Description Company: None


Automotive Cybersecurity Facilities

Keywords: ECU's cybersecurity, V2V cybersecurity, V2I cybersecurity, Fault Injection

Functional Components Description
Fleet of 3 MODEL CARS (VELOX CARS) that allow to evaluate safety (safety) and cybersecurity functions in the early stages of the development of automotive functions. Designed in collaboration with vehicle manufacturers, they represent the real vehicle scaled to 1: 8 0. These vehicles are composed of sensors like cameras, control units (Electronic Control Unit - ECU) and actuators capable of reproducing the behavior of real vehicles facilitating the road to highly automated driving, passing through more traditional systems such as the control of the engine. Fleet of 3 Model Cars (Velox Cars), each of them with the following Hardware and Software configuration:
- HARDWARE COMPONENTS: Losi 8IGHT-E: 1/8-Scale 4WD Buggy (Base vehicle body): - Scale: 1:8 - Length: 497 mm - Width: 308 mm - Height: 180 mm - Wheelbase: 323 – 327 mm - Wheel Size: Diameter: 83.5mm, Width: 42mm - Shock Type: 15mm Bore Threaded Composite - Drivetrain: 4WD All-Metal Shaft Driven - Motor: Fuze 1/8 Scale 2500KV Brushless Sensorless Motor - Servo: 9KG Servo, Waterproof, 23T - 2x LiPo battery pack (7.4V, 2 cells, 5000mAh) Sensory: - Ultrasonic sensor (front view) - Camera (front view) - Wheel Encoder Development Boards: - ADAS-ECU (Odroid-XU4 Board) - Development environment for advanced driver-assistance systems and autonomous driving algorithms. - Vehicle-ECU (STM32F4DISCOVERY Board): Manages all motor control (both longitude and lateral) and contains vehicle model for odometry calculation. Additional Circuit Boards: - STM-breakout board. - Power-circuit-board.
- SOFTWARE COMPONENTS: ADAS Board: - Preinstalled and Configured Linux - ROS development environment - Custom ROS Packages for basic functionality STM Board: - Control Functionality: lateral control, speed control, trajectory control, Control State Machine, Wheel encoder driver, odometry model AVES Software Diagnose and Configuration Tool. Vehicle-ECU Software Backups and ADAS-ECU Software Backups.

Use request Non-profit

Services provided:
Support platform for R + D + i projects
This platform will be used to develop R+D+i projects with a cooperative approach. Participants may use their own nodes, both individually or with third parties, in order to carry out other R+D+I projects of a different nature in relevant conditions. These projects should be mainly conducted by researchers and in a one-off case private projects may be developed. In the latter case, pay-per-use models may be contemplated for using the testbed for the aim of financing the projects amortization or maintenance.
Benchmarking, evaluation and / or certification of products and / or services
The testbed may be used to support benchmarking, evaluation or certification of goods and services. For instance, provided that Basque authorities issued a certificate, the evaluation of the products or services could be conducted on the testbed.
Training
The asset may be used as a platform for offering and developing a wide-range of training activities, as for instance, cyber-ranges. In other words, enabling access to the testbed to end users, companies offering cybersecurity training or researchers, so they can prepare and provide training or sophisticated simulation environments.
Support for awareness actions or generation of cybersecurity culture in the Automotive sector
In the event that public-private partnerships are encouraged, the testbed will enable conducting activities in order to support international events, to create scenarios for attracting talent or to promote the local companies as leaders in industrial cybersecurity.

Services:

Technical equipment
Model cars software: Fleet of 3 Model Cars (Velox Cars), each of them with the following Hardware and Software configuration:
- ADAS Board:
-- Preinstalled and Configured Linux - ROS development environment
-- Custom ROS Packages for basic functionality STM Board
-- Control Functionality: lateral control, speed control, trajectory control, Control State Machine, Wheel encoder driver, odometry model AVES Software Diagnose and Configuration Tool.
- Vehicle-ECU Software Backups and ADAS-ECU Software Backups
Model cars hardware:
- Losi 8IGHT-E: 1/8-Scale 4WD Buggy (Base vehicle body)
- Scale: 1:8 - Length: 497 mm - Width: 308 mm - Height: 180 mm
- Wheelbase: 323 – 327 mm
- Wheel Size: Diameter: 83.5mm, Width: 42mm
- Shock Type: 15mm Bore Threaded Composite
- Drivetrain: 4WD All-Metal Shaft Driven
- Motor: Fuze 1/8 Scale 2500KV Brushless Sensorless Motor
- Servo: 9KG Servo, Waterproof, 23T - 2x LiPo battery pack (7.4V, 2 cells, 5000mAh) Ultrasonic sensor (front view)
- Camera (front view)
- ADAS-ECU (Odroid-XU4 Board)
- Development environment for advanced driver-assistance systems and autonomous driving algorithms.
- Vehicle-ECU (STM32F4DISCOVERY Board): Manages all motor control (both longitude and lateral) and contains vehicle model for odometry calculation.
- Additional Circuit Boards: - STM-breakout board. - Power-circuit-board.


