Rockwell Automation 1785-Lx6B,D17856.5.13 MNL. PLC-5 PROTECTED PROCESSOR User Manual

Page 10

Advertising
background image

Chapter 1
Planning for a Protected System

1-5

As a means of monitoring end-user attempts to bypass security mechanisms,
you can monitor the status-file minor-fault bit (S:17/11). This bit indicates a
protection-violation attempt. It can be used to count intrusion attempts if you
add a rung of ladder logic that increments a counter and clears the minor-
fault bit on each attempt.

Program-File Conversion Rules

Follow the rules outlined below when sharing program files among
standard enhanced PLC-5 processors and PLC-5 protected processors.

Protected (PLC-5/x6) Processor

Standard (PLC-5/x0) Processor

PLC-5/x0
Offline File

X

Can restore standard-processor

files to protected processor

Cannot restore protected-processor

files to standard processor

X

Can convert standard-processor

files to protected-processor files

Cannot convert protected-processor

files to standard-processor files

Can save/restore protected-processor
files to protected processor

Can convert protected-processor files
to files for different protected processor

ASCII
File

X

Cannot export/import ASCII files

to/from a protected processor

PLC-5/x0
Offline File

PLC-5/x0
Offline File

PLC-5/x6
Offline File

PLC-5/x6
Offline File

PLC-5/x6
Offline File

PLC-5/x6
Processor

PLC-5/x0
Processor

CU

CTU

COUNT UP

Counter

Preset

Accum

C5:0

10

0

DN

S:17

11

S:17

11

U

Advertising