{"id":255336,"date":"2024-10-19T16:52:43","date_gmt":"2024-10-19T16:52:43","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62351-72017\/"},"modified":"2024-10-25T12:19:47","modified_gmt":"2024-10-25T12:19:47","slug":"bs-en-62351-72017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62351-72017\/","title":{"rendered":"BS EN 62351-7:2017"},"content":{"rendered":"
IEC 62351-7:2017 defines network and system management (NSM) data object models that are specific to power system operations. These NSM data objects will be used to monitor the health of networks and systems, to detect possible security intrusions, and to manage the performance and reliability of the information infrastructure. The goal is to define a set of abstract objects that will allow the remote monitoring of the health and condition of IEDs (Intelligent Electronic Devices), RTUs (Remote Terminal Units), DERs (Distributed Energy Resources) systems and other systems that are important to power system operations. This new edition constitutes a technical revision and includes the following significant technical changes with respect to IEC TS 62351-7 (2010): NSM object data model reviewed and enriched; UML model adopted for NSM objects description; SNMP protocol MIBs translation included as Code Components. The Code Components included in this IEC standard are also available as electronic machine readable file at: \/2.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4 Abbreviated terms and acronyms <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5 Overview of Network and System Management (NSM) 5.1 Objectives <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.2 NSM concepts 5.2.1 Simple Network Management Protocol (SNMP) 5.2.2 ISO NSM categories Figures Figure 1 \u2013 Example of a power system SCADA architecture extended with NSM Data Objects <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.2.3 NSM \u201cdata objects\u201d for power system operations 5.2.4 Other NSM protocols 5.3 Communication network management 5.3.1 Network configuration <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.3.2 Network backup 5.3.3 Communications failures and degradation <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.4 Communication protocols 5.5 End systems management <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.6 Intrusion detection systems (IDS) 5.6.1 IDS guidelines Figure 2 \u2013 IDS Information exchange between applications:generic communication topology <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.6.2 IDS: Passive observation techniques 5.6.3 IDS: Active security monitoring architecture with NSM data objects <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.7 End-to-end security 5.7.1 End-to-end security concepts Figure 3 \u2013 Active security monitoring architecture with NSM data objects <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.7.2 Role of NSM in end-to-end security <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Figure 4 \u2013 Comparison of NSM data objects with IEC 61850 objects Figure 5 \u2013 Management of both the power system infrastructure and the information infrastructure <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.8 NSM requirements: detection functions 5.8.1 Detecting unauthorized access 5.8.2 Detecting resource exhaustion as a denial of service (DoS) attack <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.8.3 Detecting invalid buffer access DoS attacks 5.8.4 Detecting tampered\/malformed PDUs 5.8.5 Detecting physical access disruption 5.8.6 Detecting invalid network access <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.8.7 Detecting coordinated attacks 5.9 Abstract object and agent UML descriptions 5.9.1 Purpose of UML <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 5.9.2 Abstract types and base types Figure 6 \u2013 Abstract types <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.9.3 Enumerated Types 5.9.4 Abstract agents Figure 7 \u2013 Enumerated types <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Figure 8 \u2013 Subagents <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Figure 9 \u2013 Environmental agent Figure 10 \u2013 Model stereotypes <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.9.5 Unsolicited Event Notification 5.9.6 UML Model extension 5.10 Abstract Object UML translation to SNMP 5.10.1 Simple Network Management Protocol (SNMP) <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.10.2 Management information bases (MIBs) Figure 11 \u2013 Object identifier structure <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 5.11 SNMP mapping of UML model Objects <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.12 SNMP Security Figure 12 \u2013 SNMP table <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Figure 13 \u2013 SNMP RFCs map and security <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 6 Abstract objects 6.1 General Figure 14 \u2013 SNMP Entity <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 6.2 Package Abstract Types 6.2.1 General 6.2.2 BooleanValue 6.2.3 BooleanValueTs 6.2.4 CounterTs Tables Table 1 \u2013 Attributes of Abstract Types::BooleanValue Table 2 \u2013 Attributes of Abstract Types::BooleanValueTs <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 6.2.5 CntRs 6.2.6 Floating 6.2.7 FloatingTs Table 3 \u2013 Attributes of Abstract Types::CounterTs Table 4 \u2013 Attributes of Abstract Types::CntRs Table 5 \u2013 Attributes of Abstract