Overview...........................................................................................97
Principle of operation........................................................................97
LogOn or logOff................................................................................99
Authorization handling in the IED.....................................................99
Section 15
Glossary.......................................................................101
Table of contents
9
Operator's manual