SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734...

of 16 /16
Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet Major Features and Benefits The SEL-3620 is a router, virtual private network (VPN) endpoint, and firewall device that can perform secu- rity proxy services for serial and Ethernet-based intelligent electronic devices (IEDs). The SEL-3620 helps create a user audit trail through strong, centralized, user-based authentication and authorization to modern and legacy IEDs. The SEL-3620 secures your control system communications with a stateful deny-by-default firewall, strong cryptographic protocols, and logs for system awareness. The SEL-3620 also manages pro- tected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules for stronger security. The integrated security proxy also provides user-based single sign-on access to Ethernet and serial devices. Secure Architecture and Malware Protection. Maximize reliability with integrated exe-GUARD ® whitelist antivirus and other malware protections, eliminating costly patch management and signature updates. Centralized User-Based Access to Protected IEDs. Provide strong, centralized access control and user accountability to all protected devices with Lightweight Directory Access Protocol (LDAP) or Remote Authentication Dial-In User Service (RADIUS). Simplify compliance with accurate logging. Automated Management of IED Passwords. Migrate away from shared passwords and accounts with the SEL-3620 acting as a password manager for protected devices. Security Proxy Services. Connect securely with identity based access controls to command line inter- faces. Detailed Connection Reports. Receive detailed connection reports that make user activity audits a snap. Secure Ethernet Communications. Use Internet Protocol Security (IPsec), Secure Shell (SSH), and Transport Layer Security (TLS) to provide confidential communications and maintain message integ- rity among devices. Stateful Deny-by-Default Firewall. Prevent unauthorized traffic from entering or exiting your private network. Log all successful or blocked connections to the firewall, and receive alerts indicating the presence of unauthorized network communication attempts. Syslog. Log events for speedy alerts, consistency, compatibility, and centralized collection. For slow commu- nications links, the SEL-3620 can throttle the number of outgoing syslog messages. Integrated Port Switch. Map one or more of the serial ports to any other serial ports, or to Ethernet TCP or UDP connections. Modbus Protocol Conversion. Convert Modbus TCP to Modbus RTU and Modbus RTU to Modbus TCP. Script Engine. Perform any sequence of command-driven tasks with a single push of a button, and restrict users to specific scripted tasks. SEL-3620 Ethernet Security Gateway

Embed Size (px)

Transcript of SEL-3620 Ethernet Security Gateway · 2017-02-10 · SEL-421 SEL-3620 SEL-351 SEL-2411 SEL-734...

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    Major Features and BenefitsThe SEL-3620 is a router, virtual private network (VPN) endpoint, and firewall device that can perform secu-rity proxy services for serial and Ethernet-based intelligent electronic devices (IEDs). The SEL-3620 helpscreate a user audit trail through strong, centralized, user-based authentication and authorization to modern andlegacy IEDs. The SEL-3620 secures your control system communications with a stateful deny-by-defaultfirewall, strong cryptographic protocols, and logs for system awareness. The SEL-3620 also manages pro-tected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules forstronger security. The integrated security proxy also provides user-based single sign-on access to Ethernet andserial devices.

    ➤ Secure Architecture and Malware Protection. Maximize reliability with integrated exe-GUARD®

    whitelist antivirus and other malware protections, eliminating costly patch management and signatureupdates.

    ➤ Centralized User-Based Access to Protected IEDs. Provide strong, centralized access control anduser accountability to all protected devices with Lightweight Directory Access Protocol (LDAP) orRemote Authentication Dial-In User Service (RADIUS). Simplify compliance with accurate logging.

    ➤ Automated Management of IED Passwords. Migrate away from shared passwords and accountswith the SEL-3620 acting as a password manager for protected devices.

    ➤ Security Proxy Services. Connect securely with identity based access controls to command line inter-faces.

    ➤ Detailed Connection Reports. Receive detailed connection reports that make user activity audits asnap.

    ➤ Secure Ethernet Communications. Use Internet Protocol Security (IPsec), Secure Shell (SSH), andTransport Layer Security (TLS) to provide confidential communications and maintain message integ-rity among devices.

