Manual
Manual
COMMUNICATIONS
User Manual
Teleprotection Equipment Notice
Warranty
This Valiant product is warranted against defects in material and workmanship for a period of
one year from the date of shipment. During the warranty period, Valiant will, at its discretion,
either repair or replace products, which prove to be defective. For warranty service or repair,
this product must be returned to a service facility designated by Valiant. The buyer shall
prepay shipping charges to Valiant and the company shall pay shipping charges to return the
product to the buyer. However, the buyer shall pay all the shipping charges, duties and taxes
for products returned to Valiant from another country.
Limitation of Warranty
The foregoing warranty shall not apply to defects resulting from improper or inadequate
maintenance by the buyer. The buyer-supplied firmware or interfacing, unauthorized
modification or misuse, operation outside of the environmental specifications for the product
or improper site preparation or maintenance.
Exclusive Remedies
The remedies provided herein are the buyer's sole and exclusive remedies. Valiant shall not
be liable for any direct, indirect, special, incidental or consequential damages, whether based
on contract or any legal theory.
Notice
Safety Warnings
!
The exclamation point within a triangle is intended to warn the operator or
service personnel of operation and maintenance factors relating to the product
and its operating environment, which could pose a safety hazard.
Always observe standard safety precautions during installation, operation and maintenance
of this product. Only qualified and authorized service personnel should carry out adjustment,
maintenance or repairs to this instrument. No adjustment, maintenance or repairs should be
performed by either the operator or the user.
Index
Particulars P. No.
Section 1: Product Description 6
Product Overview 7
Features and Benefits 7
Performance 8
Flexibility and User Programmability 8
Maintenance 8
Event and Alarm Logging 9
Management and Monitoring 9
Reliability 9
Error Detection and Coding 9
Time Clock 9
Application Diagram 10
Index
Particulars P. No.
Optical C37.94 Interface (SFP) Connection 28
Command Selection Settings 29
Index
Particulars P. No.
To Configure DNS IP Address 74
To Set SNMP Read Community 74
To Set SNMP Write Community 74
To Enable / Disable the SNMP 74
To Add New User 74
To Delete the User 75
To Change the Super User Password 75
To View System User List 75
To View Log of all successful Users 75
To View Log of all failed attempts 75
To View Log of SSH Users 75
To View Log of Telnet Users 76
To View Log of Serial Port Users 76
To View Log of All Authorized Users 76
To Change Audit User password 76
Test Command 76
To View Ping result 76
System Commands 76
Help Statements 76
Setting Statements 79
Inter-Tripping (Direct Tripping or Transfer tripping) 82
Permissive Tripping 82
Blocking Protection Scheme 82
Mapping Statements Description (C37.94 Based System only) 87
To Configure CRC4(for E1 based system only) 88
To Configure E1 Line Impedance (for E1 based system only) 88
RTC Setting Statements Description 89
Query Statements Basic Settings Description 90
Query Statements Misc Description 92
Query Statements RTC Settings Description 93
CAUTION
ELECTROSTATIC
SENSITIVE
DEVICES
SECTION: 1
Product Description
Product Overview
Teleprotection equipment is extremely reliable and flexible product that offers up to 8, two-way
independent command channels, operated selectively or simultaneously over a wide choice and a
variety of transmission interfaces.
Trip Counter Display and Alarm Extension Unit is designed as an optional extension of the
Teleprotection Equipment to provide 8 Channel, Digital Trip Counter Display along with 8 External
Relay Alarm outputs.
The Trip Counter Display and Alarm Extension Unit may be either powered from the Teleprotection
Equipment, or directly from a 48V DC, 110V DC, 220V DC or 250V DC power source. 1+1 Redundant
Power is also offered as an option.
! IEEE C37.94 compliant Multi-Mode optical fiber interface for transmission over short-reach multi-
mode optical fiber links
! IEEE C37.94 modulation compliant Single-Mode optical fiber interface for transmission over long-
reach, single-mode optical fiber links (<40 KM, <80 KM, <120 KM, <150 KM)
! Option of 1+1 redundant optical path protection / route protection
! 64Kbps, G.703 co-directional digital data interface option for transmission over 64Kbps data links
! E1, 2.048Mbps, G.703 interface option for transmission over E1 links.
Performance
! Less than 2ms command transfer time
! Less than 4ms relay operating time
! Less than 6ms back-to-back operating time (including relay operating time) in IEEE
C37.94 Optical mode
! Less than 6ms back-to-back operating time (including relay operating time) over
IP/MPLS Interface
! Less than 6ms back-to-back operating time (including relay operating time) in
2.048Mbps, E1 interface mode
! Less than 7ms back-to-back operating time (including relay operating time) in 64 kbps,
G.703 Co-directional 4 wire data interface mode.
