EasyManuals Logo
Home>Thytronic>Protection Device>XMR-V 4V

Thytronic XMR-V 4V User Manual

Thytronic XMR-V 4V
384 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #16 background imageLoading...
Page #16 background image
16
GENERAL
XMR Cybersecurity basic scheme
XMR protection relay configuration capabilities and monitoring functionalities set problems related
to the security and privacy of the data traffic exchanged between equipment and remote control
centre.
The aspects to consider in this regard are:
Traffic encryption, so it cannot be intercepted, analysed and eventually modified freely by third
parties
Authentication mechanism implementation in order to prevent any third parties false messages
generation avoiding that they can be recognized as valid
User access procedure
Authentication mechanism expects to send authentication requests coming inbound card to a
remote RADIUS authentication server that takes care user validation and it sends to CPU unit a
positive or negative feedback based on the fact that the credentials provided by the user are
correct or not and relevant associated user privilege level information
The RADIUS authentication as a reference to a remote server and uses a shared secret between
card and server for validation of access requests. The configurator provides the possibility to define
all parameters necessary for this authentication mode.
XMR-D EQUIPMENT MANUAL
Ed. 2.9 - 02/2021

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Thytronic XMR-V 4V and is the answer not in the manual?

Thytronic XMR-V 4V Specifications

General IconGeneral
BrandThytronic
ModelXMR-V 4V
CategoryProtection Device
LanguageEnglish

Related product manuals