Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet Major Features and Benefits The SEL-3620 is a router, virtual private network (VPN) endpoint, and firewall device that can perform secu- rity proxy services for serial and Ethernet-based intelligent electronic devices (IEDs). The SEL-3620 helps create a user audit trail through strong, centralized, user-based authentication and authorization to modern and legacy IEDs. The SEL-3620 secures your control system communications with a stateful deny-by-default firewall, strong cryptographic protocols, and logs for system awareness. The SEL-3620 also manages pro- tected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules for stronger security. The integrated security proxy also provides user-based single sign-on access to Ethernet and serial devices. ➤ Secure Architecture and Malware Protection. Maximize reliability with integrated exe-GUARD ® whitelist antivirus and other malware protections, eliminating costly patch management and signature updates. ➤ Centralized User-Based Access to Protected IEDs. Provide strong, centralized access control and user accountability to all protected devices with Lightweight Directory Access Protocol (LDAP) or Remote Authentication Dial-In User Service (RADIUS). Simplify compliance with accurate logging. ➤ Automated Management of IED Passwords. Migrate away from shared passwords and accounts with the SEL-3620 acting as a password manager for protected devices. ➤ Security Proxy Services. Connect securely with identity based access controls to command line inter- faces. ➤ Detailed Connection Reports. Receive detailed connection reports that make user activity audits a snap. ➤ Secure Ethernet Communications. Use Internet Protocol Security (IPsec), Secure Shell (SSH), and Transport Layer Security (TLS) to provide confidential communications and maintain message integ- rity among devices. ➤ Stateful Deny-by-Default Firewall. Prevent unauthorized traffic from entering or exiting your private network. Log all successful or blocked connections to the firewall, and receive alerts indicating the presence of unauthorized network communication attempts. ➤ Syslog. Log events for speedy alerts, consistency, compatibility, and centralized collection. For slow commu- nications links, the SEL-3620 can throttle the number of outgoing syslog messages. ➤ Integrated Port Switch. Map one or more of the serial ports to any other serial ports, or to Ethernet TCP or UDP connections. ➤ Modbus Protocol Conversion. Convert Modbus TCP to Modbus RTU and Modbus RTU to Modbus TCP. ➤ Script Engine. Perform any sequence of command-driven tasks with a single push of a button, and restrict users to specific scripted tasks. SEL-3620 Ethernet Security Gateway
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet
Major Features and BenefitsThe SEL-3620 is a router, virtual private network (VPN) endpoint, and firewall device that can perform secu-rity proxy services for serial and Ethernet-based intelligent electronic devices (IEDs). The SEL-3620 helpscreate a user audit trail through strong, centralized, user-based authentication and authorization to modern andlegacy IEDs. The SEL-3620 secures your control system communications with a stateful deny-by-defaultfirewall, strong cryptographic protocols, and logs for system awareness. The SEL-3620 also manages pro-tected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules forstronger security. The integrated security proxy also provides user-based single sign-on access to Ethernet andserial devices.
➤ Secure Architecture and Malware Protection. Maximize reliability with integrated exe-GUARD®
whitelist antivirus and other malware protections, eliminating costly patch management and signatureupdates.
➤ Centralized User-Based Access to Protected IEDs. Provide strong, centralized access control anduser accountability to all protected devices with Lightweight Directory Access Protocol (LDAP) orRemote Authentication Dial-In User Service (RADIUS). Simplify compliance with accurate logging.
➤ Automated Management of IED Passwords. Migrate away from shared passwords and accountswith the SEL-3620 acting as a password manager for protected devices.
➤ Security Proxy Services. Connect securely with identity based access controls to command line inter-faces.
➤ Detailed Connection Reports. Receive detailed connection reports that make user activity audits asnap.
➤ Secure Ethernet Communications. Use Internet Protocol Security (IPsec), Secure Shell (SSH), andTransport Layer Security (TLS) to provide confidential communications and maintain message integ-rity among devices.
➤ Stateful Deny-by-Default Firewall. Prevent unauthorized traffic from entering or exiting your privatenetwork. Log all successful or blocked connections to the firewall, and receive alerts indicating thepresence of unauthorized network communication attempts.
