Index – Rockwell Automation 1785-Lx6B,D17856.5.13 MNL. PLC-5 PROTECTED PROCESSOR User Manual

Page 30

Advertising
background image

Supplement

PLC-5 Protected Processor

Index

I–1

A

areas to protect, 1-4

attempts to bypass security mechanisms,

monitoring, 1-5

audience for this supplement, i

C

classes

assigning privileges to, 2-2

changing, 2-11

definition, i

commands

screened, i, 1-3

screened by protection mechanism,

3-5

communication channel

assigning default privilege class to,

2-6

limiting access to, 1-1

protecting, 1-3

control structures, protecting, 1-4

coprocessor port, 3-7

critical data tables, protecting, 1-4

D

data files

limiting access to, 1-1

protecting, 1-3

data-table element protection. See

DTEP

data-table write, preventing, 1-2

default privilege classes

assigning to all channels, 2-6

restoring, 2-11

download, aborted due to DTEP

violation, 3-6

downloading, protection during, 1-4

downloading files containing critical

logic, requirements before, 2-9

DTEP

definition, i

implementing, 3-1

testing, 1-2

using, 1-3

DTEP file

automatic protection, 3-2

clearing number from status file, 3-2

creating, 3-1

determining number of protection

ranges, 3-3

determining size, 3-1, 3-3

entering data-table ranges, 3-1

entering data-table ranges in,

guidelines, 3-3

entering data-table ranges in octal,

procedure, 3-4

entering number in status file, 3-1,

3-2

validation, 3-2

entering ranges to protect, 3-3

example, 3-4

example, 3-4

going into, 3-3

maximum number of protection

ranges, 3-3

setting up, 3-2

testing, 3-8

unused protection ranges, indicating,

3-3

verification, 3-4

DTEP mechanism

and offline programming, 3-5

downloaded files, 3-5

initiating, 3-2

offline protection, 1-4

restrictions

coprocessor port, 3-7

indexed addressing, 3-7

screened commands, 3-5

screening operation, 3-5

testing, 3-8

E

end user, definition, i

enhanced processors, protection

method, 1-1

Advertising