GE Multilin T60 Transformer Protection System vii
TABLE OF CONTENTS
7. COMMANDS AND
TARGETS
7.1 COMMANDS
7.1.1 COMMANDS MENU .......................................................................................... 7-1
7.1.2 VIRTUAL INPUTS.............................................................................................. 7-1
7.1.3 CLEAR RECORDS ............................................................................................ 7-2
7.1.4 SET DATE AND TIME ....................................................................................... 7-2
7.1.5 RELAY MAINTENANCE .................................................................................... 7-3
7.1.6 PHASOR MEASUREMENT UNIT ONE-SHOT.................................................. 7-3
7.2 TARGETS
7.2.1 TARGETS MENU............................................................................................... 7-6
7.2.2 TARGET MESSAGES ....................................................................................... 7-6
7.2.3 RELAY SELF-TESTS......................................................................................... 7-6
8. SECURITY 8.1 PASSWORD SECURITY
8.1.1 OVERVIEW........................................................................................................ 8-1
8.1.2 PASSWORD SECURITY MENU ....................................................................... 8-2
8.1.3 LOCAL PASSWORDS ....................................................................................... 8-2
8.1.4 REMOTE PASSWORDS ................................................................................... 8-3
8.1.5 ACCESS SUPERVISION................................................................................... 8-4
8.1.6 DUAL PERMISSION SECURITY ACCESS....................................................... 8-4
8.2 SETTINGS SECURITY
8.2.1 SETTINGS TEMPLATES................................................................................... 8-6
8.2.2 SECURING AND LOCKING FLEXLOGIC™ EQUATIONS ............................. 8-10
8.2.3 SETTINGS FILE TRACEABILITY.................................................................... 8-12
8.3 ENERVISTA SECURITY MANAGEMENT SYSTEM
8.3.1 OVERVIEW...................................................................................................... 8-15
8.3.2 ENABLING THE SECURITY MANAGEMENT SYSTEM ................................. 8-15
8.3.3 ADDING A NEW USER ................................................................................... 8-15
8.3.4 MODIFYING USER PRIVILEGES ................................................................... 8-16
9. COMMISSIONING 9.1 DIFFERENTIAL CHARACTERISTIC TEST
9.1.1 DESCRIPTION................................................................................................... 9-1
9.2 DIFFERENTIAL CHARACTERISTIC TEST EXAMPLES
9.2.1 INTRODUCTION................................................................................................ 9-3
9.2.2 TEST EXAMPLE 1 ............................................................................................. 9-4
9.2.3 TEST EXAMPLE 2 ............................................................................................. 9-9
9.2.4 TEST EXAMPLE 3 ........................................................................................... 9-10
9.2.5 TEST EXAMPLE 4 ........................................................................................... 9-11
9.3 INRUSH INHIBIT TEST
9.3.1 INRUSH INHIBIT TEST PROCEDURE ........................................................... 9-12
9.4 OVEREXCITATION INHIBIT TEST
9.4.1 OVEREXCITATION INHIBIT TEST PROCEDURE ......................................... 9-13
9.5 FREQUENCY ELEMENT TESTS
9.5.1 TESTING UNDERFREQUENCY AND OVERFREQUENCY ELEMENTS....... 9-14
9.6 COMMISSIONING TEST TABLES
9.6.1 DIFFERENTIAL RESTRAINT TESTS.............................................................. 9-16
9.6.2 INRUSH INHIBIT TESTS ................................................................................. 9-16
9.6.3 OVEREXCITATION INHIBIT TESTS............................................................... 9-17
10. MAINTENANCE 10.1 UNINSTALL AND CLEAR FILES AND DATA
10.1.1 UNINSTALL AND CLEAR FILES AND DATA.................................................. 10-1
10.2 REPAIRS
10.2.1 REPAIRS ......................................................................................................... 10-2