Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 334

DNP3

What is DNP3?

DNP3Distributed Network Protocol 3, an event-driven ICS protocol used in electric utilities, water, and oil & gas to communicate between SCADA masters and remote outstations.


DNP3 (Distributed Network Protocol 3) is a layered, event-driven ICS protocol widely deployed in electric, water, and oil & gas utilities, especially in North America. It uses unsolicited responses, time-stamped event data, and class-based polling to efficiently report changes from RTUs and IEDs to SCADA masters over serial or TCP/IP (port 20000). Base DNP3 has no authentication and is well-known to fuzzing tools, so unprotected networks are vulnerable to spoofed control commands, time-bomb data injection, and denial of service. DNP3 Secure Authentication (defined in IEC 62351-5) adds challenge-response message integrity using HMAC, and modern deployments wrap DNP3 in TLS or place it behind data diodes and ICS-aware firewalls.

Examples

  1. 01

    An electric utility SCADA master polling substation IEDs over DNP3/TCP.

  2. 02

    A gas pipeline RTU sending unsolicited pressure events to a control center.

Frequently asked questions

What is DNP3?

Distributed Network Protocol 3, an event-driven ICS protocol used in electric utilities, water, and oil & gas to communicate between SCADA masters and remote outstations. It belongs to the OT / ICS / IoT category of cybersecurity.

What does DNP3 mean?

Distributed Network Protocol 3, an event-driven ICS protocol used in electric utilities, water, and oil & gas to communicate between SCADA masters and remote outstations.

How does DNP3 work?

DNP3 (Distributed Network Protocol 3) is a layered, event-driven ICS protocol widely deployed in electric, water, and oil & gas utilities, especially in North America. It uses unsolicited responses, time-stamped event data, and class-based polling to efficiently report changes from RTUs and IEDs to SCADA masters over serial or TCP/IP (port 20000). Base DNP3 has no authentication and is well-known to fuzzing tools, so unprotected networks are vulnerable to spoofed control commands, time-bomb data injection, and denial of service. DNP3 Secure Authentication (defined in IEC 62351-5) adds challenge-response message integrity using HMAC, and modern deployments wrap DNP3 in TLS or place it behind data diodes and ICS-aware firewalls.

How do you defend against DNP3?

Defences for DNP3 typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for DNP3?

Common alternative names include: Distributed Network Protocol 3, DNP3 SA, IEEE 1815.

Related terms