Types::Floating <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.2.8 EntityIndex 6.2.9 Integer 6.2.10 IntegerTs Table 6 \u2013 Attributes of Abstract Types::FloatingTs Table 7 \u2013 Attributes of Abstract Types::EntityIndex Table 8 \u2013 Attributes of Abstract Types::Integer Table 9 \u2013 Attributes of Abstract Types::IntegerTs <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 6.2.11 InetAddress 6.2.12 InetAddressType 6.2.13 MacAddress 6.2.14 Selector Table 10 \u2013 Attributes of Abstract Types::InetAddress Table 11 \u2013 Attributes of Abstract Types::InetAddressType Table 12 \u2013 Attributes of Abstract Types::MacAddress <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 6.2.15 Timestamp 6.2.16 CharString 6.2.17 CharStringTs 6.2.18 AbstractBaseType root class Table 13 \u2013 Attributes of Abstract Types::Selector Table 14 \u2013 Attributes of Abstract Types::Timestamp Table 15 \u2013 Attributes of Abstract Types::CharString Table 16 \u2013 Attributes of Abstract Types::CharStringTs <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 6.2.19 AbstractAgent root class 6.3 Package EnumeratedTypes 6.3.1 General 6.3.2 AppDatStKind enumeration 6.3.3 PhyHealthKind enumeration 6.3.4 ExtKind enumeration Table 17 \u2013 Literals of EnumeratedTypes::AppDatStKind Table 18 \u2013 Literals of EnumeratedTypes::PhyHealthKind <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 6.3.5 IntKind enumeration 6.3.6 LnkKind enumeration 6.3.7 PSPAccKind enumeration 6.3.8 ProtIdKind enumeration Table 19 \u2013 Literals of EnumeratedTypes::ExtKind Table 20 \u2013 Literals of EnumeratedTypes::IntKind Table 21 \u2013 Literals of EnumeratedTypes::LnkKind Table 22 \u2013 Literals of EnumeratedTypes::PSPAccKind <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 6.3.9 EventKind enumeration 6.3.10 TimSyncIssueKind enumeration Table 23 \u2013 Literals of EnumeratedTypes::ProtIdKind Table 24 \u2013 Literals of EnumeratedTypes::EventKind Table 25 \u2013 Literals of EnumeratedTypes::TimSyncIssueKind <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.3.11 SecurityProfileKind enumeration 6.3.12 TimSyncSrcKind enumeration 6.3.13 AppDatStType Table 26 \u2013 Literals of EnumeratedTypes::SecurityProfileKind Table 27 \u2013 Literals of EnumeratedTypes::TimSyncSrcKind <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.3.14 PhyHealthType 6.3.15 ExtType 6.3.16 IntType 6.3.17 EventType Table 28 \u2013 Attributes of EnumeratedTypes::AppDatStType Table 29 \u2013 Attributes of EnumeratedTypes::PhyHealthType Table 30 \u2013 Attributes of EnumeratedTypes::ExtType Table 31 \u2013 Attributes of EnumeratedTypes::IntType <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 6.3.18 PSPAccType 6.3.19 ProtIdType 6.3.20 TimSyncIssueType 6.3.21 SecurityProfileType Table 32 \u2013 Attributes of EnumeratedTypes::EventType Table 33 \u2013 Attributes of EnumeratedTypes::PSPAccType Table 34 \u2013 Attributes of EnumeratedTypes::ProtIdType Table 35 \u2013 Attributes of EnumeratedTypes::TimSyncIssueType <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 6.3.22 TimSyncSrcType 6.3.23 LnkType 7 Agents 7.1 Package Overview Table 36 \u2013 Attributes of EnumeratedTypes::SecurityProfileType Table 37 \u2013 Attributes of EnumeratedTypes::TimSyncSrcType Table 38 \u2013 Attributes of EnumeratedTypes::LnkType <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Figure 15 \u2013 Class diagram Overview::Part7 Classes Overview <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.2 Package Environmental Agent 7.2.1 General Figure 16 \u2013 Class diagram Environmental Agent::Environmental <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 7.2.2 Environmental 7.2.3 PSUPEntry Table 39 \u2013 Attributes of Environmental Agent::Environmental Table 40 \u2013 Attributes of Environmental Agent::PSUPEntry <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 7.2.4 Notification 7.2.5 SecurityNotification Table 41 \u2013 Attributes of Environmental Agent::Notification Table 42 \u2013 Attributes of Environmental Agent::SecurityNotification <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 7.3 Package IED Agent 7.3.1 General Figure 17 \u2013 Class diagram IED Agent::IED <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 7.3.2 IED Table 43 \u2013 Attributes of IED Agent::IED <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 7.3.3 CPUEntry Table 44 \u2013 Attributes of IED Agent::CPUEntry <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 7.3.4 EXTEntry 7.3.5 STOREEntry Table 45 \u2013 Attributes of IED Agent::EXTEntry Table 46 \u2013 Attributes of IED Agent::STOREEntry <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 7.3.6 Notification 7.3.7 SecurityNotification 7.4 Package Application Protocols Agents 7.4.1 General Table 47 \u2013 Attributes of IED Agent::Notification Table 48 \u2013 Attributes of IED Agent::SecurityNotification <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 7.4.2 Package Common objects Figure 18 \u2013 Class diagram Common objects::Application Protocol common objects Table 49 \u2013 Attributes of Common objects::CommonProtocolInfo <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 7.4.3 Package IEEE 1815 and IEC 60870-5 Agent <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | Figure 19 \u2013 Class diagram IEEE 1815 and IEC 60870-5 Agent::IEEE 1815 and IEC 60870 Agent Relationships <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | Table 50 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPProtocolInfo <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | Table 51 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::Association <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Table 52 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::Summary <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | Table 53 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPSecurityNotification Table 54 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::60870andDNPNotification <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Table 55 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::MasterAssociation <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Table 56 \u2013 Attributes of IEEE 1815 and IEC 60870-5 Agent::OutstationAssociation <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 7.4.4 Package IEC61850 Agent <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Figure 20 \u2013 Class diagram ACSI::ACSI <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Table 57 \u2013 Attributes of ACSI::ACSISummary <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | Figure 21 \u2013 Class diagram MMS::MMS <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Table 58 \u2013 Attributes of MMS::MMSProtocolInfo <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Table 59 \u2013 Attributes of MMS::MMSProvider <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | Table 60 \u2013 Attributes of MMS::MMSAssociation <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | Table 61 \u2013 Attributes of MMS::MMSSecurityNotification Table 62 \u2013 Attributes of MMS::MMSNotification <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | Figure 22 \u2013 Class diagram SV and GSE common objects::SV and GSE common objects Table 63 \u2013 Attributes of SV and GSE common objects::GSEandSVCommon <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | Table 64 \u2013 Attributes of SV and GSE common objects::GSEandSVPublisherAssociation Table 65 \u2013 Attributes of SV and GSE common objects::GSEandSVSubscriberAssociation <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Figure 23 \u2013 Class diagram SV::SV <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | Table 66 \u2013 Attributes of SV::SVProvider Table 67 \u2013 Attributes of SV::SVPublisherAssociationIP <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | Table 68 \u2013 Attributes of SV::SVPublisherAssociationL2 Table 69 \u2013 Attributes of SV::SVSubcriberAssociationIP <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | Table 70 \u2013 Attributes of SV::SVSubcriberAssociationL2 Table 71 \u2013 Attributes of SV::SVNotification <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | Figure 24 \u2013 Class diagram GSE::GSE <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | Table 72 \u2013 Attributes of GSE::GSESubscriberAssociation Table 73 \u2013 Attributes of GSE::GSEProvider <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | Table 74 \u2013 Attributes of GSE::GSEPublisherAssociationIP Table 75 \u2013 Attributes of GSE::GSEPublisherAssociationL2 <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | Table 76 \u2013 Attributes of GSE::GSESubcriberAssociationIP Table 77 \u2013 Attributes of GSE::GSESubscriberAssociationL2 <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | Table 78 \u2013 Attributes of GSE::GSENotification <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 7.5 Package Interfaces Agent 7.5.1 General Figure 25 \u2013 Class diagram Interfaces Agent::Interfaces <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 7.5.2 Interface 7.5.3 Interfaces Table 79 \u2013 Attributes of Interfaces Agent::Interface <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Table 80 \u2013 Attributes of Interfaces Agent::Interfaces <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 7.5.4 ETHEntry 7.5.5 KEYEntry Table 81 \u2013 Attributes of Interfaces Agent::ETHEntry Table 82 \u2013 Attributes of Interfaces Agent::KEYEntry <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 7.5.6 SEREntry 7.5.7 ALGEntry Table 83 \u2013 Attributes of Interfaces Agent::SEREntry Table 84 \u2013 Attributes of Interfaces Agent::ALGEntry <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 7.5.8 USBEntry 7.5.9 Notification Table 85 \u2013 Attributes of Interfaces Agent::USBEntry Table 86 \u2013 Attributes of Interfaces Agent::Notification <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 7.6 Package Clocks Agent 7.6.1 General 7.6.2 Clock Figure 26 \u2013 Class diagram Clocks Agent::Clocks Agent Table 87 \u2013 Attributes of Clocks Agent::Clock <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 7.6.3 ClockEntry Table 88 \u2013 Attributes of Clocks Agent::ClockEntry <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 7.6.4 SecurityNotification 7.7 Network and Transport Agents 7.7.1 TCP 7.7.2 User Datagram Protocol (UDP) 7.7.3 IP Table 89 \u2013 Attributes of Clocks Agent::SecurityNotification <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 8 SNMP security 9 Secured time synchronization <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | Annex A (normative) SNMP MIB Mapping <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | Annex B (informative) Mapping of relevant IEC 61850 Objects Table B.1 \u2013 IEC 61850-7-4 objects mapping <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communications security – Network and System Management (NSM) data object models<\/b><\/p>\n |