading title and
the page number:
➢
SEL-3022 Transceiver
Disconnect Monitoring on page 3.8
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Preface
Manual Overview
ix
Examples
This instruction manual uses several example illustrations and instructions to explain
how to effectively operate the SEL-3022. These examples are for demonstration
purposes only; the firmware identification information or settings values included in
these examples may not necessarily match those in the current version of your
SEL-3022.
Safety Information
This manual uses hazard statements, formatted and defined as follows:
CAUTION
Indicates a potentially hazardous
situation that, if not avoided, may
result in minor or moderate injury or
equipment damage.
WARNING
Indicates a potentially hazardous
situation that, if not avoided, could
result in serious injury or death.
DANGER
Indicates an imminently hazardous
situation that, if not avoided, will result
in death or serious injury.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
Preliminary Copy
This page intentionally left blank
Cryptographic Manual—Do Not Copy
Preliminary Copy
Section 1
Introduction & Specifications
Introduction
This section includes the following overviews of the SEL-3022 Wireless Encrypting
Transceiver:
➤
Product Overview
➤
Application Overview
➤
Connections, Reset Button, and LED Indications
➤
Software System Requirements
➤
General Safety and Care Information
➤
Specifications
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
1.2
Introduction & Specifications
Product Overview
Cryptographic Manual—Do Not Copy
Preliminary Copy
Product Overview
The SEL-3022 Wireless Encrypting Transceiver is an EIA-232 to IEEE 802.11b, or
WiFi, encryption device that adds strong encryption and authentication features to the
data sent across wireless ports. The companion SEL-5809 Settings Software and
SEL-5810 Virtual Serial Software programs allow legacy Personal Computer (PC)
programs, such as HyperTerminal®, Relay Gold®, or ACSELERATOR® SEL-5030
Software, that use EIA-232 serial ports to securely communicate with the SEL-3022
via PC or Personal Digital Assistant (PDA) wireless (IEEE 802.11b) ports. See
Figure 1.1.
The SEL-3022, with the SEL-5809 Settings Software and SEL-5810 Virtual Serial
Software securely transmits and receives data between Intelligent Electronic Devices
(IEDs) and PCs (or PDAs) via an IEEE 802.11b wireless connection. The SEL-3022
and SEL-5810 Virtual Serial Software provide a retrofit solution that allows you to
continue to use standard PC programs while providing encrypted and authenticated
wireless connectivity with IEDs. See Figure 1.1.
SEL-651R
SEL-3022
with antenna
PC Application
SEL-5810
AcSELerator or
HyperTerminal or
SEL-3022 Settings SW
Virtual Encryption
Serial
Engine
Port
802.11b
Port
Figure 1.1 Typical SEL-3022 and
SEL-5810 Virtual Serial Software Application
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Introduction & Specifications
Product Overview
1.3
SEL-3022 Transceiver
The SEL-3022 consists of two communication ports: the EIA-232 and IEEE 802.11b.
The EIA-232 serial port connects to an IEDs EIA-232 serial port. The SEL-3022 and
IED exchange unencrypted data such as engineering access data. The SEL-3022 forms
an authentication message and encrypts the data received by the IED then passes it to
the IEEE 802.11b port. The IEEE 802.11b communication port transmits the encrypted
data to the PC/PDA running the SEL-5809 Settings Software or SEL-5810 Virtual
Serial Software. When the SEL-3022 802.11b port receives a message it decrypts and
authenticates the message. If the message decrypts and authenticates correctly the
message is passed to the serial port, otherwise the session is terminated.
SEL-5809 Settings Software and SEL-5810
Virtual Serial Software
The SEL-5809 Settings Software and SEL-5810 Virtual Serial Software are used to
communicate with the SEL-3022. The SEL-5809 Settings Software consists of three
major functions or roles: Security Officer, Operator, and User. The security officer has
access to all of the SEL-3022 configuration parameters including the cryptographic
settings. The operator has access to all of the SEL-3022 configuration parameters
except the cryptographic settings. Both the security officer and operator modes are
used to configure the SEL-3022. The user role generates a virtual serial port that allows
applications to encrypt and decrypt data between the PC and the IED that the
SEL-3022 is connected to. In the user role you cannot modify SEL-3022 configuration
parameters. To change roles you must exit the current role and reestablish a connection
to the new access level.
The SEL-5810 Virtual Serial Software is a subset of the SEL-5809 Settings Software,
and only allows connection to the SEL-3022 in the user role.
Your company security officer, or person in charge of configuring cryptographic
settings, would typically use the SEL-5809 Settings Software to configure the
SEL-3022 transceivers. After the SEL-3022 transceivers have been configured the
security officer can configure a PC and PDA with the SEL-5810 Virtual Serial
Software for field personnel (i.e., workers who need engineering access to the IEDs
connected to the SEL-3022 transceivers, but who do not need to configure the
SEL-3022 transceivers).
Both the SEL-5809 Settings Software and SEL-5810 Virtual Serial Software allow you
to integrate your standard EIA-232 serial port programs with wireless port via the
SEL-5810 Virtual Serial Software encrypting engine to a 802.11b port. When the SEL5809 Settings Software/SEL-5810 Virtual Serial Software receives a message from a
PC program, ACSELERATOR for example, the virtual serial port generates an
authentication message that is appended to the original message, which is then
encrypted. The SEL-5809 Settings Software/SEL-5810 Virtual Serial Software then
passes the encrypted message to the 802.11b port for transmission to the SEL-3022.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
1.4
Introduction & Specifications
Product Overview
Cryptographic Manual—Do Not Copy
Preliminary Copy
When the SEL-5809 Settings Software/SEL-5810 Virtual Serial Software receives a
message from the wireless port, it decrypts and authenticates the message and passes it
to the virtual serial port which in turn passes it to your PC program. See Figure 1.2.
PC With SEL-5809 Settings Software or SEL-5810 Virtual Serial Software
Serial PC
Application
SEL-5809 or SEL-5810
Security Application
HMAC
AES
Encryption Authentication
Key
Key
Hyperterml.ht
802.11b Wireless Module
WEP
Encryption
Key
Secured
Data
AcSELerator®
Software (2)
Figure 1.2
HMAC SHA-1
Authentication
and
AES Encryption
WEP
Encryptor
802.11b
Radio
Encrypted Packet Stream
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Introduction & Specifications
Application Overview
1.5
Application Overview
The SEL-3022 is ideal for applications where engineering access communication is
required but the IED is installed in a location where physical access is limited. For
example, often recloser controls are mounted in inconvenient locations either because
of power line location or to keep them out of reach of unauthorized users. In either
case, for an engineer or lineman to communicate with the recloser control, he must
traverse these obstacles to gain physical access to the IED. This includes opening the
recloser control cabinet, which will expose the inside of the control to the weather.
Through use of the SEL-3022, the lineman simply drives within distance of the
recloser control, establishes a wireless communication link using the SEL-5810 Virtual
Serial Software, and then retrieves the fault location data or modifies settings—all from
the comfort and safety of his vehicle. Further, because this communication link does
not require the lineman to open the recloser control, the internal electronic panel is not
exposed to rain, snow, or dust.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
1.6
Introduction & Specifications
Connections, Reset Button, and LED Indications
Cryptographic Manual—Do Not Copy
Preliminary Copy
Connections, Reset Button,
and LED Indications
The figure below shows typical connections for the SEL-3022.
Recloser Control
12 Vdc
PWR
SEL-651R
SP
EIA-232
PC
Computer
or PDA with
802.11b
Figure 1.3
802.11b link from
computer to SEL-3022
Typical Connections for the SEL-3022
Power Supply Connections
You can apply 5 to 24 Vdc directly to the SEL-3022 power terminals, which are
available either as compression terminals or a 2.5 mm jack. If the power source voltage
is not within the 5 to 24 Vdc range, use an auxiliary power supply to provide 5 to 24
Vdc to the SEL-3022. See Specifications on page 1.12 for power requirements.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Introduction & Specifications
Connections, Reset Button, and LED Indications
1.7
Preliminary Copy
IMPORTANT: Do NOT wire power to both the compression
terminals and the 2.5 mm jack. Use only one power
connection at a time.
Alarm Output Connection
Use the solid-state alarm contact to alert you to problems either with the
communications channel or the SEL-3022. See Section 5: Testing and Troubleshooting
for more details. To maintain the UL rating of the SEL-3022, connect the alarm output
contact as follows:
1.
Use an external load to limit current to less than 100 mA through the
alarm contact. There is no means within the SEL-3022 to limit
current through the alarm contact. You must ensure that the external
circuit connected to the SEL-3022 limits the current. For example, a
typical SEL contact input draws 4 mA. Figure 1.4 shows a typical
connection of a wetting source (125 Vdc), the SEL-3022 solid-state
output, an SEL-2030 contact input, and an optional load resistor. In
this case, because the contact input impedance limits the current to
less than 100 mA, the load resistor is not necessary. If the sensing
input does not have a means of limiting the current to less than 100
mA, then you must use a high wattage resistor. Select a load resistor
with the proper wattage rating to limit the current. For example,
assume the wetting source is 125 Vdc and that the sensing input
requires 10 mA to assert. You can use the following calculation to
determine the load resistor: 125 Vdc/ 10 mA = 12.5 kΩ. Calculate the
minimum wattage: (10 mA)2 • 12.5 kΩ = 1.25 W. You would
typically double this parameter to 2.5 W to ensure proper operation
over temperature and life. You should verify proper derating with the
resistor data sheet.
2.
Circuit protection should include an in-line fuse rated for 0.5 A or
less with a voltage rating greater than the voltage you intend to use.
Figure 1.4 shows a typical alarm output installation.
CAUTION: Current through the alarm output must be limited to less
! than 100 mA.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
1.8
Introduction & Specifications
Connections, Reset Button, and LED Indications
Cryptographic Manual—Do Not Copy
Preliminary Copy
0.5 A, 250 V
Fast Blow Fuse
SEL-3022
Alarm Output Contact
—
Wetting Voltage
125 Vdc
Do not apply 125 Vdc
directly to the SEL-3022
power supply connections
Optional Load
Resistor
SEL-2030
Contact Input
Typical SEL contact
inputs draw 4 mA of
nominal wetting source voltage
Figure 1.4
Typical Alarm Output Installation
Serial Port Pin-Out Connection
The SEL-3022 has a fully compliant DCE serial port. SEL offers many cable
configurations for use between the SEL-3022 and other devices.
The serial port pin-out descriptions for the DCE port are as follows.
Table 1.1
DCE (Female DB9)
Pin
Description
Data Carrier Detect (Output)
Transmitted Data (Output)
Received Data (Input)
Data Terminal Ready (Input)
Ground
Data Set Ready (Output)
Request to Send (Input)
Clear to Send (Output)
Ring Indicator (Output)
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Introduction & Specifications
Connections, Reset Button, and LED Indications
1.9
Preliminary Copy
Reset Button
Use the {RESET} button to reset and delete all security related settings. You can access
the {RESET} button through the small hole in the end of the SEL-3022 near the status
LED. Use a paper clip or other similar device to press the {RESET} button for at least 2
seconds, which resets the SEL-3022 into a default state. Power must be applied to the
SEL-3022 for the reset operation to occur.
IMPORTANT: Pressing the {RESET} button erases all security
parameters and interrupts transmission of encrypted
data until you initialize the SEL-3022. See Initializing the
SEL-3022 on page 2.7 in Section 2: Installation.
Status LED
Use the status LED to determine the state of the SEL-3022. If the status LED is solidly
illuminated, the SEL-3022 is operating correctly. If the LED is blinking, the SEL-3022
is in a failed or reset mode. Refer to Section 5: Testing and Troubleshooting for more
details.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
1.10
Introduction & Specifications
Software System Requirements
Cryptographic Manual—Do Not Copy
Preliminary Copy
Software System Requirements
The SEL-3022 comes with configuration and monitoring software, referred to as the
SEL-5809 Settings Software and the SEL-5810 Virtual Serial Software. The SEL-5809
Settings Software is the only means to set and monitor the SEL-3022. The software
comes in two versions: one version is for a PC and one is for a PDA operating system.
The following operating systems have been tested with the software.
Table 1.2 Operating Systems and Wireless
Modules Tested With the SEL-5809 Settings Software
Devices
Qualified Systems
PCs
Windows® XP Professional Edition (Service Pack 1)
Windows 2000 (Service Pack 4) with .NET framework (Version
1.1) installed
Windows XP with .NET framework installed
PDAs
Pocket PC 2002/2003 or higher with .NET compact framework
(Version 1.0 Service Pack 3)
Wireless (802.11b)
Modules
Netgear MA111
Linksys WPC11
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Introduction & Specifications
General Safety and Care Information
1.11
Preliminary Copy
General Safety and Care Information
General Safety Notes
The SEL-3022 is designed for restricted access locations. Access shall be limited to
qualified service personnel.
