
Authorization handling in the IED.....................................................97
Internet Protocol ports security guideline.........................................98
Section 15 Glossary.......................................................................101
Table of contents
9
Operator's manual