Industrial Blockchain Facilities

Keywords: DLT, Blockchain

Functional Components Description
The Blockchain Laboratory has a high capacity to quickly process the large amount of digitized data, obtained today, as a result of industrial processes, as well as the business logic offered by Blockchain that can lead to complex communication mechanisms between multiple Smart Contracts and in which, each of them must process complex entries in a minimum time. For this reason, this laboratory is composed of:
- DELL Servers of Deep Learning with graphic cards
- DellEMC Unity 350F Flash Storage System
- HSM device

Use request Non-profit

Services provided:
Support platform for R + D + i projects
This platform will be used to develop R+D+i projects with a cooperative approach. Participants may use their own nodes, both individually or with third parties, in order to carry out other R+D+I projects of a different nature in relevant conditions. These projects should be mainly conducted by researchers and in a one-off case private projects may be developed. In the latter case, pay-per-use models may be contemplated for using the testbed for the aim of financing the projects amortization or maintenance.
Training
The asset may be used as a platform for offering and developing a wide-range of training activities, as for instance, cyber-ranges. In other words, enabling access to the testbed to end users, companies offering cybersecurity training or researchers, so they can prepare and provide training or sophisticated simulation environments.
Support for awareness actions or generation of cybersecurity culture in DLT
In the event that public-private partnerships are encouraged, the testbed will enable conducting activities in order to support international events, to create scenarios for attracting talent or to promote the local companies as leaders in industrial cybersecurity.

Services:

Technical equipment
Deep learing servers with graphical cards. Two state-of-the-art servers with high computing capacity (DELL PowerEdge R740). Each server is composed of:
- 24 cores distributed in 2 12-core processors Intel Xeon® Xeon® Gold 6146 (3.2GHz, 12C / 24T, 24M cache, 2UPI, 165W, Turbo, HT) • Chassis with up to 8 SAS / SATA 2.5 "hard drives
- 128 GB of RAM in 4 RDIMMs of 32 GB DDR4 to 2666 MHZ • iDrac9 Enterprise with KVM for management
- 2 Solid State Hard Drives of 960 GB SSD SATA to 6G, mixed use, 2.5 "
- 1 HBA Fiber Channel 16Gb QLogic 2692 dual port
- 2 SFP + cards with four 10Gb Intel X710 ports
- 6 Fans
- 2 redundant 1600 Watt power supplies
- 1 NVIDIA Tesla P100 GPU 12GB graphics acceleration card. The graphics cards are NVIDIA PASCAL P100. 2 Switches Dell Networking S4048-ON, 48 ports 10GbE SFP + and 6 ports 40GbE QSFP +. Each switch includes 24 Twinax cables from 1 meter SFP+ to SFP+ to 10Gb
Flash storage solution:
- DellEMC Unity 350F All-Flash cab, with Intel® Xeon® processor technology, with 16 Gb FC connectivity
- Disks: 5 Flash 2.5 "1.92 TB
- Total capacity: 5 TB net
- Performance: 67500 IOPS
- The proposed composition allows a growth of more than double the current capacity thanks to the 20 free disk slots (17 TB additional net with disks of 1.92 TB), without the need for expansion trays.
- The equipment is complemented with 2 Brocade 6505 Switches from 24 ports to 16 Gb FC, 12 of them licensed and active.
Hardware security module: Hardware-based cryptographic device that generates, stores and protects cryptographic keys.

