{"id":255336,"date":"2024-10-19T16:52:43","date_gmt":"2024-10-19T16:52:43","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62351-72017\/"},"modified":"2024-10-25T12:19:47","modified_gmt":"2024-10-25T12:19:47","slug":"bs-en-62351-72017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62351-72017\/","title":{"rendered":"BS EN 62351-7:2017"},"content":{"rendered":"

IEC 62351-7:2017 defines network and system management (NSM) data object models that are specific to power system operations. These NSM data objects will be used to monitor the health of networks and systems, to detect possible security intrusions, and to manage the performance and reliability of the information infrastructure. The goal is to define a set of abstract objects that will allow the remote monitoring of the health and condition of IEDs (Intelligent Electronic Devices), RTUs (Remote Terminal Units), DERs (Distributed Energy Resources) systems and other systems that are important to power system operations. This new edition constitutes a technical revision and includes the following significant technical changes with respect to IEC TS 62351-7 (2010): NSM object data model reviewed and enriched; UML model adopted for NSM objects description; SNMP protocol MIBs translation included as Code Components. The Code Components included in this IEC standard are also available as electronic machine readable file at: \/2.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
9<\/td>\nCONTENTS <\/td>\n<\/tr>\n
15<\/td>\nFOREWORD <\/td>\n<\/tr>\n
17<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
19<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
20<\/td>\n4 Abbreviated terms and acronyms <\/td>\n<\/tr>\n
21<\/td>\n5 Overview of Network and System Management (NSM)
5.1 Objectives <\/td>\n<\/tr>\n
22<\/td>\n5.2 NSM concepts
5.2.1 Simple Network Management Protocol (SNMP)
5.2.2 ISO NSM categories
Figures
Figure 1 \u2013 Example of a power system SCADA architecture extended with NSM Data Objects <\/td>\n<\/tr>\n
23<\/td>\n5.2.3 NSM \u201cdata objects\u201d for power system operations
5.2.4 Other NSM protocols
5.3 Communication network management
5.3.1 Network configuration <\/td>\n<\/tr>\n
24<\/td>\n5.3.2 Network backup
5.3.3 Communications failures and degradation <\/td>\n<\/tr>\n
25<\/td>\n5.4 Communication protocols
5.5 End systems management <\/td>\n<\/tr>\n
26<\/td>\n5.6 Intrusion detection systems (IDS)
5.6.1 IDS guidelines
Figure 2 \u2013 IDS Information exchange between applications:generic communication topology <\/td>\n<\/tr>\n
27<\/td>\n5.6.2 IDS: Passive observation techniques
5.6.3 IDS: Active security monitoring architecture with NSM data objects <\/td>\n<\/tr>\n
28<\/td>\n5.7 End-to-end security
5.7.1 End-to-end security concepts
Figure 3 \u2013 Active security monitoring architecture with NSM data objects <\/td>\n<\/tr>\n
29<\/td>\n5.7.2 Role of NSM in end-to-end security <\/td>\n<\/tr>\n
30<\/td>\nFigure 4 \u2013 Comparison of NSM data objects with IEC 61850 objects