User programmable parameters for “Input” command sampling time and “Output” command holding
time:
! User programmable command holding delay for error resistant command inputs
! User programmable command sampling rate for error resistant command transmission
Maintenance
! Manual Loop Test: This feature initiates a “Manual Loop-Test” of the transmission link that
interconnects the “Local” Teleprotection Terminal and the “Remote” Teleprotection Terminal
! Automatic Loop Test: The Automatic Link Test feature automatically initiates “Periodic Loop
Tests” at user programmed intervals of the transmission link that interconnects the “Local”
Teleprotection Terminal and the “Remote” Teleprotection Terminal
! Delay Measurement: This feature automatically initiates an end-to-end “Delay Measurement
Test” between the “Local” and the “Remote” Teleprotection Terminal through the interconnecting
transmission link.
Reliability
Time Clock
! Built-in real time clock (RTC) with 10-year battery backup for event and alarm time-stamping
! Synchronization with an external IRIG-B Input from GPS.
Application Diagram
High Voltage Line
Trip Trip
2 Optical Fiber
Teleprotection Teleprotection
Substation A Substation B
High Voltage Line
Optical Fiber
Teleprotection system
Offered by Orion
Figure # 2 Typical Application over a IEEE C37.94 compliant optical link, as an integrated
part of the VCL-MX V6 E1 voice and data multiplexer solution over an SDH or PDH data network.
SDH or PDH
Network
E1 Interface E1 Interface
8 8 8 8
SECTION: 2
Technical Specifications
Technical Specifications:
Number of Interfaces 1
Conformity (Electrical) G.703 (E0)
Nominal Impedance 120 Ohms balanced
Bit Rate 64 Kbps
Type Co-directional, Synchronous
Connector RJ45 (Female)
Number of Interfaces 1
Conformity (Electrical) G.703 (E1)
Frame Structure As per ITU (CCITT) G.704
PCM Sampling Rate 8000 Samples/sec
Bit Rate 2048 Kbps ± 50 ppm
Code HDB3
Nominal Impedance 75 Ohms unbalanced / 120 Ohms balanced
Peak Voltage of a mark for balanced 2.37 V ± 0.237 V (75 Ohms unbalanced)
75 / 120 Ohms interface 3.0 V ± 0.3 V (120 Ohms balanced)
Nominal Pulse Width 244 ns
Pulse Mask As per ITU (CCITT) Rec. G.703
Output Jitter < 0.05 UI (in the frequency range of 20Hz to 100
Khz)
Permissible Attenuation 6 dB at 1 Mhz
Return Loss at:
51.2 KHz to 102.4 Khz > 12dB
102.4 KHz to 2048 KHz > 18dB
2048 KHz to 3072 KHz > 14dB
Jitter Tolerance As per ITU (CCITT) G.823
Loss and Recovery of Frame Alignment As per Clause 3 of ITU (CCITT) G.732
Connector Type RJ45 (F) - 120 Ohms
BNC(F) - 75 Ohms
Connector BNC
Impedance 50 Ohms
Output
! Compliant with IEC 60834-1 and IEC 834-1 specifications and standards.
! 24V DC.
! 48V DC.
! 110V DC / 125VDC
! 220V DC / 250V DC
! Voltage Withstand: Meets and exceeds IEC 834-1 and IEC 255 requirements.
Power Consumption
! < 15 Watts.
! ESD, Voltage and Surge Withstand: Meets and exceeds IEC 61000-4-2, IEC 61000-4-4, IEC
61000-4-5, Level 4 specifications
! Immunity to Voltage Dips, Short Power Supply Interruptions and Voltage Variations meets and
exceeds IEC 61000-4-11, Level 1 specifications.
Environmental
0 0
Operating Temperature -20 C to +60 C
Maximum Operating Humidity 95% R.H., Non-Condensing
Maximum Operating Altitude Up to 3,000 meters above sea level
Operation Complies with ETS 300 019 Class 3.2
Storage Temperature -400C to +700C
Storage Complies with ETS 300 019 Class 1.2
Maximum Storage Humidity 98% R.H., Non-Condensing
Maximum Storage Altitude Up to 3,000 meters above sea level
Transportation Complies with ETS 300 019 Class 2.3
! EN 50081-2
! EN 50082-2
! IEC 61000-6-2 (immunity)
! IEC 610000-6-4 (emission)
Compliance / Regulatory
! Meets CE requirements
! Complies to IEEE and IEC standards
! Complies with FCC Part 68 and EMC FCC Part 15 and CISPR 22 Class B
! Operation ETS 300 019 Class 3.2
! Storage ETS 300 019 Class 1.2
! Transportation ETS 300 019 Class 2.3
SECTION: 3
Front View
L1 L5 L1 L5 TELEPROTECTION EQUIPMENT
L2 L6 L2 L6
L3 L7 L3 L7
L4 L8 L4 L8
SYNC
INPUT OUTPUT
L1
L2
L3
L4
LAMP
TEST IRIG-B OAM OAM
COM PORT USB
PORT RESET
PORT
L1 L5 L1 L5 TELEPROTECTION EQUIPMENT
L2 L6 L2 L6
L3 L7 L3 L7
L4 L8 L4 L8
SYNC
INPUT OUTPUT
L1
L2
L3
L4
LAMP
TEST IRIG-B OAM OAM
COM PORT USB
PORT RESET
PORT
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
OPT PORT
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
OPT PORT
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
E1 PORT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
E1
– + – +
EXT. ALARM OUTPUT INPUT
TX RX