The SEL-3022 should not be installed or operated in a condition not specified in this
manual.
CAUTION: The SEL-3022 is an intentional radiator. Changes or
! modifications not expressly approved by SEL for compliance could void
the user’s authority to operate the equipment.
CAUTION: The SEL-3022 is an intentional radiator. The radio has been
! authorized by the FCC for mobile use only. Users and nearby persons
must maintain a separation distance of at least 20 cm (8 inches) from the radio
during operation.
Cleaning Instructions
The SEL-3022 should be de-energized (by removing the power connection to both the
power and alarm connection) before cleaning.
The case can be wiped down with a damp cloth. Solvent-based cleaners should not be
used on plastic parts or labels.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
1.12
Introduction & Specifications
Specifications
Cryptographic Manual—Do Not Copy
Preliminary Copy
Specifications
Indicators
Green LED:
Electromagnetic Compatibility Immunity
Conducted
RF Immunity:
Device Status
Solid-State Output
100 mA continuous
250 Vdc or 120 Vac Operational Voltage
Max. On Resistance: 50 Ω
Min. Off Resistance: 10 MΩ
Insulation:
1500 Vdc
Wiring size:
14 AWG Max.
26 AWG Min.
0.4 mm Min. Insulation
105°C, 250 V Min.
Encryption Protocols
AES:
128-bit encryption
Serial Port
Connectors:
Data Rate:
Interface:
DB-9 Female (DCE)
300 bps to 38400 bps
EIA-232
Digital Radio
Telephone RF:
Electrostatic
Discharge:
Fast Transient
Disturbance:
Radiated Radio
Frequency:
WiFi/802.11b Configuration Port
Protocol:
Modulation:
Frequency Band:
Encryption:
Authentication:
External Antenna:
Connector:
IEEE 802.11b
DSSS
2.4 GHz
128-bit WEP and
128-bit AES
HMAC SHA-1
128-bit key
Reverse Polarity
SMA Jack
+5 to +24 Vdc:
<5 W
supplied through compression terminals or a
2.5 mm jack
Dry Heat:
Dimensions
Vibration:
Type Tests
Electromagnetic Compatibility
Radiated Emissions: IEC 60255-25:2000,
Class A
FCC part 15 Class A
SEL-3022 Transceiver
IEC 61000-4-4:1995,
IEC 60255-22-4:1992,
4 kV at 2.5 and 5 kHz
ENV 50140-1993,
IEC 60255-22-3:1989,
10 V/m
IEEE C37.90.2-1995,
35 V/m
Environmental
Damp Heat, Cyclic:
3.675" wide
4.8" deep
1" high, without DIN mount
IEC 60255-22-2:1996,
IEC 61000-4-2:1999,
[EN 61000-4-2-1995],
Levels 1, 2, 3, 4
1) The SEL-3022 does not damage or impede
IED operation.
2) The SEL-3022 is allowed to lose data
during testing events.
3) The SEL-3022 must recover without
external intervention.
Operating Temperature Range
–40° to +85°C (–40° to +185°F)
5 to 95% humidity (noncondensing)
ENV 50204:1995,
10 V/m at 900 MHz
and 1.89 GHz
Type Test Compliance Criteria:
Cold:
Power Requirements
ENV 50141:1993,
10 V rms
IEC 61000-4-6:1996,
10 V rms
Max. Altitude:
Instruction Manual
IEC 60068-2-1:1990
[EN 60068-2-1-1993],
Test Ad: 16 hrs
@ –40°C
IEC 60068-2-2:1974
[EN 60068-2-2-1993],
Test Bd: 16 hrs @
+85°C
IEC 60068-2-30:1980,
Test Db: +25° to
+55°C,
6 cycles, 95% humidity
IEC 60255-21-1:1988,
Class 1
IEC 60255-21-2:1988,
Class 1
IEC 60255-21-3:1993,
Class 2
2000 m
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Introduction & Specifications
Specifications
1.13
Certifications
ISO:
Listings:
FCC:
IC:
Date Code 20050615
Device is designed and
manufactured using
ISO 9001 certified
quality program.
IEC 60950-1: 1st Ed./
CSA C22.2
No.60950-1/
EN 60950-1
15.247
ICES-001
Instruction Manual
SEL-3022 Transceiver
Preliminary Copy
This page intentionally left blank
Cryptographic Manual—Do Not Copy
Preliminary Copy
Section 2
Installation
Introduction
This section includes the following:
➤
Dimension Drawing
➤
Setting Up Your PC or PDA With the SEL-5809 Settings Software
and SEL-5810 Virtual Serial Software.
➤
Initializing the SEL-3022: Discusses the settings required to initialize
the SEL-3022 when the SEL-3022 is in a reset condition.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
2.2
Installation
Dimension Drawing
Cryptographic Manual—Do Not Copy
Preliminary Copy
Dimension Drawing
5.24
(133.0)
4.80
(121.9)
TOP
2.40
(61.0)
3.68
(93.3)
Ø0.19 (Ø4.8)
MOUNTING
HOLES FOR
#8 SCREW
4.06
(103.0)
1.00
(25.4)
FRONT
LEGEND
in
(mm)
Figure 2.1
SEL-3022 Dimension Drawing
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Installation
Setting Up Your PC or PDA With the SEL-5809 and SEL-5810 Software
2.3
Preliminary Copy
Setting Up Your PC or PDA With the
SEL-5809 and SEL-5810 Software
Software Installation
The SEL-5809 Settings Software is required to set, operate, and test the SEL-3022.
The SEL-5810 Virtual Serial Software is used by operators to connect PC programs to
remote IEDs using the SEL-3022. You can install the SEL-5809 and SEL-5810
Software on an IBM-compatible computer or a Pocket PC-compatible PDA. See
Software System Requirements on page 1.10 in Section 1: Introduction &
Specifications. If you have any difficulties installing the software, contact your
customer service representative or the SEL factory for assistance.
The software will load automatically if the autorun feature is enabled on your
computer; this is Method A. If autorun is not enabled on your computer, use the
Windows Run command to load the software; this is Method B.
Perform the following steps to install the software:
Step 1.
Load the software through use of one of the following methods:
➤
Method A. Load the software automatically.
➢
To load the software automatically, make sure your PC is
turned on and close all other applications.
➢
Place the CD-ROM in the PC CD-ROM drive. The setup
software should run automatically.
➤
Method B. Use the Windows Run command to load the software.
➢
If the Setup program does not start automatically, use the
Microsoft Windows Run function (from the Start menu) to
load the software.
➢
Figure 2.2
Type the command shown in Figure 2.2, being certain to use
the correct drive letter for the CD-ROM drive in your PC (the
CD-ROM drive in the example shown in Figure 2.2 is drive
D:\).
Windows Run Command
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
2.4
Installation
Cryptographic Manual—Do Not Copy
Setting Up Your PC or PDA With the SEL-5809 and SEL-5810 Software
Preliminary Copy
Step 2.
Complete the software loading process. Follow the loading
instructions as they appear on the PC screen.
Registering the SEL-5809 Settings Software
To start the SEL-5809 Settings Software, use the Windows Start menu to open the
software. If you installed the software within the Programs group in the main Windows
directory, click Start > Programs > SEL Applications. If you used a custom program
group, click Start > Programs > and the custom group.
You can also create a shortcut on the Windows Desktop. See your Windows
documentation for instructions on creating a shortcut. Double-click the shortcut icon to
start the software from the shortcut.
Before using the SEL-5809 Settings Software it must be registered. The product
unregistered prompt message displays when you start the software. (See Figure 2.3.)
NOTE: To modify settings in the SEL-3022, an 802.11b WiFi
interface is required on the PC or PDA. Install the
SEL-5809 Settings Software on a PC or PDA with an
802.11b WiFi card.
Figure 2.3
Product Unregistered Prompt
To register the SEL-5809 Settings Software, perform the following steps.
Step 1.
At the prompt’s text box enter the SEL-3022 Serial Number, SEL
Purchase Order Number, or Customer Purchase Order Number.
Step 2.
Click OK. This generates the registration file (reginfo.xml).
Step 3.
Save the registration file (reginfo.xml) onto your computer in a
location you can remember.
Step 4.
Email the file to 5809@selinc.com or contact your customer service
representative.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Installation
Setting Up Your PC or PDA With the SEL-5809 and SEL-5810 Software
2.5
Preliminary Copy
Step 5.
When SEL receives your e-mail, you will be sent a registration key
file (regkey.xml), which allows you to run the SEL-5809 Settings
Software.
Step 6.
Once you receive this key file, save it on your computer.
Step 7.
Restart the SEL-5809 Settings Software. Load the key file using the
{Load Key} button of the registration form. The key automatically
removes the lock.
NOTE: The registration form is also available using the Help
> Register menu.
The SEL-5810 Virtual Serial Software does not have a registration key and does not
need to be registered.
PDA Software Installation
This section assumes you have Microsoft ActiveSync installed on your computer. If
you do not, consult your PDA manual or download a free version from Microsoft.
To install the PDA software to the PDA, perform the following:
Step 1.
Connect the PDA to the ActiveSync cradle. This should activate the
ActiveSync software.
Step 2.
Install Compact Framework to the PDA.
Step 3.
Launch the Pocket PC installation package from the SEL-5809
Settings Software or SEL-5810 Virtual Serial Software.
Step 4.
To access the SEL-5809 Settings Software or SEL-5810 Virtual
Serial Software, click on the icon in the programs menu of the PDA.
You must register the SEL-5809 Settings Software before you can use it. The product
unregistered prompt message displays when you start the software.
To register the SEL-5809 Settings Software, perform the following steps.
Step 1.
At the prompt’s text box enter the SEL-3022 Serial Number, SEL
Purchase Order Number, or Customer Purchase Order Number.
Step 2.
Click OK. This generates the registration file (reginfo.xml).
Step 3.
Save the registration file (reginfo.xml) onto your PDA in a location
you can remember.
Step 4.
Email the file to 5809@selinc.com or contact your customer service
representative.
Step 5.
When SEL receives your e-mail, you will be sent a registration key
file (regkey.xml), which allows you to run the SEL-5809 Settings
Software.
Step 6.
Once you receive this key file, save it on your PDA.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
2.6
Installation
Cryptographic Manual—Do Not Copy
Setting Up Your PC or PDA With the SEL-5809 and SEL-5810 Software
Preliminary Copy
Step 7.
Restart the SEL-5809 Settings Software. Load the key file using the
{Load Key} button of the registration form. The key automatically
removes the lock.
NOTE: The registration form is also available using the Help
> Register menu.
The SEL-5810 Virtual Serial Software does not have a registration key and does not
need to be registered.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Installation
Initializing the SEL-3022
2.7
Initializing the SEL-3022
When the SEL-3022 is sent from the factory, or if the {RESET} button in the SEL-3022 is
pressed, the transceiver is in a Reset state. The Reset state indicates that all of the
encryption keys and related security parameters are erased. You can quickly determine
whether the SEL-3022 is in a Reset state by applying power and viewing the status
LED. In the Reset state, the LED turns on and off at a two-second interval. When the
SEL-3022 is in the Reset state, the wireless interface is disabled, and the DCE serial
port is set to configuration mode. To initialize the SEL-3022, use the SEL-5809
Settings Software and configure the settings as defined in the following steps.
NOTE: Only the PC version of the SEL-5809 Settings
Software can initialize the SEL-3022; the PDA version
cannot initialize the SEL-3022.
Perform the following steps to initialize the SEL-3022:
Step 1.
Connect a straight-through EIA-232 cable from the host computer
serial port to the SEL-3022 DCE port.
Step 2.
Apply power to the SEL-3022 (see Power Supply Connections on
page 1.6 in Section 1: Introduction & Specifications).
Step 3.
Start the SEL-5809 Settings Software.
Step 4.
Select File > New Device, choose a device template from the Select a
Device Type to Create box, press Create. Figure 2.4 is an example.
Figure 2.4
Select a Device Type to Create
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
2.8
Installation
Initializing the SEL-3022
Step 5.
Figure 2.5
Cryptographic Manual—Do Not Copy
Preliminary Copy
Type in the Device Location and Device Name. Figure 2.5 is an
example.
Specify New Device Location
Step 6.
Click OK.
Step 7.
Your device location is now listed. For our example, this location is
New_Group. Select the plus arrow beside your new device location to
expand the view.
Step 8.
To open a serial connection to the SEL-3022, double-click on the
device name. In our example, this name is Device 1.
Figure 2.6
Opening Device
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Step 9.
Figure 2.7
Installation
Initializing the SEL-3022
2.9
The first screen displays your system parameters.
