Synergy Systems & Solutions (SSS)

HUSKYModel DCU E70 -Multi-Functional Computing Device

SHARE

DCU-E70 is a multi-functional computing device suitable for Industrial Automation applications, as compliant to IEC61850-3 standard. DCU-E70 offers multiple serial and Ethernet ports for connecting to SCADA/HMI systems and field devices (IEDs), along with a rich set of communication protocols. Three major models are available under the DCU- E70 series.

Most popular related searches
  • Model – AHigh performance, up to 8x Ethernet, 12x Serial Ports
  • Model – BEntry Level, with up to 2x Ethernet, 4x Serial Ports
  • Model – CMedium Level, with up to 4x Ethernet, 4x Serial Ports

DCU-E70 supports traditional copper-based interfaces like RS232, RS485, 10/100-baseT Ethernet. Fiber-optic based Ethernet interface are also available on select models.

Model B & C also feature capability to house in-built 4G modem with dual-SIM feature for wireless communications.

DCU-E70 can be used in multiple roles such as a Substation Gateway, Protocol Converter, Data Concentrator, M2M Gateway, Metering Gateway, Serial Device Server. A single unit of DCU-E70 can handle multiple devices providing a common and consistent interface to SCADA/HMI centers.

DCU supports acquisition of disturbance records and real-time status and measurements, protection events from protection devices. The DCU can also act as a remote access gateway for protection devices.

With the proliferation of public communication networks like Internet, GPRS, etc. in SCADA applications, many IEDs are now directly connected to these networks. Therefore securing these devices is a major requirement in order to prevent cyber attacks which compromise the entire application being controlled by the SCADA system.

DCU can be deployed as an electronic security perimeter (ESP) that acts like a firewall between the public networks and the IEDs.

    The DCU provides the following functions to achieve a cyber-secure network –
  • Firewall that allows only specific hosts to connect with the gateway
  • Audit Logs for user actions, connection attempts, connection denials, etc.
  • TLS VPN support
  • Secure Execution Environment which prevents execution of malware or third-party applications
  • Authenticated pass-through channels
  • Role-based Access Control