OpenVPN

OpenVPN
OpenVPN is a virtual private network (VPN) protocol and software for both client and server applications.
It implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities enabling peer authentication using pre-shared secret keys, certificates or usernames/passwords.
- While pre-shared secret key is the easiest to implement, certificate-based is the most robust and richest in features. In version 2.0, username/password authentications can be enabled, both with or without certificates, yet it requires you to rely on third-party modules.
- It can also use the HMAC packet authentication feature to add an additional layer of security to the connection (known as HMAC firewall) and hardware acceleration to improve the encryption performance.
- When used in a multiclient-server configuration, it also allows the server to release authentication certificates for every client by using signatures and certificate authority.
- It makes strong use of the OpenSSL encryption library. As it lets OpenSSL do all the encryption and authentication work, OpenVPN can use all the ciphers available in the OpenSSL package. In combination with the TLS protocol, it can thus provide many security and control features and is also capable of traversing firewalls and network address translators (NATs).
- OpenVPN is a free software, released under the terms of the GNU General Public License version 2 (GPLv2).
- OpenVPN runs best over User Datagram Protocol (UDP) but can also run over Transmission Control Protocol (TCP) transports if UDP connections fail.
-

Ask us!
Cyber Security
IEC 62351 is a standard developed to handle the security of TC 57 series of protocols including IEC 60870–5 series, IEC 60870–6 series, IEC 61850 series, IEC 61970 series & IEC 61968 series.
The different security objectives include the authentication of data transfer through digital signatures, prevention of eavesdropping and playback as well as spoofing, and intrusion detection.
IPsec (IP for “Internet Protocol” and sec for “secure”) is a group of protocols to ensure the integrity, confidentiality and authentication of data communications over an IP network.
IPsec is commonly used as a base for VPNs (Virtual Private Networks), encrypting the IP packets and authenticating the source where the packets come from.
Terminal Access Controller Access-Control System Plus (TACACS+) is a protocol developed by Cisco to handle authentication, authorization, and accounting (AAA) services and was released as an open standard beginning in 1993.
It is an extension of its predecessor TACACS, encrypting the full content of each packet and provides granular control (command by command authorization) whilst operating over TCP.
OpenVPN is a virtual private network (VPN) protocol and software for both client and server applications.
It implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities enabling peer authentication using pre-shared secret keys, certificates or usernames/passwords.
Public key infrastructure (PKI) refers to a range of technologies for authenticating users and devices in order to secure the digital transfer of information for a range of network activities such as e‑commerce, internet banking and confidential email.
It includes a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.
Expert Cyber Security
iGrid T&D enforces several layers of security measures guided by the propositions of the IEC 62351 standard to protect its devices from all kinds of threats.
Our hardened devices feature Role Based Access Control (RBAC) to avoid intrinsic risks such as security holes and unauthorized actions by authenticated users.
In addition to end-to-end encryptions via TSL/SSL, HTTPS, SSH and standard procedures for VPNs (e.g. OpenVPN), its communication can also be secured with network control methods such as firewalls, IP filters, ACL or TCP port blocks.

iGW‑S Substation Gateway

iRTU – With I/Os for Direct Data Acquisition
Compact and scalable bay controller which can act as IEC 61850 client or server, featuring configurable I/O boards for direct data acquisition, high-precision timestamping and an optional Ethernet switch for additional Ethernet ports.

iControl SCADA
High-performance SCADA for the visualization and control of substation data. It is able to run either in client/server or standalone modes, providing advanced functionalities such as hot-standby redundancy, automatic line coloring, events notification (via e‑mail and sms), SQL logging, and reports generation.
iGrid Solutions and Applications

Automation with IEC 61850
The IEC 61850 standard is enabling new oportunities for vendor interoperability and advanced substation automation. Find out how you can take advantage of IEC 61850 with easy-to-use and adaptable solutions for a simple migration or retrofit.

HV Substation Automation
Powerful substation automation systems often handle numerous communication protocols and media within one network, which can result in expensive and complex projects. Avoid these problems with interoperable technology and smart configuration tools.

MV Distribution Grid Automation
It is often difficult to find the exact solution you need in a MV application, leading to higher costs than necessary. With our scalable and adaptable solutions you will be able to only pay for what you really need, without comprimising on quality or security.

Photovoltaic Power Station
Using an open and scalable SCADA system to monitor and control a PV plant comes with many benefits on several levels. Find out how advanced communication technology affects PV operation, maintenance, system design, investment security, profits…