Identification Screen
Step 10. The Status: Device tab shows the SEL-3022 diagnostic status,
previous diagnostic failures, and the constant transmit test feature.
Figure 2.8 is an example.
Refer to Device Information on page 4.7 in Section 4: Settings and
Commands for a description of these test parameters. While the
SEL-3022 is in the Reset state, the Status: Device tab allows the user
to constantly transmit data on a selected 802.11b channel. This
feature may be used to test the SEL-3022 wireless propagation
characteristic at an installation site.
NOTE: The constant transmit test function is only available
in the Reset state. After the SEL-3022 is initialized, this
feature is no longer available.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
2.10
Installation
Initializing the SEL-3022
Figure 2.8
Cryptographic Manual—Do Not Copy
Preliminary Copy
Status: Device
Step 11. Select the Settings: Wireless tab and consult your System
Administrator for the Wireless Connections Settings. The settings
shown are for example only.
Figure 2.9
Settings: Wireless
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Installation
Initializing the SEL-3022
2.11
Step 12. Select the Settings: WEP Keys tab and consult your System
Administrator for the WEP Key Settings. The settings shown in
Figure 2.10 are for example only. WEP Keys must be set to a unique
26-character hexadecimal ASCII value other than the default.
Figure 2.10
Settings: WEP Keys
Step 13. Select the Settings: User tab and enter random 32-character
hexadecimal ASCII encryption and authentication keys. Select a
password or phrase that is 6–60 characters in length. Only the
security officer should set the encryption and authentication keys. All
values must be set to nondefault values. The settings shown in
Figure 2.11 are for example only.
Figure 2.11
Settings: User
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
2.12
Installation
Initializing the SEL-3022
Cryptographic Manual—Do Not Copy
Preliminary Copy
Step 14. Select the Settings: Operator tab and enter random 32-character
hexadecimal ASCII encryption and authentication keys. Select a
password or phrase that is 6–60 characters in length. Only the
security officer should set the encryption and authentication keys. All
values must be set to nondefault values. The settings shown in
Figure 2.12 are for example only.
Figure 2.12
Settings: Operator
Step 15. Select the Settings: Security Officer tab and enter random 32character hexadecimal ASCII encryption and authentication keys.
Select a password or phrase that is 6–60 characters in length. Only the
security officer should set the encryption and authentication keys. All
values must be set to nondefault values. The settings shown in
Figure 2.13 are for example only.
NOTE: The security officer keys cannot be the same as the
operator keys.
Figure 2.13
Settings: Security Officer
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Installation
Initializing the SEL-3022
2.13
Step 16. After you are satisfied with your choices select Device > Send All.
This will send your initialization settings to the SEL-3022.
Step 17. You will see the following confirmation of send prompt. Select Yes to
continue or No to abort.
Figure 2.14
Confirm Send Prompt
Step 18. When settings have been sent successfully the following pop-up
message appears. Select OK to acknowledge the message.
Figure 2.15
Send Operation Message
Step 19. Verify that the Status LED on the SEL-3022 is illuminated. If all
settings were configured to valid values, the SEL-3022 is now
initialized. The Status LED will be illuminated, and you can use the
802.11b wireless interface to configure the SEL-3022 for your
application.
Step 20. You should record the settings and store them in a secure place. To do
this, select File > Print, choose the settings you want to print by
placing a check mark beside them, and click Print. See Figure 2.16.
NOTE: In order to print the settings, they first must be sent
to the device, as shown in Step 16.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
2.14
Installation
Initializing the SEL-3022
Figure 2.16
Cryptographic Manual—Do Not Copy
Preliminary Copy
Select Items to Print
Step 21. Print to a specific printer or print directly to a file.
Figure 2.17
Print Window
Step 22. Close the Device by clicking File > Close Device. Select Yes when
prompted to save current session.
Step 23. To open a wireless connection to the SEL-3022, double click on the
device name. Select User, Operator, or Security Officer. Enter pass
phrase, then click OK. The pass phrase that you enter must match the
user, operator, or security officer password programmed during
device initialization.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Installation
Initializing the SEL-3022
2.15
Wireless Configuration
A wireless card is required to perform in-system settings modifications, monitoring,
and to establish a virtual serial port connection. The SEL-3022 complies with the IEEE
802.11b Wireless Standard. Suitable wireless cards and associated software drivers can
be found at your local computer or office supply store.
Follow the 802.11b manufacturer’s installation procedure (for either the PC Wireless
Card or a PDA) to install the wireless card.
After the wireless card is installed, you must enable Wired Equivalence Protocol
(WEP—see Appendix C: Wireless Operator Interface Security for details). Open the
802.11b wireless driver and locate the security settings. Enter all WEP keys, including
the active WEP key. The WEP keys on your PC or PDA must match the WEP keys the
SEL-5809 Settings Software loaded during SEL-3022 initialization.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
Preliminary Copy
This page intentionally left blank
Cryptographic Manual—Do Not Copy
Preliminary Copy
Section 3
Job Done Example
Introduction
This section contains a Job Done® example for applying the SEL-3022 to an
SEL-651R Recloser Control mounted twenty feet above the street.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
3.2
Cryptographic Manual—Do Not Copy
Job Done Example
Job Done Example 1
Preliminary Copy
Job Done Example 1
EXAMPLE 3.1
Applying the SEL-3022 to an SEL-651R
Identifying the Problem
Your objective is to provide a simple and secure means of
communications to an SEL-651R Recloser Control mounted
twenty feet above the street. You decide on the SEL-3022
Wireless Encrypting Transceiver for the following reasons:
➤
The SEL-3022 eliminates the requirement to have physical
access to the recloser control, i.e. you do not need a bucket
truck to get close enough to communicate with the
SEL-651R.
➤
The SEL-3022 protects wireless data with IEEE 802.11b WEP
encryption in addition to the 128-bit AES and HMAC SHA-1
cryptographic security it provides. This is perfect for
protecting passwords and other sensitive information.
➤
The SEL-5809 Settings Software and SEL-5810 Virtual
Serial Software allow you to continue to use all of your
standard PC software programs to communicate, set, and
analyze data from the recloser control.
➤
The installation is simple and the antenna fits in a standard
3/4-inch knockout in the bottom of the recloser control.
Defining the Solution
Figure 3.1 represents the recloser control. Your task is to
configure and install the SEL-3022.
SEL-651R
Figure 3.1
Remotely Located Recloser Control
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Job Done Example
Job Done Example 1
3.3
SEL-3022 Initialization
An SEL-3022 direct from the factory is in a Reset condition.
You must initialize various settings before installing the
SEL-3022 in the recloser control. You can initialize the
SEL-3022 at your desk before you deploy the transceiver.
You will need the following:
➤
PC with IEEE 802.11b wireless card and SEL-5809 Settings
Software loaded.
➤
SEL-C388 cable, or equivalent - used to initialize the
SEL-3022.
➤
SEL-C387 cable or equivalent - installed between the
SEL-3022 and SEL-651R.
➤
SEL-651R or equivalent.
➤
ACSELERATOR
or other serial port program (e.g.,
HyperTerminal®).
Follow the instructions for Initializing the SEL-3022 on
page 2.7 in Section 2: Installation, to set up and initialize the
SEL-3022.
Set the Device Location and Device Name to Pole 43 and
SEL-651R, respectively. Figure 3.2 shows the SEL-5809
Settings Software top level view for this example.
Figure 3.2
Job Done Example SEL-5809 Top Level View
SEL-3022 Configuration Settings
Step 1. Open the SEL-5809 Settings Software.
Step 2. Select Pole 43 (as configured above).
Step 3. Double-click on SEL-651R.
Step 4. Select Security Officer and enter your pass phrase. (See
Figure 3.3.)
Step 5. Click OK.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
3.4
Job Done Example
Job Done Example 1
Figure 3.3
Cryptographic Manual—Do Not Copy
Preliminary Copy
Select a Wireless Session for DNP3 Job Done Example
Step 6. Select the Settings: DCE Port tab and configure the serial port
parameters to match the SEL-651R serial port which the
SEL-3022 is going to be connected to.
Figure 3.4
Settings: DCE Port
Step 7. Select Device > Send All to save the settings to the SEL-3022.
Step 8. Select File > Close Device to close the connection to the
SEL-3022.
Step 9. Connect a C387 (or equivalent cable) between the
SEL-3022 and SEL-651R.
Step 10. Through use of the SEL-5809 Settings Software select Pole
43.
Step 11. Double-click SEL-651R.
Step 12. Select User and enter your pass phrase. The following tab
will be displayed.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Figure 3.5
Job Done Example
Job Done Example 1
3.5
Status: Virtual Serial Port With Connection Status Red
NOTE: This display informs you regarding the virtual serial
port number created by the SEL-5809 Settings Software.
In this case, the SEL-5809 Settings Software has created
COM5. Also note the Connection Status is RED indicating
that there is not a PC program using the virtual port.
Step 13. Open ACSELERATOR (or other serial terminal program).
Step 14. Select Communication > Parameters and set Device to the
virtual serial port that the SEL-5809 Settings Software
created.
Step 15. Select OK. See Figure 3.6.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
3.6
Job Done Example
Job Done Example 1
Figure 3.6
Cryptographic Manual—Do Not Copy
Preliminary Copy
Communication Parameters Window in ACSELERATOR
16. At this point, a virtual connection between ACSELERATOR
and the SEL-651R exists. Look at the SEL-5809 Settings
Software Status: Virtual Serial Port page, the Connection
Status is GREEN indicating the virtual serial port is in
service.
Figure 3.7
Status: Virtual Serial Port With Connection Status Green
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Job Done Example
Job Done Example 1
3.7
Step 17. Through use of ACSELERATOR, you can perform such tasks
as reading the settings out of the SEL-651R (see Figure 3.8)
or viewing the metering data (see Figure 3.9).
Figure 3.8
Reading Settings Via the SEL-3022
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
3.8
Job Done Example
Job Done Example 1
Figure 3.9
Cryptographic Manual—Do Not Copy
Preliminary Copy
Monitoring SEL-651R Meter Data Via the SEL-3022
Step 18. When you are done setting and configuring the SEL-651R,
click Communication > Disconnect (to close the ACSELERATOR
serial port connection) or click File > Exit (to shut down
ACSELERATOR).
NOTE: After you perform this operation, the Status: Virtual
Serial Port Connection Status LED in the SEL-5809
Settings Software, will return to RED, indicating the
virtual serial port is no longer being used by a PC
program. See Figure 3.10.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Figure 3.10
Job Done Example
Job Done Example 1
3.9
Status: Virtual Serial Port Connection Status Red
Step 19. Select File > Close Device, to close the SEL-5809 Settings
Software virtual serial port.
Linemen or engineers who do not need to configure the
SEL-3022 transceivers, will use the SEL-5810 Virtual Serial
Software, which is strictly a virtual serial port program. Use
the SEL-5809 Settings Software to generate the
configuration files for the SEL-5810 Virtual Serial Software
that contain all of the configuration parameters necessary to
establish a connection between a PC and SEL-3022.
To generate a user file for a lineman’s PC complete the
following steps.
Step 20. Select File > Export in the SEL-5809 Settings Software.
Step 21. Check the User box next to Pole 43/SEL-651R device. Refer to
Figure 3.11.
Step 22. Select SEL-5810 from Format drop-down menu. Refer to
Figure 3.11.
Step 23. Select the {Export} button.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
3.10
Job Done Example
Job Done Example 1
Cryptographic Manual—Do Not Copy
Preliminary Copy
Figure 3.11 Specify Device to Export to
SEL-5810 Virtual Serial Software
Step 24. Enter an encryption password to protect the file.
Step 25. Select OK. This will keep the file encrypted while it is being
transferred to the lineman’s PC.
Figure 3.12
Export Encrypted User Configuration File
Step 26. Choose a folder to store the encrypted file and enter a file
name in the File name box.
Step 27. Select OK. This saves the file to the location specified by
Step 26.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Figure 3.13
Job Done Example
Job Done Example 1
3.11
Store Encrypted File
Step 28. Send or load this file onto the lineman’s PC.
Step 29. Start the SEL-5810 Virtual Serial Software.
Step 30. Click File > Import and select the file saved in Step 26 to
import the SEL-3022 device image into the SEL-5810
Software.
Step 31. Enter password.
Step 32. Select OK.
Step 33. Select the {Connect} button.
Step 34. Enter User password.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
3.12
Job Done Example
Job Done Example 1
Cryptographic Manual—Do Not Copy
Preliminary Copy
Figure 3.14 Password Prompt in
SEL-5810 Virtual Serial Software
Step 35. Verify the {Connect} button changes from Connect to
Disconnect.
Step 36. Open ACSELERATOR.
Step 37. Select Communication < Parameters.
Step 38. Specify Device by selecting, from the drop-down menu, the
Communication port generated by the SEL-5810 Virtual
Serial Software (reference the SEL-5810 Terminal Connection
Status: COM Port).
