Fault position | Abnormal data | Theoretical command on the protection on L1 | Real command on the protection on L1 |
KI1 | Case 1, 2, 3, 4 | Unlock the protection | Unlock the protection |
KL1 | Case 1 | Unlock the protection | Unlock the protection |
KL1 | Case 2 | Lock the protection | Lock the protection |
KL1 | Case 3 | Unlock the protection | Unlock the protection |
KL1 | Case 4 | Lock the protection | Lock the protection |
KL2 or KL3 or KL4 | Case 1 | Unlock the protection | Unlock the protection |
KL2 or KL3 or KL4 | Case 2 | Lock the protection | Lock the protection |
KL2 or KL3 or KL4 | Case 3 | Unlock the protection | Unlock the protection |
KL2 or KL3 or KL4 | Case 4 | Lock the protection | Lock the protection |
KM1 | Case 1 | Unlock the protection | Unlock the protection |
KM1 | Case 2 | Lock the protection | Lock the protection |
KM1 | Case 3 | Unlock the protection | Unlock the protection |
KM1 | Case 4 | Lock the protection | Lock the protection |
KM2 or KM3 or KM4 | Case 1 | Unlock the protection | Unlock the protection |
KM2 or KM3 or KM4 | Case 2 | Lock the protection | Lock the protection |
KM2 or KM3 or KM4 | Case 3 | Unlock the protection | Unlock the protection |
KM2 or KM3 or KM4 | Case 4 | Lock the protection | Lock the protection |