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
G.703 PORT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
OPT PORT
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
OPT PORT
B1 B2 B3 B4 B5 B6 B7 B8
- 48VDC - 48VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
OPT PORT
B1 B2 B3 B4 B5 B6 B7 B8
110~250VDC 110~250VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
Display Connector
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
OPT PORT
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
Display Connector
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8 OPT PORT
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
Note:
NC = Normally Closed
NO = Normally Open
COM = Common
L1 L5 L1 L5 TELEPROTECTION EQUIPMENT
L2 L6 L2 L6
L3 L7 L3 L7
L4 L8 L4 L8
SYNC
INPUT OUTPUT
L1
L2
L3
L4
LAMP
TEST IRIG-B OAM OAM
COM PORT USB
PORT RESET
PORT
PC
OAM Connection
RJ-45
(Female)
RJ-45 (Male)
L1 L5 L1 L5 TELEPROTECTION EQUIPMENT
L2 L6 L2 L6
L3 L7 L3 L7
L4 L8 L4 L8
SYNC
INPUT OUTPUT
L1
L2
L3
L4
LAMP
TEST IRIG-B OAM OAM
COM PORT USB
PORT RESET
PORT
DB9 (Female)
Connector
PC
DB9 (Male)
Connector
To Computer
L1 L5 L1 L5 TELEPROTECTION EQUIPMENT
L2 L6 L2 L6
L3 L7 L3 L7
L4 L8 L4 L8
SYNC
INPUT OUTPUT
L1
L2
L3
L4
LAMP
TEST IRIG-B OAM OAM
COM PORT USB
PORT RESET
PORT
USB (Female)
PC
Connector
USB
Port
USB (Male)
Connector
DC Input Connection
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
OPT PORT
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
24/48/110/250V DC
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
G.703 PORT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
G.703 Connection
RJ-45 (Female)
G.703 Cable
RJ-45 (Male)
E1 Interface Connection
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
E1 PORT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
E1 Connection
RJ-45 (Female)
E1 Cable
RJ-45 (Male)
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
OPT PORT
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
DISPLAY
– + – +
EXT. ALARM OUTPUT INPUT
COM1
COM2
COM3
COM4
COM5
COM6
COM7
COM8
OPT PORT
NO1
NO2
NO3
NO4
NO5
NO6
NO7
NO8
B1 B2 B3 B4 B5 B6 B7 B8
110~125VDC 110~125VDC
INPUT 1 INPUT 2
COM
NC
NO
COM1
NC1
NC5
COM2
COM3
COM7
COM8
COM6
COM5
NC2
COM4
NC6
NC3
NC7
NC4
NC8
A1 A2 A3 A4 A5 A6 A7 A8
Open Top cover of VCL-TP Teleprotection Equipment and select the command option (48/110V DC) as
per below setting on main board.
Links
VOLTS
J1-J32
MOUNTED 48V
REMOUED 110V
Links
VOLTS
J1-J32
MOUNTED 48V
REMOUED 110V
J7 J3
J5 J1
J6 J2
J8 J4
Open Top cover of VCL-TP Teleprotection Equipment and select the command option (110/250V DC)
as per below setting on main board.
Links
VOLTS
J1-J32
MOUNTED 110V
REMOUED 250V
Links
VOLTS
J1-J32
MOUNTED 110V
REMOUED 250V
J7 J3
J5 J1
J6 J2
J8 J4
SECTION: 4
Parameter Value
SNMP Settings
SNMP Enable
SNMP Read (get / getnext) Community public (case sensitive)
SNMP Write (set) Community private (case sensitive)
SNMP Trap Community public (case sensitive)
SNMP Trap Target Address1/2/3 127.0.0.1
SNMP Trap Target Port1/2/3 162
The OAM (Operations, Administration and Management / Maintenance) is a general term that is used
to describe the processes, activities, tools, standards, etc., involved with operating, administering,
managing and maintaining any system.
The OAM Interface is used to access, manage and control the system. OAM interface provides the
terminal with a highly secured interface, which is compliant with all GR-815 CORE 2 mandatory
clauses and requirements. The OAM Interface of the terminal provides two serial ports (DB-9 and
USB) and one 10/100BaseT Ethernet port to connect the unit to the external world. The use may use
either of the above ports to access, maintain and manage the system, either locally or remotely over an
IP / secure IP link.
1. Super user
The “Super User”, who is also the system administrator, creates “users” and assigns the
password for each such “user”.
2. User
A “User” is any normal user of the system that is 'created' by 'superuser'. While the “normal users”
are provided with a complete access to the system, they have only a limited access to the OAM
settings and its configuration.
3. Audit user
An 'Audit User' is a user who shall be able to view and download the LOG file by accessing the
system on HTTP port (http://<system IP Address>) and shall not have access to anything else in
the system. Only 'superuser' can change his password.
1. Super user
The “Super User”, who is also the system administrator, creates “users” and assigns the
password for each such “users”.