➤ Syslog. Log events for speedy alerts, consistency, compatibility, and centralized collection. For slow commu-nications links, the SEL-3620 can throttle the number of outgoing syslog messages.
➤ Integrated Port Switch. Map one or more of the serial ports to any other serial ports, or to EthernetTCP or UDP connections.
➤ Modbus Protocol Conversion. Convert Modbus TCP to Modbus RTU and Modbus RTU to ModbusTCP.
➤ Script Engine. Perform any sequence of command-driven tasks with a single push of a button, andrestrict users to specific scripted tasks.
SEL-3620 Ethernet Security Gateway
SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.
2
➤ X.509 Certificates. Ensure strong authentication with third party validation of incoming connectionrequests over the IPsec VPN, Active Directory connection, or Web management interface.
➤ Online Certificate Status Protocol. Use OCSP to verify validity of X.509 certificates.
➤ Time Synchronization. Synchronize events and user activity across your system with IRIG or NTP.
➤ Virtual Local Area Networks (VLANs). Segregate traffic and improve network organization and per-formance.
➤ Ease of Use. Simplify configuration and maintenance with a secure web interface that allows for con-venient setup and management.
➤ Reliability. Rely on the SEL-3620, built for availability, hardened for the substation, and backed by a10-year warranty.
➤ Ethernet Port Bridge. Support a reliable Ethernet ring topology.
➤ Encrypted Terminal Communications. Securely communicate with IEDs via Secure Shell (SSH)-encrypted terminal programs.
➤ 5 V Pin One Power on Serial Ports. Directly power 5 V devices from the serial ports.
➤ Bit-Based Conversion. Transform Conitel and other bit-based protocols to Ethernet and reduce reli-ance on expensive analog circuits.
➤ Service Port. Automate base-lining of the device settings with a basic command-line interface.
Product Overview
The SEL-3620 is a router, VPN endpoint, and firewalldevice that can perform security proxy services to serialand Ethernet-based IEDs. The SEL-3620 is an accesscontrol solution for control systems environments withboth Ethernet and serial communications. The SEL-3620filters all incoming and outgoing traffic with a deny-by-default stateful firewall that only allows authorizedtraffic. IPsec VPNs protect all site-to-sitecommunications.
Figure 1 Site-to-Site Virtual Private Network
The authentication proxy technology integrated in theSEL-3620 provides single sign-on engineering access toprotected IEDs. The strong authentication in theSEL-3620 includes centralized user-based credentialsand verification of the source of user communications.Thorough logging of all user activities on protecteddevices provides simple audit reports from which youcan know who did what when.
Figure 2 Protected Engineering Access
An integrated stateful, deny-by-default firewall preventsunauthorized communications from entering or exitingthe protected network. The SEL-3620 filters incomingand outgoing TCP, UDP, ICMP, AH, and ESP communi-cations based on a user-configurable set of rules.
Figure 3 Deny-by-Default Firewall
SEL-3620 SEL-3620Internet
TrustedNetwork
TrustedNetwork
SEL-321
SEL-3620
SEL-3620
Authorized Traffic
Malicious Traffic
TrustedNetwork
Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet
3
User-based accounts increase log granularity and makepassword management easy and effective. The SEL-3620includes support for centralized authentication andauthorization to simplify management of user accounts,passwords, and user privileges for all your protecteddevices from an active directory server.
Figure 4 Centralized User Management
The port switch integrated in the SEL-3620 allows usersto create mappings for serial-to-serial, serial-to-Ethernet,Ethernet-to-serial, and Ethernet-to-Ethernet communica-tions. Through use of these mappings you can use suchdifferent modes of communications as one-to-one, one-to-many, and many-to-many.
The SEL-3620 formats, stores, and forwards logs accord-ing to the syslog specification to enable quick notifica-tion, central collection, and interoperable reporting of
security events. IRIG-B and NTP synchronizes theseevents. The SEL-3620 records user activity on IEDs toprovide you with auditable tracking of user activitywithin your system.
Authentication for the web management interface, VPNpeers, and directory servers relies on X.509 certificates.The Online Certificate Status Protocol (OCSP) verifiesthe legitimacy of any certificates the SEL-3620 receives.