    ➤ Stateful Deny-by-Default Firewall. Prevent unauthorized traffic from entering or exiting your privatenetwork. Log all successful or blocked connections to the firewall, and receive alerts indicating thepresence of unauthorized network communication attempts.

    ➤ Syslog. Log events for speedy alerts, consistency, compatibility, and centralized collection. For slow commu-nications links, the SEL-3620 can throttle the number of outgoing syslog messages.

    ➤ Integrated Port Switch. Map one or more of the serial ports to any other serial ports, or to EthernetTCP or UDP connections.

    ➤ Modbus Protocol Conversion. Convert Modbus TCP to Modbus RTU and Modbus RTU to ModbusTCP.

    ➤ Script Engine. Perform any sequence of command-driven tasks with a single push of a button, andrestrict users to specific scripted tasks.

    SEL-3620 Ethernet Security Gateway

  • SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

    2

    ➤ X.509 Certificates. Ensure strong authentication with third party validation of incoming connectionrequests over the IPsec VPN, Active Directory connection, or Web management interface.

    ➤ Online Certificate Status Protocol. Use OCSP to verify validity of X.509 certificates.

    ➤ Time Synchronization. Synchronize events and user activity across your system with IRIG or NTP.

    ➤ Virtual Local Area Networks (VLANs). Segregate traffic and improve network organization and per-formance.

    ➤ Ease of Use. Simplify configuration and maintenance with a secure web interface that allows for con-venient setup and management.

    ➤ Reliability. Rely on the SEL-3620, built for availability, hardened for the substation, and backed by a10-year warranty.

    ➤ Ethernet Port Bridge. Support a reliable Ethernet ring topology.

    ➤ Encrypted Terminal Communications. Securely communicate with IEDs via Secure Shell (SSH)-encrypted terminal programs.

    ➤ 5 V Pin One Power on Serial Ports. Directly power 5 V devices from the serial ports.

    ➤ Bit-Based Conversion. Transform Conitel and other bit-based protocols to Ethernet and reduce reli-ance on expensive analog circuits.

    ➤ Service Port. Automate base-lining of the device settings with a basic command-line interface.

    Product Overview

    The SEL-3620 is a router, VPN endpoint, and firewalldevice that can perform security proxy services to serialand Ethernet-based IEDs. The SEL-3620 is an accesscontrol solution for control systems environments withboth Ethernet and serial communications. The SEL-3620filters all incoming and outgoing traffic with a deny-by-default stateful firewall that only allows authorizedtraffic. IPsec VPNs protect all site-to-sitecommunications.

    Figure 1 Site-to-Site Virtual Private Network

    The authentication proxy technology integrated in theSEL-3620 provides single sign-on engineering access toprotected IEDs. The strong authentication in theSEL-3620 includes centralized user-based credentialsand verification of the source of user communications.Thorough logging of all user activities on protecteddevices provides simple audit reports from which youcan know who did what when.

    Figure 2 Protected Engineering Access

    An integrated stateful, deny-by-default firewall preventsunauthorized communications from entering or exitingthe protected network. The SEL-3620 filters incomingand outgoing TCP, UDP, ICMP, AH, and ESP communi-cations based on a user-configurable set of rules.

    Figure 3 Deny-by-Default Firewall

    SEL-3620 SEL-3620Internet

    TrustedNetwork

    TrustedNetwork

    SEL-321

    SEL-3620

    SEL-3620

    Authorized Traffic

    Malicious Traffic

    TrustedNetwork

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    3

    User-based accounts increase log granularity and makepassword management easy and effective. The SEL-3620includes support for centralized authentication andauthorization to simplify management of user accounts,passwords, and user privileges for all your protecteddevices from an active directory server.

    Figure 4 Centralized User Management

    The port switch integrated in the SEL-3620 allows usersto create mappings for serial-to-serial, serial-to-Ethernet,Ethernet-to-serial, and Ethernet-to-Ethernet communica-tions. Through use of these mappings you can use suchdifferent modes of communications as one-to-one, one-to-many, and many-to-many.

    The SEL-3620 formats, stores, and forwards logs accord-ing to the syslog specification to enable quick notifica-tion, central collection, and interoperable reporting of

    security events. IRIG-B and NTP synchronizes theseevents. The SEL-3620 records user activity on IEDs toprovide you with auditable tracking of user activitywithin your system.