Step 39. Select OK.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Figure 3.15
Job Done Example
Job Done Example 1
3.13
Communication Parameters Window in ACSELERATOR
Step 40.Verify on the SEL-5810 the Terminal Connection Status: Terminal
Status shows Connected.
Step 41. You can now perform setting and monitoring functions via
the ACSELERATOR program such as reading SER reports by
selecting HMI < Meter & Control < SER.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
3.14
Job Done Example
Job Done Example 1
Figure 3.16
Cryptographic Manual—Do Not Copy
Preliminary Copy
Reading SER Report Via ACSELERATOR
Step 42. When you are done communicating with the SEL-651R,
close ACSELERATOR.
Step 43. At that point the SEL-5810 Terminal Connection Status: Terminal
Status shows Disconnected.
Step 44.Select the SEL-5810 Wireless Connection: {Disconnect} button to
close the wireless session. Note, the {Disconnect} button will
change to Connect.
NOTE: The SEL-5810 Virtual Serial Software requires that
the user’s communications program, i.e., ACSELERATOR or
HyperTerminal, close or disconnect the virtual serial port
before it is possible to close the SEL-5810 Virtual Serial
Software itself.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Section 4
Settings and Commands
Introduction
This section explains the settings and commands of the SEL-3022.
➤
Serial Port Settings: Settings that configure the EIA-232 serial port.
➤
Wireless Port Settings: Settings that configure the 802.11b wireless
port.
➤
Communication Status Command: Diagnostic status report on the
health of the SEL-3022 serial port communications channel.
➤
Device Information: Displays device-related information.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
4.2
Settings and Commands
Serial Port Settings
Cryptographic Manual—Do Not Copy
Preliminary Copy
Serial Port Settings
The following settings in Table 4.1 configure the serial port.
Table 4.1
Settings: DCE Port
Setting Name
Setting Description
Value or Range
Bits Per Second
Serial Port Baud Rate in
Bits per Second
300, 1200, 2400, 4800,
9600, 19200, or 38400
Data Bits
Number of data bits in serial
port data format
6, 7, or 8
Parity
Parity mode of the serial
port
Odd, Even, or None
Stop Bits
Number of stop bits in the
serial port
1 or 2
Flow Control
Selects hardware flow control
Hardware or None
The SEL-3022 Universal Asynchronous Receiver/Transmitters (UARTs) have a onecharacter receive buffer. If the SEL-3022 asserts Hardware (HW) flow control, one
additional character can be sent to the SEL-3022 without loss of data. If HW flow
control is asserted and characters are still being sent to the SEL-3022 (e.g., from the
serial port of a device connected to the SEL-3022) then characters will be lost.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Settings and Commands
Wireless Port Settings
4.3
Wireless Port Settings
The following settings configure the wireless interface.
NOTE: If the SEL-3022 is in a Reset mode, the wireless port
will not function. See Initializing the SEL-3022 on
page 2.7 in Section 2: Installation for details on enabling
the wireless interface.
Table 4.2
Settings: Wireless
Setting Name
Setting Description
Value or Range
Active WEP Key
Selects which key will be used for the WEP
encryption.
WEP Key 1,
WEP Key 2,
WEP Key 3, or
WEP Key 4
IP Address
Internet Protocol address of wireless device.
Consult your system administrator for an
appropriate IP address.
1.0.0.0 to
255.255.255.255
SSID
Service Set ID of the wireless device. Consult
your system administrator for an appropriate
SSID value.
1–32 characters
Operator Interface
Channel
Wireless radio channel. Consult your system
1–11
administrator for an appropriate radio channel.
Timeout
Wireless timeout for TCP connection in minutes. The SEL-3022 closes the connection if
no data is received after the specified length of
time. (Recommendation: 10 min.)
IMPORTANT: If you lose the wireless connection to the SEL-3022, the SEL-3022 will
not accept a new connection until the timeout
period expires.
1–15 minutes
NOTE: Contact your network administrator for a valid IP
address.
WEP Key settings configure WEP keys used by the SEL-3022 wireless mode. The
WEP key used in the SEL-3022 wireless module must match those used in your PC or
PDA.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
4.4
Cryptographic Manual—Do Not Copy
Settings and Commands
Wireless Port Settings
Table 4.3
Preliminary Copy
Settings: WEP Keys
Setting Name
Setting Description
Value or Range
WEP Key 1
Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
WEP Key 2
Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
WEP Key 3
Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
WEP Key 4
Twenty-six character hexadecimal (104-bit)
key used in the wireless encryption algorithm.
0–9 and A–F
The SEL-3022 provides three login roles on the wireless interface. The User role
allows EIA-232 to 802.11b wireless communication. SEL-3022 parameters cannot be
changed in the User role.
The Operator role provides read and write privileges on all settings except those that
may compromise the security of the device (encryption and authentication keys, access
passwords, settings that may disable critical security functions, etc.). In addition, the
Operator login role can access all of the SEL-3022 diagnostics capabilities.
The Security Officer login role provides a slightly higher access privilege by allowing
all of the actions provided by the Operator login role, plus the ability to write new
values to all cryptographic security parameters and sensitive settings. The three
individual roles are authenticated on the wireless operator interface using a completely
separate set of login authentication parameters.
There is an Encryption Key, Authentication Key, and Password associated with each
login role. The values of each of these three settings must be different for each of the
three roles.
Table 4.4
Settings: User
Setting Name
Description
Value or Range
Encryption Key
Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Authentication Key
Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Password
Password or Pass Phrase for user-controlled
access, referred to as Access Level 1.
6–80 printable
ASCII characters
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Table 4.5
Settings and Commands
Wireless Port Settings
Settings: Operator
Setting Name
Setting Description
Value or Range
Encryption Key
Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Authentication Key
Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Password
Password or Pass Phrase for operator-controlled access, referred to as Access Level 1.
6–80 printable
ASCII characters
Table 4.6
4.5
Settings: Security Officer
Setting Name
Setting Description
Value or Range
Encryption Key
Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Authentication Key
Thirty-two character hexadecimal ASCII
(128-bit) key.
0–9 and A–F
Password
Password or Pass Phrase for security officer
access, referred to as Access Level 2.
6–80 characters
IMPORTANT: The user, operator, and security officer
passwords cannot be read out of the SEL-3022 with the
SEL-5809 Settings Software or SEL-5810 Virtual Serial
Software. Record the keys and passwords in a safe place.
If you lose keys or passwords, you must reset and
initialize the SEL-3022 with new values before you can
modify settings.
NOTE: The security officer, operator, and user security
settings cannot be the same. If any of the security
settings are the same for the user, operator, and security
officer settings, the SEL-5809 Settings Software will
generate an error.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
4.6
Settings and Commands
Communication Status Command
Cryptographic Manual—Do Not Copy
Preliminary Copy
Communication Status Command
You can use the SEL-5809 Settings Software and the wireless interface to issue a
Communication Status command. Use the Communication Status command to analyze
the health of your serial channel. All error counters reset to zero when you press the
Clear Comm Statistics {Clear} button or if power is cycled to the SEL-3022. The
Communication Status includes the following information:
Table 4.7
Status Command Names and Descriptions
Status
Status Name
Description
DCE Serial Port Errors
DCE Framing Errors
Number of times a Stop Bit failure
has occurred.
DCE Overrun Errors
Number of times a receive character was not removed from the
serial port before a new character
has arrived.
DCE Parity Errors
Number of times a parity error has
occurred.
DCE Error Total
Total number of Framing, Overrun, and Parity Errors.
Contact Alarm Comm
Pulse
How much any communications statistics value
must increase before
pulsing the alarm contact.
0–500 Failures
Clear Comm Statistics
(Button)
NA
Press to clear all communication
statistics to zero.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Settings and Commands
Device Information
4.7
Device Information
You can use the SEL-5809 Settings Software and the wireless interface to obtain device
information.
Table 4.8
Identification
Version Name
Version Description
Firmware Version
This is the released firmware version number the SEL-3022
is running.
Hardware Version
This is the released hardware version number that determines the SEL-3022 configuration.
Firmware Download #
Datecode indicating the date and numbered programming
of the device.
MAC Address
(See Specifications)
The 802.11b wireless interface Media Access Control
address. This is a unique address.
Device Status
You can use the SEL-5809 Settings Software to determine the SEL-3022 self-test
status and wireless module signal strength.
Table 4.9
Status: Device
Test/Comm Quality
Status
Description
RAM
PASS or FAIL
Indicates status of RAM
tests
FLASH
PASS or FAIL
Indicates status of FLASH
tests
802.11b Interface
PASS or FAIL
Status of wireless module
interface
Comm Quality
dB
The Signal to Noise level
Avg Signal Level
dBm
Received power level of
wireless module
Avg Noise Level
dBm
Received noise level of
wireless module
Previous Diagnostic Failures
Status of last four diagnostic failures
Shows the most recent four
diagnostic failures and associated diagnostic information
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
4.8
Settings and Commands
Device Information
Cryptographic Manual—Do Not Copy
Preliminary Copy
Output Alarm
Use the SEL-5809 Settings Software to test the alarm output of the SEL-3022.
Table 4.10
Status: Output Alarm
Name
Display
Description
Alarm
Red = alarm contact is open
White = alarm contact is
closed
Indicates status of alarm
contact
Pulse Duration
1–30
Number of seconds to pulse
the alarm output
Pulse Alarm Contact
NA
Selecting Pulse will pulse
(open) the alarm output for
the Pulse Duration
Virtual Serial Port
The Status: Virtual Serial Port view is only available in the User mode.
Table 4.11
Status: Virtual Serial Port
Name
Display
Description
Connection Information
Virtual connection is active on
COMXX. Disconnect serial
application and then use the
Close Device command of this
application or close this application to terminate connection
Indicates where a PC
application can connect to the
virtual serial port
Connection Status
Red = Not connected
Green = Connected
Indicates when a PC
application is connected to
the virtual serial port
Transmitted
Number in Bytes
Number of bytes transmitted
Received
Number in Bytes
Number of bytes received
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Section 5
Testing and Troubleshooting
Introduction
This section provides guidelines for testing and troubleshooting the SEL-3022.
Included are discussions on testing philosophies, methods, and tools. At the end of the
section are descriptions of communication, channel diagnostics, self-tests, and
troubleshooting procedures.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
5.2
Testing and Troubleshooting
Testing Philosophy
Cryptographic Manual—Do Not Copy
Preliminary Copy
Testing Philosophy
SEL-3022 testing can be divided into three categories: acceptance, commissioning, and
maintenance testing. The categories are differentiated both by when they take place in
the life cycle of the transceiver and by test complexity. The paragraphs below describe
when you should perform each type of test, the goals of testing at that time, and the
functions that you need to test at each point.
This information is intended as a guideline for testing an SEL-3022.
Acceptance Testing
Perform acceptance testing when qualifying an SEL-3022 for use in a serial
communication system that requires data encryption.
Goals of Acceptance Testing
➤
Ensure that the SEL-3022 meets published critical performance
specifications.
➤
Ensure that the SEL-3022 meets the requirements of the intended
application.
➤
Improve your familiarity with SEL-3022 capabilities.
What to Test
Acceptance test all setting parameters critical to your intended application.
SEL performs detailed acceptance testing on all SEL-3022 models and versions. Any
SEL-3022 we ship meets published specifications. It is important for you to perform
acceptance testing on an SEL-3022 if you are unfamiliar with SEL-3022 operating
theory or settings. Such testing helps you ensure that SEL-3022 settings are correct for
your application.
Commissioning Testing
Perform commissioning testing when installing a new SEL-3022 Serial Encrypting
Transceiver.
Goals of Commissioning Testing
➤
Ensure that power connections are correct.
➤
Ensure that the Alarm Output connection is correct.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
➤
Testing and Troubleshooting
Testing Philosophy
5.3
Ensure that the SEL-3022 functions with your settings according to
your expectations.
What to Test
Perform commissioning testing on serial, and wireless ports, and your alarm output.
SEL performs a complete functional check of each SEL-3022 before shipment.
SEL-3022 commissioning tests should verify that the power supply, serial cable
antenna, and alarm output (if used) are connected properly. Commissioning testing
should also ensure proper configuration of the wireless interface.
Maintenance Testing
You generally do not need to perform maintenance testing on the SEL-3022. If you use
the alarm output, you can use the SEL-5809 Settings Software Pulse command to
verify functionality between the SEL-3022 and a connected device.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
5.4
Cryptographic Manual—Do Not Copy
Testing and Troubleshooting
Communications Channel Diagnostics
Preliminary Copy
Communications Channel Diagnostics
The SEL-3022 provides a serial communication diagnostic function to aid in
troubleshooting.