IDSOTER

Keywords: IDPS, electrical network and equipment, machine learning

Functional Components Description IDSOTER connected to a network will offer the following functionalities:
- Detection and analysis of sector-specific information and its protocols (Energy, Manufacturing, automotive, etc.)
- Non-intrusive and secure detection of:
-- Cyber incidents, including known cybersecurity attacks and possible Zero-Day attacks.
-- Any anomaly in the operation of the process that may be the result of a principle of attack, unintentional errors or even malfunction of any device in the installation.
- Comprehensive, accessible and real-time view of process and system operation.
- Reduction of response times to incidents.
- Registration of all communications for forensic analysis of any cybersecurity incident or the incorrect operation of the system itself in order to identify responsibilities.
The main building blocks that conform the system are:
- Monitoring System: in charge of non-intrusive capture of network traffic and parsing the different domain-specific protocols.
- AI powered correlation engine: the correlation engine will have an overview of the data acquired by the monitoring systems in order to identify any anomalous situation in the infrastructure. The engine combines different techniques and strategies to fulfil its mission: signatures, machine learning, etc.
- Alert Manager: alert configuration system that in the future will also allow the automation of certain preventive actions on the infrastructure.
- Dashboard: control panel that allows the monitoring and even the configuration of the system using an intuitive web interface.

Use request Non-profit/

Services provided:
Support platform for R + D + I projects
IDSOTER allows to easily capture and analyse the traffic of any industrial infrastructure. Thanks to its modular architecture it can be used to capture and parse industrial protocols for the design of artificial intelligence modules, validate the effectiveness of IDS systems and mathematical algorithms, capture real traffic from an industrial infrastructure in order to train artificial neural network, etc.
It can be used to develop R+D+I projects with a cooperative approach.
Training
The asset may be used as a platform for offering and developing a wide-range of training activities related to anomaly detection and industrial infrastructure protection, even incorporated to cyber ranges.
Consultancy
The asset may be used as a platform to support activities performed around consultancy services, allowing an analysis of the infrastructure, inventory of assets, identification of segments and conduits, etc.

Technical equipment:
- Monitoring System: It must be run on an Debian-based OS. In addition, the HW must be compliant with the specific regulations of the industrial infrastructure.
- AI powered correlation engine: A machine with at least 32GB of RAM, 1 TB of SSD Disk and at least 8 cores of CPU.

Services:


Cyber-Ranges Facilities

Keywords: Cyber-range

Functional Components Description
A cyber-range is a virtual environment that is used for the training of personnel and for the research and development of cybersecurity technology. The cyber-range includes tools that help strengthen the stability, security and performance of IT / OT systems. From the physical point of view, there is a room to host a Security Operations Center (SOC), which is the one that controls the cyber-range, and a second room that is where training and training exercises takes place. The SOC has software for monitoring, supervising and preventing IPS, IDS and SIEMS for the supervision of cyber-exercises and cyber-ranges. On the other hand, the second room includes work stations for the people that will take part in the exercises (students or researchers), screens and video walls with information on the system, as well as the physical equipment needed to replicate the different scenarios of the IT / OT network for the cyber-ranges. Concerning training, the cyber range allows to perform exercises of the type Capture The Flag (CTF) or Red-VS-Blue type. A CTF is a cybernetic challenge based of about four people that compete to attack servers and, if they manage to control, get points. In the case of Red-VS-Blue exercises, two teams are created, one that attacks a system and the other that defends it. The configuration of the exercise room is therefore flexible, so that it can be configured for one type of exercise as well as for the other.

Use request Non-profit

Services provided:
Support platform for R + D + i projects
This platform will be used to develop R+D+i projects with a cooperative approach. Participants may use their own nodes, both individually or with third parties, in order to carry out other R+D+I projects of a different nature in relevant conditions. These projects should be mainly conducted by researchers and in a one-off case private projects may be developed. In the latter case, pay-per-use models may be contemplated for using the testbed for the aim of financing the projects amortization or maintenance.
The facilities allow for the testing and experimentation in Cyber Ranges technologies and cybersecurity technologies for the detection, answer, resilience and recover.
Training
The asset may be used as a platform for offering and developing a wide-range of training activities, as for instance, cyber-ranges on the other industrial cybersecurity nodes of the BDIH. In other words, enabling access to the testbed to end users, companies offering cybersecurity training or researchers, so they can prepare and provide training or sophisticated simulation environments.
Training at individual and group levels about cyber defences, cyber-attack and forensic analysis for the Public Administration.
Support for awareness actions or generation of cybersecurity culture
In the event that public-private partnerships are encouraged, the testbed will enable conducting activities in order to support international events, to create scenarios for attracting talent or to promote the local companies as leaders in industrial cybersecurity.

