4
4
SME2-IS - Manual - 06 - 2021
DFR .................................................................................................................................................................................................................. 63
6 CYBER SECURITY 65
Preface ............................................................................................................................................................................................................65
Configuration management ........................................................................................................................................................................65
Hardware systems and networking equipment ......................................................................................................................................65
Initial system configuration ........................................................................................................................................................................65
Threat and vulnerability management ......................................................................................................................................................65
Access control ..............................................................................................................................................................................................65
Authentication and authorization management ......................................................................................................................................65
Auditing ...........................................................................................................................................................................................................65
Network communication security ..............................................................................................................................................................66
Cybersecurity application scheme .............................................................................................................................................................66
Access procedure .........................................................................................................................................................................................66
7 INSTALLATION 67
7.1 PACKAGING .......................................................................................................................................................................................................67
7.2 ASSEMBLY .........................................................................................................................................................................................................67
7.3 ELECTRICAL CONNECTIONS ......................................................................................................................................................................... 68
8 CALIBRATION AND START-UP 70
8.1 ThyVisor software ............................................................................................................................................................................................ 70
Installing ThyVisor ........................................................................................................................................................................................ 70
8.2 MMI (Man Machine Interface) ..................................................................................................................................................................... 70
Reading variables (READ) ............................................................................................................................................................................ 71
Setting modifying (SET) ................................................................................................................................................................................71
Test ...................................................................................................................................................................................................................72
Communication ..............................................................................................................................................................................................72
CB open/close commands ...........................................................................................................................................................................72
Enabling / locking the keyboard - Password ........................................................................................................................................... 73
8.4 MAINTENANCE .................................................................................................................................................................................................75
8.5 REPAIRS .............................................................................................................................................................................................................75
8.6 STORAGE ............................................................................................................................................................................................................75
9 APPENDIX 76
9.1 APPENDIX A - IEC time dependent curves .................................................................................................................................................76
General formula .............................................................................................................................................................................................76
First protection threshold 50/51 - IEC inverse time curves (type A, NIT) .............................................................................................77
First protection threshold 50/51 - IEC very inverse time curves (type B, VIT) .................................................................................... 78
First protection threshold 50/51 - IEC long inverse time curves (type LIT) ......................................................................................... 79
First protection threshold 50/51 - IEC extremely inverse time curves (type C, VIT) .......................................................................... 80
9.2 APPENDIX B - Insertion diagram ...................................................................................................................................................................81
9.3 APPENDIX C - SME2-IS panel dimensions ...................................................................................................................................................82
9.4 APPENDIX D - Revisions ................................................................................................................................................................................ 83
9.5 APPENDIX E - CE Declaration of Conformity ...............................................................................................................................................84