The SEL-3022 monitors the DCE serial port for various errors. You can use the number
and type of errors to troubleshoot communications channel problems. Use the
SEL-5809 Settings Software Communications Channel Report page to retrieve
communications channel diagnostics.
The SEL-3022 records the following Communications Channel Statistics.
Table 5.1
Status: Comm
Status
Status Name
Description
DCE Serial Port
Errors
DCE Framing Errors
Number of times a Stop Bit failure
has occurred.
DCE Overrun Errors
Number of times a receive character was not removed from the
serial port before a new character
arrived.
DCE Parity Errors
Number of times a parity error has
occurred.
DCE Error Total
Total number of Framing, Overrun, and Parity Errors.
Contact Alarm Comm
Pulse
How much any communications statistics value must
increase before pulsing the
alarm contact
0–500 Failures
Clear Comm Statistics
(Button)
NA
Press to clear all communication
statistics to zero.
You can use the SEL-5809 Settings Software to clear comm statistics.
The wireless interface shows the Comm Quality (Signal-to-Noise ratio), Average
Signal level in dBm, and Average Noise level in dBm. You can use these measurements
to determine the wireless signal strength of the SEL-3022 as you apply the transceiver
in your application.
Table 5.2
Device Status: Device Status (Sheet 1 of 2)
Status Name
Description
Comm Quality
Report RF Signal-to-Noise Ratio from 802.11b module
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Testing and Troubleshooting
Communications Channel Diagnostics
5.5
Preliminary Copy
Table 5.2
Device Status: Device Status (Sheet 2 of 2)
Status Name
Description
Avg Signal Level
Report RF Signal Level from 802.11b module
Avg Noise Level
Report RF Noise Level from 802.11b module
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
5.6
Testing and Troubleshooting
Self-Tests
Cryptographic Manual—Do Not Copy
Preliminary Copy
Self-Tests
The SEL-3022 has extensive self-test capabilities. You can determine the diagnostic
status of your SEL-3022 via the SEL-5809 Settings Software or the Status LED located
on the SEL-3022.
Table 5.3
SEL-3022 Self-Test Capabilities
Test
SEL-5809
Status:
Device
SEL-3022
Disable
Status
LED
Contact
Output
Alarm
RAM
Pass
Yes
Toggle .5
second
Open
Performs a read and
write verification
Flash
Pass
Yes
Toggle .5
second (if
possible)
Open
Performs a checksum
calculation
Cryptographic
Algorithm
Tests
NA
Yes
Toggle 1
second
Open
Checks known
answer tests for all
cryptographic functions
802.11b
Self-Tests
NA
Yes
Toggle .5
second
Open
Indicates 802.11b
wireless device health
802.11b
SNR
dB
NA
NA
NA
Reports RF Signal-toNoise Ratio from
802.11b module
802.11b
Signal
dBm
NA
NA
NA
Reports RF Signal
Level from 802.11b
module
802.11b
Noise
dBm
NA
NA
NA
Reports RF Noise
Level from 802.11b
module
RNG Test
NA
Yes
Toggle 1
second
Open
Compares each block
with previous block
Zeroized
Key
NA
Yes
Toggle 2
seconds
Open
Indicates presence of
zeroized key material
Description
Under normal operating conditions the contact alarm is closed. If the SEL-3022 is
disabled the contact will open.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Testing and Troubleshooting
Troubleshooting
5.7
Troubleshooting
Inspection Procedure
Complete the following procedure before disturbing the SEL-3022. After you finish
the inspection, proceed to the Troubleshooting Procedure.
Step 1.
Measure and record the power supply voltage at the power input
terminals.
Step 2.
Check to see that the power is on. Do not turn the SEL-3022 off.
Step 3.
Measure and record the voltage at the alarm output.
Step 4.
Record the state of the Status LED, e.g., On, Off, or flashing rate.
Troubleshooting Procedure
Table 5.4
Troubleshooting
Condition of Status LED
Possible Cause/Response
Status LED is dark
Input power is not present or firmware has failed
power on verification
Status LED is blinking at a flash
rate of 0.5 seconds
The SEL-3022 has detected a hardware failure.
Status LED is blinking at a flash
rate of 1 second
There is a problem with Cryptographic functions.
Status LED is blinking at a flash
rate of 2 seconds
The SEL-3022 has been reset. Follow the initialization procedure to configure the device.
Status LED is on but unable to
connect using wireless 802.11b
interface
Verify that the Wireless channel, SSID, IP Address,
WEP keys, Active WEP key, User/Operator/Security Officer key, and pass phrase are the same for
both the SEL-5809 Settings Software and the
SEL-3022. See Initializing the SEL-3022 on
page 2.7 in Section 2: Installation for details.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
5.8
Testing and Troubleshooting
Factory Assistance
Cryptographic Manual—Do Not Copy
Preliminary Copy
Factory Assistance
We appreciate your interest in SEL products and services. If you have questions or
comments, please contact us at:
Schweitzer Engineering Laboratories, Inc.
2350 NE Hopkins Court
Pullman, WA USA 99163-5603
Telephone: (509) 332-1890
Fax: (509) 332-7990
Internet: www.selinc.com
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Appendix A
Firmware and
Manual Versions
Firmware
This manual covers SEL-3022 Wireless Encrypting Transceivers containing firmware
bearing the firmware version numbers listed in Table A.1. This table also lists a
description of modifications and the instruction manual date code that corresponds to
firmware versions. The table lists the most recent firmware version first.
Table A.1
Firmware Revision History
Firmware Identification (FID) Number
Description of Changes
Manual
Date Code
SEL-3022-R100-V0-Z001001-D20050615
Original Firmware Release.
20050615
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
A.2
Firmware and Manual Versions
Instruction Manual
Cryptographic Manual—Do Not Copy
Preliminary Copy
Instruction Manual
The date code at the bottom of each page of this manual reflects the creation or revision
date.
Table A.2 lists the instruction manual release dates and a description of modifications.
The table lists the most recent instruction manual revisions at the top.
Table A.2
Instruction Manual Revision History
Revision
Date
Summary of Revisions
20050615
Initial Release.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Appendix B
Firmware Upgrade Instructions
Introduction
SEL occasionally offers firmware upgrades to improve the performance of your
transceiver. The SEL-3022 stores firmware in Flash memory; therefore, changing
physical components is not necessary. These instructions give a step-by-step procedure
to upgrade the SEL-3022 firmware by uploading a file from a personal computer to the
transceiver via the DCE serial port.
Required Equipment
You will need the following to perform a firmware upgrade:
➤
Personal computer (PC)
➤
SEL-5809 Settings Software
➤
Terminal emulation software that supports the Xmodem 1K protocol
(these instructions use HyperTerminal® from a Microsoft®
Windows® operating system)
➤
SEL-C388 Serial Cable or equivalent DCE to DTE “straight-through”
cable capable of supporting hardware flow control
➤
The firmware upgrade file received from your SEL customer service
representative
Upgrade Procedure
Perform the following steps to upgrade the SEL-3022 firmware:
Step 1.
Record all settings if they are to be used after the upgrade. Typically,
the previous session saves all but the cryptographic keys from the
previous connection session. Right-clicking on the device will allow
you to view the previous device image settings.
Step 2.
If the SEL-3022 is in service, disconnect the cable connected to the
DCE serial port.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
B.2
Firmware Upgrade Instructions
Introduction
Cryptographic Manual—Do Not Copy
Preliminary Copy
IMPORTANT: Pressing the {Reset} button will erase all
settings, so be sure to save your settings if they are going
to be used again.
Step 3.
Press the {Reset} button for at least 2 seconds. The Status LED will
blink at a 2-second rate while in the reset mode.
Step 4.
Start the SEL-5809 Settings Software and connect to the SEL-3022
via the serial port.
C388
Figure B.1
PC to SEL-3022 Connection
NOTE: If you are upgrading a previously installed SEL-3022,
right-click on the device name and select Edit Connection
Parameters.
Step 5.
Figure B.2
At the Serial tab, select the serial port the PC will use to
communicate with the SEL-3022.
SEL-3022 and SEL-5809 Connection Parameters
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Step 6.
Figure B.3
Firmware Upgrade Instructions
Introduction
At the Connection Method tab, select Serial.
SEL-5809 Settings Software Connection Method
Step 7.
Click OK.
Step 8.
Double-click the device from the SEL-5809 Settings Software main
menu to establish communications. While the SEL-5809 Settings
Software and SEL-3022 are establishing a connection you will see
the following status box.
Figure B.4
B.3
SEL-5809 Opening Connection
Step 9.
Date Code 20050615
When the PC and SEL-3022 have established a connection, select the
Status: Device tab.
Instruction Manual
SEL-3022 Transceiver
B.4
Firmware Upgrade Instructions
Introduction
Figure B.5
Cryptographic Manual—Do Not Copy
Preliminary Copy
Status: Device Window
Step 10. Click the {Begin} button to put the SEL-3022 into Firmware
Download Mode.
Step 11. Click Yes to enter firmware download mode.
Figure B.6
Confirmation Prompt
Step 12. Click OK to acknowledge the SEL-3022 is entering firmware
upgrade mode.
Figure B.7
Send Operation Prompt
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Firmware Upgrade Instructions
Introduction
B.5
Step 13. Configure the serial port settings in the Terminal software to the
following:
Figure B.8
a.
b.
Bits per Second: 115200
Data bits: 8
c.
d.
Parity: None
Stop bits: 1
e.
Flow control: Hardware
Configuring Serial Port Settings in the Terminal Software
Step 14. Establish a connection to the SEL-3022 using the Terminal
application.
Step 15. The SEL-3022 will send your Terminal a “C” indicating it is ready to
commence an Xmodem 1K file transfer.
NOTE: The SEL-3022 will remain in the firmware download
mode until either a succcessful firmware upgrade is
completed or the power is cycled.
Step 16. Click Transfer > Send File. See Figure B.9.
Step 17. Specify the Filename to be the received firmware upgrade file.
Step 18. Specify the Protocol by selecting 1K Xmodem from the drop-down
menu.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
B.6
Firmware Upgrade Instructions
Introduction
Figure B.9
Cryptographic Manual—Do Not Copy
Preliminary Copy
Send File Prompt
Step 19. Click Send.
Figure B.10
Sending Confirmation Window
Step 20. If Xmodem transfer was successful, you will receive the validating
firmware message. See first line of message in Figure B.11.
Step 21. If the firmware is invalid, you will receive an invalid firmware error
message. See second line of message in Figure B.11.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Figure B.11
Firmware Upgrade Instructions
Introduction
B.7
Terminal Invalid Firmware Error Message
Step 22. Once the firmware is validated, you will receive the message that the
firmware is being written to nonvolatile program memory (Flash).
IMPORTANT: Do not disconnect power during this stage.
Figure B.12
Terminal Valid Firmware Message
Step 23. When successfully written to Flash, you will need to cycle power for
the new firmware to take effect.
Step 24. After cycling power, you will need to reinitialize the SEL-3022 using
the settings saved at the start of the firmware upgrade procedure.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
B.8
Firmware Upgrade Instructions
Factory Assistance
Cryptographic Manual—Do Not Copy
Preliminary Copy
Factory Assistance
We appreciate your interest in SEL products and services. If you have questions or
comments, please contact us at:
Schweitzer Engineering Laboratories, Inc.
2350 NE Hopkins Court
Pullman, WA USA 99163-5603
Telephone: (509) 332-1890
Fax: (509) 332-7990
Internet: www.selinc.com
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Appendix C
Wireless Operator
Interface Security
Introduction
The SEL-3022 incorporates a wireless LAN (WLAN) with which you can perform
engineer access to IED and diagnostic and maintenance functions. The wireless aspect
of the device makes connection of the SEL-3022 to a Personal Computer (PC) simple
and efficient. Make such a connection through use of the SEL-5809 Settings Software
or SEL-5810 Virtual Serial Software and 802.11b (also known as Wi-Fi) compliant
devices standard with many new notebook PCs or available at most computer stores.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.2
Cryptographic Manual—Do Not Copy
Wireless Operator Interface Security
Wireless Interface Security Overview
Preliminary Copy
Wireless Interface Security Overview
The SEL-3022 wireless operator interface and SEL-5809 Settings Software implement
a two-part encryption system consisting of IEEE 802.11 WEP and the SEL Security
Application. WEP is an encryption standard defined by the 802.11 specification and is
available on most 802.11-enabled devices. The SEL Security Application consists of
National Institute of Standards and Technology (NIST)-approved encryption and
authentication algorithms that are cryptographically much stronger than WEP.
Together, these two, independent security features provide a secure communications
link between the SEL-3022 and the operator PC or Personal Data Assistant (PDA).
Strengths of the WEP and SEL Security Application combination are as follows:
➤
A 104-bit WEP encryption function keeps out all but the most
determined attackers. The following pages discuss the relative
security of the WEP function.