“Super User” may create a new user and assign a password to the new user by invoking the
“add/user” command. Or “superuser” may change the password for an existing user by invoking
the “change/password” command. In any event, the OAM card creates and keeps a log of all such
actions made by “superuser” (or by the user itself) in its non-volatile memory.
I. Change the network configuration, i.e., IP Address, Subnet Mask, Gateway and DNS
Addresses
ii. Enable / Disable SNMP traps
iii. Change the SNMP Configuration, i.e., SNMP Read Community, SNMP Write Community,
Target IPAddress, Target Port and Target Community.
iv. See the users registered in the system.
v. Add a user, delete any user and change the password of any user.
vi. View the 'LOG' file stored in the system 'non-volatile' memory.
vii. Change the password of 'audit user' as well.
viii. Initiate Ping command to check network connectivity through the Ethernet port.
i The “Super User” shall not be able to log-in in the system through Ethernet port. A
“superuser”can only access the system through the serial RS232 port or the USB port to
add new users/create new passwords, or to change/modify the passwords of existing
users. This restriction is created to prevent un-authorized persons from gaining unlawful
access to any system and creating new users and passwords, or changing the passwords
of existing users. Only a person who has a physical access to the equipment can become a
superuser. This condition has been created to reduce the possibility of a compromised
access to the system.
ii The “Super User” shall not be able to read the passwords of any user (including his / her
own). Passwords are stored in the system in one-way encrypted form and cannot be read
back by either the superuser or by any of the users.
Note: i. Should the 'Super User' lose his access password, no method is provided or is
available to retrieve 'superuser' password. If 'superuser' loses his password then he
needs to contact the Support Desk.
ii. The factory default log-in name and password of the “Super User” are:
- default log-in name: superuser (case sensitive)
- default password: superuser (case sensitive)
A “Super User” can only access the system through the serial RS232 port or the USB port to add
new users / create new passwords, or to change / modify the passwords of existing users. This
restriction is created to prevent un-authorized persons from gaining unlawful access to any
system and creating new users and passwords, or changing the passwords of any of the existing
users. Only a person who has a physical access to the equipment can become a superuser.
A “Super User” may create/assign new passwords consisting of alpha-numeric characters that
have a minimum length of 8 such characters. Special characters are not allowed in the
passwords that have been created by the superuser. All users should be advised to change the
passwords that have been assigned to them by the superuser immediately upon receipt, since
such passwords that are assigned by the superuser are not qualified by the OAM card as strong
passwords by the embedded password strength ascertaining mechanism of the OAM card.
2. User
A “User” is any normal user of the system that is 'created' by 'superuser'. While the “normal
users” are provided with a complete access to the system, they have only a limited access to the
OAM settings and its configuration.
Change or read the network configuration, i.e., IP Address, Subnet Mask, Gateway and
DNS Addresses
Enable/Disable SNMP traps
Change SNMP Read Community and SNMP Write Community
See the users registered in the system
Add a user, delete any user and change the password of any user.
View the 'LOG' file stored in the system 'non-volatile' memory.
Read passwords of any user (including their own). Passwords are stored in the system in
one-way encrypted form and cannot be read back by either the superuser or any of the
users
Note: i. Should the ‘user' loose his access password, no method is provided or is available to the
“user” to retrieve the lost password. Only the 'superuser' can change a users' password if it
has been lost by the “user”. The initiation of such an action shall automatically create a
“log” file in the system's non-volatile memory.
ii. If a normal user changes self-password then such an event shall also be recorded in the
system 'LOG' file.
iii. The factory default log-in name and password of the “user” are:
- default log-in name: systemuser
- default password: systemuser
iv. The factory default “user” is established in the default settings to allow initial access to the
system through the Ethernet port. The factory default “user” should be deleted as soon as
the terminal is operationalized.
v. A maximum of 9 “users” (i.e., 9 normal users) may be added in a system by 'superuser’.
All “users” must change their passwords upon their receipt to maintain security.
The password that is created/changed/modified by the “user” must have the following
properties:
Same as username.
Sub-string of username.
Reverse of username.
Capitalized version of username.
The same character occurring for more than 50% of the length of the password.
The old password and new password being the same.
Blank (Null) passwords are not permitted.
It should contain at least eight characters, at the minimum (the maximum number of
characters allowed in a password are 30 characters)
! @ # $ % ^ & * , ; “
Cumulative password strength of less than 14 prompts the OAM interface to reject the password
as being "weak".
} }
Total length of the characters
+ 2 point for at least one lower case
+ 2 points for at least one upper case = Password strength
+ 2 points for at least one number
+ 2 points for at least one special character
3. Audit user
An 'audituser' is a user who shall be able to view and download the LOG file by accessing
the system on HTTP port (http://<system IP Address>) and shall not have access to anything
else in the system. Only 'superuser' can change his password.
Note: i. In default there, Audit User username and password are 'audituser'/'audituser'
respectively
ii. Only one audit user is possible per system.
