• local, through the local HMI
• remote, through the communication ports
The IED users can be created, deleted and edited only with
PCM600 IED user management tool.
IEC12000202-1-en.vsd
IEC12000202 V1 EN
Figure 10.
PCM600 user management tool
AUTHMAN
This function enables/disables the maintenance menu. It also
controls the maintenance menu log on time out.
FTP access with SSL FTPACCS
The FTP Client defaults to the best possible security mode
when trying to negotiate with SSL.
The automatic negotiation mode acts on port number and
server features. It tries to immediately activate implicit SSL if the
specified port is 990. If the specified port is any other, it tries to
negotiate with explicit SSL via AUTH SSL/TLS.
Using FTP without SSL encryption gives the FTP client reduced
capabilities. This mode is only for accessing disturbance
recorder data from the IED.
If normal FTP is required to read out
disturbance recordings, create a specific
account for this purpose with rights only to
do File transfer. The password of this user
will be exposed in clear text on the wire.
Generic security application AGSAL
As a logical node AGSAL is used for monitoring security
violation regarding authorization, access control and inactive
association including authorization failure. Therefore, all the
information in AGSAL can be configured to report to 61850
client.
Activity logging ACTIVLOG
ACTIVLOG contains all settings for activity logging.
There can be 6 external log servers to send syslog events to.
Each server can be configured with IP address; IP port number
and protocol format. The format can be either syslog (RFC
5424) or Common Event Format (CEF) from ArcSight.
Security alarm SECALARM
The function creates and distributes security events for
mapping the security events on protocols such as DNP3.
It is possible to map respective protocol to the signals of
interest and configure them for monitoring with the
Communication Management tool (CMT) in PCM600. No
events are mapped by default.
Parameter names:
• EVENTID: Event ID of the generated security event
• SEQNUMBER: Sequence number of the generated security
event
Security events
All user operations are logged as events. These events can
be sent to external security log servers using SYSLOG data
formats. The log servers can be configured using PCM600.
16. Station communication
IEC 61850-8-1 communication protocol
The IED supports the communication protocols IEC 61850-8-1
and DNP3 over TCP/IP. All operational information and controls
are available through these protocols. However, some
communication functions, for example, horizontal
communication (GOOSE) between the IEDs, is only enabled by
the IEC 61850-8-1 communication protocol.
The IED is equipped with optical Ethernet rear port(s) for the
substation communication standard IEC 61850-8-1. IEC
61850-8-1 protocol allows intelligent electrical devices (IEDs)
from different vendors to exchange information and simplifies
system engineering. Peer-to-peer communication according to
GOOSE is part of the standard. Disturbance files uploading is
provided.
Disturbance files are accessed using the IEC 61850-8-1
protocol. Disturbance files are also available to any Ethernet
based application via FTP in the standard Comtrade format.
Further, the IED can send and receive binary values, double
point values and measured values (for example from MMXU
functions), together with their quality bit, using the IEC
61850-8-1 GOOSE profile. The IED meets the GOOSE
performance requirements for tripping applications in
substations, as defined by the IEC 61850 standard. The IED
interoperates with other IEC 61850-compliant IEDs, and
systems and simultaneously reports events to five different
clients on the IEC 61850 station bus.
Transformer protection RET650
1MRK 504 137-BEN B
Product version: 1.3
ABB
25
Содержание ret650
Страница 1: ...Relion 650 series Transformer protection RET650 Product guide...
Страница 69: ...69...