    Authentication for the web management interface, VPNpeers, and directory servers relies on X.509 certificates.The Online Certificate Status Protocol (OCSP) verifiesthe legitimacy of any certificates the SEL-3620 receives.

    The SEL-3620 streamlines user-configurable options anduses an HTTPS web interface for a simplified userexperience. SEL ACSELERATOR QuickSet® SEL-5030Software with connection directory software providesconfiguration of the proxy services. A command lineinterface on the integrated SSH server provides access toprotected IEDs.

    The SEL-3620 exe-GUARD feature provides whitelistarchitected antivirus and other malware protections,including a secure kernel that prevents unauthorizedaccess or modification of system data and monitorscritical system services to detect unexpected activitycaused by unauthorized modifications to the deviceprogram.

    The SEL-3620 is built for installations that require highlevels of availability. The device contains no movingparts, operates over a wide temperature range from -40°Cto +85°C, and uses a flash-based hard drive formaximum durability.

    Applications

    The SEL-3620 is ideally suited for electronic accesspoint routing, message encryption, packet authentication,and user authentication. The authorization and serialcapabilities of the SEL-3620 provide a strong solutionfor user-based access to legacy IEDs that have shareduser accounts.

    Routing and MasqueradingThe SEL-3620 forwards communications amongseparate Ethernet networks. Any device that has accessto the SEL-3620 can use it to forward Ethernet packets toa destination on a different network.

    The SEL-3620 supports Network Address Translation(NAT) for a wide variety of dynamic networkapplications. Port forwarding enables the use of similarremote address space without re-architecting IP subnets,and outbound NAT supports internet access for thoseapplications that require it.

    Secure Communications Over Untrusted NetworksThe SEL-3620 secures all communication byestablishing IPsec VPN tunnels with other SEL-3620gateways and IPsec-enabled devices.

    SEL-3620

    ++

    ?!

  • SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

    4

    Figure 5 SEL-3620 Encrypts Communications

    Point-to-Point Serial Over Ether-net NetworkFigure 6 shows the SEL-3620 in a point-to-pointapplication in which bit- and byte-based serial devicescan communicate with each other across an Ethernetnetwork. The SEL-3620 supports IPsec and SSH forencrypted and authenticated communications. Thisprovides an easy transition from existing costly analogserial lines to Ethernet transport networks without havingto upgrade remote terminal units (RTU) orcommunication front ends (CFE).

    Figure 6 SEL-3620 Protects Serial Over Ethernet

    User-Based Access to IEDsThe authentication proxy feature in the SEL-3620provides user-based access to serial and Ethernet deviceswithin the secured network. The SEL-3620 records andlogs all user activity, to provide an audit trail and useraccountability.

    Figure 7 SEL-3620 Authenticates Users

    Ethernet to Serial ConversionsGain Ethernet-based access to your serial devicesthrough the SEL-3620. The SEL-3620 performs both bit-and byte-based serial-to-Ethernet media conversions forTelnet, SSH, Raw TCP, and UDP protocols.

    Figure 8 SEL-3620 Converts Serial to Ethernet

    Password ManagementThe SEL-3620 is uniquely designed to manage thepasswords of all your protected IEDs. The single sign-oncapabilities of the authentication proxy require that theSEL-3620 be aware of the passwords of all protected

    SEL-3620

    Control Center

    Corporate Office

    SEL-3620Substation

    SEL-2411

    SEL-421

    SEL-3620 SEL-3620

    SEL-3373

    SEL-3530

    SEL-351 SEL-734

    SEL-3620

    SEL-2411

    SEL-351

    SEL-421

    SEL-3620

    SEL-351

    SEL-2411

    SEL-734

    SEL-351

    SEL-3555

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    5

    IEDs. The combination of the script engine with thispassword knowledge gives the SEL-3620 the ability tomanage your passwords, enforce strong passwords, andprovide audit reports of password changes.

    Figure 9 SEL-3620 Manages Passwords

    Time DistributionSynchronize all your devices with the SEL-3620,regardless of whether these devices understand NTP orIRIG. The SEL-3620 synchronizes to and sources bothIRIG-B and NTP.

