Pacis System: Pacis/En Tg/D10
Pacis System: Pacis/En Tg/D10
Pacis System: Pacis/En Tg/D10
PACiS/EN TG/D10
System Guide
System Guide PACiS/EN TG/D10
PACiS SYSTEM
CONTENTS
BLANK PAGE
Safety & Handling PACiS/EN SA/D10
PACiS System
CONTENTS
1. INTRODUCTION 3
2. SAFETY 4
2.1 Health and Safety 4
2.2 Explanation of symbols and labels 4
2.3 Installing, Commissioning and Servicing 4
2.4 Decommissioning and Disposal 4
3. GUARANTIES 5
BLANK PAGE
Safety & Handling PACiS/EN SA/D10
1. INTRODUCTION
The present document is a chapter of PACiS SYSTEM documentation binders. It describes
the safety, handling, packing and unpacking procedures applicable to PACiS SYSTEM
elements.
PACiS/EN SA/D10 Safety & Handling
2. SAFETY
WARNING: THIS SAFETY SECTION SHOULD BE READ BEFORE COMMENCING
ANY WORK ON THE EQUIPMENT.
2.1 Health and Safety
The information in the Safety Section of the PACiS System documentation is intended to
ensure that products are properly installed and handled in order to maintain them in a safe
condition. It is assumed that everyone who will be associated with the PACiS System
equipments will be familiar with the contents of the different PACiS System Safety Sections
and all Safety documents related to the PC and Communication networks.
2.2 Explanation of symbols and labels
The meaning of symbols and labels may be used on the PACiS System equipments or in the
PACiS System product documentation, is given below.
2.3 Installing, Commissioning and Servicing
Equipment operating conditions
The PACiS System equipments should be operated within the specified electrical and
environmental limits.
Fibre optic communication
Optical LED transceivers used in Switch boards are classified as IEC 825-1 Accessible
Emission Limit (AEL) Class 1 and consequently considered eye safe.
Optical power meters should be used to determine the operation or signal level of the device.
2.4 Decommissioning and Disposal
Disposal:
It is recommended to avoid incineration and disposal of the PACiS System elements
(hardware and software supports). The PACiS System elements should be disposed of in a
safe manner.
Safety & Handling PACiS/EN SA/D10
3. GUARANTIES
The media on which you received Schneider Electric software are guaranteed not to fail
executing programming instructions, due to defects in materials and workmanship, for a
period of 90 days from date of shipment, as evidenced by receipts or other documentation.
Schneider Electric will, at its option, repair or replace software media that do not execute
programming instructions if Schneider Electric receives notice of such defects during the
guaranty period. Schneider Electric does not guaranty that the operation of the software shall
be uninterrupted or error free.
A Return Material Authorisation (RMA) number must be obtained from the factory and clearly
marked on the package before any equipment acceptance for guaranty work.
Schneider Electric will pay the shipping costs of returning to the owner parts, which are
covered by warranty.
Schneider Electric believes that the information in this document is accurate. The document
has been carefully reviewed for technical accuracy. In the event that technical or
typographical errors exist, Schneider Electric reserves the right to make changes to
subsequent editions of this document without prior notice to holders of this edition. The
reader should consult Schneider Electric if errors are suspected. In no event shall
Schneider Electric be liable for any damages arising out of or related to this document or the
information contained in it.
Expect as specified herein, Schneider Electric makes no guaranties, express or implied and
specifically disclaims and guaranties of merchantability or fitness for a particular purpose.
Customer's rights to recover damages caused by fault or negligence on the part
Schneider Electric shall be limited to the amount therefore paid by the customer.
Schneider Electric will not be liable for damages resulting from loss of data, profits, use of
products or incidental or consequential damages even if advised of the possibility thereof.
This limitation of the liability of Schneider Electric will apply regardless of the form of action,
whether in contract or tort, including negligence. Any action against Schneider Electric must
be brought within one year after the cause of action accrues. Schneider Electric shall not be
liable for any delay in performance due to causes beyond its reasonable control.
The warranty provided herein dues net cover damages, defects, malfunctions, or service
failures caused by owner's failure to follow the Schneider Electric installation, operation, or
maintenance instructions; owner's modification of the product; owner's abuse, misuse, or
negligent acts; and power failure or surges, fire, flood, accident, actions of third parties, or
other events outside reasonable control.
PACiS/EN SA/D10 Safety & Handling
BLANK PAGE
Introduction PACiS/EN IT/D10
PACiS System
INTRODUCTION
Introduction PACiS/EN IT/D10
CONTENTS
1. INTRODUCTION 3
1.1 Scope of the document 3
1.2 Introduction to PACiS 3
2. DOCUMENTATION 5
2.1 Chapter descriptions 5
2.1.1 Safety and Handling (SA) Chapter 5
2.1.2 Introduction (IT) Chapter 5
2.1.3 Functional Description (FT) Chapter 5
2.1.4 Installation (IN) Chapter 5
2.1.5 Lexicon (LX) Chapter 5
PACiS/EN IT/D10 Introduction
BLANK PAGE
Introduction PACiS/EN IT/D10
1. INTRODUCTION
1.1 Scope of the document
This version of the PACiS documentation refers to version PACiS V5. This document is a
chapter of PACiS System documentation binders. It introduces the user to the PACiS system
and its elements documentation.
1.2 Introduction to PACiS
PACiS offers a flexible answer to electrical substation Protection, Automation, Control and
Monitoring requirements. PACiS is designed for new and retrofit application cases with
dedicated features enabling an easy system extension and a minimization of outage time
during retrofit.
PACiS is based on a unique configurable architecture, in term of functions, performances
and physical distribution within one or several substations.
The PACiS System architecture is always based on a Station Bus IEC61850 to which is
connected equipment used for the customer solution.
S0620ENa
The Station Bus is based on the IEC61850 protocol, over an Ethernet / TCP-IP network.
Additional busses (called legacy buses) are also available in the PACiS System
architectures.
PACiS/EN IT/D10 Introduction
PACiS offers connection with legacy communication networks (RS232, RS485, optical) in
order to fully re-used past investments with the new generation.
Introduction PACiS/EN IT/D10
2. DOCUMENTATION
The guides provide a functional and technical description of the PACiS elements and a
comprehensive set of instructions for the PACiS elementss use and application.
A System Guide is provided at system level: it contains chapters listed and described below.
More detailed guides (Operation Guide, Technical Guide, Getting Started Guide) are
provided at equipment level.
Due to the specific construction and application of each PACiS element, the content of each
PACiS element is adapted and some chapters do not exist in the relevant documents
2.1 Chapter descriptions
2.1.1 Safety and Handling (SA) Chapter
This chapter contains the safety instructions, handling and reception of electronic equipment,
packing and unpacking parts, Copyrights and Trademarks.
2.1.2 Introduction (IT) Chapter
This document contains the description of each document, and an outline of the product
features.
2.1.3 Functional Description (FT) Chapter
This chapter contains a description of function supported by the product.
2.1.4 Installation (IN) Chapter
This chapter contains the installation procedures.
2.1.5 Lexical (LX) Chapter
This chapter contains lexical description of acronyms and definitions.
