sel-3620 ethernet security gateway · 2017-02-10 · sel-421 sel-3620 sel-351 sel-2411 sel-734...

16
Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet Major Features and Benefits The SEL-3620 is a router, virtual private network (VPN) endpoint, and firewall device that can perform secu- rity proxy services for serial and Ethernet-based intelligent electronic devices (IEDs). The SEL-3620 helps create a user audit trail through strong, centralized, user-based authentication and authorization to modern and legacy IEDs. The SEL-3620 secures your control system communications with a stateful deny-by-default firewall, strong cryptographic protocols, and logs for system awareness. The SEL-3620 also manages pro- tected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules for stronger security. The integrated security proxy also provides user-based single sign-on access to Ethernet and serial devices. Secure Architecture and Malware Protection. Maximize reliability with integrated exe-GUARD ® whitelist antivirus and other malware protections, eliminating costly patch management and signature updates. Centralized User-Based Access to Protected IEDs. Provide strong, centralized access control and user accountability to all protected devices with Lightweight Directory Access Protocol (LDAP) or Remote Authentication Dial-In User Service (RADIUS). Simplify compliance with accurate logging. Automated Management of IED Passwords. Migrate away from shared passwords and accounts with the SEL-3620 acting as a password manager for protected devices. Security Proxy Services. Connect securely with identity based access controls to command line inter- faces. Detailed Connection Reports. Receive detailed connection reports that make user activity audits a snap. Secure Ethernet Communications. Use Internet Protocol Security (IPsec), Secure Shell (SSH), and Transport Layer Security (TLS) to provide confidential communications and maintain message integ- rity among devices. Stateful Deny-by-Default Firewall. Prevent unauthorized traffic from entering or exiting your private network. Log all successful or blocked connections to the firewall, and receive alerts indicating the presence of unauthorized network communication attempts. Syslog. Log events for speedy alerts, consistency, compatibility, and centralized collection. For slow commu- nications links, the SEL-3620 can throttle the number of outgoing syslog messages. Integrated Port Switch. Map one or more of the serial ports to any other serial ports, or to Ethernet TCP or UDP connections. Modbus Protocol Conversion. Convert Modbus TCP to Modbus RTU and Modbus RTU to Modbus TCP. Script Engine. Perform any sequence of command-driven tasks with a single push of a button, and restrict users to specific scripted tasks. SEL-3620 Ethernet Security Gateway

Upload: others

Post on 07-Apr-2020

85 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

Major Features and BenefitsThe SEL-3620 is a router, virtual private network (VPN) endpoint, and firewall device that can perform secu-rity proxy services for serial and Ethernet-based intelligent electronic devices (IEDs). The SEL-3620 helpscreate a user audit trail through strong, centralized, user-based authentication and authorization to modern andlegacy IEDs. The SEL-3620 secures your control system communications with a stateful deny-by-defaultfirewall, strong cryptographic protocols, and logs for system awareness. The SEL-3620 also manages pro-tected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules forstronger security. The integrated security proxy also provides user-based single sign-on access to Ethernet andserial devices.

➤ Secure Architecture and Malware Protection. Maximize reliability with integrated exe-GUARD®

whitelist antivirus and other malware protections, eliminating costly patch management and signatureupdates.

➤ Centralized User-Based Access to Protected IEDs. Provide strong, centralized access control anduser accountability to all protected devices with Lightweight Directory Access Protocol (LDAP) orRemote Authentication Dial-In User Service (RADIUS). Simplify compliance with accurate logging.

➤ Automated Management of IED Passwords. Migrate away from shared passwords and accountswith the SEL-3620 acting as a password manager for protected devices.

➤ Security Proxy Services. Connect securely with identity based access controls to command line inter-faces.

➤ Detailed Connection Reports. Receive detailed connection reports that make user activity audits asnap.

➤ Secure Ethernet Communications. Use Internet Protocol Security (IPsec), Secure Shell (SSH), andTransport Layer Security (TLS) to provide confidential communications and maintain message integ-rity among devices.

➤ Stateful Deny-by-Default Firewall. Prevent unauthorized traffic from entering or exiting your privatenetwork. Log all successful or blocked connections to the firewall, and receive alerts indicating thepresence of unauthorized network communication attempts.

