•
Locally by connecting the user's computer to the IED via the front
communication port.
•
Remotely over LAN/WAN.
2.6
Authorization
At delivery, logging on to the IED is not required to be able to use the LHMI. The IED
user has full access to the IED as a SuperUser until users and passwords are created
with PCM600 and written into the IED.
The available user categories are predefined for LHMI and WHMI, each with
different rights.
Table 3:
Available user categories
User category
User rights
SystemOperator
Control from LHMI, no bypass
ProtectionEngineer
All settings
DesignEngineer
Application configuration
UserAdministrator
User and password administration
All changes in user management settings cause the IED to reboot.
2.7
Communication
The protection relay supports communication protocols IEC 61850-8-1, IEC
60870-5-103 and DNP3 over TCP/IP.
All operational information and controls are available through these protocols.
However, some communication functionality, for example, horizontal
communication (GOOSE) between the protection relays, is only enabled by the IEC
61850-8-1 communication protocol.
Disturbance files are accessed using the IEC 61850 or IEC 60870-5-103 protocols.
Disturbance files are also available to any Ethernet based application in the standard
COMTRADE format. The protection relay can send binary signals to other protection
relays (so called horizontal communication) using the IEC 61850-8-1 GOOSE
1MRS757582 C
Section 2
REG630 overview
REG630
19
Application Manual
Summary of Contents for Relion 630 Series
Page 1: ...RELION 630 SERIES Generator Protection and Control REG630 Application Manual...
Page 2: ......
Page 16: ...10...
Page 63: ...57...