SEL-3620 Ethernet Security Gateway
A router, virtual private network (VPN) endpoint, and firewall device, the SEL-3620 Ethernet Security Gateway can perform secure and proxy user access for serial and Ethernet-based intelligent electronic devices (IEDs). The SEL-3620 helps create a user audit trail through strong, centralized, user-based authentication and authorization to modern and legacy IEDs. The SEL-3620 secures your control system communications with a stateful deny-by-default firewall, strong cryptographic protocols, and logs for system awareness. The SEL-3620 also manages protected IED passwords, ensuring that passwords are changed regularly and conform to complexity rules. The SEL-3620 supports enhanced security, enabling you to protect critical cyber assets with strong multifactor authentication technologies, such as RSA SecurID® using Remote Authentication Dial-In User Service (RADIUS).
The SEL-3620 resists known and unknown malware attacks with exe-GUARD™ embedded antivirus technology. Powerful rootkit resistance, embedded Linux® mandatory access controls, and process whitelisting help mitigate attacks against the gateway itself and eliminate costly patch management and antivirus signature updates. The SEL-3620 supports NERC CIP v3 and v5 compliance efforts without needing Technical Feasibility Exceptions (TFEs).
The SEL-3620 supports SEL-5827 Virtual Connect Client and SEL-5828 Virtual Port Service software. These applications are provided free by SEL to make remote SEL-3620 ports available for existing software and terminal applications on your PC, including those using Modbus TCP/RTU.
The SEL-3620 is designed and built in cooperation with the U.S. Department of Energy National SCADA Test Bed and the following companies:
- Schweitzer Engineering Laboratories, Inc.
- EnerNex Corporation
- Tennessee Valley Authority
- Sandia National Laboratories
- Secured Proxy Access to Relays and IEDs
Use the SEL-3620 to provide a central point of entry to critical cyber assets, including those from SEL and others, with user-based access control and detailed activity logs.
- IED Password Management
Enforce strong passwords on IEDs, and have them automatically changed on a configurable schedule. Satisfy regulatory password requirements, and ensure that no weak or default passwords are in use.
- Substation Firewall
Secure your substation network from malicious traffic with a powerful deny-by-default firewall. Manage status and configuration with an intuitive, menu-driven web interface. Use virtual local-area networks (VLANs) to segregate traffic and improve network organization and performance.
- IPsec VPN
Integrate with existing IT and control systems over VPN tunnels that are secured using Internet Protocol Security (IPsec). Use X.509 certificates with Online Certificate Status Protocol (OCSP) to centrally manage VPN trust.
- Exe-GUARD Whitelist Antivirus
Protect against known and unknown malware with embedded whitelist antivirus. Reduce patch cycles and resist zero-day attacks without additional settings.
- User Activity Reports
Log and time-stamp user access events and every command. Integrate event records into existing log management systems using Syslog.
- Single Sign-On
Log on to the SEL-3620, not individual IEDs. Users have a single account and password to remember—their own. Manage user accounts and group memberships centrally using Lightweight Directory Access Protocol (LDAP)-accessible systems, such as Microsoft® Active Directory®, or use RADIUS. RADIUS allows you to enhance security with multifactor authentication, such as RSA SecurID.
- Support NERC CIP Requirements
Implement strong user-based access controls to the electronic security perimeter (ESP) while protecting IEDs with strong passwords and blocking shared or default accounts. Granular access controls limit users’ access to their assigned roles on individual IEDs.
- Industry-Vetted Security and Interoperability
- IRIG-B time synchronization receives and distributes the IRIG-B signal to maintain time synchronization.
- X.509 certificates ensure strong authentication for incoming connection requests.
- OCSP certificate revocation operates with standard certificate servers to centrally revoke certificates and prevent unwanted connections.
- HTTPS web interface allows convenient, secure setup and management, and eliminates the need for extra PC software.
- Syslog logs events for consistency and compatibility, and enables centralized collection.
- IPsec (RFC 4301, 4302, 4303) creates a secure VPN.
- Lemnos interoperability facilitates communications between Cisco® routers and Lemnos-compliant devices.
- Virtual Software Client Support
Transform unsecured serial or legacy Ethernet communications on Windows® computers to cryptographically secure channels by using SEL-5827 Virtual Connect Client or SEL-5828 Virtual Port Service software. These applications are provided free by SEL to make remote SEL-3620 ports available for existing software and terminal applications on your PC, including those using Modbus TCP/RTU. Data are secured using SSH with SEL-3620 port groups, Master Ports, and serial ports.
Apply IPsec for Secure Site-to-Site Communications.
Utilize Robust, Secure Engineering Access to IEDs.
Use Highly-Configurable Port Mappings.
Use Centralized Authentication With LDAP.
Use Centralized Accounts to Access Relays.
Support High Availability at the Substation.
Provide Substation Time Synchronization.
Provide Granular User Activity Reports.
Integrate with Centralized Logging Infrastructure.
SEL University Training
- APP 3620: Sensible Cybersecurity Using the Ethernet Security Gateway
To effectively mitigate evolving cyberthreats, the cybersecurity posture of the modern substation must be aligned with modern defense-in-depth strategies. APP 3620 is designed to bridge the gap between foundational cybersecurity competencies and practical application.
- COM 203: SEL Cybersecurity Best Practices for Critical Infrastructure
If modern substation design is implemented poorly and lacks adequate cybersecurity, it can be vulnerable to cyberattack and exploitation. A lack of cybersecurity will eventually lead to decreased power system reliability. Cybersecurity is a key component of enhanced power system reliability and operation.
Access drawings via the Online Product Configuration link in the Ordering Information box at the top right of this page (below the product photo).
From the Product Configuration page, configure your product or enter your part number via the Universal Part Number Reverse Lookup. Then download custom .dwg or .pdf files specific to your product.
You may also go directly to the Product Configuration page to make a product selection.