WireGuard vs OpenVPN for SCADA Systems: Key Differences

SCADA systems provide supervisory monitoring, data acquisition, and remote control of field devices by collecting alarms and status information from distributed sites. Unlike typical IT applications, SCADA traffic is event-driven, time-sensitive, and often safety-critical. Because of this, the choice of VPN technology can directly affect how well SCADA protocols behave over wide-area or untrusted networks. WireGuard and OpenVPN… Read More »

Zakaria El Intissar

SSH Port Number Explained: What Port 22 Is Used For and How to Configure It

SSH (Secure Shell) uses TCP port 22 by default. This single port number handles everything SSH does — remote login, command execution, file transfer (SFTP/SCP), port forwarding, and tunneling. Port 22 is one of the most targeted ports on the internet. Automated bots scan it constantly looking for weak passwords. Understanding how port 22 works, how to change… Read More »

Zakaria El Intissar

IEC 61850-3 Ethernet Switch: Requirements, Features, and Substation Use

Ethernet is the backbone of modern substation automation. Protection relays, bay controllers, merging units, and SCADA gateways all communicate over Ethernet networks carrying time-critical GOOSE messages, Sampled Values, and MMS traffic. But substations are among the harshest environments for communication equipment. High electromagnetic interference, wide temperature swings, vibration, and electrical transients are the norm. A commercial office switch… Read More »

Zakaria El Intissar

4 Best IEC 61850 Test Software for GOOSE & MMS (Engineers’ Guide)

61850 Test Software is essential for validating communication, interoperability, and correct behavior in modern digital substations. From GOOSE messaging and MMS communication to multivendor interoperability checks, the right testing tools help engineers verify that protection, control, and automation systems operate safely and reliably before and after commissioning. This article reviews some of the most widely used IEC 61850… Read More »

Zakaria El Intissar

IEC 61850 MMS Port Number Explained: Why TCP Port 102 Is Used

IEC 61850 has become the global standard for substation communication systems, enabling interoperability between protection relays, bay controllers, SCADA systems, and engineering tools. At the heart of IEC 61850 client/server communication is MMS (Manufacturing Message Specification)—and one of the most searched questions is: What port number does IEC 61850 MMS use? This article provides a complete explanation of… Read More »

Zakaria El Intissar

IEC 60870-5-104 Port Numbers Explained: TCP 2404, TLS 19998, and Firewall Configuration

IEC 60870-5-104 runs over TCP/IP. The port number defines where the controlled station (RTU or IED) listens for incoming connections from the controlling station (SCADA master). Two ports are used in practice: Getting the port wrong means no connection. Leaving it unprotected means your SCADA system is exposed. This guide covers everything about IEC 104 ports — from… Read More »

Zakaria El Intissar

IACS Cybersecurity – Protecting SCADA and Industrial Control Systems

IACS Cybersecurity focuses on protecting Industrial Automation and Control Systems (IACS) such as SCADA, PLCs, RTUs, DCS, IEDs, and industrial networks from cyber threats while ensuring safety, availability, and operational reliability. For operators of critical infrastructure—power utilities, oil and gas, manufacturing, water, and renewable energy—cybersecurity is no longer optional. Modern industrial systems are connected, remote-access enabled, and increasingly… Read More »

Zakaria El Intissar

IEC 61850 Control Models Explained (Direct, SBO, SBOwES)

IEC 61850 does not treat control operations as simple “write a value and hope it works.” Instead, it defines formal control models that describe how a command is issued, who is allowed to issue it, and how safety is guaranteed. These control models are one of the most important — and most misunderstood — parts of IEC 61850.… Read More »

Zakaria El Intissar

DNP3 Event Classes Explained: How Class 0, 1, 2, and 3 Really Work in SCADA Systems

DNP3 (Distributed Network Protocol) is widely used in power systems, water utilities, and industrial SCADA systems. One of its most misunderstood features is the event class system. Many engineers assume that Class 1, 2, and 3 represent fixed priorities defined by the protocol. In reality, DNP3 works differently. This article explains what DNP3 event classes really are, how… Read More »

Zakaria El Intissar

IEC 60870-5-104 Security Explained: TLS, IEC 62351 & IEC/TS 60870-5-7 Guide

IEC 60870-5-104 (IEC-104) is one of the most widely used telecontrol protocols in electrical power systems. It plays a central role in communication between substations, RTUs, and control centers, especially in transmission and distribution SCADA systems. IEC-104 is reliable, efficient, and well understood by utilities worldwide. However, when the protocol was originally designed, cybersecurity was not a primary… Read More »

Zakaria El Intissar