EasyManua.ls Logo

Siemens 7SJ85 - Security Log

Siemens 7SJ85
1638 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Figure 3-15
Reading the Communication Log on the On-Site Operation Panel of
the Device
Deletability
The communication logs of your SIPROTEC 5 device can be deleted. Read details about this in chapter
3.1.6 Saving and Deleting the Logs.
Configurability
The communication logs are not freely configurable. The entries are preconfigured.
Security Log
Access to areas of the device with restricted access rights is recorded in the security log. Unsuccessful and
unauthorized access attempts are also recorded. Up to 2048 indications can be stored in the security log.
Reading from the PC with DIGSI 5
To access the security log of your SIPROTEC 5 device use the project tree window . The device must be in
Online access.
Project → Online access → Device → Device Information → Log tab → Security logs
The state of the security log last loaded from the device is displayed.
Before this, refresh the contents by clicking the update arrows in the headline.
[scsecmld-180816-01, 1, en_US]
Figure 3-16 Reading the Security Indications with DIGSI 5
3.1.5.8
System Functions
3.1 Indications
78 SIPROTEC 5, Overcurrent Protection, Manual
C53000-G5040-C017-8, Edition 07.2017

Table of Contents

Related product manuals