The OAM interface provided with the equipment is a highly secured interface, compliant with all GR-
815 CORE 2 mandatory clauses, described below:
! Access to all communication ports (both Ethernet as well as serial ports) are password
protected
! Every entity that participates in connection-oriented communications exchanges shall be
provided with an entity identifier that is unique.
! User should have a valid login ID and password to access the system. There is no way to
bypass the login wizard.
! Users shall have unambiguous user IDs. It will not allow user to add existing and reserved
users
! Password should be of minimum 8 and a maximum of 30 alpha-numeric characters
! All passwords are case-sensitive
! Null passwords are not acceptable for any “user” that is allowed equipment access
through the 10/100BaseT Ethernet port
! Every user can change their own password
! Only 'superuser' can add a user, delete any user and can change the password of any user
! Only 'superuser' can change password of any user
! The 'superuser' cannot view the password of any user including his own password as all
the password are saved in one-way encrypted form in the system
! No users can view (even their own) passwords. All passwords are saved in one-way
encrypted form in the system
! System shall not reveal which part of the information entered by the user (user-ID and/or
password) is incorrect upon entering wrong user name and/or password
! Log-in information of all successful as well as un-successful attempts shall be
automatically recorded by the OAM in its non-volatile memory
! System will create a log and store the MAC address, IP address, date and time of all log-in
attempts, whether successful or un-successful attempts. (IP Address and MAC Address
shall be saved only of the users logging-in through Ethernet port using Telnet or SSH)
! All log-in information shall be stored in the system's non-volatile memory and only 'audit
user' may be able to see and download the complete LOG file using HTTP
! No one (Not even the 'superuser' or 'audit user') shall be able to delete the LOG files. Only
system may delete the old 'LOG' files on FIFO (first-in/first-out) basis in its log memory
! The security log shall have a circular recording mechanism (FIFO) to delete the oldest
entries first, and an appropriate administrator shall have a capability to retrieve, print, copy,
and upload the security log of a system
! The security log shall survive even after system power down or system restart
! Only 'superuser' has the access of the log files through serial ports (DB9 and USB)
! Cryptography-based confidentiality features / services support a choice of encryption
algorithms that are standardized RFCs. All passwords are stored in the system are in one-
way encrypted form.
! If the user enters the incorrect information up to three times, the login procedure is
terminated and the user is forced to exit and end the attempted log-in session
! An SNMP Trap with the user's IP Address and MAC Address shall be sent to the system
administrator after three consecutive un-successful log-in attempts are recorded on Telnet
! An SNMP Trap with the user's IP Address and MAC Address shall be sent to the system
administrator after any un-successful log-in attempts are recorded on SSH
! An SNMP Trap with the user's system fingerprint shall be sent if any connection flooding is
detected on Telnet and/or SSH
! An SNMP Trap shall be sent if system is unable record or log any event.
! The system generates a security log (for every successful login and password changed
event) attempt that contains information to support after-the-fact investigation of loss or
impropriety and appropriate management response.
! All authentication related modifications such as add / user, delete / user, change /
password, self / passwords are recorded and assigned to the respective User ID of the
operator executing that command.
! The security log shall have a circular recording mechanism (FIFO) to delete the oldest
entries first, and an appropriate administrator shall have a capability to retrieve, print, copy,
and upload the security log.
! The security log shall survive even after system restart and software upgrades (e.g., via
reloading).
! The system closes a port immediately if a session is interrupted due to reasons such as
time-out, power failure, link disconnection, etc.
Note: Please configure the current date and time in the equipment RTC Clock and restart (Power
OFF/Power ON) the equipment to make effective the updated date and time in the OAM Card
to ensure that all events and logs are time-stamped correctly.
SECTION: 5
HyperTerminal Settings
To use HyperTerminal for executing the CLI commands through COM Port (RS232), USB Port
and 10/100BaseT Management Port (LAN Port)
To use HyperTerminal for executing the CLI commands through COM Port (RS232 Serial), USB Port
and through the 10/100BaseT Management Port (LAN Port)
Important Instructions:
! The user can choose to use the HyperTerminal utility to access the equipment either through the
local serial/DB9 COM Port and USB Port.
! Alternatively, the user may use the HyperTerminal utility access the equipment through the
10/100BaseT Ethernet Management Port to remotely access the equipment over a TCP/IP
network.
! The CLI Commands shall remain same for all three options.
! Windows-based GUI is yet another option, which the user may select to configure the equipment
either through the local serial (DB9 COM) port, USB Port or the remote (10/100BaseT ethernet)
port over a TCP/IP network.
Note: HyperTerminal and GUI may not be used simultaneously. If you are accessing the equipment
through the GUI, please exit the GUI before connecting to use the HyperTerminal utility to
access the equipment through the serial / DB9 COM Port, USB Port or the 10/100BaseT
Ethernet management port for executing the CLI commands.
Click the Start button from the Task Bar of your PC.
Go to Programs>Accessories>Communications>HyperTerminal
Select the COM** option from the drop over menu, and click OK.
** COM1 / COM2 / COM3 depends upon your PC that is in use. To confirm the same, check it out in
the properties.
Change the Bits per second option to “115200” and flow control option to “None”.