PACiS/EN IT/D10 Introduction
BLANK PAGE
Installation PACiS/EN IN/D10
PACiS System
INSTALLATION
Installation PACiS/EN IN/D10
CONTENTS
1. INTRODUCTION 3
1.1 Scope of the document 3
2. SYSTEM INSTALLATION 4
2.1 Installation ordering 5
2.2 Kind of PACiS system Installation 5
3. REQUIREMENTS 6
3.1 General PACiS system requirement 6
3.2 Basic requirement 6
3.3 Installation end requirement 7
3.4 System Commissioning Application requirement 7
6. NETWORKS INSTALLATION 24
6.1 Legacy Bus installation 24
6.2 Station Bus installation 24
6.3 Telecontrol Bus installation 24
PACiS/EN IN/D10 Installation
1. INTRODUCTION
1.1 Scope of the document
This document is a chapter of the PACiS System documentation. It describes the global
system installation with reference to each IN (installation) chapter of the system devices.
These references are described in the chapter PACiS System IT (Introduction). Reference of
non PACiS equipment is made here, with their specific and proprietary documentation.
PACiS/EN IN/D10 Installation
2. SYSTEM INSTALLATION
A system installation is defined since at least two of system devices should work together.
As they work together, a third component needs to be checked with the system network.
The system installation is then composed of several of the following installation:
PACiS SMT (System Management Tool) to download database and manage the
system,
PACiS CGAT (Computer and Gateway Administration Tool) to manage the C264
computer and Gateway range,
Third-party applications,
Experimental set-up, that uses a reduced set of devices, with the aim to validate
special features and/or configuration of a set of PACiS devices; missing system
devices are replaced by PACiS ES for example. Set-up is used to validate SCADA
mapping and communication, SOE or alarm labels, automation, communication to
IED
Factory set-up that integrates usually all system devices, not necessary mounted into
cubicles, and uses some of system external devices like IED, or simulates them like
SCADA or switch-gears. Aim is to validate customer Application needs into a FAT
(Schneider Electric/VAR Factory Acceptance Test) before final delivery.
Site installation is the final Application installation with all defined system interfaces
fully wired and operational. The SAT (Site Acceptance Tests) ends fully this
installation.
Requirements, constraints, and commissioning tests are different for each installation, and
specific for final site installation power-up. The devices and configuration is specific to a
given business and associate manual are defined in DCS business.
This chapter defines minimal requirements for installation procedure without particular
implementation. The CM (Commissioning) chapter of each device defines how to check that
PACiS device are operational and correctly installed.
Tests lead to check that system behaves correctly for a given application (with specific
functions) are part of the business plan and out of scope of standard PACiS documentation.
Customer found FAT and SAT validation test into their specific business plan.
PACiS/EN IN/D10 Installation
3. REQUIREMENTS
System is complex. Even if its manufacturing can been done by steps, several requirements
are needed before.
3.1 General PACiS system requirement
Before any installation, a versioned plan or array is needed where are defined the network
parameters. It is an output of business and technical staff.
Software and database version can be useful but subject to modification during
commissioning
Networks topology drawing (ring, star) with devices reference, length between
connections, additional switch, repeater
Non PACiS components should have been correctly installed and operational. For
example an other PC than the recommended one should have the needed operating
software, special peripheral like printers or modems should have appropriate drivers to
the PACiS OS
Power Supply source is available with compatible voltage, power capability, stability,
power source protected, and well defined power wiring
Location for set-up has to be compatible with human security and device utilisation
(mechanical support including chairs, temperature, humidity, electromagnetic field,
radiation, local emergency stop)
Correct and operational network connection to non PACiS equipment (LBUS or SBUS
link to non PACiS IED, TBUS link like PSTN to SCADA )
Normalised and operational wiring to electric devices (scheme, wiring, cable, shield,
earthing)
Qualified personnel
Process
Mapping
Wiring
Software packages
IMPORTANT:
the sce.lax file (available in the installation folder) must be modified to update the
lax.nl.java.option.java.heap.size.max attribute depending on the memory size of
your PC (to 400 Mb if the memory size is 1Gb).
the IED tunelling component, which should be installed if an IED setting software
is used in tunelling mode
Installation PACiS/EN IN/D10
IMPORTANT:
If the PC on which the agency is installed has two Ethernet ports, a configuration file has to
be modified as follows to indicate that the agency has to use the chosen port:
open the lean.cfg file, located in the exe binder of the agency installation binder
add:
Begin_Remote
Common_Name = localIP
AP_Title = 1 3 9999 23
AE_Qualifier =1
Psel = 00 00 00 01
Ssel = 00 01
Tsel = 00 01
Transport = TCP
NSAP = 49 00 01 53 49 53 43 09 01 01
Ip_addr = <IP @>
End_Remote
With <IP @> the IP address of the port the agency has to connect to.
4.3 PACiS SMT installation
PACiS SMT is composed of two applications: server and client.
The station maintenance PC has licence for both applications.
SMT Server application is normally installed on main OWS that support PACiS OI server. It
should be installed after PACiS OI server, even if needed to commission it.
PACiS SMT IN chapter describes fully the install procedure.
For commissioning it is reminded that client application should be only started after server
application part (or kernel). When client application is remote, communication link (via ping
function) should be tested before commissioning SMT client.
Briefly, a SMT software installation is as follows:
1. If a previous version of the SMT is installed, uninstall it
2. Launch the SMT installer program and follow instructions. Three components are
available:
the kernel, or server: only one kernel could be installed in a PACiS system
the HMI, or client: one client can be installed on the PC which supports the
kernel. Other clients can be installed on other PC
the HMI set-up, which allows to install HMI on other PC, without using the
installation CD-ROM
The SMT doesnt install the Station Bus agency. If it has not been previously done, the
agency must be installed.
PACiS/EN IN/D10 Installation
CAUTION
IN WINDOWS XP SP3, WHEN YOU HAVE TWO IP ADDRESSES ON THE SAME
NETWORK BOARD AND A DISCONNECT FROM THE ETHERNET NETWORK OCCURS,
THE PRIMARY IP ADDRESS RESETS TO 0.0.0.0. WHEN YOU RECONNECT THE
ETHERNET NETWORK CABLE. WINDOWS XP SP3 DOES NOT RESTORE THE
PRIMARY IP ADDRESSE.
When the user launches a PACiS application from a WTS client PC, it will successfully
communicates with the PACiS OI server, only if the latter one has been launched in a
Windows service context (launched as a Windows service or launched by a Windows
service). This is due to due to WTS session mechanisms.
This implies to install the server application as a service.
Installation PACiS/EN IN/D10
If the hot Redundancy architecture is used, InstalPacisSrv_WS2003.bat has been setup with
OI Server main and Server backup (OI_PERF1 stands for the main OI server, OI_PERF2 for
the back-up)
The use of OI Server as service with Windows Server 2003 involves the installation of
WinPcap 3.0 in place of a newest version.
If WinPcap installed version is not the version 3.0 (e.g. 4.0.1), you have first to uninstall it
from Windows.
Get the setup of WinPcap in version 3.0 from http://www.winpcap.org/archive/
PACiS/EN IN/D10 Installation
3. Click on the icon in the toolbar. Select the Default Properties tab of the
displayed dialog. Verify that the following default properties are checked and selected.
(This should be like this by default)
4. Select the "COM Security" tab and verify the Edit Limits for Access permissions
and for Launch and Activation Permissions. These settings control security
permissions concerning objects, accessed or launched locally or remotely by
PROGRAMS.
5. Click on the "Edit Limits button in the "Access Permissions" frame. Ensure
ANONYMOUS LOGON, Distributed COM Users and Everyone groups are
present, if not add these groups. Ensure each group has the following permissions.