The SEL-3620 streamlines user-configurable options anduses an HTTPS web interface for a simplified userexperience. SEL ACSELERATOR QuickSet® SEL-5030Software with connection directory software providesconfiguration of the proxy services. A command lineinterface on the integrated SSH server provides access toprotected IEDs.
The SEL-3620 exe-GUARD feature provides whitelistarchitected antivirus and other malware protections,including a secure kernel that prevents unauthorizedaccess or modification of system data and monitorscritical system services to detect unexpected activitycaused by unauthorized modifications to the deviceprogram.
The SEL-3620 is built for installations that require highlevels of availability. The device contains no movingparts, operates over a wide temperature range from -40°Cto +85°C, and uses a flash-based hard drive formaximum durability.
Applications
The SEL-3620 is ideally suited for electronic accesspoint routing, message encryption, packet authentication,and user authentication. The authorization and serialcapabilities of the SEL-3620 provide a strong solutionfor user-based access to legacy IEDs that have shareduser accounts.
Routing and MasqueradingThe SEL-3620 forwards communications amongseparate Ethernet networks. Any device that has accessto the SEL-3620 can use it to forward Ethernet packets toa destination on a different network.
The SEL-3620 supports Network Address Translation(NAT) for a wide variety of dynamic networkapplications. Port forwarding enables the use of similarremote address space without re-architecting IP subnets,and outbound NAT supports internet access for thoseapplications that require it.
Secure Communications Over Untrusted NetworksThe SEL-3620 secures all communication byestablishing IPsec VPN tunnels with other SEL-3620gateways and IPsec-enabled devices.
SEL-3620
+
+
?!
SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.
4
Figure 5 SEL-3620 Encrypts Communications
Point-to-Point Serial Over Ether-net NetworkFigure 6 shows the SEL-3620 in a point-to-pointapplication in which bit- and byte-based serial devicescan communicate with each other across an Ethernetnetwork. The SEL-3620 supports IPsec and SSH forencrypted and authenticated communications. Thisprovides an easy transition from existing costly analogserial lines to Ethernet transport networks without havingto upgrade remote terminal units (RTU) orcommunication front ends (CFE).
Figure 6 SEL-3620 Protects Serial Over Ethernet
User-Based Access to IEDsThe authentication proxy feature in the SEL-3620provides user-based access to serial and Ethernet deviceswithin the secured network. The SEL-3620 records andlogs all user activity, to provide an audit trail and useraccountability.
Figure 7 SEL-3620 Authenticates Users
Ethernet to Serial ConversionsGain Ethernet-based access to your serial devicesthrough the SEL-3620. The SEL-3620 performs both bit-and byte-based serial-to-Ethernet media conversions forTelnet, SSH, Raw TCP, and UDP protocols.
Figure 8 SEL-3620 Converts Serial to Ethernet
Password ManagementThe SEL-3620 is uniquely designed to manage thepasswords of all your protected IEDs. The single sign-oncapabilities of the authentication proxy require that theSEL-3620 be aware of the passwords of all protected
SEL-3620
Control Center
Corporate Office
SEL-3620Substation
SEL-2411
SEL-421
SEL-3620 SEL-3620
SEL-3373
SEL-3530
SEL-351 SEL-734
SEL-3620
SEL-2411
SEL-351
SEL-421
SEL-3620
SEL-351
SEL-2411
SEL-734
SEL-351
SEL-3555
Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet
5
IEDs. The combination of the script engine with thispassword knowledge gives the SEL-3620 the ability tomanage your passwords, enforce strong passwords, andprovide audit reports of password changes.
Figure 9 SEL-3620 Manages Passwords
Time DistributionSynchronize all your devices with the SEL-3620,regardless of whether these devices understand NTP orIRIG. The SEL-3620 synchronizes to and sources bothIRIG-B and NTP.
Figure 10 SEL-3620 Distributes Time
Functional DescriptionCryptographic Message ProtectionIPsec VPN initiation requires that three tasks beperformed: the two peers must authenticate each other,the IKE security associations (SAs) must be established,and the IPsec SAs must be established. Uponestablishment of the IPsec SAs, the SEL-3620 transmitsall messages that route through this “tunnel” within anEncapsulating Security Payload. The SEL-3620performs all of these steps when it connects to any peerIPsec-enabled device.