115200
System Configuration:
PROCESSOR : ARM926ej-s @ 398 Mhz
RAM : 64 MBytes, DDR-1
FLASH : 512 MBytes, HYNIX SLC
Version : x.y
Login:
Next, click on File in the main menu and then click on Properties.
Note: If the option of “Echo typed characters locally” is checked, you will receive double
characters.
System Configuration:
PROCESSOR : ARM926ej-s @ 398 Mhz
RAM : 64 MBytes, DDR-1
FLASH : 512 MBytes, HYNIX SLC
Version : x.y
Login:
Type the below user name and password to enter system configuration mode as an Administrator.
Note: An administrator can change network address configurations (IP address, Subnet Mask and
Gateway) and as well as configuration of authentication and authorization through serial port
(DB-9 and USB) but administrator cannot access the system through Telnet or SSH.
Type the below user name and password to enter system configuration mode as a Normal
System User.
Note: A normal system user's account allows a user to authenticate to system services and be
granted authorization to access them on serial port (DB-9 and USB) as well as on Telnet and
SSH; however, normal system user cannot have the access to the network address
configurations and configurations of authentication and authorization.
Prompt will be generated by the system. Now the user can access/configure the system with
the CLI commands using the HyperTerminal utility.
Note: Please save the settings before you exit the HyperTerminal window for your future use.
Click the Start button from the Task Bar of your PC.
Go to Programs>Accessories>Communications>HyperTerminal
Select the TCP/IP (Winsock) option from the drop over menu and click OK.
The default IP Address, which is already programmed at the factory / default in the memory of the
system, is 192.168.1.101. To change the IP Address, please refer to CLI commands (OAM Interface
Configuration Commands) of the user manual.
Click on OK.
System Configuration:
PROCESSOR : ARM926ej-s @ 398 Mhz
RAM : 64 MBytes, DDR-1
FLASH : 512 MBytes, HYNIX SLC
Version : x.y
Login:
Next, click on File in the main menu and then click on Properties.
Note: If the option of “Echo typed characters locally” is checked, you will receive double
characters.
System Configuration:
PROCESSOR : ARM926ej-s @ 398 Mhz
RAM : 64 MBytes, DDR-1
FLASH : 512 MBytes, HYNIX SLC
Version : x.y
Login:
Type the user name and password to enter system configuration mode.
Prompt will be generated by the system. Now the user can access/configure the system with the CLI
commands remotely, over the 10/100BaseT Ethernet Port, using the HyperTerminal utility.
Note: Please save the settings before you exit the HyperTerminal window for your future use.
To Telnet the system, click on Start > Run next type telnet <system IP Address> (as shown in below
screen) and click on OK. The default IP Address, which is already programmed at the factory / default
in the memory of the system, is 192.168.1.101.
System Configuration:
PROCESSOR : ARM926ej-s @ 398 Mhz
RAM : 64 MBytes, DDR-1
FLASH : 512 MBytes, HYNIX SLC
Version : x.y
Login:
Type the user name and password to enter system configuration mode.
Prompt will be generated by the system. Now the user can access/configure the system with the CLI
commands remotely, over the 10/100BaseT Ethernet Port, using Telnet utility.
To retrieve the log files from the system run any standard web browser and type system IPAddress and
press enter (http://OAM_CARD_IPADDRESS/ with audit user username and password) as shown in
below screen. The default IP Address, which is already programmed at the factory / default in the
memory of the system, is 192.168.1.101.
The system will prompt for the username and password, as shown in the below screen:
Enter the username and password for Audit User. The default user name and password are as follows:
The following screen will come after putting the correct user name and password:
To retrieve a log file in text format from the web server, right click on that log file and click on ‘Save
Target As’ and provide appropriate path to save the file as shown in below screen
SECTION: 6
USB serial port is a plug and play device and it usually auto installs its driver in the connected PC. In the
event that the USB port does not work, please follow the steps below to install the device drivers.
1. Connect the USB serial port with computer through the USB Cable provided with the system.
2. Open the CD / DVD drive and insert the disk which has been supplied to you along with the
equipment.
3. Next, right click on My Computer and choose properties. System properties will appear.
4. Click on ‘Hardware’ tab and choose the ‘Device Manager’ option. The Device Manager will
appear on the screen.
5. Next, go to the device which shows the “attention required” sign. You will see a mal-functioned
device under other devices named “Gadget Serial v2.4”. Next, right click on “Gadget Serial
v2.4” and choose “Update Driver”.
6. A “Hardware Update Wizard” will appear on screen. Choose the “No, not this time” option
and click on ‘Next’.
7. Next, choose the “Install from a list or specific location (Advanced)” option and click on
‘Next’.
8. Next, choose “Search removable media (floppy, CD-ROM….)” and click on ‘Next’.
9. The “Hardware Update Wizard” will start searching the load the correct driver from the
CD-ROM. Please do not close or stop this process as it as it may take a few minutes to complete.
10. The following screen will appear when the “Hardware Update Wizard” has successfully
located the correct device drivers and begins installation of the required device drivers.