➤ Syslog. Log events for speedy alerts, consistency, compatibility, and centralized collection. For slow commu-nications links, the SEL-3620 can throttle the number of outgoing syslog messages.

➤ Integrated Port Switch. Map one or more of the serial ports to any other serial ports, or to EthernetTCP or UDP connections.

➤ Modbus Protocol Conversion. Convert Modbus TCP to Modbus RTU and Modbus RTU to ModbusTCP.

➤ Script Engine. Perform any sequence of command-driven tasks with a single push of a button, andrestrict users to specific scripted tasks.

SEL-3620 Ethernet Security Gateway

Page 2: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

2

➤ X.509 Certificates. Ensure strong authentication with third party validation of incoming connectionrequests over the IPsec VPN, Active Directory connection, or Web management interface.

➤ Online Certificate Status Protocol. Use OCSP to verify validity of X.509 certificates.

➤ Time Synchronization. Synchronize events and user activity across your system with IRIG or NTP.

➤ Virtual Local Area Networks (VLANs). Segregate traffic and improve network organization and per-formance.

➤ Ease of Use. Simplify configuration and maintenance with a secure web interface that allows for con-venient setup and management.

➤ Reliability. Rely on the SEL-3620, built for availability, hardened for the substation, and backed by a10-year warranty.

➤ Ethernet Port Bridge. Support a reliable Ethernet ring topology.

➤ Encrypted Terminal Communications. Securely communicate with IEDs via Secure Shell (SSH)-encrypted terminal programs.

➤ 5 V Pin One Power on Serial Ports. Directly power 5 V devices from the serial ports.

➤ Bit-Based Conversion. Transform Conitel and other bit-based protocols to Ethernet and reduce reli-ance on expensive analog circuits.

➤ Service Port. Automate base-lining of the device settings with a basic command-line interface.

Product Overview

The SEL-3620 is a router, VPN endpoint, and firewalldevice that can perform security proxy services to serialand Ethernet-based IEDs. The SEL-3620 is an accesscontrol solution for control systems environments withboth Ethernet and serial communications. The SEL-3620filters all incoming and outgoing traffic with a deny-by-default stateful firewall that only allows authorizedtraffic. IPsec VPNs protect all site-to-sitecommunications.

Figure 1 Site-to-Site Virtual Private Network

The authentication proxy technology integrated in theSEL-3620 provides single sign-on engineering access toprotected IEDs. The strong authentication in theSEL-3620 includes centralized user-based credentialsand verification of the source of user communications.Thorough logging of all user activities on protecteddevices provides simple audit reports from which youcan know who did what when.

Figure 2 Protected Engineering Access

An integrated stateful, deny-by-default firewall preventsunauthorized communications from entering or exitingthe protected network. The SEL-3620 filters incomingand outgoing TCP, UDP, ICMP, AH, and ESP communi-cations based on a user-configurable set of rules.

Figure 3 Deny-by-Default Firewall

SEL-3620 SEL-3620Internet

TrustedNetwork

TrustedNetwork

SEL-321

SEL-3620

SEL-3620

Authorized Traffic

Malicious Traffic

TrustedNetwork

Page 3: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

3

User-based accounts increase log granularity and makepassword management easy and effective. The SEL-3620includes support for centralized authentication andauthorization to simplify management of user accounts,passwords, and user privileges for all your protecteddevices from an active directory server.

Figure 4 Centralized User Management

The port switch integrated in the SEL-3620 allows usersto create mappings for serial-to-serial, serial-to-Ethernet,Ethernet-to-serial, and Ethernet-to-Ethernet communica-tions. Through use of these mappings you can use suchdifferent modes of communications as one-to-one, one-to-many, and many-to-many.

The SEL-3620 formats, stores, and forwards logs accord-ing to the syslog specification to enable quick notifica-tion, central collection, and interoperable reporting of

security events. IRIG-B and NTP synchronizes theseevents. The SEL-3620 records user activity on IEDs toprovide you with auditable tracking of user activitywithin your system.

