DNP3

Aggressive Mode

In Geo SCADA Expert, Aggressive Mode is enabled by default on DNP3 outstations that use DNP3 Secure Authentication. This is because Aggressive Mode provides:

With Aggressive Mode, the device that sends the critical request or response anticipates a challenge to that request or response. For this reason, it includes the necessary authentication data in the original message.

The receiving device (the ‘Challenger’) has no need to issue a challenge as it has already received the data with which to authenticate the request. The receiving device authenticates the request to confirm that the critical request has genuinely come from that particular DNP3 device. Providing that the message is authentic, the device performs the critical request and sends the appropriate response to the sending device (the ‘Responder’). If the message is not authentic, the receiving device rejects the critical request. The device may then send a diagnostics message indicating a possible security attack.

Aggressive Mode is directional, which means it is applied separately in each direction - ‘Master Station to Outstation’ and ‘Outstation to Master Station’. As Aggressive Mode is directional:

Communications might cease, for example, due to a server changeover or driver shutdown in the case of direct communications, or at the end of a PSTN call in the case of PSTN communications.

Further Information

Specify whether Geo SCADA Expert accepts Aggressive Mode requests from, or issues Aggressive Mode requests to a DNP3 master outstation: see Specify Whether Aggressive Mode is Used.

Specify whether a DNP3 slave outstation accepts or issues requests using Aggressive Mode: see Specify Whether Aggressive Mode is Used.


Disclaimer

Geo SCADA Expert 2020