Security associations are shared pieces of informationthat we can use to secure communications channels. AnSA includes the encryption and authenticationalgorithms the channel uses along with their respectivekeys. An Internet Key Exchange (IKE) SA defines thesecure channel on which IPsec SA negotiation takesplace. An IPsec SA defines the communicationsparameters that will be in use for communication acrossa VPN. The SEL-3620 contains preconfigured settings in“Profiles” to simplify connecting to non-SEL devices.
Figure 11 VPN Establishment
Encryption ensures that communications are confidentialand only readable by authorized parties. The SEL-3620uses the IPsec Encapsulating Security Protocol to protectthe entire original packet, including both the header and
the payload. This prevents the possibility of informationleakage about the structure of your protected networks.The hardware-accelerated encryption algorithms theSEL-3620 supports are AES, 3DES, and Blowfish.
Figure 12 Cryptographic Message Protection
SEL-351
SEL-2411
Password Change Report
03/9/2011
SEL-351:
SEL-2411:
ACC: F*XhG0X):02AC:$ktn>H3Hf1
ACC: Buhy&32k6Q2AC: kO0%v03{sP
SEL-3620
SEL-3555
SEL-351
SEL-2407
SEL-3620
SEL-3620 SEL-3620
1. Authenticate Peers2. Establish IKE SA3. Establish IPsec SA
4. Encrypt Messages
SEL-3620 T#5sk V@37h”Hello World!
SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.
6
Device AuthenticationThe SEL-3620 can use either X.509 certificates or pre-shared keys for authentication of another party over anetwork. The X.509 certificate confirms that the party atthe opposite end of the tunnel is an entity with whom theSEL-3620 has approval to communicate. The SEL-3620accepts both self-signed X.509 certificates and X.509certificates that have been signed by a CertificateAuthority (CA).
The SEL-3620 uses OCSP to check the status of X.509certificates. When the SEL-3620 receives a connectionrequest along with a certificate signed by a CA, it willpoll an OCSP server to verify that the certificate is good.There are three possible responses the OCSP server cansupply: good, revoked, and unknown. If the SEL-3620receives a response other than good, it will deny theconnection request.
Centralized User-Based Access ControlThe security proxy services in the SEL-3620 provideuser-based access to protected serial and Ethernet IEDs.Figure 13 illustrates this process. A user needing toaccess a protected IED will first access the SEL-3620.The SEL-3620 will then prompt for the user's usernameand password. The SEL-3620 will verify the providedcredentials with a centralized server and obtain the user'spermissions. These permissions then determine whichdevices and access levels the user has authorization toaccess. The SEL-3620 connects to the IED which theuser wants to access, and joins the sessions with the userand the IED.
Figure 13 Central User Authentication
Maintaining logs of user activity is very important forauditing purposes. The SEL-3620 monitors all useractivity and logs each session to a locally stored file. Atthe same time, the SEL-3620 generates syslog messages,
indicating the start of a session and the end of a session,to alert that activity has taken place. Users withappropriate privileges can export the user log files forlater examination as necessary.
Authenticated, authorized, and recorded session
Connect to IED
Connect to communications processor
Request IED access
Successful
authentication
Credentials verified
and authorization
Verify credentials
Provide credentials
Request credentials
Provide access
Substation Engineering Access
SecurityGateway
DomainController
CommunicationsProcessor IED
Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet
7
Multiple Access MethodsUsers have multiple methods of accessing IEDs toprovide flexibility for various types of software. SSH andTelnet provide a command line interface to protecteddevices through the SEL-3620. You can also mapspecific TCP and UDP ports to physical serial ports.
SyslogThe SEL-3620 uses the syslog format to log events.These logs contain several fields that indicate eventseverity, event origin, the type of event that occurred, anddetails regarding the cause of the event. Additionally, theevent message contains such event tracking informationas the entity that triggered the event and the time anddate of the event. The SEL-3620 maintains an internalrecord of as many as 60,000 event logs in nonvolatilememory, and it generates, stores, and forwards syslogmessages to multiple destinations.