Authentication for the web management interface, VPNpeers, and directory servers relies on X.509 certificates.The Online Certificate Status Protocol (OCSP) verifiesthe legitimacy of any certificates the SEL-3620 receives.

The SEL-3620 streamlines user-configurable options anduses an HTTPS web interface for a simplified userexperience. SEL ACSELERATOR QuickSet® SEL-5030Software with connection directory software providesconfiguration of the proxy services. A command lineinterface on the integrated SSH server provides access toprotected IEDs.

The SEL-3620 exe-GUARD feature provides whitelistarchitected antivirus and other malware protections,including a secure kernel that prevents unauthorizedaccess or modification of system data and monitorscritical system services to detect unexpected activitycaused by unauthorized modifications to the deviceprogram.

The SEL-3620 is built for installations that require highlevels of availability. The device contains no movingparts, operates over a wide temperature range from -40°Cto +85°C, and uses a flash-based hard drive formaximum durability.

Applications

The SEL-3620 is ideally suited for electronic accesspoint routing, message encryption, packet authentication,and user authentication. The authorization and serialcapabilities of the SEL-3620 provide a strong solutionfor user-based access to legacy IEDs that have shareduser accounts.

Routing and MasqueradingThe SEL-3620 forwards communications amongseparate Ethernet networks. Any device that has accessto the SEL-3620 can use it to forward Ethernet packets toa destination on a different network.

The SEL-3620 supports Network Address Translation(NAT) for a wide variety of dynamic networkapplications. Port forwarding enables the use of similarremote address space without re-architecting IP subnets,and outbound NAT supports internet access for thoseapplications that require it.

Secure Communications Over Untrusted NetworksThe SEL-3620 secures all communication byestablishing IPsec VPN tunnels with other SEL-3620gateways and IPsec-enabled devices.

SEL-3620

+

+

?!

Page 4: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

4

Figure 5 SEL-3620 Encrypts Communications

Point-to-Point Serial Over Ether-net NetworkFigure 6 shows the SEL-3620 in a point-to-pointapplication in which bit- and byte-based serial devicescan communicate with each other across an Ethernetnetwork. The SEL-3620 supports IPsec and SSH forencrypted and authenticated communications. Thisprovides an easy transition from existing costly analogserial lines to Ethernet transport networks without havingto upgrade remote terminal units (RTU) orcommunication front ends (CFE).

Figure 6 SEL-3620 Protects Serial Over Ethernet

User-Based Access to IEDsThe authentication proxy feature in the SEL-3620provides user-based access to serial and Ethernet deviceswithin the secured network. The SEL-3620 records andlogs all user activity, to provide an audit trail and useraccountability.

Figure 7 SEL-3620 Authenticates Users

Ethernet to Serial ConversionsGain Ethernet-based access to your serial devicesthrough the SEL-3620. The SEL-3620 performs both bit-and byte-based serial-to-Ethernet media conversions forTelnet, SSH, Raw TCP, and UDP protocols.

Figure 8 SEL-3620 Converts Serial to Ethernet

Password ManagementThe SEL-3620 is uniquely designed to manage thepasswords of all your protected IEDs. The single sign-oncapabilities of the authentication proxy require that theSEL-3620 be aware of the passwords of all protected

SEL-3620

Control Center

Corporate Office

SEL-3620Substation

SEL-2411

SEL-421

SEL-3620 SEL-3620

SEL-3373

SEL-3530

SEL-351 SEL-734

SEL-3620

SEL-2411

SEL-351

SEL-421

SEL-3620

SEL-351

SEL-2411

SEL-734

SEL-351

SEL-3555

Page 5: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

5

IEDs. The combination of the script engine with thispassword knowledge gives the SEL-3620 the ability tomanage your passwords, enforce strong passwords, andprovide audit reports of password changes.

Figure 9 SEL-3620 Manages Passwords

Time DistributionSynchronize all your devices with the SEL-3620,regardless of whether these devices understand NTP orIRIG. The SEL-3620 synchronizes to and sources bothIRIG-B and NTP.

Figure 10 SEL-3620 Distributes Time

Functional DescriptionCryptographic Message ProtectionIPsec VPN initiation requires that three tasks beperformed: the two peers must authenticate each other,the IKE security associations (SAs) must be established,and the IPsec SAs must be established. Uponestablishment of the IPsec SAs, the SEL-3620 transmitsall messages that route through this “tunnel” within anEncapsulating Security Payload. The SEL-3620performs all of these steps when it connects to any peerIPsec-enabled device.

Security associations are shared pieces of informationthat we can use to secure communications channels. AnSA includes the encryption and authenticationalgorithms the channel uses along with their respectivekeys. An Internet Key Exchange (IKE) SA defines thesecure channel on which IPsec SA negotiation takesplace. An IPsec SA defines the communicationsparameters that will be in use for communication acrossa VPN. The SEL-3620 contains preconfigured settings in“Profiles” to simplify connecting to non-SEL devices.

Figure 11 VPN Establishment

Encryption ensures that communications are confidentialand only readable by authorized parties. The SEL-3620uses the IPsec Encapsulating Security Protocol to protectthe entire original packet, including both the header and

the payload. This prevents the possibility of informationleakage about the structure of your protected networks.The hardware-accelerated encryption algorithms theSEL-3620 supports are AES, 3DES, and Blowfish.

Figure 12 Cryptographic Message Protection

SEL-351

SEL-2411

Password Change Report

03/9/2011

SEL-351:

SEL-2411:

ACC: F*XhG0X):02AC:$ktn>H3Hf1

ACC: Buhy&32k6Q2AC: kO0%v03{sP

SEL-3620

SEL-3555

SEL-351

SEL-2407

SEL-3620

SEL-3620 SEL-3620

1. Authenticate Peers2. Establish IKE SA3. Establish IPsec SA

4. Encrypt Messages

SEL-3620 T#5sk V@37h”Hello World!

Page 6: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

6

Device AuthenticationThe SEL-3620 can use either X.509 certificates or pre-shared keys for authentication of another party over anetwork. The X.509 certificate confirms that the party atthe opposite end of the tunnel is an entity with whom theSEL-3620 has approval to communicate. The SEL-3620accepts both self-signed X.509 certificates and X.509certificates that have been signed by a CertificateAuthority (CA).

The SEL-3620 uses OCSP to check the status of X.509certificates. When the SEL-3620 receives a connectionrequest along with a certificate signed by a CA, it willpoll an OCSP server to verify that the certificate is good.There are three possible responses the OCSP server cansupply: good, revoked, and unknown. If the SEL-3620receives a response other than good, it will deny theconnection request.

Centralized User-Based Access ControlThe security proxy services in the SEL-3620 provideuser-based access to protected serial and Ethernet IEDs.Figure 13 illustrates this process. A user needing toaccess a protected IED will first access the SEL-3620.The SEL-3620 will then prompt for the user's usernameand password. The SEL-3620 will verify the providedcredentials with a centralized server and obtain the user'spermissions. These permissions then determine whichdevices and access levels the user has authorization toaccess. The SEL-3620 connects to the IED which theuser wants to access, and joins the sessions with the userand the IED.

Figure 13 Central User Authentication

Maintaining logs of user activity is very important forauditing purposes. The SEL-3620 monitors all useractivity and logs each session to a locally stored file. Atthe same time, the SEL-3620 generates syslog messages,

indicating the start of a session and the end of a session,to alert that activity has taken place. Users withappropriate privileges can export the user log files forlater examination as necessary.

Authenticated, authorized, and recorded session

Connect to IED

Connect to communications processor

Request IED access

Successful

authentication

Credentials verified

and authorization

Verify credentials

Provide credentials

Request credentials

Provide access

Substation Engineering Access

SecurityGateway

DomainController

CommunicationsProcessor IED

Page 7: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

7

Multiple Access MethodsUsers have multiple methods of accessing IEDs toprovide flexibility for various types of software. SSH andTelnet provide a command line interface to protecteddevices through the SEL-3620. You can also mapspecific TCP and UDP ports to physical serial ports.