11. After the installation has been successfully completed, the following screen will appear. Please
click ‘Finish’ to close the wizard.
12. Next, again go the “Device Manager” where you will see the “attention required” alarm sign
appearing in the “Other Devices” category for the “USB Serial Port”.
13. Please “right click” on it and choose the “Update Driver” option.
16. The USB Serial comport has successfully installed in your computer and you can find it under
“Ports (COM and LPT)”. Please make a note and record the COM port number assigned to the
virtual USB Serial COM Port.
SECTION: 7
No Alarm
Perform the delay test on local Perform the delay test on remote
system system
CLI: manual/test CLI: manual/test
Installation is successful
End
Teleprotection Equipment Section 8
SECTION: 8
CLI Commands
System Prompt:
Normal Operational Mode Prompt for Configuration and Monitoring CLI statements.
Upon power-up, the system boots-up in this mode. The system configuration settings, settings
queries, alarms queries functions are possible in this mode.
In the Normal Operational Mode, the user may execute the following types of statements:
! Basic, RTC and Misc System settings.
! Query statements for system status and configuration monitoring.
Introduction
1. This section provides details to change the configuration mode (OAM / Normal) to configure the
Operation and Maintenance (OAM) Interface and System.
2. To make any changes in the OAM interface configuration (i.e., to make any changes in the
network specific settings e.g., to set the system IP Address, Subnet Mask, Gateway and SNMP
configuration), the system needs to be put into the “OAM Configuration Mode”.
3. To make any changes in the system configuration, the system needs to be put into the “Normal
Configuration Mode”.
4. Upon power-up, the system access interfaces which include the DB9 Serial (COM) Port, USB
Serial (COM) Port and the 10/100BaseT Ethernet Port shall accept all normal “system
configuration” commands which are product specific CLI commands as described with system
configuration commands.
5. However, the DB9 Serial (COM) Port and the USB Serial (COM) Port interfaces may also be
used to access the system for the purpose of OAM interface configuration (i.e., to make network
specific configuration e.g., IPAddress, Subnet Mask, Gateway and SNMP configuration). To put
the system into the “OAM Configuration Mode”, the following command may be executed:
6. The above command will put the system into the “OAM Configuration Mode”.
7. After OAM configuration is complete, the user must return the system to its “normal operation
mode” or should exit from the system completely, by executing the following commands:
PROMPT> $$exit {enter} – To return the system to its normal operation mode
OR
PROMPT> exit {enter} – To exit from the system i.e. session close
Note: The “$$exit” command will switch from the OAM mode and return the system to its “normal
operation mode”. The “exit” command shall logout and close the session.
Command Description
ALL USER HELP-COMMANDS
target1/addr=<IP Address> Trap Target 1 IP Address
target2/addr=<IP Address> Trap Target 2 IP Address
target3/addr=<IP Address> Trap Target 3 IP Address
target1/port=<port> Trap Target 1 Port
target2/port=<port> Trap Target 2 Port
target3/port=<port> Trap Target 3 Port
target1/comm=<string> Trap Target 1 {Upto 30 Alpha-Num characters}
target2/comm=<string> Trap Target 2 {Upto 30 Alpha-Num characters}
target3/comm=<string> Trap Target 3 {Upto 30 Alpha-Num characters}
self/password Change self password wizard
ver? Show OAM software version
settings? Shows OAM settings and configuration
help? Shows help command list
$$exit Move from OAM mode to Normal {System} Mode
exit Logout and exit from system
SUPER USER SETTINGS AND COMMANDS
ipaddr=<IP Address> Sets the IP Address of the System
subnet=<Subnet Mask> Sets the Subnet Mask of the System
gateway=<IP Address> Sets the Gateway IP Address of the System
dns1/address=<IP Address> Sets the DNS1 IP Address
dns2/address=<IP Address> Sets the DNS2 IP Address
read/comm=<string> Get Community {Upto 30 Alpha-Num characters}
write/comm=<string> Set Community {Upto 30 Alpha-Num characters}
snmp_en Enable SNMP Traps
snmp_dis Disable SNMP Traps
add/user=<Name>,<PWD> Add an user (case sensitive)
delete/user=<Name> Delete an user
change/password=<Name>,<PWD> Change password
show/users? Shows the user list
OAM LOG COMMANDS
LOG=authok Show log of all successful logins
LOG=authfail Show log of all failed attempts
LOG=authssh Show log of all login attempts using SSH
LOG=authtelnet Show log of all login attempts using TELNET
LOG=authserial Show log of all login attempts using Serial Port
LOG=authall Show complete access log file
LOG=chpass,<PWD> Change LOG User (Audit User) Password
TEST COMMAND
system/ping=<IP Address> Ping an IP Address
! @ # $ % ^ & * , ; ”
a) Pure numbers: birth dates, social security number, license plate, phone numbers;
b) Words and all letters only passwords (uppercase, lowercase or mixed) as palindromes,
consecutive or repetitive letters or adjacent letters on your keyboard;
c) Username, real name, company name or (e-mail?) Address in any form (as-is, reversed,
capitalized, doubled, etc.).
