GE MiCOM P40 Agile Technical Manual page 432

Hide thumbs Also See for MiCOM P40 Agile:
Table of Contents

Advertisement

Chapter 18 - Cyber-Security
IED functions and features are assigned to different password levels. The assignment is fixed.
The audit trail is recorded, listing events in the order in which they occur, held in a circular buffer.
Records contain all defined fields from the standard and record all defined function event types where the
function is supported.
No password defeat mechanism exists. Instead a secure recovery password scheme is implemented.
Unused ports (physical and logical) may be disabled.
406
P14D
P14D-TM-EN-8

Advertisement

Table of Contents
loading

Table of Contents