6. Click on the "Edit Default button in the "Access Permissions" frame. Ensure
Everyone, SELF and SYSTEM groups are present. Add these groups, if not there.
7. Ensure each group has the Local and Remote access permissions.
PACiS/EN IN/D10 Installation
8. Click on the "Edit Limits button in the "Launch and Activation Permissions" frame.
Ensure Administrators, Distributed COM Users and Everyone are present. If not,
add these groups.
9. Ensure that each group has the following rights.
10. Click on the "Edit Default button in the "Launch and Activation Permissions" frame.
Ensure that Administrators, INTERACTIVE and SYSTEM groups are present. If
not, add these groups. Ensure that each group has the following rights.
Installation PACiS/EN IN/D10
Select PacisSrv
C:\Program Files\Pacis\PacisWatch\paciswatch.exe
Enter the name and the password specific to the VPN site (called Firewall Pacis in the
example shown) and validate.
The usual login window is displayed on the WTS client PC.
Answering Yes copies the .ini file to the C:\WINNT\system32 folder, because, in service
mode, PACiS Watch searches for the .ini file in this folder, instead of the current one, and
creates there its log file (paciswatch.txt).
The default paciswatch.ini file has no more SMT_kernel in its system tools list, because the
use of SMT_kernel is not possible with WTS.
The user can of course add it back if he/she wants to use PACiS Watch as a standard
executable (not as service).
PACiS/EN IN/D10 Installation
5.5.1 Setttings
At the end of the installation of PACIS Watch as a Service the setup launches automatically
the dcomcnfg command and guides the user.
In the Properties window, Identity tab, set the same user account used by the service to
open a session for the applications S2K.OpcServer, SCADA 2000 CS2KAlarmServer and
SCADA 2000Server.exe.
Installation PACiS/EN IN/D10
The same account will be chosen for the configuration of PacisWatch in the service manager
(see next paragraph).
Type your password twice for each of these executables.
Note: To launch the Services manager manually, run dcomcnfg.
5.5.2 Settings as a service
Open the Control Panel / Administration Tools / Services; this displays Paciswatch in the
services list (potentially after refreshing the list).
On the Paciswatch service, right click Properties and select the user account used by the
service to open a session.
PACiS/EN IN/D10 Installation
1. Under Log On tab, click on This account, then choose the same account with
administrative rights than the one configured in paciswatch service properties..
2. Using the Browse button, click on the domain or the work group of the wished user or
group.
3. In the list Name, click on the user or group account, or enter the name of account in
the area Name, then click on OK.
4. In the fields Password and Confirm the password, type the password of user account.
The user account that you select should be created in the local users and local groups of the
PC Management tool, specifically to log onto the service. In the area User properties, make
sure that the option The password never expires is enabled for the user account and that
this account is member of the appropriate groups.
Select the Automatic option in the Startup type field (in the General tab). This allows this
service to start automatically after a PC reboot as soon as Windows starts.
If applicable, remove the shortcut to PACiS OI in the Start/Programs menu.
Installation PACiS/EN IN/D10
C:\Program Files\Pacis/PacisWatch\paciswatch.exe
In manual mode, PACiS Watch must be started and stopped via the Windows services
manager).
PACiS/EN IN/D10 Installation
6. NETWORKS INSTALLATION
Systems are based on networks. Practice shows that lot of troubles (even after some time)
come from incorrect installation of the networks. Here are referenced some installation
practices in three sub-chapters for each kind of functional network
S-BUS Station Bus between PACiS devices and other IED based on Ethernet with
IEC 61850 protocol.
T-BUS: Telecontrol BUS between system and Remote Control Point or SCADA
6.1 Legacy Bus installation
Installation of Legacy Bus or field Bus is described in computer IN chapter. Cable definition
and maximum length is defined in chapter CO (Connection)
Two kinds of cable can be used with copper and optical. Installation common problem are
slightly different.
Copper cables are installed in daisy chain with computer usually in one extremity. For RS422
and RS485 links terminal resistor (150 ohms) has to be installed at both ends. When LBUS
is connected on computer BIU a jumper on the board can put a calibrated resistor for LBUS
end. Another common installation problem is that LBUS cable is correctly protected from
perturbation: not correctly shielded at both end, and/or installed into cubicle in contact with
CT/VT or power digital signal.
Optical connection is done point to point. Optional box allows to make kind of Hubb (several
input/output). The common trouble is that fiber bending under a 15cm radius raise
permanently signal attenuation until glass breaking. With time and electromagnetic field the
glass attenuation raises a bit, then signal level over attenuation leads to perturbation in
communication.
6.2 Station Bus installation
Installation of Station Bus based on Ethernet is lightly described in all PACiS devices IN
chapters, and more in detail into IN chapter of MiCOM Hxxx range devices.
The Ethernet network is composed of cables and switches (possibly repeaters). The network
scheme ask as mandatory define cable length, physical layer, speed. The chapter CO of
MiCOM Hxxx range devices and MiCOM C264 computer defines cable characteristic
(example class 5 for 100T). PACiS system has defined a range of network switch defined in
MiCOM Hxxx range devices and MiCOM C264 documentation (chapter HW & FT) with
number of connection and power voltage.
Copper cable installation problems come often from cable quality compared from
environment (class, shielding, protection against animal). For optical cable the handling
during installation is a standard problem to not bend or even break glass. Especially with
glass fiber shelding is recommended especially for mice. Optical cable has emitter/receiver
fibers to clearly distinguish before starting the install. As remind in SA chapter glance into
fiber can damage eye and specific tool is recommended to commission one by one the fiber.
PACiS provides via specific switch a redundant Ethernet. Because it is redundant a single
test can hide a wrong installation of master/secondary network. It is recommended to make
commissioning after each switch installation and not globally.
6.3 Telecontrol Bus installation
Two PACiS devices Computer or gateway can have connection to SCADA via S-BUS. The
basic installation is described into their IN chapter.
In both case TBUS communication might need a modem to get into PSTN or RNIS networks.
Modems are country dependant and not part of the system. Modems should be configurable
for all communication parameters.
Installation PACiS/EN IN/D10
local (OWS serial port) and the printer driver is installed from printer manufacturer or
Telephone network
ALERT Modem
SMS center
PACiS OI
Alarms
server
PACiS System
S0418ENa
ALERT supervises and manages a list of application variables on the PACiS OI Server. The
variables declared in this list are [ Object Linking and Embedding (OLE) ] [ for Process
Control (OPC) ] variables. ALERT polls their current state.
8.1.1 Identification of the PACiS alarms to be notified
Use the SCE to retrieve the name of the OPC variable that corresponds with the alarm to be
notified.
During this phase you will manually collect the list of the alarms to be notified, and write them
in an ASCII file, for example. This can be useful as we will see later.
selected datapoint
profile linked to
the datapoint
alarmed state
name
S0494ENa
The OPC name of an alarm is: <datapoint SCE name>.<alarmed state name>
In our example it is:
Site-1.Subst-1.VoltLevel-1.Feeder-1.XCBR-1.ComputedSwitchPos_DPS-1.Open
It relates to the PACiS OI alarm on the opened state of the datapoint.