SyslogThe SEL-3620 uses the syslog format to log events.These logs contain several fields that indicate eventseverity, event origin, the type of event that occurred, anddetails regarding the cause of the event. Additionally, theevent message contains such event tracking informationas the entity that triggered the event and the time anddate of the event. The SEL-3620 maintains an internalrecord of as many as 60,000 event logs in nonvolatilememory, and it generates, stores, and forwards syslogmessages to multiple destinations.

SNMPSimple Network Management Protocol (SNMP) supporton the SEL-3620 allows administrators to query somestate information from the device, as well as to receivenotifications (traps) for events that indicate a deviceintegrity fault, such as SELinux audit messages, andwhitelist integrity failures. The Management InformationBase (MIB) provides information about data and trapsavailable via SNMP. The MIB can be downloaded as azip file from the SEL-3620 from the SNMP Settingspage on the web management interface.

FirewallTo protect your private network from malicious traffic,the stateful firewall in the SEL-3620 denies all traffic bydefault. Explicitly identifying traffic that the SEL-3620permits makes it far less likely that the SEL-3620 willoverlook specific types of traffic.

Secure ManagementConfiguration of the SEL-3620 occurs through a secureweb management interface that uses HTTPSincorporating transport layer security (TLS). Mutualauthentication takes place before a secure webmanagement session opens. The device uses an X.509server-side certificate to authenticate to the user, and theuser uses a username and password to authenticate to thedevice. The SEL-3620 then restricts users to actions forwhich they have authorization through their accountassignments. There are two roles: administrator andtechnician. The technician may perform any task on theSEL-3620 except create or edit user accounts, modifydate/time settings, or reset, halt, or reboot the device.Administrators may perform any action on theSEL-3620, including creating and editing all accounts onthe box.

Web management provides simple-to-use graphicconfiguration pages that display the gatewayconfiguration through network diagrams. You can usethis to confirm that all configurations are as you intend.The web interface supplies you a single place fromwhich you can retrieve all communications channelinformation and network diagrams associated with theSEL-3620. The device also features a basic command-line interface Service Port that allows for the automationof configuration base-lining. The Service Port is read-only and requires administrative credentials to access.

Page 8: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

8

Figure 14 Web Management Dashboard

Mechanical Diagrams and Dimensions

Figure 15 Front-Panel Diagrams

i4468e

USB BUSB AETH F

TX

RX

21

1716151413121110987654321

LAMPTEST

ENABLED

ALARM

LNK

RX

TX

SEL-3620 ETHERNET SECURITY GATEWAY

i4467f

USB BUSB AETH F

TX

RX

21

1716151413121110987654321

LAMPTEST

ENABLED

ALARM

LNK

RX

TX

SEL-3620 ETHERNET SECURITY GATEWAY

Rack Mount

Panel Mount

Page 9: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

9

Figure 16 Rear-Panel Diagrams

Figure 17 SEL-3620 Dimensions

Copper Ethernet

Fiber Ethernet

i4731c

INIRIG–B

ETH 1 ETH 2

COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4

COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12

OUT

190

-29

97-

01

—+ SH

IEL

D

–TX

+T

X

+R

X

–RX

COM 17IRIG-BOUT

GNDA09

POWERIN101 OUT101

+ —

i4732c

INIRIG–B

ETH 1 ETH 2

COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4

COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12

OUT

190

-29

97-

01

—+ SH

IEL

D

–TX

+T

X

+R

X

–RX

COM 17IRIG-BOUT

GNDA09

POWERIN101 OUT101

+ —

i4985a

INIRIG–B

ETH 1 ETH 2

COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4

COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12

OUT

190

-29

97-

01

—+ SH

IEL

D

–TX

+T

X

+R

X

–RX

COM 17IRIG-BOUT

GNDA09

POWERIN101 OUT101

+ —

Mixed Ethernet

Page 10: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

10

Specifications

Compliance

Designed and manufactured under an ISO 9001 certified quality management system

CE Mark

Networking

Web Management

Protection Protocols: HTTPS, TLS

Authentication: X.509 and Username/Password

Encryption Key Strength: 128-bit, 256-bit

Virtual Private Networks

Maximum Throughput: 87 Mbps

Maximum Concurrent Sessions: 16

Protection Protocols: IPsec

Key Exchange: IKEv1, IKEv2

Authentication: Passphrase, X.509, OCSP

Accelerated Encryption Algorithms: AES

Nonaccelerated Encryption Algorithms: 3DES, Blowfish

Encryption Key Strength: 128-bit, 256-bit

Routing Functions

Static Routing

Network Address Translation: Port Forwarding (DNAT)