Services:

Technical equipment
Security operations center:
- It is composed by the equipment from which the Cyber-range is controlled. It has monitoring, supervision and prevention software for IPS, IDS and SIEM attacks.
- It is composed by:
-- FortiSIEM FSM-2000F: SIEM-specific hardware with perpetual licensing for monitoring 100 devices and 1,000 events per second
-- 3 workstations with Dell equipment, model Optiplex 3050 Mini Tower XCTO, with Dell 22 “monitors, with the following features each workstation: * Intel Core i5-6400 processor, 4Cores 2.7 GHz * DVD +/-RW * 4GB (1x4GB) 2400MHz DDR4 * hard drive 3.5 “500GB 7200rpm SATA * extra 1GB AMD Radeon R5 430 graphics card (DP/VGA) * USB keyboard Dell KB-522 * Dell MS116 USB Optical Mouse * O.S. Español Windows 10 Pro (64bits) * 2 monitors Dell 22 “S2218H-54, 6cm (21.5 “) Black.
Cyber-range master room:
- The Cyber Range Master room is the place where Cyber Ranges are held. It allows to carry out Cyber Ranges in which up to a maximum of 10 people can participate.
- Each participant has a Workstation with a double screen to carry out the Cyber Range.
- The Cyber Range is monitored on a wall screen consisting of 10 screens of 55 “model Dell 55 Conference Room.
- Equipment to create the Cyber Ranges scenarios as: -2 3D printers with different technology: FDM FlashForge Dreamer Printer and SLA Wanhao duplicator 7 printer -Virtual Reality Equipment (VR)/Augmented Reality (AR) composed by: * Alienware Area-51 with Monitor * Virtual reality glasses brand OCULUS * Virtual reality glasses brand HTC Live
- The Cyber Range supports the use of different software for the execution of Cyber Ranges.



OPENCERT

Keywords: Assurance cases, Standards Compliance, Assurance Accountability, GSN

Functional Components Description
The current features of OpenCert include the management of information from standards and regulations, the management of assurance projects, assurance case management, and compliance management.
The main functional blocks from OpenCert are:
Reference Framework Management: Functionality related to the management of standards information as well as any other information derived from them, such as interpretations about intents, mapping between standards, etc. This functional group maintains a knowledge database about “standards & understandings”. The database is independent of the assurance projects.
Assurance Project Lifecycle Management: This functionality factorizes aspects such as the creation of assurance projects. This module manages a “project repository”, which can be accessed by the other modules.
Assurance Case Management: This group manages argumentation information in a modular fashion. It also includes mechanisms to support compositional safety assurance, and assurance patterns management. It supports the idea of the assurance case as the OMG defined “An Assurance Case is a set of auditable claims, arguments, and evidence created to support the claim that a defined system/service will satisfy the particular requirements. An Assurance Case is a document that facilitates information exchange between various system stakeholder such as suppliers and acquirers, and between the operator and regulator, where the knowledge related to the safety and security of the system is communicated in a clear and defendable way” 1 .
Evidence Management: This module manages the full life-cycle of evidences and evidence chains. This includes evidence traceability management. This module is used to store all evidenced used for regulatory accountability purposes.
Assurance Reporting: This functionality is related with the reporting and compliance levers measurement.

Use request
General version: public
Privacy compliance specialized version: commercial/

Services provided:
Support platform for R + D + I projects
The OpenCert platform was developed in the context of an R&D project and it has evolved in later R&D projects with a cooperative approach. There is an open source version being maintained inside the umbrella of the Eclipse community with different extensions developed either in collaboration with TECNALIA or by individually or third parties by themselves.
These projects should be mainly conducted by researchers and in a one-off case private projects may be developed. In the latter case, pay-per-use regulation and standards models used in the regulation database are contemplated for using the platform for the aim of financing the projects amortization or maintenance.
Benchmarking, evaluation and / or certification of products and / or services
The platform can be used to support certain activities done during the development process for certification purposes such as evidence accountability or assurance cases edition and evolution.
Training
The asset may be used as a platform for offering and developing a wide-range of training activities, as for instance, security informed safety cases or a specific security standard compliance process. In other words, enabling access to end users, companies offering cybersecurity training or researchers, so they can prepare and provide training.
Consultancy
The asset may be used as a platform to support activities performed around consultancy services around
- Privacy and GDPR appliance
- Functional safety standards such as ISO 26262, IEC 61508 appliance
- Security management related standards appliance such as IEC 62443
Support for awareness actions or generation of cybersecurity culture
In the event that public-private partnerships are encouraged, the platform could be used in a public demo showing the different assurance activities perform during the product development process in order to comply with a specific standard or to ensure that threats and or hazards have been managed, creating appealing scenarios for attracting talent or to promote the local companies as leaders in industrial cybersecurity.