➤
The SEL Security Application employs 128-bit AES encryption and
128-bit HMAC SHA-1 authentication. This application provides
cryptographic security at greater than 128 bits of cryptographic key
strength, using only FIPS 140-2 compliant cryptographic algorithms.
The following pages discuss the SEL Security Application.
Figure C.1 shows the relationship between WEP and the SEL Security Application.
PC With SEL-5809 Settings Software or SEL-3022
SEL Security Application
AES
Encryption
Key
802.11b Wireless Module
HMAC
Authentication
Key
WEP
Encryption
Key
Secured
Data
Data
HMAC SHA-1
Authentication
and
AES Encryption
WEP
Encryptor
802.11b
Radio
Figure C.1 Two Independent Layers of Cryptographic
Security Protect the SEL-3022 Wireless Operator Interface
The decryption process of the SEL-3022 wireless interface consists of multiple
cryptographic verifications. When the SEL-3022 wireless module receives a correctly
addressed packet, the wireless module WEP decrypts the packet. The wireless module
discards any packets that do not decrypt successfully. If the packets do WEP decrypt
successfully, the wireless module passes resulting data frames to the SEL Security
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Wireless Operator Interface Security
Wireless Interface Security Overview
C.3
Preliminary Copy
Application. The data frames must then AES decrypt and HMAC SHA-1 authenticate.
If the SEL Security decryption or authentication fails, the SEL Security Application
discards these data frames and disconnects. In summary, before the SEL-3022
considers data to be valid, the data must AES decrypt, HMAC SHA-1 authenticate, and
WEP decrypt correctly, or the data are discarded. The process is reversed for the
transmission and encryption process.
The SEL-3022/SEL-5809 Settings Software includes the following wireless security
features:
➤
104-Bit Wired Equivalent Privacy (WEP) Encryption: The WEP
encryption function, provided by the 802.11b wireless LAN module,
is always enabled and active on the SEL-3022.
➤
128-Bit Advanced Encryption Standard (AES) Encryption:
Because of the relative weakness of the WEP encryption function, the
SEL-3022 also incorporates an independent layer of AES encryption.
➤
128-Bit HMAC SHA-1 Frame Authentication: Every frame
transmitted on the wireless operator interface is cryptographically
authenticated to prevent malicious tampering and to guarantee
acceptance of only those frames that authorized users transmit.
➤
Message Replay Protection: The SEL-3022 uses frame sequence
numbers with HMAC SHA-1 authentication to ensure that individual
frames cannot be retransmitted to cause malicious actions.
➤
Session Replay Protection: The SEL-3022 uses a robust challengeresponse session authentication protocol to guarantee that wireless
operator sessions cannot be replayed to cause malicious actions.
➤
AES and HMAC Session Key Exchange: The SEL-3022 exchanges
unique, randomly-generated encryption and authentication keys on
each wireless session connection. This limits the amount of data
protected by any single key value and strengthens the SEL-3022
against cryptanalytic attacks.
➤
Wireless Session Password: A configurable password is required to
open a wireless connection with the SEL-3022. This password is
never stored in the configuration software device image, so it cannot
be compromised by theft of a configured maintenance PC containing
the wireless encryption and authentication keys. In the event of a lost
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.4
Wireless Operator Interface Security
Wireless Interface Security Overview
Cryptographic Manual—Do Not Copy
Preliminary Copy
or stolen maintenance PC, this feature gives the system security
officer time to change the cryptographic security parameters on the
network.
➤
Wireless Port Timeouts: The SEL-3022 will not allow another
wireless connection for a short period of time after any failed
authentication attempt. This significantly reduces the rate at which a
malicious individual can apply a brute force cryptographic key or
password guessing attack.
➤
Network Reconnaissance Protection: The SEL-3022 will not reply
to any network traffic that fails authentication. Because of this lack of
response to unauthenticated network traffic, the SEL-3022 is not
susceptible to ping sweeps and other network mapping techniques.
➤
Single Active Session: The SEL-3022 allows only a single active
session and rejects attempts to establish a second wireless connection.
This feature ensures that only one user can change settings at any
given time.
➤
No Default Settings: The SEL-3022 will remain in an initialization
mode when any of the critical security parameters are set to the
default, zeroized values. During this initialization mode, the
SEL-3022 will disable the wireless port and force the user to enter the
initial encryption keys, authentication keys, and password values via
a direct serial connection. This functionality ensures that critical
security parameters are never transmitted over the 802.11b radio
channel protected by insecure, factory default keys.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Wireless Operator Interface Security
IEEE 802.11 WEP Security
C.5
IEEE 802.11 WEP Security
The IEEE 802.11 designers included provisions for data encryption and authentication
to provide what they considered strong data security and network access control. The
Wired Equivalent Privacy (WEP) procedures outlined in the standard provide both
functions. WEP encryption cryptographically scrambles the data contents of the Media
Access Control (MAC) packet prior to transmission. The MAC packets can be
intercepted, but the data scrambling the encryption process provides will, in theory,
make the data payload and network headers (above the MAC network layer)
incomprehensible. The encryption and decryption operations are a function of the
original message data and a secret encryption key. For symmetric encryption
algorithms, such as the RC-4 algorithm WEP uses, the encryption key and decryption
keys are identical. Several factors, including the following, determine the strength or
security of the encryption process:
➤
The secrecy of the key
➤
The length of the key
➤
How often the key value changes
➤
The cryptographic strength of the encryption algorithm
Because the encryption and decryption keys are identical for symmetric encryption
algorithms, the theft or deduction of the key value by a malicious individual will
remove any protection WEP encryption offers. There are a few common methods for
determining a key value. The would-be attacker can simply steal the key value in some
manner. If that option is not available, the attacker can attempt to guess the key value.
The difficulty of such a guessing, or brute-force attack, grows exponentially with the
length of the key. The encryption process can be strengthened against key-guessing
attacks through periodic changes to the key value. If someone ever guesses the key
value, the attacker can only decrypt the data processed with that key. Changing the key
value on a periodic basis can significantly reduce the data a single key processes.
Finally, the cryptographic strength of the encryption algorithm determines how
difficult it is to compromise portions of the encrypted messages. If the algorithm is
cryptographically sound, it is extremely difficult mathematically to compromise the
key value or message contents from publicly available knowledge. Publicly available
knowledge includes the encrypted message itself, known as ciphertext, and prior
knowledge of the contents of the message This prior knowledge, for example, could
include the statistics of English text or knowledge of the location and value of an
encrypted header field. The IEEE 802.11 standard specifies that if the incoming packet
cannot be decrypted properly, it must be dropped and ignored. All hosts must know the
value of the secret encryption key prior to being granted network access. The network
designer controls the dissemination of the key value and, therefore, controls who has
access to the WEP-protected network.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.6
Wireless Operator Interface Security
IEEE 802.11 WEP Security
Cryptographic Manual—Do Not Copy
Preliminary Copy
WEP Security Flaws Explanation
WEP is based on a two-part encryption algorithm called RC-4. The first stage of the
encryption process, known as the Key Scheduling Algorithm (KSA), takes a string of
key bits as input and forms an output initialization string. The second stage, known as
the Pseudo-Random Generation Algorithm (PRGA), produces a pseudo-random
bitstream of arbitrary length. The value of this string of bits depends on the initializing
permutation the KSA produces. Note that a given KSA input will always produce the
same PRGA output. The designers of the IEEE 802.11 standard wanted the process of
decrypting a single packet to be independent of all previous and future packets.
Because of this requirement, the output of the PRGA function has to be reset at the
beginning of every packet. If this were done without also changing the input to the
KSA function, the encryption stream would be identical for every packet and the
resulting encryption process would be trivially broken. Because of this, the input to the
KSA function is a concatenation of a secret key (104 bits in the case of the SEL-3022
wireless operator interface) with a 24-bit Initialization Vector (IV). By changing the IV
on every packet, the WEP encryption process ensures that the probability of any two,
randomly chosen packets being encrypted with the same PRGA output (known as an
“IV collision”) is sufficiently low.
For each data packet, the concatenation of the key and IV serves as the input to the RC4 algorithm, which produces a string of pseudo-random encryption bits (with a length
equal to the length of the original data packet). To perform the encryption operation,
the encryption bit string is added modulo 2 (XOR) to the original contents of the
packet. The IV used during the encryption process is then concatenated with the
resulting ciphertext to form the final message. A major contributor to the relative
weaknesses of the WEP encryption process is the fact that the IV is appended to the
ciphertext and transmitted unencrypted. The following text explains the details of these
weaknesses.
In an August 2001 presentation at the Eighth Annual Workshop on Selected Areas in
Cryptography of an article titled “Weaknesses in the Key Scheduling Algorithm of
RC4,” authors Fluhrer, Mantin, and Shamir published formal proofs of some potential
weaknesses in the RC-4 algorithm. In a later paper, published in the AT&T Labs
Technical Report TD-4ZCPZZ of August 2001 titled “Using the Fluhrer, Mantin, and
Shamir Attack to Break WEP,” authors Stubblefield, Ioannidis, and Rubin
demonstrated that the WEP algorithm was designed in such a way as to contain the
worst of the weaknesses that Fluhrer, Mantin, and Shamir’s paper outlined.
Furthermore, Stubblefield, Ioannidis, and Rubin demonstrated that a passive attack
could be used to successfully determine a 104-bit secret key in just a few hours on a
moderately loaded wireless LAN. Based on these results, Stubblefield, Ioannidis, and
Rubin urged network designers to assume that the IEEE 802.11 link layer offers very
little security and to employ additional security measures in addition to WEP. The
SEL-3022 design incorporates these additional security measures in the form of
cryptographically sound 128-bit AES encryption and HMAC SHA-1 authentication
(see The SEL Security Application on page C.9 for further explanation).
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Wireless Operator Interface Security
IEEE 802.11 WEP Security
C.7
The weaknesses Fluhrer, Mantin, and Shamir described are a direct consequence of the
RC-4 algorithm. These researchers demonstrated that there are large classes of keys for
which a very small portion of the key determines a very large portion of the KSA
output. Furthermore, Fluhrer, Mantin, and Shamir showed that the PRGA function is
weak in the sense that known patterns in the KSA output are transformed into
predictable patterns in the first byte of the PRGA output. In other words, for a large
number of keys, the first byte of the PRGA output is highly correlated with a very
small number of key bits. This correlation can be used, in certain situations, to guess
the value of the secret key. The implementation of the WEP algorithm ensures that
these weaknesses can be exploited in an effective manner. Because the WEP algorithm
transmits the IV unencrypted with each packet, an attacker has full visibility of three
bytes of the KSA input. Furthermore, the first encrypted byte of almost every IEEE
802.11 packet is a known constant. This is a direct consequence of the fact that the first
encrypted byte of an IEEE 802.11 packet is the Destination Service Access Point
(DSAP) field of the LLC header, which has a value of 0xAA (hexidecimal) for all
packets containing TCP/IP protocol data. This known value allows an attacker to
recover the first byte of the PRGA output for virtually every packet by simply XORing
the first byte of ciphertext with the value 0xAA. Someone could attack WEP by
observing the IV values of each encrypted packet transmitted on the network to find
weak values that result in the leak of information about the value of a particular secret
key byte into the first byte of the PRGA output. An attacker could repeat this process
until all bytes of the secret key are determined with sufficiently high probability.
The 802.11b wireless LAN protocol provides a very effective wireless networking
solution, which has resulted in steadily growing popularity of 802.11b-compliant
networking devices, or access points (APs), since the introduction of the standard. This
great popularity of such technology has fueled the development of software utilities
designed to locate active wireless APs and identify whether WEP encryption is enabled
on these devices.
If an attacker finds an AP protected by WEP encryption but interesting enough to
warrant further investigation, the attacker can attempt to crack the WEP key. Several
tools can passively capture normal wireless traffic on a target network and exploit the
security flaws previously discussed to potentially determine the WEP encryption key
used to secure the transmitted data. These tools have the potential to guess a WEP key
by passively observing as few as four million network packets. Clearly, the time that
this process takes is dependent on the average amount of network traffic that the 802.11
wireless network transmits.
