GE MiCOM P40 Technical Manual page 614

P446sv
Hide thumbs Also See for MiCOM P40:
Table of Contents

Advertisement

Chapter 22 - Cyber-Security
IED functions and features are assigned to different password levels. The assignment is fixed.
The audit trail is recorded, listing events in the order in which they occur, held in a circular buffer.
Records contain all defined fields from the standard and record all defined function event types where the
function is supported.
No password defeat mechanism exists. Instead a secure recovery password scheme is implemented.
Unused ports (physical and logical) may be disabled.
582
P446SV
P446SV-TM-EN-1

Advertisement

Table of Contents
loading

Table of Contents