Technical equipment:
Server asset:
- Computers: hard disk 50gb, RAM 2gb
- Software licenses: Windows 10 64 bits, PostgreSQL Database Server 9.3.15 or 9.4.10 version
Client asset:
- Computers: Dell Pc PRECISION 3530, 16Gb, 200Gb
- Software licenses: Windows 10 Pro 64 bits, Java Runtime Environment 1.8

Services:



SABOTAGE

Keywords: Fault injection, Simulation, Safety, Model-based Design

Functional Components Description
Model-driven and simulation-based fault injection tool to accomplish an early evaluation dependability evaluation of safety-critical systems. The framework sets up, configures, executes and analyses the simulation results. It includes a fault model library and it is possible to connect to virtual environments such as a virtual vehicle or a robot. The user, such as the safety engineer, starts configuring the fault injection experiments by creating the fault injection policy or fault list (Where should the faults be injected? What is the most appropriate fault model representing the functional failure modes? How should the faults be triggered within the system? Where should the fault effect be observed?). Then the faulty model is created, and the fault free simulation compared to the faulty ones. This means running, storing, visualizing and computing the obtained simulation traces, while comparing the results versus a pre-established safety requirement or pass/fail criterion. The Sabotage tool can be used in an early assessment of safety-critical systems. It is a tool based on the Simulation fault injection technique which involves the construction of a simulation model (Simulink) of the system under analysis. Thanks to this simulated system the verification and validation is achieved during iearly development phases.

Use request Non-profit

Services provided:
Support platform for R + D + I projects
The Sabotage tool was developed under two different European projects and it will be used to develop R+D+I project with a cooperative approach.
Benchmarking, evaluation and / or certification of products and / or services
The Sabotage tool could be used to support benchmarking, evaluation or validation of safety critical systems.
Training
This tool could be used as a platform for offering and developing several training activities, e.g. cyber-ranges to enable access to end users, companies or researchers.
Support for awareness actions or generation of Functional Safety culture in different domains
Currently, there are some domains like the automotive or aerospace ones that are widely aware about the importance of testing techniques for the verification and validation of safety. Nevertheless, other domains which are emerging strongly in the last decade such as Robotics are not aware about the safety critical risks, for example, collaborative robots. This is one of the reasons why different testbeds will be developed creating different scenarios to show these weaknesses and how to improve them.

Services:


Smart Grid Facilities

Keywords: OT Cybersecurity, Machine Learning, Honeypots

Functional Components Description
The Laboratory of Cybersecurity in the Smart Grid emulates a Software - Hardware real time communications environment of a Primary Distribution Substation, in which the electronic equipment (IEDs) that control and supervise the electrical equipment (switches, transformers, ...) have been deployed. It also simulates a Control Center, with basic functionalities, to which the Substation equipment is connected.
The laboratory allows to:
- Simulate the real communications between the different equipment and systems of the control center and the substation.
- Play a set of cyber-attacks through tools for generating penetration tests (ethical hacking).
- Test the response of equipment (RTU, SCU, protection relays, ...) and information systems (SCADA, LDAP server, ...) from external manufacturers to those attacks.
- Test the effectiveness of attack detection tools developed by external manufacturers.
The two environments (substation and control center) are connected through an Ethernet network established between two routers. This allows the management of external access to the laboratory. Both routers establish a VPN connection.
The laboratory is composed of two environments, the Control Center environment in which a SCADA has been installed that simulates the operation of the electric grid (reduced to a substation), and the Substation environment in which the electronic equipment is installed (SCU and relays of Protection).
Other complementary elements of the laboratory are:
- SECUREGRID HACKING TOOLBOX
SecureGrid Hacking Tool Box (HTB) is a tool box that allows to configure and perform different penetration tests to electronic devices of an electric substation. SecureGrid HTB is thought to be used by the equipment manufacturers to check the security level of their equipment.
- WHITEZONE
WHITEZONE prevents malware presence at the operational zone of industrial plants, restricting the access to the delimited area designed as operational zone, only to the authorised users carrying safe and identified software. This is a way of securing the industrial zone and improving the update process of the industrial production control (ICS) devices. It offers the following functionalities:
- Ensures that the information that is to be used within the operational zone by means of a USB key is secure, i.e. there is no virus or malware.
- Authenticates users manually or via an NFC card.
- Allows to choose the data that is going to be used in the protected zone and analyzes it to search for any virus or malware or any data not allowed through a multi-virus service in the cloud. If this verification is exceeded, it ejects a key "USB Whitezone ©" where the encrypted and signed data will be copied, to avoid modifications. These USB Whitezone © will be the only valid one within the protected operational zone. In addition, this component sends, in real time, all its activity to the BackEnd software.
- The Software Agent is an element that controls all USB port activity on the computer on which it is installed. If a non-Whitezone © USB device is inserted, it will be ejected immediately, making it impossible to use. If a USB Whitezone © is connected, it verifies that its contents have not been altered. If it has been altered, ejects the USB and otherwise decrypt the information contained so that the data is available. The software agent can communicate, in real time, all its activity to the BackEnd.