Implications of WEP Security Flaws
Because of the previously discussed flaws, the WEP encryption function the 802.11
standard specifies does not provide the advertised 104 bits of cryptographic key
strength. It does, however, provide a rather significant barrier to a potential attacker. It
is difficult to determine the WEP key from a lightly loaded wireless network. A
wireless connection between a maintenance PC and an SEL-3022 will only transmit
network packets while the session is open and data are being actively exchanged
between the PC and the SEL-3022. Under normal conditions, a potential attacker
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.8
Wireless Operator Interface Security
IEEE 802.11 WEP Security
Cryptographic Manual—Do Not Copy
Preliminary Copy
would have to capture encrypted packets for an extremely long time to analyze the few
million packets necessary to determine the WEP key and defeat the WEP encryption
function. If an attacker successfully determines the WEP encryption key, the contents
of all network packets transmitted between a maintenance PC and an SEL-3022 device
would still be protected by the cryptographically strong encryption and authentication
the SEL-3022 AES and HMAC SHA-1 functions provide (see The SEL Security
Application section below for further explanation). The cryptographic community has
scrutinized the AES encryption and HMAC SHA-1 authentication functions carefully,
but cryptographers have been unable to find any security flaws similar to those
contained in the WEP encryption function.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Wireless Operator Interface Security
The SEL Security Application
C.9
The SEL Security Application
The SEL Security Application consists of an authentication and encryption scheme that
provides very strong data security. Authentication verifies message integrity (i.e., the
message has not been altered). Encryption conceals the contents of the message. The
combination of the two security techniques provides a state-of-the-art encryption and
authentication system with a key strength greater than 128 bits. Proof of the security
strength is detailed in the following sections.
HMAC SHA-1 Authentication Overview
The HMAC SHA-1 function provides protection against frame alteration and ensures
(with extremely high probability) that the digital integrity of every frame remains
intact. With a 128-bit-long authentication key, the HMAC SHA-1 function also
provides strong frame authentication capability that allows confirmation that an
authorized device transmitted the frame.
The National Institute of Standards and Technology (NIST) developed the SHA-1 oneway hash algorithm in 1993. NIST developed the Keyed-Hash Message Authentication
Code (HMAC) algorithm in 2002. The SEL-3022 uses the proven SHA-1 one-way
hash algorithm to form the NIST-approved HMAC SHA-1 keyed hash function.
The HMAC SHA-1 function takes a variable-length message and an authentication key
as input and generates a 160-bit-long, fixed-length hash output value. The hash output
is a condensed fingerprint or signature of the message input (see Figure C.2).
Authentication Key
Message
Digital Message
"Fingerprint"
HMAC
Function
Figure C.2 Operation of the HMAC SHA-1 Keyed
Hash Authentication Function
The 128-bit-long secret key gives the HMAC SHA-1 algorithm a strong built-in
authentication capability. If an attacker changes the contents of the message, then the
hash value appended to the message would not match the value that results from a
newly calculated hash value over the new, altered message. Because the HMAC SHA-1
function is keyed (i.e., uses a secret authentication key to form the hash output), an
attacker without knowledge of the authentication key value would be unable to
recalculate a new, valid hash value over the altered message appended to the new
message to hide the fact that the message has been altered.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.10
Wireless Operator Interface Security
The SEL Security Application
Cryptographic Manual—Do Not Copy
Preliminary Copy
To produce a cryptographically secure signature of a message, NIST designed the
SHA-1 hash function to have the following properties:
➤
Given the SHA-1 hash function, H(m), and its output, h, it is
extremely difficult to derive a message, m, such that H(m) = h.
➤
Given a message, m, it is extremely difficult to find another message,
m', that produces the same SHA-1 hash output.
The first condition states that the output of the SHA-1 hash function used in the HMAC
authentication function does not give away any clues about the form, or classes, of
messages that would likely produce the same hash value. The second condition, known
as collision-resistance, states that there is no bias in the mapping of inputs to outputs
that would aid an attacker in finding messages that produce identical SHA-1 hash
values. Both conditions make it functionally impossible (given all realistic resources)
to alter a message in such a way as to produce the same hash value. The HMAC
specification provides a cryptographically secure way to combine the secret
authentication key and the protected message into the SHA-1 hash function input to
produce a key-dependent message fingerprint.
AES Overview
The AES encryption function uses a 128-bit-long secret key and scrambles the contents
of each frame prior to transmission to provide cryptographically strong data
confidentiality.
Encryption is the process of transforming a digital message from its original form into
a form that an unauthorized individual cannot interpret. The output of the encryption
process is a function of the message and an encryption key (see Figure C.3).
Encryption Key
AES
Encrypt
Hi Bob!
Figure C.3
Decryption Key
*4gu>g
aIL8}2=h
AES
Decrypt
Hi Bob!
Operation of the AES Encryption Function
This encryption process must be completely reversible by an authorized individual
with access to the secret decryption key. Authority to read a message is only granted by
sharing knowledge of the secret decryption key. Ideally, only individuals with
knowledge of the decryption key can reverse the encryption operation and interpret the
protected message. There are two main classes of encryption functions. Symmetric key
encryption relies on the same secret key value, K, to perform both the encryption and
decryption transformations. Asymmetric key encryption, on the other hand, uses a
different key for encryption and decryption. For example, asymmetric encryption
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Wireless Operator Interface Security
The SEL Security Application
C.11
might use K1 for encryption and K2 for decryption. The AES encryption algorithm the
SEL-3022 uses is a symmetric block cipher, with an encryption/decryption key size of
128 bits.
The Advanced Encryption Standard (AES) is the latest encryption standard adopted by
the National Institute of Standards and Technology (NIST). In 1997, NIST challenged
the cryptographic community to develop the next generation encryption algorithm to
replace the aging DES and 3DES encryption standards. In 2000, NIST chose the
Rijndael encryption algorithm as the AES encryption standard. During the evaluation
of candidates for the AES standard, some of the best cryptanalysts in the world
analyzed and approved Rijndael. Since NIST adopted the standard in 2001, AES has
proven to be very effective against known attacks.
Combined HMAC SHA-1
and AES Encryption Security
Every frame transmitted over the SEL-3022 wireless operator interface is authenticated
with an HMAC SHA-1 keyed hash digest and encrypted with the AES encryption
algorithm (both algorithms are described in detail in the HMAC SHA-1 Authentication
Overview and AES Overview sections above). As shown in Figure C.4, the SEL-3022
first forms the HMAC SHA-1 hash output from the original frame data payload and the
128-bit authentication key. This keyed message fingerprint is then appended to the end
of the frame data payload, and the resulting composite message is encrypted by the
AES encryption function through use of a separate, 128-bit encryption key (the
authentication key and encryption key are completely independent).
Authentication Key
HMAC
Function
HMAC
Hash
Encryption Key
Final Encrypted and
Authenticated Frame
Message
Message
Figure C.4
HMAC
Hash
AES
Encryption
Message
HMAC
Hash
SEL-3022 Security Application Overview
Upon receipt of any frame on the wireless operator interface, the SEL-3022 uses the
programmed 128-bit secret encryption/decryption key to AES decrypt the entire frame.
The SEL-3022 then uses the programmed 128-bit authentication key to calculate the
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.12
Wireless Operator Interface Security
The SEL Security Application
Cryptographic Manual—Do Not Copy
Preliminary Copy
HMAC SHA-1 keyed hash value over the payload (message) portion of the received
frame. If the calculated HMAC SHA-1 hash output does not match the received
message fingerprint, the SEL-3022 rejects the message and terminates the session.
This arrangement protects the original frame data payload from malicious alteration,
authenticates the origin of the frame as a device with knowledge of both the encryption
and authentication keys, and protects the contents of the frame data payload from theft.
SEL Security Application Analysis
Cryptographic experts have analyzed the AES and HMAC SHA-1 cryptographic
functions. This analysis process began before NIST accepted each of the functions as
standards, and it will continue as long as these standards remain in use. To date, the
AES encryption and HMAC SHA-1 authentication algorithms have withstood all
public scrutiny in the sense that they provide the advertised level of security. In other
words, an AES encryption function with a 128-bit key will, by all analysis to date,
provide data confidentiality at a cryptographic strength of 128 bits (the discussion in
the following text addresses this concept). Cryptographically sound hash functions,
such as SHA-1, are expected to provide message integrity functionality at a strength
equal to half the size of the hash output. Because SHA-1 has a hash output length of
160 bits, it should produce message integrity functionality at a cryptographic strength
of 80 bits. To date, SHA-1 has maintained the expected cryptographic strength. Finally,
the HMAC function has also withstood all cryptographic analysis, in the sense that it
has proven to be an effective and secure method of mixing a secret authentication key
into the SHA-1 hash output. We will analyze the implications of these statements in the
following text.
As stated previously, the AES encryption function has, thus far, provided data
confidentiality at a cryptographic strength equal to the size of the encryption key. To
successfully guess a 128-bit key, such as the key the SEL-3022 uses, an attacker would
have to try an average of 2127 = 1.7 • 1038 keys before finding the correct value
(assuming that all key values are equally likely). This is a staggering number of
potential key values! If an attacker could test one million potential keys per second, it
would take more than 5.39 • 1024 years, on average, to guess the correct key value
(note that the universe is estimated to be only 1013 years old)! In reality, the time that it
would take to launch an effective key guessing attack against the SEL-3022 would be
even longer, because the wireless interface on the SEL-3022 times out briefly when an
authentication failure occurs. Because of the wireless interface timeout, the maximum
rate of a key guessing attack against the SEL-3022 is much less than one million keys
per second.
Because the SEL Security Application AES encrypts the HMAC-keyed authentication
digest in every frame, both the AES encryption key and the HMAC SHA-1
authentication key must be compromised simultaneously to send data to the SEL-3022.
For such a situation, an attacker would have to guess two independent 128-bit key
values, which is the same as guessing a single, 256-bit key. To guess a key of this size,
an attacker would, on average, have to make 2255 = 5.79 • 1076 key guessing attempts.
If an attacker could test one million potential keys per second, it would take more than
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Wireless Operator Interface Security
The SEL Security Application
C.13
1.83 • 1063 years, on average, to guess both the authentication key and the encryption
key values. The analysis just described suggests that it is statistically impossible to
launch a key guessing attack against the SEL-3022 device that would result in
compromise of the system.
Even if someone were to steal a maintenance PC with the wireless interface encryption
and authentication keys programmed and saved on the PC hard drive, an attacker would
have to crack the SEL-3022 connection password to use the stolen computer to
successfully authenticate with the SEL-3022. To launch a password guessing attack, an
attacker would have to repeatedly send an initial session request frame and enter the
password guess into the SEL-5809 Settings Software dialog box.
If the entered password value is incorrect, the SEL-3022 terminates the session
authentication dialog after receiving Frame 3 of the authentication dialog (see
Figure C.5 on page C.15 and the discussion Connection Authentication and Session
Replay Protection on page C.14). If the authentication dialog fails at any point, the
SEL-3022 performs a timeout of the wireless operator interface and refuses any session
connection requests for five seconds. This limits the rate of a password guessing attack
to one guess per five seconds.
The SEL-3022 accepts password entries between 6 and 80 characters in length. These
passwords can contain all 96 printable ASCII characters (including the Space
character). If we assume that the security officer has programmed strong passwords
into the SEL-3022, an attacker would not be able to use a typical password guessing
attack dictionary to limit the number of required password guesses. In this case, all
possible password values would be equally likely and the attacker would have to
launch a brute-force password guessing attack by sending all possible password values
to the SEL-3022, one at a time. Table C.1 shows the number of potential password
values (i.e., the maximum number of guesses that an attacker will have to make) and
the average number of years required to launch a successful brute-force password
guessing attack on the SEL-3022 as a function of the length of your programmed
password value. The value representing the average number of years required to
successfully guess the SEL-3022 connection password was derived under the
assumption that all potential password values are equally probable (i.e., you do not
program a password value that is likely to be in an attack dictionary). Such strong
passwords do not form a word, slang term, or other meaningful value. A strong
password also contains a mixture of alphanumeric characters (numbers and uppercase
and lowercase letters) and non-alphanumeric characters (punctuation characters,
backslash, space, etc.).
Table C.1
Number of Years Required to Guess an SEL-3022 Password
Password
Length
Number of Possible
Password Values
Average Number of Years Required to
Guess the Password (Assuming Strong
Password Choice)
7.91 • 1011
6.27 • 104
7.59 • 1013
6.02 • 106
7.29 • 1015
5.78 • 108
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.14
Wireless Operator Interface Security
The SEL Security Application
Table C.1
Cryptographic Manual—Do Not Copy
Preliminary Copy
Number of Years Required to Guess an SEL-3022 Password
Average Number of Years Required to
Guess the Password (Assuming Strong
Password Choice)
Password
Length
Number of Possible
Password Values
...
...
...
80
3.86 • 10158
3.06 • 10151
Even with a strong, six-character password, an attacker could expect to spend more
than 60,000 years trying to launch a successful brute-force password-guessing attack
on the SEL-3022. Such a brute-force password guessing attack is statistically
impossible because of the potential strength of the SEL-3022 connection passwords
(very long password length with the password consisting of a very large number of
possible characters), and password-guessing rate limit that the five-second wireless
port timeout imposes on all connection authentication failures.
