Access restrictions

Mixed encryption authentication

Defend against attacks

IEC 61850 protocol with AES algorithm

×

×

×

IEC 61850 protocol with DES algorithm

×

×

×

IEC 61850 protocol with W-EAP algorithm