NOTE: you must be aware on how alarms are managed:
In the STATE BASIS mode, all the defined alarms are visible as
different items as presented above. According to the example,
you will see the ...DPS-1.Jammed and ...DPSP-1.Open items.
add a tag
select OPC
define all parameters attached to your Internet access (warning: the e-mail address
must be the same than the address used to have an account on SMSToB service)
add a user
type the name, the first name, the language, the class
Installation PACiS/EN IN/D10
you can define several user if several people have to receive a SMS when an alarm
occurs
if the same action (i.e. send the same SMS) must be performed when an alarm
occurs, the users can be attached to a group:
add a group
Type = event
Alarm = not enabled
DDE/OPC polling = Advise
Condition should be defined depending on what the user wants. The values of the alarm tag
are:
If the user wants to receive a SMS each time an alarm becomes active unacknowledged, the
condition will be EQUAL 40.
Alarm processing = click on "add" The action can be call user or call group depending
on the user definition
Message = the button Format allows to define the SMS message.
Installation PACiS/EN IN/D10
VPN: the client stations are members of a virtual LAN based on address translation (NAT)
either through the link Manage your server in the Start menu: select Terminal Server
In the Connections node, configure the connection operation and the permissions of the
group Remote Desktop Users.
In the Server Settings node, various options are available (Active desktop, ).
For details, refer for example to http://www.laboratoire-microsoft.org/articles/win/tse2003.
8.2.3.2 Users properties
Select the server icon. Right-click Manage; a console shows:
To display the users list, click Local Users and Groups / Users.
Installation PACiS/EN IN/D10
Select a user.
To display the users properties, right-click Properties.
Fill in the tabs that follow:
Make sure the box Deny this user permissions to log on to any Terminal Server is NOT
checked (Terminal Services Profile tab).
8.2.3.3 Policies
Click Start, click Run, and in the text box, type mmc /s and then click OK.
From the Console menu, select Add/Remove Snap-in, and click the Add button.
From the Available Standalone Snap-in list, select Group Policy, and click the Add
button.
This grants access to the Local Computer Policy, that allows to configure all the users
interfaces: in the Default Domain Controllers Policy console, expand Computer
Configuration; navigate to Administrative Templates Settings, then to Windows Components,
and select Terminal Services:
The users of the remote desk are the members of a Security Group in the Active Directory of
the DNS. Access this group using the MMC console:
Click on Start, click on Run, and in the text box, type mmc /s.
Select among the Security Groups the line named Remote Desktop Users in the
Builtin directory.
Click on Add to add members entitled to remotely access the desktop. This is not valid
if the server is a domain controller.
PACiS/EN IN/D10 Installation
To modify the default settings (Administrators, Remote Desktop users), double click on the
line Allow log on through Terminal Services:
Installation PACiS/EN IN/D10
Double click the line Set time limit for disconnected sessions and modify the setting:
PACiS/EN IN/D10 Installation
BLANK PAGE
Functional Description PACiS/EN FT/D10
PACiS System
FUNCTIONAL DESCRIPTION
Functional Description PACiS/EN FT/D10
CONTENTS
2. FUNCTIONAL DESCRIPTION 4
2.1 Control points 4
2.1.1 Remote control points (RCP) 4
2.1.2 Substation Control Points ( SCP) 4
2.1.3 Bay Control Points ( BCP) 5
2.2 Plant data interface 6
2.2.1 Digital inputs 6
2.2.2 Digital measurements 6
2.2.3 Counters 6
2.2.4 Analogue inputs 6
2.2.5 Conventional Measurement CT/VT inputs 7
2.2.6 Conventional Protection CT/VT inputs 7
2.2.7 Digital outputs 7
2.2.8 Digital setpoints 7
2.2.9 IED Interface 7
2.3 Process and apparatus data management 8
2.3.1 Binary inputs (BI) 8
2.3.2 Measurement 10
2.3.3 Tap position indication processing 12
2.3.4 Metering 12
2.3.5 Energy counting 13
2.4 Data logging and archiving 14
2.4.1 Data logging 14
2.4.2 Data archiving 15
2.4.3 Reporting 16
2.5 Control sequences 17
2.5.1 Control sequence behaviour 17
2.5.2 Control sequence of switching devices 17
2.5.3 Close control of synchronised circuit breakers 18
2.5.4 Control sequence of transformers 18
2.5.5 Control of secondary devices 18
2.6 Automatic control functions 19
2.6.1 Interlocking 19
2.6.2 Configurable automations (PLC) 19
2.6.3 Fast configurable automation (PSL) 19
2.6.4 Built-in automatic functions 20
PACiS/EN FT/D10 Functional Description
3. PACiS ARCHITECTURES 32
5. MULTI-LINGUAL SUPPORT 37
5.1 Italian Language 37
5.2 Greek Language 37
Functional Description PACiS/EN FT/D10
2. FUNCTIONAL DESCRIPTION
2.1 Control points
2.1.1 Remote control points (RCP)
PACiS allows you to control a substation from remote control points (SCADA) generally
located some kilometres away from the substation and usually able to control several
substations.
PACiS can communicate simultaneously with different Remote Control Points (RCP) using
separate communication protocols and separate databases.
PACiS can manage up to four RCPs and provides several SCADA interfaces corresponding
to a wide range of communication protocols:
International standards:
IEC60870-5-101
IEC60870-5-104
DNP 3.0
de facto standards:
ModBus
OPC
CDC Type 2
Specific protocol:
GI74
CDC Type 2
HNZ 66S15
T101-SAS
SAS
If needed other specific protocols can be taken into account and implemented.
Definition of number and types of communication protocols is user selectable using the
PACiS System Configuration Editor (SCE).
2.1.2 Substation Control Points ( SCP)
The whole substation can be controlled from one or several Operator Workstations usually
situated inside the substation or in a communication room. This control is done via several
dedicated Operator Interfaces (OI), running on PC-like computer (called the Operator
Workstation), which provide to the user the following functions:
Control functions
alarms acknowledgement and clearing
control of switching devices (circuit breaker, switch, )
locking of switching devices
control of transformers
control of secondary devices
control of internal automation
Functional Description PACiS/EN FT/D10
Maintenance functions
full graphic representation of the system
modify the settings
system maintenance functions (databases)
disturbance files upload
monitoring analysing functions
Supervision functions
access authorisation
display of events
display of states
memo function
discordance management
reports creation
hardcopy
tooltips
NOTE: Depending on the different types of PACiS architectures, the system
can exist in a configuration without any OI but with SCADA interface.
2.1.3 Bay Control Points ( BCP)
At bay level, the control can be done via:
push buttons or remote contacts (electrically wired) which allows mainly to display and
control the switchgear and transformers.
PACiS/EN FT/D10 Functional Description
For current: 0 - 1 mA, 0 - 5 mA, 0 - 10 mA, 0 - 20 mA, 1mA, 2,5 mA, 5 mA,
10 mA, 20 mA, 4 - 20 mA
The analogue inputs are acquired on a periodical basis. There exist two acquisition cycles:
a short cycle (Nsc x 100ms, Nsc configurable from 1 to 10 with a default value of 1)
a long cycle (Nlc x 500ms, Nlc configurable from 1 to 20, with a default value of 2)
Functional Description PACiS/EN FT/D10
The accuracy of the complete acquisition chain is 0.1 % of the full scale for each range at a
reference temperature of 25 C.
The Analogue to Digital Converter has a 16-bit resolution (15 bits + sign bit) and the zero
offset value is computed by the conversion of a 0 V voltage reference. An AI is time stamped
with the date/time of the scanned value.
2.2.5 Conventional Measurement CT/VT inputs
Measurement CTs and VTs are available at a 50 Hz or 60 Hz nominal frequency (fnom).
They are acquired via a dedicated CT/VT board (TMU 200 or TMU 220) embedded in the
MiCOM C264.