Network Address Translation: Outbound NAT (SNAT)

Ethernet Protocols

Address Resolution Protocol (ARP)

Dynamic Host Configuration Protocol (DHCP) Client

Encapsulating Security Payload (ESP)

File Transfer Protocol (FTP)

Hypertext Transfer Protocol Secure (HTTPS)

Internet Control Message Protocol (ICMP)

Internet Key Exchange (IKEv1/v2)

Internet Protocol Security (IPsec) Protocol Suite

Internet Secure Association and Key Management Protocol (ISAKMP)

Lightweight Directory Access Protocol (LDAP) Client

Modbus TCP/IP

Network Time Protocol (NTP) Client/Server

Online Certificate Revocation Protocol (OCSP)

Remote Authentication Dial-In User Service (RADIUS)

Secure Shell (SSH) Client/Server

Simple Network Management Protocol (SNMP)

Spanning Tree Protocol (STP)

Syslog

Telnet

Transmission Control Protocol (TCP)

Transport Layer Security (TLS)

User Datagram Protocol (UDP)

VLANS

As many as 4 VLANs per network interface

Security

User-Based Accounts

Maximum Local Accounts: 256

Password Length: 8–128 characters

Password Set: All printable ASCII characters

User Roles: Administrative and Technician

Syslog

Storage for 60,000 messages

Forwarding to 3 destinations

Firewall

Implementation: iptables

As many as 1000 user-specified rules supported

General

Operating Temperature Range

–40° to +85°C (–40° to +185°F)Note: Not applicable to UL applications.

Operating Environment

Pollution Degree: 2

Overvoltage Category: II

Relative Humidity: 5–95%, non-condensing

Maximum Altitude: 2000 m

Dimensions

1U Rack Mount: 482.6 mm W x 43.7 mm H x 159 mm D (19" W x 1.72" H x 6.26" D)

1U Panel Mount: 502.9 mm W x 80 mm H x 159 mm D (19.8" W x 3.15" H x 6.26" D)

Weight

2.35 kg (5.2 lb)

Warranty

10 Years

Processing and Memory

Processor Speed: 533 MHz

Memory: 1024 MB DDR2 ECC SDRAM

Storage: 4 GB

Page 11: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

11

Time-Code Input

IRIG accuracy depends on external GPS source

NTP accuracy depends on network conditions

Input Type: IRIG-B000 or B002, Even or Odd parity

Modulated IRIG-B (BNC)

On (1) State: Vih 3.3 Vp-p

Off (0) State: Vil 0.1 Vp-p

Input Impedance: 2.5 k

Accuracy: 500 s

Demodulated IRIG-B (BNC)

On (1) State: Vih 2.2 V

Off (0) State: Vih 0.8 V

Input Impedance: 2.5 k

Accuracy: 250 ns

Network Time Protocol (Ethernet)

Accuracy: 10 ms (varies)

Time-Code Output

IRIG accuracy depends on source accuracy

NTP accuracy depends on network conditions

Demodulated IRIG-B000 Even Parity (BNC and Serial)

On (1) State: Voh 2.4 V

Off (0) State: Vol 0.8 V

Load: 50

Output Drive Levels

Demodulated IRIG-B: TTL 120 mA, 3.5 Vdc, 25

Serial Port: TTL 2.5 mA, 2.4 Vdc, 1 k

Network Time Protocol (Ethernet)

Accuracy: 250 µs (ideal on LAN)

Communications Ports

Ethernet Ports

Ports: 2 rear, 1 front

Data Rate: 10 or 100 Mbps

Front Connector: RJ45 Female

Rear Connectors: RJ45 Female or LC Fiber (single-mode or multimode, 100 Mbps only)

Standard: IEEE 802.3

Fiber Optic

100BASE-FX Multimode Option (to 2 km)