    Figure 10 SEL-3620 Distributes Time

    Functional DescriptionCryptographic Message ProtectionIPsec VPN initiation requires that three tasks beperformed: the two peers must authenticate each other,the IKE security associations (SAs) must be established,and the IPsec SAs must be established. Uponestablishment of the IPsec SAs, the SEL-3620 transmitsall messages that route through this “tunnel” within anEncapsulating Security Payload. The SEL-3620performs all of these steps when it connects to any peerIPsec-enabled device.

    Security associations are shared pieces of informationthat we can use to secure communications channels. AnSA includes the encryption and authenticationalgorithms the channel uses along with their respectivekeys. An Internet Key Exchange (IKE) SA defines thesecure channel on which IPsec SA negotiation takesplace. An IPsec SA defines the communicationsparameters that will be in use for communication acrossa VPN. The SEL-3620 contains preconfigured settings in“Profiles” to simplify connecting to non-SEL devices.

    Figure 11 VPN Establishment

    Encryption ensures that communications are confidentialand only readable by authorized parties. The SEL-3620uses the IPsec Encapsulating Security Protocol to protectthe entire original packet, including both the header and

    the payload. This prevents the possibility of informationleakage about the structure of your protected networks.The hardware-accelerated encryption algorithms theSEL-3620 supports are AES, 3DES, and Blowfish.

    Figure 12 Cryptographic Message Protection

    SEL-351

    SEL-2411

    Password Change Report

    03/9/2011

    SEL-351:

    SEL-2411:

    ACC: F*XhG0X):02AC:$ktn>H3Hf1

    ACC: Buhy&32k6Q2AC: kO0%v03{sP

    SEL-3620

    SEL-3555

    SEL-351

    SEL-2407

    SEL-3620

    SEL-3620 SEL-3620

    1. Authenticate Peers2. Establish IKE SA3. Establish IPsec SA

    4. Encrypt Messages

    SEL-3620 T#5sk [email protected]”Hello World!

  • SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

    6

    Device AuthenticationThe SEL-3620 can use either X.509 certificates or pre-shared keys for authentication of another party over anetwork. The X.509 certificate confirms that the party atthe opposite end of the tunnel is an entity with whom theSEL-3620 has approval to communicate. The SEL-3620accepts both self-signed X.509 certificates and X.509certificates that have been signed by a CertificateAuthority (CA).

    The SEL-3620 uses OCSP to check the status of X.509certificates. When the SEL-3620 receives a connectionrequest along with a certificate signed by a CA, it willpoll an OCSP server to verify that the certificate is good.There are three possible responses the OCSP server cansupply: good, revoked, and unknown. If the SEL-3620receives a response other than good, it will deny theconnection request.

    Centralized User-Based Access ControlThe security proxy services in the SEL-3620 provideuser-based access to protected serial and Ethernet IEDs.Figure 13 illustrates this process. A user needing toaccess a protected IED will first access the SEL-3620.The SEL-3620 will then prompt for the user's usernameand password. The SEL-3620 will verify the providedcredentials with a centralized server and obtain the user'spermissions. These permissions then determine whichdevices and access levels the user has authorization toaccess. The SEL-3620 connects to the IED which theuser wants to access, and joins the sessions with the userand the IED.

    Figure 13 Central User Authentication

    Maintaining logs of user activity is very important forauditing purposes. The SEL-3620 monitors all useractivity and logs each session to a locally stored file. Atthe same time, the SEL-3620 generates syslog messages,

    indicating the start of a session and the end of a session,to alert that activity has taken place. Users withappropriate privileges can export the user log files forlater examination as necessary.

    Authenticated, authorized, and recorded session

    Connect to IED

    Connect to communications processor

    Request IED access

    Successful

    authentication

    Credentials verified

    and authorization

    Verify credentials

    Provide credentials

    Request credentials

    Provide access

    Substation Engineering Access

    SecurityGateway

    DomainController

    CommunicationsProcessor IED

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    7

    Multiple Access MethodsUsers have multiple methods of accessing IEDs toprovide flexibility for various types of software. SSH andTelnet provide a command line interface to protecteddevices through the SEL-3620. You can also mapspecific TCP and UDP ports to physical serial ports.