Connection Authentication
and Session Replay Protection
SEL-3022 Wireless Port Status
Prior to Security Parameter Initialization
The SEL-3022 uses two access levels for monitoring and configuration. Each access
level has the following security parameters: 128-bit encryption key, 128-bit
authentication key, and a password containing as many as 80 characters. Also included
in the security parameters are the 104-bit WEP keys. From the factory, cryptographic
security parameters are zeroized. At power up, the SEL-3022 determines if the
cryptographic security parameters are set to trivial (zero) values. If these parameters
are set to trivial values, the 802.11b wireless port is disabled. If the SEL-3022 is
initialized with zeroized values, or if any of these initial security parameters are left at
a zeroized value, the device will not leave the initialization mode, and the wireless port
will remain disabled. Following entry of non-zeroized security parameters, the
SEL-3022 enables the wireless module and enables both WEP and the SEL Security
Application. This ensures that data are never transmitted via the 802.11b interface with
default/trivial encryption keys.
SEL-3022 Security Parameters and Passwords
The SEL-5809 Settings Software is necessary to initiate a wireless session. The
SEL-5809 Settings Software must be programmed with identical encryption and
authentication security parameters as the SEL-3022 to which it will be connected.
Furthermore, you must enter into the SEL-5809, when prompted, the same password
stored in the SEL-3022. Note that neither a PC nor a PDA stores this password; the
user must enter this password from memory. Because the PC does not store password
values, no one can use just a PC or PDA to connect successfully with the SEL-3022
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Wireless Operator Interface Security
The SEL Security Application
C.15
without direct knowledge of the correct password value. This remains true even if
someone attempts a connection through use of a stolen PC with the correct wireless
authentication and encryption keys programmed into the device image.
SEL-3022/SEL-5809 Wireless Interface Session
Authentication Dialog
To begin a wireless operator interface session, the PC or PDA must authenticate with
the SEL-3022 to prove that it has been programmed with the exact values of the
expected authentication key and encryption key, and that you entered the correct
password. Figure C.5 provides an overview of the session authentication dialog
between a maintenance PC with the SEL-5809 Settings Software installed and an
SEL-3022 device. Each frame of this five-frame dialog is protected by the encryption
and authentication methods described previously. Because of these protection methods,
the data in each frame are secured by strong AES encryption and the SEL-5809
Settings Software, and the SEL-3022 can verify that an authorized device (i.e., a device
with direct knowledge of the encryption key and authentication key values) sent every
frame.
Maintenance PC With
SEL-5809 Settings Software
and Wireless Access Keys
SEL-3022
(1) Initial Sess
ion Request
llenge
(2) First Cha
(3) First Chal
lenge Respon
se With Pass
word
llenge
cond Cha
sport and Se
(4) Key Tran
(5) Key ACK an
d Second Ch
allenge Resp
onse
Figure C.5
Wireless Interface Session Authentication Dialog
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.16
Wireless Operator Interface Security
The SEL Security Application
Cryptographic Manual—Do Not Copy
Preliminary Copy
The connection dialog begins with a connection request frame (Frame 1 in Figure C.5)
that is encrypted and authenticated with encryption and authentication keys
programmed into the SEL-5809 Settings Software device image. Upon receiving the
connection request, the SEL-3022 decrypts and authenticates the frame. If the
authentication fails, indicating that the session request came from other than an
authorized user (i.e., a PC programmed with the appropriate AES encryption and
HMAC SHA-1 authentication keys), the SEL-3022 ignores the session request and
remains silent. Note that the initial connection frame must be directed at the correct
User Datagram Protocol (UDP) port on the wireless TCP/IP interface of the SEL-3022
transceiver. Because the UDP protocol does not require a connection handshake, as
does TCP protocol, the SEL-3022 only transmits a TCP/IP frame in response to a fully
authenticated connection request frame. This feature ensures that the SEL-3022 is
immune to traditional port mapping and network reconnaissance techniques such as
ping sweeps, TCP SYN scans, or TCP FIN scans.
If the initial connection request frame passes the authentication process, the SEL-3022
generates a large, random challenge value and transmits it to the PC (Frame 2 in
Figure C.5). Upon receipt of the First Challenge frame, the PC must insert the received
challenge value into a new encrypted and authenticated frame and transmit it to the
SEL-3022 (Frame 3 in Figure C.5). In addition, this First Challenge frame contains the
password information you entered in the SEL-5809 Settings Software session
connection dialog box. When the SEL-3022 receives this frame, it decrypts and
authenticates it. If the authentication fails, again indicating that the session request
came from an unauthorized user, the SEL-3022 terminates the session and resets the
session connection dialog. If the frame passes authentication, the SEL-3022 compares
the transmitted password information with the password value stored in the SEL-3022
settings. It is important to note that if the transmitted password information indicates
that the user entered the wrong password, or if the decrypted challenge value does not
match the challenge value transmitted in Frame 2 of the connection dialog, the
SEL-3022 again terminates the session and resets the connection dialog.
➤
The password you entered in the SEL-5809 Settings Software must
match the password value stored in the SEL-3022 device, or the
session connection will fail. This guarantees that a stolen
maintenance PC programmed with the correct encryption and
authentication keys cannot be used to connect to the SEL-3022
without the user having direct knowledge of the programmed
password value stored in the SEL-3022 (the SEL-5809 Settings
Software never stores the password value on the PC hard drive).
➤
The large, random challenge value that the SEL-3022 formed and
transmitted in Frame 2 of the connection dialog is, with very high
probability, different for every wireless session. Because of this large,
random value, a malicious individual cannot capture a previous
session dialog and use the captured packets to reconnect to the
SEL-3022 (known as a session replay attack). If someone attempted
such an attack, the challenge value transmitted in the First Challenge
Response With Password frame (Frame 3 in Figure C.5) would not
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Wireless Operator Interface Security
The SEL Security Application
C.17
match the challenge value the SEL-3022 issued in the First Challenge
frame (Frame 2 in Figure C.5), and the SEL-3022 would terminate
the connection attempt.
If the connection dialog succeeds up to this point (i.e., passes all authentication
mechanisms and session replay protection mechanisms described previously), the
SEL-3022 generates another random challenge value, a random session encryption key,
and a random session authentication key and transmits these values in Frame 4 of the
session connection dialog. The SEL-3022 uses these session keys, protected from
interception by SEL Security Application cryptographic mechanisms, described in the
previous sections, to encrypt and authenticate all configuration frames transmitted
between the PC and the SEL-3022 after the five-frame session authentication dialog
succeeds.
Upon receiving the Key Transport and Second Challenge frame, the PC must insert the
transmitted second challenge value into the final frame of the session connection dialog
(Frame 5 in Figure C.5) and transmit the frame to the SEL-3022. To complete the
session authentication dialog successfully, the decrypted and authenticated challenge
value the SEL-3022 received in Frame 5 must match the value the SEL-3022 transmits
in Frame 4. This requirement for matching values forms a second, independent layer of
protection against session replay attacks.
If the final frame authenticates correctly and the second challenge values match, the
SEL-3022 opens a wireless operator interface connection with the PC. All
configuration frames transmitted between the two devices after successful completion
of the session authentication dialog previously described will be encrypted and
authenticated through use of the session encryption and authentication keys exchanged
in the dialog.
The SEL-3022 connection authentication provides strong security against a number of
potential threats. We summarize the security features of this connection authentication
dialog as follows:
➤
There are two, independent challenge/response exchanges to prevent
session replay attacks.
➤
There is strong protection against threats posed by maintenance PC
theft. The user must enter from memory, the correct connection
password to successfully authenticate to the SEL-3022 (the
connection password is never stored on the maintenance PC).
➤
Unique session encryption and session authentication key exchanges
limit the number of frames protected by the programmed operator
and security officer role encryption and authentication keys. This
makes the SEL-3022 more resilient to cryptanalytic attacks.
Frame Replay Protection
Every frame in a given wireless operator interface session contains a sequence number
field. The value in this field increments every time a frame is transmitted over the
interface. The SEL-3022 will not accept any frame that contains a sequence number
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
C.18
Wireless Operator Interface Security
The SEL Security Application
Cryptographic Manual—Do Not Copy
Preliminary Copy
value that is less than, or equal to, the sequence number value received in the last
frame. It is exceedingly difficult to maliciously alter the sequence number in any given
frame to bypass this functionality because the sequence number field is protected by
the strong cryptographic authentication mechanisms provided by the HMAC SHA-1
function. Because of the protection these mechanisms provide, an attacker cannot
capture a frame, previously transmitted in a given wireless operator interface session,
and resend the frame to the SEL-3022 to cause harmful actions.
Conclusions
Two independent layers of cryptographic security protect the SEL-3022 wireless
operator interface: the 802.11b wireless interface module WEP encryption function,
and the AES encryption and HMAC SHA-1 authentication functions in the SEL
Security Application. For an attacker to compromise the SEL-3022 operator interface,
both the WEP encryption and the SEL Security Application have to be defeated. As
shown in the discussion above, the probability of an attacker accomplishing this is
statistically impossible.
Additional Protection for Windows XP Users
IMPORTANT: Windows XP users can further protect their
computer during setup by enabling a firewall on their
wireless connection. This firewall protects your computer
from unauthorized users who might try an ad hoc
connection. This will not impact your ability to configure
the SEL-3022.
Follow these steps to enable a firewall on Windows XP Wireless Connection.
Step 1.
Click on the Start menu, select Settings, then Network
Connections, and then Wireless Connection.
Step 2.
Click on the Wireless connection you used to communicate with the
SEL-3022 (example: Wireless Connection 2).
Step 3.
Click on Properties, then the Advanced tab.
Step 4.
Click on the box beside Protect my computer and network by
limiting or preventing access to this computer from the Internet.
Step 5.
Click OK.
SEL-3022 Transceiver
Instruction Manual
Date Code 20050615
Cryptographic Manual—Do Not Copy
Preliminary Copy
Appendix D
Certificates
ISO
The device is designed and manufactured through use of an ISO 9001 certified quality
program.
Listings
IEC 60950-1: 1st Ed./CSA C22.2 No. 60950-1/EN 60950-1
FCC
15.247
IC
ICES-001
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
Preliminary Copy
This page intentionally left blank
Cryptographic Manual—Do Not Copy
Preliminary Copy
Glossary
AES
Advanced Encryption Standard - sponsored by NIST, AES was developed for securing
sensitive but unclassified material by U.S. Government agencies. AES is a symmetric
encryption algorithm (same key for encryption and decryption) that uses block encryption.
FIPS 140-2
Federal Information Processing Standards 140-2 specifies the security requirements
satisfied by a cryptographic module in use within a security system that protects sensitive but unclassified information. The standard provides four increasing, qualitative
levels of security. The security requirements cover areas related to the secure design
and implementation of a cryptographic module.
IED
Intelligent Electronic Device. An IED, as defined in this document, is a device capable
of receiving information and sending appropriate responses. Examples of IEDs are
remote terminal units, programmable logic controllers, communication processors,
relays, meters, etc.
NIST
National Institute of Standards and Technology, a unit of the U.S. Commerce Department.
WEP
Wired Equivalent Privacy is a security protocol specified in the IEEE Wireless Fidelity
(Wi-Fi) standard 802.11b. WEP is designed to provide a wireless local area network
(LAN) with a level of security and privacy comparable to that associated with a wired
LAN.
Date Code 20050615
Instruction Manual
SEL-3022 Transceiver
Preliminary Copy
This page intentionally left blank
Preliminary Copy
Preliminary Copy
Solutions
Systems, Services, and Products
for the Protection, Monitoring, Control,
Automation, and Metering of Utility
and Industrial Electric Power
Systems Worldwide.
Attention
The SEL-3022 is a cryptographic device. Limit access to the
SEL-3022, SEL-5809 Settings Software, SEL-5810 Virtual
Serial Software, and SEL-3022 Instruction Manual to authorized
personnel only. Do not copy these items. Securely store these
items when not in use. Destroy these items when no longer
needed.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Page Count                      : 106
Page Mode                       : UseOutlines
XMP Toolkit                     : XMP toolkit 2.9.1-14, framework 1.6
About                           : uuid:bbe45571-0e5d-418b-ab69-283ca84791a8
Producer                        : Acrobat Distiller 6.0.1 (Windows)
Creator Tool                    : FrameMaker 6.0
Modify Date                     : 2005:06:20 09:28:00-07:00
Create Date                     : 2005:06:15 07:37:17Z
Metadata Date                   : 2005:06:20 09:28:00-07:00
Document ID                     : uuid:b52d7975-0db2-4177-a0b7-6fe47ef4a8fd
Format                          : application/pdf
Title                           : 3022.book
Creator                         : heatkn
Author                          : heatkn
EXIF Metadata provided by EXIF.tools
FCC ID Filing: R34SEL3X22

Navigation menu