Super User Help Commands – These commands are executable only from RS232 and USB (Serial)
COM Port.
OAM Log Commands – These commands are only executable from RS232 and USB (Serial) COM
Port.
Test Command
System Commands
The “showhelp” query statement shall display all help sub-menus. All the help menus are viewable in
both Operational as well as Configuration modes.
PROMPTS:
Setting Statements
PROMPTS:
Nn={01-15}
This term refers to protection tripping schemes where the received command from the far-end
initiates tripping without qualification by local side protection. In direct tripping applications,
tripping commands are sent directly to the master trip relay and the receipt of the command
causes circuit breaker operation. The method of communication must be very reliable and
secure in implementing the Inter-Tripping or Direct Tripping protection schemes because any
signal detected at the receiving end will cause tripping of the circuit breakers at that end. The
communications system design must be such that interference on the communication channel
does not cause spurious trips. Implementation and use of Teleprotection Equipment using
C37.94 transmission algorithms mitigates and overcomes the likelihood of spurious or false
tripping to a very large extent.
Permissive Tripping
Permissive Tripping scheme is also referred to by some as the Differential Protection scheme.
Permissive tripping requires that a circuit breaker is tripped only where the received command
initiates tripping in conjunction with the local protection equipment responding to a fault.
Permissive tripping is based on an over-current measurement on the local side and comparison
with an over-current command received from the remote side to re-confirm the fault condition.
Permissive tripping requires reliable communication with the remote side for making decisions
and is more complex in implementation than Direct Transfer Tripping. The possibility of false
tripping is greatly reduced by implementing Permissive tripping schemes since the receipt of a
tripping command from the remote side must coincide with the local protection equipment
responding to a fault.
This term refers to a protection scheme where the received command from the far-end blocks
the operation of local protection. Blocking Protection Scheme utilizes principles that are similar
to the principles used in Permissive Tripping scheme; however, in an inverse manner. Blocking
Protection Scheme does not always need to depend upon communication with the remote side
to operate. When a fault is detected, this protection scheme initiates the operation and tripping of
its corresponding circuit breaker, unless it receives a “Blocking” command from the Remote side,
which prevents it to operate. Blocking Protection Scheme is less accurate than the Permissive or
Direct Tripping protection schemes since the decisions are taken unilaterally by the local side
based on the detection of a fault condition, unless it is “Blocked” by its corresponding remote side
from operating. Blocking Protection Scheme can cause spurious tripping more often than the
other two Protection Tripping Schemes hence rank's lower in reliability.
Note: The system supports all of the above “Tripping Modes” - Inter-Tripping (also known as
Direct Tripping or Transfer tripping), Permissive Tripping and Blocking Protection
Schemes. However, it is essential that any of the two inter-working channels on either side of
the link are set to work in the same “Tripping modes”.
Setting Statements
PROMPTS:
Set to “hourly[MM]” to
schedule transmission test
hourly.
Set to “minute/MM” to
schedule transmission test
at minute intervals.
PROMPTS:
PROMPTS:
PROMPTS:
PROMPTS:
For example:
time=16:32:55
{Prompt}> showdate {enter} date={day}:DD:MM:20 Displays current date.
YY
For example:
date=mon:11:11:2011
{Prompt}> resetrtc {enter} OK Resets the Real Time Clock (RTC)
to its default value.
PROMPTS:
NOTE {st} is
ON or OFF
{Prompt}> SENSE TRIP COUNTERS : Displays the
showtripcoun Port : 01 02 03 04 05 06 07 08 current status
ters {enter} POSITIVE COUNT : 00 00 00 00 00 00 00 00 of the trip
NEGATIVE COUNT : 00 00 00 00 00 00 00 00 counters.
DRIVE TRIP COUNTERS :
Port : 01 02 03 04 05 06 07 08
POSITIVE COUNT : 00 00 00 00 00 00 00 00
NEGATIVE COUNT : 00 00 00 00 00 00 00 00
{Prompt}> OK Clears all the
clearcounters trip counters.
{enter}
{Prompt}> PSU-1 & PSU-2 STATUS : Current status
showpsu PSU Mask Setting Status of connected
{enter} 1 Masked OK input power
2 Masked Not Detected supply.
{Prompt}> OK To
alarmack acknowledge
{enter} the alarm relay.
PROMPTS:
PROMPTS:
SECTION: 9
Ordering Information
Ordering Information
Note 1: The Trip Counter Display and Alarm Extension Unit is an optional extra unit which
interconnects with the main Teleprotection unit through an interconnecting cable (supplied
with the Trip Counter Display and Alarm Extension Unit).
Note 2: The Trip Counter Display and Alarm Extension Unit may, or may not be ordered with the
Teleprotection Equipment, depending upon the user requirements.
Valiant Communications Limited Valcomm Technologies Inc. Valiant Communications (UK) Ltd
71/1, Shivaji Marg, 4000 Ponce de Leon, Suite 470 1, Acton Hill Mews,
New Delhi - 110015, Coral Gables, FL 33146 310-328 Uxbridge Road,
India U.S.A. London W3 9QN, United Kingdom