The SEL UTM solution integrates a state-of-the-art firewall and dynamic routing into the rugged SEL-3355 Automation Controller, enhancing the resiliency of network communications between substations and the control center. This advanced cybersecurity system provides stateful firewall tracking, deep-packet inspection, adaptive routing, and hardware failover.
Customized to your exacting specifications by the SEL Engineering Services team and purpose-built for industrial environments, the device contains no moving parts and operates over a wide temperature range, from –40° to +75°C (–40° to +167°F).
Protect the OT Network From Malware and Unauthorized Access—Apply a stateful firewall with SEL UTM, which tracks the state of network connections (such as TCP streams and UDP communication) to increase filtering while reducing configuration needs. The firewall protects OT networks, such as substation LANs, against ransomware, trojans, viruses, and other malware and uses deep-packet inspection to detect malicious code in incoming packets from WANs. SEL UTM supports multiple network address translation (NAT) options, such as one to one, port forwarding, and outbound NAT, and supports multiple public interfaces.
Rely on Hardware Designed Specifically for OT Environments—SEL UTM uses SEL rugged automation controllers, which are tested to protective relay standards. These automation controllers have no moving parts and are designed to withstand vibration, electrical surges, fast transients, and extreme temperatures.
Enhance Resiliency With Dynamic Routing Between Substations and the Control Center—Deploy the SEL UTM solution as a dynamic edge router for the substation. The firewall supports adaptive routing protocols, such as Open Shortest Path First (OSPF), the Border Gateway Protocol (BGP), and the Route Information Protocol (RIP), to improve fault tolerance and reduce configuration needs. It also supports VPNs and is a VPN concentrator that allows multiple VPN tunnels to use a single network.
Improve Reliability With Automatic and Seamless Failover—Configure multiple SEL UTM firewalls for high availability using the Common Address Redundancy Protocol (CARP) for hardware failover. If the primary firewall fails, then the secondary firewall becomes active.
Make High-Priority OT Traffic More Deterministic—Apply traffic shaping in the SEL UTM firewall to limit bandwidth for various IT and OT applications and to prioritize network traffic. Bandwidth limitations can be configured based on the interface, IP source and destination, direction of traffic, and port numbers.
A green “ENABLED” LED indicates normal operation. The “ALARM” LED illuminates red when a nonoptimal system condition exists.
“LNK” (link) indicates that the port is connected, and “ACT” (activity) indicates when data are being transmitted and received.
Onboard independent Gigabit Ethernet interfaces.
Install SEL or third-party PCI or PCI Express expansion cards for additional network, serial, or other application-specific I/O.
The earth ground connection for the SEL-3355-2 Automation Controller.
The rated input voltage is clearly marked on the chassis near the terminals.
Protect the substation from unauthorized access by applying a stateful firewall and increased filtering while reducing configuration.
Detect and filter out malicious code with deep-packet inspection. The SEL UTM firewall offers a built-in Network Intrusion Detection System (NIDS) and Network Intrusion Prevention System (NIPS).
Add resilient edge routing—dynamic routing with adaptive routing protocols.
Allow multiple VPN tunnels to use a single network. Create a VPN concentrator.
Prioritize critical OT traffic with traffic shaping.
Flexible NAT Options
Avoid IP address overlapping by applying flexible network address translation (NAT) options.
Configure the firewall for high availability and load balancing with CARP for hardware failover.
Operate in tough conditions with SEL rugged automation controller hardware.
Expand connectivity with up to ten Ethernet ports on the SEL-3355 Automation Controller.
Shorten the configuration time using the intuitive graphical user interface.
Control user access with user authentication, including the Lightweight Directory Access Protocol (LDAP), Remote Authentication Dial-In User Service (RADIUS), and two-factor authentication.
Secure Ethernet communications using Secure Shell (SSH) and Transport Layer Security (TLS).
Time-synchronize IEDs with the Network Time Protocol (NTP).
Centralize network management with the Simple Network Management Protocol (SNMP) and Representational State Transfer (REST) application program interfaces (APIs).
Maintain event logs for remote and local events.
Streamline troubleshooting using detailed diagnostics and logging capabilities.
The Firmware IDs for older versions of the firmware can typically be found in Appendix A of the instruction manual.