17.2.4
17.2.4.1
Application...............................................................................................................................315
17.2.4.2
Setting guidelines.................................................................................................................. 315
17.2.5
17.2.5.1
Application...............................................................................................................................315
17.2.5.2
Setting guidelines.................................................................................................................. 315
17.2.6
17.2.6.1
Identification...........................................................................................................................316
17.2.6.2
Application...............................................................................................................................316
17.2.6.3
Setting guidelines...................................................................................................................317
17.3
LON communication protocol..................................................................................................... 318
17.3.1
Application.................................................................................................................................. 318
17.3.2
17.3.2.1
Identification...........................................................................................................................319
17.3.2.2
Application...............................................................................................................................319
17.3.2.3
Setting guidelines.................................................................................................................. 320
17.4
SPA communication protocol..................................................................................................... 320
17.4.1
Application..................................................................................................................................320
17.4.2
Setting guidelines......................................................................................................................321
17.5
17.5.1
Application.................................................................................................................................. 322
17.6
17.6.1
Application..................................................................................................................................328
18.1
Binary signal transfer.................................................................................................................... 329
18.1.1
Identification..............................................................................................................................329
18.1.2
Application..................................................................................................................................329
18.1.2.1
18.1.3
Setting guidelines..................................................................................................................... 330
Section 19 Security............................................................................................................ 335
19.1
Authority status ATHSTAT........................................................................................................... 335
19.1.1
Application..................................................................................................................................335
19.2
19.2.1
Application..................................................................................................................................335
19.3
Change lock CHNGLCK................................................................................................................. 336
19.3.1
Application..................................................................................................................................336
19.4
Denial of service DOS.................................................................................................................... 336
19.4.1
Application..................................................................................................................................336
19.4.2
Setting guidelines......................................................................................................................337
20.1
IED identifiers TERMINALID......................................................................................................... 339
20.1.1
Application..................................................................................................................................339
20.2
20.2.1
Application..................................................................................................................................339
Application manual
Table of contents
11