vi T35 Transformer Protection System GE Multilin
TABLE OF CONTENTS
6.2.7 VIRTUAL OUTPUTS ..........................................................................................6-5
6.2.8 REMOTE DEVICES............................................................................................6-5
6.2.9 DIGITAL COUNTERS.........................................................................................6-6
6.2.10 SELECTOR SWITCHES ....................................................................................6-6
6.2.11 FLEX STATES....................................................................................................6-6
6.2.12 ETHERNET ........................................................................................................6-6
6.2.13 REAL TIME CLOCK SYNCHRONIZING ............................................................6-7
6.2.14 DIRECT INPUTS ................................................................................................6-8
6.2.15 DIRECT DEVICES STATUS ..............................................................................6-8
6.2.16 IEC 61850 GOOSE INTEGERS .........................................................................6-9
6.2.17 EGD PROTOCOL STATUS................................................................................6-9
6.2.18 TELEPROTECTION CHANNEL TESTS...........................................................6-10
6.2.19 REMAINING CONNECTION STATUS.............................................................6-10
6.3 METERING
6.3.1 METERING CONVENTIONS ...........................................................................6-11
6.3.2 TRANSFORMER ..............................................................................................6-14
6.3.3 SOURCES ........................................................................................................6-15
6.3.4 TRACKING FREQUENCY................................................................................6-18
6.3.5 FLEXELEMENTS .............................................................................................6-18
6.3.6 IEC 61580 GOOSE ANALOG VALUES ...........................................................6-19
6.3.7 TRANSDUCER INPUTS/OUTPUTS.................................................................6-19
6.4 RECORDS
6.4.1 USER-PROGRAMMABLE FAULT REPORTS .................................................6-21
6.4.2 EVENT RECORDS...........................................................................................6-21
6.4.3 OSCILLOGRAPHY ...........................................................................................6-21
6.4.4 DATA LOGGER................................................................................................6-22
6.4.5 BREAKER MAINTENANCE .............................................................................6-22
6.5 PRODUCT INFORMATION
6.5.1 MODEL INFORMATION...................................................................................6-23
6.5.2 FIRMWARE REVISIONS..................................................................................6-23
7. COMMANDS AND
TARGETS
7.1 COMMANDS
7.1.1 COMMANDS MENU...........................................................................................7-1
7.1.2 VIRTUAL INPUTS ..............................................................................................7-1
7.1.3 CLEAR RECORDS.............................................................................................7-2
7.1.4 SET DATE AND TIME........................................................................................7-2
7.1.5 RELAY MAINTENANCE.....................................................................................7-3
7.1.6 SECURITY..........................................................................................................7-4
7.2 TARGETS
7.2.1 TARGETS MENU ...............................................................................................7-5
7.2.2 TARGET MESSAGES........................................................................................7-5
7.2.3 RELAY SELF-TESTS .........................................................................................7-5
8. SECURITY 8.1 USER ACCOUNTS
8.1.1 OVERVIEW ........................................................................................................8-1
8.1.2 ENABLING THE SECURITY MANAGEMENT SYSTEM....................................8-1
8.1.3 ADDING A NEW USER......................................................................................8-1
8.1.4 MODIFYING USER PRIVILEGES ......................................................................8-2
8.1.5 PASSWORD REQUIREMENTS.........................................................................8-3
8.2 CYBERSENTRY
8.2.1 OVERVIEW ........................................................................................................8-4
8.2.2 SECURITY MENU ..............................................................................................8-6
9. COMMISSIONING 9.1 DIFFERENTIAL CHARACTERISTIC TEST
9.1.1 DESCRIPTION ...................................................................................................9-1