2.2.6 Conventional Protection CT/VT inputs
ProtectionCTs and VTs are available at a 50 Hz or 60 Hz nominal frequency (fnom).
They are acquired via a dedicated CT/VT board (TMU 210) embedded in the MiCOM
C264P.
2.2.7 Digital outputs
Digital outputs are used to apply a switching voltage to an external device in order to execute
single or dual, transient or permanent commands. The applied voltage is fed from an
external power supply.
The external voltage is connected to the controlled device by a relay, thus isolating the logic
part of the board from the external power supply. The relays can be single pole (one contact)
or double pole (two contacts) N/O relays. There are also inverter relays (N/C) with one
normally open and one normally closed contact, which can be used when positive security is
required.
2.2.8 Digital setpoints
A Digital Setpoint is a set of several digital outputs (up to 48), each one of them representing
a bit of its value. Digital Setpoints are used to send instruction values to the process or to
auxiliary devices.
The Digital Setpoints are processed on the same boards as the Digital Outputs. The Digital
Outputs characteristics described here above apply on Digital Setpoints.
Digital Setpoints can be encoded with BCD, Binary, Gray, Decimal, 1 among N codes.
Moreover a supplementary binary output can be used for the sign bit and a dedicated binary
output can be used to enable or not the reading of the value by the external device.
2.2.9 IED Interface
The IED Interface is used for a line-to-line or multipoint interconnection between the different
system devices. The data transfer takes place with different specific serial protocols.
The provided interfaces are EIA RS-232 transmission, EIA RS-485 transmission, Fibre optic
transmission
PACiS/EN FT/D10 Functional Description
Multiple Point (MP) derived from N Digital inputs (up to 16 in case of states, up to 64
for TPI)
System Input (SI) information related to the system, to configurable and built-in
automations or to electrical process but without acquisition possibilities
GOOSE based mode: in this mode, the change of status is transmitted in multicast to
the configured receivers. Only the BI unfiltered states with their time stamping are
transmitted, the reason for change is not.
Basically, the Report mode is used to transmit filtered data for displaying, printing and
archiving. The GOOSE mode is used to transmit data as soon as possible after their
acquisition and as quickly as possible, for automation purpose.
During a loss of communication between a client and a server, the different information are
buffered at MiCOM C264 using the standard IEC61850 concept and after the communication
reconnection, they are transfert to the different clients to update their repective functions.
2.3.2 Measurement
A measurement can be acquired by using:
an analogue input
a digital measurement
a CT/VT input
2.3.2.1 Measurement processing
Configuration process allows the user to define for each measurement a scaling law (linear,
quadratic) and up to 6 thresholds for which the detection caused by a measurement variation
can create an event and alarm.
Moreover, for 4-20 mA transducers, a special feature is implemented to avoid fleeting values
around 4 mA.
Measurements can be manually suppressed (they are not processed until unsupression), or
substituted by another value. When a measurement becomes invalid, the operator can force
it by a valid value. The measurement is automatically unforced when it becomes valid again.
The configuration allows also to the user to define automatic forcing when a measurement
becomes invalid.
Measurement resulting states
State Comment
VALID Not in one of the below states
SELFCHECK FAULTY Detected faulty by the acquisition component
SUBSTITUTED By operator
FORCED By operator / Automatically
SUPPRESSED By operator
UNKNOWN Loss communication.
SATURATED Detected saturated by the acquisition component
UNDEFINED Scaling management
OPEN CIRCUIT Open Circuit Management
OVERSHOOT[1..3] Threshold management
UNDERSHOOT[1..3] Threshold management
Functional Description PACiS/EN FT/D10
Report based mode: the measurement is transmitted to the subscribers with its
value, its status, its time stamping and the reason for change
cyclically with a short period from 0 to 60 seconds (step 0,1 second) or a long period,
from 0 to 60 seconds (step 0,5 second). Periods are user selectable.
on variation:
according to a % of the full scale value: the value is sent if the acquired value is
different of more than the specified delta from the full scale value (variation is user
selectable)
according to a % of the current value: the value is sent if the acquired value is
different of more than the specified delta from the previously transmitted value
(variation is user selectable)
on Change of state: measurements are always transmitted when the change state
(VALID, AKNOWN, SUBSTITUTED,)
The following measurement values are provided using the CT/VT inputs acquisition (TMU
200 or TMU 220):
RMS currents and voltages
Active power P (Watts total and on a per phase basis with a 0,5% precision)
Total Harmonic Distortion (THD) & Total Demand Distortion (TDD) Harmonics are
evaluated up to the 15th order.
Magnitudes
Synchrocheck information: F, V,
PACiS/EN FT/D10 Functional Description
TPI can be suppressed, substituted and forced like digital inputs and measurements.
State Comment
VALID Not in one of the below states
SELFCHECK FAULTY Due to an AI board fault or a DI board fault
SUBSTITUTED By an operator
FORCED By an operator
SUPPRESSED By an operator / automatically
UNKNOWN If the tap position is acquired via a transmission link, the
information is unknown when the link is disconnected.
UNDEFINED Due to a wrong encoding for a digital acquisition, or a saturation,
an open-circuit or an out-of-range value for an analogue
acquisition
OVERSHOOT[1..3] there exist 3 Overshoot states, one for each upper threshold
violation. Only one could be set at one time
UNDERSHOOT[1..3] there exist 3 Undershoot states, one for each lower threshold
violation. Only one could be set at one time
State Comment
VALID not in one of the below states
SELFCHECK FAULTY Due to the SELFCHECK FAULTY of the DI
UNKNOWN If the counter is acquired via a transmission link, the
information is unknown when the link is disconnected.
UNDEFINED Due to a counting failure of DCT (non-complementarity of the
two contacts)
OVERRANGE when the maximum value is reached
Chronology
Origin: substation name, voltage level name, bay name, module name
ObjectName: BI name
Origin Category: specifies the category of the originator that caused the change of
value ( bay-control, station-control, remote-control, automatic-bay, automatic-station,
automatic-remote, maintenance, process)
Origin Identification: name of the originator who caused the change of value.
NOTE: For the following Common Data Classes these two last columns are
empty:
Measurement
Daily table for the mean values of the day. These tables are stored during 35 days.
Monthly table for the minimum, maximum, mean values, computed at a reference time
(configurable) of a day. Monthly tables are stored during 15 months.
Yearly table for the minimum, maximum, mean values, computed at a reference time
(configurable) of a month. Yearly tables are stored during 5 years.
Backup central archiving
A backup of the central archive (i.e. of the SQL database) is allowed at a configured date /
time
Waveform and Disturbance Files
These files, generated at a local level, can be automatically uploaded from a device. Only
one central file archiving is defined in the system. The automatic upload could be activated /
de-activated by the operator. The disturbance files are stored in COMTRADE 2001 binary
format.
A storage policy is defined to avoid filling up the hard disk:
a maximum of 10 files can be stored on a per device basis: the oldest is automatically
removed when a new one is uploaded
real-time information
the Inter-control delay has expired (time between two sequence in the same device)
only raise command is allowed if the tap position value is the smallest one authorised
only lower command is allowed if the tap position value is the higher one authorised
Transformers can be managed in the three modes (Direct Execute, SBO once and SBO
many):
Direct Execute: only one control raise or low is performed in the control sequence.
The initiator of the request must perform many Direct Execute sequences before
reach the expected position.
SBO once: the sequence is similar to the Direct Execute but the execution phase is
preceded by a selection phase. In this phase are performed all controls checks and
the selection of the device (if it is configured).
SBO many: after the selection phase, many controls raise or low can be performed in
the same sequence in order to reach the expected position. The sequence ends only
after an unselect request from the initiator.
2.5.5 Control of secondary devices
PACiS control secondary devices like protective relays or IED allowing to (non-exhaustive
list):
Modify the setting groups parameters used by a protection equipment (for example 1
among N command type if N setting groups are available for the protection)
Reset some internal indication (for example single command type to reset alarm
indication on a protective relay)
by operator request
PACiS embeds the ISAGRAF tool (provided by ICS Triplex company) to perform the PLC
2.6.3 Fast configurable automation (PSL)
Due to the range of PLC cycle time (no less than 50 ms), another type of fast automation is
provided in PACiS: the Programmable Scheme Logic automations.
These automations are event-driven: they are calculated each time an input changes (i.e.
there is no cycle time). Inputs can be BI and measurements.
PSL are logical equations that use the following functions:
bistable function
Trip Circuit Supervision with two Digital Inputs without external resistor.
Functional Description PACiS/EN FT/D10
state basis alarm management: one alarm for each state is displayed
gravity level basis alarm management: only one alarm for each gravity level is
displayed. The previous one is replaced by the current one with same gravity level
data basis alarm management: only the last alarm is displayed. The previous one
is replaced by the current one
Spurious alarms management: are defined for events which appear but never
disappear (control acknowledgement for example)
Only the data based alarm processing is managed by the MiCOM C264 .
2.7.2 Alarm display
SCP level: the alarms are displayed via the HMI at SCP level, using:
the chronologically sorted list of the alarms (with additional sorting criteria as
geographic or functional)
with different colours for each line of the previous lists, depending on the alarm
state
graphic pictures defined during configuration phase, displayed in the different views,
which can be associated to the presence and the states of alarms for a device, for a
bay, for a voltage area, for the whole substation, etc.
BCP level: the alarms are displayed in the form of one list in the panel. This list is a circular
queue and is displayed in a scrollable view.
2.7.3 Alarm aknowledgement and clearing
An alarm can be acknowledged by an operator, to signify that it has been taken into account.
Acknowledgement can be done by the operator at SCP or BCP level. An acknowledgement
done at BCP level has no impact at SCP level and vice-versa.
Independently of the alarm acknowledgement, the audible annunciation can be
acknowledged by an operator or automatically after a user-selectable delay
An alarm can be cleared only if the reason of its apparition disappear (becomes inactive) and
was acknowledged by an operator.
An alarm can also be configured as to be cleared automatically when it becomes inactive
and is acknowledged.
PACiS/EN FT/D10 Functional Description
Synchronisation signal
Which synchronises
through SCADA bus
System Master Clock
System Master Clock
Which synchronises
IEC61850 equipment
Which synchronises
through legacy bus
IEDs
S0411ENb
In the event that the external clock does not exist or is lost, the System Master Clock
equipment can be synchronised by a SCADA or by an operator. Synchronisation priority of
the System Master Clock is in the following order:
1. From the external clock (if it exists)
2. From the SCADA (if it exists) in case of failure of the External Clock ( only if the
SCADA protocol is managed by the System Master Clock computer)
3. From the operator in case of failure of the External Clock and the SCADA
Each Station Bus equipment after reception of a synchronisation message performs its local
update procedure:
MiCOM C264: if the delta between the local clock and the synchronisation message is
less than 20 ms, a smooth increase/decrease of the local clock is done. Otherwise,
the local clock is immediately set with the date/time of the synchronisation.
Operational: the equipment is working correctly (all the functions are executed)
Test: all functions are executed except activation of the relays of local output controls.
The equipment simulates a positive acknowledgement for control sequences
simulation. Note the output controls continue to be sends to the IEDs or to other
computers.
Maintenance: the equipment is working but only some functions are executed,
generally the supervision functions (download and display data base information,
communications state,).This mode is requested by the operator or reached
automatically in case of data base incoherence.
Faulty (only for MiCOM C264): the equipment is working but only some functions are
executed, generally the supervision functions , functions not involved in the
management of the electrical process. This mode is a consequence of a failure
detected on the equipment.
to continue to control the substation from SCP level if a single failure occurs involving
one PACiS OI
Two types of redundancy are available:
create/update the objects for system devices according to customer and substation
requirements
check coherency and consistency between the objects before deployment into the
system
system architecture objects which defines the SCS architecture (for example
equipment of the system)
functions description objects which define the functions accomplished by the SCS (for
example overcurrent protection function)
real time exchanged data which define the communications between equipment and
functions
2.11.2 Stand-alone Configuration Tool (SCT)
The Stand-alone Configuration Tool is based on the same principles than the SCE but is
limited to the configuration of one computer. Nevertheless, some functions cannot be
configured using this tool (refer to the SCT documentation)
Functional Description PACiS/EN FT/D10
Status (ON / OFF) of the inputs of the configured BIU, DIU and CCU boards
Status (OPEN / CLOSE) of the outputs of the configured BIU, DOU and CCU boards
List of all IED configured with IED address and the legacy bus status (CONNECTED /
DISCONNECTED)
Maintenance (visualisation and modification for example Local access for computer
maintenance)
the system tools that are the main components of PACiS OI server: agency, OI
Server, SMT_kernel and few other processes to be defined by the user and
considered as essential;
the secondary tools: additional processes with less importance than the previous
ones, that the user wants to be started also at each time his application starts or at
each PC boot.
In event of crash of a system tool, PACiS Watch restarts it automatically. But the event of
more than a predefined number of crashes (by default 3) inside a predefined duration (by
default 1 hour) the system tools crashes are considered too repetitive and Pacis Watch
reboots the PC as default behaviour. As other possibility, it can stop itself after stopping all
the watched tools, if the user prefers this option.
In event of crashes of the secondary tools, PACiS Watch restarts them systematically,
independently of the number of crashes. Their crashes cant lead to the PC reboot.
2.12.2 Use
2.12.2.1 Start
In this mode PacisWatch takes in account the PacisWatch.ini file located in C:\Program
Files\PACIS\PacisWatch directory. It is possible to load and switch the BD with SMT.
There are two ways to launch PACiS Watch:
at each PC boot via a PACiS Watch shortcut present in C:\Documents and Settings\All
Users\Start Menu\Programs\Startup folder as shown below. So the final user does not
have to launch PW himself/herself .
Functional Description PACiS/EN FT/D10
by selecting the PACiS Watch item from the Start/Program menu; in this case the
shortcut of the C:\Documents and Settings\All Users\Start Menu\... folder is activated,
as shown below:
At its launch PACiS Watch triggers the start of the Pacis OI Server and potentially
SMT_kernel and the potential other processes stated in the PacisWatch.ini file.
The state of processes and the crashes are logged in the PacisWatch.txt file, which is
created in the directory, where PACIS Watch is installed.
If this file size is more than 250 Kbytes at the beginning of a session, PACIS Watch copies
this file as PacisWatch_Old.txt and create a new PacisWatch.txt file.
2.12.2.2 Number of crashes over the limit
If more crashes than the maximum number have occurred, there are several cases:
1. If the last one occurs inside the predefined time interval (H_hours), what happens
depends on the value of the ConfirmBeforeReboot parameter:
PACiS Watch stops the remaining watched processes and the PC shutdowns
directly after a short apparition of a system information window indicating 30
seconds remain to possibly save files before the shutdown.
Then the PC reboots automatically. In this case the PACIS Watch shortcut is
activated like the other shortcuts present in the start-up folder. In the next session
of PACIS Watch the crashes count is re-initialised.
1: the following Message box proposes to the user to shutdown and reboot the station:
PACiS/EN FT/D10 Functional Description
Yes: PACIS Watch stops the processes of the lists of the .ini file that are still running
and then shutdowns after 30-second of timeout. Then the PC reboots
automatically.
No for instance (by instance in integration phase): PACIS Watch stops all the watched
processes and stops itself. Beware that, in this case, only a manual action can
restart the application.
2. If the crash over the limit (N_crashes_inH) occurs later than the time interval
(H_hours) started when the first crash occurred, no shutdown is triggered. Instead a
new watch interval is started with this last crash considered as the first one (CRASH
1) of the period.
2.12.2.3 Quitting by a user
Different behaviours are possible when the user has manually stopped OdcLoading or
SMT_kernel (using the Exit command available by right-click on the icon of either tool, in the
system tray).
It is possible to configure PACiS Watch so that it restarts automatically this stopped tool,
after a defined timeout, if the user has not yet restarted it. This depends on the value of the
RestartAfterUserExit flag of the .ini file (see Settings in OI ENIN). The timeout duration after
quitting also be set in the same way. By default there is no automatic restart of the two
system tools.
Functional Description PACiS/EN FT/D10
2.13 Cybersecurity
2.13.1 General
There are 4 user profiles. The application will have up to 4 profiles protected by password so
4 roles are predefined. The login/password defines the menu that you can use. The
password length could be extended to 8 digits.
Disable the unused application and physical ports.
You must disable all of the unused physical ports. You must disable all of the unused
Ethernet ports.
Profile lockout: log off after x minutes of inactivity.
Store security logs: make a record of the date time and log duration. Circular buffer (size
depends of the device).
Antivirus.
When you start an application, a disclaimer is displayed. Make sure that the user always
knows where he operates. You can show a user banner if necessary.
PACiS/EN FT/D10 Functional Description
3. PACiS ARCHITECTURES
The PACiS System architecture is always based on a Station Bus to which are connected
PACiS & MiCOM equipments used for the customer solution. These equipments are:
the IEDs (protective devices, disturbance and quality recorder, when available on
Station Bus)
PC-based for PACiS GTW Telecontrol Interface and PACiS OI Operator Workstation
MiCOM Hxxx Ethernet switch, this equipment is used for Ethernet redundancy
Any combination of equipment around the Station Bus is allowed to match with the required
application.
The typical PACiS architecture consists in a series of devices connected over the
ETHERNET communication network, in order to:
maximise the functional integration through fast exchanges between devices (10/100
Mbps)
integrate third party devices within the Digital Control System of the substation
PACiS offers connection with legacy communication networks (RS232, RS485, optical) in
order to fully re-used past investments with the new generation.
System
Configuration
Editor
Operator
SCADA Internet
Workstations
Gateway or PSTN
Station bus
Master clock
(GPS, radio)
I/O, CT, VT
S0412ENa
Functional Description PACiS/EN FT/D10
Computer
PCI Switch
MiCOM H14
Ethernet convertor
Electrical / optical
Optical switch
MiCOM H60
Optical fibre
IED11
IED1 IED2
IED13
IED3
IED2
IED14
IED3
IED4
S0414ENa
PACiS/EN FT/D10 Functional Description
C364
Redundant Rail
Redundant Rail
DIN Switch
DIN Switch
MiCOM H35
MiCOM H35
C264
Redundant C264
switch SWR200
Redundant Rail
Bay DIN Switch
MiCOM H35
IED10
IED11
C264
IED12
IED1
IED2
IED3
S0415ENa
Functional Description PACiS/EN FT/D10
C264 C264
IED11 IED6
IED1 IED10
IED12 IED7
IED2 IED20
IED3 IED30
S0416ENa
PACiS/EN FT/D10 Functional Description
BAY 1 BAY 2
Dual Homing
SWD20x board Dual Homing
Rail DIN H36x
C264
C264
IED2
S0417ENa
The Dual Homing architecture can also be used with a ring architecture with additional
electrical / optical Ethernet converters.
4.4 Virtual LAN
PACiS V5 offers the capability to send information on Physical VLAN according to the
recommendations in Annex C of IEC61850-8-1.
The default virtual LAN IDs and priorities are described below:
5. MULTI-LINGUAL SUPPORT
SCE: only the menus and the capability to configure the Italian language. The data
model is not translated
CAT
SMT
PACiS S1
The SCE allows you to select the Greek language and to create Greek datapoint
labels. The system data model of the SCE is not translated into Greek
Note: All of the other PACiS sub-systems are not translated into Greek.
PACiS/EN FT/D10 Functional Description
BLANK PAGE
Glossary PACiS/EN LX/D10
GLOSSARY
Glossary PACiS/EN LX/D10
Page 1/14
CONTENTS
Page 2/14
BLANK PAGE
Glossary PACiS/EN LX/D10
Page 3/14
Page 4/14
2. GLOSSARY
AC Alternating Current
AccI Accumulator Input
ACSI Abstract Communication Service Interface
Mapping from the standard IEC 61850 abstract specification of
communication service to a concrete communication infrastructure based
on CORBA.
A/D Analog/Digital
ADC Analog to Digital Converter
AE qualifier Application Entity qualifier
Used internally by IEC 61850 to identify a server application
AI Analog Input (Measurement Value including state attribute)
Commonly Voltage or current DC signals delivered by transducers, and
representing an external value (refer to CT/VT for AC).
AIS Air Insulated Substation
AIU Analog Input Unit ( C264 Bay Computer board name for DC Analog Input)
Alarm An alarm is any event tagged as an alarm during the configuration phase
AO Analog Output
Value corresponding to a desired output current applied to a DAC.
AOU Analog Output Unit ( C264 Bay Computer board name for Analog Output)
API Application Programming Interfaces
AR Auto-Reclose
ARS Auto-Recloser
ASCII American Standard Code for Information Interchange
ASDU Application Specific Data Unit
Name given in the OSI protocol for applicable data (T103, T101..)
ASE Applied System Engineering
ATCC Automatic Tap Change Control
Automation in charge of secondary voltage regulation, more specific than
AVR
AVR Automatic Voltage Regulator
Automatic system used to regulate the secondary voltage by automatic
tap changer control (see ATCC). Set of features can be added, see
chapter C264 FT.
Bay Set of LV, MV or HV equipment (switchgears and transformers) and
devices (Protective, Measurement) usually encompassing a Circuit
Breaker and ancillary devices, and controlled by a bay computer.
BCD Binary Coded Decimal
One C264 supported coding on a set of Digital Inputs, that determine a
Digital Measurement, then a Measurement value (with specific invalid
code when coding is not valid). Each decimal digit is coded by 4 binary
digits.
BCP Bay Control Point
Name given to the device or part used to control a bay. It can be Mosaic
Panel, C264 LCD, usually associated with Remote/Local control.
BCU Bay Control Unit
Name given to the C264 controlling a bay. Usually in contrast to
Standalone.
Glossary PACiS/EN LX/D10
Page 5/14
Page 6/14
Page 7/14
Page 8/14
Page 9/14
Page 10/14
Page 11/14
Page 12/14
Page 13/14
TM Analog Measurement
TMU Transducer-Less Measurement Unit
Topological Interlocking algorithm, based on evaluation of topological information of
interlocking the switchgear arrangement in the HV network, the switchgear type and
position, and defined rules for controlling this kind of switch (e.g. continuity
of power supply)
TPI Tap Position Indication (for transformers).
Frequently acquired via a Digital Measurement
TS Logic position
Page 14/14
Voltage level Set of bays, whose plants & devices deal with the same voltage (for
example, 275 kV)
VT Voltage Transformer
Electric device connected to process and extract a voltage measurement.
By extension, part of a device (C264) that receives this AC value and
converts it to a numerical measurement value. VTs are wired in parallel.
PACiS System
CYBER SECURITY
Cyber Security PACiS/EN CS/D10
CONTENTS
3. DOCUMENTATION REFERENCE 5
5. CYBERSECURITY POLICY 7
5.1 Applicability 7
5.2 Disclaimer 8
5.3 Banner 8
5.4 Password 8
5.4.1 Password strength 8
5.4.2 Privileges 9
5.4.3 Profile lockout 9
5.4.4 Default password 10
5.5 Log off after x minutes of inactivity 10
5.6 Device hardening and EWF 11
5.7 Security logs 11
5.8 Antivirus 12
6. APPENDIX 13
6.1 Port reservation 13
PACiS/EN CS/D10 Cyber Security
BLANK PAGE
Cyber Security PACiS/EN CS/D10
SMT/EN IN chapter
OI/EN IN chapter
GTW/EN IN chapter
SUI/EN IN chapter
PACiS/EN CS/D10 Cyber Security
3. DOCUMENTATION REFERENCE
Not Applicable.
PACiS/EN CS/D10 Cyber Security
Unused Ports: Operator has the responsibility to close the other ports not used by
applications in order to secure access (refer on Appendix on section Port reservation).
Antivirus: PACiS applications are authorized to run with the condition an antivirus is
installed. Operator has the responsibility to realize the PC scanning and antivirus
updating.
4.2 Permanent PC based application
Definition: Time-critical applications running permanently on a PC like: PACiS GTW (without
HMI), PACIS SMT kernel are considered as Permanent PC based application.
Operator has the whole responsibility to define the cyber security policy.
4.6 Applications out of cyber security scope
Applications PACiS OI and PACiS SCE are out of scope of cyber security.
Cyber Security PACiS/EN CS/D10
5. CYBERSECURITY POLICY
The minimum Cyber Security policy includes:
Security logs
Antivirus
5.1 Applicability
The synthetic requirements for each application inside the cyber security scope are
described on this table below. The presentation of requirements is described on next
sections.
CAT: 4
Profile lockout X X X X
Log off
Unused ports - - X X
EWF - X - -
Security logs X X X X
Antivirus Not recommended Strongly -
PACiS CYBER Tool recommended
recommended
X : Requirement exis
: Requirement does not exist
PACiS/EN CS/D10 Cyber Security
5.2 Disclaimer
The disclaimer is a message shown at launch to transfer the usage responsibility to the user.
To access to the application, the user must accept this contract, written in the software
language.
Press the button I Agree to move on. Pressing I Disagree causes the program to close.
5.3 Banner
The banner is an easy-to-read message that plainly identifies the device where the user is
connected / working to prevent him/her from mistaking it for another one.
It is stored in C264 or the connected PC.
The banner is fixed whatever language is selected; it is configurable in SCE:
It can be the start and/or inactivity (screen saver) C264 panel to comply with the
NERC standard, or neither.
5.4 Password
A password is required to place a command or set a parameter (whether from the front panel
or via a PC-based application). For this purpose, at some point, the user chooses a profile
that depends on the intended activity.
Access without a proper password is denied as soon as the security administrator has
defined the passwords.
5.4.1 Password strength
It is recommended to comply with the NERC standards; for this purpose, the password must
have 8 caracters and in addition contains at least one character from all the categories that
follow:
5.4.2 Privileges
A profile (or role or account) is a set of privileges. Its name is referred to as login.
The privileges cumulate starting from Observer up to System administrator.
Privileges Eligibility
Change the software content System administrator
Enable/disable communication ports
Change a sub-system operating mode
Download database System administrator + System engineer
Change settings, place commands
View data System administrator + System engineer
+ Observer
A fourth profile is the Security administrator, who is only in charge of the security policy.
He/she has exclusive capacity to change passwords.
No other profile than the four mentioned ones can be created.
The authentication server hosted in C264 has three clients (MS1 is MiCOM S1 for short):
For the same login, the password is the same on all computers. Two profiles sharing the
same credentials (login + password) differ in their privileges as the applications are different.
It is NOT possible to open several sessions at a time. In other words, if a user is connected
to a C264 using one tool, another user can NOT be connected to this C264 using another
tool even with another account.
5.4.3 Profile lockout
The lockout is the automatic blocking of a session; viewing of the current screen is still
possible. Any new login attempt, even with a correct password, is rejected.
The Security administrator defines the profile lockout policy; if no lockout is defined for a
profile, the sessions last as long as the user logs off on his/her own.
PACiS/EN CS/D10 Cyber Security
Several consecutive failed login attempts result in temporary lockout of login. CAT counts the
number of consecutive login failures:
1. The first invalid login sets this counter to 1 and starts a timer.
2. Further invalid writes (for the same profile) increment the counter; at timer expiration,
or if the correct password is entered, the counter is reset to 0.
3. Once the counter value reaches the configured maximum, the password entry is
locked out. A blocking timer is started and any attempt to enter the password result in
an error response, irrespective of whether it is a correct password or not. This does
not restart the blocking timer. Once the blocking timer has expired, the password entry
is unblocked.
C264 : AAAAAAAA (8 x A)
CAT : AAAAAAAA (8 x A)
For SMT session, the timeout is set by default to 10 minutes and can be configured for
SMT Kernel via "set password HMI".
5.6 Device hardening and EWF
The Enhanced Write Filter (or EWF) is a component of Windows XP Embedded which
filters writes to another medium instead of being physically written to the volume itself. EWF
allows the writes to be discarded or committed to the physical volume.
Best practices are indicated by Schneider-Electric Platform Microsoft Windows XP
hardening recommendations. These recommendations give a brief description of standards
tools provided with Windows OS (XP sp3) to help to secure a PC through physical and
software hardening, and with account policies enforcement.
5.7 Security logs
The applications record actions related to cyber security in a circular buffer (the size of the
file depends on the sub-system capabilities). It includes the following information:
Date and time: year, month, day, hour, minute, second and millisecond
Actions:
- Antivirus efficiency
- Login: successful or not or attempt
- Manual/Automatic logoff
- Port disabled
- Firmware change: resulting in a firmware change
- Password level change
- Security log viewing/downloading
Example:
PACiS/EN CS/D10 Cyber Security
5.8 Antivirus
The Windows-based PCs are vulnerable to viruses.
At application launch, the PC does a check for an antivirus presence. In case of absence, it
is up to the user to move on or not as stated:
At application launch, the PC does a check for the virus signatures list date:
6. APPENDIX
6.1 Port reservation
PACiS Applications ports reservation
BLANK PAGE
Customer Care Centre
http://www.schneider-electric.com/CCC
Schneider Electric
35 rue Joseph Monier
92506 Rueil-Malmaison
FRANCE
Phone: +33 (0) 1 41 29 70 00
Fax: +33 (0) 1 41 29 71 00
www.schneider-electric.com Publishing: Schneider Electric
Publication: PACiS/EN TG/D10 04/2013