Use request Non-profit

Services provided:
Support platform for R + D + I projects
This platform will be used to develop R+D+i projects with a cooperative approach. Participants may use their own nodes, both individually or with third parties, in order to carry out other R+D+I projects of a different nature in relevant conditions. These projects should be mainly conducted by researchers and in a one-off case private projects may be developed. In the latter case, pay-per-use models may be contemplated for using the testbed for the aim of financing the projects amortization or maintenance.
Benchmarking, evaluation and / or certification of products and / or services
The testbed may be used to support benchmarking, evaluation or certification of goods and services. For instance, provided that Basque authorities issued a certificate, the evaluation of the products or services could be conducted on the testbed.
Training
The asset may be used as a platform for offering and developing a wide-range of training activities, as for instance, cyber-ranges. In other words, enabling access to the testbed to end users, companies offering cybersecurity training or researchers, so they can prepare and provide training or sophisticated simulation environments.
Support for awareness actions or generation of cybersecurity culture in the Smart Grid
In the event that public-private partnerships are encouraged, the testbed will enable conducting activities in order to support international events, to create scenarios for attracting talent or to promote the local companies as leaders in industrial cybersecurity.

Technical equipment:
Control center:
- Router: allows to establish a VPN connection with the router of the substation.
- Internal Switch: connects all computers in the control center.
- SCADA equipment: it contains the monitoring and control software (SCADA) of the substation. It also allows to modify the configuration on the IEDs from the Control Center.
- Computer LDAP and NTP servers: this equipment houses the different servers that are accessed from the IEDs of the substation.
- Server running the services:
-- LDAP: performs management of the control, access (authentication and authorization) of users and information systems to the IEDS.
-- NTP: provides the time synchronization service.
Substation:
- Router: allows to establish a VPN connection with the router of the control center.
- Substation Control Unit (SCU): it makes the functions of a remote unit by stablishing the communication with the SCADA of the control center through the Telecontrol IEC 60870-5-104 Telecontrol protocol. Other protocols that are accepted are the Modbus TCP and the DNP3-TCP. On the other hand, it also makes the client functions 61850 of the protection relays through the protocol IEC-61850.
- Industrial Switch: connects all IEDs by setting up the substation Bus.
- Protection relays: perform the protection functions of the electrical equipment (switches, transformers, ...). These relays implement the Protocol IEC-61850, which allows them to receive the electrical signals generated by the team OMICRON.
- CMC 850, communicate with the SCU, and launch GOOSE between them.
- Power supplies: those relays whose power supply is in continuous (VCC) are equipped with their corresponding power supply.
- SCADA equipment. It contains the monitoring and control software (SCADA) of the substation. It also allows to modify the configuration of the IEDs from the Control Center.
- OMICRON - CMC 850: allows to simulate up to 3 merging units, electrical data acquisition equipment of the substation. This equipment is connected to the TCP/IP protection relays via the substation Bus.
- OMICRON - CMC 256: alllows to simulate electrical signals and connect them directly to the protection relays through the digital input and output connections. In addition, it allows to simulate the activity of switches.

Services: