
8-4
C30 CONTROLLER SYSTEM – INSTRUCTION MANUAL
RETRIEVE FILES
CHAPTER 8: MAINTENANCE
8
5.
Click the
Read File
button. The file is saved to the destination folder. The EnerVista window remains open to download
additional files.
8.3.1 CyberSentry security event files
CyberSentry security events are available in the following two files: SECURITY_EVENTS.CSV and SETTING_CHANGES.LOG.
8.3.1.1 Security events file
The figure shows the content for the SECURITY_EVENTS.CSV file.
Figure 8-3: Security events file
Time
— Local time.
Activity
— The actual security event.
1 = Authentication Failed
2 = User Lockout
3 = FW Upgrade
4 = FW Lock
5 = Settings Lock
6 = Settings Change, this can fill the entire event log. Hence it is supported by the already existing
SETTINGS_CHANGE.LOG file. This event is not required.
7 = Clear Oscillography command
8 = Clear Data Logger command
9 = Clear Demand Records command
10 = Clear Energy command
11 = Reset Unauthorized Access
12 = Clear Teleprotection Counters
13 = Clear All Records
14 = Role Log out
15 = Role Log in
8.3.1.2 Setting changes file
The SETTING_CHANGES.LOG file stores all the setting changes. A total of 1024 events are stored in a circular buffer in non-
volatile memory.
Содержание C30
Страница 12: ...1 4 C30 CONTROLLER SYSTEM INSTRUCTION MANUAL FOR FURTHER ASSISTANCE CHAPTER 1 INTRODUCTION 1...
Страница 282: ...5 126 C30 CONTROLLER SYSTEM INSTRUCTION MANUAL SYSTEM SETUP CHAPTER 5 SETTINGS 5 Figure 5 56 Disconnect switch logic...
Страница 354: ...6 16 C30 CONTROLLER SYSTEM INSTRUCTION MANUAL PRODUCT INFORMATION CHAPTER 6 ACTUAL VALUES 6...
Страница 398: ...C 6 C30 CONTROLLER SYSTEM INSTRUCTION MANUAL COMMAND LINE INTERFACE APPENDIX C COMMAND LINE INTERFACE C...
Страница 406: ...iv C30 CONTROLLER SYSTEM INSTRUCTION MANUAL ABBREVIATIONS...