Iec 870-5-103 Protocol - GE T60 Instruction Manual

Ur series transformer protection system
Hide thumbs Also See for T60:
Table of Contents

Advertisement

2.1 INTRODUCTION
3.
Supervisor = RW (default), Administrator = R (default), Administrator = RW (only if Supervisor role is disabled)
4.
NA = the permission is not enforced by CyberSentry Security
CYBERSENTRY USER AUTHENTICATION
There are two types of authentication supported by CyberSentry that can be used to access the UR device:
Device Authentication (local UR device authenticates)
2
Server Authentication (RADIUS server authenticates)
The EnerVista software allows access to functionality that is determined by the user role, which comes either from the local
UR device or RADIUS server.
The EnerVista software has a device authentication option on the login screen for accessing the UR device. When the
"Device" button is selected, the UR uses its local authentication database and not the RADIUS server to authenticate the
user. In this case, it uses its built-in roles (Administrator, Engineer, Supervisor, Observer, Operator, or Administrator and
Supervisor when Device Authentication is disabled) as login names and the associated passwords are stored on the UR
device. As such, when using the local accounts, access is not user-attributable.
In cases where user attributable access is required especially to facilitate auditable processes for compliance reasons, use
RADIUS authentication only.
When the "Server" Authentication Type option is selected, the UR uses the RADIUS server and not its local authentication
database to authenticate the user.
No password or security information are displayed in plain text by the EnerVista software or UR device, nor are they ever
transmitted without cryptographic protection.
CyberSentry Server Authentication
The UR has been designed to automatically direct authentication requests based on user names. In this respect, local
account names on the UR are considered as reserved, and not used on a RADIUS server.
The UR automatically detects whether an authentication request is to be handled remotely or locally. As there are only five
local accounts possible on the UR, if the user ID credential does not match one of the five local accounts, the UR automat-
ically forwards the request to a RADIUS server when one is provided.
If a RADIUS server is provided, but is unreachable over the network, server authentication requests are denied. In this situ-
ation, use local UR accounts to gain access to the UR system.
IEC 870-5-103 is a companion standard to IEC 870-5 suit of standards for transmission protocols. It defines messages and
procedures for interoperability between protection equipment and devices of a control system in a substation for communi-
cating on a serial line.
The IEC 60870-5-103 is an unbalanced (master-slave) protocol for coded-bit serial communication, exchanging information
with a control system. In the context of this protocol, the protection equipment is the slave and the control system is the
master. The communication is based on a point to point principle. The master must be able to interpret the IEC 60870-5-
103 communication messages.
The UR implementation of IEC 60870-5-103 consists of the following functions:
Report binary inputs
Report analog values (measurands)
Commands
Time synchronization
The RS485 port supports IEC 60870-5-103.
2-8
T60 Transformer Protection System
2 PRODUCT DESCRIPTION

2.1.3 IEC 870-5-103 PROTOCOL

GE Multilin

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents