GE Multilin
T60 Transformer Protection System
2-5
2 PRODUCT DESCRIPTION
2.1 INTRODUCTION
2
•
Clearing energy records
•
Clearing the data logger
•
Clearing the user-programmable pushbutton states
The following operations are under setting password supervision:
•
Changing any setting
•
Test mode operation
The T60 supports password entry from a local or remote connection. Local access is defined as any access to settings or
commands via the faceplate interface. This includes both keypad entry and the through the faceplate RS232 port. Remote
access is defined as any access to settings or commands via any rear communications port. This includes both Ethernet
and RS485 connections. Any changes to the local or remote passwords enables this functionality.
When entering a settings or command password via EnerVista or any serial interface, the user must enter the correspond-
ing connection password. If the connection is to the back of the T60, the remote password must be used. If the connection
is to the RS232 port of the faceplate, the local password applies.
Password access events are logged in the Event Recorder.
c) CYBERSENTRY SECURITY
CyberSentry Embedded Security is a software option that provides advanced security services. When this option is pur-
chased, the basic password security is disabled automatically.
CyberSentry provides security through the following features:
•
An Authentication, Authorization, Accounting (AAA) Remote Authentication Dial-In User Service (RADIUS) client that
is centrally managed, enables user attribution, provides accounting of all user activities, and uses secure standards-
based strong cryptography for authentication and credential protection.
•
A Role-Based Access Control (RBAC) system that provides a permission model that allows access to UR device oper-
ations and configurations based on specific roles and individual user accounts configured on the AAA server (that is,
Administrator, Supervisor, Engineer, Operator, Observer).
•
Security event reporting through the Syslog protocol for supporting Security Information Event Management (SIEM)
systems for centralized cybersecurity monitoring.
•
Strong encryption of all access and configuration network messages between the EnerVista software and UR devices
using the Secure Shell (SSH) protocol, the Advanced Encryption Standard (AES), and 128-bit keys in Galois Counter
Mode (GCM) as specified in the U.S. National Security Agency Suite B extension for SSH and approved by the
National Institute of Standards and Technology (NIST) FIPS-140-2 standards for cryptographic systems.
CYBERSENTRY USER ROLES
CyberSentry user roles (Administrator, Engineer, Operator, Supervisor, Observer) limit the levels of access to various UR
device functions. This means that the EnerVista software allows for access to functionality based on the user’s logged in
role.
Example:
Administrative functions can be segmented away from common operator functions, or engineering type access,
all of which are defined by separate roles, as shown in the following figure, so that access of UR devices by multiple per-
sonnel within a substation is allowed.
Содержание T60
Страница 6: ...vi T60 Transformer Protection System GE Multilin TABLE OF CONTENTS ...
Страница 14: ...xiv T60 Transformer Protection System GE Multilin TABLE OF CONTENTS ...
Страница 34: ...1 20 T60 Transformer Protection System GE Multilin 1 5 USING THE RELAY 1 GETTING STARTED 1 ...
Страница 118: ...3 48 T60 Transformer Protection System GE Multilin 3 3 DIRECT INPUT OUTPUT COMMUNICATIONS 3 HARDWARE 3 ...
Страница 146: ...4 28 T60 Transformer Protection System GE Multilin 4 3 FACEPLATE INTERFACE 4 HUMAN INTERFACES 4 ...
Страница 490: ...5 344 T60 Transformer Protection System GE Multilin 5 10 TESTING 5 SETTINGS 5 ...
Страница 522: ...6 32 T60 Transformer Protection System GE Multilin 6 5 PRODUCT INFORMATION 6 ACTUAL VALUES 6 ...
Страница 536: ...7 14 T60 Transformer Protection System GE Multilin 7 1 COMMANDS 7 COMMANDS AND TARGETS 7 ...
Страница 538: ...8 2 T60 Transformer Protection System GE Multilin 8 1 DIRECTIONAL PRINCIPLE 8 THEORY OF OPERATION 8 ...
Страница 568: ...10 12 T60 Transformer Protection System GE Multilin 10 6 DISPOSAL 10 MAINTENANCE 10 ...
Страница 596: ...A 28 T60 Transformer Protection System GE Multilin A 1 PARAMETER LISTS APPENDIX A A ...
Страница 716: ...B 120 T60 Transformer Protection System GE Multilin B 4 MEMORY MAPPING APPENDIX B B ...
Страница 762: ...E 10 T60 Transformer Protection System GE Multilin E 1 IEC 60870 5 104 PROTOCOL APPENDIX E E ...
Страница 774: ...F 12 T60 Transformer Protection System GE Multilin F 2 DNP POINT LISTS APPENDIX F F ...
Страница 785: ...GE Multilin T60 Transformer Protection System H 9 APPENDIX H H 2 ABBREVIATIONS H Z Impedance Zone ...