SNMPSimple Network Management Protocol (SNMP) supporton the SEL-3620 allows administrators to query somestate information from the device, as well as to receivenotifications (traps) for events that indicate a deviceintegrity fault, such as SELinux audit messages, andwhitelist integrity failures. The Management InformationBase (MIB) provides information about data and trapsavailable via SNMP. The MIB can be downloaded as azip file from the SEL-3620 from the SNMP Settingspage on the web management interface.
FirewallTo protect your private network from malicious traffic,the stateful firewall in the SEL-3620 denies all traffic bydefault. Explicitly identifying traffic that the SEL-3620permits makes it far less likely that the SEL-3620 willoverlook specific types of traffic.
Secure ManagementConfiguration of the SEL-3620 occurs through a secureweb management interface that uses HTTPSincorporating transport layer security (TLS). Mutualauthentication takes place before a secure webmanagement session opens. The device uses an X.509server-side certificate to authenticate to the user, and theuser uses a username and password to authenticate to thedevice. The SEL-3620 then restricts users to actions forwhich they have authorization through their accountassignments. There are two roles: administrator andtechnician. The technician may perform any task on theSEL-3620 except create or edit user accounts, modifydate/time settings, or reset, halt, or reboot the device.Administrators may perform any action on theSEL-3620, including creating and editing all accounts onthe box.
Web management provides simple-to-use graphicconfiguration pages that display the gatewayconfiguration through network diagrams. You can usethis to confirm that all configurations are as you intend.The web interface supplies you a single place fromwhich you can retrieve all communications channelinformation and network diagrams associated with theSEL-3620. The device also features a basic command-line interface Service Port that allows for the automationof configuration base-lining. The Service Port is read-only and requires administrative credentials to access.
SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.
8
Figure 14 Web Management Dashboard
Mechanical Diagrams and Dimensions
Figure 15 Front-Panel Diagrams
i4468e
USB BUSB AETH F
TX
RX
21
1716151413121110987654321
LAMPTEST
ENABLED
ALARM
LNK
RX
TX
SEL-3620 ETHERNET SECURITY GATEWAY
i4467f
USB BUSB AETH F
TX
RX
21
1716151413121110987654321
LAMPTEST
ENABLED
ALARM
LNK
RX
TX
SEL-3620 ETHERNET SECURITY GATEWAY
Rack Mount
Panel Mount
Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet
9
Figure 16 Rear-Panel Diagrams
Figure 17 SEL-3620 Dimensions
Copper Ethernet
Fiber Ethernet
i4731c
INIRIG–B
ETH 1 ETH 2
COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4
COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12
OUT
190
-29
97-
01
—+ SH
IEL
D
–TX
+T
X
+R
X
–RX
COM 17IRIG-BOUT
GNDA09
POWERIN101 OUT101
+ —
i4732c
INIRIG–B
ETH 1 ETH 2
COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4
COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12
OUT
190
-29
97-
01
—+ SH
IEL
D
–TX
+T
X
+R
X
–RX
COM 17IRIG-BOUT
GNDA09
POWERIN101 OUT101
+ —
i4985a
INIRIG–B
ETH 1 ETH 2
COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4
COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12
OUT
190
-29
97-
01
—+ SH
IEL
D
–TX
+T
X
+R
X
–RX
COM 17IRIG-BOUT
GNDA09
POWERIN101 OUT101
+ —
Mixed Ethernet
SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.
10
Specifications
Compliance
Designed and manufactured under an ISO 9001 certified quality management system
All brand or product names appearing in this document are the trademark or registeredtrademark of their respective holders. No SEL trademarks may be used without writtenpermission. SEL products appearing in this document may be covered by U.S. and Foreignpatents.
Schweitzer Engineering Laboratories, Inc. reserves all rights and benefits afforded underfederal and international copyright and patent laws in its products, including without lim-itation software, firmware, and documentation.
The information in this document is provided for informational use only and is subject tochange without notice. Schweitzer Engineering Laboratories, Inc. has approved only theEnglish language document.
This product is covered by the standard SEL 10-year warranty. For warranty details, visitselinc.com or contact your customer service representative.
*PDS3620-01*
2350 NE Hopkins Court • Pullman, WA 99163-5603 U.S.A.