{"id":408322,"date":"2024-10-20T05:30:06","date_gmt":"2024-10-20T05:30:06","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iec-ts-62351-100-62022\/"},"modified":"2024-10-26T10:00:24","modified_gmt":"2024-10-26T10:00:24","slug":"bsi-pd-iec-ts-62351-100-62022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iec-ts-62351-100-62022\/","title":{"rendered":"BSI PD IEC TS 62351-100-6:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3 Terms and definitions 4 General 4.1 General guidelines 4.2 Test methodology 4.2.1 General <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2.2 Normal procedure tests and resiliency tests 4.3 Conformance testing requirements 4.3.1 Testing within the context of an application 4.3.2 Requirements for the device under test <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.3.3 Requirements for the test facility <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.3.4 Test validation 4.4 PICS 4.5 PIXIT Tables Table 1 \u2013 PIXIT for Base Profile <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Table 2 \u2013 PIXIT for GOOSE security extension and replay testing <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Table 3 \u2013 PIXIT for SV security extension and replay testing <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4.6 Tests cases for subscriber-type DUT 4.7 Tests cases for publisher-type DUT 5 Conformity Testing for 62351-6 5.1 PICS for 62351-6 security profile Table 4 \u2013 62351-6 Subscriber Compliancy Table 5 \u2013 62351-6 Publisher Compliancy <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2 GOOSE Security Conformity Testing 5.2.1 General Table 6 \u2013 Conformance table <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Table 7 \u2013 GOOSE State Transition Tests Matrix Table 8 \u2013 L2-GOOSE and R-GOOSE Security profiles <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.2.2 Test Procedures Table 9 \u2013 Verification of GOOSE subscriber security extension <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Table 10 \u2013 Verification of GOOSE publisher security extension <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Table 11 \u2013 Verification of GOOSE Replay Requirements <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.3 SV Security Conformity Testing 5.3.1 General <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.3.2 Test Procedures Table 12 \u2013 SV State Transition Tests Matrix <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Table 13 \u2013 L2-SV and R-SV Security profiles <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Table 14 \u2013 Verification of SV Subscriber Security Extension <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table 15 \u2013 Verification of SV publisher security extension <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Table 16 \u2013 Verification of SV subscriber Replay Requirements <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6 SCL extension requirements testing <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Table 17 \u2013 Verification of SCL extensions <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Power systems management and associated information exchange. Data and communication security – Cybersecurity conformance testing for IEC 61850-8-1 and IEC 61850-9-2<\/b><\/p>\n |