    SyslogThe SEL-3620 uses the syslog format to log events.These logs contain several fields that indicate eventseverity, event origin, the type of event that occurred, anddetails regarding the cause of the event. Additionally, theevent message contains such event tracking informationas the entity that triggered the event and the time anddate of the event. The SEL-3620 maintains an internalrecord of as many as 60,000 event logs in nonvolatilememory, and it generates, stores, and forwards syslogmessages to multiple destinations.

    SNMPSimple Network Management Protocol (SNMP) supporton the SEL-3620 allows administrators to query somestate information from the device, as well as to receivenotifications (traps) for events that indicate a deviceintegrity fault, such as SELinux audit messages, andwhitelist integrity failures. The Management InformationBase (MIB) provides information about data and trapsavailable via SNMP. The MIB can be downloaded as azip file from the SEL-3620 from the SNMP Settingspage on the web management interface.

    FirewallTo protect your private network from malicious traffic,the stateful firewall in the SEL-3620 denies all traffic bydefault. Explicitly identifying traffic that the SEL-3620permits makes it far less likely that the SEL-3620 willoverlook specific types of traffic.

    Secure ManagementConfiguration of the SEL-3620 occurs through a secureweb management interface that uses HTTPSincorporating transport layer security (TLS). Mutualauthentication takes place before a secure webmanagement session opens. The device uses an X.509server-side certificate to authenticate to the user, and theuser uses a username and password to authenticate to thedevice. The SEL-3620 then restricts users to actions forwhich they have authorization through their accountassignments. There are two roles: administrator andtechnician. The technician may perform any task on theSEL-3620 except create or edit user accounts, modifydate/time settings, or reset, halt, or reboot the device.Administrators may perform any action on theSEL-3620, including creating and editing all accounts onthe box.

    Web management provides simple-to-use graphicconfiguration pages that display the gatewayconfiguration through network diagrams. You can usethis to confirm that all configurations are as you intend.The web interface supplies you a single place fromwhich you can retrieve all communications channelinformation and network diagrams associated with theSEL-3620. The device also features a basic command-line interface Service Port that allows for the automationof configuration base-lining. The Service Port is read-only and requires administrative credentials to access.

  • SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

    8

    Figure 14 Web Management Dashboard

    Mechanical Diagrams and Dimensions

    Figure 15 Front-Panel Diagrams

    i4468e

    USB BUSB AETH F

    TX

    RX

    21

    1716151413121110987654321

    LAMPTEST

    ENABLED

    ALARM

    LNK

    RX

    TX

    SEL-3620 ETHERNET SECURITY GATEWAY

    i4467f

    USB BUSB AETH F

    TX

    RX

    21

    1716151413121110987654321

    LAMPTEST

    ENABLED

    ALARM

    LNK

    RX

    TX

    SEL-3620 ETHERNET SECURITY GATEWAY

    Rack Mount

    Panel Mount

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    9

    Figure 16 Rear-Panel Diagrams

    Figure 17 SEL-3620 Dimensions

    Copper Ethernet

    Fiber Ethernet

    i4731c

    INIRIG–B

    ETH 1 ETH 2

    COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4

    COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12

    OUT

    190

    -29

    97-

    01

    —+ SHIE

    LD

    –TX

    +T

    X

    +R

    X

    –RX

    COM 17IRIG-BOUT

    GNDA09

    POWERIN101 OUT101

    + —

    i4732c

    INIRIG–B

    ETH 1 ETH 2

    COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4

    COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12

    OUT

    190

    -29

    97-

    01

    —+ SHIE

    LD

    –TX

    +T

    X

    +R

    X

    –RX

    COM 17IRIG-BOUT

    GNDA09

    POWERIN101 OUT101

    + —

    i4985a

    INIRIG–B

    ETH 1 ETH 2

    COM 5 COM 6 COM 7 COM 8COM 1 COM 2 COM 3 COM 4

    COM 13 COM 14 COM 15 COM 16COM 9 COM 10 COM 11 COM 12

    OUT

    190

    -29

    97-

    01

    —+ SHIE

    LD

    –TX

    +T

    X

    +R

    X

    –RX

    COM 17IRIG-BOUT

    GNDA09

    POWERIN101 OUT101

    + —

    Mixed Ethernet

  • SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

    10

    Specifications

    Compliance

    Designed and manufactured under an ISO 9001 certified quality management system

    CE Mark

    Networking

    Web Management

    Protection Protocols: HTTPS, TLS

    Authentication: X.509 and Username/Password

    Encryption Key Strength: 128-bit, 256-bit

    Virtual Private Networks

    Maximum Throughput: 87 Mbps

    Maximum Concurrent Sessions: 16

    Protection Protocols: IPsec

    Key Exchange: IKEv1, IKEv2

    Authentication: Passphrase, X.509, OCSP

    Accelerated Encryption Algorithms: AES

    Nonaccelerated Encryption Algorithms: 3DES, Blowfish

    Encryption Key Strength: 128-bit, 256-bit

    Routing Functions

    Static Routing

    Network Address Translation: Port Forwarding (DNAT)

    Network Address Translation: Outbound NAT (SNAT)

    Ethernet Protocols

    Address Resolution Protocol (ARP)

    Dynamic Host Configuration Protocol (DHCP) Client

    Encapsulating Security Payload (ESP)

    File Transfer Protocol (FTP)

    Hypertext Transfer Protocol Secure (HTTPS)

    Internet Control Message Protocol (ICMP)

    Internet Key Exchange (IKEv1/v2)

    Internet Protocol Security (IPsec) Protocol Suite

    Internet Secure Association and Key Management Protocol (ISAKMP)

    Lightweight Directory Access Protocol (LDAP) Client

    Modbus TCP/IP

    Network Time Protocol (NTP) Client/Server

    Online Certificate Revocation Protocol (OCSP)

    Remote Authentication Dial-In User Service (RADIUS)

    Secure Shell (SSH) Client/Server

    Simple Network Management Protocol (SNMP)

    Spanning Tree Protocol (STP)

    Syslog

    Telnet

    Transmission Control Protocol (TCP)

    Transport Layer Security (TLS)

    User Datagram Protocol (UDP)

    VLANS

    As many as 4 VLANs per network interface

    Security

    User-Based Accounts

    Maximum Local Accounts: 256

    Password Length: 8–128 characters

    Password Set: All printable ASCII characters

    User Roles: Administrative and Technician

    Syslog

    Storage for 60,000 messages

    Forwarding to 3 destinations

    Firewall

    Implementation: iptables

    As many as 1000 user-specified rules supported

    General

    Operating Temperature Range

    –40° to +85°C (–40° to +185°F)Note: Not applicable to UL applications.

    Operating Environment

    Pollution Degree: 2

    Overvoltage Category: II

    Relative Humidity: 5–95%, non-condensing

    Maximum Altitude: 2000 m

    Dimensions

    1U Rack Mount: 482.6 mm W x 43.7 mm H x 159 mm D (19" W x 1.72" H x 6.26" D)

    1U Panel Mount: 502.9 mm W x 80 mm H x 159 mm D (19.8" W x 3.15" H x 6.26" D)

    Weight

    2.35 kg (5.2 lb)

    Warranty

    10 Years

    Processing and Memory

    Processor Speed: 533 MHz

    Memory: 1024 MB DDR2 ECC SDRAM

    Storage: 4 GB

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    11

    Time-Code Input

    IRIG accuracy depends on external GPS source

    NTP accuracy depends on network conditions

    Input Type: IRIG-B000 or B002, Even or Odd parity

    Modulated IRIG-B (BNC)

    On (1) State: Vih 3.3 Vp-p

    Off (0) State: Vil 0.1 Vp-p

    Input Impedance: 2.5 k

    Accuracy: 500 s

    Demodulated IRIG-B (BNC)

    On (1) State: Vih 2.2 V

    Off (0) State: Vih 0.8 V

    Input Impedance: 2.5 k

    Accuracy: 250 ns

    Network Time Protocol (Ethernet)

    Accuracy: 10 ms (varies)

    Time-Code Output

    IRIG accuracy depends on source accuracy

    NTP accuracy depends on network conditions

    Demodulated IRIG-B000 Even Parity (BNC and Serial)

    On (1) State: Voh 2.4 V

    Off (0) State: Vol 0.8 V

    Load: 50

    Output Drive Levels

    Demodulated IRIG-B: TTL 120 mA, 3.5 Vdc, 25

    Serial Port: TTL 2.5 mA, 2.4 Vdc, 1 k

    Network Time Protocol (Ethernet)

    Accuracy: 250 µs (ideal on LAN)

    Communications Ports

    Ethernet Ports

    Ports: 2 rear, 1 front

    Data Rate: 10 or 100 Mbps

    Front Connector: RJ45 Female

    Rear Connectors: RJ45 Female or LC Fiber (single-mode or multimode, 100 Mbps only)

    Standard: IEEE 802.3

    Fiber Optic

    100BASE-FX Multimode Option (to 2 km)

    Maximum TX Power: –14 dBm

    Minimum TX Power: –19 dBm

    RX Sensitivity: –30 dBm

    System Gain: 11 dB

    Source: LED

    Wavelength: 1300 nm

    Connector Type: LC (IEC 61754-20)

    100BASE-LX10 Single-Mode Option (to 15 km)

    Maximum TX Power: –8 dBm

    Minimum TX Power: –15 dBm

    RX Sensitivity: –25 dBm

    System Gain: 10 dB

    Source: Laser

    Wavelength: 1300 nm

    Connector Type: LC (IEC 61754-20)

    Serial Ports

    Type: EIA-232/EIA-422/EIA-485(software selectable)

    Data Rate: 1200 to 115200 bps

    Connectors: DB-9 Female (Ports 1–16), Isolated 8 pin (Port 17)

    Power: +5 Vdc power on Pin 1 (500 mA maximum cumulative for 16 ports)

    USB Ports

    1 Host Port: Type A (nonfunctional, for future use)

    1 Device Port: Type B (nonfunctional, for future use)

    Power Supply

    Input Voltage

    Rated Supply Voltage: 125–250 Vdc; 110–240 Vac, 50/60 Hz48–125 Vdc; 120 Vac, 50/60 Hz24–48 Vdc

    Input Voltage Range: 85–300 Vdc or 85–264 Vac38.4–137.5 Vdc or 88–132 Vac,18–60 Vdc polarity dependent

    Power Consumption

    AC:

  • SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

    12

    Leakage Current in a 500 load at Rated Voltage:

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    13

    Notes

  • SEL-3620 Data Sheet Schweitzer Engineering Laboratories, Inc.

    14

  • Schweitzer Engineering Laboratories, Inc. SEL-3620 Data Sheet

    15

  • 16

    © 2009–2016 by Schweitzer Engineering Laboratories, Inc. All rights reserved.

    All brand or product names appearing in this document are the trademark or registeredtrademark of their respective holders. No SEL trademarks may be used without writtenpermission. SEL products appearing in this document may be covered by U.S. and Foreignpatents.

    Schweitzer Engineering Laboratories, Inc. reserves all rights and benefits afforded underfederal and international copyright and patent laws in its products, including without lim-itation software, firmware, and documentation.

    The information in this document is provided for informational use only and is subject tochange without notice. Schweitzer Engineering Laboratories, Inc. has approved only theEnglish language document.

    This product is covered by the standard SEL 10-year warranty. For warranty details, visitselinc.com or contact your customer service representative.

    *PDS3620-01*

    2350 NE Hopkins Court • Pullman, WA 99163-5603 U.S.A.Tel: +1.509.332.1890 • Fax: +1.509.332.7990selinc.com • [email protected]

    SEL-3620 Data Sheet Date Code 20160715

    https://selinc.com

    Major Features and BenefitsProduct OverviewApplicationsRouting and MasqueradingSecure Communications Over Untrusted NetworksPoint-to-Point Serial Over Ethernet NetworkUser-Based Access to IEDsEthernet to Serial ConversionsPassword ManagementTime Distribution

    Functional DescriptionCryptographic Message ProtectionDevice AuthenticationCentralized User-Based Access ControlMultiple Access MethodsSyslogSNMPFirewallSecure Management

    Mechanical Diagrams and DimensionsSpecificationsselinc.com