Maximum TX Power: –14 dBm

Minimum TX Power: –19 dBm

RX Sensitivity: –30 dBm

System Gain: 11 dB

Source: LED

Wavelength: 1300 nm

Connector Type: LC (IEC 61754-20)

100BASE-LX10 Single-Mode Option (to 15 km)

Maximum TX Power: –8 dBm

Minimum TX Power: –15 dBm

RX Sensitivity: –25 dBm

System Gain: 10 dB

Source: Laser

Wavelength: 1300 nm

Connector Type: LC (IEC 61754-20)

Serial Ports

Type: EIA-232/EIA-422/EIA-485(software selectable)

Data Rate: 1200 to 115200 bps

Connectors: DB-9 Female (Ports 1–16), Isolated 8 pin (Port 17)

Power: +5 Vdc power on Pin 1 (500 mA maximum cumulative for 16 ports)

USB Ports

1 Host Port: Type A (nonfunctional, for future use)

1 Device Port: Type B (nonfunctional, for future use)

Power Supply

Input Voltage

Rated Supply Voltage: 125–250 Vdc; 110–240 Vac, 50/60 Hz48–125 Vdc; 120 Vac, 50/60 Hz24–48 Vdc

Input Voltage Range: 85–300 Vdc or 85–264 Vac38.4–137.5 Vdc or 88–132 Vac,18–60 Vdc polarity dependent

Power Consumption

AC: <40 VA

DC: <30 Watts

Input Voltage Interruptions

20 ms @ 24 Vdc20 ms @ 48 Vdc50 ms @ 125 Vac/Vdc100 ms @ 250 Vac/Vdc

Digital Inputs

Contact Input

125 Vdc: Pickup: 105–150 VdcDropout: <75 Vdc

Digital Outputs

DC Ratings

Rated Operational Voltage (Ue): 24–250 Vdc

Rated Voltage Range: 19.2–275 Vdc

Rated Insulation Voltage (Ui): 300 Vdc

Continuous Carry: 6 A at 70°C4 A at 85°C

Make: 30 A @ 250 Vdc per IEEE C37.90

Thermal: 50 A for 1 s

Contact Protection: 360 Vdc, 40 J MOV protection across open contacts

Page 12: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

12

Leakage Current in a 500 load at Rated Voltage: <0.02 mA

Impedance of a Closed Output, in D.C.: <1

Bouncing Measured in Resistive Load of 10 kW at Rated Voltage: <5 ms

Operating Time (Coil Energization to Contact Closure, Resistive Load):

Pickup time 5 ms typicalDropout time of 5 ms typical

Breaking Capacity (10,000 Operations):

Per IEC 60255-0-20: 1974:24 V 0.75 A L/R = 40 ms48 V 0.50 A L/R = 40 ms125 V 0.30 A L/R = 40 ms250 V 0.20 A L/R = 40 ms

Cyclic Capacity (2.5 Cycles/Second):

Per IEC 60255-0-20: 1974:24 V 0.75 A L/R = 40 ms48 V 0.50 A L/R = 40 ms125 V 0.30 A L/R = 40 ms250 V 0.20 A L/R = 40 ms

Mechanical Durability: 10 million no-load operations

AC Ratings

Operational Voltage (Ue): 250 Vac/Vdc

Rated Insulation Voltage (Ui): 300 Vac/Vdc

Utilization Category: AC-15 (control of electromagnetic loads >72 VA)

Contact Rating Designation: B300 (B = 5A, 300 = rated insulation voltage)

Rated Operational Current (Ie):

3 A @ 120 Vac1.5 A @ 240 Vac.

Conventional Enclosed Thermal Current (Ithe) Rating: 5 A

Operate Current: >1 mA

Rated Operational Voltage (Ue): 240 Vac

Voltage Protection Across Open Contacts: 270 Vac, 40 J

Pickup/Dropout Time: 16 ms (coil energization to contact closure).

