Eaton's IED Manager Suite (IMS) software provides reliability, security and compliance for utility automation systems. It helps utilities manage configuration settings, passwords and firmware of the intelligent electronic devices (IEDs) used in substation and distribution automation systems. It reduces maintenance costs through secure remote access and helps comply with NERC CIP. IMS software is one of Eaton's grid automation system solutions.
Security ServerIMS Security Server provides authentication and authorization services for all IMS modules, for Eaton’s SMP Gateway, and for managed devices. It integrates with Microsoft Active Directory service to provide single sign-on capability to substation and distribution network devices. When used with IMS Passthrough Manager, users no longer need to know IED passwords and connect to IEDs using their standard corporate credentials, or IMS application credentials. IMS Security Server implements role-based access control, managing access by user, by group, by regions, by substation, and by IED, helping comply with NERC CIP requirements. |
Enterprise Gateway and Data BridgeThe Enterprise Gateway and Data Bridge provide a scalable, high performance foundation for developing enterprise asset monitoring solutions. IMS Enterprise Gateway is part of the IMS infrastructure and acts as a Front-End-Processor to manage communications with devices. In addition to retrieving non-operational data such configuration settings and fault records, it also supports the retrieval of real-time operational data using the DNP3 protocol, or the SMP Gateway native data exchange protocol. The IMS Data Bridge component publishes real-time data, retrieved by the IMS Enterprise Gateway, to data historians and control systems, using the native interface or the DNP3 protocol. |
Passthrough ManagerIMS Passthrough Manager provides utilities with a secure remote maintenance and engineering solution. Users can connect to remote devices using familiar vendor tools, as if they were connected directly to the IED. IMS Passthrough Manager helps meet NERC CIP requirements by acting as an Intermediate System, implementing encrypted communications and centralized access management based on user, region and IED. Furthermore, the Auto-Login feature increases system security by hiding device passwords from the user. Authenticated users with the appropriate access permissions can connect directly to a device, without needing to know the password. The Auto-Login feature makes it possible to set different passwords for each device, greatly reducing the number of shared accounts as required for NERC CIP compliance. |
Configuration ManagerIMS Configuration Manager automatically retrieves and stores IED asset management information and configuration settings, detects changes to the baseline configuration and notifies appropriate users. The IMS Configuration Manager provides transmission utilities with a powerful tool to reduce engineering efforts and help meet NERC CIP configuration management requirements. It provides all the necessary reports to keep track of cyber assets, their firmware updates and configuration change history. It stores all configuration settings in a database providing rapid recovery capability and the capability to roll back settings to an original known good value. The IMS Configuration Manager is designed to work with the IMS Update Manager. When used together, these two modules help distribution network operators keep track of bulk firmware and settings updates and rapidly identify devices with communications difficulties. |
Password ManagerIMS Password Manager provides a comprehensive set of tools and reports to manage IED passwords, increasing system security and helping meet NERC CIP requirements. IMS Password Manager automates the process of updating the passwords in a device, as well as the data concentrator to which it is connected. Users can specify device passwords manually, or let Password Manager generate passwords automatically with length, complexity, and character set assigned for each device type and model. Passwords are encrypted and securely stored in the IMS database. A simple-to-use web-based management interface with granular access control lets authorized users view passwords and select accounts to update. Numerous reports such as password change history and device password age are provided to help with compliance. Fail-safe operation protects against password loss. |
Update ManagerIMS Update Manager helps keep IEDs secure and reliable by automating the process of updating device firmware and settings. Frequent firmware updates have become a necessary fact of life to ensure the reliability and security of devices in the substation and distribution network. New features are being added, problems are being corrected, and vulnerabilities are regularly being identified. Devices used in the distribution network are also subject to frequent changes to their settings, on a seasonal basis, or to address special conditions or issues. As the number of managed devices grows, updating firmware and settings manually becomes a tedious and error-prone procedure. IMS Update Manager automates this process, increasing efficiency and reducing maintenance costs. |
Event ManagerIMS Event Manager provides corporate-wide access to power system events, fault records, SOE, and oscillography from protection relays and DFRs. IMS Event Manager automatically retrieves event data from fault recorders and protection relays, notifies the proper users, and sends the event data along with the notification. Users can now have all the information they need to rapidly diagnose and act on problems, dispatch repair crews, and eventually restore service by remote connection to the affected device. Retrieved event data is stored in the IMS database and can be accessed through a simple-to-use web-based management interface with granular access control. Protection engineers can download and view event data, without needing to connect to the device itself. |
Minimum system requirements for IMS Server
|
Minimum system requirements for other components
|
Minimum system requirements for IMS end-users applications
|