Figure 5 \u2013 Management of both the power system infrastructure and the information infrastructure <\/td>\n<\/tr>\n
31<\/td>\n5.8 NSM requirements: detection functions
5.8.1 Detecting unauthorized access
5.8.2 Detecting resource exhaustion as a denial of service (DoS) attack <\/td>\n<\/tr>\n
32<\/td>\n5.8.3 Detecting invalid buffer access DoS attacks
5.8.4 Detecting tampered\/malformed PDUs
5.8.5 Detecting physical access disruption
5.8.6 Detecting invalid network access <\/td>\n<\/tr>\n
33<\/td>\n5.8.7 Detecting coordinated attacks
5.9 Abstract object and agent UML descriptions
5.9.1 Purpose of UML <\/td>\n<\/tr>\n
34<\/td>\n5.9.2 Abstract types and base types
Figure 6 \u2013 Abstract types <\/td>\n<\/tr>\n
35<\/td>\n5.9.3 Enumerated Types
5.9.4 Abstract agents
Figure 7 \u2013 Enumerated types <\/td>\n<\/tr>\n
36<\/td>\nFigure 8 \u2013 Subagents <\/td>\n<\/tr>\n
37<\/td>\nFigure 9 \u2013 Environmental agent
Figure 10 \u2013 Model stereotypes <\/td>\n<\/tr>\n
38<\/td>\n5.9.5 Unsolicited Event Notification
5.9.6 UML Model extension
5.10 Abstract Object UML translation to SNMP
5.10.1 Simple Network Management Protocol (SNMP) <\/td>\n<\/tr>\n
39<\/td>\n5.10.2 Management information bases (MIBs)
Figure 11 \u2013 Object identifier structure <\/td>\n<\/tr>\n
40<\/td>\n5.11 SNMP mapping of UML model Objects <\/td>\n<\/tr>\n
41<\/td>\n5.12 SNMP Security
Figure 12 \u2013 SNMP table <\/td>\n<\/tr>\n
42<\/td>\nFigure 13 \u2013 SNMP RFCs map and security <\/td>\n<\/tr>\n
43<\/td>\n6 Abstract objects
6.1 General
Figure 14 \u2013 SNMP Entity <\/td>\n<\/tr>\n
44<\/td>\n6.2 Package Abstract Types
6.2.1 General
6.2.2 BooleanValue
6.2.3 BooleanValueTs
6.2.4 CounterTs
Tables
Table 1 \u2013 Attributes of Abstract Types::BooleanValue
Table 2 \u2013 Attributes of Abstract Types::BooleanValueTs <\/td>\n<\/tr>\n
45<\/td>\n6.2.5 CntRs
6.2.6 Floating
6.2.7 FloatingTs
Table 3 \u2013 Attributes of Abstract Types::CounterTs
Table 4 \u2013 Attributes of Abstract Types::CntRs
Table 5 \u2013 Attributes of Abstract Types::Floating <\/td>\n<\/tr>\n
46<\/td>\n6.2.8 EntityIndex
6.2.9 Integer
6.2.10 IntegerTs
Table 6 \u2013 Attributes of Abstract Types::FloatingTs
Table 7 \u2013 Attributes of Abstract Types::EntityIndex
Table 8 \u2013 Attributes of Abstract Types::Integer
Table 9 \u2013 Attributes of Abstract Types::IntegerTs <\/td>\n<\/tr>\n
47<\/td>\n6.2.11 InetAddress
6.2.12 InetAddressType
6.2.13 MacAddress
6.2.14 Selector
Table 10 \u2013 Attributes of Abstract Types::InetAddress
Table 11 \u2013 Attributes of Abstract Types::InetAddressType
Table 12 \u2013 Attributes of Abstract Types::MacAddress <\/td>\n<\/tr>\n
48<\/td>\n6.2.15 Timestamp
6.2.16 CharString
6.2.17 CharStringTs
6.2.18 AbstractBaseType root class
Table 13 \u2013 Attributes of Abstract Types::Selector
Table 14 \u2013 Attributes of Abstract Types::Timestamp
Table 15 \u2013 Attributes of Abstract Types::CharString
Table 16 \u2013 Attributes of Abstract Types::CharStringTs <\/td>\n<\/tr>\n
49<\/td>\n6.2.19 AbstractAgent root class
6.3 Package EnumeratedTypes
6.3.1 General
6.3.2 AppDatStKind enumeration
6.3.3 PhyHealthKind enumeration
6.3.4 ExtKind enumeration
Table 17 \u2013 Literals of EnumeratedTypes::AppDatStKind
Table 18 \u2013 Literals of EnumeratedTypes::PhyHealthKind <\/td>\n<\/tr>\n
50<\/td>\n6.3.5 IntKind enumeration
6.3.6 LnkKind enumeration
6.3.7 PSPAccKind enumeration
6.3.8 ProtIdKind enumeration
Table 19 \u2013 Literals of EnumeratedTypes::ExtKind
Table 20 \u2013 Literals of EnumeratedTypes::IntKind
Table 21 \u2013 Literals of EnumeratedTypes::LnkKind
Table 22 \u2013 Literals of EnumeratedTypes::PSPAccKind <\/td>\n<\/tr>\n
51<\/td>\n6.3.9 EventKind enumeration
6.3.10 TimSyncIssueKind enumeration
Table 23 \u2013 Literals of EnumeratedTypes::ProtIdKind
Table 24 \u2013 Literals of EnumeratedTypes::EventKind
Table 25 \u2013 Literals of EnumeratedTypes::TimSyncIssueKind <\/td>\n<\/tr>\n
52<\/td>\n6.3.11 SecurityProfileKind enumeration
6.3.12 TimSyncSrcKind enumeration
6.3.13 AppDatStType
Table 26 \u2013 Literals of EnumeratedTypes::SecurityProfileKind
Table 27 \u2013 Literals of EnumeratedTypes::TimSyncSrcKind <\/td>\n<\/tr>\n
53<\/td>\n6.3.14 PhyHealthType
6.3.15 ExtType
6.3.16 IntType
6.3.17 EventType
Table 28 \u2013 Attributes of EnumeratedTypes::AppDatStType
Table 29 \u2013 Attributes of EnumeratedTypes::PhyHealthType
Table 30 \u2013 Attributes of EnumeratedTypes::ExtType
Table 31 \u2013 Attributes of EnumeratedTypes::IntType <\/td>\n<\/tr>\n
54<\/td>\n6.3.18 PSPAccType
6.3.19 ProtIdType
6.3.20 TimSyncIssueType
6.3.21 SecurityProfileType
Table 32 \u2013 Attributes of EnumeratedTypes::EventType
Table 33 \u2013 Attributes of EnumeratedTypes::PSPAccType
Table 34 \u2013 Attributes of EnumeratedTypes::ProtIdType
Table 35 \u2013 Attributes of EnumeratedTypes::TimSyncIssueType <\/td>\n<\/tr>\n
55<\/td>\n6.3.22 TimSyncSrcType
6.3.23 LnkType
7 Agents
7.1 Package Overview
Table 36 \u2013 Attributes of EnumeratedTypes::SecurityProfileType
Table 37 \u2013 Attributes of EnumeratedTypes::TimSyncSrcType
Table 38 \u2013 Attributes of EnumeratedTypes::LnkType <\/td>\n<\/tr>\n
56<\/td>\nFigure 15 \u2013 Class diagram Overview::Part7 Classes Overview <\/td>\n<\/tr>\n
57<\/td>\n7.2 Package Environmental Agent
7.2.1 General
Figure 16 \u2013 Class diagram Environmental Agent::Environmental <\/td>\n<\/tr>\n
58<\/td>\n7.2.2 Environmental
7.2.3 PSUPEntry
Table 39 \u2013 Attributes of Environmental Agent::Environmental
Table 40 \u2013 Attributes of Environmental Agent::PSUPEntry <\/td>\n<\/tr>\n
59<\/td>\n7.2.4 Notification
7.2.5 SecurityNotification
Table 41 \u2013 Attributes of Environmental Agent::Notification
Table 42 \u2013 Attributes of Environmental Agent::SecurityNotification <\/td>\n<\/tr>\n
60<\/td>\n7.3 Package IED Agent
7.3.1 General
Figure 17 \u2013 Class diagram IED Agent::IED <\/td>\n<\/tr>\n
61<\/td>\n7.3.2 IED
Table 43 \u2013 Attributes of IED Agent::IED <\/td>\n<\/tr>\n
62<\/td>\n7.3.3 CPUEntry
Table 44 \u2013 Attributes of IED Agent::CPUEntry <\/td>\n<\/tr>\n
63<\/td>\n7.3.4 EXTEntry
7.3.5 STOREEntry
Table 45 \u2013 Attributes of IED Agent::EXTEntry
Table 46 \u2013 Attributes of IED Agent::STOREEntry <\/td>\n<\/tr>\n
64<\/td>\n7.3.6 Notification
7.3.7 SecurityNotification
7.4 Package Application Protocols Agents
7.4.1 General
Table 47 \u2013 Attributes of IED Agent::Notification
Table 48 \u2013 Attributes of IED Agent::SecurityNotification <\/td>\n<\/tr>\n
65<\/td>\n7.4.2 Package Common objects
Figure 18 \u2013 Class diagram Common objects::Application Protocol common objects
Table 49 \u2013 Attributes of Common objects::CommonProtocolInfo <\/td>\n<\/tr>\n
66<\/td>\n7.4.3 Package IEEE 1815 and IEC 60870-5 Agent <\/td>\n<\/tr>\n
67<\/td>\nFigure 19 \u2013 Class diagram IEEE 1815 and IEC 60870-5 Agent::IEEE 1815 and IEC 60870 Agent Relationships <\/td>\n<\/tr>\n
68<\/td>\nTable 50 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPProtocolInfo <\/td>\n<\/tr>\n
69<\/td>\nTable 51 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::Association <\/td>\n<\/tr>\n
71<\/td>\nTable 52 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::Summary <\/td>\n<\/tr>\n
72<\/td>\nTable 53 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPSecurityNotification
Table 54 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPNotification <\/td>\n<\/tr>\n
73<\/td>\nTable 55 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::MasterAssociation <\/td>\n<\/tr>\n
74<\/td>\nTable 56 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::OutstationAssociation <\/td>\n<\/tr>\n
75<\/td>\n7.4.4 Package IEC61850 Agent <\/td>\n<\/tr>\n
76<\/td>\nFigure 20 \u2013 Class diagram ACSI::ACSI <\/td>\n<\/tr>\n
77<\/td>\nTable 57 \u2013 Attributes of ACSI::ACSISummary <\/td>\n<\/tr>\n
78<\/td>\nFigure 21 \u2013 Class diagram MMS::MMS <\/td>\n<\/tr>\n
79<\/td>\nTable 58 \u2013 Attributes of MMS::MMSProtocolInfo <\/td>\n<\/tr>\n
80<\/td>\nTable 59 \u2013 Attributes of MMS::MMSProvider <\/td>\n<\/tr>\n
81<\/td>\nTable 60 \u2013 Attributes of MMS::MMSAssociation <\/td>\n<\/tr>\n
82<\/td>\nTable 61 \u2013 Attributes of MMS::MMSSecurityNotification
Table 62 \u2013 Attributes of MMS::MMSNotification <\/td>\n<\/tr>\n
83<\/td>\nFigure 22 \u2013 Class diagram SV and GSE common objects::SV and GSE common objects
Table 63 \u2013 Attributes of SV and GSE common objects::GSEandSVCommon <\/td>\n<\/tr>\n
84<\/td>\nTable 64 \u2013 Attributes of SV and GSE common objects::GSEandSVPublisherAssociation
Table 65 \u2013 Attributes of SV and GSE common objects::GSEandSVSubscriberAssociation <\/td>\n<\/tr>\n
85<\/td>\nFigure 23 \u2013 Class diagram SV::SV <\/td>\n<\/tr>\n
86<\/td>\nTable 66 \u2013 Attributes of SV::SVProvider
Table 67 \u2013 Attributes of SV::SVPublisherAssociationIP <\/td>\n<\/tr>\n
87<\/td>\nTable 68 \u2013 Attributes of SV::SVPublisherAssociationL2
Table 69 \u2013 Attributes of SV::SVSubcriberAssociationIP <\/td>\n<\/tr>\n
88<\/td>\nTable 70 \u2013 Attributes of SV::SVSubcriberAssociationL2
Table 71 \u2013 Attributes of SV::SVNotification <\/td>\n<\/tr>\n
89<\/td>\nFigure 24 \u2013 Class diagram GSE::GSE <\/td>\n<\/tr>\n
90<\/td>\nTable 72 \u2013 Attributes of GSE::GSESubscriberAssociation
Table 73 \u2013 Attributes of GSE::GSEProvider <\/td>\n<\/tr>\n
91<\/td>\nTable 74 \u2013 Attributes of GSE::GSEPublisherAssociationIP
Table 75 \u2013 Attributes of GSE::GSEPublisherAssociationL2 <\/td>\n<\/tr>\n
92<\/td>\nTable 76 \u2013 Attributes of GSE::GSESubcriberAssociationIP
Table 77 \u2013 Attributes of GSE::GSESubscriberAssociationL2 <\/td>\n<\/tr>\n
93<\/td>\nTable 78 \u2013 Attributes of GSE::GSENotification <\/td>\n<\/tr>\n
94<\/td>\n7.5 Package Interfaces Agent
7.5.1 General
Figure 25 \u2013 Class diagram Interfaces Agent::Interfaces <\/td>\n<\/tr>\n
95<\/td>\n7.5.2 Interface
7.5.3 Interfaces
Table 79 \u2013 Attributes of Interfaces Agent::Interface <\/td>\n<\/tr>\n
96<\/td>\nTable 80 \u2013 Attributes of Interfaces Agent::Interfaces <\/td>\n<\/tr>\n
97<\/td>\n7.5.4 ETHEntry
7.5.5 KEYEntry
Table 81 \u2013 Attributes of Interfaces Agent::ETHEntry
Table 82 \u2013 Attributes of Interfaces Agent::KEYEntry <\/td>\n<\/tr>\n
98<\/td>\n7.5.6 SEREntry
7.5.7 ALGEntry
Table 83 \u2013 Attributes of Interfaces Agent::SEREntry
Table 84 \u2013 Attributes of Interfaces Agent::ALGEntry <\/td>\n<\/tr>\n
99<\/td>\n7.5.8 USBEntry
7.5.9 Notification
Table 85 \u2013 Attributes of Interfaces Agent::USBEntry
Table 86 \u2013 Attributes of Interfaces Agent::Notification <\/td>\n<\/tr>\n
100<\/td>\n7.6 Package Clocks Agent
7.6.1 General
7.6.2 Clock
Figure 26 \u2013 Class diagram Clocks Agent::Clocks Agent
Table 87 \u2013 Attributes of Clocks Agent::Clock <\/td>\n<\/tr>\n
101<\/td>\n7.6.3 ClockEntry
Table 88 \u2013 Attributes of Clocks Agent::ClockEntry <\/td>\n<\/tr>\n
102<\/td>\n7.6.4 SecurityNotification
7.7 Network and Transport Agents
7.7.1 TCP
7.7.2 User Datagram Protocol (UDP)
7.7.3 IP
Table 89 \u2013 Attributes of Clocks Agent::SecurityNotification <\/td>\n<\/tr>\n
103<\/td>\n8 SNMP security
9 Secured time synchronization <\/td>\n<\/tr>\n
104<\/td>\nAnnex A (normative) SNMP MIB Mapping <\/td>\n<\/tr>\n
236<\/td>\nAnnex B (informative) Mapping of relevant IEC 61850 Objects
Table B.1 \u2013 IEC 61850-7-4 objects mapping <\/td>\n<\/tr>\n
237<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Power systems management and associated information exchange. Data and communications security – Network and System Management (NSM) data object models<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2018<\/td>\n240<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":255338,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-255336","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/255336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/255338"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=255336"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=255336"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=255336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}