Electrical Durability Make VA Rating:

3600 VA, cos j = 0.3

Electrical Durability Break VA Rating: 360 VA, cos j = 0.3

Mechanical Durability: 10,000 no-load operations

Rated Frequency: 50/60 5 Hz

Type Tests

Electromagnetic Compatibility (EMC)

Emissions: IEC 60255-25:2000

Electromagnetic Compatibility Immunity

Conducted RF Immunity: IEC 60255-22-6:200110 Vrms

IEC 61000-4-6:2008 10 Vrms

Digital Radio Telephone RF Immunity:

ENV 50204:199510 V/m at 900 MHz and l.89 GHz

Electrostatic Discharge Immunity:

IEC 60255-22-2:20082, 4, 6, 8 kV contact; 2, 4, 8, 15 kV air

IEC 61000-4-2:20082, 4, 6, 8 kV contact; 2, 4, 8, 15 kV air

IEEE C37.90.3-20012, 4, and 8 kV contact; 4, 8, and 15 kV air

Fast Transient/Burst Immunity:

IEC 60255-22-4:2008Class A: 4 kV at 5 kHz, 2 kV at 5 kHz

on comm portsIEC 61000-4-4:2004 + CRGD:2006

4 kV at 5 kHz

Magnetic Field Immunity: IEC 61000-4-8:20011000 A/m for 3 s, 100 A/m for 1 min

IEC 61000-4-9:20011000 A/m

Power Supply Immunity: IEC 60255-11:2008IEC 61000-4-11:2004IEC 61000-4-29:2000

Radiated Radio Frequency Immunity:

IEC 60255-22-3:200710 V/m

IEC 61000-4-3:200810 V/m

IEEE C37.90.2-200435 V/m

Surge Immunity: IEC 60255-22-5:20081 kV Line-to-Line2 kV Line-to-Earth

IEC 61000-4-5:20051 kV Line-to-Line2 kV Line-to-Earth

Surge Withstand Capability: IEC 60255-22-1:20072.5 kV peak common mode1.0 kV peak differential mode

IEEE C37.90.1-20022.5 kV oscillatory4 kV fast transient waveform

Environmental Tests

Cold: IEC 60068-2-1:2007 16 hours at –40°C

Damp Heat, Cyclic: IEC 60068-2-30:2005 25°C to 55°C, 6 cycles, 95% relative humidity

Dry Heat: IEC 60068-2-2:200716 hours at +85°C

Vibration: IEC 60255-21-1:1988Class 1 Endurance, Class 2 Response

IEC 60255-21-2:1988Class 1 Shock Withstand, BumpClass 2 Shock Response

IEC 60255-21-3:1993Class 2 Quake Response

Safety

Dielectric Strength: IEC 60255-5:20002500 Vac on contact inputs and

contact outputs, 1 min3100 Vdc on power supply, 1 min

IEEE C37.90-20052500 Vac on contact inputs and

contact outputs, 1 min3100 Vdc on power supply, 1 min

Impulse: IEC 60255-5:2000, 0.5 Joule5 kV

IEEE C37.90-2005, 0.5 Joule5 kV

IP Code: IEC 60529:2001 + CRGD:2003IP20

Page 13: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

13

Notes

Page 14: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

14

Page 15: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

15

Page 16: SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734 SEL-351 SEL-3555. Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet 5 IEDs

16

© 2009–2016 by Schweitzer Engineering Laboratories, Inc. All rights reserved.

All brand or product names appearing in this document are the trademark or registeredtrademark of their respective holders. No SEL trademarks may be used without writtenpermission. SEL products appearing in this document may be covered by U.S. and Foreignpatents.

Schweitzer Engineering Laboratories, Inc. reserves all rights and benefits afforded underfederal and international copyright and patent laws in its products, including without lim-itation software, firmware, and documentation.

The information in this document is provided for informational use only and is subject tochange without notice. Schweitzer Engineering Laboratories, Inc. has approved only theEnglish language document.

This product is covered by the standard SEL 10-year warranty. For warranty details, visitselinc.com or contact your customer service representative.

*PDS3620-01*

2350 NE Hopkins Court • Pullman, WA 99163-5603 U.S.A.

Tel: +1.509.332.1890 • Fax: +1.509.332.7990

selinc.com • [email protected]

SEL-3620 Data Sheet Date Code 20160715